Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric...

28
Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena is the fact that there are zero international laws or treaties on cyber warfare. This is a serious issue given that the strongest cyber weapons, attacks on infrastructure, disproportionally target the weak. These attacks on infrastructure could take out power to hospitals, elderly homes and could render the digital communication, transportation and businesses useless, leaving innocent civilians as the victims. For more see The Tallinn Manual. Improving the accuracy of current systems. This is where computing in warfare has gone the furthest. Drones, Tomahawk missiles and laser guidance systems have allowed for a more humane asymmetrical war. The flip side is that this gives the countries who can afford it an excuse to go to war for less egregious reasons. Autonomous Systems While the notion has serious implications for new types of ethical issues and war crimes there aren’t any proposed systems that would “pull the trigger” without the consent of a human. However there are a plethora of academic papers funded by DoD entities that contemplate how you could incorporate the laws of war into a software program but none suggest that it is either plausible or ethical to have a machine making lethal decisions. A Headline Issue: Drones •There is a call for President Obama to release internal memos that might indicate whether or not he believes he has the authority to strike US civilians, especially on US soil. It seems apparent that if we can locate a local terrorist within our borders then we should be able to capture him/her and commence with due process. This debate gives credit to the how far computing in weapons has come and how it’s efficiency is raising eyebrows. •There is another debate about using drones at all. It has died down in 2013. The long list of Taliban leaders that have been killed by drones and the convincing argument that it gives a much more level headed response from a pilot that can remain on scene for more hours both before and after the strike has led to drones being accepted as just another usable long-range weapons system.

Transcript of Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric...

Page 1: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Computing and Lethal Weapons in Warfare:

a 2013 Snapshot3 Main Categories of Computer-Centric Lethal Weapons

Cyber Warfare

The main problem in this arena is the fact that there are zero international laws or treaties on cyber warfare. This is a serious issue given that the strongest cyber weapons, attacks on infrastructure, disproportionally target the weak. These attacks on infrastructure could take out power to hospitals, elderly homes and could render the digital communication, transportation and businesses useless, leaving innocent civilians as the victims. For more see The Tallinn Manual.

Improving the accuracy of current systems.

This is where computing in warfare has gone the furthest. Drones, Tomahawk missiles and laser guidance systems have allowed for a more humane asymmetrical war. The flip side is that this gives the countries who can afford it an excuse to go to war for less egregious reasons.

Autonomous Systems

While the notion has serious implications for new types of ethical issues and war crimes there aren’t any proposed systems that would “pull the trigger” without the consent of a human. However there are a plethora of academic papers funded by DoD entities that contemplate how you could incorporate the laws of war into a software program but none suggest that it is either plausible or ethical to have a machine making lethal decisions.A Headline Issue: Drones

•There is a call for President Obama to release internal memos that might indicate whether or not he believes he has the authority to strike US civilians, especially on US soil. It seems apparent that if we can locate a local terrorist within our borders then we should be able to capture him/her and commence with due process. This debate gives credit to the how far computing in weapons has come and how it’s efficiency is raising eyebrows.

•There is another debate about using drones at all. It has died down in 2013. The long list of Taliban leaders that have been killed by drones and the convincing argument that it gives a much more level headed response from a pilot that can remain on scene for more hours both before and after the strike has led to drones being accepted as just another usable long-range weapons system.

Page 2: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Computing and Lethal Weapons in Warfare

State a moral case to a ploughman and a professor. The former will decide it as well, and often better than the latter, because he has not been led astray by artificial rules.

Thomas Jefferson 1787

Page 3: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Laws and Treaties in Place●The Geneva Convention, The Hague●UN Charter - Mostly Chapter 7●USA - LOAC Law of Armed Conflict

or Law of War○ DoDD 5100.77, DoD Law of War Program, requires each military department

to design a program that ensures LOAC observance, prevents LOAC violations, ensures prompt reporting of alleged LOAC violations, appropriately trains all forces in LOAC, and completes a legal review of new weapons.

Preface- Law and History

Page 4: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Jus In Bello • Conduct in Warfare or

International Humanitarian laws.•a Wikipedia summary:•Persons hors de combat (outside of combat), and those not taking part in hostilities, shall be

protected and treated humanely.

