Future Crimes

Home > Other > Future Crimes > Page 65
Future Crimes Page 65

by Marc Goodman


  31 Google Wallet has also been hacked: Lance Whitney, “Latest Google Wallet Hack Picks Your Pocket,” CNET, Feb. 10, 2012; Evan Applegate, “Have Fingers, 30 Seconds? You, Too, Can Hack Google Wallet,” Bloomberg Businessweek, Feb. 13, 2012.

  32 In another instance: Gabrielle Taylor, “Have an NFC-Enable Phone? This Hack Could Hijack It,” WonderHowTo, accessed July 11, 2014.

  33 NFC apps on mobile phones: Lisa Vaas, “Android NFC Hack Lets Subway Riders Evade Fares,” Naked Security, Sept. 24, 2012.

  34 They can also intercept data: Kate Murphy, “Protecting a Cellphone Against Hackers,” New York Times, Jan. 25, 2012; Tu C. Neim, “Bluetooth and Its Inherent Security Issues,” SANS Institute InfoSec Reading Room, Nov. 4, 2002.

  35 As a result, more of what happens: Catherine Crump and Matthew Harwood, “Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything,” Blog of Rights, March 25, 2014.

  36 All drivers need to do: “Snapshot Common Questions,” Progressive Web site, http://​www.​progressive.​com/​auto/​snapshot-​common-​questions/.

  37 “we and other companies”: Rolfe Winkler, “Google Predicts Ads in Odd Spots Like Thermostats,” Digits (blog), Wall Street Journal, May 21, 2014.

  38 In some countries: Brian Brady, “Prisoners ‘to Be Chipped like Dogs,’ ” Independent, Jan. 13, 2008.

  39 “3,000 labor hours”: David Rosen, “Big Brother Invades Our Classrooms,” Salon, Oct. 8, 2012.

  40 “Students who do not wish”: David Kravets, “Student Suspended for Refusing to Wear a School-Issued RFID Tracker,” Wired, Nov. 21, 2012.

  41 Based on nothing more: Aaron Katersky and Josh Haskell, “NY Mom Accused of Growing $3M Marijuana Business,” Good Morning America, June 6, 2013; Glenn Smith, “Marijuana Bust Shines Light on Utilities,” Post and Courier, Jan. 29, 2012.

  42 “transformational for clandestine”: Spencer Ackerman, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” Wired, March 15, 2012.

  43 The mere plugging in: Neil J. Rubenking, “Black Hat: Don’t Plug Your Phone into a Charger You Don’t Own,” PCMag, Aug. 1, 2013.

  44 In the background: “Public Charging Stations Help Smartphone Users, but Also Open a New Avenue for Hacking,” New York Daily News, Aug. 13, 2013.

  45 In 2013 in Russia: Simon Sharwood, “DON’T BREW THAT CUPPA! Your Kettle Could Be a SPAMBOT,” Register, Oct. 29, 2013; Adam Clark Estes, “Russian Authorities Seize Goods from China Implanted with Spy Chips,” Gizmodo, Oct. 29, 2013.

  46 The devices contained hidden: Erik Sherman, “Hacked from China: Is Your Kettle Spying on You?,” CBS News, Nov. 1, 2013.

  47 While there may be serendipitous benefits: Klint Finley, “Why Tech’s Best Minds Are Very Worried About the Internet of Things,” Wired, May 19, 2014.

  Chapter 13: Home Hacked Home

  1 Once news of the school district’s: David Kravets, “School District Allegedly Snapped Thousands of Student Webcam Spy Pics,” Wired, April 16, 2010; Kashmir Hill, “Lower Merion School District and Blake Robbins Reach a Settlement in Spycamgate,” Forbes, Oct. 11, 2010; John P. Martin, “L. Merion Smearing Former IT Chief, Lawyer Says,” Philly.​com, May 5, 2010.

  2 “They might as well”: Suzan Clarke, “Pa. School Faces FBI Probe,” ABC News, Feb. 22, 2010.

  3 In one city alone: Loretta Chao, “Cisco Poised to Help China Keep an Eye on Its Citizens,” Wall Street Journal, July 5, 2011.

  4 “as small as six inches”: John Biggs, “DARPA Builds a 1.8-Gigapixel Camera,” TechCrunch, Jan. 28, 2013.

