Tung-Hui Hu
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029513
- eISBN:
- 9780262330091
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029513.003.0003
- Subject:
- Computer Science, Programming Languages
This chapter traces the cloud of digital data back to the data centers that store them. For security reasons, a number of data centers are repurposed Cold War military bunkers, suggesting that a ...
More
This chapter traces the cloud of digital data back to the data centers that store them. For security reasons, a number of data centers are repurposed Cold War military bunkers, suggesting that a military rationale for a bunker, to defend an area of territory, has re-entered the realm of data. By dividing networks into logical zones of inside and outside, these security infrastructures raise the specter of attack from those that might be ‘outside’ to network society, such as Chinese hackers or Iranian cyberwarfare specialists. By revisiting Paul Virilio’s Bunker Archaeology, this chapter further suggests that the specter of a disaster that the cloud continually raises also carries within it a temporality of a user’s imagined death. This temporality animates a recent series of digital preservation projects, such as the ‘Digital Genome’ time capsule, intended to survive the “death of the digital.”Less
This chapter traces the cloud of digital data back to the data centers that store them. For security reasons, a number of data centers are repurposed Cold War military bunkers, suggesting that a military rationale for a bunker, to defend an area of territory, has re-entered the realm of data. By dividing networks into logical zones of inside and outside, these security infrastructures raise the specter of attack from those that might be ‘outside’ to network society, such as Chinese hackers or Iranian cyberwarfare specialists. By revisiting Paul Virilio’s Bunker Archaeology, this chapter further suggests that the specter of a disaster that the cloud continually raises also carries within it a temporality of a user’s imagined death. This temporality animates a recent series of digital preservation projects, such as the ‘Digital Genome’ time capsule, intended to survive the “death of the digital.”
Laura Denardis
- Published in print:
- 2014
- Published Online:
- May 2014
- ISBN:
- 9780300181357
- eISBN:
- 9780300182118
- Item type:
- chapter
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300181357.003.0009
- Subject:
- Political Science, International Relations and Politics
This chapter examines four controversial technological approaches related to Internet governance. These are (i) deep packet inspection, a traffic engineering technique in which the content of packets ...
More
This chapter examines four controversial technological approaches related to Internet governance. These are (i) deep packet inspection, a traffic engineering technique in which the content of packets sent over the Internet is inspected, analyzed, and factored into a variety of possible decision processes; (ii) kill-switch approaches that sever connectivity; (iii) delegated censorship in which governments turn directly to private information intermediaries to block or filter information; and (iv) distributed denial of service (DDoS) attacks, in which multiple, unwitting computers collectively flood a targeted computer with so many requests that it becomes inaccessible for use. DDoS attacks create a great deal of collateral damage to human rights and freedom of expression.Less
This chapter examines four controversial technological approaches related to Internet governance. These are (i) deep packet inspection, a traffic engineering technique in which the content of packets sent over the Internet is inspected, analyzed, and factored into a variety of possible decision processes; (ii) kill-switch approaches that sever connectivity; (iii) delegated censorship in which governments turn directly to private information intermediaries to block or filter information; and (iv) distributed denial of service (DDoS) attacks, in which multiple, unwitting computers collectively flood a targeted computer with so many requests that it becomes inaccessible for use. DDoS attacks create a great deal of collateral damage to human rights and freedom of expression.