‘Internet of Things’ an Absolute Goldmine for Big Brother, Admits Top US Spy

TECHNOLOGY, 15 Feb 2016

Jon Queally – Common Dreams

DNI James Clappers acknowledges “intelligence services might use the [web-connected home devices] for identification, surveillance, monitoring, location tracking, and targeting for recruitment.”

Though DNI James Clapper did "not specifically name any intelligence agency as involved in household-device surveillance", reports Spencer Ackerman, "security experts examining the internet of things take as a given that the US and other surveillance services will intercept the signals the newly networked devices emit, much as they do with those from cellphones." (Image: Shutterstock)

Though DNI James Clapper did “not specifically name any intelligence agency as involved in household-device surveillance”, reports Spencer Ackerman, “security experts examining the internet of things take as a given that the US and other surveillance services will intercept the signals the newly networked devices emit, much as they do with those from cellphones.” (Image: Shutterstock)

9 Feb 2016 – Sworn testimony delivered to the U.S. Congress by Director of National Intelligence James Clapper raised eyebrows on Tuesday as he acknowledged publicly for the first time that surveillance agencies are almost certain to exploit (if they aren’t already) the increasing number of web-connected devices—also known as the “Internet of Things”—as a way to keep tabs on the population in the coming years.

“In the future, intelligence services might use the [Internet of Things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” Clapper said in his submitted testimony (pdf).

In a piece at The Register—titled “We’re going to use your toothbrush to snoop on you, says US spy bosstech-security journalist Kieran McCarthy reports Clapper’s acknowledgement that the Internet of Things (IoT) is a “potential goldmine for surveillance” echoes “a similar conclusion reached by academics last week.” The testimony on Tuesday, McCarthy adds,  follows “repeated warnings over the poor security standards included in smart-home products, even the most well-resourced and well-known. Recently, the Ring doorbell and the Nest thermostat were discovered to have security vulnerabilities that could provide an attacker with your Wi-Fi password – and so access to your home network.

According to Guardian journalist Spencer Ackerman, Clapper’s admission about the surveillance potential of networked home devices—which also include wi-fi enabled smoke detectors, larger appliances, and entertainment systems—”is rare for a US official.” Not commonly discussed in public, Ackerman points to a 2012 speech by then CIA director David Petraeus who described the surveillance implications of such devices as “transformational … particularly to their effect on clandestine tradecraft.”

Though Clapper did “not specifically name any intelligence agency as involved in household-device surveillance”, reports Ackerman, “security experts examining the internet of things take as a given that the US and other surveillance services will intercept the signals the newly networked devices emit, much as they do with those from cellphones. Amateurs are already interested in easily compromised hardware; computer programmer John Matherly’s search engine Shodan indexes thousands of completely unsecured web-connected devices.”

As McCarthy adds:

The data from IoT products can potentially be hugely valuable. Many include microphones and motion sensors, for example, such as new smart TVs, kids’ toys and voice-controlled products like Amazon’s Echo.

It wasn’t just the internet of things that Clapper is worried/excited about. He also references that artificial intelligence is provided a similar risk/opportunity. By meddling with or anticipating the results of algorithms, a huge number of AI systems “are susceptible to a range of disruptive and deceptive tactics that might be difficult to anticipate or quickly understand.” On the flipside, however, they also “might create or enable further opportunities to disrupt or damage critical infrastructure or national security networks.”

And it’s not just the government spies that people worry about. In a post at ZDNet last year, Steve Ranger explores the many pitfalls and concerns presented by IoT, including the way in which private corporations will exploit the connectedness of new technologies.

“The IoT could be one of the purest outgrowths of late capitalism imaginable,” explained Ranger, “one that can packages your every waking minute into a product (and the sleeping ones too, of course — there’s many a way of making money out of the data you generate in your slumber).

“There’s a real danger that it could form part of the ongoing erosion and corporatisation of private spaces in the quest for profit. In a surveillance economy, privacy represents an opportunity for profit forgone.”

_________________________________

Jon Queally is senior editor and staff writer for Common Dreams.

This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

Go to Original – commondreams.org

Share this article:


DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

Comments are closed.