Ethics of Emerging Weapons Technologies University of Notre Dame Spring 2012.

Slides:



Advertisements
Similar presentations
OECD International Futures Programme 1 OECD Futures Project The Commercialisation of Space and the Development of Space Infrastructure: The Role of Public.
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Last Tactical Mile “Perspective”
Discovering Computers Fundamentals, 2012 Edition
Promoting Cooperative Solutions for Space Security 1 Is Current International Humanitarian Law Sufficient to Regulate a Potential.
7 th ESPI Autumn Conference Space in a Changing World Vienna September 2013 Steven Freeland Professor of International Law, University of Western.
Emerging Business & Technology Trends Tony Hayes Deputy Director-General Department of Communities, Child Safety and Disability Services International.
Digital Citizenship in the Classroom
Ethics of Emerging Technologies EM and Non-Lethal Weapons University of Notre Dame Spring 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
NATO’S RESPONSE TO NEW SECURITY CHALLENGES Michael Rühle Head, Energy Security Section NATO Emerging Security Challenges Division ATHENA CONFERENCE Athens,
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 2 Crane of the Future: A VITAL ENTERPRISE 29 MAR 2011 Patricia Herndon.
Aaron Summers. What is Artificial Intelligence (AI)? Great question right?
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Prof. Dr. T.D. Gill University of Amsterdam & Netherlands Defence Academy.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Ethics in Human Robot Interaction (HRI). Evolution of robots (then) What can robots do? How do they fit into our lives? What are the possibilities? Dangers?
Chief Information Officer Group
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Sense & Avoid for UAV Systems
MAXWELL SECURITY AUTHORITY. THE THREAT: The TERROR PLOT of AL QAEDA.
COUNTERINTELLIGENCE TRENDS
Advanced Metering Infrastructure
International Section | Leadership & Management Division | College of Management and Technology Developing National Strategy MDWSC Georgia Nov/Dec 2011.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
Ch. 1. The Third ICT Wave The Third ICT Wave.
© BAE SYSTEMS Meeting the challenges posed by the current defence environment A paper presented at 27 th ISMOR Judith Rawle and.
NATO VIZ-N/X Custom Ontologies for Expanded Social Network Analysis Amy K. C. S. Vanderbilt, Ph.D. and J. Andrew Skene 4465 Brookfield Corporate Drive,
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Autonomous Machines By: Tyler Roberts.
Military Ethics in the New Millennium
Affective Computing: Agents With Emotion Victor C. Hung University of Central Florida – Orlando, FL EEL6938: Special Topics in Autonomous Agents March.
Military 3.6 Politics and Government. Cyberwarfare “Actions by a nation-state to penetrate another nation's computers or networks for the purposes of.
CHAPTER 10 Technology Issues.
Conduct of hostilities Protection of civilians against the effects of hostilities Dr. Elżbieta Mikos-Skuza Seminar „Introduction to International Humanitarian.
Weapons: The Future of War BY NICHOLAS NG HON 301 PROFESSORS EDUARDO MENDIETA AND FREDERICK WALTER.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
SEMINAR REPORT ON K.SWATHI. INTRODUCTION Any automatically operated machine that functions in human like manner Any automatically operated machine that.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Legal Advisor to the Executive Director
Terrorism & Bioterrorism Communication Challenges Module 9.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
XXI Century Ethics: a Global View Dr. Roberto Artavia L. Costa Rica November 12, 2009.
Overview of Information and Signal Processing Program 24 January 2007 Liyi Dai, Program Manager Computing & Information Sciences Division Mathematical.
OUTLINE OF SECURITY PROPOSAL Malcolm Dando. 1. The Original Design of the EMR Web of Prevention – Intelligence, Export Controls, Arms Control The Biological.
The Ethics of War 11.Forelesning. ”What if an international terrorist planted a nuclear bomb somewhere in Manhattan, set to go off in an hour and kill.
Computational Science & Engineering meeting national needs Steven F. Ashby SIAG-CSE Chair March 24, 2003.
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
Copyright © 2016 – Curt Hill The Digital World Understanding the challenges of this world.
Chapter 17: Foreign Policy and National Defense Section 2.
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
Peace Research Institute Oslo UAVs for border surveillance & humanitarian rescue at sea? DESSI Conference – 24 June 2013 Maria Gabrielsen Jumbert.
Emerging Global Trends and Strategic Challenges in the Coming Decade Marvin J. Cetron, President, Forecasting International June 12, 2012 Emerging Global.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
1 Do We Need to Rewrite Military Ethics? Ethics and Robotic Systems in Military Operations Msgr. Dr. Werner FREISTETTER Episcopal Vicar.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Name of the idea Description and Military Application Maturity
Name of the idea Description and Military Application Maturity
Threats to World Security Chapter 33 Section 3.
LAS 432Competitive Success/tutorialrank.com
LAS 432 Education for Service-- tutorialrank.com.
Installations of the Future
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Customer Advocate Airborne Electronic Warfare Systems 29 MAR 2011 Tim.
Assessing Deterrence Options for Cyberweapons
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
DDR&E AC: Aligned to the National Defense Strategy
Research Focus August 2018 Classified by: Curt Beck Derived from:
MicroToken Exchange Data Security Solutions
Presentation transcript:

Ethics of Emerging Weapons Technologies University of Notre Dame Spring 2012

Important Points US has experienced decades of war Different and challenging national security environment Soldiers, Sailors, Airmen, and Marines are dedicated and exceptionally good at what they do Uniformed military are the last to want a resort to armed conflict Intent is to raise awareness of ethical issues and develop a framework for thinking and deciding

Areas of Interest Research and Development – Does the mere act of development of a technology or modification of a technology to military purposes raise ethical issues? Deployment and Operations – Has sufficient consideration been given to the consequences of use of a new form of technology to national security purposes? Applicability of Just War Theory and International Humanitarian Law

Plan Historical Ethics Questions Changed Environment National Security Research New Technologies Potential Ethics Issues

Some Past Weapons Ethics Issues Crossbow versus Longbow – Pope Innocent II (1139) forbade its use Chemical warfare Biological Warfare Strategic Bombing in WWII Nuclear Weapons

The Changed Environment …and Social Media !

8 A Few Aspects of Our World Today Economic climate Competition for resources Fundamentalism, radicalism Astounding commercial technology – dual use - capabilities Shape-shifting, technologically sophisticated – and exceptionally brutal - enemies Public expectations of intelligence perfection - connecting the dots Deluge of multi-lingual structured and unstructured data, social media Weapons proliferation

Change that is too rapid can be deeply divisive; if only an elite can keep up, the rest of us will grow increasingly mystified about how the world works. We can understand natural biology, subtle as it is, because it holds still. But how will we ever be able to understand quantum computing or nanotechnology if its subtlety keeps accelerating away from us? Constant technological revolution makes planning difficult, and a society that stops planning for the future is likely to become a brittle society. Stewart Brand, Time, June 19, 2000 Keeping Up With the Pace of Change (An Argument for Scientific Literacy)

Implications of New Environment and Technologies (Lucas, Testimony, National Academy of Sciences) Familiar refrain – Our traditional concepts of warfare and its justification are outmoded – Existing laws of war and moral constraints regarding conventional combat are useless – Our conceptions of both must either be cast aside or radically reformulated Danger of threat inflation, exaggeration, hysteria Concepts of Just War and International Humanitarian Law remain valid – Must think hard and speak cogently about their meaning and application

(BGen (Ret) Richard OMeara)

National Security Research Types of Research – Basic – Advanced – Applied/Developmental Defense Department – Service Laboratories – DARPA (Defense Advanced Research Projects Agency) A special case Intelligence Agencies Department of Energy

IC Organization (Intelligence Community)

Central Intelligence Agency

An Important Note The Military and The Intelligence Agencies operate under different laws – Military: Title 10, United States Code – Intelligence: Title 50, United States Code And a different set of international norms However, ethical and moral boundaries still apply

[ Some military projects today ] Cyberweapons Cyborg insects Robots that eat Energy weapons Telepathic communication Quantum computing Submersible aircraft Exoskeletons Enhanced warfighters Dynamic armor Invisible shields and cloaks Accelerated therapeutics Real-time language translations Programmable matter 21Copyright 2011 © Ethics + Emerging Sciences Cal Poly

New Technologies for Discussion Soldier enhancements EM and Non-lethal Weapons Cyberwarfare Unmanned systems/robots Massive data mining and sensors

Example Types of Enhancements Pharmaceutical – Pilot Go pills (legal) – Steroid and other drug use in combat zones (not) Physical – Exoskeltons – Eye implants Neurological – Neural control (TransCranialMagneticStimulation) – Neuromodulation

[ Military enhancements ] Accelerated Learning Crystalline Cellulose Conversion to Glucose Education Dominance Enabling Stress Resistance Exoskeleton Neovision2 Neurotechnology for Intelligence Analysts Peak Soldier Performance (Metabolic Dominance) PowerSwim RealNose Synthetic Telepathy Wingsuit (Next-Gen Parachute System) Z-Man 24Copyright 2011 © Ethics + Emerging Sciences Cal Poly

Soldier Enhancement

NIA: Neurotechnology for Intelligence Analysts

Electromagnetic and Non-Lethal Weapons Lasers Radiofrequency Audio Odor Incapacitating agents

[ Less-than-lethal weapons ] Laser missiles Blinding weapons Pain rays and fences Sonic weapons Electric weapons Soft weapons Projectile netting Smelly weapons Other gas and sprays Copyright 2011 © Ethics + Emerging Sciences Cal Poly28

Cyber Defense Exploitation Attack Sabbotage

[ Military robotics ] Ground robots Aerial robots Marine robots Space robots Immobile/fixed robots Sentry robots Humanoid robots Chemical robots or blob-bots Biological-machine integrations or cyborgs 30Copyright 2011 © Ethics + Emerging Sciences Cal Poly

Unmanned Systems/Robots

Data Mining and Ubiquitous Sensors Credit cards EZ Pass Telephone records, location services Social media Movie rentals, downloads On-line activity of any kind Geospatial Information Systems (GIS) Cameras everywhere (ATM, traffic lights, license plate readers) Facial recognition systems And…?

Connected World=Big Data 7/25/2008Google passes 1 trillion URLs $187/secondCost of last Ebay outage 1 BillionPCs and Laptops PBSize of YouTube 2/4/2011IPv4 address space exhausted 340x10 38 Size of IPv6 address space 100 million gigabytesSize of Googles index 144 millionNumber of Tweets per day 1.7 trillionItems in a startups DB 90PBFacebook data holdings 4.3 BillionMobile devices 6.9 billion people 700 million Facebook users 33

Data Fusion Big Data Problem Integrated Analytics Structured Data Images Foreign- language Text English- language Text Audio Sensor Data Video

Advantages of New Technologies Unmanned – Reduced risk to our warfighters Enhancements – Provide tactical advantage, reduce our risk Non-Lethal – Offer viable options in appropriate scenarios Cyber – Potentially reduce harm, physical damage Big Data Techniques – Better security, consumer choice and access

Possible Issues of New Technologies (Enhancement) Reversibility Altered levels of fear and aggression Enhancement in absence of effort Possibility of leakage into society, inequality Increased government regulation

Possible Issues of New Technologies (Cyberwarfare) Difficulty distinguishing between exploitation and attack Great opportunity for misperception Great cost and damage Possibility of non-state actors Difficulty in attribution and retaliation Possible indiscriminate or disproportionate retaliation

Possible Issues of New Technologies (Robotics/Unmanned systems) May lower the threshold for violence Perception by local populace of cowardice Danger of contractors applying lethal force Uncertainty and risk of using autonomous systems

Possible Issues of New Technologies (EM and Non-Lethal Systems) Instantaneous, zero-time-flight Reduced danger could increase potential for use Could embolden adversaries Non-lethality may encourage lax control of force application Undetectable harm may encourage use as punishment

Possible Issues of New Technologies (Data Mining and Ubiquitous Sensors) Re-definition of privacy – Unrealistic expectations? Information theft and nefarious use – Frequently occurs Medical/genetic information

Readings of Interest From Crossbow to H-Bomb, Bernard and Fawn M. Brodie, Indiana University Press, 1962 Science and Human Values, Jacob Bronowski, Harper and Row, 1956