Technological Advancement of Warfare and IHL Vivek Raval.

Slides:



Advertisements
Similar presentations
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Advertisements

7 th ESPI Autumn Conference Space in a Changing World Vienna September 2013 Steven Freeland Professor of International Law, University of Western.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
186 National Socities.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
Future International Environmental Security Issues and Potential Military Requirements over the period of 2010 to for the U.S. Army Environmental.
© SEESAC, SALW Control Name? Organisation? Event? Date?
Evolution of Warfare and Security in the Modern World Lecture 1: Introduction and Basic Concepts Dr. James Corum- Dean- Baltic Defence College Dr. Eric.
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Introduction to Information Operations Attaché Corps- SEP 09
Prof. Dr. T.D. Gill University of Amsterdam & Netherlands Defence Academy.
The International Law of Armed Conflict: An Overview
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Core Principles Related to Conduct of Hostilities ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
The Privatisation of War The Law of Armed Conflict and Private Military Firms Dr Regina Rauxloh School of Law, University of Surrey, UK Surrey International.
Tel.: Fax : Kestucio str. 27, LT Kaunas, Lithuania MILITARY TECHNOLOGIES IN FUTURE CONFLICTS.
I nternational Humanitarian Law Legal FoundationsLegal Foundations Historical DevelopmentsHistorical Developments Current IssuesCurrent Issues.
New Applications of UAVs – A Driving Force Behind Joint Ventures Presented by; Haider Ali Bhatty Deputy Director General, Advanced Engineering Research.
Making choices Rules of war - walking debate. 2 Slide 5 > Look at each image scenario in turn and decide whether you think it is acceptable/unacceptable.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Autonomous Machines By: Tyler Roberts.
Military 3.6 Politics and Government. Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of.
The law of war: Humanitarian law THE STORY BEHIND THE STORY.
List 10 things that students today hope for and 10 things that they fear.
Situating International Humanitarian Law (IHL) ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Conduct of hostilities Protection of civilians against the effects of hostilities Dr. Elżbieta Mikos-Skuza Seminar „Introduction to International Humanitarian.
International Humanitarian Law and New Technologies of Warfare Lou Maresca Legal Adviser ICRC.
Weapons: The Future of War BY NICHOLAS NG HON 301 PROFESSORS EDUARDO MENDIETA AND FREDERICK WALTER.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
1) THE ROLE OF STATUS IN IHL 2) QUALIFICATION OF ARMED CONFLICT 3) REPERCUSSIONS OF STATUS ON 3 LEVELS : ON THE BATTLEFIELD : 1. CONDUCT OF HOSTILITIES.
The law of war: Humanitarian law THE STORY BEHIND THE STORY.
ICT, WARFARE AND PEACE; FOOD FOR THOUGHT Brian Naudé.
Basic Principles of IHL Dr. Hilly Moodrick-Even Khen, Alma course 2011.
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
Leiden University, 16/11/2015 The Internet as a Field of War Anne Plouy Claerwen O’Hara Louis Léonet Lucy Turner Leiden University, The Netherlands.
Daniel Cahen Legal Advisor, ICRC Regional Delegation for the US and Canada Clarifying the Notion of DIRECT PARTICIPATION IN HOSTILITIES under International.
International Humanitarian Law Oral Presentation Module Name: UJGT8E-15-M Student No:
Emerging Global Trends and Strategic Challenges in the Coming Decade Marvin J. Cetron, President, Forecasting International June 12, 2012 Emerging Global.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Human security from a legal point of view
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Types of War.
The Outer Space Treaty Article III
Autonomous Weapons Systems
Causes, Practices and Effects of War
Name of the idea Description and Military Application Maturity
Computer Aided Warfare
Name of the idea Description and Military Application Maturity
Autonomous Weapons Systems
Panel Discussion: C4I Solutions for Combating
Fires Conceptual Framework Supporting Multi-Domain Battle
Installations of the Future
Protection under international humanitarian law
Key Principles: A few preliminaries
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Customer Advocate Airborne Electronic Warfare Systems 29 MAR 2011 Tim.
Who needs rules? Discuss
Means and Methods of Warfare in Armed Conflict
HUMAN COMPUTER INTERACTION HCI IN MILITARY. Use HCI in Military Survey of some military technologies of today and the future Battlefield reconnaissance.
Eisenhower’s Policies
Artificial Intelligence in Unmanned Aerial Vehicles (UAV)
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Carpenter, International Organizations, 2011
S&T Main Focus Areas Linkages to 2018 NDS
Who is responsible for respecting IHL?
Deborah Housen-Couriel, ADV.
Presentation transcript:

Technological Advancement of Warfare and IHL Vivek Raval

Introducing the 21 st Century To begin with...what kind of world do we live in? February 2003 – three hackers disrupted the US logistics planning for the US operations in the Persian Gulf Internet is used by billion people 50% of world population lives in the cities Globalisation is on the rise – over 550 million people relocated across borders annually, over 6 million people fly daily India+China = 35% and the US+EU = 60% of the world economy (there are 192 United Nations’ member states!); of the 100 largest ‘economies’ in the world only 47 are states, the rest are multinational corporations

The world is rapidly becoming a ‘global village’ connected at various levels by new technologies, integrating economy and societies Does it mean that we solve our conflicts differently? Have we become more peaceful, do we fight differently? Are we witnessing changing conflicts in a changing world? Has information warfare gained a special role in these conflicts or has it become a way of fighting a conflict in its own right?

Conflicts Source: Human Security Brief 2007, Vancouver: Simon Fraser University

Civilian Deaths: Interstate Conflict Source: Human Security Brief 2007, Vancouver: Simon Fraser University

Introduction:changes in warfare and in constitutional order InnovationsPrincely state Kingly state Territorial state State-nation Nation-state Constitutional-Consistent finance -Permanent government -Absolutism -Sectarianism -Trade control -Aristocratic leadership -Nationalism -Imperialism -Nationalism -Ideology Warfare-Use of mercenaries -Mobile artillery -Fortification -More firearms -Siege warfare -Standing armies -Professional armies -Limited wars -Mass conscription and mass armies -Decisive battles -Nuclear weapons -Rapid computation -International communica- tions Source: Bobbitt, P. (2002) “The Shield of Achilles”, London: Penguin Books, pp

Introduction:basic terms Information warfare/operations (IW/IO) is......the integrated employment of (1) the core capabilities of electronic warfare, (2) computer network operations, (3) psychological operations, (4) military deception, and (5) operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision-making while protecting our own

The evolution of information society seems to be transforming war into a communication campaign of violent and destructive messages Information society (i.e. growing access to technologies that could be used for destructive purposes as well as growing vulnerability of society) enables smaller groups to challenge states Does it all mean fading of nation-state and emerging of a new constitutional order (market state – P.Bobbitt) remains to be seen and will be discussed during the course

MILITARY TECHNOLOGIES Intelligence and counter- intelligence security methods Psychotropic weapons Firearms Electromagnetic pulse weapons Tectonic weapon Military medicine Anti radar materials Military positioning and navigation systems Reactive materials in warfare Enemy detection systems Anti-missile shield Soldier equipage Mines and demining technologies Laser weapons Cybernetic technologies in an army Future weapons Military electronics Military training facilities State border protection systems Non-lethal weapons Space weaponry technologies Amours and their technologies Plasma weapons Communications and infor- mation encryption in warfare Energy sources in an army Military positioning and navigation systems Weapon manufacturing technologies

BATTLEFIELD RECONNAISSANCE The aim:  the exploration of the future battlefield;  receiving the information on the enemy's force structure, its location, and potential. Means:  unmanned air vehicles;  radars;  sonars;  space satellites.

MILITARY ROBOTS Robots play a constantly increasing role in warfare – they are unmanned aerial reconnaissance and combat vehicles, demining robots, (e.g. “SPIKER”, “RASP”), universal military robots capable of substituting soldiers (“Warrior 700”), robots making corridors in mine fields etc. Nevertheless, the ethical issues on the applications of robots in warfare and the problems of the latters’ consistency with Geneva conventions appear already.

FUTURE ARMAMENT PROJECTS This was only a few examples of futuristic projects. Some of them will be implemented and others probably not, but in general their ideas are actual not only for warfare. We would like to believe that such technologies will never be used according to their direct destination, but will be applied by mankind for peaceful purposes. Futuristic armament projects: “God rods”; “Metal storm”; Powerful electromagnetic guns; High power chemical laser; Cavitation torpedo.

A classification of systems Controlled Supervised Automated Autonomous

Controlled  A system that requires activation, direction and manipulation by a person ("man in the loop").

Supervised  A system is essentially an automated weapon or that has some degree of self-function but this function is permanently supervised by a human operator.  Operator supervises, does not initiate every function but may, at any time, block or take over the automated function of the system. ("man in the loop").

Automated  A system functions in an independent manner and does not require the intervention of a human operative for activation, direction, manipulation, nor for any other function.  System is pre-programmed in a specific manner and cannot adapt its function outside those parameters.  "Fire-and-forget" or "target-and-forget systems.

Autonomous  An automated weapon that can adapt its function to changing circumstances.  This is the world of artificial intelligence.

IHL does NOT prohibit technological developments for war fighting BUT these developments MUST be measured and assessed against existing legal norms.

Rule of Distinction Obligation to distinguish at all times:  civilians and other protected persons from combatants  civilian objects from military objectives

Indiscriminate attacks are prohibited  attacks not directed at a specific military objective  means and methods of warfare that cannot be directed at a a specific military objective

Proportionality in attack It is prohibited to launch an attack which may be expected to cause incidental loss to civilian life, injury to civilians, damage to civilian objects which would be excessive to the military advantage anticipated.

Propositions …  Current IHL covers controlled systems  Current law covers supervised systems  Current law should cover automatic systems  Current law may not be enough for autonomous systems

Issues and concerns  Autonomy: the absence of a "man in the loop" and related issues of target identification  Application of IHL rules distinction, proportionality and precautions. Is it feasible to program IHL compliance?  Where would liability/responsibility lie for failure or violations?

Other issues Cyber warfare Deleted uranium Incapacitating chemical agents The weaponization of biotechnology

Thank You