• Register

Data Net Blog

This Year’s CES Was All About Surveillance Technology

This Year’s CES Was All About Surveillance Technology

Held from Sunday, January 5 to Friday, January 10, 2020, this year’s Consumer Electronics Show took place in Las Vegas, Nevada. This event is an annual opportunity for startups and major companies alike to showcase their newest consumer-focused products. However, this year’s show has many security experts expressing sincere and legitimate concerns.

These concerns primarily come from the prevalence of devices that could potentially create very serious privacy and security issues. We’ll explain.

CES Served as a Platform for Surveillance Technology

This year, a huge variety of security-focused devices were showcased. Unfortunately, the way they were showcased gave pause to many security experts.

Their worries were primarily focused on the opportunity that these devices (which included smart cameras, interactive speakers, and fitness trackers) could be used as a means to invade someone’s privacy -- not to mention the idea that the smart cameras and their advanced facial recognition capabilities could potentially set a dangerous precedent. Of course, it doesn’t help that the past year or so has been filled with revelations about undermined privacy. The Amazon division that creates the Ring security cameras had a “Ring House” to demonstrate the capabilities of their devices, more or less immediately following reports of these very devices being hijacked and used to harass children.

It was only after receiving backlash that the company made a CES announcement that camera owners could also change their privacy settings to prevent Ring/Amazon from sending data over to the police without the user’s consent. One of their competitors, Wyze Labs, had announced a data breach just after Christmas that impacted 2.4 million customers and was then named as an honoree in CES’ innovation awards.

Sunflower Labs showcased a home drone security system, which would automatically track anyone who entered your property with an automated drone and send a live stream to your mobile phone. Their chief executive made a point of addressing security concerns, stating that the drone was better for your neighbor’s privacy… after all, the drone is only looking down at your property specifically. 

Privacy Concerns of Such Devices

Hopefully, it is apparent why regulators and privacy advocates aren’t totally enthused about such devices, especially when the security protecting them has historically been questionable at best. Most of these experts agree that some level of regulation is likely to come to these manufacturers to help make these devices more secure for the end user.

It must also be said that these topics were also discussed at CES, and moderators have noticed a greater acceptance of responsibility coming from companies to protect data and a shift in their view of themselves--away from owners of consumer data, and more of a view as caretakers.

Unfortunately, some of the other practices at CES contradicted this, like facial recognition being available as a sort of sign-in tool. CEO of the Consumer Technology Association (which puts on CES each year) Gary Shapiro defended these practices, saying that, “You’re opting in,” and “If you want to do it, you’ll have an opportunity to do it.” However, Executive Director Cindy Cohn of the Electronic Frontier Foundation, held a very different view: “There is a risk treating this as an individual decision... That’s not really fair or right to do to people. We need to fix the policies.”

There does seem to be some momentum toward doing so, as well, with various states restricting (or, to be more accurate, banning) the use of facial recognition technology in a variety of applications. Time will only tell.

Of course, this is also important to your business as well, despite the focus on consumer electronics. After all, if an employee has a vulnerable device, like the hottest new wearable, your network could be affected. It is important that you accept this possibility, and take the necessary steps to mitigate these risks.

Data Net can help. Reach out to us to start a conversation by calling (760) 466-1200.

Blockchain Has Applications for Many Industries
Tip of the Week: Doing More With the Windows Key


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 28, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Data Privacy Efficiency Smartphones Malware Hackers Google Innovation IT Support User Tips Email Microsoft Communication Managed IT Services Software Computer Tech Term Hardware Communications Small Business Users Cybersecurity Mobile Device VoIp Android Internet Mobile Devices Business Management Workplace Tips Outsourced IT Cloud Windows 10 Ransomware Miscellaneous Cloud Computing Passwords IT Services Business Social Media Collaboration Data Backup Hosted Solutions Apps Network Browser Wi-Fi Internet of Things Applications Managed Service Bandwidth Windows Backup Upgrade Gadgets Holiday Smartphone Data recovery Information Facebook Phishing Networking Employer-Employee Relationship Access Control Chrome Gmail Marketing Microsoft Office Wireless VPN Blockchain Managed IT services Patch Management Automation Saving Money Quick Tips Save Money Laptop Apple Compliance Value BDR Word Router Business Intelligence Managed IT Service Remote Monitoring and Management Data Security Telephone System Virtualization RAM Physical Security Mobility Office 365 Medical IT Artificial Intelligence Data Protection Batteries Password Excel Settings Employee-Employer Relationship Telephony Connectivity Windows 7 Scam Data Breach Company Culture Voice over Internet Protocol Business Continuity Paperless Office Business Technology Payment Cards Social Network iPhone Cortana Data Management G Suite Remote Monitoring Government Remote Computing Healthcare Going Green Wireless Charging Tech Terms Cost Management How To Processor Virus Net Neutrality Bring Your Own Device Computers Retail Office Virtual Assistant Solid State Drive Fleet Management Database Tech Support Law Enforcement Customer Relationship Management Telecommuting Threat Recycling Big Data Technology Tips Authorization Network Attached Storage Environment User Tip Spyware Amazon Display Edge Sales IT Service Online Shopping Trends Error Human Resources Mobile Office Content Filtering Hybrid Cloud Outlook Taskbar HP Spam Hosted Desktop Cryptocurrency Project Management IT budget Twitter Remote Support Hard Disk Drive Multi-Factor Authentication Cybercrime Alert Managed Service Provider Vulnerability Printing Personal Information Cleaning Server Microsoft Teams Managed Services Provider e-waste Training Benchmarks Dongle Tablet Mobile A.I. WannaCry Cables Profitability Help Desk National Security Document Management Antivirus User Security Firewall SaaS Search Inventory Video Mobile Device Management Machine Learning Tactics Co-Managed IT Workers Paper E-Commerce Bitcoin Backup and Disaster Recovery Comparison Electronic Health Records Vendor disposal Tip of the week Security Cameras Risk Management Movies Touchscreen HIPAA Eliminating Downtime Staff Congratulations Profiles Voice over IP GDPR Time Management Insurance IT Management Mobile Security Managing Stress Customer Service Holidays Travel File Sharing Humor Millennials Ink Payment Hard Drives Botnet Specifications Health Server Management Maintenance Plug-In Wearables Analytics Knowledge Battery Microsoft Office 365 Operating System Website Hard Drive BYOD Updates Digital Websites WhatsApp Shadow IT Streaming Media Storage Chrome OS File Management Troubleshooting OneNote Telecommute Education Memes PowerPoint instant Messaging Threats SSD Conferencing Lead Generation Employees Distribution Licensing Virtual Private Network Internet Explorer Proactive IT News Unified Communications Authentication Processors Wireless Internet Certification Safety Computer Repair eCommerce Downloads Dark Web Current Events Update Windows Server 2008 R2 Data loss Live Streaming IT Sports Reporting Vulnerabilities Scams WiFi Analysis Thank You Disaster Recovery Printers Financial Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123