Superintelligence and Law
Noam Kolt
The prospect of artificial superintelligence -- AI agents that can generally outperform humans in cognitive tasks and economically valuable activities -- will transform the legal order as we know it. Operating autonomously or under only limited human oversight, AI agents will assume a growing range of roles in the legal system. First, in making consequential decisions and taking real-world actions, AI agents will become de facto subjects of law. Second, to cooperate and compete with other actors (human or non-human), AI agents will harness conventional legal instruments and institutions such as contracts and courts, becoming consumers of law. Third, to the extent AI agents perform the functions of writing, interpreting, and administering law, they will become producers and enforcers of law. These developments, whenever they ultimately occur, will call into question fundamental assumptions in legal theory and doctrine, especially to the extent they ground the legitimacy of legal institutions in their human origins. Attempts to align AI agents with extant human law will also face new challenges as AI agents will not only be a primary target of law, but a core user of law and contributor to law. To contend with the advent of superintelligence, lawmakers -- new and old -- will need to be clear-eyed, recognizing both the opportunity to shape legal institutions as society braces for superintelligence and the reality that, in the longer run, this may be a joint human-AI endeavor.
Data-Dependent Goal Modeling for ML-Enabled Law Enforcement Systems
Dalal Alrajeh, Vesna Nowack, Patrick Benjamin
et al.
Investigating serious crimes is inherently complex and resource-constrained. Law enforcement agencies (LEAs) grapple with overwhelming volumes of offender and incident data, making effective suspect identification difficult. Although machine learning (ML)-enabled systems have been explored to support LEAs, several have failed in practice. This highlights the need to align system behavior with stakeholder goals early in development, motivating the use of Goal-Oriented Requirements Engineering (GORE). This paper reports our experience applying the GORE framework KAOS to designing an ML-enabled system for identifying suspects in online child sexual abuse. We describe how KAOS supported early requirements elaboration, including goal refinement, object modeling, agent assignment, and operationalization. A key finding is the central role of data elicitation: data requirements constrain refinement choices and candidate agents while influencing how goals are linked, operationalized, and satisfied. Conversely, goal elaboration and agent assignment shape data quality expectations and collection needs. Our experience highlights the iterative, bidirectional dependencies between goals, data, and ML performance. We contribute a reference model for integrating GORE with data-driven system development, and identify gaps in KAOS, particularly the need for explicit support for data elicitation and quality management. These insights inform future extensions of KAOS and, more broadly, the application of formal GORE methods to ML-enabled systems for high-stakes societal contexts.
The significance of the Second Hague Peace conference in the development of the institution of peaceful settlement of international disputes
B.V. Nikolaev, N.A. Pavlova
Background. Domestic diplomacy and international legal science played a leading role in the formation of the institution of peaceful resolution of international disputes. It was Russia that initiated two Hague Peace Conferences in 1899 and 1907. However, this issue has not received sufficient attention from domestic and foreign researchers, the latter, however, actively studied the role of the United States, Great Britain, France and other countries in terms of the development of the institution of peaceful resolution of international disputes. In this regard, the study of the content and results of the Second Peace Conference and its historical significance seems relevant and scientifically significant. The purpose of the work is to identify the main directions and achievements of the Hague Peace Conference of 1907 in the context of the development of the institution of peaceful resolution of international disputes. Materials and methods. These objectives are achieved by analyzing the official materials of the 1907 Hague Peace Conference, official acts of the Russian Ministry of Foreign Affairs, assessments of the conference's achievements given by its participants themselves, as well as international treaties and scientific literature. Results. The work analyzes the work and results of the 1907 forum from the point of view of the development of the institution of peaceful resolution of international disputes. Conclu-sions. The study allows us to draw a conclusion about the special role of Russian diplomacy and international legal science in the codification of the institution of peaceful resolution of international disputes and the progressive development of international law in general.
