RISK: Could Provide Access to Wi-Fi...

1
Smart homes are just one segment of the Internet of Things, which the Department of Commerce predicts will completely transform daily life and nearly every industry as “one of the most important technological trends of this decade.” Analysts predict that the industry could grow to $1.7 trillion by 2020 and potentially $4 trillion to $11 trillion by 2025, including up to $1.6 trillion for medical devices alone. While new levels of interconnectivity and automation create opportunities — with chore automation, energy savings and safety — they also come with tremendous risks to privacy and security. A vulnerability in one device could allow hackers entry to a Wi-Fi network and all other connected devices in the home, including a laptop and its data. While hackers could exploit personal data, the sheer amount of data these devices generate would also be a goldmine for marketers and advertisers, in addition to law enforcement and intelligence agencies. Personal conversations can be transmitted to a third party via a TV’s voice-recognition/ command software. Smart lightbulbs can be an easy entry point to the broader Wi-Fi network. Locks could be unlocked remotely by a third party. Hackers within close range of a fitness tracker could access the device via Bluetooth. Tied to motion sensors to maximize energy efficiency and convenience, or ward off potential intruders. Lights can be scheduled so the home appears to be occupied. Sources: National Telecommunications and Information Administration’s Request for Public Comment, Federal Register, April 6, 2016; Atlantic Council’s March 2016 issue brief on Smart Homes and the Internet of Things; Mckinsey Global Institute’s June 2015 report, “The Internet Of Things: Mapping The Value Beyond The Hype;” International Data Corporation; and Intel Security. By Patterson Clark and Janie Boschma, POLITICO Pro DataPoint PET TRACKER Monitors pet’s location and health trends WEBCAM / BABY MONITOR Monitor the home and keep an eye on the babysitter SMARTBED SECURITY SYSTEM / LOCKS Unlocks and re-locks doors or security system to let in repairman or visitors. Sends alerts in case of breach FITNESS TRACKER Helps track heart rate, sleeping patterns, physical activity and logs progress THERMOSTAT Use an app to adjust the temperature. Set a day-by-day temperature schedule so the thermostat adapts to actual energy needs, cuts energy usage and utility bills CHAIR Customize chair settings, such as temperature RISK: Could Provide Access to Personal Data These items collect personal data on location and health that could be valuable to third parties. The Department of Commerce’s National Telecommunications and Information Administration is currently requesting comment on the future of the Internet of Things and how the government can best support its growth, noting that “thus far no U.S. government agency is taking a holistic, ecosystem-wide view that identifies opportunities and assesses risks across the digital economy.” The Federal Trade Commission has issued advice on best practices for companies to follow in protecting consumer privacy and security, while individual agencies have intervened within their jurisdiction, such as Health and Human Services on medical devices, and the National Highway Traffic Safety Administration on self-driving cars. A bill introduced by Sen. Deb Fischer (R-Neb.) would require the Secretary of Commerce to convene an interagency working group to submit a report to Congress on how to plan for the explosion of the Internet of Things, particularly on planning for spectrum needs, but also to discuss potential regulation and issues related to consumer protection, privacy and security. What Is the Federal Government’s Involvement? RISK: Are Vulnerable to Ransomware TOASTER Program and monitor toasting progress RANGE Preheats oven, adjusts timer and monitors cooking progress remotely REFRIGERATOR Sends an alert in case of power outage and if door is left open. Also manages food inventory and expiration dates SMART TV Serves as hub for streaming video apps and traditional cable service CAR Keyless entry, collision avoidance WASHER/DRYER Devices with dashboard systems are vulnerable to lockout and ransomware. Hackers can also use such systems to order items surreptitiously. Program cycles remotely and monitor progress. Sends an alert if ducts are clogged Globally, there are now about 3.5 smart devices for every person. By 2020, that number is estimated to increase to 26 smart devices per person. SMART KETTLE Hot water is ready when you walk into the kitchen LIGHTBULBS Tied to motion sensors to maximize energy efficiency and convenience, or ward off potential intruders. Lights can be scheduled so the home appears to be occupied DOORBELL Wire-free installation, a doorbell rings when someone presses it or comes within range of a motion sensor. Records video SELF-GUIDED VACUUM IRRIGATION Schedule lawn irrigation remotely. Sprinklers can also self-regulate, depending on weather conditions. Minimizes water waste FLOOD DETECTION Early detection of water leaks, flooding or backups Tests itself regularly and in addition to sounding an alarm, it alerts phone if carbon monoxide levels are unsafe. Turn alarm off via an app in case of a false alarm Send warm or cool blast of air to just one room or several RISK: Could Provide Access to Wi-Fi Network These items may provide a gateway to other devices and the entire Wi-Fi network. Detects dust or hair and will auto clean around obstacles, after checking that no one is home A commandeered security camera can spy on a home’s occupants. As cars become more automated, the peril of a hack grows more severe. As cars become more automated, the peril of a hack grows more severe. A smart kitchen can be a weak spot for hackers to attack. Refrigerators and other appliances with dashboards and 24/7 online connectivity are also prime targets for routing spam emails. A thermostat’s temperature settings could be manipulated to unsafe levels or to drive up cost. Note: Devices have varying levels of security and vulnerability depending on model and manufacturer. This graphic highlights potential vulnerabilities and is not an exhaustive list of smart devices or vulnerabilities. Tracks sleeping patterns, including movement and heart rate. Sensors monitor and adjust pressure points throughout the night for comfort

Transcript of RISK: Could Provide Access to Wi-Fi...

