|By Shelly Palmer||
|March 22, 2017 09:15 AM EDT||
You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each other now, unfortunately. There was an article this week that talked about how you can surveil someone through their phones, certainly through their television sets, any number of different ways. And microwaves that turn into cameras, etc. So we know that that is just a fact of modern life.”
On its face, her statement about “microwaves that turn into cameras, et cetera” is ridiculous. It reminds me of the late Sen. Ted Stevens’ famous “Tubes” speech. I went right after “Uncle Ted” for his techno–faux pas, but even then, there were bigger issues to consider. It would be exceptionally easy to jump all over Ms. Conway for her techno–faux pas. But doing so would be taking a cheap shot at an easy target while completely missing a very, very important teaching moment.
You Cannot Hide
First and foremost, if you are a normal person who does not have a professional security team ensuring your privacy, and you are targeted, you cannot hide. There are countless legal and illegal ways to watch you (assuming you’re interesting enough to be watched), and you will not know you are being watched until someone makes use of the surveilled material. Get over it. As Ms. Conway suggests, “that is just a fact of modern life.” If you’re wondering what these mysterious “countless ways” might be, type “surveillance” into Google and read through some of the 186 million results. This may have been her point. If it was, she was just fear-mongering. Very few people are interesting enough to be watched.
Professionals Have Countermeasures
If your personal or business dealings require enterprise-grade security and privacy, you can hide. Although, even professional surveillors have trouble keeping up with professional surveillees – and vice versa, because surveillors and surveillees are locked in an iterative, accelerating arms race that will never end. That said, if this is the “fact of modern life” Ms. Conway was referring to, she either misspoke or was just misinformed about microwave ovens.
A Massive Gap in Understanding
The bigger problem with Ms. Conway’s statement was that it clearly illustrated that she has no idea what is, or is not, technologically possible. A blanket statement about digital surveillance may fulfill her communications mandate, but it raises a serious question: Does she (or do the people who crafted her message) know enough about the technology she’s attempting to describe to hold informed, rational policy discussions about it? And without this understanding, is it possible to lead the world into the 21st century?
Policy is already years behind technology, and it’s falling farther behind every day. Our elected officials need to have either a deep understanding of technological capabilities that are just over the horizon or the ability to enlist (and listen to) world-class tech advisors or, preferably, both. Sadly, this requirement for future-preparedness is not in evidence.
The Imminent Danger of IoT
Smart homes and connected devices are everywhere, and with the advent of natural language understanding (NLU) systems such as Alexa Voice Services, sales are becoming robust. Over the next few years, we will find sensors in every conceivable device, and all of these devices (an estimated 50 billion of them) will be connected to some kind of network.
Data security is already a formidable problem, and it will be an even bigger problem moving forward. But device security is also going to command our attention. There are almost no ubiquitously agreed-upon security standards for IoT devices. Just how many unregulated transceivers with central processing units do you want in your home? Is the hard-coded, unchangeable password to that network-connected, budget indoor/outdoor thermometer “1234?” If so, welcome to hacker heaven. Could an inexpensive device like this be used by hackers to commit a massive DDoS attack? In October 2016, that’s exactly what happened.
Will someone hack your devices to do something even worse? Time will tell, but Kellyanne Conway could have used her moment in the spotlight to ask real questions about IoT. BTW, earlier this week, Maureen Ohlhausen, acting head of the Federal Trade Commission, said the “Internet of Things should self-regulate.” ’Nuff said.
Turning Your Microwave into a Camera
As promised, here’s how to turn your microwave (oven), which is what I think Ms. Conway meant, into a camera.
Take a smartphone and connect it to your local area network (WiFi). Download any time-lapse photography app you like. Now, duct tape the smartphone to your microwave. Do your best to camouflage it and hide the charging cord. Walk away saying something like, “Nothing to see here, folks” to divert the attention of the curiosity seekers.
Your microwave has now been turned into a camera. Of course, it will still work as a microwave – that’s what’s so great about this! Who in their right mind would ever think a microwave could be turned into a camera?
All kidding aside, there is no way to take a microwave oven and use it “as is” as a surveillance tool. Microwave ovens are shielded, not typically network-connected, and they do not possess the proper component parts for image-making. Even the transducer that makes the beep is not really suited for use as a microphone.
Importantly, this is not true of other devices Ms. Conway mentioned. A professional can easily install software in a smart television (which typically features a microphone for voice recognition and a camera for gesture control) for surveillance use. In practice, anything with a transducer (microphone or speaker) in your home that is network-connected is a relatively easy target for espionage. But – and this is a big but – in almost every case, someone would need to break into your home to do the required modifications. This is not true with respect to turning your smart phones or some other types of smart devices against you. That can be done remotely.
Lastly, none of these surveillance techniques are easy to accomplish, and all of them require a warrant from a court of competent jurisdiction. But the rules only apply to governments and law enforcement. Criminals (hackers and other bad guys) don’t tend to follow rules or regulations. That’s what makes them criminals. So, without promoting fear, uncertainty and doubt (FUD) and without espousing conspiracy theories, let me leave you with one thought. It’s the Wild West, it’s getting wilder by the day, and there ain’t no sheriff.
“We just completed the roll out of our first public and private cloud offerings, which are a combination of public, hybrid, and private cloud,” stated Erik Levitt, CEO of Open Data Centers, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at the Javits Center in New York City. Cloud Expo® 2014 Silicon Valley, November 4–6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the...
Feb. 27, 2015 07:00 PM EST Reads: 10,322
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, will discuss how a user-centric Application Performance Management solution can help inspire your users with every appli...
Nov. 2, 2014 07:00 PM EST Reads: 7,659
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In their General Session at 15th Cloud Expo, Phil Jackson, Development Community Advocate at SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, to discuss how to take advantage of a multitude of compute option...
Oct. 12, 2014 10:00 AM EDT Reads: 7,742
With the explosion of the cloud, more businesses are transitioning to a recurring revenue model to generate reliable sales, grow profits, and open new markets. This opportunity requires businesses to get to market quickly with the pricing and packaging options customers want. In addition, you will want to take advantage of the ensuing tidal wave of data to more effectively upsell, cross-sell and manage your customers. All of this is possible, but only with the right approach. At 15th Cloud Exp...
Oct. 8, 2014 05:00 AM EDT Reads: 5,892
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, moving it to the cloud, or taking a hybrid approach. She will use real customer examples to illustrate the tradeoffs, key decision points, and how to be successful with a cloud or hybrid cloud solution.
Oct. 7, 2014 10:00 AM EDT Reads: 8,342
Planning scalable environments isn't terribly difficult, but it does require a change of perspective. In his session at 15th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will broaden your views to think on an Internet scale by dissecting a video publishing application built with The SoftLayer Platform, Message Queuing, Object Storage, and Drupal. By examining a scalable modular application build that can handle unpredictable traffic, attendees will able to grow your de...
Oct. 2, 2014 10:00 PM EDT Reads: 6,480
The cloud provides an easy onramp to building and deploying Big Data solutions. Transitioning from initial deployment to large-scale, highly performant operations may not be as easy. In his session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, will discuss the benefits, weaknesses, and performance characteristics of public and bare metal cloud deployments that can help you make the right decisions.
Sep. 11, 2014 10:30 PM EDT Reads: 7,130
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects – scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
Sep. 10, 2014 06:30 PM EDT Reads: 8,683
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? I...
Sep. 10, 2014 03:00 PM EDT Reads: 7,532
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using...
Sep. 6, 2014 06:45 PM EDT Reads: 11,258