Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 22, 2024 Fri

Time: 11:53 am

Results for drones

8 results found

Author: Smith, Michael L.

Title: Regulating Law Enforcement's Use of Drones: The Need for State Legislation

Summary: The recent rise of domestic drone technology has prompted privacy advocates and members of the public to call for the regulation of the use of drones by law enforcement officers. Numerous states have proposed legislation to regulate government drone use, and thirteen have passed laws that restrict the use of drones by law enforcement agencies. Despite the activity in state legislatures, commentary on the drones tends to focus on how courts, rather than legislative bodies, can restrict the government's use of drones. Commentators call for wider Fourth Amendment protections that would limit government surveillance. In the process, in-depth analysis of state drone regulations has fallen by the wayside. In this article, I take up the task of analyzing and comparing state laws regulating the government's use of drones. While the oldest of these laws was enacted in 2013, the thirteen laws passed so far exhibit wide variations and noteworthy trends. I survey this quickly-expanding list of laws, note which regulations are likely to constrain government drone use, and identify laws that provide only the illusion of regulation. I advance the thesis that the judiciary is ill-suited to address the rapidly-developing area of drone technology. Long-established Supreme Court precedent leaves the judiciary with very little power to curtail government drone use. And were the judiciary to attempt the task of restricting law enforcement's use of drones, the solutions proposed would likely be imprecise, unpredictable, and difficult to reverse. In light of these concerns, privacy advocates and law enforcement agencies alike should support the regulation of government drone use by state legislatures, and should look to existing laws in determining what regulations are ideal.

Details: Los Angeles: University of California, Los Angeles (UCLA) - School of Law, 2014. 31p.

Source: Internet Resource: Accessed September 9, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2492374

Year: 2014

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2492374

Shelf Number: 133186

Keywords:
Covert Surveillance, Drones (U.S.)
Drones
Fourth Amendment
Legislation
Surveillance
Surveillance Techniques

Author: Cavoukian, Ann

Title: Surveillance, then and now: securing privacy in public spaces

Summary: Surveillance is growing, as are the technologies that extend its reach. But surveillance that facilitates the sustained monitoring of people engaged in everyday activities in public is, in Justice Gerard La Forest's unforgettable words, "an unthinkable prospect in a free and open society such as ours." Unthinkable as it may be, the prospect of close and continuous surveillance is no longer simply the stuff of science fiction. Governments now have access to precise and affordable technologies capable of facilitating broad programs of indiscriminate monitoring. The unfettered use of these technologies raises the spectre of a true surveillance state. To freedom-loving people, that is an unacceptable prospect. The purpose of this paper is to assist law enforcement, lawmakers, and the broader public in understanding and protecting our fundamental right to privacy with respect to surveillance by the state of our activities in public spaces through the use of ever-growing new technologies.

Details: Toronto: Information and Privacy Commissioner, 2013. 57p.

Source: Internet Resource: Accessed May 6, 2015 at: http://www.publicsafety.gc.ca/lbrr/archives/cnmcs-plcng/cn29826-eng.pdf

Year: 2013

Country: Canada

URL: http://www.publicsafety.gc.ca/lbrr/archives/cnmcs-plcng/cn29826-eng.pdf

Shelf Number: 135520

Keywords:
Closed-Circuit Television (CCTV)
Drones
Electronic Surveillance
Privacy
Public Spaces
Video Surveillance (Canada)

Author: Miethe, Terance D.

Title: Public Attitudes about Aerial Drone Activities: Results of a National Survey

Summary: Unmanned Aerial Vehicles (UAVs) or Unmanned Aircraft Systems (UAS), commonly known as "drones," collect information and provide visual monitoring of activities in a variety of public and private settings. These free-flying aircraft are controlled by remote and digital technology. Six states (Alaska, New York, Nevada, North Dakota, Texas, and Virginia) have been federally designated as test sites for identifying operational and safety issues associated with drone technology. Although several national opinion polls have been conducted over the last several years on drone use for military purposes, less is known about public attitudes and support for drone usage in other contexts. These additional contexts for drone applications include land use patterns, geographical/climatic photo mapping, crowd management, and specific areas within criminal justice (e.g., border patrols, detecting traffic violators, home and business security). Due to the recent and dramatic growth in media attention to drone technology, it is important to establish an empirical baseline of the current level of public knowledge and attitudes about aerial drone usage to track future changes in the public's acceptance of this emerging technology. This Research in Brief summarizes the results of multiple national surveys of public knowledge and support of the use of aerial drone technology in a variety of public and private settings. It is based on samples of 636 U.S. adult citizens who completed internet surveys in the first week of June 2014. A summary of the results, demographic factors associated with levels of awareness and support for drone usage, the public policy implications of these findings, and limitations of this study are described.

Details: Las Vegas: University of Nevada at Las Vegas, Center for Crime and Justice Policy, 2014. 8p.

Source: Internet Resource: Research in Brief: Accessed May 21, 2015 at: http://www.unlv.edu/sites/default/files/page_files/3/Public-Attitudes-About-Aerial.pdf

Year: 2014

Country: United States

URL: http://www.unlv.edu/sites/default/files/page_files/3/Public-Attitudes-About-Aerial.pdf

Shelf Number: 135753

Keywords:
Aerial Drones
Drones
Privacy
Public Opinion
Surveillance

Author: Valdovinos, Maria

Title: Community Policing & Unmanned Aircraft Systems (UAS) Guidelines to Enhance Community Trust

Summary: There is no question that technology is rapidly changing the face of policing today. Most police forces now have computers in patrol cars and communicate with their officers via cell phone. They actively use new technologies to gather license plate data and pinpoint hot spots of crime. New DNA testing capabilities are reopening thousands of old cases, offering the chance to complete an investigation or, in some cases, reverse a wrongful conviction. A driving force among cutting-edge businesses is the search for "disruptive technologies" a product that will completely transform a market and potentially make former products obsolete. Technology has been a "disruptive" force for law enforcement in many ways. For example, the use of cellphone cameras and the explosive growth of body-worn cameras have irreversibly changed the nature of policing. Like these other technological breakthroughs, the development of small unmanned aircraft systems (sUAS) has the potential to revolutionize policing. These systems are portable, relatively easy to learn and use, and are becoming increasingly affordable as more manufacturers enter the growing market. The agencies that have pioneered the use of this technology have discovered that a sUAS can increase operational efficiency and improve officer and community safety. They can, among other benefits, help find lost persons, protect police officers during searches for armed suspects, decrease time needed to process crime and accident scenes, and aid in disaster relief and recovery. But this is just the start. Developers have already produced prototype miniature unmanned systems that can be carried in a pocket. They are perfecting the ability of sUAS to fly through a building using their own GPS systems. They are increasing battery power to enable them to fly longer distances or hover in place for an hour or more. And we can only imagine that the use of this technology could one day be the “Airborne Partner” to every public safety officer regardless of their location or the situation they are confronted with. The potential for these systems has caused a number of policing agencies to take note. However, early adopters of this new technology have discovered a painful truth: Where law enforcement leaders see a wonderful new tool for controlling crime and increasing public safety, a portion of the public sees the potential for a massive invasion of privacy. In the public mind the type specimen of unmanned aircraft systems is the military drone, able to hover for days, spying indiscriminately and conducting missile strikes without warning. Furthermore, the regulatory environment in the past allowed hobbyists to buy and fly sUAS the same day, while law enforcement leaders faced a number of challenges to using this relatively new technology. Chief among those were restrictions placed on sUAS use by the Federal Aviation Administration (FAA). As a result, few police and sheriff’s departments completed the rigorous authorization process and received approval for use. However, in August 2016 the FAA completed an eight-year rulemaking process and established regulations to allow the use of sUAS in the National Airspace System (NAS). With the regulatory framework in place, the use of sUAS will undoubtedly grow at a much greater pace. In addition, numerous privacy advocates and concerned citizens, as well as state legislatures across the country, have strong and valid concerns regarding privacy and safety. For example, at least 17 states have placed some level of restriction on police use of sUAS, and many others have legislation under consideration. The concerns and questions are many, and the answers thus far, are few. The President’s Task Force on 21st Century Policing (2015) notes that technology can indeed, be a double-edged sword for law enforcement. While it can provide immeasurable benefits, it can also cause police officers to spend less time interacting with citizens. The resulting alienation can cause communities to see law enforcement as an occupying force, completely divorced from the concerns of the public. To avoid this alienation, the task force recommended increased engagement with the community during the acquisition phase of any new technology. As task force co-chair and former Philadelphia Police Commissioner Charles Ramsey noted: "Just having the conversation can increase trust and legitimacy and help departments make better decisions." Law enforcement agencies considering adopting a sUAS must consider ways to include and engage their community in the decision-making process. Beyond official restrictions, law enforcement agencies across the country have encountered strong public opposition when purchasing a sUAS. Protests over potential police surveillance of citizens have led some departments to shelve their sUAS before they ever used them. The public outcry has made it clear that if law enforcement is to benefit from sUAS use, they must involve the community in the process, being transparent on the benefits and risks and on the safeguards that will be put in place to protect public privacy and safety. Strong community relationships and communication can ensure that sUAS become community assets used to solve community problems. Understanding the challenges these public perceptions of sUAS bring, the Police Foundation, in partnership with the U.S. Department of Justice, Office of Community Oriented Policing Services (COPS), has developed this guidebook to help public safety agencies successfully assess the appropriateness of acquiring a sUAS in their jurisdiction, all the while ensuring public support, avoiding public-relations pitfalls, and enhancing community trust along the way. As this guidebook outlines, the acquisition of a sUAS provides police with another opportunity to increase outreach and engagement with their communities. The agencies that have succeeded in acquiring a sUAS for their departments have undertaken community-focused outreach such as meeting with skeptics, and have provided repeated public demonstrations of the capabilities of their sUAS. The recommendations laid out in this guidebook— maximizing transparency, engaging the community, and proactively developing privacyprotection protocols— have the potential to become a positive "disruptive" force in police practices: a force that transforms former practices. Following this successful formula could be the first step toward making community policing practices the watchword in the policing of the future

