IoT
IoT
Government // Big Data Analytics
News
9/24/2014
01:00 PM
50%
50%
RELATED EVENTS
Stop Cyber Attacks with Threat Intelligence
Aug 30, 2016
In this informative webinar on August 30th you will hear security experts discuss practical ways t ...Read More>>

Internet Of Things Intrigues Intelligence Community

IoT presents big opportunity for intelligence agencies, along with information overload and privacy risks.

5 Early Cloud Adopters In Federal Government
5 Early Cloud Adopters In Federal Government
(Click image for larger view and slideshow.)

The Internet of Things has the potential to completely change the intelligence community. The IoT is jargon for the accelerating expansion of data-gathering devices that are connected to the Internet.

A panel of experts at the Intelligence & National Security Summit last week in Washington, D.C., agreed that the explosion of data is generally a good thing when it comes to meeting the mission of the intelligence community. However, it raises concerns about how to sift useful information from the vast quantities of data generated, as well as issues of privacy.

Lewis Shepherd, director and general manager of the Microsoft Institute, said that "there are three overriding vectors in the Internet of Things that we in the community can and should be thinking about."

IoT represents "a tremendous offensive collection capability and potential for operational use," he said, but added, "I think that's an overly limiting filter, if you will, an unhelpful filter, constraining the thinking of the community."

Lewis Shepherd,
Microsoft Institute
Lewis Shepherd,
Microsoft Institute

The second vector is finding ways for the intelligence community as an enterprise to make use of the actual technical capabilities of the IoT. As an example, he said, many people use a WiFi network for printing documents at home, but the intelligence community does not use that capability in their workplaces.

Finally, Shepherd said, the classic mission of the intelligence community is understanding the outside world, not just the adversary and his capabilities. "We cannot understand the world if we do not understand how the world is changing," he said, including "broader cultural, social, demographic" changes.

[The naked truth? Read Apple iCloud Hack's Other Victim: Cloud Trust.]

Rhonda Anderson, deputy national intelligence officer for science and technology in the Office of the Director of National Intelligence (ODNI), National Intelligence Council, said there are many, many questions the intelligence community has to address in considering how to make use of IoT data.

"What is it we want to connect? What will we use to connect it?" she said. "What data will you be collecting? How will it be moved, stored, will it be mobile?" She said she prefers the concept of "netted" devices, rather than connected, since IoT is not a social Internet.

Chris Reed, program manager in the Office of Smart Collection at the Intelligence Advanced Research Projects Activity (IARPA), noted that along with the challenge of selecting and prioritizing data, the question of accessibility remains.

The lack of interoperability is a real hurdle, Reed said. "Each of these have their own ways of collecting, transmitting, [and] using data. A lot of times you purchase a device and you're locked into a proprietary silo... Particularly on government procurements, we need to make sure we can unlock the value of the data."

Mark White, principal and CTO at Deloitte Consulting's global consulting technology practice, said that the "what of IoT has been relatively slow to emerge." It takes time to determine what is actually useful, rather than simply what can be connected. It takes time to sort out what is "interesting or actually disruptive," he said.

And while IoT represents an immense opportunity for understanding the world, relationships, actions, and people, it also offers heretofore unimaginable risks, said Robert Gourley, partner at Cognitio Corp. and editor and publisher of the CTO Vision blog.

"There will be bad guys in the future -- bad, bad, bad guys," Gourley said. "They're going to rush to this Internet of Things and they're going to out-innovate us... We have to automate, just to keep up."

He said that he agreed with the panelists on the initial challenge being how to sort all the data and analyze it.

"On the top of my list is the algorithms that make sense of this data," he said.

Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data. In the Partners' Role In Perimeter Security report, we'll discuss concrete strategies such as setting standards that third-party providers must meet to keep getting your business, conducting in-depth risk assessments -- and ensuring that your network has controls in place to protect data in case these defenses fail. (Free registration required.)

Washington-based Patience Wait contributes articles about government IT to InformationWeek. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JulieE419
50%
50%
JulieE419,
User Rank: Apprentice
9/14/2015 | 3:01:00 AM
Internet of Things (IoT). How will it change the Enterprise?
With so much of the current IOT hype focused on the consumer impact that wearables and the smart home will bring (plus daily reports of drones spying on celebrities), it can get lost in the noise that there are or will be plenty of great IoT solutions and benefits that exist for the business.

So, how is IoT for the consumer different than IoT for the business?
SaneIT
50%
50%
SaneIT,
User Rank: Ninja
9/25/2014 | 7:58:03 AM
IoT and the Intelligence Community
This has been a fear for as long as I've been hearing about IoT.  The piecing of data sets together from hundreds of sensors isn't farfetched so it doesn't surprise me to hear that the intelligence community is looking at how this can benefit their efforts.  Pretty soon "where were you on the night of..." will have to be stricken from any crime dramas and replaced with "a sensor put you in the vicinity of the crime". 
asksqn
50%
50%
asksqn,
User Rank: Ninja
9/24/2014 | 5:48:13 PM
All your data belong to the DMA & NSA
excerpt

>>It takes time to sort out what is "interesting or actually disruptive [...]<<

/excerpt

 

Translation:  What data can we sell to third parties for unknown purposes and how many loopholes in privacy law can we leap through/pay off our pet politicians to look the other way?

 

 
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of August 14, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.