IoT Next Surveillance Frontier, Says US Spy Chief - InformationWeek
IoT
IoT
Government
News
2/10/2016
04:06 PM
50%
50%
RELATED EVENTS
[Cybersecurity] Costs vs. Benefits
Feb 28, 2017
This online event, hosted by the editors of Dark Reading, brings together IT security leaders, bus ...Read More>>

IoT Next Surveillance Frontier, Says US Spy Chief

US Director of National Intelligence James Clapper delivers chilling remarks regarding the Internet of Things, noting there may come a day when spy agencies may tap into IoT for surveillance, network access, and more.

10 Stupid Moves That Threaten Your Company's Security
10 Stupid Moves That Threaten Your Company's http://staging.new.informationweek.com/admin/document.asp?doc_id=1324261&wysiwyg=yesSecurity
(Click image for larger view and slideshow.)

Security threats on the growing Internet of Things industry may be looming larger than initially anticipated, with government spy agencies potentially being thrown into the mix, along with cyber-criminals looking to pilfer personal information.

In chilling remarks, US Director of National Intelligence James Clapper told Senate members Tuesday that IoT devices may serve as a conduit for cyberthreats against the US.

"In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," Clapper is quoted in the Guardian.

(Image: nikauforest/iStockphoto)

(Image: nikauforest/iStockphoto)

However, Clapper did not divulge which, if any, spy agencies may be involved or contemplating such moves, but the possibility gives users another segment of hackers to be wary of. Beyond merely harboring concerns about hackers breaking into IoT devices to pilfer personal information for financial gain, users may be concerned about Big Brother types of breaches.

Security experts, according to the Guardian report, say they believe US and foreign spy agencies will glean information from signals transmitted by these IoT devices, similar to what is done with cell phones.

The IoT is definitely gaining attention as a viable target, so much so that at last year's DEF CON hacker conference an Internet of Things Village was added to the various hacker villages at the event.

To address the security of IoT devices, President Obama's new Cybersecurity National Action Plan, introduced Tuesday, calls for establishing a testing and certification center for IoT devices.

The emergence of zombified IoT devices is expected to be one of the largest security issues in 2016, according to a Dark Reading report. In fact, 2016 is expected to be the year hackers focus on turning IoT devices into the Botnet of Things, the report states.

[Read IoT Shows Its Worth to Businesses.]

In one example of how problematic, and potentially deadly, a hacked IoT device can be, consider the demonstration by famed car hackers Charlie Miller and Chris Valasek. The pair used remote control on a car being driven by a journalist driving a 2014 Chrysler Jeep Cherokee 70 mph on a highway. The pair killed the vehicle's ignition switch and steered it onto an exit ramp, while they sat on a couch 10 miles away.

For those living in smart homes or contemplating getting connected, the fear of being watched while burning dinner may have become a bit more real.

Are you an IT Hero? Do you know someone who is? Submit your entry now for InformationWeek's IT Hero Award. Full details and a submission form can be found here.

Dawn Kawamoto is a freelance writer and editor. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's News.com, TheStreet.com, AOL's DailyFinance, and The ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AlM951
50%
50%
AlM951,
User Rank: Apprentice
2/15/2016 | 10:30:57 AM
It's Probably Already Happening
If Clapper says it's a concern, it is probably already happening. In a chilling forewarning of the future about spyng via the IoT, I would reccomend the movie "The Recruit" starring Al Pacino.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll