Four hack-and-leak operations in U.S. politics between 2016 and 2019, publicly attributed to the United Arab Emirates (UAE), Qatar, and Saudi Arabia, should be seen as the “simulation of scandal”:... Show moreFour hack-and-leak operations in U.S. politics between 2016 and 2019, publicly attributed to the United Arab Emirates (UAE), Qatar, and Saudi Arabia, should be seen as the “simulation of scandal”: deliberate attempts to direct moral judgement against their target. Although “hacking” tools enable easy access to secret information, they are a double-edged sword, as their discovery means the scandal becomes about the hack itself, not about the hacked information. There are wider consequences for cyber competition in situations of constraint where both sides are strategic partners, as in the case of the United States and its allies in the Persian Gulf. Show less
Cybersecurity strategies operate on the normative assumption that national cyberspace mirrors a country’s territorial sovereignty. Its protection commonly entails practices of bordering through... Show moreCybersecurity strategies operate on the normative assumption that national cyberspace mirrors a country’s territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cybersecurity strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace. Show less
This article focuses on the role of government in relation to cybersecurity. Traditionally, cybersecurity was primarily seen as a technical issue. In recent years, governments have realised that... Show moreThis article focuses on the role of government in relation to cybersecurity. Traditionally, cybersecurity was primarily seen as a technical issue. In recent years, governments have realised that they, too, have a stake in securing the Internet. In their attempts to grapple with cybersecurity, governments often turn to technical solutions to ‘code away’ illegal or undesired behaviours. ‘Techno-regulation’ has become popular because it may seem to be an effective and cheap way of increasing control over end users’ behaviours and increasing cybersecurity. In this article, we will explain why using techno-regulation has significant downsides and, therefore, why it may be unwise to use it as a dominant regulatory strategy for securing the Internet. We argue that other regulatory strategies ought to be considered as well, most importantly: trust. The second part of this article explains that trust can be used as an implicit strategy to increase cybersecurity or as an explicit mechanism for the same goal. Show less