•It is forbidden to kill or injure an enemy who surrenders, or who is hors de combat.

•The wounded and the sick shall be cared for and protected by the party to the conflict which has them in its power. The emblem of the "Red Cross," or of the "Red Crescent," shall be required to be respected as the sign of protection.

•Captured combatants and civilians must be protected against acts of violence and reprisals. They shall have the right to correspond with their families and to receive relief.

•No-one shall be subjected to torture, corporal punishment, or cruel or degrading treatment.

•Parties to a conflict, and members of their armed forces, do not have an unlimited choice of methods and means of warfare.

•Parties to a conflict shall at all times distinguish between the civilian population and combatants. Attacks shall be directed solely against military objectives.

o Take away: The killing part was never meant to be fair. Everything else is.

Page 5: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Jus ad Bellum

•‘Just’ reasons for going to waro Can be summed up with one word

- “Defense”o One important point - History has

shown that defense often happens in the territory of the Aggressor.

Page 6: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

● Any arms race without reason is unethical.

● There are of course many reasons to develop lethal weapons.

● Some are better than others and the aspects of those reasons vary between the technology and the application.

Central Issue:

Page 7: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Three Main Categories of Technology in

Weaponry

1. Autonomous Systems Sentry Guns Robotics

TALON SWORDS MAARS

*In assecending order of ethical clarity

Page 8: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Three Main Topics cont’d

2. Infrastructure Attackso Weapons of Mass Disruptiono Unintended Lethality

Page 9: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

3. Accuracy of Lethal Weapons

Smart Bombs Drones Auto-Aiming Sniper Rifle Facial Recognition Landmines?

Page 10: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Asimov's Three Laws of Robotics:●A robot may not injure a human being or, through inaction,

allow a human being to come to harm.●A robot must obey the orders given to it by human beings,

except where such orders would conflict with the First Law.●A robot must protect its own existence as long as such

protection does not conflict with the First or Second Law.

Furthermore, increasing complexity may lead to emergent behaviors, i.e., behaviors not programmed but arising out of sheer complexity [e.g., Kurzweil, 1999, 2005]

But seriously...I read 2 and half academic papers paid for by DoD entities on AI on the battlefield and they

were just speculating on how the laws of war would be implemented. They weren’t anywhere close to proposing what systems should start being developed or a even close to addressing how they would be developed.

1.Autonomous Weapons

Page 11: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Back in Reality:

The current state of ethical autonomy is in its infancy or even less.

There is absolutely no way that even within the next 5 years a robot could possibly follow the rules of Jus in Bello (Laws during war):- Is an enemy surrendering?- Is an enemy adequately debilitated?- Am I using proportional force?- Is it an enemy disguised in a burka?

All weapons system currently have Soldiers both navigating/setting waypoints and pulling the trigger

Page 12: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

2.Mass Disruption/Cyber Warfare:

Jus ad Bellum and Jus in Bello Laws

- That’s all of ‘em.

Page 13: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Published in early 2013 by 20-member panel.

Commissioned by NATO’s Cooperative Cyber Defense Center of Excellence

Is the only unofficial “guide” for lawful actions by nations in the use of and response to cyber attacks.

Tallinn - Capital of Estonia which suffered a massive cyber attack that it says came from Russia. It Raised many questions.

●At 300 pages you could become a leading expert in international cyber warfare in a couple of days! It’s free to the public.

The Tallinn Manual

Page 14: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

● It is justifiable to go to war over cyber attacks as long as those attacks cause death or good deal of destruction

● Hackers can be combatant targets under these conditions.

● Civilians, even if they are on a shared network with the military, are off limits.

Tallinn Basics

Page 15: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

● Infrastructure“On the battlefield they would destroy control and command functions without killing soldiers – who might be persuaded to surrender. The weapons would thus also be in accord with the jus in bello demand of proportionality. The weapons would make possible the reduction of killing and wounding troops.” --Richard T. De George[Post-September 11: Computers, ethics and war]

On the other hand it would take out Hospitals, Elderly homes, and make useless the digital infrastructure that sustains life in a city. You would essentially be targeting the weak of the society you were at war with.

