Tag Archives: World Wide Web

Data Visualization Fake-Out?

Nothing in the world could take us back/ to where we used to be,” as Mariah Carey sings in her 1990 hit, I Don’t Wanna Cry–recorded back in the very year Tim Berners-Lee and CERN collaborators unveiled the World Wide Web, using HTML to share documents across huge networks and URL’s to specify computer targeted and information requested.   The coincidence of the design of such a document system that led TBL to build and design the world’s first web browser on an NeXT computer and Mariah Carey’s cooing soft-pop hit on only emptiness inside came together again in the release the WannaCry malware–malicious self-propagating code, able to exploit back-door vulnerabilities of Windows 7–which revealed a landscape from which nothing in the world can take us back to where reused to be.

But the data visualizations we’ve used to describe the lateral progression of the encryption of data files from hard drives around the interlinked world lent a new prominence to the World Wide Web as a conduit for targeting destabilization.  It not only revealed how the world wide web has reshaped what we still call the world, but posed questions of how to map such a change, as even Microsoft employees in Redmond, Washington scrambled to chart the outbreak of malware after hackers exploited vulnerabilities in the unpatched Eternal Blue, in cyber attacks alternately known as WannaCry in 2017, and Non Petya when it later hit Ukraine, together with all companies, including large American ones, who did business with that nation, in an attempt to undermine its economic viability. From command central in what seems a concrete bunker of the future, before large screens, non-state Microsoft workers in Redmond, Washington tried to maintain a sense of security in their systems around the clock, and conduct repairs, in the weeks after the United States Department of Homeland Security urgently warned that out-of-date software was a global crisis and a national vulnerability. The malware just posed problems that local governments, municipalities, and law enforcement institutions could not bear, and which it seemed only Microsoft could be able to have manpower, incentives, and infrastructure to complete.

Kyle Johnson/New York Times

Wanna Cry left many literally crying for the sudden encryption of data, and many without services–and was intended to leave an unimaginable number of people desolate, if not quite with the absence of love that Mariah Carey wistfully evoked.  But the  virulence of its spread should offer a wake-up call to possibilities of global disruption we are still working to be able to track, map or fully comprehend in adequate fashion–but record as a virulent virus blocking systems most densely in nodes of a web-linked world.

the-wannacry-ransomware-attack_535798c2-38bf-11e7-b30b-76e7402dac55
Malware 2:10 pm

New York Times

The very same visualizations indeed obscure, by oddly rendering it as distributed, the agency that underpins such carefully orchestrated cyber attacks of global consequence, by almost naturalizing its spread.  For by moving the sites where data was most encrypted into a geographical frame of reference, the graphic doesn’t help orient us to its spread, so much as overwhelm us with the data-laden content to visualize a paralysis of global systems; it removes it from context or human agency, in order to capture the omnipresence of the self-propagating cyrptoworm as much as tell a story that helps to orient us to its spread.   Perhaps that is what was intended.

The mapping of global disruption is perhaps a nightmarish puzzle for members of the interlinked world, and demands a place on the front burners of data visualization:  the inadequate nature of considering the spread of systems-wide corruptions can be visualized by cases of the compromising of data, we lack the symbolic tools to grasp the rise of a new map of global dangers.   While such data visualizations provide a terrifying premonition of the destabilization that might result from the encryption of data on a broad scale, they obscure the possibilities of specifically targeted attacks on data and visible infrastructure that are now able to be developed, and the nature of targeted threats that we have only begun to imagine.  The redefinition in this new geography of document-sharing Tim Berners-Lee and friends developed has prepared the way for a landscape of interaction between removed places broadly adopted as a protocol for information-sharing– but one that, as Mariah Carey sung, and instigators of the malware hoped, left one only wanting to cry from behind one’s screen, devastated at the scope of the unforeseen swift data loss.

The data visualizations adopted to depict the flare-ups in compromised hard drives that the cryptoworm created in a manner of hours show the particular virulence with which malware crossed national divides in unprecedented ways, displacing relations of spatial proximity, geographical distance, and regional divides.  In crippling databases including Russian and Chinese private and public institutions in but a day, demanding immediate payment for data to be restored, the ransomware raised the curtain on a new age of uncertainty.  But was the threat eclipsed by the scale of the attack by which information was encrypted?  If the spread of malware seemed to grow across computer systems without apparent relations, the distributed agency that was invested in how the malware spread worldwide seemed to obscure the possibility of agency of the attacks, concealing the tracks of any perpetrator by placing a problem of urgency on screens worldwide.

oops.png
Wana_Decrypt0r_screenshot

Websites of news media of record widely adopted animated data visualizations to orient their readers to the proliferating corruption of data on tens of thousands of computers and computer systems on account of the malware caused.   Such elegantly animated maps don’t claim to be comprehensive, and are information-laden to the extent that seek to capture the unprecedented speed and range of the spread of the cyberworm launched Friday, May 12, 2017.  We have trouble even comprehending or grasping the scale or speed with which the virus spread on systems, of course, and speed at which malware was propagated itself across networks and spread laterally across systems, rather than by geographic relations, working without a phishing hook of any sort but exploiting an NSA-developed backdoor vulnerability in the Windows 7 operating system to infect networks across national bounds, as it spread laterally across systems worldwide.

The spread of the encryption of hard drives data across space occurred in apparently haphazard ways, spreading globally in the first thirty minutes of across more advanced web-reliant regions of what we still call the globe.  While their spread “followed” systems whose operating systems had not been fully updated, it is important to remember that rather than spreading laterally along a system of their own accord, their release was planned and released by agents, rather than being a casualty of the World Wide Web; a map of instances of hard-drive vulnerabilities however can offer few diagnostic signs or clues to interpret their spread, but offer only a catalogue of individual instances difficult to process in their entirety, so overwhelming and geographically dispersed was their occurrence to defy easy interpretation or processing–they provide little that might be suggested as forensic evidence about their spread.

ransomeware 0 hr 30 min 0 sec

Red Socks Security: Malicious Threat Detection

If the growth of the virus’s spread across nations made it seemed to progress in ways that lacked a target, we may lack the tools to visualize the attack.  The systems afflicted were not linked on a geographical register, and in some senses didn’t make sense to read in a map–but if they spread on internet traffic, the broad scale of the attack of ransomeware only foregrounded the fears of where it had arrived from or offer any signs to appreciate any agency within its systems-borne spread.  But if the map seemed the best way to the speed of its growth, it was a distraction from the potential targeted threats of the malicious worm–until a lone British researcher, known as “MalwareTech,” saved the compromising of global systems as he serendipitously identified its kill switch to stop its spread:  what dominated the headlines conceals the dangers of losing sight of the specificity of the wide-ranging attacks, even while registering them in real time.

The rest of the world could only sit in silence, as Mariah Carey once sung, and watch the range of attacks unfold in space in real time:  something went wrong in the mode of sharing data across online systems that had to be couldn’t quite be understood.  If Maria Carey’s hit single contemplated the definite break in time, “only emptiness inside us,” the shock of the screens informing users across the world that their data had been definitively compromised made then realize that any notion of data security vanished, and any hope for composure in the face of cryptoworms had disappeared, as Mariah Carey’s softly-sung lyrics described, and as far away as a network-free world, or one where inter-connected users didn’t define the primary routes of its transmission, without considering the dangers of the compromised infrastructure–not only in banking, but in traffic system, airport controlling, water quality monitoring, and even traffic flows.

But we continue to rely on geographic registers, as if we can’t let go of them, and it is what we have to explain the global spread of compromised systems and a collapse of data security.  The cryptoworm successfully obtained advanced user privileges that allowed it to hijack computer systems that allowed hackers to encrypt documents worldwide in one day, reaching such a broad range of hard drives to make it seem the attack was random or haphazard.  The attacks used code to release a self-propagating worm  that didn’t really move spatially, but progressed online, using a vulnerability for which Microsoft had released a patch only two months previous, in March, in devices that share files across local networks.   After the patch arrived, we were still mapping its spread, and contemplating the prospects of the return of a similar virus, so clearly had it asked us to redefine internet traffic.  But was did the broad spread of the worm and broad scope of systems compromises, which was quick to provoke deep fears of the vulnerabilities that exist from ransomware erase the targeted nature of a similar subsequent malware attack?  The spread of thousands of infections in over a hundred–and then over a hundred and fifty countries–across hard drives across the world exploited the failure to update software systems so broadly to obscure the origins or coordination of such malware attacks, whose use of normal language to alert users of encryption made them seem as if it were an isolated standard operating failure, able to be resolved by individual payment–

Wana_Decrypt0r_screenshot
petya-ransomware-how-remove-decrypt-files-new-unlock-computer-windows-dropbox-file.jpg

–even as the malware crippled networks in different countries without having the appearance of any fixed target.  And if masquerading as a form of ransomware, later variants of the cryptoworm suggested a far, far scarier version of the scope of data corruption.

wannacry_03

Kapersky Lab/Ars Technica

We were of course struck by the unprecedented speed with which such worms replicated along these dispersive networks–following paths that are not made evident in the map of compromised hard drives provided by data security firms, which show the progression of a disease that, like a cancer, creeps invasively along a hidden network, suggests a nightmare of the distributed agency of the internet, invaded by a particularly vicious parasite that for a considerable amount of time even experts saw no way to resolve.

We can now watch the spread of internet attacks in real time, looking at the threats of hacking in real-time, in ways that reflect the emergence of the internet and World Wide Web as a real-time battlefield, even if this is only a representative tracking of hacking attempts tracked by Norse.  It doesn’t include the ten millions of daily attempts to hack into the Pentagon, or the similar number of threats that the National Nuclear Security Administration tries to fend off–and the millions of attacks universities daily confront.  But if we are apt to be mesmerized by the range of such attacks, impossible to fully comprehend or track, we’re likely to be overwhelmed by the serious fears of the security vulnerabilities of which they cannot but remind us, although the abstracted sense of a constant barrage of online attacks can remove us from all too real dangers of their infrastructural effects–and the dangers of destabilization of specifically targeted strikes.

m8g8Z1X.gif

Norse

And if we might do well to take stock of the range of attacks by hackers to which the United States is vulnerable, mostly from China and Chinese sources, privileging our country as the target of future strikes–

L2zRKfa.gif

Norse

–we loose sight of their increasingly global nature, now that much of the software to exploit vulnerabilities is available in the Dark Net.  The origins of such attacks aren’t really clearly able to be mapped–hackers are experts at deflecting or rerouting their signals, and bouncing around their traces to make hacks that are located from one site appear to emanate from another from another.  And infrastructural vulnerabilities of infrastructure are increasingly on the table for nations other than the United States, often without the means to monitor such cybersecurity issues or strikes.

In an age when the pathways of internet links may have spawned spontaneous revolutions, uprisings, and unexpected results of elections, non-human communication and propagation of such malicious malware viruses seem an apotheosis of the absence of any agency–a worm that is able to replicate itself within hard drives world wide, removed from any intent.  To be sure, the range of sped-up animated maps to track the progress of the viruses that compromised data across the world produced a sense of wonder at our vulnerability of a sort that has not been widely mapped since the Cold War:  the images generated of internet threats mirrors the map of the danger of missile strikes that emerged in Life magazine back in 1945, at the end of the Second World War–only months after the destruction of Hiroshima and Nagasaki by American atomic bombs, that increasingly stand as a premonition of the new nature of things to come.

Atom Bombs Descend on US LIFE 1945.png

Life Magazine: The Thirty-Six Hour War (November, 1945)

Mutatis mutandi, the image of the visual culture of the early Cold War was adopted by the Russian internet security agency, the Kapersky Labs, as a strategy to image the globally expanding threat of hacking to compromise hard drives and data-based systems.

malicious threats USA scale

Kapersky Labs

In an era that was defined as after or following the thaw of the Cold War, the internet emerged in 1990–just a year after the fall of the Berlin Wall heralded its thaw–as a new battleground to wage global conflict.  To be sure, the cybermaps of phishing schemes and potential email attacks are traced by the Kapersky labs in real time, to monitor for global security on the interlinked world-wide online systems.  But their dynamic images retain the symbolic structure of the arcs of a violation of national airspace to suggest the magnitude of the incursions into cyberspace they monitor and report on round the clock.

We continue to map the global spread of malware as if to wonder at its scale:  the distributed compromising of data as an animated sequence of simultaneous flare-ups of intensity from yellow to burning red across the world, as if to pose the question of its communication in terms of spatial continuity and proximity.  In some of the best data visualizations of the scare of WannaCry and Petya viruses, the brightly burning flare-ups signalled a fire that burned so brightly to become impossible to contain as if a metastisizing online cancer spread across the world’s wealthiest regions.  Despite the power of the animated visualization, we may map it wrongly, as if to imply it can be diagnosed as a spatially transmitted contagion without a target or destination.  In using the data-laden information of cybersecurity firms to map the occurrence of data corruption and systems infection, the political antagonisms and animosities that have fed the growth of malware are cunningly left absent from the map at our own peril.

1:03.png
1:19.png
2:24.png

Although these maps suggest the scope and nature of the self-replicating cryptoworm, they may take the metaphorical value of a computer virus in literal terms, as a disease map, or biological virus whose contagious could be explained,–like the famous Snow Map, created by a founder of modern epidemiology,  Dr. John Snow, to devise a mode to convince readers of the transmission from a water source of the 1854 London cholera outbreak.  Of course, the malware maps do not try to communicate the pathways or mechanics of the virus’ spread.  For rather than showcasing an event that was planned and of human agency, and whose propagation was in some sense designed, they run the risk of naturalizing both the incidence of systems’ compromises and the malicious nature of the very phenomenon that they describe.  While the meaning that each bring pixel cannot even be understood or processed in a global scale–its impact was local–the intensity of the outbreak seemed almost a skin disease on the surface of the world.  The intensity of its transmission surely mirrors the density of online connections or an economy that was web-based, as networks allowed its contagion spread from Indonesia to Europe the United States, raising alarms as it seemed to actualize some of the worst fears of a cyberattack, of the de-empowered nature of a computer system suddenly devouring its own data, but like a faceless god, from 11:00 one Friday morning, so that by 1:20, the spread of the malware had dense sites of infection on five continents.

The local merged with the global, however, in ways difficult to map:  the maps of real-time tracking of the spread of the worm across a grey, global map made it seem totally removed from human actors, in hopes to capture the speed by which the worm managed to rapidly to spread laterally across systems, using an onslaught of randomly generated IP addresses as a way to target an ever-proliferating range of hard drives through multiplying packets sent to remote hosts, whose own hard drives were hijacked, leaving anonymous-sounding messages of no clear provenance to pop-up on users’ screens, in ways that seem to imitate the “normal” logic of an algorithmic process entertaining the possibility of implicating the user in the encryption of their hard drive or the deletion of necessary valuable files.

screen-shot-2017-05-16-at-6-32-06-pm

The communication of the virus–a biomedical metaphor that seemed particularly unable to offer any diagnostic value, suggesting either the banality of the infection or its nasty spread–was not nosologically helpful, but suggested the virulence of its spread.  The natural history metaphor of the worm–or, better yet, the coinage of the cryptoworm–better expressed the lack of clarity as to its provenance or the seriousness of its damage.  Although subsequent investigations found that the first infections appeared, globally, on computers in India, Hong Kong, and the Philippines, according to SophosLabs, the stage was set for a three-pronged global spread–as if in a negative version of the Trans-Pacific Partnership, moving from South-East Asia worldwide–that began from 7:44  UTC with such startling rapidity that it will demand detailed unpacking to understand the target or decipher any of the aims that underlay the attack, or the extent of its destructive scope. The spread of the self-proliferating worm was only stopped by the inadvertent discovery in the code of the ransomware of a kill switch, which allowed a security researcher known only as MalwareTech to register a domain name able to slow the spread of the infection in a compromising manner, effectively halting its viral spread.  Despite the rapid proliferation of visualizations of the unprecedented sale of its virulence, in retrospect, it might make sense to ask whether the undifferentiated global nature of the visualization, while stunning, distracted from the malicious operations of its code, and what better metaphors might exist to describe the spread of something dangerously akin to cyberwar.

We only have a few cartographic metaphors to describe the lateral spread of online compromising of computer data and the infiltration of networks, because of the speed with which it spreads challenge human cognition.  Even if it can be schematized in a format that suggest the density of data compromises or the amount of encrypted files, the visualizations offer a limited basis to orient oneself to the seriousness or the danger of these infections, which once they start offer little possibility of stopping their spread.  The later visualizations of the global impact of the release of Wannacry network worm are usefully foreground the rapidity of its spread, and raise the specter of its unstoppability.  But the visualizations of the rapid flare-ups of malware that infect hard drives and encrypt their data may conceal the targeting of instability.  If the spread malware and ransomware have been primarily linked to extortion, the spread of self-propogating cryptoworms cannot only be seen in numbers of systems compromised:  for they are  released and created in order provoke instability, as much as for Bitcoin revenues.  Although theft of data is usually seen as most valuable to the owner of the dataset, the potential interest in ransomware as a service–and much ransomware is now available on the darknet in different forms, suggests a needed growth in cybersecurity.

If ransomware collectively netted about $1 billion during 2016–and stands to become a growth industry of sorts–the latest Petya virus netted but $10,000, although the benefits of the attack might have been much greater–in the form of the disruptions that it creates, often not so clearly racked or visible in the data visualizations of its spread, whose animated explosions suggest its out of control migration across networks as wildly crossing boundaries of state sovereignty, encrypting data on computer systems across space as it travelled along the spines of the internet as if without any destination, as tens of thousands od systems were entered and compromised via ‘back door’ disrupting hospitals in the UK, universities in China, rail in Germany, or car plants in Japan, in ways that were far more easy to track as a systems collapse by locking its victims out of critical data that allowed their continued operation.  The demand for ransom payments to restore apparently stolen data was a screen for the disruption of invasive attack on companies’ computer networks, whose compromising can only start to suggest the infrastructural disruptions they created as they rapidly globally spread, whose apparently anarchic spread revealed the new globalized nature of system vulnerabilities.

Malware explosion 2:05
Malware explosion 3:15
Ransomware4:46 pm
ransomware 5:55
wannacry-map

While malware is distinguished by the demand to hold hostage the encrypted files of one’s hard drive, the viral spread of worms targeting systems vulnerabilities can disrupt systems and infrastructure in ways particularly difficult to defend against.  Although the attacks depend on failures to update systems and to preserve retrievable back-ups, the vulnerabilities invite disruptions on a scale only so far imagined in futuristic films.  These apocalyptic scenarios are perpetuated by security firms–and by the video games of the global imaginary that require only greyed out background maps to treat data visualizations as having sufficient complexity if they register the intensity of attacks, even if this only gives cover for the malicious actors who perpetuate their spread.  But the assault on systems by the backdoor vulnerability first discovered by the NSA, in its program for targeting and infiltrating select foreign computer networks, but now for sale on the Dark Web, may only raise the curtain on a far more malicious range of malware, able to backdoor systems that are connected to transportation networks, water treatment plants, traffic systems, credit card systems, banking and airport controlling, far beyond cel phone systems, and able to–as the attack, just before WannaCry plagued web-based systems, compromised IDT Corporation–evade security detection systems.  While regular, complete and restorable systems back-ups may be the only response to ransomware, the possibility of already backdoored systems has lead to fears that the Shadow Brokers group who unleashed the Eternal Blue code from the NSA is a group of Russian-backed cybercriminals, and the hackers who released WannaCry who cyber researchers believe have tied to North Korea, may raise the threshold on cyberwarfare of a scale unheard of in previous years.

“Nothing in the world could take us back/to where we used to be.”  Golan Ben-Omi–who views the analytic skills honed in studying Torah as good training cybersecurity in the Chabad-Lubavitcher community–  Chabad-Lubavitch communities are interested in preserving the integrity of their websites from profane pollution, but are attuned to the dangers of data breaches.  The attack that was made on his company, IDT, by means of an NSA tool with the capacity to penetrate computer systems without tripping alarms–named “DoublePulsar”–enters the kernel of computer systems, or its inner core, to trip the connections between hardware and software that would allow hackers to steal systems credentials in order to compromise systems with far greater impact than earlier breaches and infections, appearing as ransomware, but perpetrating far more serious damage on a system.  The sequential flaring of compromised computer hard drives suggests a landscape that Ben-Omi has been studying for over fifteen years–and believes that the analytical skills honed in the study of Torah will allow his students to analyze.

While we lack the tools to start to map disruptions on such broad scale, the  If the attacks on hard drives that occurred in over one hundred and fifty countries on Friday, May 12, 2017 may have been a case of intentional disruption, but the Petya ransomware attack of July, which successfully targeted the same vulnerabilities, exploited similar vulnerabilities in a potentially more targeted weaponized manner.  Although it “is only code,” the lateral spread across the spines of the internet created fears of impending disaster across the most digitally rooted areas of the world, spreading fears of data disruptions, crashes and infrastructure collapse whose potential won’t be able to be so clearly mapped for quite some time.

The terrain of the crypto worm’s spread is better able to be understood, if not quite familiar.  During the most recent space of malware attacks left most untouched places those farthest from the most unreflective internet-dependent, the map only can suggest the real-life inconveniences that can hardly be captured by the burning flares of yellow-red bursting at spots across the globe at unprecedented velocity.

2000px-InternetPenetrationWorldMap.svg

Global Internet Penetration 2012/Jeff Ogden

InternetPopulation2011_HexCartogram_v7-01.png

Oxford Internet Institute (2011) Data on Internet users and population from World Bank 

For while not only communicated–as at first believed–by malicious email attachments, internet links clicked by users whose unreflective response unleash lost data, frozen systems, or looted bank accounts, the spread of ransomware parallels the amazing intensification of net-dependence and systems-based communicative tools, revealed below in the new information ecosystems that have arisen, illustrated in the quite spread of Facebook use over a short amount of time.

FB-World-Map-Comparison.png

The relation between online activity and real-time consequences are difficult to map.

All maps serve to help tell stories, and the intensity of Facebook connections suggest more than a huge time-suck of human lives:  it reveals the increased homogeneity of the systems we use, and the similarity of what we see and read.  But if all maps tell stories, the necessarily partial nature of the dense visualizations of the global disruptiveness of malicious attacks on computer systems seem compromised:  while over-laden to challenge the abilities of viewers to process their content, they only tell the most superficial part of real-time story–the compromising of data–and not the consequences that the widespread collective compromising of hard drives will effect both immediately and in the long run.  And here we get onto thin ice in terms of what can be visualized, and the limits of counting the datasets of the corruptions of computers or systems, and the difficulty of counting beyond the density of compromised hard drives to the real-world implications of systems’ collapse.  One can only start to imagine the implications of such collapse in maps contracting the real-time compromises of computer systems, in ways that reveal the global nature of an infectious spread of malware, but also obscure the different places that might be targets of weaponized malware attacks.

Malware Explosion 12:52

What we can track is the most immediate end-product of the malicious attack, but it offers few clues to interpret the basis for the attack or indeed the different scale of its real-time long-term consequences.

The visualizations track an almost near-inevitable progress of red flares in internet-dependent hubs that appear to overwhelm viewers with their over-laden information in ways that run the risk of obscuring any sense of human agency–or intent–as if to track the spread of a virus across a system that lacks internal logic of its own.  The intensity of attacks on computer networks tracked from the Wannacry ransomware showed the astoundingly rapid spread of the infectious cryptoworm that caused the attacks.  But it presented them as if they were in fact geographically localized, but the disruptions were purged of any explanatory context, geopolitical or other.  For the inevitability of the spread of malware that the images provoke–and the fears of the unstoppability of further crypto worms–may obscure the dangers of their weaponization.  If the launching of cyberthreats is often depicted as a real-time war by cybersecurity firms as Norse–

world wide war.png

–we may be increasingly in need of mapping the intersection of such live attacks on data and their real-life consequences beyond the compromising of datasets.

We  were recently warned how the expansion of malware and ransomware would soon propagate over networks in more virulent ways.  Earlier worms that infected hard drives as Conficker in 2008 and SQL Slammer back in 2003 or SamSam, spotted in 2016, offer but “a harbinger of a new wave of more malicious, tenacious and costly ransomware to come,” of even greater scale, warned Joe Marshall of Cisco Talos, with “bigger payouts.”  Marshall warned of the greater goals of hackers to infect networks, and his warnings might be augmented by suggesting the dangers of hackers working with governments to use malicious code to “cast a wider net” through self-propagating crypto worms able to laterally traverse  huge corporate networks as tools by which to target nations–and national infrastructure–in ways that the fear of network intrusion have only begun to come to terms.  When Marshall and his co-author Craig Williams noted in 2016 that the rise of ransomeware was an “ever-growing problem” that will involve greater payments to restore databases in Ransomware: Past, Present and Future with greater “intrusive capabilities,” with the repurposing of network vulnerabilities, on a massive scale, presumably including the targeting of entire systems.  The maps of data encryptions and corruptions that WannaCry caused worldwide served to capture these fears, and their broadly trans-national consequences; the trans-national nature of such a strike on hard drives may well obscure and conceal the strikes and intentions of other malicious actors.  Although some believe payment the easiest option to retrieve data, as the worms are developed that target vulnerabilities in systems, they will potentially be able to compromise targeted banking, transportation, and emergency infrastructures.

Do visualizations of the immediate fears of the spread of one virus conceal concerns of the weaponization of such internet-born infections on specific targets and nations, despite the seemingly unplanned ubiquity of their spread across interlinked systems?  Despite their shock, such visualizations of the intensity of compromised systems, often echoing hubs of internet service, raise pressing questions about how to map the operations and actors behind them that are far more complicated to process fully–and lie off of the map.

1. Viewing visualizations of such rapidly spreading worms that compromised computers on a global scale, one wants to be able to peel away layers of the visualization, to reveal, as layers of an onion, the networks along which the cryptoworm laterally spread and the extent of disruptions that its spread caused.  For the scale of the disruptions, and the intent of the hackers or those who launched the malicious code, may only be revealed in a more localized map of the sorts of destabilization that cryptoworms might produce.  While leaving us to wonder at the unprecedented scale of their recent spread over a few hours or minutes, the visualizations take geographical space as their primary register, blank background maps bleached of underlying history, may make them all the more misleading and difficult to read, as they are removed from human agency and context, and treated as an artifact of the spread of the reliance of increasing multinationals on internet services and web-based networks.

Differences in online activity are far less lopsided across geographic space than in previous years, as shown by the Oxford Internet Institute by a cartogram warping of global space showing the relative density of online activity by 2013 data, in ways that allow the broader targeting of systems to conceal a malicious attack on a country.

World Online 2013
Percentage online OIL

–which might also  be read as a record of the increased vulnerability of specific areas, and the systems vulnerabilities might offer to compromise local infrastructure, and start to focus on the implications for those places.  Doing so would consider the growing intersections between The Real World and the internet in a complex social continuum, where stability can be disrupted at select nodes more dependent on how worlds of finance, banking, shipping, health, and traffic are increasingly interlinked.  Given the inevitable nature of such vulnerabilities, the frequent backing up and smooth restoration of backups are necessary to erase the growing threats not only of malware or ransomware, but the disruptions of critical infrastructure future attacks might allow.

Continue reading

Leave a comment

Filed under computer viruses, cybersecurity, cyberspace, data visualization, globalization

Around the World in Submarine Internet Cable

As we attempt to navigate the ever-expanding seas of data in the information economy, we can overlook the extent to which data streams run underneath the world’s seas to create a quite concrete sense of the interlinked.  For such cables underlie the increasing notion of geographical proximity we experience daily, from the world of big finance to mundane online transactions.  The spans of privately funded fiber optic undersea cables that have been lain across oceans floors, some stretching over 28,000 kilometers, provide an image of global circumnavigation as well as offering the most massive engineering feat on earth that is hidden to human sight.  And the rapidity with which further cable is being lain to link the world’s data flows along faster and more secure lines of communication provides a telling model of interconnectedness–suggesting new senses of connectivity and warping past concepts of proximity, and unifying the differently owned cables as if a coherent and open information highway.

The antiquated format of charting used in the above map suggests the increasing interconnectivity of the Information Age, as well as it coyly reveals the ways that TeleGeography, a global telecom, has pioneered ways to channel information across seas–and done so by familiarizing viewers with a distinctly concept of space.  Rather than naturalize an image of high-speed connections, the clever choice to rehabilitate a slightly romanticized earlier mapping of oceanic expanse suggests the new space of online data.  And it takes the notion of the electronic frontier seriously, by seeking to orient viewers to the new mental space that such sunken data lines create.  If the map of the bridging of oceanic by sunken internet cables domesticizes the transcendence of distance through the increasing interconnectedness of information flows.  The retrograde mode of mapping also reveals the actual distances that the physical substrate of the World Wide Web inhabits in so doing, and suggests that we would do well to remember the physical substrate by which the global financial economy is interlinked.

To be sure, the format of the map echoes one of the first laying of undersea cables across the Pacific, in the mid-nineteenth century in 1850, when the thrill of hmapping the expanse of undersea cable was mapped for the first time, by tracing the transatlantic cable lain under the ocean by wooden boats, in a cutting edge technology,

linking the United States to Europe in 1853, starting from Newfoundland, by throwing thousands of kilometers of telegraph cable overboard of ships by wooden beams, losing thousands of cable underwater for several years, until warships, loaded with cable, moved from the middle of the Atlantic in opposite directions, to create a subaquatic bridge of communication, after several failed attempts and more kilometers of lost metal wire, by 1858. The first message took over sixteen hours to arrive in full from England’s Queen Victoria to U.S. President Buchanan, by undersea cable that carried submarine telegraph for only but a month–

The shrinking of distances was a powerful breakthrough of the ability to map space in different metrics, however, than every seemed possible for transatlantic travel. And it’s hence quite apt that the antiquated techniques of mapping global relations were reprised by the folks at TeleGeography to remap the current global growth of internet cables by the syntax and aesthetics from an Age of Discovery.

The appealing charting of the hidden network of submarine cables designed by TeleGeography didn’t only borrow the antiquated iconography of marine charts from an Age of Discovery in order to promote the expanding spread of submarine fiber-optic cables in amusing ways.  For the image served to suggest the shifts in spatial connectedness that such increasingly rapid data flows have allowed, and to suggest a map that, in focussing on the seas–and the overlooked areas of marine space–returned to an interesting if somewhat overlooked spatial metaphor to consider and visualize the extent to which global financial networks and information systems move in particularly flexible ways across the permeable boundaries of nations, if not the degree to which national units have ceased to be the confines that matter, as cross-border flows are increasingly the primary sorts of traffic that matter to be mapped.

Phone Calls in 2012

A more familiar global remapping of phone calls,constructed on a study by students of business, Pankaj Ghemawat and Steven A. Altman, partly funded by the logistics firm DHL, an approximate quantification of globalization was made by the metrics of cross-border telephone calls in 2012 worldwide, in which the thickness corresponds to the minutes spent on the phone–and presumably the closeness of connections, if filtered through the relative costs of calls and the ability to pay them.

In a sense, the chart featured by TeleGeography openly incorporates less data, while noting the varied speeds of connections, in an image of interconnectedness, and positions itself less as a cutting edge snapshot of globalization or globalized than at the dawn of the possibilities of future interconnectedness that the laying of fiber-optic cables of greater speed can promote.  If the map of telephone calls raises questions of information flows, some 41 percent originating in what the authors identified as “advanced economies” to “emerging economies,” and only a small fraction (9%) originating in an “emerging economy,” the technology may also illustrate the precise demographic that continue to adopt telephony:  the authors observe that the dominant “calling patterns” reflect “interactions due to immigrants,” with most international calls being placed from the United States to Mexico and India, countries of first-generation immigrants–rather than reflecting actual information flows.

TeleGeography seems decidedly optimistic about the possibilities for global circumnavigation fibre-optic cables can promote.  In place of offering a map of actual flows of data, or a revealing look at where cables lie, the adoption of an aestheticized image and iconography of the nautical chart to map the ever-expanding web of cables that connect the world advances an argument about the sorts of ties cables facilitate, in order to illustrate and promote the ever-increasing multiplicity of ways information can travel across the globe without regard for the bounds of the nation-state.  Even as we bemoan NAFTA, or raise concerns about the Trans-Pacific Partnership, the networks of cables that currently span the terrestrial sphere divide into 285 separate privately owned segments show a coherent network has rapidly grown–its extent more than doubling in length over the past three years–and seems poised to only grow in coming years, to render national protectionism a thing of the past:  the map leaves viewers only to imagine its benefits.  While not seeking to quantify actual data flows, the scope of the map seems to be to naturalize the broad range of traffic lying such cables allows, if it is also jumps backwards over the many traditions of oceanogapahical mapping to show a seafloor that is not marked by drifting continental plates and scars of underwater earthquake activity–

ocean_floor_map_1050x700

NOAA

–but a smooth surface of cables that seem to be lain without ever encountering natural obstructions or topographical variations in the ocean floor.

The expansion of transcontinental submarine travel was on the cutting edge of the 1850s, and the laying of miles of lost submarine cables the Atlantic floor may have led Thome de Gamonde to realize hopes for a tunnel between England and France that parallel the previous laying of cable–

–and project the first underwater tunnel linking England and France in 1855 for rail, a project stopped for “strategic reasons” though the idea of such a chunnel–imagined by Napoleon’s mining engineer of mines as conveying horse-drawn carriages–

–was only completed until Francois Mitterand was driven by Rolls Royce (a concession?) to board the inaugural train.

The linkage between the nations was a feet of boring a hole, but bridged the very question of territoriality that the first plans of the 1855 version, presented to both Napoleon III and Queen Victoria to be forged through undersea rock, as if piercing the earth’s mantle–

–posed to territorial bounds, and the definition of sovereignty.

The submarine network of cable now totals upwards of 550,000 miles.  Although it is never seen above ground, and lies concealed beneath the seas, it now seems to animate most international commerce.  There is a pleasant irony in adopting the decorative aspects of marine charts to map a contemporary image of global circumnavigation, since they gesture to deep shifts in the seas of information, but also evoke the marvel of rendering visible what is all but unseen.  The exact locations of such cables are not displayed, of course, but the stylized presence suggests a decidedly early modern form of boastfulness–“according to the best Authorities [and] with all the latest Discoveries to the PRESENT PERIOD,” the extent to which the infrastructure of the Information Age spans the seas.  What once was a site of marvels revealed by the officer turned conservationist Jacques Cousteau is a field for information carriers, even if monsters inhabit its depths.

submarine-cable-map-2015-l

The “New Map” updates the recent rapid exponential expansion of the network fiber optic cables in recent years as a sort of corporate promotion, rehabilitating the marine chart to naturalize the submarine network that now carries a large share of global financial and administrative information worldwide.  Retrospectively mapping the expansion of this exoskeleton of the anthropocene ignores the technologies on which such mapping suggest, recalling the abilities to technologically harness steam, wind, and power to recreate the romance and adventure of global circumnavigation in an updating of the 1873 romance and fast-paced adventure Jules Verne told of a race against the mechanized clock by a constellation of transit networks.

Verne en 80 Jours

For much as Verne offered a quickly paced adventure mildly disguised celebration of technological unification of the globe, the retrograde if glorious map masking as an engraved superimposing high-fibre cables on image of the ocean as understood in days gone conceals the clear corporate interests or material technology that underpin the Information Age. And the recent expansion of a trans-continental high-tension submarine fiber network able to carry 26.2 terrabits/second of data across the undersea floor–which once took seventeen hours and forty minutes–is an awesome acceleration of time that unbinds us from all accustomed temporal constraints in a dizzying fashion. Even as Russian and other spy ships are operating in dangerously close proximity to the cables that carry an infrastructure of global communications that maintain the illusion of the open exchange of information across territorial bounds. (The safety of the antiqued map dispels any such fears of disruption of information exchange in its friendly presentation of a mysterious unknown underwater world.). And now that 99% of global internet traffic occurs thousands of feet undersea–from Netflix to now literally offshore financial transactions to email, the more black-boxing a map can perform, the better!

The appeal of the map not only is of an oceanic unknown–but an act of traversing the very national boundaries that seemed so solidly perpetuated in paper maps. The map of the oceanic unknown celebrates the laying of a material web of the world wide web as if it were another oceanographical detail, but masks the unseen nature of the cables that were lain in hidden fashion underneath the seas:  indeed, rather than the slightly earlier Verne-ian classic of 1870 with which it is often paired, the map doesn’t heaven to futuristic science, but sublimated a similar story of submarine itineraries.  Indeed, the map offers a picturesque recuperation of an aesthetics of global unity that serves to reframe the newly prominent submarine network that ships recently strung across the ocean floor.  It conceals the labor and mechanical drudgery of doing so–both the engineering or the fragility of the fibre-optic network, and the material basis of an electromagnetic carrier lurking deep under the seas.  In the Cable Map Greg Mahlknecht coded, the spans of current cables already connect hubs of communication across oceans at varied but increasing speeds, now approaching 26.2 terabits/sec across an astounding 6,6000 km from Virginia Beach to Bilbao, Spain. And while the depths of such cables is not apparent in most maps, the lodging of the cables on the ocean bedrock, 8,000 meters beneath sea-level, is argued to promise the “stability” of such an infrastructure that seem removed from the effects of human interventions from such old-fashioned addons to the seafloor as anchors or submarines.

Greg's Active

And the planned additions to the network, in part enabled by warming waters, are poised to greatly expand:

Greg's Transatlantic

Greg’s Cable Map

The work that the map modeled after an engraving of global seas does is serious, for it integrates the growing network of fiber-optic cable at the ocean’s floor into the seascape that nautical charts showed as a light blue watery expanse.  For as the price for fiber-optic cables precipitously dropped since 2000, this material infrastructure of global financial markets has not only grown, but kept up with the rapid improvement in network communication along a growing network of 250,000 km of submarine cable most folks have limited knowledge, and whose public image is in need of better PR, the more eye candy the better. The complex web of what Russ Fordyhce of Infinera has slyly called “the workhorse of the Internet” using fiber optic–a seemingly antiquated technology in an age of streaming and cellular towers, in a high-speed fiber network able to carry internet traffic that roots a virtual world. Such high-pressure sub-sea links expanded subsea capacity by an Intelligent Transport Network, expanding the network of undersea cables to meet broadband needs across the word by 100G flows.

The speed of such expanded capacity for submarine transport as a network of “intelligence transport” suggests a massive updating of our notions of transportation, by a restricted number of undersea fiber cables that seem staged to supersede cable networks in providing bandwidth. The pictorial addition of such fairly florid decorative detail from nautical charts to invest the routes of hidden submarine cables’ with an aesthetic that both caused it to be named one of the best maps of 2015 and exemplifies how to lie with maps, if the current expansion of fiber network capacities suggest that the network of just four years ago are indeed antiquated by the Infinera and other organizations promising to transport data at significantly greater and greater speeds.

submarine-cable-map-2015-l
article-1196775-0568D94B000005DC-41_634x286

The 2015 map, published online, but emulating the paper map, seems to conceal the extent of work that went into not only laying the cable, but ensuring that it was not disrupted, but blended seamlessly into the surrounding submarine landscape.  FLAG–the Fiberoptic Link Around the Globe–after all offered a sort of modern updating of the boast of Jules Verne’s Phineas Fogg.  For Fogg wagered £20,000 that the speed of the combination of trains and steamboats would allow him to travel around the globe so that he could return to the very same seat he occupied in the Reform Club in London in only eighty days–a boast based on his trust in the speed of modern conveyances of steam travel.  For Fogg’s image of interconnectedness was realized in the copper cables that conducted telegraphy traffic.

These telegraphy cables lain under the Atlantic by the 1880s by the Eastern Telegraph Company across the Atlantic and Pacific, which by 1901 linked England to North America, India and Malay in a network of communications that offers a vision of corporate interconnection spanning the expanse of the British Empire and providing it with an efficient communications system that was its administrative and commercial underpinning.

british-empire-cables

Eastern Telegraph Company (1901), planned cables shown by dotted lines–Wikimedia

But rather than perform the feat of circumnavigation, the matrix of underwater internet cables is based on the creation of a submarine matrix to carry any message anywhere all the time–when it can be linked to an on-land cable–save, that is, in Antarctica, where the frigid waters, for now, would freeze the cable and disable it.  Fogg staked his wager after noticing a map showing the construction of British rail exchanges that allowed long-distance transit across India, believing in his ability to achieve global circumnavigation on a network of carriers, based on his trust as a passenger and subject of the British Empire–and the infrastructure the enabled news, commerce, and administrative connections to travel with velocity, leading twenty-four of the thirty ships capable of laying cable-laying to be owned by British firms by 1896.  The framed cartouche in the upper right of the 2015 Submarine Cable Map echoes the triumphalism of the “present day” in boasting of the achievements by which, since “the first intercontinental telephony submarine cable system TAT-1 connected North America to Europe in 1958 with an initial capacity of 640 Kbps, . . . . transatlantic cable capacity has compounded 38% per year to 27 Tbps in 2013,” as US-Latin American capacity has nearly quadrupled.

The map, revealing the material network to what most of us perceive as coursing through the air, less effectively places the course of cables in evidence than depicts their now naturalized course.  The seascape of the Information Age seems, indeed, to demand the naturalizing of the courses of submarine cables, shown as so many shipping lines, running across the Atlantic and to the Caribbean, around the coast of Africa, from India to Singapore and to Hong Kong and Japan, before coursing across the Pacific.  Is its quaint cartographical pastoralization of the courses of communication under the oceans, we see a reverse rendering of a materialized image of globalization, disguised by a faux nostalgia for the mapping of the as yet unknown world that will be revealed by the impending nature of an even greater increase of data flows.  Indeed, the breakneck speeds of data transport are noted prominently in some of the cartouches framed at the base of the map, which suggest the two-fold subject of the map itself:  both the routes of cables that were laid on the ocean floor, and the speed of data transport their different latency allowed.  The cartouche is a nice rendering of the corporate promise of delivering data that TeleGeography presumably makes to its customers, despite the different ownership of many of the stretches of cable that exist, and the lack of harmony, proportionality or geometric design in how the cables are in fact lain.

Latency of cables

That the network of submarine cable retains a curious focus on relays in England that is a telling relic of the nineteenth century.

The internet’s network still seems to start in England in Porthcurno, moving to Spain and through the Strait of Gibraltar, across the Mediterranean to Alexandria and then turn down the Gulf of Suez through the Red Sea, and around the Arabian Peninsula to Dubai, before moving across the Indian Ocean to Bombay and on to Malaysia and through the South China Sea to Hong Kong and up the coast of China, it creates an even more expansive set of exchanges and relays than Fogg faced.  For while Fogg was dependent on rail to traverse the United States as well as much of Europe, where he could pass through the Suez Canal to reach a steamer engine, and then cross India by train, before getting a ship at Calcutta to Hong Kong and Yokohama, the multiplicity of connections and switches that the submarine cables create disrupt any sense of linearity and carry information at unheard of speed–fiber-optic cables carry information at a velocity that satellite transmission cannot approach or rival.

Around_the_World_in_Eighty_Days_map

Voyage of Phineas Fogg by rail, steamship, and boat–Wikimedia

The relays of paired cables now enable the instantaneous transmission of information between continents realize a nineteenth century fantasy of an interlinked world in ways that expanded beyond contemplation, the possibility of visiting the countries that FLAG traces are actually verges on impossibility–if only since the network offers multiple pathways of simultaneous transit.

The ambitions of those earlier Telegraph cables in connecting the world far transcends Fogg’s plan to create a path by which he could move between transit hubs.  His plans are dwarfed by the ambitions of modernity of the range of active and future underwater cable revealed in Greg’s Cable Map in ways that suggest the ambitions of creating an ever-more intensely interlinked world, where increasing number cables have been laid to fashion the actual physical infrastructure of the internet.

Greg's Cable Map

Greg’s Cable Map (click here for detail on each lines)

We often render the “hidden world” of privately owned transatlantic and other cables as a separate underseas world of cables lying on the seabed, able to be disrupted at its nodes, but removed from alike the shoreline and terrestrial world.

Underseas World

In strong distinction from such an image, the recuperation of something like nautical engraving by TeleGeography makes the clever point of naturalizing the greatest infrastructure of the Information Age–one that sometimes seems to have outweighed investment in the visible infrastructures of our cities and roads–within the currents of our seas, and as colored by the very hues by which the land is mapped as if to show the seamlessness of the communicative bridges that they create.

Given the extreme overload of data that these maps reveal–and the eeriness of a world created by the extent of cable laid–It’s in fact quite apt that the telecom firm TeleGeography showcased the interconnected nature of global communications this year by adopting the style of nineteenth-century cartographical tools.  It’s probably not at all a coincidence that in this age of big data, there’s a deep romance in the symbolic reclaiming of the crisply engraved lines of nineteenth-century cartography that folks like Nathan C. Yau of FlowingData pioneered in the online publication of a Statistical Atlas of the United Sates with New Data, refiguring information of the 2010 Census and 2013 American Community Survey.  Although designed in bits, the maps emulate the engraved delineations created for Francis Amasa Walker’s first Atlas:  Yau announced he had done out of some disgust that budget cuts prevented the Bureau of the Census from creating the atlas displaying its data in a Census Atlas–despite its success in accumulating so much data.

A quite clever graphic designer, Yau has posted sequences of  detailed non-dynamic maps that evoke the lithographic detail and crisp objectivity with which Walker created multiple legible embodiments as the Director of the US Census from 1870, when his interest in data processing led a set of new maps of the nation to be printed in Harpers Magazine, and the Census to grow to 22 volumes.  So well are we trained in grasping information via elegant visual forms that Yau bemoaned the absence of a similarly set of stately maps by evoking the project Walker envisioned as a form of mapping serving the public good:  and his online images embody data lying in the repository of Census data, from geological records to the distribution of human populations–and digest data to recognizable form, whose individual snapshots seem a nostalgic embodiment of data available from the American Community Survey.

landcover-forest1

FlowingData, “Map Showing the Area of Land Cover for Forests within the Territory of the Coterminous United States” (2015) from data compiled by American Community Survey (2013)

population-density

Flowing Data, “Map Showing Five Degrees of Density, the Distribution of Population” (2015) from American Community Survey (2013)

It is somewhat less expected that the format of an engraved or traditional map be showcased to reveal the system of submarine cables lying on the ocean’s floor:  few would consider the invisible network with nostalgia for the medium of the paper map.

To be sure, the very subject of internet cables are more appropriately rendered in an appropriately futuristic mode that habituates us to its ambitions by expanding the colors of a public transit map to reveal an image of an interlinked world–

internet-cable-map-640x433

The decision to “go retro” breaks conspicuously with such a choice for the futuristic design, and accommodates the multiplying extent of fiber optic cables that have been laid across the world’s waters so as to network the globe.  Only in 2014, TeleGeography issued a staggering map of the improvements in linkages of relays in submarine cable systems, suggesting the extent of the interlinked world to which we have become familiar not only thanks to Edward Snowden, but to our reliance on global data flows that increasingly enable financial markets worldwide, surpassing material constraints.

2014 Telegeography

TeleGeography (2014)

Such a map is overly schematic, indeed, since many of the cables’ paths are not openly disclosed.  From the land, we cannot see the landing sites where such fiber-optic cables go underwater, as Trevor Paglen has recently reminded us, in a series of diptychs that contrast the cables barely concealed in NOAA maps and the otherwise placid landscapes of the beaches beneath which they run; few realize the extent to which the information that travels on them is likely to be monitored as a form of mass surveillance, which we are far more likely to associate with satellites or surveillance.

But the complexity of the how information is carried along such cables is as boggling to the mind as the awesomeness of its ambitions.  Perhaps recognizing the sense of overwhelming its readers with data overloads in its maps, the 2015 map of submarine cables from Telegeography updated the format of an engraved map, and put in online in a fully zoomable form, to allow one to examine its lovingly rendered detail in a map that harkens back to charts of nautical discoveries but celebrates the rapidity of delivering information in an updated version of the corporate triumphalism of the Eastern Telegraph Company.  That map, which boasts in evocative language to be revised “according to the best Authorities with all the latest Discoveries,” foregrounds the multiple linkages of fiber optic cables that carry the vast majority of communications–of which “oversea” satellites link but a fraction–so efficiently they at first carried upwards of a thousandfold as much data compared to the older copper cables that lay below the sea recently–280 Mbps of data per pair–and moved 100 Gbps across the Atlantic by 2012–and the prediction 39 Tbsp is even feared to barely satisfy demand.  For transatlantic cable have come to carry some 95% of international voice and data traffic, and are viewed as a fundamental–if unseen–part of our global infrastructure, potentially vulnerable to disastrous interruption or disruption.

The familiarity of the “New Map of the Submarine Cables connecting the World” is not only charming; it is a somewhat subtle naturalization of the  new materiality of information flows so that they are regarded as a part of our new lived environment.  To be sure, the paths of cables are highly stylized, as if they fit within the oceans’ currents, although they sacrifice accuracy even though they suggest their private ownership and considerable density.

submarine-cable-map-2015-l

The open-ness of this mapping of submarine cables has been rare until recently–as recently as 2009, the location of the cable that arrives in the UK at Cornwall Beach was kept secret even on military maps, although commercial fishing trawlers and other boats are provided with access to them, somewhat paradoxically but unsurprisingly, lest they run across and damage the undersea cables that relay so many vital data flows across the globe under the seas, and whose severing could potentially come at a cost of as much as $1.5 million per hour.

America to three continents

The actual density of such cables laid at the bottom of the sea is not displayed on the above map, of course, which conceals their precise locations or the complexity of their routes, which are tantamount to secrets of state and off most maps.

interactive Map
2013-04-20_093527

The map designed by TeleGeography is indeed a romanticized vision of the pathways that information courses around the world, undersea, in an information age; the recuperation of the iconography more familiar from a printed map of the seas than the layers of a web map or data visualization naturalize the presence of such submarine cables in an odd exercise of familiarization.  We might be more suspect of the cartographical tricks of rendering, naturalizing the courses that submarine cables take when we examine the definitive maps of actual submarine cables or study the extent of such offshore cables in an interactive map and more carefully scrutinize their actual expanse.  (Such maps are not actual renderings of their situation on the seabed, if the stark layers that chart these cables are decidedly less harmoniously balanced with the light shades of the mock-engraving, Submarine Cables Connecting the World.)

Decidedly fanciful if naturalistic sea monsters could denote the limits of the known world or the boundaries of secure navigation in many early modern charts, the inclusion of this most pictorial of cartographical iconographies familiar from early engraved maps are aptly appropriated to suggest the absence or gaps in the interlinked nature of space and of what passes as our sense of continuity in 2015–as well, on a not so subliminal level, to evoke the dangers of their disruption.

Transatlantic

So naturalized is its cartographical iconography that the map suggests the new environment of internet cables in which we live.  This naturalization might be nowhere more evident than in the exotic appearances of marine creatures included in its seas.  A longstanding historical association exists between sea monsters with the North Sea, after monsters were first rendered as crowding its overflowing oceans in glorious detail by the bishop-geographer Olaus Magnus in his 1539 map of the land and waters around Scandinavia, who seems to have borrowed from bestiaries to illustrate the dangers that sailors would face in its waters, and to delight his readers and attest to the variety of the created world.

b

James Ford Bell Library, University of Minnesota

A strikingly similar sort of horned seal and spouting fish quite appropriately make an appearance in the 2015 Submarine Cable Map of  TeleGeography within the North Sea and Arctic Ocean, as if to suggest the frigid waters that restrict the services such cables deliver–the spouting animals and seal lifted from Olaus Magnus’ Marine Chart frolic just beyond the regions that are currently covered by the cables’ crowded course.

Is this a hidden representation of what actual spatial limits constrain where countries are able to lie further submarine cable?

1 Comment

Filed under data visualization, globalization, information economy, oceans, World Wide Web