Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

International Law

U.S. Naval War College

2020

Distinction

Articles 1 - 2 of 2

Full-Text Articles in Military, War, and Peace

Autonomous Cyber Capabilities Below And Above The Use Of Force Threshold: Balancing Proportionality And The Need For Speed, Peter Margulies Oct 2020

Autonomous Cyber Capabilities Below And Above The Use Of Force Threshold: Balancing Proportionality And The Need For Speed, Peter Margulies

International Law Studies

Protecting the cyber domain requires speedy responses. Mustering that speed will be a task reserved for autonomous cyber agents—software that chooses particular actions without prior human approval. Unfortunately, autonomous agents also suffer from marked deficits, including bias, unintelligibility, and a lack of contextual judgment. Those deficits pose serious challenges for compliance with international law principles such as proportionality.

In the jus ad bellum, jus in bello, and the law of countermeasures, compliance with proportionality reduces harm and the risk of escalation. Autonomous agent flaws will impair their ability to make the fine-grained decisions that proportionality entails. However, a …


Beyond Human Shielding: Civilian Risk Exploitation And Indirect Civilian Targeting, Geoffrey S. Corn Jun 2020

Beyond Human Shielding: Civilian Risk Exploitation And Indirect Civilian Targeting, Geoffrey S. Corn

International Law Studies

Few violations of the law of armed conflict (LOAC) are as pernicious as using civilians to shield military objectives from attack. This unlawful tactic unfortunately seems to be an all too common practice of organized armed groups, especially in conflicts against tactically superior conventional state armed forces. The very term "human shielding" presupposes, however, the ultimate objective is to prevent an opponent from attacking the shielded military objective or, in the alternative, substantially complicate that attack decision. But is a shielding effect always the ultimate objective of such civilian exploitation? This article argues that the answer is no; that there …