Aug 23rd 2017

Robots and Virtual Terrorism

by Daniel Wagner

 

Daniel Wagner is the founder and CEO of Country Risk Solutions and a widely published author on current affairs and risk management.

Daniel Wagner began his career at AIG in New York and subsequently spent five years as Guarantee Officer for the Asia Region at the World Bank Group's Multilateral Investment Guarantee Agency in Washington, D.C. After then serving as Regional Manager for Political Risks for Southeast Asia and Greater China for AIG in Singapore, Daniel moved to Manila, Philippines where he held several positions - including as Senior Guarantees and Syndications Specialist - for the Asian Development Bank's Office of Co-financing Operations. Prior to forming CRS he was Senior Vice President of Country Risk at GE Energy Financial Services. He also served as senior consultant for the African Development Bank on institutional investment.

Daniel Wagner is the author of seven books: The America-China Divide, China Vision, AI Supremacy, Virtual Terror, Global Risk Agility and Decision Making, Managing Country Risk, and Political Risk Insurance Guide. He has also published more than 700 articles on risk management and current affairs and is a regular contributor to the South China Morning Post, Sunday Guardian, and The National Interest, among many others. (For a full listing of his publications  and media interviews please see www.countryrisksolutions.com).

Daniel Wagner holds master's degrees in International Relations from the University of Chicago and in International Management from the Thunderbird School of Global Management in Phoenix. He received his bachelor's degree in Political Science from Richmond College in London.

Daniel Wagner can be reached at: daniel.wagner@countryrisksolutions.com.

Robots can store sensitive information, including encryption keys, user social media, e-mail accounts and vendor service credentials, and send that information to and from mobile applications, Internet services, and computer software. As a result, encryption is mandatory to avoid data compromises, yet most robot manufacturers use the same passwords for most or all of their products, leaving consumers vulnerable to hacking if they fail to change them. Robots also receive remote software updates, so proper encryption is necessary to ensure that these updates are trusted and have not been modified to include malicious software.

A 2017 study found nearly 50 cybersecurity vulnerabilities in robot ecosystem components, many of which were common in home, business, and industrial robots, as well as the control software used by other robots tested. Although the number of robots tested was not a large sample, the fact that dozens of vulnerabilities were uncovered, in such a broad spectrum of robots, is concerning. Most of the robots evaluated were using insecure forms of communications, with mobile and software applications connected to the Internet, Bluetooth, and Wi-Fi without properly securing the communication channel. Although some had weak encryption, most of the others sent data to vendor services or the cloud without any protection.

Most of the robots that have been tested to determine the nature of their security protocols did not require sufficient authorization to protect their functionality, including critical functions such as installation of applications in the robots themselves or updating of their operating system software. This enables cyberattackers to install software without permission and gain full control over them. Most of the robots tested were also either not using encryption at all or improperly using it, exposing sensitive data to potential attackers. Furthermore, many robot manufacturers have generally failed to ensure that either users are instructed to change passwords, or updates are routinely provided when changes in the product security protocols are made.

Certain robot features are common, intended to improve accessibility, usability, interconnection, and reusability (such as real-time remote control with mobile applications). Unfortunately, many of these features make robots more vulnerable from a cybersecurity perspective, with both critical- and high-risk cybersecurity issues present in many of the features. A hacked robot has many of the same vulnerabilities as computers, and can suffer the same consequences.

A hacked robot operating inside a home might spy on a family via the robot’s microphones and cameras. An attacker could also use a robot’s mobility to cause physical damage in or to the house. Compromised robots could even hurt family members and pets with sudden, unexpected movements, since hacked robots can bypass safety protections that limit their movements. Hacked robots could also start fires in a kitchen by tampering with electricity or potentially poison family members and pets by mixing toxic substances with food or drinks, or by utilizing sharp objects to cause harm.

While there are of course nefarious potential connotations to a robotic future, such capability also opens up fantastic possibilities in areas as broad as search and rescue operations, disaster relief, ambulatory services, and oil spill containment. They may, of course, also be used for more nefarious purposes. In 2014 some researchers at Harvard University created the largest robot swarm at that time using 1,024 tiny robots the size of a penny that could find one another and collaborate to assemble themselves into various shaped and designs, like a mechanical flash mob.

Some defense contractors have already developed drones that can fly into enemy territory, collect intelligence, drop bombs, and defend themselves against attack. In the Korean demilitarized zone, South Korea has deployed border control sniper robots that detect intruders with heat and motion sensors, and can automatically fire on targets up to one kilometer away with machine guns and grenade launchers. What if autonomous drones infected with malware decided for themselves to drop bombs or perform kamikaze missions in a stadium filled with people?

