{"id":14928,"date":"2013-12-08T18:24:19","date_gmt":"2013-12-08T16:24:19","guid":{"rendered":"https:\/\/www.hiig.de\/?p=14928"},"modified":"2019-04-23T19:48:23","modified_gmt":"2019-04-23T17:48:23","slug":"how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/","title":{"rendered":"How the infrastructure of the internet disappeared and why we ought to go look for it"},"content":{"rendered":"<p dir=\"ltr\">Edward Snowden\u2019s revelations indicate a massive breach of trust in internet infrastructure. However, there is one positive aspect to his revelations: they lead to a greater public awareness for questions regarding the net\u2019s infrastructure. Mainstream media have started to question the geographical location of data centres, address encryption practices or to inquire internet exchange points.<\/p>\n<p>We should be thankful for this. And we ought to identify elements that make internet infrastructure visible, so as to conceptualise points of entry for understanding it before it disappears into oblivion again.<\/p>\n<h2>Processes of disappearance<\/h2>\n<p>Infrastructures can easily disappear from general perception. The screenshot below, taken from Google Trends, shows how the volume of <a href=\"http:\/\/www.google.de\/trends\/explore#q=internet%20infrastructure&amp;cmpt=date\">searches for &#8220;internet infrastructure&#8221;<\/a> has decreased since the beginning of the recordings in 2004. While this chart has serious flaws from a scientific perspective \u2013 no scales, no variables for comparison, undifferentiated anglophone clipping \u2013 it inspires further thinking about visibility and loss of interest in infrastructure.<br \/>\n<img alt=\"\" width=\"624px;\" height=\"325px;\" \/><\/p>\n<p dir=\"ltr\">Looking at the physical aspects of internet infrastructure, it is possible to trace a process of absorption.<sup><a href=\"#f1\">[1]<\/a><\/sup> Internet infrastructure has a materiality that ranges from data centres over cables up to transmission facilities. But in order to use the internet today, non-professional users hardly ever have to deal with this materiality \u2013 except at the<a href=\"http:\/\/en.wikipedia.org\/wiki\/End-to-end_principle\"> end points of the network<\/a>. But even there, the infrastructure increasingly deprives users from perceptibility.<\/p>\n<p dir=\"ltr\">In the mid 1990s, the early days of the European wire-based internet, the endpoints could be associated with modem noise, various cables and a fixed location. Today, visibility is reduced to a socket in the wall, few cables and the WiFi router. The latter dissolves the internet into our personal sphere, weakens the restriction of use that comes with locality and lowers the sensory perceptibility of the infrastructure.<\/p>\n<p dir=\"ltr\">When wireless (mobile) access infrastructure developed, invisibility clearly was identified as an advantage from the outset. From a user\u2019s perspective, there was no materiality to the internet infrastructure, unless one lived close to a transmission tower. Wireless internet reached us as a feature in mobile phones. To date, we refer to smartphones, and not to internet devices with phone functionality \u2013 as if telephony absorbed the internet and not vice versa.<\/p>\n<p dir=\"ltr\">Wireless internet infrastructure also contributes to a blurring of the endpoints themselves. In metro-zones internet access has become so ubiquitously available that it has become part of the environment: There is no need for an act of connecting. Being connected is the status quo. Even when there is no intention to actively access the internet, apps ensure that resources of the internet infrastructure are constantly being tapped into.<\/p>\n<p dir=\"ltr\">What is left to be observed of the internet infrastructure are apps, says internet researcher Jeanette Hofmann.\u00a0They settle on the interface to the tangible, the physical. Apps are the cars of the internet. Through applications, users align the infrastructure with purposes. They help mobilise resources to pursue other activities. &#8220;[Infrastructure is] part of the background for other kinds of work,&#8221; writes the ethnologist Susan Leigh Star (Star 1999, p . 380). She points out that invisibility is a hallmark of effective infrastructures. However, effective only means that the infrastructure works for someone, not necessarily for everyone. &#8220;One persons\u2019 infrastructure is anothers\u2019 topic, or difficulty&#8221; denotes Star on the relational character of infrastructure (Star 1999, p . 380).<\/p>\n<h2>&#8220;Visible upon breakdown&#8221;<\/h2>\n<p dir=\"ltr\">Casually speaking: The one who has got a problem with infrastructure will notice. In Star\u2019s words: &#8220;Infrastructure becomes visible upon breakdown&#8221; (Star 1999, p 382). As an example for a breakdown in an information infrastructure, Star mentions a server failure.<\/p>\n<p dir=\"ltr\">However, looking at areas where internet infrastructure has developed in a similar manner to Germany, this example does not appear very instructional anymore: Since for most users perceptibility of internet infrastructure is reduced to the interfaces of apps, any breakdown experience is limited to error messages within apps. In other words: What is visible at breakdown is a breakdown, no more; the failure of a delegated action. In infrastructure terms, when dealing with apps, users face empty signifiers.<\/p>\n<p dir=\"ltr\">Unlike when encountering a pothole in a road, internet users can usually neither determine the point of failure of their internet experience nor can they identify who may be held responsible. Error sources may range from the device over the software to processing units on other continents. The infrastructure of the internet remains unrecognisable to those who do not deal with it professionally, such as network engineers.<\/p>\n<h2>The task: to make internet infrastructure visible<\/h2>\n<p dir=\"ltr\">Science can contribute to making the infrastructure of the internet more visible and show, i.e., &#8220;Hidden Levers of Internet Control&#8221; as Laura DeNardis titled her paper on governance through infrastructure (DeNardis 2012). But more systemization can be achieved. Broadly varying uses of the term &#8220;internet infrastructure&#8221;, of which I only list some here, show that. Internet infrastructure can be approached from different angles:<\/p>\n<ul>\n<li><strong>physical components<\/strong> from cables to the spectrum: &#8220;physical layer&#8221; (Benkler 2000, p. 3);<\/li>\n<li><strong>entities<\/strong> that are involved in providing or controlling it: &#8220;organizations and institutions&#8221; (Kritische Infrastrukturen, n.d.) and actors &#8220;designers, developers, users, administrators&#8221; (Bowker, Baker, Millerand &amp; Ribes, 2010, p. 98);<\/li>\n<li><strong>technologies<\/strong> that are being used: &#8220;software systems like the Domain Name System (DNS)&#8221; (Critical Internet Infrastructure 2013);<\/li>\n<li><strong>technical architectures<\/strong> and related <strong>design principles<\/strong> that underly the technologies: &#8220;logical layer&#8221;, &#8220;software and standards&#8221; (Benkler 2000, p. 3), &#8221; Protocol Politics&#8221; (DeNardis 2009), layering and best-effort principle (see VanSchewick 2010);<\/li>\n<li>the <strong>purpose<\/strong> or <strong>group of users<\/strong>, &#8220;for public use&#8221; (Frischman 2007, p. 3), &#8220;regardless of the type of use or identity of the user&#8221; (Frischman 2007, p. 1), &#8220;enables knowledge work&#8221; (Bowker et al ., 2010, p. 98), &#8220;common facility&#8221; that &#8220;must be free of entry barriers to effective communication&#8221; (Benkler 2000, pp. 10 &amp; 14 on &#8220;core infrastructure&#8221;);<\/li>\n<li>the <strong>resources<\/strong> that it allows to <strong>activate<\/strong>: \u00a0&#8220;content layer&#8221; (Benkler 2000, p 3); &#8220;pervasive enabling resources in network form&#8221; (Bowker et al., 2010, p. 98); &#8220;supply systems of our society&#8221; (Kritische Infrastrukturen, n.d.)<\/li>\n<li>a mixed form: &#8220;interrelated social, organisational, and technical components or systems&#8221; (Bowker et al, 2010, p. 99).<\/li>\n<\/ul>\n<p dir=\"ltr\">Analysing the many approaches and tracing their origins is beyond the scope of this article. The list is by no means complete. It does, however, substantiates two things: 1. Internet infrastructure is probably referred to more often than the term is explicitly put to use. 2. It suggests that wherever only a singular aspect of infrastructure as being addressed, any critical assessment should be accompanied by questioning the context and inquiring about possible interdependencies. This is what makes thinking about infrastructure interesting.<\/p>\n<h2>Detect interplays<\/h2>\n<p dir=\"ltr\">This awareness ought to be rooted in net policy: that, for example, networking standards may fundamentally influence options of use. That the sociality organised around an internet exchange point may contribute to where peerings between network actors come about and thus, whose data has to travel long or short routes. That the suggestion to introduce something like a &#8220;Schengen&#8221; or &#8220;German routing&#8221; may lever influence for new players, or at least whet the appetite. Where national boundaries are introduced into the internet for one purpose, they may as well be activated for other purposes. In conclusion, interventions that target one aspect of infrastructure can have side effects elsewhere.