29 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Humanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy

    Full text link
    With the deployment of lethal autonomous weapons, there is the requirement that any such platform complies with the precepts of International Humanitarian Law. Humanitarian Algorithms[9: p. 9] ensure that lethal autonomous weapon systems perform military/security operations, within the confines of International Humanitarian Law. Unlike other existing techniques of regulating lethal autonomy this scheme advocates for an approach that enables Machine Learning. Lethal autonomous weapons must be equipped with appropriate fail-safe mechanisms that locks them if they malfunction.Comment: 14 pages, 11 references and 1 diagra

    Doctor of Philosophy Thesis in Military Informatics (OpenPhD ) : Lethal Autonomy of Weapons is Designed and/or Recessive

    Get PDF
    My original contribution to knowledge is : Any weapon that exhibits intended and/or untended lethal autonomy in targeting and interdiction – does so by way of design and/or recessive flaw(s) in its systems of control – any such weapon is capable of war-fighting and other battle-space interaction in a manner that its Human Commander does not anticipate. Even with the complexity of Lethal Autonomy issues there is nothing particular to gain from being a low-tech Military. Lethal autonomous weapons are therefore independently capable of exhibiting positive or negative recessive norms of targeting in its perceptions of Discrimination between Civilian and Military Objects, Proportionality of Methods and Outcomes, Feasible Precaution before interdiction and its underlying Concepts of Humanity. Additionally Lethal Autonomy in Human-interacting Autonomous Robots is ubiquitous[designed and/or recessive]. This marks the completion of an Open PhD ( #openphd ) project done in sui generis for

    Popular Impact - Tweet Mention by Valbonne Consulting : Gremlins Paradox

    No full text
    <p>Chronic Performance Problems in computing</p

    A PRECIS OF UNDERWORLD AND TERROR TRADECRAFTS FOR AL SHABAAB’S GLOBAL OPERATIONS

    No full text
    <p>The Transitional Federal Government of Somalia, backed by the United Nations and protected by AMISOM ( African Union Mission in Somalia) peace<br>keepers, is the main impediment to Al Shabaab’s insurgency objective of taking full control of Somalia.  Given the military superiority demonstrated by way of AMISOM bases, armored vehicles and personnel in Mogadishu, Somalia, anti-TFG insurgent forces, have<br>adopted local terror operations to placate the population of Somalia and international terror operations to induce the withdrawal of AMISOM armed intervention from Somalia.  Though fractious and with ill-defined leadership structures, a critical mass of anti-TFG insurgents are merged under the banner of Al Shabaab. This paper analyses<br>the behavior and intentions of key operators in Al Shabaab, with a view to deducing the underlying doctrine behind its covert operations and global<br>ambitions.<br><br></p> <p> </p

    INTELLIGENCE STUDIES IN FORENSIC CRIMINOLOGY OF FUGITIVE EMANATING DEFINITIVE AND LOCATIONAL PARAMETERS - Dissertation without Errata

    No full text
    <p>This dissertation addresses the problem of manhunts, against criminal fugitives. It establishes<br>new ways of describing and refining mechanisms and techniques, for manhunts. Methods used in this<br>dissertation to meet those objectives, include: review of case studies, benchmarking of techniques and<br>the analysis of techniques and concepts, which have been put forward by other scholars. Emphasis<br>has been placed on the applicability of search techniques to a wide range of situations, and techniques for shielding the actual intentions of a search-interdiction party, from the fugitive’s support network.  Also derived from the analyses and case studies in this dissertation, are some innovative concepts that enhance the manhunt tradecrafts of personnel currently engaged in on-going searches for fugitives and insights into fugitive psychology. Though the case studies have got a wide range of characteristics idiosyncratic to their subjects, illustrations of similarities and correspondence in otherwise, obviously unrelated case studies, is empirical evidence of the importance of review of past cases, to assist in the refining of future manhunt operations. The dissertation, proposes various manhunt tradecraft solutions, which may be widely applicable, even in situations where search-interdiction teams have very limited operations funding, but can nevertheless assist in obtaining success by a resourceful operative. The dissertation further seeks to give any new search-interdiction operative initial procedures and points of inquiry, while for the skilful operatives, it provides various methods for refinement of techniques and performance benchmarking.<br><br></p> <p> </p

    AUTONOMOUS CARS AND DRIVERLESS LETHAL AUTONOMY

    No full text
    <p>“The small picture” - make an advanced autonomous/driverless car. Lots of algorithms, sensors, computers and other gizmos. Now get it to take you to work, park itself and seamlessly run your family errands around the city. Taking grandma<br>to the doctor for the medical check-up, getting the children from school, etc. With Radar, Lidar and other sensors, the car steering with ease through the traffic, no driver to pay, that is another plus, fuel/energy efficiency, yet another plus. It is a bold<br>new world and the sky is the limit. Without the resolution of “small picture” issues there is no functioning autonomous/self-driving car, and without resolution of “THE BIG PICTURE” issues such as Driverless Lethal Autonomy there is no successful,<br>viable and/or safe autonomous car.</p

    Reply to Review Questions - Informatics Papers on Lethal Autonomy

    No full text
    <p><strong>Reply to Review Questions : </strong></p> <p> “Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous<br>Network Integrated Multifaceted Warfighting Solutions Version 1.0” : A Peer-Reviewed Monograph [31] by Nyagudi Musandu Nyagudi<br>arXiv 1401.6379v2<br>and<br>Humanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy [12] by Nyagudi Musandu Nyagudi<br>arXiv 1402.2206v1</p> <p>Initial review by Academics A,....,Z who are anonymous to the public but known to me, they include several Professors, Ph.Ds and M. Sc.s in<br>Informatics. Some of their positions have been edited for purposes of preserving their anonymity. Review is dated 1st November, 2013. Notably<br>the reviewers only accessed the Exploratory Study and they were not privy to the actual research paper – the Architectural Framework. further reviews especially those with very specific questions are much welcome, including on pubpeer.com</p> <p>Urls :</p> <p>[31] Nyagudi, Nyagudi Musandu (2014): Post-Westgate SWAT : C4ISTAR Architectural<br>Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version<br>1.0” : A Peer-Reviewed Monograph. figshare. http://dx.doi.org/10.6084/m9.figshare.899737</p> <p><br>[12] Nyagudi, Nyagudi Musandu (2014), Humanitarian Algorithms : A Codified Key Safety<br>Switch Protocol for Lethal Autonomy. figshare. http://dx.doi.org/10.6084/m9.figshare.899736</p> <p> </p> <p> </p> <p> </p> <p> </p
    corecore