Assembling cybersecurity: the politics and materiality of technical malware reports and the case of Stuxnet
In: Contemporary security policy, Band 41, Heft 1, S. 129-152
ISSN: 1352-3260, 0144-0381
7 Ergebnisse
Sortierung:
In: Contemporary security policy, Band 41, Heft 1, S. 129-152
ISSN: 1352-3260, 0144-0381
World Affairs Online
In: Contemporary security policy, Band 41, Heft 1, S. 129-152
ISSN: 1743-8764
In: Stevens , C L 2019 , ' Assembling cybersecurity : The politics and materiality of technical malware reports and the case of Stuxnet ' , Contemporary Security Policy . https://doi.org/10.1080/13523260.2019.1675258
This is an article about how cybersecurity gets "made," with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success and its interpretation as malware is deeply interwoven in social, technical and material alliances. Secondly, a materialist-minded examination of Symantec's Stuxnet reports will demonstrate the politically situated nature of how cybersecurity expertise emerges. The article finds that Symantec's work was not a-political or neutrally-technical: Their experts made profoundly political choices in their analyses. By showing the processes that go into making cybersecurity, the article contributes to a widening and deepening of debates about what is at stake in cybersecurity knowledge and practices.
BASE
In: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5051926/
This study reviews the Department of Defense's (DoD's) biosurveillance-related programs, prioritizes missions and desired outcomes, evaluates how DoD programs contribute to these, and assesses the appropriateness of the funding system for biosurveillance.
BASE
In: Review of international studies: RIS, S. 1-18
ISSN: 1469-9044
Abstract
In contrast to a view of secrecy as a tool of statecraft, where the game of 'covering/uncovering' dominates as the central way of interpreting secrecy's power, we set out 'secrecy games' as an approach for understanding secrecy's power and influence. To do so, we offer a set of three games to illustrate the more varied ways that secrecy operates and draw attention to the ways in which non-state actors use secrecy and shape its effects. In particular, we offer an analysis of: (1) the secrecy games of tunnelling in the Israeli–Palestinian conflict and the role of mobility as part of secrecy; (2) the secrecy game of camouflage and how stowaways blend in to facilitate access to global shipping routes; and (3) the secrecy game of maze-running and maze-making within urban warfare. Drawing these together, we show how secrecy involves a wider set of actors, practices, and associated knowledge-(un)making strategies than currently understood within International Relations. In turn, this expanded understanding of secrecy helps to make sense of the more complex ways in which secrecy is presented, used, resisted, and transformed – including and especially as a force that limits sovereign power – and, therefore, as central to what shapes global politics.
In: Children and youth services review: an international multidisciplinary review of the welfare of young people, Band 101, S. 261-269
ISSN: 0190-7409
In: International political sociology, Band 16, Heft 3
ISSN: 1749-5687
Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threat of the next "cyber-attack" or the emergence of a new vulnerability in highly interconnected supply chains. However, such discursive positioning of threat and its resolution has typically reinforced, and perpetuated, dominant power structures and forms of violence as well as universalist protocols of protection. In this collective discussion, in contrast, six scholars from different disciplines discuss what it means to "do" "critical" research into what many of us uncomfortably refer to as "cybersecurity." In a series of provocations and reflections, we argue that, as much as cybersecurity may be a dominant discursive mode with associated funding and institutional "benefits," it is crucial to look outward, in conversation with other moves to consider our technological moment. That is, we question who and what cybersecurity is for, how to engage as academics, and what it could mean to undo cybersecurity in ways that can reassess and challenge power structures in the twenty-first century.
World Affairs Online