Tracking and Targeting

This introduction to the special issue of the same title sets out the context for a critical examination of contemporary developments in sociotechnical systems deployed in the name of security. Our focus is on technologies of tracking, with their claims to enable the identification of those who comprise legitimate targets for the use of violent force. Taking these claims as deeply problematic, we join a growing body of scholarship on the technopolitical logics that underpin an increasingly violent landscape of institutions, infrastructures, and actions, promising protection to some but arguably contributing to our collective insecurity. We examine the asymmetric distributions of sociotechnologies of (in)security; their deadly and injurious effects; and the legal, ethical, and moral questions that haunt their operations.

[1]  Michael Lynch,et al.  Discipline and the Material Form of Images: An Analysis of Scientific Visibility , 1985 .

[2]  C. Wright Representing and Intervening , 1985 .

[3]  Carol Cohn,et al.  Sex and Death in the Rational World of Defense Intellectuals , 1987, Signs: Journal of Women in Culture and Society.

[4]  Mary Elizabeth Lynch,et al.  The externalized retina: Selection and mathematization in the visual documentation of objects in the life sciences , 1988 .

[5]  Donna Harawy Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective , 2022, Philosophical Literary Journal Logos.

[6]  S. Woolgar,et al.  Representation in Scientific Practice , 1990 .

[7]  David H. DeVorkin,et al.  Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance , 1990 .

[8]  Scott D. Sagan,et al.  Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance, Donald MacKenzie, 1990. The MIT Press, Cambridge, MA. 500 pages. ISBN: 0-262-13258-3. $29.95 , 1990 .

[9]  B. Asher The Professional Vision , 1994 .

[10]  N. Thrift Environment and Planning D: Society and Space , 1995 .

[11]  Simulating the Unthinkable , 2000 .

[12]  J. R. Griffin,et al.  The Closed World: Computers and the Politics of Discourse in Cold War America , 2000 .

[13]  The Invention of the Passport: Surveillance, Citizenship and the State.By John Torpey. Cambridge: Cambridge University Press, 2000. Pp. xii+211. $59.95 (cloth); $22.95 (paper). , 2001 .

[14]  Chalmers A. Johnson American Militarism and Blowback: The Costs of Letting the Pentagon Dominate Foreign Policy , 2002 .

[15]  Technology and Security: Governing Threats in the New Millennium , 2007 .

[16]  Brian Rappert Technology and Security , 2007 .

[17]  H. Gusterson Anthropology and Militarism , 2007 .

[18]  John Stone,et al.  Science, Technology and the Military: Priorities, Preoccupations and Possibilities , 2008 .

[19]  Claudia Aradau,et al.  Security, Technologies of Risk, and the Political: Guest Editors' Introduction , 2008 .

[20]  NeoConOpticon: The EU Security-Industrial Complex , 2009 .

[21]  J. Butler Frames of War: When Is Life Grievable? , 2009 .

[22]  Sean Lawson Surfing on the edge of chaos: Nonlinear science and the emergence of a doctrine of preventive war in the US , 2011 .

[23]  D. Gregory The everywhere war , 2011 .

[24]  D. Gregory From a View to a Kill , 2011 .

[25]  R. Andersson Illegality, Inc.: Clandestine Migration and the Business of Bordering Europe , 2012 .

[26]  Grégoire Chamayou Manhunts: A Philosophical History , 2012 .

[27]  Rachel Plotnick Predicting push-button warfare: US print media and conflict from a distance, 1945–2010 , 2012 .

[28]  Hedvig Ördén,et al.  Cities under siege: the new military urbanism , 2013 .

[29]  N. N. Sørensen,et al.  The Migration Industry and the Commercialization of International Migration , 2013 .

[30]  Anthropology and Militarism , 2013 .

[31]  Banu Bargu Human shields , 2013, Contemporary Political Theory.

[32]  Louise Amoore,et al.  The Politics of Possibility: Risk and Security Beyond Probability , 2013 .

[33]  Janet Vertesi,et al.  Representation in Scientific Practice Revisited , 2014 .

[34]  D. Bigo The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts , 2014 .

[35]  Joseph Masco The Theater of Operations: National Security Affect from the Cold War to the War on Terror , 2014 .

[36]  D. Skinner,et al.  Topologies of Race , 2014 .

[37]  Natasha Myers,et al.  Rendering Life Molecular: Models, Modelers, and Excitable Matter , 2015 .

[38]  J. Lloyd,et al.  A Theory of the Drone , 2015 .

[39]  Armin Krishnan,et al.  Mass Surveillance, Drones, and Unconventional Warfare , 2015 .

[40]  Masco, Joseph, The Theatre of Operations: National Security Affect from the Cold War to the War on Terror , 2015 .

[41]  F. Al-Shamali,et al.  Author Biographies. , 2015, Journal of social work in disability & rehabilitation.

[42]  We Kill Because We Can: From Soldiering to Assassination in the Drone Age , 2016 .

[43]  M. Selgelid The Value of Security , 2016 .

[44]  Jutta Weber,et al.  Keep adding. On kill lists, drone warfare and the politics of databases , 2016 .

[45]  Corey Johnson,et al.  Border militarisation and the re-articulation of sovereignty , 2016 .

[46]  Lucy Suchman,et al.  Configuring the Other: Sensing War through Immersive Simulation , 2016 .

[47]  Jon R. Lindsay,et al.  Target Practice , 2017 .

[48]  Targets in the Cloud , 2017 .

[49]  Neve Gordon,et al.  Distinction and the ethics of violence: On the legal construction of liminal subjects and spaces , 2017 .

[50]  E. Carmel Re-interpreting knowledge, expertise and EU governance: The cases of social policy and security research policy , 2017 .

[51]  Sabina Leonelli,et al.  Data Shadows , 2017 .

[52]  C. Wilke Seeing and Unmaking Civilians in Afghanistan , 2017 .

[53]  Dirty Dancing: Drones and Death in the Borderlands , 2017 .

[54]  Data Friction: , 2019, Mapping Landscapes in Transformation.