“Add to that the destruction of the communications systems, the transportation system, and all the private and business computers. The city would stop functioning except on the most primitive level, and hence the effect on innocent civilians would be devastating.” -Richard T. De George

Rough Ethical Arguments on Cyber Attacks

Page 16: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

It’s all about accuracy...

Rough Ethical Arguments on Cyber Attacks

Page 17: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

3. Accuracy of Weapons:The Good

Smart Bombs- "However, a happy by-product is that they can reduce the risk of collateral damage when actually used in war. A striking illustration of this was the extent to which the ordinary citizens in Baghdad frequently went about their business even as bombs were falling. They had quickly become accustomed to bombs hitting their intended military targets – so much so that when one went astray and landed in a residential area, they were incensed. "--Richard T. De George(again)

•jus in bello has always stated throughout history that the death of non-combatants should be avoided at all costs.

•Therefore you could argue that we have a moral and ethical obligation to develop these weapons.

Page 18: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Accuracy:The Gray

● Are aggressors more likely to attack us knowing they can hide in the civilian population?○ I would argue that if they can’t hide like that then

their cause isn’t just enough to start a war anyways. ○ However, does it put civilians at risk as shields. i.e.

Afghanistan• Are we more likely to attack because we have this

weaponry?o Jus ad Bellum states that war is always a last resort. o However this a concern - more later.

• Given that the accuracy of these weapons makes them more humane and closer to jus in bello ideals shouldn’t we be making this open source technology? If our enemies were going to drop bombs on us wouldn’t we want them to use these bombs?

Page 19: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Accuracy, The Dark Side: Assassination,

History• Nov. 20, 1975: Senate Select Committee to study Governmental Operations with Respect to Intelligence Agencies (Church Committee) reported numerous CIA assassination attempts: Fidel Castro (Cuba) , Patrice Lumumba (Congo), Rafael Trujillo (Dominican Republic), and 2 others occurred during the Presidencies of Dwight D. Eisenhower, John F. Kennedy, Lyndon B. Johnson, and Richard M. Nixon. o Every president up after this report until Bush Sr.

Signed an order stating no one in the Gov shall not take part in assassination plots.

• January 23, 1995: Pres. Bill Clinton signed Executive Order 12947 that approved creation of list of specific terrorists.

• 1998: Bill Clinton creates secret list of Bin Laden and associates that he targets for assassination. Citing the Constitution Article 2 Section 2.

-Mostly Quoting from “Targeted Killings”: Timeline of U.S. Policy Concerning Covert Operations Involving Assassination. by Prof. Gordon L. Bowen

Page 20: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Assassination Law

Article 23b of the Hague Regulations, adopted by the U.S. and other nations in 1907, prohibits “assassination, proscription, or outlawry of an enemy, or putting a price upon an enemy’s head, as well as offering a reward for an enemy 'dead or alive'."

Page 21: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Which brings us to:

Drones

I have to say that I am biased here. From my experience the military offers many avenues for reporting misconduct, especially when an artillery mission is involved. I couldn’t imagine a large unit, like the one in charge of drone strikes, not having more dissenters if they were really killing as many civilians as some reporters claim.

I've heard the one soldier who left the program but he didn’t seem credible to me.

Page 22: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Drones

● Long War Journal:○ 7 to 1 Legitimate combatants in

Afghanistan.○ Yemen: 1 civilian casualty to 5

● UN: 84% of Civilian Casualties caused by insurgency

● Admiral Dennis Blair Director of National Intelligence: January 29, 2009 – May 28, 2010

Page 23: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Some of the Drone debate●“The reduced costs and reduced transparency associated with unmanned systems inadvertently lower the threshold for resorting to war, and could facilitate illegitimate operations. These technologies thus threaten to undermine compliance with the Traditional just war requirements that war only be declared as a last resort and by the legitimate political authority. “

●Show of cowardice and removing the possibility of connecting with the local people.

●Enhance Contractor lethal force capabilities?

