SlideShare a Scribd company logo
1 of 4
Download to read offline
Proposed model to allow for the building of a common theoretical frameworks to help key
stakeholders synchronize academic research, operational planning, and high-level
policymaking.
Possible (Physical constraints): Consists of everything that
technologists have or can deliver without violating the
laws of physics.
Permissible (Normative constraints): Nestled within the possible
is the permissible which reflects the range of lawful options
for policymakers to consider.
Preferable (Policy constraints): Within the permissible is the
preferable which encompasses the policy options
which are most compatible and aligned with the
political landscape, cultural sentiment,
and national interests.
The chief benefit of this construct is that it provides a common framework that allows the three
indispensable disciplines within cyber to avoid talking past each other as they discuss
limitations on policy options, capabilities development, or operational courses of action.
POSSIBLE
Technology
PERMISSIBLE
Norms
PREFERABLE
Policy
Artificial Intelligence and the Law of Armed Conflict:
Parameters for Discussion
The Future Society at the Harvard Kennedy School of Government
Although there is near universal agreement on the customary norms governing
armed conflict there has been no international discussion on applying these
standards to the incorporation of Artificial Intelligence (AI) agents used in support
of military operations.
Technology, Law, and Policy: The Three P’s
Have the seven sets of norms which form the basis of the
Law of Armed Conflict (LOAC) been satisfied in mission
planning and execution? For fully autonomous
operations, has the AI been programmed (or taught) how
to independently apply the most fundamental of these
norms at cyber-speed, without immediate human
supervision? For hybrid operations, do humans have the
appropriate resources immediately available for real-time
decision making in concert with the AI?
Here are the first 35 questions which should be asked by the
human-AI team before embarking on a potentially destructive
mission in cyberspace:
Legal Safe Harbor
for Command Responsibility
1. Participation: Does the Law of Armed Conflict (LOAC) apply to this cyber operation? Are there any
geographical limitations we are bound to respect in planning the operation? Is the conflict international or non-
international? What is the criminal responsibility of leaders who are aware or should have been aware of
violations of LOAC? What is the criminal responsibility for operators in carrying out a patently unlawful order?
2. Attacks Generally: Are the attacks being carried out by members of the armed forces? Is the attack part of a
cyber levee en mass? Do the operators carrying out the cyber operation meet the international definition of
“mercenaries’? Are the operators civilians?
3. Attacks against Persons: Are the operators aware of the general prohibition of attacks against civilians?
How much doubt is there as to the status of the person being attacked? Is the person a lawful object of attack?
Are civilians directly participating in a cyber attack? Can the cyber attack be characterized as a terror attack?
4. Attacks against Objects: Is the operator aware of the general prohibition of attacks against civilian objects?
In targeting, has distinction been made between civilian objects and military objectives? Have targeters
distinguished between objects used for civilian and military purposes? How much doubt is there as to the status
of the object to be attacked?
5. Means & Methods of Warfare: Is the operator aware of the definition of ‘means and methods of war’? Will
the cyber attack cause superfluous injury or unnecessary suffering? Are operators employing an indiscriminate
means or method? Doe the operation involve laying a cyber booby trap? Is the cyber operation an indispensable
component of a larger operation that will result in the starvation of civilians? Can the operation be characterized
as a belligerent reprisal? Does the alternative definition of belligerent reprisal of Additional Protocol I apply to the
country conducting the cyber operation? Has the cyber weapon been the subject of a legal review to ensure that
it is not per se indiscriminate?
6. Conduct of Attacks: Is this an indiscriminate attack? Is the operation being conducted against clearly
separated and distinct military objectives? Has the principal of proportionality (attacks may not cause
unreasonable collateral damage to civilians or their property with respect to the concrete and direct military
advantage expected to be gained?)
7. Precautions in Attack: Has constant care been exercised in the planning and execution of the cyber attack?
Have the targets been verified? Have the appropriate limitations been placed upon the choice of means and
methods to attack? Have precautions as to proportionality (the expected collateral harm to civilians and their
property weighed against the concrete and direct military advantage to be gained) been taken? Have the proper
restrictions on choice of targets been enforced? Do mission rules provide for the suspension of cancellation of
attack when certain legal criteria have been met? If required, have appropriate warnings been issued with
sufficient lead time?
ARTIFICIAL INTELLIGENCE & THE LAW OF ARMED CONFLICT: PARAMETERS FOR DISCUSSION | January 2016
ARTIFICIAL INTELLIGENCE & THE LAW OF ARMED CONFLICT: PARAMETERS FOR DISCUSSION | January 2016
Designed to vertically integrate legal considerations across the range of autonomous
operations, the AI-Human Pyramid of Interaction provides operators, mission
planners and decision-makers greater operational awareness by stratifying the
requirements for autonomous, semi-autonomous and directed operations.
The AI-Human Pyramid of Interaction
MACHINE
Autonomous
HYBRID
Human-Machine
HUMAN
In the loop
Level where the human
operator has the most control
and fully runs the machine.
Level where machine operates
autonomously and independently
makes distinction on what can
and can’t be destroyed.
Level where the machine reports back to
the human operator for input. Involves
comprehensive decision trees based
around the law of armed conflict and
organizational ethics.
We recommend that the best way forward to start tackling this issue is by convening
an global group of experts and stakeholders from the public, private and NGO sector
to address the following:
o In search of a common ground, how can the global community reach a consensus
around a working definition of “AI”?.
o How can the interdependent dynamics between technology, law, policy and society
best be framed?
o What are the most effective/appropriate technological, legal and policy safeguards
that would need to be implemented to ensure that the military, intelligence, and law
enforcement operations are kept within the bounds of accepted international norms?
What forum would be most appropriate to develop these?
Principles for
delegation
Contact
The AI Initiative | The Future Society @ Harvard Kennedy School
www.thefuturesociety.org | cyrus.hodes [at] thefuturesociety.org | nico [at] thefuturesociety.org
@hksfuture
www.linkedin.com/groups/The-Future-Society-8431532
Authors
The Future Society (TFS) at the Harvard Kennedy School of Government (HKS) works to raise
awareness regarding the consequences of the NBIC revolution (Nanotechnology, Biotechnology,
Information Technology and Cognitive Sciences) by placing key policy-making questions at the
center of its work.
The AI Initiative engages a wide range of stakeholders globally to foster discussion and facilitate
policy-making.
Thomas Wingfield, J.D., LL.M / Professor of Cyber Law / National Defense University
Thomas.Wingfield [at] ndu.edu
Lydia Kostopoulos, PhD
L [at] Lkcyber.com
Cyrus Hodes, Director, The AI Initiative, The Future Society @ HKS
cyrus.hodes [at] thefuturesociety.com
Nicolas Miailhe, Co-founder and Director for Projects, The Future Society @ HKS
Nico [at] thefuturesociety.com

More Related Content

Viewers also liked

Beav ex interview questions and answers
Beav ex interview questions and answersBeav ex interview questions and answers
Beav ex interview questions and answersJulianDraxler
 
Tugas css 1210651191
Tugas css 1210651191Tugas css 1210651191
Tugas css 1210651191prima_putra
 
Alberto Rocha - Key Core Competencies
Alberto Rocha - Key Core CompetenciesAlberto Rocha - Key Core Competencies
Alberto Rocha - Key Core CompetenciesAlberto Rocha
 
Course brochure
Course brochureCourse brochure
Course brochurekellys113
 
"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association
"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association
"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity AssociationClean Energy Canada
 

Viewers also liked (18)

Appilicious
AppiliciousAppilicious
Appilicious
 
Beav ex interview questions and answers
Beav ex interview questions and answersBeav ex interview questions and answers
Beav ex interview questions and answers
 
ตรรกวิทยา
ตรรกวิทยาตรรกวิทยา
ตรรกวิทยา
 
ตาราง
ตารางตาราง
ตาราง
 
Asthma
AsthmaAsthma
Asthma
 
Administrative
AdministrativeAdministrative
Administrative
 
Presentation1
Presentation1Presentation1
Presentation1
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
ระบบหายใจ
ระบบหายใจระบบหายใจ
ระบบหายใจ
 
Tugas css 1210651191
Tugas css 1210651191Tugas css 1210651191
Tugas css 1210651191
 
ทั่วไป
ทั่วไปทั่วไป
ทั่วไป
 
Training- Classroom Vs Online
Training- Classroom Vs OnlineTraining- Classroom Vs Online
Training- Classroom Vs Online
 
กำเนิด
กำเนิดกำเนิด
กำเนิด
 
Alberto Rocha - Key Core Competencies
Alberto Rocha - Key Core CompetenciesAlberto Rocha - Key Core Competencies
Alberto Rocha - Key Core Competencies
 
Course brochure
Course brochureCourse brochure
Course brochure
 
"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association
"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association
"Future Proofing Canada's Grids," Jim Burpee, Canadian Electricity Association
 
สารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรมสารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรม
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 

Similar to Common framework for cyber research, operations and policy

International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...Mansoor Faridi, CISA
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
 
International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxvrickens
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018Peerasak C.
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsNumaan Huq
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsThomas Hughes
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEeraser Juan José Calderón
 
The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...
The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...
The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...IRJET Journal
 
Re thinking regulation at the age of AI
Re thinking regulation at the age of AIRe thinking regulation at the age of AI
Re thinking regulation at the age of AILofred Madzou
 
PP_GTFPO_Defence_EN_Web
PP_GTFPO_Defence_EN_WebPP_GTFPO_Defence_EN_Web
PP_GTFPO_Defence_EN_Webjpchabot
 
Artificial Intelligence in the Military: An Overview of the Capabilities, App...
Artificial Intelligence in the Military: An Overview of the Capabilities, App...Artificial Intelligence in the Military: An Overview of the Capabilities, App...
Artificial Intelligence in the Military: An Overview of the Capabilities, App...Adib Bin Rashid
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 

Similar to Common framework for cyber research, operations and policy (20)

COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docx
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...
The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...
The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weap...
 
Re thinking regulation at the age of AI
Re thinking regulation at the age of AIRe thinking regulation at the age of AI
Re thinking regulation at the age of AI
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 
Geopolitics HLS Article
Geopolitics HLS ArticleGeopolitics HLS Article
Geopolitics HLS Article
 
PP_GTFPO_Defence_EN_Web
PP_GTFPO_Defence_EN_WebPP_GTFPO_Defence_EN_Web
PP_GTFPO_Defence_EN_Web
 
Artificial Intelligence in the Military: An Overview of the Capabilities, App...
Artificial Intelligence in the Military: An Overview of the Capabilities, App...Artificial Intelligence in the Military: An Overview of the Capabilities, App...
Artificial Intelligence in the Military: An Overview of the Capabilities, App...
 
HRIA and tool example.pdf
HRIA and tool example.pdfHRIA and tool example.pdf
HRIA and tool example.pdf
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 

More from Dr. Lydia Kostopoulos

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOFDr. Lydia Kostopoulos
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial IntelligenceDr. Lydia Kostopoulos
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...Dr. Lydia Kostopoulos
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Dr. Lydia Kostopoulos
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Dr. Lydia Kostopoulos
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDr. Lydia Kostopoulos
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerDr. Lydia Kostopoulos
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDr. Lydia Kostopoulos
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeDr. Lydia Kostopoulos
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersDr. Lydia Kostopoulos
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the FutureDr. Lydia Kostopoulos
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesDr. Lydia Kostopoulos
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutDr. Lydia Kostopoulos
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Dr. Lydia Kostopoulos
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]Dr. Lydia Kostopoulos
 

More from Dr. Lydia Kostopoulos (20)

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOF
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial Intelligence
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...
 
Letter from the Frontline in 2050
Letter from the Frontline in 2050Letter from the Frontline in 2050
Letter from the Frontline in 2050
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid Change
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive Powers
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the Future
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise Handout
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Common framework for cyber research, operations and policy

  • 1. Proposed model to allow for the building of a common theoretical frameworks to help key stakeholders synchronize academic research, operational planning, and high-level policymaking. Possible (Physical constraints): Consists of everything that technologists have or can deliver without violating the laws of physics. Permissible (Normative constraints): Nestled within the possible is the permissible which reflects the range of lawful options for policymakers to consider. Preferable (Policy constraints): Within the permissible is the preferable which encompasses the policy options which are most compatible and aligned with the political landscape, cultural sentiment, and national interests. The chief benefit of this construct is that it provides a common framework that allows the three indispensable disciplines within cyber to avoid talking past each other as they discuss limitations on policy options, capabilities development, or operational courses of action. POSSIBLE Technology PERMISSIBLE Norms PREFERABLE Policy Artificial Intelligence and the Law of Armed Conflict: Parameters for Discussion The Future Society at the Harvard Kennedy School of Government Although there is near universal agreement on the customary norms governing armed conflict there has been no international discussion on applying these standards to the incorporation of Artificial Intelligence (AI) agents used in support of military operations. Technology, Law, and Policy: The Three P’s
  • 2. Have the seven sets of norms which form the basis of the Law of Armed Conflict (LOAC) been satisfied in mission planning and execution? For fully autonomous operations, has the AI been programmed (or taught) how to independently apply the most fundamental of these norms at cyber-speed, without immediate human supervision? For hybrid operations, do humans have the appropriate resources immediately available for real-time decision making in concert with the AI? Here are the first 35 questions which should be asked by the human-AI team before embarking on a potentially destructive mission in cyberspace: Legal Safe Harbor for Command Responsibility 1. Participation: Does the Law of Armed Conflict (LOAC) apply to this cyber operation? Are there any geographical limitations we are bound to respect in planning the operation? Is the conflict international or non- international? What is the criminal responsibility of leaders who are aware or should have been aware of violations of LOAC? What is the criminal responsibility for operators in carrying out a patently unlawful order? 2. Attacks Generally: Are the attacks being carried out by members of the armed forces? Is the attack part of a cyber levee en mass? Do the operators carrying out the cyber operation meet the international definition of “mercenaries’? Are the operators civilians? 3. Attacks against Persons: Are the operators aware of the general prohibition of attacks against civilians? How much doubt is there as to the status of the person being attacked? Is the person a lawful object of attack? Are civilians directly participating in a cyber attack? Can the cyber attack be characterized as a terror attack? 4. Attacks against Objects: Is the operator aware of the general prohibition of attacks against civilian objects? In targeting, has distinction been made between civilian objects and military objectives? Have targeters distinguished between objects used for civilian and military purposes? How much doubt is there as to the status of the object to be attacked? 5. Means & Methods of Warfare: Is the operator aware of the definition of ‘means and methods of war’? Will the cyber attack cause superfluous injury or unnecessary suffering? Are operators employing an indiscriminate means or method? Doe the operation involve laying a cyber booby trap? Is the cyber operation an indispensable component of a larger operation that will result in the starvation of civilians? Can the operation be characterized as a belligerent reprisal? Does the alternative definition of belligerent reprisal of Additional Protocol I apply to the country conducting the cyber operation? Has the cyber weapon been the subject of a legal review to ensure that it is not per se indiscriminate? 6. Conduct of Attacks: Is this an indiscriminate attack? Is the operation being conducted against clearly separated and distinct military objectives? Has the principal of proportionality (attacks may not cause unreasonable collateral damage to civilians or their property with respect to the concrete and direct military advantage expected to be gained?) 7. Precautions in Attack: Has constant care been exercised in the planning and execution of the cyber attack? Have the targets been verified? Have the appropriate limitations been placed upon the choice of means and methods to attack? Have precautions as to proportionality (the expected collateral harm to civilians and their property weighed against the concrete and direct military advantage to be gained) been taken? Have the proper restrictions on choice of targets been enforced? Do mission rules provide for the suspension of cancellation of attack when certain legal criteria have been met? If required, have appropriate warnings been issued with sufficient lead time? ARTIFICIAL INTELLIGENCE & THE LAW OF ARMED CONFLICT: PARAMETERS FOR DISCUSSION | January 2016
  • 3. ARTIFICIAL INTELLIGENCE & THE LAW OF ARMED CONFLICT: PARAMETERS FOR DISCUSSION | January 2016 Designed to vertically integrate legal considerations across the range of autonomous operations, the AI-Human Pyramid of Interaction provides operators, mission planners and decision-makers greater operational awareness by stratifying the requirements for autonomous, semi-autonomous and directed operations. The AI-Human Pyramid of Interaction MACHINE Autonomous HYBRID Human-Machine HUMAN In the loop Level where the human operator has the most control and fully runs the machine. Level where machine operates autonomously and independently makes distinction on what can and can’t be destroyed. Level where the machine reports back to the human operator for input. Involves comprehensive decision trees based around the law of armed conflict and organizational ethics. We recommend that the best way forward to start tackling this issue is by convening an global group of experts and stakeholders from the public, private and NGO sector to address the following: o In search of a common ground, how can the global community reach a consensus around a working definition of “AI”?. o How can the interdependent dynamics between technology, law, policy and society best be framed? o What are the most effective/appropriate technological, legal and policy safeguards that would need to be implemented to ensure that the military, intelligence, and law enforcement operations are kept within the bounds of accepted international norms? What forum would be most appropriate to develop these? Principles for delegation
  • 4. Contact The AI Initiative | The Future Society @ Harvard Kennedy School www.thefuturesociety.org | cyrus.hodes [at] thefuturesociety.org | nico [at] thefuturesociety.org @hksfuture www.linkedin.com/groups/The-Future-Society-8431532 Authors The Future Society (TFS) at the Harvard Kennedy School of Government (HKS) works to raise awareness regarding the consequences of the NBIC revolution (Nanotechnology, Biotechnology, Information Technology and Cognitive Sciences) by placing key policy-making questions at the center of its work. The AI Initiative engages a wide range of stakeholders globally to foster discussion and facilitate policy-making. Thomas Wingfield, J.D., LL.M / Professor of Cyber Law / National Defense University Thomas.Wingfield [at] ndu.edu Lydia Kostopoulos, PhD L [at] Lkcyber.com Cyrus Hodes, Director, The AI Initiative, The Future Society @ HKS cyrus.hodes [at] thefuturesociety.com Nicolas Miailhe, Co-founder and Director for Projects, The Future Society @ HKS Nico [at] thefuturesociety.com