{"id":259916,"date":"2024-04-22T12:00:33","date_gmt":"2024-04-22T11:00:33","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=259916"},"modified":"2024-04-17T05:21:34","modified_gmt":"2024-04-17T04:21:34","slug":"a-brief-history-of-kill-lists-from-langley-to-lavender","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2024\/04\/a-brief-history-of-kill-lists-from-langley-to-lavender\/","title":{"rendered":"A Brief History of Kill Lists from Langley to Lavender"},"content":{"rendered":"<div id=\"attachment_259918\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2024\/04\/gaza-israel-genocide-palestine.png\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-259918\" class=\"wp-image-259918\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2024\/04\/gaza-israel-genocide-palestine-1024x683.png\" alt=\"\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2024\/04\/gaza-israel-genocide-palestine-1024x683.png 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2024\/04\/gaza-israel-genocide-palestine-300x200.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2024\/04\/gaza-israel-genocide-palestine-768x512.png 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2024\/04\/gaza-israel-genocide-palestine.png 1170w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-259918\" class=\"wp-caption-text\">The bodies of Palestinians killed in Israeli strikes are buried in a mass grave in Khan Younis.\u00a0 Photo credit: Al-Jazeera<\/p><\/div>\n<p><em>16 Apr <\/em>2024 &#8211; The Israeli online magazine +972 has published a<a target=\"_blank\" href=\"https:\/\/www.972mag.com\/lavender-ai-israeli-army-gaza\/\" > detailed report<\/a> on Israel\u2019s use of an artificial intelligence (AI) system called \u201cLavender\u201d to target thousands of Palestinian men in its bombing campaign in Gaza. When Israel attacked Gaza after October 7, the Lavender system had a database of 37,000 Palestinian men with suspected links to Hamas or Palestinian Islamic Jihad (PIJ).<\/p>\n<p>Lavender assigns a numerical score, from one to a hundred, to every man in Gaza, based mainly on cellphone and social media data, and automatically adds those with high scores to its kill list of suspected militants. Israel uses another automated system, known as \u201cWhere\u2019s Daddy?\u201d, to call in airstrikes to kill these men and their families in their homes.<\/p>\n<p>The report is based on interviews with six Israeli intelligence officers who have worked with these systems. As one of the officers explained to +972, by adding a name from a Lavender-generated list to the Where\u2019s Daddy home tracking system, he can place the man\u2019s home under constant drone surveillance, and an airstrike will be launched once he comes home.<\/p>\n<p>The officers said the \u201ccollateral\u201d killing of the men\u2019s extended families was of little consequence to Israel. \u201cLet\u2019s say you calculate [that there is one] Hamas [operative] plus 10 [civilians in the house],\u201d the officer said. \u201cUsually, these 10 will be women and children. So absurdly, it turns out that most of the people you killed were women and children.\u201d<\/p>\n<p>The officers explained that the decision to target thousands of these men in their homes is just a question of expediency. It is simply easier to wait for them to come home to the address on file in the system, and then bomb that house or apartment building, than to search for them in the chaos of the war-torn Gaza Strip.<\/p>\n<p>The officers who spoke to 972+ explained that in previous Israeli massacres in Gaza, they could not generate targets quickly enough to satisfy their political and military bosses, and so these AI systems were designed to solve that problem for them. The speed with which Lavender can generate new targets only gives its human minders an average of 20 seconds to review and rbber-stamp each name, even though they know from tests of the Lavender system that at least 10% of the men chosen for assassination and familicide have only an insignificant or a mistaken connection with Hamas or PIJ.<\/p>\n<p>The Lavender AI system is a new weapon, developed by Israel. But the kind of kill lists that it generates have a long pedigree in U.S. wars, occupations and CIA regime change operations. Since the birth of the CIA after the Second World War, the technology used to create kill lists has evolved from the CIA\u2019s earliest coups in Iran and Guatemala, to Indonesia and the Phoenix program in Vietnam in the 1960s, to Latin America in the 1970s and 1980s and to the U.S. occupations of Iraq and Afghanistan.