<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD with MathML3 v1.2 20190208//EN" "JATS-journalpublishing1-mathml3.rng">
<article xmlns:xlink="http://www.w3.org/1999/xlink"
         article-type="research-article"
         dtd-version="1.2"
         xml:lang="en"><?letex RNG_JATS-journalpublishing1-mathml3 ok?>
   <front>
      <journal-meta>
         <journal-id/>
         <journal-title-group>
            <journal-title>TATuP – Journal for Technology Assessment in Theory and Practice</journal-title>
         </journal-title-group>
         <issn pub-type="ppub">2568-020X</issn>
      </journal-meta>
      <article-meta>
         <article-id>7257</article-id>
         <article-id pub-id-type="doi">10.14512/tatup.7257</article-id>
         <article-categories>
            <subj-group>
               <subject>Research article</subject>
            </subj-group>
            <subj-group>
               <subject>Special topic · Technology assessment and future warfare: The Good, the Bad, and the Ugly</subject>
            </subj-group>
         </article-categories>
         <title-group>
            <article-title xml:lang="en">Military technology assessment and preventive arms control</article-title>
            <subtitle xml:lang="en">Fundamental issues, natural-science peace research, and present challenges</subtitle>
            <trans-title-group>
               <trans-title xml:lang="de">Militär-Technikfolgenabschätzung und präventive Rüstungskontrolle</trans-title>
               <trans-subtitle xml:lang="de">Grundlegende Fragen, naturwissenschaftliche Friedensforschung und aktuelle Herausforderungen</trans-subtitle>
            </trans-title-group>
         </title-group>
         <contrib-group>
            <contrib contrib-type="author" corresp="yes" id="Au1" xlink:href="#Aff1">
               <name name-style="western">
                  <surname>Altmann</surname>
                  <given-names>Jürgen</given-names>
                  <prefix>PD Dr.</prefix>
               </name>
               <address>
                  <email>juergen.altmann@tu-dortmund.de</email>
               </address>
               <bio>
                  <boxed-text id="FPar1" specific-use="Style1">
                     <caption>
                        <title>PD DR. JÜRGEN ALTMANN</title>
                     </caption>
                     <p>is a physicist and peace researcher (retired) at TU Dortmund University since 1999, continuing lecturing there. Since 1985 he has studied scientific-technical problems of disarmament. An experimental focus is automatic sensor systems for co-operative verification and IAEA safeguards. Another focus is assessment of new military technologies and preventive arms control.</p>
                     <fig id="Figa">
                        <label/>
                        <caption>
                           <title/>
                        </caption>
                        <graphic specific-use="Print" xlink:href="910000_2026_7257_Figa_Print.eps"/>
                        <graphic specific-use="HTML" xlink:href="910000_2026_7257_Figa_HTML.png"/>
                     </fig>
                  </boxed-text>
               </bio>
               <aff id="Aff1">
                  <institution>TU Dortmund University</institution>
                  <institution content-type="dept">Experimental Physics III</institution>
                  <addr-line>
                     <city>Dortmund</city>
                     <country>Germany</country>
                  </addr-line>
               </aff>
            </contrib>
         </contrib-group>
         <pub-date date-type="pub">
            <day>23</day>
            <month>03</month>
            <year>2026</year>
         </pub-date>
         <fpage>22</fpage>
         <lpage>27</lpage>
         <permissions>
            <copyright-year>2026</copyright-year>
            <copyright-holder>by the author(s); licensee oekom</copyright-holder>
            <license>
               <license-p>This Open Access article is published under a Creative Commons Attribution 4.0 International Licence (CC BY).</license-p>
            </license>
         </permissions>
         <abstract abstract-type="summary" id="Abs1" xml:lang="en">
            <title>Abstract</title>
            <p>Military technologies have so far been largely neglected in technology assessment (TA), even though they can have devastating consequences and their very purpose is to cause damage, injury, and death. While an individual state can establish and enforce rules for civilian technologies, in the anarchic international system there is no higher authority that can regulate military technologies – restrictions and prohibitions can only come about through voluntary agreements between states. Military TA starts with a natural-science/technical analysis, evaluates the results against a set of criteria, and then develops options for preventive restrictions. The article outlines examples from such past and current work, showing that emerging military technologies pose particular challenges for TA.</p>
         </abstract>
         <abstract abstract-type="summary" id="Abs2" xml:lang="de">
            <title>Zusammenfassung</title>
            <p>Militärtechnologien wurden bisher in der Technikfolgenabschätzung (TA) weitgehend vernachlässigt, obwohl sie verheerende Auswirkungen haben können und ihr eigentlicher Zweck darin besteht, Schaden, Verletzung und Tod zu verursachen. Während ein einzelner Staat Regeln für zivile Technologien aufstellen und durchsetzen kann, gibt es im anarchischen internationalen System keine übergeordnete Instanz, die militärische Technologien regulieren kann – Einschränkungen und Verbote können nur durch freiwillige Vereinbarungen zwischen Staaten zustande kommen. Militär-TA beginnt mit einer naturwissenschaftlich-technischen Analyse, bewertet die Ergebnisse anhand einer Reihe von Kriterien und entwickelt dann Optionen für präventive Beschränkungen. Im Artikel werden Beispiele aus solchen früheren und aktuellen Arbeiten angeführt, die zeigen, dass neue militärische Technologien die TA vor besondere Herausforderungen stellen.</p>
         </abstract>
         <kwd-group>
            <compound-kwd>
               <compound-kwd-part content-type="code">heading</compound-kwd-part>
               <compound-kwd-part content-type="text">Keywords</compound-kwd-part>
            </compound-kwd>
            <compound-kwd>
               <compound-kwd-part content-type="code"/>
               <compound-kwd-part content-type="text">military technology assessment</compound-kwd-part>
            </compound-kwd>
            <compound-kwd>
               <compound-kwd-part content-type="code"/>
               <compound-kwd-part content-type="text">preventive arms control</compound-kwd-part>
            </compound-kwd>
            <compound-kwd>
               <compound-kwd-part content-type="code"/>
               <compound-kwd-part content-type="text">peace research</compound-kwd-part>
            </compound-kwd>
            <compound-kwd>
               <compound-kwd-part content-type="code"/>
               <compound-kwd-part content-type="text">emerging technologies</compound-kwd-part>
            </compound-kwd>
         </kwd-group>
      </article-meta>
      <notes>
         <sec sec-type="referencedarticle">
            <title/>
            <p>
               <italic>This article is part of the Special topic</italic> “Technology assessment and future warfare: The Good, the Bad, and the Ugly,” <italic>edited by K. Weber, M. Bresinsky. <ext-link xlink:href="https://doi.org/10.14512/tatup.7286">https://doi.org/10.14512/tatup.7286</ext-link>
               </italic>
            </p>
         </sec>
      </notes>
   </front>
   <body>
      <sec id="Sec1">
         <label>1</label>
         <title>Introduction: military technology – the neglected field in technology assessment</title>
         <p>Usually, technology assessment (TA) is concerned about potential negative impacts from new technologies – affecting humans, the environment, society – and strives to provide information that can help decision makers and society to avoid these effects. Preventing or minimizing death, injury and damage is a routine task in engineering, even before TA, and they occur rarely, mainly in accidents and sometimes from intended misuse by single perpetrators. On the opposite, military technology – central for armed forces – is designed and developed to kill, injure, or destroy from the outset. Thus, it is odd that TA does not often take military uses of technology into view. Text books on TA neglect military issues.<fn id="Fn1">
               <p>E.g. Paschen et al. <xref ref-type="bibr" rid="CR29">1978</xref>; Porter et al. <xref ref-type="bibr" rid="CR34">1980</xref>. Even the recent book on TA in a Globalized World (Hennen et al. <xref ref-type="bibr" rid="CR19">2023</xref>) does not mention military/war and peace issues.</p>
            </fn> But there are exceptions. The Office of Technology Assessment of the US Congress, which operated from 1972/1974 to 1995, had an International Security and Commerce (later: International Security and Space) Program that produced many highly relevant reports. In Germany, the Office of Technology Assessment at the German Bundestag (TAB) has done a handful of preliminary and full studies of military technologies.<fn id="Fn2">
               <p>Dealing with: preventive arms control, dual use, space, uncrewed systems, autonomous weapon systems (Petermann et al. <xref ref-type="bibr" rid="CR31">1996</xref>; Altmann <xref ref-type="bibr" rid="CR1">2000</xref>; Petermann et al. <xref ref-type="bibr" rid="CR32">2003</xref>; Petermann and Grünwald <xref ref-type="bibr" rid="CR33">2011</xref>; Grünwald and Kehl <xref ref-type="bibr" rid="CR17">2020</xref>). For comparison: The total number of TAB Work Reports, excluding annual activity reports, is 188 (TAB <xref ref-type="bibr" rid="CR38">2025</xref>a).</p>
            </fn> In the 105 issues of TATuP since 1992 a few articles have covered military technologies.<fn id="Fn3">
               <p>Found by search in the archive (TATuP <xref ref-type="bibr" rid="CR40">2025</xref>) using keywords “Krieg” and “milit*” and counting only the articles directly treating military uses. These covered drones/robots (Geser <xref ref-type="bibr" rid="CR16">2011</xref>; Koch and Rinke <xref ref-type="bibr" rid="CR21">2011</xref>), autonomous weapon systems (Nass <xref ref-type="bibr" rid="CR26">2022</xref>; Tzoufis and Petropoulos <xref ref-type="bibr" rid="CR42">2024</xref>), and preventive arms control (Bielefeld and Eurich <xref ref-type="bibr" rid="CR8">2005</xref>).</p>
            </fn>
         </p>
         <p>With the start of natural-science/technical peace research in Germany came important contributions. Following the intermediate-range missile debate and protests of the 1980s, some researchers in Germany turned to problems of disarmament and peace (Kronfeld et al. <xref ref-type="bibr" rid="CR23">1993</xref>). A major focus was military TA and preventive arms control – work was done, among others, for the respective TAB project (Petermann et al. <xref ref-type="bibr" rid="CR31">1996</xref>). Five groups collaborated to develop a general framework and study specific cases (Altmann et al. <xref ref-type="bibr" rid="CR2">2001</xref>). Such work was continued since then in several areas, e.g. biotechnology, plutonium disposition, nanotechnology, and ballistic missile defense. Recently, the acceleration of military technologies has led to increased activities in peace-research institutes and to new professorships in computer science and physics (Reuter et al. <xref ref-type="bibr" rid="CR37">2026</xref>).</p>
         <p>This article discusses the purpose of military TA, explaining the differences between civilian and military uses. It presents approaches of military TA and methods how threats can be reduced by preventive arms control. Ballistic missile defense serves as an example of an enduring issue. Challenges from new technologies conclude the text.</p>
      </sec>
      <sec id="Sec2">
         <label>2</label>
         <title>Two ways of assessing military technologies</title>
         <p>The assessment of new military technologies, new military uses of technologies, or new kinds of military systems can have the goal of increasing the combat strength of one’s armed forces. Such analyses are routinely done in the planning of armaments as well as of military research and development. Such work much increased after 1945 and led to think tanks such as RAND (<xref ref-type="bibr" rid="CR35">2025</xref>), long before TA began.</p>
         <p>The other approach rather follows the general goal of TA, that is, to avoid harm. Since war consists of the systematic production of harm to overcome the will of an enemy by violent force, a main aim should be the avoidance of war, in particular nuclear war, or, if war cannot be avoided, to limit the damage and suffering. The first aim is enshrined in the UN Charter (Art. 2) and the German Fundamental Law (Art. 26), the second aim is covered by international humanitarian law (the laws of warfare), generally accepted by the states. These lay one foundation of the ethical framework for military TA. Thus, its first task is to investigate whether new military technologies or systems would increase the risk of war or would make war more horrible. The second then is to study ways of preventing such outcomes, possibly by preventive limits on technologies or on their military uses.</p>
         <p content-type="eyecatcher" specific-use="Style2">A main aim should be the avoidance of war.</p>
         <p>There is no strict separation between both approaches. Firstly, analyses in both can come to similar results on a technical level. Secondly, if one accepts that armed forces exist – or if one even finds continued nuclear deterrence important to avoid nuclear war – preventing destabilization is a common motive, and each type of analysis can learn from the other.</p>
      </sec>
      <sec id="Sec3">
         <label>3</label>
         <title>Civilian versus military uses of technology</title>
         <p>There is a fundamental difference between civilian and military uses of technologies. In civilian life dangerous technologies are regulated to prevent or at least minimize damage, injury, or death. Such regulation takes place within states (often with international co-ordination). Misuse is prohibited and accidents are precluded as far as possible by laws and other regulation; handling may require licenses. The state has the power, means, and personnel to enforce compliance with the set rules. Perpetrators can be prosecuted, brought to court trial, put into jail, etc. The state has far-reaching inspection rights, e.g. on suspicion of non-compliance. Such constraints on individual freedom are broadly accepted for the sake of safety and security of citizens and society.</p>
         <p>Military technologies, on the contrary, are designed intentionally to destroy, injure, or kill, selectively or massively. In the international system, still basically anarchic, there is no overarching authority with a monopoly on legitimate violence that could guarantee the security of states, that would be legitimized to set and enforce rules for weapons and armed forces, which would include military uses of technology. Thus, to prepare themselves for aggression by another state, the states maintain armed forces. This creates the security dilemma (Herz <xref ref-type="bibr" rid="CR20">1950</xref>): As states strengthen their armed forces for defense against aggression, at the same time they increase the threats towards other states. While each state strives for its own security, the overall outcome at the system level is that the security decreases for all. One way out is arms control, that is, mutual limitation of armaments and forces (Bull 1961/<xref ref-type="bibr" rid="CR11">1965</xref>). Arms control has three goals: avoiding war (in particular nuclear war), limiting the damage should war nevertheless occur, and saving expenses. These goals are not automatically consistent, so the first goal should take precedence.</p>
         <p>To make arms control legally binding, states conclude international treaties. To make it reliable, mechanisms of verification of compliance are included, by observation from outside or, co-operatively, by on-site inspections. There is a friction between limitations of the armed forces and their motive to gain victory in war, should it occur, and between transparency and military secrecy.</p>
         <p>Thus, military uses of technology set a very different context for TA and the ensuing regulation: International agreements are needed, states have to enter them voluntarily, limiting one‘s armaments or forces is at odds with the motive for higher combat strength, and secrecy creates additional hurdles. Thus, agreeing to arms control can be a tedious process within and among countries.</p>
      </sec>
      <sec id="Sec4">
         <label>4</label>
         <title>Military technology assessment – criteria and preventive arms control</title>
         <p>Assessment of a new military technology (or its new military uses) needs interdisciplinary research, proceeding in several steps (Altmann <xref ref-type="bibr" rid="CR3">2008</xref>). The first is prospective natural-science/technical analysis of the foreseeable applications – what would be the properties of the technology, how would a weapon effect propagate, what would be the effect on a target? In the second step, one investigates military/operational aspects – what would be probable uses, against which targets? How about unusual modes of use? Which collateral damages would be possible? In the third step, one studies potential consequences systematically. Would the technology undermine arms-control and disarmament treaties or violate international humanitarian law? Could it be used for weapons of mass destruction? Could it destabilize the military situation or lead to an accelerated qualitative arms race? Is there a potential for proliferation? Would it bring dangers for humans, the environment or society?</p>
         <p>If the assessment is negative in at least one dimension, then in the fourth step options for potential limits need to be considered, including methods and means for the verification of compliance, and the required extent of inclusion of civilian uses. Ideally, then, states would take up such analyses and proposals and would start negotiations, optimally about a legally binding treaty.</p>
