{"id":94377,"date":"2016-08-16T07:06:32","date_gmt":"2016-08-16T11:06:32","guid":{"rendered":"http:\/\/countingpips.com\/?p=94377"},"modified":"2016-08-16T07:06:32","modified_gmt":"2016-08-16T11:06:32","slug":"the-next-president-will-face-an-internet-disaster","status":"publish","type":"post","link":"https:\/\/www.investmacro.com\/forex\/2016\/08\/the-next-president-will-face-an-internet-disaster\/","title":{"rendered":"The Next President Will Face an Internet Disaster"},"content":{"rendered":"<div id=\"inves-1412126038\" class=\"inves-below-title-posts inves-entity-placement\"><div id =\"posts_date_custom\"><div align=\"left\">August 16, 2016<\/div><hr style=\"border: none; border-bottom: 3px solid black;\">\r\n<\/div><\/div><p>By <a href=\"http:\/\/WallStreetDaily.com\/\"><u>WallStreetDaily.com<\/u><\/a> <img loading=\"lazy\" decoding=\"async\" class=\"attachment-home-th size-home-th wp-post-image\" style=\"display: block; margin-bottom: 5px; clear: both;\" src=\"http:\/\/www.wallstreetdaily.com\/wp-content\/uploads\/2016\/08\/0816_INNOV_Hacker.jpg\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" srcset=\"http:\/\/www.wallstreetdaily.com\/wp-content\/uploads\/2016\/08\/0816_INNOV_Hacker.jpg 580w, http:\/\/www.wallstreetdaily.com\/wp-content\/uploads\/2016\/08\/0816_INNOV_Hacker-300x155.jpg 300w\" alt=\"The Next President Will Face an Internet Disaster\" width=\"580\" height=\"300\" \/><\/p>\n<p>Donald Trump or Hillary Clinton is going to face a massive internet disaster during the next four to eight years.<\/p>\n<p>This isn\u2019t some breach of confidentiality \u2013 the leak of celebrity photos, the naming of Ashley Madison users, the theft of Sony\u2019s documents by North Korea \u2013 that cost about $3.8 million on average.<\/p>\n<p>No, we\u2019re talking about threats to the integrity and availability of the Internet of Things (IoT).<\/p>\n<p>And people will die.<\/p>\n<p>In late 2015, John Chambers, the former CEO of <strong>Cisco Systems Inc.<\/strong> (<a href=\"http:\/\/agorafinancial.com\/ticker\/csco\/\"><strong>CSCO<\/strong><\/a>) forecast that by 2025, 500 billion (that\u2019s \u201cbillion,\u201d with a \u201cb\u201d) devices would be connected to the internet.<\/p><div id=\"inves-2648674615\" class=\"inves-in-content inves-entity-placement\"><hr style=\"border: 1px solid #ddd;\">\r\n<div id=\"inpost_ads_header\">\r\n<p style=\"font-size:10px; float:left; color:#666;\">Free Reports:<\/p><\/div>\r\n<div id=\"inpost_ads\"> \r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/1ApBOV\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2018\/06\/graph_techs_PD.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t     <a href=\"https:\/\/goo.gl\/1ApBOV\"><b><u>Get Our Free Metatrader 4 Indicators<\/u><\/b><\/a> - Put Our Free MetaTrader 4 Custom Indicators on your charts when you join our Weekly Newsletter<\/p><br><br>\r\n<br>\r\n<br>\r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/f3RrHX\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2019\/01\/cot_pie_80.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t    <a href=\"https:\/\/goo.gl\/f3RrHX\"><b><u>Get our Weekly Commitment of Traders Reports<\/u><\/b><\/a> - See where the biggest traders (Hedge Funds and Commercial Hedgers) are positioned in the futures markets on a weekly basis.<\/p><br><br>\r\n<\/div>\r\n<hr style=\"border: 1px solid #ddd;\">\r\n<br><\/div>\n<p>Now, Chambers\u2019 number is much bigger than most observers\u2019 \u2013 including BI Intelligence, which expects to see 34 billion by 2020, or tech research firm Gartner, which predicts 21 billion.<\/p>\n<p>Let\u2019s take the \u201cconservative\u201d estimate: Even 21 billion is about three times the number of people on Earth. That\u2019s still a big number.<\/p>\n<p>The vulnerabilities that come with the number of connections like that are almost literally incalculable.<\/p>\n<p>At the same time, device makers continue to prioritize profits over security. As we reported in December 2015, \u201c\u2026authentication provider Auth0 found that 85% of IoT developers admitted to being pressured to get a product to market before adequate security could be implemented.