Monday, September 29, 2014
Survival of the Paranoid
She received an alert from credit card Company of a debit of $50 from the neighborhood grocery store. She panicked and then remembered that it was probably the refrigerator ordering replenishments (My refrigerator has gone shopping). She was however worried about what did it end up ordering. Having finished the orange juice from the last purchase and not wanting anymore, nor the horrible cake that came as an offer last time (She was anyway trying to lose weight). She then received the e-bill on mail and was shocked to see sausages and beef steak ! These did not exist in the master list and decided to visit the store on the way back to find out what had gone wrong.
Recently I was at a cybersecurity conference in the country which boasts of the maximum number of IT security startups and companies. They continue to redefine information and cyber security in ways that most of us would find hard to imagine. The new and old are not focusing just to make better antivirus or firewalls or mobile device management solutions; their R&D has transcended conventional boundaries. With Internet of (Every)Things and all kinds of devices communicating with again all kind of devices, the channels need to be secured.
The use cases discussed sounded straight out of science fiction or futuristic movies except that all were stark reality which we are rarely exposed to. The innocuous IP audio-conferencing phone in the meeting room as a listening device or the video conferencing equipment transmitting images or streaming live unknown to everyone. Directional antenna sniffing the airwaves and breaking wireless networks or RFID tags or readers in a manufacturing facility misbehaving and making a mess of the inventory and production plan.
At our homes the number of connected devices is increasing; for me it started with my streaming media box, then the television followed by the gaming console which was fighting with multiple tablet and laptop computers. My new car wants to send messages to the service station when it felt sick and my GPS has a mind of its own routing me through lesser known roads in a quest to get me to my destination faster and screwing up. When I have not finished my daily dose of walking my fitness ban posts on social media embarrassing me.
It is not a stretch of imagination to believe that these devices can be infected with malicious code which may change behavior or purpose. Individuals unknowingly changing their daily pattern or nudged in an alternate direction by compromised devices can impact their professional actions and outcomes. Why do you need to break into a trading system, break the trader, it’s easier ! Shutting down an electrical grid is big effort, shut down people or change them; use sensors to hack into the system. I was stunned by the possibilities.
In the future with every device connected and transmitting or receiving information, intelligence is corruptible and creates new scenarios of what can go wrong. Recent demonstrations though not malicious in intent of some highly computerized cars being hijacked predict an unstable future. The ability to patch or secure the large number of devices (estimated at 20 billion plus), company provided or individual owned BYOD enabled will be a veritable nightmare for the enterprise security managers and CIOs.
Enterprises are pushing to create new opportunities that become possible with IoT; some of these maybe seeded with hare brained ideas though I believe many will survive and become the next big thing of tomorrow. I believe that everyone needs to be cognizant of the fact that IoT is here to stay; how we leverage it within our ecosystem will give a differentiated advantage that success stories are made of. Every new hyped technology falls through the trough of disillusionment before becoming mainstream. Stay invested.
She reached the store and challenged them demanding a refund and the fact that they had goofed up majorly. In return they showed her the order which did contain specific brand of sausages and steak. She called the refrigerator company who informed her that the last software upgrade had added social media features and her refrigerator had accepted a request from the specified company to receive promotions. The conversion of the promotion to order was probably a bug which they will investigate and patch the firmware.
I wonder if a virus were to infect the refrigerator, what would it do ?