AAG2017 – Curating (in)security

I am thoroughly looking forward to the AAG with a session Pip Thornton and I have put together on ‘Curating (in)security: Unsettling Geographies of Cyberspace’. The programme is above, along with the original session outline below. Curating (in)security: Unsettling Geographies of Cyberspace In calling for the unsettling of current theorisation and practice, this session intends

Living with Algorithms Summer Workshop @ RHUL

I’m very excited with what looks like a fascinating workshop with a great set of people (I don’t believe the list is finalised yet, so will hold off on that) on living with algorithms. This is being hosted by Royal Holloway, University of London. I’m particularly excited with the short 5 – 10 minute provocations that

Read More

Durham Moving Together Postgraduate Conference

I will be presenting at the Durham conference on May 4 2016 with the paper: W32.Stuxnet: An Olympic Games. Sprinting, jumping, throwing, shooting, running, leaping.   Siemens Programmable Logic Controller (PLC)? Seimens SIMATIC Step 7 Industrial Control Software? Yes… Next Step.   Welcome to the most wonderful of Olympic Games. A brilliant new, sophisticated cyber

Read More

The in(dividual)

Yesterday I went to a reading group within cyber security, and we talked about an interesting paper that was in Science January this year, called “Unique in the shopping mall: on the reidentifiability of credit card metadata” (paid subscription required). Though we talked about several of the issues with the paper and the reason for its

Read More