Regulating the Internet of Things

Imagine this: It’s 2007 and you are Dick Cheney. You have just gotten a heart defibrillator to help with your irregular heart rate and rhythm. It turns out that your defibrillator is wirelessly connected to the Internet, which allows your doctor to monitor you from remote locations. Now this might become a problem considering you’re the vice president of the United States and now have something implanted in your body that has the potential to be hacked into, and possibly used to stalk, injure, or even kill you. (For further information look here.) The issues in heart defibrillators themselves are not incredibly worrisome, as Barnaby J. Feder discusses in this article. The larger issue that presents itself is the Internet of Things as a whole, which is why I believe the FTC should regulate it.

The Internet of Things, also known as the “world’s nervous system”, is a mass of web connected sensors and controllers. Essentially, the Internet of Things can receive inputs form the physical environment and act on them (for example, the sensors might detect a sound, and the controllers might act on those senses.) Massive amounts of data can be collected through the Internet of Things, presenting quite a few issues (which are the reasons I think it should be regulated.)

First, data is often collected without consent. One huge example is the first story Edward Snowden revealed. Basically, the NSA was given the authority to collect months worth of Verizon subscribers’ data without them knowing about it. This obviously poses a huge issue, as people were unaware that their data was being collected. Although some people are now aware that all cell phone companies are required to give some data they’ve collected to the government, many still are not. And even more concerning, unless the Internet of Things begins to be regulated, no one is regulating whether or not companies are telling their consumers what information they are collecting about them.

Another example I came across was about the FTC regulating the Internet of Things, including your car. One of the problems associated with this situation, as well as other similar situations, is that personal information will be shared. As the geolocation of motor vehicles is collected, information is also being collected about the consumer. It will be known precisely where and when the consumer is going, and businesses would easily be able to sell this information to data brokers, who in turn would be able to resell the information to different businesses. Collecting this information can also have effects on the price of insurance and the security of connected cars.

The second reason I think regulating the Internet of Things is a good idea is that the information these companies and organizations are collecting can actually be very dangerous to the consumer. If the FTC isn’t regulating the security of the information being collected, who knows what information is going where. People can steal information, and when there is a lot of information stored about many consumers, it poses a threat to all of them. This can also be the case with more private information like home security systems, which would possibly pose an even greater threat to the individual.

Although I believe regulating the Internet of Things is the best thing to do, it would also be a very difficult task. Regulating the Internet of Things would cost time and money that isn’t currently being spent on it, and it may be difficult to do. Even if regulation of the Internet of Things is implemented, should consumers have the right to opt out of data collection? Or should it be mandatory? There are definitely pros and cons of regulating the Internet of Things.

The FTC is here to protect our privacy and ensure consumer protection. If the FTC were to adopt regulations governing how data from inanimate objects is collected, used, stored and accessed, we, as citizens of the United States, would be more fully protected. In Alice E. Marwick’s article titled How Your Data Are Being Deeply Mined (a reading from earlier this year), she makes the point that people who are concerned with privacy matters must “continue to demand that checks and balances be applied to these private corporations…While closer scrutiny of the NSA is necessary and needed, we must apply equal pressure to private corporations to ensure that seemingly harmless targeted mail campaigns and advertisements do not give way to insidious and dangerous violations of personal privacy.” Marwick also makes the point that technology is changing faster than our current consumer protection laws, which means the FTC adopting new regulations is important and crucial if something like that were to be effective. Ultimately, I believe the benefits of regulating the Internet of Things outweighs the cons, and the FTC should begin regulating in order to ensure the safety of the consumer.

 

  1. http://www.gartner.com/newsroom/id/2636073
  2. http://www.securityprivacyandthelaw.com/2014/10/the-ftc-wants-to-regulate-the-internet-of-things-including-your-car/
  3. The New York Review of Books: How Your Data Are Being Deeply Mined by Alice E. Marwick
  4. http://mashable.com/2013/06/05/verizon-nsa-phone-records/
  5. http://www.ibm.com/smarterplanet/us/en/overview/article/iot_video.html
  6. http://www.heart.org/HEARTORG/Conditions/Arrhythmia/PreventionTreatmentofArrhythmia/Implantable-Cardioverter-Defibrillator-ICD_UCM_448478_Article.jsp
  7. http://www.nytimes.com/2008/03/12/business/12heart-web.html?_r=1&
  8. http://www.cnn.com/2013/10/20/us/dick-cheney-gupta-interview/

