Securing with algorithms: Knowledge, decision, sovereignty

Amid the deployment of algorithmic techniques for security – from the gathering of intelligence data to the proliferation of smart borders and predictive policing – what are the political and ethical stakes involved in securing with algorithms? Taking seriously the generative and world-making capacities of contemporary algorithms, this special issue draws attention to the embodied actions of algorithms as they extend cognition, agency and responsibility beyond the conventional sites of the human, the state and sovereignty. Though focusing on different modes of algorithmic security, each of the contributions to the special issue shares a concern with what it means to claim security on the terrain of incalculable and uncertain futures. To secure with algorithms is to reorient the embodied relation to uncertainty, so that human and non-human cognitive beings experimentally generate and learn what to bring to the surface of attention for a security action.

[1]  Priya Dixit Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .

[2]  Claudia Aradau Making Things International 2: Catalysts and Reactions , 2016 .

[3]  M. Cooper Life as Surplus: Biotechnology and Capitalism in the Neoliberal Era , 2008 .

[4]  G. Sullivan,et al.  The politics of security lists , 2016 .

[5]  Rebecca Lemov Database of Dreams: The Lost Quest to Catalog Humanity , 2015 .

[6]  L. Parisi Contagious Architecture: Computation, Aesthetics, and Space , 2013 .

[7]  Luke Harding,et al.  The Snowden Files: The Inside Story of the World's Most Wanted Man , 2014 .

[8]  Donna Harawy Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective , 2022, Philosophical Literary Journal Logos.

[9]  Louise Amoore Cloud geographies , 2018, Cognitive Code.

[10]  K. Crawford,et al.  Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms , 2013 .

[11]  Andrew Hoskins,et al.  How we think: digital media and contemporary technogenesis , 2014 .

[12]  Charlotte Heath-Kelly Algorithmic autoimmunity in the NHS: Radicalisation and the clinic , 2017 .

[13]  Ian R. Kerr,et al.  Robot Law , 2016 .

[14]  Ted Striphas Algorithmic culture , 2015 .

[15]  B. Anderson Preemption, precaution, preparedness: Anticipatory action and future geographies , 2010 .

[16]  Ian G.R. Shaw,et al.  Predator Empire: Drone Warfare and Full Spectrum Dominance , 2016 .

[17]  Lisa Parks,et al.  Drones, Vertical Mediation, and the Targeted Class , 2022, Feminist Studies.

[18]  Judy L. Klein,et al.  How Reason Almost Lost Its Mind: The Strange Career of Cold War Rationality , 2013 .

[19]  Mark B. Salter,et al.  Making Things International 2: Catalysts and Reactions , 2016 .

[20]  Glenn Greenwald,et al.  No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .

[21]  Pablo J. Boczkowski,et al.  The Relevance of Algorithms , 2013 .

[22]  Eric Gossett,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .

[23]  Silvia Mollicchi,et al.  Flatness versus depth: A study of algorithmically generated camouflage , 2017 .

[24]  Richard A. Grusin Premediation: Affect and Mediality After 9/11 , 2010 .

[25]  J. Tambling How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics by N. Katherine Hayles (review) , 2001, Modern Language Review.

[26]  M. Goede Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .

[27]  D. Gregory From a View to a Kill , 2011 .

[28]  Lauren Wilcox Embodying algorithmic war: Gender, race, and the posthuman in drone warfare , 2017 .

[29]  Jonathan Crary,et al.  24/7: Late Capitalism and the Ends of Sleep , 2013 .

[30]  Peter Galison The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision , 1994, Critical Inquiry.

[31]  S. Elden Secure the volume: Vertical geopolitics and the depth of power , 2013 .

[32]  Benjamin H. Bratton,et al.  The Stack: On Software and Sovereignty , 2016 .

[33]  P. W. Singer,et al.  Wired for War: The Robotics Revolution and Conflict in the 21st Century , 2009 .

[34]  Claudia Aradau,et al.  Politics of Catastrophe: Genealogies of the Unknown , 2011 .

[35]  Louise Amoore,et al.  The Politics of Possibility: Risk and Security Beyond Probability , 2013 .

[36]  Nick Lally,et al.  Crowdsourced surveillance and networked data , 2017 .

[37]  Andra Giurgiu,et al.  No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .

[38]  Viktor Mayer-Schnberger,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2013 .

[39]  Orit Halpern Beautiful Data: A History of Vision and Reason since 1945 , 2015 .

[40]  Stefan Elbe,et al.  Catching the flu: Syndromic surveillance, algorithmic governmentality and global health security , 2017 .