Skip to primary content
Skip to secondary content

geographical imaginations

wars, spaces and bodies

geographical imaginations

Main menu

  • Home
  • About/Contact
  • AUDIO/VIDEO
  • DOWNLOADS
  • GRADUATE STUDENTS
  • GUIDE
  • LIVE
  • TEACHING

Tag Archives: Metadata+

Poisoned Apple

Posted on September 28, 2015 by Derek Gregory

I’ve previously documented Josh Begley‘s trials with Apple over his Metadata+ app that tracks each new US drone strike.  Metadata+ was removed from the app store on Sunday for its ‘exceptionally crude or objectionable content.’  Really.

metadata-drone

Kate Conger reports:

Begley compiled his information on drone strikes from news reports, so it’s strange to see his app banned while the news apps that report on drone strikes remain. Metadata+ is, at heart, a journalism project and the decision to remove it is a decision about what kinds of journalism Apple deems unacceptable.

Even more revealing is Apple’s determination to shoot the messenger: it’s not the drone strikes that provoke their ire – hardly surprising, since they rely on technologies that are intimately entangled with digital platforms like the iPhone – but information about them.

Share this:

  • Print
  • Email
  • Facebook
  • Twitter
  • More
  • LinkedIn
  • Reddit
  • Pinterest
  • Tumblr

Like this:

Like Loading...
Posted in drones, information, media | Tagged drones, Josh Begley, Metadata+

Digital capture and physical kill

Posted on June 10, 2015 by Derek Gregory

When he was the US Air Force’s deputy chief of staff for Intelligence, Surveillance and Reconnaissance (ISR) Lt Gen David Deptula frequently warned about the danger of ‘swimming in sensors and drowning in data‘.  He was talking about crossing what he saw as the divide between ‘industrial age’ and ‘information age’ warfare, and specifically about the extraordinary volumes of data captured as full-motion video feeds from Predators and Reapers:

Swimming in sensors

Dan Gettinger provides an excellent overview in ‘Drone geography: mapping a system of intelligence’ here.  But there are other systems of intelligence involved in these strikes and other forms of what Deptula called ‘data crush’.

Operating in close concert with real-time ISR carried out from these remote platforms are other modes of digital data capture, not least the panoply of communications intercepts carried out by the National Security Agency.  In many cases the targets Air Force crews are tasked to track and ultimately to kill by the CIA or the US military have been identified through SIGINT (signals intelligence) derived from ‘harvesting’ e-mails, text messages and cell phone calls.

These have become increasingly important in today’s wars where the targets are often mobile.  E-mails can provide a vector of likely locations to be watched from the air, while call and messaging data reveal general vectors of movement:

SKYNET phone tracking and courier identification

(The tracks above are taken from an NSA report on ‘SKYNET: Courier detection by machine learning’ released by The Intercept).

But it’s important not to misrepresent this as system of total surveillance: as Grégoire Chamayou insists, ‘it matters less to the NSA to actively monitor the entire world than to endow itself with the powers to target anyone – or, rather, whomever it wishes’ (what he calls ‘programmatic surveillance’).

It’s programmatic in several senses beyond the legal-political armatures that Chamayou initially emphasizes: it also implies, crucially, algorithmic executions.  The software programs used by the NSA and associated agencies to tunnel into this data and extract signals from the noise are myriad – see for example this NSA white paper on ‘co-traveller analytics‘  – but even armed with these deadly algorithms (see also here) there is a concern about data crunch.

Writing in the Washington Post Ashkan Soltani and Barton Gellman reported that in 2012 FASCIA, the NSA’s databank, was ingesting almost 5 billion records a day:

FASCIA limits

Hence, as Peter Maass reports in The Intercept, the NSA’s own officers have become alarmed at rising metadata levels.  In 2011, for example, a deputy director in the Signals Intelligence Directorate was asked about ‘analytic modernization’ at the agency

“We live in an Information Age when we have massive reserves of information and don’t have the capability to exploit it… I was told that there are 2 petabytes of data in the SIGINT System at any given time. How much is that? That’s equal to 20 million 4-drawer filing cabinets. How many cabinets per analyst is that? By the end of this year, we’ll have 1 terabyte of data per second coming in. You can’t crank that through the existing processes and be effective.”

