Welcome!

Cognitive Computing Authors: Liz McMillan, Dynatrace Blog, Elizabeth White, Yeshim Deniz, Jnan Dash

Related Topics: Artificial Intelligence, @CloudExpo, Cloud Security, @ThingsExpo

Artificial Intelligence: Blog Feed Post

How to Turn Your Microwave into a Camera | @ThingsExpo #IoT #M2M #Security

All kidding aside, there is no way to take a microwave oven and use it 'as is' as a surveillance tool

You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each other now, unfortunately. There was an article this week that talked about how you can surveil someone through their phones, certainly through their television sets, any number of different ways. And microwaves that turn into cameras, etc. So we know that that is just a fact of modern life.”

On its face, her statement about “microwaves that turn into cameras, et cetera” is ridiculous. It reminds me of the late Sen. Ted Stevens’ famous “Tubes” speech. I went right after “Uncle Ted” for his techno–faux pas, but even then, there were bigger issues to consider. It would be exceptionally easy to jump all over Ms. Conway for her techno–faux pas. But doing so would be taking a cheap shot at an easy target while completely missing a very, very important teaching moment.

You Cannot Hide
First and foremost, if you are a normal person who does not have a professional security team ensuring your privacy, and you are targeted, you cannot hide. There are countless legal and illegal ways to watch you (assuming you’re interesting enough to be watched), and you will not know you are being watched until someone makes use of the surveilled material. Get over it. As Ms. Conway suggests, “that is just a fact of modern life.” If you’re wondering what these mysterious “countless ways” might be, type “surveillance” into Google and read through some of the 186 million results. This may have been her point. If it was, she was just fear-mongering. Very few people are interesting enough to be watched.

Professionals Have Countermeasures
If your personal or business dealings require enterprise-grade security and privacy, you can hide. Although, even professional surveillors have trouble keeping up with professional surveillees – and vice versa, because surveillors and surveillees are locked in an iterative, accelerating arms race that will never end. That said, if this is the “fact of modern life” Ms. Conway was referring to, she either misspoke or was just misinformed about microwave ovens.

A Massive Gap in Understanding
The bigger problem with Ms. Conway’s statement was that it clearly illustrated that she has no idea what is, or is not, technologically possible. A blanket statement about digital surveillance may fulfill her communications mandate, but it raises a serious question: Does she (or do the people who crafted her message) know enough about the technology she’s attempting to describe to hold informed, rational policy discussions about it? And without this understanding, is it possible to lead the world into the 21st century?

Lifelong Learning
Policy is already years behind technology, and it’s falling farther behind every day. Our elected officials need to have either a deep understanding of technological capabilities that are just over the horizon or the ability to enlist (and listen to) world-class tech advisors or, preferably, both. Sadly, this requirement for future-preparedness is not in evidence.

The Imminent Danger of IoT
Smart homes and connected devices are everywhere, and with the advent of natural language understanding (NLU) systems such as Alexa Voice Services, sales are becoming robust. Over the next few years, we will find sensors in every conceivable device, and all of these devices (an estimated 50 billion of them) will be connected to some kind of network.

Data security is already a formidable problem, and it will be an even bigger problem moving forward. But device security is also going to command our attention. There are almost no ubiquitously agreed-upon security standards for IoT devices. Just how many unregulated transceivers with central processing units do you want in your home? Is the hard-coded, unchangeable password to that network-connected, budget indoor/outdoor thermometer “1234?” If so, welcome to hacker heaven. Could an inexpensive device like this be used by hackers to commit a massive DDoS attack? In October 2016, that’s exactly what happened.

Will someone hack your devices to do something even worse? Time will tell, but Kellyanne Conway could have used her moment in the spotlight to ask real questions about IoT. BTW, earlier this week, Maureen Ohlhausen, acting head of the Federal Trade Commission, said the “Internet of Things should self-regulate.” ’Nuff said.

Turning Your Microwave into a Camera
As promised, here’s how to turn your microwave (oven), which is what I think Ms. Conway meant, into a camera.

Take a smartphone and connect it to your local area network (WiFi). Download any time-lapse photography app you like. Now, duct tape the smartphone to your microwave. Do your best to camouflage it and hide the charging cord. Walk away saying something like, “Nothing to see here, folks” to divert the attention of the curiosity seekers.

Your microwave has now been turned into a camera. Of course, it will still work as a microwave – that’s what’s so great about this! Who in their right mind would ever think a microwave could be turned into a camera?

Disclaimer
All kidding aside, there is no way to take a microwave oven and use it “as is” as a surveillance tool. Microwave ovens are shielded, not typically network-connected, and they do not possess the proper component parts for image-making. Even the transducer that makes the beep is not really suited for use as a microphone.

Importantly, this is not true of other devices Ms. Conway mentioned. A professional can easily install software in a smart television (which typically features a microphone for voice recognition and a camera for gesture control) for surveillance use. In practice, anything with a transducer (microphone or speaker) in your home that is network-connected is a relatively easy target for espionage. But – and this is a big but – in almost every case, someone would need to break into your home to do the required modifications. This is not true with respect to turning your smart phones or some other types of smart devices against you. That can be done remotely.

Lastly, none of these surveillance techniques are easy to accomplish, and all of them require a warrant from a court of competent jurisdiction. But the rules only apply to governments and law enforcement. Criminals (hackers and other bad guys) don’t tend to follow rules or regulations. That’s what makes them criminals. So, without promoting fear, uncertainty and doubt (FUD) and without espousing conspiracy theories, let me leave you with one thought. It’s the Wild West, it’s getting wilder by the day, and there ain’t no sheriff.

The post How to Turn Your Microwave into a Camera originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

@ThingsExpo Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
SYS-CON Events announced today that Ocean9will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Ocean9 provides cloud services for Backup, Disaster Recovery (DRaaS) and instant Innovation, and redefines enterprise infrastructure with its cloud native subscription offerings for mission critical SAP workloads.
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, will provide a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services ...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), will provide an overview of various initiatives to certifiy the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldw...
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
SYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ pr...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that Loom Systems will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Founded in 2015, Loom Systems delivers an advanced AI solution to predict and prevent problems in the digital business. Loom stands alone in the industry as an AI analysis platform requiring no prior math knowledge from operators, leveraging the existing staff to succeed in the digital era. With offices in S...