Keywords :
data privacy; embedded systems; mobile computing; mobile handsets; M2M technology; data privacy; data safety; embedded cellular device; machine-to-machine; Access protocols; Cellular phones; Computer crime; Computer security; Global Positioning System; IP networks; Land mobile radio cellular systems; Carmen Sandiego Project; M2M; Scada; Zoombak; cellular technology; computer security; critical infrastructure; cybersecurity; embedded systems; machine-to-machine; privacy; tracking devices; vehicle security module;