<\/p>\n<p dir=\"ltr\">Due to the revelations by Edward Snowden, we have not experienced a breakdown of internet infrastructure in the way Susan Leigh Star has described it. The internet experience of the vast user base has apparently not directly been altered by the spying, storage and analysis activities at the junction points of the internet infrastructure. On top of that, breakdowns cannot reasonably be attributed to sources in an internet that is not only controlled in a distributed way but also ever more perceived through apps. However, such activities increase the likelihood of breakdowns in other spheres of our democracies, for example, by provoking chilling effects that prevent us from exercising the right to free expression. We ought to oppose this. A prerequisite is to pay more attention to the infrastructure of the internet and its many facets.<\/p>\n<hr \/>\n<p><a name=\"f1\"><\/a><sup>1.<\/sup>\u00a0I am referring to Germany here, but the same may hold true for other areas where internet technology has been adopted in similar phases. Another story may have to be told for areas where internet access has developed differently, like in Sub-Sahara Africa where mobile internet always has been more important for the general public than fixed broadband.<\/p>\n<h4>References<\/h4>\n<ul>\n<li>Benkler, Y. (2000). Property commons and the first amendment: Toward a core common infrastructure (white paper). New York: Brennan Center for Justice, New York University Law School. Retrieved from <a href=\"http:\/\/www.benkler.org\/WhitePaper.pdf\">http:\/\/www.benkler.org\/WhitePaper.pdf<\/a><\/li>\n<li>Bowker, G. C., Baker, K., Millerand, F., &amp; Ribes, D. (2010). Toward information infrastructure studies: Ways of knowing in a networked environment. In International handbook of internet research (pp. 97-117). Dordrecht: Springer Netherlands. doi:10.1007\/978-1-4020-9789-8_5<\/li>\n<li>Critical Internet infrastructure. (2013, October 10). In Wikipedia, The Free Encyclopedia. Retrieved from <a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=Critical_Internet_infrastructure&amp;oldid=576654434\">http:\/\/en.wikipedia.org\/w\/index.php?title=Critical_Internet_infrastructure&amp;oldid=576654434<\/a><\/li>\n<li>DeNardis. (2009). Protocol politics: The globalization of internet governance. Cambridge, MA: MIT Press.<\/li>\n<li>DeNardis, L. (2012). Hidden levers of internet control. Information, Communication &amp; Society, 15(5), 720-738. doi:10.1080\/1369118X.2012.659199<\/li>\n<li>Frischman, B. M. (2007). Infrastructure commons in economic perspective. First Monday, 12(6). Retrieved from <a href=\"http:\/\/firstmonday.org\/ojs\/index.php\/fm\/rt\/printerFriendly\/1901\/1783\">http:\/\/firstmonday.org\/ojs\/index.php\/fm\/rt\/printerFriendly\/1901\/1783<\/a><\/li>\n<li>Kritische Infrastrukturen. (n.d.). Kritische infrastrukturen. [Web page] Retrieved from <a href=\"http:\/\/www.bbk.bund.de\/DE\/AufgabenundAusstattung\/KritischeInfrastrukturen\/kritischeinfrastrukturen_node.html\">http:\/\/www.bbk.bund.de\/DE\/AufgabenundAusstattung\/KritischeInfrastrukturen\/kritischeinfrastrukturen_node.html<\/a><\/li>\n<li>Star, S. L. (1999). The ethnography of infrastructure. American Behavioral Scientist, 43(3), 377-391.<\/li>\n<li>Van Schewick, B. (2010). Internet architecture and innovation. MIT Press.<\/li>\n<\/ul>\n<p><strong>This post is part of a weekly series of articles by\u00a0<a title=\"Doctoral Programme\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\">doctoral candidates<\/a>\u00a0of the Alexander von Humboldt Institute for Internet and Society.\u00a0<\/strong><\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fhow-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=How%20the%20infrastructure%20of%20the%20internet%20disappeared%20and%20why%20we%20ought%20to%20go%20look%20for%20it https%3A%2F%2Fwww.hiig.de%2Fen%2Fhow-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fhow-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it%2F&subject=How%20the%20infrastructure%20of%20the%20internet%20disappeared%20and%20why%20we%20ought%20to%20go%20look%20for%20it\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Edward Snowden\u2019s revelations indicate a massive breach of trust in internet infrastructure. However, there is one positive aspect to his revelations: they lead to a greater public awareness for questions regarding the net\u2019s infrastructure. Mainstream media have started to question the geographical location of data centres, address encryption practices or to inquire internet exchange points.&hellip;<\/p>\n","protected":false},"author":42,"featured_media":39455,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[224],"tags":[],"class_list":["post-14928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How the infrastructure of the internet disappeared and why we ought to go look for it &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How the infrastructure of the internet disappeared and why we ought to go look for it &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Edward Snowden\u2019s revelations indicate a massive breach of trust in internet infrastructure. However, there is one positive aspect to his revelations: they lead to a greater public awareness for questions regarding the net\u2019s infrastructure. Mainstream media have started to question the geographical location of data centres, address encryption practices or to inquire internet exchange points.&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-08T16:24:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-23T17:48:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2013\/12\/anders-jilden-150790-unsplash-Cropped.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Uta Meier-Hahn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Uta Meier-Hahn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How the infrastructure of the internet disappeared and why we ought to go look for it &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/","og_locale":"en_US","og_type":"article","og_title":"How the infrastructure of the internet disappeared and why we ought to go look for it &#8211; Digital Society Blog","og_description":"Edward Snowden\u2019s revelations indicate a massive breach of trust in internet infrastructure. However, there is one positive aspect to his revelations: they lead to a greater public awareness for questions regarding the net\u2019s infrastructure. Mainstream media have started to question the geographical location of data centres, address encryption practices or to inquire internet exchange points.&hellip;","og_url":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/","og_site_name":"HIIG","article_published_time":"2013-12-08T16:24:19+00:00","article_modified_time":"2019-04-23T17:48:23+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2013\/12\/anders-jilden-150790-unsplash-Cropped.jpg","type":"image\/jpeg"}],"author":"Uta Meier-Hahn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Uta Meier-Hahn","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/"},"author":{"name":"Uta Meier-Hahn","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/1dd5018d7a9fef3cacc6f193d89cf694"},"headline":"How the infrastructure of the internet disappeared and why we ought to go look for it","datePublished":"2013-12-08T16:24:19+00:00","dateModified":"2019-04-23T17:48:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/"},"wordCount":1583,"commentCount":3,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Policy and Law"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/","url":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/","name":"How the infrastructure of the internet disappeared and why we ought to go look for it &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2013-12-08T16:24:19+00:00","dateModified":"2019-04-23T17:48:23+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/how-the-infrastructure-of-the-internet-disappeared-and-why-we-ought-to-go-look-for-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"How the infrastructure of the internet disappeared and why we ought to go look for it"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/1dd5018d7a9fef3cacc6f193d89cf694","name":"Uta Meier-Hahn","sameAs":["https:\/\/www.hiig.de\/staff\/uta-meier-hahn-3\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/14928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=14928"}],"version-history":[{"count":12,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/14928\/revisions"}],"predecessor-version":[{"id":55261,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/14928\/revisions\/55261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/39455"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=14928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=14928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=14928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}