This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Moving 2 Mishap: M2M's Impact on Privacy and Safety
January/February 2012 (vol. 10 no. 1)
pp. 84-87
Don A. Bailey, iSEC Partners
The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.

1. M. Mazzetti and H. Cooper, "Detective Work on Courier Led to Breakthrough on Bin Laden," New York Times,2 May 2011; www.nytimes.com/2011/05/02/world/asia02reconstruct-capture-osama-bin-laden.html?_r=3 .
2. J. Scheck, "Stalkers Exploit Cellphone GPS," Wall Street J.,3 Aug. 2010; http://online.wsj.com/articleSB10001424052748703467304575383522318244234.html .
3. D. Bailey, "A Million Little Tracking Devices: Turning Embedded Devices into Weapons," PowerPoint presentation, iSEC Partners, 2011; http://pa-ri.sc/zA%20Million%20Little%20Tracking%20Devices.pdf .
4. D. Bailey, "WarTexting: Weaponizing Machine 2 Machine," PowerPoint presentation, iSEC Partners, 2011; www.isecpartners.com/storage/docs/presentations isec_bh2011_war_texting.pdf
5. "Number of Internet Users Worldwide Reaches Two Billion,"26 Jan. 2011, PhysOrg.com; www.physorg.com/news2011-01-internet-users-worldwide-billion.html .

Index Terms:
embedded systems, cellular technology, Zoombak, tracking devices, M2M, machine-to-machine, vehicle security module, Carmen Sandiego Project, Scada, critical infrastructure, computer security, cybersecurity, privacy
Citation:
Don A. Bailey, "Moving 2 Mishap: M2M's Impact on Privacy and Safety," IEEE Security & Privacy, vol. 10, no. 1, pp. 84-87, Jan.-Feb. 2012, doi:10.1109/MSP.2012.16
Usage of this product signifies your acceptance of the Terms of Use.