Lethal autonomous robots take many forms—they can walk, swim, drive, fly, or simply lie in wait. Our ability to outsource kill decisions to machines is fraught with a panoply of ethical, moral, legal, technical and security implications. As robots continue to proliferate, we are more likely to suffer the consequences of Moore’s law clashing with Murphy’s law. Inaccurate data and software glitches may combine with malware and hardware malfunctions to create an inevitable kill zone where it may be the least desired or expected. All drones and robots are hackable, and it is a question of time until virtual terrorists succeed in turning what would otherwise have been a wondrous technological future into one even more fraught with fear, uncertainty, and peril.

Daniel Wagner is the Founder of Country Risk Solutions(@countryriskmgmt), Managing Director of Risk Cooperative (@RiskCoop),and author of the new book “Virtual Terror”. He can be reached at:daniel.wagner@countryrisksolutions.com.



 


This article is brought to you by the author who owns the copyright to the text.

Should you want to support the author’s creative work you can use the PayPal “Donate” button below.

Your donation is a transaction between you and the author. The proceeds go directly to the author’s PayPal account in full less PayPal’s commission.

Facts & Arts neither receives information about you, nor of your donation, nor does Facts & Arts receive a commission.

Facts & Arts does not pay the author, nor takes paid by the author, for the posting of the author's material on Facts & Arts. Facts & Arts finances its operations by selling advertising space.

 

 

Browse articles by author

More Current Affairs

Dec 6th 2008

NEW YORK - In the not-so-distant future, students will be able to graduate from high school without ever touching a book. Twenty years ago, they could graduate from high school without ever using a computer.

Dec 5th 2008

NEW YORK - We are all Keynesians now. Even the right in the United States has joined the Keynesian camp with unbridled enthusiasm and on a scale that at one time would have been truly unimaginable.

Dec 4th 2008

BORDEAUX- Almost every day I run a gauntlet of beggars in this wealthy French town, mostly old men and women but sometimes rather prim middle-aged ladies.

Dec 3rd 2008

NEW DELHI - The fallout from the terror attacks in Mumbai last week has already shaken India.

Dec 3rd 2008

ISLAMABAD - Sitting next to a four-foot-tall water pipe, I asked the tribal leader in front of me: What does victory mean to you? He sputtered smoke, raised his bushy white eyebrows, and said, "Victory. How can you have victory here?"

Dec 1st 2008

We consume approximately one gram's worth of genes in every meal. This may not seem like very much, but each of our meals contains trillions of individual genes.

Dec 1st 2008

While Sydneysiders will venture that their harbour remains inimitable, that incomparably pagan place of beauty in the world (What of stunning beauties such as Stockholm? Or dashing, daring San Francisco Bay?), one of the primary reasons for its fame was due to a Dane.

Dec 1st 2008

In looking back at the now-completed presidential contest, it is striking to note the degree to which Arabs, Muslims, and Islam itself, were factored into the race.

Nov 28th 2008

MUMBAI - In most cities of South Asia, hidden beneath the grime and neglect of extreme poverty, there exists a little Somalia waiting to burst out and infect the body politic.

Nov 26th 2008

BERKELEY - The global financial crisis has breathed new life into hoary arguments about the euro's imminent demise.

Nov 25th 2008

A mounting chorus of voices -- including President-elect Obama's -- are linking any economic stimulus or any related bailout of Detroit to environmental and energy independence objectives.

Nov 24th 2008

CAMBRIDGE - The European Economic and Monetary Union (EMU) and the euro are about to celebrate their tenth anniversary.

Nov 24th 2008

The euro has been something of a political scapegoat despite its runaway success, says Joaquin Almunia.

Nov 24th 2008

Because expectations across the Middle East are so high and the need for change is so great, during the next two months, all eyes will be focused on the early decisions made by President-elect Barack Obama.

Nov 22nd 2008

In the first two weeks since the election, President-elect Barack Obama has broken with a tradition established over the past eight years through his controversial use of complete sentences, political observers say.

Nov 21st 2008

WASHINGTON, DC - The financial crisis that began in 2007 has been persistently marked by muddled thinking and haphazard policymaking. Now, the United States Treasury is headed for a mistake of historic and catastrophic proportions by refusing to bail out America's Big Three automakers.

Nov 19th 2008

Haven't we seen this before? As Chrysler, Ford Motors and General Motors beg both the Bush administration and the transitional team of President elect Barack Obama to relieve them of financial woes, the similarities with the late 1970s can't be ignored.

Nov 18th 2008

There is an old cliché which says that the victors write history.