Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Deterritorializing Cyber Security and Warfare in Palestine: Hackers, Sovereignty, and the National Cyberspace as Normative

Cristiano, Fabio LU (2019) In CyberOrient 13(1). p.28-42
Abstract
Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing... (More)
Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace. (Less)
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Contribution to journal
publication status
published
subject
keywords
cybersecurity, Occupied Palestinian Territory, Israel, Hamas, territorialization, hackers
in
CyberOrient
volume
13
issue
1
pages
28 - 42
publisher
American Anthropological Association
ISSN
1804-3194
DOI
10.1002/j.cyo2.20191301.0002
language
English
LU publication?
yes
id
037c669b-47b5-43dd-a9a6-9aa4557d0c44
date added to LUP
2022-03-24 11:33:24
date last changed
2022-05-09 12:33:49
@article{037c669b-47b5-43dd-a9a6-9aa4557d0c44,
  abstract     = {{Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace.}},
  author       = {{Cristiano, Fabio}},
  issn         = {{1804-3194}},
  keywords     = {{cybersecurity; Occupied Palestinian Territory; Israel; Hamas; territorialization; hackers}},
  language     = {{eng}},
  number       = {{1}},
  pages        = {{28--42}},
  publisher    = {{American Anthropological Association}},
  series       = {{CyberOrient}},
  title        = {{Deterritorializing Cyber Security and Warfare in Palestine: Hackers, Sovereignty, and the National Cyberspace as Normative}},
  url          = {{http://dx.doi.org/10.1002/j.cyo2.20191301.0002}},
  doi          = {{10.1002/j.cyo2.20191301.0002}},
  volume       = {{13}},
  year         = {{2019}},
}