Incorporating AI incident reporting into telecommunications law and policy: Insights from India
Avinash Agarwal, Manisha J. Nene
The integration of artificial intelligence (AI) into telecommunications infrastructure introduces novel risks, such as algorithmic bias and unpredictable system behavior, that fall outside the scope of traditional cybersecurity and data protection frameworks. This paper introduces a precise definition and a detailed typology of telecommunications AI incidents, establishing them as a distinct category of risk that extends beyond conventional cybersecurity and data protection breaches. It argues for their recognition as a distinct regulatory concern. Using India as a case study for jurisdictions that lack a horizontal AI law, the paper analyzes the country's key digital regulations. The analysis reveals that India's existing legal instruments, including the Telecommunications Act, 2023, the CERT-In Rules, and the Digital Personal Data Protection Act, 2023, focus on cybersecurity and data breaches, creating a significant regulatory gap for AI-specific operational incidents, such as performance degradation and algorithmic bias. The paper also examines structural barriers to disclosure and the limitations of existing AI incident repositories. Based on these findings, the paper proposes targeted policy recommendations centered on integrating AI incident reporting into India's existing telecom governance. Key proposals include mandating reporting for high-risk AI failures, designating an existing government body as a nodal agency to manage incident data, and developing standardized reporting frameworks. These recommendations aim to enhance regulatory clarity and strengthen long-term resilience, offering a pragmatic and replicable blueprint for other nations seeking to govern AI risks within their existing sectoral frameworks.
Protected Grounds and the System of Non-Discrimination Law in the Context of Algorithmic Decision-Making and Artificial Intelligence
Janneke Gerards, Frederik Zuiderveen Borgesius
Algorithmic decision-making and similar types of artificial intelligence (AI) may lead to improvements in all sectors of society, but can also have discriminatory effects. While current non-discrimination law offers people some protection, algorithmic decision-making presents the law with several challenges. For instance, algorithms can generate new categories of people based on seemingly innocuous characteristics, such as web browser preference or apartment number, or more complicated categories combining many data points. Such new types of differentiation could evade non-discrimination law, as browser type and house number are not protected characteristics, but such differentiation could still be unfair, for instance if it reinforces social inequality. This paper explores which system of non-discrimination law can best be applied to algorithmic decision-making, considering that algorithms can differentiate on the basis of characteristics that do not correlate with protected grounds of discrimination such as ethnicity or gender. The paper analyses the current loopholes in the protection offered by non-discrimination law and explores the best way for lawmakers to approach algorithmic differentiation. While we focus on Europe, the conceptual and theoretical focus of the paper can make it useful for scholars and policymakers from other regions too, as they encounter similar problems with algorithmic decision-making.
When Anti-Fraud Laws Become a Barrier to Computer Science Research
Madelyne Xiao, Andrew Sellars, Sarah Scheffler
Computer science research sometimes brushes with the law, from red-team exercises that probe the boundaries of authentication mechanisms, to AI research processing copyrighted material, to platform research measuring the behavior of algorithms and users. U.S.-based computer security research is no stranger to the Computer Fraud and Abuse Act (CFAA) and the Digital Millennium Copyright Act (DMCA) in a relationship that is still evolving through case law, research practices, changing policies, and legislation. Amid the landscape computer scientists, lawyers, and policymakers have learned to navigate, anti-fraud laws are a surprisingly under-examined challenge for computer science research. Fraud brings separate issues that are not addressed by the methods for navigating CFAA, DMCA, and Terms of Service that are more familiar in the computer security literature. Although anti-fraud laws have been discussed to a limited extent in older research on phishing attacks, modern computer science researchers are left with little guidance when it comes to navigating issues of deception outside the context of pure laboratory research. In this paper, we analyze and taxonomize the anti-fraud and deception issues that arise in several areas of computer science research. We find that, despite the lack of attention to these issues in the legal and computer science literature, issues of misrepresented identity or false information that could implicate anti-fraud laws are actually relevant to many methodologies used in computer science research, including penetration testing, web scraping, user studies, sock puppets, social engineering, auditing AI or socio-technical systems, and attacks on artificial intelligence. We especially highlight the importance of anti-fraud laws in two research fields of great policy importance: attacking or auditing AI systems, and research involving legal identification.
Space and National Security: Points of interaction, Opportunities and Issue of Priority
Volodymyr Neskorozhenyi, Volodymyr Zakharov, Alexander Slyusarenko
The article reveals the importance of space for national security. The points of interaction between space activities and national security are identified, which reflect the growing importance of outer space for ensuring the security of States and emergency management, the growth of international cooperation in the field of space technologies. The newest possibilities of space to ensure national security (warning and military intelligence systems; communication systems and means of coordination; systems of space monitoring of the environment and resource management; systems of border and maritime surveillance; development of other technologies; development of global cooperation) are revealed. The problems of ensuring the priority of national security in the use of space resources have been formed, with the formation of a global strategy that geopolitical stability and prevention of the militarization of space should become key aspects for ensuring the national security of any State.
What is glacier sliding
Robert Law, David Chandler, Phillip Voigt
et al.
Glacier and ice-sheet motion is fundamental to glaciology. However, we still lack a consensus for the optimal way to relate basal velocity to basal traction for large-scale glacier and ice-sheet models (the 'sliding relationship'). Typically, a single tunable coefficient loosely connected to one or a limited number of physical processes is varied spatially to reconcile model output with observations. Yet, process-agnostic studies indicate that the suitability of a given sliding relationship depends on the setting. Here, we suggest that this arises from myriad overlapping setting- and scale-dependent sliding sub-processes, including complicated near-basal stress states not captured by large-scale models, reviewed here as comprising a basal 'sliding layer'. A corresponding 'bulk layer' then accounts for ice deformation only minimally influenced by bed properties. We provide a framework for incorporating arbitrarily many sub-processes within a given region -- separated into normal ('form drag') and tangential ('slip') resistance at the ice-bed interface, stressing that the maximum scale of cavitation is an important contributor to the division between the two. Under reasonable assumptions, our framework implies that sliding relationships should fall within a sum of regularised-Coulomb and power-law components, with a rough-smooth distinction proving more consequential in dictating sliding behaviour than a traditional hard-soft transition.
Influence of valley topography on earth pressure of high-fill arch culvert
FENG Zhong-ju, WANG Si-qi, WANG Xi-qing
et al.
High-fill culverts placed in valley topography have a complex earth pressure distribution law due to their locations around culverts in various valley topography conditions. In order to investigate the influence of valley topography on the earth pressure around the culvert of high-fill arch culverts, an interaction model of "topography-culvert-fill" was established by using centrifugal model test and numerical simulation method. Additionally, the distribution laws of earth pressure around the arch culverts and earth pressure concentration coefficient Ks at the top of the culvert under different valley widths B and valley slopes α were analyzed and were compared with the latest Chinese culvert design code. Furthermore, the mechanism of earth pressure formation of high-fill arch culverts under valley topography was presented. The research findings are as follows: (1) The influence of the valley width B on the earth pressure concentration coefficient Ks at the top of the culvert is significant, and the increment of the earth pressure concentration coefficient Ks at the top of the culvert is larger when B is 4D−6D(D is the clear span of arch culvert). (2) When B is less than 4D, the topography would play the role of load reduction to the culvert. (3) With valley slopes ranging from 45° to 60°, the earth pressure at the tops and Ks would be affected dramatically. (4) When fill height is 20 m with α >70°, Ks≤1; and when 40 m fill height with α >50°, Ks≤1. (5) The Ks recommended by the latest Chinese culvert design code differs to some extent from those by centrifugal model test and numerical simulation. In the case of α =45° with a small B value, the earth pressure concentration coefficient Ks at the top of a culvert of the code is more conservative. (6) Ks of high-fill arch culvert in valley is related to the formation of arch top compaction area and isobaric surface. The arch top compaction area can cause the earth pressure concentration on the top of the arch culvert, and cause the vertical earth pressure of the soil around the compaction area to be arched. At a certain depth approaching the surface of the fill, the arch distribution gradually transits to the horizontal distribution, thus forming an isobaric surface. The upper load of the isobaric surface will be dispersed on the valley slope, so the unloading effect of the valley topography can be exerted.
