Internet Spying: Your Home is Full of Snitches

Published On August 22, 2014 | By Tom Huskerson | Now You Know
ID-10050037

Courtesy of Image go

A lot of African-Americans are going to be extremely surprised by what I am about to tell you. Your home is full of snitches. Everything in it is spying on you. And not just your home. Your car is a snitch as well.

Black people are extremely averse to having our business in the streets. We believe in minding our own business and reminding you to stay out of ours. But we live in the information age and things have become very open and complicated. Technology has gotten to the point where you can’t do much or anything or go anywhere without someone knowing exactly what you are doing. 

AACR Rule #11, Information is the currency and commodity of the digital age.

Let’s look at the devices in your home that are telling your business.

1) Televisions – Black men love a big screen television with all the tricks and features. You gotta have it to watch the game. But these new smart TVs can and do track what you watch. Electronics manufacturer LG makes televisions that not only spy on what channels you’re watching but sends the names of files on thumb drives connected to the set back to LG. Hackers can also hack some models of Samsung smart TVs and use them as instruments to steal data from your network and all the devices connected to it. And are you ready for this? Hackers can even watch you through the webcam built into the television.

2) Your DVR/Cable-Box/Satellite-TV ReceiverNow even if your television is not spying on you then your cable box may be doing the job. Those set top boxes do more than bring you cable television. They can also provide your Internet service. So everything you watch on television and do online is recorded somewhere. Cable providers can track what you are watching and recording. They use this information to target ads more efficiently. Did you read your service contract? You may have agreed to allow the cable company to sell this information and even turn it over to the government.

3) Kitchen Appliances – Yeah; the newest refrigerators and other high tech kitchen appliances are connected to your home network allowing for great convenience and energy savings. But there is a catch; spying and security risks. So what can a kitchen appliance tell someone about you? How about when you wake up in the morning. That connected coffee maker is a snitch. If you have a refrigerator with a barcode reader it will tell someone your shopping habits. Smart kitchen appliances have had known security vulnerabilities for some time now. Can you believe there is a documented instance where hackers were using a smart refrigerator in a malicious email attack. I’m not joking! Hackers successfully used a smart fridge to send out malicious emails.

4) Cell Phones – If this comes as a surprise to you then you clearly have not been paying attaention. Your cell provider may be following your everymove, call and text. This information includes whom you communicate with and your location. This also includes the various apps you load on to your phone. Haven’t you heard about Angry Birds That and other apps may track other more detailed activity. Some apps will sync your phone contact list with the app the providers’ servers by default.

5) Your Webcam or Home Security Cameras Malware on your computer can operate your computer webcam  and record you or your family. That’s right. That webcam may be busy taking photos or video and you think the camera is off. Some notable people have found themselves the target of blackmail from a hacker who captured compromising images. Miss Teen USA was blackmailed by a hacker who took control of her laptop’s webcam. The hacker photographed her naked and demanded more images. Your home security cameras are vulnerable as well. Malware on computers could intercept transmissions from your home security cameras. These cameras are attached to your network and allow you to watch your homes from anywhere. Once hacked a criminal can see you’re not home or, more frightening, who is at home.

6) Your Telephone – You got the bundle right? Phone, internet and television service all in one. All using your home network and router. Easy pickings especially if you have not changed your router default password. Look at your phone bill. Every call, every number you dialed and every incoming call is listed and how long you were on the call. Its all there. And the provider has it too. See #1 & 2.

7.)  Lighting, Home Entertainment System, Home Security System – Can you turn on the lights from your cell phone? Open the garage door? What about your home alarm system? All these things are controlled via the Internet. Very convenient.  But ask yourself if this information is available to outsiders?  Is your security company recording your coming and going? What about your home entertainment system? Do you have a DVD player that streams Netflix? Do you stream music over your home stereo? This information is  relayed to manufacturers of the equipment as well as the supplier of the music or programming. Remember that anything that connects to the Internet can be hacked.

8) The house thermostat (s) Internet connected thermostats are now on the market. These devices provide convenience and energy savings. And the energy companies learn your habits and preferences. Google’s recently purchased the Nest thermostat maker. And keep in mind that Google is a notorious information collector. Your utility company may offer comparable devices to help you save on your energy bills. But what else is that thermostat or better versions that are sure to come telling your utility company?

9) Your Medical Devices This should definitely shock you but its not anything new. Medical devices such as pacemakers, insulin pumps, and other medical devices can and have been hacked. But even if they have not been hacked these devices may still be spying on you. Some pacemakers can transmit patient status information over the Internet allowing the doctor to monitor the patient.  Could this information be intercepted? What if a hacker transmitted phony information to the doctor? Also known as a man-in-the-middle attack.  And please forgive me thinking like this, but what if a hacker took control of a pacemaker or insulin pump? Would that be the perfect murder?

10) Your car – You have GPS don’t you? What about Bluetooth? Pandora radio? What about EzPass or other toll taking devices? Wherever you drive you can be tracked. Cars are the latest target of hackers because more and more come with Internet connectivity and some even act a WiFi hot spots. But what about how you drive? Some insurance companies are now offering devices that track your driving habits in exchange for insurance discounts. Progressive insurance uses a device called a SnapShot. It tracks your driving habits for 30 days and then adjusts your rates accordingly.

11) Your gun! – America loves its guns and it seems everyone has one at home. Is this a privacy issue? As firearms technology advances we may see the day of the  “smartgun.” A weapon that is computerized with various safety features meant to prevent accidents and unauthorized use. Such as by a child or someone other than the owner. Look for these on the market soon.  But can these devices be used to spy on the owner? Can the gun be remotely disabled by a hacker or law enforcement? Would the government be interested in such a high tech measure? Could a citizen or criminal be tracked by following his gun? Could a stolen firearm be tracked or how about illegal gun sales. And what would the NRA say about it? Stay tuned!

Now You Know

 

 

 

Like this Article? Share it!

About The Author

Tom Huskerson Bio Born in Richmond Virginia Tom Huskerson is a military veteran who settled in California after his discharge. Tom attended Santa Barbara City College where he began his writing career as a campus reporter. He worked as an intern news reporter for the Santa Barbara News-Press writing feature stories before moving on to San Francisco. At San Francisco State University Tom studied broadcast communications and began to focus on the Internet. He completed his graduate thesis on Internet advertising. Tom was the first student to ever focus on the Internet as a graduate student at San Francisco State University. After graduation he went to work for Zona Research in California’s Silicone Valley. As a research associate Tom supported senior analyst writing on the latest developments in the Internet industry. During the dot com boom Tom worked for several web businesses as a market researcher and analyst. As a writer and researcher Tom has authored various technical works including a training program for Charles Schwab security. Other projects included professional presentations on workplace violence and hiring security contractors. Tom has also written both fiction and non-fiction works and blogging for a travel website. He has published two books of short stories and completed two novels. Tom is the owner of Scribe of Life Literature and EbonyCandle.com. Tom is not the chief editor for the OnTechStreet. com. A news and information blog that focuses on tech news for African-Americans. The blog is the result of his desire to inform the African American community of the dangers and benefits of the cyber age. In his blog Tom reports on information security, new and analysis, scams and hoaxes, legal happenings and various topics that arise from the age of information. Tom believes that technology is a necessary tool for black people and they should know what is happening. Tom writes believing that techno speak is for the professional and that valuable information can be communicated using plain language. As a result he has embraced the motto, Less Tech, More Knowledge.

Comments are closed.