»Eine sorgfältig konstruierte Maschine der Gewalt«

Über algorithmische Kriegsführung, abduktive Mutmaßungen und automatisiertes »Völkerrecht«

Autor/innen

  • Jutta Weber

DOI:

https://doi.org/10.32387/prokla.v54i217.2144

Schlagworte:

Epistemologie, Künstliche Intelligenz, Krieg, Zielfindungssysteme

Abstract

Die generelle Entwicklung und der Einsatz von militärischer »Data Science« bzw. Künstlicher Intelligenz (KI) und ihre Konsequenzen wurden lange vernachlässigt zugunsten einer Betrachtung der Probleme autonomer Waffensysteme, ihrer möglichen Regulation und der Bedeutung einer »Meaningful Human Control«. Anschließend an frühere Arbeiten diskutiere ich die Entwicklung, Architektur, die epistemische Logik und Materialität algorithmischer Kriegsführung sowie die Konsequenzen des Einsatzes fortgeschrittener KI-gestützter Entscheidungs-, Ziel- und Tötungssysteme am Beispiel des US-amerikanischen »War on Terror« und des Gazakrieges. Ich analysiere die epistemologischen und ontologischen Prämissen algorithmischer Kriegsführung und die soziotechnischen Implikationen dieser Mensch-Maschinen-Gefüge.

Downloads

Keine Nutzungsdaten vorhanden.

Literaturhinweise

Abraham, Yuval (2023): ›A mass assassination factory‹: Inside Israel’s calculated bombing of Gaza (30.11.2023). In: +972Magazine (in partnership with LocalCall). URL: https://www.972mag.com/mass-assassination-factory-israel-calculated-bombing-gaza/, Zugriff: 2.9.2024.

– (2024a): ›Lavender‹: The AI machine directing Israel’s bombing spree in Gaza (3.4.2024). URL: https://www.972mag.com/lavender-ai-israeli-army-gaza/, Zugriff: 2.9.2024.

– (2024b): ›Order from Amazon‹: How tech giants are storing mass data for Israel’s war (4.8.2024). URL: https://www.972mag.com/cloud-israeli-army-gaza-amazon-google-microsoft/, Zugriff: 2.9.2024.

Ackerman, Spencer (2022): Joe Biden’s Disposition Matrix (31.10.2022). URL: https://www.forever-wars.com/joe-bidens-disposition-matrix-extrajudicial-drone-murder/, Zugriff: 2.9.2024.

Agree, Philip (1994): Surveillance and Capture: Two Models of Privacy. In: The Information Society 10: 101-127. DOI: https://doi.org/10.1080/01972243.1994.9960162.

Amoore, Louise (2009): Algorithmic war: everyday geographies of the war on terror. In: Antipode: A Radical Journal of Geography 41(1): 49-69. DOI: https://doi.org/10.1111/j.1467-8330.2008.00655.x.

– (2013): The Politics of Possibility: Risk and Security Beyond Probability. Duke University Press.

Aradau, Claudia / Van Munster, Rens (2007): Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future. European Journal of International Relations 13(1): 89-115. DOI: https://doi.org/10.1177/1354066107074290.

Arquilla, John / Ronfeldt, David (2001): Die Entstehung des Netzkriegs (Revisited). In: Netzwerke und Netzkriege: Die Zukunft von Terror, Kriminalität und Militanz. 1-25.

Bamford, James (2024): How US Intelligence and an American Company feed Israel’s Killing Machine in Gaza (12.4.2024). URL: https://www.thenation.com/article/world/nsa-palantir-israel-gaza-ai/, Zugriff: 2.9.2024.

Belcher, Oliver (2013): The Afterlives of Counterinsurgency: Postcolonialism, Military Social Science, and Afghanistan 2006-2012. Dissertation, University of British Columbia. Vancouver.

Bhuta, Nehal u.a. (2016): Autonomous Weapon Systems. Law, Ethics, Policy. Cambridge: Cambridge University Press.

Brumfiel, Geoff (2023): Israel is using an AI system to find targets in Gaza. Experts say it’s just the start (14.12.2023).URL: https://www.npr.org/2023/12/14/1218643254/israel-is-using-an-ai-system-to-find-targets-in-gaza-experts-say-its-just-the-st, Zugriff: 2.9.2024.

Cauchi, E.D. / Tyab, Imtiaz (2023): U.S. terrorist watchlist grows to 2 million people — nearly doubling in 6 years (14.12.2023). URL: https://www.cbsnews.com/news/us-terrorist-watchlist-grows/, Zugriff: 2.9.2024.

Cebrowski, Arthur K. / Garstka, John J. (1998): Netzzentrierte Kriegsführung: Ursprung und Zukunft. In: US Naval Institute Proceedings 124(1): 28-35.

Davies, Harry / McKernan, Bethan / Sabbagh, Dan (2024): ›The Gospel‹: how Israel uses AI to select bombing targets in Gaza (1.12.2023). URL: https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets, Zugriff: 2.9.2024.

Deleuze, Gilles (1993 [1991]): Postskriptum über die Kontrollgesellschaften. In: Unterhandlungen. 1972–1990. Frankfurt/M.: 254-260.

Edwards, Paul (1996): The Closed World: Computers and the Politics of Discourse in Cold War America. In: Inside Technology. Cambridge, MA. DOI: https://doi.org/10.7551/mitpress/1871.001.0001.

González, Roberto J. (2015): Seeing into Hearts and Minds. Part 2. ›Big Data‹, Algorithms and Computational Counterinsurgency. In: Anthropology Today 31(4): 13-18. DOI: https://doi.org/10.1111/1467-8322.12188.

Grabenhorst, Susanne u.a. (2024): »The Myth of Targeted Killing«: Against the Rationalization of War (9.5.2024). URL: https://berlinergazette.de/against-the-rationalization-of-war/, Zugriff: 2.9.2024.

Graham, Stephen (2011): Cities under Siege: The New Military Urbanism. London. DOI: https://doi.org/10.1002/9781444395105.ch11.

Gregory, Derek (2011): Lines of descent (8.11.2011). URL: https://www.opendemocracy.net/en/lines-of-descent/, Zugriff: 2.9.2024.

Grothoff, Christian / Porup, J. M. (2016): The NSA’s SKYNET Program May Be Killing Thousands of Innocent People (16.2.2026). URL: https://arstechnica.com/information-technology/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/, Zugriff: 29.12.2020.

Hildebrandt, Mireille / Gutwirth, Serge (Hg.) (2008): Profiling the European Citizen. Cross Disciplinary Perspectives. Berlin. DOI: https://doi.org/10.1007/978-1-4020-6914-7.

Hoijtink, Marijn (2022): ›Prototype warfare‹: Innovation, optimisation, and the experimental way of warfare. In: European Journal of International Security 7(3): 322-336. DOI: https://doi.org/10.1017/eis.2022.12.

ICRC (International Committee of the Red Cross) (2016): Views of the ICRC on autonomous weapon systems (11.4.2017). URL: https://www.icrc.org/en/document/views-icrc-autonomous-weapon-system, Zugriff: 2.9.2024.

IDF (2024): Israel Defence Forces’ response to claims about use of ›Lavender‹ AI database in Gaza (3.4.2024). URL: https://www.theguardian.com/world/2024/apr/03/israel-defence-forces-response-to-claims-about-use-of-lavender-ai-database-in-gaza, Zugriff: 2.9.2024.

Joint War?ghting Center (2011): Joint Doctrine Support Division. Commander’s Handbook for Attack the Network. Version 1.0. Su?olk; Virginia (20.052011). URL: www.dtic.mil/doctrine/doctrine/jwfc/atn_hbk.pdf, Zugriff: 2.9.2024.

Kitchin, Rob (2014): The Data Revolution. Big Data, Open Data, Data Infrastructures & Their Consequences. Los Angeles. DOI: https://doi.org/10.4135/9781473909472.

Lawton, Joel (2016): Intelligence Planning and Methods Employed: Operation Red Dawn – The Capture of Saddam Hussein (16.3.2016). URL: https://smallwarsjournal.com/jrnl/art/intelligence-planning-and-methods-employed-operation-red-dawn-the-capture-of-saddam-hussein, Zugriff: 2.9.2024.

Marischka, Christoph (2024): AI-based Targeting – The Case of Gaza. Paper presented at the Pre-Conference Workshop »Imaginations of Autonomy: On Humans, AI-Based Weapon Systems and Responsibility at Machine Speed« (22.5.2024). URL: https://www.imi-online.de/2024/06/13/ai-based-targeting-the-case-of-gaza/, Zugriff: 2.9.2024.

Mayer, Katja / Weber, Jutta (2021): From Optimizing Military Operations to Targeting Terrorist Networks: Social Network Analysis in Data- Driven Warfare. In: Burkhardt, Marcus / Shnayien, Mary / Grashöfer, Katja (Hg.): Explorations in Digital Cultures. Lüneburg.

Reed, Brian J. / David R. Segal (2006): Social Network Analysis and Counterinsurgency Operations: The Capture of Saddam Hussein. In: Sociological Focus 39(4): 251-64. DOI: https://doi.org/10.1080/00380237.2006.10571288.

Reichborn-Kjunnerud, Erik (2025): The Worlds According to Military Targeting. Martial Epistemologies and Ecologies of Operation (im Erscheinen).

Ressler, Steve (2006): Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research. In: Homeland Security A?airs 2(2): 1-10.

Roff Heather M. / Moyes, Richard (2016): Meaningful Human Control, Artificial Intelligence and Autonomous Weapons. Briefing paper for delegates at the Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS). URL: https://article36.org/wp-content/uploads/2016/04/MHC-AI-and-AWS-FINAL.pdf, Zugriff: 7.10.2024.

Sageman, Marc (2004): Understanding Terrorist Networks. Philadelphia. DOI: https://doi.org/10.9783/9780812206791.

Scharre, Paul (2018): Army of None: Autonomous Weapons and the Future of War. London.

Schmid, Alex (2011): The De?nition of Terrorism. In: Ders. (Hg.): The Routledge Handbook of Terrorism Research. Abingdon, Virginia: 39-99. DOI: https://doi.org/10.4324/9780203828731.

Schneier, Bruce (2006): Data Mining for Terrorists (9.3.2006). URL: https://www.schneier.com/blog/archives/2006/03/data_mining_for.html, Zugriff: 2.9.2024.

SPD / Bündnis 90/Die Grünen / FDP (2021): [Koalitionsvertrag zwischen SPD, Bündnis 90/Die Grünen und FDP:] Mehr Fortschritt wagen (7.12.2021). URL: https://www.spd.de/fileadmin/Dokumente/Koalitionsvertrag/Koalitionsvertrag_2021-2025.pdf, Zugriff: 2.9.2024.

Shaw, Ian / Akhter, Majed (2014): The Dronification of State Violence. In: Critical Asian Studies 46(2): 211-234. DOI: https://doi.org/10.1080/14672715.2014.898452.

Streeruwitz, Marlene (2022): Handbuch gegen den Krieg. Wien 2022.

Suchman, Lucy / Weber, Jutta (2016): Human-Machine Autonomies. In: Bhuta, Nehal u.a. (Hg.): Autonomous Weapon Systems. Law, Ethics, Policy. Cambridge: 75-102.

Suchman, Lucy (2024): The Algorithmically Accelerated Killing Machine (24.1.2024). URL: https://ainowinstitute.org/publication/the-algorithmically-accelerated-killing-machine, Zugriff: 2.9.2024.

Sylvia, Noah (2024): Israel?s Targeting AI: How Capable is It? (8.2.2024). URL: https://www.rusi.org/explore-our-research/publications/commentary/israels-targeting-ai-how-capable-it, Zugriff: 2.9.2024.

Tambini, Anthony J (2007): Wiring Vietnam: The Electronic Wall. Lanham.

US Army / US Navy (2006): Counterinsurgency Field Manual. US Army and Marine Corps.

Weber, Jutta (2014): Wild Cards. Imagination als Katastrophenprävention. In: Zeitschrift für Kulturwissenschaft 8(2): 81-95. DOI: https://doi.org/10.14361/zfk-2014-0208.

– (2016): Keep adding. On kill lists, drone warfare and the politics of databases. In: Environment and Planning D: Society and Space 34(1): 107-125. DOI: https://doi.org/10.1177/0263775815623537.

– (2024): Autonomous Drone Swarms and the Contested Imaginaries of Artificial Intelligence. In: Digital War 5: 146-149. DOI: https://doi.org/10.1057/s42984-023-00076-7.

Whittaker, Meredith (2024): Das KI-Märchen (12.6.2024). URL: https://www.zeit.de/digital/2024-05/kuenstliche-intelligenz-meredith-whittaker-fortschritt-ueberwachung, Zugriff: 2.9.2024.

Veröffentlicht

2024-12-11

Zitationsvorschlag

Weber, J. (2024). »Eine sorgfältig konstruierte Maschine der Gewalt«: Über algorithmische Kriegsführung, abduktive Mutmaßungen und automatisiertes »Völkerrecht«. PROKLA. Zeitschrift für Kritische Sozialwissenschaft, 54(217), 609–625. https://doi.org/10.32387/prokla.v54i217.2144