Jump to ContentJump to Main Navigation
Digital DepressionInformation Technology and Economic Crisis$
Users without a subscription are not able to see the full content.

Dan Schiller

Print publication date: 2014

Print ISBN-13: 9780252038761

Published to Illinois Scholarship Online: April 2017

DOI: 10.5406/illinois/9780252038761.001.0001

Show Summary Details
Page of

PRINTED FROM ILLINOIS SCHOLARSHIP ONLINE (www.illinois.universitypressscholarship.com). (c) Copyright Illinois University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in ISO for personal use.date: 22 September 2021

Accumulation and Repression

Accumulation and Repression

(p.211) Chapter 14 Accumulation and Repression
Digital Depression

Dan Schiller

University of Illinois Press

This chapter examines concerns regarding the internet's strategic vulnerabilities and the challenges to the longstanding U.S. approach to global internet governance both from within and without. The 1990s and the decade that followed witnessed scattered cyberattacks, occasionally quite serious ones. U.S. analysts charged that China-based hackers had repeatedly broken into U.S. military organizations, corporate contractors, and digital services, and that they had insinuated “logic bombs” into U.S. networks for possible later use. This chapter first considers issues pertaining to cyber-conflict, in which network-enabled weapons launched a far-reaching reappraisal of strategic imperatives, before discussing the U.S.'s cyber-conflict policy, including the Comprehensive National Cybersecurity Initiative adopted in January 2008 and efforts to reconstruct the internet around territorially bounded networks imbued with connectivity restrictions. It also explores how foregrounding digital sites of accumulation gave rise to an increasingly fractious geopolitics of information.

Keywords:   internet, internet governance, cyberattacks, U.S. military, accumulation, information, networks, cyber-conflict, Comprehensive National Cybersecurity Initiative

Illinois Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.