References
- Amoore, L. 2014. “Security and the Incalculable.” Security Dialogue 45 (5): 423–439. doi:https://doi.org/10.1177/0967010614539719.
- Amoore, L., and V. Piotukh. 2015. “Life beyond Big Data: Governing with Little Analytics.” Economy and Society 44 (3): 341–366. doi:https://doi.org/10.1080/03085147.2015.1043793.
- Anderson, K. 2012. “Efficiency in Bello and Ad Bellum: Making the Use of Force Too Easy?” In Targeted Killings: Law and Morality in an Asymmetric World, edited by J. D. O. Claire Finkelstein and A. Altman, 374–402. Oxford: Oxford University Press.
- Beier, J. M. 2017. “Short Circuit: Retracing the Political for the Age of ‘Autonomous’ Weapons.” Critical Military Studies: 1–18. doi:https://doi.org/10.1080/23337486.2017.1384978.
- Bousquet, A. 2008. “Chaoplexic Warfare or the Future of Military Organization.” International Affairs 84 (5): 915–929. doi:https://doi.org/10.1111/j.1468-2346.2008.00746.x.
- Bousquet, A. 2009. Scientific Way of Warfare: Order and Chaos on the Battlefields of Modernity. Oxford: Oxford University Press.
- Brogan, J. 2016. “What’s the Deal with Algorithms?” Slate. February 2. https://slate.com/technology/2016/02/whats-the-deal-with-algorithms.html
- Brunstetter, D., and M. Braun. 2011. “The Implications of Drones on the Just War Tradition.” Ethics & International Affairs 25 (3): 337–356. doi:https://doi.org/10.1017/S0892679411000281.
- Carvin, S. 2015. “Getting Drones Wrong.” International Journal of Human Rights 19 (2): 127–141. doi:https://doi.org/10.1080/13642987.2014.991212.
- Carvin, S., and M. J. Williams. 2015. Law, Science, Liberalism and the American Way of Warfare: The Quest for Humanity in Conflict. Cambridge: Cambridge University Press.
- Castel, R. 1991. “From Dangerousness to Risk.” In The Foucault Effect, edited by G. Burchell, C. Gordon, and P. Miller, 281–298. Hertfordshire, Great Britain: Harvester Wheatsheaf.
- Chamayou, G. 2014. A Theory of the Drone. Lloyd, J. Trans. New York: New Press.
- CJCSI 3160.01A. 2012. “No-Strike and the Collateral Damage Estimation Methodology” https://info.publicintelligence.net/CJCS-CollateralDamage.pdf
- CLAMO PowerPoint. 2009. “Slides Used in the US Army Judge Advocate General’s School, Center for Law and Military Operations (CLAMO) Class: An Introduction to the Collateral Damage Methodology (COM) and the Collateral Damage Estimate (CDE).” Government Attic. Released 30 August 2011. https://www.governmentattic.org/5docs/ArmyJAG-CLAMO-Slides_2009.pdf
- Cole, D. 2014. “We Kill People Based on Metadata.” The New York Review of Books, May 10.
- Crawford, N. C. 2013a. Accountability for Killing: Moral Responsibility for Collateral Damage in America’s Post-9/11 Wars. Oxford: Oxford University Press.
- Crawford, N. C. 2013b. “Bugsplat: US Standing Rules of Engagement, International Humanitarian Law, Military Necessity, and Noncombatant Immunity.” In Just War: Authority, Tradition, and Practice, edited by A. Lang, C. O’Driscoll, and J. Williams, 231–251. Washington D.C.: Georgetown University Press.
- Domingos, P. 2015. The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World. New York: Basic Books.
- Enemark, C. 2019. “Drones, Risk, and Moral Injury.” Critical Military Studies 5 (2): 150–167. doi:https://doi.org/10.1080/23337486.2017.1384979.
- Garard, O. 2016. “Targeting Clausewitzian Judgments: Fusing Precision and Accuracy to Strategy and Tactics.” Strategy Bridge, September 20.
- Graham, B. 2003. “Military Turns to Software to Cut Civilian Casualties.” Washington Post, February 21. https://www.washingtonpost.com/archive/politics/2003/02/21/military-turns-to-software-to-cut-civilian-casualties/af3e06a3-e2b2-4258-b511-31a3425bde31/?utm_term=.e7b1effacaef
- Greenwald, G., and J. Scahill. 2015. “The Assassination Complex.” The Intercept, October 15. https://theintercept.com/drone-papers/the-assassination-complex/
- Gregory, T. 2017. “Targeted Killings: Drones, Noncombatant Immunity, and the Politics of Killing.” Contemporary Security Policy 38 (2): 212–236. doi:https://doi.org/10.1080/13523260.2017.1336296.
- Grothoff, C., and J. Porup. 2016. “The NSA’s SKYNET Program May Be Killing Thousands of Innocent People.” ARS Technica, February 16. https://arstechnica.com/information-technology/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/3/
- Hacking, Ian. 1990. The Taming of Chance. Cambridge: Cambridge University Press.
- Hagmann, J., and M. D. Cavelty. 2012. “National Risk Registers: Security Scientism and the Propagation of Permanent Insecurity.” Security Dialogue 43 (1): 79–96. doi:https://doi.org/10.1177/0967010611430436.
- Horowitz, M. 2016. “The Ethics & Morality of Robotic Warfare: Assessing the Debate over Autonomous Weapons.” Daedalus 145 (4): 25–36. doi:https://doi.org/10.1162/DAED_a_00409.
