Category Archives: globalization

Ink-Jet Wonders and Other Printed Curiosities

The appeal that was exercised by a newly discovered set of gores that arrived at Christie’s announced was considerable.  The map constituted one of the first mappings to show the place of America on the globe–and indeed to map the globe as a globe.  The considerable attention that the gores slated to go to auction in mid-December attracted must have lain not only in their rarity, but the cult of priority of the naming of place.  The gores exemplified the declarative role of mapping to designate place, as well as a geometric organization of global continuity shortly after the discovery of the new world, but it was hard to imagine that the appeal of the gores in our increasingly pixelated, pointillistic, and fragmented mediated sense of space was not in the solidity with which they seemed to embody “America,” both on the map and on a globe.

The gores were highly valued as the first image that mapped America–and assigned it a name–whose almost cultic prestige had grown allowed viewers view a watery western hemisphere, since described by antiquarians as the “birth certificate” of America, in an ahistorical but nineteenth-century fashion, for bestowing the name of the European navigator Vespucci on the continent that he had described in a set of letters that widely circulated in Europe from 1503, and provided a written account that oriented readers to to the New World, describing a vicarious sort of witnessing the unknown that expanded the demand for global maps as they were widely reprinted.   Amerigo Vespucci described the long shorelines of a New World  that allowed a distinctively modern way to view a rapidly expanded image of the inhabited world, and allowed Waldseemüller–even if the humanist cosmographer who had trained as a theologian rarely travelled beyond his town of St. Die, near Strasbourg, but exploited the printing press to reconcile Vespucci’s findings with precepts of map projection derived from cutting edge cartographic tools.  And when he adopted the format of the mathematician Apian to render the world on gores, he used the graphic techniques of projection to lend solidity to the first narrations of the New World.  So it was quite surprising that the forged copy of gores that almost made it to auction in 2017 belonged to the same visual culture of online images–the culture of image capture and digital reproductions–as what seemed a worm-eaten sheet of printed paper was found to be created by tools of digital photographic reproduction, with little human trace of an engraver’s hand, although they seemed strikingly similar to the long unknown image of a material rendering of the post-Colomban world.

 

MUNICH WALDSEEMULER in Peckham, 1504:1510pngUniversity Library of Munich, ULM Cim. 107#2. Courtesy of University Library of Munich

Indeed, the similarity between the online diffusion of the image and the reproduction of the fake seems a modern rewriting of the intense attention that Waldseemüller and his circle of geographers in St. Die embraced the tools of early modern engraving to design multiple woodcut maps in the first decades of the sixteenth century, in order to meet a fast-growing market for globes that lent legibility to the world.  But the new forms of legibility that the online reproductions prized–so distinct from the printed images of the early sixteenth century–seem something like a moral fable of the different levels of spatial legibility of different ages, if not two period eyes.  The gores that cosmographer Martin Waldseemüller and his St. Die circle had designed were printed in 1507 had been long prized as the earliest example of an identification of the New World as America, in honor of Vespucci.  In an elegant description of the entire surface of an earth as yet not fully known, but able to be mapped in a woodblock form, the gores adopt and incorporate aspects of recent engraved maps and nautical charts in a synoptic visual digest.  The gores form part of a distinctly cosmographic project of rendering the world on a graticule of parallels and meridians, and vaunting the adoption of an ancient global geometry for transposing the curvature of the inhabited surface of the globe to a sectional globe of two dimensions, despite their limited toponymy, and balance their comprehensive coverage with the treatment of the map as a canvas to advertise the new naming of America, expanding the map’s surface far beyond the manuscript tradition of Ptolemaic maps and orienting viewers to the predominantly watery surface of the world.

 

800px-Claudius_Ptolemy-_The_World

 

The single sheet that seemed early modern map gores for a short bit of time seemed to belong to the first records naming the continent after the navigator, and clearly gained their value as such as a piece of paper:  the announcement of a new discovery of the sectional rendering of the world’s surface by regular intervals of thirty degrees appeared to offer an early geographic primer modernizing Ptoleamic geography, based on the first nautical charts of the new world.  The attempt to chart global space for Renaissance readers who remained in Europe were long associated with the cosmographer Martin Waldseemüller, the mathematically-trained theologian and cartographer known for creating several global maps, and for writing one of the first treatises of cosmography to adopt Ptolemaic principles to explain and describe the principles for mapping the New World.  By announcing the adoption of a new set of tools as a new descriptive framework in a manner similar to his 1507 cosmographic wall-map, which unified the nautical charts of America Vespucci with a Ptolemaic framework of world-mapping; the sheet of map gores supersede traditional nautical charts in a form of world-making.

Indeed, the single sheet seemed to seek to promote universal geometric tools to unify an expanded global expanse:  the new sense of the “cumene” would not be recognized by Ptolemy or ancient mappers, and gave an expansive portion of its surface to oceanic expanse, registering a new conception of a terraqueous world.  The graphic image following Ptolemaic principles of projection incorporated Vespucci’s accounts and nautical maps in a new model of cosmographic knowledge, inviting readers to experience vicariously his travels to the New World, and to understand the greater value that he attributed to maps and cosmographical knowledge to arrive at this site across the ocean in another world:  much as Carlos Fuentes has recently offered an indelible picture of the epistemic paralysis of the monarch Don Felipe, a barely disguised version of Philip II, as a semi- autistic ruler doubting the existence of a new world that was not comprehended in the palace to which he has withdrawn in Terra Nostra (1975), a massive novel whose literary structure mirrored the tripartite structure of the palace Philip II commissioned to include maps of all the Spanish possessions, the embodiment of the globe on a set of twelve elegant map gores would condense and rebut such the imperial stance of utter disregard to the new world that possessed Fuentes in his novel.  The careful construction of the globe’s surface onto indices offer a global purview that might be called the first age of globalism.

 

1. Waldseemüller’s single sheet map condensed the cosmographic principles the he had followed in series of elegant wall-maps that foregrounded the artifice and difficulty of the composition of the world map.   Waldseemüller and his circle had actively promoted standards of global legibility, using Ptolemaic precepts in a triumphal manner to celebrate the power of naming, charting, and mapping new lands for European audiences that invited ways of telling, describing and narrating Europeans’ spatial relation to a new world.  The large wall-maps that he produced in over a thousand copies promoted modes of reading globalist relations  facilitated by copious textual cartouches and inventive decoration, that underscore its cosmographical nature as a product of writing, drawing, and design to affirm the growth of oceanic expanse that defined the continents.  The wall map was hardly free of what Edward Tufte might call “chart junk” on its exuberant margins, but conveyed tthe excitement of heralding a new graphic synthesis of a global map over which Vespucci presided in one lunette, adding continents of a new hemisphere to the known globe, offered a cartographic solution to a problem of ordering terrestrial space.

 

Vespucii On Map

Waldseemuller-Map-631Martin Waldseemüller, Universalis Cosmographia secundum Ptolomei Traditionem . . . . / Library of Congress

 

 

The image is no less than celebration of the new status of cosmographical arts that elevate the medium of engraved images to tools of global description.  If the twelve-sheet c wall maps Waldseemüller’s school composed, designed, and whose engraving they closely supervised set a new standard for the elevation of cartographical skill from a technical craft to a new model of knowing and seeing–and a way of making epistemological claims, as much as using transmitted forms, in ways that linked the art of mapping as a scribal technology to cultures of telling, describing, and demonstration, the wall maps invite viewer’s eyes to comprehend space outside a situated position.

