Tag Archive for Privacy

Is Connected Car Data Worth $1,400 Annually?

Is Connected Car Data Worth $1,400 Annually?Michael Strong at TheDetroitBureau.com reports that Continental AG and Cisco (CSCO) recently demoed a highly connected car using the internet to improve vehicle safety and infotainment options at the recent Center for Automotive Research Management Briefing Seminars in Traverse City, MI.

Cisco logoThe firms believe they’ve produced a connected car that provides a balance between giving consumers a safe, connected driving experience while providing companies with a chance to offer services that enhance the driving experience: for a price.

According to the article, the companies involved in bringing the Internet to cars collect an enormous amount of information about drivers. This presents a variety of challenges when it comes to privacy, who owns the information, how can or should it be used and what’s it worth?

data generated by a connected car is worth about $1,400 a year.While privacy and data ownership issues are still up in the air thanks to the U.S. government. Andreas Mai, director of product management at Cisco, believes data generated by a connected car is worth about $1,400 a year.  He breaks it down this way:

  • Drivers can save $550 through better fuel economy, less time stuck in traffic, lower insurance rates, etc.
  • Society can save $420 by employing car platoons to speed up traffic and increase a road’s capacity.
  • Service providers can earn $150 by providing traffic guidance, navigation, parking, emergency services, etc.
  • Automakers can save $300 in lower warranty costs, profitable apps, etc.

The key, according to the article, is to maximize the information that can be collected (and re-sold) is convincing drivers that they get a tangible benefit from releasing the data, such as shorter commutes or lower insurance rates (thanks Flo). According to a survey by Cisco, 74% of drivers were willing to share vehicle information. However, who or what owns that information still needs to be sorted out, he said. They must balance all of those things against the driver’s wants and needs: connectivity, infotainment, and cutting-edge safety features.

Cars switch between 3G, 4G, WiFi, and DSRC on the goThe firms believe they’ve produced a connected car that provides a balance between giving consumers a safe, connected driving experience while providing companies with a chance to offer services that enhance the driving experience: for a price.

Continental and Cisco teamed up to keep the bits flying. As a vehicle moves it needs to prioritize the critical needs of drivers and passengers for network connectivity, according to the article. Digital Trends explains that Continental will supply the hardware and Cisco will provide the software. The car can switch between 3G, 4G, WiFi, and Dedicated Short Range Communication (DSRC) on the go, depending on service quality and cost to the customer. DSRC system is part of the emerging vehicle-to-vehicle (V2V) technology system that allows cars to communicate with each other directly – and autonomously.

A Cisco software router loaded in Continental hardware performs the network switching. The router sends signals first to a Cisco-managed “Connected Car Cloud,” which then relays information to whatever network appears optimal at the moment.

 Connected Car Concept

The Cisco on-board software system can seamlessly switch between available 3G, 4G, and other wireless networks based on cost and quality of service preferences. “Connected vehicles are opening up a vast field of opportunities for services to make driving safer, more efficient, and more comfortable,” said Ralf Lenninger, head of innovation and strategy, Continental’s Interior Division. “This is why we are looking at ways to connect the moving vehicle in a highly secure, fast, and reliable way.

the same amount of network security that is available at homeThe Cisco and Continental proof-of-concept connected car show how auto manufactures can provide the same amount of network security that is available at home (oh NO!) or in the office. Cisco provides one highly secure software gateway that delivers Cisco’s core networking capabilities and optimizes multiple communication links and mobility services to and from the vehicle. Security against cyber attacks will become more important as more vehicles include connected functions.

rb-

I recently covered Ford’s efforts to understand connected cars by studying the commlinks of space-based robots here.

The savings claims seem suspicious to me. The “lower insurance costs” are just cash savings. Oh, yeah Walmart is still in business. What is going to be the costs to the drivers after the insurance companies get their Hadoop big data analytics on the data from the magic boxes they are installing? Will they use the data you provided them to change the rules on your policy to raise your rates? It only takes a small leap to think about what the NSA could do with the data.

Just in case someone at Cisco or Ford or anybody else is reading this, here are some suggestions from Veracode to secure connected cars.. 

Versacode Connected Car infographic

Infographic by Veracode Application Security

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

From Madison to PRISM

From Madison to PRISMThe folks at Whocalledmyphone.net have given us this excellent infographic. It traces the battle between the right to privacy and the prying eyes of the government. The infographic follows the erosion of privacy from the Bill of Rights to Prism. For more details, you can also check out the EFF page Timeline of NSA Domestic Spying.

