Skip to main content

Currently Skimming:

4 The Internet of Things and the Decreasing Cost of Measurement and Assessment
Pages 21-26

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 21...
... He defined IoT devices as "small devices that contain digital processors and memory, just like your computers. The mobile phone is an example of an IoT device." He presented the following points: The Internet of Things and the Decreasing Cost of Measurement and Assessment 21
From page 22...
... of 13.6 percent over the 2017-2022 forecast period.2 • The United States dominates IoT services and software but not hardware production. He noted that these statistics underscore the rapid pace at which the use of IoT devices is expanding, evolving, and developing, while 1 An ARM processor is a type of processor developed by Advanced RISC Machines.
From page 23...
... Even the current generation of IoT devices lacks sufficient security features to thwart someone with basic training in electronics from gaining access, he stated. He also provided many examples of homework problems that he assigns to undergraduate students including the following: • Log into an IP camera and change parameters (see the reverse-engineering exercise)
From page 24...
... Sometimes a more balanced judgment alerting people to what might go wrong would be more helpful." In addition to data collection, Manferdelli also discussed sensors and their expanded use as they become less expensive. He highlighted nuclear and chemical sensors, noting that chemical sensors are more likely to proliferate in the short term.
From page 25...
... Mallory Stewart, a planning committee member, described how spoofing can add significant uncertainty to analysis, which then greatly extends attribution decision timelines, potentially resulting in no attribution at all. As an example, Manferdelli recalled an infamous cyberattack with which he was personally familiar outside of government.
From page 26...
... nation-states tend to be naturally conservative, and if one has some resilience and can introduce deterrence, that can be effective against attacks. 26 Technology / Partnerships / Counterproliferation


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.