\u201d<\/p>\n<p>As security technologist and Resilient Systems Inc. CTO Bruce Schneier explained in a July 25, 2016, article for article for <em>Motherboard<\/em>, \u201cClassic information security is a triad: confidentiality, integrity, and availability.<\/p>\n<p class=\"blockquote\" style=\"padding-left: 30px;\"><em>You\u2019ll see it called \u201cCIA,\u201d which admittedly is confusing in the context of national security. But basically, the three things I can do with your data are steal it (confidentiality), modify it (integrity), or prevent you from getting it (availability)\u2026<\/em><\/p>\n<p class=\"blockquote\" style=\"padding-left: 30px;\"><em>With the advent of the Internet of Things and cyber-physical systems in general, we\u2019ve given the internet <\/em><em>hands and feet<\/em><em>: the ability to directly affect the physical world. What used to be attacks against data and information have become attacks against flesh, steel, and concrete\u2026<\/em><\/p>\n<p>\u201cThe Internet of Things will allow for attacks we can\u2019t even imagine.\u201d<\/p>\n<p>It\u2019s true that we\u2019re creating more powerful and more useful systems. And it\u2019s equally true that the dangers inherent in such systems are more and more acute.<\/p>\n<p>Here\u2019s how Director of National Intelligence James Clapper described the threat in the DNI\u2019s 2015 Worldwide Threat Assessment:<\/p>\n<p class=\"blockquote\" style=\"padding-left: 30px;\"><em>Most of the public discussion regarding cyber threats has focused on the confidentiality and availability of information; cyber espionage undermines confidentiality, whereas denial-of-service operations and data-deletion attacks undermine availability. In the future, however, we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e. accuracy and reliability) instead of deleting it or disrupting access to it. Decision-making by senior government officials (civilian and military), corporate executives, investors, or others will be impaired if they cannot trust the information they are receiving.<\/em><\/p>\n<p>The 2016 assessment included the following update:<\/p>\n<p class=\"blockquote\" style=\"padding-left: 30px;\"><em>Future cyber operations will almost certainly include an increased emphasis on changing or manipulating data to compromise its integrity (i.e., accuracy and reliability) to affect decision making, reduce trust in systems, or cause adverse physical effects. Broader adoption of IoT devices and AI \u2013 in settings such as public utilities and health care \u2013 will only exacerbate these potential effects.<\/em><\/p>\n<p>Hackers will seek to exploit vulnerabilities in three areas: software control, interconnections, and autonomy.<\/p>\n<p>Your computer is vulnerable to hackers and so is your thermostat and touchscreen universal remote once they come under software control.<\/p>\n<p>That holds for your automobile, which can be hacked while it\u2019s parked in your driveway or while you\u2019re moving down the road at a healthy clip\u2026 until you\u2019re not.<\/p>\n<p>More devices mean more interconnections, and vulnerabilities in one device lead to attacks against others.<\/p>\n<p>A recent hack of a <strong>Samsung <\/strong><strong>Electronics Co. Ltd.<\/strong> smart refrigerator exposed Gmail login credentials.<\/p>\n<p>Hospital IT networks have been compromised due to weaknesses in medical devices.<\/p>\n<p>And <strong>Target Corp.<\/strong> (<a href=\"http:\/\/agorafinancial.com\/ticker\/tgt\/\"><strong>TGT<\/strong><\/a>) was attacked via a vulnerability in its HVAC system.<\/p>\n<p>The number of vulnerabilities increases geometrically with the addition of each new connected device.<\/p>\n<p>Now think about how fast we\u2019re taking humans out of so many equations: computer programs that control your thermostat, buy and sell stocks, drive a car, or control the electric grid.<\/p>\n<p>Those autonomous systems can be compromised \u201cimmediately, automatically, and ubiquitously.\u201d<\/p>\n<p>Will we notice something\u2019s wrong\u2026 before it\u2019s too late?<\/p>\n<p>It\u2019s hard to say at this point if policymakers will summon the wisdom and the will to act on the myriad potential threats represented by the IoT.<\/p>\n<p>And cyber-criminals have an uncanny ability to stay under the radar for long periods, thanks to things like \u201cleave-no-trace\u201d malware that allows them to avoid exposure and remain undetected on networks for months at a time.<\/p>\n<p>The criminal infrastructure they employ is highly transient, and they\u2019re extremely sophisticated in their use of IP addresses and internet service providers. They also use \u201cbulletproof hosters,\u201d or providers located in non-cooperative countries, which allows them to remain online long enough to switch to different providers and remain stealthy.<\/p>\n<p>All of that makes cybersecurity more and more difficult.<\/p>\n<p>It\u2019s an ever-evolving undertaking. And the needs are constant. So from an investor\u2019s perspective, we prefer the diversification of <strong>PureFunds ISE Cybersecurity ETF<\/strong> (<a href=\"http:\/\/agorafinancial.com\/ticker\/hack\/\"><strong>HACK<\/strong><\/a>).<\/p>\n<p>The Internet of Things really is a matter of life and death.<\/p>\n<h2 class=\"centered headline\">This Week In\u2026<\/h2>\n<p><a href=\"http:\/\/boingboing.net\/2016\/08\/15\/how-not-to-get-stuck-in-traffi.html\" target=\"_blank\"><strong>Prudence<\/strong><\/a>:<\/p>\n<p class=\"blockquote\" style=\"padding-left: 30px;\"><em>\u201cThere are 4 billion hours of travel delays in America each year, contributing to pollution, fossil-fuel waste, and costing us all money \u2013 an estimated $87.2 billion dollars.<\/em><\/p>\n<p class=\"blockquote\" style=\"padding-left: 30px;\"><em>\u201cNot to mention traffic is just plain annoying. But is there a solution to your traffic woes?\u201d<\/em><\/p>\n<p>The video above, \u201cHow Not to Get Stuck in Traffic,\u201d answers this question with some practical tips on how to better operate your vehicle to maintain a consistent speed, to reduce unnecessary braking, and to keep your car in its \u201cliquid\u201d state.<\/p>\n<p>It also explains the potential benefits of self-driving cars, how researchers are exploring biologically-inspired algorithms to help reduce travel times, and the impact of interconnected travel infrastructure, such as synchronizing traffic signals.<\/p>\n<p>Innovation is indeed driving improvement in mobility.<\/p>\n<p>(But see: <a href=\"http:\/\/boingboing.net\/2016\/08\/15\/its-pretty-easy-to-hack-traf.html\" target=\"_blank\"><strong>It\u2019s pretty easy to hack traffic signals<\/strong><\/a>.)<\/p>\n<p>Smart Investing,<\/p>\n<p>David Dittman<br \/>\nEditorial Director, <i>Wall Street Daily<\/i><\/p>\n<p>The post <a href=\"http:\/\/www.wallstreetdaily.com\/2016\/08\/16\/internet-security\/\" rel=\"nofollow\">The Next President Will Face an Internet Disaster<\/a> appeared first on <a href=\"http:\/\/www.wallstreetdaily.com\" rel=\"nofollow\">Wall Street Daily<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By WallStreetDaily.com Donald Trump or Hillary Clinton is going to face a massive internet disaster during the next four to eight years. This isn\u2019t some breach of confidentiality \u2013 the leak of celebrity photos, the naming of Ashley Madison users, the theft of Sony\u2019s documents by North Korea \u2013 that cost about $3.8 million on [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-94377","post","type-post","status-publish","format-standard","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/94377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/comments?post=94377"}],"version-history":[{"count":2,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/94377\/revisions"}],"predecessor-version":[{"id":94389,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/94377\/revisions\/94389"}],"wp:attachment":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/media?parent=94377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/categories?post=94377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/tags?post=94377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}