         <p>Such preventive arms control concerns technologies or systems that are not (yet) introduced into the armed forces. Inclusion of preventive elements succeeded in several arms-control treaties. This is the case with the nuclear test ban treaties (partial 1963, comprehensive 1996), the Conventions banning biological (1972) and chemical (1993) weapons and environment modification (1977), the Nuclear Non-Proliferation Treaty (1968), the Anti-Ballistic Missile (ABM) Treaty (1972–2002, USA-USSR), the Antarctica (1959) and Outer Space (1967) Treaties and the Protocol on Blinding Laser Weapons (1995). Some treaties prohibit not only deployment and use, but also the earlier stages of development and testing, e.g. the Biological and the Chemical Weapons Conventions.</p>
         <p>Despite such partial successes of preventive arms control, the general qualitative arms race was not significantly slowed down – neither in the Cold War nor after it. Ballistic missile defense provides a case in point.</p>
      </sec>
      <sec id="Sec5">
         <label>5</label>
         <title>Ballistic missile defense – an example of military technology assessment</title>
         <p>In the Cold War, several scientists advised the governments in the USA and the USSR on military-technical issues, mostly under secrecy rules. Motivated to prevent nuclear war and unintended escalation, some issued warnings to the public, built on technical analyses of the new kinds of weapons that were being researched and developed. An enduring issue has been defense against ballistic missiles. Explaining the technical properties of the intended anti-ballistic missile systems, Richard Garwin and Hans Bethe pointed out in Scientific American that protection from nuclear missiles could not be achieved and that ABM deployments would rather lead to an increase in offensive missiles on the US and Soviet sides (Garwin and Bethe <xref ref-type="bibr" rid="CR15">1968</xref>). At the same time Herbert York explained that the introduction of multiple independently targetable reentry vehicles (MIRVs) on ballistic missiles was inseparable from ABM and that “the military power of the United States has been steadily increasing while at the same time our national security has been rapidly and inexorably decreasing. The same thing is happening in the Soviet Union.” (York <xref ref-type="bibr" rid="CR43">1970</xref>)<fn id="Fn4">
               <p>Many early texts covering the full field are reprinted in Foradori et al. (<xref ref-type="bibr" rid="CR14">2018</xref>).</p>
            </fn>. Such arguments played a role in the 1972 conclusion by both countries of the ABM Treaty and the SALT I Interim Agreement. ABM systems were limited strictly, strategic missiles moderately, and MIRVs were not prevented.</p>
         <p>When in 1983 US President Reagan proposed his “Strategic Defense Initiative” (SDI) in which ballistic missile defense by directed energy weapons in space should render “these nuclear weapons impotent and obsolete” (Reagan <xref ref-type="bibr" rid="CR36">1983</xref>), a big study from the American Physical Society (APS) assessed that crucial system elements would need improvements of several orders of magnitude and that space weapons would create threats against satellites, including other space weapons (Bloembergen et al. <xref ref-type="bibr" rid="CR9">1987</xref>). This and the reports by the OTA (<xref ref-type="bibr" rid="CR27">1985</xref>, <xref ref-type="bibr" rid="CR28">1988</xref>) – here under the explicit designation as TA –, as well as experiences in SDI research, raised fundamental questions about the feasibility and sensibleness of the program. They were important factors in the decisions of the late 1980s and the early 1990s to direct ballistic missile defense away from beam weapons and from the idea of full nation-wide protection against nuclear attack. Later APS studies investigated defense acting in the boost phase of intercontinental ballistic missiles (ICBMs) (Barton et al. <xref ref-type="bibr" rid="CR6">2004</xref>) and studied the effectiveness against ICBMs from North Korea (Lamb et al. <xref ref-type="bibr" rid="CR24">2025</xref>), both skeptical.</p>
         <p content-type="eyecatcher" specific-use="Style2">The fundamental situation is the same as sixty, or forty years ago.</p>
         <p>Recently, motivated by the apparent Israeli success in defense against the Iranian missile attacks of April (accompanied by drones) and October 2024, US President Trump has revived the concept of full defense of the US against all kinds of missiles (Trump <xref ref-type="bibr" rid="CR41">2025</xref>). According to independent analysis by experts in missiles and missile defense, Israel stopped only 80 to 85 percent of the (conventionally armed) missiles. Concerning complete protection of the much larger USA against nuclear missiles, the fundamental situation is the same as sixty or forty years ago: It is not a credible possibility for several reasons (Fetter and Wright <xref ref-type="bibr" rid="CR13">2025</xref>). It is noteworthy that according to the Executive Order the US “will guarantee its secure second-strike capability” (Trump <xref ref-type="bibr" rid="CR41">2025</xref>), that is, US missiles must to be able to overcome any Russian or Chinese missile defenses. But obviously Russia and China will do the utmost to maintain their respective capabilities in the face of increased US defense efforts; the US aspiration for complete asymmetry cannot materialize.</p>
         <p>Scientists’ warnings were partially heeded in the early 1970s: ABM systems and strategic weapons were limited, but missiles with multiple warheads (MIRVs) proceeded. Similarly, in the 1980s beam weapons in outer space were put on hold, but other defense technologies were pursued. Whether in the present situation rational arguments can again be at least partially successful, remains to be seen.</p>
      </sec>
      <sec id="Sec6">
         <label>6</label>
         <title>Challenges from new technologies</title>
         <p>Military technologies are on the rise. When one looks at challenges to military stability, international security, and peace from them (Altmann <xref ref-type="bibr" rid="CR5">2020</xref>), some issues seem familiar; this holds for ballistic missile defense and military uses of outer space. Hypersonic missiles are related, but more recent. Cyber-war preparations, a subject of military research and development since a few decades, have been studied to quite some extent (Hansel et al. <xref ref-type="bibr" rid="CR18">2018</xref>), but open questions remain. The same holds for autonomous weapon systems, where ethical, legal, and stability problems come up (Bhuta et al. <xref ref-type="bibr" rid="CR7">2016</xref>; Altmann and Sauer <xref ref-type="bibr" rid="CR4">2017</xref>), and for additive manufacturing (Brockmann and Kelley <xref ref-type="bibr" rid="CR10">2018</xref>). There are more recent developments that deserve deeper scrutiny – one is synthetic biology including gene editing (Patrick and Barton <xref ref-type="bibr" rid="CR30">2024</xref>). Even more radical change could come from body manipulation, e.g., for enhanced soldiers (Matthews and Schnyer <xref ref-type="bibr" rid="CR25">2019</xref>). Military uses of artificial intelligence can change many aspects of warfare, in particular leading to much reduced times for warning and reaction, increasing escalation risks (Chernavskikh and Palayer <xref ref-type="bibr" rid="CR12">2025</xref>). The new field of quantum technologies raises special problems concerning breaking or securing encrypted information, the design of new biochemical warfare agents, or detection of strategic weapons, in particular submarines, possibly endangering the second-strike capabilities which are a central priority for nuclear-weapon states (Krelina and Altmann <xref ref-type="bibr" rid="CR22">2022</xref>).<fn id="Fn5">
               <p>Note that the TAB has an on-going project on military applications of quantum technologies (TAB <xref ref-type="bibr" rid="CR39">2025</xref>b).</p>
            </fn>
         </p>
         <p>First considerations suggest that for these technologies some questions of the third preventive-arms-control step would be answered in the affirmative. Thus, systematic natural-science-/technological and interdisciplinary research should be done or deepened.</p>
         <p>Designing preventive limitations in many of these areas poses significant challenges: one is dual use. Difficult trade-offs will need to be considered. Limitations, definitions, and verification means and methods need to be negotiated between states, in particular between potential enemies. But also, internal negotiations will occur between factions that favor military strength and those that see national security in a wider context, in a framework of international security. All such questions will thus be decided as much by political as by scientific arguments. TA can help in increasing the weight of the latter.</p>
         <p content-type="eyecatcher" specific-use="Style2">Technology assessment can help in increasing the weight of political and scientific arguments.</p>
