Security, Race, Biopower
eBook - ePub

Security, Race, Biopower

Essays on Technology and Corporeality

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Security, Race, Biopower

Essays on Technology and Corporeality

About this book

  

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Security, Race, Biopower by Holly Randell-Moon, Ryan Tippet, Holly Randell-Moon,Ryan Tippet in PDF and/or ePUB format, as well as other popular books in Biological Sciences & Biotechnology. We have over one million books available in our catalogue for you to explore.
Part I
Geocorpographies
To think about bodies—their capacities, vulnerabilities, corporealities—is to think about our experience of the world as grounded in bodily being. On this ground, our bodies are relational because they connect and collide inter-corporeally with other bodies, objects, and environments. Developed as a way of explaining how bodies are ‘geopolitically situated’ through ‘regimes of visuality’ (2007, p. 12), Joseph Pugliese’s notion of geocorpographies seeks to challenge the abstract logic that would render geography, politics, and movement across borders seemingly devoid of embodied experience and the processes that inscribe bodies with meaning and identity. The four chapters in this section examine the geographies of security and law as corporealised in drone warfare, medicine and pornography, the British monarchy, and airport surveillance.
Pugliese’s own chapter opens the book with a piercing account of the United States’ drone kill program in Pakistan and Yemen. How this program renders life killable is made plain in the stark jargon of military officials who use words like ‘data’, ‘content’, and ‘targets’ to describe these killings and lend scientific accuracy to the bloodshed unleashed by drone warfare. Pugliese counters this dispassionate scientism by coining the term bioinformationalisation of life to reintroduce the body and life back into the de-humanising, data-driven language that frames the deployment of drone technologies. Joshua Pocius’ chapter continues the focus on the transformation of bodies through scientific technologies in the context of antiretroviral medicines in the prevention of human immunodeficiency virus/ acquired immune deficiency syndrome (HIV/AIDS). The role of bodies, and the right kinds of bodies, in preserving Crown rule is the subject of Holly Randell-Moon’s Chap. 3. The section concludes with Sunshine Kamaloni’s experiential account of airports and racial profiling. In describing the quotidian encounters that take place between bodies in the airport, Kamaloni articulates how race underprops somatic visibility such that non-white bodies are isolated for being ‘out-of-place’ and hence subject to surveillance.
In their focus on the geographies of security and preservation that designate lives worth saving or letting die, the chapters engage differently with geocorporgraphies as critical praxis to account for the politics of embodied experience and spatial ordering. Pugliese considers the targets of drone kills fatally coextensive with their geocorpographies because their spatial location is read as evidence of their “suspect”, and hence killable, status. He extends the term to consider the geobiomorphology that occurs when the carnage of drone warfare renders the corporeality of humans, animals, and other objects, indistinguishable. Kamaloni likewise situates her own body as generative of and inscribed by geocorpograhies of race, space, and place. Pocius meanwhile, tracks the asymmetry of resources tied to the HIV/AIDS pandemic as determined by geocorpographies which also work to simultaneously render “viral” bodies a geocorpography. Randell-Moon suggests that Crown rule functions geocorpographically to situate particular bodies (Anglican, English) as necessary for the preservation of settler state sovereignty, which functions to obscure already existing Indigenous sovereign bodies and laws. The chapters each reveal, as per Pugliese’s original conception, that attempts to expunge the body—both literally and epistemologically—from its geographical location are saturated in the violence and power relations of race.
© The Author(s) 2016
Holly Randell-Moon and Ryan Tippet (eds.)Security, Race, Biopower10.1057/978-1-137-55408-6_1
Begin Abstract

1. Death by Metadata: The Bioinformationalisation of Life and the Transliteration of Algorithms to Flesh

Joseph Pugliese1
(1)
Department of Media, Music, Communication and Cultural Studies, Macquarie University, Sydney, NSW, Australia
I wish to thank Holly Randell-Moon for her invitation to contribute the keynote presentation, upon which this chapter is based, at the Space, Race, Bodies: Geocorpographies of City, Nation, Empire conference, 8–10 December 2014, Otago University, Dunedin, New Zealand. I am profoundly grateful to Constance Owen for her brilliant and enduring research assistance.
End Abstract
What are the effects of the increasing use of surveillance technologies in the conduct of contemporary wars? What are the relations of knowledge/power that undergird instrumentalising technologies that focalise life, transmute it into generic and anonymous data, and thereby render it killable through lethal militarised targeting? 1 Drawing on the revelations of Edward Snowden and two former drone operators, in this chapter I attempt to answer these questions by pursuing the lines of convergence between the United States’ Department of Defense (DoD) and the National Security Agency (NSA) in the conduct of the US’ drone kill program. In the first part of the chapter, I focus on new tracking technologies developed by the NSA that have been incorporated into the DoD’s drone targeting program. Specifically, I examine the interlocking of the NSA’s metadata with the DoD’s algorithmic formulae used to conduct drone kills in which often the identities of those killed are not known. In the latter part of the chapter, I situate what I will term the bioinformationalisation of life within the geocorpographies of Pakistan and Yemen in order to disclose the violent transliteration of abstract metadata to flesh.

Death by Metadata and the Bioinformationalisation of Life

In the course of a debate at Johns Hopkins University on the topic of the NSA’s bulk surveillance programs, Michael Hayden, former Central Intelligence Agency (CIA) and NSA director, confirmed NSA General Counsel Stewart Baker’s observation that ‘metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content’ (cited in Cole 2014). I want, presently, to discuss this notion of metadata as superseding the need for content but, at this juncture, I want to focus on Hayden’s comments. After remarking that Baker’s observation was ‘absolutely correct’, Hayden asserted: ‘We kill people based on metadata’ (cited in Cole 2014). As has been well documented, US drone operators rely on metadata in order to determine what targets to terminate on their kill lists. Furthermore, as was evidenced by documents released by Edward Snowden, ‘the agency analyzes metadata as well as mobile-tracking technology to determine targets, without employing human intelligence to confirm a suspect’s identity’ (RT 2014). An unnamed drone operator succinctly outlines this practice: ‘People get hung up that there’s a targeted list of people … It’s really like we’re targeting a cell phone. We’re not going after people—we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy’ (cited in RT 2014). Two things are operative in these collected remarks that are worth unpacking: that if you gather enough metadata, it will supplant the need for ‘content’; and that human targets, in the context of metadata-driven drone kills, become so somatechnically instrumentalised as to be entirely coextensive with the technology they use—in this case, their phones. This practice is further evidenced by a former drone operator who worked with Joint Special Operations Command. The former drone operator has disclosed the expansive and mobile dimensions of the NSA’s surveillance and tracking sweep:
the NSA doesn’t just locate the cell phones of terror suspects by intercepting communications from cell phone towers and Internet service providers. The agency also equips drones and other aircraft with devices known as ‘virtual base-tower transceivers’—creating, in effect, a fake cell phone tower that can force a targeted person’s device to lock onto the NSA’s receiver without their knowledge. That, in turn, allows the military to track the cell phone to within 30 feet of its actual location, feeding the real-time data to teams of drone operators who conduct missile strikes or facilitate night raids. (cited in Scahill and Greenwald 2014)
The NSA’s program deploys ‘advanced mathematics to develop a new geolocation algorithm intended for operational use on unmanned aerial vehicles (UAV) flights’ (Scahill and Greenwald 2014). The former drone operator has also revealed crucial details about the NSA’s use of the tracking program Geo Cell. Geo Cell identifies and ‘geolocates’ a tracked cell phone or SIM card without necessarily being able to determine who the person on the other end of the phone is:
‘Once the bomb lands or a night raid happens, you know that the phone is there,’ he says. ‘But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an unlawful enemy combatant … They might have been terrorists,’ he says. ‘Or they could have been family members who have nothing to do with the target’s activities … It’s really like we’re targeting a cell phone’. (cited in Scahill and Greenwald 2014)
The practice of killing by metadata underscores the intensification of what I will term the bioinformationalisation of life. Drawing upon a Heideggerian critique of contemporary science, the bioinformationalisation of life results from positivist science’s demand ‘that nature reports itself in some way or other that is identifiable through calculation and that it remains orderable as a system of information’ (Heidegger 1978, p. 304). The convergence of metadata systems and digitised identification systems exemplifies the rendering of life into an orderable system of information through the application of algorithmic formulae. Through processes of bioinformationalisation, life, in all of its forms, becomes transmuted into anonymous digital data that is trackable and that can be killed extrajudiciously, that is to say, with impunity. I say ‘anonymous’ precisely because the US often kills targets whose identities are not known. Geolocation technology, the DoD says, has ‘cued and compressed numerous “kill chains” (i.e., all of the steps taken to find, track, target, and engage the enemy)’ (Scahill and Greenwald 2014). The compression of the drone kill chain has been enabled by the often critical conflation of a cell phone with the unknown identity of the user—in the words of the above-cited drone operator, ‘We’re not going after people—we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.’
The investigative journalist, Jeremy Scahill, provides in his book, Dirty Wars (2013), a powerful exposé of the covert wars that the US is conducting through its drone campaign. He explains what is at stake in this drone targeting program: ‘In some cases, the specific individuals are being targeted, even though the United States doesn’t know their identities, and may not have any actual evidence that they’re involved in terrorist activity’ (cited in Channel 4 2014). Operating under the dubious rubric of exercising its right to self-defence in response to an imminent threat, the ‘US believes determining if a terrorist is an imminent threat “does not require the United States to have clear evidence that a specific attack on US persons and interest will take place in the immediate future”’ (Serle 2014). The category of ‘imminent threat’ is inbuilt with an extraordinary latitude in terms of the subjects it enables the US military to target. It has resulted in the deaths of innumerable subjects whose names are unknown and who, when they are finally identified, are found to have no connections at all to such targeted groups as al-Qaeda. In its analysis of 400 US drone strikes in Pakistan alone, the Bureau of Investigative Journalism found that ‘fewer than 4% of the people killed had been identified by available records as named members of al-Qaeda. This calls into question US Secretary of State John Kerry’s claim last year that only “confirmed terrorist targets at the highest levels were fired at”’ (Serle 2014). A recent report by Reprieve (2014) has brought to light that up to 874 ‘unknowns’ have been killed by US drone strikes in the hunt for 24 targeted individuals. The Reprieve report documents the extraordinary toll on civilians that has been exacted by these metadata drone kills. It estimates that ‘96.5% of casualties from US drone strikes are civilians’ (Dvorin 2014). Reprieve’s Jennifer Gibson, who led the study, elaborates on the meaning of these statistics: ‘Drone strikes have been sold to the American public on the claim that they’re “precise.” But they are only as precise as the intelligence that feeds them. There is nothing precise about the intelligence that results in the deaths of 28 unknown people, including women and children, for every “bad guy” the US goes after’ (cited in Khan 2014). The Reprieve report documents the manner in which certain targeted individuals have been listed as having been killed up to six times, with the result that dozens of unknown civilians have actually been killed by the time the reporting process authenticates a targeted strike.
The geolocation technology’s foundational dependence on an algorithmic formula provides a calculus of risk probability for a designated target whose identity remains unknown. In other words, this algorithmic program works to transmute difference into serial sameness and interchangeability. Knowledge, in this scientific schema, is what Friedrich Nietzsche would term as ‘the falsifying of the multifarious and incalculable into the identical, similar, and calculable’ (cited in Babich 1994, p. 102). What is operative here is the serial conflation of a technological signature with the unknown identity of the user of the cell phone. The knowledge of the one is rendered as interchangeable with the non-knowledge of the other. The contours of this convoluted scientific episte...

Table of contents

  1. Cover
  2. Frontmatter
  3. 1. Geocorpographies
  4. 2. Technologies
  5. 3. Biopolitics
  6. Backmatter