PEACE PROBE by Gene Stoltzfus

Robotic Warfare: Making This World Safe? by peaceprobe

Last week Predator drones attacked in Helmand province in Southern Afghanistan and mistakenly killed civilians. We don’t know how many. The incidents are another warning like the messages of protest that Pakistanis have been trying to send Americans for the past few years. Despite the much ballyhooed precision of these air crafts and their weapons, they still kill civilians because corroborating intelligence on the ground is unreliable and this leads to flawed targeting.

The protection of civilians has been a most basic plank of all notions of just war for many nations going back 1600 years. The slide towards increased killing of civilians in war by national armies and as a corollary, the use of civilians as human shields is often overlooked. Tactics arising from the use of robotic weapons of war may increase the slide of disrespect for civilian life in war. This trend that brought us civilian casualties from Dresden to Hiroshima, from IEDs in Iraq to drones in Pakistan reflect the broad lines of increased disrespect for civilian life into the 21st century warfare in regular and insurgent armies.

During the final week of Lent this year I expect to travel to Las Vegas and to Creech AFB 45 miles northwest where the Predator pilots and their staffs are trained and local control rooms guide the planes in the 24 hour surveillance and attack assignments over Pakistan, Iraq and Afghanistan. As I go I know that the Predators are just a tip of a vast array of robotic technology now being developed to make modern warfare “safer” for soldiers but more lethal for civilians.

The Predator and their Hellfire missiles are the air weapon delivery system of choice right now but maybe not for long. In the future the work of disarmament will be made even more complicated by robotic instruments of all kinds. The U. S. Army is working with universities to build micro fliers, tiny bird like flyers to be used for intelligence gathering and surveillance through its Micro Autonomous Systems and Technology Collaborative Alliance. Joseph Mait, manager of the Army Research Laboratory says,“ Our long-term goal is to develop technologies that can produce a map of a building interior or detect bombs,”

Big unmanned Predator like aircraft have lots of problems. They are still expensive to build, maintain and fly although they are much cheaper than the earlier generations of bombers. They can also be easy to spot. In Pakistan I was told that children in remote areas have games they play called, “spotting the Predators”. Shrinking those vehicles to a few ounces will not only change the children’s games but will give an up-close view of who is doing what, when and where.

According to Discovery Magazine, Haibo Dong of Wright State University is working on a four-winged robot, the Wright Dragon flyer. The designers complain that it is more difficult to create than a two-winged flapping system but promises more speed and manoeuverability. Dong expects to have a prototype, about the size of a real dragon-fly, completed this year. “This small craft could perform surveillance, environmental monitoring and search and rescue,” he says.

At Harvard University roboticist Robert Wood is working on mechanical bee-like instruments to create a colony of RoboBees. These swarming robots will incorporate optical and chemical sensors as well as communications systems to make autonomous flight decisions and to coordinate with colony members during tasks such as searching for objects or people.

Robotic technology is already heavily used in all of America’s wars. As many as 4000 robots are already on the ground in Iraq. Tiny information gathering devices are complemented by robotic instruments designed to identify and disarm bombs. With ground mobility they can enter into dangerous settings where enemy soldiers are heavily armed. Some of these instruments are being adapted for or are already used for in the homeland security. Their phenomenal growth will change forever the arms race, the balance of power(s) in the world and the nature of police work.

The ethical implications of this revolution of arms, force and information gathering are daunting.

1. The development, deployment, and use of the instruments of robotic warfare are being carried out in at least 40 countries around the world. A robotic arms race is already under way. There are few if any forums that address the implications of this race for the future of life on earth and for the quality of life-like basic freedoms.

2. As the robotic arms movement unfolds, the possibility for back yard development of instruments of destruction reaches to the limits of imagination. Violent video games were just a beginning although they may have helped dull our sensitivity and create a culture of acceptance. The IED (improvised explosive device) an interim instrument for defence and attack for insurgents will have been just the first generation of a long line of sophisticated adaptation of off the shelf technology for killing. The distance between the safe researcher silently working in a sanitized laboratory and the field practitioner is narrowing. The absence of meaningful work for so many in this generation may become the void where new waves of imagination in the service of violence are unleashed. Nonviolence movements will match this challenge only with keen understanding of the implications of robotic developments and solid healthy organizations.

3. As civilian casualties grow, persons who believe that life is sacred are faced with enormous new challenges. Peacemakers and human rights workers have only begun to grasp the implications of robotic warfare. People on the ground in Pakistan told me that just 10% of the victims of Predator drone bombings are insurgent combatants. Ninety percent are civilians. The Pakistan Security Monitor, a project of the School for International Studies at Simon Fraser University disputes these figures. I have travelled in Pakistan and have heard the estimated 90% figure from persons with access to the areas of impact with accompanying stories of travail and death to women and children..

