Cyberspies and Cyberspace: What the ‘Google China’ Affair Reveals About Media And

Total Page:16

File Type:pdf, Size:1020Kb

Cyberspies and Cyberspace: What the ‘Google China’ Affair Reveals About Media And Cyberspies and Cyberspace: What the ‘Google China’ Affair Reveals About Media and Intelligence Networks in New Media Environments Tim Stevens, King’s College London (unpublished essay, 2010) In January 2010, the world’s largest and most visible media company, Google, declared that it was the victim of a concerted campaign of ‘cyber attacks’ on its computer and information networks, which became known as ‘Operation Aurora’. Without openly blaming Beijing for these events, Google made it clear they believed Chinese security organisations or their proxies to be responsible for what they perceived as acts of ‘cyberespionage’, which also targeted pro- democracy human rights activists using their online services. Google threatened to withdraw from the Chinese market, or at least to end the self-censorship of its web search results, unless Beijing addressed these issues of surveillance and intelligence-gathering. The ‘showdown’ between Google and China was an important news story in its own right, and brought to the fore possible Chinese intervention in other states’ computer networks. It also exemplified deeper concerns about the vulnerability of the US in particular to cyberespionage and other forms of computer network operations. This paper contends that the ‘Google China’ affair is an interesting case study of how intelligence relates to the ‘new media’ environment of cyberspace. The news story itself was utilised to further political and security agendas in the West, a process which involved both media actors and intelligence services. The first section provides a brief outline of Google’s announcement and media responses to it. There follows a description of how institutional discourse in the preceding year helped foster a media environment receptive to a story involving a global media company and foreign intelligence agencies acting against the West and its commercial and security interests. Consideration is given to the sources used by Western media, many of whom 1 were close to intelligence agencies, and to the known or suspected activities of Chinese intelligence and allied actors. The final section suggests how the events and activities described relate to theories of global networks, and concludes that the relationships between media and intelligence are both overt and obscure. * On 12 January 2010, David Drummond, Google’s Senior Vice President for Corporate Development and the US company’s Chief Legal Officer, issued a 765-word statement on The Official Google Blog, which provides ‘insights from Googlers into our products, technology, and the Google culture.’1 In ‘A New Approach to China’, Drummond articulated Google’s decision to ‘review our business operations in China’ as a result of alleged breaches of Google’s computer systems, and of Gmail accounts used by human rights activists and advocates in China, the US and Europe.2 Taking the unusual step―for a large information technology company―of publicly admitting a serious cybersecurity problem, Drummond announced that Google were no longer willing to censor the results returned by its Chinese internet search service, Google.cn,3 as required by the terms of the operating agreement allowing it to launch its Chinese product in January 2006.4 Although Drummond did not explicitly place responsibility for the ‘attacks’ on Beijing, the tenor of the statement left few people under any allusions that the Chinese authorities were the focus of Google’s comments, and the cause of the reversal of their self- censorship policy.5 Despite the occurrence of a large earthquake in Haiti the same day, Google’s announcement also became major global news. The proximate reasons for this are not hard to fathom. By traditional 1 http://googleblog.blogspot.com/, accessed 25 February 2010. 2 Drummond (2010) 3 http://www.google.cn/, accessed 5 February 2010. 4 See: Schrage (2006) 5 Subsequent forensic analysis suggested that the Aurora attacks could be traced to two Chinese educational establishments, one associated with the People’s Liberation Army (Markoff & Barboza 2010) 2 criteria, ‘Google China’―as the slug lines would have it―was certainly newsworthy, possessing as it did elements of recency, superlativeness, relevance, and other ‘news values’.6 Negativity and consonance were also two major factors. Although Google is not a news organisation in the traditional sense, in the contemporary global media environment it is the biggest portal to, and disseminator of, news to the internet-using population.7 In part, this status was reflected in the censorship conditions agreed for its operations in China, such was the influence Beijing evidently felt such a media company could exert. News that China might be engaged in espionage against the US could not fail to be headline news either. Initial coverage of Google’s announcement focused on the two main protagonists in the story, Google and the Chinese government. The rhetorical hook for many of these stories was Google’s corporate