In this third essay in a series, Kit Dawnay discusses sovereign control of information in China and the changes wrought by social and technological change.
In this second essay in a series, Joseph Ansorge discusses the sovereign's appetite for data and the tools used to "identify and sort" human populations.
In the wake of Edward Snowden's leak of NSA secrets, surveillance, privacy and the nature of information have dominated headlines. Thesigers has been toying with the notion of "sovereign data" for a while...
Given the parlous state of global affairs in recent years, there has been a renewed focus on futurism. It questions the grandiose projections of future-obsessed Western thinkers and artists of the past, and
Given the decline in attacks and speculation as to their causes, various factors underpinning Somali piracy are worth considering. On-shore conditions have not changed significantly, making it difficult to
The 2009 ‘Stuxnet’ attack on Iran’s nuclear programme set off a virtual campaign of computer-based attacks in the Middle East, revealing increased cyber capabilities among
The polls on 21 July for the House of Councillors will clarify whether the administration of Shinzo Abe, which took office in December 2012, has popular support. Abe needs 72 seats to secure a Liberal