This document analyzes cybersecurity threats against teleoperated surgical robots like the Raven II system. The researchers identify several possible attacks, including intention manipulation, intention modification, and hijacking attacks. They experimentally evaluate vulnerabilities and demonstrate the ability to maliciously control robot functions or override surgeon commands. The researchers also find attacks can abuse the emergency stop mechanism. They propose initial steps to increase security but note more work is needed given the risks of disrupted surgical procedures if systems are compromised.