      </sec>
      <sec id="Sec7">
         <label>7</label>
         <title>Conclusion</title>
         <p>While most of TA focuses on civilian applications of technologies and largely neglects military uses, there are many reasons to widen the scope. One is that the very purpose of military technologies is to produce harm – damage to objects or injury and death to humans. Another is that even if preparations for war are motivated by concerns for one’s own security, the combined actions in the international system intensify threats and increase the probability of war.</p>
         <p>There are good examples of military TA in the Cold War when the main issues were nuclear weapons and their carriers, and arms-control treaties reduced the danger. But military-technology development has not stopped – many kinds of new weapons or other systems have been added or are at the horizon. Military TA is needed more than ever. Even though the present geopolitical situation is extremely unfavorable for preventive arms control, it is important to do this research soon – on the one hand to prepare for a future change for the better, on the other to contribute to such change.</p>
      </sec>
   </body>
   <back>
      <ack>
         <p>
            <boxed-text id="FPar2" specific-use="Style1">
               <caption>
                  <title>Funding</title>
               </caption>
               <p>This article received no funding.</p>
            </boxed-text>
         </p>
         <p>
            <boxed-text id="FPar3" specific-use="Style1">
               <caption>
                  <title>Competing interests</title>
               </caption>
               <p>The author declares no competing interests.</p>
            </boxed-text>
         </p>
         <p>
            <boxed-text id="FPar4" specific-use="Style1">
               <caption>
                  <title>Ethical oversight</title>
               </caption>
               <p>The author confirms that all procedures were performed in compliance with relevant laws and institutional guidelines.</p>
            </boxed-text>
         </p>
      </ack>
      <ref-list id="Bib1">
         <title>References</title>
         <ref id="CR1">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <name content-type="editor">
                     <surname>Altmann</surname>
                     <given-names>J</given-names>
                  </name>
                  <date>
                     <year>2000</year>
                  </date>
                  <source content-type="BookTitle">Dual-use in der Hochtechnologie. Erfahrungen, Strategien und Perspektiven in Telekommunikation und Luftfahrt</source>
                  <publisher-name>Nomos</publisher-name>
                  <publisher-loc>Baden-Baden</publisher-loc>
               </element-citation>
               <mixed-citation>Altmann, Jürgen (ed.) (2000): Dual-use in der Hochtechnologie. Erfahrungen, Strategien und Perspektiven in Telekommunikation und Luftfahrt. Baden-Baden: Nomos.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR3">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>Altmann</surname>
                     <given-names>J</given-names>
                  </name>
                  <date>
                     <year>2008</year>
                  </date>
                  <article-title>Präventive Rüstungskontrolle</article-title>
                  <issue>2–3</issue>
                  <page-range>105–126</page-range>
                  <source content-type="journal">Die Friedens-Warte</source>
                  <volume>83</volume>
               </element-citation>
               <mixed-citation>Altmann, Jürgen (2008): Präventive Rüstungskontrolle. In: Die Friedens-Warte 83 (2–3), pp. 105–126.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref specific-use="2" id="CR5">
            <mixed-citation>Altmann, Jürgen (2020): Technology, arms control and world order. Fundamental change needed. Available online at <ext-link xlink:href="https://toda.org/assets/files/resources/policy-briefs/t-pb-89_jurgen-altmann.pdf">https://toda.org/assets/files/resources/policy-briefs/t-pb-89_jurgen-altmann.pdf</ext-link>, last accessed on 21.11.2025.</mixed-citation>
         </ref>
         <ref id="CR4">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Altmann</surname>
                        <given-names>J</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Sauer</surname>
                        <given-names>F</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2017</year>
                  </date>
                  <article-title>Autonomous weapon systems and strategic stability</article-title>
                  <issue>5</issue>
                  <page-range>117–142</page-range>
                  <volume-id content-type="bibarticledoi">10.1080/00396338.2017.1375263</volume-id>
                  <source content-type="journal">Survival</source>
                  <volume>59</volume>
               </element-citation>
               <mixed-citation>Altmann, Jürgen; Sauer, Frank (2017): Autonomous weapon systems and strategic stability. In: Survival 59 (5), pp. 117–142. <ext-link xlink:href="https://doi.org/10.1080/00396338.2017.1375263">https://doi.org/10.1080/00396338.2017.1375263</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref specific-use="2" id="CR2">
            <mixed-citation>Altmann, Jürgen et al. (2001): Präventive Rüstungskontrolle. Erste Ergebnisse des Projektes „Präventive Rüstungskontrolle“ des Forschungsverbundes Naturwissenschaft, Abrüstung und Internationale Sicherheit (FONAS). In: W&amp;F 2001 (3). Available online at <ext-link xlink:href="https://wissenschaft-und-frieden.de/dossier/praeventive-ruestungskontrolle/">https://wissenschaft-und-frieden.de/dossier/praeventive-ruestungskontrolle/</ext-link>, last accessed on 21.11.2025.</mixed-citation>
         </ref>
         <ref id="CR6">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>Barton</surname>
                     <given-names>D</given-names>
                  </name>
                  <date>
                     <year>2004</year>
                  </date>
                  <article-title>Report to the American Physical Society of the study group on boost-phase intercept systems for national missile defense. Scientific and technical issues</article-title>
                  <issue>3</issue>
                  <page-range>1–424</page-range>
                  <volume-id content-type="bibarticledoi">10.1103/RevModPhys.76.S1</volume-id>
                  <source content-type="journal">Reviews of Modern Physics</source>
                  <volume>76</volume>
               </element-citation>
               <mixed-citation>Barton, David et al. (2004): Report to the American Physical Society of the study group on boost-phase intercept systems for national missile defense. Scientific and technical issues. In: Reviews of Modern Physics 76 (3), pp. 1–424. <ext-link xlink:href="https://doi.org/10.1103/RevModPhys.76.S1">https://doi.org/10.1103/RevModPhys.76.S1</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR7">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="editor">
                     <name content-type="editor">
                        <surname>Bhuta</surname>
                        <given-names>N</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Beck</surname>
                        <given-names>S</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Geiß</surname>
                        <given-names>R</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Hin-Yan</surname>
                        <given-names>L</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Kreß</surname>
                        <given-names>C</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2016</year>
                  </date>
                  <source content-type="BookTitle">Autonomous weapon systems. Law, ethics, policy</source>
                  <publisher-name>Cambridge University Press</publisher-name>
                  <publisher-loc>Cambridge</publisher-loc>
               </element-citation>
               <mixed-citation>Bhuta, Nehal; Beck, Susanne; Geiß, Robin; Liu, Hin-Yan; Kreß, Claus (eds.) (2016): Autonomous weapon systems. Law, ethics, policy. Cambridge: Cambridge University Press.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR8">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Bielefeld</surname>
                        <given-names>T</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Eurich</surname>
                        <given-names>C</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2005</year>
                  </date>
                  <article-title>Science Roadmapping für Rüstungstechnologie-Folgenabschätzung und präventive Rüstungskontrolle</article-title>
                  <issue>3</issue>
                  <page-range>128–134</page-range>
                  <volume-id content-type="bibarticledoi">10.14512/tatup.14.3.128</volume-id>
                  <source content-type="journal">TATuP – Journal for Technology Assessment in Theory and Practice</source>
                  <volume>14</volume>
               </element-citation>
