Posted on 02/09/2016 4:59:08 PM PST by BenLurkin
As increasing numbers of devices connect to the internet and to one another, the so-called internet of things promises consumers increased convenience â the remotely operated thermostat from Google-owned Nest is a leading example. But as home computing migrates away from the laptop, the tablet and the smartphone, experts warn that the security features on the coming wave of automobiles, dishwashers and alarm systems lag far behind.
...
James Clapper, the US director of national intelligence, was more direct in testimony submitted to the Senate on Tuesday as part of an assessment of threats facing the United States.
"In the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," Clapper said.
Clapper did not specifically name any intelligence agency as involved in household-device surveillance. But security experts examining the internet of things take as a given that the US and other surveillance services will intercept the signals the newly networked devices emit, much as they do with those from cellphones. Amateurs are already interested in easily compromised hardware; computer programmer John Matherly's search engine Shodan indexes thousands of completely unsecured web-connected devices.
(Excerpt) Read more at theguardian.com ...
And we may use our 2nd Amendment rights to stop said spying.
F U B O!
I’ve had suspicions about my toaster.
Obviously inocorrect. The word "might" is superfluous.
James Clapper, the US director of national intelligence, isn’t too intelligent if he thinks that we don’t know where he lives. As for his Obuma operatives, all they care about is liquor, money and where to find hookers.
My 45 yr old Maytag that only uses hot water (and plenty of it) to wash dishes gets the job done well and in under an hour.
We'll bug your DISH-WASHER.
Might? He may have a future career as a politician.
Everything around you with a microphone or a speaker collects audio 24/7. Smart phones, dumb phones, flip phones, tablets, IPads, televisions and so on. Video too. With some devices it’s done even when they’re off. Everything is collected from everybody. The data is warehoused in bulk. If and when an interest is taken in a person software can be used to scan for specific words, phrases, etc. within set time frames.
Take up Navajo or something if you want to have a private conversation.
Many people in the know say that anything with “Smart” attached to it is recording all you say and storing it in the Utah data center (most likely) using ipV6. IpV6 has the ability to assign a unique ip address to every grain of sand on Earth and that each person has their own ip address. Using quantum computing it would be possible to process all that data to determine how effective their media was affecting people, or look for trouble spots against the government, etc.
Many people in the know say that anything with *Smart* attached to it is recording all you say and storing it in the Utah data center (most likely) using ipV6. - IpV6 has the ability to assign a unique ip address to every grain of sand on Earth and that each person has their own ip address. - Using quantum computing it would be possible to process all that data to determine how effective their media was affecting people, or look for trouble spots against the government, etc.
Check out article and comments.
As Laz says...
The list, Ping
Let me know if you would like to be on or off the ping list
What BBC series / episode is that picture from?
Thx
Why would Clapper tell a half truth when he is exempt from the law? I hate inconsistency. He should lie all the time.
You guys recall my post about the Mr. Coffee with wi-fi awhile back....
Darks, better make sure your coffee recipe is square with Geneva Convention...do we clip the blue wire?
DHS CTASF ( Counter Terror Appliance Strike Force) We have a confirmed kill on the KCup at....
K-Cups are immune to me.
However, regular percs are only safe from my weaponised coffee if the user doesn’t set them up that way.
Failing that, the internet of things could then unleash *shudder* coffee hell on anyone doing it.
And THAT is how we lose data packets without a trace or a flag tag showing up.
Caff-Net is Awake!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.