Weapon | Developed | Used By | Military Purpose | Type of Tech | Repurpose (Potential/Actual) | Reference | Link |
---|---|---|---|---|---|---|---|
Large Geospatial Models | 2025 | Niantic Labs | (proposed) | Large generative model combined with 3D photogrammetry of public spaces for enhanced/predictive mapping capacities | Pokémon Go | Maiberg (2024b) | 404 Media |
Polygraph+ | 2024 | US, Presage, Altec | Credibility Assessment, updated polygraph, physiological tracking, biofeedback, AI analysis | “standard consumer grade cameras for medical assessment” “research and clinical technologies that monitor biosignals” | Interrogation, job interviews, “vetting new hires, evaluating existing DoD personnel for access to classified information, assisting in determining source credibility, and supporting criminal investigations” | (“DoD, DIU Announce Polygraph+ Credibility Assessment Modernization Effort” n.d.) | DIU |
Lavender | 2023 | Israel | Creates kill lists. Ranks each person from 1-100 for their similarity to pre-existing targets, based on data found in WhatsApp groups, mobile phones, location targeting, network surveillance, face recognition, and other tracking techniques. collects “Visual information, cellular information, social media connections, battlefield information, phone contacts, photos. […and] over time the machine will come to identify features on its own” | Ranking, classification, prediction, text analysis, image analysis | Works on similar principles to recommender systems: If you liked this reel, or behaved this way online, you are most like these other internet/mobile users. Uses the hypersurveillance of vast cyber infrastructure to connect information that may not represent “likeness.” Also entangled with text/image analysis | (Abraham 2024) | 972 Mag |
Where’s Daddy | 2023 | Israel | Determines when people are at home with their families in order to destroy them and their homes | Geolocation, computer vision (object detection), signal tracking | Package delivery, advertising, legal preceedings | (Abraham 2024) | 972 Mag |
Legion X | 2022 | Israel, Elbit Systems | Platform for identifying and targeting people carrying weapons or wearing uniforms, for controlling autonomous drone swarms, “coordinated strike after human confirmation” | Network, object identification, geolocation, weapon, pose estimation | Security, identify people in crowds, in shops | (“Legion-X Autonomous Networked Combat Solution” n.d.) | Elbit Systems |
Artificial Intelligence Platform | 2022 | Palantir | “Artificial Intelligence Platform, which allows for the integration of large language models into the company’s military products” “An Army of AI Agents that do what I say for me” | Large language model, natural language processing, + | Supply chain management, contracts, infrastructure grid, “LMNotebook” dashboards | (Palantir 2023) | Palantir |
MetaConstellation | 2022 | Ukraine, Palantir, USA | “relies on intelligence gathered on enemy troop positions by commercial satellites, heat sensors and reconnaissance drones as well as spies working behind enemy lines and ordinary Ukrainians pin-pointing the locations of Russian troops on the country’s E-Enemy app. The software uses AI to transform the data into a map highlighting the probable locations of Russian artillery, tanks and troops. A Ukrainian soldier using a tablet device is given a list of coordinates and can then direct their fire. The technology also “learns” from previous strikes, meaning that it is constantly getting better at identifying and locating material.” | Prediction, object detection, “process imagery, detect, and geolocate objects, and determine any movement” | “monitor locations across the globe for indications of competitor activities” | (Grylls 2022) | Palantir |
Clearview | 2022 | Ukraine, ClearviewAI | Facial recognition to “identify dead soldiers and to uncover Russian assailants and combat misinformation.” | Facial recognition | Commercial/policing tool then used for warfare | (Fontes and Kamminga 23AD) | National Defense Magazine |
Wolly | 2022 | Ukraine, Roboneers, D3 (former Google employees, investors), Helsing (investors) | Automated machine guns “We could sit in the trench drinking coffee and smoking cigarettes and shoot at the Russians” | Object identification, computer vision, repurposed video game controllers | Security systems, prisons, protests | (Mozur and Satariano 2024) | NYT |
First-Person-View Drones | 2022 | Ukraine, Vyriy, PG Robotics, Skyeton, Swarmer, others | Fully automated, weaponized drones, with automated targeting. Some can easily be built with hobby kit like materials. | Quads, computer vision, deep learning, classification and sorting algorithms | Personal drones, sports, already in use. Drones as local police first responders | (Mozur and Satariano 2024) | NYT |
MAPLE | 2022 | United Kingdom | Command and control platform for the UK Navy to control an automated fleet of unmanned air, ground, and water vehicles | Assign, task | Driver and delivery apps, logistics apps | (Fish and Mehta 2022) | Breaking Defense |
The Gospel (Habsora) | 2021 | Israel | Marks homes and public buildings as targets for destruction, for alleged military use, based on “enormous amounts of data that “tens of thousands of intelligence officers could not process,” and recommends bombing sites in real time. Possible data includes: “cell phone messages, satellite images, drone footage, and even seismic sensors.” | Classification, data analysis, object recognition | Redlining, unequal or biased distribution of resources | (Abraham 2023) | 972 Mag |
The Alchemist | 2021 | Israel | Sends real-time data to commanders in field about possible threats, using machine learning | Transmit | As-yet unknown | (Ahronheim 2021) | Jerusalem Post |
Project Nimbus | 2021 | Israel, Google, Amazon | Provides cloud services (storage, compute) “Nimbus is a flagship project and a key anchor in the implementation of the Israeli Government’s cloud policy, and is intended to provide a comprehensive and in-depth solution to the provision of public cloud services to the Government, the defense establishment and other public organizations. […] accelerating the Government’s digital transformation process, as well as improving the command, control and cyber defense capabilities of the government IT systems.” | Cloud compute and storage, edge computing | Cloud compute and storage, edge computing | (“Workers Against Project Nimbus Are Sharing Stories and Organizing Action This Thursday” n.d.) | Tech Workers Coalition Newsletter |
Assault Rifle Combat Application System | 2021 | Israel, Elbit Systems | a gunsight sold by the Israeli defense firm Elbit Systems. According to a company spec sheet, the “AI-powered” device is capable of “human target detection” at a range of more than 600 yards, and human target “identification” (presumably, discerning whether a person is someone who could be shot) at about the length of a football field. Anna Ahronheim-Cohen, a spokesperson for the company, told MIT Technology Review, “The system has already been tested in real-time scenarios by fighting infantry soldiers.” | Pose estimation, object detection, AR | Video games: “We made it very intuitive so it looks like PlayStation’s Fortnite ; it shows range, wind and ammo left, etc.,” said Arie Chernobrov, general manager of Elbit Security Systems. | (Atherton 2021) | Popular Science |
Lethal autonomous weapons (LAW) | 2021 | Libya, Azerbaijan (US, Turkey, Israeli-made), Russia (aka Kub & Lancet) | ““loitering munitions” — drones that can autonomously patrol an area and automatically divebomb enemy radar signals. These weapons look like smaller versions of the remote-controlled drones that have been used extensively by the U.S. military in Iraq, Afghanistan and other conflicts. Instead of launching missiles through remote control, though, loitering munitions have a built-in explosive and destroy themselves on impact with their target.” | Automated drones, hardware, geolocation | Consumer drones | (Vynck 2021) | Washington Post |
Gotham | 2021 | USA, Palantir | An operating system “Powering the Kill chain”: AI target identification and pairing, command center, mixed reality, edge computing. Using machine learning models | Sorting, identifying, data analysis, edge computing | Miscellaneous business to business applications, “global project management” | (Palantir 2021) | Palantir |
Joint Warfighting Cloud Capability, JEDI | 2021 | USA, Amazon, Microsoft, Google, Oracle, IBM | Multi-cloud provider for military use, including Unclassified, Secret and Top Secret (2021, 2019) | Storage, compute (calculation), “Commercial Cloud Enterprise” | Cloud compute and storage, edge computing | (Harper 2021) | National Defense Magazine |
Fire Weaver | 2020 | Israel, Raphael | Sensor-to-Shooter System. “The system connects all battlefield elements in real time and instantly selects the most relevant shooter for each target – enabling comprehensive situational awareness and simultaneous, precision strikes. Collecting, filtering, and disseminating data from multiple sources […] – with details down to a specific window in a targeted building. Marking and sharing targets, enemy locations, blue forces, and POIs on all weapon sights” | Analyzing, filtering, real-time data | As-yet unknown | (“Rafael : FIRE WEAVER- Multi Service, Network Centric Warfare” n.d.) | Rafael |
Fire Factory | 2020 | Israel, Raphael | Calculates necessary bomb strength to destroy “target” and schedules aircraft to deliver it. “uses data about military-approved targets to calculate munition loads, prioritize and assign thousands of targets to aircraft and drones, and propose a schedule.” | Sorting, tasking, assign | As-yet unknown | (Newman 2023) | Bloomberg, Business Standard |
Dialect Recognition Software (DIAS) | 2019 | Germany | Determines “authenticity” of migrants’ claims to refugee status via computer voice analysis, used by the German Federal Asylum Agency. Claims to detect accent (“language biometry”) despite high error rate. | Voice recognition, telephone audio datasets | Voice print for identification, verification, entry, and residency permit | (Lulamae n.d.) | Algorithm Watch |
Automated Facial Recognition System (AFRS) | 2019 | India | Facial recognition used for missing children | Facial recognition | Repurposed for surveillance and crackdowns of peaceful protests | (“Privacy Fears as India Police Use Facial Recognition at Rally” 2019) | Al Jazeera |
Starshield, Starlink | 2024, 2019 | USA, Ukraine, SpaceX | Swarming spy satellites, imaging, reconnaisance | Infrastructure | Commercially available internet access | (Taylor 2024) | Reuters |
Pantsir-SM | 2019 | Russia | Modifications of existing air defense systems incorporate algorithms to orient, detect, and categorize targets by degree of danger, select a method for defense, “then open fire without human intervention.” | Classify, identify | nan | (Hynek and Solovyeva 2022) | Hynek, Solovyeva (2022) |
Red Wolf | 2018 | Israel | Monitors and controls people’s movement using facial recognition | Facial recognition, camera infrastructure | Dating apps, photo library search, local policing, traffic tickets (BBC), public event security | (“Israel Using Previously-Unreported Facial Recognition System to ‘Automate Apartheid’ Against Palestinians - New Report” n.d.) | Amnesty Int |
Blue Wolf | 2018 | Israel | Lets soldiers instantly access and add to face recognition human database (Wolf Pack) via app | App interface, facial recognition | Border patrol, security, restriction of movement | (“Israel Using Previously-Unreported Facial Recognition System to ‘Automate Apartheid’ Against Palestinians - New Report” n.d.) | Amnesty Int |
Wolf Pack | 2018 | Israel | “Vast database containing all available information on Palestinians from the Occupied Palestinian Territories, including places of residence, family members and whether they are wanted for questioning by the Israeli authorities.” | Database, data aggregation | Social credit systems, biased allocation of resources | (“Israel Using Previously-Unreported Facial Recognition System to ‘Automate Apartheid’ Against Palestinians - New Report” n.d.) | Amnesty Int |
Mabat 2000 | 2018 | Israel, | Infrastructure of surveillance cameras in occupied territories and illegally annexed areas that support the Wolf systems | Cameras | Existing infrastructure to build AI systems on top of | (“Israel Using Previously-Unreported Facial Recognition System to ‘Automate Apartheid’ Against Palestinians - New Report” n.d.) | Amnesty Int |
TKH Security (Dutch), | ~2 cameras every 5 meters | ||||||
Hikvision (China) | |||||||
Urban Reconnaissance through Supervised Autonomy (URSA) | 2018 | USA | “enabled robots and drones to act as forward observers for platoons in urban operations. After input from the project’s advisory group on ethical and legal issues, it was decided that the software would only ever designate people as”persons of interest.” “DARPA program to enable improved techniques for rapidly discriminating hostile intent and filtering out threats in complex urban environments” “combining new knowledge about human behaviors, autonomy algorithms, integrated sensors, multiple sensor modalities, and measurable human responses to discriminate the subtle differences between hostile and innocent people” | Sorting, identifying, data analysis, behavior analysis | Suggested as drones to patrol cities | (“Urban Reconnaissance Through Supervised Autonomy” n.d.) | DARPA |