For Christian pacifists the reach of research, development, and manufacture dips into every one of our communities. We are now faced with new challenges to our convictions about not killing. Unless we face those oncoming ambiguities without falling into legalism, the convictions will morph into fluffy cotton decoration over a core of words that are not backed up with action.

4. As we enter this new frontier of ethics and robotic warfare, our methods of witness for a nonviolent way will be forced to adapt. The centralization of the development and manufacture of killer instruments into fewer and fewer corporations and selected political powers is over. The time is here when ordinary people can go to the local computer store or to order component parts for assembling a weapon. What will we do if the computer store owner even goes to our church or parish? What will we do if people in our church own stock in companies that produce the components? We won’t have to go to Washington or to some well-mannered legislative office to begin the discussion and to engage in public witness.

We are now swimming in the culture of robotics, a technology that is being adapted every day by nations around the world to myriad roles that include security and killing. We can watch in admiration or distaste as the magic is unveiled . In periods of transition and unfolding violence it takes a little time for our consciences to be awakened and the gift of stubborn resistance to become clear. The time has arrived.


4 Comments so far
Leave a comment

Pentagon has bold plan for digital warfare
Tech repulblic

* Date: June 4th, 2009
* Author: Chad Perri

Pentagon officials are making plans for a new cyberwarfare strategic command, but the plans still await final details and approval.

In a move similar to President Obama’s promise to appoint a cyber czar, the Pentagon intends to create a new military command specifically dedicated to computer warfare operations. This initiative, announced by administration officials on the 28th of May, would be a complement to the civilian “cyber security” initiatives announced the very next day.

This new plan is a response to a number of criticisms and admitted failings of current Department of Defense policies regarding digital warfare. Among the milder criticisms are statements that offensive and defensive operations are segregated and poorly coördinated (if they are coördinated at all). Stepping up the scale of the seriousness of charges of poor policy development and implementation a bit, we find my own earlier article, China chooses FreeBSD as basis for secure OS, which points out areas where China may be moving well ahead of the US military in terms of defensibility. The critiques get more serious from there in discussion of that article, culminating in the following statement from TechRepublic community member pacomj60:

In 1979 I commanded the first USAF cyber team which we called the Red Team. We went after our own systems and everything said today about Vulnerabilities we knew then. No one read the reports.

Criticism doesn’t get much more scathing that the kind of demonstration of indifference embodied in the sentence “No one read the reports.” It seems things may have turned around, judging by the establishment of a new cyberwarfare command in Fort Meade, MD.

Air Force General Kevin Chilton, commander of the US Strategic Command, said the new cyberwarfare command would require two to four thousand personnel over the next five years. They’re still working out the budgeting details.

The plan hasn’t been presented to President Obama in full yet, according to the New York Times, and according to the AP story in Slate, Defense Secretary Gates has not yet given final approval for the plan.

Chad PerrinChad Perrin is an IT consultant, developer, and freelance professional writer. He holds both Microsoft and CompTIA certifications and is a graduate of two IT industry trade schools. Read his full bio and profile.

Comment by Gene

Digital warfare system hunts Iraq rebels
But soldiers say dust, heat can thwart computers

U.S. Army Spc. Michael Scott, from Michigan, of the 1st Battalion 22nd Regiment 4th infantry division, sitting inside his humvee checks a map on a computer screen, in Tikrit, Iraq, Wednesday, Dec. 31, 2003.
Gregorio Borgia / AP

By Jason Keyser
updated 2:39 p.m. CT, Thurs., Jan. 1, 2004
TIKRIT, Iraq – On mud-spattered computer screens in their Humvees, American soldiers scan digital street maps, monitor enemy positions, zoom in on individual buildings through satellite imagery and download instructions from commanders…

Comment by Gene

Just one of many application…gs

Gene Stoltzfus Blog: RR#1 RMB 293, Fort Frances, Ontario P9A3M2 Canada P. O. Box 1482, Internaitonal Falls MN 56649 US tel. 807-274-0138 email

Comment by peaceprobe

Gene says in this blog that he planned to go to Creech AFB the last week of Lent, as follows:
(quote) During the final week of Lent this year I expect to travel to Las Vegas and to Creech AFB 45 miles northwest where the Predator pilots and their staffs are trained and local control rooms guide the planes in the 24 hour surveillance and attack assignments over Pakistan, Iraq and Afghanistan. As I go I know that the Predators are just a tip of a vast array of robotic technology now being developed to make modern warfare “safer” for soldiers but more lethal for civilians. (end quote)
I am wondering WHO is going in Gene’s place, now that he is not able to go? I personally cannot go since I am currently in Papua, which has its own history of being an occupied territory and in need of international support.

Comment by Paul Godshall

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: