Computer security expert and privacy specialist Bruce Schneier writes:

The Internet of Things is the name given to the computerization of everything in our lives. Already you can buy Internet-enabled thermostats, light bulbs, refrigerators, and cars. Soon everything will be on the Internet: the things we own, the things we interact with in public, autonomous things that interact with each other.

These “things” will have two separate parts. One part will be sensors that collect data about us and our environment. Already our smartphones know our location and, with their onboard accelerometers, track our movements. Things like our thermostats and light bulbs will know who is in the room. Internet-enabled street and highway sensors will know how many people are out and about­ — and eventually who they are. Sensors will collect environmental data from all over the world.

The other part will be actuators. They’ll affect our environment. Our smart thermostats aren’t collecting information about ambient temperature and who’s in the room for nothing; they set the temperature accordingly. Phones already know our location, and send that information back to Google Maps and Waze to determine where traffic congestion is; when they’re linked to driverless cars, they’ll automatically route us around that congestion. Amazon already wants autonomous drones to deliver packages. The Internet of Things will increasingly perform actions for us and in our name.

Increasingly, human intervention will be unnecessary. The sensors will collect data. The system’s smarts will interpret the data and figure out what to do. And the actuators will do things in our world. You can think of the sensors as the eyes and ears of the Internet, the actuators as the hands and feet of the Internet, and the stuff in the middle as the brain. This makes the future clearer. The Internet now senses, thinks, and acts.

We’re building a world-sized robot, and we don’t even realize it.
Source: https://www.schneier.com/blog/archives/201...
tv watches us.png

"George Orwell would be proud. Earlier this week Propublica discovered that more than 10 million Vizio televisions silently record what their owners are watching and send a live-stream of their viewing habits to a commercial company that uses it to profile them. Most disturbingly, Vizio ties this viewing information to the user’s IP address, allowing their offline interests to be used to target them with advertisements in the online world.

According to Vizio, the company uses this information to offer advertisers “highly specific viewing behavior data on a massive scale with great accuracy” thatrepresents a “revolutionary shift across all screens that brings measurability, relevancy and personalization to the consumer like never before.” Security vendor Avast published an analysis on Wednesday that dissects the data stream Vizio sends back, showing that it is essentially a low-resolution screen capture taken at regular intervals of whatever is on the screen at that moment.

Yet, for all of the uproar this discovery has caused, it is just part of a broader trend of humans being intricately profiled through the digital trails they leave. Hospitals and insurance companies are beginning to explore using public records and credit card purchase data to determine how healthy you are being in your daily life. For example, buying a pack of cigarettes at the gas station, buying donuts on the way home, stopping off at a fast food restaurant for lunch, or letting your gym membership lapse could all be reported back to your doctor and potentially used to increase your insurance rates.

More here

What an impressive suite of services BMW drivers can enjoy with their new car! Imagine the data being collected by private car companies today and wait till the IOT makes all of this data collection standardised through related ITS policies. BMW's suite of apps include:

1. BMW ConnectedDrive basic features

a. ConnectedDrive Services (SA6AK)

b. Intelligent Emergency Call (SA6AC)

c. BMW TeleServices (SA6AE)

2. Real Time Traffic Information (SA6AM)

3. Remote Services (SA6AP)

4. Concierge Services (SA6AN)

5. Internet (SA6AR)

6. Online Entertainment (SA6FV)

More here.

Full article here.

"Film and television have long been at the forefront of creativity and innovation – especially when it comes to technology.

That might be hard to believe in the age of Hollywood reboots and sequels, but it wasn’t long ago that TV shows were pushing the boundaries and blowing our minds with gadgets beyond our wildest dreams.

Star Trek is often the first program people think of, with innovations like the personal communicator (mobile phone) and automatic door now a part of our everyday lives, but one of the most well known (and possibly least credited) programs to predict life in the future was The Jetsons, which first beamed into homes in 1962.

Though created for children, the program included fantastical predictions of what life in the year 2063 might be like, capturing the imaginations of both adults and kids alike. That date may still be a long way off, but many of the predicted technologies are already here, especially in the home. From robotic vacuum cleaners to flat screens TVs and video conferencing, here are some predictions that actually came true."

For the full article visit here

Posted
AuthorKatina Michael
 Source: The Institute (IEEE News Source)  http://theinstitute.ieee.org/technology-focus/technology-topic/the-value-of-privacy

Source: The Institute (IEEE News Source)

http://theinstitute.ieee.org/technology-focus/technology-topic/the-value-of-privacy

"A PRECAUTIONARY TALE

Not all are as optimistic as Prasad about the future of the IoT. While users may have control over who in the general public sees their information, the bigger concern for consumer privacy expert Katherine Albrecht is the question of who owns the data. She is an executive with StartPage, a search engine that does not collect or share personal information, and StartMail, an encrypted e-mail service.

