Autonomous Weapon Systems, the Frame Problem, and Computer Security

نویسنده

  • Michał Klincewicz
چکیده

Unlike human soldiers, autonomous weapon systems (AWS) are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS critically vulnerable to hacking. The political and tactical consequences of hacked AWS far outweigh the purported advantages of AWS not being affected by psychological factors and always following orders. Therefore, one of the moral justifications for the deployment of AWS is undermined.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weapon scheduling in naval combat systems for maximization of defense capabilities

Air defense is a crucial area for all naval combat systems. In this study, we consider a warship equipped with an air-defense weapon that targets incoming threats using surface-to-air missiles. We define the weapon scheduling problem as the optimal scheduling of a set of surface-to-air missiles of a warship to a set of attacking air threats. The optimal scheduling of the weapon results in an in...

متن کامل

Humanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy

_ Nyagudi Musandu (Independent Researcher, Nairobi, KENYA – EAST AFRICA) Abstract: With the deployment of lethal autonomous weapons, there is the requirement that any such platform complies with the precepts of International Humanitarian Law. Humanitarian Algorithms[9: p. 9] ensure that lethal autonomous weapon systems perform military/security operations, within the confines of International H...

متن کامل

Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

“Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0” : A Peer-Reviewed Monograph by Nyagudi Musandu Nyagudi – Security Analyst Nations are today challenged with multiple constraints such as declining population and financial austerity, these inevitably reduce military/security forces preparedness. Faced with well...

متن کامل

Multi-Frame Vectors for Unitary Systems in Hilbert $C^{*}$-modules

In this paper, we focus on the structured multi-frame vectors in Hilbert $C^*$-modules. More precisely, it will be shown that the set of all complete multi-frame vectors for a unitary system can be parameterized by the set of all surjective operators, in the local commutant. Similar results hold for the set of all complete wandering vectors and complete multi-Riesz vectors, when the surjective ...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015