Skip to main content

Lawfully Using Autonomous Weapon Technologies

  • Book
  • © 2024

Overview

  • Explores the technical aspects of AI, for an actual understanding of what AI is capable of, and what its weaknesses are
  • Focusses specifically on the operational level and the particular challenges that come for commanders employing AWS
  • Offers practical recommendations for commanders that can be readily implemented, like task division lists and flowcharts

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 149.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled?

The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others:

- How to maintain control of AWS throughout a targeting cycle;

- How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures;

- Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend;

- What extra precautionary measures unique to AWS technology can and should be employed;

- When it is militarily desirable to employ AWS over other alternatives; and

- Under what circumstances criminal liability may be attributed for AWS-related harm.

It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS.

Dr. Jonathan Kwik is a researcher at the T.M.C. Asser Institute in The Hague specialised in artificial intelligence and targeting law, and is a member of the Board of Experts of the Asia-Pacific Journal of International Humanitarian Law.

Similar content being viewed by others

Keywords

Table of contents (14 chapters)

  1. Framing the Study

  2. Controlling AWS

  3. Understanding AWS

  4. AWS in the Legal-Operational Context

  5. Criminal Liability

  6. Conclusions

Authors and Affiliations

  • TMC Asser Instituut, The Hague, The Netherlands

    Jonathan Kwik

Bibliographic Information

Publish with us