{"id":3991,"date":"2016-03-07T12:00:46","date_gmt":"2016-03-07T16:00:46","guid":{"rendered":"http:\/\/ncjolt.org\/?p=3991"},"modified":"2020-06-04T20:53:02","modified_gmt":"2020-06-04T20:53:02","slug":"3991-2","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/3991-2\/","title":{"rendered":"The Implications of the Expansion of the Internet of Things into Everyday Life"},"content":{"rendered":"<p>We are constantly told to be careful with what personal information we intentionally put on the Internet for the whole world to see. But with the rise of the \u201cInternet of Things,\u201d it seems we should be even more concerned about what we unintentionally put up on the World Wide Web. <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.intel.com\/content\/www\/us\/en\/internet-of-things\/infographics\/guide-to-iot.html\">Billions of \u201csmart\u201d devices make up the \u201cInternet of Things\u201d<\/a><\/span> (\u201cIoT\u201d). These \u201cInternet of Things\u201d smart devices use wireless technology to communicate with other devices. For example, personal use IoT devices, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.theverge.com\/2016\/1\/4\/10707894\/samsung-smart-refrigerator-connected-fridge-iot-ces-2016\">such as Samsung\u2019s fridge of the future that allows users to check spoilage from their phone<\/a><\/span>, can conveniently collect information or can remotely carry out the demands of the users.\u00a0 Other more common devices, such as the modern smartphone that have built in sensors that track every single movement of the user, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/fortune.com\/2016\/02\/10\/why-no-one-should-be-surprised-the-internet-of-things-is-a-gift-to-spies\/\">can become a part of the Internet of Things<\/a><\/span> when they pass on any of that information into the internet (most of them do).<br \/>\nIt seems as if top officials within the US surveillance community are playing good-cop-bad-cop with their approach of addressing the opportunities that the new generation of smart home devices offer to track human activity. The Director of National Intelligence, James Clapper, has <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.theguardian.com\/technology\/2016\/feb\/09\/internet-of-things-smart-home-devices-government-surveillance-james-clapper\">acknowledged that surveillance agencies<\/a><\/span>, without specifying which ones, might use IoT devices to expand upon their surveillance capabilities to monitor the better American public. It seemed as if he was excited when he told the Senate that \u201cintelligence services might use the [Internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.\u201d<br \/>\nOn the other hand, the Federal Bureau of Investigation released a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.ic3.gov\/media\/2015\/150910.aspx\">public announcement<\/a><\/span> expressing their concern that the soft security of many IoT devices may expose users to new avenues of harm. The FBI even listed examples of such harms, including the possibility of criminals gaining access to and controlling security systems, garage doors, and automated house locks of private homes. The Director of the National Security Agency, Admiral Michael Roger, gave the impression that the government is concerned about the potential violations of privacy that will arise from the presence of IoT devices within the home, stating that it was time to make such devices \u201cmore defensible.\u201d However, it is highly doubtful that the director of the National Security Agency suggested that such devices should be \u201cmore defensible\u201d from government snooping. One would naturally assume that the ability to access the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/fortune.com\/2016\/02\/10\/why-no-one-should-be-surprised-the-internet-of-things-is-a-gift-to-spies\/\">millions of sensors that comprise the Internet of Things<\/a><\/span> to monitor human activity is every security and law enforcement official\u2019s dream.<br \/>\nThe possibility of a reality where the government has access to every single spec of movement we make brings up two very important questions: (1) Are the companies that sell these products adequately protecting their users from government intrusion? (2) Does the 4<sup>th<\/sup> Amendment protect against government surveillance and the collection of data that arise from one\u2019s activity within her personal home?<br \/>\nThe answer to the first question is quite simply, no. Hewlett Packard Enterprise released a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA5-4759ENW.pdf\">report<\/a><\/span> that found that an \u201calarmingly high average number of vulnerabilities\u201d in each of the 10 most popular IoT devices. The answer to the first question requires a closer look into the companies that make these products. Many of these companies are established corporations that have no experience making products that connect to the Internet such as coffee machines, children\u2019s toys, and refrigerators. Many others are young start up companies that do not have the means or may not stay in business long enough to address security holes. Furthermore, based on Hewlett Packard\u2019s findings, it may just be that these companies simply do not care about protecting their users\u2019 information.<br \/>\nNext, does the U.S. Constitution protect against the government intrusion into the privacy of one\u2019s home? An analysis of the Supreme Court decisions that focused on this issue leads to the notion that the 4<sup>th<\/sup> Amendment will not protect the information deriving from IoT devices because the collection of that data does not intrude upon an individual\u2019s \u201creasonable expectation of privacy\u201d or may not qualify as trespass.<br \/>\nThe Supreme Court adopted and still uses a two-pronged \u201creasonable expectation of privacy\u201d test, as stated by Justice Harlan in his concurring opinion in <em>Katz v. United States, <\/em>to determine whether a warrantless search by the government intrudes upon someone\u2019s 4<sup>th<\/sup> Amendment rights. The 4<sup>th<\/sup> Amendment does not protect information that was knowingly revealed to the public. In <em>United States v. Miller<\/em>, the Supreme Court held that information voluntarily given to third parties is not subject to 4<sup>th<\/sup> Amendment protection. In <em>Smith v. Maryland<\/em>, the Court went one step further and held that the information collected by third parties is not protected when an individual was presumably aware that third parties collect that data. In conclusion, the 4<sup>th<\/sup> Amendment will not protect the information from IoT devices that is uploaded onto the Internet. The user is knowingly sending all of the information from his device to the company by connecting it to the Internet.\u00a0 At the very least, the user is aware that the company is recording the data from the device to the application or website she is using to access the device.<br \/>\nIn <em>Kyllo v. United States<\/em>, the Supreme Court held that the government can not access information from within an individual\u2019s personal home with a device \u201cnot in general public use\u201d to explore \u201cdetails of the home\u201d that would have been \u201cunknowable without physical intrusion.\u201d The device used by the government to observe individuals in <em>Kyllo<\/em>, a thermal imaging device, differs greatly from the IoT devices the government may use in the future. The next big issue for the Supreme Court will be to decide how dispositive the \u201cnot in general public use\u201d element is in determining whether a search is reasonable.<\/p>\n<blockquote><p>We live in a society where the presence of technology within our daily lives continuously increases. Hence, our privacy over the most intimate details of our lives will increasingly rely on the Supreme Court\u2019s answer to that one small question.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>We are constantly told to be careful with what personal information we intentionally put on the Internet for the whole world to see. But with the rise of the \u201cInternet of Things,\u201d it seems we should be even more concerned about what we unintentionally put up on the World Wide Web. Billions of \u201csmart\u201d devices <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/3991-2\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":3992,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3991"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=3991"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3991\/revisions"}],"predecessor-version":[{"id":7223,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3991\/revisions\/7223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/3992"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=3991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=3991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=3991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}