Related Topics: @ThingsExpo, @CloudExpo, Cloud Security

@ThingsExpo: Blog Feed Post

How to Turn Your Microwave into a Camera | @ThingsExpo #IoT #M2M #Security

All kidding aside, there is no way to take a microwave oven and use it 'as is' as a surveillance tool

You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each other now, unfortunately. There was an article this week that talked about how you can surveil someone through their phones, certainly through their television sets, any number of different ways. And microwaves that turn into cameras, etc. So we know that that is just a fact of modern life.”

On its face, her statement about “microwaves that turn into cameras, et cetera” is ridiculous. It reminds me of the late Sen. Ted Stevens’ famous “Tubes” speech. I went right after “Uncle Ted” for his techno–faux pas, but even then, there were bigger issues to consider. It would be exceptionally easy to jump all over Ms. Conway for her techno–faux pas. But doing so would be taking a cheap shot at an easy target while completely missing a very, very important teaching moment.

You Cannot Hide
First and foremost, if you are a normal person who does not have a professional security team ensuring your privacy, and you are targeted, you cannot hide. There are countless legal and illegal ways to watch you (assuming you’re interesting enough to be watched), and you will not know you are being watched until someone makes use of the surveilled material. Get over it. As Ms. Conway suggests, “that is just a fact of modern life.” If you’re wondering what these mysterious “countless ways” might be, type “surveillance” into Google and read through some of the 186 million results. This may have been her point. If it was, she was just fear-mongering. Very few people are interesting enough to be watched.

Professionals Have Countermeasures
If your personal or business dealings require enterprise-grade security and privacy, you can hide. Although, even professional surveillors have trouble keeping up with professional surveillees – and vice versa, because surveillors and surveillees are locked in an iterative, accelerating arms race that will never end. That said, if this is the “fact of modern life” Ms. Conway was referring to, she either misspoke or was just misinformed about microwave ovens.

A Massive Gap in Understanding
The bigger problem with Ms. Conway’s statement was that it clearly illustrated that she has no idea what is, or is not, technologically possible. A blanket statement about digital surveillance may fulfill her communications mandate, but it raises a serious question: Does she (or do the people who crafted her message) know enough about the technology she’s attempting to describe to hold informed, rational policy discussions about it? And without this understanding, is it possible to lead the world into the 21st century?

Lifelong Learning
Policy is already years behind technology, and it’s falling farther behind every day. Our elected officials need to have either a deep understanding of technological capabilities that are just over the horizon or the ability to enlist (and listen to) world-class tech advisors or, preferably, both. Sadly, this requirement for future-preparedness is not in evidence.

The Imminent Danger of IoT
Smart homes and connected devices are everywhere, and with the advent of natural language understanding (NLU) systems such as Alexa Voice Services, sales are becoming robust. Over the next few years, we will find sensors in every conceivable device, and all of these devices (an estimated 50 billion of them) will be connected to some kind of network.

Data security is already a formidable problem, and it will be an even bigger problem moving forward. But device security is also going to command our attention. There are almost no ubiquitously agreed-upon security standards for IoT devices. Just how many unregulated transceivers with central processing units do you want in your home? Is the hard-coded, unchangeable password to that network-connected, budget indoor/outdoor thermometer “1234?” If so, welcome to hacker heaven. Could an inexpensive device like this be used by hackers to commit a massive DDoS attack? In October 2016, that’s exactly what happened.

Will someone hack your devices to do something even worse? Time will tell, but Kellyanne Conway could have used her moment in the spotlight to ask real questions about IoT. BTW, earlier this week, Maureen Ohlhausen, acting head of the Federal Trade Commission, said the “Internet of Things should self-regulate.” ’Nuff said.

Turning Your Microwave into a Camera
As promised, here’s how to turn your microwave (oven), which is what I think Ms. Conway meant, into a camera.

Take a smartphone and connect it to your local area network (WiFi). Download any time-lapse photography app you like. Now, duct tape the smartphone to your microwave. Do your best to camouflage it and hide the charging cord. Walk away saying something like, “Nothing to see here, folks” to divert the attention of the curiosity seekers.

Your microwave has now been turned into a camera. Of course, it will still work as a microwave – that’s what’s so great about this! Who in their right mind would ever think a microwave could be turned into a camera?

All kidding aside, there is no way to take a microwave oven and use it “as is” as a surveillance tool. Microwave ovens are shielded, not typically network-connected, and they do not possess the proper component parts for image-making. Even the transducer that makes the beep is not really suited for use as a microphone.

Importantly, this is not true of other devices Ms. Conway mentioned. A professional can easily install software in a smart television (which typically features a microphone for voice recognition and a camera for gesture control) for surveillance use. In practice, anything with a transducer (microphone or speaker) in your home that is network-connected is a relatively easy target for espionage. But – and this is a big but – in almost every case, someone would need to break into your home to do the required modifications. This is not true with respect to turning your smart phones or some other types of smart devices against you. That can be done remotely.

Lastly, none of these surveillance techniques are easy to accomplish, and all of them require a warrant from a court of competent jurisdiction. But the rules only apply to governments and law enforcement. Criminals (hackers and other bad guys) don’t tend to follow rules or regulations. That’s what makes them criminals. So, without promoting fear, uncertainty and doubt (FUD) and without espousing conspiracy theories, let me leave you with one thought. It’s the Wild West, it’s getting wilder by the day, and there ain’t no sheriff.

The post How to Turn Your Microwave into a Camera originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
With privacy often voiced as the primary concern when using cloud based services, SyncriBox was designed to ensure that the software remains completely under the customer's control. Having both the source and destination files remain under the user?s control, there are no privacy or security issues. Since files are synchronized using Syncrify Server, no third party ever sees these files.
Mobile device usage has increased exponentially during the past several years, as consumers rely on handhelds for everything from news and weather to banking and purchases. What can we expect in the next few years? The way in which we interact with our devices will fundamentally change, as businesses leverage Artificial Intelligence. We already see this taking shape as businesses leverage AI for cost savings and customer responsiveness. This trend will continue, as AI is used for more sophistica...
"We are an integrator of carrier ethernet and bandwidth to get people to connect to the cloud, to the SaaS providers, and the IaaS providers all on ethernet," explained Paul Mako, CEO & CTO of Massive Networks, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
I believe that this may finally be the year that the CIO role ‘crosses the Rubicon,' leaving behind its traditional, IT-focused orientation. But I don't believe that either of the previous predictions of this outcome — fading into oblivion or rising to a business executive level — is correct. Instead, I think this is the year that we will see the role of the CIO transformed into something altogether different.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"NetApp is known as a data management leader but we do a lot more than just data management on-prem with the data centers of our customers. We're also big in the hybrid cloud," explained Wes Talbert, Principal Architect at NetApp, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.