TacNet | 2017 | Germany, Rheinmetall | “command and control application” including digital force deployment using AI to decide where and when to place troops. “By analyzing geo data and the monitored situation on the battlefield, the system automatically provides positions to achieve the mission objective and to eliminate potential risks. Command selects according the strategic approach and hand over information directly to his team. […] Accelerate decision making process through AI. Share positions in real time to achieve your mission objectives as quickly as possible” | Geolocation, object detection | Tasking and tracking gig workers | (“Rheinmetall-DigitalForces” n.d.) | Rheinmetall |
Bylina | 2017 | Russia, Syria | Reportedly tested in Ukraine and Syria, this system can independently evaluate the battlefield situation and calculate how to attack structures. | Info synthesis, predict, assign | As-yet unknown | (Penati and Nunes 2021) | Penati and Nunes |
Project Maven | 2017 | USA & Google | Object detection from satellite images to destroy ground targets. “a Pentagon program that developed target recognition algorithms for video footage from drones” | Object detection, computer vision, data processing | Mapping, location confirmation, surveillance | (Michel 2023) | MIT Tech Review |
PackBot | 2016 | Arlington Capital Partners (iRobot) | Search and rescue, and bomb disposal robot | Site mapping, sensors | Roomba | (Swearingen 2018) | New York Magazine |
GIS Arta | 2014 | Ukraine | Pairs a battlefield target to an artillery unit (“like Uber rider to driver” | Tasking, sorting | Driver and delivery apps, logistics apps | (Michel 2023) | MIT Tech Review |
IrisGuard | 2013 | Jordan, UNHCR, IrisGuard Inc | Iris scanning biometric hardware, software, and storage | Iris scanning biometric hardware, software, and storage | FinTech e-wallets, payment ID, Worldcoin, etc. | (Dongus 2018) | Ars Electronica |
Skynet | 2012 | USA | “uses phone location and call metadata from bulk phone call records to detect suspicious patterns in the physical movements of suspects and their communication habits, according to a 2012 government presentation The Intercept obtained from Edward Snowden. The presentation indicates that Skynet looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” It also looks for suspicious behaviors such as someone who engages in “excessive SIM or handset swapping” or receives “incoming calls only.” The goal is to identify people who move around in a pattern similar to Al Qaeda couriers who are used to pass communication and intelligence between the group’s senior leaders. ” | Filtering, sorting, pattern matching | Leads to AI-DSS used above ^^ | (Zetter 2015) | WIRED |
Robot Riot Control, Prison Guard | 2011 | China, South Korea | “3D depth cameras, a two-way wireless communication system, and software capable of recognizing certain human behavior patterns” | Behavior pattern detection, motion tracking, pose detection | Private security robots (in use in US cities) | (“Where to Draw the Line: Increasing Autonomy in Weapon Systems – Technology and Trends” 2020) | PAX for Peace |
Pegasus | 2011 | Many countries | Access mobile phones via spyware, targeted journalists, activists, dissidents, heads of state | Cyber weapon, spyware | Continued personal data surveillance | (Priest, Timberg, and Mekhennet 2021) | Washington Post |
Sentry-Tech, Super Aegis III, Sentry Robot | 2010 | South Korea, Israel | ““An automated gun turret that can be mounted with a 12.7 mm (.50 in) machine gun, automatic 40 mm grenade launcher, or portable surface-to-air missile. With a detection range of 2.2 km in total darkness, utilising IR thermal sensors, colour camera with 30x magnification, laser illuminator and laser range finder. Automated detection, tracking, targeting and manual or automated firing. Although not initially designed to include manual functions, there is a requirement for manual input that permits the turret to shoot. Currently the weapon has no way to distinguish between friend or foe. “The system’s highly accurate target engagement and auto-tracking capabilities, | Optical sensors, thermal sensors, tracking, automated firing. Connected to gun turrets | Automatic security cameras and sensor activated tech | (Vynck 2021) | Washington Post |
combined with accurate stabilisation mechanism, enable superior performance under the most adverse conditions”. “Once IDF sensors locate a potential target, the operator can cue Sentry Tech to verify or engage the target through its own electro-optic (EO) day/night sensor package. The sensor-acquired information is transferred to the electro-optic package of the weapon station, which slews to the target, enabling the operator to locate and track the target”. “Sources at Rafael say that the company is now developing an autonomous “see-shoot” system which will not require human intervention.” Autonomous “As early as 2010, the arms division of South Korean tech giant Samsung built autonomous sentry guns that use image recognition to spot humans and fire at them. Similar sentry guns have been deployed by Israel on its border with the Gaza Strip. Both governments say the weapons are controlled by humans, though the systems are capable of operating on their own. | |||||||
PRISM/XKEYSCORE | 2007 | USA, Google, Microsoft, Verizon, Facebook, Skype, YouTube, Apple, Yahoo, etc. | Used the US Foreign Intelligence Surveillance Act to collect and store massive amounts of internet data on citizens | Storage, data collection | Common data privacy breaches and personal surveillance in collaboration with private companies | (Nakashima 2021) | Washington Post |
DynaSpeak | 2006 | SRI, USA | Speech recognition engine, used in IraqComm speech translation system, provides speech-to-speech machine translation of English–Arabic for US forces in Iraq. | Speech recognition, speech synthesis, machine translation “trained to handle topics of tactical importance” | They also offer the EduSpeak toolkit for developers of second-language learning tools. | (Frandsen, Riehemann, and Precoda 2010) | Sobh et al |
CALO (Cognitive Agent that Learns and Organizes) | 2003-2014 | USA (DARPA), SRI, Swiss Institute of Technology | Automates tasks, predicts and takes action on behalf of field commanders | Agent, natural language processing, voice regonition, voice synthesis, classification, clustering, information extraction, document classification, sorting, annotating text, entity extraction, semantic extraction | Siri (Apple) digital assistant | (Finn 2017) | Finn. What Algorithms Want. & pal.sri.com |
Golden Shield, Skynet, Sharp Eyes | 2003 | China | “The eyes that safeguard China” is a network of 600 million surveillance cameras or one camera for every two adults, plus the social incentives built in to view and report on footage. As AI technologies have improved, the system has increased predictive policing and the databases it references | Cameras, social incentives, reporting, predictive policing, databases | Used against Hong Kong protestors (2019); Proposed use as lunar surveillance (2024) | (Thompson 2021) | Georgetown CSET |
AI War Cloud
Battlefield to Desktop
artificial intelligence, artistic research, automated decision making, autonomous weapons, critical AI, defense, generative AI, international security, machine learning, military, surveillance, technoimperialism, tech industry, warfare
When the bots, recommender systems, and automated agents many people use daily are the same technologies used to wage war, how should we understand and hold these systems to account? Ultimately, what responsibilities do tech makers and users have in choosing AI tools, when their development also leads to deadly outcomes at massive scales? With the spotlight now on systems like Ukraine’s Palantir MetaConstellation and Israel’s Lavender, the stakes for machine learning tasks are increasingly urgent and personal. This project examines the specific machine learning tasks used in military “AI Decision Support Systems” (AI-DSS). These combine massive amounts of data and processing to help make choices about who lives or dies, speeding up the process exponentially. The research presents a database that details how the training datasets, models, and inferences military tools rely on are the very same types used by consumers. It shows how these are also deployed by, or even upon, citizens of the countries that first developed them, after they are tested on vulnerable foreign populations in conflict zones.
AI War Cloud is an interactive database and tangible interactive installation connecting and explaining the current techno-imperial boomerang created by machine learning.
