Ethics of Drones, Remote Weapons and Robots

Remote weapons have been around at least since the bow and arrow, and were taken to new levels by missiles, artillery and aerial bombing.

However, the advent of pilotless drones able to stay in the air for long periods, and to be directed from thousands of miles away, and of precision- guided long-range missiles, has raised new questions about the boundaries between peace and war, and the nature of future conflicts.

Their advantages include the lack of direct risk to the operators, the ability to target relatively precisely and to have greater certainty about the identification of targets, and the opportunity to strike targets anywhere in the world without having boots on the ground.

The rapid elimination of known and apparently dangerous enemies has helped western opinion to turn a blind eye to the risks associated with such strikes. There are also precious few acceptable alternative means of action in large areas of ungovernable space. The long shadow of Iraq means little enthusiasm for sacrificing soldiers' lives to secure deserts.

However, the sense of action without direct consequences for the power using such weapons is seen by some as an illusion. The operators themselves may still suffer psychological stress from killing.

Moreover, however precise modern remote weapons may be in theory, the risk of associated civilian casualties is always present. Faulty intelligence can lead to serious mistakes. Even a completely accurate strike can set up a strong political reaction.

The resulting resentment by local communities may be toxic, and act as a recruiting sergeant for others supporting the cause of those hit, or seeking revenge. The government of the country on whose territory attacks are conducted by a third party can suffer political consequences for condoning or at least not preventing them (for example Pakistan).

More broadly, remote attacks may become a substitute for the kind of political strategy which alone can defeat over time groups using terrorist tactics.

The use of such weapons against individuals or groups in territories which have not been declared combat zones also raises difficult legal and ethical questions.

Can such attacks be justified under international law, especially when they are preventive in nature? Are the views of the government in control of such territories of no relevance? Does it make a difference if nationals of the country using the weapons are targeted in the kind of extra-judicial killing which would not be contemplated or condoned at home? How would countries using such weapons respond if another power used them to eliminate those considered enemies on their own territories, as the technology spreads and becomes cheaper? Are stricter controls needed on the sale of such technology?

Even more difficult long-term questions arise over weapons systems which could operate and kill autonomously, with no specific human decision involved. What are the moral and political issues if miniaturisation of weapons and guidance systems eventually allows delivery of bullet size payloads to kill single individuals at will?

Armed drones are designed for lethal action, but as terrorists have shown many times, machines of any kind can be hijacked or adapted to become weapons capable of inflicting significant casualties and severe damage on societies.

Commercial drones now being considered for many purposes would create new opportunities for this kind of attack. Vehicles and robots are increasingly operated by software which opens up the prospect of remote hijacking or ransom demands through offensive cyber-attacks.

Moreover, what would happen if robots or drones, or autonomous cars, had to choose between greater and lesser evils: crashing into a school or into a hospital for example. Who would bear the responsibility for the choice?

image: California Air National Guard unit is primarily involved in Predator unmanned aerial vehicle missions

Ditchley:

Technology, Multilateralism, War and Peace:

Tanks To Have Remote-Control:             A New Autonomous Tactical Drone:

Drone-Visuality: The Psychology Of Killing:

 

 

« Robots Will Repair Satellites In Space
Data Breaches Attack All Parts Of A Business »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

CTR Secure Services

CTR Secure Services

CTR Secure Services provides a broad range of security consulting services from asset protection to cyber security.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

Cyberus

Cyberus

Cyberus brings together industry, business, and government to collaboratively create a secure digital future for Russia and the world.