A few things about technology vulnerabilities before I go through the particulars of the more unusual types of devices that can be used as a spying, surveillance or stalking tool.
All technology has vulnerabilities. The only reason we may not have found any one particular vulnerability is we either aren’t looking for it, aren’t using the device in a way that would reveal it or we haven’t been hacked yet by someone who is.
What is the common thread in all of this? People.
Technology is only going to have the weaknesses of the people who have designed and created the technology to start with. In a way these issues are forcing us back on ourselves to take a good long look at:
Yes, it’s impossible to miss all the weaknesses in something simply because we as people don’t see everything at all times. Yes, the learning process goes on even when there is a high level of knowledge. But seriously at some point you do have to step back and from the technological tunnel vision and take a look at the bigger picture at hand… The human picture of the folks making these wonderful toys.
Ok, so that was a bit abstract. After dealing with a stalker for years and seeing the rapid evolution in learning with them with such a focus on what is not seen, blind spots and continuously changing up methodologies… this creates the illusion of chaos and requires very careful observation and tracking to find the blind spots in their choices.
Anyhoo… I wandered a bit. The human patterns start to tell another story sometimes.
A technology weakness allows those people with the know how, motivation and goals and objectives they would like to keep hidden to move forward on those goals and remain as anonymous as possible.
So while a technology weakness can be used to stalk someone, this is only the tip of the iceberg. Since human drives and motivations span a wide range of intentions so will the actions. Some other lovely things that can happen around technology weaknesses:
We have already seen all of these scenarios play out in various industries such as healthcare, security and information by some of the biggest brands, and governments.
Google owned nest thermostats have shown both security vulnerabilities and the capability of being compromised fairly easily since about 2014.
This means there’s a potential for multiple vulnerabilities.
I’m sure improvements have been made on the nest since 2014 to prevent this level of hacking. However, it’s also no surprise that people use their nest cameras to prank each other as well.
The significance to your robot room cleaners being hacked and used against you as a stalking tool has more than one component to it.
Next step in development is scanning this means information about your house your income the things you have and more detailed information about your patterns will also be gathered and transmitted through the air and a Wi-Fi network.
Planting cameras and listening devices in an A.C. unit is not the most original idea. It has been around for a while. It makes for a great way to spy on people since the units tend to be in locations where the space is open and people will tend to be (especially in warm weather) gravitating around the unit to keep cool in warm months.
A/C units which are also IoT machines or Smart devices also will have the same vulnerabilities as other Smart devices.
This is not something you see as much especially since it is so easy to compromise a cell phone, Smart TV or Smart Refrigerator.
In all of this stalking madness it is something to be aware of.
While I am not sure of any one cause of becoming a control freak or…
With 70% of stalking victims knowing their abusers often a stalking circumstance is misunderstood, denied…
If only we could turn back tome to that point where we could understand, stop…
Cyberstalking is still a new phenomenon. Law enforcement, the courts and protection efforts are still…
Before you settle on the idea of having a SmartPhone stalker you need to know…
Surviving the Manipulation of a Stalker As we've gone through our experience dealing with stalking,…