Skip to main content

Data Territories: Changing Architectures of Association in International Law

  • Chapter
  • First Online:

Part of the book series: Netherlands Yearbook of International Law ((NYIL,volume 47))

Abstract

Territoriality is a powerful architecture of association in international law, performing significant bounding, distributive and placement functions. Yet it has always interacted with other global legal architectures of affiliation and disaffiliation, among them informational geographies. So what becomes of territoriality amid the turn to data analytics—the automated analysis of massive, distributed data sets—as a basis for international legal and policy decision, action, thinking, and prediction? This chapter recounts processes and practices already underway on the global plane that are effecting, on one hand, the ‘datafication’ of territory (and the related rise of a logic of association) and, on the other, the ‘territorialisation’ of data (and the emergence or recurrence of ‘data territories’) in international legal order. Through these kinds of processes, and in its variable configurations, data might yet parallel physical territory (landed and maritime) as a primary medium for the conduct of juridical global life and conflict, a prospect that raises important questions for international law and lawyers.

The author is indebted to Hans Lindahl for conversation about this piece, and to two anonymous reviewers for insightful and instructive comments. Thanks are also due to Dr. Pornsakol Dao Coorey for research assistance.

This is a preview of subscription content, log in via an institution.

Notes

  1. 1.

    Fustel de Coulanges 2006, at 202–203.

  2. 2.

    See, e.g., Handl 2012, at 4: ‘[I]n a seemingly borderless world social, economic or environmental problems and their solutions tend to be transnational in nature, or “de-territorialised”, thus calling into question territorial sovereignty as a fundamental organising principle of the global legal architecture’.

  3. 3.

    Johns 2013, 2016; Frater and Ryan 2001; Yam 2008; Meier 2015.

  4. 4.

    Elden 2013, at 328.

  5. 5.

    Elden 2013, at 4; Oxford English Dictionary (OED) Online (2016), http://www.oed.com, accessed 6 June 2016.

  6. 6.

    See generally Prescott and Triggs 2008; Ryngaert 2015.

  7. 7.

    Prescott and Triggs 2008; Brunet-Jailly 2015.

  8. 8.

    Vattel 1760, at 137.

  9. 9.

    Jackson and Zacher 1997.

  10. 10.

    1933 Montevideo Convention on Rights and Duties of States, 165 LNTS 19.

  11. 11.

    Grant 1999.

  12. 12.

    Kesby 2007.

  13. 13.

    See, e.g., Moore et al. 2009; and Gagnon et al.2009.

  14. 14.

    Wai 2002.

  15. 15.

    Noyes 2011; Pahuja 2012.

  16. 16.

    Wilde 2008.

  17. 17.

    Oxford English Dictionary (OED) Online (2016), http://www.oed.com, accessed 6 June 2016.

  18. 18.

    See generally, for example, Sugarman 1983; Zizek 1989.

  19. 19.

    Evans 1998; Samama 2008.

  20. 20.

    Perrin 1927; Higgitt and Dolan 2010.

  21. 21.

    Leszczynski 2012.

  22. 22.

    Hardy 2009; Hewlett Packard (2016), Products and solutions / Eco solutions: CeNSE, http://www8.hp.com/us/en/hp-information/environment/cense.html, accessed 6 June 2016.

  23. 23.

    Economist (2015) Monitoring Nuclear Weapons: The Nuke Detectives, 5 September 2015, http://www.economist.com/topics/nuclear-weapons, accessed 6 June 2016.

  24. 24.

    Oleson (2015) Beyond the Bomb: The World’s Nuclear Watchdog Expands its Science, Earth Magazine, 27 April 2015, http://www.earthmagazine.org/article/beyond-bomb-worlds-nuclear-watchdog-expands-its-science, accessed 6 June 2016.

  25. 25.

    Stanley and Liao 2011.

  26. 26.

    On “corrupt” personalization, see C Sandvig (2014), Corrupt Personalization, Social Media Collective Research Blog, 26 June 2014, https://socialmediacollective.org/2014/06/26/corrupt-personalization/, accessed 6 June 2016.

  27. 27.

    Hardy 2009 (on a self-aware globe); Johns 2013, at 12-14 and 34 (on legal interoperability).

  28. 28.

    European Commission (2016), EU Commission and United States agree on new framework for transatlantic data flows: EU-US Privacy Shield, Press Release, 2 February 2016, http://europa.eu/rapid/press-release_IP-16-216_en.htm, accessed 6 June 2016; Boyd and Crawford 2012.

  29. 29.

    Benkler 2003, 2006.

  30. 30.

    Rauch 2005.

  31. 31.

    Hand et al. 2001, at 158.

  32. 32.

    Lee and Lee 2011, at 483 and 488. See generally Agrawal et al. 1993.

  33. 33.

    Aragones et al. 2005.

