• About
  • Advertise
  • Contact
Wednesday, October 8, 2025
No Result
View All Result
NEWSLETTER
iotillinois
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotillinois
No Result
View All Result
Home Internet of Things

IoT and the law of unintended consequences

in Internet of Things
IoT and the law of unintended consequences
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

You’ve probably already heard about the latest Internet of Things (IoT) security fiasco — coverage has gone far beyond the tech press into the mainstream TV news. In case you haven’t been paying attention, though, here’s the elevator pitch version:

Fitness network Strava publishes a global heatmap of where users are running and working out using its services, and folks just figured out that the map includes information that could reveal the locations of military forces working out in sensitive and sometimes secret locations. One expert worried that “tracking the timing of movements on bases could provide valuable information on patrol routes or where specific personnel are deployed.”

Unlike other IoT security concerns, Strava’s situation doesn’t involve hacking, spearfishing, compromised security protocols, or anything like that. In fact, Strava’s service is working exactly as it was intended, letting folks see where others are running and exercising around the world. The problem is the data reveals previously unseen patterns that could be used in ways Strava, or the security personnel sharing their workout data, never considered.

The Pentagon is concerned

The problem isn’t trivial. According to CNN, “Defense Secretary James Mattis has been made aware of the issue, and the DoD is reviewing policy regarding smartphones and wearable devices.” A Pentagon spokesman told CNN, “We take these matters seriously, and we are reviewing the situation to determine if any additional training or guidance is required, and if any additional policy must be developed to ensure the continued safety of DoD personnel at home and abroad.”

It doesn’t sound like addressing this particular issue will be that difficult. It’s mostly a matter of telling soldiers in sensitive locations to turn off the sharing functions of the Strava app. But, once again, this situation points to a larger problem with new IoT technology.

Put simply, using smart devices to gather and report previously unavailable data has complex implications that can’t always be figured out in advance. The deeper you look at how IoT devices are being used, the more potential flashpoints crop up.

In this example, while it may be easy to get soldiers to stop sharing Strava data, who knows what other devices, apps, and services they’re using, and what data may be collected. In most cases, that process is all pretty innocent, but that doesn’t mean the data can’t be used in hard-to-predict ways. Lots of things track location these days, and in many cases, location data can tell a remarkably detailed story about what folks may be doing.

Strava is only the beginning

Location is only the beginning. In the run up to Mardi Gras in New Orleans, the New York Times wonders whether 1,500 cameras that barkeeps in the French Quarter and elsewhere have been required to install to deter crime could also put a damper on the festivities. After all, during Mardi Gras, flashing has long been considered part of the fun. With all the cameras running, though, what happens in NOLA is less likely to stay in NOLA.

This isn’t idle speculation. Nanny cams have revealed plenty of things that their owners may not have wanted to know. IoT-powered toys have been criticized for listening in on children, as well as being vulnerable to hacking to collect other personal information. Cellphone records and automated toll-road data have aleady been subpoenaed in divorce and other cases. Lawyers, insurance companies and ethicists are worried about the decisions autonomous cars may have to make in life-or-death situations. Then there was the time a software glitch caused Nest thermostats to shut down in the middle of winter, leading to burst pipes and flooding. Similarly, relying on IoT devices in remote places can force you to go to great lengths to repair or replace them.

Of course, unintended consequences are hardly unique to IoT. U.S. cybersecurity tools have been hijacked and are now being used by criminal hackers. And who hasn’t wondered what true artificial intelligence entities might get up to once they realize they exist?

Before we panic and outlaw all technological innovation, though, consider that unintended consequences aren’t always bad. In fact, they’re often the source truly breakthrough technological innovations, from microwave ovens and X-ray images to Amazon Web Services, which was born from the company’s own internal operations.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes Free
Download Best WordPress Themes Free Download
Download WordPress Themes
Download Best WordPress Themes Free Download
free online course
download samsung firmware
Premium WordPress Themes Download
download udemy paid course for free
Tags: IoT and the law of unintended consequences
Next Post
When IoT met blockchain

When IoT met blockchain

Recommended

What you need to know about HaLow, or 802.11ah Wi-Fi

How to architect the network so IoT devices are secure

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Illinois USA

© 2024 iotillinois.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotillinois.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In