Submit your essay to the AI-Cybersecurity Essay Prize Competition by January 2, 2025.
The AI-Cybersecurity Essay Prize Competition

What does critical cybersecurity look like?

‘Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions,’ edited by Anwar Mhajne and Alexis Henshaw, broadens the scope of cybersecurity research by highlighting marginalised voices and overlooked issues
Main Top Image
Image created using Midjourney

Cybersecurity research has largely evolved through Western- and state-centric lenses, particularly in the field of international relations (IR). Recent critical work has challenged conventional approaches, incorporating marginalised voices and considering questions that traditional IR analyses and cybersecurity research methods have overlooked. ‘Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions’ is a significant contribution in this regard. 

Edited by political scientists Anwar Mhajne, an expert in feminist security studies and Middle Eastern politics, and Alexis Henshaw, who has written extensively on gender and security in Latin America, ‘Critical Perspectives’ boasts a diverse authorship, a human security viewpoint, and analysis of under-explored topics and case studies. The volume offers a refreshing take amidst a growing body of literature grappling with what it means to study cybersecurity critically. 

The authors use feminist and postcolonial frameworks to analyse issues of security, sovereignty, representation, and resistance in cyberspace, with a focus on the Global South. Thus, the book is an important read for scholars in cybersecurity, IR, sociology, feminist and postcolonial studies, and critical theory. It also presents valuable insights for policymakers, digital rights and social justice advocates, and anyone interested in how technology intersects with issues of power, identity, and global inequalities. 

A human-centric perspective

 ‘Critical Perspectives’ challenges state-centric questions in cybersecurity research, which prioritise topics like cyber warfare, regulating state cyber behaviour, and superpower competitions over technology dominance. Instead, its authors adopt a human-centric perspective, highlighting injustices and inequalities in human experiences of cybersecurity. There are chapters on data weaponisation in armed conflicts, authoritarian state practices in cyberspace, data privacy in colonised territories, and gendered online resistance to power hierarchies. 

As put by the book’s editors, this approach not only ‘critiques and de-centres the state’, but also views the state itself as an agent of cyber ‘insecurity’. For example, the development of military cyber commands in Latin American countries in cooperation with foreign powers has drawn criticism for undermining democratic governance. Alexis Henshaw takes this analysis a step further. She argues that the US, Canada, and international agencies supply surveillance tools to Latin America to build cyber capacity, but this also enables state abuse and harms marginalised social groups.   

Underrepresented authors and overlooked questions

The volume combats the ‘racial-epistemic hierarchies’ of cybersecurity expertise by gathering diverse academics and practitioners from across the globe. It emphasises cases from the Global South, offering important insights to overlooked questions, not just in cybersecurity research, but in IR research more generally. For example, Julia-Silvana Hofstetter examines the influence of digital technologies on gendered (in)security in Afghanistan, while Mhajne explores discriminatory practices by the Israeli government against Palestinians.

Following the withdrawal of US troops from Afghanistan in 2021, much analysis focused on strategic aspects of the withdrawal or the Taliban’s brutality against women. This overlooked the ways foreign governments and aid organisations themselves may have contributed to repression through data collection. Hofstetter’s incisive analysis reveals how discriminatory colonial structures led to invasive data collection by foreign powers and aid groups in Afghanistan, producing gender-specific vulnerabilities that enabled the repression of Afghan women. 

Similarly, Mhajne presents a significant critique of the lack of research on civilians’ right to data privacy in the Israeli-Palestinian conflict, despite the massive volume of research on the conflict, and investigates the applicability of international humanitarian law in cyberspace. 

The view through intersectional and post-colonial lenses

‘Critical Perspectives’ is rich with discussions of feminist and postcolonial theoretical and conceptual literature, developing critical analysis to complement the empirical case studies. Building on the growing feminist critique of cybersecurity, the volume integrates gender, race, ethnicity, and geographical positionality as inseparable aspects of human experiences of cybersecurity. The book also adopts a postcolonial lens, investigating spaces of resistance, refusal strategies to hierarchies of power, and how movements in the Global South challenge the boundaries of cyberspace. 

Murat Yılmaz argues that whilst all Uyghurs abroad are at risk of harassment by the Chinese regime, women face more significant personal attacks, for being women, Muslim, and Turkic. Through a qualitative review of secondary resources, including reports by NGOs and Uyghur lobbies’ social media platforms, Yılmaz compellingly shows how cyberspace facilitates state surveillance and transnational authoritarianism, subjecting the Uyghur diaspora to continuous repression. 

Meanwhile, Margaret Monyani and Allan Wefwafwa discuss the opposite side of the coin: when cyberspace allows vulnerable communities to participate in activism that is otherwise restricted in traditional public spaces. Using internet ethnography and interviews with social media users, they reveal how women in Kenya defy legal and societal restrictions on their freedom of expression by posting nude pictures online and maintaining control over their bodies. Social media platforms in the Global South are widely being used in a fight to expand social freedoms, online citizenship, and political debates, as was seen as early as 2011, during the Arab Spring.

Toward a progressive cybersecurity practice

‘Critical Perspectives’ does not stop at critiquing; it also addresses one of the most difficult questions in critical security studies: What do progressive security practices look like? Crystal Whetstone and Luna K.C. call for the application of UN Security Council Resolution 1325 and the women, peace, and security agenda to cybersecurity. They also insist on the need for an international legal framework that acknowledges how cybercrime and cyber violence disproportionality affect women and girls. 

Similarly, Erin Saltman and Dina Hussein argue for global baseline standards for data protection and privacy. They write that an international body should be established to promote such standards and mitigate divides between the Global North and South. Even if such calls seem utopian and unpragmatic in the contested realm of cyberspace regulation, it is important for critical research to continuously push for a more just world, and engage with the very meaning of that ‘justice’.

Future paths for critical cybersecurity

‘Critical Perspectives’ is undoubtedly a significant contribution to critical cybersecurity, applying feminist and postcolonial perspectives to a field often limited by conventional IR questions and frameworks. Future research should forge new, cybersecurity-informed theoretical, conceptual, and methodological frameworks to contribute in turn to feminist and postcolonial literature. The book does so to some degree, employing concepts like ‘technocolonialism’ and ‘digital transnational authoritarianism’, but its questions tend to be more empirical than theoretical. 

It is also intriguing to think about how the human-centric approach to cybersecurity presented in the book connects with queer theory, as well as feminist and postcolonial approaches that adopt a new materialist perspective or a ‘more-than-human’ lens, emphasising the active role of bodies, objects, and non-human forces in shaping social phenomena. Given the book’s assertion that feminist scholarship has neglected digital politics, examining how critical cybersecurity perspectives could disrupt existing frameworks and introduce novel ones is essential for advancing not only the cybersecurity agenda but also more digitally informed research in IR and beyond.

Terms and Conditions for the AI-Cybersecurity Essay Prize Competition

Introduction

The AI-Cybersecurity Essay Prize Competition (the “Competition”) is organized by Virtual Routes (“Virtual Routes”) in partnership with the Munich Security Conference (“MSC”). It is sponsored by Google (the “Sponsor”). By entering the Competition, participants agree to these Terms and Conditions (T&Cs).

Eligibility

The Competition is open to individuals worldwide who are experts in the fields of cybersecurity and artificial intelligence (“AI”). Participants must ensure that their participation complies with local laws and regulations.

Submission Guidelines

Essays must address the question: “How will Artificial Intelligence change cybersecurity, and what are the implications for Europe? Discuss potential strategies that policymakers can adopt to navigate these changes.”

Submissions must be original, unpublished works between 800-1200 words, excluding footnotes but including hyperlinks for references.

Essays must be submitted by 2 January 2025, 00:00 am CET., through the official submission portal provided by Virtual Routes.

Only single-authored essays are accepted. Co-authored submissions will not be considered.

Participants are responsible for ensuring their submissions do not infringe upon the intellectual property rights of third parties.

Judging and Awards

Essays will be judged based on insightfulness, relevance, originality, clarity, and evidence by a review board comprising distinguished figures from academia, industry, and government.

The decision of the review board is final and binding in all matters related to the Competition.

Prizes are as follows: 1st Place: €10,000; Runner-Up: €5,000; 3rd Place: €2,500; 4th-5th Places: €1,000 each. The winner will also be invited to attend The Munich Security Conference

Intellectual Property Rights

The author retains ownership of the submitted essay.

By submitting the essay, the author grants Virtual Routes exclusive, royalty-free rights to use, reproduce, publish, distribute, and display the essay for purposes related to the Competition, including but not limited to educational, promotional, and research-related activities.

The author represents, warrants, and agrees that no essay submitted as part of the essay prize competition violates or infringes upon the rights of any third party, including copyright, trademark, privacy, publicity, or other personal or proprietary rights, breaches, or conflicts with any obligation, such as a confidentiality obligation, or contains libellous, defamatory, or otherwise unlawful material.

The author agrees that the organizers can use your name (or your pseudonym) and an image of you in association with your essay for purposes of publicity, promotion and any other activity related to the exercise of its rights under these Terms.

The organizers may remove any essay-related content from its platforms at any time and without explanation.

The organizers may block contributions from particular email or IP addresses without notice or explanation.

The organizers may enable advertising on its platforms and associated social media accounts, including in connection with the display of your essay. The organizers may also use your Material to promote its products and services.

The organizers may, at its sole discretion, categorise Material, whether by means of ranking according to popularity or by any other criteria.

Data Protection

Personal information collected in connection with the Competition will be processed in accordance with Virtual Routes’ Privacy Policy. Participants agree to the collection, processing, and storage of their personal data for the purposes of the Competition.

Liability and Indemnity

Virtual Routes, MSC, and the Sponsor will not be liable for any damages arising from participation in the Competition, except where prohibited by law.

Participants agree to indemnify Virtual Routes, MSC, and the Sponsor against any claims, damages, or losses resulting from a breach of these T&Cs.

General Conditions

Virtual Routes reserves the right to cancel, suspend, or modify the Competition or these T&Cs if fraud, technical failures, or any other factor beyond Virtual Routes’ reasonable control impairs the integrity or proper functioning of the Competition, as determined by Virtual Routes in its sole discretion.

Any attempt by any person to deliberately undermine the legitimate operation of the Competition may be a violation of criminal and civil law, and, should such an attempt be made, Virtual Routes reserves the right to seek damages from any such person to the fullest extent permitted by law.

Governing Law

These Terms and Conditions are governed by the laws of the United Kingdom, without regard to its conflict of law principles. Any dispute arising out of or in connection with these Terms and Conditions, including any question regarding its existence, validity, or termination, shall be referred to and finally resolved by the courts of the United Kingdom. The participants agree to submit to the exclusive jurisdiction of the courts located in the United Kingdom for the resolution of all disputes arising from or related to these Terms and Conditions or the Competition.