2020
DOI: 10.1057/s42984-020-00014-x
|View full text |Cite
|
Sign up to set email alerts
|

Postdigital war beneath the sea? The Stack’s underwater cable insecurity

Abstract: This article addresses the problem of undersea cable security, arguing that for almost a century undersea cables have been the playground of major states that have enjoyed the practice of cable interference as part of international conflict. Over the last two decades, it has been a major source of intelligence for organisations like NSA and GCHQ, and so there has been a reluctance to advance international legalisation in this area. Nonetheless, the effect of this has been a failure to protect the digital globa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…By using their control over necessary APIs as leverage to dictate national “governments how they can collect data from their citizens in the fight against COVID” (Moerel & Timmers, 2021 , p. 6) and how their contact tracing apps should store this data, Google and Apple are exercising what in other contexts is called “hardware and software sovereignty” (Aldrich & Karatzogianni, 2020 , pp. 2930): a form of sovereignty that is based on the actor having control over key IT-components and digital infrastructure.…”
Section: Resultsmentioning
confidence: 99%
“…By using their control over necessary APIs as leverage to dictate national “governments how they can collect data from their citizens in the fight against COVID” (Moerel & Timmers, 2021 , p. 6) and how their contact tracing apps should store this data, Google and Apple are exercising what in other contexts is called “hardware and software sovereignty” (Aldrich & Karatzogianni, 2020 , pp. 2930): a form of sovereignty that is based on the actor having control over key IT-components and digital infrastructure.…”
Section: Resultsmentioning
confidence: 99%