Human Rights Activists Want to Ban ‘Killer Robots’

700_20942d209ab9dcf4e86a225fb4d0ca7a.jpgIf a human soldier commits a war crime, he has to face the consequences (at least in theory). The same goes for human operators of drones (again, in theory).

But if a fully autonomous war machine with no human operator goes rogue and kills a whole bunch of innocent people, who would be responsible, its programmers or the manufacturers? Finding someone to blame would be hard enough, and proving it in a court of law would 

It’s a scenario we’ve seen played out in countless sci-fi movies. But this is not RoboCop or Skynet; this is real life, and these machines are startlingly close to being realized. That’s why Harvard Law School and Human Rights Watch want to ban “killer robots” before they can become a reality. In a new report to the United Nations, they argue that there are serious moral and legal concerns surrounding fully autonomous weapons—and that they must be outlawed.

In an age when so much of modern warfare is carried out by pilotless flying killing machines, it’s not at all farfetched to say that we’ll have battlefield robots that actually make their own decisions in a matter of years.

Already, Israel’s Iron Dome defense system, for instance, is pre-programmed to intercept and neutralize rockets and other projectiles coming into Israel and the US military employs a similar system.
“Many people question whether the decision to kill a human being should be left to a machine,” the report says. “There are also grave doubts that fully autonomous weapons would ever be able to replicate human judgment and comply with the legal requirement to distinguish civilian from military targets.”

The report was released a few days ahead of an April 13 UN meeting in Geneva that will weigh the costs and benefits of autonomous weapons. Delegates will consider adding “killer robots” to the Inhumane Weapons Convention, which currently outlaws “blinding laser weapons,” and certain uses of incendiary weapons such as flamethrowers, among other weapons of an especially heinous nature.

DefenseOne:

« JP Morgan Algorithm Identifies Rogue Employees
Data Privacy: The Tide Turns in EU »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.