Skip to main content

Currently Skimming:

Appendix B: Meeting Agendas and Participants
Pages 283-297

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 283...
... MEETING 1 Tuesday, August 30, 2011 10:45 AM - 11:15 AM Discussion of Charge with DARPA Norman Whitaker, DARPA 11:15 AM - 12:45 PM Military Ethics and Law Shannon French, Case Western University (video) •  ow and to what extent, if any, do military H ethics differ from the law of armed conflict?
From page 284...
... Consider, for example:  -- Peacekeeping, conflict reduction, humanitarian operations; nation-building  -- DOD support as authorized by law for domestic agencies within the continental United States  -- Traditional military activities, for example with respect to near-peer competitors 5:15 PM Adjourn
From page 285...
...  Consider, for example, such questions as they relate to:  -- Constraints on technologies intended to help protect troops, civilian populations, or particular subgroups; to support humanitarian missions or other peacekeeping operations  -- Technologies that kill vis-à-vis those that maim or that negatively or positively affect mental or psychological processes  -- Concerns regarding blowback from emerging technologies  -- Technologies that enable military operations at long range or that remove the "human-in-the-loop" from decision making (e.g., drones, cyber, robots)  -- Technologies for surveillance (including surveillance of populations as well as of military deployments and movements)
From page 286...
... -- Stuart Harshbarger, Contineo Robotics  Technology (eye) -- Daniel Palanker, Stanford University  Technology (neurology)
From page 287...
... Farahany, Vanderbilt University 5:35 PM - 6:15 PM Reception with Speakers 6:15 PM - 7:45 PM Dinner Thursday, November 3, 2011 8:00 AM - 8:30 AM Breakfast 8:30 AM - 10:15 AM Crosscutting Synthesis and Discussion Judith Reppy, Cornell University George Khushf, University of South Carolina 10:15 AM - 10:30 AM Adjourn Questions for Technology Panels Basic Science What is the maturity of the underlying science for creating national security applications with significant operational value? What hard problems need to be resolved to enable such applications?
From page 288...
... How can or should attention to these issues affect directions and outcomes of basic and applied research oriented toward national security applications? How, if at all, have the ethical and societal issues evolved as the technology has matured?
From page 289...
... •  ow has the research community H responded to such mechanisms? •  ow and in what ways, if any, could such H mechanisms be usefully applied to the conduct of research with applications for national security?
From page 290...
... Paul Fischbeck, Carnegie Mellon University •  ow to elicit expert judgments about the H performance of deeply uncertain systems Denise Caruso, Carnegie Mellon University •  ow to responsibly conduct R&D in the H context of emerging scientific understanding and complexity Peter Hancock, University of Central Florida •  ow to anticipate human use and misuse of H new technologies 10:30 AM - 10:45 AM Break 10:45 AM - 11:45 AM Committee Discussion -- Identification of Major Ideas This session will focus on identifying the major ideas that committee members believe are important for inclusion in the report. To increase the efficiency of the idea extraction process, we'll use a procedure often used in industry to engage committee members in parallel.
From page 291...
... 11:45 AM - 12:45 PM Lunch 12:45 PM - 3:15 PM Committee Discussion 3:15 PM Adjourn Questions for Technology Panels Basic Science What is the maturity of the underlying science for creating national security applications with significant operational value? What hard problems need to be resolved to enable such applications?
From page 292...
... What ethical and societal issues arise if the national security applications described above can be successfully deployed? What ethical and societal issues arise in the course of conducting basic and/or applied research oriented toward national security applications?
From page 293...
... 10:45 AM - 11:00 AM Break 11:00 AM - 12:45 PM Risk Assessment Paul Fischbeck, Carnegie Mellon University Wandi de Bruin, Carnegie Mellon University Arthur (Skip) Lupia, University of Michigan Adam Finkel, Carnegie Mellon University •  hat information do various publics need W in order to judge social and ethical issues of emerging military technologies fairly?
From page 294...
... •  ow and in what ways, if any, could such H mechanisms be usefully applied to the conduct of research with applications for national security? 3:15 PM - 3:30 PM Break 3:30 PM - 5:30 PM Non-U.S.
From page 295...
... Accordingly, •  rofessors Qiu Renzong and Frans Brom are P requested to address ethics in science and technology from the Asian and European perspectives, respectively, and to speculate, if they wish, on the implications of Asian and European perspectives on ethics in science and technology as they might apply to military matters. •  rofessors Steven Lee and Montgomery P McFate are requested to compare different religious (Lee)
From page 296...
... 10:00 AM - 10:15 AM Break 10:15 AM - 12:15 PM Nonlethal Weapons  David Fidler, Center for Applied Cybersecurity Research, Indiana State University  Neil Davison, International Committee of the Red Cross (via videolink)
From page 297...
... APPENDIX B 297 12:15 PM - 1:15 PM Lunch 1:15 PM - 5:30 PM Closed Session 5:30 PM - 8:00 PM Reception and Dinner Tuesday, June 5, 2012 ALL TUESDAY SESSIONS ARE CLOSED.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.