We now have the unprecedented ability to gather and analyze massive amounts of information. The digital data pond has transformed into an ocean that provides deep insights into behavioral patterns and personal preferences. Understanding and predicting user behaviors is a valuable resource for the private and public sector alike. But where there is value, there are high stakes and risks.
A 2019 report by Symantec maps out some of the most concerning cybercrime trends and the underground economy related to them. It starts with our inability to eradicate traditional cyber breaches, with email phishing and malicious links still counting for a large portion of cyber-attacks. So no, do not click the Microsoft Word attachment in that strangely-worded email (48 percent of malicious email attachments are camouflaging as Word files).
Potential for cybercrime
Cybercrime tools are becoming more sophisticated with rising numbers of formjacking1 on the financial fraud front. We also see more mobile-based attacks using fake mobile apps masquerading as legitimate ones, and a 33 percent rise of mobile malware2.
The much-anticipated integration of the 5G network accelerates connectivity levels, cloud-based solutions and multi-user networks further. Such high-connectivity potential also means that more individuals and devices would become soft targets – vulnerable for third party data gathering and malicious attacks.
Since the internet is borderless and boundless, a security breach in one region, country or for one individual could affect and infect a much broader number of devices and entities. It’s no surprise, then, that the cybersecurity market is expected to reach a market share of $248.26 billion by 2023.
The data collateral
The spike in personal device-based ownership and usage embeds digital content interaction in physical public, private and intimate spaces. If online data capturing is valuable, then gathering real-world, real-time data is priceless. Public-space surveillance is already an acceptable practice. But CCTV abilities pale in comparison to what our mobile devices and wearables are armed with.
From depth-capturing cameras that enable spatial and facial recognition to real-time biometric capturing and analysis, these abilities combined with compromised security measures bring with them new risk factors – such as biometric data highjacking or identity theft.
With more smart devices – from app-activated security systems and connected appliances to voice-activated virtual assistants and toys – our households become data-gathering heaven. These devices use integrated speech and visual and motion capturing capabilities, and could potentially give any ill-intentioned entity access to your personal and behavioral data.
Since most consumers don’t necessarily focus on security features when purchasing IoT devices, manufacturers have little incentive to integrate high-standard defence systems in them. As a result, most devices can be vulnerable to cyber-attacks. A very creepy case involved voice-activated dolls for children that were hacked to read out quotes from the best-selling erotic novel, Fifty Shades of Grey.
Blockchain and other encryption solutions might protect data leaking and breaches from third parties, but what are we to do when the platform creator intends to harvest and manipulate your data without our consent?
Many tech platform builders and service providers are heavily invested in motion tracking, biometric data and facial recognition systems, enabling personalized data tracks, identity authentication and data personalization along with potential privacy breaches and deep-data hacking. Facebook is forming entire divisions focused on advancing biometric and cognitive human-computer interaction for commercial and marketing purposes.
Insurance and healthcare-related companies are already experimenting in biometric and behavior-linked financial models. In the future, our data might literally determine our civic options and personal horizons. In China, facial recognition has been used to track and mark potential law offenders (projecting jaywalkers’ faces on a billboard or sending to their boss) and analyze primary school children’s facial expressions to quantify their level of scholarly engagement.
The alarming potential of biometrics and image tracking has generated several anti-surveillance solutions to protect users and bystanders from having their image & data collected within the physical space against their will.
Steve Mann, a leading researcher in computer vision and founder of the MIT Media Lab’s Wearable Computing group, started exploring vision enhancement and registering devices in the 1970s.
Many times, surveillance embraces hypocrisy. Surveillance wants to watch but not be watched, wanting to see but not to be seen, wanting to know everything about us but reveal nothing about itself.Steve Mann
As a researcher of surveillance, anti-surveillance and “Sousveillance” technologies, he and his students are creating devices that detect and alert us when our image is being captured3. His AR-enabled wearable computer EyeTap already integrates interactive filtering abilities and can remove elements in the physical environment in real-time.
Hiding in style
But next to data scramblers, filtering devices and gadgets, we are also likely to see more cybersecurity lifestyle products. Anti-surveillance fashion was pioneered in the ’90s via the iconic Vexed Generation label which is being reintroduced via a collaboration with Farfetch.
Modern-day camouflage tactics against intrusive technology include surveillance-blocking prints and textiles. One stylish disconnection initiative is Project KOVR, a “the digital invisibility cloak” using metalliferous fabrics that block incoming and outgoing digital signals. The Hyperface project, a collaboration between Berlin-based artist Adam Harvey and Hyphen-Labs, is a computer-vision-fooling print applied to scarves and other garments.
A more entertaining print-based solution is the REALFACE Glamouflauge by Simone C. Niquille, created to fool Facebook’s auto-tagging via the creation of a repeat print made of celebrity look-alike portraits. Other anti-surveillance accessories include the URME, a 3D printed mask used as a personal surveillance identity prosthetic. A more glamorous solution is Sheridan Tjhung’s bejeweled mask, a French net veil with 546 crystals.
It is a sad prospect for our culture and future when individuals must hide from data capturing systems out in public. Unless we regulate the integration of identity, biometric and behavioral tracking – we might end up having to hide from data predators in the real world. At least we’ll look pretty stylish doing so.
- Formjacking refers to highjacking personal and payment details through online payment forms. Another alarming factor is that cyber-attacks are becoming more aggressive and more targeted – looking to compromise operational computers, telecoms services, traffic control and supply chain systems attacks.
- In January 2019 alone, Google detected a malware that infected 9 million Android devices and despite the even iOS-based devices is becoming increasingly malware-susceptible.
- Mann created a device that lights up as an individual enters the veillance fields from surveillance cameras.