Cyber and Unmanned Systems – untapped potential

Cyber and Unmanned Systems – untapped potential

This post is also available in: heעברית (Hebrew)

19023024_sPeople love using buzzwords, especially combining popular buzzwords from two different fields and disciplines. The connection of unmanned capabilities and Cyber sounds very sexy, but not very clear – merely because Cyber is not a well-defined term and scope.

When using an old car, we usually don’t insure the vehicle itself but only “third party insurance” because the damage that may happen to a third party may exceed it’s value.

When we deal with unmanned capabilities we need to consider damage of different types and magnitude that may happen as a result of a hostile “take-over”:

  • The damage and cost of the (air/naval/land) unmanned devices

  • Collateral damage that a stray device could cause

  • Direct or deliberate damage that the unmanned device could cause to the “good guys”

  • Indirect damage that hackers could cause by penetrating into the secure network which the unmanned device is part of – exposure to confidential information, dis-information and more.

Unmanned devices have a few “entry” points for hostile takeovers, the data link between the device and it’s control station – usually wireless, and the control center that has many connections and interfaces to the external world: C4ISTAR systems, internet and intranet IP networks, serial and other interfaces.

www.i-hls.com

A solution that provides a comprehensive protection for militaries and agencies operating unmanned systems should be a holistic solution, which is certified to a common standard that is applicable to all devices supplied by different vendors and defense contractors. This standard should comply with the specific organization’s information security policy and existing legacy systems.

I believe such a standard will not come from the vendors but should be imposed on them by the major procurement “super-power” – the military. Israel is a leading force worldwide both in the field of cyber and information assurance as well as in the unmanned systems fields.

A defense contractor that will provide its unmanned systems with such a “cyber protected” solution will gain a big competitive advantage when approaching potential international unmanned system’s customers – especially if the IDF uses its system (“Combat proven”). A company providing this kind of a “cyber suit” will be married to the army for a long term relationship!

The major synergy shall occur when a company with resources understands the potential concealed in this fusion of expertise – I personally know a few individuals with the technical capabilities just waiting for the resources / gun shot – and the race will begin.

By Avi Yariv

Avi Yariv
Avi Yariv