Skip to main navigation menu Skip to main content Skip to site footer

Vol. 20 (2016)

Artykuły

Modern methods of commiting crime by the example of advancement of Internet of Things

  • Piotr Słowiński
DOI: https://doi.org/10.52097/pwk.5571  [Google Scholar]
Published: 2023-06-07

Abstract

The article deals with a subject of new methods of committing crimes with Internet of Things (IoT) as an illustration. Its aim is to present threats in a situations when there is a lack of decent securities in things which are part of Iot concept and to systematize state of knowledge about this conception. Based on recent experiments conducted by the security researchers, author depicts risks which could be very harmful. This article also sets forth to define IoT for the purposes of forensic and law studies.

References

  1. Brachman A., Internet przedmiotów – Raport, Obserwatorium ICT, Technopark Gliwice 2013. [Google Scholar]
  2. Kołodziej M. Internet Rzeczy, nowe spojrzenie na ochronę prywatnościw: J. Kosiński (red.) Przestępczość teleinformatyczna 2015, Wydział Wydawnictw i Poligrafii Wyższej Szkoły Policji, Szczytno 2015. [Google Scholar]
  3. Szpor G. (red.) Internet rzeczy. Bezpieczeństwo w Smart City, C.H. Beck, Warszawa 2015. [Google Scholar]
  4. http://abcnews.go.com/US/vice-president-dick-cheney-feared-pacemaker-hacking/story?id=20621434 [Google Scholar]
  5. http://arstechnica.com/security/2016/01/first-known-hacker-caused-power-outage-signals-troubling-escalation [Google Scholar]
  6. http://motherboard.vice.com/read/hackers-killed-a-simulated-human-by-turning-off-its-pacemaker [Google Scholar]
  7. http://sfglobe.com/2016/01/06/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night/ [Google Scholar]
  8. http://thehackernews.com/2015/08/hacking-internet-of-things-drone.html [Google Scholar]
  9. http://www.independent.co.uk/life-style/gadgets-and-tech/news/baby-monitors-hacked-parents-warned-to-be-vigilant-after-voices-heard-coming-from-speakers-a6843346.html [Google Scholar]
  10. http://www.pcworld.com/article/3012220/security/internet-connected-hello-barbie-doll-can-be-hacked.html [Google Scholar]
  11. http://www.reuters.com/article/us-ukraine-crisis-malware-idUSKBN0UE0ZZ20151231 [Google Scholar]
  12. http://www.rfidjournal.com/articles/view?4986 [Google Scholar]
  13. https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf [Google Scholar]
  14. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/410117/Internet_of_things_-_FINAL.pdf, [Google Scholar]
  15. https://www.ic3.gov/media/2016/160317.aspx [Google Scholar]
  16. https://www.praetorian.com/iotmap/#15/30.2647/-97.7520 [Google Scholar]
  17. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ [Google Scholar]
  18. https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/ [Google Scholar]
  19. https://www.wired.com/2015/07/hackers-can-disable-sniper-rifleor-change-target/ [Google Scholar]
  20. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ [Google Scholar]
  21. https://www.wired.com/2015/08/hackers-cut-corvettes-brakes-via-common-car-gadget/, [Google Scholar]
  22. https://www.wired.com/2015/12/2015-the-year-the-internet-of-things-got-hacked/ [Google Scholar]
  23. Raport Internet Rzeczy w Polsce, IAB Polska, 2015. [Google Scholar]