Law in the Internet Society

View   r6  >  r5  ...
CharlotteSkertenFirstEssay 6 - 19 Mar 2018 - Main.CharlotteSkerten
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Line: 15 to 15
 Nuclear weapons systems can be connected to an internet platform or air gapped. But neither option eliminates all security threats. Interference with nuclear weapons systems has been a risk since their inception, and does not necessarily require advanced technology (as demonstrated, for example, by the 2012 break in to a Tennessee nuclear plant by an 84-year-old nun). However, the internet society increases the risk of private and state interference with nuclear weapons systems, which in turn increases the likelihood of nuclear strike.
Changed:
<
<
Many nuclear arsenals are now being ‘modernized’, including through increased connectivity to the rest of the war-fighting system. This introduces new vulnerabilities and dangers, including the risk of remote access through the internet. Like all complex technological systems, those designed for nuclear weapons are inherently flawed. They are designed, built, installed, maintained, and operated by humans. Hardware and software are often off-the-shelf, so there is never complete control over the supply chain for critical nuclear components. Today’s systems must also contend with all the other modern tools of cyber warfare, including spyware, malware, worms, bugs, viruses, corrupted firmware, logic bombs and Trojan horses.
>
>
Many nuclear arsenals are now being ‘modernized’, including through increased connectivity to the rest of the war-fighting system. This introduces new vulnerabilities and dangers, including the risk of remote access through the internet. Like all complex technological systems, those designed for nuclear weapons are inherently flawed. They are designed, built, installed, maintained, and operated by humans. Hardware and software are often off-the-shelf, and there is never complete control over the supply chain for critical nuclear components. Today’s systems must also contend with all the other modern tools of cyber warfare, including spyware, malware, worms, bugs, viruses, corrupted firmware, logic bombs and Trojan horses.
 
Changed:
<
<
On the other hand, the ‘Stuxnet’ attack in Iran illustrates that air gapping devices does not necessarily protect them from technological corruption by adversaries. The Stuxnet malware was spread through USB flash drives, and then between computers (irrespective of whether they were connected to the internet) to seek out and compromise the specific model of Siemens computers which ran the uranium-enriching centrifuges at the Nantanz nuclear plant. The size and sophistication of Stuxnet indicated that it was state-sponsored. But the development of online communities such as ‘Anonymous’ and ‘LulzSec’, combined with the ever-increasing availability of information online, demonstrates the increasing potential for individuals to take action in areas that were once considered to be exclusively in the government domain.
>
>
On the other hand, the ‘Stuxnet’ attack in Iran illustrates that air gapping devices does not necessarily protect them from technological corruption by adversaries. The Stuxnet malware was spread through USB flash drives, and then between computers (irrespective of whether they were connected to the internet) to seek out and compromise the specific model of Siemens computers that ran the uranium-enriching centrifuges at the Nantanz nuclear plant. The size and sophistication of Stuxnet indicated that it was state-sponsored. But the development of online communities such as ‘Anonymous’ and ‘LulzSec’, combined with the ever-increasing availability of information online, demonstrates the growing potential for individuals to take action in areas that were once considered to be exclusively in the government domain.
 

The new threat: killer robots

The internet has also allowed for the development of new weapons of mass destruction, including lethal autonomous weapons systems designed to select and attack targets without intervention by a human operator. These so-called ‘killer robots’ involve statistical analysis of data sets as a complement to algorithms that use the data to do something, including identifying a target (for example, through a hashtag) and firing an integrated weapon. Because each person active on the internet has now become a dense cluster of data points linked to other people’s clusters of data points, the physiology of the internet has created the perfect breeding ground to aggregate technologies to develop killer robots.

Changed:
<
<
Some lethal autonomous weapons are already in use. For example, Samsung’s SGR-A1 sentry gun, capable of performing surveillance, voice-recognition, tracking and firing autonomously, is deployed along the border of the Korean Demilitarized Zone. But the potential for the development of killer robots into weapons of mass destruction is exponential. A future involving killer robots has been likened to scenes from the Terminator and Robocop movies. But allowing machines to "decide" to actively kill humans would be “devastating to our security and freedom&#8221. Some experts have therefore insisted that artificial intelligence must therefore be proactively regulated because of the “fundamental risk [it poses] to the existence of civilization”.
>
>
Some lethal autonomous weapons are already in use. For example, Samsung’s SGR-A1 sentry gun, capable of performing surveillance, voice-recognition, tracking and firing autonomously, is deployed along the border of the Korean Demilitarized Zone. But the potential for the development of killer robots into weapons of mass destruction is exponential. A future involving killer robots has been likened to scenes from the Terminator and Robocop movies. Allowing machines to 'decide' to actively kill humans would be devastating to both our security and freedom. Some experts have therefore insisted that artificial intelligence must therefore be proactively regulated because of its “fundamental risk to the existence of civilization”.
 
Changed:
<
<
Killer robots undoubtedly violate the first principle of robotics. They would also violate international humanitarian law applicable in armed conflict, in particular the principle of distinction, which requires the ability to discriminate combatants from non-combatants, and proportionality, which requires that damage to civilians is proportional to the military aim. Like traditional weapons of mass destruction, killer robots have real potential to cause harm to innocent people (both in warfare and peacetime), and to global stability. But they also fundamentally differ. It would be nearly impossible to hold any person or nation to account for injury, death or war crimes caused by killer robots. The development of relatively cheap ‘intelligent’ tools with the ability to kill without human thought or emotion changes the hierarchy between humans and machines in the world order, with machines taking effective control.
>
>
Killer robots undoubtedly violate the first principle of robotics. They would also violate international humanitarian law applicable in armed conflict, in particular the principle of distinction, which requires the ability to discriminate combatants from non-combatants, and proportionality, which requires that damage to civilians is proportional to the military aim. Like traditional weapons of mass destruction, killer robots have real potential to cause harm to innocent people (both in warfare and peacetime), and to global stability. But they also fundamentally differ. It would be nearly impossible to hold any person or nation to account for injury, death or war crimes caused by killer robots. The development of relatively cheap ‘intelligent’ tools with the ability to kill without human thought or emotion changes the hierarchy between humans and machines in the world order, with machines taking over effective control.
 

Conclusion


Revision 6r6 - 19 Mar 2018 - 02:06:44 - CharlotteSkerten
Revision 5r5 - 19 Mar 2018 - 00:55:00 - CharlotteSkerten
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM