
55 minute read
c. Forensic Architecture
With the deterioration of local military conflicts and developed countries' involvement, the media are reporting on war zones, and increasing cases concerning architecture and the built environment have been brought before international courts. Most of the buildings in these cases play the role of perpetrators of violence against human beings, but they are also victims of war and witnesses to it, documenting the whole process of violence. The majority of buildings are reduced to mere remains and broken pieces of concrete, and these dilapidated buildings or ruins are often considered selfevident examples of atrocities. Thus in an environment where the issue of military violence is rife, architect Weizman attempts to transform the built environment from an account of alleged violations to a source about historical events or, rather, as a complex method that aims to narrate history from what it covers, Architecture as an evidentiary tool in the narration of the whole of violence26 . Weizman, Paulo Tavares, Susan Schuppli and Situ Studio describe how architecture has become more than a means of violation in conflict, as it has become an essential source of evidence in the search for international justice27. They created Forensic Architecture (FA) to showcase cities at war and to expose the human rights violations committed by certain countries. They document human rights violations in documenting urban conflicts through the movement of intelligent lenses and showcase them with international courts and public media.
FA's forensic techniques are often used through 3D modelling, allowing FA to create a virtual space and cross-reference it with OSINT, including human rights reports, news reports and social media content, to create a complete description of events in time and space as a simulation and footages28 . Afterwards, the evidence collected, the interactive scenarios created are handed over to the judiciary. In addition, FA's extensive forensic approach uses architectural specialised digital tools to simulate its understanding of the physical space in which a human rights event occurred in order to build a range of evidence based on the event. Combining victims' memories and OSINT in virtual scenarios and digital models guides surviving victims to recall memories of the violence they suffered and to obtain detailed testimonies29. Some victims, however, suffer from post-traumatic stress disorder and are reluctant to disclose past atrocities. Since 2014, the FA team has developed a PARRERN software that collects and shares real reports of people who have suffered violence anonymously via the internet30. These reports will be mapped in time and space to create an initial framework.
Advertisement
Furthermore, the FA usually investigates cases from the perspective of architecture and urban space. For example, during the 2008-2009 Gaza conflict, the Jordanian Coordination Committee for Environmental Action reported in a statement that the Israeli military offensive against the Gaza Strip
Figure 6 Footage techniques commonly used in FA: the combination of real pictures and virtual models. Artwork:Forensic Architecture.
26 Eyal Weizman, Paulo Tavares, Susan Schuppli, and Situ Studio. “Forensic Architecture.” Architectural design 80, no. 5 (2010): 59. 27 Weizman,Forensic Architecture. 60. 28 Sebastian Klovig Skelton. “How Forensic Architecture Uses Tech to Protect Human Rights.” ComputerWeekly. 2022. https://www.computerweekly.com/feature/How-Forensic-Architecture-uses-tech-toprotect-human-rights. 29 Skelton. How Forensic Architecture Uses Tech to Protect Human Rights. 30 Weizman. Forensic Architecture : What is Forensic Architecture. Brooklyn, NY: Zone Books,( 2017):114-118.
and its use of chemical weapons had not only killed thousands of Palestinians, It also destroyed the infrastructure and environmental resources of the area, including the contamination of water and agriculture31, but the Israeli government denied this report.The FA thus began to investigate the incident. Working with Munitions Expert Chris Cobb-Smith, they examined data reports on the use of white phosphorous munitions by the US military against Iras in 2004 to develop a parametric model that simulates the trajectory of a projectile detonated in various configurations in a typical urban environment32. The projectile's impact on the built environment at the urban and residential building scale was analysed, and it was found that the fumes claimed by Israel to be located over Gaza cities were none other than white phosphorus and referred to an international military tribunal33. The success of the case represents not only the forensic viability of cities and buildings as evidence in conflict areas but also as a challenge to authoritative governments.

Figure 7 Parametric modelling of white phosphorous shells exploding over Gaza .Artwork: Forensic Architecture.
31 Hana Namrouqa. “Environmentalists Call for Investigation into Israel’s Use of White Phosphorus.” Knight-Ridder/Tribune Business News. Washington: Tribune Content Agency LLC, 2009. 32 “Forensic Architecture.”Forensic-Architecture.org. 2019. https://forensic-architecture.org/investigation/white-phosphorus-in-urban-environments. 33 “Forensic Architecture.”Forensic-Architecture.org. 2019.
After analyzing three organizations in different disciplines, Bellingcat, Killing Architects, and Forensic Architecture, even though those organizations mostly rely on OSINT to investigate cases, the members of their organizations have different backgrounds and would have different investigative theories. Bellingcat's members are primarily journalists. They depend on existing empirical data to build theories in the investigation process and could not use the visualization of data as evidence of violence, similar to FA. When dealing with more complex cases, like those related to urban conflict, Bellingcat will work with FA or Killing, combining the digital capabilities of an architect or urban designer34. With a background in architecture and Urbanest, Killing's approach combines existing information with city models or digital maps, interspersing the whole story with city models or satellite maps. The audience can more clearly understand where and when the incident occurred. Moreover, the members of Forensic Architecture are mainly from the architectural discipline. They concentrate on integrating OSINT and digitization in the investigation of cases and the integration of open data into architectural and urban spaces. As a result, their findings are presented by adding parametric simulation videos to existing databases. Compared to Killing Architects, FA's investigation process is more complicated. They begin each case with a series of studies that include site visits, LiDAR scans, photogrammetry, and ground-penetrating radar as the use of digital models to locate and synchronize source materials in space and time35. In terms of digital modelling, the organization can accurately build out the crime space and then allow the actual film to be combined with virtual animation through cinematic techniques. From an aesthetic point of view, the investigation results presented by FA are more convincing compared to the first two. Overall, the three organizations depend on investigative data from OSINT, which they filter by finding this information in forums or databases that are open to all. Journalists and activists use these digital data sources to produce a public record of these human rights violations and provide links to available sources of information. Links to these sources of information can facilitate the investigation of cases by more individuals. These links have revolutionized traditional forensic science, allowing individuals to gather evidence of violent crimes through OSINT. In the meantime, these NGOs have encouraged the commons to better monitor the state's authority by uploading videos and pictures exposing state and military violence through social media.
Forensic Architecture Theory
After analyzing how existing non-forensic professional organizations analyze cases, it find that although architects originally conceptualized forensic architecture, architecture in this context does not refer to architectural design but an expanded field of exploration and study of space. The field is a new disciplinary area between architecture, urban environment, law, forensics and history. Forensic Architecture theory considers forensic objects a whole with people or spaces and buildings, or countries or societies because forensic objects are in constant evolution and are not static. Further, forensic architecture conceives of space/events as a hybrid of material and temporal distributed throughout the architectural field. In this section the theories of Forensis; Evidence; Aesthetics in forensic architecture will be introduced and how dose they connect in order to adopt these theories in Spatial Investigation of the Chinese embassy bombing in the third section.
Forensic has its origins in the Latin word forensis: "Pertaining to the forum"36. In Roman times the trial process was public, allowing the citizens to participate and encouraging them to give evidence concerning the case37. Thus, in Roman times, the forum was a platform for negotiating and giving evidence about the case to each other to understand the case better and investigate the truth, with evidence and forum being prerequisites for forensis. Furthermore, the most significant element in forensics is Fields and the Forum: Fields is not only a static area but also an active and abstract field, as investigators can map out the traces of a crime by searching for traces of the field38. Forum is a public discussion of a controversial object or site. In addition, in the investigation of a controversial object, many of the objects being explored are inanimate and challenging to narrate in the form of sound; for instance, rivers, wars, countries and other abstract objects often require a power of an aural demonstration to present the truth39. Hence, the Roman rhetorician The Quintilian called 'prosopopoeia' gave sound to inanimate objects through the rhetorical technique of anthropomorphism40. In the traditional courtroom , forensic anthropologists presented human remains as witnesses and interlocutors, recounting the violence suffered41. With today's technology, anthropomorphism will digitally manipulate objects, present abstract objects come to life in the courtroom in the form of video or pictures and in the narrative.
Forensic science does not only apply to courts and medicine today, but teams like the one by Weizman have opened up a new field of forensic science, studying violations by the state and challenging the state's authority. The shift in the object of evidence to the state is unprecedented and full of unknowns. This is because the object of state violence is not only a person or an object but can even a case that has already occurred and has been decided by the court. By forcing the court to change or destroy evidence through the state's authority, state violence is more likely to be denial and secrecy of evidence, the erasure of an event from history. In 2014, Forensic Architecture, together with Francesco Sebregondi, developed an open-source software named PATTRN42. The software allows the forum to evolve from a bounded space into an infinite open database, PATTRN enables its user community to share and collate first-hand reports of local events, then map the relationships between discrete events and make sense of the scattered pieces of information. The data is anonymously uploaded, reducing the risk of human identification. PATTRN operates by allowing participants to create a library of events with spatial coordinates and a timeline and add tags, media, and content to these events. The data is then collated in the backend cloud, allowing visualisation and a detailed map of the events. In this borderless Forum cloud, fragments of events can be collected and elaborated to create a complete visualisation of the data. Journalists play an important role in the PATTERN software, and most of the information is uploaded by journalists from different countries. In Event in which people died trying to reach Europe, journalists from 15 European countries uploaded data on the number of people who died in Africa trying to reach or stay in Europe43. From the visualized data, countless lives were found lost in the Mediterranean Sea and at the Greek-Turkish border. In 2015 Turkey closed its borders with the European Union in exchange for money and diplomatic favors, which effectively prevented the passage of refugees through Eastern Europe44, which explains why so many refugees died at the borders, and on the other hand this visualization can be used as evidence of state violence.
36 Anselm ,and Weizman . Forensis : the Architecture of Public Truth. Berlin: Sternberg Press,pp.9. 2014. 37 Oxford English Dictionary, 2nd ed. 38 Weizman, Forensis : the Architecture of Public Truth. 9-13. 39 Weizman, Forensic Architecture. 65. 40 Weizman, Forensis : the Architecture of Public Truth. 9-10. 41 Weizman, Forensic Architecture. 68. 42 Weizman, Forensic Architecture. 116. 43 Weizman, Forensic Architecture. 117. 44 William Spindler. “2015: The Year of Europe's Refugee Crisis,” UNHCR, December 8, 2015, https://www.unhcr.org/news/stories/2015/12/56ec1ebde/2015-year-europes-refugee-crisis.html.
In this bureaucratic situation, Weizman sought to change the status of forensic medicine by turning it into a counter-hegemonic discipline, aiming at reversing the relationship between the individual and the state through forensic perspectives, and ultimately making the tyranny of the state known45 . They have also developed a new understanding of Forum and Fields in forensics. Compare with Forensis,the collection of evidence in the modern Forensic is no longer collected by professionals but has moved to large internet databases where they can sort out more independently generated evidence, individual could be an investigator in searching case. The framework of this evidence is based on the experience of the abused, the accuracy of the evidence is ultimately improved by using satellite imagery or analyzing video evidence in the lab, mapping out traces of the crime, and presenting abstract objects in anthropomorphic ways46. Moreover, the modern forum is not just restricted to a limited space of communication but is increasingly spread across websites and media. By taking advantage of the rapid dissemination of information in the Internet age, the continuous indepth discussion of these kinds of social issues inadvertently puts pressure on the government to publicly admit and apologize for making changes.

