IoT
IoT
Government
News
2/10/2016
04:06 PM
50%
50%

IoT Next Surveillance Frontier, Says US Spy Chief

US Director of National Intelligence James Clapper delivers chilling remarks regarding the Internet of Things, noting there may come a day when spy agencies may tap into IoT for surveillance, network access, and more.

10 Stupid Moves That Threaten Your Company's Security
10 Stupid Moves That Threaten Your Company's http://staging.new.informationweek.com/admin/document.asp?doc_id=1324261&wysiwyg=yesSecurity
(Click image for larger view and slideshow.)

Security threats on the growing Internet of Things industry may be looming larger than initially anticipated, with government spy agencies potentially being thrown into the mix, along with cyber-criminals looking to pilfer personal information.

In chilling remarks, US Director of National Intelligence James Clapper told Senate members Tuesday that IoT devices may serve as a conduit for cyberthreats against the US.

"In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," Clapper is quoted in the Guardian.

(Image: nikauforest/iStockphoto)

(Image: nikauforest/iStockphoto)

However, Clapper did not divulge which, if any, spy agencies may be involved or contemplating such moves, but the possibility gives users another segment of hackers to be wary of. Beyond merely harboring concerns about hackers breaking into IoT devices to pilfer personal information for financial gain, users may be concerned about Big Brother types of breaches.

Security experts, according to the Guardian report, say they believe US and foreign spy agencies will glean information from signals transmitted by these IoT devices, similar to what is done with cell phones.

The IoT is definitely gaining attention as a viable target, so much so that at last year's DEF CON hacker conference an Internet of Things Village was added to the various hacker villages at the event.

To address the security of IoT devices, President Obama's new Cybersecurity National Action Plan, introduced Tuesday, calls for establishing a testing and certification center for IoT devices.

The emergence of zombified IoT devices is expected to be one of the largest security issues in 2016, according to a Dark Reading report. In fact, 2016 is expected to be the year hackers focus on turning IoT devices into the Botnet of Things, the report states.

[Read IoT Shows Its Worth to Businesses.]

In one example of how problematic, and potentially deadly, a hacked IoT device can be, consider the demonstration by famed car hackers Charlie Miller and Chris Valasek. The pair used remote control on a car being driven by a journalist driving a 2014 Chrysler Jeep Cherokee 70 mph on a highway. The pair killed the vehicle's ignition switch and steered it onto an exit ramp, while they sat on a couch 10 miles away.

For those living in smart homes or contemplating getting connected, the fear of being watched while burning dinner may have become a bit more real.

Are you an IT Hero? Do you know someone who is? Submit your entry now for InformationWeek's IT Hero Award. Full details and a submission form can be found here.

Dawn Kawamoto is a freelance writer and editor. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's News.com, TheStreet.com, AOL's DailyFinance, and The ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AlM951
50%
50%
AlM951,
User Rank: Apprentice
2/15/2016 | 10:30:57 AM
It's Probably Already Happening
If Clapper says it's a concern, it is probably already happening. In a chilling forewarning of the future about spyng via the IoT, I would reccomend the movie "The Recruit" starring Al Pacino.
Time to Reconsider Enterprise Email Strategy
Time to Reconsider Enterprise Email Strategy
Cost, time, and risk. It's the demand trifecta vying for the attention of both technology professionals and attorneys charged with balancing the expectations of their clients and business units with the hard reality of the current financial and regulatory climate. Sometimes, organizations assume high levels of risk as a result of their inability to meet the costs involved in data protection. In other instances, it's time that's of the essence, as with a data breach.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of August 14, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.