Engineering geology. Rock mechanics. Soil mechanics. Underground construction
Application of a Novel Multi-Agent Optimization Algorithm Based on PID Controllers in Stochastic Control Problems
Andrei Panteleev, Maria Karane
The article considers the problem of finding the optimal on average control of the trajectories of continuous stochastic systems with incomplete feedback. This class of problems includes control problems in which the initial states are described by a given distribution law; random effects on the control object are taken into account; and it is also assumed that information is available only about some coordinates of the state vector. As special cases, the problems of determining the optimal open-loop control and control with complete feedback in the presence of information about all state vector coordinates are considered. A method for parameterization of the control law based on expansions in various systems of basis functions is described. The problem of parametric optimization obtained is solved using a new metaheuristic multi-agent algorithm based on the use of extended PID (Proportional-Integral-Derivative) controllers to control the movement of agents. Solutions of three model examples of control of nonlinear continuous stochastic systems with interval constraints on the amount of control for all possible cases of state vector awareness are presented.
Analysis of the status and framework design of intelligentcoal mine auxiliary transportation system
CHANG Kai, LIU Zhigeng, YUAN Xiaoming
et al.
This paper introduces the development and application status of intelligent auxiliary transportation technology in open-pit coal mine and underground coal mines at home and abroad. The intelligent auxiliary transportation system of open-pit coal mine has realized the functions of unmanned driving, automatic loading, automatic unloading, active obstacle avoidance and intelligent dispatching of mining trucks in fixed sections. And the system has achieved good application results in engineering practice. At present, the auxiliary transportation intelligence of underground coal mine is still in the development stage of single machine intelligence of equipment. The intelligent auxiliary transportation system integrating vehicle scheduling, operation status monitoring, traffic command, material control and other functions has not yet been formed. The main problems of intelligent auxiliary transportation system in underground coal mine are analyzed. The underground positioning system has low precision and poor real-time performance. The dispatching system function lacks effective integration. The driving assistance system module is not perfect. The unmanned driving technology lags behind and the test conditions are lacking. Based on the relevant requirements of intelligent auxiliary transportation in Coal Mine Intelligent Construction Guide (2021 edition), this paper puts forward the overall goal of the construction of intelligent auxiliary transportation. According to the overall goal, the intelligent coal mine auxiliary transportation system framework is designed. ① Coding and centralized loading transportation of materials realizes the whole process information management and control of materials from storage, coding, loading, transportation, unloading and recycling. ② Automatic loading and unloading and automatic connection realizes the automatic transfer and connection of materials among rail locomotives, monorail cranes, trackless and other different auxiliary transportation modes. ③ Accurate positioning and intelligent navigation achieves accurate real-time positioning, route planning and real-time navigation of personnel and transportation equipment. ④ Intelligent vehicle dispatching realizes the functions of auxiliary transportation comprehensive information display, data transmission, status monitoring, dispatching command and health management. ⑤ Driving assistance system builds several intelligent subsystems, such as anti fatigue driving warning, 360° panoramic look around monitoring, collision prevention, traffic sign identification, auxiliary braking for downhill driving, adaptive lighting, etc. Driving assistance system improves the safety of locomotive operation. ⑥ The auxiliary operation robot realizes the robot automatic operation of underground auxiliary operation scenes. The auxiliary operation robot reduces the number of personnel and improves the overall automation level of auxiliary operation. ⑦ Unmanned driving realizes the normal unmanned driving operation of locomotives in underground coal mine. The research can provide reference for the construction and development of intelligent auxiliary transportation system.
Mining engineering. Metallurgy
Hardy-Leindler-Type Inequalities via Conformable Delta Fractional Calculus
H. M. Rezk, Wedad Albalawi, H. A. Abd El-Hamid
et al.
