Big Data and International Relations PDF
Big Data and International Relations PDF
Big Data and International Relations PDF
Relations
Andrej Zwitter*
F
rom November to , , ten heavily armed members of
Lashkar-e-Taiba (LeT), a Kashmiri separatist group, attacked several pub-
lic sites in Mumbai, India, with automatic weapons and grenades, killing
people and wounding three hundred. This was one of the rst known instanc-
es of terrorists employing powerful search algorithms such as Twitters or the link
analysis used in Googles PageRank system, which allowed LeT members to access
information from massive data pools in real-time. During the attacks, an LeT
operations center based in Pakistan communicated with the terrorists via sattelite
and GSM phones to provide them with open-source intelligence. From the oper-
ations center, LeT members data mined the Internet and social media, tapping
into the power of Big Data to provide the attackers with an intelligence advantage
over Indian law enforcement agencies. The attackers were thereby kept up to date
on the status of the Indian governments response and even received personal
proles of the hostages they took in the Taj Mahal Palace hotel.
Ironically, counterterrorism agencies are relying on the same technological
advances to stop similar attacks from occurring. For example, the U.S. military
is developing drones that, empowered by the combination of facial recognition
software and vast databases of face-tagged photos, are able to identify individuals
even in crowdsleading to what experts call hyperpersonalized warfare.
Furthermore, using data-mining techniques, trend spotting, and sentiment analy-
sis, experts in the area of predictive policing and intelligence analysis are hoping
to distill the indicators and to identify the anomalies that would help predict
terrorist attacks, counteract organized crime groups, and, at the same time, save
resourcesand potentially livesby employing targeted interventions.
*This essay was produced as part of the cooperation between the Austrian Institute for International Affairs and
the Danube University Krems, Austria.
377
Big Data increasingly affects politics in manifold ways. With the ascendance of
cyberspace as an important domain of daily activity, international politics has al-
ready experienced technology-driven change. Big Data unveils new dimensions to
these changes, which we as political scientists and observers of international affairs
are only now beginning to comprehend. It changes power distributions and there-
by some basic assumptions of international relations theory, and its analytics will
increasingly inform international relations research and policymaking. It has cre-
ated both new opportunities and threats in areas such as humanitarian aid, devel-
opment, and international peace and security. As hardware becomes better and
cheaper, and as open-source software and database search and analysis services
become more widely available, the power of Big Data is also increasingly at the
disposal of small enterprises and individuals. Its ascendance in all aspects of social
and political life has also sharpened important questions about global Internet
governance.
Individual Agency
It is well known that the Internet has revolutionized how we communicate and
has empowered individuals: with the rise of online substate groups, individual
agency seems to be ourishing. Big Data, on the other hand, pushes individual
agency into the background. A recent case helps to illustrate this trend.
Conclusion
In their book Cyberspace and International Relations, Jan-Frederik Kremer and
Benedikt Mller argue that the global cyberspace substrate has undermined the
older distinctions between international and domestic, between peace and war, be-
tween state and non-state actors, and between technology, politics, and econom-
ics. I would go even further: global cyberspace, and its intensication through
the ubiquitous nature of Big Data and the Internet of Things, challenges us to re-
think fundamental notions of international relations and powernotions that we
have taken for granted for decades.
There are many challenges ahead. Governance efforts should strive to reduce
sensitive data and exploitable information from becoming open data.
Furthermore, despite ongoing efforts by the European Union and other state ac-
tors to update data protection regulationsan effort that is lagging behind relent-
less technological innovationthe governance of nonstate actors has largely
escaped national and international legislation.
NOTES
Marc Goodman, Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do
About It, ebook (New York: Knopf Doubleday Publishing Group, ), ch. .
Charles J. Dunlap Jr., The Hyper-Personalization of War: Cyber, Big Data, and the Changing Face of
Conict, Georgetown Journal of International Affairs , International Engagement on Cyber IV
(), pp. .
Rick Smolan and Jennifer Erwitt, The Human Face of Big Data (Sausalito, Calif.: Against All Odds
Productions, ); Rob Kitchin, Big Data and Human Geography: Opportunities, Challenges and
Risks, Dialogues in Human Geography , no. (), pp. ; Doug Laney, D Data
Management: Controlling Data Volume, Velocity, and Variety (Meta Group, February , ),
blogs.gartner.com/doug-laney/les///ad-D-Data-Management-Controlling-Data-Volume-
Velocity-and-Variety.pdf; and Bill Vorhies, How Many Vs in Big DataThe Characteristics That
Dene Big Data, Business Foundation Series #, October , , data-magnum.com/how-many-
vs-in-big-data-the-characteristics-that-dene-big-data/.
Ibid.
Small chips attached to objects that contain electronically stored and wirelessly transferred information,
e.g., for tracking and identifying parcels (functionally similar to QR codes).
Richard Winter, Big Data: Business Opportunities, Requirements, and Oracles Approach, Executive
Report, Winter Corporation, December , p. , www.oracle.com/us/corporate/analystreports/infras
tructure/winter-big-data-.pdf.
Andrej Zwitter, Big Data Ethics, Big Data & Society , no. (), p. ; Viktor Mayer-Schnberger
and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work, and Think
(Boston: Houghton Mifin Harcourt, ), p. ff.
Mayer-Schnberger and Cukier, Big Data, pp. .
Zwitter, Big Data Ethics, p. .
Rob Kitchin, Big Data, New Epistemologies and Paradigm Shifts, Big Data & Society , no. (),
p. .
Ray Wang, Mondays Musings: Beyond The Three Vs of Big DataViscosity and Virality, Forbes,
February , .
Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn, Virality Prediction and Community Structure in
Social Networks, Scientic Reports , Article number: (published online August , ).
Jacob Silverman, Time to Regulate Data Brokers, Al Jazeera America, Opinion section, January ,
, america.aljazeera.com/opinions///time-to-regulatedatabrokers.html.
Lawrence Lessig, Code and Other Laws of Cyberspace (New York: Basic Books, ).
Chris Anderson, The End of Theory: The Data Deluge Makes the Scientic Method Obsolete,
WIRED, June , , archive.wired.com/science/discoveries/magazine/-/pb_theory/.
David Lazer et al., The Parable of Google Flu: Traps in Big Data Analysis, Science , no.
(), pp. .
Center for Social Media, Social Media Survey Results, Annual Survey (Alexandria, Va.:
International Association of Chiefs of Police, Fall ), www.iacpsocialmedia.org/Resources/Publica-
tions/SurveyResults.aspx.
John Karlsrud, Peacekeeping .: Harnessing the Potential of Big Data, Social Media, and Cyber
Technologies, in Jan-Frederik Kremer and Benedikt Mller, eds., Cyberspace and International
Relations: Theory, Prospects and Challenges, edition (Heidelberg, Ger.: Springer, ), pp. .
Satellite Sentinel Project, Evidence of Burial of Human Remains in Kadugli, South Kordofan, Special
Report, Harvard Humanitarian Initiative, August , , hhi.harvard.edu/publications/special-
report-evidence-burial-human-remains-kadugli-south-kordofan.
Sheldon Himelfarb, Can Big Data Stop Wars Before They Happen? Foreign Policy, April , ,
foreignpolicy.com////can-big-data-stop-wars-before-they-happen/.
Rasool Dawar (Associated Press), Taliban Threatens Foreign Aid Workers, Washingtion Times
online, August , , www.washingtontimes.com/news//aug//taliban-threatens-foreign-
aid-workers/.
Marc Parry, Academics Join Relief Efforts Around the World as Crisis Mappers, Chronicle of Higher
Education, March , , chronicle.com/article/Academics-Join-Relief-Efforts//.
Mireille Hildebrandt, Smart Technologies and the End(s) of Law: Novel Entanglements of Law and
Technology (Cheltenham, U.K.: Edward Elgar Pub, ), p. .
John J. Reilly Center of the University of Notre Dame, Predictive Policing, reilly.nd.edu/
outreach/emerging-ethical-dilemmas-and-policy-issues-in-science-and-technology-/predictive-policing/.
I.e., a website that cannot be indexed by search engines and to which one only has access through
identity-cloaking protocols such as Tor.
Jan-Frederik Kremer and Benedikt Mller, eds., Cyberspace and International Relations: Theory,
Prospects and Challenges, edition (Heidelberg, Ger.: Springer, ), p. vii.