SlideShare a Scribd company logo
1 of 27
Download to read offline
RESTRICTED
1
RESTRICTED
CHAPTER ONE
INTRODUCTION
1. The revolution and evolution of computers in both the military and non-military
communities have been incredible. The difficulty comes in deciding how best to use the
hardware and software available. This study will look at the evolution of computers from
their inception, through their first military uses, through their present day military uses, and
finally at possible future uses. This study will narrow the scope of the research to the
evaluation of artificial intelligence and expert computer systems only. This study will begin
by looking at the field of computers from a user oriented perspective. The information
provided will not break new ground on the technical aspects of hardware or software
engineering. Rather, it will review the beginnings of computers with specific attention paid to
those areas where the military has played a role. A major goal of this study is to identify
current applications of artificial intelligence and expert computer systems that are in the
process of research and development (Staples, 1973).
2. “Every aspect of learning or any other feature of intelligence can be so precisely
described that a machine can be made to simulate it” was the proposal included in the
Dartmouth Conference held at 1956 which was organized by two senior scientists named
Marvin Minsky, John McCarthy in order to create important programmes beneficial to the
country.. At the conference, McCarthy persuaded the attendees to accept “Artificial
Intelligence (AI)” as the name of this modern field and it is considered as the birth of AI.
3. The study will consider the overall system and not one particular peripheral in the
evaluation of these technologies. Intelligence and expert systems are discussed today in
greater anticipation and excitement in military and non-military communities with its
involvement in all communities. However, the key to progress of AI today, is steady and
constant research in both of these fields.
4. The Analytical Machine invented for calculating purposes was the initiation of the
new self functioning, human beneficial and effective technology. It is also the initiation of the
AI technology. Therefore, the machine created for statistic purposes was improved to a
RESTRICTED
2
RESTRICTED
Decision making autonomous system by Leonardo Torres in the early 1900 and it was a chess
playing machine. That self brained autonomous technology was developed with a mass
storage and converted to a computer system and created cyber technologies later on with a lot
of researches.
5. Since machines were taking the control of the day today human inputs with higher
efficiency and an effective manner, armies began to be more interested in these machines in
order to utilize them for beneficial functions. Therefore after succeeding from the application
usage in the World War I as a storage for information and as analyzers, they were
operationally used during the World War II by all vital activists. The development of the field
of AI bloomed with the invention of Nano technology.
6. The most important aspect is that the machines which use the AI technologies have
improvised the use the following Intelligence cycle (Figure 1.1) and during our research we
found that AI Technology use the AI Cycle(Figure1.2) which has two additional steps as
Decisions and Engagement /Execution. Most researches are ongoing with this new concept.
Always the scientists want to instill rationalism in AI machines. The latest theory was
established to make machines which possess rational thinking.
Figure 1.1: Intelligence Cycle
FIGURE 1.2: Artificial Intelligence Cycle
DIRECTION
COLLECTION
PROCESSING
DISSERMINATION
DIRECTION
COLLECTION
PROCESSING
DISSERMINATION
DECISION
ENGAGE/ EXECUTION
RESTRICTED
3
RESTRICTED
ASSUMPTIONS
7. Most details of this script consist of data which we collected by questionnaires and
also by referring books and the internet.
8. All data which we have obtained from books, internet and by collecting data by
giving questionnaires are only sources from which we gain the information.
PURPOSE OF THE THESIS
9. The purpose of this thesis is to develop a hypothesis with regard to creating AI which
is in line with International humanitarian law and Military law.
DEFINITION OF TERMS
10. Artificial Intelligence. The subfield of computer science that endeavors to develop
machines capable of performing functions normally associated with human intelligence, such
as reasoning, learning, and understanding human language.1
11. Expert System. A computer programme capable of considering a vast body of
knowledge, reasoning, and then recommending a course of action.2
12. Inference Engine. The component of an expert system that accesses, selects, and
executes previously programmed rules. Sometimes referred to as a rule interpreter.3
13. Knowledge Base. The part of an expert system that has declarative knowledge (facts)
and procedural knowledge (rules).4
1
Shipley, Chris. "Whatever Happened to AI?” PC Com Quitting, (March 1989):p.
2
Ibid.
3
Ibid.
4
Ibid.
RESTRICTED
4
RESTRICTED
14. LISP (LISt Processing Language). The programming language used most in the
United States for AI applications. LISP was developed in 1958; its name is derived from the
listing of symbols emblematic of procedural and declarative knowledge.5
15. Natural Language Processing. A subfield of AI whose goal is to develop an English
language interface for computer systems.6
SIGNIFICANCE OF THE STUDY
16. This thesis is based on a question and the question of this study is “Will future combat
systems neglect the moral aspect of warfare?”
REPORT OUTLINE
17. Chapter Two describes the literature survey pertaining to the Artificial Intelligence
and expert computer systems, Here we mention the background and the systems which were
used in previous years and what will be the future weaponry and also we give a brief review
on this subject.
18. Chapter four consists of Methodology adopted for this research with particular
techniques used to implement this methodology described later in this chapter.
19. Chapter Five explains how the researchers developed their Hypothesis.
20. In chapter six mentions how we concluded this study with Discussions and
Conclusion.
21. Chapter Seven includes the references of the sources used for this research.
5
Ibid.
6
Ibid.
RESTRICTED
5
RESTRICTED
CHAPTER TWO
LITERATURE REVIEW
22. Technology of AI became available to create machine intelligence due to the
development of the electronic computers since 1940’s. After that, the world began to go
through this subject and the people who were always involved in this matter wantes to do
researches and also wanted to make machines related to this subject. Theories and principles
developed and created in the term of Artificial Intelligence started from 1956 at the
Dartmouth conference and after about four 4 decades, there are now a variety of AI
programmes in the world which have a remarkable impact over other technological
advancements.
23. The technology of electronics gave a new path to AI. Electronics is the field which
has the ability to make an artificial machine which is having intelligence. Therefore a number
of scientists used this technology to control many systems without an order.
24. In early 1950’s Dr. Norbert Wainer was one of the first Americans to make
observations on the principle of feedback theory. This was a turning point of the latest
technology and it paved the way to new innovations.
25. In 1956 John McCarthy who was regarded as the father of AI, organized a conference
to draw the talent and expertise of others interested in machine intelligence for a month of
brainstorming. He invited them to Vermont for "The Dartmouth summer research project on
artificial intelligence" and from there on the field was known as Artificial intelligence.
Further, the Dartmouth conference brought the founders in AI and served to lay the
groundwork for the present AI researchers.
26. Seven years after the conference, AI began to pick up momentum. Although the field
was still undefined, ideas formed at the conference were re-examined and built upon. AI
research was placed upon creating systems that could efficiently solve problems and secondly
making systems that could learn by themselves. In 1957 the first version of a new
RESTRICTED
6
RESTRICTED
programme The General Problem Solver (GPS) was tested. While more programmes were
being produced, McCarthy was busy developing a major breakthrough in AI history. In 1958
McCarthy announced his new development, the Locator/identifier separation protocol (LISP)
language, which is still in use. In 1963 Massachusetts Institute of Technology (MIT) received
a 2.2 million dollar grant from the United States government to be used in researching
Machine-Aided Cognition (artificial intelligence). The grant by the Department of Defense's
Advanced research projects Agency was given to ensure that the United States would stay
ahead of the Soviet Union in technological advancements.
27. The project served to increase the pace of development in AI research, by drawing
computer scientists from around the world and continuing funding. Because of the large
storage capacity of computers at the time, expert systems had the potential to interpret
statistics to formulate rules and applications in the market place which were extensive over
the course of ten years. Further, expert systems had been introduced to forecast the stock
market, aiding doctors with the ability to diagnose disease and instruct miners to promising
mineral locations. These systems were created due to the ability of the system to store
conditional rules and facility to store information.
28. During the 1970's many new methods in the development of AI were tested. David
Marr proposed new theories about machine vision. As an example: how a machine would be
possible to distinguish an image based on the shading of an image, basic information on
shapes, colour, edges and texture. During the 1980's AI was moving at faster pace and further
into the corporate sector. In 1986, United States sales of AI-related hardware and software
surged to $425 million. In 1990's AI was in a rapid development and AI applications were
used to a greater success (Hubert, 1988; Stuart 1988) such as;
a. Automatic scheduling software to automatically create better project schedules
faster.
b. The software which connect the teacher and student very politely.
c. The convertor of language and quickly convert in to another languages in
format of vocal.
RESTRICTED
7
RESTRICTED
d. Software which manage details and giving details automatically when we
wanted.
e. Face-recognition systems.
f. Washing machines that automatically adjust to different conditions to wash
clothes better.
g. Automatic mortgage underwriting systems.
h. Automatic investment decision makers.
j. Software that improves knowledge on decision making.
k. Credit fraud detection systems.
l. Help desk support systems that help find the right answer to any customer's
question faster.
m. Shopping bots on the web.
n. Data mining tools.
o. E-mail filters.
p. Automated advice systems that personalize their responses.
RESTRICTED
8
RESTRICTED
CHAPTER THREE
HYPOTHESIS DEVELOPMENT
“Will future combat systems neglect the moral aspect of warfare?”
29. In the previous chapter we got so many data from resources and they were gathered
by applying methodology and we were able to gain specific information. The information is
relevant to establish the relationship between variables.
30. The manner in which the military commanders and soldiers operate and coordinate
with future AI systems will redesign the “intelligence cycle” as discussed above and with far
greater autonomy over defense intelligent cycle, AI combat systems will endanger the human
life (Bowcott, 2012).
31. We should first begin by asking what is meant by moral aspect or ethical behavior.
Professor Christopher Coker suggests that: Moral thought is deeply concerned with the
systematic examination of the relations of human beings to each other. Ethics is concerned
with how we should conduct relations with others. When codified by the state they become
laws. The aim of war, Clausewitz argued, is to persuade the enemy that he has been defeated.
32. Thus, it follows that the more ethically we can conduct our warfare and the treatment
of prisoners of war (PWO) and civilians, the smoother the process of concluding war might
become. The British Defence Vision is to be 'A Force for Good in the World'. Underpinning
the vision are the international Law of Armed Conflict (LOAC) and the Single Services' lists
of Core Values and Standards. The 'just war' principles define just cause for war and just
conduct during war:
a. Just cause, right intention, proportionality, hope for success, last resort.
b. Careful choice of targets and objectives, military urgency to prevent a worse
occurrence and humanity.
RESTRICTED
9
RESTRICTED
METHOD OF HYPOTHESIS DEVELOPMENT
33. After the literature review basically we identified following Three (3) variables which
