Tracking and targeting

News from Lucy Suchman of a special issue of Science, Technology and Human Values [42 (6) (2017)]  on Tracking and targeting: sociotechnologies of (in)security, which she’s co-edited with Karolina Follis and Jutta Weber.

Here’s the line-up:

Lucy Suchman, Karolina Follis and Jutta Weber: Tracking and targeting

This introduction to the special issue of the same title sets out the context for a critical examination of contemporary developments in sociotechnical systems deployed in the name of security. Our focus is on technologies of tracking, with their claims to enable the identification of those who comprise legitimate targets for the use of violent force. Taking these claims as deeply problematic, we join a growing body of scholarship on the technopolitical logics that underpin an increasingly violent landscape of institutions, infrastructures, and actions, promising protection to some but arguably contributing to our collective insecurity. We examine the asymmetric distributions of sociotechnologies of (in)security; their deadly and injurious effects; and the legal, ethical, and moral questions that haunt their operations.

Karolina Follis: Visions and transterritory: the borders of Europe

This essay is about the role of visual surveillance technologies in the policing of the external borders of the European Union (EU). Based on an analysis of documents published by EU institutions and independent organizations, I argue that these technological innovations fundamentally alter the nature of national borders. I discuss how new technologies of vision are deployed to transcend the physical limits of territories. In the last twenty years, EU member states and institutions have increasingly relied on various forms of remote tracking, including the use of drones for the purposes of monitoring frontier zones. In combination with other facets of the EU border management regime (such as transnational databases and biometrics), these technologies coalesce into a system of governance that has enabled intervention into neighboring territories and territorial waters of other states to track and target migrants for interception in the “prefrontier.” For jurisdictional reasons, this practice effectively precludes the enforcement of legal human rights obligations, which European states might otherwise have with regard to these persons. This article argues that this technologically mediated expansion of vision has become a key feature of post–cold war governance of borders in Europe. The concept of transterritory is proposed to capture its effects.

Christiane Wilke: Seeing and unmaking civilians in Afghanistan: visual technologies and contested professional visions

While the distinction between civilians and combatants is fundamental to international law, it is contested and complicated in practice. How do North Atlantic Treaty Organization (NATO) officers see civilians in Afghanistan? Focusing on 2009 air strike in Kunduz, this article argues that the professional vision of NATO officers relies not only on recent military technologies that allow for aerial surveillance, thermal imaging, and precise targeting but also on the assumptions, vocabularies, modes of attention, and hierarchies of knowledges that the officers bring to the interpretation of aerial surveillance images. Professional vision is socially situated and frequently contested with communities of practice. In the case of the Kunduz air strike, the aerial vantage point and the military visual technologies cannot fully determine what would be seen. Instead, the officers’ assumptions about Afghanistan, threats, and the gender of the civilian inform the vocabulary they use for coding people and places as civilian or noncivilian. Civilians are not simply “found,” they are produced through specific forms of professional vision.

Jon Lindsay: Target practice: Counterterrorism and the amplification of data friction

The nineteenth-century strategist Carl von Clausewitz describes “fog” and “friction” as fundamental features of war. Military leverage of sophisticated information technology in the twenty-first century has improved some tactical operations but has not lifted the fog of war, in part, because the means for reducing uncertainty create new forms of it. Drawing on active duty experience with an American special operations task force in Western Iraq from 2007 to 2008, this article traces the targeting processes used to “find, fix, and finish” alleged insurgents. In this case they did not clarify the political reality of Anbar province but rather reinforced a parochial worldview informed by the Naval Special Warfare community. The unit focused on the performance of “direct action” raids during a period in which “indirect action” engagement with the local population was arguably more appropriate for the strategic circumstances. The concept of “data friction”, therefore, can be understood not simply as a form of resistance within a sociotechnical system but also as a form of traction that enables practitioners to construct representations of the world that amplify their own biases.

M.C. Elish: Remote split: a history of US drone operations and the distributed labour of war

This article analyzes US drone operations through a historical and ethnographic analysis of the remote split paradigm used by the US Air Force. Remote split refers to the globally distributed command and control of drone operations and entails a network of human operators and analysts in the Middle East, Europe, and Southeast Asia as well as in the continental United States. Though often viewed as a teleological progression of “unmanned” warfare, this paper argues that historically specific technopolitical logics establish the conditions of possibility for the work of war to be divisible into discreet and computationally mediated tasks that are viewed as effective in US military engagements. To do so, the article traces how new forms of authorized evidence and expertise have shaped developments in military operations and command and control priorities from the Cold War and the “electronic battlefield” of Vietnam through the Gulf War and the conflict in the Balkans to contemporary deployments of drone operations. The article concludes by suggesting that it is by paying attention to divisions of labor and human–machine configurations that we can begin to understand the everyday and often invisible structures that sustain perpetual war as a military strategy of the United States.

I’ve discussed Christiane’s excellent article in detail before, but the whole issue repays careful reading.

And if you’re curious about the map that heads this post, it’s based on the National Security Agency’s Strategic Mission List (dated 2007 and published in the New York Times on 2 November 2013), and mapped at Electrospaces: full details here.

Security Theatre

Security Theatre

At the Or Gallery, 555 Hamilton Street, Vancouver: Security Theatre, an exhibition featuring works by Karl Burke, Harun Farocki, An-My Lê and the Bureau of Inverse Technology.

Security Theatre revolves around methods of simulation and documentation and their hold on respective truth claims about modern war. Specifically, this exhibition looks at how modern warfare is rationalised, remembered and portrayed across image based media such as electronic games, video and photography. The exhibition examines how these systems manifest and evolve into the 21st century, which sees war increasingly fought by proxy and through remote digital means. While claims of possessing the humanist high ground remain tied to the Western Bloc, they are no longer linked to the policy of deterrence seen in the 20th century, but instead are tied to myths of precision and expedience in a preemptive first strike context. Just as there were efforts in the 20th century to socialise people to the omnipresent threats of nuclearism, so too is there an effort to socialise people to the endless need for conflict underwritten by the ubiquitous threat of terrorist states and actors. This requires the creation of dissociative mental states. While the past mass dissociation of the Cold War addressed the need to prevent nuclear war by preparing for it, today’s dissociation follows the need to prevent terrorism by engaging in it. The technology used and the social conditions required were developed incrementally with the aid of experts in various fields, with the aim of gaining either tacit or explicit endorsement of so-called “security policies” which are largely maintained through obfuscation and manipulation. The artists included use media and techniques that provide an intrinsic sense of objective documentation when making reference to armed conflict and related events, which interpret and manage expectations of modern war.

The exhibition opens on 13 May and runs to 18 June; the gallery is open 1200-1700 Tuesday-Saturday, and admission is free.  More information (including profiles of the artists) here.

Security by remote control

Security by remote control

News from Lucy Suchman that the website for the Security by Remote Control conference at Lancaster, 22-23 May, is now live here.  It will be enhanced and updated as the symposium approaches – including programme details: I’m still thinking over what I might present – but registration is open now.

Despite investment in new technologies, the legitimacy and efficacy of actions taken in the name of security is increasingly in question. In April of 2013 a coalition led by Human Rights Watch initiated a campaign in favour of a legally binding prohibition on the development, production and use of fully autonomous weapon systems. Simultaneously, some military and robotics experts argue that equipping robots with the capacity to make ethical judgments is an achievable technological goal. Within these debates, the ‘human in the loop’ is posited alternately as the safeguard against illegitimate killing, or its source. Implicit across the debate is the premise of a moment of decision in which judgements of identification and appropriate response are made. This symposium will focus on on the troubling space between automation and autonomy, to understand more deeply their intimate relations, and the inherent contradictions that conjoin them.

Security archipelagos

Three short contributions that have caught my eye raise a series of interesting questions about contemporary ‘security archipelagos’ (in multiple sense of the term, hence the plural).

amar-security-archipelagoThe term itself comes from Paul Amar, and Austin Zeiderman has a short but interesting review of his The Security Archipelago: Human-Security States, Sexuality Politics, and the End of Neoliberalism (Duke, 2013) over at Public Books (Public Culture‘s public site):

‘Amar asserts that we need an analytical framework focused on the rise of human security—a governance regime that “aim[s] to protect, rescue, and secure certain idealized forms of humanity.” This new regime is gradually replacing neoliberalism, Amar contends, “as the hegemonic project of global governance and of state administration.” This shift is evident in how security is now justified and pursued by states. The antagonistic relationship between security and human rights that characterized the “neoliberal market states” of the late 20th century is no longer so evident. The repressive security strategies that underpinned earlier development paradigms have been succeeded by the “promise to reconcile human rights and national security interests” in the interest of economic prosperity. Progressive and conservative security doctrines now agree on the imperative to “humanize” (or “humanitarianize”) both state and parastatal security apparatuses. The result, Amar argues, is what he calls the “human-security state”: a globally emergent governance regime with “consistent character and political profile.” From Latin America to the Middle East, political legitimacy is increasingly based on securing humanity against a range of malicious forces….

If the megacities of the Global South are indeed “laboratories” in which new logics and techniques of global governance are being created, it is up to other researchers to fill out and develop further Amar’s concept of the “security archipelago.” Though his study provides both the theoretical rationale and the analytical tools with which to do so, it may be worth questioning whether the “human” is necessarily central to emerging security regimes. For along with human security apparatuses and the human actors struggling to articulate progressive alternatives, a host of non-humans—drones, border fences, hurricanes—are actively producing the security landscape of the future.’

Secondly, I’ve been thinking about the ways in which the work of these ‘laboratories’ often relies on non-state, which is to say corporate, commercial sites (this isn’t news to Paul, of course, even if he wants to challenge our ideas about neoliberalism).  We surely know that the traditional concept of the military-industrial complex now needs wholesale revision, and I’ve noted before the timely and important essay by Jeremy Crampton, Sue Roberts and Ate Poorthuis on ‘The new political economy of geospatial intelligence‘ in the Annals of the Association of American Geographers 104 (1)  (2014) (to which I plan to return in a later post).  The latest MIT Technology Review has a short but suggestive essay by Antonio Regalado, ‘Spinoffs from Spyland’, which describes some of the pathways through which the National Security Agency commercializes (and thus potentially subcontracts and, in some cases, even subverts) its surveillance technology:

In 2011, the NSA released 200,000 lines of code to the Apache Foundation. When Atlas Venture’s Lynch read about that, he jumped—here was a technology already developed, proven to work on tens of terabytes of data, and with security features sorely needed by heavily regulated health-care and banking customers. When Fuchs’s NSA team got cold feet about leaving, says Lynch, “I said ‘Either you do it, or I’ll find five kids from MIT to do it and they’ll steal your thunder.’”

Eventually, Fuchs and several others left the NSA, and now their company [Sqrrl] is part of a land grab in big data, where several companies, like Splunk, Palantir, and Cloudera, have quickly become worth a billion dollars or more.

Over the summer, when debate broke out over NSA surveillance of Americans and others, Sqrrl tried to keep a low profile. But since then, it has found that its connection to the $10-billion-a-year spy agency is a boost, says Ely Kahn, Sqrrl’s head of business development and a cofounder. “Large companies want enterprise-scale technology. They want the same technology the NSA has,” he says.

SQRRL

And finally, before we rush to radicalise and globalise Foucault’s critique of the Panopticon, it’s worth reading my friend Gaston Gordillo‘s cautionary note – prompted by the search for missing Malaysian Airlines Flight 370 – on ‘The Opaque Planet’:

The fascination with, and fetishization of, technologies of global location and surveillance often makes us forget that, for all their sophistication, we live on a planet riddled with opaque zones that will always erode the power of human-made systems of orientation, for the simple fact that no such system (contrary to what the NSA seems to believe) will ever manage to create an all-seeing God. This opacity is intrinsic to the textured, three-dimensional materiality of the surface of the planet, and is especially marked in the liquid vastness of the ocean.

MH370-military_radar-tracking-peninsula-170314-eng-graphcs-tmi-kamarul

Phil Steinberg has already commented on the geopolitics of the search, but Gaston draws out attention to the gaps in the surveillance capabilities of states, and here too the geopolitical meshes (and sometimes jibes against) the geoeconomic, as described in this report from Reuters:

Analysts say the gaps in Southeast Asia’s air defenses are likely to be mirrored in other parts of the developing world, and may be much greater in areas with considerably lower geopolitical tensions.

“Several nations will be embarrassed by how easy it is to trespass their airspace,” said Air Vice Marshal Michael Harwood, a retired British Royal Air Force pilot and ex-defense attache to Washington DC. “Too many movies and Predator (unmanned military drone) feeds from Afghanistan have suckered people into thinking we know everything and see everything. You get what you pay for. And the world, by and large, does not pay.”

A new natural history of destruction?

