AI-Driven Warfare: Cyber and Moral Predicaments in Modern Conflict
DOI:
https://doi.org/10.63468/jpsa.4.1.42Keywords:
Cyber Conflicts, Asymmetrical warfare, Artificial Intelligence, Irregular tactics, Information and Communication technologyAbstract
War has always been dynamic. The paper begins by looking at the historical trajectory that led to the current state of warfare, emphasizing the transition from conventional, state-centric fights to an era defined by asymmetric warfare, cyber operations, and the fusion of conventional and unconventional tactics. Technological developments, geopolitical upheavals, and strategic thought have all had an impact on warfare's evolution. It also has an impact on the global, political, social, and economic order, which is further complicated by terrorism and cyber warfare. Information and Communicational Technological breakthroughs such as artificial intelligence, autonomous weaponry, and cyber capabilities raise questions about human decision-making. The advent of space warfare and state sovereignty calls into question traditional conceptions of combat. The study looks at the ethical quandaries raised by autonomous weapons, civilian targeting in the digital age, and the risk of irreversible environmental damage. As artificial intelligence becomes more integrated into military applications, concerns about accountability and decision-making responsibility grow. It also investigates the effectiveness of current international rules and norms in addressing these new disputes. The Arms Traffic Treaty was adopted in 2014 with the goal of reducing civilian harm by limiting the transfer of weapons to conflict zones. Several case studies are presented to provide a well-rounded perspective, including conflicts in the Middle East, hybrid warfare, and cyber warfare in the US-Russia rivalry. To summarize, a thorough understanding of modern warfare and its far-reaching consequences will enable policymakers, strategists, and the general public to navigate the complexities of a changing global security landscape. Research is conducted using qualitative and analytical methodologies.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Eman Choudary , Muhammad Anas Ashfaq

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.