Page 1: RISK: Could Provide Access to Wi-Fi Networkstatic.politico.com/f7/3f/5ebad1b744cda247cc0229dbb2b7/datapoint...third party via a TV’s voice-recognition/ command software. Smart lightbulbs

Smart homes are just one segment of the Internet of Things, which the Department of Commerce predicts will completely transform daily life and nearly every industry as “one of the most important technological trends of this decade.” Analysts predict that the industry could grow to $1.7 trillion by 2020 and potentially $4 trillion to $11 trillion by 2025, including up to $1.6 trillion for medical devices alone. While new levels of interconnectivity and automation create opportunities — with chore automation, energy savings and safety — they also come with tremendous risks to privacy and security. A vulnerability in one device could allow hackers entry to a Wi-Fi network and all other connected devices in the home, including a laptop and its data. While hackers could exploit personal data, the sheer amount of data these devices generate would also be a goldmine for marketers and advertisers, in addition to law enforcement and intelligence agencies.

Personal conversations can be transmitted to a third party via a TV’s voice-recognition/command software.

Smart lightbulbs

can be an easy entry point

to the broader Wi-Fi network.

Locks could be unlocked remotely bya third party.

Hackers within close range of a fitness tracker could access the device via Bluetooth.

Tied to motion sensors to maximize energy e�ciency and convenience, or ward o� potential intruders. Lights can be scheduled so the home appears to be occupied.

Sources: National Telecommunications and Information Administration’s Request for Public Comment, Federal Register, April 6, 2016; Atlantic Council’s March 2016 issue brief on Smart Homes and the Internet of Things; Mckinsey Global Institute’s June 2015 report, “The Internet Of Things: Mapping The Value Beyond The Hype;” International Data Corporation; and Intel Security.

By Patterson Clark and Janie Boschma, POLITICO Pro DataPoint

PET TRACKERMonitors pet’s location and health trends

WEBCAM / BABY MONITORMonitor the home and keep an eye on the babysitter

SMARTBED

SECURITY SYSTEM / LOCKSUnlocks and re-locks doors or security system to let in repairman or visitors. Sends alerts in case of breach

FITNESS TRACKERHelps track heart rate, sleeping patterns, physical activity and logs progress

THERMOSTATUse an app to adjust the temperature.Set a day-by-day temperature scheduleso the thermostat adapts to actual energy needs, cuts energy usage and utility bills

CHAIRCustomize chair settings, such as temperature

RISK: Could Provide Access to Personal DataThese items collect personal data on location and health that could be valuable to third parties.

The Department of Commerce’s National Telecommunications and Information Administration is currently requesting comment on the future of the Internet of Things and how the government can best support its growth, noting that “thus far no U.S. government agencyis taking a holistic, ecosystem-wide view that identifies opportunities and assesses risks across the digital economy.”

The Federal Trade Commission has issued advice on best practicesfor companies to follow in protecting consumer privacy and security, while individual agencies have intervened within their jurisdiction,

such as Health and Human Services on medical devices, and the National Highway Tra�c Safety Administration on self-driving cars.

A bill introduced by Sen. Deb Fischer (R-Neb.) would require the Secretary of Commerce to convene an interagency working groupto submit a report to Congress on how to plan for the explosion of the Internet of Things, particularly on planning for spectrum needs, butalso to discuss potential regulation and issues related to consumer protection, privacy and security.

What Is the Federal Government’s Involvement?

RISK: Are Vulnerable to Ransomware

TOASTERProgram and monitor toasting progress

RANGEPreheats oven, adjusts timer and monitors cooking progress remotely

REFRIGERATORSends an alert in case of power outage and if door is left open. Also manages food inventory and expiration dates

SMART TVServes as hub for streaming video apps and traditional cable service

CAR Keyless entry, collision avoidance

WASHER/DRYER

Devices with dashboard systems are vulnerable to lockout and ransomware. Hackers can also use such systems to order items surreptitiously.

Program cycles remotely and monitor progress. Sends an alert if ducts are clogged

Globally, there are now about3.5 smart devices for every person.

By 2020, that number is estimated to increase to 26 smart devices per person.

SMART KETTLEHot water is ready when you walk into the kitchen

LIGHTBULBSTied to motion sensorsto maximize energy e�ciency and convenience, or ward o� potential intruders. Lights can be scheduled so the home appears to be occupied

DOORBELLWire-free installation, a doorbell rings when someone presses itor comes within range of a motion sensor. Records video

SELF-GUIDED VACUUM

IRRIGATIONSchedule lawn irrigation remotely. Sprinklers can also self-regulate, depending on weather conditions. Minimizes water waste

FLOOD DETECTIONEarly detection of water leaks, flooding or backups

Tests itself regularly and in addition to sounding an alarm,it alerts phone if carbon monoxide levels are unsafe. Turn alarm o� via an app in case of a false alarm

Send warm or cool blast of air to just one room or several

RISK: Could Provide Access to Wi-Fi Network These items may provide a gateway to other devices and the entire Wi-Fi network.

Detects dust or hair and will auto clean around obstacles, after checking that no one is home

A commandeered security camera can spy on a home’s occupants.

As cars become more automated,

the peril of a hack grows more

severe.

As cars become more automated,

the peril of a hack grows more

severe.

A smart kitchen can be a weak spot for hackers to attack. Refrigeratorsand other appliances with dashboards and 24/7 online connectivityare also prime targets for routing spam emails.

A thermostat’s temperature settings could be manipulated to unsafe levels or to drive up cost.

Note: Devices have varying levels of security and vulnerability depending on model and manufacturer. This graphic highlights potential vulnerabilities and is not an exhaustive list of smart devices or vulnerabilities.

Tracks sleeping patterns, including movement and heart rate. Sensors monitor and adjust pressure points throughout the night for comfort