An article coauthored with IEEE Senior Member Katina Michael, “Connected: To Everyone and Everything,” in the Winter 2013 issue of IEEE Technology and Society Magazine, puts Albrecht’s concern bluntly: “[Consumers] may think we’re in charge of our shopper cards and our mobile apps and our smart fridges—but … let’s not fool ourselves. [The information] is not ours. It belongs to Google, and IBM, and Cisco Systems…and the global Mega-Corp that owns your local supermarket. If you don’t believe us, just try removing ‘your’ data from their databases.”

Michael is the associate dean international of the University of Wollongong Faculty of Engineering and Information Sciences, in Australia, and editor in chief of IEEE Technology and Society Magazine.

To prepare for the interconnected future, businesses and governments are outlining measures to be taken while new policies are developed. The European Union, for example, outlined such measures in its report “IoT Privacy, Data Protection, Information Security,” published in January 2013. One recommendation is to develop privacy-friendly default settings on IoT products and services that would give users more control over what information is shared with others. Furthermore, it suggests that IoT networks give individuals the rights to their own data. In 2012, participants at the Open IoT Assembly—an initiative to envision a future with the IoT—developed an “IoT Bill of Rights” at a two-day conference in London that calls for transparency of IoT processes and the preservation of privacy. It also calls for people to have access to their personal data.

Despite potential risks to privacy, companies are betting their customers will see the advantages that the IoT will bring them, says Colcher. But some groups advocate that consumers have the power to slow down or even stop the advancement of the IoT. Not Colcher. “The inclusion of the IoT all around us is inevitable,” he says. “The only thing to do now is to prepare the best we can.”"

 

"Meet the offspring of iRobot, and Transformers creator Hasbro. No, really. Back in 2000, the two companies teamed up on a project to create a baby doll called "My Real Baby" that had emotionally expressive animatronic facial expressions.

One look at this pic could explain why the project was later discontinued."

 Source: http://gizmodo.com/5332377/creepy-irobots-my-real-baby

Source: http://gizmodo.com/5332377/creepy-irobots-my-real-baby

 Source: http://www.irobot.com.au/Cool-Stuff/iRobot-DNA

Source: http://www.irobot.com.au/Cool-Stuff/iRobot-DNA

From the company that has brought us the Packbot and the Roomba! How cute, NOT!

And now for a real baby riding a real Roomba!

It is with great joy that MG and I write to let you know that the Uberveillance edited volume is finally in stores and available for purchase. We encourage you to ask your libraries to purchase the volume. Of significance are the coming together of well-known voices in the surveillance field to discuss the definition and impact of uberveillance, including Katherine Albrecht, Roger Clarke, Mark Gasson, Kevin Haggerty, Steve Mann, Ellen McGee, Kevin Warwick, Marcus Wigan and numerous authorities on the topic of microchipping people. This volume contains 17 book chapters, and 7 interviews and panel presentations as well as full referencing of source materials in some 500 pages.

 "Uberveillance" edited volume by Michael and Michael (2014)

"Uberveillance" edited volume by Michael and Michael (2014)

 

CONTENTS PAGE

PART A The Veillances

Chapter 1 Introduction: On the “Birth” of Uberveillance  (pages 1-31) M. G. Michael (University of Wollongong, Australia)

Chapter 2 Veillance: Beyond Surveillance, Dataveillance, Uberveillance, and the Hypocrisy of One-Sided Watching  (pages 32-45) Steve Mann (University of Toronto, Canada)

Chapter 3 Uberveillance: Where Wear and Educative Arrangement  (pages 46-62) Alexander Hayes (University of Wollongong, Australia)

PART B Applications of Humancentric Implantables

Chapter 4 Practical Experimentation with Human Implants  (pages 64-132) Kevin Warwick (University of Reading, UK), Mark N. Gasson (University of Reading, UK)

Chapter 5 Knowledge Recovery: Applications of Technology and Memory  (pages 133-142) Maria E. Burke (University of Salford, UK), Chris Speed (University of Edinburgh, UK)

PART C Adoption of RFID Implants for Humans

Chapter 6 Willingness to Adopt RFID Implants: Do Personality Factors Play a Role in the Acceptance of Uberveillance?  (pages 144-168) Christine Perakslis (Johnson and Wales University, USA)

Chapter 7 Surveilling the Elderly: Emerging Demographic Needs and Social Implications of RFID Chip Technology Use  (pages 169-185) Randy Basham (University of Texas – Arlington, USA)

PART D Tracking and Tracing Laws, Directives, Regulations, and Standards

Chapter 8 Towards the Blanket Coverage DNA Profiling and Sampling of Citizens in England, Wales, and Northern Ireland  (pages 187-207) Katina Michael (University of Wollongong, Australia)

