Friday, November 15, 2013



The Moral Hazard of Drones

The Stone
The Stone is a forum for contemporary philosophers and other thinkers on issues both timely and timeless.
As the debate on the morality of the United States’ use of unmanned aerial vehicles (“U.A.V.’s,” also known as drones) has intensified in recent weeks, several news and opinion articles have appeared in the media. Two, in particular, both published this month, reflect the current ethical divide on the issue. A feature article in Esquire by Tom Junod censured the “Lethal Presidency of Barack Obama” for the administration’s policy of targeted killings of suspected militants; another, “The Moral Case for Drones,” a news analysis by The Times’ Scott Shane, gathered opinions from experts that implicitly commended the administration for replacing Dresden-style strategic bombing with highly precise attacks that minimize collateral damage.
To say that we can target individuals without incurring troop casualties does not imply that we ought to.
Amid this discussion, we suggest that an allegory might be helpful to illustrate some of the many moral perils of drone use that have been overlooked. It shows that our attempts to avoid obvious ethical pitfalls of actions like firebombing may leave us vulnerable to other, more subtle, moral dangers.
While drones have become the weapons of our age, the moral dilemma that drone warfare presents is not new.  In fact, it is very, very old:
Once upon a time, in a quiet corner of the Middle East, there lived a shepherd named Gyges.  Despite the hardships in his life Gyges was relatively satisfied with his meager existence.  Then, one day, he found a ring buried in a nearby cave.