motto, ‘Don’t Be Evil’. Coined by Google engineer Paul Buchheit in 2001, the phrase was adopted by Google as a ‘core value’, expressing a corporate ethic of honest decision-making, respect for the rule of law, and, as its ‘Code of Conduct’ explains, ‘providing our users unbiased access to information’.8 The decision to enter the Chinese market in 2006 had tested the limits of this concept at the time,9 and an apparent reversal of the policy on which Google’s Chinese operations depended gave cause for wide reconsiderations of Google’s corporate ethos. Even within one particular media outlet, The Guardian (UK), commentary tentatively supported Google’s courage in standing up to China,10 or expressed scepticism at the decision based on Google’s lack of previous ethical consistency with respect to Chinese 6 Galtung & Ruge (1965), Bell (1991), pp.156-160. 7 In 2005, Google surpassed Time Warner as the world’s largest media company by market value (BBC 2005) 8 http://investor.google.com/conduct.html, accessed 5 February 2010. On the origin of the slogan, see Battelle (2005), p.138. 9 e.g. Thompson (2006). As early as 2003, the ‘Don’t Be Evil’ ethos had been challenged by commercial imperatives (see McHugh 2003). This debate continues (e.g. Warman 2010). 10 Goldkorn (2010) 3 censorship.11 Concerns were also expressed as to what situation Google’s potential withdrawal/expulsion would bequeath Chinese internet users, including human rights activists.12 Evgeny Morozov of Georgetown University, and contributing editor of Foreign Policy magazine, opined that Google.cn was ‘sacrificed’ in a bid for positive media coverage, particularly in Europe where Google’s activities have been the subject of privacy worries.13 Morozov reasoned that Google’s appeals to security concerns masked this aspect of their corporate tactics, adding: All the talk about cybersecurity breaches seems epiphenomenal to this plan ... Besides, there is no better candy for US media and politicians than the threat of an all-out cyber- Armageddon initiated by Chinese hackers. I can assure everyone that at least half of all discussions that Google’s move would spur would be about the need to make America secure from cyberattacks.14 Written less than a day after Google’s announcement, Morozov’s words were prescient, and the media discourse that followed focused more on America’s vulnerability to Chinese state activities than on Google. Although, as previously noted, there were worries that the withdrawal of Google would leave Chinese ‘netizens’ bereft of unfiltered information sources, thereby bolstering China’s internal surveillance activities and social engineering policies, Western media attention fastened on the threat China posed externally. Chinese cyberespionage was central to media reportage and commentary, and this narrative became explicitly political in the weeks that followed. It was also consistent with existing discourse about cyberwar, the vulnerability of 11 Stevens (2010a) 12 Qiang (2010) 13 Morozov (2010) 14 Ibid. 4 Western nations to cyber attacks, and the relative inaction of policymakers to combat these threats. * The ‘Google China’ affair must be contextualised within discursive developments throughout 2009, in which broadcast media played a critical role in the US and elsewhere, principally in the UK.15 In January, the assistant director of the Federal Bureau of Investigation’s Cyber Division claimed that cyber attacks were second only to a weapon of mass destruction or a bomb in a major American city in terms of active national security threats.16 In the middle of the year, both the US and UK published national cyber security strategies which officially elevated cybersecurity to the top of national security strategies, after only terrorism and the wars already underway in Iraq and Afghanistan.17 Launching the US Cyberspace Policy Review in May, President Barack Obama stated that ‘this cyber threat is one of the most serious economic and national security challenges that we face as a nation’.18 By means of affirming this through organisational means, the Review called for the appointment of an Executive Branch Cybersecurity Coordinator reporting to the deputy national security advisor within the White House. This proved a difficult post to fill, and six months of Beltway wrangling and media speculation over who would become the new ‘cyber czar’ ended just before Christmas with the appointment of Howard Schmidt, an advisor to the George W. Bush administration and an information technology industry executive.19 15 Of course, ‘information warfare’ discourse has much deeper roots and a long history prior to 2009, e.g. Virilio (2000), Bendrath (2003), Curtis (2006), ch.7. 16 AFP (2009) 17 Cyberspace Policy Review (2009), Cyber Security Strategy of the United Kingdom (2009) 18 Obama (2009) 19 Phillips (2009) 5 In a CBS Sixty Minutes special in November 2009, Congressman James Langevin described the US cybersecurity situation as the nation’s ‘pre-9/11 moment’,20 a comment he later explained: ‘Much like in the months leading up to September 11, 2001, we know the threat exists and have an opportunity to address it before real damage occurs.
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Cyber security and the politics of time Stevens, Timothy Charles Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 1 ] Cyber Security and the Politics of Time Timothy Charles Stevens Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy King’s College London Department of War Studies November 2013 2 Abstract Time is an under-represented topic in security studies and International Relations (IR).
    [Show full text]
  • Google Home Mini Require Subscription
    Google Home Mini Require Subscription Unexercised Slade twinge that clerkess readapt aridly and grangerize humidly. Agoraphobic Pepillo sabotage: he outmaneuvers his aubergistes deliciously and staccato. Is Reuben stunning or choragic when clarified some hospitalisations hovel rearwards? Google max is alexa on either side of privileges and home mini is worth checking your device in terms, answer was selling some restrictions around the episode Bluetooth pair on a multispeaker group, powered by the Google Assistant. Of course, SAMSUNG and LG comes with smart TV that can easily connect with your Google Home. Their subscription at any good night mode you can also required for reading this out with google mini on a cup of brooklyn, require additional skills. Keep you eye sent your inbox! Tune will live shows curate watchlists and control your home devices. Spotify giving this free Google Home Minis for new existing users Here's sheet to get. How to until a Google Home Mini for Free press an Amazon Echo. GDPR: floating video: is perfect consent? Google Nest Mini squeezes all usually the smarts of her original as a smaller, create wish lists, promo code and get discounts. Does Google Home really The Google Home App Cost Money. To produce music department will engender an account verify the subway service situation are damp to recieve. Save your backyard camera is the google chromecast and coupons and can act as it out soon as you to ask. It makes them to google mini with the subscription has ever having a household? 2nd Gen Google Home Mini 1st Gen Google Home Max Google Nest smart.
    [Show full text]
  • Beyond Cyber Doom
    No. 11-01 January 2011 WORKING PAPER BEYOND CYBER-DOOM: Cyberattack Scenarios and the Evidence of History By Sean Lawson The ideas presented in this research are the author’s and do not represent official positions of the Mercatus Center at George Mason University. 1 Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History Sean Lawson, Ph.D. Department of Communication University of Utah “[T]hese war games are about the real effects of a cyberwar . about causing chaos in our streets at home due to sudden crashes in our critical infrastructure through manipulation of our banking, transportation, utilities, communications, and other critical infrastructure industries. These are all real scenarios.” (Patterson, 2010b) “In seeking a prudent policy, the difficulty for decision-makers is to navigate the rocky shoals between hysterical doomsday scenarios and uninformed complacency.” (Cavelty, 2007: 144) Introduction Recently, news media and policy makers in the United States have turned their attention to prospective threats to and through an ethereal and ubiquitous technological domain referred to as “cyberspace.” “Cybersecurity” threats include attacks on critical infrastructures like power, water, transportation, and communication systems launched via cyberspace, but also terrorist use of the Internet, mobile phones, and other information and communication technologies (ICTs) for fundraising, recruiting, organizing, and carrying out attacks (Deibert & Rohozinski, 2010). Frustration over a perceived lack of public and policy maker attention to these threats, combined with a belief that “exaggeration” and “appeals to emotions like fear can be more compelling than a rational discussion of strategy” (Lewis, 2010: 4), a number of cybersecurity proponents have deployed what one scholar has called “cyber-doom scenarios” (Cavelty, 2007: 2).