Privacy vs. Security infographic
Image compliments of Who Called My Phone

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Internet of Things

Internet of ThingsAdding computer communication to otherwise dumb devices isn’t new. As far back as the 1990s, a whole list of Internet-enabled Coke machines around the world had varying functionality. The granddaddy of all Internet of Things was the Coke machine at Carnegie Mellon University, set up in the 1970s.

Internet of Things vulnerable to false data injection

Smart meters vulnerable to false data injectionThe power grid delivers electricity to charge iPads and run data centers. The power grid connects users with electricity producers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to ensure reliable power grid operation. The analysis of smart meter measurements and power systems is a routine part of system monitoring.

Help Net Security reports that most energy security professionals told nCircle they did not believe smart meters are secure enough. When asked, “Do smart meter installations have enough security controls to protect against false data injection?” 61% of the 104 energy security professionals said “no”. False data injection attacks introduce arbitrary errors into state variables while bypassing existing techniques for bad measurement detection to exploit the power grid.

Patrick Miller, the founder, CEO, and president of EnergySec noted, “Smart meters vary widely in capability and many older meters were not designed to adequately protect against false data injection. It doesn’t help that some communication protocols used by the smart meter infrastructure don’t offer much protection against false data injection either.”

… we need to make sure that all systems that process usage data, especially those that make autonomous, self-correcting, self-healing decisions, assure data integrity,” Miller added.

Related articles
  • Not-so-smart meters costly | Herald Sun

Railroad Sensors Predict Derailments Wirelessly

Railroad Sensors Predict Derailments WirelesslyUnion Pacific (UNP), the nation’s largest railroad company, has deployed Internet of Things technology throughout its network. according to Dailywirless.org, the IoT can predict certain kinds of derailments days or weeks before they are likely to occur. This will improve safety and avoid millions of dollars in damages.

According to the article, Union Pacific, which moves 900 trains a day, started using acoustic sensors 10 years ago to monitor noises from vibrations of ball bearings in train wheels. This allows the company to get trains off the track before a faulty bearing causes a derailment. More recently, the company started using visual sensors that can detect when wheels begin to flatten–another factor that can cause accidents on the rails.

Lynden Tennison, CIO at Union Pacific, told CIO Journal, that the company can now check 40 million patterns every day and can alert the train operators of any anomaly in a bearing within five minutes. “Our goal was to design a system that requires very little maintenance,” he said.

To do this, Union Pacific worked with Intel (INTC) which addressed some of the unique challenges of designing a wireless sensor network for a rail system (pdf). The blog states that to overcome the battery-life issues, Millennial Net paired its i-Bean wireless technology with “energy harvesting” technology from startup Ferro Solutions. An inductive vibration generates power to send [battery free] at 115 Kbps over a distance of 30 m,” said Tod Riedel, cofounder and vice president of business development at Millennial Net.

Related articles

Are you ready for appliances that are smarter than you?

LG Smart Thinq refrigeratorStacey Higginbotham at GigaOM asks “Are you ready for appliances that are smarter than you?” She points out that LG has introduced its first connected appliance, a Smart Thinq refrigerator that knows what’s inside it. The appliance can communicate with your phone. Your kitchen is about to get a similar level of connectivity as your living room.

The Smart Thinq refrigerator got a lot of press at the Consumer Electronics Show in Las Vegas as smart appliances were all the rage. The Android-based OS that enabled the fridge to communicate with your smartphone and share information like the contents of the fridge excited the press. The idea, according to the author, was that when someone got home from the grocery store they could choose to tell the fridge what was inside using a touchscreen or they could scan a bar code on their receipt that would contain the information about their purchases.

In this ideal world, the fridge would then be able to suggest recipes for the family based on their weight goals, age, gender, and whatnot. If the consumer selected a fridge-offered recipe the appliance could shoot the recipe to the Smart Thinq oven and it could preheat. All of the connectivity occurs via Wi-Fi and is controlled by the phone and the touchscreen.

The article explains that other features include such as calorie counting and notifications of expiration dates. And if grocery stores take part – then the fridge could show when certain items are out and order them for home delivery.

Is Your Dishwasher Really Yearning for the Internet?

