The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2012 vol.10)
pp: 84-87
Don A. Bailey , iSEC Partners
ABSTRACT
The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.
INDEX TERMS
embedded systems, cellular technology, Zoombak, tracking devices, M2M, machine-to-machine, vehicle security module, Carmen Sandiego Project, Scada, critical infrastructure, computer security, cybersecurity, privacy
CITATION
Don A. Bailey, "Moving 2 Mishap: M2M's Impact on Privacy and Safety", IEEE Security & Privacy, vol.10, no. 1, pp. 84-87, January/February 2012, doi:10.1109/MSP.2012.16
REFERENCES
1. M. Mazzetti and H. Cooper, "Detective Work on Courier Led to Breakthrough on Bin Laden," New York Times,2 May 2011; www.nytimes.com/2011/05/02/world/asia02reconstruct-capture-osama-bin-laden.html?_r=3 .
2. J. Scheck, "Stalkers Exploit Cellphone GPS," Wall Street J.,3 Aug. 2010; http://online.wsj.com/articleSB10001424052748703467304575383522318244234.html .
3. D. Bailey, "A Million Little Tracking Devices: Turning Embedded Devices into Weapons," PowerPoint presentation, iSEC Partners, 2011; http://pa-ri.sc/zA%20Million%20Little%20Tracking%20Devices.pdf .
4. D. Bailey, "WarTexting: Weaponizing Machine 2 Machine," PowerPoint presentation, iSEC Partners, 2011; www.isecpartners.com/storage/docs/presentations isec_bh2011_war_texting.pdf
5. "Number of Internet Users Worldwide Reaches Two Billion,"26 Jan. 2011, PhysOrg.com; www.physorg.com/news2011-01-internet-users-worldwide-billion.html .
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool