References
- Allen, G., and T. Chan. 2017. “Artificial Intelligence and National Security.” Harvard Kennedy School: Belfer Center for Science and International Relations, Accessed on 19 May 2021. https://www.belfercenter.org/publication/artificial-intelligence-and-national-security.
- Amoore, L. 2009. “Algorithmic War: Everyday Geographies of the War on Terror.” Antipode 41 (1): 49–69. doi:10.1111/j.1467-8330.2008.00655.x.
- Amoore, L. 2011. “Data Derivatives: On the Emergence of a Security Risk Calculus for Our Times.” Theory, Culture & Society 28 (6): 24–43. doi:10.1177/0263276411417430.
- Amoore, L. 2020. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press.
- Badalič, V. 2019. The War Against Civilians: Victims of the ‘War on Terror’ in Afghanistan and Pakistan. London: Palgrave Macmillan.
- Badalič, V. 2021. “Automating the Target Selection Process: Humans, Semiautonomous Weapons Systems, and the Assault on International Humanitarian Law.” In Automating Crime Prevention, Surveillance, and Military Operations, edited by A. Završnik and V. Badalič, 223–242. Cham: Springer.
- Bernal, P. 2016. “Data Gathering, Surveillance and Human Rights: Recasting the Debate.” Journal of Cyber Policy 1 (2): 243–264. doi:10.1080/23738871.2016.1228990.
- Calude, C. S., and G. Longo. 2017. “The Deluge of Spurious Correlations in Big Data.” Foundations of Science 22 (3): 595–612. doi:10.1007/s10699-016-9489-4.
- Wasinski C.. 2019. “When the War Machine Produces Its Enemies: Making Sense of the Afghan Situation Through British Airpower.” Critical Military Studies 5 (4): 341–358. doi:10.1080/23337486.2017.1412631.
- Cloud, D. S. 2011, April 10. “Anatomy of an Afghan War Tragedy.” Los Angeles Times, April 10. Accessed on 30 August 2015. http://www.latimes.com/world/la-fg-afghanistan-drone-20110410-story.html.
- Cloud, D. S. 2010, May 7. “CIA Allowed to Kill Terrorist Suspects Without Identification.” The Sydney Morning Herald. Accessed on 17 May 2021. https://www.smh.com.au/world/cia-allowed-to-kill-terrorist-suspects-without-identification-20100506-uh33.html.
- Cole, D. 2014, May 10. We kill people based on metadata. The New York Review of Books. Accessed on 30 January 2023. https://www.nybooks.com/online/2014/05/10/we-kill-people-based-metadata/
- Congressional Research Service (CRS) 2020. “Artificial Intelligence and National Security.” Accessed on 19 May 2021. https://fas.org/sgp/crs/natsec/R45178.pdf.
- Crawford, E. 2015. Identifying the Enemy: Civilian Participation in Armed Conflict. Oxford: Oxford University Press.
- Crawford, E. 2018. “Who is a Civilian? Membership of Opposition Groups and Direct Participation in Hostilities.” In The Grey Zone: Civilian Protection Between Human Rights and the Laws of War, edited by M. Lattimer and P. Sands, 19–40. London: Hart Publishing.
- Crowe, J., and K. Weston-Scheuber. 2013. Principles of International Humanitarian Law. Cheltenham: Edward Elgar Publishing.
- Currier, C., G. Greenwald, and A. Fishman. 2015, May 8. US Government Designated Prominent Al Jazeera Journalist as “Member of Al Qaeda”. The Intercept, Accessed on 4 May 2021. https://theintercept.com/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/.
- Currier, C., and P. Maass. 2016. “Firing blind.” In The Assassination Complex: Inside the Government’s Secret Drone Warfare Program, edited by J. Scahill, 108–121. New York: Simon & Schuster.
- Curtis, N. 2016. “The Explication of the Social: Algorithms, Drones and (Counter-) Terror.” Journal of Sociology 52 (3): 522–536. doi:10.1177/1440783316654265.
- Delori, M. 2014. “Killing Without Hatred: The Politics of (Non)-Recognition in Contemporary Western Wars.” Global Discourse 4 (4): 516–531. doi:10.1080/23269995.2014.935102.
- Delori, M. 2019. “Humanitarian Violence: How Western Airmen Kill and Let Die in Order to Make Live.” Critical Military Studies 5 (4): 322–340. doi:10.1080/23337486.2017.1401827.
- Dryer, A. 2006, May 15. “How the NSA Does “Social Network Analysis”.” Slate, Accessed 17 August 2020. http://www.slate.com/articles/news_and_politics/explainer/2006/05/how_the_nsa_does_social_network_analysis.html.
- Ekelhof, M. A. C. 2018. “Lifting the Fog of Targeting: “Autonomous Weapons” and Human Control Through the Lens of Military Targeting.” Naval War College Review 71 (3): 6.
- Emery, J. R. 2020. “Probabilities Towards Death: Bugsplat, Algorithmic Assassinations, and Ethical Due Care.” Critical Military Studies 8 (2): 179–197. doi:10.1080/23337486.2020.1809251.
- Gandomi, A., and M. Haider. 2015. “Beyond the Hype: Big Data Concepts, Methods, and Analytics.” International Journal of Information Management 35 (2): 137–144. doi:10.1016/j.ijinfomgt.2014.10.007.
- Gardam, J. 2004. Necessity, Proportionality and the Use of Force by States. Cambridge: Cambridge University Press.
- Grothoff, C., and J. M. Porup. 2016, February 2. “The Nsa’s KSYNET Program May Be Killing Thousands of Innocent People.” Ars technica, Accessed on 1 March 2021. https://arstechnica.com/information-technology/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/.
- Heath, J. 2006. “The RT10 Initiative Overview.” Accessed on 28 May 2021. https://search.edwardsnowden.com/docs/RT10InitiativeOverview2018-01-19_nsadocs_snowden_doc.
- Heller, K. J. 2013. “’One Hell of a Killing Machine’: Signature Strikes and International Law.” Journal of International Criminal Justice 11 (1): 89–119. doi:10.1093/jicj/mqs093.
- Henckaerts, J. -M., and L. Doswald-Beck. 2005. Customary International Humanitarian Law volume 1: Rules. Cambridge: Cambridge University Press.
- Hildebrandt, M., and K. de Vries, edited by. 2013. Privacy, Due Process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology. New York: Routledge.
- Hogue, S. 2021. Project Maven, Big Data, and Ubiquitous Knowledge: The Impossible Promises and Hidden Politics of Algorithmic Security Vision. In A. Završnik and V. Badalič. Automating Crime Prevention, Surveillance, and Military Operations (203–221). Springer, Cham.
- Ilachinski, A. 2017. “Artificial Intelligence and Autonomy: Opportunities and Challenges.” Arlington: Center for Naval Analyses. Accessed on 24 May 2021. https://apps.dtic.mil/sti/pdfs/AD1041749.pdf.
- The Intercept. 2015a. “SKYNET: Applying Advanced Cloud-Based Behavior Analytics.” Accessed on 14 May 2021. https://theintercept.com/document/2015/05/08/skynet-applying-advanced-cloud-based-behavior-analytics/.
- The Intercept. 2015b. “SKYNET: Courier Detection via Machine Learning.” Accessed on 14 May 2021. https://theintercept.com/document/2015/05/08/skynet-courier/.
- Ipsen, K. 2008. “Combatants and non-combatants.” In The Handbook of International Humanitarian Law, edited by D. Fleck. 2nd ed., 301–331. Oxford: Oxford University Press.
- Jensen, B. M., C. Whyte, and S. Cuomo. 2020. “Algorithms at War: The Promise, Peril, and Limits of Artificial Intelligence.” International Studies Review 22 (3): 526–550. doi:10.1093/isr/viz025.
- Jonas, J., and J. Harper. 2006. Effective Counterterrorism and the Limited Role of Predictive Data Mining. Washington, DC: Cato Institute.
- Kasher, A. 2007. “The Principle of Distinction.” Journal of Military Ethics 6 (2): 152–167. doi:10.1080/15027570701436841.
- Kerr, I. 2013. “Prediction, Pre-Emption, Presumption: The Path of Law After the Computational Turn.” In Privacy, Due Process and the Computational Turn, edited by Hildebrandt, M., and de Vries, K., 105–134. New York: Routledge.
- Kleffner, J. K. 2007. “FROM ‘Belligerents’ to ‘Fighters’ and Civilians Directly Participating in Hostilities – on the Principle of Distinction in Non-International Armed Conflicts One Hundred Years After the Second Hague Peace Conference.” Netherlands International Law Review 54 (02): 315–336. doi:10.1017/S0165070X07003154.
- Leese, M. 2014. “The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union.“Security Dialogue, 45 (5): 494–511. doi:10.1177/0967010614544204.
- Lehr, D., and P. Ohm. 2017. “Playing with the Data: What Legal Scholars Should Learn About Machine Learning.” UC Davis Law Review 51: 653–717.
- Lele, A. 2018. Disruptive Technologies for the Militaries and Security. Singapore: Springer.
- L’Heureux, A., K. Grolinger, H. F. El Yamany, and M. A. Capretz. 2017. “Machine Learning with Big Data: Challenges and Approaches.” IEEE Access 5: 7776–7797. doi:10.1109/ACCESS.2017.2696365.
- Lindekilde, L., F. O’Connor, and B. Schuurman. 2019. “Radicalization Patterns and Modes of Attack Planning and Preparation Among Lone-Actor Terrorists: An Exploratory Analysis.” Behavioral Sciences of Terrorism and Political Aggression 11 (2): 113–133. doi:10.1080/19434472.2017.1407814.
- McKendrick, K. 2019. Artificial Intelligence Prediction and Counterterrorism. Research paper, The Royal Institute of International Affairs, Chatham House.
- Medina, R. M. 2014. “Social Network Analysis: A Case Study of the Islamist Terrorist Network.” Security Journal 27 (1): 97–121. doi:10.1057/sj.2012.21.
- Melzer, N. 2008. Targeted Killing in International Law. Oxford: Oxford University Press.
- Melzer, N. 2009. Interpretive Guidance on the Notion of Direct Participation in Hostilities Under International Humanitarian Law. Geneva: International Committee of the Red Cross. https://www.icrc.org/en/doc/assets/files/other/icrc-002-0990.pdf.
- Melzer, N., and G. Gaggioli Gasteyger (2015) Conceptual Distinction and Overlaps Between Law Enforcement and the Conduct of Hostilities. In T. D. Gill. and F. Fleck The Handbook of the International Law of Military Operations. Oxford: Oxford University Press. 63–92.
- Moltke, H. 2019, May 29. “Mission Creep: How the Nsa’s Game-Changing Targeting System Built for Iraq and Afghanistan Ended Up on the Mexico Border.” The Intercept, Accessed on 4 may 2021. https://theintercept.com/2019/05/29/nsa-data-afghanistan-iraq-mexico-border/.
- Nakashima, E., and J. Warrick. 2013, July 14. “For NSA Chief, Terrorist Threat Drives Passion to “Collect It All”.” Washington Post, Accessed on 14 May 2013. https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html.
- Naughton, J. 2016, February 21. “Death by Drone Strike, Dished Out by Algorithm.” The Guardian, Accessed 29 April 2020. https://www.theguardian.com/commentisfree/2016/feb/21/death-from-above-nia-csa-skynet-algorithm-drones-pakistan.
- Naylor, S. 2015. Relentless Strike: The Secret History of Joint Special Operations Command. New York: St. Martin’s Griffin.
- Niva, S. 2013. “Disappearing Violence: JSOC and the Pentagon’s New Cartography of Networked Warfare.” Security Dialogue 44 (3): 185–202. Accessed on 25 may 2021. doi:10.1177/0967010613485869.
- Official Records of the Diplomatic Conference on the Reaffirmation and Development of International Humanitarian Law Applicable in Armed Conflicts (1974 -1977) Volume XV. https://www.loc.gov/rr/frd/Military_Law/pdf/RC-records_Vol-15.pdf.
- Penney, J. W. 2016. “Chilling Effects: Online Surveillance and Wikipedia Use.” Berkeley Technology Law Journal 31 (1): 117–182.
- Perugini, N., and N. Gordon. 2017. “Distinction and the Ethics of Violence: On the Legal Construction of Liminal Subjects and Spaces.” Antipode 49 (5): 1385–1405. doi:10.1111/anti.12343.
- Porter, G. 2011, September 11. “How McChrystal and Petraeus Built an Indiscriminate ‘Killing Machine’.” Truthout, Accessed 17 August 2020. http://www.truth-out.org/news/item/3588:how-mcchrystal-and-petraeus-built-an-indiscriminate-killing-machine.
- Priest, D., and W. M. Arkin. 2011. Top Secret America: The Rise of the New American Security State. New York: Back Bay Books.
- Pugliese, J. 2013. State Violence and the Execution of Law: Biopolitical Caesurae of Torture, Black Sites, Drones. New York: Routledge.
- Robbins, M. 2016, February 18. “Has a Rampaging AI Algorithm Really Killed Thousands in Pakistan?” The Guardian, Accessed on 27 May 2021. https://www.theguardian.com/science/the-lay-scientist/2016/feb/18/has-a-rampaging-ai-algorithm-really-killed-thousands-in-pakistan.
- Rosenzweig, P. 2010. “Privacy and Counter-Terrorism: The Pervasiveness of Data.” Case Western Reserve Journal of International Law 42 (3): 625–646. https://scholarlycommons.law.case.edu/jil/vol42/iss3/6.