 

Week 6 News Digest

6 Utah stores affected in Jimmy John’s card data breach

Wednesday 24 September

http://www.ksl.com/index.php?sid=31694543&nid=151&title=6-utah-stores-affected-in-jimmy-johns-card-data-breach

Jimmy Johns (national sandwich franchise) released a list of stores affected by the card data breach, 6 out of the 216 were locations in Utah.  The login credentials were stolen from a point-of-sale vendor used by Jimmy Johns, making it so that the identity thieves could access part of the payment system. According to Jimmy Johns, customers’ names, verification codes, expiration dates, and card numbers may have been accessed in the data breach. On Wednesday the company said their system had been secured, and it was safe for customers to use payment cards again at their restaurants.

New body scanners aim to cut back on jail contraband

Wednesday 24 September

http://www.ksl.com/index.php?sid=31698121&nid=148&title=new-body-scanners-aim-to-cut-back-on-jail-contraband

On Wednesday, Salt Lake County Sheriff Jim Winder released two new body scanning machines, called SecurPASS. These machines produce clear X-ray quality pictures and can detect anything hidden on-or inside of-inmates bodies. Every inmate changing into a jail jumpsuit in Salt Lake County Jail will be put through the machine before being released. Jail official estimate several hundred prisoners will be scanned a day, as they are planning on scanning all inmates who are transported in and out of the jail. Winder says “We know that contraband is being introduced into our facility. We tried to secure it every other way we could. But when someone has inserted it into their body, that makes it extremely difficult for us. This solves that problem.”

Police: Undercover officers able to trap man looking for teens for sex

Monday 22 September

http://www.ksl.com/index.php?sid=31667352&nid=148&title=police-undercover-officers-able-to-trap-man-looking-for-teens-for-sex

Undercover officers set up a fake Facebook profile, and were able to catch a  52-year-old man trying to meet up with a young girl to have sex in a hotel room. The Facebook account was a fake social media profile of a 15-year-old girl. Officers say they got lucky when the man (David Kent Davis) starting talking to them without realizing he was talking to the police. Davis convinced the girl to meet him in a hotel room on a Friday afternoon, where Police were waiting for him. Davis admitted to coming to the hotel to meet up with a 15-year-old girl, and the Police were able to arrest him and charge him with a misdemeanor charge of enticing a minor over the internet.

Child Pornography Case Spurs Debate on Military’s Role in Law Enforcement

Sunday 21 September

http://www.nytimes.com/2014/09/22/us/child-porn-case-leads-to-questions-of-militarys-role-in-law-enforcement.html?ref=us&_r=0

A federal agent (Mr. Logan) working undercover signed on to a file-sharing network, sometimes used by child pornography traders. He was able to locate a computer that contained illegal photos and video, and downloaded multiple files as evidence. The owner of the computer was convicted and given an 18-year sentence at a federal prison. The problem with this case though, was that Mr. Logan was supposed to be searching for military service members trading in child pornography, not civilians. This sparked a debate over how much the military’s investigative powers can legally contribute to civilian law enforcement. One judge stated “The extraordinary nature of the surveillance here demonstrates a need to deter future violations.” The argument has been made that the military’s involvement had been minimal and Mr. Logan and colleagues had originally investigated because “we had the opportunity and the equipment”, but the case is still pending.

4chan to Emma Watson: You speak out on gender equality, we release nude photos

Monday 22 September

http://www.rawstory.com/rs/2014/09/4chan-responds-emma-watsons-feminist-speech-at-un-with-photo-countdown-clock/

Emma Watson recently delivered a speech about ending gender inequality, to which a group on 4chan responded by creating a website called “Emma You Are Next.” The website is an alleged count down to a day when a 4chan user will release nude photographs of her. In part of the speech, she addressed the fact that “at 14, I started being sexualized by certain elements of the press”, which made her a target of interest for the “Emma You Are Next” site. Some are claiming the site is a hoax, but recent iCloud hacks make it hard to indicate whether or not it is real.