Figure 8 Ancient Roman Forensis Forum

Figure 9 Fortress Europe: Visualization of the Migrants' Files datasets.As locasted by PATTRN. Artwork:Forensic Architecture.
45 Weizman, Forensis : the Architecture of Public Truth. 11. 46 Weizman, Forensic Architecture. 66.
Evidence is often based on objects that actually occurred and usually reveals facts by the changes that the objects suffered themselves. Evidence in forensic can be divided into direct evidence and circumstantial evidence, physical evidence, and reconstructive evidence47. Direct evidence includes statements and confessions of eyewitnesses or victims; physical evidence is the traces left at the scene of a violent crime through architectural debris; reconstructive evidence is the technical means to simulate the process of violence and bullet trajectories in a virtual scene, accurately indicating the location of the victim in the crime space and the exact manner and sequence of the crime events48 . Thus evidence can link the person to the crime or crime scene, combining the crime process, space and time. Simultaneously, detailed evidence has a conclusive role in the courtroom, and each piece of evidence presented can influence the outcome of the trial.
Despite the forensic architecture organizations collecting evidence by analyzing public data and probing social media, the methods of collecting evidence differ. According to the analysis of the three organizations in the first part of this article: When investigating social issues, Bellingcat usually first looks for news related to the issue or collects information posted by the government on the Internet. For example, in the case of the recently condemned Russian invasion of Ukraine, Bellingcat journalists relied on a large number of videos and images posted by civilians on social networks as evidence to expose the Russian government's political disinformation49. Killing Architects is more likely to base on observing changes in satellite maps as circumstantial evidence when investigating cases related to construction. In the case of the Chinese campus, they compared changes in Google satellite maps of Xinjiang with Chinese mapping software over several years and found what appeared to be a cover-up of certain areas of Xinjiang by the Chinese government50, as well as hundreds of campuses accommodating thousands of people, thereby serving as circumstantial evidence of human rights abuses by the Chinese government against Xinjiang's ethnic minorities. At the same time, FA is more focused on reconstructive evidence. When they work on the victim's testimony, they are more likely to reconstruct the scene from the victim's recollections51, and use architectural techniques to build precise models from the memories to allow the victim to recall the more detailed testimony in the virtual model.
Nevertheless, the evidence in Forensic Architecture is also problematic. Even though FA is able to perfectly simulate the process of violence and to obtain testimonies from victims' memories in digital models, the complexity of memory causes testimonies to be full of amnesic fragments and blank segments52, and consequently cannot rely on memory to paint a complete picture of the whole event. In addition, these non-forensic organizations do not have the same technology as developed countries or the military and they cannot accurately zoom in on satellite images. Therefore, this evidence is sometimes not strong enough to point to the criminal process of the perpetrator and the state violence.The viability and convincingness of evidence in forensic architecture are substantially constrained by technology and open-source.
47 Douglas P Lyle. “Types of Evidence Used in Forensics.” Dummies, March 26, 2016. https://www.dummies.com/article/academics-the-arts/science/forensics/types-of-evidence-used-in-forensics-138087/. 48 Lyle. “Types of Evidence Used in Forensics.” 49 Eliot Higgins. “Russia’s Bucha ‘Facts’ versus the Evidence.” Bellingcat, April 4, 2022. https://www.bellingcat.com/news/2022/04/04/russias-bucha-facts-versus-the-evidence/. 50 Rajagopalan."China Secretly Built A Vast New Infrastructure To Imprison Muslims." buzzfeednews, August 27, 2020. https://www.buzzfeednews.com/article/meghara/china-new-internment-campsxinjiang-uighurs-muslims 51 Weizman, Forensic Architecture.45. 52 Weizman, Forensic Architecture.128.
Aesthetics was primarily defined in Greek as anything closely associated with the senses53, but forensic aesthetics refers to the sensory capabilities of matter itself. Aesthetics is found in three important forensic contexts: Fields, Lab, and Forum54, where matter is the ability to refract and reflect its surroundings and is considered to be the embodiment of beauty because it is a constant record of the surrounding influences. In war, architectural remains and bones are a classic material aesthetic, and they can recognize as witnesses to the war because they are a continuous record of the surrounding environment through the traces on the walls of buildings or the process of decomposing bodies. Simultaneously in the lab, it is possible to react to details that are not visible to the naked eye by means of technologies as well as the age of the soil and simulated bombs hitting buildings. In addition, digitalization is used in the lab to combine techniques like film, photography and 3D modelling, to organize images and data, validate facts, assemble cases and compile narratives55 . Eventually, in the forensic forum, participants can present the investigation results they have collected, again with aesthetic embellishments to give authenticity to the data they have presented and to present the details of the events in a more perfect way. Forensic aesthetic modifications are usually narrative, dramatization and projection. The aesthetics are presented in the courtroom through visual displays, projections and digital simulations, which have a strong visual impact and an immersive feeling.
The concept of forensic aesthetics is perfectly demonstrated in the images produced by Richard Helmer, while later becoming an important method for investigating war crimes and human rights violations56. This case progressively changed the perspective of traditional forensic aesthetics, successfully turning a static object in the courtroom and modifying it into an anthropomorphic object through technology. After the suspected remains of Josef Mengele, the "executioner of Auschwitz", were discovered in 1984 in the suburbs of São Paulo57, German pathologist and photographer Richard Helmer overlaid video images of portrait photographs on video images of skulls through the video technique of "face-skull superimposition" to determine whether the two represented the same person58. By the time Mengele's skull appeared on the forum's screen, political aesthetics had been gradually sensitized to the fact that real images produced through technology were more effective in the realm of courtroom presentation and visualization.
However, occasionally forensic aesthetics is questioned in exhibitions showing a large number of videos and photographs. Peter Wollen argues that "The cinema cannot show the truth, or reveal it, because the truth is not out there in the real world, waiting to be photographed"59. Thus, the self doubts whether architectural analysis and digital modelling techniques can unravel the complexity of the case. The overuse of rhetoric, design and aesthetic means of constructing videos and images

Figure 10 Montage Aesthetics in display Conflict area. Artwork:Forensic Architecture
53 Lesley Martin.“Aesthetics.”Csmt.uchicago.edu. 2003. Csmt.uchicago.edu. https://csmt.uchicago.edu/glossary2004/aesthetics.htm. 54 Keenan, Mengele’s Skull : the Advent of a Forensic Aesthetics.67-71. 55 Weizman, Forensic Architecture.96. 56 Thomas Keenan, and Weizman. Mengele’s Skull : the Advent of a Forensic Aesthetics. Berlin: Sternberg Press, pp.55.2012. 57 Keenan, Mengele’s Skull : the Advent of a Forensic Aesthetics.14. 58 Keenan.56. 59 Peter Wollen."Godard and Counter Cinema: Vent d'Est ".(1976): 373.file:///C:/Users/RGB/Desktop/Semester%204/thesis%20studio/Wollen.pdf
can reinforce the viewer's conviction that what they are seeing is the truth. This materialistic way of expression only makes it easier to miss the hidden secrets behind the events. In the case of The killing of Tahir Elci (2019), the narrative structure does not allow the audience to understand the real reason why the victim was killed60, despite the fact that FA clearly conveys the course of events through the use of cinematic aesthetics using camera and scene transitions. This is the constraints of Forensic Aesthetics. But it is undeniable that architecture often plays a mediating role in cases involving urban ruins and spatial violence, and architects excel at simulating the space of events through collected data, using 3D models to locate multiple images in space and establish interrelationships. The aesthetics of constructing virtual models from spatial information in this way describes a new way of arguing in forensics, taking traditionally static objects and presenting the relationship between time and space in a montage of aesthetics.
Conclusion
In summary, by evaluating the four basic theories of Forensis; Forum, Evidence; and Aesthetic in Forensic Architecture, it is beneficial for the non-Forensic specialist to investigate cases through these theories and establish a preliminary case framework. The four theories are closely interrelated. The Forensis theory emphasizes the Forum as a public platform. Individuals can display the evidence they have investigated related to the case on the platform for the international tribunal trial.Forensic Architecture's Forum is not confined to traditional tectonic space but can be a social media or data cloud library. In addition, in Forensic Architecture, each case is composed of a relationship between different aesthetic perspectives. The new perspectives represent a new way of collecting evidence; for instance, the concrete wall is aestheticised to the blast; the cloud is aestheticised to the chemical gas in conflict areas 61. Thus the concept of aesthetics is of fundamental importance in FA theory, not only in terms of collecting evidence for a case but also in combining the rhetoric and architectural techniques as performativity and as a presentation tool in a Forum. In an international context of complex social issues and political conflicts, forensic architecture can be used as a groundbreaking theoretical tool in the international investigation of human rights violations. Forensic Architecture can be used as a groundbreaking theoretical tool in the international investigation of human rights violations.
Section III(The Investigation Of The Chinese Embassy In Kosovo War), this article will investigate the bombing of the Chinese Embassy in Yugoslavia by the U.S. government and NATO from these four theories. Due to the lack of open intelligence information on the incident reported by the Chinese government and NATO joint forces, this article cannot definitively analyze whether the bombing was an accidental bombing as officially reported by the U.S. and NATO or whether it was a deliberate attempt, but it will analyze whether there are inconsistencies in the U.S. military report and whether the Chinese government was hiding secrets at the embassy through the available opensource.
60 Deniz Johns."FORENSIC ARCHITECTURE: THE WHOLE TRUTH?" Millennium Film Journal, Fall 2021.https://link.gale.com/apps/doc/A683690348/AONE?u=usyd&sid=bookmarkAONE&xid=3420c4d0. 61 Weizman. "Forensic Architecture with Eyal Weizman." UNSW. May 5, 2022, https://www.youtube.com/watch?v=UL2dx66n7d8&list=PL50XnIfJxPDV4QnTChrS3z7sfvC5vvIyd&index=2.
Introduction: This chapter starts with the background of the Bombing chinese Embassy and the reasons for the military intervention of NATO forces in Yugoslavia. In the period from 1991 to 1992, nation-states other than Serbia and Montenegro gained independence from Yugoslavia, and the former federal polity gradually disintegrated as a result 62. However, the demarcation of the new borders led to a decade-long Yugoslav civil war between the former Yugoslav states. The war was marked by a series of horrific events, including genocide, crimes against humanity, ethnic cleansing and rape, and some 130,000 people died in the nearly decade-long civil war (Crisis in the Balkans)63 . The Milosevic government's campaign of ethnic cleansing and the killing of Albanians in Kosovo drew strong international condemnation. On March 24, 1999, U.S.-led NATO forces decided to launch a series of military campaigns against Yugoslavia to prevent ethnic cleansing, and this military interention end of 10th June64 .
From a political perspective, the Serbian capital of Belgrade, which was the capital of the government of the FRY for several years, has been the scene of numerous military operations. These military strikes included the Urban killings in Vukovar in 1991, the 1991 bombings of Dubrovnik, and the 1992 siege of Sarajevo, all of these brutal military orders came from the Generalstab complex in the city of Belgrade65. The Generalstab complex used to be the Yugoslav Army Headquarters and the Federal Ministry of Defense. The NATO attack did not appear to be an act of violence or a violation of human rights but more of the liberation of the former Yugoslav people. However, in this "justifiable" military strike, NATO forces also committed unjustifiable violations, bombing targets of strategic military importance as well as unreasonable targets as schools and hospitals66 .
62 Allan E Goodman and James E. "Yugoslavia, 1991-1992: Could Diplomacy have Prevented a Tragedy?". District of Columbia: Georgetown University. School of Foreign Service. Institute for the Study of Diplomacy, (1992): 5-9. https://search.alexanderstreet.com/view/work/bibliographic_entity%7Cbibliographic_details%7C3966296. 63 Noam Chomsky. "Crisis in the Balkans." Z Magazine, May, 1999. https://chomsky.info/199905__/. 64 Chomsky. "Crisis in the Balkans." 65 Nikolina Bobic. Operations of Force: NATO, Belgrade and the Inflection of Urbicide. The University of Sydney, (2014): 109. 66 Bobic.56.
Fig a: 08/05/1999 (Escape the fire ) B:2000- 2010
f : 2000 EPA C: after 2010
k :10/11/2010 ANDREJ ISAKOVIC b 17/05/1999 (AP Archive) c 17/05/1999 (AP Archive) d 17/05/1999 (AP Archive) e 17/05/1999 (AP Archive)
g 2001 SASA STANKOVIC h 2001 SASA STANKOVIC i 2001 SASA STANKOVIC j 2001 SASA STANKOVIC/EPA
l 10/11/2010 ANDREJ ISAKOVIC m 10/11/2010 ANDREJ ISAKOVIC n 10/11/2010 ANDREJ ISAKOVIC o 2021 Chinese Cultural Center
During the 78-day military airstrike, social infrastructure buildings like primary and secondary schools, hospitals, hospitals and hospitals were included as military targets, while the Chinese Embassy was also the target of bombing on the night of May 7. That night the U.S. sent B2 stealth bombers, the B2 being the ace U.S. military weapon, over the embassy, dropping five bombs on the main body of the building67. The incident resulted in the deaths of three Chinese journalists, Zhu Ying; Shao Yunhuan; and Xu Xinghu68. The images figure a to e, respectively, demonstrate the evacuation of survivors from the main embassy building on the night of the bombing, and the U.S. government's inspections of the site afterwards. After one decade, the Chinese government eventually decided to rebuild the embassy in 2010 and convert it into a Chinese cultural center. In terms of the international legal definition of embassies, they are legally considered to be the territory of the country they represent, despite that they are located in the territory of other countries69 . Thus, the bombing of an embassy can be seen as a challenge to the authority of a Sovereign.

Figure 11 icture combine with digital model (after air strike ) .Artwork: Junlong.
As the incident became increasingly serious, the U.S. government and NATO compensated and apologized to the Chinese families and reported that the incident was not directed at China but that multiple factors and errors by multiple branches of the U.S. government were responsible for the mistaken bombing. The U.S. government report was
Official reports from the U.S. Army and NATO indicate that the cause of the incident was attributed to the use of outdated maps by the U.S. Army in the development of the FDSP as a potential military target, using commercial maps from 1989 and 1996 and 199771. The actual situation FDSP was 350m away from the Chinese Embassy. And none of these maps mentioned the FDSP buildings and none of the maps accurately indicated the current location of the Chinese Embassy. As a result, an unknown coordinate was incorrectly used as the coordinates of the FDSP building, as well as not used to update the location of the other country's embassy in the planning of the military strike, and not detected in the follow-up target verification prior to the eventual military strike, resulting in the Chinese embassy being "accidentally bombed ". Consequently, It is difficult to understand from the report why obsolete maps were used in the military campaign because the world's number one military power with the highest satellite imagery, and it is difficult to explain the problem in the coordinates of the bombing target. Later in this chapter, it will simulate the methodology of Forensic Architecture to investigate the case, through combining digital modeling, journalistic research, and OSINT to analyze NATO and U.S. Army reports and examine potential evidence.
The bombing resulted from three basic failures. First, the technique used to locate the intended target--the headquarters of the Yugoslav Federal Directorate for Supply and Procurement (FDSP)--was severely flawed. Second, none of the military or intelligence databases used to verify target information contained the correct location of the Chinese Embassy. Third, nowhere in the target review process was either of the first two mistakes detected…. that the targeted building was not the FDSP headquarters….was in fact, the Chinese Embassy--was ever consulted70 .
Figure 12 The Chinese Embassy and the target building FDSP are on the same street, approximately 350m distance.Artwork: Junlong.

Despite the building was reconstructed as a modern building, and the walls can no longer record the military violence of that period, the war violence of NATO forces against Yugoslavia and the fact of bombing Chinese Embassy cannot be removed. In order to gain a deeper knowledge of the case, photos of the building's interior taken by Western media and reports given by the Chinese government were combined with digital models to understand the location of the five bombs of the bombing and the direction of their trajectory. According to the report from Chinese government ,figure 13 displays that the first bomb penetrated the entire building and exploded on the first floor and figure 15 illustrates the trajectory of the first bomb and and the location of the explosion in the basement. Delayed detonation of bombs is usually programmed into the fuse in advance. In addition, according to Thomas Withington in his book "B-2A Spirit Units in Combat", the bomb used in this incident was the Joint Direct Attack Munition (JDAM)GBU 3172. This bomb was GPS/INS guided (the GPS, INS and WGS relationship will explain later in the "Evidence Section") and had an accelerometer-based electronic fuse at the front of the GBU31 bomb that could be controlled by the number of layers, distance or time of triggering73. When the bomb penetrates the target, the gas pedal senses the G-load on the bomb due to deceleration. And the fuze can distinguish between land, concrete, rock and air74. Hence that can confirm the first bomb was dropped after the next level of triggering was pre-programmed by the U.S. military, and also represents whether there is a military target on the first floor or merely to strike the building structure.

Figure 13 A bomb penetrated from the fifth floor(Combine STANKOVIC' photo with Digital model ).Artwork: Junlong.
Figure 14 Plan of Chinese Embassy Bombing(Chinese xinhuanet).Interpretation:Junlong.
Figure 15 Trajectory of the first bomb in Digital model. Artwork: Junlong.


According to the U.S. Army report they were targeting the FDSP building and they accidentally bombed Chinese Embassy, then It can seem that the U.S. Army's first bomb was aimed at the FDSP basement level. However, there is no available information on the FDSP building floor plan to confirm whether the FDSP had a subterranean level. Assuming the FDSP had a subterranean level, it would be reasonable for the U.S. military to pre-program the bomb fuse. Conversely, if the FDSP building did not have a subterranean level, then there are serious inconsistencies in the U.S. Army's post incident report. Hence, If the hypothesis non-existent basement is valid, the basement level of the FDSP building could be used as circumstantial evidence to challenge the US Army report. Consequently, under the condition that spatial investigation is limited by open source, the decisive evidence of the case can be found by assuming the potential of the investigated subject, besides it is possible to study the case from a different aesthetic perspective. The next part will introduce the study from a Journalism perspective.
FDSP (Logistic Building)
Chinese Embassy

Ground
Logistic Building has a basement or not
Figure 16 Digital Model Investigation (FDSP).Artwork: Junlong.

Figure 17 Footage of Chinese Embassy .Artwork : Junlong.
The inability to confirm the internal structure of the FDSP building, it caused the spatial investigation to be shifted to the Chinese Embassy building to investigate whether the Chinese Embassy may have the targets of U.S. military strike. In forensic architecture, researchers will generally establish a new case framework by gathering existing news. According to the investigation of multiple media reports about the Embassy, two suspected military targets inside the Chinese Embassy were revealed. The first potential target: In August-October 1999, several Western media outlets had published that NATO forces had found Yugoslav radio communications signals coming from the Chinese Embassy. One of the intelligence officials in Macedonia stated that on the night of April 23, communications signals from Yugoslav President Milosevic's lodgings disappeared after being bombed that night75 , when they reappeared in the air, NATO discovered that the signals were coming from the Chinese Embassy. During this 78-day military air campaign, it was discovered that most of NATO's primary military target was the communications base stations. Therefore, Yugoslav communication stations inside the Chinese Embassy could be considered a motive for the crime in the forensic evidence theory, but it does not directly prove that NATO intentionally bombed the Embassy. Another suspected military target is the wreckage of a U.S. F-117 stealth bomber hidden inside the Chinese Embassy. On March 27, 1999, one of the U.S. Air Force's most technologically advanced stealth aircraft was shot down by the Seriban army76. Some reports claim that the aircraft's wreckage was subsequently transported to the Chinese Embassy, giving the Chinese government access to military secrets of aviation77. However, the Chinese government denied this claim and denied the presence of the F-117 wreckage at the Embassy78. It is impossible to know whether the Chinese government had involvement with the F-117 wreckage from the media news reports. Although suspicions were found during the investigation of the news reports, and these suspicions may have been indirectly responsible for the incident, they were not supported by evidence and could not be used as valid evidence for the case in the Forum. This is the constraint of Journalism in forensic architecture, as it relies on existing reports to establish the framework of the case. For this reason, the Weizman team and Killing Architects team combined press and media sources with their data collected through OSINT during the case investigation. In the next section will analyze the potential evidence of presence in the maps collected from OSINT.
75 Chris Marsden. "British newspaper says NATO deliberately bombed Chinese embassy in Belgrade." World Socialist Web Site. 19 October, 1999. https://www.wsws.org/en/articles/1999/10/chin-o19.pdf 76 Richelson Jeffrey T. "When Secrets Crash." AIR FORCE Magazine. July 2001: 62. https://www.airforcemag.com/PDF/MagazineArchive/Documents/2001/July%202001/0701crash.pdf 77 Altin Kukaj. "The Implications of the 1999 U.S. Bombing of the Chinese Embassy in Belgrade on Contemporary Sino-American Relations: A Theoretical Analysis". Senior Theses.(2019): 45. 78 Ponniah."The night the US bombed a Chinese embassy." BBC News. May 7,2019.
In the previous part of the article, two different areas were described to investigate the digital model case and the Journalism investigation. However, there are limitations due to the lack of relevant data in the architectural model and evidence to support the Journalism perspective. The following two parts will focus on analysing OSINT from different forensic aesthetic perspectives and the discovery of some new potential evidence from MAP and Satellite imagery.
Figure 18 Belgrade city map, Portion of Beograd Serbia City Graphic 1:15,000 Edition 2-NIMA,Sheet 2,National Imagery and Mapping Agency. Artwork:Junlong .
24


After finding this map of Belgrade in the English version, it is necessary to know which country it is published in. Figure 19 was found to be from the National Imagery and Mapping Agency, which was established in 1996 as an agency of the U.S. government to collect, analyze, and disseminate geographic intelligence for national security purposes79. Hence, the map could be used for military activities, probably for the military intervention in Yugoslavia in 1999.
Time Information
Secondly, the text in the red line in the Figure21 illustrates when the map information was updated: Map Information updated with 1997; Embassy and Bridge updated in 1999; Street name and numbered feature information as of 1998. Thus the geographic location of the Chinese Embassy is possible that it was updated in 1999, which is consistent with the U.S. report that they used the 1996 and 1997 versions of the map80 . There is a possibility that the location of the Chinese Embassy was not updated. Paradoxically, in a July 22, 1999 court, U.S. C-I-A Director George Tenet admitted that U.S. diplomats had visited the Chinese Embassy in Belgrade in 199781and admitted court: We have also found one report from 1997 that gave the correct address of the Chinese Embassy82. These testimonies prove that the U.S. government had the exact location of the Chinese Embassy in 1997. It is noticeable that in court, the U.S. consistently persisted in its argument that the 1997 version of the map they used did not have the exact location of the Chinese embassy entered into the database83 . However, the U.S. government has known the coordinates of the Chinese embassy in Belgrade since 1997. It is difficult to explain that the U.S. government did not know the location of the Chinese embassy during the Yugoslav air strikes.Moreover, it has a logical contradiction between the official reports of subsequent incidents and the testimony .
Figure 19 National Imagery and Mapping Agency

Figure 20 Belgrade map Figure 21 (From map top)

79 https://www.nga.mil/defining-moments/National_Imagery_and_Mapping_Agency.html 80 Pickering. "Oral Presentation to the Chinese Government: Regarding the Accidental Bombing of The P.R.C. Embassy in Belgrade." 81 George Tenet.“USA: CIA DIRECTOR TESTIFYS OVER BOMBING OF CHINESE BELGRADE EMBASSY.” AP Archive, July 22,1999. https://www.youtube.com/watch?v=gtpTh8U_ST4&t=59s 82 Tenet. 83 Pickering. "Oral Presentation to the Chinese Government: Regarding the Accidental Bombing of The P.R.C. Embassy in Belgrade."
Chinese Embassy FDSP(Logistic Building)
Map Notes

Figure 22 Belgrade Map (Yellow Blocks are Military Buildings). Artwork: Junlong.
Map Notes
The National Imagery and Mapping Agency has mastered the structure of the city of Belgrade and has numbered and categorized the urban building complexes from the notes below the map. In particular, they have marked the building clusters of Government Buildings and Military Establishments. The yellow parts of the map numbered 71-79 military buildings, and the red parts were government buildings. Therefore, during the military intervention in Yugoslavia in 1999, these governmental and military buildings were the real targets of U.S. and NATO humanitarian intervention. However, the FDSP building, a target of U.S. military strikes on the night of May 784, is neither a Government Building nor a Military Establishment, but why is it a military target. Ironically, in previous military campaigns, NATO and the U.S. military have conducted military strikes on homes, elementary schools, and hospital buildings85. Referring to previous military operations that were in violation of humanitarianism, it would not be surprising to attack an FDSP building that was outside the scope of the military target.
The numbering at the bottom reveals vital information about this map, but from the perspective of traditional aesthetics, this information is merely a numerical code. Without the aesthetics of words, it is hard to gain relevant information about the case. In contrast, forensic architecture escapes traditional aesthetics through the multiplicity of aesthetics and sensitivity as a resource for investigation86. The forensic is essentially aesthetic, it depends on the perspective and direction of the view of the subject, and by considering these numbers from a different perspective, there might be an essential tool to unravel the case.
NSN
The full name of the NSN is NATO Stock Number, or National Stock Number, which is a permutation of 13 Arabic digits, each of them representing a separate piece of data stored in the NATO database87. A search of the NATO database for NSN in Figure 24 indicates that the map is U.S. Army Department of Defense data. From this, it can be determined that the map is a U.S. Army map and has the potential to be referenced in the war.
WGS 84
The World Geodetic System 1984 (WGS 84) is a three-dimensional coordinate reference frame (Figure 26) used to establish latitude, longitude and altitude for navigation, positioning and targeting for the Department of Defense, I.C., NATO, the International Hydrographic Bureau and the International Civil Aviation Organization88. Simultaneously the WGS 84 system is the reference positioning system for the GPS, and the coordinates in GPS are derived from the WGS 84 system data89 .


Figure 23 Belgrade map
Figure 27 Embassy of China had been signed


Figure 26 WGS 84 System Diagram Figure 24 Map Number Reference
Department of Defense
Figure 25 Search on NSN Lookup
As a result, combined with the map in the NSN originated from the U.S. Department of Defense, it confirms that this map was not only used on the battlefield of Belgrade in 1999, but the GPS positioning relied on by the U.S. military weapons was based on this WGS 84 system. The map coordinates would have been displayed in the GPS as well. Confusingly, the Chinese embassy was already marked on this map by the U.S. military, and the location of the Chinese embassy was already recorded in this WGS 84 system, but why would the JDAM bombs that relied on GPS positioning still drop on the Chinese embassy. After forensic investigation of the map, it can be concluded that although the U.S. government used an outdated map and mistakenly used the Chinese Embassy location as the FDSP when drawing up the bombing target, the GPS coordinates for the JDAM bomb would have been set prior to military operations and would detect the target building as exactly the Chinese Embassy. However, the U.S. military never found out, and the only potential explanation is that the U.S. military GPS was not calibrated based on WGS 84 prior to the operation, resulting in the Chinese Embassy coordinates being shown in WGS 84 but not updated in the GPS. In official report, the U.S. government mentioned that they did not update the database90, but it is not known if the database in the report refers to the GPS database.
Overall, the information on maps in forensic architecture is not only expressed in contour lines and building clusters, but some more valuable information is hidden behind the numerical figures. In the next section, potential evidence will be looked at from a map aesthetic perspective.
90 Pickering."Oral Presentation to the Chinese Government: Regarding the Accidental Bombing of The P.R.C. Embassy in Belgrade."
Satellite maps can generally accurately record changes in the geographic landscape over time and can assist in detecting changes in urban architecture by comparing satellite images produced at different times91. In forensic architecture, satellite imagery can be used as Geospatial Evidence to reveal long-term social problems and demonstrate the extent of architectural destructions during the conflicts92. The Weizman team and Killing Architects studio typically use remote sensing to collect data from Earth orbits and aerial platforms, using Geospatial Investigation to demonstrate the case process.
Fifth JDAM Bomb
Satellite maps will be the new aesthetic tool to analyze the case of the bombing the Chinese embassy. Although the 1997 Google-satellite map of the Chinese embassy is available, the satellite map of the FDSP from 1997-to 1999 is missing; thus, the 2000 G-satellite maps are used to ensure that the same period is used. Figure 28 and Figure 30 from Xinhuanet show the approximate location of the five bombs of this bombing, and the fifth JDAM bomb attacked the Official Residence of the Chinese Embassy. The location of this fifth bomb is an essential part of the forensic evidence in this chapter.

Figure 28 Plan of Chinese Embassy Bombing(Chinese xinhuanet).Interpretation:Junlong.

Fifth JDAM
1997 Chinese embassy Figure 29 Architectural Properties of Chinese Embassy.Artwork: Junlong.
Figure 30 Location of Five bombs fell on Chinese Embassy Bombing(Combination with diagram and satellite maps). Artwork:Junlong.

Figure 31 2000 Chinese embassy.Artwork:Junlong. Figure 32 Location of Five bombs fell on Chinese Embassy Bombing. Artwork:Junlong.

Figure 33 2000 FDSP(Logistic) Building.Artwork:Junlong. Figure 34 Overlap Chinese Embassy and FDSP(logistic) building. Artwork:Junlong. Red :Chinese Embassy Purple: Logistic Building
According to official US military reports they were targeting the FDSP building, but an unknown coordinate was incorrectly used as the coordinates of the FDSP building93, thus it can be understood that the US forces had pre-programmed the bombs to explode in the position based on the FDSP building structure, but the wrong coordinates were used to drop the bombs. However, according to the 2000 Google satellite images it depicts the square footage of the Chinese Embassy and FDSP buildings and then overlay the floor space of the two buildings, it was found the part of the Chinese Embassy was not within the overlap area, and the fifth bomb targeted this part of the building. This represents that if the US forces were targeting the FDSP building, then the main building of the Chinese Embassy was in the area of the mistaken bombing. But the building of the Official Residence was not part of the target area, and the fifth bomb attacked precisely on this building.
93 Pickering. Oral Presentation to the Chinese Government: Regarding the Accidental Bombing of The P.R.C. Embassy in Belgrade.
Outside of Range

Figure 35 13m range from the main building to the outside. Artwork:Junlong.

figure 27's perspective
Wall Figure 36 Percentage of floor space within and outside the margin of error.Artwork:Junlong.
Wall

Figure 37 Artwork:Junlong. Figure 38 US Embassy officials observe the circumstances (May 17,1999).Artwork:Junlong.
Since the fifth bomb hit a building in close proximity to the main building, this can be explained by the accuracy of the GPS guidance, which is 13 m for JDAM GBU-3194, then all 13 m of the perimeter of the target building can be considered to be within the range of the military target(Figure 35). As a result, extending the northwest side of the building outwards horizontally by 13m, part of the Embassy residence was found to be within the margin of error. Nevertheless, due to the lack of precise data on the exact location of the fifth bomb, the potential for the fifth bomb to hit a military target can only be estimated by probability. By official residence roof area within the predicted JDAM hit error range likelihood, approximately 23.3% of the area was within the military target error range, but the remaining 76.7% was outside of the range. In addition, Figure 38 Shows a picture of the area between the main embassy building and the official residence, it can find that although the red wall in the picture had broken, the overall structure remains intact.Hence, it can be concluded that the bomb did not hit the side of the wall close to the picture. Therefore, less than 23.3% of the official residence area could have been attacked by the bomb. From a probability perspective, the fifth bomb's probability of dropping within the target range is considerably lower than outside the range. This bomb will likely strike an official residence outside the error range. The GPS-guided, highly accurate JDAM bombs can not explain why the fifth bomb landed on a building outside the margin of error. Although there is a high probability that the fifth bomb struck a building outside of the target range, probabilism is not sufficient evidence to be used in forensic architecture thus the exact bombing coordinates of the fifth bomb are still required. If this coordinate is within range, it can be explained as a guidance error, and if it is outside of range, it can be used as evidence to question whether the US military deliberately set the explosion location of the fifth bomb to a building outside of the target in their GPS programming of the bomb. Coincidentally, this off-target building is an official residence on the plan of the Chinese Embassy, whether this is a coincidence or a hidden story.


Figure 39 The latest street view of the former FDSP building. Figure 40 The words on top of the building can be clearly seen as "IMMPORT- SDPR".

Figure 41 April 2000, FDSP Building (Google Earth). Artwork:Junlong.
Figure 42 March 2022, FDSP Building (Google Earth). Artwork:Junlong. Moreover, FDSP was a Yugoslavian company engaged in importing and exporting defencerelated equipment95. Thus FDSP, as a military building, was a potential target for NATO and U.S. forces to strike. On the night of the 45th day of NATO and U.S. airstrikes on Yugoslavia, U.S. forces accidentally attacked the Chinese Embassy as a strike initially on the FDSP96. This part will investigate the possibility that the FDSP as a target building was attacked militarily in the following 33 days. According to the most recent satellite street view picture (Figure 40), the FDSP headquarters were not searched, and the previous "Bulevar umetnosti 2" location is now the IMMPORT-SDPR building. This implies that the FDSP has disappeared from Belgrade, and it is likely that the building was destroyed during military attacks. However, from the case of the Bank of New York lawsuit against the FDSP, it mentioned that in September 1996 the Yugoslav government issued a new organic law, declaring in the Commercial Court of Belgrade that the FDSP was officially reorganized as the Yu-goimport SDPR, and the address of the building was still "Bulevar umetnosti 2"97. And from SDPR's official web seems that IMMPORT-SDPR on the map today is the original FDSP headquarters, and this building is still engaged in the import and export of defence-related equipment today98. Moreover, Yugoslavia was under international economic sanctions for 7.5 years before the war began99,reconstruction of the city did not begin immediately after the war ended. Many of the destroyed buildings were kept in the city for several years before reconstruction began. The former Yugoslav Ministry of Defense Generalštab did not start reconstruction until 2013100. Thus if FDSP was attacked in 1999, the building would remain in ruins in the satellite map of 2000. Furthermore, by analyzing google maps from 2000(Figure 41) and the latest version of google maps(Figure 42), it discovered that the outer outline of the FDSP building, which was the military target on the night of May 7, has remained unchanged. That demonstrates the building was more likely never bombed by military strikes in 1999. Consequently, the building was supposed to be hit by airstrikes on May 7, but never suffered any military strikes. It is once again difficult to explain whether the real target of the U.S. bombers that night was FDSP headquarters or the Chinese Embassy.

95 Pickering. Oral Presentation to the Chinese Government: Regarding the Accidental Bombing of The P.R.C. Embassy in Belgrade. 96 Pickering. 97 Ralph Karl Winter. "Bank of New York v. Yugoimport, 745 F.3d 599." United States Court of Appeals, Second Circuit. Aug. 29, 2012. https://cite.case.law/f3d/745/599/ 98 https://www.army-technology.com/contractors/infrastructure/yugoimport-sdpr/ 99 Daniel Williams. "Decades, Billions Needed to Restore Yugoslavia." Washington Post Foreign Service. June 5, 1999: Page A1. 100 Gruia Bădescu. “Making Sense of Ruins: Architectural Reconstruction and Collective Memory in Belgrade.” Nationalities papers 47, no. 2 (2019): 182.
This section reviews the case of the 1999 bombing of the Chinese Embassy in Yugoslavia from a forensic architectural perspective. The purpose of examining the case is to evaluate whether there are conflicting reports from the U.S. government and the Chinese government about the case and to investigate potential evidence. Both governments attempted to use political aesthetics to create a rhetorical set of governmental aspirations in the post-case period. The U.S. government, as the perpetrator, emphasized that they caused the incident by using outdated maps that did not indicate the location of the Chinese embassy. The Chinese government, as the victim, used linguistic aesthetics to convince the Chinese people that it was a deliberate bombing by the U.S., rather than delving into the case and searching for evidence that the U.S. intentionally bombed the embassy. In order to escape from the political aesthetics and to gain a deeper understanding of the case, several potential pieces of evidence are elaborated from four forensic architectural perspectives: building a 3d model, journalistic investigation, studying Belgrade maps and analyzing satellite maps, respectively. Combining the 3D model with the findings in the post-event scene, a U.S. bomb passed through the Chinese Embassy and exploded on the underground level. The bomb was pre-programmed to explode on the ground floor of the target building (FDSP). Therefore whether the building had a ground floor or not would be an important twist in the case. Reports in several Western media outlets have pointed to the Chinese Embassy's hiding fragments of U.S. F-117s and the presence of communication radios used by the Yugoslav Army. Forensically these objects could be considered potential motives for the perpetrators of the crime. The number reference in Belgrade's map indicates that the location of the Chinese embassy was shown in WSG 84 as the calibration system for the U.S. military's GPS. Still, ultimately the U.S. military GPS bombs struck the Chinese embassy nonetheless. And the location of the fifth U.S. bomb in the satellite maps is circumstantial evidence to question why the U.S. military was outside the target building when pre-programming the location of the fifth bomb. The satellite map also found that the FDSP building as the target was still intact, contradicting the official report that the FDSP was a military target. In summarizing the findings in the four directions above, while not directly proving that the U.S. forces bombed intentionally, it is reasonable to challenge the official U.S. government report and question whether the real target of the U.S. forces on the night of May 7 was the FDSP or the Chinese Embassy.

IN SUMMATION
The article aims to explore the re-examination of the mistaken bombing of the Chinese Embassy in Yugoslavia that occurred in 1999 from a forensic architectural perspective. The thesis does not involve an attempt to conclude whether the incident was a mistaken or deliberate bombing. Instead, it concentrates on gathering potential evidence from OSINT to challenge the reports of both governments. Insufficient information resulted in some of the evidence being presented based on hypotheses following the analysis. But the analytical approach to collecting evidence is based on the theory of forensic aesthetics proposed by Weizman, a leading figure in forensic architecture. The fundamental concept of forensic architecture is established with urban destruction, which architecturally depicts the effects of military violence on urban space, with spatial elements such as walls and fortifications being deployed as agents and agents of war101. In forensic theory, architecture is reframed as an amalgamation of multiple independent aesthetic elements, each representing a new perspective on the case and the tools to present it. Furthermore, Forensic architecture pursues the re-viewing of cases from different standpoints: backtracking from fragments of information or memory, fieldwork through advanced digital models as simulations, and testing forensic data from and through reconstructed crime scenes102. And by studying images of cases, audio files, government testimonies, and political connections that are brought together to create a forensic "portfolio", cases that happened in the past are allowed to be presented in a new aesthetic form.
Nowadays, increasing numbers of non-governmental institutions are trying to use architecture as a tool in forensics to unlock new perceptions of the political, judicial and territorial, and religious spheres and to challenge the authority of governments and expose their criminal violence.
101 Bobic. Operations of Force: NATO, Belgrade and the Inflection of Urbicide. 255. 102 Sława Harasymowicz. "Book Review: Eyal Weizman, Forensic Architecture: Violence at the Threshold of Detectability."Journal of Visual Culture 16, no. 3 (December 2017): 392–95.
Limitation and Further Research
There is still plenty of further research in this article, especially in the section on the investigation of the Chinese Embassy. Because of the case's complexity, the history of the case is 23 years ago, and the Internet was not well developed at that time. There is limited information available on the Internet today. Therefore, this article cannot directly determine whether the Chinese Embassy was bombed by mistake or intentionally. However, this article analyzes several pieces of evidence that could be used as circumstantial evidence to challenge the U.S. military's report. And It is reasonable to wonder whether the Chinese government is deliberately covering up some of the critical evidence. Therefore, open-source intelligence can be collected either through field trips to Belgrade or through the government to collect information in future investigations. Because all sovereign states have a database called "Freedom of Information" for the general public to understand what the government did103. Although it is possible to request data and information related to a case from the government through Freedom of Information, the government's response is slow. Usually, it takes six months, and there is a high probability that the request will be denied. In early May, when writing the Map Evidence section of this article, a request to the Serbian government for maps of the city of Belgrade from 1996 and 1997 did not receive a response. These two maps are the identical erroneous versions of maps used in the U.S. Army report. Hence, it probably can play a decisive role in examining whether the U.S. Army report is contradictory. Simultaneously, open-source intelligence can also be affected by political circumstances. In today's closed political context in China (human rights issues), there is a high probability of rejection when requesting government information from today's Chinese government, which is part of the limitations of investigating the case. The victim government is unwilling to reveal much information about whether the Chinese Embassy hid F117 debris. Instead, it constructs ideal government rhetoric through aesthetics to inflame people's emotions and make them believe that the U.S. military deliberately bombed the embassy, ultimately achieving the people's anti-American goals. There is actually one more piece of evidence in this article that proves that NATO was not involved in the mistaken bombing of the Chinese Embassy. The evidence is a NATO audio file recorded by NATO military spokesman Maj. Gen. Walter Jertz describing the air attacks on Yugoslavia for Day 46, May 8:
This light show us fixed targets, as you can see, we strike Air Defence and commend and control targets. Including again NOVISAD;KRUSEVAC;IVA NJICA....strike victory production facilities. Lines of communication and other military targets as shown. Serbia Air Defence will light and all of our crafts happy to see return safety104 . The audio from May 8 does not contain any information about NATO military operations in Belgrade on May 7, and therefore proves that NATO was not directly involved in and commanded this operation.This evidence was not investigated in depth due to time constraints, but this could also be the focus of the further investigation Notwithstanding the limitations of the investigation process, there is much potential evidence beyond this article on the FDSP and the Chinese Embassy Building in Belgrade that may require a new discipline of forensic aesthetics rather than an architectural perspective.
Anthony,Sebastian. “Malaysia Airlines Flight 17 Shot down in Ukraine: How Did They Do It?” ExtremeTech.com (2014). Bădescu, Gruia. “Making Sense of Ruins: Architectural Reconstruction and Collective Memory in Belgrade.” Nationalities papers 47, no. 2 (2019): 182–197. Bellingcat. “‘A Birdie Is Flying towards You’ Identifying the Separatists Linked to the Downing of MH17.” n.d. Accessed April 19, 2022. https://www.bellingcat.com/app/uploads/2019/06/a-birdie-is-flying-towards-you.pdf. Bernstein, Fred A. “Newsmaker: Alison Killing.” Architectural Record 209, no. 8 (2021): 21. Bobic, Nikolina. Operations of Force: NATO, Belgrade and the Inflection of Urbicide. The University of Sydney, 2014. Buzzfeed news." China Secretly Built A Vast New Infrastructure To Imprison Muslims." Buzzfeed news, August 27, 2020. https://www.buzzfeednews.com/article/meghara/china-new-internment-camps-xinjiang-uighurs-muslims Chomsky, Noam. "Crisis in the Balkans". Z Magazine. May, 1999. https://chomsky.info/199905__/. Comparitech.“Is Google blocked in China and how can you access it?”. 2022. https://www.comparitech.com/privacysecurity-tools/blockedinchina/google DEFENSE MAPPING AGENCY WASHINGTON DC. Department of Defense World Geodetic System 1984: Its Definition and Relationships with Local Geodetic Systems. Second Edition. September 1, 1991: 2-3. Diffen. “Consulate vs Embassy - Difference and Comparison | Diffen.” n.d. Www.diffen.com. https://www.diffen.com/ difference/Consulate_vs_Embassy. Elmes, Gregory A, George Roedl, and Jamison Conley. Forensic GIS: The Role of Geospatial Technologies for Investigating Crime and Providing Evidence. Vol. 11. Dordrecht: Springer Netherlands, 2014. Franke, Anselm., and Eyal. Weizman. Forensis : the Architecture of Public Truth. Berlin: Sternberg Press, 2014. Forensic-Architecture. “Forensic Architecture.” 2019. Forensic-Architecture.org. 2019. https://forensic-architecture. org/investigation/white-phosphorus-in-urban-environments.
