Text archives Help


Re: [projectvrm] Security Architects Three Laws of the IoT


Chronological Thread 
  • From: "Larry W. Smith" < >
  • To: Dan Blum < >
  • Cc: ProjectVRM list < >
  • Subject: Re: [projectvrm] Security Architects Three Laws of the IoT
  • Date: Tue, 3 Feb 2015 21:23:06 -0500

Didn’t the NSA backdoor a 4th Law of Robotics: A robot may do harm when compelled by law or FISA court order.

And don’t NSA, et al, already have IoT covered at both nodes and edges.

And isn’t In-Q-Tel, the CIA investment/VC arm, already entrenched at the IoT infrastructure? - https://mattermark.com/106-startups-who-received-investment-from-the-c-i-a-most-frequent-in-q-tel-co-investors/

Just asking . . . 

Larry



Dear Colleagues: 

I originally wrote these laws December 10, 2014 and at that time thought applying Asimov to the IoT from a security AND privacy perspective would be a mighty cool idea. I shelved the file because I was busy with 2 simultaneous consulting contracts and didn't have time to do the deeper analysis I wanted to do.

But a few days ago I discovered someone had independently applied Asimov’s laws to cybersecurity and already done some detailed analysis. However, they did not explicitly discuss privacy principles as a core value of the IoT. For the rest, see:


Dan Blum
Security Architects, LLC
----------------------
We are a consulting firm dedicated to helping organizations plan, specify and develop security programs, policies and technology solutions.





Archive powered by MHonArc 2.6.19.