Yogyakarta, 13th September 2018 - The era of interconnectivity has provided much innovations to help humans in maximizing its full potential. On its endeavor to achieve it, there is one modern technology that has been put under much spotlight: the Internet of Things. Gradually, this technology has gained its popularity with its features that help humans’ activities, ranging from automatically setting up the condition of a house, until independently monitoring the traffic situation. Center for Digital Society UGM (CfDS UGM) brought up the topic of ‘Internet of Things’ in its monthly discussion series, Difussion, on Wednesday (13/9).
‘IoT: Internet of Things’ or Internet of Threats’
Generally, the definition of ‘Internet of Things’ contains two elements: the technology of ‘Internet of Things’ can be in the form of a device that is capable of responding stimulant that is coming from the outside. The stimulant can be in the form of many things, ranging from smart home appliances that can respond to the order given through the user’s voice, until smart devices that can monitor the traffic situation. Despite its many features, the ‘Internet of Things’ still has various weaknesses that usually correlate with the security of user’s data stored in the ‘IoT’ devices. The cyber crime that targets ‘IoT’ devices usually exploits the interconnectivity feature offered by this technology.
"IoT opens a gap for cyber crime to exploit our personal information, because devices that use IoT technology usually ask for our personal information when we’re about to access it." said Ellyati Priyanka, one of the research assistant at CfDS UGM who explained the first material in this discussion.
Besides being the target for cyber crime, the ‘IoT’ technology can also be used as a tool to commit cyber crimes. For example, ‘IoT’ devices can be used to monitor a person's activities that create potential violations of the individual's privacy.
Then, how do we prevent cyber crime that is involving our ‘IoT’ devices?
‘First, we must be careful in managing the personal data that we uploaded to our ‘IoT’ device. This fundamental effort must also be accompanied by regulations and the establishment of regional institutions that focus on protecting the personal data of ‘IoT’ devices’ users.' said Ellyati.
In regards to the data security regulations in Indonesia, Ellyati argues that there has not been any regulation that is truly rule-binding and contains criminal sanctions for cyber criminals. In contrast to the European Union, which has issued a General Data Protection Regulation (GDPR) in May 2018, which aims to protect the security of users' personal data by providing a standardization component of ‘IoT’ service providers circulating in the European Union area.
‘The Internet of Things and Its Role in Facilitating Technologically-Induced Domestic Violence’
Treviliana Eka Putri, opens the second discussion by giving a video describing the relationship between "IoT" and domestic violence. Domestic violence is a type of violence that occurs in the private or domestic sphere, for example in the sphere of marriage relationship. In the context of marriage relationship, usually there are partners who share their own personal informations for each others.
‘However, if the relationship is no longer running, it will trigger domestic violence, considering that individuals involved in the relationship can misuse the personal information that was previously distributed to their partners.' said Treviliana as one of the researchers at CfDS UGM. As the key to overcome these problems, digital literacy is a crucial aspect that must be possessed by every user of the technology,’ said Treviliana, as she closes the second session of the discussion.
How Secure are our Home AI and IoT Smart Devices?
Home Artificial Intelligence (Home AI) is an IOT-powered device that is able to connect various electronic devices in our home. In the United States alone, the sales of Home AI devices have experienced a rapid surge that almost rivals the sales of smartphones. Basically, Home AI devices help humans to do their activities by studying and recording all the activities and habits that humans usually do at home. The recorded data certainly has the potential to be misused, and it was discussed in the previous discussion session.
‘Until now there has not been any data security standardization for Home AI products. There was a case in the United States where a family sued the Amazon company because the Amazon Echo device they had have recorded and sent family talks to their colleagues, without the family's consent. The ‘IoT’ device manufacturer with also has the responsibility to improve the safety standards of its products.’ said Priscilla Asoka as one of the research assistants at CfDS UGM, closing the last session of the discussion.
Written by: Ruben Raka