directly affect the research question and these variables are more or less qualitative in nature
where as comparative analysis is the best way to measure them.
a. Level of autonomy of the future combat systems[X1].
b. Security vulnerability of the AI systems [X2].
c. Competence and the experience of the Unmanned system controller[X3].
34. We took the “possibility of neglecting the moral aspect”[Y] as dependent variable
whereas following variables were considered as independent.
35. Level of autonomy of the future combat systems[X1]. “Autonomy” means the
freedom of machinery to act independently or self-governing of particular system. We have
found several combat systems and weapons with different levels of autonomy. The degree of
human involvement has been the diminishing factor in ongoing research and development
process of future weaponries and it further described as follows:
a. Automation has nearly always been welcomed by operators because of the
increase in system effectiveness and reliability it offers. Removing humans from the
decision-making cycle can improve performance and allow them to concentrate on
other tasks. Human reaction time is typically 400 milliseconds whereas a machine can
respond in a few nanoseconds. The potential military advantages of autonomy are
obvious, especially if the machine has learning abilities. It is also expected that, with
the right level of programming, unmanned systems will provide increased precision
and therefore reduce collateral damage.
b. There are, nevertheless, several arguments for maintaining human oversight.
Many saw a 'man in the loop' as essential for unmanned systems to work properly, let
alone ethically.
RESTRICTED
10
RESTRICTED
c. It was suggested that robots are being brought into service because they are
cheaper than manned vehicles. Furthermore they remove the concern about self-
defence because there is no human on board. As a consequence their use will be more
ethical because there will be less risk to humans. Unfortunately, the cost of producing
some of the more advanced unmanned vehicles would prohibit exploitation of this
advantage.
d. The use of UAVs by Special Forces and intelligence agencies has also caused
problems. Special Forces flying operations are generally covert. Such activity could
cause mid-air collisions and generate interference on frequencies designated for other
operations.
e. When we critically analyse the outcome of the interviews and questionnaires,
majority believe that Autonomous combat systems are detrimental, but some people
who were from technological background, gave a reasonable attitude over AI
involvement in warfare. Some were optimistic about the future and thought that, with
the development of rational machineries, we would be able to build moral agents
which can be embedded in to future combat systems.
f. So it is clear that the degree of autonomy[x1] may uphold the moral aspect and
sometimes may negate it. So there is direct proportionate as well as indirect
proportionate relationship between variables.
g. If possibility of neglecting the moral aspect = Y
Y α X1 and Y α 1/X1
36. Security Vulnerability of the AI Systems [X2]. The computer age has brought into
existence another environment in which hostilities can be conducted. The dependence of
modern societies and of their armed forces on computer systems renders such systems prime
objects of attack or a choice medium through which to target some linked object or person
and further described as follows:
RESTRICTED
11
RESTRICTED
a. Cyber operations can be taken to be military operations in which one computer
is used either to target another or to use that other computer as the conduit through
which injury or damage is caused to an opposing party to the conflict. Further, it is
elaborated deeply as follows:
(1). The use of any instrument, including a computer, to cause death,
injury, damage or destruction to another party to an armed conflict will cause
that instrument, or computer, to become a weapon or means of warfare.
(2). The damage or injury may be caused to the users of the targeted
computer system or the targeted system itself may be damaged; in either case
causing the cyber operation to be regarded as a cyber attack.
b. Further, the critical issue for the purposes of the unmanned combat system,
however, that the operation may be initiated a considerable distance in both space and
time from the place and time, where and when, the damaging consequences are
intended to occur.
c. It is important to mention here about 9/11 attack which was carried out with
hijacking manned passenger air craft which involved high physical commitment in
terrorist's point of view. What will happen if they hacked an unmanned drone with
sophisticated missiles?
d. So security vulnerability of the AI systems [X2] have direct proportionate
relationship with possibility of neglecting the moral aspect [Y].
Therefore Y α X2
37. Competence and the experience of the Unmanned system controller[X3]. This is
having indirect proportionate relationship with the possibility of neglecting the moral aspect
[Y].
Y α 1/X3
RESTRICTED
12
RESTRICTED
CHAPTER FOUR
RESEARCH METHODOLOGY
38. This chapter reviews the approach used to determine the current technology available
in the areas of artificial intelligence and expert computer systems as they relate to the military
throughout the globe. This chapter will discuss the research methodology used to determine
the role warfare played in the evolution of AI systems.
INFORMATION SOURCES
39. The basic approach to this research began with a literary search for current material.
The research then evolved into an online search for the current status of development of
artificial intelligence and expert systems within the military and civilian communities.
RESEARCH TOOLS
40. We have developed a hypothesis on our research, based on written documents, the
reason being, as per our topic, we can only imagine the things we should care about in
relation to the future warfare with the use of artificial intelligence. As students who are
related to military, we should face problems which are related to warfare and we were always
familiar with military equipment. So we should have to have a good knowledge on Artificial
intelligence and also future warfare. Though there is a shortage of readings, we read and
continue this research on our basic theories.
RESTRICTED
13
RESTRICTED
CHAPTER FIVE
THE LATEST USE OF ARTIFICIAL INTELLIGENCE
IN WARFARE
SYSTEMS
41. There is some machinery which has the latest technology and in our research we have
gone through it. Most of them are related to the military and they use Artificial Intelligence
technology highly. We want to continue this study with latest equipment and always we get
the things which are related to the military. We saw in our study that the use of artificial
intelligence in machines of mostly around 70% is for military purposes.
42. During our research we managed to gather some details from using internet, but
during the study we also found that some countries are not displaying their newest their
technology to another. However, following machines are the world’s latest machines which
were made to give a contribution to future warfare.
a. Unattended Ground Sensors (UGS)
Figure 4.1. Unattended Ground Sensor (UGS)
(1) Unattended Ground Sensor (UGS) is containing with facility to detect
chemical or radioactive materials while providing links in communications
RESTRICTED
14
RESTRICTED
chains to spot targets for other units to fire upon and to assist in crowd control
by directing people to head in a certain direction.
(2) Hence, it has the ability to remotely switched on and off in order to
allow friendly troops to move through the area. (Humphrey, 2000; Watts,
2000)
b. Non-line of Sight Launch System (NLOS-LS)
Figure 4.2 Non-line of Sight Launch System
(1) Non-line of Sight Launch System (NLOS-LS) is consisting with a
system computer and reliable communication system in order to connect to the
network of fifteen missiles at once.
(2) Soldiers can direct the missile even after launching and can give
instructions remotely for further modified targets though it is in the air.
RESTRICTED
15
RESTRICTED
c. Intelligent Munitions System
Figure 4.3: Intelligent Munitions System
(1) This robotic unit will be deployed to an area to guard it with
suppressive weapons.
(2) This will aid in troop dispersion, help organize battlefields and force
enemy troops into desired positions.
d. Unmanned Aerial Vehicles. There are several classes and various
machineries related to Unmanned Aerial Vehicles(UAV). Following details are
consisting on the details of technical data of the various machineries of UAV.
(1) The Class I UAV will weigh less than 15 pounds, take off and land
vertically, and provide intelligence, surveillance and communications relay
functions. It will be remote-controlled and portable.
(2) The Class II UAV supports the Infantry and Mounted Combat System
Company Commanders with reconnaissance, security/early warning, target
acquisition and designation.
(3) The Class III UAV will look like a small, simplified airplane. It will
take off and land without a dedicated airfield and fly longer and farther than
Class I and II UAVs.
RESTRICTED
16
RESTRICTED
(4) Class IV will be an unmanned helicopter that can stay in the air and
provide surveillance over an area of 47 miles (75 km) for up to 24 hours.
d. Armed Robotic Vehicle (ARV)
(1) One of the most revolutionary aspects of FCS is the adoption of these
robotic tanks. These units will be controlled remotely and provide many of the
functions of a manned tank unit.
(2) Further these will offer support for troops with direct fire, anti-tank fire
and over-watch fire. ARVs will also increase troop dispersion.
e. Small Unmanned Ground Vehicle (SUGV)
(1) These units were key equipments which utilized in Iraq.
(2) Militaries already did a significant study to create SUGV’s capable of
explosive disposal and urban reconnaissance and to create a future version
which has offensive capabilities.
f. Multifunctional Utility/Logistics and Equipment (MULE)
(1) This two-and-a-half ton truck will be able to operate via remote control
or as a slave unit following a controlled vehicle in front of it.
(2) In addition to hauling equipment, the MULE will have a mine-
sweeping configuration and an armed light assault configuration.
g. Mounted Combat System (MCS)
(1) The MCS is probably the most important piece of hardware in Future
Combat System considering to other developments.
RESTRICTED
17
RESTRICTED
(2) It was planned to replace the main battle tanks with MCS while
maintaining a comparable survivability rate by using speed, situational
awareness and an extremely long range 120-mm weapon to avoid close-up
confrontations.
(3) It is planned to reduce the weight to 20-tons in order to transport by
using C-130 aircrafts.
h. Infantry Carrier Vehicle (ICV). It is a vehicle handling by crew of two and
have the capability of transport nine additional soldiers to the battlefield. It will carry
all of their equipment, provide a link to the network and protect itself with a 40-mm
weapon.
j. Non-Line-of-Sight Cannon (NLOS-C). This vehicle will be a mobile long-
range artillery unit.
k. Non-Line-of-Sight Mortar (NLOS-M). This vehicle is similar to the NLOS-
C, but it will use a mortar as a weapon instead of a long-range cannon. This will give
it the ability to provide close support for infantry and use precision rounds to destroy
highly dangerous targets.
l. Reconnaissance and Surveillance Vehicle (RSV). The RSV is a high-tech
scout equipped with a host of sensors, radio frequency interceptors, chemical
detectors and communications link-ups.
m. Command and Control Vehicle (C2V). The C2V is the mobile field
headquarters unit for military commanders. This vehicle offers all the network
connections and information analysis tools that field leaders need to make command
decisions on the fly.
RESTRICTED
18
RESTRICTED
n. Medical Vehicle Treatment (MV-T) and Evacuation (MV-E). These
vehicles will allow medical personnel and trauma specialists to move with combat
units, placing them closer to the battle and allowing them to treat wounded soldiers
quickly and evacuate them safely.
o. FCS Recovery and Maintenance Vehicle (FRMV). FRMVs will primarily
carry repair and maintenance crews. They also have a limited capability to recover
damaged equipment and crews from the battlefield.
p. Space Weapon or Satellite Mounted Weapons. Space weapons are
weapons used in space warfare. They include weapons that can attack space systems
in orbit to attack targets on the earth from space or disable missiles travelling through
space. In the course of the militarisation of space, such weapons were developed
mainly by the contesting superpowers during the Cold War and some remain under
development today.
RESTRICTED
19
RESTRICTED
CHAPTER SIX
DO WE NEED ARTIFICIAL INTELLIGENCE FOR
WARFARE?
43. “I'm not against autonomous robots—my vacuum is an autonomous robot," says Noel
Sharkey, a professor of artificial intelligence and robotics at the University of Sheffield and
chair of the International Committee for Robot Arms Control (and a fixture on British