  34. 34.

    Hastie et al. 2009.

  35. 35.

    Hand et al. 2001, at 163 and 235.

  36. 36.

    Loh et al. 2003, at 358.

  37. 37.

    Azzalini and Scarpa 2012, at 5.

  38. 38.

    Hand et al. 2001, at 295 and 440–441.

  39. 39.

    Wang et al. 2005; Hand et al. 2001, at 295.

  40. 40.

    Wang et al. 2005.

  41. 41.

    Li 2005.

  42. 42.

    Hand et al. 2001, at 431.

  43. 43.

    Ciborra 2002.

  44. 44.

    Amoore 2009.

  45. 45.

    Vaitla 2014.

  46. 46.

    World Bank 2014, at 23.

  47. 47.

    Quinn et al. 2010.

  48. 48.

    Eagle et al. 2010.

  49. 49.

    1966 International Covenant on Civil and Political Rights, 999 UNTS 171, Article 9(2).

  50. 50.

    Amoore 2009.

  51. 51.

    Anghie 2007.

  52. 52.

    Taylor and Broeders 2015, at 230–235.

  53. 53.

    Reveron 2006, at 460; United States National Security Agency (NSA) (2010), Declassified UKUSA Signals Intelligence Agreement Documents Available, Press Release, 24 June 2015, https://www.nsa.gov/news-features/press-room/press-releases/2010/ukusa.shtml, accessed 6 June 2016.

  54. 54.

    Rudner 2004, at 209–210; Lefebvre 2003, at 531–532.

  55. 55.

    Reveron 2006, at 460; BBC (2010), Siprnet: Where the Leaked Cables Came From, 29 November 2010, http://www.bbc.co.uk/news/world-us-canada-11863618, accessed 6 June 2016.

  56. 56.

    Svendsen 2008; Sepper 2010, at 154–159; Svendsen 2012.

  57. 57.

    Church 2011–2012: Reveron 2006, at 457; Fenster 2011–2012, at 492, note 189; Department of Defense (DOD) 2012.

  58. 58.

    Department of Defense (DOD) 2012, at 63.

  59. 59.

    FBI website, https://www.fbi.gov/contact-us/legat, accessed 6 June 2016. See also Sepper 2010, at 159–166 (emphasizing the importance of professional community, professional reputation, professional ‘ethos’ and peer relationships in intelligence networks).

  60. 60.

    Rudner 2004, at 200.

  61. 61.

    Rohn and Erez 2013.

  62. 62.

    Rudner 2004, at 222; Sepper 2010, at 156–157.

  63. 63.

    Steele 2007.

  64. 64.

    See, e.g., Bach 2011.

  65. 65.

    Fustel de Coulanges 2006, at 202–203.

  66. 66.

    Case Concerning the Frontier Dispute (Burkina Faso/Republic of Mali), ICJ, Judgment, 22 December 1986, para 20.

  67. 67.

    E.g., Paasi 1998.

  68. 68.

    Johns 2013; Johns and Joyce 2014.

References

  • Agrawal R, Imielinski T, Swami A (1993) Mining Association Rules between Sets of Items in Large Databases. Proceedings, ACM SIG-MOD Conference on Management of Data. http://www.almaden.ibm.com/cs/quest/papers/sigmod93.pdf. Accessed 6 June 2016

  • Amoore L (2009) Lines of Sight: On the Visualization of Unknown Futures. Citizenship Studies 13:17–30

    Google Scholar 

  • Anghie A (2007) Imperialism, Sovereignty and the Making of International Law. Cambridge University Press, Cambridge

    Google Scholar 

  • Aragones E, Gilboa I, Postlewaite A, Schmeidler D (2005) Fact-Free Learning. American Economic Review 95:1355–1368

    Google Scholar 

  • Azzalini A, Scarpa B (2012) Data Analysis and Data Mining: An Introduction. Oxford University Press, Oxford

    Google Scholar 

  • Bach J (2011) Modernity and the Urban Imagination in Economic Zones. Theory, Culture & Society 28(5):98–122

    Google Scholar 

  • Benkler Y (2003) Freedom in the Commons: Towards a Political Economy of Information. Duke Law Journal 52:1245–1276

    Google Scholar 

  • Benkler Y (2006) The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, New Haven

    Google Scholar 

  • Boyd D, Crawford K (2012) Critical Questions for Big Data. Information, Communication & Society 15:662–679

    Google Scholar 

  • Brunet-Jailly E (2015) Border Disputes: A Global Encyclopedia. ABC-CLIO, Santa Barbara

    Google Scholar 

  • Church KA (2011–2012) Espionage 2.0: Protecting Human Intelligence Sources in the Digital Age. South California Law Review 85:1183-1228

    Google Scholar 

  • Ciborra C (2002) The Labyrinths of Information: Challenging the Wisdom of Systems. Oxford University Press, Oxford

