Autonomous Weapon Systems, the Frame Problem, and Computer Security
نویسنده
چکیده
Unlike human soldiers, autonomous weapon systems (AWS) are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS critically vulnerable to hacking. The political and tactical consequences of hacked AWS far outweigh the purported advantages of AWS not being affected by psychological factors and always following orders. Therefore, one of the moral justifications for the deployment of AWS is undermined.
منابع مشابه
Weapon scheduling in naval combat systems for maximization of defense capabilities
Air defense is a crucial area for all naval combat systems. In this study, we consider a warship equipped with an air-defense weapon that targets incoming threats using surface-to-air missiles. We define the weapon scheduling problem as the optimal scheduling of a set of surface-to-air missiles of a warship to a set of attacking air threats. The optimal scheduling of the weapon results in an in...
متن کاملHumanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy
_ Nyagudi Musandu (Independent Researcher, Nairobi, KENYA – EAST AFRICA) Abstract: With the deployment of lethal autonomous weapons, there is the requirement that any such platform complies with the precepts of International Humanitarian Law. Humanitarian Algorithms[9: p. 9] ensure that lethal autonomous weapon systems perform military/security operations, within the confines of International H...
متن کاملPost-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
“Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0” : A Peer-Reviewed Monograph by Nyagudi Musandu Nyagudi – Security Analyst Nations are today challenged with multiple constraints such as declining population and financial austerity, these inevitably reduce military/security forces preparedness. Faced with well...
متن کاملMulti-Frame Vectors for Unitary Systems in Hilbert $C^{*}$-modules
In this paper, we focus on the structured multi-frame vectors in Hilbert $C^*$-modules. More precisely, it will be shown that the set of all complete multi-frame vectors for a unitary system can be parameterized by the set of all surjective operators, in the local commutant. Similar results hold for the set of all complete wandering vectors and complete multi-Riesz vectors, when the surjective ...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کامل