Details: Washington, DC: Office of Community Oriented Policing Services, 2016. 311p.

Source: Internet Resource: Accessed November 17, 2016 at: https://www.policefoundation.org/wp-content/uploads/2016/11/UAS-Report.pdf

Year: 2016

Country: United States

URL: https://www.policefoundation.org/wp-content/uploads/2016/11/UAS-Report.pdf

Shelf Number: 144851

Keywords:
Community Policing
Drones
Police Technology

Author: Rassler, Don

Title: Remotely Piloted Innovation: Terrorism, Drones and Supportive Technology

Summary: In mid-August 2016, the Shiite militant group Hezbollah reportedly dropped two small bombs from what is believed to have been a modified, commercially available drone that it was flying over rebel positions in Syria. While terrorist groups have long had a fascination with drones and experimented with their use, the incident was a first for a terror group, and it potentially represents the leading edge of a wave of similar incidents that could follow in the months, years and decades ahead. Much has been made of the threat of terror use of drones (also known as "uninhabited aircraft systems," or UASs), but little empirical and historical work has been done to support our understanding of this phenomenon and its evolution. This report seeks to address this gap by providing a review of, and framework to situate, cases in which terrorist entities have either shown a substantive interest in drones or have used them. It evaluates both individual use cases and the activity of groups that have used drones frequently enough to constitute their having a "program." These cases are then complemented by a review of the creative ways that private citizens have used drones, in order to provide decision-makers with a firmer baseline of both demonstrated terror capability and what lies within the immediate realm of possibility, given what has already been achieved by others. This report also includes an overview of new technologies that are likely to further complicate the scope of this developing threat.

Details: West Point, NY: Combating Terrorism Center at West Point, United States Military Academy, 2016. 77p.

Source: Internet Resource: Accessed November 21, 2016 at: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/10/Drones-Report.pdf

Year: 2016

Country: International

URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/10/Drones-Report.pdf

Shelf Number: 147851

Keywords:
Drones
Terrorism

Author: Feeney, Matthew

Title: Surveillance Takes Wing: Privacy in the Age of Police Drones

Summary: Unmanned aerial vehicles, commonly referred to as "drones," are being used in a range of industries, including conservation, journalism, archeaology, and policing. (In this paper I will use the word "drone" to apply to unmanned aerial vehicles, excluding unmanned aquatic vehicles and terrestrial robots.) Law enforcement drones have clear benefits: allowing police to more easily find missing persons, suspects, and accident victims, for example. They also allow police to investigate dangerous situations such as bomb threats and toxic spills. Yet without strict controls on their use, drones could present a very serious threat to citizens' privacy. Regrettably, while the Supreme Court has tackled privacy issues amid the emergence of new technologies, the Court's rulings on aerial surveillance are not well suited for today, now that police are using drones. Fortunately, lawmakers at the state and federal levels can implement policies that allow police to take advantage of drones while protecting privacy. These policies should not only address familiar issues associated with searches, such as warrant requirements, but also relatively new concerns involving weaponization, biometric software, and surveillance technology. Such controls and regulations will allow police to do their job and prevent drones from being used as tools for secretive and needlessly intrusive surveillance

Details: Washington, DC: Cato Institute, 2016. 20p.

Source: Internet Resource: Policy Analysis No. 807: Accessed February 7, 2017 at: https://object.cato.org/sites/cato.org/files/pubs/pdf/pa807_1.pdf

Year: 2016

Country: United States

URL: https://object.cato.org/sites/cato.org/files/pubs/pdf/pa807_1.pdf

Shelf Number: 146014

Keywords:
Criminal Investigations
Drones
Police Surveillance
Police Technology
Privacy

Author: Smith, Brian T.

Title: Ethics on the Fly: Toward a Drone-Specific Code of Conduct for Law Enforcement

Summary: This thesis examines the issue of law enforcement's use of unmanned aerial systems (UAS) from an ethical perspective. It describes ethics as rules governing individual conduct that are functionally specific, relating to the role one plays in society. The role police play in U.S. communities and the ethical frameworks they use to guide their conduct have a great impact in defining the relationship between the people and their government in the American context, colored as it is by the social contract and the idea, enshrined in the Declaration of Independence, that the legitimacy of any government is derived from the consent of the governed.[1] Empowered to enforce the laws by which society has corporately agreed to be governed, police have a unique ethical relationship to the law. For an action to be ethical for police to take, it must first be legal. The law is a necessary deontological reference point for officers and agencies in defining right and wrong conduct. Unfortunately, in the current environment, legislation governing UAS use by police agencies is lacking. This circumstance creates a referential void for law enforcement executives seeking to put drone technology to use in service of the public. From a homeland security perspective, public safety stands to be greatly enhanced by the fielding of these versatile platforms. UAS will allow law enforcement agencies without manned aviation units to realize gains in situational awareness, crime scene investigation, accident investigation, search and rescue operations, warrant service, and tactical operations. At issue is how to put the technology to use in these legitimate public safety missions in a way that adequately addresses the privacy and other concerns that accompany any discussion about domestic drone use by government. It is imperative that these issues be considered if public support for law enforcement UAS deployment is to be secured.[2] Yet, at present, the discussion about the ethics of UAS employment for law enforcement purposes is nearly absent from the literature. This research seeks to help fill that void. The primary research question posed by this thesis is whether a prevailing ethical framework exists to govern the use of UAS for domestic law enforcement functions. This thesis concluded that no such consensus exists. Indeed, this research found no single set of ethical guidelines is available to which all American police agencies subscribe. Rather, state and local law enforcement in the United States is fragmented, which results in a lack of standardization regarding ethical norms. With over 18,000 law enforcement agencies nationwide,[3] law enforcement in the United States is far from a unitary project. Whether by accident or by design, this circumstance allows agencies to be responsive to local and regional concerns with regard to the ethics of policing. As a secondary research question, this thesis considers what ethical frameworks might be applied to this problem through an examination of the emerging literature. A hybrid research methodology using elements of the case study method, as well as a policy analysis section, are used in developing this thesis. Using the case study method, it examines evidence of ethical frameworks currently in use by domestic law enforcement agencies. The evidence considered is largely documentary and considered against the ethical standards society expects of law enforcement. Once described, a comparative policy analysis is performed to identify any overlapping areas of concern that appear to be held in common. This study identified seven common dimensions of ethical concern regarding UAS employment: Engagement Accountability Transparency Privacy Legality Use of Force Safety This thesis recommends that agencies currently using or preparing to use UAS for law enforcement missions address these dimensions in a drone-specific code of conduct, both to guide decision making for officers in the field and to inform the public regarding the uses and limitations of these increasingly capable public safety tools. Further, this thesis recommends the code of conduct be made available for public review and that it be considered a living document that is expected to change over time. Public opinion is not static; society's expectations are subject to refinement over time. It is in this light, possessing a capacity for change, that the code of conduct should be understood when considering drones and their place alongside other tools employed in law enforcement missions. Of the more than 18,000 law enforcement agencies in the United States,[4] only 20 agencies have a certificate of waiver authorization (COA) with the Federal Aviation Administration (FAA) to operate drones.[5] Accordingly, very little experience exists from which to draw regarding what acceptable and unacceptable conduct looks like in law enforcement's use of drones. UAS use by police is just one facet of an ever-broadening debate in this country about the costs of security in the modern world. The debate about police use of drones is a debate about the future of policing. Law enforcement agencies are uniquely positioned at this moment to lead that conversation, demonstrating that drone technology can contribute to this nation's collective security in a way consistent with American principles and that maintains the consent of the governed.

Details: Monterey, CA: Naval Postgraduate School, 2016. 79p.

Source: Internet Resource: Thesis: Accessed March 28, 2018 at: https://www.hsdl.org/?abstract&did=792232

Year: 2016

Country: United States

URL: https://www.hsdl.org/?abstract&did=792232

Shelf Number: 149603

Keywords:
Code of Conduct
Drones
Homeland Security
Law Enforcement
Police Surveillance
Police Technology
Unmanned Aerial System

Author: Ackerman, Gary

Title: On the Horizon: Security Challenges at the Nexus of State and Non-State Actors and Emerging/Disruptive Technologies

Summary: Innovation and new technologies have many positive attributes and provide significant improvement to humanity, much that is likely unforeseen at the time of initial discovery. The unpredictability of the technology trajectories can lead to significant negative consequences. This white paper aims to discuss the massive leaps in innovation and understand what this means for national security. The articles are briefly summarized below. In Chapter 1, entitled "Third Offset Implications for Homeland Security: Tranquility or Turbulence," Robert McCreight states that the overall future trajectory of modern technologies hinges on a fairly imperfect and periodically naive grasp of dual-use science and technology and what it portends for our planet and its inhabitants. He goes on to say that one immediate concern is to determine not only how it is affecting our current way of life, geopolitics, the economy, social stability, governance, security, and the ordinary functions and determinants of the natural world around us, but also weigh the downstream consequences of technology growth, diversity, and convergence on all of those things ten to twenty years on. If advanced dual-use technologies hold the potential for a vast array of unanticipated threats in the next few years, we will need effective doctrine, strategy, and deterrence measures. He asks a key question: How to begin to establish criteria which guarantees that humans retain ultimate control, management, and direction of advanced dual-use technologies and thereby thwart untoward and dangerous outcomes arising from their mix of expected and unexpected outcomes. He advances five possible criteria for wrestling with the emergence of ADUCT (advanced dual-use convergent technologies) in a manner that sketches out an approach for the short term and allows flexibility for modifications and improvements along the way over the next decade. Gina Ligon and Michael Logan in Chapter 2, "Malevolent Innovation: Novelty and Effectiveness in Terror Attacks," state that terrorism provides a model context for examining creativity, as the need for survival and innovation pervades these destructive and malevolent groups. Despite this, creativity and innovation remain underdeveloped concepts in terrorism research. One reason for this is the limited empirical data about this phenomenon, making it unclear which tenets of creativity research hold versus which do not translate in the domain of terrorism. The present effort overcomes this by examining the dimensions of malevolent innovation in a large sample of terrorist attacks. To anticipate adversary threats, it is critical that we examine all of the possible combinations of VEO innovation developed in the past. This particular effort can provide planners with exemplars of the highest levels of VEO innovation across a large dataset of violent extremist organizations, providing a comprehensive look at what is possible and what should be prevented. Don Rassler in Chapter 3 "Back to the Future: The Islamic State, Drones, and Future Threats" states that the Islamic State is an irony of sorts, as while the organization looks to, is inspired by, and seeks to recreate the past certain aspects of the group's behavior also provide a window into conflicts of the future. A key case study in this regard is the Islamic State's drone program, and specifically how the group "overcame technical and cost asymmetries," and creatively developed a novel and scalable drone-based weapons system "constructed from commercial components that challenged - at least for a period of time - states' ability to respond." He goes on to state that the Islamic State's drone accomplishments speak to, and have a number of important implications regarding, the character and style of future threats that are either constructed around or that significantly leverage dual-use commercial technologies. He concludes by stating to stay ahead of the issue, and to better prepare for a future that will almost certainly be typified by the proliferation of other hybrid threats that leverage and/or repurpose commercial systems in dangerous ways, the United States should identify the pathways and methods that allowed the Islamic State to acquire and scale its fleet of quad-copter drones in the first place, and trace the evolution of functional threat streams. Bennett Clifford in Chapter 4, "Exploring Pro-Islamic State Instructional Material on Telegram," makes several key observations: - English-speaking supporters of the Islamic State (ISIS) use the messaging application Telegram to distribute a range of information, including instructional material - manuals and guides designed to aid operatives with step-by-step procedures for providing assistance to the group. - Channel administrators distribute whichever manuals they believe can be of aid to aspiring operatives, regardless of its ideological background. - Telegram's internal file-sharing features and lax approach to content moderation allow channel administrators to create repositories of instructional information within Telegram channels. - While attack-planning manuals available on Telegram channels understandably pose a large concern for counter-terrorism authorities, operational security and cyber-security manuals are also frequently distributed, relatively easy to implement, and help operatives successfully conduct activities in support of terrorist groups while minimizing the risk of detection or apprehension. In Chapter 5 entitled "Examining the Present and Future Role of Cybercrime-as-a-Service in Terror and Extremism," Thomas Holt makes the case that the rise of online illicit markets that enable the sale of cybercrime tools and stolen personal information have made it possible for individuals to engage in technically sophisticated forms of crime regardless of level of computer skill. Ideological and terror groups over the last decade have expressed an interest in cyber-attacks as a means to cause harm, though it is not clear how much ability they have to perform such attacks. As a result, cybercrime markets may engender their attacks, though it is not clear how often this may occur, or what conditions would lead to their use. He provides recommendations for policy and research to disrupt cybercrime markets and improve our knowledge of ideologically-motivated cyber-attackers generally. - Cybercrime markets generate millions of dollars in revenue and enable non-technical actors to perform sophisticated attacks. - They may provide a point of entry for ideologically-motivated extremists and terrorists to engage in cyber-attacks. - These markets can be disrupted through traditional law enforcement investigations, and may also be affected through other extra-legal efforts such as Sybil attacks. - Research is needed on the radicalization process of ideologically-motivated actors who engage in cyber-attacks, and how this differs from those who have engaged in physical attacks. Rebecca Earnhardt and Gary Ackerman in Chapter 6 entitled "Modelling Terrorist Technology Transfer," make the point that while technology transfer occurs as a part of routine life, the topic remains relatively understudied in the terrorism literature. As terrorists engage in increasingly lethal and technologically sophisticated attacks, the concern surrounding terrorists acquiring cutting-edge weaponry and related technologies is accumulating. They go on to describe the Terrorist Technology Transfer (T3) project which provides a first cut at addressing this critical operational gap in knowledge through the exploration of extant technology transfer literature, construction of the first iteration of the T3 Model, and illustrative application of the model to an emerging technological threat. They conclude by stating the T3 project indicates the promise of having not only research, but also operational and policy impacts. It raises the possibility of providing government stakeholders, including intelligence, law enforcement, military, and policy agencies with a variety of insights and operational tools In Chapter 7, "Hacking the Human Body: The Cyber-Bio Convergence," Rebecca Earnhardt makes the point that the increasing convergence between the fields of biosecurity and cybersecurity may result in consequences that analysts have yet considered. Biotechnology use and expertise expansion beyond practitioners have stoked concerns about a wide range of traditional biosecurity issues including shielding the outputs from advanced gene editing systems or protecting university lab data storage systems. As biotechnology advances, including digitization and automation of systems that were once localized and only accessible to those directly involved on related research, biosecurity and cybersecurity fields continue to intersect. She concludes by stating a fully-fledged research project would explore the cyber security risk factors that are cited commonly as key vulnerabilities, and filter these cyber security risk factors through an adversary technology adoption decision making and motivational analysis. In Chapter 8 entitled "Evolving Human and Machine Interdependence in Conflict: Advantages, Risks, and Conundrums," R. E. Burnett makes several key points: - Emerging science and technology will continue to disrupt customary characteristics of political and kinetic conflicts among states and non-state actors. - The increasing complex interdependence between humans and machines is one area for particular examination. - We cannot reliably predict whether or not human roles will rapidly give way to a more dominant robotic style of war, so we must prepare for a variety of futures, per the Scharre/Horowitz autonomy typologies. - Humans involved with machines that operate at vastly greater speeds and volumes of data will further create problems of cognitive demand for the human soldier that need to be examined. - We must investigate this not only in terms of technical performance, but also from a more holistic perspective, to include the social, political, and psychological dimensions of the soldier and of the citizen.

Details: Washington, DC: U.S. Department of Homeland Security2019. 67p.

Source: Internet Resource: A Strategic Multilayer Assessment (SMA) Periodic Publication: Accessed May 4, 2019 at: https://nsiteam.com/social/wp-content/uploads/2019/04/DoD_DHS-On-the-Horizon-White-Paper-_FINAL.pdf

Year: 2019

Country: United States

URL: https://nsiteam.com/social/wp-content/uploads/2019/04/DoD_DHS-On-the-Horizon-White-Paper-_FINAL.pdf

Shelf Number: 155659

Keywords:
Biosecurity
Cybercrime
Cybersecurity
Drones
Emerging Technologies
Extremism
Homeland Security
Radicalism
Terrorism
Violent Extremism