Drone Wars – When Cyber Warfare Becomes Real

Tuesday, November 08, 2011

Dan Dieterle


The race to create unmanned military equipment is in full furry. No ground robots were used during the Iraq War in 2003, but by 2008 there were about 12,000 in use there.

Congress has required that one/third of all military ground vehicles be unmanned by 2015. Unmanned drones flown by pilots in the US are used daily in the hunt for terrorists in remote places in Afghanistan and Pakistan.

Arial drone technology is advancing rapidly. The US is testing the X-47B prototype that will not only land on aircraft carriers but will also be able to be refueled while it is still in the air.

A stealth drone (The RQ-170 Sentinel) not only exists, but has been used in service for several years now. At least one of these units provided live video and monitored Pakistani military communications during the raid on Osama bin Laden’s hideout.

But the US is not the only country that has this technology. China, Russia, Pakistan, Iran and about 45 other countries are either developing them or are buying them. Hezbollah has even joined the fray, reportedly using an Iranian designed system.

Much hype has been heard in the media about “Cyber Wars” but most of the instances cited so far point more to espionage or even at the most extreme case, sabotage.  The comparison to “war” really hasn’t been justified. But what if these automated machines could be compromised? What if a drone based virus could change friend from foe designations?

One would have to look first to see if there are any situations where military robots have acted erratic or have been acted upon by external sources. P.W. Singer’s “Wired for War” covers several of these instances.

According to his book numerous accounts have been made where electronic interference have affected these units. Several types of robots in service have been noted to spin or act erratically (called a “Crazy Ivan”) if it is near radio frequency interference. Humorous at best, but when the robots are armed it really isn’t that funny:

The Marine Corp’s Gladiator combat robot protoype (the one the size of a golf cart) also had a Crazy Ivan experience during its testing, driving about in a circle that left the marines at the exercise not knowing whether to laugh or run away.”


Electronic jammers used on US vehicles to prevent IED attacks have also wreaked havoc with military drones.

According to Singer, the jammers can cause some drones to crash when they fly overhead. Prompting one army EOD team to call their Talon drone “Rainman the Robot.”

Also according to Singer, military robot manufacturers are using off the shelf components in some equipment and are being pressured to cut some corners in testing to get the units out into the field:

One engineer described “pressure to try to pass safety tests only with the paper version [of the robot's design]; that is, no field tests.”

Militants have intercepted live video feeds from predator drones in the past, using $26 worth of off the shelf equipment. And recently a virus was found in military systems near computers used in piloting drones.

With many of our systems, military and civilian, under constant attack by foreign entities (even our satellites!), one would have to assume that automated military systems will eventually be targeted by our adversaries too.

Though currently no instances have been recorded of automated systems being infected or attacked, if code could be injected into these systems that allowed enemies to remote control them or change friend from foe designation, we may truly be on the verge of a real cyber war.

Cross-posted from Cyber Arms

Possibly Related Articles:
Military Cyberwar Network Security Code Injection Cyber Warfare Robotics Drone
Post Rating I Like this!
Dan Dieterle I thought this was interesting!

"Darpa Looks to Protect Drones From Hack Attacks" - http://www.wired.com/dangerroom/2011/11/darpa-cybersecurity-drones/
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.