television). "We are simply calling for a prohibition on the kill function on such robots. A
robot doesn’t have moral agency, and can't be held accountable for crimes. There's no way to
punish a robot.”
44. The real-life equivalent of Isaac Asimov's Three Laws of Robotics (which posits that
robots may not harm humans, even if they are instructed to do so) is, like killer-robot
technology itself, a ways off. In April, the United Nations released a report that
recommended suspending the development of autonomous weapons until their function and
application is discussed more thoroughly. Last December, the US Department of Defense
issued a directive on weapon systems autonomy, calling for the establishment of "guidelines
designed to minimize the probability and consequences of failures in autonomous and semi-
autonomous weapon systems that could lead to unintended engagements.”
45. Though the Pentagon document stresses the need for human supervision of military
robots, critics claim it leaves the door open for the development of autonomous lethal robots
that aren't accountable to meaningful human oversight. "We already don't understand
Microsoft Windows; we're certainly not going to understand something as complex as a
humanlike intelligence," says Mark Gubrud, a research associate working on robotic and
space weapons arms control at Princeton. "Why would we create something like that and then
arm it?" Killer robot foes also note that, according to the Pentagon directive, it only takes
signatures from two department undersecretaries and the chair of the Joint Chiefs of Staff to
green-light the development and use of lethal autonomous technology that targets humans.
RESTRICTED
20
RESTRICTED
46. Militaries and contractors are already working on combat systems that surpass our
current fleet of killer drones by requiring less human control. The US Navy commissioned
Northrop Grumman's X-47B (as yet unarmed) to demonstrate the takeoff and landing
capabilities of autonomous unmanned aircraft. Researchers at Carnegie Mellon University
have developed a truck like combat vehicle called the "Crusher," designed for fire support by
the Defense Advanced Research Projects Agency. The $220 million “Taranis” warplane,
developed by BAE Systems for the United Kingdom, could one day conduct fully
autonomous intercontinental missions. And China has been developing its Invisible Sword
unmanned stealth aircraft for years.
47. Yet the technology required for to make an advanced fighting robot is still far from
complete. "Our vision and sensing systems on robots are not that good," Sharkey says. "They
might be able to tell difference between a human and a car, but they can be fooled by a statue
or a dog dancing on its hind legs, even." Experts also say that the technology is nowhere near
being able to make crucial distinctions between combatants and noncombatants—in other
words, whom it's okay to kill.
48. This technological uncertainty has caused some experts to think a preemptive
injunction on warbot development is misguided. "We are making legal arguments based
entirely on speculation," says Michael Schmitt, chairman of the international law department
at the US Naval War College. (Schmitt, recently planned a workshop on the legal issues
surrounding killer robots, but sequestration has delayed it.) "Do I have my concerns? Of
course. But these systems have not been fielded on the battlefield, nor are they in active
development in the US.”
49. Schmitt argues that existing international law would keep the use of robots from
spiraling into a sci-fi nightmare. "If such a system cannot discriminate between civilians and
enemy combatants in an environment, then it is therefore unlawful," he explains. "No one is
talking about a George Jetson-type scenario. What we are talking about is going to a field
commander and saying, 'Here's another system, like a drone, or a frigate, or an F-17.' If I
were a commander, I would know what laws there are, and in what situation I can use it.”
RESTRICTED
21
RESTRICTED
50. Another side of the debate is over whether killer robots would reduce or increase
civilian casualties. The Department of Defense has been funding the research of Georgia
Tech roboticist, Ronald Arkin, who seeks to design a software system, or "ethical governor,"
that will ensure robots adhere to international rules of war. He's argued that machines will be
more effective fighters than humans. "My friends who served in Vietnam told me that they
fired—when they were in a free-fire zone—at anything that moved," Arkin recently told the
New York Times. "I think we can design intelligent, lethal, autonomous systems that can
potentially do better than that, because if a robot commits a war crime, who's responsible for
it?”
51. Creating an artificial intelligence that could act upon just-war principles or the idea
that civilian casualties should be minimized would involve elaborate programming. "That's
kind of what we're worried about," says George Lucas, Jr., a professor of ethics and public
policy at the Naval Postgraduate School who has worked with Arkin. "Those extraordinarily
complex algorithmical systems, they may operate fine 99% of the time, but every once and a
while they go nuts." If armed robots are eventually deployed, Lucas says they should be
limited to simple and very tightly scripted scenarios, like protecting a no-go zone around a
vessel at sea. In a counterinsurgency setting, the sheer number of complicated variables
determining who's an enemy, ally, or noncombatant might overwhelm a robot's capabilities.
RESTRICTED
22
RESTRICTED
CHAPTER SEVEN
RECOMMENDATIONS
52. After our research we have formulated so many recommendations on the question of
“Will future combat systems neglect the moral aspect of warfare?” Here we are discussing
the measures which we have to take for this issue in question. It is a timely topic not only for
our country but also for the whole world.
a. Establish codes of conduct, ethics and practice defining responsible behavior
with respect to “Autonomous Combat Systems” in accordance with IHL and IHRL, or
strengthen existing ones while all the countries who use AI technologies in Warfare
must work under that Legal framework.
b. Take necessary steps to stop the proliferation of Autonomous Combat Systems
in to non-state actors.
c. Conduct researches to increase the level of accuracy of Autonomous Combat
Systems for the protection of civilians.
d. Fully autonomous combat systems must be prohibited and command
responsibility must always remain with a human.
e. Take all necessary steps to certify the security of the Autonomous Combat
Systems and their network.
f. Encourage the utilization of AI systems for reconciliation processes in post-
war scenarios.
g. All countries must get united and take necessary actions to make AI more
reliable and more secure with researches.
RESTRICTED
23
RESTRICTED
CHAPTER EIGHT
CONCLUSION
53. Utilization of Artificial intelligence in the modern warfare is a very pragmatic and
debatable issue which is considered in many national and international forums. At least once
a week we would be able to hear via media that US forces launching Drone7
strikes against
terrorists in the tribal areas of Pakistan, Yemen or Somalia. It is clear that such attacks took
the lives of more innocent civilians other than few terrorists. Not only US but also other
power players like Russia, China, UK, Japan and Israel use more sophisticated artificial
intelligence technologies for their military purposes.
54. As a country we defeated LTTE after three decades of war, but still some extremist
pro LTTE supporters have not given up their ambition to establish a separate state within Sri
Lankan territory. The Tamil Diaspora have made false allegations against the country and put
enormous pressure on international community to act against us. Such circumstances provide
fertile soil for some opportunistic countries and INGOS8
to intervene with the internal affairs
of the country.
55. Sri Lanka is a country which is situated near strategically important sea lanes that
transit the Indian Ocean. The emerging superpowers like China and India are our native
countries and prominent superiors of world arena have to fight with them to keep their status.
Indian subcontinent would become one of their potential battle fields. Apart from that, this
region becomes the labour-room for many brutal terrorist organizations. After 9/11
destruction, US with other NATO9
countries engages in massive warfare against terrorists in
front of our door-step10
.
56. Under the United Nations Convention on the Law of the Sea (UNCLOS) Sri Lanka is
entitled to claim an extended area of seabed which is equivalent to 23 times of its land mass.
7
Unmanned aerial vehicles.(UAV)
8
International nongovernmental organizations
9
North Atlantic Treaty Organization, also called the Atlantic Alliance, is an intergovernmental military
alliance based on the North Atlantic Treaty which was signed on 4 April 1949
10
War against the terrorists in Afghanistan, Pakistan and Yemen.
RESTRICTED
24
RESTRICTED
This zone contains a variety of exploitable mineral oil and natural gas deposits and also it is
proved that “Manna Basin” in North-Western costal area of the country is nourished with oil
and natural gas11
.
57. So it is obvious that as a nation we have a most crucial journey towards prosperity.
All the prominent power players are suffering from “Power-Hunger” and are seeking
potential opportunities. Sri Lanka is a hot-spot in their game plan. As a non-aligned country
we have to balance the conflicting interests of our friendly nations while protecting national
security and it must be our paramount consideration for our future prosperity. The
unremitting competition over the possession of limited resources has reached to unpredictable
and non controllable status. The definition and the subjects of national security have been
evolving rapidly. Today its scope has expanded. So a strategic plan for the protection of
natural recourses and potential opportunities, should be foremost in our future agenda.
58. Modes and methods of warfare have rapidly changed. The brain power took control
over the arms power. “Thinking machines” play a vital role in modern warfare. Basically it
protects the soldier’s life while ensuring the correct targets. Sometimes it creates ethical and
legal issues. Each power player is enthusiastic over AI technologies, due to its effectiveness.
So what would “future warfare”be like? Sometimes it may be a fully unmanned scenario or
you may not be able to demarcate human from robot with your naked eye since the gravity of
the present research works go up to that extent.
59. So what is the Sri Lankan perspective? That is the question that we get after basic
literature survey. How should we prepare today with regard to the threats and opportunities
tomorrow? We won’t survive in the future unless we address this issue.
11
Prof. Senarathne, R.(2013). “Lanka’s future prosperity lies in the sea”, Sunday Observer, 9th
June
2013
RESTRICTED
25
RESTRICTED
60. Conducting a research under the theme “Artificial Intelligence and Future Warfare” is
an interesting project which gives great exposure for Officer Cadets as well as Day Scholars
of General Sir John Kotelawala Defence University.
RESTRICTED
26
RESTRICTED
REFERENCES
BOOKS
1. Staples, R. (1973) A Computer Perspective, (Harvard University press, Cambridge,
Mass), p. 12.
2. Hubert L., Stuart E. (1988) Mind over Machine, The Power of Human Intuition and
Expertise in the Era of the computer. p 63.
3. Humphrey, Watts S., (2000) Annals of the History of Computing, Springer-Verlang, p
137.
WEB SITES
1. J Masters, (2013) 'Targeted Killings', Council on Foreign Relations, Available:
http://www.cfr.org/counterterrorism/targeted-killings/p9627
2. 'The National Security Studies Programme(2013): Key Findings', New America
Foundation, Available: http://natsec.newamerica.net/
3. 'CIA Drones: (2013) Pentagon To Take Over Some Operations, Sources Say',
Reuters: Available: http://www.huffingtonpost.com/2013/05/21/cia-drones-pentagon_n_
3309739.html
4. O Bowcott, (2012 June) 'Drone strikes threaten 50 years of international law, says UN
rapporteur', The Guardian, Available: http://www.guardian.co.uk/world/2012/jun/21/d
rone-strikes-international-law-un
5. S Waterman, (2013 May) 'U.N. official: US claim for using drones viewed as invalid',
Washington Times, Available: http://www.washingtontimes.com/news/2013/may/14/un-
official-us-claim-for-using-drones-viewed-as-in
RESTRICTED
27
RESTRICTED
6. M Rusling, (2012 April) 'Legality of U.S. drone strikes in Pakistan increasingly under
scrutiny', Xinhua, Available: http://news.xinhuanet.com/english/world/2012-
04/20/c_131539011.html
7. J MacKenzie, (2011) 'Drone Wars: Is it legal?', GlobalPost, 10 October 2011:
Available:http://www.globalpost.com/dispatch/news/regions/asia-pacific/pakistan/110822/
drone-wars-legal-law-pakistan-yemen-al-qaeda
8. Sarah Kreps, John Kaag, (2013) 'The Use of Unmanned Aerial Vehicles in
Contemporary Conflict: A Legal and Ethical Analysis' Available: http://www.dw.de/who-
will-stop-the-drone-strikes/a-16870353

More Related Content

Similar to Artificial Intelligence And Future Warfare

artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligencevallibhargavi
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligencevallibhargavi
 
Artificial intelligence-full -report.doc
Artificial intelligence-full -report.docArtificial intelligence-full -report.doc
Artificial intelligence-full -report.docdaksh Talsaniya
 
AI Washington
AI Washington AI Washington
AI Washington OmGujar4
 
Dangers of Over-Reliance on AI in the Military
Dangers of Over-Reliance on AI in the MilitaryDangers of Over-Reliance on AI in the Military
Dangers of Over-Reliance on AI in the MilitaryJoe Hanson
 
ArtificialIntelligencein Automobiles.pdf
ArtificialIntelligencein Automobiles.pdfArtificialIntelligencein Automobiles.pdf
ArtificialIntelligencein Automobiles.pdfabhi49694969
 
Artificial intelligence nanni
Artificial intelligence nanniArtificial intelligence nanni
Artificial intelligence nannisominand
 
Management Information System
Management Information System Management Information System
Management Information System MEKUANINT ABERA
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceRishab Acharya
 
algorithme de recherche en intelligence artificielle
algorithme de recherche en intelligence artificiellealgorithme de recherche en intelligence artificielle
algorithme de recherche en intelligence artificielleSlimAmiri
 
Artificial intelligence .pptx
Artificial intelligence  .pptxArtificial intelligence  .pptx
Artificial intelligence .pptxroshanrathod50
 
Mahakal institute of technology
Mahakal institute of technologyMahakal institute of technology
Mahakal institute of technologyOman Jangir
 
2016 promise-of-ai
2016 promise-of-ai2016 promise-of-ai
2016 promise-of-aiMaxim Zhdanov
 
Future aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishekFuture aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishekEr. rahul abhishek
 
Artificial Intelligence - Past, Present and Future
Artificial Intelligence - Past, Present and FutureArtificial Intelligence - Past, Present and Future
Artificial Intelligence - Past, Present and FutureGrigory Sapunov
 
Cool current projects in AI
Cool current projects in AICool current projects in AI
Cool current projects in AIBibus Poudel
 
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Swapsg
 

Similar to Artificial Intelligence And Future Warfare (20)

artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
Artificial intelligence-full -report.doc
Artificial intelligence-full -report.docArtificial intelligence-full -report.doc
Artificial intelligence-full -report.doc
 
Artificial intelligence research
Artificial intelligence researchArtificial intelligence research
Artificial intelligence research
 
Artificial intelligence research
Artificial intelligence researchArtificial intelligence research
Artificial intelligence research
 
AI Washington
AI Washington AI Washington
AI Washington
 
AI_Lecture_1.pptx
AI_Lecture_1.pptxAI_Lecture_1.pptx
AI_Lecture_1.pptx
 
Dangers of Over-Reliance on AI in the Military
Dangers of Over-Reliance on AI in the MilitaryDangers of Over-Reliance on AI in the Military
Dangers of Over-Reliance on AI in the Military
 
ArtificialIntelligencein Automobiles.pdf
ArtificialIntelligencein Automobiles.pdfArtificialIntelligencein Automobiles.pdf
ArtificialIntelligencein Automobiles.pdf
 
Artificial intelligence nanni
Artificial intelligence nanniArtificial intelligence nanni
Artificial intelligence nanni
 
Management Information System
Management Information System Management Information System
Management Information System
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
algorithme de recherche en intelligence artificielle
algorithme de recherche en intelligence artificiellealgorithme de recherche en intelligence artificielle
algorithme de recherche en intelligence artificielle
 
Artificial intelligence .pptx
Artificial intelligence  .pptxArtificial intelligence  .pptx
Artificial intelligence .pptx
 
Mahakal institute of technology
Mahakal institute of technologyMahakal institute of technology
Mahakal institute of technology
 
2016 promise-of-ai
2016 promise-of-ai2016 promise-of-ai
2016 promise-of-ai
 
Future aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishekFuture aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishek
 
Artificial Intelligence - Past, Present and Future
Artificial Intelligence - Past, Present and FutureArtificial Intelligence - Past, Present and Future
Artificial Intelligence - Past, Present and Future
 
Cool current projects in AI
Cool current projects in AICool current projects in AI
Cool current projects in AI
 
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
 

More from Tony Lisko

Overcoming WriterS Block For Your College Essays Pers
Overcoming WriterS Block For Your College Essays PersOvercoming WriterS Block For Your College Essays Pers
Overcoming WriterS Block For Your College Essays PersTony Lisko
 
Compare And Contrast College And High School Es
Compare And Contrast College And High School EsCompare And Contrast College And High School Es
Compare And Contrast College And High School EsTony Lisko
 
Best Markers For Drawing, Doodling And Coloring
Best Markers For Drawing, Doodling And ColoringBest Markers For Drawing, Doodling And Coloring
Best Markers For Drawing, Doodling And ColoringTony Lisko
 
015 Essay Example Buy College Essays Online 1858
015 Essay Example Buy College Essays Online 1858015 Essay Example Buy College Essays Online 1858
015 Essay Example Buy College Essays Online 1858Tony Lisko
 
Technical Report Cover Page Template (6) - TEMP
Technical Report Cover Page Template (6) - TEMPTechnical Report Cover Page Template (6) - TEMP
Technical Report Cover Page Template (6) - TEMPTony Lisko
 
How To Manage Stress Essay Ilustrasi. Online assignment writing service.
How To Manage Stress Essay  Ilustrasi. Online assignment writing service.How To Manage Stress Essay  Ilustrasi. Online assignment writing service.
How To Manage Stress Essay Ilustrasi. Online assignment writing service.Tony Lisko
 
Lab Report Conclusion Te. Online assignment writing service.
Lab Report Conclusion Te. Online assignment writing service.Lab Report Conclusion Te. Online assignment writing service.
Lab Report Conclusion Te. Online assignment writing service.Tony Lisko
 
New Vision Learning Home. Online assignment writing service.
New Vision Learning  Home. Online assignment writing service.New Vision Learning  Home. Online assignment writing service.
New Vision Learning Home. Online assignment writing service.Tony Lisko
 
Essay Writing Topics For 6Th Graders. Online assignment writing service.
Essay Writing Topics For 6Th Graders. Online assignment writing service.Essay Writing Topics For 6Th Graders. Online assignment writing service.
Essay Writing Topics For 6Th Graders. Online assignment writing service.Tony Lisko
 
Personal And Educational Autobiography Essay Exa
Personal And Educational Autobiography Essay ExaPersonal And Educational Autobiography Essay Exa
Personal And Educational Autobiography Essay ExaTony Lisko
 
Free Printable Staff Paper Free Printable Staff Paper
Free Printable Staff Paper  Free Printable Staff PaperFree Printable Staff Paper  Free Printable Staff Paper
Free Printable Staff Paper Free Printable Staff PaperTony Lisko
 
Definition Essay Sample Term Paper Outline
Definition Essay Sample Term Paper OutlineDefinition Essay Sample Term Paper Outline
Definition Essay Sample Term Paper OutlineTony Lisko
 
College Essays About Music. College Essay About Musi
College Essays About Music. College Essay About MusiCollege Essays About Music. College Essay About Musi
College Essays About Music. College Essay About MusiTony Lisko
 
Newspaper Examples New. Online assignment writing service.
Newspaper Examples  New. Online assignment writing service.Newspaper Examples  New. Online assignment writing service.
Newspaper Examples New. Online assignment writing service.Tony Lisko
 
Memorable Vacation Free Essay Example. Online assignment writing service.
Memorable Vacation Free Essay Example. Online assignment writing service.Memorable Vacation Free Essay Example. Online assignment writing service.
Memorable Vacation Free Essay Example. Online assignment writing service.Tony Lisko
 
How To Write Report On Rese. Online assignment writing service.
How To Write Report On Rese. Online assignment writing service.How To Write Report On Rese. Online assignment writing service.
How To Write Report On Rese. Online assignment writing service.Tony Lisko
 
Autumn Trees Writing Paper. Online assignment writing service.
Autumn Trees Writing Paper. Online assignment writing service.Autumn Trees Writing Paper. Online assignment writing service.
Autumn Trees Writing Paper. Online assignment writing service.Tony Lisko
 
17 Thesis Statement Essay Examples Pics - Scholarship
17 Thesis Statement Essay Examples Pics - Scholarship17 Thesis Statement Essay Examples Pics - Scholarship
17 Thesis Statement Essay Examples Pics - ScholarshipTony Lisko
 
Free College Admission Application Letter Templates
Free College Admission Application Letter TemplatesFree College Admission Application Letter Templates
Free College Admission Application Letter TemplatesTony Lisko
 
Essay Writing Notes - The Oscillation Band
Essay Writing Notes - The Oscillation BandEssay Writing Notes - The Oscillation Band
Essay Writing Notes - The Oscillation BandTony Lisko
 

More from Tony Lisko (20)

Overcoming WriterS Block For Your College Essays Pers
Overcoming WriterS Block For Your College Essays PersOvercoming WriterS Block For Your College Essays Pers
Overcoming WriterS Block For Your College Essays Pers
 
Compare And Contrast College And High School Es
Compare And Contrast College And High School EsCompare And Contrast College And High School Es
Compare And Contrast College And High School Es
 
Best Markers For Drawing, Doodling And Coloring
Best Markers For Drawing, Doodling And ColoringBest Markers For Drawing, Doodling And Coloring
Best Markers For Drawing, Doodling And Coloring
 
015 Essay Example Buy College Essays Online 1858
015 Essay Example Buy College Essays Online 1858015 Essay Example Buy College Essays Online 1858
015 Essay Example Buy College Essays Online 1858
 
Technical Report Cover Page Template (6) - TEMP
Technical Report Cover Page Template (6) - TEMPTechnical Report Cover Page Template (6) - TEMP
Technical Report Cover Page Template (6) - TEMP
 
How To Manage Stress Essay Ilustrasi. Online assignment writing service.
How To Manage Stress Essay  Ilustrasi. Online assignment writing service.How To Manage Stress Essay  Ilustrasi. Online assignment writing service.
How To Manage Stress Essay Ilustrasi. Online assignment writing service.
 
Lab Report Conclusion Te. Online assignment writing service.
Lab Report Conclusion Te. Online assignment writing service.Lab Report Conclusion Te. Online assignment writing service.
Lab Report Conclusion Te. Online assignment writing service.
 
New Vision Learning Home. Online assignment writing service.
New Vision Learning  Home. Online assignment writing service.New Vision Learning  Home. Online assignment writing service.
New Vision Learning Home. Online assignment writing service.
 
Essay Writing Topics For 6Th Graders. Online assignment writing service.
Essay Writing Topics For 6Th Graders. Online assignment writing service.Essay Writing Topics For 6Th Graders. Online assignment writing service.
Essay Writing Topics For 6Th Graders. Online assignment writing service.
 
Personal And Educational Autobiography Essay Exa
Personal And Educational Autobiography Essay ExaPersonal And Educational Autobiography Essay Exa
Personal And Educational Autobiography Essay Exa
 
Free Printable Staff Paper Free Printable Staff Paper
Free Printable Staff Paper  Free Printable Staff PaperFree Printable Staff Paper  Free Printable Staff Paper
Free Printable Staff Paper Free Printable Staff Paper
 
Definition Essay Sample Term Paper Outline
Definition Essay Sample Term Paper OutlineDefinition Essay Sample Term Paper Outline
Definition Essay Sample Term Paper Outline
 
College Essays About Music. College Essay About Musi
College Essays About Music. College Essay About MusiCollege Essays About Music. College Essay About Musi
College Essays About Music. College Essay About Musi
 
Newspaper Examples New. Online assignment writing service.
Newspaper Examples  New. Online assignment writing service.Newspaper Examples  New. Online assignment writing service.
Newspaper Examples New. Online assignment writing service.
 
Memorable Vacation Free Essay Example. Online assignment writing service.
Memorable Vacation Free Essay Example. Online assignment writing service.Memorable Vacation Free Essay Example. Online assignment writing service.
Memorable Vacation Free Essay Example. Online assignment writing service.
 
How To Write Report On Rese. Online assignment writing service.
How To Write Report On Rese. Online assignment writing service.How To Write Report On Rese. Online assignment writing service.
How To Write Report On Rese. Online assignment writing service.
 
Autumn Trees Writing Paper. Online assignment writing service.
Autumn Trees Writing Paper. Online assignment writing service.Autumn Trees Writing Paper. Online assignment writing service.
Autumn Trees Writing Paper. Online assignment writing service.
 
17 Thesis Statement Essay Examples Pics - Scholarship
17 Thesis Statement Essay Examples Pics - Scholarship17 Thesis Statement Essay Examples Pics - Scholarship
17 Thesis Statement Essay Examples Pics - Scholarship
 
Free College Admission Application Letter Templates
Free College Admission Application Letter TemplatesFree College Admission Application Letter Templates
Free College Admission Application Letter Templates
 
Essay Writing Notes - The Oscillation Band
Essay Writing Notes - The Oscillation BandEssay Writing Notes - The Oscillation Band
Essay Writing Notes - The Oscillation Band
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Artificial Intelligence And Future Warfare

  • 1. RESTRICTED 1 RESTRICTED CHAPTER ONE INTRODUCTION 1. The revolution and evolution of computers in both the military and non-military communities have been incredible. The difficulty comes in deciding how best to use the hardware and software available. This study will look at the evolution of computers from their inception, through their first military uses, through their present day military uses, and finally at possible future uses. This study will narrow the scope of the research to the evaluation of artificial intelligence and expert computer systems only. This study will begin by looking at the field of computers from a user oriented perspective. The information provided will not break new ground on the technical aspects of hardware or software engineering. Rather, it will review the beginnings of computers with specific attention paid to those areas where the military has played a role. A major goal of this study is to identify current applications of artificial intelligence and expert computer systems that are in the process of research and development (Staples, 1973). 2. “Every aspect of learning or any other feature of intelligence can be so precisely described that a machine can be made to simulate it” was the proposal included in the Dartmouth Conference held at 1956 which was organized by two senior scientists named Marvin Minsky, John McCarthy in order to create important programmes beneficial to the country.. At the conference, McCarthy persuaded the attendees to accept “Artificial Intelligence (AI)” as the name of this modern field and it is considered as the birth of AI. 3. The study will consider the overall system and not one particular peripheral in the evaluation of these technologies. Intelligence and expert systems are discussed today in greater anticipation and excitement in military and non-military communities with its involvement in all communities. However, the key to progress of AI today, is steady and constant research in both of these fields. 4. The Analytical Machine invented for calculating purposes was the initiation of the new self functioning, human beneficial and effective technology. It is also the initiation of the AI technology. Therefore, the machine created for statistic purposes was improved to a
  • 2. RESTRICTED 2 RESTRICTED Decision making autonomous system by Leonardo Torres in the early 1900 and it was a chess playing machine. That self brained autonomous technology was developed with a mass storage and converted to a computer system and created cyber technologies later on with a lot of researches. 5. Since machines were taking the control of the day today human inputs with higher efficiency and an effective manner, armies began to be more interested in these machines in order to utilize them for beneficial functions. Therefore after succeeding from the application usage in the World War I as a storage for information and as analyzers, they were operationally used during the World War II by all vital activists. The development of the field of AI bloomed with the invention of Nano technology. 6. The most important aspect is that the machines which use the AI technologies have improvised the use the following Intelligence cycle (Figure 1.1) and during our research we found that AI Technology use the AI Cycle(Figure1.2) which has two additional steps as Decisions and Engagement /Execution. Most researches are ongoing with this new concept. Always the scientists want to instill rationalism in AI machines. The latest theory was established to make machines which possess rational thinking. Figure 1.1: Intelligence Cycle FIGURE 1.2: Artificial Intelligence Cycle DIRECTION COLLECTION PROCESSING DISSERMINATION DIRECTION COLLECTION PROCESSING DISSERMINATION DECISION ENGAGE/ EXECUTION
  • 3. RESTRICTED 3 RESTRICTED ASSUMPTIONS 7. Most details of this script consist of data which we collected by questionnaires and also by referring books and the internet. 8. All data which we have obtained from books, internet and by collecting data by giving questionnaires are only sources from which we gain the information. PURPOSE OF THE THESIS 9. The purpose of this thesis is to develop a hypothesis with regard to creating AI which is in line with International humanitarian law and Military law. DEFINITION OF TERMS 10. Artificial Intelligence. The subfield of computer science that endeavors to develop machines capable of performing functions normally associated with human intelligence, such as reasoning, learning, and understanding human language.1 11. Expert System. A computer programme capable of considering a vast body of knowledge, reasoning, and then recommending a course of action.2 12. Inference Engine. The component of an expert system that accesses, selects, and executes previously programmed rules. Sometimes referred to as a rule interpreter.3 13. Knowledge Base. The part of an expert system that has declarative knowledge (facts) and procedural knowledge (rules).4 1 Shipley, Chris. "Whatever Happened to AI?” PC Com Quitting, (March 1989):p. 2 Ibid. 3 Ibid. 4 Ibid.
  • 4. RESTRICTED 4 RESTRICTED 14. LISP (LISt Processing Language). The programming language used most in the United States for AI applications. LISP was developed in 1958; its name is derived from the listing of symbols emblematic of procedural and declarative knowledge.5 15. Natural Language Processing. A subfield of AI whose goal is to develop an English language interface for computer systems.6 SIGNIFICANCE OF THE STUDY 16. This thesis is based on a question and the question of this study is “Will future combat systems neglect the moral aspect of warfare?” REPORT OUTLINE 17. Chapter Two describes the literature survey pertaining to the Artificial Intelligence and expert computer systems, Here we mention the background and the systems which were used in previous years and what will be the future weaponry and also we give a brief review on this subject. 18. Chapter four consists of Methodology adopted for this research with particular techniques used to implement this methodology described later in this chapter. 19. Chapter Five explains how the researchers developed their Hypothesis. 20. In chapter six mentions how we concluded this study with Discussions and Conclusion. 21. Chapter Seven includes the references of the sources used for this research. 5 Ibid. 6 Ibid.
  • 5. RESTRICTED 5 RESTRICTED CHAPTER TWO LITERATURE REVIEW 22. Technology of AI became available to create machine intelligence due to the development of the electronic computers since 1940’s. After that, the world began to go through this subject and the people who were always involved in this matter wantes to do researches and also wanted to make machines related to this subject. Theories and principles developed and created in the term of Artificial Intelligence started from 1956 at the Dartmouth conference and after about four 4 decades, there are now a variety of AI programmes in the world which have a remarkable impact over other technological advancements. 23. The technology of electronics gave a new path to AI. Electronics is the field which has the ability to make an artificial machine which is having intelligence. Therefore a number of scientists used this technology to control many systems without an order. 24. In early 1950’s Dr. Norbert Wainer was one of the first Americans to make observations on the principle of feedback theory. This was a turning point of the latest technology and it paved the way to new innovations. 25. In 1956 John McCarthy who was regarded as the father of AI, organized a conference to draw the talent and expertise of others interested in machine intelligence for a month of brainstorming. He invited them to Vermont for "The Dartmouth summer research project on artificial intelligence" and from there on the field was known as Artificial intelligence. Further, the Dartmouth conference brought the founders in AI and served to lay the groundwork for the present AI researchers. 26. Seven years after the conference, AI began to pick up momentum. Although the field was still undefined, ideas formed at the conference were re-examined and built upon. AI research was placed upon creating systems that could efficiently solve problems and secondly making systems that could learn by themselves. In 1957 the first version of a new
  • 6. RESTRICTED 6 RESTRICTED programme The General Problem Solver (GPS) was tested. While more programmes were being produced, McCarthy was busy developing a major breakthrough in AI history. In 1958 McCarthy announced his new development, the Locator/identifier separation protocol (LISP) language, which is still in use. In 1963 Massachusetts Institute of Technology (MIT) received a 2.2 million dollar grant from the United States government to be used in researching Machine-Aided Cognition (artificial intelligence). The grant by the Department of Defense's Advanced research projects Agency was given to ensure that the United States would stay ahead of the Soviet Union in technological advancements. 27. The project served to increase the pace of development in AI research, by drawing computer scientists from around the world and continuing funding. Because of the large storage capacity of computers at the time, expert systems had the potential to interpret statistics to formulate rules and applications in the market place which were extensive over the course of ten years. Further, expert systems had been introduced to forecast the stock market, aiding doctors with the ability to diagnose disease and instruct miners to promising mineral locations. These systems were created due to the ability of the system to store conditional rules and facility to store information. 28. During the 1970's many new methods in the development of AI were tested. David Marr proposed new theories about machine vision. As an example: how a machine would be possible to distinguish an image based on the shading of an image, basic information on shapes, colour, edges and texture. During the 1980's AI was moving at faster pace and further into the corporate sector. In 1986, United States sales of AI-related hardware and software surged to $425 million. In 1990's AI was in a rapid development and AI applications were used to a greater success (Hubert, 1988; Stuart 1988) such as; a. Automatic scheduling software to automatically create better project schedules faster. b. The software which connect the teacher and student very politely. c. The convertor of language and quickly convert in to another languages in format of vocal.
  • 7. RESTRICTED 7 RESTRICTED d. Software which manage details and giving details automatically when we wanted. e. Face-recognition systems. f. Washing machines that automatically adjust to different conditions to wash clothes better. g. Automatic mortgage underwriting systems. h. Automatic investment decision makers. j. Software that improves knowledge on decision making. k. Credit fraud detection systems. l. Help desk support systems that help find the right answer to any customer's question faster. m. Shopping bots on the web. n. Data mining tools. o. E-mail filters. p. Automated advice systems that personalize their responses.
  • 8. RESTRICTED 8 RESTRICTED CHAPTER THREE HYPOTHESIS DEVELOPMENT “Will future combat systems neglect the moral aspect of warfare?” 29. In the previous chapter we got so many data from resources and they were gathered by applying methodology and we were able to gain specific information. The information is relevant to establish the relationship between variables. 30. The manner in which the military commanders and soldiers operate and coordinate with future AI systems will redesign the “intelligence cycle” as discussed above and with far greater autonomy over defense intelligent cycle, AI combat systems will endanger the human life (Bowcott, 2012). 31. We should first begin by asking what is meant by moral aspect or ethical behavior. Professor Christopher Coker suggests that: Moral thought is deeply concerned with the systematic examination of the relations of human beings to each other. Ethics is concerned with how we should conduct relations with others. When codified by the state they become laws. The aim of war, Clausewitz argued, is to persuade the enemy that he has been defeated. 32. Thus, it follows that the more ethically we can conduct our warfare and the treatment of prisoners of war (PWO) and civilians, the smoother the process of concluding war might become. The British Defence Vision is to be 'A Force for Good in the World'. Underpinning the vision are the international Law of Armed Conflict (LOAC) and the Single Services' lists of Core Values and Standards. The 'just war' principles define just cause for war and just conduct during war: a. Just cause, right intention, proportionality, hope for success, last resort. b. Careful choice of targets and objectives, military urgency to prevent a worse occurrence and humanity.
