Commerce

The Informational is Spatial: Understanding the Geoeconomics of Cybersecurity in Youth Environments

On Tuesday, 02/28/2012 @ 4PM, I’ll be presenting “The Informational is Spatial” at the Association of American Geographers’ paper session on “Geographies of Surveillance and Security 3: Data, Discourses, and Affects” (session organized by David Murakami Wood and Steve Graham).

Location: The Hilton New York, Second Floor, Sutton Parlor South.

Abstract: As cyberspace expands within young people’s everyday environments, so too does a geoeconomic conception of cybersecurity. My ongoing participatory action research project, MyDigitalFootprint.org, involved a team of youth co-researchers in investigating the production, circulation, and consumption of their personal data in order to collectively address larger questions of privacy, property, and security under informational capitalism. Of specific interest were how the material forms and social practices of proprietary digital environments such as Facebook and Twitter link up with the emerging U.S. war doctrine of cyberdominance. I discuss U.S. cyberdominance as a geoeconomic manifestation of security that aims to reframe a global cyberspace as a component of U.S. territory. Informational flows, from the global to the intimate, are thus cast as matters of national security that must be managed through a plethora of digital enclosure and surveillance mechanisms that are intimately experienced by U.S. youth through their routine participation in proprietary digital environments. Further, despite the “newness” of digital enclosure and surveillance I argue that these mechanisms are rooted in historical processes of environmental control and presuppose a geoeconomic logic of privatization and segregation already operating in our urban environments through strategies such as zoning, gating, and CCTV. I will conclude with a discussion of how the MyDigitalFootprint.org project’s development of its own open-source social network site served as a methodology for understanding the various forms of geoeconomic cybersecurity that become objectified, internalized, reworked, and/or resisted through young people’s everyday engagements with and within proprietary digital environments.

Understanding the Architectures of SOPA & PIPA

Two controversial pieces of legislation that would significantly alter the architecture of the internet are currently being debated in congress: the Stop Online Privacy Act (SOPA) in the U.S. House of Representatives, and the Protect IP Act (PIPA) in the U.S. Senate. The following is a round up of some sources I’ve found helpful in trying to understand the effect that these pieces of legislation would have on the informational architecture of the internet.

The first comes from the Electronic Frontier Foundation who recently published an open letter to congress from 83 prominent internet engineers and architects. The letter is short and worth a full read, but here is the key passage (emphasis mine):

If enacted, either of these bills will create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. Regardless of recent amendments to SOPA, both bills will risk fragmenting the Internet’s global domain name system (DNS) and have other capricious technical consequences. In exchange for this, such legislation would engender censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties’ right and ability to communicate and express themselves online.

The second is Ars Technica’s summary of a Consumer Electronics Show panel that debated both SOPA and the recently introduced OPEN Act, an alternative piece of legislation supported by notable critics of SOPA (emphasis mine):

[Ryan] Clough [legislative counsel for the Office of Rep. Zoe Lofgren (D-CA)] said SOPA and Protect-IP create an architecture for Internet censorship. “Once we create this system, there is no way it will be contained to copyright infringement,” he said. Further, he argued “this bill will make it easier for China to keep imposing the types of controls on the Internet that it does and to keep resisting international pressure against it.”

The third is a piece Julian Sanchez wrote for the Cato Institute. Sanchez discusses the link between information architecture and free speech in order to argue that SOPA and PIPA would constitute a new legal and technological architecture of censorship (emphasis mine):

SOPA is a 70 page statute establishing a detailed legal process by which the Justice Department can initiate blocking of supposed pirate domains by ISPs and search engines, and by which private parties can seek orders requiring payment processors and ad networks to sever tie.

If SOPA passes, thousands of commercial ISPs, colleges, small businesses, nonprofits, and other entities that maintain domain servers are going to have to reconfigure their networks, potentially at substantial cost, in order to easily comply with the new law.

… These twin architectures will obliterate major institutional barriers to Internet censorship generally, not just censorship for antipiracy purposes.

The fourth is the Obama Administration’s response to SOPA/PIPA, written by Victoria Espinel (IP Enforcement Coordinator at Office of Management and Budget), Aneesh Chopra (U.S. Chief Technology Officer and Assistant to the President and Associate Director for Technology at the Office of Science and Technology Policy), and Howard Schmidt (Special Assistant to the President and Cybersecurity Coordinator for National Security Staff) (emphasis theirs):

We must avoid creating new cybersecurity risks or disrupting the underlying architecture of the Internet. Proposed laws must not tamper with the technical architecture of the Internet through manipulation of the Domain Name System (DNS), a foundation of Internet security. Our analysis of the DNS filtering provisions in some proposed legislation suggests that they pose a real risk to cybersecurity and yet leave contraband goods and services accessible online. We must avoid legislation that drives users to dangerous, unreliable DNS servers and puts next-generation security policies, such as the deployment of DNSSEC, at risk.

And finally – A short video, from a group called Fight for the Future, illustrating what PIPA entails and the chilling effect it would have on the internet:

 

British Foreign Secretary On E-Commerce and Blurred Geographies

From British Foreign Secretary William Hague’s 10/18/2011 guest editorial in Spiegel :

Web-based industry has already become a critical part of our economies. The UK’s industry is already worth £100 billion, accounting for 8% of our total GDP, and is forecast to grow at 10 percent over the next four years. Globally, e-commerce sees $8 trillion change hands each year …

Our reliance on cyber blurs geographical boundaries, breaks down traditional cultural and religious divides, brings families and friends closer together and enables contact between those who share common interests or concerns.

The Internet in Society: Empowering or Censoring Citizens?

From the Royal Society for the Encouragement of Arts, Manufactures and Commerce (RSA):

You’re not the customer, you’re the product

h/t http://imgur.com/gallery/WiOMq
Facebook and You

1 2 3 6