  5 As a result, cameras can perform: “Fighting Terrorism in New York City,” 60 Minutes, Sept. 26, 2011.

  6 One young woman: “Miss Teen USA: Screamed upon Learning She Was ‘Sextortion’ Victim,” CNN, Sept. 28, 2013.

  7 Abrahams carried out his attack: Aaron Katersky, “Miss Teen USA 1 of ‘Half-Million’ ‘Blackshades’ Hack Victims,” ABC News, May 19, 2014.

  8 “All of a sudden”: Amy Wagner, “Hacker Hijacks Baby Monitor,” Fox News, April 22, 2014.

  9 “Wake up … you”: “Parents Left Terrified After Man Hacked Their Baby Monitor and Yelled Abuse at Them and Their 2-Year-Old Daughter,” Mail Online, Aug. 13, 2013.

  10 Nearly 70 percent: Kim Zetter, “Popular Surveillance Cameras Open to Hackers, Researcher Says,” Wired, May 15, 2012.

  11 As a consequence: Kelly Jackson Higgins, “Millions of Networked Devices in Harm’s Way,” Dark Reading, Jan. 29, 2013.

  12 Without the consent: Katie Notopoulos, “Somebody’s Watching: How a Simple Exploit Lets Strangers Tap into Private Security Cameras,” Verge, Feb. 3, 2012.

  13 Why not hack: Jim Finkle, “US Security Expert Says Surveillance Cameras Can Be Hacked,” Reuters, June 18, 2013.

  14 That’s exactly what a team: Mark Buttler, “Crown Casino Hi-Tech Scam Nets $32 Million,” Herald Sun (Melbourne), March 14, 2013.

  15 Confident of his bets: Kim Zetter, “Crooks Spy on Casino Card Games with Hacked Security Cameras, Win $33M,” Wired, March 15, 2013.

  16 A car rolling off: Robert N. Charette, “This Car Runs on Code,” IEEE Spectrum, Feb. 1, 2009.

  17 All these embedded electronics: Ibid.; Chris Bryant, “Manufacturers Respond to Car-Hacking Risk,” Financial Times, March 22, 2013.

  18 While event-data-recording black boxes: Craig Timberg, “Web-Connected Cars Bring Privacy Concerns,” Washington Post, March 5, 2013.

  19 “[We know] everyone”: “GPS Users Beware, Big Auto Is Watching: Report,” CNBC.​com, Jan. 9, 2014.

  20 GM’s OnStar: John R. Quain, “Changes to OnStar’s Privacy Terms Rile Some Users,” Wheels (blog), New York Times, Sept. 22, 2011.

  21 Oh, and that convenient: Declan McCullagh and Anne Broache, “FBI Taps Cell Phone Mic as Eavesdropping Tool,” CNET, Dec. 1, 2006; Bruno Waterfield and Matthew Day, “EU Has Secret Plan for Police to ‘Remote Stop’ Cars,” Telegraph, Jan. 29, 2014.

  22 In just the first six months: Jeff Bennett, “GM Adds 8.45 Million Vehicles to North America Recall,” Wall Street Journal, June 30, 2014; Christopher Jensen, “An Increase in Recalls Goes Beyond Just G.M.,” New York Times, May 29, 2014.

  23 When the deeply complex: James R. Healey, “Toyota Deaths Reported to Safety Database Rise to 37,” USA Today, Feb. 17, 2010.

  24 A jury found: Phil Baker, “Software Bugs Found to Be Cause of Toyota Acceleration Death,” Daily Transcript, Nov. 4, 2013; Junko Yoshida, “Acceleration Case: Jury Finds Toyota Liable,” EETimes, Oct. 24, 2013.

  25 Toyota was accused: Jerry Hirsch, “Toyota Admits Misleading Regulators, Pays $1.2-Billion Federal Fine,” Los Angeles Times, March 19, 2014.

  26 According to the London Metropolitan Police: Victoria Woollaston, “Forget Carjacking, the Next Big Threat Is Car-HACKING,” Mail Online, May 8, 2014.

  27 The operation takes less: William Pentland, “Car-Hacking Goes Viral in London,” Forbes, May 20, 2014; Thomas Cheshire, “Thousands of Cars Stolen Using Hi-Tech Gadgets,” Sky News, May 8, 2014.

  28 Using nothing more than a laptop: Sebastian Anthony, “Hackers Can Unlock Cars via SMS,” ExtremeTech, July 28, 2011; Robert McMillan, “ ‘War Texting’ Lets Hackers Unlock Car Doors Via SMS,” CSO Online, July 27, 2011.