 

Waldseemuller_map_2Martin Waldseemüller, Universalis Cosmographia secundum Ptolomei Traditionem . . . . / Library of Congress

 

In a counterpart to the large wall maps that he designed and sold, Waldseemüller expounded the modern precepts to orient one in space and synthesize global knowledge by parallels and meridians in his Introduction to Cosmography (1507).   The slim volume,  the basis for his identification with the unsigned gores, seven as a manifesto for the twelve-sheet engraved global wall map, over which preside busts of Ptolemy, the ancient geographer who formulated the mathematical precepts of terrestrial projection on a graticule, with America Vespucci, combined the modern experience of navigation with the ancient precepts of learning and naming place.   Waldseemüller himself never travelled far beyond his native Strasbourg, but invested the map with authority to communicate geographical knowledge as a token of modernity of embodying a global geographical knowledge, albeit a modernity now displaced by the grid.  Waldsemüller’s projection has the energetic displacement of the authority of a nautical chart, echoing how Vespucci declared his competency in his letter to arrive at the New World even “without the knowledge of sea charts” prized by navigators, being “more expert in navigation than all the pilots of the world.”   The gores staked a similar model of expertise of reckoning and calculating distance and place by a new matrix of latitude and longitude that they embody:  the preeminence of the graticule as an epistemological tools of global geography that expanded the scope and nature of geographical knowledge lasted some four hundred and eighty years until it being displaced by grids.  Indeed, the value that the map was readily assigned suggests its survival in a distinctly post-scribal culture of mapping.

Did the value that the auctioneers assigned the map gores reflect these grandiose knowledge claims?  The gores elegantly translated knowledge of the earth’s newly discovered hemisphere to indices the viewer could readily process and digest, foregrounding the new name that it proposed for the continent named after the Italian navigator.  But they assumed a new status in the age of digitized maps, and Google Earth images of global interconnectivity, which may have been paradoxically elevated by the newly antiquated image they acquired.  Rather than being sold as emblems of knowledge, the new image of the gores that Christie’s claimed to bring to public auction had gained an immeasurable status after the earlier auctioning of similar gores for above a million dollars, not to mention the unprecedented price that the United States Library of Congress agreed to pay in 2003 of $10 million for the sole surviving edition of the large wall map Waldseemüller had engraved, the one copy of the thousand-odd he had printed, of which it was something of the poorer cousin, but which had been widely touted as the “birth certificate” of America, and the map on which Waldseemüller had proposed using the name of the Florentine navigator Vespucci who had described the long coastlines of the New World in his printed letters.

The set of map gores, a complementary spherical map that Waldseemüller had described making, provided an early image of global totality that gave a similar dominance to the line–indeed, the geometrically determined line–to orient viewers to a global surface.  When the late historians of cartography David Woodward and J.B. Harley tersely defined the map in “purposely broad” terms, at the outset of the monumental History of Cartography, an extremely elegant series since expanded over multiple volumes, as “graphic representations that facilitate spatial understanding of the world of things, concepts, conditions, processes, or events in the human world,” they may have been thinking of the graphic lines of the gores as such a facilitation of spatial understanding.  For the gores process the encounter with the New world, the travels of the navigator, and the recovery of Ptolemaic precepts of world-mapping, and the naming of the newly discovered continents in the western hemisphere on a clearly graphic construction.  Woodward and Harley’s emphasis on “graphic representations” recuperated the ancient Claudius Ptolemy’s use the Greek verb  γράφειν (graphein), or “to write,” and Waldseemüller’s assimilation of that verb of the act of writing to engraving tools; it caused much revision, even by Woodward himself, of its lack of allowance for cross-cultural comparisons, but suggests a significance of writing systems as a mode of ordering space.  Waldseemüller appropriated the authority of the verb in print, giving the engraved line a deictic sense of displaying space–

 

Single Sheet UNM

Waldseemüller-Globus.jpg

Waldseemüller School, 1507 Globe Gores/Badische Landesbibliothek

 

–in a map of globular design of the sort that Woodward idealized as the culmination and embodiment of cartographical principles, in a globular map of the sort that was more readily defined in a more familiar globular form by 1583, here shown in two images of the same year in “universal rendering of the newly discovered parts of the world,” printed in Italian, or discovered parts of the world, which emphasize nautical travel as the basis for the incorporation of place on the globe, and reveal the increased scope of geographical exploration in the intervening eighty years.

 

Globular Italian Map Parte del Mondo Ritrovato 1583

 

 

Globe_terrestre_de_Jacques_Vau_de_Claye_(1583)

 

More broadly, however, “graphein” might be understood as the trace of the human that orients themselves to the world, hand-drawn or manually rendered.  These were soon shown to be absent from the gores:  indeed, the blurring of the very lines of the gores that went to auction suggest that they belong to a new visual culture of scanned images and photographic reproduction.  The very traces of graphical operations were permuted and erased in new ways, as is the sense of a human presence, in ways that suggest the distance of our own visual culture from Waldseemüller’s world, in ways that the forger never intended.

In their groundbreaking History of Cartography, David Woodward and Brian Harley had celebrated the line as the means of graphical orientation, in what now seems an elegy to the art of printing.  An unforgettable image remains clear in my head of David Woodward in his basement, in Madison, WI, running maps off a letterpress printer, and hanging them to dry on strings by clothespins, and his love of the ink applied to the engraved plate to present a precise rendering of space.  But the fake set of gores that reached auction were not printed or drawn, let alone in the Renaissance or during Waldseemüller’s life, but probably printed some five hundred years later, from a scan of the map in the James Ford Bell Library’s website.

The gores that arrived at auction this December suggest far less of a clear trace of a human hand, and perhaps belong to a different visual culture of online images.  Indeed, the astronomical value that the single sheet was invested may be a symptom of our entrance into a different visual culture of mapping–indeed, the sheet that seemed to be valued at more than a sheet of gold of the same size suggests the fetishization of the paper map in an era of web-based mapping, and mobile GPS.  The fake gores suggestedthe translation of Ptolemaic terms to a visual culture that privileges the dot and the grid as a basis for orientation, rather than the engraved line, but where the aura of the writing of space persists, and the paper map fetishized in a world that increasingly relies exclusively on mediated digitized images.  The set o fraudulent gores is itself something of a post-modern artifact,–less concerned with the authorities of narratives of discovery, but able to admit the false authority of the map as objective, and almost ready to accept the value of its aura even if it was only an image grab printed on old paper.

Continue reading

Leave a comment

Filed under fake maps, globalism, globalization, Mapping the New World, media studies

Data Visualization Fake-Out?

Nothing in the world could take us back/ to where we used to be,” as Mariah Carey sings in her 1990 hit, I Don’t Wanna Cry–recorded back in the very year Tim Berners-Lee and CERN collaborators unveiled the World Wide Web, using HTML to share documents across huge networks and URL’s to specify computer targeted and information requested.   The coincidence of the design of such a document system that led TBL to build and design the world’s first web browser on an NeXT computer and Mariah Carey’s cooing soft-pop hit on only emptiness inside came together again in the release the WannaCry malware–malicious self-propagating code, able to exploit back-door vulnerabilities of Windows 7–which revealed a landscape from which nothing in the world can take us back to where reused to be.

Indeed, the boom of Malware by which the world’s information highways have been afflicted may have in general declined since 2017, from when the number of malware variants has dropped considerably, malware attacks, from ransomware to cryptojacking attacks, have risen, and the number of malicious email attachments has ballooned, often by inserting malicious code into a website to allow hackers to view financial information and histories of corporate entities and other institutions. The absence of any guides to ransomware of different varieties have left many increasingly vulnerable, as networks gain the vulnerability akin to “skimmer” able to glean financial histories off of the magnetic strips of credit cards at ATM’s across the world, exposing the global vulnerabilities into an infrastructure allowing global financial transactions. And despite relatively wide consensus that one should not pay ransoms from WannaCry as doing so would neither ensure access to the compromised files and possibly only expose one to further vulnerabilities to future attacks, the current wisdom of disconnecting all devises from Ethernet cables and wireless dongles suggest that disconnection without rebooting the system is in fact the best option for compromised systems, with an installation of Microsoft’s security patch–in addition to windows security updates and a reputable antivirus blocker. But the fear of vulnerability in a world where WannaCry remains a threat that has continued to hit 13,000 plus organizations since 2020 has led to increased concern how to prevent WannaCry attacks.

But the data visualizations we’ve used to describe the lateral progression of the encryption of data files from hard drives around the interlinked world lent a new prominence to the World Wide Web as a conduit for targeting destabilization.  It not only revealed how the world wide web has reshaped what we still call the world, but posed questions of how to map such a change, as even Microsoft employees in Redmond, Washington scrambled to chart the outbreak of malware after hackers exploited vulnerabilities in the unpatched Eternal Blue, in cyber attacks alternately known as WannaCry in 2017, and Non Petya when it later hit Ukraine, together with all companies, including large American ones, who did business with that nation, in an attempt to undermine its economic viability. From command central in what seems a concrete bunker of the future, before large screens, non-state Microsoft workers in Redmond, Washington tried to maintain a sense of security in their systems around the clock, and conduct repairs, in the weeks after the United States Department of Homeland Security urgently warned that out-of-date software was a global crisis and a national vulnerability. The malware just posed problems that local governments, municipalities, and law enforcement institutions could not bear, and which it seemed only Microsoft could be able to have manpower, incentives, and infrastructure to complete.

Kyle Johnson/New York Times

Wanna Cry left many literally crying for the sudden encryption of data, and many without services–and was intended to leave an unimaginable number of people desolate, if not quite with the absence of love that Mariah Carey wistfully evoked.  But the  virulence of its spread should offer a wake-up call to possibilities of global disruption we are still working to be able to track, map or fully comprehend in adequate fashion–but record as a virulent virus blocking systems most densely in nodes of a web-linked world.

the-wannacry-ransomware-attack_535798c2-38bf-11e7-b30b-76e7402dac55
Malware 2:10 pm

New York Times

The very same visualizations indeed obscure, by oddly rendering it as distributed, the agency that underpins such carefully orchestrated cyber attacks of global consequence, by almost naturalizing its spread.  For by moving the sites where data was most encrypted into a geographical frame of reference, the graphic doesn’t help orient us to its spread, so much as overwhelm us with the data-laden content to visualize a paralysis of global systems; it removes it from context or human agency, in order to capture the omnipresence of the self-propagating cyrptoworm as much as tell a story that helps to orient us to its spread.   Perhaps that is what was intended.

The mapping of global disruption is perhaps a nightmarish puzzle for members of the interlinked world, and demands a place on the front burners of data visualization:  the inadequate nature of considering the spread of systems-wide corruptions can be visualized by cases of the compromising of data, we lack the symbolic tools to grasp the rise of a new map of global dangers.   While such data visualizations provide a terrifying premonition of the destabilization that might result from the encryption of data on a broad scale, they obscure the possibilities of specifically targeted attacks on data and visible infrastructure that are now able to be developed, and the nature of targeted threats that we have only begun to imagine.  The redefinition in this new geography of document-sharing Tim Berners-Lee and friends developed has prepared the way for a landscape of interaction between removed places broadly adopted as a protocol for information-sharing– but one that, as Mariah Carey sung, and instigators of the malware hoped, left one only wanting to cry from behind one’s screen, devastated at the scope of the unforeseen swift data loss.

The data visualizations adopted to depict the flare-ups in compromised hard drives that the cryptoworm created in a manner of hours show the particular virulence with which malware crossed national divides in unprecedented ways, displacing relations of spatial proximity, geographical distance, and regional divides.  In crippling databases including Russian and Chinese private and public institutions in but a day, demanding immediate payment for data to be restored, the ransomware raised the curtain on a new age of uncertainty.  But was the threat eclipsed by the scale of the attack by which information was encrypted?  If the spread of malware seemed to grow across computer systems without apparent relations, the distributed agency that was invested in how the malware spread worldwide seemed to obscure the possibility of agency of the attacks, concealing the tracks of any perpetrator by placing a problem of urgency on screens worldwide.

oops.png
Wana_Decrypt0r_screenshot

Websites of news media of record widely adopted animated data visualizations to orient their readers to the proliferating corruption of data on tens of thousands of computers and computer systems on account of the malware caused.   Such elegantly animated maps don’t claim to be comprehensive, and are information-laden to the extent that seek to capture the unprecedented speed and range of the spread of the cyberworm launched Friday, May 12, 2017.  We have trouble even comprehending or grasping the scale or speed with which the virus spread on systems, of course, and speed at which malware was propagated itself across networks and spread laterally across systems, rather than by geographic relations, working without a phishing hook of any sort but exploiting an NSA-developed backdoor vulnerability in the Windows 7 operating system to infect networks across national bounds, as it spread laterally across systems worldwide.

The spread of the encryption of hard drives data across space occurred in apparently haphazard ways, spreading globally in the first thirty minutes of across more advanced web-reliant regions of what we still call the globe.  While their spread “followed” systems whose operating systems had not been fully updated, it is important to remember that rather than spreading laterally along a system of their own accord, their release was planned and released by agents, rather than being a casualty of the World Wide Web; a map of instances of hard-drive vulnerabilities however can offer few diagnostic signs or clues to interpret their spread, but offer only a catalogue of individual instances difficult to process in their entirety, so overwhelming and geographically dispersed was their occurrence to defy easy interpretation or processing–they provide little that might be suggested as forensic evidence about their spread.

ransomeware 0 hr 30 min 0 sec

Red Socks Security: Malicious Threat Detection

If the growth of the virus’s spread across nations made it seemed to progress in ways that lacked a target, we may lack the tools to visualize the attack.  The systems afflicted were not linked on a geographical register, and in some senses didn’t make sense to read in a map–but if they spread on internet traffic, the broad scale of the attack of ransomeware only foregrounded the fears of where it had arrived from or offer any signs to appreciate any agency within its systems-borne spread.  But if the map seemed the best way to the speed of its growth, it was a distraction from the potential targeted threats of the malicious worm–until a lone British researcher, known as “MalwareTech,” saved the compromising of global systems as he serendipitously identified its kill switch to stop its spread:  what dominated the headlines conceals the dangers of losing sight of the specificity of the wide-ranging attacks, even while registering them in real time.

