Surveillance And The Internet Of Things

Technology Surveillance

The internet has been used for surveillance ever since its widespread adoption two decades ago. Hundreds of companies make huge profits by monitoring, recording and collating all our information, before either selling it to governments who want to pry on citizen’s lives or corporations who want to learn about everything from the effectiveness of their latest advertising campaigns to the demographic that are most interested in their products.

So far, however, these companies have only been able to use information garnered from computers, smartphones and tablets to build a profile about you. While they may learn massive amounts of information from what you search for on Google and what links you open on Twitter, a committed person easily build themselves a ‘fake’ profile by opening pages and clicking links that they really had no interest in.

All that is now starting to change with the growth of the ‘Internet of Things’ (IoT). As the sector grows we will start to see more and more of previously inanimate, standalone objects include internet connected modules. Cars and home appliances will all be able to collect and collate real-time data about everything from our health to our shopping preferences. How far away are smart advertising boards on the side of the road which can change their message in accordance with the person who is driving past?

The ultimate destination of the internet of things is that everything in our lives will have an internet connection. Already the IoT allows for a far greater amount of surveillance than was possible just a couple of years ago and the future reality will be that everything we do – both online and offline – will be recorded and stored for near-eternity.

Services such as Google Now already give a glimpse into this interconnected utopia. It tracks you permanently via your mobile phone and Gmail inbox to give you information as detailed as where you parked your car, how much traffic is expected on your drive to the office, when your favourite TV show is about to start and how far you have walked and/or cycled that month.

People concerned about surveillance should probably stay away from Google Glass – it cannot be too difficult for a hacker to get a live stream of what you are seeing and hearing through the device at any given time, while the falling price of airborne drones combined with their increased capabilities means facial recognition to easily see who is doing what from up in the sky is not too far away.

Of course, at the moment the amount of data is almost too massive to analyse, but as technology improves so will the ability to automatically sift through the huge quantities of information. If an object knows that it’s been purchased it means that whoever or whatever it is communicating with will know where you are and what you doing with it. It is unlikely that simple privacy settings will be sufficient – one only needs to look at Facebook’s ongoing privacy debacle to understand that virtually anyone can have access to your information if they are willing to pay for it.

What do you think? What is the future of surveillance on the internet of things?

By Daniel Price

Recovery Experts.png
Data Fallout.png
Disaster Plan.png
Disaster Recovery Plan.png
Stacey Farrar
Effective Data Migrations The cloud service industry is experiencing substantial growth. Gartner forecasts that spending on public cloud services will grow to $494.7 billion in 2022, up 20.4% from 2021. In 2023, end-user spending is ...
Alex Vakulov
Ransomware Database Targeting The scourge of ransomware is undoubtedly the most severe cyber security concern for home users and organizations these days. It revolves around taking important data hostage and demanding money, usually hard-to-trace cryptocurrency ...
Dan Teichman
Cloud-Native Communications Historically, Communication Service Providers (CSPs) networks ran on purpose-built hardware. However, in the early 2000s organizations started to update their infrastructure, moving to virtualization. Now, providers are looking to take the next step, ...
Threat Security
Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.