               <mixed-citation>Bielefeld, Tom; Eurich, Christian (2005): Science Roadmapping für Rüstungstechnologie-Folgenabschätzung und präventive Rüstungskontrolle. In: TATuP – Journal for Technology Assessment in Theory and Practice 14 (3), pp. 128–134. <ext-link xlink:href="https://doi.org/10.14512/tatup.14.3.128">https://doi.org/10.14512/tatup.14.3.128</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR9">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>Bloembergen</surname>
                     <given-names>N</given-names>
                  </name>
                  <date>
                     <year>1987</year>
                  </date>
                  <article-title>Report to the American Physical Society of the study group on science and technology of directed energy weapons</article-title>
                  <issue>3</issue>
                  <page-range>1–201</page-range>
                  <volume-id content-type="bibarticledoi">10.1103/RevModPhys.59.S1</volume-id>
                  <source content-type="journal">Reviews of Modern Physics</source>
                  <volume>59</volume>
               </element-citation>
               <mixed-citation>Bloembergen, Nicholas et al. (1987): Report to the American Physical Society of the study group on science and technology of directed energy weapons. In: Reviews of Modern Physics 59 (3), pp. 1–201. <ext-link xlink:href="https://doi.org/10.1103/RevModPhys.59.S1">https://doi.org/10.1103/RevModPhys.59.S1</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR10">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Brockmann</surname>
                        <given-names>K</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Kelley</surname>
                        <given-names>R</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2018</year>
                  </date>
                  <comment>https://www.sipri.org/publications/2018/policy-reports/challenge-emerging-technologies-non-proliferation-efforts-controlling-additive-manufacturing-and, last accessed on 19.01.2026</comment>
                  <source content-type="BookTitle">The challenge of emerging technologies to non-proliferation efforts. Controlling additive manufacturing and intangible transfers of technology</source>
                  <publisher-name>SIPRI</publisher-name>
                  <publisher-loc>Stockholm</publisher-loc>
               </element-citation>
               <mixed-citation>Brockmann, Kolja; Kelley, Robert (2018): The challenge of emerging technologies to non-proliferation efforts. Controlling additive manufacturing and intangible transfers of technology. Stockholm: SIPRI. Available online at <ext-link xlink:href="https://www.sipri.org/publications/2018/policy-reports/challenge-emerging-technologies-non-proliferation-efforts-controlling-additive-manufacturing-and">https://www.sipri.org/publications/2018/policy-reports/challenge-emerging-technologies-non-proliferation-efforts-controlling-additive-manufacturing-and</ext-link>, last accessed on 19.01.2026.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR11">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <name content-type="author">
                     <surname>Bull</surname>
                     <given-names>H</given-names>
                  </name>
                  <date>
                     <year>1965</year>
                  </date>
                  <source content-type="BookTitle">The control of the arms race. Disarmament and arms in the missile age</source>
                  <publisher-name>Praeger</publisher-name>
                  <publisher-loc>New York</publisher-loc>
               </element-citation>
               <mixed-citation>Bull, Hedley (1961/1965): The control of the arms race. Disarmament and arms in the missile age. New York, NY: Praeger.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR12">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Chernavskikh</surname>
                        <given-names>V</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Palayer</surname>
                        <given-names>J</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2025</year>
                  </date>
                  <source content-type="BookTitle">Impact of military artificial intelligence on nuclear escalation risk</source>
                  <publisher-name>SIPRI</publisher-name>
                  <publisher-loc>Stockholm</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.55163/FZIW8544</volume-id>
               </element-citation>
               <mixed-citation>Chernavskikh, Vladislav; Palayer, Jules (2025): Impact of military artificial intelligence on nuclear escalation risk. Stockholm: SIPRI. <ext-link xlink:href="https://doi.org/10.55163/FZIW8544">https://doi.org/10.55163/FZIW8544</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR13">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Fetter</surname>
                        <given-names>S</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Wright</surname>
                        <given-names>D</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2025</year>
                  </date>
                  <article-title>Can the iron dome be transmuted into a golden dome?</article-title>
                  <issue>2</issue>
                  <page-range>95–114</page-range>
                  <volume-id content-type="bibarticledoi">10.1080/0163660X.2025.2514916</volume-id>
                  <source content-type="journal">The Washington Quarterly</source>
                  <volume>48</volume>
               </element-citation>
               <mixed-citation>Fetter, Steve; Wright, David (2025): Can the iron dome be transmuted into a golden dome? In: The Washington Quarterly 48 (2), pp. 95–114. <ext-link xlink:href="https://doi.org/10.1080/0163660X.2025.2514916">https://doi.org/10.1080/0163660X.2025.2514916</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR14">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="editor">
                     <name content-type="editor">
                        <surname>Foradori</surname>
                        <given-names>P</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Giacomello</surname>
                        <given-names>G</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Pascolini</surname>
                        <given-names>A</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2018</year>
                  </date>
                  <source content-type="BookTitle">Arms control and disarmament. 50 years of experience in nuclear education</source>
                  <publisher-name>Springer</publisher-name>
                  <publisher-loc>Cham</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.1007/978-3-319-62259-0</volume-id>
               </element-citation>
               <mixed-citation>Foradori, Paolo; Giacomello, Giampiero; Pascolini, Alessandro (eds.) (2018): Arms control and disarmament. 50 years of experience in nuclear education. Cham: Springer. <ext-link xlink:href="https://doi.org/10.1007/978-3-319-62259-0">https://doi.org/10.1007/978-3-319-62259-0</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR15">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Garwin</surname>
                        <given-names>R</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Bethe</surname>
                        <given-names>H</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>1968</year>
                  </date>
                  <article-title>Anti-ballistic-missile systems</article-title>
                  <issue>3</issue>
                  <page-range>21–31</page-range>
                  <volume-id content-type="bibarticledoi">10.1038/scientificamerican0368-21</volume-id>
                  <source content-type="journal">Scientific American</source>
                  <volume>218</volume>
               </element-citation>
               <mixed-citation>Garwin, Richard; Bethe, Hans (1968): Anti-ballistic-missile systems. In: Scientific American 218 (3), pp. 21–31. <ext-link xlink:href="https://doi.org/10.1038/scientificamerican0368-21">https://doi.org/10.1038/scientificamerican0368-21</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR16">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>Geser</surname>
                     <given-names>H</given-names>
                  </name>
                  <date>
                     <year>2011</year>
                  </date>
                  <article-title>Waffensysteme als „derivierte Akteure“. Kampfroboter im asymmetrischen Krieg</article-title>
                  <issue>1</issue>
                  <page-range>52–59</page-range>
                  <volume-id content-type="bibarticledoi">10.14512/tatup.20.1.52</volume-id>
                  <source content-type="journal">TATuP – Journal for Technology Assessment in Theory and Practice</source>
                  <volume>20</volume>
               </element-citation>
               <mixed-citation>Geser, Hans (2011): Waffensysteme als „derivierte Akteure“. Kampfroboter im asymmetrischen Krieg. In: TATuP – Journal for Technology Assessment in Theory and Practice 20 (1), pp. 52–59. <ext-link xlink:href="https://doi.org/10.14512/tatup.20.1.52">https://doi.org/10.14512/tatup.20.1.52</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR17">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Grünwald</surname>