Chapter 9 ID Scanners and Überveillance in the Night-Time Economy: Crime Prevention or Invasion of Privacy?  (pages 208-225) Darren Palmer (Deakin University, Australia), Ian Warren (Deakin University, Australia), Peter Miller (Deakin University, Australia)

Chapter 10 Global Tracking Systems in the Australian Interstate Trucking Industry  (pages 226-234) Jann Karp (C.C.C. Australia, Australia)

Chapter 11 Tracking Legislative Developments in Relation to “Do Not Track” Initiatives  (pages 235-259) Brigette Garbin (University of Queensland, Australia), Kelly Staunton (University of Queensland, Australia), Mark Burdon (University of Queensland, Australia)

Chapter 12 Uberveillance, Standards, and Anticipation: A Case Study on Nanobiosensors in U.S. Cattle  (pages 260-279) Kyle Powys Whyte (Michigan State University, USA), Monica List (Michigan State University, USA), John V. Stone (Michigan State University, USA), Daniel Grooms (Michigan State University, USA), Stephen Gasteyer (Michigan State University, USA), Paul B. Thompson (Michigan State University, USA), Lawrence Busch (Michigan State University, USA), Daniel Buskirk (Michigan State University, USA), Erica Giorda (Michigan State University, USA), Hilda Bouri (Michigan State University, USA)

PART E Health Implications of Microchipping Living Things

Chapter 13 Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006  (pages 281-317) Katherine Albrecht (CASPIAN Consumer Privacy, USA)

PART F Socio-Ethical Implications of RFID Tags and Transponders

Chapter 14 Privacy and Pervasive Surveillance: A Philosophical Analysis  (pages 319-350) Alan Rubel (University of Wisconsin – Madison, USA)

Chapter 15 Neuroethics and Implanted Brain Machine Interfaces  (pages 351-365) Ellen M. McGee (Independent Researcher, USA)

Chapter 16 We Are the Borg! Human Assimilation into Cellular Society  (pages 366-407) Ronnie D. Lipschutz (University of California - Santa Cruz, USA), Rebecca J. Hester (University of Texas Medical Branch, USA)

Chapter 17 Uberveillance and Faith-Based Organizations: A Renewed Moral Imperative  (pages 408-416) Marcus Wigan (Oxford Systematics, Australia & Edinburgh Napier University, UK)

Acronyms and Abbreviations

Compilation of References

About the Contributors

Index

EDITORIAL ADVISORY BOARD

Roba Abbas, University of Wollongong, Australia

Greg Adamson, University of Melbourne, Australia

Katherine Albrecht, CASPIAN, USA

Anas Aloudat, University of Jordan, Jordan

Michael V. Arnold, University of Melbourne, Australia

Emilia Belleboni, Universidad Politecnica de Madrid, Spain

Rafael Capurro, University of Wisconsin – Milwaukee, USA

Kenneth Foster, University of Pennsylvania, USA

Amal Graafstra, Amal.net, USA

Mireille Hildebrandt, Erasmus University Rotterdam, The Netherlands

Peter Hyland, University of Wollongong, Australia

Nicholas Huber, Accenture, Australia

Indrawati, Institut Manajemen Telkom, Indonesia

Eleni Kosta, K. U. Leuven, Belgium

Ronald Leenes, Tilburg University, The Netherlands

Avner Levin, Ryerson University, Canada

Michael Loui, University of Illinois – Urbana-Champaign, USA

Noëmi Manders-Huits, Delft University of Technology, The Netherlands

Keith W. Miller, University of Missouri – St. Louis, USA

Lyria Bennett Moses, University of New South Wales, Australia

Christine Perakslis, Johnson and Wales University, USA

Laura Perusco, Macquarie Bank, UK

Kenneth Pimple, Indiana University – Bloomington, USA

Joseph Savirimuthu, University of Liverpool, UK

Alan D. Smith, Robert Morris University, USA

Charles Smith, Mesa State College Alumni, USA

Judith Symonds, Auckland University of Technology, New Zealand

Samuel Fosso Wamba, Rouen Business School, France

John Weckert, Charles Sturt University, Australia

 

HOW TO CITE THE VOLUME

MLA Style

Michael, M.G. and Katina Michael. "Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies." IGI Global, 2014. 1-509. Web. 24 Dec. 2013. doi:10.4018/978-1-4666-4582-0

APA Style

Michael, M., & Michael, K. (2014). Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies (pp. 1-509). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-4582-0

Chicago Style

Michael, M.G. and Katina Michael. "Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies." 1-509 (2014), accessed December 24, 2013. doi:10.4018/978-1-4666-4582-0

The latest IEEE T&S Magazine I edit is now out. I am extremely proud of this special section on Wireless Sensors.

