Monday, September 29, 2014

Survival of the Paranoid

She received an alert from credit card Company of a debit of $50 from the neighborhood grocery store. She panicked and then remembered that it was probably the refrigerator ordering replenishments (My refrigerator has gone shopping). She was however worried about what did it end up ordering. Having finished the orange juice from the last purchase and not wanting anymore, nor the horrible cake that came as an offer last time (She was anyway trying to lose weight). She then received the e-bill on mail and was shocked to see sausages and beef steak ! These did not exist in the master list and decided to visit the store on the way back to find out what had gone wrong.

Recently I was at a cybersecurity conference in the country which boasts of the maximum number of IT security startups and companies. They continue to redefine information and cyber security in ways that most of us would find hard to imagine. The new and old are not focusing just to make better antivirus or firewalls or mobile device management solutions; their R&D has transcended conventional boundaries. With Internet of (Every)Things and all kinds of devices communicating with again all kind of devices, the channels need to be secured.

The use cases discussed sounded straight out of science fiction or futuristic movies except that all were stark reality which we are rarely exposed to. The innocuous IP audio-conferencing phone in the meeting room as a listening device or the video conferencing equipment transmitting images or streaming live unknown to everyone. Directional antenna sniffing the airwaves and breaking wireless networks or RFID tags or readers in a manufacturing facility misbehaving and making a mess of the inventory and production plan.

At our homes the number of connected devices is increasing; for me it started with my streaming media box, then the television followed by the gaming console which was fighting with multiple tablet and laptop computers. My new car wants to send messages to the service station when it felt sick and my GPS has a mind of its own routing me through lesser known roads in a quest to get me to my destination faster and screwing up. When I have not finished my daily dose of walking my fitness ban posts on social media embarrassing me.

It is not a stretch of imagination to believe that these devices can be infected with malicious code which may change behavior or purpose. Individuals unknowingly changing their daily pattern or nudged in an alternate direction by compromised devices can impact their professional actions and outcomes. Why do you need to break into a trading system, break the trader, it’s easier ! Shutting down an electrical grid is big effort, shut down people or change them; use sensors to hack into the system. I was stunned by the possibilities.

In the future with every device connected and transmitting or receiving information, intelligence is corruptible and creates new scenarios of what can go wrong. Recent demonstrations though not malicious in intent of some highly computerized cars being hijacked predict an unstable future. The ability to patch or secure the large number of devices (estimated at 20 billion plus), company provided or individual owned BYOD enabled will be a veritable nightmare for the enterprise security managers and CIOs.

Enterprises are pushing to create new opportunities that become possible with IoT; some of these maybe seeded with hare brained ideas though I believe many will survive and become the next big thing of tomorrow. I believe that everyone needs to be cognizant of the fact that IoT is here to stay; how we leverage it within our ecosystem will give a differentiated advantage that success stories are made of. Every new hyped technology falls through the trough of disillusionment before becoming mainstream. Stay invested.

She reached the store and challenged them demanding a refund and the fact that they had goofed up majorly. In return they showed her the order which did contain specific brand of sausages and steak. She called the refrigerator company who informed her that the last software upgrade had added social media features and her refrigerator had accepted a request from the specified company to receive promotions. The conversion of the promotion to order was probably a bug which they will investigate and patch the firmware.

I wonder if a virus were to infect the refrigerator, what would it do ?

Monday, September 22, 2014

Big Brother is watching you !

“We are sorry Sir, we are unable to accept your order; thank you for calling your favorite dining place”. I am sure you have also received or read some of the messages floating around on social media where the protagonist is unable to order his favorite pizza or pasta or whatever dish you may want to imagine. He is repeatedly denied his request to quench his craving with inferences about his cholesterol or past illness or health insurance coverage; you can imagine the rest as it would probably pan out for the majority of us.

The situation is not too far in the future ! In an interconnected world, combination of personal, medical, social, financial and professional data creates new possibilities of analytical correlations that can be used or misused depending on how you look at the situation. Connected netizens fill in void hours in their lives on multiple devices through the day with status updates, browsing for information or clarifications on something that they are unable to comprehend. They leave behind a trail that can be picked up.

We already see this happening with targeted advertisements across various sites depending on our browsing behavior. Would you turn off cookies or stop accessing popular search engines from your mobile ? What about all the apps on the smartphone ? Some nifty utilities that make life so much easier; finding great restaurants, booking tables, looking up flight schedule or delay. Can these apps pry at other data on your smartphones or the remnants of bread crumbs and widgets start snooping around your laptop or tablet ?

I get this weird feeling when advertisements remind me of my visits to some websites like someone has been looking over my shoulder spying on me all along in my public and private moments. So I decided to confuse the intruders by randomly checking for exotic locations which I would never visit or check out merchandise that most sane people would shudder to buy. The trail it created led the crawlies on a red herring trail. I felt elated as if I had won a major war by thwarting the evil shenanigans in their quest to hound me.

Our dependence on technology is slowly and steadily shifting our thought patterns and the way we think. Intuitively we reach out to query a term or gather additional information adding to the vast amount of data we assimilate. We also seek help for simple and complex problems or situations rarely exerting our thinking prowess. I am not sure if this is good or bad, healthy or not, this has become a way of life. The extreme dependence of the newer generation also known as Digital Natives on technology is exciting and scary.

CIOs have struggled with BYOD getting entrenched across their enterprises and made half-hearted attempts to rope in the rogues with Mobile Device Management and other tools. But that is only part of the story; our incessant need to be online across all our devices adds to the trail we leave behind. Most of the providers have become our shadow with embedded trackers hiding their intent in fine print over 30 pages of agreements which no one reads and clicks “I Agree”. And guess what ? In most cases we don’t really care.

Every day we are flooded with huge amounts of quotes, stories, posts, pictures, videos sent to us by people we know. No one knows the origin or validity of the content we receive. Are we at the cusp of incremental revolution nudged by technology that is controlled by few who are playing with our decisions ? Are our cognitive behaviors are being shaped by some manipulative story teller who is pulling at our heartstrings in ways unknown to us ? Are we really in control of our actions and destiny anymore ?

The digitization of the world is an eventuality that cannot be wished away. It is gaining momentum every day and encompassing every aspect of our lives slowly and steadily. We are given choices on how we would like to engage with technology but peer pressure breaks down resistance quickly. I wonder if I have a mind of my own as I keep going back to technology to assist me with every step I take. As a kid I read the Orwellian tale about Big Brother watching me; I think the future has arrived stealthily without telling us !