This was no ordinary ring; it rendered its wearer invisible.  With this new power, Gyges became increasingly dissatisfied with his simple life.  Before long, he seduced the queen of the land and began to plot the overthrow of her husband.  One evening, Gyges placed the ring on his finger, sneaked into the royal palace, and murdered the king.
In his “Republic,” Plato recounts this tale, but does not tell us the details of the murder. Still, we can rest assured that, like any violent death, it was not a pleasant affair.  However, the story ends well, at least for Gyges.  He marries the queen and assumes the position of king.
This story, which is as old as Western ethics itself, is meant to elicit a particular moral response from us: disgust.  So why do we find Plato’s story so appalling?
Maybe it’s the way that the story replaces moral justification with practical efficiency: Gyges’ being able to commit murder without getting caught, without any real difficulty, does not mean he is justified in doing so.  (Expediency is not necessarily a virtue.)
Maybe it’s the way that Gyges’ ring obscures his moral culpability: it’s difficult to blame a person you can’t see, and even harder to bring them to justice.
Maybe it’s that Gyges is successful in his plot: a wicked act not only goes unpunished, but is rewarded.
Maybe it’s the nagging sense that any kingdom based on such deception could not be a just one: what else might happen in such a kingdom under the cover of darkness?
Our disgust with Gyges could be traced to any one of these concerns, or to all of them.
Leif Parsons
One might argue that the myth of Gyges is a suitable allegory to describe the combatants who have attacked and killed American civilians and troops in the last 10 years.  A shepherd from the Middle East discovers that he has the power of invisibility, the power to strike a fatal blow against a more powerful adversary, the power to do so without getting caught, the power to benefit from his deception.  These, after all, are the tactics of terrorism.
But the myth of Gyges is really a story about modern counterterrorism, not terrorism.
We believe a stronger comparison can be made between the myth and the moral dangers of employing precision guided munitions and drone technologies to target suspected terrorists. What is distinctive about the tale of Gyges is the ease with which he can commit murder and get away scot-free.  The technological advantage provided by the ring ends up serving as the justification of its use.
Terrorists, whatever the moral value of their deeds, may be found and punished; as humans they are subject to retribution, whether it be corporal or legal. They may lose or sacrifice their lives. They may, in fact, be killed in the middle of the night by a drone. Because remote controlled machines cannot suffer these consequences, and the humans who operate them do so at a great distance, the myth of Gyges is more a parable of modern counterterrorism than it is about terrorism.
Only recently has the use of drones begun to touch on questions of morality.  Perhaps it’s because the answers to these questions appear self-evident.  What could be wrong with the use of unmanned aerial vehicles?  After all, they limit the cost of war, in terms of both blood and treasure. The U.S. troops who operate them can maintain safer stand-off positions in Eastern Europe or at home. And armed with precision-guided munitions, these drones are said to limit collateral damage.  In 2009, Leon Panetta, who was then the director of the Central Intelligence Agency, said, U.A.V.’s are “very precise and very limited in terms of collateral damage … the only game in town in terms of confronting or trying to disrupt the al Qaeda leadership.”  What could be wrong with all this?
Quite a bit, it turns out.
Return, for a minute, to the moral disgust that Gyges evokes in us.  Gyges also risked very little in attacking the king.  The success of his mission was almost assured, thanks to the technological advantage of his ring. Gyges could sneak past the king’s guards unscathed, so he did not need to kill anyone he did not intend on killing. These are the facts of the matter.
What we find unsettling here is the idea that these facts could be confused for moral justification. Philosophers find this confusion particularly abhorrent and guard against it with the only weapon they have: a distinction.  The “fact-value distinction” holds that statements of fact should never be confused with statements of value.  More strongly put, this distinction means that statements of fact do not even imply statements of value.  “Can” does not imply “ought.”  To say that we can target individuals without incurring troop casualties does not imply that, we ought to.
This seems so obvious.  But, as Peter W. Singer noted earlier this year in The Times, when the Obama administration was asked why continued U.S. military strikes in the Middle East did not constitute a violation of the 1973 War Powers Resolution, it responded that such activities did not “involve the presence of U.S. ground troops, U.S. casualties or a serious threat thereof.” The justification of these strikes rested solely on their ease. The Ring of Gyges has the power to obscure the obvious.
This issue has all the hallmarks of what economists and philosophers call a “moral hazard” — a situation in which greater risks are taken by individuals who are able to avoid shouldering the cost associated with these risks.  It thus seems wise, if not convenient, to underscore several ethical points if we are to avoid our own “Gyges moment.”
First, we might remember Marx’s comment that “the windmill gives you a society with the feudal lord; the steam engine gives you one with the industrial capitalist.” And precision guided munitions and drones give you a society with perpetual asymmetric wars.
The creation of technology is a value-laden enterprise.  It creates the material conditions of culture and society and therefore its creation should be regarded as always already moral and political in nature.  However, technology itself (the physical stuff of robotic warfare) is neither smart nor dumb, moral nor immoral.  It can be used more or less precisely, but precision and efficiency are not inherently morally good.  Imagine a very skilled dentist who painlessly removes the wrong tooth.  Imagine a drone equipped with a precision guided munition that kills a completely innocent person, but spares the people who live in his or her neighborhood.  The use of impressive technologies does not grant one impressive moral insight.  Indeed, as Gyges demonstrates, the opposite can be the case.
Second, assassination and targeted killings have always been in the repertoires of military planners, but never in the history of warfare have they been so cheap and easy.   The relatively low number of troop casualties for a military that has turned to drones means that there is relatively little domestic blowback against these wars. The United States and its allies have created the material conditions whereby these wars can carry on indefinitely. The non-combatant casualty rates in populations that are attacked by drones are slow and steady, but they add up.  That the casualty rates are relatively low by historical standards — this is no Dresden — is undoubtedly a good thing, but it may allow the international media to overlook pesky little facts like the slow accretion of foreign casualties.
Related
More From The Stone
Read previous contributions to this series.
Third, the impressive expediency and accuracy in drone targeting may also allow policymakers and strategists to become lax in their moral decision-making about who exactly should be targeted.  Consider the stark contrast between the ambiguous language used to define legitimate targets and the specific technical means a military uses to neutralize these targets.  The terms “terrorist,” “enemy combatant,” and “contingent threat” are extremely vague and do very little to articulate the legitimacy of military targets. In contrast, the technical capabilities of weapon systems define and “paint” these targets with ever-greater definition. As weaponry becomes more precise, the language of warfare has become more ambiguous.
This ambiguity has, for example, altered the discourse surrounding the issue of collateral damage. There are two very different definitions of collateral damage, and these definitions affect the truth of the following statement:  “Drone warfare and precision guided munitions limit collateral damage.” One definition views collateral damage as the inadvertent destruction of property and persons in a given attack.  In other words, collateral damage refers to “stuff we don’t mean to blow up.” Another definition characterizes collateral damage as objects or individuals “that would not be lawful military targets in the circumstances ruling at the time.” In other words, collateral damage refers to “the good guys.” Since 1998, this is the definition that has been used.  What is the difference between these definitions?
The first is a description of technical capabilities (being able to hit X while not hitting Y); the second is a normative and indeed legal judgment about who is and is not innocent (and therefore who is a legitimate target and who is not).  The first is a matter of fact, the second a matter of value.   There is an important difference between these statements, and they should not be confused.
Fourth, questions of combatant status should be the subject of judicial review and moral scrutiny. Instead, if these questions are asked at all, they are answered as if they were mere matters of fact, unilaterally, behind closed doors, rather than through transparent due process. That moral reasoning has become even more slippery of late, as the American government has implied that all military aged males in a strike area are legitimate targets:  a “guilt by association” designation.
Finally, as the strategic repertoires of modern militaries expand to include drones and precision guided munitions, it is not at all clear that having more choices leads strategists to make better and more informed ones.  In asking, “Is More Choice Better Than Less?” the philosopher Gerald Dworkin once argued that the answer is “not always.” In the words of Kierkegaard:  “In possibility everything is possible.  Hence in possibility one can go astray in all possible ways.”
Some might object that these guidelines set unrealistically high expectations on military strategists and policymakers. They would probably be right.  But no one — except Gyges — said that being ethical was easy.
 

Monday, January 2, 2012

robotic's

Journal Entry by InHardFocus.com on October 7, 2010
Fujitsu Labs' new robotic teddy bear is a "social robot with a personality" -- and he actually has a fairly serious job. The company plans to use the bot in geriatric therapy with patients who suffer from dementia. The teddy bear's sophisticated hardware enables it to interact with and respond to ...
Journal Entry by InHardFocus.com on August 19, 2011
Artist Richard Sargent created this impressive "Where's Wall-E" art, which features pretty much every robot ever made in entertainment history. Can you find Wall-E? (Click on the image for full-size.)
Journal Entry by InHardFocus.com on January 21, 2011
Three men were arrested in Dubai today for selling special "robot jockeys" as a way to fix camel races. The ancient sport of camel racing is surprisingly lucrative in the Middle East, where successful thoroughbreds can be worth up to millions of dollars. The men allegedly sold modified robot jo ...
Journal Entry by InHardFocus.com on February 15, 2011
In a world filled with scary , creepy and downright deadly robots, RURO is a nice change of pace. Designed by schoolchildren and sponsored by Osaka's business community, the educational robot has a sweet, calm presence. And, come on, it's downright adorable. The bot stands 2 feet tall and runs ...
Journal Entry by InHardFocus.com on February 7, 2011
The U.S. military forces in Afghanistan aren't going it alone any more: As of February, more than 2,000 robots are also helping the cause. According to Wired.com 's calculation, that means one in 50 U.S. troops in Afghanistan is a robot. Marine Corp Lt. Col. Dave Thompson, the project manager ...
Journal Entry by InHardFocus.com on August 12, 2011
A robot built to drink wine all day? I'm so jealous. Granted, it's not exactly a robot: It's more of an electronic tongue at this stage. But it's still fantastic at sampling Spain's best wine and differentiating between types. Created at a university in Barcelona, the tongue features voltammetri ...
Journal Entry by InHardFocus.com on July 26, 2011
Image credit: Hawkesbury Gazette One day humans and robots will probably live and work side by side. So, we might as well start the bonding time now. To that end (sort of), the University of Western Sydney's MARCS Robotics Lab has developed an "adopt-a-robot" program. During the six-month trial ...
Journal Entry by InHardFocus.com on November 16, 2011
In a downturned economy, it's always a relief to hear that job creation is on the horizon; this time, from an unexpected source: Robotics. According to a new report, the field will be a major driver for global job creation over the next five years. The announcement is based on a study conducted by ...
Journal Entry by InHardFocus.com on September 27, 2011
Israeli researchers are taking the concept of "artificial intelligence" to an entirely new level. A team at Tel Aviv University has deveoped a tiny, rodent-sized artificial cerebellum that can be implanted onto the skull of a rat. In experiments, the AI brain enables a rat with brain damage to fun ...
Journal Entry by InHardFocus.com on January 26, 2011
To prove to themselves just how advanced robots are becoming, researchers at Germany's Institute of Robotics and Mechatronics sought inspiration from a masterpiece of American technological innovation: the 1991 film "Terminator 2." Check out their creation: an amazingly lifelike robotic hand that ...
Show next page of results »

Wednesday, July 6, 2011

China is at it again: China has a strangle hold on the west, when it come to rare earth metals.










China says it plans to restrict exports of rare earth metals, and build a strategic reserve of the valuable minerals. But this decision by the world's largest producer of rare earth metals has sparked global concerns. Let's check out some global reactions.
The Daily Telegraph has reported that China's decision could cause a crisis for high-tech development. The UK newspaper says global energy competition has entered a new stage, claiming this is because nations are already experiencing difficulties in acquiring rare raw materials.
The US News and World Reports says the US relies on the Chinese exports for new energy uses. Export restrictions on the metal elements could cause fuel refineries to cut production, triggering a new nation-wide energy shortage.
Meanwhile, the Times worries that China's plans could lead to a global supply short-fall, adding that the monopoly of rare earth metals is unimaginable for Western nations.



But developed nations have hardly mentioned the benefits they have won from China's willingness to tolerate the Western world's environmental abuses. Many countries, like the US, have already built their own rare metal reserves. They use imports to protect their mineral reserves. The US is the world's second largest rare earth metals holder, accounting for nearly 12 percent of worldwide stocks. But it began halting production in 1999 for strategic and environmental concerns.
Australia and Canada are also tightening the mining of rare earth metals, and importing from China for mineral reserves.

South Korea and Japan nearly import all rare earth elements from China. The minerals are used in one third of Japan's industrial sector, and the country has on reserve two thirds of its annual imports for strategic proposes

DGH story
Rare earth mine China

 China is planing to cut export of rear earth metal by half in 2011 according to Chines government sources.

Friday, July 1, 2011

China Russia United State Cyber warfare no rules or morals



                        China Russia United State Cyber warfare 
                            ( War without rule and moral restriction)





 The Internet is an amazing resource. As you sit before your monitor, long after your neighbors are warm and cozy in their beds, I want you to think about this: Beyond that screen lies 4,000 years of accumulated knowledge. At any time, you can reach out into the void and bring that knowledge home.
There is something almost metaphysical about this. It's as though you can fuse yourself to the hearts and minds of humanity, read its innermost inspirations, its triumphs, its failures, its collective contributions to us all. With the average search engine, you can even do this incisively, weeding out the noise of things you deem nonessential.
For this reason, the Internet will ultimately revolutionize education. I'm not referring to home study or classes that save time by virtue of teaching 1,000 students simultaneously. Although these are all useful techniques of instruction that will undoubtedly streamline many tasks for teachers and students alike, I am referring to something quite different.

Today, many people have forgotten what the term education really means. Think back to your days at school. In every life there is one memorable teacher: One person who took a subject (history, for example) and with his or her words, brought that subject to life in an electrifying display. Through whatever means necessary, that person transcended the identity of instructor and entered the realm of the educator. There is a difference: One provides the basic information needed to effectively pass the course; the other inspires.


The Internet can serve as a surrogate educator, and users can now inspire themselves. The other night, I had dinner with a heavy-equipment operator. Since his childhood, he has been fascinated with deep space. Until recently, his knowledge of it was limited, primarily because he didn't have enough resources. He had a library card, true, but this never provided him with more than those books at his local branch. Only on two occasions had he ever ordered a book through inter-library loan. At dinner, he explained that he had just purchased a computer and gone online. There, he found a river of information. Suddenly, I realized I was no longer having dinner with a heavy-equipment operator; I was dining with an avid student of Einstein, Hawking, and Sagan. His talk was so riveting that I went away hungry for lack of having eaten.
So this much is true: The Internet is a an incredible resource for information. However, it is also an incredible resource for communication and basic human networking. Networking from a human standpoint is different from computer networking; human networking contains an added ingredient called action. Thus, individuals from all over the world are organizing (or I should say, crystallizing) into groups with shared interests. Women are organizing for equality, voters are organizing for representation, and parents are organizing for legislation to protect their children.
China Accuses the U.S. of Online Espionage
China today accused the U.S. of using internet warfare to bring down enemy governments, especially some in the Middle East. The accusations come from two military scholars who wrote that “the shadow of America” lies behind an “internet tornado” sweeping across the world. Social unrest, and a little online organization would go a long way toward real revolution in that country.


