Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of English Administrative Law from 1550: Continuity and Change

English Administrative Law from 1550: Continuity and Change

Price: £140.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Lawfully Using Autonomous Weapon Technologies


ISBN13: 9789462656307
To be Published: August 2024
Publisher: T.M.C. Asser Press
Country of Publication: Netherlands
Format: Hardback
Price: £139.99



This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled?

The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others:

  • How to maintain control of AWS throughout a targeting cycle
  • How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures
  • Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend
  • What extra precautionary measures unique to AWS technology can and should be employed
  • When it is militarily desirable to employ AWS over other alternatives; and
  • Under what circumstances criminal liability may be attributed for AWS-related harm

It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS.

Subjects:
Public International Law
Contents:
Part I. FRAMING THE STUDY
Chapter 1. Introduction

Part II. CONTROLLING AWS
Chapter 2. Controlling AWS: A cyclical process

Part III. UNDERSTANDING AWS
Chapter 3. AI fundamentals and the military environment.- Chapter 4. Measures of performance.- Chapter 5. Causes of failure.- Chapter 6. Adversarials: Anti-AI countermeasures

Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT
Chapter 7. Legal-operational analysis: Introduction.- Chapter 8. Legally-salient variables for AWS.- Chapter 9. AWS and targeting.- Chapter 10. Desirability of using AWS

Part V. CRIMINAL LIABILITY
Chapter 11. Criminal liability: Problem setting.- Chapter 12. Obstacles to criminal liability: a systemic analysis.- Chapter 13. Across the spectrum of intent

Part VI. CONCLUSIONS
Chapter 14. Integration and closing

Appendix
Index