- Jabri, V. 2006. “War, Security and the Liberal State.” Security Dialogue 37 (1): 47–64. doi:https://doi.org/10.1177/0967010606064136.
- Joint Publication 3-60. 2013. “Joint Targeting” 31 January. Available via Just Security at: https://www.justsecurity.org/wp-content/uploads/2015/06/Joint_Chiefs-Joint_Targeting_20130131.pdf
- Kaag, J. 2008. “Another Question Concerning Technology: The Ethical Implications of Homeland Defence and Security Technologies.” Homeland Security Affairs 4(2). https://www.hsaj.org/articles/125
- Lambeth, B. S. 2010. Air Power against Terror: America’s Conduct of Operation Enduring Freedom. Santa Monica, CA: RAND Corporation.
- Lewis, M. W. 2013. “Drones: Actually the Most Humane Form of Warfare Ever.” The Atlantic, August 21.
- Mabee, B. 2016. “From ‘Liberal War’ to ‘Liberal Militarism’: United States Security Policy as the Promotion of Military Modernity.” Critical Military Studies 2 (3): 242–261. doi:https://doi.org/10.1080/23337486.2016.1184418.
- Miller, K. 2014. “Total Surveillance, Big Data and Predictive Crime Technology: Privacy’s Perfect Storm.” Journal of Technology of Law and Policy 19: 105–146.
- Morkevicius, V. 2014. “Tin Men: Ethics, Cybernetics and the Importance of Soul.” Journal of Military Ethics 13 (1): 3–19. doi:https://doi.org/10.1080/15027570.2014.908011.
- Owens, P. 2003. “Accidents Don’t Just Happen: The Liberal Politics of High-Technology `humanitarian’ War.” Millennium: Journal of International Studies 32 (3): 595–616. doi:https://doi.org/10.1177/03058298030320031101.
- Parasuraman, R., and D. H. Manzey. 2010. “Complacency and Bias in Human Use of Automation: An Attentional Integration.” Human Factors 52 (3): 381–410. doi:https://doi.org/10.1177/0018720810376055.
- Pasquale, F. 2016. The Black Box Society: The Secret Algorithms that Control Money and Information. Cambridge, MA: Harvard University Press.
- Renic, N. C. 2018. “Justified Killing in an Age of Radically Asymmetric Warfare.” European Journal of International Relations 25 (2): 408–430. doi:https://doi.org/10.1177/1354066118786776.
- Renic, N. C. 2020. Asymmetric Killing: Risk Avoidance, Just War, and the Warrior Ethos. Oxford: Oxford University Press.
- Roff, H. 2014. “The Strategic Robot Problem: Lethal Autonomous Weapons in War.” Journal of Military Ethics 13 (3): 211–227. doi:https://doi.org/10.1080/15027570.2014.975010.
- Schwarz, E. 2016. “Prescription Drones: On the Techno-Biopolitical Regimes of Contemporary ‘Ethical Killing.’.” Security Dialogue 47 (1): 59–75. doi:https://doi.org/10.1177/0967010615601388.
- Schwarz, E. 2018. Death Machines: The Ethics of Violent Technologies. Manchester: Manchester University Press.
- Schwenkenbecher, A. 2014. “Collateral Damage and the Principle of Due Care.” Journal of Military Ethics 13 (1): 94–105. doi:https://doi.org/10.1080/15027570.2014.910015.
- Seaver, N. 2017. “Algorithms as Culture: Some Tactics for the Ethnography of Algorithmic Systems.” Big Data & Society 4 (2): 1–12. doi:https://doi.org/10.1177/2053951717738104.
- Sewall, S. B. 2016. Chasing Success: Air Force Efforts to Reduce Civilian Harm. Maxwell Air Force Base, Alabama: Air University Press.
- Shachtman, N. 2007. “How Technology Almost Lost the War: In Iraq, the Critical Networks are Social – Not Electronic.” Wired, November 27.
- Shaw, M. 2002. “Risk Transfer Militarism, Small Massacres, and the Historic Legitimacy of War.” International Relations 16 (3): 343–359. doi:https://doi.org/10.1177/0047117802016003003.
- Strawser, B. J. 2010. “Moral Predators: The Duty to Employ Uninhabited Aerial Vehicles.” Journal of Military Ethics 9 (4): 342–368. doi:https://doi.org/10.1080/15027570.2010.536403.
- Wagner, A. R., J. Bornstein, and A. Howard. 2018. “Computing Ethics: Overtrust in the Robotics Age.” Communications of the ACM 61 (9): 22–24. doi:https://doi.org/10.1145/3241365.
- Walzer, M. 2006. Just and Unjust Wars: A Moral Argument with Historical Illustrations 4th Ed. New York: Basic Books.
- Washington Post. 1998. “Fog of War: The Battle for Hearts and Minds.” http://www.washingtonpost.com/wp-srv/inatl/longterm/fogofwar/vignettes/v8.htm
- Watch, H. R. 2003. “The Conduct of the Air War.” Human Rights Watch. https://www.hrw.org/reports/2003/usa1203/4.htm#_ftnref29
- Zehfuss, M. 2011. “Targeting: Precision and the Production of Ethics.” European Journal of International Relations 17 (3): 543–566. doi:https://doi.org/10.1177/1354066110373559.
- Zehfuss, M. 2018. War and the Politics of Ethics. Oxford: Oxford University Press.