HomeNewsArticle Display

Are your running shoes spying on you?

Are your running shoes spying on you?

Are your running shoes spying on you?

WASHINGTON (AFNS) -- Five or 10 years ago, such a statement might have been appropriate for a cartoon matinee or slapstick farce, but in a new world defined by the Internet of Things, this statement isn’t just a possibility, but an actual cyber vulnerability to be aware of.

Companies today are adding the word “smart” to a constellation of different products: water bottles, refrigerators, televisions, and yes, even running sneakers.

In simple terms that word “smart” means computer code performing some automated function such as data collection, storage, transmittal or other task to offer the user better insight into his or her experience using that product. Those running shoes might log miles walked, calories burned or altitude climbed and then send that data over a connection of some kind, whether physical or Wi-Fi, to another smart device such as a phone, tablet or computer, which the user can use to monitor fitness.

It is that interaction, where the shoes “touch” the mostly unregulated, unprotected web where the true vulnerability lies. 

Any code can be altered once a connection occurs. The data you expect those shoes to collect may be changed by the bad guys to collect other data instead, or host malicious code that can be carried to the actual target they want to infect.  All you might have to do is walk by the ATM and your bank could now be potentially infected.

We take for granted the utility of smart devices. There is no argument they make life easier, more automated, and allow us to access data we might never have had access to before. Unfortunately, that comfort and joy we experience in the ever expanding landscape of technological wonders has a very evil underside we absolutely must be aware of.  We cannot assume that these devices are safe, secure, and protected. They are not.

So the question that comes to mind is simply: what do we do?

This is not some call to revert society back to an agrarian base. Instead, we must grow a culture aware of cybersecurity.

Even the simple act of asking questions: is this device (or shoe or water bottle) connected? How? Should I disable it before I come into work every day – or even not bring it at all? Are there security patches I can load on these items? That simple pause to address what has become a part of every facet of our lives could be the difference between a massive data breach and just another day at the office. 

An extreme example recalls how terrorists utilized simple box cutters as weapons of war to then turn civilian aircraft into even deadlier mass destruction devices.  It was the definition of asymmetric advantage by a “supposedly” inferior enemy. In an Internet of Things we have created hundreds of these tools, now weapons in waiting. Yet a simple cultural shift, a turn from blind trust to trust but verify, can blunt that advantage.

The Internet of Things offers an unbelievable range of possibility to the consumer. There is truly no limit to the new ways we can utilize smart devices to enhance our lives, but with the massive increase in powerful tools comes the simple responsibility to utilize them safely.

It is like the Wild West in terms of opportunity, so we must realize our role in keeping the cyber peace. Use these new technologies to their fullest, but be skeptical and vigilant that they are just as much a weapon as a tool and the enemy is always watching.

Engage

Twitter
The Installation Resilience Operations Center prototype is a game-changing solution for enhancing base security, em… https://t.co/ATHhejDoQJ
Twitter
“It’s important that you will be able to lead through complex challenges,” @GenCQBrownJr said. “I really want to ch… https://t.co/UI86usPVtO
Twitter
VCSAF Gen David W. Allvin visited various @AFResearchLab facilities to see how the 711th Human Performance Wing is… https://t.co/F5tpk0Mabc
Twitter
Invisible Wounds: Signs and Symptoms The Invisible Wounds Initiative, an @AFW2 Support Program, leads in creating… https://t.co/4SeYhlQuua
Twitter
Maggie Gee and Hazel Ying Lee were two of the first Chinese-American aviators to join the Women Airforce Service Pi… https://t.co/txl43oLLRs
Twitter
RT @USAFCENT: Listen to SrA Francis Andrew, assigned to the 332nd Air Expeditionary Wing, tell his story as one of the 'Lost Boys of Sudan.…
Twitter
#ICYMI Aircraft loaded with #COVID19 supplies left @Travis60AMW, California, bound for India. This shipment was jus… https://t.co/YdYFniZyok
Twitter
“While there are a lot of people who have done great things in the #AirForce, we wanted to recognize diversity and… https://t.co/bTH2aP5emk
Twitter
“It is a real honor, and I wish I could be there in person,”@GenCQBrownJr said during his acceptance speech. “I’d r… https://t.co/DH5Ou832K5
Twitter
RT @RealAFOSI: 1/ OSI's Guam based Detachment 602 recently spent time strengthening relationships throughout the Commonwealth of the North…
Twitter
RT @grandslamwing: Mobilizing to assist - anywhere, anytime. Members from #TeamAUAB aboard a C-17 from @TeamCharleston took off to assist t…
Twitter
RT @AirNatlGuard: .@HiAirGuard Airmen deployed to California to participate in exercise Sentinel Response 2021 alongside @CalGuard Airmen a…
Twitter
.@GenCQBrownJr and @cmsaf_official discuss the best ways to help Airmen's talent to bloom. #Airmen #Questionshttps://t.co/GGDHJkiOOb
Twitter
Airmen at the 149th Fighter Wing, Texas, demonstrated an autonomous machine solution for an @AFWERX innovation init… https://t.co/5ZGnnOPfYi
Twitter
During a quarterly senior leader review, @KesselRunAF & @USAF_ACC leaders agreed the Air Operations Center Weapon S… https://t.co/FnXQYIiG86
Twitter
RT @SecAFOfficial: #PublicServiceRecognitionWeek starts today! This is a chance to acknowledge the civil servants who dedicate themselves t…
Twitter
#ICYMI - The Air Force Employee Assistance Program has expanded the available resources available to #AirForce civi… https://t.co/t1eC1eRPfb
Twitter
RT @PACAF: #Airmen from PACAF conducted bilateral training with @JASDF_PAO (Koku-Jieitai) to enhance joint deterrence and response capabili…
Twitter
For 40 Airmen, the standard, manual deployment process averages four hours & 15 minutes per Airman from start to fi… https://t.co/Q8clDOwq3g
Facebook
The newest Air Force Podcast recently dropped. Listen to a small snippet of CMSAF Kaleth O. Wright talk with Staff Sgt. New about resiliency. Listen to the entire podcast on Youtube: https://go.usa.gov/xpnAD or Subscribe to The Air Force Podcast on iTunes: https://podcasts.apple.com/podcast/the-air-force-podcast/id1264107694?mt=2
Facebook
Our mantra, "Always ready!" It's the spirit we fly by! #B2Tuesday
Facebook
Need some motivation to get your week started off right? Listen as CMSAF Kaleth O. Wright weighs in...
Facebook
The U.S. Air Force Academy gives its cadets some unique opportunities. Ride along one of this opportunities.
Facebook
A United States Air Force KC-135 Stratotanker refuels an F-22 Raptor over northern Iraq, Nov. 6, 2019. U.S. Central Command operations deter adversaries and demonstrate support for allies and partners in the region. (Video by Staff Sgt. Daniel Snider)
Facebook
Although the Silver Star is the third-highest military medal, it's not given often. Today, TSgt Cody Smith was the 49th Special Tactics Airman to receive this medal since Sept. 11th, 2001. Read more of TSgt Smith's amazing story: https://www.airforcespecialtactics.af.mil/News/Article-Display/Article/2024815/special-tactics-airman-battled-through-injuries-awarded-silver-star/fbclid/IwAR2LZWwx1VHdTnQe39rIEBOuJS_0JvMQBBGt7I-E6zsxxn-Lx9387yu43Bc/ Cannon Air Force Base Air Force Special Operations Command United States Special Operations Command (USSOCOM) U.S. Department of Defense (DoD)
Facebook
Tune in as our Air Force musicians along with other military musicians are awarded the National Medal of Arts.
Facebook
Like Us
Twitter
1,346,467
Follow Us