How Drones are Like Viruses (and Vice-Versa)

Cybersecurity expert Peter W. Singer discusses the similarities between drones and computer viruses. Singer is the author of Cybersecurity and Cyberwar: What Everyone Needs to Know.

Peter W. Singer: There’s been an enormous amount of changing forces on warfare in the twenty-first century. And they range from new actors in war like private contractors, the black waters of the world to the growth of warlord and child soldier groups to technologic shifts. The introduction of robotics to cyber. And one of the interesting things that ties these together is how not only the who of war is being expanded but also the where and the when. So one of the things that links, for example, drones and robotics with cyber weapons is that you’re seeing a shift in both the geographic location of the human role. Humans are still involved. We’re not in the world of the Terminator. Humans are still involved but there’s been a geographic shift where the operation can be happening in Pakistan but the person flying the plane might be back in Nevada 7,000 miles away.

Or on the cyber side where the software might be hitting Iranian nuclear research centrifuges like what Stuxnet did but the people who designed it and decided to send it are, again, thousands of miles away. And in that case it was a combined U.S./Israeli operation. One of the next steps in this both with the physical side of robotics and the software side of cyber is a shift in that human role — not just geographically but chronologically where the humans are still making decisions but they’re sending the weapon out in the world to then make its own decisions as it plays out there. In robotics we think about this as autonomy. With Stuxnet it was a weapon. It was a weapon like anything else in history, you know, a stone, a drone — it caused physical damage.

But it was sent out in the world on a mission in a way no previous weapon has done. Go out, find this one target and cause harm to that target and nothing else. And so it plays out over a matter of, you know, Stuxnet plays out over a series of time. It also is interesting because it’s the first weapon that can be both here, there, everywhere and nowhere. Unlike a stone. Unlike a drone. It’s not a thing and so that software is hitting the target, those Iranian nuclear research facilities, but it also pops up in 25,000 other computers around the world. That’s actually how we discover it, how we know about it. The final thing that makes this interesting is it introduces a difficult ethical wrinkle.

On one hand we can say this may have been the first ethical weapons ever developed. Again whether we’re talking about the robots or Stuxnet, they can be programmed to do things that we would describe as potentially ethical. So Stuxnet could only cause harm to its intended target. Yet popped up in 25,000 computers around the world but it could only harm the ones with this particular setup, this particular geographic location of doing nuclear research. In fact, even if you had nuclear centrifuges in your basement, it still wouldn’t harm them. It could only hit those Iranian ones. Wow, that’s great but as the person who discovered it so to speak put it, “It’s like opening Pandora’s box.” And not everyone is going to program it that way with ethics in mind.

Directed/Produced by Jonathan Fowler and Dillon Fitton
Source: Big Think

More Posts:

Betavoltaic Power Source Prolongs The Life Of Microelectronics By 20 Years
Google Wallet To Extend Its Features
Add Gestures To Your Applications With 3Gear SDK Systems (+VIDEO)
RASSOR Will Get Water, Ice And Fuel From The Soil Of The Moon
CSR Paper-Thin Bluetooth Keyboard - Engadget at IFA 2013
Meet OutRunner: The World's First Remotely Controlled Running Robot
Futurist Thomas Frey on "162 Future Jobs: Preparing for Jobs that Don’t Yet Exist"
RoboBee: From Aerial to Aquatic
Nike Adds Self-Lacing Shoes to Sneaker Arms Race
Dubai Launches World's First 3D Printed Office