Advertisement

Death by Metadata: The Bioinformationalisation of Life and the Transliteration of Algorithms to Flesh

Chapter

Abstract

In this chapter I examine the relations of knowledge/power that undergird military technologies that transmute life into anonymous data and thereby render it killable through lethal drone targeting. I specifically focus on tracking technologies developed by the National Surveillance Agency (NSA) that have been incorporated into the United States Department of Defense’s (DoD) drone program. I examine the interlocking of the NSA’s metadata with the DoD’s algorithmic formulae used to conduct drone kills in which the identities of those killed are often not known. I situate what I term the bioinformationalisation of life in the context of Pakistan and Yemen in order to disclose the violent transliteration of abstract metadata to flesh.

Keywords

Cell Phone Imminent Threat National Security Agency Killing Field Temporal Pulp 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Alkarama Foundation. (2013). The United States’ War on Yemen: Drone attacks. Report submitted to the special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terror, 3 June. http://en.alkarama.org/documents/ALK_USA-Yemen_Drones_SRCTwHR_4June2013_Final_EN.pdf. Accessed 21 June 2013.
  2. Al-Muslimi, F. (2013). United States Senate Judiciary Committee, Subcommittee on The Constitution, Civil Rights and Human Rights, Drone Wars: The constitutional and counterterrorism implications of targeted killing. Statement of Farea Al-Muslimi, 23 April. http://www.emptywheel.net/wp-content/uploads/2013/04/04-23-13Al-MuslimiTestimony.pdf. Accessed 1 July 2013.
  3. Babich, B. E. (1994). Nietzsche’s philosophy of science. Albany: State University of New York Press.Google Scholar
  4. Bayoumy, Y. (2013). Al Qaeda gains sympathy in Yemen as US drone strikes wedding party. Business Insider, 10 December. http://www.businessinsider.com.au/al-qaeda-gains-sympathy-in-yemen-as-us-drone-strikes-a-wedding-party-2013-12. Accessed 11 Dec 2013.
  5. Channel 4 News. (2014). What is ABI – And will it make drones even deadlier? 22 February. http://www.channel4.com/news/drones-abi-activity-based-intelligence-yemen-strike-attack. Accessed 24 Feb 2014.
  6. Cole, D. (2014). We kill people based on metadata. New York Review of Books, 10 May. http://www.nybooks.com/blogs/nyrblog/2014/may/10/we-kill-people-based-metadata/. Accessed 22 May 2014.
  7. da Silva, D. F. (2009). No-bodies: Law, raciality and violence. Griffith Law Review, 18(2), 212–236.CrossRefGoogle Scholar
  8. Democracy Now! (2013). Yemeni reporter who exposed U.S. drone strike freed from prison after jailing at Obama’s request. Democracy Now!, 25 July. http://www.democracynow.org/2013/7/25/yemeni_reporter_who_exposed_us_drone. Accessed 26 July 2013.
  9. Dilanian, K. (2014). Debate grows over proposal for CIA to turn over drones to Pentagon. LA Times, 11 May. http://touch.latimes.com/#section/-1/article/p2p-80167118/. Accessed 17 May 2014.
  10. Drones Team. (2013). Get the data: Drone wars: Yemen: Reported US covert actions. The Bureau of Investigative Journalism, 3 January. http://www.thebureauinvestigates.com/2013/01/03/yemen-reported-us-covert-actions-2013/. Accessed 6 Jan 2013.
  11. Dvorin, T. (2014). 96.5% of casualties from US drone strikes civilians. Arutz Sheva/Israel International News, 26 November. http://www.israelnationalnews.com/News/News.aspx/187922. Accessed 30 Nov 2014.
  12. Foucault, M. (1980). Power/knowledge: Selected interviews and other writings 1972–1977. New York: Pantheon Books.Google Scholar
  13. Heidegger, M. (1975). Poetry, language, thought. New York: Harper and Row.Google Scholar
  14. Heidegger, M. (1978). The question concerning technology. In D. F. Krell (Ed.), Martin Heidegger: Basic writings. London: Routledge and Kegan Paul.Google Scholar
  15. Heidegger, M. (1995). The fundamental concepts of metaphysics: World, finitude, solitude. Bloomington: Indian University Press.Google Scholar
  16. Human Rights Watch. (2013). ‘Between a drone and al-Qaeda’: The civilian cost of US targeted killings in Yemen. http://www.hrw.org/sites/default/files/reports/yemen1013_ForUpload.pdf. Accessed 12 Nov 2013.
  17. Khan, H. (2014). “Precise” drone strikes in Pakistan: 874 “Unknowns” killed in US hunt for terrorists. Express Tribune, 26 November. http://tribune.com.pk/story/797295/precise-drone-strikes-in-pakistan-874-unknowns-killed-in-us-hunt-for-24-terrorists/. Accessed 27 Nov 2014.
  18. Latour, B. (2004). Nonhumans. In S. Harrison, S. Pile, & N. Thrift (Eds.), Patterned ground: Entanglements of nature and culture. London: Reaktion Books.Google Scholar
  19. Merleau-Ponty, M. (1997). The visible and the invisible. Evanston: Northwestern University Press.Google Scholar
  20. Merleau-Ponty, M. (2003). Nature: Course notes from the Collège de France. Evanston: Northwestern University Press.Google Scholar
  21. Pugliese, J. (2007). Geocorpographies of torture. Critical Race and Whiteness Studies, 3(1). http://www.acrawsa.org.au/. Accessed 23 Sept 2014.
  22. Pugliese, J. (2013). State violence and execution of law: Biopolitical caesurae of torture, black sites, drones. Abingdon/New York: Routledge.Google Scholar
  23. Pugliese, J. (2016). Drone casino mimesis: Telewarfare and the militarisation of civilian sites, practices and technologies. Journal of Sociology, 53(3), 500–521.Google Scholar
  24. Reprieve. (2014). You never die twice: Multiple kills in the US drone program. Reprieve, 24 November. http://www.reprieve.org/uploads/2/6/3/3/26338131/2014_11_24_pub_you_never_die_twice_-_multiple_kills_in_the_us_drone_program.pdf. Accessed 25 Nov 2014.
  25. RT. (2014). Former CIA director: “We kill people based on metadata.” RT, 12 May. http://rt.com/usa/158460-cia-director-metadata-kill-people/. Accessed 14 May 2014.
  26. Scahill, J. (2013). Dirty wars: The world is a battlefield. New York: Nation Books.Google Scholar
  27. Scahill, J., & Greenwald, G. (2014). The NSA’s secret role in the US assassination program. The Intercept, 10 February. http://firstlook.org/theintercept/2014/02/10/the-nsa-secret-role/. Accessed 12 Feb 2014.
  28. Serle, J. (2014). Only 4% of drone victims in Pakistan named as al Qaeda members. Bureau of Investigative Journalism, 16 October. http://www.thebureauinvestigates.com/namingthedead/only-4-of-drone-victims-in-pakistan-named-as-al-qaeda-members/?lang=en. Accessed 17 Oct 2014.
  29. Stryker, S. (2006). (De)subjugated knowledges: An introduction to transgender studies. In S. Stryker & S. Whittle (Eds.), The transgender studies reader. New York: Routledge.Google Scholar

Copyright information

© The Author(s) 2016

Authors and Affiliations

  1. 1.Department of Media, Music, Communication and Cultural StudiesMacquarie UniversitySydneyAustralia

Personalised recommendations