Mitigating the Risk of Autonomous Weapon Misuse by Insurgent Groups

IF 1.3 Q1 LAW Laws Pub Date : 2022-12-30 DOI:10.3390/laws12010005
J. Kwik
{"title":"Mitigating the Risk of Autonomous Weapon Misuse by Insurgent Groups","authors":"J. Kwik","doi":"10.3390/laws12010005","DOIUrl":null,"url":null,"abstract":"The intersection between autonomous weapon systems (‘AWS’) and non-State armed groups (‘NSAG’) is an underexplored aspect of the AWS debate. This article explores the main ways future policymakers can reduce the risk of NSAGs committing violations of the laws of armed conflict (‘LOAC’) using AWS once the technology becomes more prolific and easily distributable. It does this by sketching a chronological picture of an NSAG’s weapons obtention process, looking first at its likely suppliers and transport routes (acquisition), and, subsequently, at factors which can increase the risk of LOAC violations once the system is in their possession (use). With regard to use, we find that the lack of explicit legal obligations in LOAC to (a) review weapons meant solely for transfer and (b) provide technical training to recipients of transfer constitute serious reasons why LOAC violations may be aggravated with the introduction of AWS to insurgent groups. We also find, however, that States are uniquely and powerfully placed to address both acquisition and use factors, and outline how they can be persuaded into implementing the risk-reducing measures recommended in this article for purely strategic reasons, i.e., even if they express no interest in improving LOAC compliance per se.","PeriodicalId":30534,"journal":{"name":"Laws","volume":" ","pages":""},"PeriodicalIF":1.3000,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Laws","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/laws12010005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 1

Abstract

The intersection between autonomous weapon systems (‘AWS’) and non-State armed groups (‘NSAG’) is an underexplored aspect of the AWS debate. This article explores the main ways future policymakers can reduce the risk of NSAGs committing violations of the laws of armed conflict (‘LOAC’) using AWS once the technology becomes more prolific and easily distributable. It does this by sketching a chronological picture of an NSAG’s weapons obtention process, looking first at its likely suppliers and transport routes (acquisition), and, subsequently, at factors which can increase the risk of LOAC violations once the system is in their possession (use). With regard to use, we find that the lack of explicit legal obligations in LOAC to (a) review weapons meant solely for transfer and (b) provide technical training to recipients of transfer constitute serious reasons why LOAC violations may be aggravated with the introduction of AWS to insurgent groups. We also find, however, that States are uniquely and powerfully placed to address both acquisition and use factors, and outline how they can be persuaded into implementing the risk-reducing measures recommended in this article for purely strategic reasons, i.e., even if they express no interest in improving LOAC compliance per se.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
减轻叛乱团体滥用自主武器的风险
自主武器系统(“AWS”)和非国家武装团体(“NSAG”)之间的交集是AWS辩论中未被充分探讨的一个方面。本文探讨了一旦AWS技术变得更加多产和易于分发,未来政策制定者可以通过哪些主要方法来降低nsg使用AWS违反武装冲突法(LOAC)的风险。为此,它按时间顺序勾勒出一个国家武装部队获取武器的过程,首先考察其可能的供应商和运输路线(获取),然后考察一旦该系统被其拥有(使用),可能增加违反《LOAC》风险的因素。在使用方面,我们发现《军事行动控制法》缺乏明确的法律义务(a)审查仅用于转让的武器和(b)向转让接受者提供技术培训,这是《军事行动控制法》违规行为可能因向叛乱团体引入AWS而加剧的严重原因。然而,我们还发现,各国在解决获取和使用因素方面处于独特而有力的地位,并概述了如何能够说服它们出于纯粹的战略原因实施本文中建议的降低风险的措施,即,即使它们对改善《公约》的遵守本身没有兴趣。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Laws
Laws LAW-
CiteScore
2.00
自引率
16.70%
发文量
77
审稿时长
11 weeks
期刊最新文献
Exploring Defuturing to Design Artificial-Intelligence Artifacts: A Systemic-Design Approach to Tackle Litigiousness in the Brazilian Judiciary Why Equity Follows the Law The Professional Conflict Pertaining to Confidentiality—The Obligation of Disclosure for Intermediaries of Financial Transactions Windfall Profit Taxation in Europe (and Beyond) To Enhance the Credibility of the Green Bond Market through Regulating GBERs: The Case of China
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1