I’m working my way through these files as part of my ‘Deadly dancing’ essay on targeted killing in Pakistan’s Federally Administered Tribal Areas.  I’m particularly interested in the ways in which these two systems of digital capture – signals intercepts and video-feeds – intersect.  On occasion, the two systems even become one: for example, the NSA’s GILGAMESH program relies on sensors attached to a Predator to track a cell phone to within 30 feet of its location while SHENANIGANS similarly ‘vacuums up massive amounts of data from any wireless routers, computers, smart phones or other electronic devices that are within range’.

In any event these two, closely connected systems of digital capture are also often the harbingers of a physical kill.  As Michel Hayden, former director of the NSA and the CIA, admitted to David Cole last year: ‘We kill people based on metadata.’

And the reliance on algorithms and the expert systems they animate ensures, as Louise Amoore insists, that ‘there is then nothing exceptional about the exception; they are derogated to and derive from “expert knowledges”.’

As Louise’s comment implies, all of this speaks directly to the FATA as a space of exception, and the first section of my essay treats its production in detail (you can find early sketches here and here); but in the second section I connect this to the FATA as a space of execution.  Formally, I suppose this and its derivative expert knowledges parallel Stuart Elden‘s suggestion that territory be treated as a political technology, but the space of execution (like the space of exception) has a paradoxical topology since here and elsewhere its calculus enables the United States to enact an extra-territorial claim over the territory of another sovereign state.

Drone strikes in the FATA then appear as the deadly tip of an extended spear, the product of a dense network of collaboration and calculation between the CIA (which directs the strikes),  the NSA and its associated agencies (which provide the geospatial intelligence), and the US Air Force (which executes them).

The intelligence component of the network is transnational.  There is a long history of often fraught collaboration between the CIA and Pakistan’s Inter-Services Intelligence, and the NSA also derives what it calls ‘locational intelligence’ from its Five Eyes partners – the UK, Australia, Canada and New Zealand – and its Tier II partners which are contracted for specific projects and paid for their services: an NSA document for 2013 in the Snowden cache shows that this includes Pakistan, but it is impossible to know when this contractual relationship started and whether it has been discontinued.

Remote split operations.001

The NSA also conducts a version of ‘remote split’ operations.  Just as Predators and Reapers are controlled from the United States via satellite link and fiber-optic cable (once forward deployed crews have handled the take-off) – see the slide above – so much of the NSA’s interception and analysis of global communications takes place in the United States, harvesting data through two overarching systems:

1 Intercepts of foreign communications from submarine fiber-optic cables, the physical channels of the web; these are UPSTREAM intercepts conducted ‘as data flows past’ under legal authorizations that flow from Section 702 of the Foreign Intelligence Surveillance Act (FISA: passed under Bush and extended under Obama and permits the monitoring of electronic communications of foreigners abroad); some take place at more than a dozen switching stations within the US, exploiting its pole position within the web, while the rest take place overseas, often in conjunction with other intelligence services (FVEY and Tier II ‘Third Parties’); multiple software programs [FAIRVIEW, BLARNEY, STORMBREW, OAKSTAR] are used to harvest the data, which together amount to c. 9 per cent of Internet traffic collected under S702.

nsa1024

You can also find a stunning interactive map that attempts to annotate the submarine cable intercepts based on the Snowden cache here.

2 Direct collection of data from servers of major Internet companies and corporations (Google, Microsoft, AOL, Skype etc) in response to demands under S702 that requires ISP to turn over any data matching court-approved search terms; these are DOWNSTREAM intercepts because the data has already been collected by the companies (un)concerned; the data include e-mails and social network activity, and together these intercepts are the major source of raw intelligence, accounting for 91 per cent of Internet traffic collected under S702.  The chart below from The Verge refers to the NSA collecting ‘your’ data but the ‘you’ is a global collective.  PRISM – ‘the code name for a data-collection effort known officially by the SIGAD US-984XN…. that collects stored Internet communications based on demands made to [US] Internet companies’ started in 2007; this too exploits what the NSA calls the US’s position as ‘the world’s telecommunications backbone.’

flowchart_final_008

1 and 2 provide DNI data [Digital Network Intelligence]; but 1 also allows the harvesting of DNR data [Dialed Number Recognition] and, according to a PRISM briefing slide dated April 2013, is ‘coming soon’ to 2 (PRISM).

faa-702-prism-upstream

According to Boundless Informant, an NSA collection visualisation tool, during a 3-day period ending in March 2013 DNI intercepts from Pakistan accounted for 13.9 per cent of global DNI intercepts (#2 after Iran, which accounted for 14.5 per cent) and 11.1 per cent of global DNR intercepts (#2 after Afghanistan, which accounted for 17.6 per cent).  Aggregating the two – shown on the map below – Pakistan was the state subject to the most intense interception during that period (12.3 per cent of all global DNI and DNR intercepts).

boundless-informant-map

DNR is vital for drone strikes, since these so often depend on tracking cell-phones to identify the target in motion — see my post here — and for this reason the NSA has also forward deployed tactical cells working in close concert with military SIGINT units at (for example) Bagram Air Base in Afghanistan.  In short, its operations are not only ‘remote’ and are clearly ‘split’.  These intercepts are often of direct and immediate utility, but bulk collections of call data records from (for example) Pakistan Telecom providers are also mined via SKYNET to identify suspects and convert them into targets via ‘Joint Enterprise Modelling and Analytics’ (JEMA) [AOI in the slide below refers to Area/Actor of Interest].

SKYNET Advanced cloud-based behavior analytics (dragged)

It is this combination of the transnational and the local – which parallels the network in which those flying the Predators and Reapers are embedded – that characterises what Rob Kitchin and Martin Dodge call code/space:

codespace_cover1‘Given that many of these code/spaces are the product of coded infrastructure, their production is stretched out across extended network architectures, making them simultaneously local and global, grounded … in certain locations, but accessible from anywhere across the network, and linked together into chains that stretch across space and time to connect start and end nodes into complex webs of interactions and transactions. Any space that has the latent capacity to be transducted by code constitutes a code/space at the moment of that transduction.’

As you can see from the subtitle, their primary interest is everyday life.  But in the cases that most concern me, the conversion of everyday life into code/space is a precursor to everyday death.

In the FATA and elsewhere code/space is clearly a highly asymmetric field, as it is intended to be, but those who are summoned into presence within the space of execution – a process that Louise Amoore calls ‘the appearance of an emergent subject’, of ‘pixelated people’ that emerge on screens scanning databanks but who also appear in the crosshairs of a video display – are not wholly ignorant of what is taking place, of the ‘coding’ of their space. It is of course the case that crews can see without being seen, and Grégoire Chamayou has argued that ‘the fact that the killer and his victim are not inscribed in “reciprocal perceptual fields” facilitates the administration of violence’ because it ruptures what psychologist Stanley Milgram in his experiments on Obedience to authority called ‘the experienced unity of the act.’ And yet those who are living under drones have developed their own apprehensions; they have learned, in some small measure, how to counter their digital capture and to reduce their physical vulnerability.

Share this:

  • Print
  • Email
  • Facebook
  • Twitter
  • More
  • LinkedIn
  • Reddit
  • Pinterest
  • Tumblr

Like this:

Like Loading...
Posted in counterterrorism, drones, imagery, information, intelligence, late modern war, surveillance, technology, Uncategorized | Tagged algorithms, code/space, David Deptula, drones, Edward Snowden, Grégoire Chamayou, Louise Amoore, Metadata+, Michael Hayden, NSA, remote split operations, signals intelligence

Killing the SIMs

Posted on February 10, 2014 by Derek Gregory

NSA-binoculars5

Hard on the heels of yesterday’s post about Metadata+ – and my earlier, necessarily impressionistic discussion of the National Security Agency, drone strikes in Pakistan and what I called ‘the everyware war’ – comes a report from Jeremy Scahill and Glenn Greenwald at The Intercept that details the NSA’s role in the US’s targeted killing programme.

The programme is carried out by multiple means and multiple agencies (including the US military), but the main source for their report is a former drone operator from Joint Special Operations Command (JSOC) – and readers of Jeremy’s Dirty Wars will know that it is JSOC rather than the CIA that is his main critical target.  We’ve known about the NSA’s Geolocation Cell (‘GeoCell’) for some time now.  Last summer Dana Priest outlined the history of collaboration between the National Geospatial Intelligence Agency and the NSA, which she traced back to the months following 9/11, and the determination to use cell phones as ‘targeting beacons’:

The cell opened up chat rooms with military and CIA officers in Afghanistan — and, eventually, Iraq — who were directing operations there. Together they aimed the NSA’s many sensors toward individual targets while tactical units aimed their weaponry against them.

