Nowhere To Run

On a quiet London evening in December 1944, a young member of the US Women’s Army Corp was walking out her office building near Marble Arch.  She turned back to return some papers that she inadvertently took from her office. As it happened, some friends volunteered to do so in her stead.  

A minute later, a German V-2 (Vengeance Weapon 2 – an intermediate range ballistic missile launched from 100 miles away) slammed into her office building killing all her friends.

Eighteen thousand other people would be killed by these V-2’s in less than six months.  And countless others, like the young woman were left severely wounded in both body and mind for a life time.  

Years later on, as she tearfully shared this story with her only son, my mother whispered that in modern warfare, there was nowhere to run, nor anywhere to hide. In those years of my childhood, she was speaking in terms of massive nuclear weapons and their destructive capabilities.

Today, the technology of terror is drones. Narrower in scope, but more focused in dealing out death and destruction. And is seems as drone technology has vastly improved and played out in the past few years from the Armenia-Azerbaijan conflict, to the Ukraine-Russia war, and most recently in Israel, my mother’s resigned statement is sadly now truer than ever before.

Killing As A Video Game

Today’s drones are long range, long dwell, and are moving from human directed targeting to pre-programmed targeting. The technology is cheap, easily produced, and easily used.  All of which means it is not going away. And it will continue to spread in use and targeted lethality.
 
Social media has brought the use of these new vengeance weapons to everyone’s computer screens.  Videos of drone attacks are frightening not only for the result but also the method. 
 
They have become a deadly video game with long distance players. Chasing down combatants in the field of battle and civilians at home relentlessly. Clean killing.  Dehumanizing killing.  Reducing it all to a game.

And now, thanks to simple computer technology, swarms of drones can be directed in simultaneous targeted attacks in the same way.  

An even more frightening form of hell -- the kind of hell warfare that was experienced in the terrorist and jungle wars of the mid to late 20th century.  No front lines. Only sudden attack and death.

Long Range Terror Weapon, Sort of 

Watching the advance of long range drones is equally terrifying. The ability to hit civilian targets deep in country – like in the current Middle East conflict or the Ukraine-Russia war - with near stealth capability is meant to kill and to damage in a limited fashion.  But, this is also about terror and degradation of the morale of the population. 

The problem with any “vengeance’ weapon is people become surprisingly inured to their attacks.  As with the civilians of London in World War Two, the survivors went about their business knowing the attacks could occur at any time.  And as we have seen in Kiev today, the attacks often strengthen the resolve of the local citizens – not damage morale.

No Going Back

So where does it leaves us – this increasingly automated and targeted drone warfare? 

There is some talk that like landmines, for instance, nations could try to set international standards for drone warfare. However, in my opinion, it is likely such action is to be agreed to by few or simply ignored or paid lip service by the many.

I am afraid that for now, we are in a spiral of drone war with heightening defenses and increasing deterrence – one side keeps upping its defenses, the other side ramping up their capabilities. 

Welcome to the mechanized hell of mid-21st century warfare.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

You Might Also Read:

Beware The Ghost Stories Of Cyber Space:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

  

« The UK Needs To Reevaluate Its Cybersecurity Strategy

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Polymer

Polymer

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

RecoLabs

RecoLabs

Reco’s proprietary AI technology dynamically maps business interactions within your collaboration tools to identify sensitive assets shared and uncover incidents that are relevant to your business.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

SecondSight

SecondSight

SecondSight’s Vertical AI embodies a full-spectrum approach to cyber insurance, facilitating accurate digital risk profiling.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.