Human Rights Activists Want to Ban ‘Killer Robots’

700_20942d209ab9dcf4e86a225fb4d0ca7a.jpgIf a human soldier commits a war crime, he has to face the consequences (at least in theory). The same goes for human operators of drones (again, in theory).

But if a fully autonomous war machine with no human operator goes rogue and kills a whole bunch of innocent people, who would be responsible, its programmers or the manufacturers? Finding someone to blame would be hard enough, and proving it in a court of law would 

It’s a scenario we’ve seen played out in countless sci-fi movies. But this is not RoboCop or Skynet; this is real life, and these machines are startlingly close to being realized. That’s why Harvard Law School and Human Rights Watch want to ban “killer robots” before they can become a reality. In a new report to the United Nations, they argue that there are serious moral and legal concerns surrounding fully autonomous weapons—and that they must be outlawed.

In an age when so much of modern warfare is carried out by pilotless flying killing machines, it’s not at all farfetched to say that we’ll have battlefield robots that actually make their own decisions in a matter of years.

Already, Israel’s Iron Dome defense system, for instance, is pre-programmed to intercept and neutralize rockets and other projectiles coming into Israel and the US military employs a similar system.
“Many people question whether the decision to kill a human being should be left to a machine,” the report says. “There are also grave doubts that fully autonomous weapons would ever be able to replicate human judgment and comply with the legal requirement to distinguish civilian from military targets.”

The report was released a few days ahead of an April 13 UN meeting in Geneva that will weigh the costs and benefits of autonomous weapons. Delegates will consider adding “killer robots” to the Inhumane Weapons Convention, which currently outlaws “blinding laser weapons,” and certain uses of incendiary weapons such as flamethrowers, among other weapons of an especially heinous nature.

DefenseOne:

« JP Morgan Algorithm Identifies Rogue Employees
Data Privacy: The Tide Turns in EU »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Halborn

Halborn

Elite blockchain cybersecurity. Award-winning ethical blockchain hackers to secure your stack end-to-end. Far beyond smart contracts.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

Secure Blink

Secure Blink

Secure Blink provides automated application and API security solutions that empower developers and security engineers to protect critical assets from exploitation.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.