In this Frontier Internet Packages compiled blog post, I’ll talk about some of the ways in which machine hardware is expected to pose a considerable security risk in the future. And this account is not your usual, run-of-the-mill type, narrative that resembles a science fiction movie script
I find that whenever this topic is discussed in academic or TV talk show settings, it inevitably resembles the script of a science fiction movie. And that’s ok. Because good futuristic films like the Terminator, Robocop, and Star Trek series do showcase some highly plausible concerns. With the great advances in I.T, the chances of a machine takeover are not so unlikely. Recently, I read an I.T geared blog through my Frontier Internet Packages that detailed this issue in full. And this post is in many ways an extension of the theme that it was centered on. But with some additional dosages of my personal insights, of course.
On a Somewhat Personal Note…
At this stage, I’d like to point to a curious case in which modern technology, in addition to providing value, can also have some frightening results!
When I became a sophomore in college, my father bought me a microwave. My parents were intimately aware of the fact that I was a horrible cook. And such a waste in the kitchen, that they knew that I could only live-off on pre-cooked food. So the fact that they gave me a microwave was something of a no-brainer.
On Microwaves, Spying, and the Security Concerns of Technology
In my junior year, the 2016 U.S Presidential Elections rolled out in full swing. And a choice remark by a campaign-affiliate of then-Republican candidate Donald J. Trump was enough to put me in a worried state.
In one of his caucus rallies, Mr. Trump’s campaign manager Kellyanne Conway hinted that her boss had been spied upon through his microwave. Based on the funny way that she described the affair, the media unsurprisingly got a huge kick out of the comments. But a few software security experts on TV, at the time, expressed their concerns. They didn’t consider the matter in the comedic light that it had been portrayed. And instead, they took to the New York Times to explain their take.
After this incident publicly broke out, it wasn’t long after that Trump was elected President that several intelligence agencies came out with an analysis of their own. And to the shock of many, they reported that the Trump campaign had indeed been spied upon. With the microwave in question having been used to carry out this inglorious deed!
An Expose’ that Threatens Us All
Although this investigation is still underway, with the Russians currently being held responsible, it demands more public scrutiny than it has received. And especially the concern that everyday home appliances like microwave ovens, toasters and coffeemakers can be ‘hacked’ by malicious parties to act as spying tools.
And I have a feeling that time will tell just how easy it is for clever coders and machine experts to violate our individual privacy. In an IoT-connected world – which all hardware brands are looking forward to – I greatly fear that it will be extremely hard to remain anonymous. Even more so than it is today; with social media applications like Facebook and Instagram ‘innocently’ documenting our every move.
Four Biggest Security Concerns of Emerging Technologies
The following are the 4 key ways in which physical technologies (which include all kinds of machine hardware) are expected to wreak some systematic security havoc. And privacy violation issues, when considered in this light, will soon be the least of people’s concerns.
- More Incisive Privacy Breaches
Privacy breaches are expected to become more commonplace, and possibly unavoidable. And more sophisticated A.I algorithms incorporated into social media interfaces can provide an important vehicle for this issue to surface. Additionally, there is a huge potential risk of entire hackers’ consortiums being formed – who deal specifically in the barter of personal information.
2. Malfunctioning Devices – and Physical Damage
Malfunctioning machine architecture, just as the issue is showcased in several Hollywood science fiction productions, is a futuristic problem likely to face us all. And this problem can arise out of both software and hardware dysfunction. There is even the likelihood of some expert hackers manipulating certain devices into carrying out elaborate assassination events.
3. Software Lapses
In terms of security breaches, software lapses constitute one of the most common ways of getting restricted access inside peoples’ private profiles. And the upcoming few decades are expected to witness an increased incidence-rate of this issue occurring.
4. Covert Human Profiling
Using an entire range of secretly-installed devices, professional hackers can conduct sophisticated human profiling sessions covertly. The data collected from these routines can then be used by different commercial organizations for (marketing) audience-targeting purposes. Some TV movies like Ex Machina (2014), and The Day the Earth Stood Still (2008), which i caught on my Spectrum Cable Services, showcased this theme beautifully. And with full cinematic flair!