TY - JOUR
T1 - Deterritorializing Cyber Security and Warfare in Palestine
T2 - Hackers, Sovereignty, and the National Cyberspace as Normative
AU - Cristiano, Fabio
PY - 2019
Y1 - 2019
N2 - Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace.
AB - Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace.
U2 - 10.1002/j.cyo2.20191301.0002
DO - 10.1002/j.cyo2.20191301.0002
M3 - Article
SN - 1804-3194
VL - 15
SP - 28
EP - 42
JO - CyberOrient
JF - CyberOrient
IS - 2
ER -