||Fabio Cristiano, Lund University, Lund University Box 192, 221 00 Lund, Sweden. E-mail: email@example.com
||CyberOrient, Vol. 13, Iss. 1, 2019, pp. 28-42
||December 20, 2019
||Cybersecurity strategies operate on the normative assumption that national
cyberspace mirrors a country’s territorial sovereignty. Its protection commonly
entails practices of bordering through infrastructural control and service delivery, as
well as the policing of data circulation and user mobility. In a context characterized
by profound territorial fragmentation, such as the Occupied Palestinian Territory
equating national cyberspace with national territory proves to be reductive.
This article explores how different cybersecurity strategies – implemented by the
Israeli government, the Palestinian Authority, and Hamas – intersect and produce
a cyberspace characterized by territorial annexation, occupation, and blockade.
Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-)
territorialization to reflect on how these strategies, as well as those of Palestinian
hackers, articulate territoriality beyond the normativity of national cyberspace.
Palestine, cybersecurity, national cyberspace, cyber warfare, securitization