●Even if their target acquisition capabilities reach 100%. People never seem to believe it.

General Norman Swartz 19th Chief of Staff of the Air Force 2008-2012

Page 24: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Conclusions

Page 25: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Sourceshttp://download.springer.com/static/pdf/110/art%253A10.1023%252FB%253AETIN.0000017734.23180.fa.pdf?auth66=1384405679_6e11744ecbccdb1a08b0e7778bcf746b&ext=.pdfaccessed Nov 9 2013Post-September 11: Computers, ethics and war Richard T. De George

-http://www.intelligencesquared.comaccessed Oct 28 2013Is the U.S. Drone Program Fatally Flawed?Oxford Style Debate

-http://www.globalresearch.ca/targeted-killings-timeline-of-u-s-policy-concerning-covert-operations-involving-assassination/5326095

“Targeted Killings”: Timeline of U.S. Policy Concerning Covert Operations Involving Assassinationby

Prof. Gordon L. Bowen

http://www.nationaldefensemagazine.org/archive/2008/October/Pages/Drone%20Can%20Spot%20a%20Face%20in%20a%20Crowd.aspx

Drone Can Spot a Face in a Crowd October 2008 By Robert H. Williams accessed Nov, 13 2013

-http://www.longwarjournal.org

Accessed Nov 8-13, 2013

Page 26: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

Sources

http://www.nytimes.com/2003/02/20/technology/taking-aim-at-an-enemy-s-chips.html?pagewanted=all&src=pm

accessed Nov 13 2013Taking Aim at an Enemy's ChipsBy SETH SCHIESELPublished: February 20, 2003

http://usmilitary.about.com/cs/wars/a/loac.htmaccessed Nov 10Law of Armed Conflict (LOAC)The Rules of Warby Rod Powers

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?partnum=6249424&searchProductType=IEEE%20Conferences

accessed Nov 13, 2013Governing lethal behavior: Embedding ethics in a hybrid deliberative/reactive robot architecture part

I: Motivation and philosophyArkin, R.C.

http://www.nbcnews.com/id/42861619/#.UoRF1pTXQcoaccessed Nov 13, 2013Was it Right to Kill Bin Laden?Arthur Caplan, Ph.D.

Page 27: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

http://ethics.calpoly.edu/ONR_report.pdfaccessed Nov, 13 2013Autonomous Military Robotics: Risk, Ethics, and Design

Patrick Lin, Ph.D. George Bekey, Ph.D. Keith Abney, M.A.

http://www.rferl.org/content/new-manual-rules-cyberwarfare/24944686.htmlaccessed Nov 13, 2013New Manual Explains Laws Of CyberwarfareBy Heather MaherApril 01, 2013

https://www.ccdcoe.org/249.htmlaccessed Nov 13, 2013The Tallinn Manual

http://www.usna.edu/Ethics/publications/Mac10exec.pdfAccessed Nov 13, 2013New Warriors and New Weapons: The Ethical Ramifications of Emerging Military Technologies

UNIQUE ETHICAL PROBLEMS IN INFORMATION TECHNOLOGY

http://www.psmag.com/politics/obama-promised-divulge-drones-6-months-ago-heres-still-dont-know-70454/Obama Promised to Divulge More on Drones 6 Months Ago: Here's What We Still Don't KnowNovember 24, 2013 • By Cora Currier

Sources

Page 28: Computing and Lethal Weapons in Warfare: a 2013 Snapshot 3 Main Categories of Computer-Centric Lethal Weapons Cyber Warfare The main problem in this arena.

clipboard

Another debate which has died down just recently is over the use of drones as a lethal weapon at all. Objectors claim that the killing is done with less of an emotional toll and that it turns missions into sport. They also claim that the most extreme of estimates of civilian casualties are true. As a veteran I will post my own thoughts. I know that, especially in the Air Force, the proper channels are set up for reporting misconduct. A 20 civilian deaths to 1 military target ratio that the objectors claim is misconduct. Missions of this type are not just a couple of guys sitting in a dark room. It is a large operation and the fact that they are are not experiencing the visceral response that a pilot with only an hour or two fuel has is a very good thing.