Is Your Dishwasher Really Yearning for the Internet?Is Your Dishwasher Really Yearning for the Internet? A startup called Ube thinks so. The firm is betting that smart devices and smartphone apps will make home automation cheap and easy.

In MIT’s Technology Review article “Is Your Dishwasher Really Yearning for the Internet?” Glen Burchers Ube’s chief marketing officer says that more and more home gadgets will ship with microprocessors, enabling the automation and remote control of everything from your lights to your laundry. Until this is a widespread reality, he’d like to sell you a wall outlet.

The wall outlet includes an ARM processor, runs Google’s Android mobile operating system, and can connect to the Internet. This means anything you plug into it can be controlled via your smartphone, and it will also track how much power your devices are consuming.

According to TR, the startup plans to sell the outlet along with a “smart” dimmer switch and plug for $60 to $70 apiece. The Austin, TX firm also plans to offer a free smartphone app that can control these and other Internet-enabled devices.

The blog reports that the Ube app will access a Wi-Fi network to scan for nearby Internet-enabled devices it can manage and lets you know what it can control. Mr. Burchers says the app can control more than 200 devices, most of which are gaming systems, set-top boxes, and TVs.

Mr. Burchers believes that Ube’s first products are just the beginning. He told TR most new electronics will be able to connect to the Web, and home builders will offer smart dimmers to new home buyers as they do granite countertops.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Disposal Dummies Cause Privacy Problems

The article Disposal Dummies Cause Privacy Problems, posted at  SecureWorld Post by Rebecca Herold lays out the privacy problems caused by dumb disposal policies. The article claims that trash-based breaches are worse than ever.

Disposal Dummies Cause Privacy ProblemsThe oldest security and privacy problem, unsecured disposal of personal information, is prevalent today as it was centuries ago reports the author. She says because of the rapidly growing amount of data, in which EMC (EMC) and IDC claim that data is doubling every two years, along with print information, there are even more ways in which disposal-related breaches are occurring. Here are just a few instances I found:

The blog outlines some of the most common egregious information disposal dummy security and privacy mistakes:

  • DTrash canonating print documents with personal information on them to outside groups, like pre-schools and community groups, to use as scrap paper.
  • Selling computers, smartphones, copiers, fax machines, and other computing devices, to recoup some of the investment, but not irreversibly removing the data before the sale.
  • Putting digital storage devices in the trash without first irreversibly removing the data.
  • Putting print documents containing personal information into unsecured dumpsters, and not shredding them.
  • Never throwing away no-longer-needed hard copy and digital devices; letting them accumulate in storage areas, with inadequate or no security, allowing them to be taken by anyone who happens along.

Data disposal is important because breaches caused by poor disposal activities are getting so bad that the article states there are growing numbers of laws explicitly covering disposal, and bills are being proposed at the state and federal levels. The Disposal Rule (part of the Fair and Accurate Credit Transactions Act of 2003 (FACTA) has been in effect since 2005. The blog says FACTA has many very specific requirements that basically all types of businesses, of all sizes, that do most types of credit checks must take when disposing of information in all forms.

In Michigan, data destruction requirements are covered in IDENTITY THEFT PROTECTION ACT MCL Section 445.72a. where destruction of data containing personal information required; violation as misdemeanor; fine; compliance; “destroy” are defined.

MichiganBesides the fact that secure information disposal is now a legal requirement for most businesses, it makes sense to dispose of information securely to prevent privacy breaches. By having effective disposal policies, procedures and supporting technologies in place businesses demonstrate reasonable due diligence.

Ms. Herold argues that all organizations, from the smallest to the largest, need to follow proper information disposal practices or they will experience significant privacy breaches and non-compliance penalties. She presents an action plan to get started:

  • Assign overall responsibility for information security and privacy compliance to a position or department within your organization, which will include responsibility for the disposal of information in all forms.
  • Perform a disposal risk assessment to find exactly how your organization really disposes of all types of information.
  • Create information disposal policies and procedures, or update existing ones, based upon the results of the disposal risk assessment.

The policies and procedures need actions:

  • Locate, inventory, and gather at the end of their business useFilingcabinetfulness all types of digital storage devices, including CDs, DVDs, USB drives, external drives, tapes (yes, many organizations still use them), microfiche (yes, these too), and any other type of storage media.
  • Inventory all types of computing equipment, including not just the “traditional” computers, but also devices such as printers, fax machines, copiers, smartphones, MP3 devices, and any other types of devices that do computing activities.
  • Define acceptable shredding methods and locations for paper documents. Finely cross-shredding hard copy information is recommended, as well as ensuring any contracted shredding company does such shredding on-site.
  • Define acceptable methods of irreversibly removing data from computing and digital storage devices. Degaussers are still often used, in addition to contracted services to wipe storage devices clean.
  • Make sure you include information backups, and all types of information archives, in your disposal procedures. These items are typically overlooked, and many breaches have resulted from such items.