<\/p>\n<p>Just as U.S. weapons development aims to be at the cutting edge, or the killing edge, of new technology, the CIA and U.S. military intelligence have always tried to use the latest data processing technology to identify and kill their enemies.<\/p>\n<p>The CIA learned some of these methods from German <a target=\"_blank\" href=\"https:\/\/archive.is\/KuXrp\" >intelligence<\/a> officers captured at the end of the Second World War. Many of the names on Nazi kill lists were generated by an intelligence unit called Fremde Heere Ost (Foreign Armies East), under the command of Major General Reinhard Gehlen, Germany\u2019s spy chief on the eastern front (see David Talbot, <a target=\"_blank\" href=\"https:\/\/www.harpercollins.com\/products\/the-devils-chessboard-david-talbot?variant=32207669559330\" ><em>The Devil\u2019s Chessboard<\/em><\/a>, p. 268).<\/p>\n<p>Gehlen and the FHO had no computers, but they did have access to four million Soviet POWs from all over the USSR, and no compunction about torturing them to learn the names of Jews and communist officials in their hometowns to compile kill lists for the Gestapo and Einsatzgruppen.<\/p>\n<p>After the war, like the 1,600 German scientists spirited out of Germany in Operation Paperclip, the United States <a target=\"_blank\" href=\"https:\/\/archive.is\/KuXrp\" >flew<\/a> Gehlen and his senior staff to Fort Hunt in Virginia. They were welcomed by Allen Dulles, soon to be the first and still the longest-serving director of the CIA. Dulles sent them back to Pullach in occupied Germany to resume their anti-Soviet operations as CIA agents. The Gehlen Organization formed the nucleus of what became the BND, the new West German intelligence service, with Reinhard Gehlen as its director until he retired in 1968.<\/p>\n<p>After a <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2003\/11\/30\/weekinreview\/ideas-trends-iran-guatemala-1953-54-revisiting-cold-war-coups-finding-them.html\" >CIA coup<\/a> removed Iran\u2019s popular, democratically elected prime minister Mohammad Mosaddegh in 1953, a CIA team led by U.S. Major General Norman Schwarzkopf trained a new intelligence service, known as <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/SAVAK\" >SAVAK<\/a>, in the use of kill lists and torture. SAVAK used these skills to purge Iran\u2019s government and military of suspected communists and later to hunt down anyone who dared to oppose the Shah.<\/p>\n<p>By 1975, Amnesty International<a target=\"_blank\" href=\"https:\/\/merip.org\/1980\/03\/the-guerrilla-movement-in-iran-1963-1977\/\" > estimated<\/a> that Iran was holding between 25,000 and 100,000 political prisoners, and had \u201cthe highest rate of death penalties in the world, no valid system of civilian courts and a history of torture that is beyond belief.\u201d<\/p>\n<p>In Guatemala, a <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2003\/11\/30\/weekinreview\/ideas-trends-iran-guatemala-1953-54-revisiting-cold-war-coups-finding-them.html\" >CIA coup<\/a> in 1954 replaced the democratic government of Jacobo Arbenz Guzman with a brutal dictatorship. As <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Guatemalan_Civil_War\" >resistance grew<\/a> in the 1960s, U.S. special forces joined the Guatemalan army in a scorched earth campaign in Zacapa, which killed 15,000 people to defeat a few hundred armed rebels. Meanwhile, CIA-trained urban death squads abducted, tortured and killed PGT (Guatemalan Labor Party) members in Guatemala City, notably 28 prominent labor leaders who were abducted and disappeared in March 1966.<\/p>\n<p>Once this first wave of resistance was suppressed, the CIA set up a new telecommunications center and intelligence agency, based in the presidential palace. It compiled a database of \u201csubversives\u201d across the country that included leaders of farming co-ops and labor, student and indigenous activists, to provide ever-growing lists for the death squads. The resulting civil war became a <a target=\"_blank\" href=\"https:\/\/www.usip.org\/publications\/1997\/02\/truth-commission-guatemala\" >genocide<\/a> against indigenous people in Ixil and the western highlands that killed or disappeared at least 200,000 people.