- Sandoz, Y., C. Swinarski, and B. Zimmerman, edited by. 1987. Commentary on the Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I). Geneva: International Committee of the Red Cross, Martinus Nijhoff Publishers.
- Sassòli, M. 2019. International Humanitarian Law: Rules, Controversies, and Solutions to Problems Arising in Warfare. Cheltenham: Edward Elgar Publishing.
- Scahill, J. 2016. The Assassination Complex: Inside the Government’s Secret Drone Warfare Program. New York: Simon & Schuster.
- Scharre, P. 2016. Autonomous Weapons and Operational Risk: Ethical Autonomy Project. Washington, D.C: Center for a New American Security.
- Scharre, P. 2019. “Military Applications of Artificial Intelligence: Potential Risks to International Peace and Security.” In The Militarization of Artificial Intelligence August. New York: United Nations. Accessed on 20 May 2021. https://reliefweb.int/sites/reliefweb.int/files/resources/TheMilitarization-ArtificialIntelligence.pdf
- Schmitt, M. N., and E. Widmar. 2016. “The Law of Targeting.” In Targeting: The Challenges of Modern Warfare, edited by Ducheine, Paul A. L., Schmitt, M. N., and Osinga, Frans P. B., 121–145. The Hague: Asser Press.
- Schneier, B. 2006, March 9. “Why Data Mining Won’t Stop Terror.” Wired, Accessed on 11 June 2021. https://www.wired.com/2006/03/why-data-mining-wont-stop-terror/.
- Solis, G. D. 2010. The Law of Armed Conflict: International Humanitarian Law in War. Cambridge: Cambridge University Press.
- Soltani, A., and B. Gellman. 2013, December 2013. “New Documents Show How the NSA Infers Relationships Based on Mobile Location Data.” The Washington Post, https://www.washingtonpost.com/news/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/#whitepaper.
- Stoycheff, E. 2016. “Under Surveillance: Examining Facebook’s Spiral of Silence Effects in the Wake of NSA Internet Monitoring.” Journalism & Mass Communication Quarterly 93 (2): 296–311. doi:10.1177/1077699016630255.
- Suchman, L. 2020. “Algorithmic Warfare and the Reinvention of Accuracy.” Critical Studies on Security 8 (2): 175–187. doi:10.1080/21624887.2020.1760587.
- US Government. 2018, March 28. “Humanitarian Benefits of Emerging Technologies in the Area of Lethal Autonomous Weapons. Group of Governmental Experts of the High Contracting Parties to the Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects.” CCW/GGE.1/2018/WP.4, Accessed on 23. April 2020. https://unog.ch/80256EDD006B8954/httpAssets/7C177AE5BC10B588C125825F004B06BE/$file/CCW_GGE.1_2018_WP.4.pdf.
- Van Linschoten, A. S., and F. Kuehn. 2011. “A knock at the door: 22 months of ISAF press releases”. Kabul: Afghanistan Analyst Network. Accessed on 28 May 2021. http://www.afghanistan-analysts.org/wp-content/uploads/downloads/2012/10/AAN_2011_ISAFPressReleases.pdf.
- Verhelst, H. M., A. W. Stannat, and G. Mecacci. 2020. “Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.” Science and Engineering Ethics 26: 2975–2984. doi:10.1007/s11948-020-00254-w.
- Vestner, T. and Rossi, A. 2021. “Legal Reviews of War Algorithms.“ International Law Studies 97: 509–555. ISSN: . https://digital-commons.usnwc.edu/ils/vol97/iss1/26/.
- Weber, J. 2016. “Keep Adding. On Kill Lists, Drone Warfare and the Politics of Databases.” Environment and Planning D, Society & Space 34 (1): 107–125. doi:10.1177/0263775815623537.
- Weiskopf, R. and Hansen, H. Kause. 2022. “Algorithmic governmentality and the space of ethics: Examples from ‘People Analytics’.“ Human Relations 001872672210753. doi:10.1177/00187267221075346.
- Wilcox, L. 2017. “Embodying Algorithmic War: Gender, Race, and the Posthuman in Drone Warfare.” Security Dialogue 48 (1): 11–28. doi:10.1177/0967010616657947.
- Wilke, C. 2017. “Seeing and Unmaking Civilians in Afghanistan.“ Science, Technology, & Human Values 42 (6): 1031–1060. doi:10.1177/0162243917703463.
- Zuiderveen Borgesius, F. J. 2020. “Strengthening Legal Protection Against Discrimination by Algorithms and Artificial Intelligence.” The International Journal of Human Rights 24 (10): 1572–1593. doi:10.1080/13642987.2020.1743976.