Namely, the widespread dissemination of commercial technology that might be secretly wired to function in unintended ways or even spy on its users. ???From this vantage point, mobile phones, network routers, computer work stations and any other device hooked up to a network can provide a point of entry for an adversary,??? the research arm of the DoD said in a statement.