Nowhere To Run

On a quiet London evening in December 1944, a young member of the US Women’s Army Corp was walking out her office building near Marble Arch.  She turned back to return some papers that she inadvertently took from her office. As it happened, some friends volunteered to do so in her stead.  

A minute later, a German V-2 (Vengeance Weapon 2 – an intermediate range ballistic missile launched from 100 miles away) slammed into her office building killing all her friends.

Eighteen thousand other people would be killed by these V-2’s in less than six months.  And countless others, like the young woman were left severely wounded in both body and mind for a life time.  

Years later on, as she tearfully shared this story with her only son, my mother whispered that in modern warfare, there was nowhere to run, nor anywhere to hide. In those years of my childhood, she was speaking in terms of massive nuclear weapons and their destructive capabilities.

Today, the technology of terror is drones. Narrower in scope, but more focused in dealing out death and destruction. And is seems as drone technology has vastly improved and played out in the past few years from the Armenia-Azerbaijan conflict, to the Ukraine-Russia war, and most recently in Israel, my mother’s resigned statement is sadly now truer than ever before.

Killing As A Video Game

Today’s drones are long range, long dwell, and are moving from human directed targeting to pre-programmed targeting. The technology is cheap, easily produced, and easily used.  All of which means it is not going away. And it will continue to spread in use and targeted lethality.
 
Social media has brought the use of these new vengeance weapons to everyone’s computer screens. Videos of drone attacks are frightening not only for the result but also the method. 
 
They have become a deadly video game with long distance players. Chasing down combatants in the field of battle and civilians at home relentlessly. Clean killing.  Dehumanizing killing.  Reducing it all to a game.

And now, thanks to simple computer technology, swarms of drones can be directed in simultaneous targeted attacks in the same way.  

An even more frightening form of hell -- the kind of hell warfare that was experienced in the terrorist and jungle wars of the mid to late 20th century.  No front lines. Only sudden attack and death.

Long Range Terror Weapon, Sort of 

Watching the advance of long range drones is equally terrifying. The ability to hit civilian targets deep in country – like in the current Middle East conflict or the Ukraine-Russia war - with near stealth capability is meant to kill and to damage in a limited fashion.  But, this is also about terror and degradation of the morale of the population. 

The problem with any “vengeance’ weapon is people become surprisingly inured to their attacks.  As with the civilians of London in World War Two, the survivors went about their business knowing the attacks could occur at any time.  And as we have seen in Kiev today, the attacks often strengthen the resolve of the local citizens – not damage morale.

No Going Back

So where does it leaves us – this increasingly automated and targeted drone warfare? 

There is some talk that like landmines, for instance, nations could try to set international standards for drone warfare. However, in my opinion, it is likely such action is to be agreed to by few or simply ignored or paid lip service by the many.

I am afraid that for now, we are in a spiral of drone war with heightening defenses and increasing deterrence – one side keeps upping its defenses, the other side ramping up their capabilities. 

Welcome to the mechanized hell of mid-21st century warfare.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

Image: Sergii Kolesnikov

You Might Also Read:

Beware The Ghost Stories Of Cyber Space:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

  

« The UK Needs To Reevaluate Its Cybersecurity Strategy
Celebrating 10 Years Of Kubernetes »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.