Nowhere To Run

On a quiet London evening in December 1944, a young member of the US Women’s Army Corp was walking out her office building near Marble Arch.  She turned back to return some papers that she inadvertently took from her office. As it happened, some friends volunteered to do so in her stead.  

A minute later, a German V-2 (Vengeance Weapon 2 – an intermediate range ballistic missile launched from 100 miles away) slammed into her office building killing all her friends.

Eighteen thousand other people would be killed by these V-2’s in less than six months.  And countless others, like the young woman were left severely wounded in both body and mind for a life time.  

Years later on, as she tearfully shared this story with her only son, my mother whispered that in modern warfare, there was nowhere to run, nor anywhere to hide. In those years of my childhood, she was speaking in terms of massive nuclear weapons and their destructive capabilities.

Today, the technology of terror is drones. Narrower in scope, but more focused in dealing out death and destruction. And is seems as drone technology has vastly improved and played out in the past few years from the Armenia-Azerbaijan conflict, to the Ukraine-Russia war, and most recently in Israel, my mother’s resigned statement is sadly now truer than ever before.

Killing As A Video Game

Today’s drones are long range, long dwell, and are moving from human directed targeting to pre-programmed targeting. The technology is cheap, easily produced, and easily used.  All of which means it is not going away. And it will continue to spread in use and targeted lethality.
 
Social media has brought the use of these new vengeance weapons to everyone’s computer screens. Videos of drone attacks are frightening not only for the result but also the method. 
 
They have become a deadly video game with long distance players. Chasing down combatants in the field of battle and civilians at home relentlessly. Clean killing.  Dehumanizing killing.  Reducing it all to a game.

And now, thanks to simple computer technology, swarms of drones can be directed in simultaneous targeted attacks in the same way.  

An even more frightening form of hell -- the kind of hell warfare that was experienced in the terrorist and jungle wars of the mid to late 20th century.  No front lines. Only sudden attack and death.

Long Range Terror Weapon, Sort of 

Watching the advance of long range drones is equally terrifying. The ability to hit civilian targets deep in country – like in the current Middle East conflict or the Ukraine-Russia war - with near stealth capability is meant to kill and to damage in a limited fashion.  But, this is also about terror and degradation of the morale of the population. 

The problem with any “vengeance’ weapon is people become surprisingly inured to their attacks.  As with the civilians of London in World War Two, the survivors went about their business knowing the attacks could occur at any time.  And as we have seen in Kiev today, the attacks often strengthen the resolve of the local citizens – not damage morale.

No Going Back

So where does it leaves us – this increasingly automated and targeted drone warfare? 

There is some talk that like landmines, for instance, nations could try to set international standards for drone warfare. However, in my opinion, it is likely such action is to be agreed to by few or simply ignored or paid lip service by the many.

I am afraid that for now, we are in a spiral of drone war with heightening defenses and increasing deterrence – one side keeps upping its defenses, the other side ramping up their capabilities. 

Welcome to the mechanized hell of mid-21st century warfare.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

Image: Sergii Kolesnikov

You Might Also Read:

Beware The Ghost Stories Of Cyber Space:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

  

« The UK Needs To Reevaluate Its Cybersecurity Strategy
Celebrating 10 Years Of Kubernetes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

tunCERT

tunCERT

TunCERT is the National Computer Emergency Response Team of Tunisia.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.