                        <given-names>R</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Kehl</surname>
                        <given-names>C</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2020</year>
                  </date>
                  <source content-type="BookTitle">Autonome Waffensysteme. Endbericht zum TA-Projekt</source>
                  <series>Arbeitsbericht Nr. 187</series>
                  <publisher-name>Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB)</publisher-name>
                  <publisher-loc>Berlin</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.5445/IR/1000127160</volume-id>
               </element-citation>
               <mixed-citation>Grünwald, Reinhard; Kehl, Christoph (2020): Autonome Waffensysteme. Endbericht zum TA-Projekt. Arbeitsbericht Nr. 187. Berlin: Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB). <ext-link xlink:href="https://doi.org/10.5445/IR/1000127160">https://doi.org/10.5445/IR/1000127160</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR18">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Hansel</surname>
                        <given-names>M</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Mutschler</surname>
                        <given-names>M</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Dickow</surname>
                        <given-names>M</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2018</year>
                  </date>
                  <article-title>Taming cyber warfare. Lessons from preventive arms control</article-title>
                  <issue>1</issue>
                  <page-range>44–60</page-range>
                  <volume-id content-type="bibarticledoi">10.1080/23738871.2018.1462394</volume-id>
                  <source content-type="journal">Journal of Cyber Policy</source>
                  <volume>3</volume>
               </element-citation>
               <mixed-citation>Hansel, Mischa; Mutschler, Max; Dickow, Marcel (2018): Taming cyber warfare. Lessons from preventive arms control. In: Journal of Cyber Policy 3 (1), pp. 44–60. <ext-link xlink:href="https://doi.org/10.1080/23738871.2018.1462394">https://doi.org/10.1080/23738871.2018.1462394</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR19">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Hennen</surname>
                        <given-names>L</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Hahn</surname>
                        <given-names>J</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Ladikas</surname>
                     </name>
                     <name content-type="author">
                        <surname>Miltos</surname>
                     </name>
                     <name content-type="author">
                        <surname>Lindner</surname>
                        <given-names>R</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Peissl</surname>
                        <given-names>W</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Est</surname>
                        <given-names>R</given-names>
                        <suffix>van</suffix>
                     </name>
                  </person-group>
                  <date>
                     <year>2023</year>
                  </date>
                  <source content-type="BookTitle">Technology assessment in a globalized world. Facing the challenges of transnational technology governance</source>
                  <publisher-name>Springer</publisher-name>
                  <publisher-loc>Cham</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.1007/978-3-031-10617-0</volume-id>
               </element-citation>
               <mixed-citation>Hennen, Leonhard; Hahn, Julia; Ladikas, Miltos; Lindner, Ralf; Peissl, Walter; van Est, Rinie (eds.) (2023): Technology assessment in a globalized world. Facing the challenges of transnational technology governance. Cham: Springer. <ext-link xlink:href="https://doi.org/10.1007/978-3-031-10617-0">https://doi.org/10.1007/978-3-031-10617-0</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR20">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>Herz</surname>
                     <given-names>J</given-names>
                  </name>
                  <date>
                     <year>1950</year>
                  </date>
                  <article-title>Idealist internationalism and the security dilemma</article-title>
                  <issue>2</issue>
                  <page-range>157–180</page-range>
                  <volume-id content-type="bibarticledoi">10.2307/2009187</volume-id>
                  <source content-type="journal">World Politics</source>
                  <volume>2</volume>
               </element-citation>
               <mixed-citation>Herz, John (1950): Idealist internationalism and the security dilemma. In: World Politics 2 (2), pp. 157–180, 195. <ext-link xlink:href="https://doi.org/10.2307/2009187">https://doi.org/10.2307/2009187</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR21">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Koch</surname>
                        <given-names>B</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Rinke</surname>
                        <given-names>B</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2011</year>
                  </date>
                  <article-title>Der militärische Einsatz bewaffneter Drohnen. Zwischen Schutz für Soldaten und gezieltem Töten</article-title>
                  <issue>3</issue>
                  <page-range>38–44</page-range>
                  <volume-id content-type="bibarticledoi">10.14512/tatup.27.3.38</volume-id>
                  <source content-type="journal">TATuP – Journal for Technology Assessment in Theory and Practice</source>
                  <volume>27</volume>
               </element-citation>
               <mixed-citation>Koch, Bernhard; Rinke, Bernhard (2011): Der militärische Einsatz bewaffneter Drohnen. Zwischen Schutz für Soldaten und gezieltem Töten. In: TATuP – Journal for Technology Assessment in Theory and Practice 27 (3), pp. 38–44. <ext-link xlink:href="https://doi.org/10.14512/tatup.27.3.38">https://doi.org/10.14512/tatup.27.3.38</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR22">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Krelina</surname>
                        <given-names>M</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Altmann</surname>
                        <given-names>J</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2022</year>
                  </date>
                  <article-title>Quantum technologies. A new field that needs assessment</article-title>
                  <issue>3–4</issue>
                  <page-range>267–289</page-range>
                  <volume-id content-type="bibarticledoi">10.35998/fw-2022-0012</volume-id>
                  <source content-type="journal">Die Friedens-Warte – Journal of International Peace and Organization</source>
                  <volume>95</volume>
               </element-citation>
               <mixed-citation>Krelina, Michal; Altmann, Jürgen (2022): Quantum technologies. A new field that needs assessment. In: Die Friedens-Warte – Journal of International Peace and Organization 95 (3–4), pp. 267–289. <ext-link xlink:href="https://doi.org/10.35998/fw-2022-0012">https://doi.org/10.35998/fw-2022-0012</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR23">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="editor">
                     <name content-type="editor">
                        <surname>Kronfeld</surname>
                        <given-names>U</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Baus</surname>
                        <given-names>W</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Ebbesen</surname>
                        <given-names>B</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Jathe</surname>
                        <given-names>M</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>1993</year>
                  </date>
                  <source content-type="BookTitle">Naturwissenschaft und Abrüstung. Forschungsprojekte an deutschen Hochschulen</source>
                  <publisher-name>LIT</publisher-name>
                  <publisher-loc>Münster</publisher-loc>
               </element-citation>
               <mixed-citation>Kronfeld, Ulrike; Baus, Wolfgang; Ebbesen, Björn; Jathe, Markus (eds.) (1993): Naturwissenschaft und Abrüstung. Forschungsprojekte an deutschen Hochschulen. Münster: Lit.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR24">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <name content-type="author">
                     <surname>Lamb</surname>
                     <given-names>F</given-names>
                  </name>
                  <date>
                     <year>2025</year>
                  </date>
                  <comment>https://res.cloudinary.com/apsphysics/image/upload/v1741185158/APS_BMD_Report_2025_qzgzaz.pdf, last accessed on 21.11.2025</comment>
                  <source content-type="BookTitle">Strategic ballistic missile defense. Challenges to defending the United States</source>