GISGeography. “World Geodetic System (WGS84).” GIS Geography, October 6, 2015. https://gisgeography.com/ wgs84-world-geodetic-system/. Goodman, Allan E. and James E. Bjork. Yugoslavia, 1991-1992: Could Diplomacy have Prevented a Tragedy?. District of Columbia: Georgetown University. School of Foreign Service. Institute for the Study of Diplomacy, 1992. https://search.alexanderstreet.com/view/work/bibliographic_entity%7Cbibliographic_details%7C3966296. Harasymowicz, Sława. “Book Review: Eyal Weizman, Forensic Architecture: Violence at the Threshold of Detectability.” Journal of Visual Culture 16, no. 3 (December 2017): 392–95. https://doi.org/10.1177/1470412917737513. Higgins, Eliot. “Russia’s Bucha ‘Facts’ versus the Evidence.” Bellingcat. April 4, 2022. https://www.bellingcat.com/ news/2022/04/04/russias-bucha-facts-versus-the-evidence/.
Ilyuk, Yuliya. 2019. “Journalistic Investigations in the Digital Age of Post-Truth Politics: The Analysis of Bellingcat’s Research Approaches Used for the (Re)Construction of the MH17 Case.” Perekrestki, no. 1: 56–78. http://journals.ehu. lt/index.php/perekrestki/article/view/977.
Jertz, Walter.Strategic Targets in Day 46. CNN, May 13, 1999.http://edition.cnn.com/WORLD/europe/9904/01/nato. attack.03/nato.maps/#44
Keenan, Thomas, and Eyal. Weizman. Mengele’s Skull : the Advent of a Forensic Aesthetics. Berlin: Sternberg Press, 2012.
Kiling, Alison. "Migration Trail". Migrationtrail.Com, 2022. https://www.migrationtrail.com/david. KOVACEVSKI CONDEMNS RUSSIA’S DECISION TO RECOGNIZE DONETSK AND LUHANSK PEOPLE’S REPUBLICS AS INDEPENDENT. INFOMAC Daily News Service. Macedonian Information Centre, 2022.
Liscia, Valentina Di."Forensic Architecture and Bellingcat Map Police Brutality at Black Lives Matter Protests." hyperallergic, October 30, 2020. https://hyperallergic.com/598414/forensic-architecture-bellingcat-black-lives-matterprotests-map/
Listi, Ginesse A, Mary H Manhein, and Michael Leitner. “Use of the Global Positioning System in the Field Recovery of Scattered Human Remains.” Journal of forensic sciences 52, no. 1 (2007): 11–15. Lyle, Douglas P. “Types of Evidence Used in Forensics.” Dummies.March 26, 2016. https://www.dummies.com/article/ academics-the-arts/science/forensics/types-of-evidence-used-in-forensics-138087/. Martin, Lesley.“Aesthetics.” 2003. Csmt.uchicago.edu. https://csmt.uchicago.edu/glossary2004/aesthetics.htm. Military Analysis Network .“Joint Direct Attack Munition (JDAM) GBU-31 - Smart Weapons.” n.d. Man.fas.org. Accessed April 11, 2022. https://man.fas.org/dod-101/sys/smart/jdam.htm. Moynihan, Colin. “Forensic Architecture Founder Says United States Prevented His Visit.” The New York Times. The New York Times, February 20, 2020. https://www.nytimes.com/2020/02/19/arts/design/forensic-architecture-foundersays-us-denied-him-visa.html. Namrouqa,Hana. “Environmentalists Call for Investigation into Israel’s Use of White Phosphorus.” Knight-Ridder/ Tribune Business News. Washington: Tribune Content Agency LLC, 2009. Oxford English Dictionary. 2nd ed. Oxford: Oxford University Press, 2004. Rajagopalan, Megha, and Alison Killing. Review of Inside a Xinjiang Detention Camp. Buzzfeednew. December 2020. https://www.buzzfeednews.com/article/meghara/inside-xinjiang-detention-camp Rajagopalan, Megha , Alison Killing, and Christo Buschek."China Secretly Built A Vast New Infrastructure To Imprison Muslims." Buzzfeednews. August 27,2020. https://www.buzzfeednews.com/article/meghara/china-new-internmentcamps-xinjiang-uighurs-muslims. Richelson, Jeffrey T. "When Secrets Crash". AIR FORCE Magazine. July 2001: 62. https://www.airforcemag.com/PDF/ MagazineArchive/Documents/2001/July%202001/0701crash.pdf Spindler, William. “2015: The Year of Europe's Refugee Crisis.” UNHCR, December 8, 2015. https://www.unhcr.org/ news/stories/2015/12/56ec1ebde/2015-year-europes-refugee-crisis.html. Tarozzi, Massimiliano. “What Is Grounded Theory?” London [England: Bloomsbury Academic, 2020. van Wyk, Jo-Ansie. “Pixels, Politics and Peace: The Forensic Use of Satellite Imagery.” Journal of African Foreign Affairs 6, no. 2 (2019): 31–50. Weizman, Eyal, Paulo Tavares, Susan Schuppli, and Situ Studio. “Forensic Architecture.” Architectural design 80, no. 5 (2010): 58–63. Weizman, Eyal. "Forensic Architecture with Eyal Weizman." UNSW. May 5, 2022, https://www.youtube.com/watch?v=U L2dx66n7d8&list=PL50XnIfJxPDV4QnTChrS3z7sfvC5vvIyd&index=2. Weizman, Eyal. Forensic Architecture : Violence at the Threshold of Detectability. Brooklyn, NY: Zone Books, 2017. Williams, Daniel. "Decades, Billions Needed to Restore Yugoslavia." Washington Post Foreign Service. June 5, 1999: Page A1. Winter, Ralph Karl . "Bank of New York v. Yugoimport, 745 F.3d 599." United States Court of Appeals, Second Circuit. Aug. 29, 2012.https://cite.case.law/f3d/745/599/ Withington, Thomas. "B-2A Spirit Units in Combat". 2006. 41. Wollen, Peter."Godard and Counter Cinema: Vent d'Est ".(1976): 373.file:///C:/Users/RGB/Desktop/Semester%204/ thesis%20studio/Wollen.pdf
https://www.army-technology.com/contractors/infrastructure/yugoimport-sdpr/ https://www.bellingcat.com/about/ https://www.nato.int/structur/ac/135/ncs_guide/english/e_1-6-5.htm https://www.nga.mil/defining-moments/National_Imagery_and_Mapping_Agency.html https://www.usgs.gov/faqs/what-informationdata-not-covered-freedom-information-act-foia
Images
Figure 3 Bellingcat.Identifying the Separatists Linked to the Downing of MH17.June 19. 2019.https://www.bellingcat. com/news/uk-and-europe/2019/06/19/identifying-the-separatists-linked-to-the-downing-of-mh17/ Figure 4 Bellingcat.Identifying the Separatists Linked to the Downing of MH17.June 19. 2019.https://www.bellingcat. com/news/uk-and-europe/2019/06/19/identifying-the-separatists-linked-to-the-downing-of-mh17/ Figure 5 Kiliing Architects.Review of Inside a Xinjiang Detention Camp. December 2020. https://www.buzzfeednews. com/article/meghara/inside-xinjiang-detention-camp. Figure 6 Cascone, Sarah.Israeli Bombings Are an ‘Existential Threat’ to an Ancient Archaeological Site on the Gaza Strip, Forensic Architecture Finds in a New Investigation. April 15, 2022.https://news.artnet.com/art-world/forensicarchitecture-israel-destroy-palestinian-archaeological-site-2099642 Figure 7 Gvul, Yesh, Michael Sfard and Law Office.The use of white Phosphorus in Urban Environments.December 11, 2012. https://forensic-architecture.org/investigation/white-phosphorus-in-urban-environments Figure 8 https://sites.google.com/site/activity21site/j-republican-form-of-government Figure 9 Weizman, Eyal, Paulo Tavares, Susan Schuppli, and Situ Studio. “Forensic Architecture.” Architectural design 80, no. 5 (2010): 117. Figure 10 Gilad, Tal.Forensic Architecture: Killing in Umm Al-hiran.n.d.https://www.visibleproject.org/blog/text/forensicarchitecture-killing-in-umm-al-hiran/ Figure 19 National Imagery and Mapping Agency.n.d.https://www.heraldry-wiki.com/heraldrywiki/wiki/National_ Imagery_and_Mapping_Agency,_US Figure 26 GISGeography. “World Geodetic System (WGS84).” GIS Geography, October 6, 2015. https://gisgeography. com/wgs84-world-geodetic-system/.
imagery Timeline Of Chinese Embassy Figure a to f: AP Archive.May 17,1999.http://www.aparchive.com/metadata/youtube/ad019d211534995589e6 6e6939822471
Figure f to j:Ponniah,Kevin.The night the US bombed a Chinese embassy.May 7, 2019. https://www.bbc.com/news/ world-europe-48134881