This Article 
 Bibliographic References 
 Add to: 
Moving 2 Mishap: M2M's Impact on Privacy and Safety
January/February 2012 (vol. 10 no. 1)
pp. 84-87
Don A. Bailey, iSEC Partners
The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.

1. M. Mazzetti and H. Cooper, "Detective Work on Courier Led to Breakthrough on Bin Laden," New York Times,2 May 2011; .
2. J. Scheck, "Stalkers Exploit Cellphone GPS," Wall Street J.,3 Aug. 2010; .
3. D. Bailey, "A Million Little Tracking Devices: Turning Embedded Devices into Weapons," PowerPoint presentation, iSEC Partners, 2011; .
4. D. Bailey, "WarTexting: Weaponizing Machine 2 Machine," PowerPoint presentation, iSEC Partners, 2011; isec_bh2011_war_texting.pdf
5. "Number of Internet Users Worldwide Reaches Two Billion,"26 Jan. 2011,; .

Index Terms:
embedded systems, cellular technology, Zoombak, tracking devices, M2M, machine-to-machine, vehicle security module, Carmen Sandiego Project, Scada, critical infrastructure, computer security, cybersecurity, privacy
Don A. Bailey, "Moving 2 Mishap: M2M's Impact on Privacy and Safety," IEEE Security & Privacy, vol. 10, no. 1, pp. 84-87, Jan.-Feb. 2012, doi:10.1109/MSP.2012.16
Usage of this product signifies your acceptance of the Terms of Use.