2,981 research outputs found

    Predator empire: the geopolitics of U.S. drone warfare

    Get PDF
    This paper critically assesses the CIA’s drone program and proposes that the use of unmanned aerial vehicles is driving an increasingly paramilitarized U.S. national security strategy. The paper suggests that large-scale ground wars are being eclipsed by fleets of weaponized drones capable of targeted killings across the planet. Evidence for this shift is found in key security documents that mobilize an amorphous war against vaguely defined al-Qa’ida “affiliates”. This is further legitimized by the White House’s presentation of drone warfare as a bureaucratic task managed by a “disposition matrix”. Such abstract narratives are challenged through the voices of people living in the tribal areas of Pakistan. What I call the Predator Empire names the biopolitical power that catalogues and eliminates threatening “patterns of life”. This permanent war is enabled by a topological spatial power that folds the environments of the “affiliate” into the surveillance machinery of the Homeland

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Artificial intelligence in drones and robots for war purposes: a biolegal problem

    Get PDF
    The ever-increasing use of drones as war weapons is not a concern that is simply left to the news; it is a problem that involves the entire humanity, especially as an aspect that needs to be studied rigorously from biolaw. Among the nuances that this issue entails, the use of artificial intelligence is perhaps the one that, nowadays, receives the most attention, due to the idea of providing a significant level of autonomy in the selection of targets, and the same moving ability that they can reach. to have. This article aims to contribute to this debate, by reviewing artificial intelligence from a bioethical approach, in relation to the persistence of the responsibility that a human being has as a drone operator in a war context

    Disruptive Technologies with Applications in Airline & Marine and Defense Industries

    Get PDF
    Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they come to fruition may do more harm than good; Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs; Challenge the ammunition industry by grassroots use of recycled metals; Changing landscape of UAS regulations and drone privacy; and finally, Detailing Bioterrorism Risks, Biodefense, Biological Threat Agents, and the need for advanced sensors to detect these attacks.https://newprairiepress.org/ebooks/1038/thumbnail.jp

    America’s Imperfect War: The Ethics, Law, and Strategy of Drone Warfare

    Get PDF
    This study explores the ethics, law, and strategy of targeted killings by drones in the War on Terror. It starts with an exploration of just war theory, its historical development and criteria, to create a foundational framework by which to analyze the ethics of drones as a tactic. Then it defines terrorism and insurgency, establishing how sub-state actors operate, and the strategies states will use to neutralize them as threats. This shows that the War on Terror is actually an armed conflict because terrorism and insurgency are forms of warfare under the law and in warfare theory. After looking at terrorism a broad concept, a history of the War on Terror, its operational context, and the specific nature of al-Qaeda and its affiliates are explained to give context to the ethical debate. Because of the actions of al-Qaeda and its affiliates, the U.S. is at war with these organizations and is allowed to use kinetic action against them. The study then approaches the history, law, geopolitics, and ethics of drone warfare to show targeted killings and strategic strikes are legitimate forms of kinetic action and are legal, ethical, and useful tactics to neutralize enemy combatants and terrorist organizations. Finally, using the cases of Pakistan, Afghanistan, Iraq, Yemen, and Somalia this study demonstrates that targeted killings by drones are proportional, discriminatory, and militarily necessary

    Part 1: Inflation, Drones, and the Economy of Hampton Roads

    Get PDF
    2022 may be characterized as the “best of times and worst of times.” Unemployment continued to fall, wages continued to rise, and homeowners experienced rises in property values. Hotels continued to rebound from the COVID-19 economic shock and the Port of Virginia experienced record volumes of cargo traffic. On the other hand, prices at the grocery store, gas station, and, it seems, almost everywhere else, continued to rise. Employers struggled to find the right employees at the right time and economic sentiment soured. Russia’s invasion of Ukraine highlighted the continuing revolution in military affairs brought about by drones and other unmanned systems. We ask how Hampton Roads fared over the past year and prospects for growth in 2023

    Unmanned Systems Sentinel / 24 June 2016

    Get PDF
    Approved for public release; distribution is unlimited

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp
    • …
    corecore