In this article, some fractional Hardy-Leindler-type inequalities will be illustrated by utilizing the chain law, Hölder’s inequality, and integration by parts on fractional time scales. As a result of this, some classical integral inequalities will be obtained. Also, we would have a variety of well-known dynamic inequalities as special cases from our outcomes when α=1.
Decision-Making Within Forensic Psychiatric Investigations: The Use of Various Information Sources by Different Expert Groups to Reach Conclusions on Legal Insanity
Lizel Göranson, Olof Svensson, Olof Svensson
et al.
BackgroundWhich type of information experts use to make decisions regarding legal insanity within forensic psychiatric investigations (FPI) is relatively unknown, both in general and when considering variations due to case context. It is important to explore this area to be able to counteract the effects of various kinds of cognitive bias.MethodThe aim was to explore whether FPI expert groups differed regarding case-specific as well as general use of information types required to make decisions on severe mental disorder (SMD). Three FPI case vignettes were presented to three professional groups involved in FPIs in Sweden (n = 41): forensic psychiatrists (n = 15), psychologists (n = 15), and social workers (n = 11). The participants reported which types of information they required to reach conclusions regarding SMD in each case. They also reported which types of information they had used within general FPI praxis during the previous year and the information types’ perceived usefulness.ResultsThe expert groups differed somewhat regarding what type of information they required for the cases (e.g., results from cognitive testing), but some information was required in all cases (e.g., client’s self-report). Regarding the preliminary assessment of SMD in the three cases, minor differences were found. Within the general FPI praxis, experts reported using several information types, while the general perceived usefulness of these sources varied.DiscussionThe professional groups relied partly on a “core” of information sources, but some case-specific adaptations were found. The professional groups’ inclination to suspect SMD also varied somewhat. This indicates a need to explore the potential consequences of these similarities and differences.
Cybersecurity Law: Legal Jurisdiction and Authority
Feras A. Batarseh
Cybersecurity threats affect all aspects of society; critical infrastructures (such as networks, corporate systems, water supply systems, and intelligent transportation systems) are especially prone to attacks and can have tangible negative consequences on society. However, these critical cyber systems are generally governed by multiple jurisdictions, for instance the Metro in the Washington, D.C. area is managed by the states of Virginia and Maryland, as well as the District of Columbia (DC) through Washington Metropolitan Area Transit Authority (WMATA). Additionally, the water treatment infrastructure managed by DC Water consists of waste water input from Fairfax and Arlington counties, and the district (i.e. DC). Additionally, cyber attacks usually launch from unknown sources, through unknown switches and servers, and end up at the destination without much knowledge on their source or path. Certain infrastructures are shared amongst multiple countries, another idiosyncrasy that exacerbates the issue of governance. This law paper however, is not concerned with the general governance of these infrastructures, rather with the ambiguity in the relevant laws or doctrines about which authority would prevail in the context of a cyber threat or a cyber-attack, with a focus on federal vs. state issues, international law involvement, federal preemption, technical aspects that could affect lawmaking, and conflicting responsibilities in cases of cyber crime. A legal analysis of previous cases is presented, as well as an extended discussion addressing different sides of the argument.
A scaling law chaotic system
Xiao-Jun Yang
In this article, we propose an anomalous chaotic system of the scaling-law ordinary differential equations involving the Mandelbrot scaling law. This chaotic behavior shows the "Wukong" effect. The comparison among the Lorenz and scaling-law attractors is discussed in detail. We also suggest the conjecture for the fixed point theory for the fractal SL attractor. The scaling-law chaos may be open a new door in the study of the chaos theory.
