Internet of (Vulnerable) Things
In Nature documentaries, we can watch penguin colonies raise their chicks. We can watch the adults come and go with food and finally the chicks make their first splash in the ocean. All the while, right off shore, the sharks are swimming, waiting for a meal, knowing that the adults and chicks will swim right into range. The concentration of penguins means that the shark is very likely to get a meal.
Currently, there is a mad rush into the Internet of Things. Yes, the opportunities are huge. The benefits will be large to industry when every piece of equipment can report on its health. There is some extra convenience when consumer devices can be controlled from a distance. But the spread of unsafe devices is putting all of us at risk.
With the Internet of Things, the "sharks" are "swimming right off shore" here too. The problem is that almost none of the consumer level devices being built can be guaranteed to be safe now or even in a few years. The recent discovery of a major flaw in the WiFi encryption protocol shows the problem. Every WiFi device: phone, camera, front door lock, washing machine, heart monitor, or industrial machine needs to be updated to fix this flaw.
But in many cases, we do not have a way to update the equipment. Medical equipment and inexpensive home devices often have no way to be updated. Or worse yet, have "back doors" for such updating which can also be exploited by the "sharks".
Yes, the "sharks" are out there looking for these things. The Mirai botnet is but the first example. Millions of "Internet of Thing" devices were compromised to be used for a destructive attack on several web sites. Others have been compromised to mine bitcoins.
Most people do not worry about their use of such insecure devices. In many cases, the problems come not from one compromised device, but in the power of many compromised devices. When millions of devices can be controlled by one bad actor, the whole network can be put at risk.
This risk is not just because of criminals or unhappy young men wanting to shut someone up. The risk is that national enemies will take advantage of these capabilities to perform cyber warfare against us. Already, the Russians have been testing other methods such as GPS spoofing (which is giving our Navy and Air Force real problems). What could North Korea do with this? Iran and Saudi Arabia have already engaged in multiple cyber-attacks on each other.
We are at risk. Our purchases of cheap "Internet of Things" devices may easily become a national vulnerability.
As we spread Internet of Thing devices into our power grid (for the very good reason of better control), we may also spread the very way for an enemy to bring our power gird down on command from their office.
We will need to figure out how to detect and isolate such vulnerable devices.