Data destructionThe bottom line for all organizations, the author argues is: You need to make sure there are proper safeguards for information, computing, and storage devices, during the disposal process.

The author concludes with some recommended resources and articles to aid you with improving your own personal, and organizational, disposal practices:

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Texas School ID Cards Track Students

Updated 07-27-13 According to Chron, Northside Independent School District Texas spokesman Pascual Gonzalez said the microchip-ID program turned out not to be worth the trouble.

Family claimed the RFID tag is “the mark of the beast”Updated 01-19-13 The student lost her lawsuit against the district. The student and her family had sued the district, claiming that her first amendment rights were being violated (she claims the RFID tag is “the mark of the Beast”), but the school removed the RFID chip from her ID and the court found that that was a reasonable accommodation.

Updated 12-02-12 A self-described teen-aged Anonymous hacker claims to have hacked the website of Texas’s Northside Independent School District in support of a student who refuses to wear an RFID ID badge according to the San Antonio Express-News. The district’s site was never compromised, Northside spokesman Pascual Gonzalez said.

In a statement posted on Twitter, the teenaged hacker wrote: “Now it is your school and your rules, but you seen what I did to your website, and have a simple deal for you, weather you accept it or not, is up to you,” the statement reads. “If you still want to do this tracking idea on the students, at least have a meeting with each and every students parents, so they know what is going on.”

Updated 11-21-12 It is not surprising to me that Wired is reporting that the school district is being sued over the program. According to Wired, the family claims that the student refuses to wear the badge because it signifies Satan.

Texas School ID Cards Track StudentsA Texas school district is putting tracking chips into new, mandatory student IDs to keep tabs on students’ whereabouts while on campus. According to Sophos’ Naked Security blog, Texas’s Northside Independent School District‘s John Jay High School and Anson Jones Middle School are performing a pilot test of the technology.

Sophos logoFOX 29 TV in Texas reports that students will be required to wear the cards on a lanyard around their necks and will be charged a fee for losing them. Their location will be beamed out to electronic readers throughout the campuses.

The one-year pilot program, which will cost the district $261,000, is also expected to increase attendance, and could bring an extra $2 million to the district in state funding as a result, District spokesman Pascual Gonzalez said. He stated that the program will be re-evaluated next summer.

RFID chipIn a letter to parents, school administrators stated that the ID cards will store no personal information and that they’ll work only on school grounds. “Think how important this will be in the case of an emergency,” the letter reads. “In addition, the ‘smart’ student ID card will be used in the breakfast and lunch lines in the cafeteria and to check out books from the library. Because all students will be required to wear their ‘smart’ ID, staff will be able to quickly identify Jay students inside the school.”

FoxNews reports that a coalition of privacy and civil liberties organizations and experts have called for a moratorium on the technology, including the American Civil Liberties Union.

RFID tags eveywhereThe Sophos blog reports that some parents are protesting, comparing the tags to RFID tags used to track cattle. Steven Hernandez, a father of a student who attends the school and the only local parent to attend a protest late last month, told KSN News that the new badges amount to “a spy chip”.

His daughter, Andrea, a sophomore, told KSN that she’s decided to wear her old photo ID even though students were told the new micro-chip ID is mandatory: “It makes me uncomfortable. It’s an invasion of my privacy.

Northside ISD’s Gonzalez rejected that criticism, saying the pilot program and the “smart” ID cards have been used successfully in Houston’s Spring Independent School District for at least the past five years. “This is non-threatening technology,” he said. “This is not surveillance.”

rb-

Chip readerThere is a great deal of bluster around this article on the blog. Look around people, your passports and driver’s licenses have RFID tags. What about proximity card readers? Have you checked the Visa in your wallet? Isn’t near field communications (NFC) the hot topic in the VC world?

I will bet a cookie that some of the same folks blustering about ID tags also favor gutting public education funding, yet the object to efforts to increase alternate sources of revenue for Texas schools by using chips in student ID cards.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.