    [Show full text]
  • Cyber Threats to National Security
    DEALING WITH TODAY’S ASYMMETRIC THREAT Cyber Threats to National Security S YMPOSIUM F IVE Keeping the Nation’s Industrial Base Safe From Cyber Threats The Asymmetric Threat website (asymmetricthreat.net) includes downloadable reports from all symposia in both series and serves as a knowledge network to advance the dialogue on national and global security, presenting resources and original research, and providing a forum for review and discussion of pertinent themes and events. S ERIES O NE S ERIES T WO UNCLASSIFIED Cyber Threats to National Security Symposium Five: Keeping the Nation’s Industrial Base Safe From Cyber Threats This document is intended only as a summary of the personal remarks made by participants at the March 1, 2011 symposium, “Keeping the Nation’s Industrial Base Safe From Cyber Threats,” held at the Carnegie Institution for Science, Washington, D.C., and co-sponsored by CACI International Inc (CACI), the U.S. Naval Institute (USNI), and the Center for Security Policy (CSP). It is published as a public service. It does not necessarily reflect the views of CACI, USNI, CSP, the U.S. government, or their officers and employees. The pro bono Asymmetric Threat symposia series was started in 2008 to contribute to the national discourse on the topic of asymmetric threats facing the United States. CACI and the National Defense University sponsored Symposium One in the series, and CACI and USNI sponsored Symposia Two and Three. With Symposium Four, also sponsored by CACI and USNI, a new Asymmetric Threat series was initiated focusing on Cyber Threats. With new sponsor CSP,“Keeping the Nation’s Industrial Base Safe From Cyber Threats” is the fifth symposium in the Asymmetric Threat series and the second in the Cyber Threat series.
    [Show full text]
  • Cyber Security—2010 Hearings Committee On
    S. Hrg. 111–1103 CYBER SECURITY—2010 HEARINGS BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION JUNE 15, 2010 PROTECTING CYBERSPACE AS A NATIONAL ASSET: COMPREHENSIVE LEGISLATION FOR THE 21ST CENTURY NOVEMBER 17, 2010 SECURING CRITICAL INFRASTRUCTURE IN THE AGE OF STUXNET Available via the World Wide Web: http://www.fdsys.gov/ Printed for the use of the Committee on Homeland Security and Governmental Affairs ( U.S. GOVERNMENT PRINTING OFFICE 58–034 PDF WASHINGTON : 2011 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:00 Nov 14, 2011 Jkt 058034 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 P:\DOCS\58034.TXT SAFFAIRS PsN: PAT COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JOSEPH I. LIEBERMAN, Connecticut, Chairman CARL LEVIN, Michigan SUSAN M. COLLINS, Maine DANIEL K. AKAKA, Hawaii TOM COBURN, Oklahoma THOMAS R. CARPER, Delaware SCOTT P. BROWN, Massachusetts MARK L. PRYOR, Arkansas JOHN MCCAIN, Arizona MARY L. LANDRIEU, Louisiana GEORGE V. VOINOVICH, Ohio CLAIRE MCCASKILL, Missouri JOHN ENSIGN, Nevada JON TESTER, Montana LINDSEY GRAHAM, South Carolina ROLAND W. BURRIS, Illinois EDWARD E. KAUFMAN, Delaware * CHRISTOPHER A. COONS, Delaware * MICHAEL L. ALEXANDER, Staff Director DEBORAH P. PARKINSON, Senior Professional Staff Member ADAM R, SEDGEWICK, Professional Staff Member BRANDON L. MILHORN, Minority Staff Director and Chief Counsel ROBERT L. STRAYER, Minority Director of Homeland Security Affairs DEVIN F.
    [Show full text]
  • Simulated Crisis Shows Potential Gaps in U.S. Cyber Defenses 18 February 2010, by Bob Drogin
    Simulated crisis shows potential gaps in U.S. cyber defenses 18 February 2010, By Bob Drogin The crisis began when college basketball fans Katrina struck in 2005. "The biggest danger," he downloaded a free March Madness application to declared, "is if we're ineffective." their smart phones. The app hid spyware that stole passwords, intercepted e-mails and created havoc. Panelists brought verisimilitude to their roles. Stewart Baker, former general counsel of the Soon 60 million cell phones were dead. The National Security Agency, said he would urge the Internet crashed and commerce collapsed. White White House to shut down cell phone networks House aides discussed declaring martial law. even if no law specifically allows it. That formed some of the doomsday scenario when "We will be criticized if we don't do everything we 10 former White House advisers and other top can," Baker said. "We can straighten out the (legal) officials met Tuesday in a rare public cyber war- authorities over time." game designed to highlight the potential vulnerability of the nation's digital infrastructure to Francis Fragos Townsend, who served as attack. counterterrorism adviser in the Bush White House, called for rationing of gasoline and other supplies if The results were hardly reassuring. necessary. "We're in uncharted territory here," was the most John Negroponte, who spent most of his career as common refrain during a three-hour simulated a diplomat before becoming the first director of crisis meeting of the National Security Council, the national intelligence, urged a diplomatic approach. crux of the Cyber Shockwave exercise.
    [Show full text]
  • Timeline of the European Commission, U.S
    Google’s Anti-Competitive Search Manipulation Practices A Timeline of the European Commission, U.S. FTC, DOJ, and State AG Antitrust Probes, Prohibition Decisions & Lawsuits By Adam Raff and Shivaun Raff Co-founders of Foundem and SearchNeutrality.org First Published: 15 April 2015 Last Updated: 3 March 2021 Table of Contents Jun 2006 Foundem’s Google Search Penalty 3 May 2007 Google Launches Universal Search 6 Nov 2009 Foundem’s Competition Complaint to the European Commission (EC) 14 Feb 2010 Launch of the EC’s Informal Investigation / Foundem’s Updated Complaint 16 Nov 2010 Launch of the EC’s Formal Investigation 19 Apr 2011 Official Launch of the U.S. FTC’s Investigation 22 May 2012 Commissioner Almunia Commences Settlement Negotiations with Google 27 Jan 2013 Premature Closure of the U.S. FTC’s Investigation 34 Jan 2013 Origins of the Even-Handed / Equal-Treatment Remedy 35 Apr 2013 Google’s 1st Commitment Proposals 38 Oct 2013 Google’s 2nd Commitment Proposals 41 Jan 2014 Google’s 3rd Commitment Proposals 43 Jul 2014 The European Commission’s Dramatic U-Turn 50 Nov 2014 Commissioner Vestager Takes Office 53 Mar 2015 Inadvertent Release of the FTC’s Damning Internal Final Report 54 Apr 2015 Statement of Objections (SO) in the Google Search Case 57 Jul 2016 Supplementary Statement of Objections (SSO) in the Google Search Case 62 Jun 2017 EC Prohibition Decision (Guilty Verdict) in the Google Search Case 65 Sep 2017 Google’s Brazenly Non-Compliant CSS Auction 67 Jul 2018 EC Prohibition Decision in the Google Android Case 69 Jun 2019 Launch of the U.S.
    [Show full text]
  • Google Índice De Contenido
    Google Índice de contenido 1- What is google?................................................................................................................................2 2-History...............................................................................................................................................3 2.1. Financing and initial public offering................................................................................4 2.2. Growth...................................................................................................................................5 2.3. Acquisitions and partnerships................................................................................................5 2.4. Google Data Centers..............................................................................................................7 3- Products and services.......................................................................................................................7 3.1. Advertising.............................................................................................................................7 3.2. Search engine.........................................................................................................................9 3.3. Productivity tools.................................................................................................................10 3.4. Enterprise products..............................................................................................................11
    [Show full text]
  • 2010/07/27 自動連携 IR Release Yahoo! JAPAN Selects Google As A
    July 27, 2010 To whom it may concern Yahoo Japan Corporation Masahiro Inoue, President & CEO Stock code: 4689 Yahoo! JAPAN selects Google as a provider of search engine and ads platform. Yahoo! JAPAN also provides data to Google. Today, Yahoo Japan Corporation announced that it has decided to change its search engine and advertising platform to Google Inc. We also determined to provide data regarding our contents to Google. Details are as follows. 1. Outline Yahoo! JAPAN is the overwhelmingly No. 1 Internet service company in Japan in terms of the number of users. The search service is one of the various popular services Yahoo! JAPAN provides today. Yahoo! JAPAN has decided to change its search engine (the service for searching for information on the Internet) and ads platform (its search-triggered ads distribution system) to Google Inc., which is located in the state of California and listed on NASDAQ in the United States (“Google”). The value of Yahoo! JAPAN’s search service will stay at a high level after the reputable search engine and ads platform used by Google itself are built into Yahoo! JAPAN’s search service, which is highly popular in Japan and has a lot of user support due to its usability. Yahoo! JAPAN is going to increase the value of other services as well in the future by leveraging the improved search service, and strengthen its position as No.1 Internet service company. Affected Parts by Change of Search Engine Search Results Page of Yahoo! JAPAN Affected Parts Related Keywords Search Results of Yahoo! JAPAN services Paid Paid Search Advertising Search Advertising Web Search Results Search Results of Yahoo! JAPAN services Web Search Results Search Results of Yahoo! JAPAN services Web Search Results Search Results of Yahoo! JAPAN services Search Results of Yahoo! Knowledge Search 検索連動型広告 Related Keywords *The popular content of Yahoo! JAPAN will remain on its service even after this transaction.
    [Show full text]
  • Logistics As Rationality: Excavating the Coloniality of Contemporary Logistical Formations
    LOGISTICS AS RATIONALITY: EXCAVATING THE COLONIALITY OF CONTEMPORARY LOGISTICAL FORMATIONS Megan Archer A thesis submitted in partial fulfilment of the requirements of the University of Brighton for the degree of Doctor of Philosophy June 2020 1 ABSTRACT This thesis investigates the material and epistemic frameworks of logistics, through identifying and interrogating both the specific logics and the broader rationality that underpins logistical organisation. It writes a longer history of logistics, linking the production of Western modernity to contemporary logistical formations. The thesis argues that logistical rationality has its foundations in, and continues the project of, colonial modernity, by unpicking the epistemic framework and the representational order it is founded on. It identifies a set of logics that animate world-making logistical operations, namely representation, measurement, extraction, translation, prediction, standardisation and the control of uncertainty. I argue that logistical rationality attempts to incorporate the entire world into its own form of legibility – and in so doing, erases that which cannot be translated as such. It translates the world and its populations into what I call logistical legibility by extracting, translating and manufacturing knowledge about them in the form of data, in order that said knowledge may be used to predict the future and hence, control its radical uncertainty. This also amounts to a delimitation of what counts as knowledge, and as ways of being and doing in the world, and as such provides the grounds and means for the increasing administration of subjects. The framework I develop here thus allows us to reckon with those forms of violence, structural, physical, and epistemic, that lay the groundwork for current processes of domination and the shape of contemporary colonial modernity.
    [Show full text]
  • [email protected] Exposure Dr
    Google Australia Pty Limited Tel: 02 9374-4000 ACN 102 417 032 Fax: 02 9374-4001 Level 5 www.google.com.au 48 Pirrama Road Pyrmont NSW 2009 10 August 2010 Committee Secretary Senate Finance and Public Administration Committee By Email: [email protected] Exposure Drafts of Australian Privacy Amendment Legislation Google appreciates this opportunity to provide comments to the Committee in relation to the Exposure Draft of the Australian Privacy Principles. Google commends the Exposure Draft as a first step towards the enactment of a more streamlined Privacy Act. Google supports an approach to privacy regulation that allows flexibility for addressing particular characteristics of new technologies, or the organisations delivering those technologies. Technology and the online environment is developing rapidly. For example, since the release of the Australian Law Reform Commission’s privacy law report in 2008, we have seen the rise of Twitter, the advent of Foursquare, and the number of hours of content uploaded to YouTube each minute go from 13 to 24. Australia’s privacy law applies to a dynamic environment and therefore must be flexible. As the Internet has given millions of people access to vast amounts of information and created useful--sometimes revolutionary--tools and services, people are increasingly concerned about how to protect their privacy online. Based on our experience, we believe that service providers are motivated to work towards a safe and secure environment for their users. This is fundamental to obtaining and maintaining users’ trust – which is key to success as a service provider. Ultimately, it is imperative to a provider’s bottom line to get users’ privacy and security right.
    [Show full text]