Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Towards a Single Secure European Cyberspace?

Type
Slides
Tags
privacy
Authors
Suso Baleato
Event
Chaos Communication Congress 28th (28C3) 2011
Indexed on
Mar 27, 2013
URL
http://events.ccc.de/congress/2011/Fahrplan/attachments/2028_eurocyberspace
File name
2028_eurocyberspace
File size
4.0 MB
MD5
72209b4b5120edebac8587afe6cdc42a
SHA1
625d03a0e7cd3dbd898bd0bdd636cf957324a6c9

The "European Great Firewall" was the way that European civil rights organizations has addressed the proposal to create a "single European cyberspace". Surely other lectures will describe the technicalities of the proposal. This lecture will go beyond that, describing a vulnerability that the proposal reveals in the power structures of the European and world governance, that could be exploited by the hackerdom if the war is understood as a value to be avoided. The proposal registered by the body of the Council of the European Union to create «a single secure European cyberspace» marks a pivotal moment in the development of the Union. Three reasons grounds that statement. First, because after decades omitting the use of the term, the semantics of «cyberspace» is officially adopted by the Union's policy. Second, because that adoption enacts a new field of community policy making. Third, because the new field is formulated by binding, under a «single European» frame, the home affairs with the security and defense areas – the building blocks of sovereignty since the Peace of Westphalia. The notion of cyberspace as a global wide computer mediated domain of human agency is not new. Furthermore, the saliency of that domain in the contemporary society can hardly be refuted: Beyond the contributions from the Literature and the Academia, the most reliable source of empirical evidence can be found in the production of the concerned polities to address the deployment and the effects of informatics and telecommunications – the constituent technologies of cyberspace. The legal developments on the protection of personal data and on the enforcement of intellectual property rights, or the budgetary assignments to the field of information society are meaningful proofs of that saliency. However, the idea of an «European cyberspace» (a) impugns the aforementioned «global wide» range by assuming the possibility to constrain the agency to the boundaries of a political body – the EU – which then becomes the holder of the sovereignty in that domain, what (b) defies the traditional monopoly of the State regarding the exercise of power over their own territory. As Kymlicka has pointed out, the existence of a common identity is a requirement of statality, at leas in the political configuration designed under the liberal democracy paradigm. Provided that cyberspace favours the establishment of social interactions not limited by the constrains that provides statality, it is possible to conform alternative identities that can enact a conflict with the identitary demarcations of the State and, therefore, following Foucault, to challenge the discoursive hegemony of the State.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !