The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2012 vol.10)
pp: 84-87
Don A. Bailey , iSEC Partners
The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.
embedded systems, cellular technology, Zoombak, tracking devices, M2M, machine-to-machine, vehicle security module, Carmen Sandiego Project, Scada, critical infrastructure, computer security, cybersecurity, privacy
Don A. Bailey, "Moving 2 Mishap: M2M's Impact on Privacy and Safety", IEEE Security & Privacy, vol.10, no. 1, pp. 84-87, January/February 2012, doi:10.1109/MSP.2012.16
1. M. Mazzetti and H. Cooper, "Detective Work on Courier Led to Breakthrough on Bin Laden," New York Times,2 May 2011; .
2. J. Scheck, "Stalkers Exploit Cellphone GPS," Wall Street J.,3 Aug. 2010; .
3. D. Bailey, "A Million Little Tracking Devices: Turning Embedded Devices into Weapons," PowerPoint presentation, iSEC Partners, 2011; .
4. D. Bailey, "WarTexting: Weaponizing Machine 2 Machine," PowerPoint presentation, iSEC Partners, 2011; isec_bh2011_war_texting.pdf
5. "Number of Internet Users Worldwide Reaches Two Billion,"26 Jan. 2011,; .
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool