Abstract
Amid the deployment of algorithmic techniques for security â from the gathering of intelligence data to the proliferation of smart borders and predictive policing â what are the political and ethical stakes involved in securing with algorithms? Taking seriously the generative and world-making capacities of contemporary algorithms, this special issue draws attention to the embodied actions of algorithms as they extend cognition, agency and responsibility beyond the conventional sites of the human, the state and sovereignty. Though focusing on different modes of algorithmic security, each of the contributions to the special issue shares a concern with what it means to claim security on the terrain of incalculable and uncertain futures. To secure with algorithms is to reorient the embodied relation to uncertainty, so that human and non-human cognitive beings experimentally generate and learn what to bring to the surface of attention for a security action.
Introduction
In a world where data trails and pattern-of-life analyses of human beings are thought to yield new forms of knowledge and enable the detection of future threats, algorithms appear to afford a renewed potential for security. Algorithms â as both technical process and synecdoche for ever more complex and opaque socio-technical assemblages â imply new ways of knowing, even as their actual operations are increasingly inaccessible (Gillespie, 2016). Advances in task-based artificial intelligence, machine learning and neural network computation are radically reshaping practices of securitization and instituting new logics for the governing of populations. As Edward Snowdenâs disclosure of the analysis of bulk data by the US National Security Agency (NSA) and the UKâs Government Communications Headquarters (GCHQ) revealed, the sifting, sorting and triage of vast streams of digital data has become possible because of algorithmic techniques such as pattern recognition, n-gram modelling and distributed querying across cloud databases (Greenwald, 2014; Harding, 2014). From the real-time stream analysis of online text read by machine learning algorithms to the anomaly-detection algorithms for the discovery of incipient sentiment and human affects, algorithms hold the promise of extending the threshold of human perception and cognition. So, too, do algorithms attend upon, and emerge from, new practices and forms of archival curation, sovereignty, politics and security (Bratton, 2016; Lemov, 2015).
Notwithstanding the resurgence of interest in how algorithmic devices and systems transform the practice of security, however, some of the most fundamental questions remain scarcely addressed. What does it mean to claim to secure against uncertain events by means of algorithms? In what sense do contemporary algorithms change the nature of uncertainty and the capacity to act upon uncertain futures? Amid the apparent proliferation of algorithmic techniques in the gathering of intelligence data from battlefield, border and city streets, what are the political and ethical stakes involved in securing with, through and via algorithms in the 21st century? In one sense, the modern history of security is saturated with the methods and technologies of computation. The rise of 20th-century cybernetics, for example, lent to âCold War rationalityâ the âcrystalline definiteness, generality, and conclusiveness of the algorithmâ that could âcope with a world on the brinkâ (Erickson et al., 2013: 30). It was this sense of the âdefinitenessâ and stability of the algorithm in a world otherwise characterized by profound uncertainty that promised a capacity to secure against unknown futures. Deeply embedded within the international relations of the mid-20th century, then, was a particular science of statistical knowledge, probabilistic modelling, data systems and behaviour analysis (Galison, 1994; Hayles, 1999). Understood in these terms, international relations is bound historically with the development of algorithmic ways of calculating. If, as Orit Halpern (2015: 25) succinctly outlines, âcybernetics is a science of control or prediction of future events and actionsâ, then the practice of security has historically embraced a computational capacity to act decisively and procedurally in the face of radical uncertainty.
Understood as part of a longer genealogy of placing algorithmic routines at the service of war and security, then, the renewed contemporary interest in the politics of securing with algorithms does not take place at the point of some kind of epistemological break with past modalities. Rather, it reanimates and extends a longstanding intertwining of the practices and techniques of security with computational processes. Across the disciplines of international relations, sociology, media and cultural studies, human geography, law, security studies and political science, a key shared concern is the precise character of the 21st centuryâs relations bet. Responding to the spectres of the âsemi-supervisedâ targeting of the drone strike (Shaw, 2016; Gregory, 2011, Wilcox, 2017), the lethal decisions of autonomous weapons systems (Calo et al., 2016; Singer, 2009; Suchman and Weldes, 2016), and the anticipatory actions of âsmartâ borders, cities and predictive policing, scholars have focused on the technological systems, assemblages and ensembles of which algorithms are one element. Likewise, scholars interested in security practices have traced how algorithms devised in the domains of behavioural advertising, customer relations management, finance, insurance and recommendation systems have become mobile, travelling to new sites and assuming new forms of sovereign deployment.
However, the debates on algorithmic politics within security studies have to a certain extent been conducted in isolation from a longstanding and sustained body of research: feminist and posthuman analyses of science, technology and militarization (Haraway, 1988, 1997; Hayles, 1999, 2012; Braidotti, 2013; Parks, 2016). As a consequence of neglecting some of the most significant interventions on the question of the limitations of the category of the human, security studies risks falling short in the analysis of what it means to seek human security in our times. Particularly in the context of a security regime in which algorithmic procedures are corporeally enacted, critical security studies needs feminist epistemologies more than ever before. Though there has been extensive attention paid to the materiality and agency of the objects of security (Salter, 2016), there has been little attention to the question of how algorithms act in ways that are thoroughly embodied, even while they forget the person as such. âWhat embodiment securesâ, writes Katherine Hayles, is ânot the distinction between male and female or between humans who can think and machines which cannotâ, but rather that embodiment âmakes clear that thought is a much broader cognitive functionâ (Hayles, 1999: xiv). To draw attention to the embodied actions of algorithms, then, is precisely to reflect on how the already broad cognitive function of thought is distributed and extended through algorithms. As Lauren Wilcox writes in her contribution to this special issue, âI ask not to what extent drone warfare is embodied or disembodied, but rather, how bodies are corporealized in drone assemblagesâ (Wilcox, 2017: 15). Thus, the often dominant emphasis on the surveillant assemblage or âvertical geopoliticsâ of algorithmic technologies (Graham, 2016; Elden, 2013) â what Donna Haraway (1988: 581) has described as âvisualizing technologies without apparent limitâ â is juxtaposed with horizontal or âflattenedâ imaginaries that âdo not necessarily entail the view from aboveâ (Mollichi, 2017: 80). To secure with algorithms, then, is to reorient the embodied relation to uncertainty, so that human and non-human beings are constantly attuned to novel events and features in their data environment, becoming perennially creatively alert (Heath-Kelly, 2017).
This special issue of Security Dialogue is intended to develop and extend the existing debates on how algorithms transform security practice, proposing that there is more at stake than the application of algorithmic technologies to the domain of security. The contributors to this special issue, though they focus on a range of different modes of algorithmic security, do share a common concern with the specific contemporary rearticulation of what it means to claim security on the terrain of the incalculable or uncertain. Each of the contributions explores the algorithm as more than a technological or mathematical apparatus. Indeed, each of the articles explores algorithms as ways of visualizing, calculating, embodying, knowing or perceiving future events such that they may be acted upon in the present. Though to an extent this is familiar territory for those who have long studied the anticipatory techniques of preemptive or premediated security (Grusin, 2010; Amoore, 2013; De Goede, 2012; Aradau and Van Munster, 2011; Anderson, 2010; Uncertain Commons, 2013), here the embodied ontological form of the algorithm itself is the central focal point.
Encouraging a more active engagement with the humanities, where âconceptualization is intimately tied with implementation, design decisions have theoretical consequences, and algorithms embody reasoningâ (Hayles, 2012: 35), this special issue foregrounds precisely the matter of how the world to be known and secured is surfaced in and through the algorithm. As the following articles show, the conceptual and empirical encounters with algorithmic security necessarily involve new ways of reading signals, detecting disturbances and shaping action (Roberts and Elbe, this issue; Lally, this issue). In short, it is not merely that algorithms are applied as technological solutions to security problems, but that they filter, expand, flatten, reduce, dissipate and amplify what can be rendered of a world to be secured.
Data, knowledge, worlds
Though, as we have suggested, one could reasonably situate the birth of algorithmic security within a history of cybernetics, there can be little doubt that the post-9/11 world has provided the context for much of the research on algorithmic forms of security. However, the algorithms that were most widely connected to the desire to âconnect the dotsâ, to break the data silos and to act preemptively were of a specific type of rules-based and statistical-regression form. The algorithms available for data mining in 2001 were predominantly designed to identify patterns in a volume of transactions, so that rules could be generated for the detection of future events. Though such rules-based systems remain extraordinarily important in security practices â and they are depicted in this special issue in the form of classifiers and relevancy scores (Roberts and Elbe, 2017) â the exponential growth in the availability of so-called big data has accelerated the development of other non-rules-based forms of algorithm. The rise of big data has been accompanied by a new set of promises for how the world might be rendered securable. What Kenneth Cukier and Viktor Mayer-Schönberger (2013) describe as an increase in the volume, variety and velocity of data has held out the possibility for the analysis of unstructured or semi-structured data stored in NoSQL databases. This representation of data as synchronic, or âreal timeâ, notwithstanding its illusory and fragile nature (Crary, 2013), brings with it the imagination of a horizon of security in which the detection of new events can reject traditional statistical risk criteria and embrace emergent futures (Cooper, 2008). Moreover, the migration of data from drives and servers to cloud-based data centres opens up offshore data spaces that defy conventional territorial jurisdictions (Hu, 2015; Bratton, 2016). Put simply, the advances in non-rules-based machine learning algorithms are producing new forms of political authority. The algorithms authorize what or whom is surfaced for the attention of a security analyst who, in turn, cannot meaningfully access this process of authorizing and surfacing.
Algorithms increasingly have the capacity to analyse across different forms of data (images, text, video, audio) and across cloud-based spatial locations of data, as with the US intelligence agenciesâ âICITEâ cloud system (Amoore, 2016), which has been facilitated by the shift from rules-based to generative forms of algorithms. Where rules-based algorithmic security would conduct actions on all of the data patterns within the rules, deep machine learning-based systems will find, learn and apply new rules. As Luciana Parisi (2013: 2) writes, âit is not by chance that the age of the algorithm has also come to be recognized as an age characterized by forms of emergent behaviour that are determined by continual variation and uncertaintyâ. Understood in Parisiâs terms, the very problem space of security â human dwelling in relations of continual variation and uncertainty â actually underwrites the existence of algorithms that âderive rules from contingenciesâ (Parisi, 2013: 2), or indeed supplies the conditions they require to learn. Though rules-based algorithms do continue to be present in security practice, the historical significance of the increased use of generative machine learning algorithms cannot be overstated. The abductive logics of many of these families of algorithms contrast with deductive reasoning so that they are closer to experimental processes of learning and verifying through the available data. In the context of security, abductive and generative processes do not begin with a fixed set of criteria for threat or target, but instead they abductively generate the threats and targets via the recognition of patterns in vast volumes of data. In practice this means, for example, that the conventions of âblacklistingâ and security listing begin to generate an adaptive real-time list based on the extrapolation of patterns (De Goede and Sullivan, 2016), or that a social movement is censored in and via its social media activities (Gillespie, 2012), or that a drone targets data-based âsignature strikesâ (Wilcox, 2017: 15).
The contributions of this special issue address the generative capacities of algorithms to make worlds in and through data, and they do this in ways that animate the politics of algorithmic world-making. In her discussion of how the British National Health Service (NHS) works to identify possible future radicalized individuals, Charlotte Heath-Kelly traces how âinductive calculative methods from the digital realmâ (Heath-Kelly, 2017: 30) begin to be deployed in the broader profiling of vigilant NHS professionals. The profiles of who or what may be a threat are not accorded a set of criteria for judgement, but are generated and induced through a generalized âalertness to radicalisationâ (Heath-Kelly, 2017: 31). The inscription of racialized and prejudicial religious profiles thus begins to adopt a pattern-recognition style of reasoning and action. Similarly, as Nick Lally illustrates in his essay on crowdsourced surveillance, the âracist imaginaries of terrorismâ are written, in part, through âalgorithmic affordancesâ, so that algorithms are âa matter not only of watching the worldâ in a surveillant or observational form, but âalso of constructing worldsâ (Lally, 2017: 66, 67, 71). The material from which this world is constructed is increasingly offered up by open-source internet data, as suggested by Stephen Roberts and Stefan Elbe in their essay on a global syndromic surveillance regime tracking the movements of viruses and bacteria. The stream analysis of online indirect and open source data, as Roberts and Elbe explain, becomes a means of ârendering visible and intelligible future-facing knowledgeâ so that âsignals of unusual clusters of illnessesâ become readable and detectable (Roberts and Elbe, 2017: 47, 48). Algorithms, in other words, act on other algorithms, humans and non-human entities alike. Across the articles in the special issue, one can see how computational and algorithmic forms become embodied, material and everyday ways of enacting security, from identifying radicalization to the targeting of populations by drones. In her compelling argument on algorithmically generated camouflage, however, Silvia Mollichi sounds an important note of caution in the debates on anticipation and the making of actionable worlds. The art of military camouflage, as Mollichi elucidates for us, is âthe art of anticipating perceptionâ, though not to render the world legible but to work on âunreadabilityâ and âimpairing the capacity for making distinctionsâ (Mollichi, 2017: 81). Citing Orit Halpernâs (2015) account of the cybernetic reformulation of the visual apparatus, Mollichi vividly shows how algorithmically generated mimetic patterns are remaking the observer within the system of visualization.
Decision, responsibility, ethics
Contemporary security decisions are made by a complex amalgam of human and machine elements. The algorithm is an integral part of human action and culture (Striphas, 2015). It not only contains within it a teeming array of past human decisions â which training dataset to use, where to set the threshold for sensitivity, whether to use this nearest neighbour algorithm or another one in the same family, how to verify the model for operational use â but, as the following articles show, also extends and modifies embodied human action itself. The figure of the observing security subject is thus impossible definitively to identify, for she is a composite figure of distributed human and non-human agency. The moment of security decision, then, remains an indefinite moment of profound uncertainty. Who or what authorizes the algorithmic security decision? Who or what takes responsibility for the errors, misfires, inconsistencies and mistakes so abundantly documented in this special issue? What would an ethical security decision look like in the context of the humanâalgorithm composite, in the entangled nexus of what Tarleton Gillespie (2014: 183) terms a ârecursive loop between the calculations of the algorithm and the âcalculationsâ of peopleâ?
The critical and political responses to these kinds of questions have overwhelmingly sought to reinstate the human as the proper figure of sovereignty, its executive decisions bound by juridical and ethical codes of conduct. Thus the âhuman in the loopâ often functions as a fail-safe for the speculative imaginary of driverless cars, autonomous weapons and robotic surgery. However, taking seriously the generative and world-making capacities of algorithms means troubling the human as the sole locus of security decision, authorship, interpretation and ethico-political responsibility (Raley, 2016). After all, humans and algorithmic systems can be said to have co-evolved in complex processes of technogenesis, with human knowledge and logical structures migrating between people and software agents (Hayles, 2012). As N. Katherine Hayles (1999: 287) has elsewhere written, âwhat is lethal is not the posthuman as such but the grafting of the posthuman onto a liberal humanist view of the selfâ. Such a conception of the self, as Hayles (1999: 286) points out, applies to a âfraction of humanityâ whose âwealth, leisure and powerâ affords a life of apparent autonomy and âindividual agencyâ. Perhaps we can extend this to contemporary posthuman forms of security, suggesting that what is lethal is not the posthuman as such â not the posthuman soldier, analyst, border guard or drone pilot â but the grafting of this figure onto a liberal humanist subject âin the loopâ. For it is this liberal human subject who has animated the violences and sovereignties of international relations and yet simultaneously appears at the core of the drafting of âethical frameworksâ for the design of military software, legal âdue processâ for myriad algorithmic decisions (Crawford and Schultz, 2014) and juridical reviews of bulk data mining for security.
The articles in this special issue offer a politics of algorithmic security that exceeds and undercuts the search for a singularly human agency and responsibility, yet they do not evade the necessity of confronting the embodied violence of entangled humanâalgorithmic security action. As Lauren Wilcox (2017:, 13) writes in her contribution, reflecting on the responsibility of the drone operator, âthe question of the embodiment of decisionmaking remains vitally importantâ. Her account is a powerful corrective to notions of the disembodied, non-human, robotic or automated actions of algorithms, urging us to consider that all action at the humanâalgorithm interface is embodied and to attend to precisely how the putatively immaterial algorithm becomes materialized in the moment of decision. Wilcoxâs insights signal an ethics of algorithmic security that could never be captured by an appeal to the critical judgement of the human in the machinic loop. To situate sovereign decisionmaking and ethical responsibility solely within the realm of the autonomous machine, or within the realm of the âhumanâ â itself a dematerialized abstraction that has historically depended on the erasure of the body â is to forget the extent to which algorithms are necessarily instantiated within both.
There are similar moments in the accounts of the other contributors to the volume. Charlotte Heath-Kelly, for example, documents a âblurringâ of social security and national security, where the intuition and inference of algorithmic forms begin to encompass the reasoning and racialized judgements of all of the many humans in the national security/social security loop or, better, feedback loop. Roberts and Elbe ask directly in their essay how there could be any accountability of the forms of knowledge that make up global syndromic surveillance systems. What might it mean, for example, to hold a relevance score accountable for its onward future actions? As Nick Lally (2017: 65) proposes in his contribution, âalgorithms establish a framework that contributes to shaping the possibilities for actionâ. Perhaps to give an account of such actions is not a matter of uncovering or visualizing a complete picture, nor indeed of opening the so-termed black box of algorithms, but rather of beginning from indeterminate lines of sight and partial perspectives as sites of political contestation, negotiation and refusal. A defining feature of the securityâalgorithm relation is the act of surfacing something for action. How the person of interest or object of concern is surfaced for security action is a matter of politics. In her account of the camouflage algorithms that work âagainst depthâ, Silvia Mollichi reflects on what she calls the âprivileged observation pointsâ that do not quite fit the prevailing debates on the birdâs eye view that reveals all aspects of an environment or system (Mollichi, 2017: 80). âThe possibility of unwiring and rewiring input threadsâ in the operative logic of this family of algorithms âis limitedâ, she argues, because âthe data are the wiring design itselfâ (Mollichi, 2017: 91). Mollichi initiates beautifully the challenge for critical responses to such algorithms in security: where the data generate the design, an ethical response cannot be to modify the design but must begin from the unreadability and illegibility of the pattern.
In sum, the contributions of this special issue map out the many political and ethical dilemmas emerging as algorithms implement, but also transform, existing practices of knowledge production, decisionmaking and securitization. Considered together, the articles offer a timely reminder of the need to situate and interrogate the algorithm as both artefact and precept, technologized procedures that order our perception of control systems. Responding critically to often secretive, black-boxed or obscure techniques and technologies, the authors remind us that algorithmic systems are in fact not inscrutable, and that the calculative modalities that inform their programing can be examined. The work of this special issue, then, is to open up the space for future work on the securityâalgorithm relation.
Footnotes
Acknowledgements
The authors acknowledge the editors and anonymous reviewers of Security Dialogue for their insightful comments; Claudia Aradau for first persuading us, in a Toronto café, to edit this special issue; Volha Piotukh, Sarah Hughes, Alice Cree, Peter Forman and Vanessa Schofield for their work in support of Durham University workshops at which some of these articles were first presented; and finally, the contributors to the special issue who have generously committed their work and creative energies. Thank you.
Funding
Louise Amooreâs contribution to this work was supported by the RCUK Global Uncertainties Fellowship âSecuring Against Future Events: Pre-emption, Protocols and Publicsâ (Grant number ES/K000276/1) and Leverhulme Trust Major Research Fellowship âThe Ethics of Algorithmâ.
