Nowhere To Run

On a quiet London evening in December 1944, a young member of the US Women’s Army Corp was walking out her office building near Marble Arch.  She turned back to return some papers that she inadvertently took from her office. As it happened, some friends volunteered to do so in her stead.  

A minute later, a German V-2 (Vengeance Weapon 2 – an intermediate range ballistic missile launched from 100 miles away) slammed into her office building killing all her friends.

Eighteen thousand other people would be killed by these V-2’s in less than six months.  And countless others, like the young woman were left severely wounded in both body and mind for a life time.  

Years later on, as she tearfully shared this story with her only son, my mother whispered that in modern warfare, there was nowhere to run, nor anywhere to hide. In those years of my childhood, she was speaking in terms of massive nuclear weapons and their destructive capabilities.

Today, the technology of terror is drones. Narrower in scope, but more focused in dealing out death and destruction. And is seems as drone technology has vastly improved and played out in the past few years from the Armenia-Azerbaijan conflict, to the Ukraine-Russia war, and most recently in Israel, my mother’s resigned statement is sadly now truer than ever before.

Killing As A Video Game

Today’s drones are long range, long dwell, and are moving from human directed targeting to pre-programmed targeting. The technology is cheap, easily produced, and easily used.  All of which means it is not going away. And it will continue to spread in use and targeted lethality.
 
Social media has brought the use of these new vengeance weapons to everyone’s computer screens. Videos of drone attacks are frightening not only for the result but also the method. 
 
They have become a deadly video game with long distance players. Chasing down combatants in the field of battle and civilians at home relentlessly. Clean killing.  Dehumanizing killing.  Reducing it all to a game.

And now, thanks to simple computer technology, swarms of drones can be directed in simultaneous targeted attacks in the same way.  

An even more frightening form of hell -- the kind of hell warfare that was experienced in the terrorist and jungle wars of the mid to late 20th century.  No front lines. Only sudden attack and death.

Long Range Terror Weapon, Sort of 

Watching the advance of long range drones is equally terrifying. The ability to hit civilian targets deep in country – like in the current Middle East conflict or the Ukraine-Russia war - with near stealth capability is meant to kill and to damage in a limited fashion.  But, this is also about terror and degradation of the morale of the population. 

The problem with any “vengeance’ weapon is people become surprisingly inured to their attacks.  As with the civilians of London in World War Two, the survivors went about their business knowing the attacks could occur at any time.  And as we have seen in Kiev today, the attacks often strengthen the resolve of the local citizens – not damage morale.

No Going Back

So where does it leaves us – this increasingly automated and targeted drone warfare? 

There is some talk that like landmines, for instance, nations could try to set international standards for drone warfare. However, in my opinion, it is likely such action is to be agreed to by few or simply ignored or paid lip service by the many.

I am afraid that for now, we are in a spiral of drone war with heightening defenses and increasing deterrence – one side keeps upping its defenses, the other side ramping up their capabilities. 

Welcome to the mechanized hell of mid-21st century warfare.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

Image: Sergii Kolesnikov

You Might Also Read:

Beware The Ghost Stories Of Cyber Space:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

  

« The UK Needs To Reevaluate Its Cybersecurity Strategy
Celebrating 10 Years Of Kubernetes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

SecurityHQ

SecurityHQ

SecurityHQ (formerly known as Si Consult) is a Global Managed Security Service Provider (MSSP) that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.