Lawfully using autonomous weapon technologies A theoretical and operational perspective

Open Access
Authors
Supervisors
Cosupervisors
Award date 14-02-2024
Number of pages 345
Organisations
  • Faculty of Law (FdR)
Abstract
Autonomous weapon systems (AWS) have to be employed in conformity with international humanitarian law (IHL). On this, the international community has reached consensus. Less clear is how to translate this normative commitment into practice in the field. How are the technology’s end-users – field commanders – expected to exercise command-and-control when ordering AWS-attacks?
This legal treatise adopts an operational approach and theorises on how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. This research explored the following legal questions from a commander’s perspective:
• How does one maintain control of AWS throughout a targeting cycle?
• How does one make informed and reasoned deployment decisions, by analysing information related to the technical parameters of the AWS, characteristics of the operational environment, and enemy countermeasures?
• Under which circumstances may AWS not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend?
• What extra precautionary measures unique to AWS technology can and should be employed?
• When is it militarily desirable to employ AWS (over other alternatives)?
• Under what circumstances may criminal liability be attributed for AWS-related harm?
This monograph has two core outputs, one academic and one practical. For the former, it offers new legal and doctrinal insights on the technology that is useful for future legal developments. For the latter, it provides efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS.
Document type PhD thesis
Language English
Related publication Lawfully Using Autonomous Weapon Technologies Lawfully Using Autonomous Weapon Technologies
Downloads
Thesis (complete) (Embargo up to 2026-08-14)
1: Introduction (Embargo up to 2026-08-14)
2: Controlling AWS: A cyclical process (Embargo up to 2026-08-14)
3: Awareness: Introduction (Embargo up to 2026-08-14)
4: Measures of performance (Embargo up to 2026-08-14)
5: Causes of failure (Embargo up to 2026-08-14)
6: Adversarials: Anti-AI countermeasures (Embargo up to 2026-08-14)
7: Legal-operational analysis: Introduction (Embargo up to 2026-08-14)
8: Variables of complexity and facility (Embargo up to 2026-08-14)
9: AWS and targeting (Embargo up to 2026-08-14)
10: Desirability of using AWS (Embargo up to 2026-08-14)
11: Criminal liability: Problem setting (Embargo up to 2026-08-14)
12: Obstacles to criminal liability: A systemic analysis (Embargo up to 2026-08-14)
13: Across the spectrum of intent (Embargo up to 2026-08-14)
14: Integration and closing (Embargo up to 2026-08-14)
Annex (Embargo up to 2026-08-14)
Permalink to this page
cover
Back