Dangers of Drone Warfare
Section 1 – Drone Surveillance
Drone surveillance – Drones have the power to intensively monitor and record human activity and communications to a degree not possible by other means.

“The Almighty God is the creator of the world and can see everything. He sees the sky, the earth, and under the ground. God sees everything. God knows everything. Be aware that He will find out everything. Who created this balloon? God created the man who made this. God gave him the brain to create this balloon, and God knows every thought that he thinks.”After showing a similar blimp over Aberdeen, Maryland, which the U.S. military said had no cameras but is radar-equipped to detect long-range missile attacks, the film closes with this:
“U.S. Army 1st Brigade Afghanistan After Action Report:
“Recommendation: Fly the Persistent Ground Surveillance System (the blimp) as much as possible even if the camera systems/feed is broken. Insurgents and Local Nationals alike believe the blimp can see everything and will act differently when it is up.”
Mitchell Gray observes in the journal Surveillance and Society that the power of surveillance “transforms those under its gaze.”

The drone is essential to gathering the following types of critical video and electronic information that cannot be so quickly and remotely gathered on individuals, groups, and masses of people in any other way.
Weaponized Drones – technological capabilities 1.A. Video and Hyperspectral Information (1) Biometric Identification – Physical measurements of faces and bodies of individuals, hair and eye color and other physical characteristics, including a person’s gait when walking, their speed of movement and gestures, are used to identify and stalk. However, biometric technology reportedly has serious flaws with respect to accuracy and hackability. The U.S. Government Accountability Office reports that between 2008 and 2017, the U.S. Department of Defense used biometric and forensic data (such as fingerprints) to capture or kill 1,700 individuals, deny 92,000 individuals access to military bases and put 213,000 people on a DOD “watchlist.” (2) Facial Recognition – This technology uses facial biometric data to match faces under surveillance with faces already held on file in a database of targeted people. This technology has been found to be particularly inaccurate and harmful to blacks, Hispanics and other people of color. This technology therefore presents an extraordinarily dangerous threat to the public in current war zones where the vast majority of people are people of color. The U.S. state of California has banned police from using facial recognition technology, but its use is permitted elsewhere and the technology is widely available and being used. Flight Global reports that General Atomics Aeronautical Systems, maker of the workhorse of U.S. drone killing, the MQ-9 Reaper, announced in 2020 that it is testing an on-board system that will use facial recognition technology to identify an enemy combatant and “autonomously find, track and propose targets to human commanders.” (3) Emotional Analysis – A technology of AI-assisted analysis has been developed in which cameras record extremely minute, flickering changes in facial, voice, along with other features in an attempt to determine emotions, as well as both conscious and unconscious thoughts. Shosana Zoboff explains this process in “The Age of Surveillance Capitalism”:“This complex of machine intelligence is trained to isolate, capture and render the most subtle and intimate behaviors, from an inadvertent blink to a jaw that slackens in surprise for a fraction of a second. Combinations of sensors and software can recognize the identity of faces; estimate age, ethnicity, and gender; analyze gaze direction and blinks; and track distinct facial points to interpret ‘micro-expressions’, eye movements, emotions, moods, stress, deceit, boredom, confusion, intentions and more: all at the speed of life.”The technology, Zuboff says, is intended to capture behaviors that “elude the conscious mind.”

At this point, it appears that this technology is being used primarily by corporations in guiding advertising and product development.
At this point, it appears that this technology is being used primarily by corporations in guiding advertising and product development. However, Forbes reports that Matt Celuszak, the founder of the UK firm Element Human, an emotion-detection technology company, “thinks it will be useful for emotion detection to look out for patterns of agitation in a group of protesters to predict if a riot was about to erupt.” China has installed emotion detection technology in Xinjiang Province, according to a report in The Straits Times, quoting a Chinese official who said: “Using video footage, emotion recognition technology can rapidly identify criminal suspects by analyzing their mental state…to prevent illegal acts including terrorism and smuggling.” Xinjiang’s Muslim population of over 1 million has been placed under intense surveillance by the central government. 1.B. Electronic information Drones can carry electronic detection equipment that enables them to monitor cell-phone conversations, locate and track the cellphone user and capture and hack wi-fi communications. A Venture Beat report on the use of small drones for tracking mobile electronic devices notes: “Drones, of course, offer better coverage than ground-based methods, and can be used in areas inaccessible by vehicles or foot.” Cell phone tower simulators, such as Stingray, which can be carried by drones, trick cellphones into connecting to the simulator rather than a legitimate cell phone tower. The Electronic Frontier Foundation reports:The ACLU provides this map of U.S. state and local police departments known to be using Stingray technology in 2018. Stingray type devices are also used in Canada, Ireland, the United Kingdom, Saudi Arabia, UAE and Turkey.“Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections. Law enforcement use cell-site simulators to pinpoint the location of phones with greater accuracy than phone companies. Cell-site simulators can also log IMSI numbers (unique identifying numbers) of all of the mobile devices within a given area. Some cell-site simulators may have advanced features allowing law enforcement to intercept communications or even alter the content of communications.”
1.C. Mass Data Collection
OneZero reported in 2019 that the U.S. military has created a
“vast database, packed with millions of images of faces, irises, fingerprints and DNA data – a biometric dragnet of anyone who has come in contact with the U.S. military abroad. The 7.4 million identities in the database range from suspected terrorists in active military zones to allied soldiers training with U.S. forces.”
This database is linked to the U.S. Federal Bureau of Investigation’s database, the report says, meaning that the U.S. military can compare its data with biometric data of U.S. citizens and “cataloged” non-citizens. This will, the report says, “ultimately amount to a global surveillance system.”
It is very likely that this database, known as Automated Biometric Information System (ABIS), will be linked with a Pentagon AI-driven data collecting, sorting, targeting and weapons selecting global “brain” that has been officially dubbed Joint Enterprise Defense Infrastructure (JEDI). Microsoft has won a $10 billion contract to build the brain, which the Pentagon says will speed up its “lethality.” (Amazon Web Services is contesting the award, but it appears it will not succeed in capturing it.)