Aug 23rd 2017

Robots and Virtual Terrorism

by Daniel Wagner

 

Daniel Wagner is the founder and CEO of Country Risk Solutions and a widely published author on current affairs and risk management.

Daniel Wagner began his career at AIG in New York and subsequently spent five years as Guarantee Officer for the Asia Region at the World Bank Group's Multilateral Investment Guarantee Agency in Washington, D.C. After then serving as Regional Manager for Political Risks for Southeast Asia and Greater China for AIG in Singapore, Daniel moved to Manila, Philippines where he held several positions - including as Senior Guarantees and Syndications Specialist - for the Asian Development Bank's Office of Co-financing Operations. Prior to forming CRS he was Senior Vice President of Country Risk at GE Energy Financial Services. He also served as senior consultant for the African Development Bank on institutional investment.

Daniel Wagner is the author of seven books: The America-China Divide, China Vision, AI Supremacy, Virtual Terror, Global Risk Agility and Decision Making, Managing Country Risk, and Political Risk Insurance Guide. He has also published more than 700 articles on risk management and current affairs and is a regular contributor to the South China Morning Post, Sunday Guardian, and The National Interest, among many others. (For a full listing of his publications  and media interviews please see www.countryrisksolutions.com).

Daniel Wagner holds master's degrees in International Relations from the University of Chicago and in International Management from the Thunderbird School of Global Management in Phoenix. He received his bachelor's degree in Political Science from Richmond College in London.

Daniel Wagner can be reached at: daniel.wagner@countryrisksolutions.com.

Robots can store sensitive information, including encryption keys, user social media, e-mail accounts and vendor service credentials, and send that information to and from mobile applications, Internet services, and computer software. As a result, encryption is mandatory to avoid data compromises, yet most robot manufacturers use the same passwords for most or all of their products, leaving consumers vulnerable to hacking if they fail to change them. Robots also receive remote software updates, so proper encryption is necessary to ensure that these updates are trusted and have not been modified to include malicious software.

A 2017 study found nearly 50 cybersecurity vulnerabilities in robot ecosystem components, many of which were common in home, business, and industrial robots, as well as the control software used by other robots tested. Although the number of robots tested was not a large sample, the fact that dozens of vulnerabilities were uncovered, in such a broad spectrum of robots, is concerning. Most of the robots evaluated were using insecure forms of communications, with mobile and software applications connected to the Internet, Bluetooth, and Wi-Fi without properly securing the communication channel. Although some had weak encryption, most of the others sent data to vendor services or the cloud without any protection.

Most of the robots that have been tested to determine the nature of their security protocols did not require sufficient authorization to protect their functionality, including critical functions such as installation of applications in the robots themselves or updating of their operating system software. This enables cyberattackers to install software without permission and gain full control over them. Most of the robots tested were also either not using encryption at all or improperly using it, exposing sensitive data to potential attackers. Furthermore, many robot manufacturers have generally failed to ensure that either users are instructed to change passwords, or updates are routinely provided when changes in the product security protocols are made.

Certain robot features are common, intended to improve accessibility, usability, interconnection, and reusability (such as real-time remote control with mobile applications). Unfortunately, many of these features make robots more vulnerable from a cybersecurity perspective, with both critical- and high-risk cybersecurity issues present in many of the features. A hacked robot has many of the same vulnerabilities as computers, and can suffer the same consequences.

A hacked robot operating inside a home might spy on a family via the robot’s microphones and cameras. An attacker could also use a robot’s mobility to cause physical damage in or to the house. Compromised robots could even hurt family members and pets with sudden, unexpected movements, since hacked robots can bypass safety protections that limit their movements. Hacked robots could also start fires in a kitchen by tampering with electricity or potentially poison family members and pets by mixing toxic substances with food or drinks, or by utilizing sharp objects to cause harm.

While there are of course nefarious potential connotations to a robotic future, such capability also opens up fantastic possibilities in areas as broad as search and rescue operations, disaster relief, ambulatory services, and oil spill containment. They may, of course, also be used for more nefarious purposes. In 2014 some researchers at Harvard University created the largest robot swarm at that time using 1,024 tiny robots the size of a penny that could find one another and collaborate to assemble themselves into various shaped and designs, like a mechanical flash mob.

Some defense contractors have already developed drones that can fly into enemy territory, collect intelligence, drop bombs, and defend themselves against attack. In the Korean demilitarized zone, South Korea has deployed border control sniper robots that detect intruders with heat and motion sensors, and can automatically fire on targets up to one kilometer away with machine guns and grenade launchers. What if autonomous drones infected with malware decided for themselves to drop bombs or perform kamikaze missions in a stadium filled with people?

Lethal autonomous robots take many forms—they can walk, swim, drive, fly, or simply lie in wait. Our ability to outsource kill decisions to machines is fraught with a panoply of ethical, moral, legal, technical and security implications. As robots continue to proliferate, we are more likely to suffer the consequences of Moore’s law clashing with Murphy’s law. Inaccurate data and software glitches may combine with malware and hardware malfunctions to create an inevitable kill zone where it may be the least desired or expected. All drones and robots are hackable, and it is a question of time until virtual terrorists succeed in turning what would otherwise have been a wondrous technological future into one even more fraught with fear, uncertainty, and peril.

Daniel Wagner is the Founder of Country Risk Solutions(@countryriskmgmt), Managing Director of Risk Cooperative (@RiskCoop),and author of the new book “Virtual Terror”. He can be reached at:daniel.wagner@countryrisksolutions.com.



 


This article is brought to you by the author who owns the copyright to the text.

Should you want to support the author’s creative work you can use the PayPal “Donate” button below.

Your donation is a transaction between you and the author. The proceeds go directly to the author’s PayPal account in full less PayPal’s commission.

Facts & Arts neither receives information about you, nor of your donation, nor does Facts & Arts receive a commission.

Facts & Arts does not pay the author, nor takes paid by the author, for the posting of the author's material on Facts & Arts. Facts & Arts finances its operations by selling advertising space.

 

 

Browse articles by author

More Current Affairs

Feb 1st 2009

BANGKOK - A friend recently asked a seemingly naïve question: "What is money? How do I know I can trust that it is worth what it says it is worth?" We learn in introductory economics that money is a medium of exchange. But why do we accept that?

Jan 30th 2009

Watching President Obama's interview on Al-Arabiya this week was striking in multiple respects, not the least of which, of course, was that an American president actually did an interview with an Arab network with a largely Muslim viewing audience -- and did it in the f

Jan 30th 2009

The recent appointment of George Mitchell as special envoy to the Middle East is
no doubt a positive sign of President Obama's commitment to the region,
signalling that there will be immediate and direct American involvement in the

Jan 30th 2009

According to James Wolcott in last month's London Review of Books, Norman Mailer exerted telepathic powers over the future, while the Beats hot-wired 'the American psyche (at the risk of frying their own circuits).

Jan 29th 2009

Hisman Melhem, Washington Bureau Chief for Al Arabiya, was trying to chase down an interview with former U.S. Senator and new presidential envoy to the Middle East George Mitchell.

Jan 28th 2009

PARIS - Hollywood history is often nonsensical, but filmmakers usually have the good sense not to whitewash killers and sadists. Steven Soderbergh's new film about Che Guevara, however, does that, and more.

Jan 27th 2009

In appointing former Senator George Mitchell as Special Envoy for the Middle East, President Barack Obama made clear his determination to pursue Arab-Israeli peace. Mitchell, an Arab American, was former Majority Leader of the U.S.

Jan 27th 2009

For decades the prices of gold and oil have closely paralleled one another. In 2003 an ounce of gold would have bought you 12 barrels of oil. Today that ounce will buy you about 20 barrels, even though the nominal price of oil is up about 50% from what it was in 2003.

Jan 23rd 2009

French President Nicolas Sarkozy is not a happy man. All evidence indicates that his ascendancy as the world's leading peacemaker and problem-solver is over.

Jan 23rd 2009

Of course, I agree with my passionate friend, Bernard-Henri Levy, who

Jan 23rd 2009

LONDON - I spent the New Year in Sydney, watching the fireworks above the iconic bridge welcome in 2009. The explosions over Gaza that night were not intended to entertain, but rather to break Hamas and discredit it in the eyes of Palestinians.

Jan 22nd 2009

Now that Israel has unilaterally declared an end to the hostilities it appears
that Hamas, which has been badly crippled, will eventually sign on to the
ceasefire. Having achieved its war objectives, Israel must demonstrate that the

Jan 21st 2009

NEW YORK - Today's world hunger crisis is unprecedentedly severe and requires urgent measures. Nearly one billion people are trapped in chronic hunger - perhaps 100 million more than two years ago.

Jan 20th 2009

LONDON - Testifying recently before a United States congressional committee, former Federal Reserve Chairman Alan Greenspan said that the recent financial meltdown had shattered his "intellectual structure." I am keen to understand what he meant.

Jan 18th 2009

COPENHAGEN- As Barack Obama prepares for his inauguration, it is worth contemplating a passage from his book Dreams from My Father. It reveals a lot about the way we view the world's problems.

Jan 18th 2009

It has been 94 years since the right leg of the great actress Sarah Bernhardt was sawed off by a Bordeaux surgeon. Still preserved in formaldehyde, it remains an object of great - if somewhat morbid - curiosity despite the passage of time.

Jan 18th 2009

With Guantánamo Bay losing its patriotic luster and purpose, US authorities are willing to offload some of the carceral baggage to recipient states. In truth, they have been in the business of doing so for years.

Jan 18th 2009

MELBOURNE - Louise Brown, the first person to be conceived outside a human body, turned 30 last year. The birth of a "test-tube baby," as the headlines described in vitro fertilization was highly controversial at the time.