Drone Proliferation and the Challenge of Regulating Dual-Use Technologies

2018 ◽  
Vol 21 (3) ◽  
pp. 497-517
Author(s):  
Marcus Schulzke

AbstractThe controversy surrounding military drones has generated many proposals for restricting or prohibiting existing drones, additional autonomous variants that may be created in the future, and the sale of drones to certain markets. Moreover, there is broad interest in regulating military drones, with proposals coming not only from academics but also from NGOs and policymakers. I argue that these proposals generally fail to consider the dual-use character of drones and that they therefore provide inadequate regulatory guidance. Drones are not confined to the military but rather spread across international and domestic security roles, humanitarian relief efforts, and dozens of civilian applications. Drones, their component technologies, the control infrastructure, and the relevant technical expertise would continue to develop under a military-focused regulatory regime as civilian technologies that have the potential to be militarized. I evaluate the prospects of drone regulation with the help of research on other dual-use technologies, while also showing what the study of drones can contribute to that literature. Drones’ ubiquity in nonmilitary roles presents special regulatory challenges beyond those associated with WMDs and missiles, which indicates that strict regulatory controls or international governance frameworks are unlikely to succeed. With this in mind, I further argue that future research should acknowledge that drone proliferation across military and civilian spheres is unavoidable and shift focus to considering how drone warfare may be moderated by countermeasures and institutional pressures.

Author(s):  
Leana A. Bouffard ◽  
Haerim Jin

This chapter provides an overview of the literature examining the role of religion and military service in the desistance process. It also identifies outstanding issues and directions for future research. It first presents an overview of research examining the role of religion in desistance and highlights measurement issues, potential intervening mechanisms, and a consideration of faith-based programs as criminal justice policy. Next, this chapter covers the relationship between military service and offending patterns, including period effects that explain variation in the relationship, selection effects, and the incorporation of military factors in criminal justice policy and programming. The chapter concludes by highlighting general conclusions from these two bodies of research and questions to be considered in future research.


2020 ◽  
Vol 10 (1) ◽  
pp. 115-124
Author(s):  
Chunchun Wang

PurposeThe purpose of this paper is to examine the transformations of prosthetic practices in China, as well as the daily experiences and dilemmas arising from the everchanging practices since 1949. On the basis of materials, this paper explores an everyday perspective to review the history of technology.Design/methodology/approachEthnography was collected with the application of participant observations, informal interviews and in-depth interviews during a 13-months study at a rehabilitation center in Chengdu, China. The literature on prosthetic manufacturing was also reviewed for this paper.FindingsChina's prosthetic technology seems to evolve from traditional to modern. However, this progressive narrative – innovation-based timeline (Edgerton, 2006, xi) – has been challenged by daily practices. Due to institutional pressures, prosthetists are in a dilemma of selectively using their knowledge to create one kind of device for all prosthesis users with a certain kind of disability, thereby regulating the physical and social experiences of prosthesis users. Besides, prosthesis users are accustomed to prostheses made with old techniques, and must correct themselves from old experiences to the daily practices recognized by the selected techniques.Originality/valueThis paper provides a cross-cultural case to reexamine Edgerton's criticism of the progressive and orderly innovation-centric technological narrative. More importantly, it reviews the history and practices of China's prosthetics from daily experiences rather than Edgerton's concentration on technology; therefore, it provides an everyday perspective for future research on technological transformations.


2020 ◽  
pp. 123-153
Author(s):  
Muhammad Maigari Abdullahi ◽  
Usman Ahmad Karofi ◽  
Uthman Abdullahi Abdul-Quadir ◽  
Ibrahim Arafat

This article identifies different operational codenames adopted by the Nigerian military in special domestic operations from 1966-2019 and examined whether the operations were executed in line with the codenames. In Nigeria, the military has an established tradition of codenaming special operations, in both internal and foreign missions. Since 1966, the Nigerian military has been involved in internal security management and codenamed all the operations using both English and local language names. The aftermath of the first military coup d'état on 15th January 1966, was the beginning of military involvement in domestic security operations in addition to their constitutional responsibility of defending the territorial integrity of the country. The Effect Perspective (TEP) is adopted as the theoretical framework which gives proper nuance to the study. Methodologically, data were elicited through in-depth interviews. The findings explain why several military operations have failed to achieve the objectives of their codenames. It concludes that there is no correlation between the operational codenames and their outcomes of special military operations in Nigeria because the desired results of restoring peace have not been achieved within the specific time frame given when they were launched. The paper concludes that the majority of special military operations launched in Nigeria failed below expectations and unable to restore peace in their country in line with the operational codenames as a result of factors identified in the study.


2020 ◽  
Author(s):  
Pauline Barbeau ◽  
Alan Michaud ◽  
Candyce Hamel ◽  
Danielle Rice ◽  
Becky Skidmore ◽  
...  

ABSTRACT Introduction Musculoskeletal injuries (MSKi) are a common challenge for those in military careers. Compared to their male peers, reports indicate that female military members and recruits are at greater risk of suffering MSKi during training and deployment. The objectives of this study were to identify the types and causes of MSKi among female military personnel and to explore the various risk factors associated with MSKi. Materials and Methods A scoping review was conducted over a 4-month time frame of English language, peer-reviewed studies published from 1946 to 2019. Search strategies for major biomedical databases (e.g., MEDLINE; Embase Classic + Embase; and the following EBM Reviews—Cochrane Central Register of Controlled Trials, Cochrane Database of Systematic Reviews, Database of Abstracts of Reviews of Effects, Health Technology Assessment, and the NHS Economic Evaluation Database) were developed by a senior medical information specialist and included 2,891 titles/abstracts. Study selection and data collection were designed according to the Population, Concept, and Context framework. Studies were included if the study population provided stratified data for females in a military context. Results From a total of 2,287 citations captured from the literature searches, 168 peer-reviewed publications (144 unique studies) were eligible for inclusion. Studies were identified from across 10 countries and published between 1977 and 2019. Study designs were primarily prospective and retrospective cohorts. Most studies assessed both prevalence/incidence and risk factors for MSKi (62.50%), with few studies assessing cause (13.69%). For MSKi of female recruits compared to active female members, the prevalence was higher (19.7%-58.3% vs. 5.5%-56.6%), but the incidence (0.02%-57.7% vs. 13.5%-71.9%) was lower. The incidence of stress fractures was found to be much higher in female recruits than in active members (1.6%-23.9% vs. 2.7%). For anthropometric risk factors, increased body fat was a predictor of MSKi, but not stress fractures. For physiological risk factors for both female military groups, being less physically fit, later menarche, and having no/irregular menses were predictors of MSKi and stress fractures. For biomechanical risk factors, among female recruits, longer tibial length and femoral neck diameter increased the risk of stress fractures, and low foot arch increased risk of an ankle sprain. For female active military members, differences in shoulder rotation and bone strength were associated with risk of MSKi. For biological sex, being female compared to male was associated with an increased risk of MSKi, stress fractures, and general injuries. The consequences of experiencing MSKi for active military included limited duties, time off, and discharge. For recruits, these included missed training days, limited duty days, and release. Conclusions This scoping review provides insight into the current state of the evidence regarding the types and causes of MSKi, as well as the factors that influence MSKi among females in the military. Future research endeavors should focus on randomized controlled trials examining training paradigms to see if women are more susceptible. The data presented in the scoping review could potentially be used to develop training strategies to mitigate some of the identified barriers that negatively impact women from pursuing careers in the military.


2020 ◽  
pp. 128-131
Author(s):  
И.В. Баранова ◽  
М.А. Власенко

В статье рассмотрен гособоронзаказ как драйвер развития предприятий оборонно-промышленного комплекса, требования обеспечения финансовой устойчивости предприятий при исполнении ими гособоронзаказа. Диверсификация оборонно-промышленного комплекса РФ и конверсия производства предприятий, входящих в данный комплекс, ориентированные на производство продукции двойного назначения, а также повышение объемов продаж в среднесрочной перспективе рассматриваются как факторы повышения их финансовой устойчивости. The article considers the defense procurement and acquisition as a driver for the development of enterprises of the military-industrial complex; the requirements for ensuring the financial stability of enterprises when they perform a state contract under the state defense order. The diversification of the Russian military-industrial complex and the conversion of production of enterprises included in this complex, focused on the production of dual-use products, increasing sales in the medium term, are considered as factors for increasing the financial stability of enterprises in the military-industrial complex.


Author(s):  
Tom Holert

Contemporary warfare has been significantly transformed by the promotion and implementation of unmanned aerial vehicles (or drones) into global military operations. Networked remote sensory vision and the drones’ capability to carry deadly missiles entail and facilitate increasingly individualised, racialised, and necropolitical military practices conceptualised as ‘surgical strikes’ or ‘targeted killings’, all in the name of ‘counterinsurgency’. In the absence of publicly accessible documentations of ‘drone vision’, images of drones themselves constitute what is arguably one of the most contested iconographies of the present. The ethical and legal problems engendered by the virtualisation of violence and the panoptical fantasies of persistent vision and continuous threat interfere with the commercial interests and the publicised ideas of ‘clean’ warfare of the military-industrial-media complex. Drones have become a fetishised icon of warfare running out of human measure and control and are henceforth challenged by activist strategies highlighting the blind spots and victims of their deployment.


Author(s):  
Risa Brooks

The concluding chapter synthesizes insights from the individual chapters, identifying six overarching lessons: civilian control of the US military is complex and understudied; norms are essential for healthy civil-military relations; the relationship between society and the military is less than healthy; partisanship is corroding civil-military relations; public scrutiny of the military is essential to military effectiveness; and the fundamental character of civil-military relations is changing. In turn, it proposes several questions for future research, suggesting that more could be known about public accountability of military activity; the nature and measurement of military politicization; and changing actors and roles in civil-military relations.