                  <publisher-name>American Physical Society</publisher-name>
                  <publisher-loc>College Park</publisher-loc>
               </element-citation>
               <mixed-citation>Lamb, Frederick et al. (2025): Strategic ballistic missile defense. Challenges to defending the United States. College Park, MD: American Physical Society. Available online at <ext-link xlink:href="https://res.cloudinary.com/apsphysics/image/upload/v1741185158/APS_BMD_Report_2025_qzgzaz.pdf">https://res.cloudinary.com/apsphysics/image/upload/v1741185158/APS_BMD_Report_2025_qzgzaz.pdf</ext-link>, last accessed on 21.11.2025.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR25">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="editor">
                     <name content-type="editor">
                        <surname>Matthews</surname>
                        <given-names>M</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Schnyer</surname>
                        <given-names>D</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2019</year>
                  </date>
                  <source content-type="BookTitle">Human performance optimization. The science and ethics of enhancing human capabilities</source>
                  <publisher-name>Oxford University Press</publisher-name>
                  <publisher-loc>Oxford</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.1093/oso/9780190455132.001.0001</volume-id>
               </element-citation>
               <mixed-citation>Matthews, Michael; Schnyer, David (eds.) (2019): Human performance optimization. The science and ethics of enhancing human capabilities. Oxford: Oxford University Press. <ext-link xlink:href="https://doi.org/10.1093/oso/9780190455132.001.0001">https://doi.org/10.1093/oso/9780190455132.001.0001</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR26">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>Nass</surname>
                     <given-names>E</given-names>
                  </name>
                  <date>
                     <year>2022</year>
                  </date>
                  <article-title>Human dignity and lethal autonomous weapon systems. A Christian ethical positioning from a catholic point of view</article-title>
                  <issue>3</issue>
                  <page-range>58–64</page-range>
                  <volume-id content-type="bibarticledoi">10.14512/tatup.31.3.58</volume-id>
                  <source content-type="journal">TATuP – Journal for Technology Assessment in Theory and Practice</source>
                  <volume>31</volume>
               </element-citation>
               <mixed-citation>Nass, Elmar (2022): Human dignity and lethal autonomous weapon systems. A Christian ethical positioning from a catholic point of view. In: TATuP – Journal for Technology Assessment in Theory and Practice 31 (3), pp. 58–64. <ext-link xlink:href="https://doi.org/10.14512/tatup.31.3.58">https://doi.org/10.14512/tatup.31.3.58</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR27">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <string-name>OTA – U.S. Congress, Office of Technology Assessment</string-name>
                  <date>
                     <year>1985</year>
                  </date>
                  <source content-type="BookTitle">Ballistic missile defense technologies</source>
                  <series>OTA-ISC-254</series>
                  <publisher-name>US Government Printing Office</publisher-name>
                  <publisher-loc>Washington, DC</publisher-loc>
               </element-citation>
               <mixed-citation>OTA – U.S. Congress, Office of Technology Assessment (1985): Ballistic missile defense technologies. OTA-ISC-254. Washington, DC: US Government Printing Office.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR28">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <string-name>OTA</string-name>
                  <date>
                     <year>1988</year>
                  </date>
                  <source content-type="BookTitle">SDI. Technology, survivability, and software</source>
                  <series>OTA-ISC-353</series>
                  <publisher-name>U.S. Government Printing Office</publisher-name>
                  <publisher-loc>Washington, DC</publisher-loc>
               </element-citation>
               <mixed-citation>OTA (1988): SDI. Technology, survivability, and software. OTA-ISC-353. Washington, DC: U.S. Government Printing Office.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR29">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Paschen</surname>
                        <given-names>H</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Gresser</surname>
                        <given-names>K</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Conrad</surname>
                        <given-names>F</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>1978</year>
                  </date>
                  <source content-type="BookTitle">Technology assessment – Technologiefolgenabschätzung. Ziele, methodische und organisatorische Probleme, Anwendungen</source>
                  <publisher-name>Campus</publisher-name>
                  <publisher-loc>Frankfurt a. M.</publisher-loc>
               </element-citation>
               <mixed-citation>Paschen, Herbert; Gresser, Klaus; Conrad, Felix (1978): Technology assessment – Technologiefolgenabschätzung. Ziele, methodische und organisatorische Probleme, Anwendungen. Frankfurt a. M.: Campus.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref specific-use="2" id="CR30">
            <mixed-citation>Patrick, Stewart; Barton, Josie (2024): Mitigating risks from gene editing and synthetic biology. Global governance priorities. Carnegie endowment for international peace. Available online at <ext-link xlink:href="https://carnegie-production-assets.s3.amazonaws.com/static/files/Patrick_Barton-Biotech%20Governance-final.pdf">https://carnegie-production-assets.s3.amazonaws.com/static/files/Patrick_Barton-Biotech%20Governance-final.pdf</ext-link>, last accessed 21.11.2025</mixed-citation>
         </ref>
         <ref id="CR31">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Petermann</surname>
                        <given-names>T</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Socher</surname>
                        <given-names>M</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Wennrich</surname>
                        <given-names>C</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>1996</year>
                  </date>
                  <source content-type="BookTitle">Kontrollkriterien für die Bewertung und Entscheidung bezüglich neuer Technologien im Rüstungsbereich</source>
                  <series>Arbeitsbericht Nr. 45</series>
                  <publisher-name>Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB)</publisher-name>
                  <publisher-loc>Berlin</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.5445/IR/1000103310</volume-id>
               </element-citation>
               <mixed-citation>Petermann, Thomas; Socher, Martin; Wennrich, Christine (1996): Kontrollkriterien für die Bewertung und Entscheidung bezüglich neuer Technologien im Rüstungsbereich. Arbeitsbericht Nr. 45. Berlin: Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB). <ext-link xlink:href="https://doi.org/10.5445/IR/1000103310">https://doi.org/10.5445/IR/1000103310</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR32">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Petermann</surname>
                        <given-names>T</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Coenen</surname>
                        <given-names>C</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Grünwald</surname>
                        <given-names>R</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2003</year>
                  </date>
                  <source content-type="BookTitle">Militärische Nutzung des Weltraums und Möglichkeiten der Rüstungskontrolle im Weltraum. Sachstandbericht</source>
                  <publisher-name>Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB)</publisher-name>
                  <publisher-loc>Berlin</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.5445/IR/1000103294</volume-id>
               </element-citation>
               <mixed-citation>Petermann, Thomas; Coenen, Christopher; Grünwald, Reinhard (2003): Militärische Nutzung des Weltraums und Möglichkeiten der Rüstungskontrolle im Weltraum. Sachstandbericht. Berlin: Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB). <ext-link xlink:href="https://doi.org/10.5445/IR/1000103294">https://doi.org/10.5445/IR/1000103294</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR33">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Petermann</surname>
                        <given-names>T</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Grünwald</surname>
                        <given-names>R</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2011</year>
                  </date>
                  <source content-type="BookTitle">Stand und Perspektiven der militärischen Nutzung unbemannter Systeme. Endbericht zum TA-Projekt</source>