The rest of the world could only sit in silence, as Mariah Carey once sung, and watch the range of attacks unfold in space in real time:  something went wrong in the mode of sharing data across online systems that had to be couldn’t quite be understood.  If Maria Carey’s hit single contemplated the definite break in time, “only emptiness inside us,” the shock of the screens informing users across the world that their data had been definitively compromised made then realize that any notion of data security vanished, and any hope for composure in the face of cryptoworms had disappeared, as Mariah Carey’s softly-sung lyrics described, and as far away as a network-free world, or one where inter-connected users didn’t define the primary routes of its transmission, without considering the dangers of the compromised infrastructure–not only in banking, but in traffic system, airport controlling, water quality monitoring, and even traffic flows.

But we continue to rely on geographic registers, as if we can’t let go of them, and it is what we have to explain the global spread of compromised systems and a collapse of data security.  The cryptoworm successfully obtained advanced user privileges that allowed it to hijack computer systems that allowed hackers to encrypt documents worldwide in one day, reaching such a broad range of hard drives to make it seem the attack was random or haphazard.  The attacks used code to release a self-propagating worm  that didn’t really move spatially, but progressed online, using a vulnerability for which Microsoft had released a patch only two months previous, in March, in devices that share files across local networks.   After the patch arrived, we were still mapping its spread, and contemplating the prospects of the return of a similar virus, so clearly had it asked us to redefine internet traffic.  But was did the broad spread of the worm and broad scope of systems compromises, which was quick to provoke deep fears of the vulnerabilities that exist from ransomware erase the targeted nature of a similar subsequent malware attack?  The spread of thousands of infections in over a hundred–and then over a hundred and fifty countries–across hard drives across the world exploited the failure to update software systems so broadly to obscure the origins or coordination of such malware attacks, whose use of normal language to alert users of encryption made them seem as if it were an isolated standard operating failure, able to be resolved by individual payment–

Wana_Decrypt0r_screenshot
petya-ransomware-how-remove-decrypt-files-new-unlock-computer-windows-dropbox-file.jpg

–even as the malware crippled networks in different countries without having the appearance of any fixed target.  And if masquerading as a form of ransomware, later variants of the cryptoworm suggested a far, far scarier version of the scope of data corruption.

wannacry_03

Kapersky Lab/Ars Technica

We were of course struck by the unprecedented speed with which such worms replicated along these dispersive networks–following paths that are not made evident in the map of compromised hard drives provided by data security firms, which show the progression of a disease that, like a cancer, creeps invasively along a hidden network, suggests a nightmare of the distributed agency of the internet, invaded by a particularly vicious parasite that for a considerable amount of time even experts saw no way to resolve.

We can now watch the spread of internet attacks in real time, looking at the threats of hacking in real-time, in ways that reflect the emergence of the internet and World Wide Web as a real-time battlefield, even if this is only a representative tracking of hacking attempts tracked by Norse.  It doesn’t include the ten millions of daily attempts to hack into the Pentagon, or the similar number of threats that the National Nuclear Security Administration tries to fend off–and the millions of attacks universities daily confront.  But if we are apt to be mesmerized by the range of such attacks, impossible to fully comprehend or track, we’re likely to be overwhelmed by the serious fears of the security vulnerabilities of which they cannot but remind us, although the abstracted sense of a constant barrage of online attacks can remove us from all too real dangers of their infrastructural effects–and the dangers of destabilization of specifically targeted strikes.

m8g8Z1X.gif

Norse

And if we might do well to take stock of the range of attacks by hackers to which the United States is vulnerable, mostly from China and Chinese sources, privileging our country as the target of future strikes–

L2zRKfa.gif

Norse

–we loose sight of their increasingly global nature, now that much of the software to exploit vulnerabilities is available in the Dark Net.  The origins of such attacks aren’t really clearly able to be mapped–hackers are experts at deflecting or rerouting their signals, and bouncing around their traces to make hacks that are located from one site appear to emanate from another from another.  And infrastructural vulnerabilities of infrastructure are increasingly on the table for nations other than the United States, often without the means to monitor such cybersecurity issues or strikes.

In an age when the pathways of internet links may have spawned spontaneous revolutions, uprisings, and unexpected results of elections, non-human communication and propagation of such malicious malware viruses seem an apotheosis of the absence of any agency–a worm that is able to replicate itself within hard drives world wide, removed from any intent.  To be sure, the range of sped-up animated maps to track the progress of the viruses that compromised data across the world produced a sense of wonder at our vulnerability of a sort that has not been widely mapped since the Cold War:  the images generated of internet threats mirrors the map of the danger of missile strikes that emerged in Life magazine back in 1945, at the end of the Second World War–only months after the destruction of Hiroshima and Nagasaki by American atomic bombs, that increasingly stand as a premonition of the new nature of things to come.

Atom Bombs Descend on US LIFE 1945.png

Life Magazine: The Thirty-Six Hour War (November, 1945)

Mutatis mutandi, the image of the visual culture of the early Cold War was adopted by the Russian internet security agency, the Kapersky Labs, as a strategy to image the globally expanding threat of hacking to compromise hard drives and data-based systems.

malicious threats USA scale

Kapersky Labs

In an era that was defined as after or following the thaw of the Cold War, the internet emerged in 1990–just a year after the fall of the Berlin Wall heralded its thaw–as a new battleground to wage global conflict.  To be sure, the cybermaps of phishing schemes and potential email attacks are traced by the Kapersky labs in real time, to monitor for global security on the interlinked world-wide online systems.  But their dynamic images retain the symbolic structure of the arcs of a violation of national airspace to suggest the magnitude of the incursions into cyberspace they monitor and report on round the clock.

We continue to map the global spread of malware as if to wonder at its scale:  the distributed compromising of data as an animated sequence of simultaneous flare-ups of intensity from yellow to burning red across the world, as if to pose the question of its communication in terms of spatial continuity and proximity.  In some of the best data visualizations of the scare of WannaCry and Petya viruses, the brightly burning flare-ups signalled a fire that burned so brightly to become impossible to contain as if a metastisizing online cancer spread across the world’s wealthiest regions.  Despite the power of the animated visualization, we may map it wrongly, as if to imply it can be diagnosed as a spatially transmitted contagion without a target or destination.  In using the data-laden information of cybersecurity firms to map the occurrence of data corruption and systems infection, the political antagonisms and animosities that have fed the growth of malware are cunningly left absent from the map at our own peril.

