The Law of Armed Conflict Issues Created by Programming Automatic Target Recognition Systems Using Deep Learning Methods

Author(s):  
Joshua G. Hughes

Emerging technologies have always played an important role in armed conflict. From the crossbow to cyber capabilities, technology that could be weaponized to create an advantage over an adversary has inevitably found its way into military arsenals for use in armed conflict. The weaponization of emerging technologies, however, raises challenging legal issues with respect to the law of armed conflict. As States continue to develop and exploit new technologies, how will the law of armed conflict address the use of these technologies on the battlefield? Is existing law sufficient to regulate new technologies, such as cyber capabilities, autonomous weapons systems, and artificial intelligence? Have emerging technologies fundamentally altered the way we should understand concepts such as law-of-war precautions and the principle of distinction? How can we ensure compliance and accountability in light of technological advancement? This book explores these critical questions while highlighting the legal challenges—and opportunities—presented by the use of emerging technologies on the battlefield.


2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Zongyong Cui ◽  
Zongjie Cao ◽  
Jianyu Yang ◽  
Hongliang Ren

A hierarchical recognition system (HRS) based on constrained Deep Belief Network (DBN) is proposed for SAR Automatic Target Recognition (SAR ATR). As a classical Deep Learning method, DBN has shown great performance on data reconstruction, big data mining, and classification. However, few works have been carried out to solve small data problems (like SAR ATR) by Deep Learning method. In HRS, the deep structure and pattern classifier are combined to solve small data classification problems. After building the DBN with multiple Restricted Boltzmann Machines (RBMs), hierarchical features can be obtained, and then they are fed to classifier directly. To obtain more natural sparse feature representation, the Constrained RBM (CRBM) is proposed with solving a generalized optimization problem. Three RBM variants,L1-RNM,L2-RBM, andL1/2-RBM, are presented and introduced to HRS in this paper. The experiments on MSTAR public dataset show that the performance of the proposed HRS with CRBM outperforms current pattern recognition methods in SAR ATR, like PCA + SVM, LDA + SVM, and NMF + SVM.


Author(s):  
Tsvetelina van Benthem

Abstract This article examines the redirection of incoming missiles when employed by defending forces to whom obligations to take precautions against the effects of attacks apply. The analysis proceeds in four steps. In the first step, the possibility of redirection is examined from an empirical standpoint. Step two defines the contours of the obligation to take precautions against the effects of attacks. Step three considers one variant of redirection, where a missile is redirected back towards the adversary. It is argued that such acts of redirection would fulfil the definition of attack under the law of armed conflict, and that prima facie conflicts of obligations could be avoided through interpretation of the feasibility standard embedded in the obligation to take precautions against the effects of attacks. Finally, step four analyzes acts of redirection against persons under the control of the redirecting State. Analyzing this scenario calls for an inquiry into the relationship between the relevant obligations under international humanitarian law and human rights law.


Sign in / Sign up

Export Citation Format

Share Document