Welcome!

Cognitive Computing Authors: Yeshim Deniz, Elizabeth White, Liz McMillan, Pat Romanski, Shelly Palmer

Related Topics: @ThingsExpo, @CloudExpo, Cloud Security

@ThingsExpo: Blog Feed Post

How to Turn Your Microwave into a Camera | @ThingsExpo #IoT #M2M #Security

All kidding aside, there is no way to take a microwave oven and use it 'as is' as a surveillance tool

You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each other now, unfortunately. There was an article this week that talked about how you can surveil someone through their phones, certainly through their television sets, any number of different ways. And microwaves that turn into cameras, etc. So we know that that is just a fact of modern life.”

On its face, her statement about “microwaves that turn into cameras, et cetera” is ridiculous. It reminds me of the late Sen. Ted Stevens’ famous “Tubes” speech. I went right after “Uncle Ted” for his techno–faux pas, but even then, there were bigger issues to consider. It would be exceptionally easy to jump all over Ms. Conway for her techno–faux pas. But doing so would be taking a cheap shot at an easy target while completely missing a very, very important teaching moment.

You Cannot Hide
First and foremost, if you are a normal person who does not have a professional security team ensuring your privacy, and you are targeted, you cannot hide. There are countless legal and illegal ways to watch you (assuming you’re interesting enough to be watched), and you will not know you are being watched until someone makes use of the surveilled material. Get over it. As Ms. Conway suggests, “that is just a fact of modern life.” If you’re wondering what these mysterious “countless ways” might be, type “surveillance” into Google and read through some of the 186 million results. This may have been her point. If it was, she was just fear-mongering. Very few people are interesting enough to be watched.

Professionals Have Countermeasures
If your personal or business dealings require enterprise-grade security and privacy, you can hide. Although, even professional surveillors have trouble keeping up with professional surveillees – and vice versa, because surveillors and surveillees are locked in an iterative, accelerating arms race that will never end. That said, if this is the “fact of modern life” Ms. Conway was referring to, she either misspoke or was just misinformed about microwave ovens.

A Massive Gap in Understanding
The bigger problem with Ms. Conway’s statement was that it clearly illustrated that she has no idea what is, or is not, technologically possible. A blanket statement about digital surveillance may fulfill her communications mandate, but it raises a serious question: Does she (or do the people who crafted her message) know enough about the technology she’s attempting to describe to hold informed, rational policy discussions about it? And without this understanding, is it possible to lead the world into the 21st century?

Lifelong Learning
Policy is already years behind technology, and it’s falling farther behind every day. Our elected officials need to have either a deep understanding of technological capabilities that are just over the horizon or the ability to enlist (and listen to) world-class tech advisors or, preferably, both. Sadly, this requirement for future-preparedness is not in evidence.

The Imminent Danger of IoT
Smart homes and connected devices are everywhere, and with the advent of natural language understanding (NLU) systems such as Alexa Voice Services, sales are becoming robust. Over the next few years, we will find sensors in every conceivable device, and all of these devices (an estimated 50 billion of them) will be connected to some kind of network.

Data security is already a formidable problem, and it will be an even bigger problem moving forward. But device security is also going to command our attention. There are almost no ubiquitously agreed-upon security standards for IoT devices. Just how many unregulated transceivers with central processing units do you want in your home? Is the hard-coded, unchangeable password to that network-connected, budget indoor/outdoor thermometer “1234?” If so, welcome to hacker heaven. Could an inexpensive device like this be used by hackers to commit a massive DDoS attack? In October 2016, that’s exactly what happened.

Will someone hack your devices to do something even worse? Time will tell, but Kellyanne Conway could have used her moment in the spotlight to ask real questions about IoT. BTW, earlier this week, Maureen Ohlhausen, acting head of the Federal Trade Commission, said the “Internet of Things should self-regulate.” ’Nuff said.

Turning Your Microwave into a Camera
As promised, here’s how to turn your microwave (oven), which is what I think Ms. Conway meant, into a camera.

Take a smartphone and connect it to your local area network (WiFi). Download any time-lapse photography app you like. Now, duct tape the smartphone to your microwave. Do your best to camouflage it and hide the charging cord. Walk away saying something like, “Nothing to see here, folks” to divert the attention of the curiosity seekers.

Your microwave has now been turned into a camera. Of course, it will still work as a microwave – that’s what’s so great about this! Who in their right mind would ever think a microwave could be turned into a camera?

Disclaimer
All kidding aside, there is no way to take a microwave oven and use it “as is” as a surveillance tool. Microwave ovens are shielded, not typically network-connected, and they do not possess the proper component parts for image-making. Even the transducer that makes the beep is not really suited for use as a microphone.

Importantly, this is not true of other devices Ms. Conway mentioned. A professional can easily install software in a smart television (which typically features a microphone for voice recognition and a camera for gesture control) for surveillance use. In practice, anything with a transducer (microphone or speaker) in your home that is network-connected is a relatively easy target for espionage. But – and this is a big but – in almost every case, someone would need to break into your home to do the required modifications. This is not true with respect to turning your smart phones or some other types of smart devices against you. That can be done remotely.

Lastly, none of these surveillance techniques are easy to accomplish, and all of them require a warrant from a court of competent jurisdiction. But the rules only apply to governments and law enforcement. Criminals (hackers and other bad guys) don’t tend to follow rules or regulations. That’s what makes them criminals. So, without promoting fear, uncertainty and doubt (FUD) and without espousing conspiracy theories, let me leave you with one thought. It’s the Wild West, it’s getting wilder by the day, and there ain’t no sheriff.

The post How to Turn Your Microwave into a Camera originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

@ThingsExpo Stories
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus intern...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Everywhere we turn in our industry we can find strong opinions about the direction, type and nature of cloud’s impact on computing and business. Another word that is used in every context in our industry is “hybrid.” In his session at 20th Cloud Expo, Alvaro Gonzalez, Director of Technical, Partner and Field Marketing at Peak 10, will use a combination of a few conceptual props and some research recently commissioned by Peak 10 to offer a real-world consideration of how the various categories of...
In order to meet the rapidly changing demands of today’s customers, companies are continually forced to redefine their business strategies in order to meet these needs, stay relevant and continue to see profitable growth. IoT deployment and development is integral in this transformation, and today businesses are increasingly seeing the value of investing their resources into IoT deployments. These technologies are able increase ROI through projects such as connecting supply chains or enabling sm...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deli...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Five years ago development was seen as a dead-end career, now it’s anything but – with an explosion in mobile and IoT initiatives increasing the demand for skilled engineers. But apart from having a ready supply of great coders, what constitutes true ‘DevOps Royalty’? It’ll be the ability to craft resilient architectures, supportability, security everywhere across the software lifecycle. In his keynote at @DevOpsSummit at 20th Cloud Expo, Jeffrey Scheaffer, GM and SVP, Continuous Delivery Busine...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assis...
SYS-CON Events announced today that Carbonite will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Carbonite protects your entire IT footprint with the right level of protection for each workload, ensuring lower costs and dependable solutions with DoubleTake and Evault.
SYS-CON Events announced today that EARP Integration will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. EARP Integration is a passionate software house. Since its inception in 2009 the company successfully delivers smart solutions for cities and factories that start their digital transformation. EARP provides bespoke solutions like, for example, advanced enterprise portals, business intelligence systems an...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
SYS-CON Events announced today that Outscale will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outscale's technology makes an automated and adaptable Cloud available to businesses, supporting them in the most complex IT projects while controlling their operational aspects. You boost your IT infrastructure's reactivity, with request responses that only take a few seconds.
SYS-CON Events announced today that Progress, a global leader in application development, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Enterprises today are rapidly adopting the cloud, while continuing to retain business-critical/sensitive data inside the firewall. This is creating two separate data silos – one inside the firewall and the other outside the firewall. Cloud ISVs oft...
DevOps at Cloud Expo – being held October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real r...
In his opening keynote at 20th Cloud Expo, Michael Maximilien, Research Scientist, Architect, and Engineer at IBM, will motivate why realizing the full potential of the cloud and social data requires artificial intelligence. By mixing Cloud Foundry and the rich set of Watson services, IBM's Bluemix is the best cloud operating system for enterprises today, providing rapid development and deployment of applications that can take advantage of the rich catalog of Watson services to help drive insigh...
As cloud adoption continues to transform business, today's global enterprises are challenged with managing a growing amount of information living outside of the data center. The rapid adoption of IoT and increasingly mobile workforce are exacerbating the problem. Ensuring secure data sharing and efficient backup poses capacity and bandwidth considerations as well as policy and regulatory compliance issues.