20,408 research outputs found

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Get PDF
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Disappearing Legal Black Holes and Converging Domains: Changing Individual Rights Protection in National Security and Foreign Affairs

    Get PDF
    This Essay attempts to describe what is distinctive about the way the protection of individual rights in the areas of national security and foreign affairs has been occurring in recent decades. Historically, the right to protection under the U.S. Constitution and courts has been sharply limited by categorical distinctions based on geography, war, and, to some extent, citizenship. These categorical rules carved out domains where the courts and Constitution provided protections and those where they did not. The institutional design and operating rules of the national security state tracked these formal, categorical rules about the boundaries of protection. There have been many ā€œlegal black holesā€ historically, domains where legal protections did not exist for certain people. Foreign affairs and national security have historically been areas deļ¬ned by their legal black holes. In recent years, legal black holes are disappearing, and previously distinct domains are converging. The importance of U.S. citizenship to protection under the Constitution and courts is decreasing, formal barriers to legal protection and judicial review based on geography and war are dissolving, and the dissolution of these categorical boundaries is changing the design and operation of the national security state. National security and foreign affairs law is being domesticated and normalized, as rights protections available in ordinary, domestic, peacetime contexts are extended into what were previously legal black holes. The jurisprudence of categorization and boundary-marking is fading away. The core of this Essay identiļ¬es, names, and discusses these trends, seeking to give a vocabulary and conceptual and historical coherence to current discussions of individual rights protection in national security and foreign affairs contexts. Secondarily, this Essay suggests some factors that might be driving convergence and closing of legal black holes today. Because most of these potential causal drivers are still exerting their force on the shape of the law, this Essay concludes that the future of national security law will likely see more convergence and fewer black legal holes and then offers several speciļ¬c predictions
    • ā€¦
    corecore