James T Keating, Vice President of Product Strategy at Zimperium based in the United States, participates in Risk Roundup to discuss “The Weaponization of Wi-Fi.”
The Weaponization of Wi-Fi
Over the years, the fear of the potential misuse of wireless technologies as a covert weapon system is becoming very real. The reason behind that is if the wireless technologies can be used for cyber-attacks in different sizes, shapes, and forms, can monitor any individuals heart rate, synchronize and alter a heart rhythm, then with specific modification, it could very well be used to alter brain waves in humans or any other living species and thereby change its behavior or other anatomical functions.
Since the backbone of the internet, the infrastructure of the network of networks upon which the global internet traffic travels has gone from being an impassive infrastructure for communication to an active weapon for growing diverse attacks, it is essential to understand what has changed and what needs to change.
- What has enabled the internet to be weaponized?
- Which layer of cyberspace is easy to weaponize?
- Which layer of cyberspace weaponization will have the most significant impact on respective nations and its components?
- What will be the impact of the weaponization of Wi-Fi?
Manipulating Wi-Fi
It is said that depending on how our internet traffic passes through and which country it passes through determines the vulnerability of weaponization. It is, therefore, important to understand what role each country’s digital infrastructure plays in the weaponization of the internet.
- What is it about internet architecture that allows it to be weaponized?
- How is Wi-Fi weaponized? What makes Wi-Fi vulnerable to weaponization?
- Can the 5G network be weaponized? If yes, how?
- What can different weapons be transmitted using Wi-Fi?
- Do we have the capacity to stop the weapons coming our way through the Wi-Fi network?
- Can the wireless networks be used as carrier frequencies to induce brainwave manipulation?
- Can manipulation of brainwave happen through smartphones? What would be the impact?
- Do we have any weapon system that can directly speak to the mind of the human or machines in a format it understands?
- How easily can a smart grid be weaponized?
- How real are the threats to the Wi-Fi? At what scale can the Wi-Fi be weaponized?
- Are there any flaws in our smart mobile devices and the internet of things that make them vulnerable to wi-fi attacks?
- How do hackers and criminals currently exploit Wi-Fi?
- Which are the malicious Wi-Fi networks that can exploit smartphones? Is there any directory available that people can refer to and know where they are located?
The time is now to evaluate the risks of the weaponization of Wi-Fi!
For more, please watch the Risk Roundup Webcast or hear the Risk Roundup Podcast
About the Guest
James T Keating is the Vice President of Product Strategy at Zimperium based in the United States.
About the Host of Risk Roundup
Jayshree Pandya (née Bhatt), the founder and chief executive officer of Risk Group LLC(www.riskgroupllc.com), is working passionately to define a new security-centric operating system for humanity. Her efforts towards building a strategic security risk analytics platform are to equip the global strategic security community with the tools and culture to collectively imagine the strategic security risks to our future and to define and design a new security-centric operating system for the future of humanity.
About Risk Roundup
Risk Roundup, a global initiative launched by Risk Group, is a security risk reporting for risks emerging from existing and emerging technologies, technology convergence, and transformation happening across cyberspace, aquaspace, geospace, and space. Risk Roundup is released in both audio (Podcast) and video (Webcast) format and is available for subscription at (Risk Group Website, iTunes, Google Play, Stitcher Radio, Android, and Risk Group Professional Social Media).
About Risk Group
Risk Group LLC is a leading strategic security risk analytics platform.
Copyright Risk Group LLC. All Rights Reserved