<<

Keywords: cyberspace. national of the normativity beyond territoriality articulate hackers, those Palestinian of as well as these strategies, how on to reflect territorialization (de-)–(re-) of prism the conceptual employs it then analysis, this on Drawing blockade. and occupation, annexation, territorial by characterized a cyberspace produce and –intersect and Authority, the Palestinian government, Israeli the by –implemented strategies security cyber different how explores article This command command computer the with of adjacent wall the separation surface grey the dominates a graffiti West the in Bank, and Jerusalem between village a Palestinian Qalandyia, in checkpoint Israeli the Overlooking Introduction Palestine securitization, warfare, cyber security, cyber cyberspace, national (OPT), Territory Palestinian the Occupied as such fragmentation, territorial profound by In characterized acontext mobility. user and circulation data the policingof as well as delivery, service and control through infrastructural bordering of practices entails commonly Itsprotection sovereignty. territorial acountry’s mirrors cyberspace that national assumption the normative on operate strategies security Cyber Abstract: University Leiden Fabio Cristiano asNormative Cyberspace Palestine: Hackers, Sovereignty, andtheNational and Warfare Security Cyber Deterritorializing in a continuity between spatial and cyber closures for . closures cyber and spatial between a continuity traces also command graffitied the time, same forcibly At the terminated. thatbe to needs process as afailed itself wall the portraits figuratively light-blue the shortcut task, keyboard unresponsive painted an terminate 1 yber equating national cyberspace with proves to national be territory reductive.

ctrl+alt+del

C yber , written in giant capital letters. capital giant in , written O rient, Vol. 13, Iss. 1, 2019 2 Typically to used , pp. 28–42

28 Corresponding author: Fabio Cristiano, Leiden University, 2501 EE, Hague, The Netherlands. E-mail: [email protected] theoretical works on works (de-)–(re-)territorializationtheoretical Guattari and (Deleuze byInspired hackers. offensive conductedoperations by Palestinian of analysis the through cyberspace in of sovereignty understanding of a“static” territorial acritique advances article this Furthermore, cyberspace. in also replicate PA’s ultimately measures these cooperation with security circulation, data and on mobility user limitations severe forms. Imposing direct less in (PA) Authority operate on territoriality of Palestinian the recent bordering, legislations of territorial practice foremost adirect as configures networks absolute Israel’s controlWhereas over infrastructural territory. of Palestinian the fragmentation current consistent the with are these whether and control over cyberspace, territorial disrupt and enact, intersect, strategies and explores Palestinian how Israeli article This Strip. of Gaza the blockade and occupation of West the of Jerusalem, Bank, East control: annexation territorial of Israeli differentdegrees theof result constitute regimes These of Palestinians. of the control life system biopolitical over the distributed of the compile complex the grammar of mobility regimes shifting and a country’s territory. a country’s with of basis on its the cyberspace national congruence the order secure and to purports security mobility, user cyber and of modes circulation and data raison d’être raison ultimate the fact, represents, in sovereignty territorial oneOn hand, and securitization. its cyberspace of qualities the territorial toon reflect Territoryperspective unique a offers of Occupied Palestinian the case the mobility, regulating regimes diverse For and fragmentation its territorial qualities territorial traditional Assigning cyberspace. in sovereignty and territory national correspondence between spatial the continuity: perceived by asimilar inspired commonly are warfare, cyber and offensivedefensive as well as policies, security cyber National to the ordering of mobilities for both data and users. for of and data ordering to mobilities both the approaches different and bordering envision its physical protection through yber

of the Israeli–Palestinian conflict; on the on other, multiple conflict; of Israeli–Palestinian the C 4 yber O rient, Vol. 13, Iss.

to cyberspace, national authorities national to cyberspace, 1, 2019 3 Regulating extent extent Regulating