PUBLIC INTEREST IN PUBLIC PROCUREMENT
Vitaly V. Kikavets
The basis of legal relations in public procurement are private and public interests. The purpose of the study is a substantive assessment of the authors hypothesis that the purpose of legal regulation and financial support of public procurement is to satisfy the public interest expressed in the form of a public need for goods, works, and services. The methodological basis of the study rests on historical and systematic approach, analysis, synthesis and comparative-legal methods. The results of the analysis of normative legal acts regulating public procurement, doctrinal literature and practice showed that public interest denounced in the form of public need is realized through public procurement. Public and private interests can be realized exclusively jointly since these needs cannot objectively be met individually. In general, ensuring public as well as private interests boils down to defining and legally securing the rights and obligations of the customer and their officials, which safeguards them in the process of meeting public needs through public procurement. The study revealed the dependence of the essence of public interest on the political regime, which determines the ratio of public and private interests. Public interest in public procurement is suggested to understand as the value-significant selective position of an official or another person authorized by the government, which is expressed in the form of the public need for the necessary benefit; gaining such benefit involves both legal regulation and financial security. The purpose of legal regulation of public procurement is to satisfy public interest. These concepts should be legally enshrined in Law No. 44-FZ.
The scaling-law flows: An attempt at scaling-law vector calculus
Xiao-Jun Yang
In this paper, the scaling-law vector calculus, which is related to the connection between the vector calculus and the scaling law in fractal geometry, is addressed based on the Leibniz derivative and Stieltjes integral for the first time. The Gauss-Ostrogradsky-like theorem, Stokes-like theorem, Green-like theorem, and Green-like identities are considered in the sense of the scaling-law vector calculus. The Navier-Stokes-like equations are obtained in detail. The obtained result is as a potentially mathematical tool proposed to develop an important way of approaching this challenge for the scaling-law flows.
en
nlin.CD, physics.flu-dyn
Development and Hybrid Control of an Electrically Actuated Lower Limb Exoskeleton for Motion Assistance
Chao-Feng Chen, Zhi-Jiang Du, Long He
et al.
This paper describes a system design and hybrid control algorithm of an electrically actuated lower limb exoskeleton (LLE). The system design mainly includes three parts: mechanical structure design, actuation system design and sensor system design. According to the initial state of the joint angle, LLE can be divided into Non-anthropomorphic state (NAS) and anthropomorphic state (AS). The human motion intention (HMI) estimation can be divided into gait phase classification and reference trajectory estimation. The fuzzy logic is used to detect different phases in the gait phase classification. In the reference trajectory estimation, the kinematic model of the LLE is utilized to obtain a continuous joint trajectory, which is used as input of the control law. To make the LLE accurately follow the movement of people and remain stable, a hybrid dual-mode control strategy is proposed in this paper, i.e., the adaptive impedance control (AIC) method is used to improve the stability and resistance to shock in stance phase, and the active disturbance rejection control with the fast terminal sliding mode control (ADRC-FTSMC) method is employed to improve the response speed and the tracking precision in swing phase. Furthermore, in order to solve the torque discontinuity in the switching process, a smoothing method is proposed during the transition. Finally, the prototype experiments were set up to verify the tracking performance and power-assisted effect of the proposed exoskeleton. The experiments results show the LLE can achieve excellent tracking performance and power-assisted effect based on the proposed HMI methodology and hybrid dual-mode control strategy.
Electrical engineering. Electronics. Nuclear engineering
LA PROBLEMATIQUE DE LA PREVENTION DE L’EXPLOITATION ILLICITE DES MINERAIS EN REPUBLIQUE DEMOCRATIQUE DU CONGO
Renia Binaki Bamangana
L’exploitation illicite des minerais congolais a été la cause de violation massive des droits de l’homme, mais également de la destruction de l’économie congolaise par la perte des financements vrais à même de lui permettre de réduire la pauvreté de la population congolaise. Ce qui est une atteinte au droit souverain sur les ressources naturelles. C’est pour tenter d’y mettre fin que des mécanismes juridiques ont été mis en place au niveau international, sous-régional et même national. Leur efficacité théorique est mise à rude épreuve face aux intérêts divergents des acteurs impliqués et par la faiblesse de l’Etat congolais, faiblesse manifestée par l’inexistence d’une jurisprudence en la matière qui aurait un rôle pédagogique de dissuasion à jouer auprès de tous ceux qui s’y aventuraient à nouveau.