Code
import pandas as pd
from pandas import Series, DataFrame
import networkx as nx
import gravis as gv
from pprint import pprint
# create graph with edges from csv import
= pd.read_excel("./data/aiwc.ods", sheet_name = "E_isDeployedBy")
Edges_Deployed = pd.read_excel("./data/aiwc.ods", sheet_name = "E_isDevelopedBy")
Edges_Developed = pd.read_excel("./data/aiwc.ods", sheet_name = "E_place")
Edges_Place = pd.read_excel("./data/aiwc.ods", sheet_name = "E_connection")
Edges_Connection = [Edges_Deployed, Edges_Developed, Edges_Place, Edges_Connection]
all_edges = pd.concat(all_edges)
Edges
= nx.from_pandas_edgelist(Edges,
g ='source',
source='target',
target=['label','weight'],
edge_attr=nx.Graph(), #DiGraph
create_using=False)
edge_key
# print(g.edges())
# assign data to nodes (stakeholders)
= pd.read_excel("./data/aiwc.ods", sheet_name = "N_Stakeholders") #, header=0, index_col=0
Stakeholders = Stakeholders.T # transforms from long to wide table
Stakeholders = 'id'
Stakeholders.index_col
= Stakeholders.to_dict()
StakeDict # pprint((StakeDict))
for d in StakeDict:
'id']].update(StakeDict[d])
g.nodes[StakeDict[d][
# assign data to nodes (systems)
= pd.read_excel("./data/aiwc.ods", sheet_name = "N_Systems")
Systems = Systems.T # transforms from long to wide table
Systems = 'id'
Systems.index_col
= Systems.to_dict()
SysDict
for d in SysDict:
'id']].update(SysDict[d]) #this worked!!?????!!!!!
g.nodes[SysDict[d][
# assign data to nodes (civic)
= pd.read_excel("./data/aiwc.ods", sheet_name = "N_Civic")
Civic = Civic.T # transforms from long to wide table
Civic = 'id'
Civic.index_col
= Civic.to_dict()
CivDict
for d in CivDict:
'id']].update(CivDict[d])
g.nodes[CivDict[d][
# assign data to nodes (historical)
= pd.read_excel("./data/aiwc.ods", sheet_name = "N_Historical")
Hist = Hist.T # transforms from long to wide table
Hist = 'id'
Hist.index_col
= Hist.to_dict()
HistDict
for d in HistDict:
'id']].update(HistDict[d])
g.nodes[HistDict[d][
# test nodes
# print(g.nodes.data())
# print(g.nodes['Lavender']['nounKey'])
# visual settings
= g.graph
gg 'edge_opacity'] = 0.25
gg['node_opacity'] = 0 #.75
gg[# gg['node_shape'] = 'rectangle'
# gg['node_border_size'] = 0
'edge_label_size'] = 5
gg['node_label_size'] = 8
gg[# gg['node_color'] = 'gray'
# gg['border_size'] = 0
'node_click'] = 'Details: $hover'
gg[
# centrality = nx.algorithms.degree_centrality(g)
# nx.set_node_attributes(g, centrality, 'size')
# communities = nx.algorithms.community.louvain_communities(g)
= nx.algorithms.community.greedy_modularity_communities(g)
communities = ['#51DBD9', '#5186DB', '#51B2DB', '#51DBAB', '#515ADB', '#009ADB']
colors for community, color in zip(communities, colors):
for node in community:
'color'] = color #add edges to this too
g.nodes[node][
gv.d3(g, =600,
graph_height=0.8,
zoom_factor=False,
show_details=True,
show_details_toggle_button=True,
show_node_label='name',
node_label_data_source# node_size_data_source='year',
= 2,
node_size_factor # use_node_size_normalization=True,
# node_size_normalization_max=20,
=True,
show_edge_label# edge_size_data_source='size',
# edge_size_normalization_max=3,
# edge_size_normalization_min=0.5,
='label',
edge_label_data_source=0,
edge_curvature=True,
node_hover_neighborhood=True,
node_hover_tooltip=True,
edge_hover_tooltip=True,
use_collision_force=- 400.0,
many_body_force_strength=0.9,
many_body_force_theta=True,
node_drag_fix=True,
show_node_image=2,
node_image_size_factor=False,
show_node_label_border=False,
show_edge_label_border# node_label_rotation=0
# node_label_font='Arial',
= True,
use_x_positioning_force = 0.11,
x_positioning_force_strength = True,
use_y_positioning_force = 0.11,
y_positioning_force_strength # use_centering_force = False,
)