29 Fabio Cristiano function that a territory plays in relation to in identity. plays aterritory that function ordering to the peculiar logic of anormative inclusion–exclusion, through then operates theof a territory delimitation function, spatial a fulfilling two different spatial realities: an inside and an outside.andinside an realities: spatial different two creates space of aspecific bordering the implications, legislative Besides becomes aterritory. aspace that bordering physical through primarily thus elementsovereignty. tonational define essential It is an fact, in constitutes, territory recognized continuous, internationally and adelimited, terms, 1997; realist (Wu country of 2002). Mueller asovereign classical those In to equivalent are that characteristics territorial and spatial to possess 2017; 2010; Mueller 2011). Morozov thoughtare These “compartments” (Mueller subdivisions into national of cyberspace fragmentation and disintegration contributed defense and current to policies the security cyber-utopianist of visions aborderless with contrast Internet,In national National national and cyberspace territory territory. national its corresponding tout court reproduces cyberspace anational that assumption normative interrogates the ultimately article move, this data of and how users afunction as cyberspace of 2018)the territoriality define et al. these As (Bullée manipulation and engineering forms of social creative onobsolescence through them imposed to overcome technological hackers the –empowers Palestinian to security approach distributed anecessarily –and cyberspace in boundaries spatial of univocal lack the Furthermore, strategies. and policies of national extent (de-)–(re-)territorialization sovereign” through of “becoming same to the moments as understood be operations can hacking Palestinian light, this In 2004). Waldenfels 2014; (Petersen refers to undone redo the re-territorialization disarticulated, norms are to moment the established which in pertains de-territorialization whereas moments sovereign: relational it becoming different encompasses of sovereignty. stem Rather, national from not does linearly cyberspace of articulation how territorial indicates the operations further hacking of these analysis Foucault the 2007), 2000; Guattari and 1988; Deleuze yber C yber O rient, Vol. 13, Iss. 1, 2019 5 In addition to to addition In

30 Fabio Cristiano logic of exceptionalism of logic 2018). (AbuShanab archetypal an city through the in Operating service Internet commercializing and delivering from (ISPs) mobile carriers and providers Internet service Palestinian outlawing aban provision, with of service denial the through unfolds annexation Israeli the backbone, Internet the controlling Besides to cyberspace. pertains also Jerusalem of East annexation The Westterritorial the from capital Bank. Palestinian designated the detaching thus Jerusalem, East concretely annexes wall border (the Green Line), internationally-recognized its the from path the Deviating contested wall. the separation by erecting ground” on the “facts government put Israeli the 2000s, early the in concrete bordering, through (the line annexation Green Line). this of armistice the east Advancing areas 1967,In of Six-Day the War, aftermath Palestinian the in annexed Israel territory. Palestinian over the blockade and occupation, of annexation, territorialities illegal reproduces the thus and boundaries, territorial legitimate its exceeds fact in elements of cyberspace metal” absolute control of “bare the Israel’s perspective, 2019). (AbuShanab 1948 territory From infrastructural an for entire network the infrastructural control the and Internet backbone the PA’s autonomythe authorities currently –Israeli right to infrastructural (1995) of II Oslo contraventionIn declares of Art.36/3 unambiguously –that sovereignty, 2017). thus unfold (Broeders and where territoriality, ultimate terrains the constitute ramifications and nodes cyberspace distributed to a variety of actors other than the state, the of other than actors to avariety distributed cyberspace of for security the responsibilities with time, same At the territoriality. componentsits thus fundamental physical and of Internet the network, authority, control determine by a central of the administered and gathered routes data computer that, and of principal networks aseries comprises 2015) public (Broeders core This cyberspace. in sovereignty national forth sets that feature primary the –constitutes to “corereferred as network” 2016). Musiani and (DeNardis control National – also backbone over the ceteraet switches, servers, cables, fiber backbone, the of network: the elements control through over infrastructural cyberspace national their of delimitation territorial the authorities enact national At abasic level, yber C yber 7 – that is the sovereign suspension of agreed norms suspension of sovereign is agreed the – that O rient, Vol. 13, Iss. 1, 2019 6 local local

31 Fabio Cristiano in line with the Zionist imaginary of a unified Jewish city city Jewish of aunified Zionist imaginary the with line in complete – undergoes annexation Jerusalem East in cyberspace Whereas cyberspace. its from national also city Palestinian the to detach purport ultimately policies –Israeli freedoms political and bordering. Whereas the annexation of East Jerusalem in cyberspace marks marks cyberspace in of Jerusalem East annexation the bordering. Whereas of concrete direct less and measures through cyberspace in translates occupation absence ofIn Israeli absolute provision, the control over service 2014). et al. operators (Niksic to one to mobile of Israeli subscribe Internet, opting commonly the access to frequencies to on Cneed roam Israeli Area in Palestinians to this, Due (across West Jerusalem). the community East and Bank settler growing the to needed serve network infrastructural the improved expanded and ISPsexpansion – Israeli their on freeze official an establishing agreements since 1993 2019)West (EEAS quadrupled has peace Bank – despite several the presence in settler As C. Area in settlements Jewish to illegal services supply providers mobile Internet and Israeli connection while down, them turns (ICA) regularly Administration Civil Israeli the concerns, security Citing area. the in technologies or installing forauthorizations transporting multiplepercent Internet of operators West the require Bank), Palestinian 61 C(presentlyWith ca I(1993) Oslo over Area jurisdiction Israel granting autonomy. infrastructural absence of the in attained be ever can cyberspace in sovereignty national West 2019). (AbuShanab Bank one whether least, ask should very At the of the areas controlled Palestinian the equipment towards technologies and of ICT import block the authorities regularly Israeli on core the network, control full A 2016 detaining World besides that, indicates report Bank territory. the Internet across connection a second-hand, expensive, and homologs ISPs Israeli depend on to their supply Palestinian that means absolute However, Westthe Israeli the control Bank. of infrastructure the of areas Palestinian the provision across service and Internet governance control. The forforms of territorial the responsibility PA in fact, holds, direct less through intooccupation cyberspace of West the translates Bank yber C yber O rient, Vol. 13, Iss. 1, 2019 8 – the Israeli Israeli –the

32 Fabio Cristiano measures that are conventionally enforced domestic contexts. in conventionally are that measures security on cyber relies heavily cyberspace control over Palestinian territorial Israeli defense, the control cyber and infrastructural Besides defense strategies. and security conflating thus cyberspace, of nodes national the military and (NCD) forDirectorate protection the of –holds civilian both responsibility Since 2017, model. governance Cyber National –the a centralized unit asingle light of the in security cyber its national organizes currently Israel bordering territorial as security Cyber over cyberspace. Gaza’s seized sovereignty Israel upholdssecurity, territorial cyber controland infrastructural Through into obsolescenceforce dependency. astate and of Gaza technological measures Israeli allocation, frequency and spectrum, to bandwidth, extends 2019). Sowers and (Weinthal blockade territorial delivery As service and compromise infrastructure the further cuts, power ICTs, regular as well as bombardments on 2017). Israeli (Abou Jalal down Furthermore, turned regularly are but these maintenance, order infrastructural in to perform Strip Gaza the ISPs to access permits need For Palestinian reason, this Internet. wireless and wired including telecommunication system, entire treatment (World 2019). authorities control Bank Israeli the Likewise, water, electricity, sewage and as such for provision the of basic services on even Israel relies currently 2012). Gaza aresult, (Erakat As territory of Palestinian rest the the from area the isolating further people, thus and goods of the mobility limits severely blockade illegal The Israeli Strip. Gaza on the blockade aterritorial imposed has Israel elections, Palestinian the in success Hamas’ however,(Tawil-Souri 2012). following Since 2006, territory Hamas-governed the across service ISPs asecondhand deliver Palestinian core network, Israeli on the Relying West one the the in Bank. to similar asetup through functions Strip Gaza the in Internet governance 2017). (Berda system permit Kafkaesque and its checkpoints, (flying) roadblocks, of Israeli reminiscent are that ways in delivery West service the in hinders Bank cyberspace occupation of the wall, of separation erection the the with a continuity yber C yber O rient, Vol. 13, Iss. 9 1, 2019

