Will Robots Be Allowed To Kill?

Humans are creating and beginning to deploy autonomous robotic weaponry for military use and as national protection. Recently the discussion of robotics has become an important debate with argument concerning the application of robot troops in warfare and whether there should be more understanding and international legal restrictions on their use in combat. 

Robotic History
Of course the history of robotics goes back a long time and has its origins in the ancient cultures around the globe. Historic inventors and engineers in China, Egypt and Greece all attempted to build self-operating animal and human looking machines. Among the first verifiable automation is a humanoid drawn by Leonardo da Vinci (1452–1519) in around 1495. 
Leonardo's notebooks, rediscovered in the 1950s, contain detailed drawings of a mechanical knight in armour which was able to sit up, wave its arms and move its head and jaw. 

Now it is becoming increasingly common to use robots in war zones to do checks on battlefield threats and find lost items. However, now we are moving toward kill robotics without an agreed international agreement. 

Potential Robotic Solution
However, death without military purpose happened during WW2, when about 57 million people were killed of which 38 million were civilians, and this was made-up of local non-military casualties, women, children and old aging personnel. These deaths were greater in number than military deaths and this murderous process still goes on in many parts of the world. 
This is because the weapons used and the attacks methods such as the bombing of cities to take out production and industrial infrastructure. And these attack methods took little notice of who would be killed. Of course this was purposely done when the US used of atomic bombs during the 2nd WW and this caused massive civilian deaths. 

Currently some of the discussion points cover the idea that killer robots could impede such tragedy as their sophisticated technology could identify and target better than human senses and execute assassination exactly how it is programmed. 
Their sight is not limited by fog and their mobility is not restricted by physical limitations, in contrast to human pilots and soldiers. 

The thoughts are that the advancement of Artificial Intelligence (AI) could improve robotics identification of the military enemy and they could be programmed to focus on the military enemy and not civilians.
Some military operations are still not employing armed robots yet drones are being used to kill on battlefields and for instance the Russians have used them in Syria. The US have used them but they are controlled by a distant ‘pilot’ controlling them from the US. 

The debate is now addressing whether killer robots without immediate human control could potentially replace human soldiers during conflict and whether this would potentially reduce the number of civilian casualties.  

The employment of robots in warfare could also have a significant effect and improve the psychological effects on combatants. 

The new idea is that robotic algorithms could control attacks in accordance to internationally agreed Rules of Engagement. 
Although the idea of robotic warfare sounds effective as it could potentially reduce a war’s effects on the civilian population, the main issue is still whether military robots should have the right to decide on whom to kill and whom to save, or should robotics still be controlled by military personnel. 

By Alfred Rolington 

You Might Also Read:

The Technology Of Human Robotics:

AI - Driven Warfare Using Robots:

 

 

« Business Migration To The Cloud
US Sanctions Against N. Korean Hacking Groups »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.