I had the great fortune to work with Dr Katherine Albrecht of StartPage on the issue. Katherine has also been named the Magazine's newest Associate Editor bringing to the Magazine a strong track record in consumer representation on technology matters, privacy, security and human rights.

The current issue of the Magazine is presently available here. The special section editorial can be downloaded FREE here

This issue has contributions from Harvard, Stanford, Cambridge, Sydney, ESADE, Kent, Reading universities and perspectives from industry including Siemens, Accenture, Illuminating Concepts. This issue includes international voices from Germany, Spain, UK, US, Australia, Canada, and Japan.

I hope you will enjoy the diversity of opinion in this issue- a great deal of debate on where society and sensors is headed... will definitely stop and make you think.

What starts off as a bargain... takes about 4 weeks to turn yukky.

I've washed both pairs of my new Kathmandu slacks on several occasions now. I've loved wearing them, they're comfortable, and good quality... But it's taken me till now to figure out what that stiff 'cardboard' feeling thing was in the bottom side of my pocket. I first thought it was the Kathmandu label but as I put up my washing this afternoon and compared my black and gray slacks as I pegged them onto the line, I soon realised that 'it' wasn't in the pocket, nor was it a label- but something else in that extra sew-on attachment.

What gave it away? 

The black pants had a black extra sew-on attachment, while the gray pants had a white sew-on attachment and as the sun beamed I turned the clothes inside out.  The light of the sun revealed something else through the white fabric! And in the end had it not been for that, I would have been completely oblivious to the embedded tag.

Click through to see the discovery as it happened...

I have to say it is the first time that I've come across an item I've bought whose manufacturer has gone to such extraordinary lengths to embed a tag into the clothing. At first I thought, yeah, a lot of thieves would frequent Kathmandu for the quality clothing, and then when I came to my senses I realised this was not about theft or loss prevention but about consumer tracking!

Having recently re-opened Katherine Albrecht's and Liz McIntyre's Spychips bestseller, I soon put one and one together (see e.g. the Benetton and Gillette campaign)... this tag would potentially be used to understand repeat clientele back into Kathmandu retail stores!

shook my head stunned, thinking this was not right... I went to fetch my camera and scissors to cut open the sew-on attachment... and there, to my amazement, was the tag in full view. If that was not enough, the tag was stuck onto the fabric. I was reminded of a short 2 minute clip I had shown my students in IACT905 IT & Innovation @ UOW of Will Smith in the famous scene of Enemy of the State... tags in shoes, watches, pants, smart phone, you name it!

 Enemy of the State (1998). Scene taken 57 min into film. 

Enemy of the State (1998). Scene taken 57 min into film. 

What have we become?! Tracking spychips... in slacks... chips in slacks...! How utterly abhorrent! I thought about my kids wearing Kathmandu as well- those tags must go! Check your clothes and cut the attachments off!

The last gallery image depicts me quite disturbed at this discovery... I added my face to my pants symbolically, using my new Samsung Galaxy 4 Android device! There are several reasons for this- but for the greater part, the tag in my slacks is linked to me forever because my name is now linked to those pants, as is my face, and my transaction history.

I wonder how soon all of this will sync up with the "anonymous" tracking of consumers at shopping malls! It seems only a matter of time that there will be a truly integrated effort to bring together CCTV, smartphones and RFID chips! 

 The elevator scene in  Enemy of the State  (1998) between Will Smith and Gene Hackman.

The elevator scene in Enemy of the State (1998) between Will Smith and Gene Hackman.

 The elevator scene in  Enemy of the State  (1998) between Will Smith and Gene Hackman.

The elevator scene in Enemy of the State (1998) between Will Smith and Gene Hackman.

 The elevator scene in  Enemy of the State  (1998) between Will Smith and Gene Hackman.

The elevator scene in Enemy of the State (1998) between Will Smith and Gene Hackman.

 Courtesy: SkyFii

Courtesy: SkyFii

Images: GizMag

Dr. McCoy’s tricoder isn't looking too futuristic these days. Not only are real life versions of the Star Trek device under development, but some new medical devices are making it look a bit old fashioned. Take, for example, the ViSi Mobile vital signs monitor built by Sotera Wireless of San Diego, California. This wearable sensor pack uses Wi-Fi technology and is claimed to allow doctors using a tablet or smartphone to remotely monitor patient vital signs with the accuracy of an intensive care unit.

Read more

 Image:  Vergence

Image: Vergence

In today’s world, we’re moving from a single computer that connects to the internet and helps us organize and optimize our workflow while we’re at our desk, and into an incredible future where we all have the ability to optimize and increase the things that matter most to us in our lives while we’re on the go.  This is enabled through the ecosystem.

Read more