Wherever you’re sitting right now, take a moment to note the connected devices around you. In your pocket or handbag, you probably have an electronic key fob and perhaps a rechargeable subway card embedded with RFID. You likely have a smartphone, which is connected to a Wi-Fi network and also has voice-mail service. You might be wearing a Nike FuelBand, or a Fitbit, or possibly even a new pair of Google Glass. Maybe you can spot a traffic light or an orange highway sign out of your window. A power strip is likely not too far away.
All of these devices share one thing in common: They can be hacked.
As we herald the coming Internet of Things, it’s easy to forget that our ever expanding tech playground is mostly unsupervised. There is no playground teacher to blow a whistle when another kid takes control of your Bluetooth headset. There is no Norton antivirus software for your garage door opener.
If you can plug it in or connect it to a network, your device—no matter what it is—can be harnessed by someone else. And that someone doesn’t have to be a Chinese superhacker to do some serious damage with it, either on purpose or by accident. It can be your Uncle Roger, who doesn’t have his new iPhone figured out and is cluelessly turning your lights on and off via your Belkin WeMo.
I’m a hobbyist. Because I study emerging technlogy and the future of media, I’m often tinkering, breaking things, and putting them back together. Once, I wanted to see if I could break into the protected Wi-Fi network we set up for my daughter at home. Less than an hour later, I’d failed to penetrate her network but managed to shut down the main network for our house. Which I knew, because of my husband’s sudden yelling upstairs: “Why is the IRS website redirecting to Sesame Street?!”
Part of what makes new technology so exciting is that, unlike the old days, it works right out of the box. You no longer need to know how to build a computer, connect a modem, run a terminal emulator, and install bulletin board stystem, or BBS, software in order to send a racy message to a co-worker. Now any tech idiot can download Snapchat and accidentally send a racy photo to his sister-in-law. The tech playground is more accessible and, as a result, increasingly problematic.
Just after the annual Black Hat Internet security convention a few months ago in Las Vegas, I asked a group of my friends—a Navy engineer, a professional hacker, and a hobbyist—to help me come up with a quick list of devices that will be vulnerable during the next few years as the Internet of Things becomes widespread. Here’s our (incomplete) list. (Entries with a * are those we’ve tried hacking at home, for fun.):
tablets and phablets*
home computer locks*
the cloud (services, storage, software)
ATMs at banks
thumb and portable USB drives
hotel and gym safes (they tend to use a single default passcode)
cable box or DVR
voice mail (especially those with a global call-in number that doesn’t lock out after successive failed attempts—we saw this with the News of the World scandal)
power strips (can be infected with malware)
power cords for your devices (code can be implanted)
luggage trackers (such as the Trakdot)
connected glasses (Google Glass, Oculus Rift. As of now, Google’s QR barcodes for Wi-Fi store the full access point name and password as plain text)
gaming consoles: PS3, Kinect, Nintendo*
refrigerators (such as Samsung)
cars with computer operating systems
smart pens (like the Livescribe)
gesture control devices (such as the Leap)*
smart alarm clocks*
kitchen and pantry trackers (such as Egg Minder)
insurance driving monitors, such as Progressive’s Snapshot device
traffic lights (MIRT transmitters can change lights to green in two to three seconds)
highway signs that spell out text
And we didn’t even get into medical devices, which are frighteningly exposed to mischief.
TODAY IN SLATE
Here’s Where We Stand With Ebola
Even experienced international disaster responders are shocked at how bad it’s gotten.
Why Are Lighter-Skinned Latinos and Asians More Likely to Vote Republican?
A Woman Who Escaped the Extreme Babymaking Christian Fundamentalism of Quiverfull
Subprime Loans Are Back
And believe it or not, that’s a good thing.
It Is Very Stupid to Compare Hope Solo to Ray Rice
In Defense of HR
Startups and small businesses shouldn’t skip over a human resources department.