Edition: English | 中文簡體 | 中文繁體 Монгол
Homepage > Exclusive

Remote Weapons Come of Age

Editor: Qian Ding 丨CCTV.com

09-12-2018 17:13 BJT

By Mathew Maavak, a doctoral candidate in risk foresight at Universiti Teknologi Malaysia

During a military-related event on Aug 4, Venezuelan President Nicolás Maduro came close to being assassinated by a pair of drones. While he escaped unscathed, the attack managed to wound seven soldiers. Various media outlets noted that this was the first known drone assassination attempt on a sitting president. This development was however long in the offing.

The type of drone used in the Venezuelan attack was reportedly a DJI M600 model that can be ordered online for US$5,000. Each drone allegedly carried 1 kg of C-4 plastic explosives, which itself can be confected from online DIY (Do it yourself) tutorials – if one knew where and how to look for them. Imagine what would happen if a few C-4 laden drones crashed into an oil tanker truck at a congested traffic stop or an oil refinery itself? Or even a crowded children's playground? A month since the assassination attempt on Maduro, terrorists in Syria's Idlib province have begun using drones against Russian military bases in the region.

The incidences were preceded by an alleged drone attack on Abu Dhabi's international airport in late July by Yemen's Houthi rebels.  According to rebel sources, the domestically-built Sammad-3 drones were launched and guided through 1,500km of mostly Saudi and UAE (United Arab Emirates) airspace before reaching the airport. This incredulous feat continues to raise many questions. Do Houthi rebels really possess such technology and navigation support systems to execute this feat? It is also within the realm of possibility for a few rebels to slip quietly across the porous Saudi-Yemeni border and assemble weaponized drones from smuggled kits nearer to the airport.

This ominous form of remote-terrorism is compounded by the relative anonymity enjoyed by perpetrators. While the study of remote killings had, until now, focused on cyberattacks on hospitals or nuclear power plants, the use of drones for assassinations have finally crossed the boundaries of fictional bestsellers and movies into an emerging globalized threat. 

Drones can be used for any variety of nefarious schemes. Some drones can see through walls and generate high-resolution 3D images of targeted structures or record passwords clicked on a keyboard in a secure high-rise office. It can be used to transport contraband, particularly narcotics, munitions and small arms across the US-Mexico border or be adjusted to make a special delivery all the way to Trump Tower. US President Donald J. Trump should perhaps scale up the projected height of his fabled wall.

Net-centric devices, including drones, will emerge as a major social disruptor in the coming years unless new regulations are drawn up to add extra layers of security to the information grid. Otherwise, hackers can find a way to crash planes into skyscrapers. The possibilities are endless. Here is where the Internet of Things (IoT), Industry 4.0, cryptology and psychopathology meet at the confluence of a shocking complex reality.  

From now on, we may see increasing calls to restrict the sale of drones that can operate beyond a maximum 200 to 500 metre radius. However, there are many methods to circumvent such restrictions. The advent of 3D-printed drones, just like 3D-printed guns, will pose new challenges to law enforcement agencies worldwide.

Eventually, the ongoing drone revolution may lead to renewed calls for greater Internet surveillance, as well as a raft of drone-specific laws that will include mandatory licensing regimes. Drone enthusiasts may be required to attend drone piloting schools as a prelude to obtaining a license. Similar to vehicular licenses, drone permits can be revoked if users indulge in risky or anti-social activities.

But how does one prevent the transmission of a variety 3D-printable drone designs through cryptographic channels? If secure blockchain transmissions are good enough for Bitcoin, they will do equally well in an underground, cyber-facilitated illegal weapons industry. 

The drone security solutions market is projected to be worth up to $2 billion by 2024. Several companies are already developing technologies that can detect and commandeer unauthorized drones in private or restricted airspace through radio frequency jamming and denial-of-service attacks.

Nonetheless, a combination of swarm intelligence and drone-mounted electromagnetic pulse devices could “jam the jammers” and neutralize anti-drone solutions. Technologically-savvy subversives will be a step ahead in the future net-centric battle space. Countermeasures developed will be protracted, expensive and based on hindsight. In the meantime, techno-subversives will work on new ways to breach defences that are still in the theoretical stages.

Security gurus therefore must undertake regular risk foresight to think ahead and out-think the perpetrators of future forms of net-centric subversion. This is the tricky part. The prevalent global talent identification regime is incapable of spotting those endowed with anticipatory or “metic intelligence” in this area. The open source domain – the fertile data mining ground for OSINT (Open source intelligence) analysts – is disappointing with its mounting e-waste of suspect or toxic information. 

Google search, for instance, is no longer as effective and accurate as its previous iterations as information integrity is increasingly sacrificed at the altar of fake news and political correctness – all for the sake of short-term political capital.

Ironically, the very "data smog" that facilitates political chicanery may turn out to be the ideal smokescreen for hi-tech subversive activities. This will have future implications for democracy – nominal or otherwise – as fake news societies would be at the forefront of technology-mediated discontent.


(The opinions expressed here do not necessarily reflect the opinions of Panview or CCTV.com. )

Panview offers a new window of understanding the world as well as China through the views, opinions, and analysis of experts. We also welcome outside submissions, so feel free to send in your own editorials to "globalopinion@vip.cntv.cn" for consideration.

Follow us on

  • Please scan the QR Code to follow us on Instagram

  • Please scan the QR Code to follow us on Wechat