Beyond IoT And 5G: Internet Of Bodies, Or IoB

The conclusion to this detailed explanation of the Internet of Bodies (IoB) correctly states, “Be warned that this technology may make your life easier in the short term, but its long-term purpose is to make you a dehumanized slave.” ⁃ TN Editor

The age of the Internet of Things (IoT), and soon to follow the Internet of Bodies (IoB), is now upon us.

The RAND Corporation, the think tank behind some of the world’s most influential and frightening ideas and technologies, has released a report titled

You should be wary of any reports issued by the RAND Corporation. Alex Abella, author of Soldiers of Reason: The RAND Corporation and the Rise of American Empire, explains why:

RAND was, and is, the essential establishment organization. Throughout its history, RAND has been at the heart of that interweaving of Pentagon concupiscence and financial rapacity that President Eisenhower aimed to call the military-industrial-legislative complex. RAND has literally reshaped the modern world—and very few know it.

With this understanding, there is much cause for alarm with the issuance of this new report.

What is the Internet of Bodies (IoB)?

RAND defines the IoB as “a growing industry of devices that monitor the human body, collect health and other personal information, and transmit that data over the Internet.” In order to qualify as an IoB device, the technology must:

  • contain software or computing capabilities
  • be able to communicate with an Internet-connected device or network

An IoB device must also satisfy one or both of the following:

  • collect person-generated health or biometric data
  • be able to alter the human body’s function

The technology that Hollywood has presented over the years in dystopian sci-fi fantasies is now a reality. In the very near future, the technocratic overlords of science, health, finance, and Big Tech desire humanity to go from wearable devices to devices embedded within our bodies.

How IoB intersects with IoT

IoT devices such as smart meters, smart watches, virtual assistants, and self-driving cars connect directly to the Internet or through a local network. As IoT devices become more commonplace, experts predict that acceptance of and desire for IoB devices will also increase. The RAND report predicts:

By 2025, there will be more than 41 billion active IoT devices, generating 2.5 quintillion bytes of data daily on environment, transportation, geolocation, diet, exercise, biometrics, social interactions, and everyday human lives. This explosion in IoT devices will result in further popularity of IoB devices.

IoB Products in Use or Being Developed

Figure 1 from the RAND report shows just how invasive and pervasive IoB technology can become. By the time it is fully unleashed, no part of the human body will escape its interference. They even plan to have our toilets connected to the Internet where they will monitor our waste using BioBot technology to determine what we eat, what drugs we may take, and analyze our genetic material!

Here are just a few examples of the technology currently being developed:

  • Augmented reality contact lenses
  • Brain reading and writing devices
  • Body-implanted sensors
  • Clothing with sensors
  • Implantable microchips (RFID and NFC)
  • Mental and emotional sensors
  • Artificial pancreas
  • Bluetooth connected diaper

Not even babies will be able to escape this nightmare where every bodily function is constantly tracked and monitored. The sad part is that many people will welcome these intrusive technologies because they’re convenient and timesaving. However, exchanging bodily sovereignty for convenience is never a fair transaction. It almost always serves to benefit those who desire more control over our lives. Through adoption of technological advancement, humans are consenting to allow technocrats to dictate every facet of life. Soon doctors will be able to know if you are taking prescribed medication appropriately, and will have tools to report you if you aren’t. Digital pills will be used to record your medical compliance as the RAND report signals:

In 2017, the FDA approved the first digital pill: an aripiprazole tablet with an ingestible sensor embedded in the pill that records that the medication was taken. The product is approved for the treatment of schizophrenia, acute treatment of manic and mixed episodes associated with bipolar I disorder, and for use as an add-on treatment for depression in adults… The system works by sending a message from the pill’s sensor to a wearable patch. The patch transmits the information to a mobile application so that patients can track the ingestion of the medication on their smartphone. Patients can also permit their caregivers and physician to access the information through a web-based portal.

IoB Needs Advanced Technologies for Peak Usefulness

If you’re wondering what will power all of this forthcoming technology, the answer lies in a combination of 5Gnext generation Wi-Fi, and satellite Internet. These advanced systems will increase data transfer speeds and offer extra-low latency so that those audio and visual dropouts on Zoom calls will be relegated to the dust bin of history. Combined, these systems will provide the power and resources necessary to create a control and surveillance grid that can be monitored in real time. RAND confirms this purpose, illustrating that:

These advancements will enable consumer IoT technologies, such as smart home systems, to connect to IoB devices so that, for example, one’s smart thermostat will be linked to her smart clothing and automatically can regulate the temperature in her home. Greater connectivity and the widespread packaging of IoB in smartphones and appliances—some of which might collect data unbeknownst to the user—will increase digital tracking of users across a range of behaviors.

As 5G is widely being rolled out in the U.S. and other parts of the globe, plans are already being made to perfect and implement 6G. According to author Thomas S. Rappaport, 6G technology “will usher in the ability to send wireless signals at the rate of human computation”… and “could mean that human intelligence could eventually be sent over the air instantaneously.” Experts predict 6G will be widely available by 2030.

To top it off, nanobiotechnology is being used to manipulate cells and interconnect human bodies to the Internet. Scientists, researchers, and tech geniuses are attempting to play God by reengineering our cell structures, causing them to communicate with IoB devices. According to an article in News Medical, nanotechnology has “enabled several types of next-generation vaccines” such as the mRNA coronavirus vaccine being developed by Moderna.

Potential Benefits

The potential downside of IoB technology has been clearly established, but can anything good come out of this? There is no way IoB could be sold to the masses if it didn’t promise to improve quality of life. As RAND indicates:

IoB might enable wider access to health care by enabling inexpensive “distributed” or “democratized” health care or by decreasing the need for risky or costly medical intervention. Through greater health awareness, improved prevention, and more-effective intervention, IoB even has the potential to drive down health-care costs. It was hypothesized that early detection and intervention through remote monitoring were the primary drivers of the reduction. IoB devices can gather vital data to provide medical alerts to doctors, patients, and caregivers. IoB devices might also prove useful in guiding treatment for those who cannot speak or articulate their symptoms or thoughts, such as infants, stroke victims, or dementia patients, by alerting caregivers to significant changes in vital signs, for instance. IoB is a promising approach for developing real-time remote health monitoring systems for noncommunicable disease patients, most immediately diabetics and heart patients.

If any of these scenarios helps save and improve lives, then maybe IoB is a worthy endeavor. However, a careful reading of this quote reveals that IoB benefits are described with phrases such as “might enable,” “has the potential,” “might also prove useful,” and “is a promising approach.” In other words, IoB technology is still experimental and many things can go wrong if implemented on a wide scale.

We already know that radiation from mobile phones causes cancer. What happens when IoB devices powered by tech with even greater levels of radiation are implanted in the human body? Where are the long-term safety studies? If they already exist or are currently being conducted, who is sponsoring them? If the studies originate from the same industries poised to profit from their use, then malfeasance is all but guaranteed.

Potential for Misuse

Unfortunately, it seems as though the negative consequences of IoB devices will far outweigh their advances. There are just way too many things that can go wrong as indicated in Table 4.

Read full story here…

WEF Great Reset: Move Over IoT, Now It’s ‘Internet Of Bodies’

The slippery slope of Technocracy first introduced the “Internet of Things”, which was quickly upgraded to “Internet of Everything”. Now we rather blatantly have the “Internet of Bodies”: connecting, collecting, controlling. Did Klaus Schwab binge-watch too many episodes of Star Trek featuring the Borg? ⁃ TN Editor

In the special wards of Shanghai’s Public Health Clinical Center, nurses use smart thermometers to check the temperatures of COVID-19 patients. Each person’s temperature is recorded with a sensor, reducing the risk of infection through contact, and the data is sent to an observation dashboard. An abnormal result triggers an alert to medical staff, who can then intervene promptly. The gathered data also allows medics to analyse trends over time.

The smart thermometers are designed by VivaLNK, a Silicon-Valley based startup, and are a powerful example of the many digital products and services that are revolutionizing healthcare. After the Internet of Things, which transformed the way we live, travel and work by connecting everyday objects to the Internet, it’s now time for the Internet of Bodies. This means collecting our physical data via devices that can be implanted, swallowed or simply worn, generating huge amounts of health-related information.

See Shaping The Future of the Internet of Bodies.

Some of these solutions, such as fitness trackers, are an extension of the Internet of Things. But because the Internet of Bodies centres on the human body and health, it also raises its own specific set of opportunities and challenges, from privacy issues to legal and ethical questions.

Connecting our bodies

As futuristic as the Internet of Bodies may seem, many people are already connected to it through wearable devices. The smartwatch segment alone has grown into a $13 billion market by 2018, and is projected to increase another 32% to $18 billion by 2021. Smart toothbrushes and even hairbrushes can also let people track patterns in their personal care and behaviour.

For health professionals, the Internet of Bodies opens the gate to a new era of effective monitoring and treatment.

In 2017, the U.S. Federal Drug Administration approved the first use of digital pills in the United States. Digital pills contain tiny, ingestible sensors, as well as medicine. Once swallowed, the sensor is activated in the patient’s stomach and transmits data to their smartphone or other devices.

In 2018, Kaiser Permanente, a healthcare provider in California, started a virtual rehab program for patients recovering from heart attacks. The patients shared their data with their care providers through a smartwatch, allowing for better monitoring and a closer, more continuous relationship between patient and doctor. Thanks to this innovation, the completion rate of the rehab program rose from less than 50% to 87%, accompanied by a fall in the readmission rate and programme cost.

The deluge of data collected through such technologies is advancing our understanding of how human behaviour, lifestyle and environmental conditions affect our health. It has also expanded the notion of healthcare beyond the hospital or surgery and into everyday life. This could prove crucial in fighting the coronavirus pandemic. Keeping track of symptoms could help us stop the spread of infection, and quickly detect new cases. Researchers are investigating whether data gathered from smartwatches and similar devices can be used as viral infection alerts by tracking the user’s heart rate and breathing.

At the same time, this complex and evolving technology raises new regulatory challenges.

What counts as health information?

In most countries, strict regulations exist around personal health information such as medical records and blood or tissue samples. However, these conventional regulations often fail to cover the new kind of health data generated through the Internet of Bodies, and the entities gathering and processing this data.

In the United States, the 1996 Health Insurance Portability and Accountability Act (HIPPA), which is the major law for health data regulation, applies only to medical providers, health insurers, and their business associations. Its definition of “personal health information” covers only the data held by these entities. This definition is turning out to be inadequate for the era of the Internet of Bodies. Tech companies are now also offering health-related products and services, and gathering data. Margaret Riley, a professor of health law at the University of Virginia, pointed out to me in an interview that HIPPA does not cover the masses of data from consumer wearables, for example.

Recent technological advancements have ushered in a new era of the “internet of bodies” (IoB), with an unprecedented number of connected devices and sensors being affixed to or even implanted and ingested into the human body.

The IoB generates tremendous amounts of biometric and human behavioral data. This is, in turn, fuelling the transformation of health research and industry, as well as other aspects of social life, such as the adoption of IoB in work settings, or the provision of new options for entertainment – all with remarkable data-driven innovations and social benefits.

The World Economic Forum recently released a special report on this developing area. The August 2020 report explores how IoB raises new challenges for data governance that concern not only individual privacy and autonomy but also new risks of discrimination and bias in employment, education, finance, access to health insurance and other important areas for the distribution of social resources.

Another problem is that the current regulations only look at whether the data is sensitive in itself, not whether it can be used to generate sensitive information. For example, the result of a blood test in a hospital will generally be classified as sensitive data, because it reveals private information about your personal health. But today, all sorts of seemingly non-sensitive data can also be used to draw inferences about your health, through data analytics. Glenn Cohen, a professor at Harvard Law school, told me in an interview that even data that is not about health at all, such as grocery shopping lists, can be used for such inferences. As a result, conventional regulations may fail to cover data that is sensitive and private, simply because it did not look sensitive before it was processed.

Read full story here…

Under The Radar: Internet Of Things Explodes In 2020

The IoT (Internet of Things) is a necessary component of Technocracy to monitor everything that happens in society as well as geospatial movement. As devices interact with other devices and transmit results to centralized computers, AI is then applied to exercise control.

This article will give you an idea of the magnitude and trajectory of IoT. ⁃ TN Editor

The last few years have seen the Internet of Things (IoT) grow from a theoretical concept to a major priority for many organizations. As companies integrate IoT devices into their network infrastructures, they are looking for new ways to utilize them and manage the data they collect. Given the tremendous impact these devices are likely to have on the world, it’s worth looking at a few key Internet of Things statistics.

What is IoT?

In a very general sense, IoT refers to a broad range of internet-connected devices that are capable of communicating with other devices and networks. They can perform a variety of functions but are most often used to gather information and perform specific actions. While many of them have the ability to process data, some are only intended to gather and transmit data elsewhere for processing.

The advantage of IoT devices is that their connectivity greatly enhances functionality and market reach. Since they can connect to a broader network, they can have extensive functionality with relatively modest hardware capabilities. They are crucial for automation strategies and can be used to control a variety of tasks and functions remotely.

IoT Statistics: How Many Internet-Connected Devices Are There?

1. There Will be 41 Billion IoT Devices by 2027

That’s a lot of devices. When looking at the raw number of connected devices Business Insider predicts will be connected to the internet by the end of the decade, it’s easy to lose sight of how large the figure actually is. For context, take a moment to look at the difference between a million and a billion in terms of time:

One million seconds is roughly equal to 11.5 days.

One billion seconds is roughly equal to 31.75 years.

The difference between a few million IoT devices and a few billion, then, is quite staggering. Other estimates that push IoT projections farther into the future provide even more striking numbers, forecasting as many as 125 billion IoT devices by 2030.

2. By 2023, 70% of Automobiles Will Be Connected to the Internet

Autonomous vehicles are coming, whether people like it or not. While precise numbers are difficult to determine, the automotive industry alone has invested over $100 billion on research and development of self-driving cars over the last five years alone. While driverless cars may not be taking over the highways soon, their need to gather and analyze huge amounts of data will demand more sophisticated edge data centers capable of directing the resulting digital traffic.

Even if self-driving vehicles aren’t here yet, existing automobiles are increasingly incorporating IoT features. From sensors that transmit usage and mechanical condition data to manufacturers and dispatchers to internet connectivity that facilitates better GPS and driver comfort, today’s vehicles offer as much connectivity as the modern home. The computing power that makes this connectivity possible will make IoT-enabled vehicles valuable tools in edge computing frameworks.

3. Every Second, Another 127 Devices Are Connected to The Internet

Increasingly, IoT devices are popping up everywhere. Former Cisco researcher David Evans, who calculated just how many devices were being added every second, provides a glimpse into how widespread they’ve already become:

…“things” are no longer just computers and phones. Today, literally anything can be connected, including tennis rackets, diapers, clothing, vehicles, and, of course, homes. And although people may find this unsettling, the network is also starting to include biological things: Today, pets, crops, livestock, and the clothing on your body can be connected. We’re not far from an Internet link you can actually swallow as a pill.

With so many devices proliferating, IT professionals will need to be much more aware of potential security threats. Each device represents a different attack vector for hackers, and with so many devices coming and going in the workplace, companies must become more diligent in managing access.

4. There Will Be 1.9 Billion 5G Cellular Subscriptions by 2024

In a 2019 report on the mobile industry, Ericsson predicts that the rapid expansion of 5G availability will continue to drive Internet of Things growth. The North American market is expected to see the most growth, with 63 percent of mobile subscriptions featuring 5G service, but 47 percent of cellular subscribers in East Asia will have 5G access as well. Short-range IoT devices are expected to see the greatest benefits from these connections. Wide-area and cellular internet-connected devices should also continue to contribute more to total cellular data traffic, which increased by 82 percent in the first quarter of 2019 alone. Much of this IoT growth will be credited to reductions in chipset prices and the expansion of cellular technologies such as NB-IoT and Cat-M1.

IoT Statistics: What is the IoT Market Size?

5. Companies Will Invest Up to $1.1 Trillion in IoT by 2023

Many companies have already identified IoT devices as a clear value-add for their business. Far from just the technology sector, clothing manufacturers, healthcare providers, and municipalities around the world are investing in new ways to leverage the potential of interconnected devices.

With so much capital pouring into research and development, it’s safe to assume that the IoT market size of the next decade will look very different from today’s. One thing that won’t change, however, will be the importance of edge data centers in IoT networks. This may explain why colocation data centers continue to be a vital IT solution for organizations looking to rapidly scale their operations to make the most of IoT devices.

6. The Total Economic Impact of IoT Could Range Between $4 and $11 Trillion per Year by 2025

Research by the McKinsey Global Institute suggests that IoT growth will continue to be rapid despite the fact that many of the most promising applications of the technology have yet to be fully deployed. Many companies already utilizing IoT technology are doing so modestly, such as using smart sensors to track products flowing through their supply chains. However, complementary technologies such as more versatile cloud technology and edge computing architecture will likely enable a rapid expansion of IoT applications. The expansion of 5G technology and reductions in hardware costs are also expected to help increase the widespread adoption of internet-connected devices.

7. The Home IoT Market is Expected to Grow to $53.45 Billion by 2022

Smart home devices, most of which are used to automate lighting, climate, appliances, entertainment, or security systems in a household, are already entering homes in record-breaking numbers. As an example, “smart speaker” devices like the Amazon Echo are already in 31 percent of US broadband households as of Q1 2019, up from a mere seven percent in 2017.

8. By 2024, the Global IoT Healthcare Market is Expected to Reach $140 Billion

Healthcare is one of the most exciting use cases for IoT technology, which is why the market in that sector is expected to grow by 12 percent annually from 2017 to 2023. The potential of telemedicine and wearable sensors will make it possible for medical professionals to better monitor and treat patients, especially in traditionally difficult-to-reach regions. Although the healthcare sector faces unique challenges owing to the compliance demands of HIPAA/HITECH requirements, improvements in IoT security will help the technology to be applied more broadly in the coming years.

Read full story here…

Michigan Bill: It’s OK To Microchip Employees, But Not To Make It Mandatory

A Republican lawmaker in Michigan finds it OK to microchip employees as long as employers don’t make it mandatory. Employers want this to “increase workplace efficiency”, where “efficiency” is a favorite Technocrat concept. A better concept would have been for Michigan to simply ban microchips, period. ⁃ TN Editor

The Michigan House of Representatives has passed a controversial bill to microchip humans voluntarily in the state under the guise of protecting their privacy. The Microchip Protection Act would allow Michigan employers to use microchipping of their workers with their consent. However, research has shown that RFID transponders causes cancer.