1:03.png
1:19.png
2:24.png

Although these maps suggest the scope and nature of the self-replicating cryptoworm, they may take the metaphorical value of a computer virus in literal terms, as a disease map, or biological virus whose contagious could be explained,–like the famous Snow Map, created by a founder of modern epidemiology,  Dr. John Snow, to devise a mode to convince readers of the transmission from a water source of the 1854 London cholera outbreak.  Of course, the malware maps do not try to communicate the pathways or mechanics of the virus’ spread.  For rather than showcasing an event that was planned and of human agency, and whose propagation was in some sense designed, they run the risk of naturalizing both the incidence of systems’ compromises and the malicious nature of the very phenomenon that they describe.  While the meaning that each bring pixel cannot even be understood or processed in a global scale–its impact was local–the intensity of the outbreak seemed almost a skin disease on the surface of the world.  The intensity of its transmission surely mirrors the density of online connections or an economy that was web-based, as networks allowed its contagion spread from Indonesia to Europe the United States, raising alarms as it seemed to actualize some of the worst fears of a cyberattack, of the de-empowered nature of a computer system suddenly devouring its own data, but like a faceless god, from 11:00 one Friday morning, so that by 1:20, the spread of the malware had dense sites of infection on five continents.

The local merged with the global, however, in ways difficult to map:  the maps of real-time tracking of the spread of the worm across a grey, global map made it seem totally removed from human actors, in hopes to capture the speed by which the worm managed to rapidly to spread laterally across systems, using an onslaught of randomly generated IP addresses as a way to target an ever-proliferating range of hard drives through multiplying packets sent to remote hosts, whose own hard drives were hijacked, leaving anonymous-sounding messages of no clear provenance to pop-up on users’ screens, in ways that seem to imitate the “normal” logic of an algorithmic process entertaining the possibility of implicating the user in the encryption of their hard drive or the deletion of necessary valuable files.

screen-shot-2017-05-16-at-6-32-06-pm

The communication of the virus–a biomedical metaphor that seemed particularly unable to offer any diagnostic value, suggesting either the banality of the infection or its nasty spread–was not nosologically helpful, but suggested the virulence of its spread.  The natural history metaphor of the worm–or, better yet, the coinage of the cryptoworm–better expressed the lack of clarity as to its provenance or the seriousness of its damage.  Although subsequent investigations found that the first infections appeared, globally, on computers in India, Hong Kong, and the Philippines, according to SophosLabs, the stage was set for a three-pronged global spread–as if in a negative version of the Trans-Pacific Partnership, moving from South-East Asia worldwide–that began from 7:44  UTC with such startling rapidity that it will demand detailed unpacking to understand the target or decipher any of the aims that underlay the attack, or the extent of its destructive scope. The spread of the self-proliferating worm was only stopped by the inadvertent discovery in the code of the ransomware of a kill switch, which allowed a security researcher known only as MalwareTech to register a domain name able to slow the spread of the infection in a compromising manner, effectively halting its viral spread.  Despite the rapid proliferation of visualizations of the unprecedented sale of its virulence, in retrospect, it might make sense to ask whether the undifferentiated global nature of the visualization, while stunning, distracted from the malicious operations of its code, and what better metaphors might exist to describe the spread of something dangerously akin to cyberwar.

We only have a few cartographic metaphors to describe the lateral spread of online compromising of computer data and the infiltration of networks, because of the speed with which it spreads challenge human cognition.  Even if it can be schematized in a format that suggest the density of data compromises or the amount of encrypted files, the visualizations offer a limited basis to orient oneself to the seriousness or the danger of these infections, which once they start offer little possibility of stopping their spread.  The later visualizations of the global impact of the release of Wannacry network worm are usefully foreground the rapidity of its spread, and raise the specter of its unstoppability.  But the visualizations of the rapid flare-ups of malware that infect hard drives and encrypt their data may conceal the targeting of instability.  If the spread malware and ransomware have been primarily linked to extortion, the spread of self-propogating cryptoworms cannot only be seen in numbers of systems compromised:  for they are  released and created in order provoke instability, as much as for Bitcoin revenues.  Although theft of data is usually seen as most valuable to the owner of the dataset, the potential interest in ransomware as a service–and much ransomware is now available on the darknet in different forms, suggests a needed growth in cybersecurity.

If ransomware collectively netted about $1 billion during 2016–and stands to become a growth industry of sorts–the latest Petya virus netted but $10,000, although the benefits of the attack might have been much greater–in the form of the disruptions that it creates, often not so clearly racked or visible in the data visualizations of its spread, whose animated explosions suggest its out of control migration across networks as wildly crossing boundaries of state sovereignty, encrypting data on computer systems across space as it travelled along the spines of the internet as if without any destination, as tens of thousands od systems were entered and compromised via ‘back door’ disrupting hospitals in the UK, universities in China, rail in Germany, or car plants in Japan, in ways that were far more easy to track as a systems collapse by locking its victims out of critical data that allowed their continued operation.  The demand for ransom payments to restore apparently stolen data was a screen for the disruption of invasive attack on companies’ computer networks, whose compromising can only start to suggest the infrastructural disruptions they created as they rapidly globally spread, whose apparently anarchic spread revealed the new globalized nature of system vulnerabilities.

Malware explosion 2:05
Malware explosion 3:15
Ransomware4:46 pm
ransomware 5:55
wannacry-map

While malware is distinguished by the demand to hold hostage the encrypted files of one’s hard drive, the viral spread of worms targeting systems vulnerabilities can disrupt systems and infrastructure in ways particularly difficult to defend against.  Although the attacks depend on failures to update systems and to preserve retrievable back-ups, the vulnerabilities invite disruptions on a scale only so far imagined in futuristic films.  These apocalyptic scenarios are perpetuated by security firms–and by the video games of the global imaginary that require only greyed out background maps to treat data visualizations as having sufficient complexity if they register the intensity of attacks, even if this only gives cover for the malicious actors who perpetuate their spread.  But the assault on systems by the backdoor vulnerability first discovered by the NSA, in its program for targeting and infiltrating select foreign computer networks, but now for sale on the Dark Web, may only raise the curtain on a far more malicious range of malware, able to backdoor systems that are connected to transportation networks, water treatment plants, traffic systems, credit card systems, banking and airport controlling, far beyond cel phone systems, and able to–as the attack, just before WannaCry plagued web-based systems, compromised IDT Corporation–evade security detection systems.  While regular, complete and restorable systems back-ups may be the only response to ransomware, the possibility of already backdoored systems has lead to fears that the Shadow Brokers group who unleashed the Eternal Blue code from the NSA is a group of Russian-backed cybercriminals, and the hackers who released WannaCry who cyber researchers believe have tied to North Korea, may raise the threshold on cyberwarfare of a scale unheard of in previous years.

“Nothing in the world could take us back/to where we used to be.”  Golan Ben-Omi–who views the analytic skills honed in studying Torah as good training cybersecurity in the Chabad-Lubavitcher community–  Chabad-Lubavitch communities are interested in preserving the integrity of their websites from profane pollution, but are attuned to the dangers of data breaches.  The attack that was made on his company, IDT, by means of an NSA tool with the capacity to penetrate computer systems without tripping alarms–named “DoublePulsar”–enters the kernel of computer systems, or its inner core, to trip the connections between hardware and software that would allow hackers to steal systems credentials in order to compromise systems with far greater impact than earlier breaches and infections, appearing as ransomware, but perpetrating far more serious damage on a system.  The sequential flaring of compromised computer hard drives suggests a landscape that Ben-Omi has been studying for over fifteen years–and believes that the analytical skills honed in the study of Torah will allow his students to analyze.

While we lack the tools to start to map disruptions on such broad scale, the  If the attacks on hard drives that occurred in over one hundred and fifty countries on Friday, May 12, 2017 may have been a case of intentional disruption, but the Petya ransomware attack of July, which successfully targeted the same vulnerabilities, exploited similar vulnerabilities in a potentially more targeted weaponized manner.  Although it “is only code,” the lateral spread across the spines of the internet created fears of impending disaster across the most digitally rooted areas of the world, spreading fears of data disruptions, crashes and infrastructure collapse whose potential won’t be able to be so clearly mapped for quite some time.

The terrain of the crypto worm’s spread is better able to be understood, if not quite familiar.  During the most recent space of malware attacks left most untouched places those farthest from the most unreflective internet-dependent, the map only can suggest the real-life inconveniences that can hardly be captured by the burning flares of yellow-red bursting at spots across the globe at unprecedented velocity.

2000px-InternetPenetrationWorldMap.svg

Global Internet Penetration 2012/Jeff Ogden

InternetPopulation2011_HexCartogram_v7-01.png

Oxford Internet Institute (2011) Data on Internet users and population from World Bank 

For while not only communicated–as at first believed–by malicious email attachments, internet links clicked by users whose unreflective response unleash lost data, frozen systems, or looted bank accounts, the spread of ransomware parallels the amazing intensification of net-dependence and systems-based communicative tools, revealed below in the new information ecosystems that have arisen, illustrated in the quite spread of Facebook use over a short amount of time.

FB-World-Map-Comparison.png

The relation between online activity and real-time consequences are difficult to map.

All maps serve to help tell stories, and the intensity of Facebook connections suggest more than a huge time-suck of human lives:  it reveals the increased homogeneity of the systems we use, and the similarity of what we see and read.  But if all maps tell stories, the necessarily partial nature of the dense visualizations of the global disruptiveness of malicious attacks on computer systems seem compromised:  while over-laden to challenge the abilities of viewers to process their content, they only tell the most superficial part of real-time story–the compromising of data–and not the consequences that the widespread collective compromising of hard drives will effect both immediately and in the long run.  And here we get onto thin ice in terms of what can be visualized, and the limits of counting the datasets of the corruptions of computers or systems, and the difficulty of counting beyond the density of compromised hard drives to the real-world implications of systems’ collapse.  One can only start to imagine the implications of such collapse in maps contracting the real-time compromises of computer systems, in ways that reveal the global nature of an infectious spread of malware, but also obscure the different places that might be targets of weaponized malware attacks.

Malware Explosion 12:52

What we can track is the most immediate end-product of the malicious attack, but it offers few clues to interpret the basis for the attack or indeed the different scale of its real-time long-term consequences.

The visualizations track an almost near-inevitable progress of red flares in internet-dependent hubs that appear to overwhelm viewers with their over-laden information in ways that run the risk of obscuring any sense of human agency–or intent–as if to track the spread of a virus across a system that lacks internal logic of its own.  The intensity of attacks on computer networks tracked from the Wannacry ransomware showed the astoundingly rapid spread of the infectious cryptoworm that caused the attacks.  But it presented them as if they were in fact geographically localized, but the disruptions were purged of any explanatory context, geopolitical or other.  For the inevitability of the spread of malware that the images provoke–and the fears of the unstoppability of further crypto worms–may obscure the dangers of their weaponization.  If the launching of cyberthreats is often depicted as a real-time war by cybersecurity firms as Norse–

world wide war.png

–we may be increasingly in need of mapping the intersection of such live attacks on data and their real-life consequences beyond the compromising of datasets.

We  were recently warned how the expansion of malware and ransomware would soon propagate over networks in more virulent ways.  Earlier worms that infected hard drives as Conficker in 2008 and SQL Slammer back in 2003 or SamSam, spotted in 2016, offer but “a harbinger of a new wave of more malicious, tenacious and costly ransomware to come,” of even greater scale, warned Joe Marshall of Cisco Talos, with “bigger payouts.”  Marshall warned of the greater goals of hackers to infect networks, and his warnings might be augmented by suggesting the dangers of hackers working with governments to use malicious code to “cast a wider net” through self-propagating crypto worms able to laterally traverse  huge corporate networks as tools by which to target nations–and national infrastructure–in ways that the fear of network intrusion have only begun to come to terms.  When Marshall and his co-author Craig Williams noted in 2016 that the rise of ransomeware was an “ever-growing problem” that will involve greater payments to restore databases in Ransomware: Past, Present and Future with greater “intrusive capabilities,” with the repurposing of network vulnerabilities, on a massive scale, presumably including the targeting of entire systems.  The maps of data encryptions and corruptions that WannaCry caused worldwide served to capture these fears, and their broadly trans-national consequences; the trans-national nature of such a strike on hard drives may well obscure and conceal the strikes and intentions of other malicious actors.  Although some believe payment the easiest option to retrieve data, as the worms are developed that target vulnerabilities in systems, they will potentially be able to compromise targeted banking, transportation, and emergency infrastructures.

Do visualizations of the immediate fears of the spread of one virus conceal concerns of the weaponization of such internet-born infections on specific targets and nations, despite the seemingly unplanned ubiquity of their spread across interlinked systems?  Despite their shock, such visualizations of the intensity of compromised systems, often echoing hubs of internet service, raise pressing questions about how to map the operations and actors behind them that are far more complicated to process fully–and lie off of the map.

1. Viewing visualizations of such rapidly spreading worms that compromised computers on a global scale, one wants to be able to peel away layers of the visualization, to reveal, as layers of an onion, the networks along which the cryptoworm laterally spread and the extent of disruptions that its spread caused.  For the scale of the disruptions, and the intent of the hackers or those who launched the malicious code, may only be revealed in a more localized map of the sorts of destabilization that cryptoworms might produce.  While leaving us to wonder at the unprecedented scale of their recent spread over a few hours or minutes, the visualizations take geographical space as their primary register, blank background maps bleached of underlying history, may make them all the more misleading and difficult to read, as they are removed from human agency and context, and treated as an artifact of the spread of the reliance of increasing multinationals on internet services and web-based networks.

Differences in online activity are far less lopsided across geographic space than in previous years, as shown by the Oxford Internet Institute by a cartogram warping of global space showing the relative density of online activity by 2013 data, in ways that allow the broader targeting of systems to conceal a malicious attack on a country.

World Online 2013
Percentage online OIL

–which might also  be read as a record of the increased vulnerability of specific areas, and the systems vulnerabilities might offer to compromise local infrastructure, and start to focus on the implications for those places.  Doing so would consider the growing intersections between The Real World and the internet in a complex social continuum, where stability can be disrupted at select nodes more dependent on how worlds of finance, banking, shipping, health, and traffic are increasingly interlinked.  Given the inevitable nature of such vulnerabilities, the frequent backing up and smooth restoration of backups are necessary to erase the growing threats not only of malware or ransomware, but the disruptions of critical infrastructure future attacks might allow.

Continue reading

Leave a comment

Filed under computer viruses, cybersecurity, data visualization, globalization, World Wide Web

NORAD Maps the Flight of Santa’s Sleigh

If Santa Claus is global, the image of Santa living in the North Pole outside of sovereign divides has been elevated to a new horizon of expectations in the age of real-time maps. The question of “Where is Santa?” now can be responded to on a real-time viewer, prepared each and every Christmas Eve for over fifty-fie years, the North American Aerospace Command. For since the Cold War, and through the present age of smart phones and real-time tracking, NORADh as invited viewers all over the world the chance to track the gift-laden sleigh of Santa crossing the night-time sky at the speed of starlight. Never mind the different hours and expectations of Santa Claus in different nations or countries. For NORAD allows the world to track the flight of Claus cum reindeers on NORAD’s Santa Tracker, an annual collective exercise in mapping of increasing popularity, moving the image of bearing gifts into the globalized world.

images-52.jpeg

Indeed, the mind-boggling proportions of its popularity, attracting upwards of 20 million individual users in 2011 alone, is a statement not only to its improved UX, but to the versatility of its incorporation of mapping servers better to imagine the itinerary of Santa’s airborne sleigh.  For while we once envisioned the night-time flight of Santa Claus far-off and against a starlit sky and full moon, to accentuate the surprise of a magical sled-borne itinerary–

–the Santa Map brings that journey up-close for everyone before a computer monitor, following a sort of sleigh space that is the surrogate for airspace.  The remapping of Santa’s itinerary has been done in a way that tracked, as the sleigh’s global progress is intercepted and relayed online in real time from posts of remote observation to viewers around the world.  And in an age of global surveillance, there seems to be no reason why Santa’s sleigh cannot as well be surveilled for the interests of children everywhere.

There’s a huge appeal in the ways that the Santa Map creates and imagined community, as much as it embodies an annual itinerary.  The interest in tracking Santa’s sleigh has grown considerably in recent Christmas Eves.  The huge interest in tracking Santa’s sleigh–and effectively mapping the visits of the airborne sleigh into our hearth–is a way of bringing maps in line with pleasure at a time when we need to look for solace where we can find it, and where we can find a comfort that the onslaught of most maps of contemporary events in fact rarely provide.  

Christmas has been a communal but solitary experience–located in the hearth and around the tree, and gift-opening a ritual of individual families–but somewhat serendipitously, the collective witnessing of the Santa Map offers a vicariously removed experience for crowds of viewers, removed from one another but creating the illusion of comprehensively witnessing the arrival of a fictional character to homes everywhere, as if to knit us together in holiday wonder, suspended for the evening in an imaginary international airspace of momentary world peace.  In recent years, but perhaps since the Cold War, this particular image of good cheer provides the odd inversion of the danger of the military missile strikes, if not offering the miracle of suspending fears of missile strikes, or the contradictions implicit in imagining peace in a world that lies on the brink of global war by using the very tools to chart missile defense systems as instruments of good cheer. Santa may face a different workweek in the malls where he can now be met in many different nations–as he traverses national borders with different work weeks!–

Santa’s Workweek in Ottawa Mall

–but the folks in the U.S. government and NORAD it completely reasonable to have the right to track the geospatial complexity of Santa’s sleigh ride, without removing any mystery out of Christmas holidays. It may be even reassuring that if Christmas Eve is Santa’s busiest hour of flight, the arcs of where reindeers guide his flightpath can be illuminated on our devices, in vivid geospatial specificity and even local detail.

Continue reading

1 Comment

Filed under Christmas, globalization, mapping technologies, Satellite maps, satellite surveillance, United States Defence Meteorological Satellite Program

Mapping the New Isolationism: America First?

The tortured narrative of the recent American election ended with something of a surprise.  As we struggle to map their results, it is impossible to deny that they may mark entrance into a new world which may antiquate earlier forms and points of geopolitical reference, as global politics seem to be about to be destabilized in ways we have never seen.  For in ways that reconfigure geopolitics which transcend national bounds, the extent of destabilization seems to abandon the very criteria by which we have been most familiar to map national borders, and indeed  international relationships, as we enter into a new era of resistance, suspicion, and fear that dispense with international conventions that seemed established in the recent past–and internationalism rebuffed and international obligations and accords dissolved.  Or at least, this was one of the few promises made by Donald Trump that appealed to voters that seems as if it will be acted upon.

The very America First doctrine that catapulted Trump to the White House stands, for all its championing of national self-interest, to be best embodied by the removal of the United States from its role on the global geopolitical map.  And the removal of the United States and England–achieved through the striking success of go-it-alone political parties in both nations–seems to show just how outdated a five-color map is to describe the world.

 

cattelanferrari

 

The vintage Rand McNally map that claims to provide a world picture assigns prominence to the United States–and Great Britain–becomes the perfect foil and field to illustrate the impending uncertainty of a move against globalization across the western world.

For the prestige of the globe as an image for the dynamics of global politics was long familiar as a part of the furniture of the Oval Office, as the stunning fifty inch diameter mounted globe that OSS director William J. Donovan had specially constructed for President Roosevelt, at the suggestion of General George C. Marshall.  A stunning pair of monumental mounted globes were presented President Roosevelt and Prime Minister Winston Churchill by the U.S. Army as Christmas Gifts in December, 1941, which set on large bases on which they rotated for easy consultation.  The globe embodied the newly emergent geopolitical order that folks as Donovan created and served, and which the OSS Map Division protected.  Could we imagine Donald Trump gazing with as much interest or cool at a revolving globe?  While Roosevelt stares with remove but interest at the globe, apparently focussing his eyes near the Straits of Gibraltar, this formerly classified Central Intelligence Agency photography was meant to celebrate his growing mastery over a theater of global war.

 

 

Roosevelt before GLobe in Office.pngRoosevelt and OSS Globe in Oval Office/Central Intelligence Agency

 

The monumental “President’s” globes Donovan presented on Christmas 1942 to both Franklin Delano Roosevelt and the British Prime Minister Winston Churchill placed monumental revolving globes–each weighing an unprecedented 740 pounds–occurred at the suggestion of Dwight Eisenhower, with the confidence of “that they foreshadow great victories,” in the words of George C. Marshall, and Roosevelt proudly told the General that he treasured the gift enough to place it directly behind his chair in the Oval Office and to marvel at the ease with which “I can swing around and measure distances to my great satisfaction;” Churchill’s was sent by airplane directly to 10 Downing Street.

The symbolic role of these large and weighty globes cannot be overstated:  the large globes symbolize the complete mastery of geopolitical knowledge by both commander in chiefs in the midst of World War II; they show the investment of military forces in maps.  The world map served in the post-war to embody the new global order already emerging during that war on which both understood a benevolent geopolitics destined to define American hegemony in the post-war; the Weber Costello globe company of Chicago, Illinois would construct some fifteen copies before going out of business in 1955.  With sixty years of hindsight after the globe-making company shuttered its production line of deluxe maps, it seems the new United States President has opted to withdraw attention from maps.

