University of Southern California
In the midst of the cold war, the U.S. Department of Defense
was beginning its efforts to track terrorists using
databases enhanced with scruffy AI. Early prototypes
attempted to model how terrorists shared knowledge in
order to determine how these organizations might take
advantage of associations. While scholars have analyzed
the textual trail of terrorists and counter-terrorism
efforts, examining the code of one of these early models
reveals the ways in which terrorists were conceived
in this time period. This paper uses the methodology
of Critical Code Studies to show what this LISP source
code and design documents say about the cultural moment
in which the military attempted to model geopolitical
insurgencies.
If this content appears in violation of your intellectual property rights, or you see errors or omissions, please reach out to Scott B. Weingart to discuss removing or amending the materials.
Complete
Hosted at University of Maryland, College Park
College Park, Maryland, United States
June 20, 2009 - June 25, 2009
176 works by 303 authors indexed
Conference website: http://web.archive.org/web/20130307234434/http://mith.umd.edu/dh09/
Series: ADHO (4)
Organizers: ADHO