Originally published at TechPoint.
The Internet of Things is growing fast. Connecting so many devices leads to better decisions, safety, and efficiency. But with this comes new security challenges. We, as the defenders, are in a constant arms race against malicious actors. They can fail to attack a system one hundred times and be no worse off. But it only takes one mistake in our defense for them to win. We have seen these growing pains countless times before (and will again) as technology changes.
Now that the number of devices involved is so much larger, there is a larger impact if things go wrong. Why is that?
In short, security is rarely made a priority and given enough time or money.
Not with the current economic incentives: the cost of failure is externalized. Bruce Schneier has a great explanation:
Think of all the CCTV cameras and DVRs used in the attack against Brian Krebs. The owners of those devices do not care. Their devices were cheap to buy, they still work, and they do not even know Brian. The sellers of those devices do not care: they are now selling newer and better models, and the original buyers only cared about price and features. Insecurity is what economists call an externality: it’s an effect of the purchasing decision that affects other people. Think of it kind of like invisible pollution.
This is similar to how credit card fraud primarily affects merchants and banks, not the end user. In fact, some criminals find it more lucrative to keep their presence hidden and rent out the compromised device.
Devices like the Amazon Echo (powered by Alexa) are becoming more and more popular. Alexa must listen to (but not necessarily record) everything that it can hear. What is the risk profile of an Echo (or similar device) being compromised?
Some IoT devices track health or fitness data (e.g. heart rate, temperature, footstep count, etc.) that can reveal a lot about you. How active you are and when can reveal when you are out of the house on your morning jog and your sleep patterns. Trends in this data can reveal if you are ill or have a chronic medical condition. Samsung’s new smart refrigerator can report its contents, which could reveal if you are on vacation. The type of food you eat reveals information about your health. The cost of the food you eat can tell a picture of your finances. On the small scale, this is invaluable for targeting individuals. On a larger scale, this information can be used to build profiles of consumers, which is nothing new, but now far more intrusive.
Liability is murky in many of these cases (having not been tested in the courts), but there is a lot at stake. Take cars, for example. On the relatively tame end of the vulnerability spectrum is being able to get access to sensitive data on the car and its owner (which is still a big deal!). On the scarier side is the risk that hackers could exert more control over a big packet of kinetic energy with squishy humans inside.
For businesses, IoT devices are likely the weakest link in a security strategy. A compromised IoT device could easily lead to a far more serious breach. Attackers use such breaches to extort money from businesses. With a high potential cost of failure, even an empty threat cannot be ignored.
The media can help by separating fact from fiction. “Hotel ransomed by hackers as guests locked out of rooms” was a sensational headline that certainly drew some attention. But it wasn’t true and only added to the fear, uncertainty, and doubt surrounding the issue.
The economic incentives described above need to change. We need to align manufacturers and consumers so security is at least considered. I’m not optimistic about this happening on its own. Historically, the free market does not address externalized problems well. You may have heard of the tragedy of the commons. This is where the government might have to step in. No one likes regulations, but sometimes they are necessary. It works for pollution and it could work here.
We in the industry can help by making it easier to get security right. Stronger industry-supported guidelines would go a long way towards setting a baseline expectation. Besides the purely technical concerns, we need guidelines for design and user experience. Mika Stahlberg rightfully points out that “ease-of-use, especially during set up, is critical for these kinds of products.” Making security features more accessible to the consumer would go a long way towards improving security.
Whether we are businesses, journalists, technologists, or consumers, we need to enter this brave new world with eyes wide open. And while I hope my post freaks you out a little, I’m excited to see how we all come together to figure it out.