Latest technology raises new security risks


The latest technology raises new security risksPhoto used with permission from Shuttershock.com

Google’s new wearable computer, Google Glass, is among a current crop of technologies that sound like science fiction; however, they present real privacy risks. Here are a few developments that healthcare privacy professionals and organizations should be thinking about now.

A BYOD privacy challenge

Depending on whom you ask, the recently announced Google Glass is either every geek’s dream or a scheme to turn ordinary people into “surveillance cyborgs.” The first release of Google’s wearable computer, shaped like a pair of eyeglasses, can respond to voice commands to compose emails, shoot and transmit photos and video, perform Internet searches and get directions.

The limited functionality of the device may limit its adoption in the near future, but the potential is there for hackers to see everything the wearer does, turning unwitting innocents into spies to stealing passwords and door-entry codes, as well as financial, medical and other personal information. Today, Google Glass is designed to provide personal entertainment and convenience, but just like tablets and smartphones, this heads-up computing technology is sure to make its way into the medical work environment, adding to the challenges of maintaining security in a bring-your-own-device (BYOD) environment.

Multiplying mobile risks

Google Glass is not the only cutting-edge technology creating privacy and security risks. The dangers of mobile computing, in fact, lie not only in the devices, but in the applications they run and the data they generate; both are expanding exponentially. In 2013, almost 40 percent of worldwide phone sales were smartphones, and by January 2013, iOS and Android users had downloaded more than 80 billion applications, many of them capable of sophisticated data gathering. A recent article in the Wall Street Journal reports that corporate mobile and web applications can collect and analyze everything from camera type and geolocation of posted photos to “vibration information” that can extrapolate whether the user is travelling in a car.

In the future, medical applications may be designed to take advantage of these sophisticated data-gathering capabilities. (Wouldn’t it be interesting to do a remote sleep study using vibration information to find out whether a patient snores?) But just as with heart monitors and other medical devices, healthcare organizations will need to plan for security in the transmission, storage and use of these potentially massive amounts and new kinds of data. They will also need to make their patients aware that would-be thieves may be behind “free” applications, and to provide consumer guidelines for the safety of personal devices that may be used for medical purposes.

The ‘bottom’ line on privacy

Experts are already evaluating the privacy risks of implantable devices such as heart monitors. The privacy concerns of mobile medical devices have now extended from the heart to the derriere. According to The New York Times, a start-up named Pixie Scientific has developed a diaper that the company says can detect possible urinary tract infections, kidney dysfunctions and dehydration, accompanied by a smartphone app that can transmit the information to a physician.

In this case, the diaper simply incorporates test strips that analyze the diaper’s contents, then a caregiver photographs the test strips and transmits the image to a healthcare provider, so the security of the information is more a function of the smart phone client application than the diaper itself, but the article also mentions several more communications-capable “quantified self products,” including shirts that measure and transmit biometric data, all of which raise medical privacy concerns for consumers and for healthcare organizations that gather this data. (The diaper is initially being marketed for infants, but it could no doubt be used for adult patients in the future.)

Never underestimate the power of a hacker

At this point, you may be thinking: “There’s no way that criminals would take the trouble to steal all this obscure medical data.” Well, based on the stories I see and hear, you can never underestimate the creativity of data thieves. A recent blog post by security expert Brian Krebs shows just how creative cyber-attackers can be.

Annoyed at Krebs’ data security evangelism, a Russian hacker known as “Flycracker” organized an online campaign to raise money, buy heroin online and have it delivered by mail to Krebs, and notify the police in order to frame him. Krebs was able to track the plot and notify the police before the heroin arrived, but the story illustrates how resourcefulness, cohesiveness and determined these criminal networks really are.

A positive outcome

Enough of the dire warnings. Here’s an uplifting idea that may be good for your organization and for someone who has served our country: A new non-profit organization is offering military veterans and wounded service members a free six-month security training and certification program to help them find private sector employment and to provide security experts to meet the ever-increasing need.

Photo used with permission from Shuttershock.com