<\/p>\n<p>This pattern was repeated across the world, wherever popular, progressive leaders offered hope to their people in ways that challenged U.S. interests. As historian Gabriel Kolko <a target=\"_blank\" href=\"https:\/\/books.google.com\/books?id=yVaqAAAAIAAJ&amp;newbks=1&amp;newbks_redir=0&amp;printsec=frontcover&amp;q=The+irony+of+U.S.+policy+in+the+Third+World+is+that,+while+it+has+always+justified+its+larger+objectives+and+efforts+in+the+name+of+anticommunism,+its+own+goals+have+made+it+unable+to+tolerate+change+from+any+quarter+that+impinged+significantly+on+its+own+interests&amp;hl=en\" >wrote<\/a> in 1988, \u201cThe irony of U.S. policy in the Third World is that, while it has always justified its larger objectives and efforts in the name of anticommunism, its own goals have made it unable to tolerate change from any quarter that impinged significantly on its own interests.\u201d<\/p>\n<p>When General Suharto seized power in Indonesia in 1965, the U.S. Embassy compiled a list of 5,000 communists for his death squads to hunt down and kill. The CIA estimated that they eventually killed 250,000 people, while other estimates run as high as a million.<\/p>\n<p>Twenty-five years later, journalist Kathy Kadane<a target=\"_blank\" href=\"https:\/\/archive.seattletimes.com\/archive\/?date=19900520&amp;slug=1072820\" > investigated<\/a> the U.S. role in the massacre in Indonesia, and spoke to Robert Martens, the political officer who led the State-CIA team that compiled the kill list. \u201cIt really was a big help to the army,&#8221; Martens told Kadane. \u201cThey probably killed a lot of people, and I probably have a lot of blood on my hands. But that&#8217;s not all bad &#8211; there&#8217;s a time when you have to strike hard at a decisive moment.\u201d<\/p>\n<p>Kathy Kadane also spoke to former CIA director William Colby, who was the head of the CIA\u2019s Far East division in the 1960s. Colby compared the U.S. role in Indonesia to the Phoenix Program in Vietnam, which was launched two years later, claiming that they were both successful programs to identify and eliminate the organizational structure of America\u2019s communist enemies.<\/p>\n<p>The <a target=\"_blank\" href=\"https:\/\/www.warhistoryonline.com\/vietnam-war\/phoenix-program.html\" >Phoenix<\/a> program was designed to uncover and dismantle the National Liberation Front\u2019s (NLF) shadow government across South Vietnam. Phoenix\u2019s Combined Intelligence Center in Saigon fed thousands of names into an IBM 1401 computer, along with their locations and their alleged roles in the NLF. The CIA credited the Phoenix program with killing 26,369 NLF officials, while another 55,000 were imprisoned or persuaded to defect. Seymour Hersh reviewed South Vietnamese government documents that put the death toll at<a target=\"_blank\" href=\"https:\/\/www.newyorker.com\/magazine\/2003\/12\/15\/moving-targets\" > 41,000<\/a>.<\/p>\n<p>How many of the dead were correctly identified as NLF officials may be impossible to know, but Americans who took part in Phoenix operations reported killing the wrong people in many cases. Navy SEAL Elton Manzione told author<a target=\"_blank\" href=\"https:\/\/www.douglasvalentine.com\/index.htm\" > Douglas Valentine<\/a> (<em>The Phoenix Program<\/em>) how he killed two young girls in a night raid on a village, and then sat down on a stack of ammunition crates with a hand grenade and an M-16, threatening to blow himself up, until he got a ticket home.<\/p>\n<p>\u201cThe whole aura of the Vietnam War was influenced by what went on in the \u201chunter-killer\u201d teams of Phoenix, Delta, etc,\u201d Manzione told Valentine. \u201cThat was the point at which many of us realized we were no longer the good guys in the white hats defending freedom &#8211; that we were assassins, pure and simple. That disillusionment carried over to all other aspects of the war and was eventually responsible for it becoming America\u2019s most unpopular war.\u201d<\/p>\n<p>Even as the U.S. defeat in Vietnam and the \u201cwar fatigue\u201d in the United States led to a more peaceful next decade, the CIA continued to engineer and support coups around the world, and to provide post-coup governments with increasingly computerized kill lists to consolidate their rule.<\/p>\n<p>After supporting General Pinochet\u2019s coup in Chile in 1973, the CIA played a central role in Operation Condor, an alliance between right-wing military governments in Argentina, Brazil, Chile, Uruguay, Paraguay and Bolivia, to hunt down tens of thousands of their and each other\u2019s political opponents and dissidents, killing and disappearing at least 60,000 people.<\/p>\n<p>The CIA\u2019s role in Operation Condor is still shrouded in secrecy, but Patrice McSherry, a political scientist at Long Island University, has investigated the U.S. role and <a target=\"_blank\" href=\"https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9780203867907-14\/industrial-repression-operation-condor-latin-america-america-patrice-mcsherry\" >concluded<\/a>, \u201cOperation Condor also had the covert support of the US government. Washington provided Condor with military intelligence and training, financial assistance, advanced computers, sophisticated tracking technology, and access to the continental telecommunications system housed in the Panama Canal Zone.\u201d<\/p>\n<p>McSherry\u2019s research revealed how the CIA supported the intelligence services of the Condor states with computerized links, a telex system, and purpose-built encoding and decoding machines made by the CIA Logistics Department. As she wrote in <a target=\"_blank\" href=\"https:\/\/www.amazon.com\/Predatory-States-Operation-Condor-America\/dp\/0742536874\/ref=sr_1_1?crid=1ZSAR0BXTZW2&amp;dib=eyJ2IjoiMSJ9.Aj-otdeUNbmRYZ_dJfBH8a1_C8TMRLJ-curUyWQOkHgNQd4N4b8ha1irfNNK4PrsxwhgvP1wsTZCbrWIYgR5KEGsLlVXCPBjoHHSnsFpmBbKjajQxnGXDI8vCHaIDOx-LXjT-bX08nKNw9A6J2wx3g.oPsa30jxFBv1EwODCyNTBoQPxQwrWBpGYeQFpdOhHsw&amp;dib_tag=se&amp;keywords=predatory+states+McSherry&amp;qid=1712965658&amp;s=books&amp;sprefix=predatory+states+mcsherry%2Cstripbooks%2C104&amp;sr=1-1\" >her book<\/a>, <em>Predatory States: Operation Condor and Covert War in Latin America<\/em>:<\/p>\n<p>\u201cThe Condor system\u2019s secure communications system, Condortel,&#8230; allowed Condor operations centers in member countries to communicate with one another and with the parent station in a U.S. facility in the Panama Canal Zone. This link to the U.S. military-intelligence complex in Panama is a key piece of evidence regarding secret U.S. sponsorship of Condor\u2026\u201d<\/p>\n<p>Operation Condor ultimately failed, but the U.S. provided similar support and training to right-wing governments in Colombia and Central America throughout the 1980s in what senior military officers\u00a0<a target=\"_blank\" href=\"https:\/\/loveman.sdsu.edu\/supplement\/docs\/MajGenValenzuelaColRosello2004.pdf\" >have called<\/a> a \u201cquiet, disguised, media-free approach\u201d to repression and kill lists.<\/p>\n<p>The U.S. School of the Americas (SOA) trained thousands of Latin American officers in the use of torture and death squads, as Major Joseph Blair, the SOA\u2019s former chief of instruction\u00a0<a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=rCKCksmJpBg\" >described<\/a> to John Pilger for his film, <em>The War You Don\u2019t See<\/em>:<\/p>\n<p>\u201cThe doctrine that was taught was that, if you want information, you use physical abuse, false imprisonment, threats to family members, and killing. If you can\u2019t get the information you want, if you can\u2019t get the person to shut up or stop what they\u2019re doing, you assassinate them \u2013 and you assassinate them with one of your death squads.\u201d<\/p>\n<p>When the same methods were <a target=\"_blank\" href=\"https:\/\/znetwork.org\/zmagazine\/the-dirty-war-in-iraq-by-nicolas-j-s-davies\/\" >transferred<\/a> to the U.S. hostile military occupation of Iraq after 2003, <em>Newsweek<\/em><a target=\"_blank\" href=\"https:\/\/web.archive.org\/web\/20050110030928\/http:\/www.msnbc.msn.com\/id\/6802629\/site\/newsweek\/\" > headlined<\/a> it \u201cThe Salvador Option.\u201d A U.S. officer explained to <em>Newsweek<\/em> that U.S. and Iraqi death squads were targeting Iraqi civilians as well as resistance fighters. \u201cThe Sunni population is paying no price for the support it is giving to the terrorists,\u201d he said. \u201cFrom their point of view, it is cost-free. We have to change that equation.\u201d<\/p>\n<p>The United States sent two veterans of its dirty wars in Latin America to Iraq to play key roles in that campaign. Colonel <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/James_Steele_(United_States_Army_officer)\" >James Steele<\/a> led the U.S. Military Advisor Group in El Salvador from 1984 to 1986, training and supervising Salvadoran forces who killed tens of thousands of civilians. He was also deeply involved in the Iran-Contra scandal, narrowly escaping a prison sentence for his role supervising shipments from Ilopango air base in El Salvador to the U.S.-backed Contras in Honduras and Nicaragua.<\/p>\n<p>In Iraq, Steele oversaw the training of the Interior Ministry\u2019s Special Police Commandos &#8211; rebranded as \u201cNational\u201d and later \u201cFederal\u201d Police after the discovery of their al-Jadiriyah torture center and other atrocities.<\/p>\n<p>Bayan al-Jabr, a commander in the Iranian-trained Badr Brigade militia, was appointed Interior Minister in 2005, and Badr militiamen were integrated into the Wolf Brigade death squad and other Special Police units. Jabr\u2019s chief adviser was <a target=\"_blank\" href=\"https:\/\/herald-review.com\/special-section\/news\/limited\/sullivan-native-given-key-role-in-iraq-steven-casteel-named-senior-adviser-to-interior-minister\/article_701a781a-7894-594d-9a79-49a2afbdb21c.html\" >Steven Casteel<\/a>, the former intelligence chief for the U.S. Drug Enforcement Agency (DEA) in Latin America.<\/p>\n<p>The Interior Ministry death squads waged a dirty war in Baghdad and other cities, filling the Baghdad morgue with <a target=\"_blank\" href=\"https:\/\/www.globalsecurity.org\/military\/library\/report\/2006\/hr-report_unami_jul-aug2006.htm\" >up to 1,800<\/a> corpses per month, while Casteel fed the western media absurd cover stories, such as that the death squads were all \u201cinsurgents\u201d in <a target=\"_blank\" href=\"https:\/\/www.mcclatchydc.com\/latest-news\/article24447463.html\" >stolen<\/a> police uniforms.<\/p>\n<p>Meanwhile U.S. special operations forces conducted \u201ckill-or-capture\u201d night raids in search of Resistance leaders. General Stanley McChrystal, the commander of Joint Special Operations Command from 2003-2008, oversaw the development of a database system, used in Iraq and Afghanistan, that compiled cellphone numbers mined from captured <a target=\"_blank\" href=\"https:\/\/truthout.org\/articles\/how-mcchrystal-and-petraeus-built-an-indiscriminate-killing-machine\/\" >cellphones<\/a> to generate an ever-expanding target list for night raids and air strikes.<\/p>\n<p>The targeting of cellphones instead of actual people enabled the automation of the targeting system, and explicitly excluded using human intelligence to confirm identities. Two senior U.S. <a target=\"_blank\" href=\"https:\/\/archive.is\/KrF7L\" >commanders<\/a> told the <em>Washington Post<\/em> that only half the night raids attacked the right house or person.<\/p>\n<p>In Afghanistan, President Obama put McChrystal in charge of U.S. and NATO forces in 2009, and his cellphone-based \u201csocial network analysis\u201d<a target=\"_blank\" href=\"https:\/\/truthout.org\/articles\/how-mcchrystal-and-petraeus-built-an-indiscriminate-killing-machine\/\" > enabled<\/a> an exponential increase in night raids, from 20 raids per month in May 2009 to up to 40 per night by April 2011.<\/p>\n<p>As with the Lavender system in Gaza, this huge increase in targets was achieved by taking a system originally designed to identify and track a small number of senior enemy commanders and applying it to anyone suspected of having links with the Taliban, based on their cellphone data.<\/p>\n<p>This led to the capture of an endless flood of innocent civilians, so that most civilian detainees had to be quickly released to make room for new ones. The increased killing of innocent civilians in night raids and airstrikes fueled already fierce resistance to the U.S. and NATO occupation and ultimately led to its defeat.<\/p>\n<p>President Obama\u2019s drone campaign to kill suspected enemies in Pakistan, Yemen and Somalia was just as indiscriminate, with reports <a target=\"_blank\" href=\"https:\/\/foreignpolicy.com\/2009\/07\/14\/do-targeted-killings-work\/\" >suggesting<\/a> that 90% of the people it killed in Pakistan were innocent civilians.<\/p>\n<p>And yet Obama and his national security team kept meeting in the White House every \u201cTerror Tuesday\u201d to <a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/world\/2013\/jul\/14\/obama-secret-kill-list-disposition-matrix\" >select<\/a> who the drones would target that week, using an Orwellian, computerized \u201cdisposition matrix\u201d to provide technological cover for their life and death decisions.<\/p>\n<p>Looking at this evolution of ever-more automated systems for killing and capturing enemies, we can see how, as the information technology used has advanced from telexes to cellphones and from early IBM computers to artificial intelligence, the human intelligence and sensibility that could spot mistakes, prioritize human life and prevent the killing of innocent civilians has been progressively marginalized and excluded, making these operations more brutal and horrifying than ever.<\/p>\n<p>Nicolas has at least two good friends who survived the dirty wars in Latin America because someone who worked in the police or military got word to them that their names were on a death list, one in Argentina, the other in Guatemala. If their fates had been decided by an AI machine like Lavender, they would both be long dead.<\/p>\n<p>As with supposed advances in other types of weapons technology, like drones and \u201cprecision\u201d bombs and missiles, innovations that claim to make targeting more precise and eliminate human error have instead led to the automated mass murder of innocent people, especially women and children, bringing us full circle from one holocaust to the next.<\/p>\n<p>__________________________________________<\/p>\n<p style=\"padding-left: 40px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/02\/Medea_Benjamin_1-e1612415731362.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-178648\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/02\/Medea_Benjamin_1-e1612415731362.jpg\" alt=\"\" width=\"100\" height=\"113\" \/><\/a> Medea Benjamin is cofounder of <\/em><a target=\"_blank\" href=\"https:\/\/www.codepink.org\/\" ><em>CODEPINK for Peace<\/em><\/a><em>, and author of several books, including <\/em><a target=\"_blank\" href=\"https:\/\/www.orbooks.com\/catalog\/inside-iran-medea-benjamin\/\" >Inside Iran: The Real History and Politics of the Islamic Republic of Iran<\/a><em>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 40px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/07\/Nicolas-J.-S.-Davies-e1594113054428.gif\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-164428\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/07\/Nicolas-J.-S.-Davies-e1594113054428.gif\" alt=\"\" width=\"100\" height=\"100\" \/><\/a><em>Nicolas J. S. Davies is an independent journalist, a researcher with CODEPINK and the author of<\/em><a target=\"_blank\" href=\"https:\/\/www.amazon.com\/Blood-Our-Hands-American-Destruction\/dp\/193484098X\/ref=mt_paperback?_encoding=UTF8&amp;me=\" > Blood on Our Hands: The American Invasion and Destruction of Iraq<\/a><em>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>Medea Benjamin and Nicolas J. S. Davies are the authors of<\/em> <a target=\"_blank\" href=\"https:\/\/www.orbooks.com\/catalog\/war-in-ukraine\/\" >War in Ukraine: Making Sense of a Senseless Conflict<\/a>, <em>available from OR Books in November 2022.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>16 Apr 2024 &#8211; On Israel&#8217;s use of AI-generated kill lists in the Gaza genocide, and the CIA&#8217;s kill lists of thousands in country after country. How Israel&#8217;s Lavender is just the latest of the U.S. and its allies&#8217; ever-increasing use of information technology to automate mass murder.  <\/p>\n","protected":false},"author":4,"featured_media":259918,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3078],"tags":[1733,133,87,865,3264,88,3256,2524,715,427,70],"class_list":["post-259916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence-ai","tag-artificial-intelligence-ai","tag-cia","tag-gaza","tag-genocide","tag-idf","tag-israel","tag-lavender","tag-mass-murder","tag-massacre","tag-palestine","tag-usa"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/259916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=259916"}],"version-history":[{"count":2,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/259916\/revisions"}],"predecessor-version":[{"id":259921,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/259916\/revisions\/259921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/259918"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=259916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=259916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=259916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}