                  <publisher-name>Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB)</publisher-name>
                  <publisher-loc>Berlin</publisher-loc>
                  <volume-id content-type="bibbookdoi">10.5445/IR/310084510</volume-id>
               </element-citation>
               <mixed-citation>Petermann, Thomas; Grünwald, Reinhard (2011): Stand und Perspektiven der militärischen Nutzung unbemannter Systeme. Endbericht zum TA-Projekt. Berlin: Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (TAB). <ext-link xlink:href="https://doi.org/10.5445/IR/310084510">https://doi.org/10.5445/IR/310084510</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR34">
            <citation-alternatives>
               <element-citation publication-type="book">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Porter</surname>
                        <given-names>A</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Rossini</surname>
                        <given-names>F</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Carpenter</surname>
                        <given-names>S</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Roper</surname>
                        <given-names>T</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Larson</surname>
                        <given-names>R</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Tiller</surname>
                        <given-names>J</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>1980</year>
                  </date>
                  <source content-type="BookTitle">A guidebook for technology assessment and impact analysis</source>
                  <publisher-name>North Holland</publisher-name>
                  <publisher-loc>New York</publisher-loc>
               </element-citation>
               <mixed-citation>Porter, Alan; Rossini, Frederick; Carpenter, Stanley; Roper, Thomas; Larson, Rolan; Tiller, Jeffrey (1980): A guidebook for technology assessment and impact analysis. New York, NY: North Holland.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref specific-use="2" id="CR35">
            <mixed-citation>RAND Corporation (2025): Our history. Available online at <ext-link xlink:href="https://www.rand.org/about/history.html">https://www.rand.org/about/history.html</ext-link>, last accessed on 21.11.2025.</mixed-citation>
         </ref>
         <ref specific-use="2" id="CR36">
            <mixed-citation>Reagan, Ronald (1983): Strategic defense initiative. President’s backup copy. Address on defense, March 23, 1983. Available online at <ext-link xlink:href="https://www.reaganlibrary.gov/public/2020-06/sdi-speech.pdf">https://www.reaganlibrary.gov/public/2020-06/sdi-speech.pdf</ext-link>, last accessed on 21.11.2025.</mixed-citation>
         </ref>
         <ref id="CR37">
            <citation-alternatives>
               <element-citation publication-type="chapter">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Reuter</surname>
                        <given-names>C</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Scheffran</surname>
                        <given-names>J</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Kreutle</surname>
                        <given-names>M</given-names>
                     </name>
                  </person-group>
                  <person-group person-group-type="editor">
                     <name content-type="editor">
                        <surname>Engels</surname>
                        <given-names>B</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Giessmann</surname>
                        <given-names>H-J</given-names>
                     </name>
                     <name content-type="editor">
                        <surname>Rinke</surname>
                        <given-names>B</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2026</year>
                  </date>
                  <chapter-title>Naturwissenschaftlich-technische Friedens- und Konfliktforschung</chapter-title>
                  <source content-type="BookTitle">Handbuch Frieden</source>
                  <publisher-name>Springer VS</publisher-name>
                  <publisher-loc>Wiesbaden</publisher-loc>
               </element-citation>
               <mixed-citation>Reuter, Christian; Scheffran, Jürgen; Kreutle, Manuel (2026): Naturwissenschaftlich-technische Friedens- und Konfliktforschung. In: Bettina Engels, Hans-Joachim Giessmann, and Bernhard Rinke (eds.): Handbuch Frieden. Wiesbaden: Springer VS.</mixed-citation>
            </citation-alternatives>
         </ref>
         <ref specific-use="2" id="CR38">
            <mixed-citation>TAB – Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag (2025a): TAB-Berichte. Available online at <ext-link xlink:href="https://www.tab-beim-bundestag.de/publikationen.php?tab=%5B962%5D#tabpanel-962">https://www.tab-beim-bundestag.de/publikationen.php?tab=%5B962%5D#tabpanel-962</ext-link>, last accessed on 25.11.2025.</mixed-citation>
         </ref>
         <ref specific-use="2" id="CR39">
            <mixed-citation>TAB (2025b): Militärische Nutzung von Quantentechnologien. Available online at <ext-link xlink:href="https://www.tab-beim-bundestag.de/themenfeld-infrastrukturen-und-sicherheit_militarische-nutzung-von-quantentechnologien.php">https://www.tab-beim-bundestag.de/themenfeld-infrastrukturen-und-sicherheit_militarische-nutzung-von-quantentechnologien.php</ext-link>, last accessed on 25.11.2025.</mixed-citation>
         </ref>
         <ref specific-use="2" id="CR40">
            <mixed-citation>TATuP – Journal for Technology Assessment in Theory and Practice (2025): Archives. Available online at <ext-link xlink:href="https://www.tatup.de/index.php/tatup/issue/archive">https://www.tatup.de/index.php/tatup/issue/archive</ext-link>, last accessed on 10.07.2025.</mixed-citation>
         </ref>
         <ref specific-use="2" id="CR41">
            <mixed-citation>Trump, Donald (2025): The iron dome for America. In: The White House, 27.01.2025. Available online at <ext-link xlink:href="https://www.whitehouse.gov/presidential-actions/2025/01/the-iron-dome-for-america/">https://www.whitehouse.gov/presidential-actions/2025/01/the-iron-dome-for-america/</ext-link>, last accessed on 25.11.2025.</mixed-citation>
         </ref>
         <ref id="CR42">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <person-group person-group-type="author">
                     <name content-type="author">
                        <surname>Tzoufis</surname>
                        <given-names>V</given-names>
                     </name>
                     <name content-type="author">
                        <surname>Petropoulos</surname>
                        <given-names>N</given-names>
                     </name>
                  </person-group>
                  <date>
                     <year>2024</year>
                  </date>
                  <article-title>The commission of crimes using autonomous weapon systems. Issues of causation and attribution</article-title>
                  <issue>2</issue>
                  <page-range>35–41</page-range>
                  <volume-id content-type="bibarticledoi">10.14512/tatup.33.2.35</volume-id>
                  <source content-type="journal">TATuP – Journal for Technology Assessment in Theory and Practice</source>
                  <volume>33</volume>
               </element-citation>
               <mixed-citation>Tzoufis, Vasilios; Petropoulos, Nikolaos (2024): The commission of crimes using autonomous weapon systems. Issues of causation and attribution. In: TATuP – Journal for Technology Assessment in Theory and Practice 33 (2), pp. 35–41. <ext-link xlink:href="https://doi.org/10.14512/tatup.33.2.35">https://doi.org/10.14512/tatup.33.2.35</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
         <ref id="CR43">
            <citation-alternatives>
               <element-citation publication-type="journal">
                  <name content-type="author">
                     <surname>York</surname>
                     <given-names>H</given-names>
                  </name>
                  <date>
                     <year>1970</year>
                  </date>
                  <article-title>ABM, MIRV, and the arms race. ABM and MIRV require and inspire each other; together they will lessen our national security</article-title>
                  <issue>3942</issue>
                  <page-range>257–260</page-range>
                  <volume-id content-type="bibarticledoi">10.1126/science.169.3942.257</volume-id>
                  <source content-type="journal">Science</source>
                  <volume>169</volume>
               </element-citation>
               <mixed-citation>York, Herbert (1970): ABM, MIRV, and the arms race. ABM and MIRV require and inspire each other; together they will lessen our national security. In: Science 169 (3942), pp. 257–260. <ext-link xlink:href="https://doi.org/10.1126/science.169.3942.257">https://doi.org/10.1126/science.169.3942.257</ext-link>
               </mixed-citation>
            </citation-alternatives>
         </ref>
      </ref-list>
   </back>
</article>
