Ethics of Drones, Remote Weapons and Robots

Remote weapons have been around at least since the bow and arrow, and were taken to new levels by missiles, artillery and aerial bombing.

However, the advent of pilotless drones able to stay in the air for long periods, and to be directed from thousands of miles away, and of precision- guided long-range missiles, has raised new questions about the boundaries between peace and war, and the nature of future conflicts.

Their advantages include the lack of direct risk to the operators, the ability to target relatively precisely and to have greater certainty about the identification of targets, and the opportunity to strike targets anywhere in the world without having boots on the ground.

The rapid elimination of known and apparently dangerous enemies has helped western opinion to turn a blind eye to the risks associated with such strikes. There are also precious few acceptable alternative means of action in large areas of ungovernable space. The long shadow of Iraq means little enthusiasm for sacrificing soldiers' lives to secure deserts.

However, the sense of action without direct consequences for the power using such weapons is seen by some as an illusion. The operators themselves may still suffer psychological stress from killing.

Moreover, however precise modern remote weapons may be in theory, the risk of associated civilian casualties is always present. Faulty intelligence can lead to serious mistakes. Even a completely accurate strike can set up a strong political reaction.

The resulting resentment by local communities may be toxic, and act as a recruiting sergeant for others supporting the cause of those hit, or seeking revenge. The government of the country on whose territory attacks are conducted by a third party can suffer political consequences for condoning or at least not preventing them (for example Pakistan).

More broadly, remote attacks may become a substitute for the kind of political strategy which alone can defeat over time groups using terrorist tactics.

The use of such weapons against individuals or groups in territories which have not been declared combat zones also raises difficult legal and ethical questions.

Can such attacks be justified under international law, especially when they are preventive in nature? Are the views of the government in control of such territories of no relevance? Does it make a difference if nationals of the country using the weapons are targeted in the kind of extra-judicial killing which would not be contemplated or condoned at home? How would countries using such weapons respond if another power used them to eliminate those considered enemies on their own territories, as the technology spreads and becomes cheaper? Are stricter controls needed on the sale of such technology?

Even more difficult long-term questions arise over weapons systems which could operate and kill autonomously, with no specific human decision involved. What are the moral and political issues if miniaturisation of weapons and guidance systems eventually allows delivery of bullet size payloads to kill single individuals at will?

Armed drones are designed for lethal action, but as terrorists have shown many times, machines of any kind can be hijacked or adapted to become weapons capable of inflicting significant casualties and severe damage on societies.

Commercial drones now being considered for many purposes would create new opportunities for this kind of attack. Vehicles and robots are increasingly operated by software which opens up the prospect of remote hijacking or ransom demands through offensive cyber-attacks.

Moreover, what would happen if robots or drones, or autonomous cars, had to choose between greater and lesser evils: crashing into a school or into a hospital for example. Who would bear the responsibility for the choice?

image: California Air National Guard unit is primarily involved in Predator unmanned aerial vehicle missions

Ditchley:

Technology, Multilateralism, War and Peace:

Tanks To Have Remote-Control:             A New Autonomous Tactical Drone:

Drone-Visuality: The Psychology Of Killing:

 

 

« Robots Will Repair Satellites In Space
Data Breaches Attack All Parts Of A Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Mission Secure (MSi)

Mission Secure (MSi)

MSi is a specialized provider of next generation cyber defense solutions protecting control systems and critical physical assets in energy, transportation and defense.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.