  29 Your musical tastes: Rebecca Boyle, “Trojan-Horse MP3s Could Let Hackers Break into Your Car Remotely, Researchers Find,” Popular Science, March 14, 2011.

  30 For just under $30: Victoria Woollaston, “The $20 Handheld Device That Hacks a CAR—and Can Control the Brakes,” Mail Online, Feb. 6, 2014.

  31 Entirely possible: John Markoff, “Researchers Hack into Cars’ Electronics,” New York Times, March 9, 2011; Chris Philpot, “Can Your Car Be Hacked?,” Car and Driver, Aug. 2011; Andy Greenberg, “Hackers Reveal Nasty New Car Attacks—with Me Behind the Wheel,” Forbes, July 24, 2013; Dan Goodin, “Tampering with a Car’s Brakes and Speed by Hacking Its Computers: A New How-To,” Ars Technica, July 29, 2013.

  32 Renault Nissan’s CEO:
Paul A. Eisenstein, “Spying, Glitches Spark Concern for Driverless Cars,” CNBC.​com, Feb. 8, 2014.

  33 The biggest proponent: Sebastian Anthony, “Google’s Self-Driving Car Passes 700,000 Accident-Free Miles, Can Now Avoid Cyclists, Stop at Railroad Crossings,” ExtremeTech, April 29, 2014; John Markoff, “Google’s Next Phase in Driverless Cars: No Steering Wheel or Brake Pedals,” New York Times, May 27, 2014.

  34 Law enforcement officials clearly: Lance Whitney, “FBI: Driverless Cars Could Become ‘Lethal Weapons,’ ” CNET, July 16, 2014.

  35 Just as vehicles were rated: Ms. Smith, “Most ‘Hackable’ Vehicles Are Jeep, Escalade, Infiniti, and Prius,” Network World, Aug. 3, 2014.

  36 In a nod: Ina Fried, “Tesla Hires Hacker Kristin Paget to, Well, Secure Some Things,” Re/code, Feb. 7, 2014.

  37 “expected to reach”: Transparency Market Research, “Home Automation Market (Lighting, Safety and Security, Entertainment, HVAC, Energy Management)—Global Industry Analysis, Size, Share, Growth, Tends, and Forecast, 2013–2019,” Sept. 30, 2013.

  38 Many such systems: Kashmir Hill, “When ‘Smart Homes’ Get Hacked: I Haunted a Complete Stranger’s House via the Internet,” Forbes, July 26, 2013.

  39 A July 2014 study: Daniel Miessler, “HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack,” HP, July 29, 2014.

  40 Major toy makers: Arrayent, “Internet of Things Toys with Mattel,” http://​www.​arrayent.​com/​internet-​of-​things-​case-​studies/​connecting-​toys-​with-​mattet/​Disney Research, “CALIPSO: Internet of Things.” http://​www.​disneyresearch.​com/​project/​calipso-​internet-​of-​things/.

  41 But toys too can be subverted: Heather Kelly, “ ‘Smart Homes’ Are Vulnerable, Say Hackers,” CNN, Aug. 2, 2013.

  42 They allow hackers to turn off: Dan Goodin, “Welcome to the ‘Internet of Things,’ Where Even Lights Aren’t Hacker Safe,” Ars Technica, Aug. 13, 2013.

  43 Additional systems: Jane Wakefield, “Experts Hack Smart LED Light Bulbs,” BBC News, July 8, 2014; Leo King, “Smart Home? These Connected LED Light Bulbs Could Leak Your Wi-Fi Password,” Forbes, July 9, 2014.

  44 The device, known: Andy Greenberg, “An Eavesdropping Lamp That Livetweets Private Conversations,” Wired, April 23, 2014.

  45 Because Insteon did not require: Hill, “When ‘Smart Homes’ Get Hacked.”

  46 The Insteon Hub: Paul Roberts, “Breaking and Entering,” The Security Ledger, July 25, 2013.

  47 The number of vulnerabilities: Ms. Smith, “500,000 Belkin WeMo Users Could Be Hacked; CERT Issues Advisory,” Network World, Feb. 18, 2014.

  48 As a result, their cameras: Kashmir Hill, “How Your Security System Could Be Hacked to Spy on You,” Forbes, July 23, 2014.

  49 It’s not just older alarm systems: Ms. Smith, “Hacking and Attacking Automated Homes,” Network World, June 25, 2013.

  50 Hilton Hotels too: Nancy Trejos, “Hilton Lets Guests Pick Rooms, Use Smartphones as Keys,” USA Today, July 29, 2014.

  51 Worldwide nearly ninety million: Michael Wolf, “3 Reasons 87 Million Smart TVs Will Be Sold in 2013,” Forbes, Feb. 25, 2013.

  52 Many brands have been found: Lorenzo Franceschi-Bicchierai, “Your Smart TV Could Be Hacked to Spy on You,” Mashable, Aug. 2, 2013; Dan Goodin, “How an Internet-Connected Samsung TV Can Spill Your Deepest Secrets,” Ars Technica, Dec. 12, 2012.

  53 “750,000 malicious spam”: Ellie Zolfagharifard, “Criminals Use a Fridge to Send Malicious Emails in First Ever Home Hack,” Mail Online, Jan. 17, 2014.

  54 Refrigerator spam: “Spam in the Fridge,” Economist, Jan. 25, 2014.

  55 In early 2014, researchers: Dan Goodin, “ ‘Internet of Things’ Is the New Windows XP—Malware’s Favorite Target,” Ars Technica, April 2, 2014.

  56 As of mid-2013: Utility-Scale Smart Meter Deployments, IEE report, Aug. 2013, 3; Chris Choi, “Smart Meters Are Heading to Every Home in Britain,” ITV News, July 8, 2014.

  57 Researchers in Germany: Jordan Robertson, “Your Outlet Knows: How Smart Meters Can Reveal Behavior at Home, What We Watch on TV,” Bloomberg, June 10, 2014.

  58 According to an investigation: Brian Krebs, “FBI: Smart Meter Hacks Likely to Spread,” Krebs on Security, April 9, 2012.

  59 Like all computers: Katie Fehrenbacher, “Smart Meter Worm Could Spread like a Virus,” Gigaom, July 31, 2009.

  60 Nest’s thermostats: Rolfe Winkler, “What Google Gains from Nest Labs,” Wall Street Journal, Jan. 15, 2014.

  61 “conscious home”: Marcus Wohlsen, “What Google Really Gets out of Buying Nest for $3.2 Billion,” Wired, Jan. 14, 2014.

  62 Google’s Nest thermostat: Richard Lawler, “Nest Learning Thermostat Has Its Security Cracked Open by GTVHacker,” Engadget, June 23, 2014.

  63 Nest’s other main product: Edward C. Baig, “Nest Halts Sales, Issues Warning on Smoke Detector,” USA Today, April 3, 2014.

  64 Dropcam cameras: Hill, “How Your Security System Could Be Hacked to Spy on You.”

  65 Using simple, widely available data recovery tools: Armen Keteyian, “Digital Photocopiers Loaded with Secrets,” CBS News, April 19, 2010.

  66 Hackers have been able to gain access: Dan Ilett, “Hackers Use Google to Access Photocopiers,” ZDNet, Sept. 24, 2004.

  67 Moreover, office printers: Graham Cluley, “HP Printer Security Flaw Allows Hackers to Extract Passwords,” GrahamCluley.​com, Aug. 7, 2013.

  68 By exploiting a vulnerability: “Exclusive: Millions of Printers Open to Devastating Hack Attack, Researchers Say,” NBC News, Nov. 29, 2011; Sebastian Anthony, “Tens of Millions of HP LaserJet Printers Vulnerable to Remote Hacking,” ExtremeTech, Nov. 29, 2011.

  69 To prove the point: Nicole Perlroth, “Flaws in Videoconferencing Systems Make Boardrooms Vulnerable,” New York Times, Jan. 22, 2012.

  70 In April 2012: Brock Parker, “Hackers Convert MIT Building in Giant Tetris Video Game,” Boston.​com, April 24, 2012.

  71 From their headquarters: Brian Krebs, “Fazio Mechanical Services,” Krebs on Security, Feb. 12, 2014; Gregory Wallace, “HVAC Vendor Eyed as Entry Point for Target Breach,” CNNMoney, Feb. 7, 2014; Danny Yadron and Paul Ziobro, “Before Target, They Hacked the Heating Guy,” Digits (blog), Wall Street Journal, Feb. 5, 2014.

  72 There they found: Dan Goodin, “Epic Target Hack Reportedly Began with Malware-Based Phishing E-Mail,” Ars Technica, Feb. 12, 2014; U.S. Senate Committee on Commerce, Science, and Transportation, A “Kill Chain” Analysis of the 2013 Target Data Breach, Majority Staff Report for Chairman Rockefeller, March 26, 2014.

  73 Once there, attackers installed: Kim Zetter, “The Malware That Duped Target Has Been Found,” Wired, Jan. 16, 2014.

  74 Worse, it was possible: Sean Gallagher, “Vulnerabilities Give Hackers Ability to Open Prison Cells from Afar,” Ars Technica, Nov. 7, 2011; Shaun Waterman, “Prisons Bureau Alerted to Hacking into Lockups,” Washington Times, Nov. 6, 2011.

  75 In mid-2013: Kim Zetter, “Prison Computer ‘Glitch’ Blamed for Opening Cell Doors in Maximum-Security Wing,” Wired, Aug. 16, 2013.

  76 While the chamber had successfully: Siobhan Gorman, “China Hackers Hit U.S. Chamber,” Wall Street Journal, Dec. 21, 2011.

  77 As the Chinese premier: Goodman, “Power of Moore’s Law in a World of Geotechnology.”

  78 “means of electric media”: Marshall McLuhan, Understanding Media: The Extensions of Man (New York: Routledge, 2001), rev. ed.

  79 “Fitbit for the city”: Elizabeth Dwoskin, “They’re Tracking When You Turn Off the Lights,” Wall Street Journal, October 20, 2014.

  80 Better sensors in our streetlights: “Outdoor Lighting,” Echelon, https:/​/​www.​echelon.​com/​applications/​street-​lighting/.

  81 Using a wireless traffic-detection system: Mark Prigg, “New York’s Traffic Lights HACKED,” Mail Online, April 30, 2014.

  82 If smart meters: Erica Naone, “Hacking the Smart Grid,” MIT Technology Review, Aug. 2, 2010.r />
  83 A hacker using the same exploit: Reuters, “ ‘Smart’ Technology Could Make Utilities More Vulnerable to Hackers,” Raw Story, July 16, 2014.

  Chapter 14: Hacking You

  1 “We Are All Cyborgs Now”: Amber Case, “We Are All Cyborgs Now,” TED Talk, Dec. 2010.

  2 Over 90 percent: “Text Message/Mobile Marketing,” WebWorld2000, http://​www.​webworld2000.​com/.

  3 Over 100 million: Marcelo Ballve, “Wearable Gadgets Are Still Not Getting the Attention They Deserve—Here’s Why They Will Create a Massive New Market,” Business Insider, Aug. 29, 2013.

  4 Most wearable devices: “How Safe Is Your Quantified Self? Tracking, Monitoring, and Wearable Tech,” Symantec Security Response, July 30, 2014.

  5 Google has already: “Google Partners with Ray-Ban, Oakley for New Glass Designs,” NBC News, March 24, 2014; Deloitte, Technology, Media, and Telecommunications Predictions, 2014, 10.

  6 The fear of filming: Richard Gray, “The Places Where Google Glass Is Banned,” Telegraph, Dec. 4, 2013.

  7 In fact, hackers had already: Andy Greenberg, “Google Glass Has Already Been Hacked by Jailbreakers,” Forbes, April 26, 2013.

  8 The GPS features: Mark Prigg, “Google Glass HACKED to Transmit Everything You See and Hear: Experts Warn ‘the Only Thing It Doesn’t Know Are Your Thoughts,’ ” Mail Online, May 2, 2013.

  9 While your grandma: John Zorabedian, “Spyware App Turns the Privacy Tables on Google Glass Wearers,” Naked Security, March 25, 2014.

  10 Given the pace: Katherine Bourzac, “Contact Lens Computer: Like Google Glass, Without the Glasses,” MIT Technology Review, June 7, 2013.

  11 The device is in early stages: Leo King, “Google Smart Contact Lens Focuses on Healthcare Billions,” Forbes, July 15, 2014.

  12 Not to be outdone: Bourzac, “Contact Lens Computer.”

  13 The historic operation: N. M. van Hemel and E. E. van der Wall, “8 October 1958, D Day for the Implantable Pacemaker,” Netherlands Heart Journal 16, no. S1 (Oct. 2008): S3–S4.

  14 The first Wi-Fi pacemaker: Ben Gruber, “First Wi-Fi Pacemaker in US Gives Patient Freedom,” Reuters, Aug. 10, 2009.

 

‹ Prev