The Internet of Things: A Brief on Modern IoT Threats and Other Risks

Our team will briefly talk about the history of the emergence of the IoT and the current problems of the industry.



History



The idea of ​​devices that exchange data and interact with the Internet was discussed back in the 70s and 80s. Visionary Hollywood filmmaker James Cameron first explored this in his legendary blockbuster The Terminator (1984), where the Skynet network became self-aware and took over every machine in the world, leading to war.



The phrase "Internet of Things" itself was first used in the 90s by British tech guru, Kevin Ashton , co-founder of the Auto-ID Center at MIT. In 1999, Neil Gershenfield published When Things Start Thinking. In it, he explored the concepts of the Internet of Things.



Journalist Neil Gross predicted in his 1999 Businessweek article:



In the next century, planet Earth will put on an electron shell. She will use the Internet as a support to support and convey her feelings. This skin is already sewn together. It consists of millions of built-in electronic measuring devices: thermostats, pressure gauges, pollution detectors, cameras, microphones, glucose sensors, ECG, electroencephalographs. They will explore and control cities and endangered species of animals and plants, the atmosphere, ships, highways and trucks, conversations, human bodies and even ... dreams.



image

Image: Unsplash



The revolution



The desire to connect the physical world with the Internet, improving the quality of life for consumers is a key strategy of technology, marketing and strategic teams of global companies.



For example, Dropcam and RemoteLock have products and apps that allow people to lock doors and monitor homes from their smartphones, and alert related services to fires, floods and robberies. This happens in real time.



For example, if you forgot to turn off your TV, then using the app from Comcast and Google, you can do it from your smartphone. If you have lost your keys, just attach the Tile bluetooth tracker to your keys, and you will be able to find them in no time.



LG, Samsung, Whirpool and Sony are making smart home technologies. Amazon Echo has voice recognition feature. It is compatible with other connected devices, web music services (Pandora and Spotify), and can perform other tasks with a voice command, including calling an Uber taxi, controlling the lights and temperatures in your home, sharing news, weather forecasts, and making phone calls.



How does IoT work?



Each IoT device / machine contains sensors associated with the cloud-based IoT platform. The latter, in turn, collects, processes, and distributes data from each connected device / sensor, allowing devices to interact with each other and on the Internet (this process of machine-to-machine communication through IoT platforms is called M2M).



Challenges



In some ways, IoT has the same challenges as blockchain. This is primarily due to the unpredictable and constantly evolving nature of the Internet:



  • . , IoT — « » , . , , … ! , IoT. (, Stuxnet ). Mirai 2016 , Netflix, Reddit Airbnb. « ».
  • . , IoT « » — , . IoT. , , IT . , . . .


IoT ?



image

Image: Unsplash



While we don't have superintelligent machines yet - the legal, political, social, financial and other regulatory issues are so complex and broad that we need to look at them now from an IoT perspective. Then it will be possible to work with them safely in the next 10-20 years. Artificial intelligence is already a threat in its current form. And here are some of the possible risks of a superintelligent IoT:



Autonomous weapons . AI can be programmed to kill. It can be assumed that the nuclear arms race will be replaced by a global autonomous arms race. The victorious country will rule the entire world.



In addition to the risk of the weapon gaining sentience upon activation, it will likely be difficult to disable or stop fighting.



Social manipulation... Offline algorithms are highly effective in targeted social media marketing. They know who we are, what we like, and they know what we think.



The US continues to investigate Cambridge Analytica and other companies, which used data from 50 million Facebook users in an attempt to influence the outcome of the 2016 US presidential election and the UK Brexit referendum. If the accusations are correct, then this is a clear illustration of the use of AI for social manipulation. By spreading propaganda to people identified by algorithms and personal data, AI can target them and spread any information, in any format, that is most compelling to humans.



Violation of privacy... Now you can track and analyze every movement of a person on the Internet, as well as see when he is going about his daily activities. Cameras and face recognition algorithms are everywhere. Everyone already knows who you are. This type of information analysis is used in China: each citizen is given a personal score depending on their behavior - how they move around the streets, whether they smoke in the wrong places, how long they play video games, etc. When “Big Brother is watching you,” and then making decisions based on his data, is no longer just an invasion of privacy. This is social oppression.



Inconsistency between human and machine goals... People appreciate efficiency and effectiveness in AI machines. But it can be dangerous if the goals of the machine are different from those of humans. For example, the command “get me to the airport as soon as possible” can have dire consequences for other road users. Yes, the car will efficiently complete its task - it will take you to the airport on time. But it can leave behind a train of accidents, fines and even ... deaths!



Discrimination . Since machines can collect, track and analyze data, it is possible that they will start using information against you. It's not hard to imagine annoying calls from an insurance company who found out that you recently had an accident. Or the employer who fired you based on your "social credit rating".



conclusions



The IoT industry appeared only in 2005. She needs time to "mature". But at the same time, the period of its ripening is "black soil" for hacker attacks. Therefore, companies are investing millions of dollars in hackathons exploring vulnerabilities in the IoT.



Simply put, the top of the mountain will be the companies that will provide security on IoT platforms and related equipment, as well as those who will solve the relevant business and consumer problems using IoT goods and services.



But any powerful technology, as we know, can be misused. Artificial intelligence works today for many good purposes. This includes making better medical diagnoses, finding new cancer treatments, and making cars safer. However, as artificial intelligence expands, we will also see it being used for dangerous or malicious purposes.



All Articles