Security by remote control conference

My work on drones has been invigorated by reading an outstandingly creative essay by Lucy Suchman on ‘Situational Awareness: deadly bioconvergence at the boundaries of bodies and machines’, forthcoming at the ever-interesting Mediatropes.  It’s sparked both an e-mail conversation and an invitation to speak at a symposium on Security by remote control: automation and autonomy in robot weapon systems at Lancaster University, 22-23 May.  Here is the call for papers:

Remotely operated and robotic systems are central to contemporary military operations. Robotic weapons can select targets and deliver lethal force with varying degrees of human control, and technologies for fully autonomous weapon systems are currently in development. Alongside military reconnaissance and the prospective configuration of ‘killer- robots,’ drone technologies are being deployed for ostensibly peaceful purposes, most notably surveillance of public space, private property and national borders. More generally, the frame offered by contemporary security discourses has redrawn previous boundaries regarding the use of state violence in the name of homeland protection. But despite an extended history of investment in technologies that promise to rationalise the conflict zone and accurately identify the imminent threat, the legitimacy and efficacy of actions taken in the name of security is increasingly in question.

The purpose of this symposium is to present and debate current scholarship on the ethics and legality of robotic systems in war and beyond. By robotic systems we mean networked devices with on-board algorithms that direct machine actions (in this case, tracking, targeting and deploying force) in varying configurations of pre-programmed operation and remote human control. The line between automation and autonomy has come under renewed debate in the context of contemporary developments in remotely controlled weapon systems, most prominently uninhabited aerial vehicles or drones. For 
example, in April of 2013 a coalition led by Human Rights Watch initiated a campaign in favour of a legally binding prohibition on the development, production and use of fully autonomous weapon systems. Simultaneously, some military and robotics experts emphasize the advantages of automated weapons and argue that equipping robots with the capacity to make ethical judgments is an achievable technological goal. Within these debates, the ‘human in the loop’ is posited alternately as the safeguard against illegitimate killing, or its source. Implicit across the debate is the premise of a moment of decision in which judgements of identification and appropriate response are made.

While emerging arms control strategies focus on the ‘red line’ that would prohibit the development and use of weapons that remove human judgment from the identification of targets and the decision to fire, the question remains to what extent human judgment and decision-making are already compromised by the intensifications of speed, and associated increase in forms and levels of automation, that characterise contemporary war-fighting, particularly in situations of remote control. Rather than attempting to establish one or the other of these concerns as correct, or even as more important than the other, we seek to focus our discussion on the troubling space between automation and autonomy, to understand more deeply their intimate relations, and the inherent contradictions that conjoin them.

To explore the key stakes and lines of argument in this debate, we invite contributions from scholars in the fields of security, peace and conflict studies, international human rights law, anthropology/sociology of science and technology, technoculture and technomilitarism, computing, simulation and cyber law. The ambition for this event is to stimulate ongoing cross-disciplinary discussion and further research on this topic, drawing on the resources of the Lancaster University centres that are its co-sponsors.

Confirmed Speakers:

Patrick Crogan, Senior Lecturer in Film Studies at the University of the West of England in Bristol, scholar of technoculture, videogames and military technoscience, author of Gameplay Mode: War, Simulation, and Technoculture (2011);

Derek Gregory, Peter Wall Distinguished Professor and Professor of Geography at the University of British Columbia in Vancouver, author of multiple works interrogating social and spatial dimensions of conflict, and currently completing a book titled The Everywhere War (forthcoming);

M. Shane Riza, command pilot and former instructor at the U.S. Air Force Weapons School, author of Killing Without Heart: Limits on Robotic Warfare in an Age of Persistent Conflict (2013);

Christiane Wilke, Associate Professor in Law and Legal Studies at Carleton University, Canada. She has been researching legal responses to state violence and is working on a project about visuality, photography, and international law.

To indicate your interest in participating, or for further information, please contact Lucy Suchman l.suchman@lancaster.ac.uk.

I’m really excited about this; I’m part way through Shane Riza’s book, and it’s already clear that I’m going to learn a lot from the meeting.

The image at the top of this post comes from the CFP, incidentally, but the image below is Margaret Bourke-White‘s classic photograph from the rubble of a bombed German city, which I use when I talk about the ways in which the trauma of air war dislocates the very sinews of language and the capacity to write and re-present (see ‘Doors in to nowhere’, an extended reflection on W.G. Sebald: DOWNLOADS tab).  Perhaps I’ll use my time at Lancaster (given the name, a peculiarly appropriate place) to join the dots between the two images and revisit ‘The natural history of destruction’ for the twenty-first century….

tumblr_m04iio5ICm1qbwvhpo1_500