  • 9. RESTRICTED 9 RESTRICTED METHOD OF HYPOTHESIS DEVELOPMENT 33. After the literature review basically we identified following Three (3) variables which directly affect the research question and these variables are more or less qualitative in nature where as comparative analysis is the best way to measure them. a. Level of autonomy of the future combat systems[X1]. b. Security vulnerability of the AI systems [X2]. c. Competence and the experience of the Unmanned system controller[X3]. 34. We took the “possibility of neglecting the moral aspect”[Y] as dependent variable whereas following variables were considered as independent. 35. Level of autonomy of the future combat systems[X1]. “Autonomy” means the freedom of machinery to act independently or self-governing of particular system. We have found several combat systems and weapons with different levels of autonomy. The degree of human involvement has been the diminishing factor in ongoing research and development process of future weaponries and it further described as follows: a. Automation has nearly always been welcomed by operators because of the increase in system effectiveness and reliability it offers. Removing humans from the decision-making cycle can improve performance and allow them to concentrate on other tasks. Human reaction time is typically 400 milliseconds whereas a machine can respond in a few nanoseconds. The potential military advantages of autonomy are obvious, especially if the machine has learning abilities. It is also expected that, with the right level of programming, unmanned systems will provide increased precision and therefore reduce collateral damage. b. There are, nevertheless, several arguments for maintaining human oversight. Many saw a 'man in the loop' as essential for unmanned systems to work properly, let alone ethically.
  • 10. RESTRICTED 10 RESTRICTED c. It was suggested that robots are being brought into service because they are cheaper than manned vehicles. Furthermore they remove the concern about self- defence because there is no human on board. As a consequence their use will be more ethical because there will be less risk to humans. Unfortunately, the cost of producing some of the more advanced unmanned vehicles would prohibit exploitation of this advantage. d. The use of UAVs by Special Forces and intelligence agencies has also caused problems. Special Forces flying operations are generally covert. Such activity could cause mid-air collisions and generate interference on frequencies designated for other operations. e. When we critically analyse the outcome of the interviews and questionnaires, majority believe that Autonomous combat systems are detrimental, but some people who were from technological background, gave a reasonable attitude over AI involvement in warfare. Some were optimistic about the future and thought that, with the development of rational machineries, we would be able to build moral agents which can be embedded in to future combat systems. f. So it is clear that the degree of autonomy[x1] may uphold the moral aspect and sometimes may negate it. So there is direct proportionate as well as indirect proportionate relationship between variables. g. If possibility of neglecting the moral aspect = Y Y α X1 and Y α 1/X1 36. Security Vulnerability of the AI Systems [X2]. The computer age has brought into existence another environment in which hostilities can be conducted. The dependence of modern societies and of their armed forces on computer systems renders such systems prime objects of attack or a choice medium through which to target some linked object or person and further described as follows:
  • 11. RESTRICTED 11 RESTRICTED a. Cyber operations can be taken to be military operations in which one computer is used either to target another or to use that other computer as the conduit through which injury or damage is caused to an opposing party to the conflict. Further, it is elaborated deeply as follows: (1). The use of any instrument, including a computer, to cause death, injury, damage or destruction to another party to an armed conflict will cause that instrument, or computer, to become a weapon or means of warfare. (2). The damage or injury may be caused to the users of the targeted computer system or the targeted system itself may be damaged; in either case causing the cyber operation to be regarded as a cyber attack. b. Further, the critical issue for the purposes of the unmanned combat system, however, that the operation may be initiated a considerable distance in both space and time from the place and time, where and when, the damaging consequences are intended to occur. c. It is important to mention here about 9/11 attack which was carried out with hijacking manned passenger air craft which involved high physical commitment in terrorist's point of view. What will happen if they hacked an unmanned drone with sophisticated missiles? d. So security vulnerability of the AI systems [X2] have direct proportionate relationship with possibility of neglecting the moral aspect [Y]. Therefore Y α X2 37. Competence and the experience of the Unmanned system controller[X3]. This is having indirect proportionate relationship with the possibility of neglecting the moral aspect [Y]. Y α 1/X3
  • 12. RESTRICTED 12 RESTRICTED CHAPTER FOUR RESEARCH METHODOLOGY 38. This chapter reviews the approach used to determine the current technology available in the areas of artificial intelligence and expert computer systems as they relate to the military throughout the globe. This chapter will discuss the research methodology used to determine the role warfare played in the evolution of AI systems. INFORMATION SOURCES 39. The basic approach to this research began with a literary search for current material. The research then evolved into an online search for the current status of development of artificial intelligence and expert systems within the military and civilian communities. RESEARCH TOOLS 40. We have developed a hypothesis on our research, based on written documents, the reason being, as per our topic, we can only imagine the things we should care about in relation to the future warfare with the use of artificial intelligence. As students who are related to military, we should face problems which are related to warfare and we were always familiar with military equipment. So we should have to have a good knowledge on Artificial intelligence and also future warfare. Though there is a shortage of readings, we read and continue this research on our basic theories.
  • 13. RESTRICTED 13 RESTRICTED CHAPTER FIVE THE LATEST USE OF ARTIFICIAL INTELLIGENCE IN WARFARE SYSTEMS 41. There is some machinery which has the latest technology and in our research we have gone through it. Most of them are related to the military and they use Artificial Intelligence technology highly. We want to continue this study with latest equipment and always we get the things which are related to the military. We saw in our study that the use of artificial intelligence in machines of mostly around 70% is for military purposes. 42. During our research we managed to gather some details from using internet, but during the study we also found that some countries are not displaying their newest their technology to another. However, following machines are the world’s latest machines which were made to give a contribution to future warfare. a. Unattended Ground Sensors (UGS) Figure 4.1. Unattended Ground Sensor (UGS) (1) Unattended Ground Sensor (UGS) is containing with facility to detect chemical or radioactive materials while providing links in communications
  • 14. RESTRICTED 14 RESTRICTED chains to spot targets for other units to fire upon and to assist in crowd control by directing people to head in a certain direction. (2) Hence, it has the ability to remotely switched on and off in order to allow friendly troops to move through the area. (Humphrey, 2000; Watts, 2000) b. Non-line of Sight Launch System (NLOS-LS) Figure 4.2 Non-line of Sight Launch System (1) Non-line of Sight Launch System (NLOS-LS) is consisting with a system computer and reliable communication system in order to connect to the network of fifteen missiles at once. (2) Soldiers can direct the missile even after launching and can give instructions remotely for further modified targets though it is in the air.
  • 15. RESTRICTED 15 RESTRICTED c. Intelligent Munitions System Figure 4.3: Intelligent Munitions System (1) This robotic unit will be deployed to an area to guard it with suppressive weapons. (2) This will aid in troop dispersion, help organize battlefields and force enemy troops into desired positions. d. Unmanned Aerial Vehicles. There are several classes and various machineries related to Unmanned Aerial Vehicles(UAV). Following details are consisting on the details of technical data of the various machineries of UAV. (1) The Class I UAV will weigh less than 15 pounds, take off and land vertically, and provide intelligence, surveillance and communications relay functions. It will be remote-controlled and portable. (2) The Class II UAV supports the Infantry and Mounted Combat System Company Commanders with reconnaissance, security/early warning, target acquisition and designation. (3) The Class III UAV will look like a small, simplified airplane. It will take off and land without a dedicated airfield and fly longer and farther than Class I and II UAVs.
  • 16. RESTRICTED 16 RESTRICTED (4) Class IV will be an unmanned helicopter that can stay in the air and provide surveillance over an area of 47 miles (75 km) for up to 24 hours. d. Armed Robotic Vehicle (ARV) (1) One of the most revolutionary aspects of FCS is the adoption of these robotic tanks. These units will be controlled remotely and provide many of the functions of a manned tank unit. (2) Further these will offer support for troops with direct fire, anti-tank fire and over-watch fire. ARVs will also increase troop dispersion. e. Small Unmanned Ground Vehicle (SUGV) (1) These units were key equipments which utilized in Iraq. (2) Militaries already did a significant study to create SUGV’s capable of explosive disposal and urban reconnaissance and to create a future version which has offensive capabilities. f. Multifunctional Utility/Logistics and Equipment (MULE) (1) This two-and-a-half ton truck will be able to operate via remote control or as a slave unit following a controlled vehicle in front of it. (2) In addition to hauling equipment, the MULE will have a mine- sweeping configuration and an armed light assault configuration. g. Mounted Combat System (MCS) (1) The MCS is probably the most important piece of hardware in Future Combat System considering to other developments.
  • 17. RESTRICTED 17 RESTRICTED (2) It was planned to replace the main battle tanks with MCS while maintaining a comparable survivability rate by using speed, situational awareness and an extremely long range 120-mm weapon to avoid close-up confrontations. (3) It is planned to reduce the weight to 20-tons in order to transport by using C-130 aircrafts. h. Infantry Carrier Vehicle (ICV). It is a vehicle handling by crew of two and have the capability of transport nine additional soldiers to the battlefield. It will carry all of their equipment, provide a link to the network and protect itself with a 40-mm weapon. j. Non-Line-of-Sight Cannon (NLOS-C). This vehicle will be a mobile long- range artillery unit. k. Non-Line-of-Sight Mortar (NLOS-M). This vehicle is similar to the NLOS- C, but it will use a mortar as a weapon instead of a long-range cannon. This will give it the ability to provide close support for infantry and use precision rounds to destroy highly dangerous targets. l. Reconnaissance and Surveillance Vehicle (RSV). The RSV is a high-tech scout equipped with a host of sensors, radio frequency interceptors, chemical detectors and communications link-ups. m. Command and Control Vehicle (C2V). The C2V is the mobile field headquarters unit for military commanders. This vehicle offers all the network connections and information analysis tools that field leaders need to make command decisions on the fly.
  • 18. RESTRICTED 18 RESTRICTED n. Medical Vehicle Treatment (MV-T) and Evacuation (MV-E). These vehicles will allow medical personnel and trauma specialists to move with combat units, placing them closer to the battle and allowing them to treat wounded soldiers quickly and evacuate them safely. o. FCS Recovery and Maintenance Vehicle (FRMV). FRMVs will primarily carry repair and maintenance crews. They also have a limited capability to recover damaged equipment and crews from the battlefield. p. Space Weapon or Satellite Mounted Weapons. Space weapons are weapons used in space warfare. They include weapons that can attack space systems in orbit to attack targets on the earth from space or disable missiles travelling through space. In the course of the militarisation of space, such weapons were developed mainly by the contesting superpowers during the Cold War and some remain under development today.
  • 19. RESTRICTED 19 RESTRICTED CHAPTER SIX DO WE NEED ARTIFICIAL INTELLIGENCE FOR WARFARE? 43. “I'm not against autonomous robots—my vacuum is an autonomous robot," says Noel Sharkey, a professor of artificial intelligence and robotics at the University of Sheffield and chair of the International Committee for Robot Arms Control (and a fixture on British television). "We are simply calling for a prohibition on the kill function on such robots. A robot doesn’t have moral agency, and can't be held accountable for crimes. There's no way to punish a robot.” 44. The real-life equivalent of Isaac Asimov's Three Laws of Robotics (which posits that robots may not harm humans, even if they are instructed to do so) is, like killer-robot technology itself, a ways off. In April, the United Nations released a report that recommended suspending the development of autonomous weapons until their function and application is discussed more thoroughly. Last December, the US Department of Defense issued a directive on weapon systems autonomy, calling for the establishment of "guidelines designed to minimize the probability and consequences of failures in autonomous and semi- autonomous weapon systems that could lead to unintended engagements.” 45. Though the Pentagon document stresses the need for human supervision of military robots, critics claim it leaves the door open for the development of autonomous lethal robots that aren't accountable to meaningful human oversight. "We already don't understand Microsoft Windows; we're certainly not going to understand something as complex as a humanlike intelligence," says Mark Gubrud, a research associate working on robotic and space weapons arms control at Princeton. "Why would we create something like that and then arm it?" Killer robot foes also note that, according to the Pentagon directive, it only takes signatures from two department undersecretaries and the chair of the Joint Chiefs of Staff to green-light the development and use of lethal autonomous technology that targets humans.
  • 20. RESTRICTED 20 RESTRICTED 46. Militaries and contractors are already working on combat systems that surpass our current fleet of killer drones by requiring less human control. The US Navy commissioned Northrop Grumman's X-47B (as yet unarmed) to demonstrate the takeoff and landing capabilities of autonomous unmanned aircraft. Researchers at Carnegie Mellon University have developed a truck like combat vehicle called the "Crusher," designed for fire support by the Defense Advanced Research Projects Agency. The $220 million “Taranis” warplane, developed by BAE Systems for the United Kingdom, could one day conduct fully autonomous intercontinental missions. And China has been developing its Invisible Sword unmanned stealth aircraft for years. 47. Yet the technology required for to make an advanced fighting robot is still far from complete. "Our vision and sensing systems on robots are not that good," Sharkey says. "They might be able to tell difference between a human and a car, but they can be fooled by a statue or a dog dancing on its hind legs, even." Experts also say that the technology is nowhere near being able to make crucial distinctions between combatants and noncombatants—in other words, whom it's okay to kill. 48. This technological uncertainty has caused some experts to think a preemptive injunction on warbot development is misguided. "We are making legal arguments based entirely on speculation," says Michael Schmitt, chairman of the international law department at the US Naval War College. (Schmitt, recently planned a workshop on the legal issues surrounding killer robots, but sequestration has delayed it.) "Do I have my concerns? Of course. But these systems have not been fielded on the battlefield, nor are they in active development in the US.” 49. Schmitt argues that existing international law would keep the use of robots from spiraling into a sci-fi nightmare. "If such a system cannot discriminate between civilians and enemy combatants in an environment, then it is therefore unlawful," he explains. "No one is talking about a George Jetson-type scenario. What we are talking about is going to a field commander and saying, 'Here's another system, like a drone, or a frigate, or an F-17.' If I were a commander, I would know what laws there are, and in what situation I can use it.”
  • 21. RESTRICTED 21 RESTRICTED 50. Another side of the debate is over whether killer robots would reduce or increase civilian casualties. The Department of Defense has been funding the research of Georgia Tech roboticist, Ronald Arkin, who seeks to design a software system, or "ethical governor," that will ensure robots adhere to international rules of war. He's argued that machines will be more effective fighters than humans. "My friends who served in Vietnam told me that they fired—when they were in a free-fire zone—at anything that moved," Arkin recently told the New York Times. "I think we can design intelligent, lethal, autonomous systems that can potentially do better than that, because if a robot commits a war crime, who's responsible for it?” 51. Creating an artificial intelligence that could act upon just-war principles or the idea that civilian casualties should be minimized would involve elaborate programming. "That's kind of what we're worried about," says George Lucas, Jr., a professor of ethics and public policy at the Naval Postgraduate School who has worked with Arkin. "Those extraordinarily complex algorithmical systems, they may operate fine 99% of the time, but every once and a while they go nuts." If armed robots are eventually deployed, Lucas says they should be limited to simple and very tightly scripted scenarios, like protecting a no-go zone around a vessel at sea. In a counterinsurgency setting, the sheer number of complicated variables determining who's an enemy, ally, or noncombatant might overwhelm a robot's capabilities.
  • 22. RESTRICTED 22 RESTRICTED CHAPTER SEVEN RECOMMENDATIONS 52. After our research we have formulated so many recommendations on the question of “Will future combat systems neglect the moral aspect of warfare?” Here we are discussing the measures which we have to take for this issue in question. It is a timely topic not only for our country but also for the whole world. a. Establish codes of conduct, ethics and practice defining responsible behavior with respect to “Autonomous Combat Systems” in accordance with IHL and IHRL, or strengthen existing ones while all the countries who use AI technologies in Warfare must work under that Legal framework. b. Take necessary steps to stop the proliferation of Autonomous Combat Systems in to non-state actors. c. Conduct researches to increase the level of accuracy of Autonomous Combat Systems for the protection of civilians. d. Fully autonomous combat systems must be prohibited and command responsibility must always remain with a human. e. Take all necessary steps to certify the security of the Autonomous Combat Systems and their network. f. Encourage the utilization of AI systems for reconciliation processes in post- war scenarios. g. All countries must get united and take necessary actions to make AI more reliable and more secure with researches.
  • 23. RESTRICTED 23 RESTRICTED CHAPTER EIGHT CONCLUSION 53. Utilization of Artificial intelligence in the modern warfare is a very pragmatic and debatable issue which is considered in many national and international forums. At least once a week we would be able to hear via media that US forces launching Drone7 strikes against terrorists in the tribal areas of Pakistan, Yemen or Somalia. It is clear that such attacks took the lives of more innocent civilians other than few terrorists. Not only US but also other power players like Russia, China, UK, Japan and Israel use more sophisticated artificial intelligence technologies for their military purposes. 54. As a country we defeated LTTE after three decades of war, but still some extremist pro LTTE supporters have not given up their ambition to establish a separate state within Sri Lankan territory. The Tamil Diaspora have made false allegations against the country and put enormous pressure on international community to act against us. Such circumstances provide fertile soil for some opportunistic countries and INGOS8 to intervene with the internal affairs of the country. 55. Sri Lanka is a country which is situated near strategically important sea lanes that transit the Indian Ocean. The emerging superpowers like China and India are our native countries and prominent superiors of world arena have to fight with them to keep their status. Indian subcontinent would become one of their potential battle fields. Apart from that, this region becomes the labour-room for many brutal terrorist organizations. After 9/11 destruction, US with other NATO9 countries engages in massive warfare against terrorists in front of our door-step10 . 56. Under the United Nations Convention on the Law of the Sea (UNCLOS) Sri Lanka is entitled to claim an extended area of seabed which is equivalent to 23 times of its land mass. 7 Unmanned aerial vehicles.(UAV) 8 International nongovernmental organizations 9 North Atlantic Treaty Organization, also called the Atlantic Alliance, is an intergovernmental military alliance based on the North Atlantic Treaty which was signed on 4 April 1949 10 War against the terrorists in Afghanistan, Pakistan and Yemen.
  • 24. RESTRICTED 24 RESTRICTED This zone contains a variety of exploitable mineral oil and natural gas deposits and also it is proved that “Manna Basin” in North-Western costal area of the country is nourished with oil and natural gas11 . 57. So it is obvious that as a nation we have a most crucial journey towards prosperity. All the prominent power players are suffering from “Power-Hunger” and are seeking potential opportunities. Sri Lanka is a hot-spot in their game plan. As a non-aligned country we have to balance the conflicting interests of our friendly nations while protecting national security and it must be our paramount consideration for our future prosperity. The unremitting competition over the possession of limited resources has reached to unpredictable and non controllable status. The definition and the subjects of national security have been evolving rapidly. Today its scope has expanded. So a strategic plan for the protection of natural recourses and potential opportunities, should be foremost in our future agenda. 58. Modes and methods of warfare have rapidly changed. The brain power took control over the arms power. “Thinking machines” play a vital role in modern warfare. Basically it protects the soldier’s life while ensuring the correct targets. Sometimes it creates ethical and legal issues. Each power player is enthusiastic over AI technologies, due to its effectiveness. So what would “future warfare”be like? Sometimes it may be a fully unmanned scenario or you may not be able to demarcate human from robot with your naked eye since the gravity of the present research works go up to that extent. 59. So what is the Sri Lankan perspective? That is the question that we get after basic literature survey. How should we prepare today with regard to the threats and opportunities tomorrow? We won’t survive in the future unless we address this issue. 11 Prof. Senarathne, R.(2013). “Lanka’s future prosperity lies in the sea”, Sunday Observer, 9th June 2013
  • 25. RESTRICTED 25 RESTRICTED 60. Conducting a research under the theme “Artificial Intelligence and Future Warfare” is an interesting project which gives great exposure for Officer Cadets as well as Day Scholars of General Sir John Kotelawala Defence University.
  • 26. RESTRICTED 26 RESTRICTED REFERENCES BOOKS 1. Staples, R. (1973) A Computer Perspective, (Harvard University press, Cambridge, Mass), p. 12. 2. Hubert L., Stuart E. (1988) Mind over Machine, The Power of Human Intuition and Expertise in the Era of the computer. p 63. 3. Humphrey, Watts S., (2000) Annals of the History of Computing, Springer-Verlang, p 137. WEB SITES 1. J Masters, (2013) 'Targeted Killings', Council on Foreign Relations, Available: http://www.cfr.org/counterterrorism/targeted-killings/p9627 2. 'The National Security Studies Programme(2013): Key Findings', New America Foundation, Available: http://natsec.newamerica.net/ 3. 'CIA Drones: (2013) Pentagon To Take Over Some Operations, Sources Say', Reuters: Available: http://www.huffingtonpost.com/2013/05/21/cia-drones-pentagon_n_ 3309739.html 4. O Bowcott, (2012 June) 'Drone strikes threaten 50 years of international law, says UN rapporteur', The Guardian, Available: http://www.guardian.co.uk/world/2012/jun/21/d rone-strikes-international-law-un 5. S Waterman, (2013 May) 'U.N. official: US claim for using drones viewed as invalid', Washington Times, Available: http://www.washingtontimes.com/news/2013/may/14/un- official-us-claim-for-using-drones-viewed-as-in
  • 27. RESTRICTED 27 RESTRICTED 6. M Rusling, (2012 April) 'Legality of U.S. drone strikes in Pakistan increasingly under scrutiny', Xinhua, Available: http://news.xinhuanet.com/english/world/2012- 04/20/c_131539011.html 7. J MacKenzie, (2011) 'Drone Wars: Is it legal?', GlobalPost, 10 October 2011: Available:http://www.globalpost.com/dispatch/news/regions/asia-pacific/pakistan/110822/ drone-wars-legal-law-pakistan-yemen-al-qaeda 8. Sarah Kreps, John Kaag, (2013) 'The Use of Unmanned Aerial Vehicles in Contemporary Conflict: A Legal and Ethical Analysis' Available: http://www.dw.de/who- will-stop-the-drone-strikes/a-16870353