A motto quickly caught on at Geo Cell: “We Track ’Em, You Whack ’Em.”

But, as Scahill and Greenwald show, the process remains far from reliable.  Their informant confirms that strikes are often carried out on the basis of metadata analysis and cellphone tracking (‘SIGINT’) rather than human intelligence (agents on the ground), and he admits that it is a hit or miss affair, and literally so: ‘high value targets’ have been killed, but so too have innocent people.

[T]he geolocation cells at the NSA that run the tracking program – known as Geo Cell – sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

“Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

There are several lists of so-called High Value Targets, but the operational problem is, as he concedes, ‘We’re not going after people – we’re going after their phones.’

 [T]racking people by metadata and then killing them by SIM card is inherently flawed. The NSA “will develop a pattern,” he says, “where they understand that this is what this person’s voice sounds like, this is who his friends are, this is who his commander is, this is who his subordinates are. And they put them into a matrix. But it’s not always correct. There’s a lot of human error in that.”

The programme relies on more than what we have come to think of as standard (though still shocking) NSA intercepts of communications.  For more on the NSA’s global tracking of cellphones, see Barton Gellman and Ashkan Soltani here, from which I’ve taken the image below.

NSA cell phone tracking 1

As the graphic shows, the standard method of ‘co-location analytics’ tracks not only targets but also their associates (‘co-travellers’) using cell towers (which have in turn become key targets for insurgent attack in Afghanistan partly for this reason).

For clandestine operations in Afghanistan, Pakistan, Yemen, Somalia and elsewhere the NSA’s geolocation system codenamed ‘GILGAMESH’  (king of the city-state of Uruk in Mesopotamia: where do they get these names from?) equips Predators assigned to JSOC with ‘virtual base-tower transceivers’ that can track and locate a SIM card to within 30 feet; the information is then used in near-real time to activate an air strike or a night raid through a network that has ‘cued and compressed numerous kill chains’.

The CIA uses another system, codenamed SHENANIGANS (no mystery about that one), which collects data ‘from any wireless routers, computers, smart phones or other electronic devices that are within range.’  Last fall Greg Miller, Julie Tate and Barton Gellman described how the system was used in the targeted killing of Hassan Ghul in Mir Ali in Waziristan in October 2012:

In the search for targets, the NSA has draped a surveillance blanket over dozens of square miles of northwest Pakistan. In Ghul’s case, the agency deployed an arsenal of cyber-espionage tools, secretly seizing control of laptops, siphoning audio files and other messages, and tracking radio transmissions to determine where Ghul might “bed down.”

The e-mail from Ghul’s wife “about her current living conditions” contained enough detail to confirm the coordinates of that household, according to a document summarizing the mission. “This information enabled a capture/kill operation against an individual believed to be Hassan Ghul on October 1,” it said.

The file is part of a collection of records in the Snowden trove that make clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT.

To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find terrorism targets. The unit spent a year tracking Ghul and his courier network, tunneling into an array of systems and devices, before he was killed. Without those penetrations, the document concluded, “this opportunity would not have been possible.”

The two systems are agency-specific but they often work in concert: Scahill and Greenwald note one joint operation in 2012, ‘VICTORYDANCE’, that ‘mapped the WiFi fingerprint of nearly every town in Yemen.’

Takhar attack 1

The documents that they draw upon are from various dates, extending back to 2005, so that these are a series of snapshots of an uneven and developing set of systems.  Still, the concerns about accuracy are persistent, and although they don’t cite her report Kate Clark‘s forensic examination of the attempted killing of the Taliban shadow governor of Takhar province in Afghanistan in September 2010 provides an exceptionally detailed account of the dangers of relying on metadata and cellphone tracking.  Here is what I said about this in my discussion of Targeted Killing and Signature Strikes:

On 2 September 2010 ISAF announced that a ‘precision air strike’ earlier that morning had killed [Muhammad Amin] and ‘nine other militants’.  The target had been under persistent surveillance from remote platforms – what Petraeus later called ‘days and days of the unblinking eye’ – until two strike aircraft repeatedly bombed the convoy in which he was travelling.  Two attack helicopters were then ‘authorized to re-engage’ the survivors. The victim was not the designated target, however, but Zabet Amanullah, the election agent for a parliamentary candidate; nine other campaign workers died with him. Clark’s painstaking analysis clearly shows that one man had been mistaken for the other, which she attributed to an over-reliance on ‘technical data’ – on remote signatures.  Special Forces had concentrated on tracking cell phone usage and constructing social networks. ‘We were not tracking the names,’ she was told, ‘we were targeting the telephones.’