    Google Scholar 

  • Department of Defense (DoD) (2012) DoD Information Security Program: Marking of Classified Information. Department of Defense Manual No. 5200.01, Vol. 2. http://www.dtic.mil/whs/directives/corres/pdf/520001_vol2.pdf. Accessed 6 June 2016

  • Eagle N, Macy M, Claxton R (2010) Network Diversity and Economic Development. Science 328(5981):1029–1031

    Google Scholar 

  • Elden S (2013) The Birth of Territory. University of Chicago Press, Chicago/London

    Google Scholar 

  • Evans J (1998) The History and Practice of Ancient Astronomy. Oxford University Press, Oxford

    Google Scholar 

  • Fenster M (2011–2012) The Transparency Fix: Advocating Legal Rights and Their Alternatives in the Pursuit of a Visible State. University of Pittsburgh Law Review 73:443–503

    Google Scholar 

  • Fustel de Coulanges ND (2006) The Ancient City: A Study of the Religion, Laws, and Institutions of Greece and Rome, tr. W Small [1874]. Dover Publications, New York

    Google Scholar 

  • Frater MR, Ryan MJ (2001) Electronic Warfare for the Digitized Battlefield. Artech House, Boston

    Google Scholar 

  • Gagnon AJ, Zimbeck M, Zeitlin J (2009) Migration to Western Industrialized Countries and Perinatal Health: A Systematic Review. Social Science & Medicine 69:934–946

    Google Scholar 

  • Grant TD (1999) Defining Statehood: The Montevideo Convention and its Discontents. Columbia Journal of Transnational Law 37:403–458

    Google Scholar 

  • Hand D, Mannila H, Smyth P (2001) Principles of Data Mining. MIT Press, Cambridge

    Google Scholar 

  • Handl G (2012) Extraterritoriality and International Legal Authority. In: Handl G, Zekoll J, Zumbansen P (eds) Beyond Territoriality: Transnational Legal Authority in an Age of Globalization. Brill, Leiden, pp 3–12

    Google Scholar 

  • Hardy Q (2009) The Self-Aware Earth. Forbes Asia 5(9):50–50

    Google Scholar 

  • Hastie T, Tibshirani R, Friedman J (2009) The Elements of Statistical Learning. Springer, New York

    Google Scholar 

  • Higgitt R, Dolan G (2010) Greenwich, Time and ‘The Line’. Endeavour 34(1):35–39

    Google Scholar 

  • Jackson RH, Zacher MW (1997) The Territorial Covenant: International Society and the Stabilization of Boundaries. Institute of International Relations, University of British Columbia Working Paper No. 15. http://www.ligi.ubc.ca/sites/liu/files/Publications/webwp15.pdf. Accessed 6 June 2016

  • Johns F (2016) Global Governance Through the Pairing of List and Algorithm. Environment and Planning D: Society and Space 33:126–149

    Google Scholar 

  • Johns F, Joyce D (2014) Beyond Privacy. Is Prevailing Legal Debate too Analog for a Digital Age? Human Rights Defender 23(3):24–25

    Google Scholar 

  • Johns F (2013) The Deluge. London Review of International Law 1:9–34

    Google Scholar 

  • Kesby A (2007) The Shifting and Multiple Border and International Law. Oxford Journal of Legal Studies 27:101–119

    Google Scholar 

  • Lee KC, Lee S (2011) Interpreting the Web-Mining Results by Cognitive Map and Association Rule Approach. Information Processing & Management 47:482–490

    Google Scholar 

  • Lefebvre S (2003) The Difficulties and Dilemmas of International Intelligence Cooperation. International Journal of Intelligence and CounterIntelligence 16:527–542

    Article  Google Scholar 

  • Leszczynski A (2012) Situating the Geoweb in Political Economy. Progress in Human Geography 36(1):72–89

    Google Scholar 

  • Li Y (2005) A User-Guided Association Rules Mining Method and its Application. Fifth International Conference on Computer and Information Technology, Shanghai, pp 150–156. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1562643. Accessed 6 June 2016

  • Loh S, Palazzo Moreira de Oliveira J, Gameiro MA (2003) Knowledge Discovery in Texts for Constructing Decision Support Systems. Applied Intelligence 18:357–366

    Google Scholar 

  • Meier P (2015) Digital Humanitarians: How Big Data is Changing the Face of Humanitarian Response. CRC Press, Boca Raton

    Google Scholar 

  • Moore AR, F Amey, Y Bessa (2009) Earnings Attainment of Immigrants in the USA: The Effects of Race, Gender, and Place of Birth. Equal Opportunities International 28(6):500–512

    Google Scholar 

  • Noyes JE (2011) The Common Heritage of Mankind: Past, Present, and Future. Denver Journal of International Law and Policy 40:447–471

    Google Scholar 

  • Paasi A (1998) Boundaries as Social Processes: Territoriality in a World of Flows. Geopolitics 3(1):69–88

    Google Scholar 

  • Pahuja S (2012) Conserving the World’s Resources? In: Crawford J, Koskenniemi M (eds) The Cambridge Companion to International Law. Cambridge University Press, Cambridge, pp 398–420

    Google Scholar 

  • Perrin WG (1927) The Prime Meridian. The Mariner’s Mirror. 13(2):109–124

    Google Scholar 

  • Prescott V, Triggs GD (2008) International Frontiers and Boundaries: Law, Politics and Geography. Martinus Nijhoff, Leiden

    Google Scholar 

  • Quinn JA, Okori W, Gidudu A (2010) Increased-Specificity Famine Prediction Using Satellite Observation Data. Proceedings of the First ACM Symposium on Computing for Development. Article No. 18. http://dx.doi.org/10.1145/1926180.1926203. Accessed 6 June 2016

  • Rauch J (2005) Logic of Association Rules. Applied Intelligence 22:9–28

    Google Scholar 

  • Reveron DS (2006) Old Allies, New Friends: Intelligence-Sharing in the War on Terror. Summer Orbis 50:453–468

    Google Scholar 

  • Rohn E, Erez G (2013) A Framework for Agro-terrorism Intentions Detection Using Overt Data Sources. Technological Forecasting and Social Change 80(9):1877–1884

    Google Scholar 

  • Rudner M (2004) Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism. International Journal of Intelligence and CounterIntelligence 17:193–230

    Google Scholar 

  • Ryngaert C (2015) Jurisdiction in International Law, 2nd edn. Oxford University Press, Oxford

    Google Scholar 

  • Samama N (2008) Global Positioning: Technologies and Performance. Wiley, Hoboken

    Google Scholar 

  • Sepper E (2010) Democracy, Human Rights, and Intelligence Sharing. Texas International Law Journal 46:151–208

    Google Scholar 

  • Stanley J, Liao L (2011) Planetary Skin Institute ALERTS: Automated Land Change Evaluation, Reporting and Tracking System. Proceedings of the 2nd International Conference on Computing for Geospatial Research and Applications, Article No. 65. http://dl.acm.org/citation.cfm?doid=1999320.1999388. Accessed 6 June 2016

  • Steele RD (2007) Foreign Liaison and Intelligence Reform: Still in Denial. International Journal of Intelligence and Counterintelligence 20:167–174

    Google Scholar 

  • Sugarman D (1983) Legality, Ideology, and the State. Academic Press, New York

    Google Scholar 

  • Svendsen A (2008) The Globalization of Intelligence Since 9/11: Frameworks and Operational Parameters. Cambridge Review of International Affairs 21:129–144

    Google Scholar 

  • Svendsen A (2012) Understanding the Globalization of Intelligence. Palgrave Macmillan, Basingstoke

    Google Scholar 

  • Taylor L, Broeders D (2015) In the Name of Development: Power, Profit and the Datafication of the Global South. Geoforum 64:229–237

    Google Scholar 

  • Vaitla B (2014) The Landscape of Big Data for Development. UN Foundation/Data2X. http://data2x.org/wp-content/uploads/2014/08/Data2X_LandscapeOfBigDataForDevelopment.pdf. Accessed 6 June 2016

  • Vattel E (1760) The Law of Nations or the Principles of International Law. Newbery et al, London

    Google Scholar 

  • Wai R (2002) Transnational Liftoff and Juridical Touchdown: The Regulatory Function of Private International Law in an Era of Globalization 40:209–274

    Google Scholar 

  • Wang K, Zhou S, Yang Q, Yeung JMS (2005) Mining Customer Value: From Association Rules to Direct Marketing. Data Mining and Knowledge Discovery 11:57–79

    Google Scholar 

  • Wilde R (2008) International Territorial Administration: How Trusteeship and the Civilizing Mission Never Went Away. Oxford University Press, Oxford

    Google Scholar 

  • World Bank (2014) Big Data in Action for Development. The World Bank. http://live.worldbank.org/sites/default/files/Big%20Data%20for%20Development%20Report_final%20version.pdf. Accessed 6 June 2016

  • Yam P (2008) Digital Humanitarianism. Scientific American 298(6):18–18

    Google Scholar 

  • Zizek S (1989) The Sublime Object of Ideology. Verso Books, London/New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fleur Johns .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 T.M.C. Asser Press and the authors

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Johns, F. (2017). Data Territories: Changing Architectures of Association in International Law. In: Kuijer, M., Werner, W. (eds) Netherlands Yearbook of International Law 2016. Netherlands Yearbook of International Law, vol 47. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-207-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-207-1_5

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-206-4

  • Online ISBN: 978-94-6265-207-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics