You are on page 1of 27

RESTRICTED

CHAPTER ONE

INTRODUCTION

1. The revolution and evolution of computers in both the military and non-military
communities have been incredible. The difficulty comes in deciding how best to use the
hardware and software available. This study will look at the evolution of computers from
their inception, through their first military uses, through their present day military uses, and
finally at possible future uses. This study will narrow the scope of the research to the
evaluation of artificial intelligence and expert computer systems only. This study will begin
by looking at the field of computers from a user oriented perspective. The information
provided will not break new ground on the technical aspects of hardware or software
engineering. Rather, it will review the beginnings of computers with specific attention paid to
those areas where the military has played a role. A major goal of this study is to identify
current applications of artificial intelligence and expert computer systems that are in the
process of research and development (Staples, 1973).

2. “Every aspect of learning or any other feature of intelligence can be so precisely


described that a machine can be made to simulate it” was the proposal included in the
Dartmouth Conference held at 1956 which was organized by two senior scientists named
Marvin Minsky, John McCarthy in order to create important programmes beneficial to the
country.. At the conference, McCarthy persuaded the attendees to accept “Artificial
Intelligence (AI)” as the name of this modern field and it is considered as the birth of AI.

3. The study will consider the overall system and not one particular peripheral in the
evaluation of these technologies. Intelligence and expert systems are discussed today in
greater anticipation and excitement in military and non-military communities with its
involvement in all communities. However, the key to progress of AI today, is steady and
constant research in both of these fields.

4. The Analytical Machine invented for calculating purposes was the initiation of the
new self functioning, human beneficial and effective technology. It is also the initiation of the
AI technology. Therefore, the machine created for statistic purposes was improved to a
1

RESTRICTED
RESTRICTED

Decision making autonomous system by Leonardo Torres in the early 1900 and it was a chess
playing machine. That self brained autonomous technology was developed with a mass
storage and converted to a computer system and created cyber technologies later on with a lot
of researches.

5. Since machines were taking the control of the day today human inputs with higher
efficiency and an effective manner, armies began to be more interested in these machines in
order to utilize them for beneficial functions. Therefore after succeeding from the application
usage in the World War I as a storage for information and as analyzers, they were
operationally used during the World War II by all vital activists. The development of the field
of AI bloomed with the invention of Nano technology.

6. The most important aspect is that the machines which use the AI technologies have
improvised the use the following Intelligence cycle (Figure 1.1) and during our research we
found that AI Technology use the AI Cycle(Figure1.2) which has two additional steps as
Decisions and Engagement /Execution. Most researches are ongoing with this new concept.
Always the scientists want to instill rationalism in AI machines. The latest theory was
established to make machines which possess rational thinking.

DIRECTION

DISSERMINATION COLLECTION

PROCESSING

Figure 1.1: Intelligence Cycle

DIRECTION

ENGAGE/ EXECUTION COLLECTION

DECISION PROCESSING

DISSERMINATION

FIGURE 1.2: Artificial Intelligence Cycle

RESTRICTED
RESTRICTED

ASSUMPTIONS

7. Most details of this script consist of data which we collected by questionnaires and
also by referring books and the internet.

8. All data which we have obtained from books, internet and by collecting data by
giving questionnaires are only sources from which we gain the information.

PURPOSE OF THE THESIS

9. The purpose of this thesis is to develop a hypothesis with regard to creating AI which
is in line with International humanitarian law and Military law.

DEFINITION OF TERMS

10. Artificial Intelligence. The subfield of computer science that endeavors to develop
machines capable of performing functions normally associated with human intelligence, such
as reasoning, learning, and understanding human language.1

11. Expert System. A computer programme capable of considering a vast body of


knowledge, reasoning, and then recommending a course of action.2

12. Inference Engine. The component of an expert system that accesses, selects, and
executes previously programmed rules. Sometimes referred to as a rule interpreter.3

13. Knowledge Base. The part of an expert system that has declarative knowledge (facts)
and procedural knowledge (rules).4

1
Shipley, Chris. "Whatever Happened to AI?” PC Com Quitting, (March 1989):p.
2
Ibid.
3
Ibid.
4
Ibid.
3

RESTRICTED
RESTRICTED

14. LISP (LISt Processing Language). The programming language used most in the
United States for AI applications. LISP was developed in 1958; its name is derived from the
listing of symbols emblematic of procedural and declarative knowledge.5

15. Natural Language Processing. A subfield of AI whose goal is to develop an English


language interface for computer systems.6
SIGNIFICANCE OF THE STUDY

16. This thesis is based on a question and the question of this study is “Will future combat
systems neglect the moral aspect of warfare?”

REPORT OUTLINE

17. Chapter Two describes the literature survey pertaining to the Artificial Intelligence
and expert computer systems, Here we mention the background and the systems which were
used in previous years and what will be the future weaponry and also we give a brief review
on this subject.

18. Chapter four consists of Methodology adopted for this research with particular
techniques used to implement this methodology described later in this chapter.

19. Chapter Five explains how the researchers developed their Hypothesis.

20. In chapter six mentions how we concluded this study with Discussions and
Conclusion.

21. Chapter Seven includes the references of the sources used for this research.

5
Ibid.
6
Ibid.
4

RESTRICTED
RESTRICTED

CHAPTER TWO

LITERATURE REVIEW

22. Technology of AI became available to create machine intelligence due to the


development of the electronic computers since 1940’s. After that, the world began to go
through this subject and the people who were always involved in this matter wantes to do
researches and also wanted to make machines related to this subject. Theories and principles
developed and created in the term of Artificial Intelligence started from 1956 at the
Dartmouth conference and after about four 4 decades, there are now a variety of AI
programmes in the world which have a remarkable impact over other technological
advancements.

23. The technology of electronics gave a new path to AI. Electronics is the field which
has the ability to make an artificial machine which is having intelligence. Therefore a number
of scientists used this technology to control many systems without an order.

24. In early 1950’s Dr. Norbert Wainer was one of the first Americans to make
observations on the principle of feedback theory. This was a turning point of the latest
technology and it paved the way to new innovations.

25. In 1956 John McCarthy who was regarded as the father of AI, organized a conference
to draw the talent and expertise of others interested in machine intelligence for a month of
brainstorming. He invited them to Vermont for "The Dartmouth summer research project on
artificial intelligence" and from there on the field was known as Artificial intelligence.
Further, the Dartmouth conference brought the founders in AI and served to lay the
groundwork for the present AI researchers.

26. Seven years after the conference, AI began to pick up momentum. Although the field
was still undefined, ideas formed at the conference were re-examined and built upon. AI
research was placed upon creating systems that could efficiently solve problems and secondly
making systems that could learn by themselves. In 1957 the first version of a new
5

RESTRICTED
RESTRICTED

programme The General Problem Solver (GPS) was tested. While more programmes were
being produced, McCarthy was busy developing a major breakthrough in AI history. In 1958
McCarthy announced his new development, the Locator/identifier separation protocol (LISP)
language, which is still in use. In 1963 Massachusetts Institute of Technology (MIT) received
a 2.2 million dollar grant from the United States government to be used in researching
Machine-Aided Cognition (artificial intelligence). The grant by the Department of Defense's
Advanced research projects Agency was given to ensure that the United States would stay
ahead of the Soviet Union in technological advancements.

27. The project served to increase the pace of development in AI research, by drawing
computer scientists from around the world and continuing funding. Because of the large
storage capacity of computers at the time, expert systems had the potential to interpret
statistics to formulate rules and applications in the market place which were extensive over
the course of ten years. Further, expert systems had been introduced to forecast the stock
market, aiding doctors with the ability to diagnose disease and instruct miners to promising
mineral locations. These systems were created due to the ability of the system to store
conditional rules and facility to store information.

28. During the 1970's many new methods in the development of AI were tested. David
Marr proposed new theories about machine vision. As an example: how a machine would be
possible to distinguish an image based on the shading of an image, basic information on
shapes, colour, edges and texture. During the 1980's AI was moving at faster pace and further
into the corporate sector. In 1986, United States sales of AI-related hardware and software
surged to $425 million. In 1990's AI was in a rapid development and AI applications were
used to a greater success (Hubert, 1988; Stuart 1988) such as;

a. Automatic scheduling software to automatically create better project schedules


faster.

b. The software which connect the teacher and student very politely.

c. The convertor of language and quickly convert in to another languages in


format of vocal.

RESTRICTED
RESTRICTED

d. Software which manage details and giving details automatically when we


wanted.

e. Face-recognition systems.

f. Washing machines that automatically adjust to different conditions to wash


clothes better.

g. Automatic mortgage underwriting systems.

h. Automatic investment decision makers.

j. Software that improves knowledge on decision making.

k. Credit fraud detection systems.

l. Help desk support systems that help find the right answer to any customer's
question faster.

m. Shopping bots on the web.

n. Data mining tools.

o. E-mail filters.

p. Automated advice systems that personalize their responses.

RESTRICTED
RESTRICTED

CHAPTER THREE

HYPOTHESIS DEVELOPMENT

“Will future combat systems neglect the moral aspect of warfare?”

29. In the previous chapter we got so many data from resources and they were gathered
by applying methodology and we were able to gain specific information. The information is
relevant to establish the relationship between variables.

30. The manner in which the military commanders and soldiers operate and coordinate
with future AI systems will redesign the “intelligence cycle” as discussed above and with far
greater autonomy over defense intelligent cycle, AI combat systems will endanger the human
life (Bowcott, 2012).

31. We should first begin by asking what is meant by moral aspect or ethical behavior.
Professor Christopher Coker suggests that: Moral thought is deeply concerned with the
systematic examination of the relations of human beings to each other. Ethics is concerned
with how we should conduct relations with others. When codified by the state they become
laws. The aim of war, Clausewitz argued, is to persuade the enemy that he has been defeated.

32. Thus, it follows that the more ethically we can conduct our warfare and the treatment
of prisoners of war (PWO) and civilians, the smoother the process of concluding war might
become. The British Defence Vision is to be 'A Force for Good in the World'. Underpinning
the vision are the international Law of Armed Conflict (LOAC) and the Single Services' lists
of Core Values and Standards. The 'just war' principles define just cause for war and just
conduct during war:

a. Just cause, right intention, proportionality, hope for success, last resort.

b. Careful choice of targets and objectives, military urgency to prevent a worse


occurrence and humanity.

RESTRICTED
RESTRICTED

METHOD OF HYPOTHESIS DEVELOPMENT

33. After the literature review basically we identified following Three (3) variables which
directly affect the research question and these variables are more or less qualitative in nature
where as comparative analysis is the best way to measure them.

a. Level of autonomy of the future combat systems[X1].

b. Security vulnerability of the AI systems [X2].

c. Competence and the experience of the Unmanned system controller[X3].

34. We took the “possibility of neglecting the moral aspect”[Y] as dependent variable
whereas following variables were considered as independent.

35. Level of autonomy of the future combat systems[X1]. “Autonomy” means the
freedom of machinery to act independently or self-governing of particular system. We have
found several combat systems and weapons with different levels of autonomy. The degree of
human involvement has been the diminishing factor in ongoing research and development
process of future weaponries and it further described as follows:

a. Automation has nearly always been welcomed by operators because of the


increase in system effectiveness and reliability it offers. Removing humans from the
decision-making cycle can improve performance and allow them to concentrate on
other tasks. Human reaction time is typically 400 milliseconds whereas a machine can
respond in a few nanoseconds. The potential military advantages of autonomy are
obvious, especially if the machine has learning abilities. It is also expected that, with
the right level of programming, unmanned systems will provide increased precision
and therefore reduce collateral damage.

b. There are, nevertheless, several arguments for maintaining human oversight.


Many saw a 'man in the loop' as essential for unmanned systems to work properly, let
alone ethically.

RESTRICTED
RESTRICTED

c. It was suggested that robots are being brought into service because they are
cheaper than manned vehicles. Furthermore they remove the concern about self-
defence because there is no human on board. As a consequence their use will be more
ethical because there will be less risk to humans. Unfortunately, the cost of producing
some of the more advanced unmanned vehicles would prohibit exploitation of this
advantage.

d. The use of UAVs by Special Forces and intelligence agencies has also caused
problems. Special Forces flying operations are generally covert. Such activity could
cause mid-air collisions and generate interference on frequencies designated for other
operations.

e. When we critically analyse the outcome of the interviews and questionnaires,


majority believe that Autonomous combat systems are detrimental, but some people
who were from technological background, gave a reasonable attitude over AI
involvement in warfare. Some were optimistic about the future and thought that, with
the development of rational machineries, we would be able to build moral agents
which can be embedded in to future combat systems.

f. So it is clear that the degree of autonomy[x1] may uphold the moral aspect and
sometimes may negate it. So there is direct proportionate as well as indirect
proportionate relationship between variables.

g. If possibility of neglecting the moral aspect = Y

Y α X1 and Y α 1/X1

36. Security Vulnerability of the AI Systems [X2]. The computer age has brought into
existence another environment in which hostilities can be conducted. The dependence of
modern societies and of their armed forces on computer systems renders such systems prime
objects of attack or a choice medium through which to target some linked object or person
and further described as follows:

10

RESTRICTED
RESTRICTED

a. Cyber operations can be taken to be military operations in which one computer


is used either to target another or to use that other computer as the conduit through
which injury or damage is caused to an opposing party to the conflict. Further, it is
elaborated deeply as follows:

(1). The use of any instrument, including a computer, to cause death,


injury, damage or destruction to another party to an armed conflict will cause
that instrument, or computer, to become a weapon or means of warfare.

(2). The damage or injury may be caused to the users of the targeted
computer system or the targeted system itself may be damaged; in either case
causing the cyber operation to be regarded as a cyber attack.

b. Further, the critical issue for the purposes of the unmanned combat system,
however, that the operation may be initiated a considerable distance in both space and
time from the place and time, where and when, the damaging consequences are
intended to occur.

c. It is important to mention here about 9/11 attack which was carried out with
hijacking manned passenger air craft which involved high physical commitment in
terrorist's point of view. What will happen if they hacked an unmanned drone with
sophisticated missiles?

d. So security vulnerability of the AI systems [X2] have direct proportionate


relationship with possibility of neglecting the moral aspect [Y].

Therefore Y α X2

37. Competence and the experience of the Unmanned system controller[X3]. This is
having indirect proportionate relationship with the possibility of neglecting the moral aspect
[Y].
Y α 1/X3

11

RESTRICTED
RESTRICTED

CHAPTER FOUR

RESEARCH METHODOLOGY

38. This chapter reviews the approach used to determine the current technology available
in the areas of artificial intelligence and expert computer systems as they relate to the military
throughout the globe. This chapter will discuss the research methodology used to determine
the role warfare played in the evolution of AI systems.

INFORMATION SOURCES

39. The basic approach to this research began with a literary search for current material.
The research then evolved into an online search for the current status of development of
artificial intelligence and expert systems within the military and civilian communities.

RESEARCH TOOLS

40. We have developed a hypothesis on our research, based on written documents, the
reason being, as per our topic, we can only imagine the things we should care about in
relation to the future warfare with the use of artificial intelligence. As students who are
related to military, we should face problems which are related to warfare and we were always
familiar with military equipment. So we should have to have a good knowledge on Artificial
intelligence and also future warfare. Though there is a shortage of readings, we read and
continue this research on our basic theories.

12

RESTRICTED
RESTRICTED

CHAPTER FIVE

THE LATEST USE OF ARTIFICIAL INTELLIGENCE


IN WARFARE

SYSTEMS

41. There is some machinery which has the latest technology and in our research we have
gone through it. Most of them are related to the military and they use Artificial Intelligence
technology highly. We want to continue this study with latest equipment and always we get
the things which are related to the military. We saw in our study that the use of artificial
intelligence in machines of mostly around 70% is for military purposes.

42. During our research we managed to gather some details from using internet, but
during the study we also found that some countries are not displaying their newest their
technology to another. However, following machines are the world’s latest machines which
were made to give a contribution to future warfare.

a. Unattended Ground Sensors (UGS)

Figure 4.1. Unattended Ground Sensor (UGS)

(1) Unattended Ground Sensor (UGS) is containing with facility to detect


chemical or radioactive materials while providing links in communications

13

RESTRICTED
RESTRICTED

chains to spot targets for other units to fire upon and to assist in crowd control
by directing people to head in a certain direction.

(2) Hence, it has the ability to remotely switched on and off in order to
allow friendly troops to move through the area. (Humphrey, 2000; Watts,
2000)

b. Non-line of Sight Launch System (NLOS-LS)

Figure 4.2 Non-line of Sight Launch System

(1) Non-line of Sight Launch System (NLOS-LS) is consisting with a


system computer and reliable communication system in order to connect to the
network of fifteen missiles at once.

(2) Soldiers can direct the missile even after launching and can give
instructions remotely for further modified targets though it is in the air.

14

RESTRICTED
RESTRICTED

c. Intelligent Munitions System

Figure 4.3: Intelligent Munitions System

(1) This robotic unit will be deployed to an area to guard it with


suppressive weapons.

(2) This will aid in troop dispersion, help organize battlefields and force
enemy troops into desired positions.

d. Unmanned Aerial Vehicles. There are several classes and various


machineries related to Unmanned Aerial Vehicles(UAV). Following details are
consisting on the details of technical data of the various machineries of UAV.

(1) The Class I UAV will weigh less than 15 pounds, take off and land
vertically, and provide intelligence, surveillance and communications relay
functions. It will be remote-controlled and portable.

(2) The Class II UAV supports the Infantry and Mounted Combat System
Company Commanders with reconnaissance, security/early warning, target
acquisition and designation.

(3) The Class III UAV will look like a small, simplified airplane. It will
take off and land without a dedicated airfield and fly longer and farther than
Class I and II UAVs.

15

RESTRICTED
RESTRICTED

(4) Class IV will be an unmanned helicopter that can stay in the air and
provide surveillance over an area of 47 miles (75 km) for up to 24 hours.

d. Armed Robotic Vehicle (ARV)

(1) One of the most revolutionary aspects of FCS is the adoption of these
robotic tanks. These units will be controlled remotely and provide many of the
functions of a manned tank unit.

(2) Further these will offer support for troops with direct fire, anti-tank fire
and over-watch fire. ARVs will also increase troop dispersion.

e. Small Unmanned Ground Vehicle (SUGV)

(1) These units were key equipments which utilized in Iraq.

(2) Militaries already did a significant study to create SUGV’s capable of


explosive disposal and urban reconnaissance and to create a future version
which has offensive capabilities.

f. Multifunctional Utility/Logistics and Equipment (MULE)

(1) This two-and-a-half ton truck will be able to operate via remote control
or as a slave unit following a controlled vehicle in front of it.

(2) In addition to hauling equipment, the MULE will have a mine-


sweeping configuration and an armed light assault configuration.

g. Mounted Combat System (MCS)

(1) The MCS is probably the most important piece of hardware in Future
Combat System considering to other developments.

16

RESTRICTED
RESTRICTED

(2) It was planned to replace the main battle tanks with MCS while
maintaining a comparable survivability rate by using speed, situational
awareness and an extremely long range 120-mm weapon to avoid close-up
confrontations.

(3) It is planned to reduce the weight to 20-tons in order to transport by


using C-130 aircrafts.

h. Infantry Carrier Vehicle (ICV). It is a vehicle handling by crew of two and


have the capability of transport nine additional soldiers to the battlefield. It will carry
all of their equipment, provide a link to the network and protect itself with a 40-mm
weapon.

j. Non-Line-of-Sight Cannon (NLOS-C). This vehicle will be a mobile long-


range artillery unit.

k. Non-Line-of-Sight Mortar (NLOS-M). This vehicle is similar to the NLOS-


C, but it will use a mortar as a weapon instead of a long-range cannon. This will give
it the ability to provide close support for infantry and use precision rounds to destroy
highly dangerous targets.

l. Reconnaissance and Surveillance Vehicle (RSV). The RSV is a high-tech


scout equipped with a host of sensors, radio frequency interceptors, chemical
detectors and communications link-ups.

m. Command and Control Vehicle (C2V). The C2V is the mobile field
headquarters unit for military commanders. This vehicle offers all the network
connections and information analysis tools that field leaders need to make command
decisions on the fly.

17

RESTRICTED
RESTRICTED

n. Medical Vehicle Treatment (MV-T) and Evacuation (MV-E). These


vehicles will allow medical personnel and trauma specialists to move with combat
units, placing them closer to the battle and allowing them to treat wounded soldiers
quickly and evacuate them safely.

o. FCS Recovery and Maintenance Vehicle (FRMV). FRMVs will primarily


carry repair and maintenance crews. They also have a limited capability to recover
damaged equipment and crews from the battlefield.

p. Space Weapon or Satellite Mounted Weapons. Space weapons are


weapons used in space warfare. They include weapons that can attack space systems
in orbit to attack targets on the earth from space or disable missiles travelling through
space. In the course of the militarisation of space, such weapons were developed
mainly by the contesting superpowers during the Cold War and some remain under
development today.

18

RESTRICTED
RESTRICTED

CHAPTER SIX

DO WE NEED ARTIFICIAL INTELLIGENCE FOR


WARFARE?

43. “I'm not against autonomous robots—my vacuum is an autonomous robot," says Noel
Sharkey, a professor of artificial intelligence and robotics at the University of Sheffield and
chair of the International Committee for Robot Arms Control (and a fixture on British
television). "We are simply calling for a prohibition on the kill function on such robots. A
robot doesn’t have moral agency, and can't be held accountable for crimes. There's no way to
punish a robot.”

44. The real-life equivalent of Isaac Asimov's Three Laws of Robotics (which posits that
robots may not harm humans, even if they are instructed to do so) is, like killer-robot
technology itself, a ways off. In April, the United Nations released a report that
recommended suspending the development of autonomous weapons until their function and
application is discussed more thoroughly. Last December, the US Department of Defense
issued a directive on weapon systems autonomy, calling for the establishment of "guidelines
designed to minimize the probability and consequences of failures in autonomous and semi-
autonomous weapon systems that could lead to unintended engagements.”

45. Though the Pentagon document stresses the need for human supervision of military
robots, critics claim it leaves the door open for the development of autonomous lethal robots
that aren't accountable to meaningful human oversight. "We already don't understand
Microsoft Windows; we're certainly not going to understand something as complex as a
humanlike intelligence," says Mark Gubrud, a research associate working on robotic and
space weapons arms control at Princeton. "Why would we create something like that and then
arm it?" Killer robot foes also note that, according to the Pentagon directive, it only takes
signatures from two department undersecretaries and the chair of the Joint Chiefs of Staff to
green-light the development and use of lethal autonomous technology that targets humans.

19

RESTRICTED
RESTRICTED

46. Militaries and contractors are already working on combat systems that surpass our
current fleet of killer drones by requiring less human control. The US Navy commissioned
Northrop Grumman's X-47B (as yet unarmed) to demonstrate the takeoff and landing
capabilities of autonomous unmanned aircraft. Researchers at Carnegie Mellon University
have developed a truck like combat vehicle called the "Crusher," designed for fire support by
the Defense Advanced Research Projects Agency. The $220 million “Taranis” warplane,
developed by BAE Systems for the United Kingdom, could one day conduct fully
autonomous intercontinental missions. And China has been developing its Invisible Sword
unmanned stealth aircraft for years.

47. Yet the technology required for to make an advanced fighting robot is still far from
complete. "Our vision and sensing systems on robots are not that good," Sharkey says. "They
might be able to tell difference between a human and a car, but they can be fooled by a statue
or a dog dancing on its hind legs, even." Experts also say that the technology is nowhere near
being able to make crucial distinctions between combatants and noncombatants—in other
words, whom it's okay to kill.

48. This technological uncertainty has caused some experts to think a preemptive
injunction on warbot development is misguided. "We are making legal arguments based
entirely on speculation," says Michael Schmitt, chairman of the international law department
at the US Naval War College. (Schmitt, recently planned a workshop on the legal issues
surrounding killer robots, but sequestration has delayed it.) "Do I have my concerns? Of
course. But these systems have not been fielded on the battlefield, nor are they in active
development in the US.”

49. Schmitt argues that existing international law would keep the use of robots from
spiraling into a sci-fi nightmare. "If such a system cannot discriminate between civilians and
enemy combatants in an environment, then it is therefore unlawful," he explains. "No one is
talking about a George Jetson-type scenario. What we are talking about is going to a field
commander and saying, 'Here's another system, like a drone, or a frigate, or an F-17.' If I
were a commander, I would know what laws there are, and in what situation I can use it.”

20

RESTRICTED
RESTRICTED

50. Another side of the debate is over whether killer robots would reduce or increase
civilian casualties. The Department of Defense has been funding the research of Georgia
Tech roboticist, Ronald Arkin, who seeks to design a software system, or "ethical governor,"
that will ensure robots adhere to international rules of war. He's argued that machines will be
more effective fighters than humans. "My friends who served in Vietnam told me that they
fired—when they were in a free-fire zone—at anything that moved," Arkin recently told the
New York Times. "I think we can design intelligent, lethal, autonomous systems that can
potentially do better than that, because if a robot commits a war crime, who's responsible for
it?”

51. Creating an artificial intelligence that could act upon just-war principles or the idea
that civilian casualties should be minimized would involve elaborate programming. "That's
kind of what we're worried about," says George Lucas, Jr., a professor of ethics and public
policy at the Naval Postgraduate School who has worked with Arkin. "Those extraordinarily
complex algorithmical systems, they may operate fine 99% of the time, but every once and a
while they go nuts." If armed robots are eventually deployed, Lucas says they should be
limited to simple and very tightly scripted scenarios, like protecting a no-go zone around a
vessel at sea. In a counterinsurgency setting, the sheer number of complicated variables
determining who's an enemy, ally, or noncombatant might overwhelm a robot's capabilities.

21

RESTRICTED
RESTRICTED

CHAPTER SEVEN

RECOMMENDATIONS

52. After our research we have formulated so many recommendations on the question of
“Will future combat systems neglect the moral aspect of warfare?” Here we are discussing
the measures which we have to take for this issue in question. It is a timely topic not only for
our country but also for the whole world.

a. Establish codes of conduct, ethics and practice defining responsible behavior


with respect to “Autonomous Combat Systems” in accordance with IHL and IHRL, or
strengthen existing ones while all the countries who use AI technologies in Warfare
must work under that Legal framework.

b. Take necessary steps to stop the proliferation of Autonomous Combat Systems


in to non-state actors.

c. Conduct researches to increase the level of accuracy of Autonomous Combat


Systems for the protection of civilians.

d. Fully autonomous combat systems must be prohibited and command


responsibility must always remain with a human.

e. Take all necessary steps to certify the security of the Autonomous Combat
Systems and their network.

f. Encourage the utilization of AI systems for reconciliation processes in post-


war scenarios.

g. All countries must get united and take necessary actions to make AI more
reliable and more secure with researches.

22

RESTRICTED
RESTRICTED

CHAPTER EIGHT

CONCLUSION

53. Utilization of Artificial intelligence in the modern warfare is a very pragmatic and
debatable issue which is considered in many national and international forums. At least once
a week we would be able to hear via media that US forces launching Drone7 strikes against
terrorists in the tribal areas of Pakistan, Yemen or Somalia. It is clear that such attacks took
the lives of more innocent civilians other than few terrorists. Not only US but also other
power players like Russia, China, UK, Japan and Israel use more sophisticated artificial
intelligence technologies for their military purposes.

54. As a country we defeated LTTE after three decades of war, but still some extremist
pro LTTE supporters have not given up their ambition to establish a separate state within Sri
Lankan territory. The Tamil Diaspora have made false allegations against the country and put
enormous pressure on international community to act against us. Such circumstances provide
fertile soil for some opportunistic countries and INGOS8 to intervene with the internal affairs
of the country.

55. Sri Lanka is a country which is situated near strategically important sea lanes that
transit the Indian Ocean. The emerging superpowers like China and India are our native
countries and prominent superiors of world arena have to fight with them to keep their status.
Indian subcontinent would become one of their potential battle fields. Apart from that, this
region becomes the labour-room for many brutal terrorist organizations. After 9/11
destruction, US with other NATO9 countries engages in massive warfare against terrorists in
front of our door-step10.

56. Under the United Nations Convention on the Law of the Sea (UNCLOS) Sri Lanka is
entitled to claim an extended area of seabed which is equivalent to 23 times of its land mass.
7
Unmanned aerial vehicles.(UAV)
8
International nongovernmental organizations
9
North Atlantic Treaty Organization, also called the Atlantic Alliance, is an intergovernmental military
alliance based on the North Atlantic Treaty which was signed on 4 April 1949
10
War against the terrorists in Afghanistan, Pakistan and Yemen.
23

RESTRICTED
RESTRICTED

This zone contains a variety of exploitable mineral oil and natural gas deposits and also it is
proved that “Manna Basin” in North-Western costal area of the country is nourished with oil
and natural gas11.

57. So it is obvious that as a nation we have a most crucial journey towards prosperity.
All the prominent power players are suffering from “Power-Hunger” and are seeking
potential opportunities. Sri Lanka is a hot-spot in their game plan. As a non-aligned country
we have to balance the conflicting interests of our friendly nations while protecting national
security and it must be our paramount consideration for our future prosperity. The
unremitting competition over the possession of limited resources has reached to unpredictable
and non controllable status. The definition and the subjects of national security have been
evolving rapidly. Today its scope has expanded. So a strategic plan for the protection of
natural recourses and potential opportunities, should be foremost in our future agenda.

58. Modes and methods of warfare have rapidly changed. The brain power took control
over the arms power. “Thinking machines” play a vital role in modern warfare. Basically it
protects the soldier’s life while ensuring the correct targets. Sometimes it creates ethical and
legal issues. Each power player is enthusiastic over AI technologies, due to its effectiveness.
So what would “future warfare”be like? Sometimes it may be a fully unmanned scenario or
you may not be able to demarcate human from robot with your naked eye since the gravity of
the present research works go up to that extent.

59. So what is the Sri Lankan perspective? That is the question that we get after basic
literature survey. How should we prepare today with regard to the threats and opportunities
tomorrow? We won’t survive in the future unless we address this issue.

11
Prof. Senarathne, R.(2013). “Lanka’s future prosperity lies in the sea”, Sunday Observer, 9th June
2013

24

RESTRICTED
RESTRICTED

60. Conducting a research under the theme “Artificial Intelligence and Future Warfare” is
an interesting project which gives great exposure for Officer Cadets as well as Day Scholars
of General Sir John Kotelawala Defence University.

25

RESTRICTED
RESTRICTED

REFERENCES
BOOKS

1. Staples, R. (1973) A Computer Perspective, (Harvard University press, Cambridge,


Mass), p. 12.

2. Hubert L., Stuart E. (1988) Mind over Machine, The Power of Human Intuition and
Expertise in the Era of the computer. p 63.

3. Humphrey, Watts S., (2000) Annals of the History of Computing, Springer-Verlang, p


137.

WEB SITES

1. J Masters, (2013) 'Targeted Killings', Council on Foreign Relations, Available:


http://www.cfr.org/counterterrorism/targeted-killings/p9627

2. 'The National Security Studies Programme(2013): Key Findings', New America


Foundation, Available: http://natsec.newamerica.net/

3. 'CIA Drones: (2013) Pentagon To Take Over Some Operations, Sources Say',
Reuters: Available: http://www.huffingtonpost.com/2013/05/21/cia-drones-pentagon_n_
3309739.html

4. O Bowcott, (2012 June) 'Drone strikes threaten 50 years of international law, says UN
rapporteur', The Guardian, Available: http://www.guardian.co.uk/world/2012/jun/21/d
rone-strikes-international-law-un

5. S Waterman, (2013 May) 'U.N. official: US claim for using drones viewed as invalid',
Washington Times, Available: http://www.washingtontimes.com/news/2013/may/14/un-
official-us-claim-for-using-drones-viewed-as-in

26

RESTRICTED
RESTRICTED

6. M Rusling, (2012 April) 'Legality of U.S. drone strikes in Pakistan increasingly under
scrutiny', Xinhua, Available: http://news.xinhuanet.com/english/world/2012-
04/20/c_131539011.html

7. J MacKenzie, (2011) 'Drone Wars: Is it legal?', GlobalPost, 10 October 2011:


Available:http://www.globalpost.com/dispatch/news/regions/asia-pacific/pakistan/110822/
drone-wars-legal-law-pakistan-yemen-al-qaeda

8. Sarah Kreps, John Kaag, (2013) 'The Use of Unmanned Aerial Vehicles in
Contemporary Conflict: A Legal and Ethical Analysis' Available: http://www.dw.de/who-
will-stop-the-drone-strikes/a-16870353

27

RESTRICTED

You might also like