Targeting the telephones

The Takhar case has been on my mind again because, as Kate revealed in a new report last week, the agencies involved in targeted killing reach beyond the NSA – and beyond the USA.

The involvement of Britain’s GCHQ and other ‘Five Eyes’ sites in global surveillance has become well-known in recent months – and see Nikolas Kozloff for a short reflection on its ‘geopolitics of racism‘ (though he ignores the willingness to spy on other European states and allies)  – but Kate’s new report is significant for what it reveals about the complicity of civilian police agencies. In August 2013 Habib Rahman, who lost two brothers, two uncles and his father-in-law in the Takhar attack, petitioned for a judicial review of the involvement of Britain’s Ministry of Defence and the (civilian) Serious Organised Crime Agency (SOCA) – whose brief includes the drug trade from Afghanistan – in the compilation of the Joint Prioritised Effects List (one of the lists of priority targets used by the Pentagon).

soca_logo

SOCA is part of the  Joint Inter-Agency Afghanistan Task Force (JIATF), a military-police task force based at Kandahar AFB that also includes the US Drug Enforcement Agency, the US military and the British military.  In a US Senate report on the nexus between drug trafficking and insurgency, ‘Afghanistan’s Narco War‘, a SOCA investigator described the proposed collaboration as ‘a critical opportunity to blend military and law enforcement expertise’ (p.15).  At the time (August 2009) the JIATF was awaiting formal approval from Washington and London, but informal collaboration was already under way, and the SOCA officer was enthusiastic about its consolidation:

‘In the past, the military would have hit and evidence would not have been collected,’ he explained. ‘Now, with law enforcement present, we are seizing the ledgers and other information to develop an intelligence profile of the networks and the drug kingpins.’ An American military officer with the project was blunter, telling the committee staff, ‘Our long-term approach is to identify the regional drug figures and corrupt government officials and persuade them to choose legitimacy or remove them from the battlefield.’

Rahman’s lawyers argued:

As a civilian policing organisation SOCA has no legitimate or lawful role to play in the compilation or administration of this Kill List – it has no authority to be involved in military operations and the killing of individuals. The courts must urgently review whether the SOCA’s and indeed the UK’s role in the compilation, review and execution of this list if unlawful. Incidents like that affecting our client must be properly investigated.

In response, SOCA acknowledged making its intelligence available to the military, but added these provisos:

SOCA places restrictions on the dissemination of intelligence to the ISAF. Intelligence which is disseminated by SOCA is required to include handling conditions which require the express approval of the originator if it is proposed to use the material for military targeting purposes. If the mission is to arrest, with a view to criminal investigation and potential prosecution, SOCA would ordinarily be prepared to provide and/or allow the use of its intelligence. On the other hand, if the primary option for a mission is to use lethal force, SOCA would not provide intelligence or allow the use of its intelligence in support of such a mission, save potentially where the individual who is the target of the operation poses a significant and immediate threat to he lives of others (and so such disclosure would be for the purpose of preventing a criminal offence).

9780547547893_hresThe judge dismissed Rahman’s claim.  But read that last sentence again.  These missions are almost always designated as ‘kill or capture’, and while in practice ‘kill’ is often preferred over ‘capture’, how likely is it that the ‘primary option for a mission’ would be advertised as a targeted killing before the intelligence were made available?  An undated US Justice Department memo setting out conditions for targeted killing included the stipulation that where  ‘capture is infeasible’ the US would continue ‘to monitor whether capture becomes feasible’, which turns the mission (and SOCA’s proviso) into a moving target in more ways than one.  Once intelligence has been incorporated into the matrix it can hardly be withdrawn or embargoed.

And that final clause about pre-emptive action opens up a discretionary space that the Obama administration has already sought to enlarge with its demands for an ‘elongated’ concept of imminence in which the ‘immediacy’ of the threat is subject to prolongation to the point of contortion.