China today accused the U.S. of using internet warfare to bring down enemy governments, especially some in the Middle East. The accusations come from two military scholars who wrote that “the shadow of America” lies behind an “internet tornado” sweeping across the world. Social unrest, and a little online organization would go a long way toward real revolution in that country.
Inherent within this process is the exchange of opinions, or more aptly put, ideology. Ideology of any sort is bound to bring controversy, and controversy brings disagreement. Whether that disagreement occurs between two nations or between two individuals is irrelevant. When it occurs on the Internet, it often degenerates into warfare. That is what this chapter is about.
Much like the term information warfare, the term Internet warfare is often misunderstood. To understand Internet warfare, you must know that there are different classifications of it.


 Let's start with those classifications. From there, we can discuss warfare at its most advanced levels. The classifications are

1.  Personal Internet warfare
2.  Public Internet warfare
3.  Corporate Internet warfare
4.  Government Internet warfare

More generally, Internet warfare is activity in which one or more participants utilize tools over the Internet to attack another or the information of another. The objective of the attack may be to damage information, hardware, or software, or to deny service. Internet warfare also involves any defensive action taken to repel such an attack.



US and Russia


The United States recently changed course and began open talks with Russia regarding the role of the United Nations arms control committee towards strengthening Internet security and limiting the use of cyberspace as a military platform. Although Russia and the US have engaged in dialogue about the subject, their interpretations vary. There has been a growing concern in the Obama Administration over the increasing development of cyberweapons and their use. The goal of the US is to increase international cooperation regarding cybercrime.
The Internet war
THE INTERNET has produced a vast expansion of free speech and access to information around the world. But for China and Russia, it has also become a means for waging a covert war against other nations, including the United States -- a brazen effort to steal secrets and plant malware. For those countries and for a host of other authoritarian regimes, Internet freedom is a threat, to be countered by censorship, the imprisonment of bloggers and domestic spying.
This Story  To win the cyber-war, look to the Cold War
    

        China is world leader in hacked computers, report finds
         The Internet war



The U.S. government has been grappling with these challenges for years. But it has not done enough to fight back politically by making Internet freedom an issue in diplomatic and commercial relations and by seeking the international censure of those who violate it. That's why the speech delivered Thursday by Secretary of State Hillary Rodham Clinton was so important. Ms. Clinton made it admirably clear that abusers such as China will no longer get a free pass in U.S. public diplomacy or in international forums.

China is worthy of special attention in part because a large portion of the cyberattacks on U.S. military and other government agencies originate there and in part because of the restrictions that it places on U.S. companies that offer Internet services to its citizens. Google's announcement this month that it and many other U.S. companies had been the object of cyberattacks from China and that it would no longer censor its China-based search engine finally brought that issue to the forefront. To the administration's credit, Ms. Clinton repeated a demand that China investigate and explain the cyberattack, backed Google's stance and called on other American companies to adopt the same position.

"Censorship should not be in any way accepted by any company from anywhere," Ms. Clinton said. "American companies need to make a principled stand. This needs to be part of our national brand." This raises an immediate issue for Microsoft and Apple, two companies that continue to censor their Chinese content. The administration and Congress should explore what steps can be taken to ensure that these companies and others follow the no-censorship rule wherever they operate.

Ms. Clinton pledged that in addition to defending its own companies and cyberspace, the United States would take measures to help human rights advocates, political dissidents and civil society groups overcome their governments' censorship. Until now, the State Department has been negligent in this area; it has misspent -- or failed to spend at all -- money appropriated by Congress for firewall-busting.

A group called the Global Internet Freedom Consortium has been denied funding, even though it says that it has a proven record of breaching the firewalls of both China and Iran. A State Department official told The Post that the group was refused help because it is connected to the banned Falun Gong movement and "the Chinese would go ballistic if we did that." But other officials told us that is not the case; they said that they hoped that the consortium would apply for future funding, which the State Department sensibly plans to spread, venture-capital style, among various groups and technologies.
Russia Cyber Headquarters
US cyber Unit NSA
 Regardless of who is funded, Beijing will probably "go ballistic." A Foreign Ministry statement issued in response to Ms. Clinton's speech already threatened that the new agenda could be "harmful to China-U.S. relations." And perhaps it should be. Far better that the United States raise issues of Internet freedom, discrimination against U.S. companies and cyberwar stemming from China directly and openly with the Communist leadership than allow Beijing to poison and abuse the Internet without paying a price.
     Articular put together By DGH