Is The CIA Concerned About The Internet Of Things?

Is The CIA Concerned About The Internet Of Things?

Is The CIA Concerned About The Internet Of Things?

A recent forum on the future of warfare at the Aspen Security Centre in Colorado established that one of the major geo-security threats of the coming decades would be the internet of things – specifically the embedding of computers, sensors and internet capabilities into everyday objects. But why is the CIA worried?

Dawn Meyerriecks, the Deputy Director of the Central Intelligence Agency’s Directorate of Science and Technology, said today’s concerns about cyber war don’t address the looming geo-security threats posed by the Internet of Things. “Smart refrigerators have been used in distributed denial of service attacks”, she said. “At least one smart fridge played a role in a massive spam attack last year, involving more than 100,000 internet-connected devices and more than 750,000 spam emails”.

IoT

She believes we are currently at a position where the physical and virtual are merging into one single reality – a situation which will inevitably create security and access problems for those within the organisation. Nonetheless, Meyerriecks says the CIA have no excuse for being caught out by technological growth or “punctuating technological disruptions” that can be easily predicted by today’s trends. She used the example of the mobile phone to define a ‘disruptor’, saying “when it goes from the brick to something I can’t leave my house without, then it’s disruptive”.

The CIA also believe the internet of things can make people vulnerable. Dick Cheney, former U.S. Vice President, had a wireless pacemaker installed in his chest in 2007 that would have allowed his doctor to monitor his heart online – but he didn’t enable the Bluetooth broadcasting feature for fear of it being hacked. The CIA is clearly concerned that – given our inability to secure data on our desktop computers – there could be an entire generation of baby boomers who are becoming vulnerable to lethal cyber attacks because of internet-enabled medical devices. It sounds far-fetched, but it’s becoming a reality.

These latest claims of supposed worry lie in sharp contrast to a 2012 interview given by then CIA Director David Petraeus in which he enthused about the possibilities. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus said, “particularly to their effect on clandestine tradecraft”.

With the rise of the smart home, the CIA is undoubtedly more than happy for you to send tagged, geolocated data that the agency can intercept in real time. Items of interest will be located, identified, monitored and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all of which will be connected to the next-generation internet using abundant, low-cost, and high-power computing.

Which is the truth? Is the internet of things good or bad for the CIA? Let us know in the comments below.

(Image Source: Shutterstock)

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…