Continue reading

Leave a comment

Filed under 2016 US Presidential Election, Art and Cartography, Brexit, geopolitics, globalization

Being Offshore in a Globalized Economy

Is the notion of the offshore trumping national sovereignty as a means of storing and generating wealth? As much as the phenomenon of globalization is a mutation of the nation of clear bounds, or clearly mapped bounds, the discovery of the offshore has been as central to the economy of the globalized world as the discovery of, say, the Indies or America was once central to Mercantilism. For the offshore is often considered a negative space, apart from the world of nation, apart from settled lands, apart from industrialization, or post-industrialization, the offshore plays an increasingly commanding role in the global economy to sequester funds and finance. And if the offshore was invented by legal conveyance as a way to avoid taxation of sovereign states, it is increasingly corrosive of the state, and as much as a legal fiction demands to be understood as a “discovery” internalized by a new financial class, and global elite, as a new operating strategy in the global economy. If even the realtor turned oligarch turned autocrat Donald Trump is a product of the offshore, this is a new playing board for the game of global competition, giving financial elites an upper hand, but demands to be traced as a discovery that will have deeply corrosive effects of international landscapes and a national good. For why need government exist, if most funds are stored offshore, and why does taxation or any financial administration of currency need to exist, if increasing funds are docked on offshore reserves?

The notion of the “offshore” suggests a realm out of reach of the law of the land, existing just off the coast of the regions supervised by regulators and taxmen, but has wildly expanded with the perpetuation of the legal fictions of the offshore as a place that offers an escape from national programs of taxation.  Rather than exist only as a region beyond the shoreline or coast, and lie of the known map, the “offshore” is what escapes legal overview–and lies outside of national legal bounds.  Arising as a convention to designate “offshore spaces” that lay outside of the recognized sovereign tax codes.  But “offshore” regions need not properly be removed far from the mainland, or even from it at all–and are found on most any region or continent, save Antarctica.  They are places where money of the superwealthy is invisibly routed, out of sight, not to remain, but to escape regulators’ oversight or the payment of a national tax or subject to national sovereign claims. The map of the offshore is increasingly a map of the unseen paths of where the superwealthy’s funds go. We are supposed to park our funds offshore to avoid taxes,

top twenty offshore sites

The growth of the offshore is not a place to locate money, indeed, but through which circuits of international capital travel in a globalized world.  For the expansion of the offshore is a not so odd consequence of globalism, and the increasing fluidity of finance to travel smoothly across territorial bounds–an ability to sequester funds just out of site, nestled in offshore accounts that are not subject to state scrutiny or traceable by paper trails.  We have recuperate the notion of islands, removed from the shore, as a new way to symbolize and achieve the escape from regulation:  the offshore as an entity emerged with the ability to dislocate and remove global capital from any place, and all oversight, as the circulation of global capital among the superwealthy resists being parked or located in a national framework or onshore spaces, but can be invested in sites of excessive demand and overvalued property.  

The “offshore” is the ultimate example of the uneven nature of the valuation of space in an age of income disparities, and a fiction to allow these income disparities to be preserved. It is the geographic manifestation of a logic of tax avoidance that has become the exclusive privileged operation of the superwealthy, who feel entitled to subtract their wealth from the community they live, escaping the demands of living in any nation by shifting their wealth–“parking” their luxury cars to secure parking places or garages–that guarantee tax-avoidance, and indeed sanction a geography of tax-avoidance that is the privileged exemption of the superwealthy, those of a guaranteed worth of $30 million for the next twenty years, a coterie of increasingly large size as a bracket, that in 2010 included 62,960 ultra-high-net-worth folks in North America; 54,325 in Europe; and 42,525 in the Asia-Pacific, per Wealth-X, with the latter predicted to leapfrog both by the 2030’s. havens located offshore currently enable the super-wealthy–the richest 0.01%–to evade 25% of owed income taxes, in a global scam that, per Gabriel Zucman and colleagues, effectively conceals over 40% of their personal fortunes, rendering them opaque to any national government, and as a consequence erodes claims to national sovereignty, and indeed the authority of the post-Westphalian state that was defined by its borders. If the map of territorial waters loosened national authority from borders to accommodate a global economic playing field allowing actual offshore mineral extraction–in what were felicitously termed “international waters, free from taxation, and outside the nation-state.

United States Territorial Waters

The rise of the “offshore” as an geoepistemic category, or “geoepistemology,” in Bill Rankin’s terms, effectively legitimized by the broad “tax amnesties” granted by multiple governments extended to tax cheats after the 2008-2009 financial crisis. The amnesties from sovereign taxes many–even before the release of the Panama papers–to for the first time try to “to map out the frequency of tax avoidance, by income level” that was long unmapped, first among Scandinavian countries, to start to plot the range of financial subterfuges and conceits that removed the wealth of the super-rich from any actual tax franchise, affirming the existence of a perilously increasing wealth inequality: in America alone, the disappearance of a “tax gap” that only between 2008-10 amounted to a massive $406-billion between what taxpayers owed Uncle Sam and what they actually paid. This removed their wealth from the territory, and indeed from the sovereignty, that create a deep crisis in the form of a time bomb for the sovereign state, making conceits of “tarriffs” and “imports” almost pale as a lower level of financial transactions occuring in real time, or on the books, rather than offshore.

Is there any surprise that no moral authority existed able to compel Donald Trump to reveal his actual tax returns as U.S. President, when a gap of such proportions was the norm in the Obama era? The decreased in likelihood that America’s millionaires would ever find their returns audited have dropped up 80 percent than in 2011, suggesting a tacit acceptance of a gap in wealth that the geography of the offshore perpetuates and enables. Even after the stock market’s boom and bust cycles, returns of the upper 1% jumped in capital gains for mutual funds and financial accounts–measured in trillions of dollars in the last decade–that only solidified wealth inequality as a reality.

New stratospheric wealth levels pushed the collective net worths of the 1% considerably north of a hundred trillion; these rates of return were both not shared by other income groups, and not able to be comprehended by them. And such wealth generation granted rights to park wealth in an exclusively available geography of tax evasion of an expanded offshore constellation of money managers, outside sovereign reach; they would be no longer beholden to sovereign taxation agencies and were without obligation to states. The concentration of a hundred and twenty trillion in the wealth of the upper 1% created new spaces for wealth, apart from sovereign surveillance, where they might accumulate and grow, unable to be tracked in the global projections by which we are used to monitor other global events.

If the notion of the offshore is a relic of the post-colonial era–and began as a legal clarification of the category of offshore jurisdictions or overseas dependencies, removed from the European colonial powers as they enjoyed a liminal connection to formerly colonizing states–but it is perhaps better understood as the hegemony of a new notion of financial empire and wealth inequality. Today’s offshore are an exclusive insider knowledge, not open to many, but accessible to all initiated in schemes of tax avoidance, brokered in a bespoke maner by agencies–as Mossack Fonseca–who exploit loopholes of international law and the financial fictions of the ius mari to enable clients to sequester vast sums from national oversight–lest financial transactions be mapped.  The offshore ensures opacity ing financial mapping, or the ability to place vast sums of money off the table, that sanction frictionless cash flows off the map.

In a global economy whose cash flows are more difficult to detect or embody–based less on the face-to-face, and rooted in the borderless fiction of the friction-free, increased integration of markets open multiple loophole for syphoning off national tax franchises, facilitating the sequestering corporate money–as the wealth of super-rich long tolerated to hold accounts described euphoniously as offshore, or, even more opaquely, as overseas, opening up fantastic speculation as to what that might really mean.

0214map.jpg
Continue reading

1 Comment

Filed under globalization, offshore, Panama Papers, tax shelters, wealth inequities