As autonomous, self-driving cars seem to be nearing reality, the risks only grow. Have we considered the potential consequences if people with malicious intent can easily gain access to these devices? A 2015 demonstration of what can be remotely controlled on a fairly standard modern car is a frightening example. But most of these devices have very weak security, and tampering with them can cause more than just mischief. As we add smart speakers (that are always listening), smart security cameras, smart faucets, smart locks, and smart thermostats to our homes and offices, we appreciate the convenience of being able to remotely control these devices from our smart phones.
![griffin charging multidock cradle griffin charging multidock cradle](https://www.sbsupply.be/media/catalog/product/cache/5/image/800x/602f0fa2c1f0d1ba5e241f914e856ff9/g/r/griffin_multidock_2_10_bay-6_3.png)
The so-called Internet of Things represents a new threat. Think about the chaos that would ensue if banking records were deleted or encrypted and held for ransom? Even more frightening, image what might happen if hackers gained access to the control systems inside a nuclear power plant. Imagine an attack that knocks out our 911 emergency system during a hurricane, or that disables the computer driven x-ray and MRI machines in our hospitals, or that turns all the traffic lights green at the same time. Imagine an attack that shuts down the power grid during a heat wave or a deep freeze. We know that bad actors working for foreign governments have probed the systems that control our power grid, our financial systems, and our communications networks. Used at the appropriate moment, it can represent a deadly threat. Think of the lost income to some of our biggest industries when the results of our expensive research and development projects are simply copied by a foreign competitor. The Chinese are also masters of industrial espionage, and we have only helped them in that pursuit by off-shoring so much of our high tech manufacturing to them. Our intelligence agencies tell us that the Russian and the Chinese governments sponsor these attacks but, of course, they deny them when confronted. Hacking, like other forms of terrorism, is hard to anticipate, and retaliation is difficult because the attackers work from the shadows and often disguise their identities.
![griffin charging multidock cradle griffin charging multidock cradle](https://i.ebayimg.com/images/g/4HgAAOSwdjZfd3bK/s-l640.png)
![griffin charging multidock cradle griffin charging multidock cradle](http://ecx.images-amazon.com/images/I/31TuUE6JOyL._SL500_AA300_.jpg)
No direct attack on the American military is likely to end well, but the terrorist attacks of, and the frequent cyber-attacks on our infrastructure, up to and including the possible tipping of the 2016 presidential election, have demonstrated a clear vulnerability that we have been slow to shore up. But I sometimes wonder if we're falling for the same false sense of security as the Spanish did. No nation would be foolish enough to go head-to-head with America's military. Spain never recovered and Britannia ruled the waves for the next three hundred and fifty years.Īmerica has the most powerful military in the world and spends as much on "defense" as the next seven nations combined. The Spanish, rich with gold from the Americas, had more ships, bigger ships, more heavily armed ships, but the British man o' wars were more nimble, better manned, and used unconventional strategies that led to a decisive victory. In grade school, we learned about Sir Francis Drake, pirate or privateer, depending on who you asked, and his rout of the Spanish Armada in 1588, under adverse conditions and against all odds.