IoT Next Surveillance Frontier, Says US Spy Chief - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

04:06 PM

IoT Next Surveillance Frontier, Says US Spy Chief

US Director of National Intelligence James Clapper delivers chilling remarks regarding the Internet of Things, noting there may come a day when spy agencies may tap into IoT for surveillance, network access, and more.

10 Stupid Moves That Threaten Your Company's Security
10 Stupid Moves That Threaten Your Company's
(Click image for larger view and slideshow.)

Security threats on the growing Internet of Things industry may be looming larger than initially anticipated, with government spy agencies potentially being thrown into the mix, along with cyber-criminals looking to pilfer personal information.

In chilling remarks, US Director of National Intelligence James Clapper told Senate members Tuesday that IoT devices may serve as a conduit for cyberthreats against the US.

"In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," Clapper is quoted in the Guardian.

(Image: nikauforest/iStockphoto)

(Image: nikauforest/iStockphoto)

However, Clapper did not divulge which, if any, spy agencies may be involved or contemplating such moves, but the possibility gives users another segment of hackers to be wary of. Beyond merely harboring concerns about hackers breaking into IoT devices to pilfer personal information for financial gain, users may be concerned about Big Brother types of breaches.

Security experts, according to the Guardian report, say they believe US and foreign spy agencies will glean information from signals transmitted by these IoT devices, similar to what is done with cell phones.

The IoT is definitely gaining attention as a viable target, so much so that at last year's DEF CON hacker conference an Internet of Things Village was added to the various hacker villages at the event.

To address the security of IoT devices, President Obama's new Cybersecurity National Action Plan, introduced Tuesday, calls for establishing a testing and certification center for IoT devices.

The emergence of zombified IoT devices is expected to be one of the largest security issues in 2016, according to a Dark Reading report. In fact, 2016 is expected to be the year hackers focus on turning IoT devices into the Botnet of Things, the report states.

[Read IoT Shows Its Worth to Businesses.]

In one example of how problematic, and potentially deadly, a hacked IoT device can be, consider the demonstration by famed car hackers Charlie Miller and Chris Valasek. The pair used remote control on a car being driven by a journalist driving a 2014 Chrysler Jeep Cherokee 70 mph on a highway. The pair killed the vehicle's ignition switch and steered it onto an exit ramp, while they sat on a couch 10 miles away.

For those living in smart homes or contemplating getting connected, the fear of being watched while burning dinner may have become a bit more real.

Are you an IT Hero? Do you know someone who is? Submit your entry now for InformationWeek's IT Hero Award. Full details and a submission form can be found here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
2/15/2016 | 10:30:57 AM
It's Probably Already Happening
If Clapper says it's a concern, it is probably already happening. In a chilling forewarning of the future about spyng via the IoT, I would reccomend the movie "The Recruit" starring Al Pacino.
Rethinking Technology Road Maps for the Second Half of 2020
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  7/2/2020
The Best Way to Get Started with Data Analytics
John Edwards, Technology Journalist & Author,  7/8/2020
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
White Papers
Register for InformationWeek Newsletters
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Flash Poll