4,854 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    The Fault Is Not in Our Stars: Avoiding an Arms Race in Outer Space

    Get PDF
    The world is on the precipice of a new arms race in outer space, as China, Russia, the United States, and others undertake dramatic new initiatives in anti-satellite weaponry. These accelerated competitive efforts at space control are highly destabilizing because developed societies have come to depend so heavily upon satellite services to support the entire civilian economy and the modern military apparatus; any significant threat or disruption in the availability of space assets would be massively, and possibly permanently, disruptive. International law regarding outer space developed with remarkable rapidity in the early years of the Space Age, but the process of formulating additional treaties and norms for space has broken down over the past several decades; no additional legal instruments have emerged that could cope with today’s rising threats. This Article therefore proposes three initiatives. Although none of them can suffice to solve the emerging problems, they could, perhaps, provide additional diplomacy, reinvigorating the prospects for rapprochement in space. Importantly, each of these three ideas has deep roots in other sectors of arms control, where they have served both to restore a measure of stability and to catalyze even more ambitious agreements in the longer term. The first proposal is for a declaratory regime of “no first use” of specified space weapons; this would do little to directly alter states’ capabilities for space warfare, but could serve as a “confidence-building measure,” to temper their most provocative rhetoric and practices. The second concept is a “limited test ban,” to interdict the most dangerous debris-creating developmental tests of new space weapons. Third is a suggestion for shared “space situational awareness,” which would create an international apparatus enabling all participants to enjoy the benefits of greater transparency, reducing the possibilities for secret malign or negligent behavior. In each instance, the Article describes the proposal and its variations, assesses its possible contributions to space security, and displays the key precedents from other arms-control successes. The Article concludes by calling for additional, further-reaching space diplomacy, in the hope that these relatively modest initial measures could provoke more robust subsequent negotiations

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    An Assessment of North Korean Threats and Vulnerabilities in Cyberspace

    Get PDF
    This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by denying and disrupting the use of cyberspace by covert cyber units outside of North Korea, as well as by enabling and ensuring the less monitored and less controlled use of cyberspace by civilians inside of North Korea

    Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk : Volume II East Asian Perspectives.

    Get PDF
    Artificial intelligence (AI) is not only undergoing a renaissance in its technical development, but is also starting to shape deterrence relations among nucleararmed states. This is already evident in East Asia, where asymmetries of power and capability have long driven nuclear posture and weapon acquisition. Continuing this trend, integration of AI into military platforms has the potential to offer weaker nuclear-armed states the opportunity to reset imbalances in capabilities, while at the same time exacerbating concerns that stronger states may use AI to further solidify their dominance and to engage in more provocative actions. This paradox of perceptions, as it is playing out in East Asia, is fuelled by a series of national biases and assumptions that permeate decision-making. They are also likely to serve as the basis for AI algorithms that drive future conventional and nuclear platforms

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    Sandworms and Computer Worms: An Assessment of American Critical Infrastructure Cyber Vulnerabilities and the Russian Federation\u27s Growing Offensive Capabilities

    Get PDF
    Bottom Line Up Front: It is highly likely that the Russian GRU has the capability, resources, and intent to execute cyberweapon attacks against American critical infrastructure in times of heightened tensions, either as a warning or a first strike. I also assess that much of current American critical infrastructure is not secure enough to withstand a coordinated assault by the GRU, and very likely has numerous severe vulnerabilities known by the GRU

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Get PDF
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems

    “On target”: precision and balance in the contemporary law of targeting

    Get PDF
    The law of targeting lies at the heart of international humanitarian law (IHL). As such it is the fulcrum around which discussion of combat operations revolves. The efficacy of this body of law depends on maintenance of the delicate balance between military necessity and humanitarian concerns. Mischaracterization or misapplication of IHL norms risks imbalance, thereby jeopardizing the innocent and potentially eroding State support for IHL’s application. Regrettably, while some of the current debate and commentary surrounding, inter alia, drone operations, autonomous weapons systems, cyber operations, and the current conflicts in Afghanistan, Syria, Yemen, Somalia, and Ukraine, to name just a few, is highly sophisticated, much of it has been characterized by imprecise, skewed, or wrong assertions regarding the law of targeting. It is therefore a propitious moment to revisit the structure and content of targeting law. After briefly placing the law of targeting in the broader context of IHL, this article examines the five constituent elements of a targeting operation: (1) target; (2) weapon; (3) execution of the attack; (4) collateral damage and incidental injury; and (5) location. The legality of an engagement depends on full compliance with the rules falling into each category
    • …
    corecore