The plan to microchip humans is sponsored by Rep. Bronna Kahle under the guise of protecting the privacy of workers. The stated objective of the bill is that it will protect the privacy rights of Michigan workers and promote further growth for job providers as it relates to microchipping – a cutting-edge technology on the rise that increases workplace efficiency.

“With the way technology has increased over the years and as it continues to grow, it’s important Michigan job providers balance the interests of the company with their employees’ expectations of privacy.”

“Microchipping has been brought up in many conversations as companies across the country are exploring cost-effective ways to increase workplace efficiency. While these miniature devices are on the rise, so are the calls of workers to have their privacy protected.”

Rep. Bronna Kahle, the Republican who sponsored the bill, said in a press statement.

Radio-frequency identification tags, commonly referred to as microchips, are beginning to seep into the marketplace as new technological devices to help streamline everyday business practices. The chips, roughly the size of a grain of rice, are implanted into the hands of employees and act as a replacement for I.D. badges, timecards, usernames and passwords for security clearance, and even credit cards.

“Despite this type of technology not quite making its way into our state yet, I wouldn’t be surprised if it becomes a standard business practice statewide within the next few years,” Kahle said. “We should absolutely take every step possible to get ahead of these devices.”

Under Kahle’s plan, Michigan employers would be able utilize microchipping, but could not mandate employees to have such devices implanted. Kahle said the measure strikes a good balance between protecting workers’ rights and providing businesses with flexibility to increase efficiency and further grow.

Read full story here…

Protecting Your Digital Life In The Age Of IoT

Unless specifically demonstrated otherwise, you should assume that every electronic device in your home is capable of ratting on you in one form or another. Here are some steps that can protect you. ⁃ TN Editor

The Internet of Things (IoT) device universe is expanding. This statement echoes for the fifth year in a row—only the numbers change as they grow bigger. Indeed, as the universe of IoT devices grows, so do the dangers they bring. With Gartner’s predicted 20 billion IoT devices by 2020 and 25 billion by 2021 comes not only lack of certification for IoT security (ISO/IEC 27030 is still in draft version and there are no clear dates when it can be released) but also real dangers right now from interconnected, insecurely designed, and not properly updated and maintained IoT.

Such constant expansion clearly demonstrates the attitude of those who participate in the IoT market. New models are introduced with shiny new functionality, but secure design, and extensive quality assurance and testing remain low on the priority list.

17 entry points to a connected home

Each new component added to the network poses a new possible risk and widens the attack surface for each household. This attack area for households is already large. On average, there are 17 devices connected to the internet for a single household, including computers, phones, gaming consoles, smart TVs, watches, cameras, NAS devices, printers, and thermostats.

This means every household has 17 devices on average that are:

  • Collecting your private data
  • Sending your private data for further analysis to the cloud
  • Serving as a possible entry point to the network
  • Disrupting internet services by participating in DDoS (distributed denial of service) attacks

Our data shows that almost 43 percent of devices are using an operating system (OS) that is no longer supported. This does not mean immediate danger and exploitability because of differentiating OS lifecycles, but it does suggest a huge number of interconnected devices out there that are possibly no longer maintained by vendors, though they still exist in the local network as part of a device base. Even if we approximate that no more than a quarter of these devices are really vulnerable, that’s an impressive 10 percent of the overall device universe left to be exploited, posing real danger.

The risks posed by rogue devices

The most dangerous scenarios point toward devices that are unsupported, discontinued, or no longer maintained. They might still be storing sensitive user data after they are left connected to the internet with their ports forwarded.

Remote access attempts executed by malicious outsiders or host discovery scanners and unauthorized attempts to access the open port make up more than 65 percent of overall suspicious and malicious activities registered daily. Based on CUJO AI data attempts to check open ports or scan for possible vulnerabilities, this kind of activity happens at least 10 times a day per household. Apart from the direct danger to sensitive user data, no longer used and forgotten devices can serve as a trampoline or proxy inside the local network.

Other typical scenarios include leaving default credentials when connecting the device to the network. Given that IoT device configuration is often too complex or there’s no way to change the default built-in credentials, this is usually left “for later” and never done at all. The same considerations come with vulnerability patching and firmware updates.

IoT devices were often overlooked as minuscule, unimportant details of the overall network. This view has changed completely after the initial Mirai botnet attack. Hundreds of thousands of low calculating power devices can be coordinated together to unleash a huge, volumetric DDoS attack.

And there are several considerations when talking about IoT device security and protection:

  • How to protect them on the perimeter?
  • How to protect devices inside the network?
  • How to distinguish legitimate device behavior from malicious?
  • How to protect the device that is no longer maintained by the vendor itself?

What can be done to secure the home?

With the evolution of a chaotic IoT device market, new problems arise. How do you deal with the massive amount of discontinued and possibly no longer used devices still connected to the network and partially alive in zombie mode?

Cloud services used by such devices can be no longer available, patches are no longer released, and the manufacturer has shifted to a different type of product. And this problem will become more and more relevant with the practically unregulated expansion of the IoT device market. Parts of the internet become an interconnected landfill.

How to minimize the impact?

  • Monitor your household by identifying what devices are in your network. Review them occasionally to dismiss ones that are no longer used, thus decreasing the attack surface for your home network.
  • Change the default credentials, especially for IoT devices. Secure them with strong passwords according to the latest recommendations.
  • Deploy protection to the edge of the home network to disallow malicious outsiders access to your inner network while at the same time disallowing your devices from participating in illegal activities or communicating with malicious nodes.
  • Utilize security solutions driven by artificial intelligence that are capable of proactive protection for deterministic IoT devices by analyzing their behavior and determining typical vs anomalous behavior.

Read full story here…

Flashback: In Our Hyperconnected Future, Regulation Will Be Instant And Irresistible

Pushbutton control over algorithms and devices will ultimately circumvent and then replace traditional methods of governance, leaving no ground for appeal or redress: ‘Your app has been automatically updated.’ ⁃ TN Editor

Last week, a man crash landed his drone on the White House lawn. Evidently, the individual, a member of a US intelligence agency, had been drinking and was showing off his drone to a friend when he lost control of the craft.

Any other house and lawn and no problem. Obviously, not the case here. The president called for more drone regulations. Headlines fretted White House security. And DJI, the drone’s maker, grounded drones in the Washington DC area with a GPS software patch.

And perhaps that last item is the most intriguing. A maker of a physical product reached out through cyberspace and disabled it to comply with the law. (In fact, the update couldn’t be forced on owners as the drones aren’t internet connected, but if owners want to benefit from other updates, they have to accept that one.)

Now, it’s not to say DJI’s move doesn’t make sense. The fledgling drone industry is just getting its feet, and the FAA is still considering how to regulate it. Bad press about runaway drones in high-security areas? Not really all that ideal. Also, since 9/11, the airspace around Washington DC has been highly restricted. It’s not hard to see why the rule make sense in Washington. If a drone can carry a camera, it can carry more lethal packages and deliver them at a distance.

DJI had also already established a few thousand no-fly zones surrounding airports. Such no-fly zones are as much about safety as malevolent acts—mistakes happen, and we wouldn’t want a jet engine inhaling an errant toy aircraft.

But underneath all that is the fact that a simple software update can dramatically change what an already owned product can do. Most updates add functionality, but in this case an update took functionality away.

Where most regulated products rely on the threat of punishment and law enforcement to ensure people follow rules, with computer-based physical products, we may be witnessing the birth of a new, distinctly modern regulatory era.

Imagine a future in which the FAA rules on a particular item—say, no drones within 100 feet of federal buildings. Prior regulations have been put in place that require all drone makers to update their no-fly zones within five days. Almost instantly, no drone can fly within some new set of GPS coordinates. Why might this be appealing to regulators? In theory, the rule requires less enforcement because drones are physically prevented from flaunting it.

We’ve been talking drones, but they’re just one early example. There are others.

Tesla, for example, is well-known for pushing automatic software updates to its cars. And these aren’t just updates to the dashboard readout. Elon Musk just announced a software tweak to improve the Tesla Model S P85D’s acceleration by 0.01 seconds—small but significant in the high-end market where accelerations are measured and compared in hundredths of seconds.

As we head toward an increasingly driverless future, cars will become more like computers on wheels than wheels with computers. What regulations could be written into software? Speed limits? No-drive zones? Car won’t start until you put on your seatbelt?

And, of course, it doesn’t end there either. Analysts expect billions of new physical devices to come online in the next decade. The Internet of Things may afford the government real-time regulatory enforcement—government mandated thermostat settings to save energy or restricted water usage in a drought, for example.

Could such a system be abused? No doubt about it.

Read full story here…

Forbes: How The IoT Enables Pushbutton Regulation From A Distance

The Internet of Things (IoT) is designed as a command-and-control system to regulate the entire system in which they operate. This includes humans contained therein as well.

This article’s author rightly concludes,

The “Smart Cities” movement potentially may present the most significant incarnation of Regulation from A Distance, though. Versions I’ve noticed seem to involve heavy governmental control, “partnered” with large corporations or government-preferred players.

⁃ TN Editor


Artificial intelligence can be curiously stupid. My Android phone still thinks I’m “wing Cruz” and doesn’t know my kids. Pandora overplays The Church and Deadmau5 (no offense).

As hackable as Alexa, Jeep Cherokees and credit card services are over a public Internet not designed for security, the networked gadgetries enabled by the Internet of Things (IoT) continue to dazzle. An overwhelming number of them will be on display again in January at the 2020 Consumer Electronics Show (#CES2020).

The primary vulnerability of the IoT is not hackers, though, but IoT policy.

Technology that overcomes “market failure” in the provision of goods and services should enable the reduction and streamlining of regulatory burdens. Instead it sometimes threatens to foster the expansion of government power.

That is, the same IoT that animates objects can also mean instantaneous nanny-state regulation from a distance—of drones, vehicles, buildings, social media use, schooling and more.

You’ve heard of free-range kids vs. helicopter parenting?

Well, the society fancying itself on the verge of flying cars may face helicopter government instead; assorted bureaucrats clicking and swiping from afar, using the IoT to control the IoT.

It’s one thing for Tesla to send its own software updates to its customers’ cars. We definitely want such things to happen—a lot.

But as Jason Dorrier noted in Singularity Hub, “regulations … written into software” could be highly appealing to regulators. A “No drones within 100 feet of federal buildings,” rule, for example, could be enforced by requiring the uploading to networked objects of software patches altering GPS coordinates, and disabling them in event of non-compliance.

Dorrier named other examples: software patches imposing speed restrictions and no-drive zones on vehicles, preventing cars from starting without seatbelt attachment, and mandating thermostat settings and water use restrictions in buildings.

Entrepreneur Marc Andreessen long ago described software eating the world. Titans in sectors from “movies to agriculture to national defense” are now software companies, run on software and delivered as online services.

Unfortunately, while software has eaten business models, it is not eating traditional top-down central regulatory regimes in the sense of displacing them.

Those systems are preparing to eat the IoT instead.

The next step in this “evolution” could go beyond rules mandating the updating or patching of software, to unelected bureaucrats simply doing it themselves remotely by clicking and swiping rather than enacting a law or rule, Constitution notwithstanding. The use of guidance documents, informal directives and other “offers you can’t refuse” are already a prominent regulatory concern highlighted by the Administrative Conference of the United States. The IoT could magnify such abuse.

Read full story here…

Amazon Ring Doorbells Exposed Your Wi-Fi Password To Hackers


Ring says the vulnerability was fixed in September, but it did not report the problem until now. Wouldn’t you think Ring owners would have wanted to be notified immediately upon discovery so they could at least change passwords on their Wi-Fi routers?

TN has said many times that Big Tech Technocrats barely treat security even as an afterthought. Getting products to market is far more important than consumer security and safety. ⁃ TN Editor


A new report from security researchers alleges that Amazon Ring doorbells have exposed users’ home Wi-Fi passwords to hackers.

TechCrunch reports that security researchers at Bitdefender have claimed that Amazon Ring doorbells were sending users Wi-Fi passwords in cleartext as the doorbell joins the home network. This would allow hackers to intercept the Wi-Fi password and gain access to users’ local network.

Bitdefender stated: “When first configuring the device, the smartphone app must send the wireless network credentials. This takes place in an unsecure manner, through an unprotected access point. Once this network is up, the app connects to it automatically, queries the device, then sends the credentials to the local network.”

All of this happens over an unencrypted connection which exposes the Wi-Fi password being sent over the air. The vulnerability was reportedly fixed by Amazon in September but the vulnerability was only recently disclosed.

A Ring spokesperson provided the following statement to Breitbart News: “Customer trust is important to us and we take the security of our devices seriously. We rolled out an automatic security update addressing the issue, and it’s since been patched.”

This is yet another vulnerability recently discovered in smart home devices, Breitbart News reported a team of researchers from Tokyo’s University of Electro-Communications and the University of Michigan recently claimed to have discovered a way to “hijack” voice-enabled devices by shining a laser at the microphones of the devices.


Qualcomm Salivates Over 5G And Internet Of Things

Qualcomm understands that 5G will provide a gusher real-time data to be collected, manipulated and sold for huge profits. Technocrats lust for and hoard all the data that they can get their hands on. ⁃ TN Editor

Like many municipalities, the city of Carlsbad has deployed connected water meters to reduce costs of sending crews out to read meters manually.

But these smart meters provide something perhaps more valuable than operational savings. They generate digital data on water use.

The Carlsbad Municipal Water District began running analytics software on that data to spot spikes and anomalies in consumption. For a time, a staffer would call residents to let them know their usage had surged.

The result was 16 million gallons of water saved in just six months, said David Graham, Carlsbad’s chief innovation officer, at Qualcomm’s Smart Cities Accelerate 2019 conference this week.

“That doesn’t exactly drive revenue for the city. We get more revenue the more water people use,” said Graham. “But it drives a better customer experience, and ultimately in California we want to reduce water usage across the board.”

The benefits and challenges of smart cities technologies were the focus of Qualcomm’s Smart Cities event, where more than 550 people, including representatives from 400 companies that make smart cities technologies, attended at the company’s Sorrento Mesa campus.

For Qualcomm, smart cities technology is part of its strategy to bring the wireless connectivity not only to smartphones but also to many other things including roads, energy and water grids and smart streetlights.

Faster, more flexible 5G networks, which have begun rolling out globally, have been tailored to eventually connect as many as one million devices per square kilometer — paving the way for a vast expansion of connected sensors, cameras and infrastructure.

For cities, connecting and analyzing data from connected street lights, water meters, energy grids and environmental sensors has the potential to improve safety, ease traffic jams and preserve scarce resources.

“At an intersection, which is really one of the most dangerous parts of driving, you can actually manage it with a combination of cars communicating with cars, cars communicating with the infrastructure and the infrastructure, with video, having the ability to understand exactly what is going on,” said Jim Thompson, chief technology officer of Qualcomm.

Read full story here…

Digital Slavery: 5G, Internet of Things and Artificial Intelligence

The Technocrat’s lust for 5G and Internet of Things is so strong that they are perfectly willing to ignore all human concerns, protests and especially health concerns. However, the issue of Scientific Dictatorship, aka Technocracy, is much greater. ⁃ TN Editor

Technocracy was originally defined as “the science of social engineering, the scientific operation of the entire social mechanism to produce and distribute goods and services to the entire population…” (The Technocrat Magazine, 1938)

Planted as a seed in 1932, Technocracy has grown into a tree so big that it literally covers the earth today: that is, through the rebranding and repurposing by the United Nations as Sustainable Development, Agenda 21, 2030 Agenda, New Urban Agenda, etc.

Furthermore, it is like a hydra-headed monster with many tentacles and expressions, but we must never lose sight of the common purpose of all: kill the world’s economic system of Capitalism and Free Enterprise and replace it with the vacuous economic system, Sustainable Development.

Since Technocracy is a resource-based economic system, people like you and I are considered as mere resources on the same level as livestock on a ranch. If people are just animals who selfishly consume resources, then they must be monitored, managed and limited in their consumption.

To this end, Technocracy originally called for total surveillance of all people, all consumption, all production and all energy consumed in every activity. The outcome was to control all consumption and production. This level of technology didn’t exist in 1932, but it does today!

When the surveillance network in America (and the world) is finally functional, the command and control system will become reality, resulting in a Scientific Dictatorship that exceeds even Orwell’s Nineteen Eighty Four or Huxley’s Brave New World.

What is the last cog in the gearbox necessary to bring this about? In short, 5G!

Why? When you consider the massive amount of data that is waiting to be collected from the widespread Internet of Things, facial recognition cameras, Smart City sensors, self-driving vehicles, etc., they all lack one element: real-time connectivity5G solves this!

If you listen to any 2019 speech given by the CEO of Verizon, T-Mobile or AT&T, you will hear them rave over how 5G’s real-time connectivity is going to light up the Internet of Things like a Macy’s Christmas tree. You will hear the words “transformative” and “disruptive” over and over.

What’s the big deal with “real-time” connectivity? Artificial Intelligence (AI).

It is said that AI without data is as inert and useless as a pile of rocks. AI needs data to “learn” and then to take action. Up until now, Technocrats who create AI programs have had to use historical data for learning and that’s about all; forever learning but never doing.

The “holy grail” of Technocrats is to use their AI on REAL-TIME DATA. Real-time analysis can then close the control loop by feeding back real-time adjustments. This has never been done in the history of the world, but thanks to 5G, Technocrats everywhere are salivating to dive into the control business; that is, the “scientific operation of the entire social mechanism.”

Let me give you an example. Say you are an engineer and you designed and built a state-of-the-art fire truck that will revolutionize firefighting. There it sits on display for everyone to see. You start the engine and everyone is duly impressed, but still, it just sits there. Without water (e.g., the data) to pump through the numerous hoses, everyone, including yourself, can only imagine of what it would be like. In fact, your engineering dream is quite useless until you take it to an actual, real-time fire and blast away with the water cannons to douse the flames. Then you will know if you were successful or not.

Technocrats understand this. They know that 5G will fully enable their AI inventions and dreams. Unfortunately for us, they also know that it will enable the feedback loop to control the objects of surveillance, namely, US!

The Technocrat’s lust for 5G and Internet of Things is so strong that they are perfectly willing to ignore all human concerns, protests and especially health concerns.

Perhaps now you can understand how and why they are living out the old nautical phrase, “Damn the torpedoes, full speed ahead!” Risks don’t matter. Danger doesn’t matter. Collateral damage doesn’t matter.

To the extent that we citizens can nullify the rollout and implementation of 5G, we will scuttle the Technocrat’s ability to establish a Scientific Dictatorship. Truly, it is we who should be mounting the counter-attack with our own cry of “Damn the torpedoes, full speed ahead!”