Hostname: page-component-89b8bd64d-shngb Total loading time: 0 Render date: 2026-05-11T13:36:07.541Z Has data issue: false hasContentIssue false

Transcending the fog of war? US military ‘AI’, vision, and the emergent post-scopic regime

Published online by Cambridge University Press:  30 May 2024

Hendrik Huelss*
Affiliation:
Department of Political Science and Public Management, University of Southern Denmark, Odense M, Denmark
Rights & Permissions [Opens in a new window]

Abstract

The integration of ‘AI’ technologies into weapon systems introduces a complex dimension to international relations and security, championing technological solutions for enduring warfare challenges, notably enhancing ‘situational awareness’ through advances such as automated ‘vision’. However, the discourse, particularly in Western militaries like that of the United States, often overlooks inherent limitations and issues in AI-based warfare. This paper explores ‘AI’s’ implications for military vision by inter alia scrutinising the US military’s Joint All-Domain Command and Control (JADC2) process. It argues that the US military actively transforms the observation, decision, and action apparatus, progressively substituting human vision and decision-making, leading to a multidimensional de-visualisation. This denotes fundamental changes in human perception, reshaping knowledge, control, and agency dynamics. In conclusion, the paper suggests an imminent era of de-visualisation in the military – a deliberate relinquishment of human control for perceived military efficiency and effectiveness. This marks a transformative shift, urging nuanced consideration of the profound impact of ‘AI’ technologies on warfare dynamics.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2024. Published by Cambridge University Press on behalf of The British International Studies Association.
Figure 0

Figure 1. JADC2 overview.a

aSource: US Department of Defense, ‘Summary of JADC2’, p. 3.
Figure 1

Figure 2. Visualisation of metadata by Skynet.a

aSource: The Intercept, ‘SKYNET: Courier detection via Machine Learning’ (2015), available at: {https://theintercept.com/document/2015/05/08/skynet-courier/}.
Figure 2

Figure 3. Visualisation of patterns of movement by Skynet.a

aSource: The Intercept, ‘SKYNET: Courier detection via Machine Learning’.
Figure 3

Figure 4. Palantir AIP interface.a

aSource: Video screenshot from Palantir, ‘Palantir AIP for Defense’ (2023), available at: {https://www.palantir.com/aip/defense/}.
Figure 4

Figure 5. Graffiti and physical perturbation to a ‘Stop’ sign.a

aSource: Eykholt et al., ‘Robust physical-world attacks on deep learning models’, 2.