Author(s):  
G. Giacomello

Computers have always caused psychological uneasiness in the human brain. That a computer is the closet thing to a thinking machine can be discomforting. That average users have little understanding of the complexity and intricacies of how computers and software operate only add to the distress. Networked computers further increased the puzzlement of human beings. The media (suffering from the same poverty of information as the public) have picked up catchwords like cyberwar, netwars, cyberterrorism, and cybercrime. Speaking of Electronic Pearl Harbors and comparing modems to bombs have only contributed to increasing the level of media hysteria and confusion in public opinion. Schwartau (1994) is a classic example. Imagine that poorly informed journalists start telling the general public that ruthless hackers (hired by terrorists) could take over the power grid and shut it down, or cause patients’ death after their medical records have been compromised. The mere suspicion that terrorists could perform such acts would be enough to fueling the fear factor, which regularly happens as a result of this crying wolf. Under these circumstances, cyberterrorism seems like a nightmare come true. As Embar-Seddon (2002) noted, the word terrorism brings together two significant modern fears: the fear of technology and the fear of terrorism. Both technology and terrorism are significant unknowns and unknown threats are generally perceived as more threatening than known threats. To some extent, cyberterrorism does not need to be manifested itself in any significant way because many already believe it to be real. This article will try to dispel some of the myths of cyberterrorism, such as the contention that terrorists could remotely take control of critical infrastructure and thus bring a country to its knees. In fact, today, cybercrime and economic damage caused by hackers are far more real and serious threats than terrorists. Misdeeds are more likely to be committed by disgruntled insiders than skilled outsiders (Randazzo et al., 2004). There is no commonly accepted definition of terrorism, hence cyberterrorism has been variously interpreted. For example, Sofaer et al. (2000) defines it as “intentional use or threat of use, without legally recognized authority, of violence, disruption or interference against cyber systems” (p. 26), resulting in death or injury of people, damage to physical property, civil disorder, or economic harm. The probability, however, that cyberattacks may actually cause victims is extremely low. Furthermore, Sofaer et al. tends to exclude states from committing terrorist acts, which is also debatable. Hughes (2004) observes cyberterrorism as a diverse set of technologies whose purpose is to scare people, but scaring people without getting anything in return is simply useless. Paraphrasing a working definition of terrorism, I would identify cyberterrorism as the use of digital means to threat or undertake acts of organized violence against civilians to achieve political advantages. Perpetrators then could be nonstate groups or sovereign states. Terrorists spreading scary stories to terrify the populace via the Internet would also qualify. Finally, because of cost efficiency, information and communication technologies have blurred the distinction that long existed between the noncombatant and the combatant spheres. The technology on which the military now rely is exactly the same commercial off-the-shelf hardware and software products that civilians have in their homes and offices (Department of the Army, 2003). Military and civilians alike use largely the same computer networks, which were designed for ease of use and not for hardened communications. During the Cold War, dual use technology (civilian hardware and software) was considered “dangerous” because it could help the Soviets close the gap with the West. Paradoxically, dual-use technologies are now “good.” One of the many downsides of such a situation is that if terrorists hit computer networks, in theory, they could hit multiple targets: the economy, law enforcement agencies, emergency services, and (albeit to a lesser extent) even the military. For terrorists this scenario would be a dream come true. Reality, however, is substantially different.


2020 ◽  
Vol 185 (Supplement_1) ◽  
pp. 154-160 ◽  
Author(s):  
Sandra M Escolas ◽  
Margie Luton ◽  
Hamid Ferdosi ◽  
Bianca D Chavez ◽  
Scot D Engel

ABSTRACT Introduction In 2008, it was reported that 19.5% of service members previously deployed experienced a mild traumatic brain injury (mTBI). Fifty-seven percent of those did not seek medical care. It was suggested that concerns with seeking care involved confidentiality and career issues. Objective: This study addressed mTBI history, medical treatment history, and stigmas associated with mTBI/concussion. Materials and Methods An anonymous questionnaire was developed. Data collection occurred throughout March 2018 in conjunction with Brain Injury Awareness Month activities. Results All 5,174 volunteers were Army; 86% male; 87% were between 18 and 34 years old; 89% had <14 years in the military; 35% had a combat deployment; and 10% reported having one or more mTBIs in their military careers. Of the Soldiers who reported a concussion, 52% sought medical care. Of those not seeking care, 64% reported they did not think the injury required care, followed by 18% fearing negative impact on their career. Twenty-eight percent who experienced an mTBI versus 11% who have not reported that there is a stigma associated with an mTBI. Conclusions Soldiers sometimes failed to report their suspected concussions and did not seek medical care. Educational efforts may increase reporting of and medical screening for potentially concussive events. Future research to determine the ramifications of unreported and untreated mTBIs/concussions is recommended.


Sign in / Sign up

Export Citation Format

Share Document