Your IoT devices could spy on you, admits US intelligence chief

Big Brother may be watching you from the fridge, US spy chief warns

Security services may target Internet of Things devices like smart TVs in order to spy on people, according to US director of national intelligence, James Clapper.

At a US Senate committee hearing on Tuesday, Clapper acknowledged that agents may take advantage of devices connected to the internet so it can track or spy on people.

He said that smart devices incorporated into the electricity grid, autonomous cars and even household appliances could threaten data privacy.

"In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," he said.

Clapper did not specify which intelligence agencies might use the IoT to spy on citizens, or if such information would be shared with other government agencies.

Last year, it was demonstrated that an internet-connected Barbie doll could be hacked to spy on children.

Broaching the subject of artificial intelligence, Clapper said that the implications of broader AI included "increased vulnerability to cyber attack, difficulty in ascertaining attribution, facilitation of advances in foreign weapon and intelligence systems, the risk of accidents and related liability issues, and unemployment".

"The increased reliance on AI for autonomous decision-making is creating new vulnerabilities to cyber attacks and influence operations," he added. "As we have already seen, false data and unanticipated algorithm behaviours have caused significant fluctuations in the stock market because of the reliance on automated trading of financial instruments."

He admitted there may also be improvements to cybersecurity through AI but such systems would be "susceptible to a range of disruptive and deceptive tactics that might be difficult to anticipate or quickly understand.

"Efforts to mislead or compromise automated systems might create or enable further opportunities to disrupt or damage critical infrastructure or national security networks."

Picture courtesy of Medill DC

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021