Rahman is not the first victim to have been rebuffed by British courts.  Last month the Court of Appeal dismissed Noor Khan‘s case against the British Government over the role of GCHQ in providing ‘locational intelligence’ for a CIA-directed drone strike in March 2010 in Miranshah in North Waziristan that killed his father.  The ruling accepted that the case put forward by Noor Khan’s barrister – that the provision of such intelligence risked contravening the Serious Crimes Act (2007) – was ‘attractive’ and  ‘persuasive’, but concluded that the review could not proceed because the claims
‘involve serious criticisms of the acts of a foreign state.  It is only in certain established circumstances that our courts will exceptionally sit in judgment of such acts.   There are no such exceptional circumstances here.’ 
The state of exception, it turns out, is not so exceptional…  To be continued.

Share this:

  • Print
  • Email
  • Facebook
  • Twitter
  • More
  • LinkedIn
  • Reddit
  • Pinterest
  • Tumblr

Like this:

Like Loading...
Posted in Afghanistan, counterterrorism, drones, intelligence, law, Pakistan, police, surveillance, Yemen | Tagged drones, geospatial intelligence, Glenn Greenwald, Habib Rahman, Jeremy Scahill, Kate Clark, Metadata+, Noor Khan, NSA, Reprieve, Takhar attack, targeted killing

Meta-dating

Posted on February 9, 2014 by Derek Gregory

Excellent news from Josh Begley that Apple has finally accepted his app tracking US drone strikes:

BEGLEY Twitter Metadata

No longer Drones+, it’s now called Metadata+ and advertises ‘real time updates on national security’, and you can download it free of charge from the App Store.

MetadataYou can find more on Josh’s work, including the larger Dronestream project here, while the  saga of Apple’s rejections of Drones + is here.   The first application in July 2012 was rejected because the app was ‘not useful or entertaining enough’ (really); a subsequent application was rejected because it provided content that ‘many audiences would find objectionable’ (yes indeed).  Last September Apple made it clear that any app specifically about drone strikes would be rejected – unless, of course, it was a game like UAV Fighter – but ‘if you broaden your topic, then we can take another look.’  Hence Metadata+ (and look at its wonderful logo on the left).

According to Lorenzo Franceschi-Bicchierai at mashable, the inspiration for the name change was a tweet from Tom Junod, the author of an unrelenting critique of ‘The lethal presidency of Barack Obama’ that appeared in Esquire in August 2012:

Junod Metadata

Indeed it is.  I’ve posted about metadata, code/space and ‘the everyware war’ via Josh’s work here, and for a brief reflection on the ‘connection between the unfolding NSA metadata controversy and the controversy that has long plagued the administration’s position on drone strikes’, see Robert Chesney at Lawfare here.  Like too many commentators he thinks the key issue is ‘transparency’ (which he links to legitimacy) – on which Madiha Tahir‘s critical comments bear repeating –  but Josh’s experience with Apple shows that transparency is important.  As long as it’s entertaining and not objectionable, of course…

Share this:

  • Print
  • Email
  • Facebook
  • Twitter
  • More
  • LinkedIn
  • Reddit
  • Pinterest
  • Tumblr

Like this:

Like Loading...
Posted in drones, late modern war, USA | Tagged Apple, drone strikes, Josh Begley, Metadata+

Enter your email address to follow this blog and receive notifications of new posts by email.

Follow geographical imaginations on WordPress.com

Recent Posts

  • Digital War
  • Health and the body politic
  • End of the ride (but not of the road)
  • Nature and Politics in the Middle East
  • Airspace Tribunal
  • The War Lawyers
  • Big Ron
  • Material Witness
  • Post-Atomic Eyes
  • Biopolitics of the more-than-human

Top Posts & Pages

  •  Cologne and the geometry of destruction
    Cologne and the geometry of destruction
  • Ideology of the drone
    Ideology of the drone
  • 'Your turn, doctor'
    'Your turn, doctor'
  • Patches, the Pentagon and Pakistan
    Patches, the Pentagon and Pakistan
  • Is Paris Burning?
    Is Paris Burning?
  • Blackout
    Blackout
  • Drone Culture
    Drone Culture
  • Law, ethics and drone warfare
    Law, ethics and drone warfare
  • Game of Drones
    Game of Drones
  • Theory of the drone 10: Killing at a distance
    Theory of the drone 10: Killing at a distance

Archives

  • December 2020
  • October 2020
  • May 2020
  • April 2020
  • March 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • March 2019
  • February 2019
  • January 2019
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012

Categories

  • Afghanistan
  • Africa
  • air wars
  • American Civil War
  • Arab Spring
  • arms and weapons
  • art
  • biopolitics
  • blogs
  • bombing
  • books
  • borderlands
  • camp
  • cartography
  • casualties
  • cities
  • Cold War
  • colonialism
  • conferences
  • corpography
  • counterinsurgency
  • counterterrorism
  • culture
  • cyberwarfare
  • data
  • drama and performance
  • drones
  • emergency
  • ethics
  • Europe
  • exhibitions
  • film
  • forensic architecture
  • genocide
  • geography
  • geopolitics
  • Guantanamo Bay
  • humanitarianism
  • humanities
  • imagery
  • information
  • intelligence
  • Iraq
  • Israel/Palestine
  • Japan
  • journals
  • landscape
  • late modern war
  • law
  • Lebanon
  • Libya
  • literature
  • logistics
  • mapping
  • media
  • medical geography
  • Mexico
  • Middle East
  • military occupation
  • nature
  • new wars
  • Orientalism
  • Pakistan
  • peace
  • Periscope
  • photography
  • poetry
  • police
  • politics
  • refugees
  • security
  • sexual violence
  • simulations
  • Somalia
  • space
  • Sudan
  • surveillance
  • Syria
  • teaching
  • technology
  • terrorism
  • theatre
  • time
  • torture
  • Uncategorizable
  • Uncategorized
  • United Kingdom
  • universities
  • USA
  • Vietnam
  • visuality
  • World War I
  • World War II
  • writing
  • Yemen

Afghanistan air wars arms and weapons art biopolitics bombing books casualties conferences counterinsurgency counterterrorism drones film imagery Iraq Israel/Palestine late modern war law media medical geography Middle East Pakistan Syria technology United Kingdom USA Vietnam visuality World War I World War II

  • Afghanistan
  • air strikes
  • Aleppo
  • Amnesty International
  • art
  • atomic bomb
  • Beirut
  • bodies
  • bombing
  • Bureau of Investigative Journalism
  • casualties
  • casualty evacuation
  • Chris Woods
  • CIA
  • civilian casualties
  • civilians
  • corpography
  • counterinsurgency
  • drones
  • drone strikes
  • Edward Said
  • Emily Mayhew
  • Eyal Weizman
  • Federally Administered Tribal Areas
  • First World War
  • forensic architecture
  • Gaston Gordillo
  • Gaza
  • Giorgio Agamben
  • Grégoire Chamayou
  • Harry Parker
  • Hiroshima
  • Human Rights Watch
  • imagery
  • international humanitarian law
  • international law
  • Iraq
  • Islamic State
  • Israel
  • James Bridle
  • Jeremy Scahill
  • Josh Begley
  • Judith Butler
  • Kunduz
  • medical evacuation
  • medical neutrality
  • Michel Foucault
  • MSF
  • Owen Sheers
  • Pakistan
  • Palestine
  • Predator
  • refugees
  • siege warfare
  • social media
  • space of exception
  • Steve Graham
  • Stuart Elden
  • Syria
  • targeted killing
  • targeting
  • terrorism
  • torture
  • Trevor Paglen
  • Twitter
  • United States
  • Uruzgan
  • Vietnam
  • violence
  • Walter Benjamin
  • war
  • Waziristan
  • Western Front
  • wounded
  • Yemen

Top Clicks

  • geographicalimaginations.…
  • geographicalimaginations.…
  • skyscrapercity.com/showth…
  • geographicalimaginations.…
  • geographicalimaginations.…
  • geographicalimaginations.…
  • geographicalimaginations.…
  • oldtimerchronicle2.wordpr…
  • geographicalimaginations.…
  • geographicalimaginations.…

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com
Blog at WordPress.com.
  • Follow Following
    • geographical imaginations
    • Join 1,735 other followers
    • Already have a WordPress.com account? Log in now.
    • geographical imaginations
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: