Nowhere To Run

On a quiet London evening in December 1944, a young member of the US Women’s Army Corp was walking out her office building near Marble Arch.  She turned back to return some papers that she inadvertently took from her office. As it happened, some friends volunteered to do so in her stead.  

A minute later, a German V-2 (Vengeance Weapon 2 – an intermediate range ballistic missile launched from 100 miles away) slammed into her office building killing all her friends.

Eighteen thousand other people would be killed by these V-2’s in less than six months.  And countless others, like the young woman were left severely wounded in both body and mind for a life time.  

Years later on, as she tearfully shared this story with her only son, my mother whispered that in modern warfare, there was nowhere to run, nor anywhere to hide. In those years of my childhood, she was speaking in terms of massive nuclear weapons and their destructive capabilities.

Today, the technology of terror is drones. Narrower in scope, but more focused in dealing out death and destruction. And is seems as drone technology has vastly improved and played out in the past few years from the Armenia-Azerbaijan conflict, to the Ukraine-Russia war, and most recently in Israel, my mother’s resigned statement is sadly now truer than ever before.

Killing As A Video Game

Today’s drones are long range, long dwell, and are moving from human directed targeting to pre-programmed targeting. The technology is cheap, easily produced, and easily used.  All of which means it is not going away. And it will continue to spread in use and targeted lethality.
 
Social media has brought the use of these new vengeance weapons to everyone’s computer screens. Videos of drone attacks are frightening not only for the result but also the method. 
 
They have become a deadly video game with long distance players. Chasing down combatants in the field of battle and civilians at home relentlessly. Clean killing.  Dehumanizing killing.  Reducing it all to a game.

And now, thanks to simple computer technology, swarms of drones can be directed in simultaneous targeted attacks in the same way.  

An even more frightening form of hell -- the kind of hell warfare that was experienced in the terrorist and jungle wars of the mid to late 20th century.  No front lines. Only sudden attack and death.

Long Range Terror Weapon, Sort of 

Watching the advance of long range drones is equally terrifying. The ability to hit civilian targets deep in country – like in the current Middle East conflict or the Ukraine-Russia war - with near stealth capability is meant to kill and to damage in a limited fashion.  But, this is also about terror and degradation of the morale of the population. 

The problem with any “vengeance’ weapon is people become surprisingly inured to their attacks.  As with the civilians of London in World War Two, the survivors went about their business knowing the attacks could occur at any time.  And as we have seen in Kiev today, the attacks often strengthen the resolve of the local citizens – not damage morale.

No Going Back

So where does it leaves us – this increasingly automated and targeted drone warfare? 

There is some talk that like landmines, for instance, nations could try to set international standards for drone warfare. However, in my opinion, it is likely such action is to be agreed to by few or simply ignored or paid lip service by the many.

I am afraid that for now, we are in a spiral of drone war with heightening defenses and increasing deterrence – one side keeps upping its defenses, the other side ramping up their capabilities. 

Welcome to the mechanized hell of mid-21st century warfare.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

Image: Sergii Kolesnikov

You Might Also Read:

Beware The Ghost Stories Of Cyber Space:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

  

« The UK Needs To Reevaluate Its Cybersecurity Strategy
Celebrating 10 Years Of Kubernetes »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

PowerDMARC

PowerDMARC

PowerDMARC is a domain security and email authentication SaaS platform that helps organizations protect their domain name, brand, and emails against unauthorized use.