33 Fabio Cristiano of the network. Its security forces employ in fact extensive surveillance to forces surveillance employ extensive fact in Its security of network. the nodes control by tightening unfolds local over endusers and security cyber Hamas’ delivery, service and over or infrastructure no authority With little services. connection of use on Israeli the aban by introducing cyberspace over its sovereignty to regain vain in tried Hamas 2012, In security. cyber of to strategy its develop own Gaza’s hinders provision ability severely andservice infrastructures absence The of locally-controlled cyberspace. over power its national marginal Conversely, government retains Hamas 2015). et al. quo (Arafeh status spatial into “escapes” apreserved Palestinian potential reterritorializes routes ultimately alternative words, outlawing other In network. occupied the along national traffic to constrain purports control it as territorial Israeli reenacts methods these Banning like. the I2P, 31) mesh networking, and routes (Article VPNs, as alternative such via connection outlaws also legislation the security, toconcerns national 2018). (Abdeen values or security Citing national to threat as a flag agencies content , online PA blogs, and those that down take its and security to ISPs services hosting and Palestinian it urges practice, In cyberspace. 51) (Article its national across harmony” “social and unity” “national to protect purports legislation – this regulation access and management –content aspects focal two through operating law: controversial 2018, In PA the for Palestinians. approved the a cyberspace in mobility hinder further that strategies security The cyber enforce andHamas PA sovereignty. territorial and of national rationale any superseding thus diaspora, international the well as territory the across 1948 2018). (AbuShanab Palestinians target measures These of violence of kind any no warning connotation indicating and political contentsolely updates and intercept their for status flagged algorithms the freedom words as such Arabic of blacklisted (Cristiano 2018). relevance apool –besides Evidence that security indicates contents to of data detect alleged examines automaticwherein the scanning media, social on focuses primarily flagging This pre-crimes. and policing of content predictive online part as of Palestinian parsing algorithmic the to forces recur security Israeli espionage, cyber addition toIn traditional yber C yber O rient, Vol. 13, Iss. , martyr 1, 2019 , Al Aqsa Al , et cetera –

34 Fabio Cristiano and governmental personnel (IDF 2017). (IDF hackers personnel governmental 2018,and In Palestinian military target specifically links media etc.) social news, fake dating, and apps (gaming, contents. deceitful malicious Context-tailored emails, for passage into users allowing Israeli tricking baits to well-designed success their crediting thus techniques, but hacking social advanced coding, unsophisticated somewhat commonly operations feature These groups. forasset Palestinian proved have agreat campaigns these Israel–Palestine, in potentials cyber asymmetric despite vastly warfare; cyber of regional feature immanent an constitute they violent concomitance escalations, in with intensify defacements, etc.)redirects, 2013). (Rudner attacks these Whereas takedowns, ones attacks, (distributed denial-of-service disruptive as well etc.) ransomware, as (spear-, intelligence spyware, for gathering strategies intrusive both include These nodes. civilian and itsboth military on cyberspace Israeli targeting offensive techniques, through sovereignty of PFLP, articulation etc.) this (Hamas, in faction Jihadists, –participate for apolitical wing –autonomous hackers acyber as or operating Palestinian outside of creation an the “other”. through of sovereignty orders boundaries and the articulates security cyber sense, this In own. on their cyberspace in ordering reinforce territorial and construct strategies national these sovereignty, by territorial defined acontext in operating territory. While national and cyberspace national of correspondence between corroborate astrong and evidence cyberspace Palestinian for (fragments of) of territorialization devices as function strategies security cyber different how illustrate sections The previous (de-)–(re-)territorialization as Hacking (AbuShanab 2019). to monitor Internet cafes online raid roam how users forces regularly websites”, on enforced security “immoral a ban precepts:to having Islamic 2019). compliance (AbuShanab used arefor policing techniques same These opponents prosecution of and or political dissidents arrest motivate the yber C yber O rient, Vol. 13, Iss. 1, 2019

35 Fabio Cristiano targets, in line with one of the social hacking precepts: vulnerability resides precepts: vulnerability hacking one of social with the line in targets, contents bait employed diverse attack for the different other hand, the On passage. approved thus and their Gaza from originating as to them detect domecyber failed the Israeli expedient, this Germany. in Through based Viper –on servers Arid to Operation – referred as attacks these leveraged (Trendhackers users Research 2015). Threat Micro Team Palestinian individual and private companies, departments, military to public offices, belonging databases operation compromised the accessed and blockade, the bypassing cyberspace: on Israeli attack spear-phishing a massive launched 2015, In hackers Gaza-based block. territorial this circumvent to ability on depends the primarily Gaza from launched of endpoints 2019).network (AbuShanab conditions, success the these In its order in to Strip prevent reaching from them Gaza the from coming data of all mobility the provisions consists of blocking security cyber One of basic Israel’s techniques. hacking aforementioned the social with combine complex hackers operations Palestinian otherOn occasions, to them. available bandwidth the expanded successfully hackers of codes, the manipulation Through out attack. the forneeded carrying bandwidth alarger to them access zombie-network, allowed controlled on the operating that, language aprogramming coded hackers Palestinian the sophisticated design of Distributed Denial-of-Service (DDoS). Denial-of-Service of Distributed design sophisticated the unique for time the at operation appeared this – years fifteen last the in or defaced by Palestinians down websites taken of been have Israeli of terms not outcomes in unique thousands –as Whereas territorialization. de- of direct atechnique through websites servers of and of Israeli aseries )took control (IADAQ Brigades ad-Din of Izz the al-Qassam wing cyber territory. the 2013, the In for across example, obsoletethe infrastructures spitein of of effectiveness, and sophistication levels unanticipated shown operations at have times cyber Palestinian low-techBesides hacking, (ClearSky 2018). about attacks warns that asoftware through attacking exploitedthe logic of ubiquitous technique securitization: This Gaza. from attacks event rocket of the imminent in users Israeli warns that a service Alert, Red the into app mimicking an implanted a spyware yber C yber O rient, Vol. 13, Iss. 1, 2019 10

36 Fabio Cristiano ordering, and disordering, of data circulation and user mobility. user and of circulation data disordering, and ordering, the through primarily occurs (de)–(re)territorializationthat cyberspace in argued has article control, this territory. infrastructural Besides national independent the are of that correspondence astatic with ways in cyberspace in articulated of are how territories part thus 2015). are nodes Network Barnett and (Ruiz closure case of routes in alternative through of traffic data for rerouting the allows of system the resilience the structure, architectural to 2017). (van nodes its Keymolen network den and Berg Unique to this control functions extensive assigns of cyberspace architecture the all, Above assumption. this with associated demonstrate issues the territory Palestinian the across realities complex the spatial article, this throughout argued territory. As national and cyberspace national between continuity alinear marks conventional arrangement this core networks, 2017). Badiei and (Mueller Togethercyberspace control national on with to jurisdictions of national boundaries the extend formally and polities top-level code (ccTLDs) domains country for sovereign reserved indeed are .il hosted domain on the websites attacking identification: indication of asufficient territorial are names that domain the common creed on acted apparently hackers These Palestine. with solidarity in cyberspace Israeli targeting hackers of victim fallen (PLO), himself had Liberation Organization Palestinian member and of cause, the advocate of Palestinian the A historical . business the out his family peeping nowhomepage was of flag aPalestinian holding cyborg armed of an image Palestine”, defacing the Togethercompany website databases. “Freedom and to message the with compromised his irremediably had acyberattack earlier, days A few over arecent economic loss. recounted to frustration me his Jerusalem, 2017, August In East resident in man, of Isawiya a64-year-old Palestinian Conclusions of sovereignty. its understanding and normative security cyber for uncontrollable to choices, national and adegree behavior users’ in yber C yber would equate to attacking Israel. In general terms, terms, general In Israel. equate to would attacking O rient, Vol. 13, Iss. 1, 2019

37 Fabio Cristiano The public core of the Internet of the core public The Dennis. 2015. Broeders, Press. University Stanford Yael. 2017.Berda, the-shackled-engine-of-palestines-development/. Al-Shabaka Development.” Palestine’s of Engine “ICT:Shackled 2015. The Wassim. Abdullah and Bahour, Sam Nur, Arafeh Press of Chicago State of Exception 2005. Giorgio. Agamben, Palestinians of Abuses Rights Digital of 2018: 2019. Overview Palestine An Hashtag Anan AbuShanab, Advancement Media. of Social Rights Digital on Impact Its and Infrastructure ICT Palestinian the of Control Israel’s Interrupted: Connection 2018. Anan. AbuShanab, crisis-internet-israel.html. 9, 2017, https://www.al-monitor.com/pulse/originals/2017/07/gaza-power-cuts-electricity- Al-Monitor crisis.” Internet with dealing are 2017. Gazans Rasha. “How Jalal, Abou Rights. for Human Law Al-Haq Ramallah: on Decree by Law the to Taken Counter Al-Haq by Measures 2018. Isam. Abdeen, References one. anew create can they territory: apreimagined enacting do more than can thereof) hacking (or strategies the security cyber terms, these In space. asovereign creates estrangement very this exception, an sovereignty. By articulating territorial (legitimate) moves from away imaginaries, national consistent to respective being while that, imaginary light of in aspatial operateoperations, fact in hacking as well as strategies, security cyber national Palestinian and Israeli yber . Haifa: 7amleh - The Arab Center for the Advancement of Social Media. Social of Advancement the for Center Arab -The 7amleh . Haifa: . Palo Alto: Alto: Palo . occupied the in regime permit Israel’s emergency: Living C yber O rient, Vol. , November 9, https://al-shabaka.org/briefs/ict- 2015, , November Chicago: Attell. by Kevin . Translated . Haifa: 7amleh - The Arab Center for the the for Center Arab -The 7amleh . Haifa: 13, Iss. . Amsterdam: Amsterdam University Press. University Amsterdam . Amsterdam: 1, 2019 University University , July July , .

38 Fabio Cristiano 37: 40–83. 37: no. 11, Law Eastern Near and Islamic of Journal UCLA Response.” UN the and Law International “ 2012. Noura. Erakat, Macmillan. Palgrave 3–35. London: Levinson, S. Nanette and DeNardis, Laura Governance Internet in to Infrastructure Turn The In Infrastructure.” by “Governance 2016. Musiani. Francesca and Laura, DeNardis, Press. of Minnesota University Minneapolis: Schizophrenia and Capitalism Anti-Oedipus: 2000. Guattari. Félix and Gilles, Deleuze, Publishing. Bloomsbury London: Schizophrenia. and Capitalism Plateaus: AThousand 1988. Guattari. Félix and Gilles, Deleuze, Macmillan. Palgrave 178–201. Basingstoke: Piquerot, Sylvie and Doran, Marie-Christine Gabriel, Blouin-Genest by edited Battlefields, Territory.” as Rights Human In Palestinian Occupied the from Critique ADystopian Right: Human as Access Fabio. “Internet 2018. Cristiano, 3 andSociety Conflict Jerusalem.” East in Reality Diminished at Playing 2017. Occupation: of the Lines “Along the Distretti. Fabio, Emilio and Cristiano, no. 898260. paper Research Theory Legal and Law Public Georgetown Space.” As/And “Cyberspace 2007. E. Julie Cohen, Soldiers Targeting Israeli Android Hamas’ of Samples and Infrastructure 2018. ClearSky. 45. no. 15, 1: 20– Profiling Offender and Psychology Investigative of Journal attacks.” of successful dissection –Aliterature‐based attacks engineering of social anatomy the “On 2018. Hartel. Pieter and Junger, Marianne Wolter Montoya, Pieters, Lorena H., Jan‐Willem Bullée 376. security.” national and sovereignty state with Internet’ of the core public of ‘the protection international the “Aligning 2017. Dennis. Broeders, . Cambridge: Clearsky Security Ltd. Ltd. Security Clearsky . Cambridge: yber C It’s Not Wrong, It’s Illegal: Situating the Gaza Blockade Between Between Blockade Gaza the Situating It’s Not Wrong, It’s Illegal: yber O rient, Vol.

, edited by Musiani, Francesca, Derrick L. Cogburn, Cogburn, L. Derrick Francesca, Musiani, by , edited 13, Iss. 2, no. 3: 366– 3: 366– 2, no. Policy Cyber of Journal 1, 2019 , no. 1: 130– 143. no. 1: 130– . ,

39 Fabio Cristiano 1977 France, de Collège the at lectures population: territory, Security, 2007. Michel. Foucault, September, 28, 1995. 28, September, DC. Washington, Strip. Gaza the West the on and Bank 1995. Agreement Interim II. Oslo 1993. 13, September, DC. Washington, Arrangements. Self-Government Interim on Principles of 1993. Declaration I. Oslo Palestinian economy Palestinian the of future the 2014. Cand Area Cali. Massimiliano and Eddin, Nasser Nur Orhan, Niksic, 18, no. 1: 435–515. Review Law &Technology Science Columbia Names.” Top Domain Code Level Country and Rights Property Claims, Sovereignty ICANN, Territory: Internet 2017. Badiei. “Governing Farzaneh and Milton, Mueller, Press. Polity Cambridge: 2017. Fragment? Milton. Internet the Mueller, Will Press. MIT Cambridge: . governance of Internet politics global The States. and Networks 2010. Milton. Mueller, Press. MIT Cambridge: . Taming the and Cyberspace of Governance Internet Root: the Ruling 2002. Milton. Mueller, Affairs. Public Freedom ofInternet Side Dark The Delusion: Evgeny.Morozov, Net 2011. The http://www.filippominelli.com/projects/. 2019,15, December accessed Studio, Minelli Filippo 2019. “PROJECTS.” Filippo. Minelli, security Cyber and Cyberspace 2012. George. Kostopoulos, facebook-profiles-to-target-israeli-soldiers/. 5, 2017, https://www.idf.il/en/articles/hamas/hamas-uses-fake- February Forces, Defense Israel The Soldiers.” to Israeli Profiles Target IDF. Facebook Fake 2017. Uses “Hamas – 78. yber New York Springer. New City: . Washington, DC: The World Bank. The DC: Bank. World . Washington, C yber O rient, Vol. 13, Iss. . London: CRC Press. . London: 1, 2019 . New York . New City:

40 Fabio Cristiano 1 Notes 10, no. 3: &Technology 647–666. Law of Journal Harvard System.” International the and Internet The Wu, T. Sovereignty: 1997. S. “Cyberspace D.C.: Group. World Bank Washington, . Committee Liaison Hoc Ad to the Report 2019. Monitoring World Economic Bank. International Affairs Gaza.” and West Bank the in livelihoods and infrastructure 2019. “Targeting Sowers. Jeannie and Erika, Weinthal, Philosophica Orders,” of Boundaries “The 2004. Bernhard. Waldenfels, 31, &Technology no. 188–205. 2: Computers Law, of Review International trust.” versus control Internet: on the security 2017. Keymolen. “Regulating Esther and Bibi, Berg, den van Inc. Trend Micro City: Shibuya . Dome Iron the Bypassing Viper: Arid 2015. Operation Team. Research Threat Trend Micro Palestine Studies High-Tech Gaza’s Occupation: Enclosure.” “Digital 2012. Helga. Tawil-Souri, networks?” Internet international the owns “Who 2015. Barnett. A. George and B. Jeanette Ruiz Challenge.” Intelligence An Infrastructure: National to Critical “Cyber-Threats 2013. Martin. Rudner, Design of Politics the and Exchange Knowledge Cross-Cultural Development: Conversion, Subversion, In Subversion.” into Assemble Politics and Technology When 2014. “Freifunk: Gregers. Petersen, the recognized Palestinian territory in its entirety: East Jerusalem, West Bank, and the Gaza Strip. Strip. Gaza the and West Bank, Jerusalem, East entirety: its in territory Palestinian recognized the to interchangeably refer to territory Palestinian Territory, Palestinian Occupied Palestine, definitions In line with the conventional use of the United Nations, conventional this article employs the the employs article this conventional Nations, United of the use conventional the with line In yber The Journal of International Communication of International The Journal International Journal of Intelligence of CounterIntelligence and Journal International 41, no. 27–43. 2: , edited by Leach James and Lee Wilson, 39–56. Cambridge: MIT Press. MIT Cambridge: 39–56. Wilson, Lee and James Leach by , edited C yber O rient, Vol. 95, no. 2: 319–340. 95, no. 319–340. 2: 13, Iss. 21, no. 1: 38–57. 1, 2019 26, no. 3: 453–481. 26, 73, no. 1: 71–86. no. 1: 73, 71–86. Journal of

41 Fabio Cristiano zombies to flood targeted websites with access requests until they collapse. they until requests access with websites targeted to flood zombies use (the botnet), hackers network arobot into together these Joining “zombies”). as jargon are however commonly framed in terms of national security and preventive strategies. preventive and security of national terms in framed commonly however are these attributed, When users. or infrastructures foreign targeting operations cyber offensive to recur regularly countries course, Of (2007). Cohen see topic, this On conventions. augmented-reality gaming (see Cristiano and Distretti 2017). Distretti and (see Cristiano gaming augmented-reality responsibility. of shares hold unique context, particular this in who, of users choices individual the 10 10 9 8 7 6 5 4 3 2 access, handover, roaming, et cetera. et roaming, handover, access, regardless of their territorial configuration. territorial of their regardless Palestinian to be envisioned are that spaces on those operates apparatus security Israeli the words, other In websites. and blogs international pro-Palestinian but also Lebanon, or Jordan in cafes Internet boundaries: territorial perceived outside fall that cyberspace Painted by artist Filippo Minelli in 2007, for further details see Minelli (2019). Minelli see details for further 2007, in Minelli Filippo artist by Painted This territorial imaginary is also reinforced within interactive digital spaces, such as as such spaces, digital interactive within reinforced also is imaginary territorial This State the of Exception in Agamben by theorized As well as providers, service security, cyber commercial contractors, security include These (2012). Kostopoulos see please cyberspace, in rule” of “territoriality concept the On This argument also provides the rationale for Israeli monitoring of parts of the Palestinian the Palestinian of parts of monitoring Israeli for rationale the provides also argument This User mobility refers, in this article, to different forms of users’ movement in cyberspace: cyberspace: in movement users’ of forms to different article, this in refers, mobility User The spatial and territorial connotations of cyberspace are themselves highly disputed disputed highly themselves are cyberspace of connotations territorial and spatial The These consist in taking control over a large number of unsuspecting computers (known in in (known computers unsuspecting of number large a over control taking in consist These yber C yber O rient, Vol. 13, Iss. (2005). 1, 2019

42 Fabio Cristiano