2,028
Views
1
CrossRef citations to date
0
Altmetric
Articles

‘It would be smart to discuss this on telegram’: China’s digital territorialization project and its spatial effects on contentious politics

ORCID Icon
Pages 1081-1099 | Received 18 Feb 2022, Published online: 23 Mar 2023

ABSTRACT

Despite extensive literature examining digital activism, there is limited geographical research exploring the spatialities of digitally centred contentious politics. This article makes use of recent literature examining territory, terrain, sovereignty and digital territorialization projects to produce a conceptual framework that can make sense of the complex geographies of digital activism in contemporary China. It then uses this conceptual framework to analyse the spatial effects of digital territorialization projects and the development of digital sovereignty on those practising contentious politics in China. To do this, it uses the case study of #BeijingSurgery#, a Beijing-centred hashtag and instant messaging project attempting to contest narratives around the eviction of migrants from Beijing in 2017.

1. INTRODUCTION

In this article I build on recent scholarship examining territory to consider the forms that digital territory currently takes and can take (Elden, Citation2017, Citation2021). To help in this process I make use of Möllers’s (Citation2021) concept of ‘digital territorialization projects’, originally used to examine the German experience, to understand how, since the mid-1990s, China has produced a complex, bordered and multi-scalar digital territory. In doing this I am interested in understanding what form Chinese digital territory takes, how China’s digital territory is governed and how people within China’s digital territory connect to other digital territories as well as the rest of the world. In extending Möllers’s arguments I make a secondary argument, that the digital territory of the United States is, at the time of writing, the most populous digital territory in the world. By exploring US digital territory alongside Chinese digital territory I highlight the role that state and non-state actors play in digital territorialization projects, how territory can be used as a technology to achieve sovereignty over both space and people (Morris, Citation2022b), and why, due to data and digital colonialism (Couldry & Mejias, Citation2019; Kwet, Citation2019), it is strategically advantageous for the United States to stay out of debates on territory and sovereignty (Couture & Toupin, Citation2019). Through a case study of digital activism in China, the eviction mapping project #BeijingSurgery#, I highlight the importance of understanding digital territorialization projects globally, as when activists leave China’s digital territory they often make strategic use of spaces in US digital territory, such as Instagram and Twitter, or multi-territorial digital spaces, such as Telegram, with data centres in at least the United States, the Netherlands and Singapore.

I will begin this exploration of digital territory’s (re)production and the development of digital sovereignty from a relatively top-down position: the writing of Binxing Fang (Fang, Citation2018), the lead engineer of China’s digital border, the so-called Great Firewall of China (Griffiths, Citation2019; Roberts, Citation2018), and an influential state-affiliated academic. Fang’s academic writing is chosen here as it offers insights into how digital socio-spatial relations are understood at the highest levels of Chinese politics. I will build on this analysis by examining Chinese government documents, laws and regulations – including those used by Fang in their analysis – to explore how digital territory is articulated legally and how sovereignty over digital territory is developing (Creemers, Citation2020). In doing this I note a legal turn in the Chinese digital territorialization project, a turn that enables the Chinese state to both govern internally and to act as a norm entrepreneur.

In the empirical sections of this article, through the #BeijingSurgery# case study, I provide a bottom-up perspective on digital territorialization projects and their spatial effects. #BeijingSurgery# was an anti-eviction mapping project that contested the treatment of migrants in Beijing following a deadly fire in Xinjian Village in November 2017. #BeijingSurgery# started as a hashtag focused project in the days following the fire. The project was organized on Weixin,Footnote1 where #BeijingSurgery#’s administrators-to-be discussed starting a hashtag project to map the ongoing evictions. Following this, a long-imageFootnote2 was collaboratively made using an online text editing site before this long-image was shared in a WeiboFootnote3 original post (OP) along with the text #BeijingSurgery#. This moment of posting created the OP, which could be reposted, liked or commented on, becoming a dynamic digital place; the hashtag, a larger digital place where multiple networked conversations could be had, and where people gathered for information and to create connections; and the project itself, an affective, networked public including project leaders, project members and general viewers who conversed within the projects semi-public hashtag (Boyd, Citation2011; Papacharissi, Citation2015). Unfortunately, after rising to the top of Weibo’s hashtag metrics, after fewer than 20 hours, the #BeijingSurgery# hashtag was deleted resulting in the project’s leaders and users being displaced (Morris, Citation2022a). Fortunately, the project had a backup Weixin instant messaging group. It was here that the project continued, though with significant limitations.

In analysing #BeijingSurgery#, I highlight four spatial effects of China’s digital territorialization project on contentious political projects: deletion and displacement, the use of semi-private rather than semi-public spaces for gathering, the use of non-Chinese digital territories for activist practice, and mobility across a multitude of digital borders. In the discussion, I highlight what #BeijingSurgery#’s experience teaches us about digital activism more broadly, including the role of multiple territories in digital activism, and how digital activists may be simultaneously situated across multiple territories to balance out risks associated with their ‘socio-spatial positionality’ (Leitner & Sziarto, Citation2008, p. 158). I conclude the article by arguing that nobody need be bound by Sino-American imaginaries of digital territory or sovereignty and that alternative models of digital territory are possible. In doing this I encourage readers to support digital territories where projects such as #BeijingSurgery# can flourish, and not be silenced.

2. DIGITAL TERRITORIAL FRAMEWORK

In understanding how a digital territory emerges, the development of digital sovereignty and the production of a digital terrain, this article builds on the scholarship of Stuart Elden, who argues that territory is a ‘political technology’ (Elden, Citation2010, p. 801) that ‘should be understood not as a simple bounded area, but in multiple registers’ (Elden, Citation2017, p. 8). For Elden, territory is not a single political technology but rather ‘a bundle of political technologies’ (Elden, Citation2013, p. 322), and it is not a universal but something that is (re)produced across time and space by numerous actors, from the state and its various appendages to everyday people who live, work and exist around borders of multiple kinds. As a political technology, territory can be used to dominate voluminous space and the people inhabiting it (Billé, Citation2020), and there are ongoing international negotiations over how territory can be produced underground and undersea, on land, in the sky, in space and in the poles (Adey, Citation2010; Campling & Colás, Citation2018; Gordillo, Citation2018; Starosielski, Citation2015).

As a political technology through which power over people is practiced, territory and territorialization has an important influence over hybrid activist geographies (Castells, Citation2015; Halvorsen, Citation2021), including the roles that both human and non-human actors, such as algorithms, play in such geographies. States are engaged in active legal, infrastructural, commercial and moral contestation over which actors can use digital spaces, which states control these spaces, what institutions and people have access to these spaces, and how the by-products of digital interactions are used (Couldry & Mejias, Citation2019; Creemers, Citation2020; Kwet, Citation2019; Starosielski, Citation2015). As more social, political, cultural, economic, scientific and militaristic actions take place in digital spaces there is an increasing drive for governments and institutions to carve out spaces where they are in control. To do this, states are actively engaged in practices that border digital spaces, and while many states, governments and institutions refrain from using the potentially loaded language of ‘territory’, ‘border’ and ‘sovereignty’, there are also a large number of states and corporations using digital territory as a political, economic, cultural and militaristic technology (Barnard-Wills & Ashenden, Citation2012; Howard et al., Citation2011; Kaiser, Citation2015).

The role of territory in digital relations is particularly visible in Norma Möllers’s (Möllers, Citation2021) recent scholarship, which examines how digital territory is produced through ‘territorialization projects’. Exploring the German model, Möllers describes how:

states mobilize scientists and engineers in order to transform globally distributed information infrastructure into bounded national territory, and how they invest it with patriotic meaning, thereby making ‘digital territory.’ ‘Digital territory,’ in other words, is nationalized information infrastructure. (p. 114)

For Möllers, digital territory is ‘nationalized as in materially under state control and nationalized as in invested with normative ideas about nation and citizenship’ (p. 116). But, as Morris (Citation2022a) suggests in their work on Chinese digital geographies, both non-state and state actors play key roles in the moral and material dimensions of digital territorialization. This means that nationalization is just one articulation of the moral dimensions of digital territorialization, and a variety of moral articulations can potentially enable digital territorialization projects to begin. Looking at the United States, for instance, it becomes possible to see a loosely regulated and bordered digital territory – what Bratton (Citation2018) describes as a ‘hemispherical stack’ built around Google, Apple, Facebook and Amazon – where private corporations play an important role in the expansion of US digital power.

Extending these spatial conceptualizations of digital relations, and influenced by Jessop et al. (Citation2008), in this article I put forward a framework that helps highlight the complex geographies and power relations involved in digital relations. Building on the above discussion, in this article digital territory is understood as a political technology through which institutions, most notably nation-states and international organizations, attempt to gain power over digital spaces, digital places, users, the companies operating digital spaces, and digital infrastructure through a range of bordering and territorialization practices. Digital spaces are distinct digital services hosted on servers which can be accessed by humans and non-humans in ways that enable a social life, broadly defined, to emerge within the coded environments (Amoore & Raley, Citation2017; Kotliar, Citation2020; Massey, Citation2005). They are ‘a constellation of processes rather than a thing’ (Massey, Citation2005, p. 141) and they can include multiple digital places, with examples including Weixin, Facebook, Bilibili and Telegram. Sitting within digital spaces, digital places are distinct assemblages that emerge from the interaction between humans and non-humans within digital spaces. Digital places can take many forms, with examples including instant messaging groups, hashtags, Twitter posts and the comments sections of short videos. Using this framework it becomes possible to analyse the differences in digital territorialization projects, different forms of digital mobility and the ways in which socio-spatial positionality matters for the users of digital spaces (Leitner & Sziarto, Citation2008).

Through this framework, in at least population terms, the United States could be considered to have the largest digital territory in the world, with users from different physical territories around the world congregating in spaces within US digital territory for social, economic, political and cultural reasons. Importantly, the spaces users use are not state-owned but managed by private companies such as Meta, Alphabet and Twitter.Footnote4 The pull of US digital territory is illustrated through the status of UK Facebook users post-Brexit. Upon leaving the European Union (EU), UK Facebook users, no longer covered by EU General Data Protection Regulation (GDPR) regulations that localize their data to the EU, were promptly transferred to a US Terms of Service, with their data moving from the EU to the United States (Menn, Citation2020). For the United States, while the state is important in the growth of digital territory, including through state-supported digital imaginaries (Graham, Citation2013), corporate action has been and continues to be essential to the (re)production and expansion of digital territory.

A critical analysis of digital infrastructure can also help to highlight the role of terrain – as the political materiality of territory (Elden, Citation2021, p. 170) – in digital territorialization projects. The Pacific Light Cable Network is one particularly clear example of tensions surrounding digital borders, as a cable network originally envisioned to connect California to Hong Kong in the end, due to security concerns from both sides of the digital border, connected the United States to Taiwan and the Philippines (de Seta, Citation2021). Through this cable network, it becomes evident that the political materiality of digital territory can extend the digital terrain of one nation into the physical territory of other nations (Lim, Citation2018; Starosielski, Citation2015), a security and sovereignty quandary that some nations, including the United States, wish to avoid. While sovereignty as a concept operates across multiple scales, digital sovereignty tends to be associated with the capacity of sovereign rulers and authorities (national governments) to exercise supreme power within their territory (Glasze et al., Citation2022; Kokas, Citation2022; Pohle & Thiel, Citation2020). This makes the production of a digital territory and borders one way through which sovereign power can be practiced and extended, as boundaries to sovereign power are a key component of sovereign power. In this manner, territory and sovereignty are intimately connected, with the production of digital territory often one of the first steps to the development of digital sovereignty. With a US state–corporate nexus that has extraterritorial control over digital infrastructure, increased planetary tensions around digital socio-spatial relations are almost inevitable.

Due in part to US dominance over digital relations, the EU has attempted to ‘avoid routing data flows within Europe via exchange points and routes outside of Europe’ (Pohle & Thiel, Citation2020, p. 9), with data localization that seeks ‘to restrict the storage, movement and/or processing of data to specific areas and jurisdictions’ (p. 9) being fundamental to the EU’s flagship digital governance policy: GDPR (Chander, Citation2020; Taylor, Citation2020). Through GDPR, a legalistic rather than infrastructural intervention, the EU is not just attempting to have control over data abstractly, it is seeking to keep data in a material sphere which it has both physical and digital access to, keeping data on EU terrain. In this manner, data centres that were previously understood as transnational nodes in digital relations become the digital terrain of digital territories, and EU citizens and organizations are asked to carefully consider which terrain they use.

Outside of the United States, China and the EU, it is possible to find evolving digital territorial and sovereignty models, and evolving dynamics within inter-state digital relations (Chen & Yang, Citation2022). These become particularly visible in Singapore, an important submarine cable and data centre hub. While Singapore has been recently described as one territorial node in evolving geographies of planetary illiberalism (Luger, Citation2020), the city-state plays a role in ongoing legal disputes elsewhere in the world due to its digital terrain and territory. For instance, a recent legal dispute between the Indian government and Telegram becomes complicated due to Telegram’s use of Singaporean data centres, leading one Indian judge to note that ‘conventional concepts of territoriality cannot be strictly applied’ (The Times of India, Citation2022). In these examples, whether the language of territory is used (as in India) or avoided (as in the United States), a territorial analysis of digital relations can help pinpoint moments of transnational tension in digital relations (Couture & Toupin, Citation2019). A wide range of institutions and actors participate in the production of digital territory, terrain and borders in ways that benefit both states and corporations. And while digital territorialization projects are most visible through the actions of large actors, such as the United States, EU, China or India, a number of smaller states and institutions play a vital role in digital territorialization, including through their production of easily accessible digital terrain.

The above examples begin to highlight how a spatial framework for digital relations can shed light on emerging geopolitical tensions. The framework also offers one way through which the geographies of US dominance over digital relations can be mapped and understood relationally (Couldry & Mejias, Citation2019; Fang, Citation2018; Fraser, Citation2019). Importantly for this article, this approach also emphasizes how digital borders take many forms, that they are located somewhere, accept arrivals from multiple places, and have a political materiality and positionality to them. Due to the ways in which digital borders are produced, where the border is and what passes through it often becomes a matter of state and/or corporate policy (Morris, Citationforthcoming, 2023). Through this framework it is possible to highlight the other spatialities involved in digital socio-spatial relations as well as the issues faced by those who have unequal access to digital place, space and mobility.

3. CHINA’S DIGITAL TERRITORIALIZATION PROJECT

From this conceptual starting point, it is possible to begin an analysis of perhaps the best known digital territorialization project: the Chinese project. The institutions involved in China’s digital territorialization project are perhaps the most overt in using the language of space and sovereignty, with the English language name of China’s leading body for digital relations being the Cyberspace Administration of China and with the idea of digital sovereignty being used as early as 2010 in the White Paper The Internet in China (State Council Information Office, Citation2010). But China’s digital territorialization project precedes the White Paper by over a decade, with the blocking and filtering of websites and information beginning in the mid-1990s through the creation of a digital border often described as the Great Firewall of China (Griffiths, Citation2019). This digital border began as a more simplistic filtering project before evolving into a more dynamic system which works within the Golden Shield project, an umbrella project responsible for national digital security that involves the integration and interconnection of previously disparate domestic security systems (Tai, Citation2010). In recent years this border has been regulated using newer legal technologies, such as the Outbound Data Transfer Security Assessment Measures, which specify what data can and cannot cross digital borders (Cyberspace Administration of China, Citation2022).

In his book Cyberspace Sovereignty, the lead engineer of this bordering project, Binxing Fang (Fang, Citation2018, p. 85), suggests that a ‘territorial cyberspace’ – ‘cyberspace sovereignty of a state is based on the ICT systems under the state’s own jurisdiction’ – and a ‘border’ – ‘the boundaries thereof consist of a collection of the state’s own network device ports directly connected to the network devices of other states’ – are part of a broader Chinese attempt to have sovereignty over the spaces used by Chinese citizens, be they physical or digital spaces, and is in response to US digital power. Fang argues that this sovereignty is based on:

the ICT systems under the state’s own jurisdiction; the boundaries thereof consist of a collection of the state’s own network device ports directly connected to the network devices of other states; cyberspace sovereignty is exercised for protection of various operations of data by cyber roles. The constituting facilities of cyberspace, the carried data and the operation of data are subject to judicial and administrative jurisdiction of the state to which they belong; each state can equally participate in the governance of international network interconnection; operations of the information and communication infrastructure located in the territory of a state shall not be interfered in by other states; a state has the right to protect its own cyberspace from aggression and to maintain corresponding military capabilities. (p. 85)

The Chinese digital territorialization project was actualized through the mobilization of engineers (including Fang) and policymakers, with network engineering replacing civil engineering in the production of the border, and new forms of material infrastructure involved in mapping and reinforcing the border (Möllers, Citation2021; Wilmott, Citation2020). In this case, the production of a digital terrain – including servers, cables and other territorialized infrastructure – started the successful production of a border, and in the following years legal frameworks reinforced this process, aiding in the development of digital sovereignty. In recent years, this has also led to legal frameworks demanding the localization of servers; reproducing digital terrain. In a broader sense, territory here has been a technology used to develop sovereignty over the spaces used by citizens, sovereignty which enables more thorough governance of citizens, including where citizens can congregate, move and what information citizens have access to (Morris, Citation2022a; Roberts, Citation2018).

Digital sovereignty is a common reference point in Chinese government documents, either explicitly brought up or alluded to through actions that are only possible due to sovereign control over space. These documents provide a window into a digital spatial imaginary that is extensively used by the Chinese state apparatus. For instance, the 2017 International Strategy of Cooperation on Cyberspace, states:

As a basic norm in contemporary international relations, the principle of sovereignty enshrined in the UN Charter covers all aspects of state-to-state relations, which also includes cyberspace.  …  Upholding sovereignty in cyberspace not only reflects governments’ responsibility and right to administer cyberspace in accordance with law, but also enables countries to build platforms for sound interactions among governments, businesses and social groups.  …  National governments are entitled to administer cyberspace in accordance with law. They exercise jurisdiction over ICT infrastructure, resources and activities within their territories. (Ministry of Foreign Affairs of the People’s Republic of China, Citation2017)

Elsewhere, the National Cyberspace Security Strategy notes that ‘cyberspace’ is as important as ‘land, sea, air and space, [that] national sovereignty has extended and stretched into cyberspace, [and that] sovereignty in cyberspace has become an important component part of national sovereignty’ (Creemers, Citation2016). Furthermore, ‘[n]o infringement of sovereignty … will be tolerated’, and as ‘[c]yberspace is a new territory for national sovereignty’ a ‘cybersecurity protection [force]’ should be built (Creemers, Citation2016).

Issues of digital sovereignty also appear throughout the Personal Information Protection Law (Creemers & Webster, Citation2021), with Article 12 noting that China should act as a global norm entrepreneur by:

vigorously [participating] in the formulation of international rules [or norms] for personal information protection, [stimulating] international exchange and cooperation in the area of personal information protection, and [promoting] mutual recognition of personal information protection rules [or norms], standards, etc., with other countries, regions, and international organizations.

While in the Data Security Law (Creemers, Citation2021), the use of Chinese digital terrain becomes a legal requirement for access to China’s digital territory, while data mobility to and from Chinese territory also regulated. All these documents are underpinned by the pivotal China’s Cybersecurity Law, a law formulated to ‘safeguard cyberspace sovereignty and national security’ (Creemers et al., Citation2017).

These documents are part of a legal turn in China’s digital territorialization project that began in 2010 and which has accelerated under the Xi Jinping administration. Here, the digital territorialization project evolves from one of sovereign power to one of sovereignty through rule by law (Minzner, Citation2011). One effect of this legal turn in China’s digital territorialization project is that China can now more easily export these ideas, becoming a norm entrepreneur (Creemers, Citation2020; Erie & Streinz, Citation2021). But perhaps more importantly for the users of China’s physical and digital territory, this legal turn has created a legal process through which companies and citizens can be publicly shamed, rebuked, fined, shut down, imprisoned or intimidated for both their actions in Chinese digital territory and their lack of action in governing the digital spaces that make up China’s digital territory, including through official and unofficial measures (Deng & Brien, Citation2013).

The development of sovereignty through an ever-growing body of legal and government texts means that the Chinese state can govern both the people and the companies that manage the digital spaces that people use, outsourcing governance of the population to private companies that risk being dissolved if they fail to govern correctly. Thus, while in the 2000s China relied on regular infrastructural interventions to produce and govern its digital territory, in the late 2010s and 2020s the Chinese state has been able to rely on legal means to achieve domestically oriented governance goals. This does not mean that the infrastructural interventions have disappeared, but they are no longer the main form of governance, in part because the previous success of infrastructural interventions has led to new governmental challenges emerging.

This legal turn has created an imaginary through which corporations can better understand their responsibilities, users can better understand legal boundaries, and the state can better engage with corporations and users. As I will show below, this understanding of the legal and territorial landscape influences how people use the digital spaces of China’s digital territory, including in the practices of contentious politics. In short, the legal turn in China’s digital territorialization project has enabled the Chinese state to make ‘real the world envisioned by the regulative principles’, giving it ‘sovereignty over space’ (Davis, Citation2020, p. 51). This has also contributed to planetary geographies of illiberalism, through the exporting of hardware, software and norms (Luger, Citation2020).

4. THE SOCIO-SPATIAL EFFECTS OF CHINESE DIGITAL TERRITORY ON #BEIJINGSURGERY#

Scholarship on digitally centred activism and various forms of hybrid activism will be familiar to many readers, and there has been thought-provoking work produced that examines numerous contexts (Castañeda, Citation2012; Juris, Citation2012; Recuero et al., Citation2015; Smit et al., Citation2017; Su et al., Citation2022; Yang, Citation2009). Much of this scholarship has tempered expectations about the power of digital technologies to bring about political change (Chen, Citation2015; Gerbaudo, Citation2012). But in these accounts of hybrid and digitally centred activism, the territorial and ‘socio-spatial positionality’ of those engaged in activism rarely features (Castells, Citation2015; Leitner & Sziarto, Citation2008, p. 158).

In much of this scholarship, a relationship between the physical territory of [NATION A] and the digital territory of [NATION B] is present but not interrogated. For instance, during the Arab Spring in Egypt there was an important territorial relationship between Egyptian physical territory and US digital territory, with numerous contentious political projects making use of US digital territory. While this is a somewhat simplistic rendering of the situation – other scales do matter and the US digital terrain is selectively spread around the world (Lim, Citation2018) – it gets to a core territorial dynamic that is often alluded to but rarely discussed in ongoing scholarship. Central to this dynamic is the relationship between physical and digital territories that are under different jurisdictions, with the authority governing a physical territory having little control over other digital territories. The result is the use of Twitter, Instagram, Facebook, Telegram, YouTube and Bluetooth mesh networks as sites of activist organization. In many cases this means that those engaged in contentious politics can use spaces that the governments they are protesting against have little control over. As the institution with control over physical territory lacks control over the digital territory it is left with limited options when attempting to govern contentious political action. But with the number of digital territorialization projects increasing alongside attempts to silence activists and state critics through localized and regional internet blackouts (Morris, Citationforthcoming, 2023), it is important to deepen scholarly understanding of the effects that digital territorialization projects have on contentious politics in situations with strong digital borders and advanced digital sovereignty.

To examine this, I return to #BeijingSurgery#, the mapping project described in the introduction. #BeijingSurgery#’s unique trajectory, moving from Weibo hashtag to Weixin instant messaging group project and surviving after initial attempts to end the project through digital governance, makes it a multi-sited activist project. While #BeijingSurgery# did suffer due to deletion and censorship, these forms of governance did not immediately end #BeijingSurgery#, rather, the project evolved. Empirical data from #BeijingSurgery# not only illuminates the domestic spatial effects of a digital territorialization project, but also it shines a light on the role that digital territory and borders play in transnational socio-spatial relations.

#BeijingSurgery# was examined during a multi-year stint of fieldwork in China’s hybrid geographies, including the physical spaces of Beijing, the digital spaces of China’s digital territories and the spaces outside of China’s digital territories that interlocutors visited and congregated in. Under the Xi Jinping administration, the territories in which this study was conducted could be described as spaces of ‘authoritarian closure’ (Koch, Citation2013), and this impacted the methods this study could use. To deal with creeping closure, this project made use of a multi-method fieldwork toolkit that included ethnography, semi-structured interviews and playful application walkthrough methods (Morris, Citation2021b). The ethnographic portions of this fieldwork built on the guidance found in Pink et al. (Citation2015), particularly their principle of decentring the digital in ethnographic work on digital relations. To consider ideas around place, space, positionality and scale the ethnographic practices of Madianou (Citation2016), used to explore co-presence, influenced this study, as did Xiang’s (Citation2013) discussion of multi-scalar ethnography.

The Weixin groups discussed in this project were initially accessed through invitation by interlocutors, though these groups were also advertised publicly, through QR codes. These publicly posted QR codes also influenced my understanding of these places, as while I had initially considered these to be private places, I began to see them more as simultaneously semi-public and semi-private; they were accessible to the public, but they were gate kept by administrators; they were visible to censors, but they were private enough to avoid raising an alarm. To me, these places were, in Koch’s (Citation2013) words, both ‘open’ and ‘closed’, although their level of openness was influenced by the authoritarian nature of the space they were territorialized into.

Once within groups, I made my status as a researcher open knowledge, I included my researcher status in my biography and name, and I negotiated continued access with group administrators. Alongside this I took part in the offline activities of these groups, meeting other group members in person and participating in smaller Weixin groups. During interviews with project leaders and members, I also conducted miniature application walkthroughs (Light et al., Citation2018), where interlocutors would walk me through their usage of different applications, while also showing me both how they used them and what they could see in them. Through these interactions, it became possible to identify different governance strategies used to control their contentious political action, as well as the tactics different people used to work around forms of governance.

4.1. Deletion and displacement

The first obvious effect of China’s digital territorialization project on the leaders, members and audience of #BeijingSurgery# was how easy it was to lose access to spaces of protests. This is most obvious through the deletion of the OP and hashtag. After the OP and hashtag were produced, friends of the project leaders and interested others began to repost the OP, the hashtag and the long-image, on Weibo and other digital spaces (Weixin Moments, Douban, etc.). Then, in a moment, and after fewer than 20 hours, #BeijingSurgery#, a complex affective and networked public, was gone (Boyd, Citation2011; Papacharissi, Citation2015). The hashtag was deleted, the OP deleted, comments vanished, and many posts sharing the hashtag, resharing the OP or sharing the long-image were shadow banned. This semi-public space, where people came together to discuss the evictions and to share data on them, was gone; the site of resistance had been deleted and the public displaced.

As research on contentious politics and general social media use in China has shown (King et al., Citation2013, Citation2014), content that is likely to cause protest or that calls for mass gatherings of people is more likely to be deleted than content that simply insults officials. Deletion and censorship of content, information, posts and accounts often occur for political reasons (Chen & Qiu, Citation2018; Roberts, Citation2018), and it is more often than not carried out by the operating companies of digital spaces and services in accordance with their legal responsibilities. The Chinese digital territorialization project, the legal turn, and China’s digital sovereignty aids the Chinese state in coercing companies into practising deletion; if they do not, they will be exiled, fined or their business dissolved.

But deletion has spatial effects, as it is not an abstract nothingness that is deleted, it is either information (e.g., a news article) or sites where people gather (e.g., hashtags, IM groups, Weibo posts, applications) that are deleted. Focusing on the latter, in the case of #BeijingSurgery#, the deletion of the hashtag and the OP led to the users of these shared digital spaces being displaced, losing access to both their sites of contentious politics and the network of people they met in those and through those places (Morris, Citation2022a). Space is the central logic of governance here as they lost the site of engagement, not their Weibo accounts. The territorialization project, as a spatial process that enables greater (repressive) governance, was producing spatial effects for those engaged in contentious politics, including forced mobility and displacement.

4.2. Semi-private spaces

A secondary effect of #BeijingSurgery#’s displacement was a turn away from semi-public spaces of organization and gathering towards semi-private spaces. My use of semi-public and semi-private here has a double meaning. I am alluding to visibility and ownership, while also considering accessibility. Both Weibo and Weixin are operated by platform companies, companies that market novel affordances alongside the curation of public discourse (Gillespie, Citation2010). Microblogging spaces such as Weibo are often imagined to offer users the capacity to gather in public and to be visible to other publics, while instant messaging spaces such as Weixin offer the idea of private gathering.

But these spaces are neither fully public nor completely private. First, it is important to remember that no corporate-owned space can truly be public, meaning these digital spaces have much in common with privately owned, semi-public physical places such as London’s Canary Wharf and Kings Cross. Therefore, public access to these spaces is always conditional, and one’s ability to be visible to others while in them always under negotiation. Furthermore, the 2020 revision of China’s Civil Code highlights how digital spaces such as Weixin should be considered semi-private in that they offer privacy from other civil actors but do not offer privacy (through encryption) from the state and its institutional partners, who, under the Personal Information Protection Law, are able to access personal information for reasons of ‘security’ (Creemers, Citation2022). These semi-public and private statuses influence what rights users have as well as what personal information is safe from state surveillance: none. Therefore, with the semi-public space of Weibo gone, #BeijingSurgery# became a semi-private, IM group-based project. In using IM groups, #BeijingSurgery# avoided populous semi-public digital spaces where their activities could be easily noticed by a range of people and institutions, instead using IM groups only visible to those within them and the administrators of Weixin.

While the semi-public space was gone, but the project still existed. The #BS# project had included a QR code in the long-image, this QR code was the entry key for the #BS# Weixin IM group. Within hours the IM group had over 99 users, and the QR code stopped functioning; if one scanned it, one would receive an error message informing one that the group one was attempting to join could no longer be joined via the QR code. Despite this form of artificial congestion and gatekeeping the group continued to grow through direct invitation into the group and within 48 hours the group reached close to 500 people, the Tencent mandated size limit of a Weixin IM group. Rather than being affected by a vertical ceiling, the project grew horizontally; soon #BS# IM groups #2, #3 and #4 emerged, alongside administrative groups and data cleaning groups. Each of the numbered #BS# groups had several hundred users, resulting in over one thousand members across several groups.

In this case, China’s digital territorialization project resulted in both a change in place of protest, gatekeeping entry into #BeijingSurgery#, a distinct change in the visibility of the project to other, non-member audiences and a change in spatialization, from one large, publicly visible space to numerous smaller spaces. Each of these changes affected #BeijingSurgery# in diverse ways. The change of space meant that the project leaders were now subject to new legislation (China Law Translate, Citation2017), and the single Group Leader could be prosecuted for content within the group. It also meant that the project went from a leaderless horizontal project to a Group Leader administered IM project.

Gatekeeping through QR code governance meant that entry became invite-only, unlike a hashtag. As one can only invite one’s pre-existing Weixin contacts into a Weixin IM group this limited the potential membership of the project, increasing the homogeneity of the project. The QR code gatekeeping and changes in visibility also stopped the project from building on its hashtag momentum, as regardless of how many people saw the hashtag the QR code would not work if more than 99 people were in the group. The move to multiple IM groups worked around the gatekeeping and forced size constraints, but this spatial solution also created problems around information sharing and group consensus. With over 1000 people spread across multiple groups discussions around plans, ideas, analysis and grievances occurred repeatedly, sometimes simultaneously, and it became difficult to share updates across the project’s membership. In short, these forms of gatekeeping made it more difficult to extend #BeijingSurgery#’s protest cycle (Tarrow, Citation1993).

4.3. Transnational turn

The third spatial effect of the territorialization project is the use of non-Chinese digital territory for this digitally centred activist project. In #BeijingSurgery#’s case, US digital territory was used through Google Drive, while the more difficult-to-pinpoint abstract non-Chinese digital territories hosting Telegram and Signal were also used. The reasons for this transnational turn were tied to the Chinese territorialization project and the development of digital sovereignty alongside it. As noted above, this gave state and non-state actors a legal requirement to delete and report contentious political activity. The systems of surveillance, censorship and deletion affected what could be said, where people could gather, and what could be stored. Data that were stored in Chinese digital terrain – in commercial or personal storage – could be accessed, confiscated and/or deleted by authorities. #BeijingSurgery# lost the data stored in the Weibo hashtag during the initial deletion, but the project also lost data stored in a third-party service, with the service provider informing the project members that their data had to be deleted due to sensitivity. Following these initial deletions, active keyword censorship made it difficult to have sensitive conversations even in semi-private places, and there was always a fear that surveillance technologies would be used to find and prosecute project leaders, members and the Weixin Group Leader. The result was the use of non-Chinese digital territory for project storage and administration, including important administrative conversations, spaces that could be accessed through virtual private networks (VPNs).

Despite the transnational turn in administration and storage, #BeijingSurgery# remained centred in Chinese digital territory. Chinese digital territory was essential for recruiting members, gathering data and accessibility for project members. Not only were many of the non-Chinese digital IM spaces used by project administrators unfamiliar to users of Chinese digital territory, but to access them would require a working VPN, a technology not everybody has access to. For these reasons, while administration and storage were now partially conducted in non-Chinese digital territories, spaces within Chinese digital territory remained vital to the project.

While #BeijingSurgery# did continue to be centred in Chinese digital territory, the project administrators and members made tactical use of non-Chinese digital territory as a spatial imaginary during project moderation. Within #BeijingSurgery# two interlinked spatial imaginaries emerged, the first was that Chinese digital territory was dangerous to people and to the project, an imaginary founded on the deletion of the #BeijingSurgery# hashtag and the recently implemented Internet Group Information Service Management Provisions (China Law Translate, Citation2017). The second spatial imaginary was that in non-Chinese digital territory – the waiwangFootnote5 – anything could be discussed; it was a space free from Chinese state censorship and surveillance.

Fearing surveillance and deletion of the #BeijingSurgery# IM groups and an end to the project, project leaders and members used these spatial imaginaries to govern behaviour within #BeijingSurgery#. This was most obvious in how non-Chinese digital territory was described as a space where sensitive conversations that should not happen in Weixin could happen. When language or images were used that were considered dangerous, the group leader, project administrators and project members would suggest these topics be discussed outside China’s digital territory, suggesting Telegram, WhatsApp, iMessage, Signal and Wire. Building on a discourse of project safety, group leader safety and project member safety, members may say:

Jia: Everybody should really consider using Telegram.

Bin: Maybe I am over thinking things though.

Jia: Telegram and WhatsApp are both good to use. If you can use them, using them would be smart.Footnote6

These spatial imaginaries had political effects within #BeijingSurgery#, as asking people to move to non-Chinese digital territory for sensitive discussions also silenced those discussions within the group. The silencing strategy of being told to ‘discuss this on Telegram’ often worked, but there was no infrastructure set up to help these conversations occur in non-Chinese digital territory. While these spatial imaginaries were used successfully, and perhaps productively, what Roberts (Citation2018) describes as ‘friction’ could stop transnational mobility occurring for the majority of users, meaning that sensitive conversations ended. Overall, the friction to participation created by the digital border meant that #BeijingSurgery# had to remain in Chinese digital territory, and while administrators selectively used (the imaginary built around) other territories, the nature of the project made a full relocation to non-Chinese digital territory difficult and therefore made moderation essential.

4.4. Mobility across digital borders

The transnational territorial turn and its associated imaginaries bring me to the final spatiality discussed here, mobility.Footnote7 Digital mobility is associated with all the above examples; forced mobility from hashtags to IM groups; mobility between semi-private IM groups; mobility across transnational digital borders. But another digital border was crossed, taking the digitally centred project into physical spaces and decentring the digital in digital activism (Pink et al., Citation2015).

China’s digital territorialization project, including its associated governance and imaginaries, made moving the project offline at key moments a tactical necessity. #BeijingSurgery# members had key meetings offline, gathered data offline, and engaged in semi-public discussions about practice offline. I caveat this by noting my interlocutors were always simultaneously in a hybrid digital–physical territory – they were always connected and connecting – but, while the plan was for #BeijingSurgery# to be a digitally centred hashtag project, the realities of China’s territorialization project meant that interlocutors made an active decision to move across the digital border, to decentre the digital in their digital activism, and to use Beijing’s physical territory to avoid digital censorship, deletion and surveillance. While the use of physical spaces in digital activism is not new (Gerbaudo, Citation2012; Juris, Citation2012; Lim, Citation2018), it is often a choice made to extend the scope of the project’s activism in an evolving contentious field. For #BeijingSurgery#, mobility across the digital border and decentring the digital was forced on them due to the forms which governance takes in China’s digital territory.

Because the #BeijingSurgery# project and its members desired ‘stillness’ and persistence within Chinese digital territory, hypermobility became a spatial necessity (Bissell & Fuller, Citation2011; Xiang, Citation2021). The project had wished to stay in one site, ideally the Weibo hashtag, but what instead emerged was a forced mobility around China’s digital territory, Beijing’s physical territory and non-Chinese digital territories. The result was a restless, ‘turbulent’ and ‘dynamic stillness’ in Weixin IM groups and China’s digital territory, a situation where the only way to produce stillness was hypermobility (Martin, Citation2011; Morris, Citation2021a; Xiang, Citation2021).

5. DISCUSSION: SIMULTANEOUS SITUATEDNESS ACROSS DIGITAL TERRITORIES

The #BeijingSurgery# example shows that digital territorialization projects do not make digital territory static, and digital territorial dynamics and strategies for working around digital sovereignty are important considerations for activists in China. Importantly, in other well-documented examples of digital activism, such as the Arab Spring, the territorial relationship is often bipartite, with a local physical territory and a non-local digital territory. Instead, for #BeijingSurgery# the core territorial dynamic is tripartite: Chinese digital territory, Chinese physical territory, and non-Chinese digital territory. For #BeijingSurgery# the ‘local’ digital territory plays a vital role in activist practice. Surveillance and censorship within the bordered digital territory meant that Chinese physical and non-Chinese digital territory became at times safer than Chinese digital territory, even though they were less effective in growing the #BeijingSurgery# project. Thus, #BeijingSurgery# highlights how territorial relations are particularly complex when activists are physically present in territories governed by states engaged in digital territorialization projects.

In contemporary Chinese digitally centred activism, socio-spatial positionality matters in both physical and digital territory (Leitner & Sziarto, Citation2008). The local physical territory is where the body is present, where the body is in danger, and where the body threatened by eviction and imprisonment exists. Local digital territory and terrain are where the project is spread, where it grows, and, perhaps most importantly, where the everyday lives of project participants take place. The local digital territory is not just a politically contentious field, it is also where family IM groups exist and digital wallets are stored, where sociality occurs, contact are stored, and where like-minded people can be found (Liao, Citation2019). It may be necessary for professional activities, and it is also a site where ‘relational repression’ can take place (Deng & Brien, Citation2013). Chinese digital territory is where activist practice intersects with everyday life, and for those reasons continued use of this territory matters to many activists. To help balance out pressures associated with socio-spatial positionality, #BeijingSurgery#’s leaders and members engaged in tactical simultaneous situatedness across Chinese digital territory, Chinese physical territory, and non-Chinese digital territory.

Being simultaneously situated in multiple territories meant that the project could continue in Chinese digital territory and so could the daily lives of participants. This meant that the most sensitive discussions could take place in either non-Chinese digital territory or Chinese physical territory, away from absolute state surveillance. Being simultaneously situated in three territories at once – a physical territory and two digital territories – was the case for those in the physical territory of China as well as for the small number of project members based outside of China’s physical territory. While those residing abroad did not have the same socio-spatial pressures as some members of #BeijingSurgery#, most of them understood the risks faced by those based in China, particularly the project leaders. Despite the numerous, often repressive spatial effects of China’s digital territorialization project, the #BeijingSurgery# project was able to continue by being tactically and simultaneously situated in multiple territories and making use of a range of spatialities.

6. CONCLUSIONS

In the first sections of this article, I laid out a digital territorial framework based primarily on the work of Elden and Möllers, highlighting how digital territory can be understood as a political technology, how the (re)production of digital territory takes place in part through territorialization projects, the role that digital terrain – including servers, data centres and cables – plays in this process, and how these ideas help us understand the digital border. In doing this I have shown how digital territorialization projects can take many forms and that they have a multitude of outcomes. I suggested that many people around the world are simultaneously situated in two territories, their local physical territory, and a separate digital territory: often the digital territory of the United States. It is rare, I suggested, for activists to use both local digital and physical territory, a territorial quirk that has important effects on how contentious politics is practiced.

One potential outcome of digital territorialization projects is the use of digital territory as a technology for developing ‘sovereignty over space’ and making ‘real the world envisioned by the regulative principles’ (Davis, Citation2020, p. 51). I examined this outcome through China’s digital territorialization project, making use of the writing of Chinese-state affiliated theorist and engineer Binxing Fang (Citation2018), as well as various legal texts, texts that highlight a legal turn in the Chinese digital territorialization project. To understand the form of territory and modes of sovereignty developed during China’s digital territorialization project I analysed the digital-activist mapping project, #BeijingSurgery#. During my analysis of #BeijingSurgery#, I highlighted how this project used multiple spatialities in its contentious political practice (Jessop et al., Citation2008; Leitner & Sziarto, Citation2008). Notable spatial effects of the Chinese digital territorialization project on #BeijingSurgery# were forced mobility through deletion and displacement, the use of semi-private not semi-public spaces for contentious politics, hypermobility between semi-private spaces of contentious politics by project leaders to keep the project on track, the production of multiple small-scale sites of protest, and the use of non-Chinese digital and physical territories to more safely continue the contentious political project. For some leaders and members of #BeijingSurgery#, this resulted in simultaneous situatedness across multiple digital territories in order to safely continue the project in relation to their socio-spatial positionality.

#BeijingSurgery#’s experience highlights the role of mobility between digital spaces and digital territories within activist practice, with Chinese digital spatial governance requiring regular activist mobility. These forms of cross-border and -territory mobility are discussed in scholarship on activism centred in physical spaces, and the #BeijngSurgery# adds to this literature with a case of digital activist mobility (Castañeda, Citation2020; Leitner & Sziarto, Citation2008; Morris, Citation2021a). Those engaged in #BeijingSurgery# contentious politics were able to find spaces to operate in by exploiting tensions between China’s digital territorialization and sovereignty projects and different regimes elsewhere in the world. The Chinese state’s focus on macro spatial governance meant that those with alternative spatial imaginaries and realities could effectively practice contentious politics using spatial tactics (Morris, Citation2022b). This begins to suggest that local digital territories will play a significant role in activist practice despite technologies of digital mobility existing, that both encrypted and public digital spaces are beneficial to activism in China, and that fears of total surveillance may lead to either the digital or the local being decentred in digital activist projects.

#BeijingSurgery#’s experience also forces scholars to question what ideas are normalized in current scholarship on digital activism. For instance, #BeijingSurgery#’s experience suggests that digital space is at least as fragile as physical space, but the fragility of digital space is rarely discussed in current scholarship. In a similar manner, while discussions around digital forgetting seem common, for #BeijingSurgery# being forgotten and erased was all too easy (Ghezzi et al., Citation2014; Hoskins, Citation2018). Furthermore, for #BeijingSurgery# the hashtag was a temporary home, not the long-lasting persistent space of activism described in scholarship on anglophone and US digital territory-centred digital activism (Freelon et al., Citation2018; Juris, Citation2012). When digital activism is examined from a position centred in US digital territory the question ‘What would we do if the projects hashtag was deleted?’ is rarely, if ever, asked. Perhaps it should be.

Finally, it is important to remember that digital territorialization projects, as well as the territorial and sovereign models developed in their wake, are bound to neither the US path nor the Chinese path. Just as visa (Wang, Citation2004), financial (Aalbers, Citation2018) and political regimes differ across territories, so can digital territorial models. Estonia offers eResidency (Tammpuu & Masso, Citation2019), Barcelona is imagining new forms of technological sovereignty (Mann et al., Citation2020), and arguments are being made for digital commons that offer realistic alternatives to some of the digital governance norms being exported by the United States, China and numerous corporations (Arora, Citation2015; de Rosnay & Stalder, Citation2020; Fuchs, Citation2020; Zygmuntowski et al., Citation2021). In making clearer the potential risks of digital territorial projects due to trends in ‘planetary illiberalism’ (Luger, Citation2020), I am not suggesting that states interested in digital territorialization should stop their projects, rather, I hope they consider the potential opportunities for new models of digital territorialization. Neither the United States nor the Chinese model was ideal for the members of #BeijingSurgery#, but that does not mean a territorialization project that could help activist organizations such as #BeijingSurgery# flourish is impossible. I would encourage those engaged in territorialization projects to consider how they can help organizations like #BeijingSurgery# to continue their practice safely and effectively while also challenging current regimes of digital mobility and citizenship.

ETHICS STATEMENT

All interviewees gave informed consent for interview data to be included in this research project and its subsequent publications. All references to interviewees are anonymised and/or pseudonymised. Data from multiple research participants may be brought together under constructed identities to provide further anonymity to participants in this project.

ACKNOWLEDGEMENTS

The author thanks Laura Antona, Peter Gries, Chenchen Zhang, Andrea Pia, Hyun Bang Shin and Claire Mercer for their comments, suggestions and thought-provoking conversations had around this subject. The author also thanks the anonymous reviewers for their generous comments. The research conducted for this article took place at the London School of Economics; the writing of this article took place at the University of Manchester.

DISCLOSURE STATEMENT

No potential conflict of interest was reported by the author.

Correction Statement

This article has been corrected with minor changes. These changes do not impact the academic content of the article.

Additional information

Funding

This work was supported by the Chiang Ching-Kuo Foundation for International Scholarly Exchange [grant number DD028-U-18]; and the Economic and Social Research Council [grant number 1642032].

Notes

1 China’s most popular mobile instant messaging service. It is also known as WeChat, which is the international version of Weixin.

2 A long-scrolling image that contains information, shared in image format rather than textual format. It might be created through specific software, or just made through screenshots.

3 A longstanding and extremely popular micro-blogging service.

4 A follow-on effect of this is that academic scholarship also becomes focused on US digital territory.

5 A common phrase in Chinese. Here, wai means external or foreign and wang means the internet. Literally, the internet outside of China’s digital border.

6 This is a synthesis of various conversations that took place in #BeijingSurgery# and employs constructed identities.

7 In line with Leitner and Sziarto (Citation2008), I understand ‘mobility’ and ‘socio-spatial positionality’ as two of the spatialities composing the multiple spatialities of contentious politics.

REFERENCES

  • Aalbers, M. B. (2018). Financial geography I: Geographies of tax. Progress in Human Geography, 42(6), 916–927. https://doi.org/10.1177/0309132517731253
  • Adey, P. (2010). Vertical security in the megacity. Theory, Culture & Society, 27(6), 51–67. https://doi.org/10.1177/0263276410380943
  • Amoore, L., & Raley, R. (2017). Securing with algorithms: Knowledge, decision, sovereignty. Security Dialogue, 48(1), 3–10. https://doi.org/10.1177/0967010616680753
  • Arora, P. (2015). Usurping public leisure space for protest. Space and Culture, 18(1), 55–68. https://doi.org/10.1177/1206331213517609
  • Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual space. Space and Culture, 15(2), 110–123. https://doi.org/10.1177/1206331211430016
  • Billé, F. (Ed.). (2020). Voluminous states: Sovereignty, materiality, and the territorial imagination. Duke University Press.
  • Bissell, D., & Fuller, G. (2011). Stillness in a mobile world. Routledge.
  • Boyd, D. (2011). Social network sites as networked publics: Affordances, dynamics, and implications. In Z. Papacharissi (Ed.), A networked self: Identity, community and culture on social network sites (pp. 39–58). Routledge.
  • Bratton, B. H. (2018). On hemispherical stacks: Notes on multipolar geopolitics and planetary-scale computation. In S. Wang (Ed.), As We May think: Feedforward: The 6th Guangzhou triennial (pp. 77–85). Guangdong Museum of Art.
  • Campling, L., & Colás, A. (2018). Capitalism and the sea: Sovereignty, territory and appropriation in the global ocean. Environment and Planning D: Society and Space, 36(4), 776–794. https://doi.org/10.1177/0263775817737319
  • Castañeda, E. (2012). The indignados of Spain: A precedent to occupy wall street. Social Movement Studies, 11(3–4), 309–319. doi:10.1080/14742837.2012.708830.
  • Castañeda, P. (2020). From the right to mobility to the right to the mobile city: Playfulness and mobilities in Bogotá’s cycling activism. Antipode, 52(1), 58–77. https://doi.org/10.1111/anti.12581
  • Castells, M. (2015). Networks of outrage and hope: Social movements in the internet Age. John Wiley & Sons.
  • Chander, A. (2020). Is data localization a solution for Schrems II? Journal of International Economic Law, 23(3), 771–784. https://doi.org/10.1093/jiel/jgaa024
  • Chen, S. X. (2015). Collective action in digital China: A case study of the 2013 southern weekly incident. In G. Yang (Ed.), China’s contested internet (pp. 283–304). NIAS Press. http://www.niaspress.dk/books/china%E2%80%99s-contested-internet.
  • Chen, X., & Yang, Y. (2022). Different shades of norms: Comparing the approaches of the EU and ASEAN to cyber governance. The International Spectator, 1–18. doi:10.1080/03932729.2022.2066841
  • Chen, Y., Qiu, M. Z., & L. J. (2018). Super-sticky WeChat and Chinese society. Emerald Group.
  • China Law Translate. (2017). Internet group information service management provisions. https://www.chinalawtranslate.com/internet-group-information-service-management-provisions/
  • Couldry, N., & Mejias, U. A. (2019). The costs of connection: How data is colonizing human life and appropriating it for capitalism.
  • Couture, S., & Toupin, S. (2019). What does the notion of ‘sovereignty’ mean when referring to the digital? New Media & Society, 21(10), 2305–2322. https://doi.org/10.1177/1461444819865984
  • Creemers, R. (2016). National cyberspace security strategy. In China Copyright and Media. https://chinacopyrightandmedia.wordpress.com/2016/12/27/national-cyberspace-security-strategy/
  • Creemers, R. (2020). China’s conception of cyber sovereignty: Rhetoric and realization. In D. Broeders & B. V. D. Berg (Eds.), Governing cyberspace: Behavior, power and diplomacy (pp. 107–142). Rowman & Littlefield.
  • Creemers, R. (2021). China’s emerging data protection framework. ID 3964684, SSRN scholarly paper, 16 November. Rochester, NY: Social Science Research Network. https://papers.ssrn.com/abstract=3964684.
  • Creemers, R. (2022). China’s emerging data protection framework. Journal of Cybersecurity, 8(1). https://doi.org/10.1093/cybsec/tyac011
  • Creemers, R., Triolo, P., & Webster, G. (2017). Translation: Cybersecurity Law of the people’s republic of China (effective June 1, 2017). In New America. https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-cybersecurity-law-peoples-republic-china/.
  • Creemers, R., & Webster, G. (2021). Translation: Personal Information Protection Law of the People’s Republic of China (Effective Nov. 1, 2021) | DigiChina. Accessed August 23, 2021. https://digichina.stanford.edu/news/translation-personal-information-protection-law-peoples-republic-china-effective-nov-1-2021.
  • Cyberspace Administration of China. (2022). Outbound data transfer security assessment measures. https://web.archive.org/web/20220708014822/http://www.cac.gov.cn/2022-07/07/c_1658811536396503.htm
  • Davis, S. (2020). Islands and oceans: Reimagining sovereignty and social change. Geographies of justice and social transformation. The University of Georgia Press.
  • Deng, Y., Brien, O., & J. K. (2013). Relational repression in China: Using social ties to demobilize protesters. The China Quarterly, 215, 533–552. https://doi.org/10.1017/S0305741013000714
  • de Seta, G. (2021). Gateways, sieves and domes: On the infrastructural topology of the Chinese stack. International Journal of Communication, 15, 24.
  • Dulong de Rosnay, M., & Stalder, F. (2020). Digital commons. Internet Policy Review, 9(4). https://doi.org/10.14763/2020.4.1530
  • Elden, S. (2010). Land, terrain, territory. Progress in Human Geography, 34(6), 799–817. https://doi.org/10.1177/0309132510362603.
  • Elden, S. (2013). The birth of territory. University of Chicago Press.
  • Elden, S. (2017). Legal terrain—The political materiality of territory. London Review of International Law, 5(2), 199–224. https://doi.org/10.1093/lril/lrx008
  • Elden, S. (2021). Terrain, politics, history. Dialogues in Human Geography, 11(2), 170–189. https://doi.org/10.1177/2043820620951353.
  • Erie, M. S., & Streinz, T. (2021). The Beijing effect: China’s ‘digital silk road’ as transnational data governance. ID 3810256, SSRN scholarly paper, 22 March. Rochester, NY: Social Science Research Network. https://papers.ssrn.com/abstract=3810256.
  • Fang, B. (2018). Cyberspace sovereignty: Reflections on building a community of common future in cyberspace. Springer.
  • Fraser, A. (2019). Curating digital geographies in an era of data colonialism. Geoforum; Journal of Physical, Human, and Regional Geosciences, 104, 193–200. https://doi.org/10.1016/j.geoforum.2019.04.027
  • Freelon, D., McIlwain, C., & Clark, M. (2018). Quantifying the power and consequences of social media protest. New Media & Society, 20(3), 990–1011. https://doi.org/10.1177/1461444816676646
  • Fuchs, C. (2020). The ethics of the digital commons. Journal of Media Ethics, 35(2) Routledge: 112–126. https://doi.org/10.1080/23736992.2020.1736077.
  • Gerbaudo, P. (2012). Tweets and the streets: Social media and contemporary activism. Pluto Press.
  • Ghezzi, A., Pereira, Â, & Vesnic-Alujevic, L. (2014). The ethics of memory in a digital Age: Interrogating the right to Be forgotten. Springer.
  • Gillespie, T. (2010). The politics of ‘platforms’. New Media & Society, 12(3), 347–364. https://doi.org/10.1177/1461444809342738
  • Glasze, G., Cattaruzza, A., Douzet, F., Dammann, F., Bertran, M., Bômont, C., Braun, M., Danet, D., Desforges, A., Géry, A., Grumbach, S., Hummel, P., Limonier, K., Münßinger, M., Nicolai, F., Pétiniaud, L., Winkler, J., & Zanin, C. (2022). Contested spatialities of digital sovereignty. Geopolitics, 1–40. https://doi.org/10.1080/14650045.2022.2050070
  • Gordillo, G. (2018). Terrain as insurgent weapon: An affective geometry of warfare in the mountains of Afghanistan. Political Geography, 64, 53–62. https://doi.org/10.1016/j.polgeo.2018.03.001
  • Graham, M. (2013). Geography/internet: Ethereal alternate dimensions of cyberspace or grounded augmented realities? The Geographical Journal, 179(2), 177–182. https://doi.org/10.1111/geoj.12009
  • Griffiths, J. (2019). The Great Firewall of China: How to build and control an alternative version of the internet. Zed Books.
  • Halvorsen, S. (2021). The role of territory in grassroots party-building: Insights from Argentina. Territory, Politics, Governance, 1–21. doi:10.1080/21622671.2021.1886162
  • Hoskins, A. (2018). Digital memory studies: Media pasts in transition. Routledge, Taylor & Francis Group.
  • Howard, P. N., Agarwal, S. D., & Hussain, M. M. (2011). When do states disconnect their digital networks? Regime responses to the political uses of social media. The Communication Review, 14(3), 216–232. https://doi.org/10.1080/10714421.2011.597254
  • Jessop, B., Brenner, N., & Jones, M. (2008). Theorizing sociospatial relations. Environment and Planning D: Society and Space, 26(3), 389–401. https://doi.org/10.1068/d9107
  • Juris, J. S. (2012). Reflections on #occupy everywhere: Social media, public space, and emerging logics of aggregation. American Ethnologist, 39(2), 259–279. https://doi.org/10.1111/j.1548-1425.2012.01362.x
  • Kaiser, R. (2015). The birth of cyberwar. Political Geography, 46, 11–20. https://doi.org/10.1016/j.polgeo.2014.10.001
  • King, G., Pan, J., & Roberts, M. E. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 107(2), 326–343. https://doi.org/10.1017/S0003055413000014
  • King, G., Pan, J., & Roberts, M. E. (2014). Reverse-engineering censorship in China: Randomized experimentation and participant observation. Science, 345(6199), 1251722. https://doi.org/10.1126/science.1251722
  • Koch, N. (2013). Introduction – field methods in ‘closed contexts’: Undertaking research in authoritarian states and places. Area, 45(4), 390–395. https://doi.org/10.1111/area.12044
  • Kokas, A. (2022). Trafficking data: How China Is winning the battle for digital sovereignty. Oxford University Press.
  • Kotliar, D. M. (2020). The return of the social: Algorithmic identity in an age of symbolic demise. New Media & Society, 22(7), 1152–1167. https://doi.org/10.1177/1461444820912535.
  • Kwet, M. (2019). Digital colonialism: US empire and the new imperialism in the global south. Race & Class, 60(4), 3–26. https://doi.org/10.1177/0306396818823172.
  • Leitner, H., Sziarto, S. E., & M. K. (2008). The spatialities of contentious politics. Transactions of the Institute of British Geographers, 33(2), 157–172. https://doi.org/10.1111/j.1475-5661.2008.00293.x
  • Liao, S. (2019). ‘#IAmGay# what about You?’ storytelling, discursive politics, and the affective dimension of social media activism against censorship in China. International Journal of Communication, 13, 21.
  • Light, B., Burgess, J., & Duguay, S. (2018). The walkthrough method: An approach to the study of apps. New Media & Society, 20(3), 881–900. https://doi.org/10.1177/1461444816675438
  • Lim, M. (2018). Roots, routes, and routers: Communications and media of contemporary social movements. Journalism & Communication Monographs, 20(2), 92–136. https://doi.org/10.1177/1522637918770419
  • Luger, J. (2020). Planetary illiberalism and the cybercity-state: In and beyond territory. Territory, Politics, Governance, 8(1), 77–94. https://doi.org/10.1080/21622671.2019.1627906.
  • Madianou, M. (2016). Ambient co-presence: Transnational family practices in polymedia environments. Global Networks, 16(2), 183–201. https://doi.org/10.1111/glob.12105
  • Mann, M., Mitchell, P., Foth, M., & Anatasiu, I. (2020). #Blocksidewalk to Barcelona: Technological sovereignty and the social license to operate smart cities. Journal of the Association for Information Science and Technology, 71(9), 1103–1115. https://doi.org/10.1002/asi.24387
  • Martin, C. (2011). Turbulent stillness. In D. Bissell & G. Fuller (Eds.), Stillness in a mobile world (pp. 192–208). Routledge.
  • Massey, D. B. (2005). For space. SAGE.
  • Menn, J. (2020). Exclusive: Facebook to move UK users to California terms, avoiding EU privacy rules. Reuters, 16 December. https://www.reuters.com/article/uk-britain-eu-facebook-exclusive-idUSKBN28P2HM.
  • Ministry of Foreign Affairs of the People’s Republic of China. (2017). International Strategy of Cooperation on Cyberspace. https://www.fmprc.gov.cn/mfa_eng/wjb_663304/zzjg_663340/jks_665232/kjlc_665236/qtwt_665250/t1442390.shtml.
  • Minzner, C. F. (2011). China’s turn against Law. American Journal of Comparative Law, 59(4), 935–984. https://doi.org/10.5131/AJCL.2011.0006.
  • Möllers, N. (2021) Making digital territory: Cybersecurity, techno-nationalism, and the moral boundaries of the state. Science, Technology, & Human Values, 46(1), 112–138. doi:10.1177/0162243920904436.
  • Morris, C. (2021a). Moving to keep still: Dynamic stillness in the digital and physical geographies of Beijing. Mobilities, 16(6), 935–950. https://doi.org/10.1080/17450101.2021.1928539.
  • Morris, C. (2021b). Playful exploration and digital (field) sites: Understanding the sites in which we practice (digital) ethnography. In Field Research Methods Lab. https://blogs.lse.ac.uk/fieldresearch/2021/01/18/playful-exploration-and-digital-field-sites-understanding-the-sites-in-which-we-practice-digital-ethnography/.
  • Morris, C. (2022a). Digital displacement: The spatialities of contentious politics in China’s digital territory. Transactions of the Institute of British Geographers, 47(4), 1075–1089. https://doi.org/10.1111/tran.12559
  • Morris, C. (2022b). Spatial governance in Beijing: Informality, illegality and the displacement of the ‘Low-end population’. The China Quarterly, 251, 822–842. doi:10.1017/S0305741022000868.
  • Morris, C. (forthcoming, 2023). Seeing digital Asia spatially: Vignettes of digital socio-spatial relations. In Asiascape: Digital Asia. Brill.
  • Papacharissi, Z. (2015). Affective publics: Sentiment, technology, and politics. Oxford University Press.
  • Pink, S., Horst, H., Postill, J., Hjorth, L., Lewis, T., & Tacchi, J. (2015). Digital ethnography: Principles and practice. SAGE.
  • Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4), https://doi.org/10.14763/2020.4.1532
  • Recuero, R., Zago, G., Bastos, M. T., & Araújo, R. (2015). Hashtags functions in the protests across Brazil. SAGE Open, 5(2), 215824401558600. https://doi.org/10.1177/2158244015586000
  • Roberts, M. E. (2018). Censored: Distraction and diversion inside China’s Great Firewall. Princeton University Press.
  • Smit, R., Heinrich, A., & Broersma, M. (2017). Witnessing in the new memory ecology: Memory construction of the Syrian conflict on YouTube. New Media & Society, 19(2), 289–307. https://doi.org/10.1177/1461444815604618.
  • Starosielski, N. (2015). The undersea network. Duke University Press.
  • Su, C. C., Chan, M., & Paik, S. (2022). Telegram and the anti-ELAB movement in Hong Kong: Reshaping networked social movements through symbolic participation and spontaneous interaction. Chinese Journal of Communication, 15(3), 431–448. https://doi.org/10.1080/17544750.2022.2092167.
  • Tai, Z. (2010). Casting the ubiquitous Net of information control. International Journal of Advanced Pervasive and Ubiquitous Computing, 2(1), 53–70. https://doi.org/10.4018/japuc.2010010104
  • Tammpuu, P., & Masso, A. (2019). Transnational digital identity as an instrument for global digital citizenship: The case of Estonia’s E-residency. Information Systems Frontiers, 21(3), 621–634. https://doi.org/10.1007/s10796-019-09908-y
  • Tarrow, S. (1993). Cycles of collective action: Between moments of madness and the repertoire of contention. Social Science History, 17(2), 281–307. https://doi.org/10.2307/1171283.
  • Taylor, R. D. (2020). ‘Data localization’: The internet in the balance. Telecommunications Policy, 44(8), 102003. https://doi.org/10.1016/j.telpol.2020.102003
  • State Council Information Office. (2010). The internet in China (White Paper). https://www.chinadaily.com.cn/china/2010-06/08/content_9950198.htm
  • The Times of India. (2022). Delhi high court to telegram: ‘Server in Singapore’ is no excuse. 1 September. https://timesofindia.indiatimes.com/gadgets-news/delhi-high-court-to-telegram-server-in-singapore-is-no-excuse/articleshow/93915591.cms.
  • Wang, H. (2004). Regulating transnational flows of people: An institutional analysis of passports and visas as a regime of mobility. Identities, 11(3), 351–376. https://doi.org/10.1080/10702890490493536.
  • Wilmott, C. (2020). Mobile mapping: Space, cartography and the digital. Amsterdam University Press. doi:10.5117/9789462984530.
  • Xiang, B. (2013). Multi-scalar ethnography: An approach for critical engagement with migration and social change. Ethnography, 14(3), 282–299. https://doi.org/10.1177/1466138113491669.
  • Xiang, B. (2021). Suspension: Seeking agency for change in the hypermobile world. Pacific Affairs, 94(2), 233–250. https://doi.org/10.5509/2021942233
  • Yang, G. (2009). The power of the internet in China : citizen activism online. Columbia University Press.
  • Zygmuntowski, J. J., Zoboli, L., & Nemitz, P. F. (2021). Embedding European values in data governance: A case for public data commons. Internet Policy Review, 10(3). doi:10.14763/2021.3.1572