Will Robots Be Allowed To Kill?

Humans are creating and beginning to deploy autonomous robotic weaponry for military use and as national protection. Recently the discussion of robotics has become an important debate with argument concerning the application of robot troops in warfare and whether there should be more understanding and international legal restrictions on their use in combat. 

Robotic History
Of course the history of robotics goes back a long time and has its origins in the ancient cultures around the globe. Historic inventors and engineers in China, Egypt and Greece all attempted to build self-operating animal and human looking machines. Among the first verifiable automation is a humanoid drawn by Leonardo da Vinci (1452–1519) in around 1495. 
Leonardo's notebooks, rediscovered in the 1950s, contain detailed drawings of a mechanical knight in armour which was able to sit up, wave its arms and move its head and jaw. 

Now it is becoming increasingly common to use robots in war zones to do checks on battlefield threats and find lost items. However, now we are moving toward kill robotics without an agreed international agreement. 

Potential Robotic Solution
However, death without military purpose happened during WW2, when about 57 million people were killed of which 38 million were civilians, and this was made-up of local non-military casualties, women, children and old aging personnel. These deaths were greater in number than military deaths and this murderous process still goes on in many parts of the world. 
This is because the weapons used and the attacks methods such as the bombing of cities to take out production and industrial infrastructure. And these attack methods took little notice of who would be killed. Of course this was purposely done when the US used of atomic bombs during the 2nd WW and this caused massive civilian deaths. 

Currently some of the discussion points cover the idea that killer robots could impede such tragedy as their sophisticated technology could identify and target better than human senses and execute assassination exactly how it is programmed. 
Their sight is not limited by fog and their mobility is not restricted by physical limitations, in contrast to human pilots and soldiers. 

The thoughts are that the advancement of Artificial Intelligence (AI) could improve robotics identification of the military enemy and they could be programmed to focus on the military enemy and not civilians.
Some military operations are still not employing armed robots yet drones are being used to kill on battlefields and for instance the Russians have used them in Syria. The US have used them but they are controlled by a distant ‘pilot’ controlling them from the US. 

The debate is now addressing whether killer robots without immediate human control could potentially replace human soldiers during conflict and whether this would potentially reduce the number of civilian casualties.  

The employment of robots in warfare could also have a significant effect and improve the psychological effects on combatants. 

The new idea is that robotic algorithms could control attacks in accordance to internationally agreed Rules of Engagement. 
Although the idea of robotic warfare sounds effective as it could potentially reduce a war’s effects on the civilian population, the main issue is still whether military robots should have the right to decide on whom to kill and whom to save, or should robotics still be controlled by military personnel. 

By Alfred Rolington 

You Might Also Read:

The Technology Of Human Robotics:

AI - Driven Warfare Using Robots:

 

 

« Business Migration To The Cloud
US Sanctions Against N. Korean Hacking Groups »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Infosys

Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions.. Services include IT strategy, technical architecture and operations including cybersecurity.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.