Log in to star items.
- Convenors:
-
Clare Stevens
(Cardiff University)
Laura Meyer (ENS European-University Viadrina)
Send message to Convenors
- Chair:
-
Clare Stevens
(Cardiff University)
- Discussant:
-
Benjamin Lipp
(Technical University of Denmark)
- Format:
- Combined Format Open Panel
Short Abstract
The workshop brings together scholars working on the intersection of STS and IR, focusing on the mundane labour that goes into producing, sustaining, and fracturing technical systems at the conceptual, material, and political interfaces of where digital/analogue technical systems meet.
Description
Contemporary security discourse often frames digital technologies as radically new challenges requiring novel analytical frameworks. Yet, news archives are full of distrust for technologies we now take for granted: telegraphs raising anxieties about information overload; radios enabling unprecedented propaganda; early computing systems promising total battlefield transparency.
This panel and workshop move beyond innovation-speak to examine the mundane, often invisible labour that sustains and destabilises digital/analogue interfaces of security infrastructures. We focus on the conceptual, material, and political interface work between what gets categorised as “analogue” and “digital,” “old” and “new,” “stable” and “threatening.” By interrogating how such putative boundaries are produced, sustained, and fractured, we ask: Whose labour remains invisible in these systems and our methodological approaches to studying them? How do shifts in categorisation reshape the materiality of technical systems? In doing so, the panel contributes to STS by foregrounding the politics of categorisation and continuity in technoscientific change, aligning with EASST 2026’s theme of interrogating the politics of technoscientific futures.
This Combined Format Open Panel invites abstracts that identify patterns and changes at the interfaces between digital/analogue systems in the security sector. We also seek up to 20 abstracts from researchers interested in a creative workshop session on analogue/digital interface work, as expressions of interest for convening a journal special issue.
Expected Public Output: The workshop will consolidate an interdisciplinary STS and IR network and develop a collaborative research agenda on digital/analogue interface work in security. A key outcome will be a proposed special issue exploring continuities, ruptures, and hidden labour across these systems.
Practical Requirements: One open panel and one workshop space for up to 30 participants, arranged for group work. Materials needed: whiteboard and markers, four A2 paper pads, and coloured pens/pencils. Workshop includes up to 20 invited abstract contributors, with remaining spots open to other conference attendees.
Accepted contributions
Short abstract
This paper recovers the hidden labour histories of GPO engineers who worked at the analogue-digital interface in Britain's wartime intelligence infrastructure. Drawing on archival materials, I argue understanding intelligence infrastructure requires theorising adversarial sociotechnical relations.
Long abstract
When we discuss Britain's WWII intelligence success, we credit radar technology, brilliant cryptanalysts, and organisational innovation. But what about the 10,000 General Post Office engineers who installed and maintained 30,000 miles of telephone cables connecting radar stations to Fighter Command? Their labour made "the system" work—yet they remain invisible in historical accounts.
This paper recovers the hidden labour histories of GPO engineers who worked at the analogue-digital interface in Britain's wartime intelligence infrastructure. Drawing on archival materials, I show how these telecommunications workers installed cable networks under bombing, maintained connections under wartime conditions, and adapted existing analogue infrastructure to carry digital radar signals. Their skilled practices—improvisation, repair, continuous maintenance—constituted what intelligence historians treat as "technological capability."
Building on Shapin's concept of "invisible technicians," I argue that understanding intelligence infrastructure requires theorising adversarial sociotechnical relations. Unlike cooperative Large Technical Systems, adversarial systems are characterised by strategic exploitation through shared infrastructure, where success depends on both hiding capabilities from adversaries and maintaining them through labour. This creates a double invisibility: workers must be hidden from enemies and are subsequently erased from histories privileging technology and elites.
This matters because contemporary cybersecurity debates systematically erase infrastructure workers—system administrators, network engineers—whose expertise makes security systems function. Recovering historical labour reveals patterns persisting from radar to cyberspace.
Short abstract
In this talk I examine how security research has challenged previously stable interfaces between hardware and software, and argue that the concept of interface work may offer resources for reasoning about the implications.
Long abstract
In this talk I examine how security research has challenged previously stable interfaces between hardware and software, and argue that the concept of interface work may offer resources for reasoning about the implications.
The abstractions specified in instruction set architectures and memory standards define core functional interfaces on which software work depends, enabling analogue hardware to be treated as implementing specific digital functionality. The material properties of semiconductor hardware make direct scrutiny difficult, and details of the hardware design are often concealed for commercial purposes. Reasoning about computation thus conventionally rests on assumptions that standards and specifications accurately represent the functional properties of the hardware. However, in the 2010s security research into disturbance errors and transient execution vividly demonstrated that the functionality that hardware offers to a creative programmer is not reliably constrained by specification. Exploiting these vulnerabilities can entail the implementation of ‘weird machines’ with computational capacities that transgress those intended (Dullien 2017).
I go back to classic work on information hiding, and David Parnas’s characterisation of modularity in terms of ‘responsibility assignment’ (1972, Colburn and Shute 2011), and Melvin Conway’s observations of emergent homomorphism between social organisation and software architecture (1968). If computer science and software engineering understood interfaces in terms of intended divisions of labour, recent vulnerability research pushes us to question the power of the designer to define what interfaces are possible. Adversarial interface work, then, is a set of social processes that explores the possibility space for adversarial agency, increasingly crucial for security today.
Short abstract
WMD treaties must constantly navigate a ‘verification trap’ in which states simultaneously want to access and restrict information to assess treaty compliance. Digital-analogue data interfaces present opportunities and challenges for those wanting to escape the verification trap.
Long abstract
This paper describes the interfaces between analogue and digital systems in weapons of mass destruction (WMD) treaty verification, and how they represent opportunities and challenges to global arms control, disarmament and non-proliferation. It argues that WMD treaty verification – that is, systems for confirming compliance and / or detecting non-compliance – is perceived as essential to effective treaties but is difficult to achieve in practice, since it must balance a need for high-quality information against requirements to protect military and commercial secrets, whilst remaining cost-effective. Treaties must therefore navigate the possibility that verification becomes a political trap: indispensable yet impossible, and thus a means for bad-faith actors to stall WMD arms control, disarmament and non-proliferation.
Benchmark treaties – developed during the Cold War – resolved such trade-offs through complex analogue verification arrangements which restrict what information can be used, how it can be collected, and who can be involved. This paper considers how digital ecosystems disrupt these arrangements: on the one hand, digital tools and technologies enable more people to access and make sense of more data that could help meet information needs, on the other hand, they risk undermining the carefully-negotiated compromises that allow treaties to function.
Short abstract
The paper outlines a project proposal aimed at examining the influence of changing security dynamics and threat perceptions on the design of digital infrastructures through a case study of the standardization practices of the European Telecommunications Standards Institute (ETSI).
Long abstract
Digital infrastructures have become foundational to political, social, and economic life in the European Union (EU). Far from being neutral tools, they play a constitutive role in contemporary societies. Today, the rule of law, and core political values are no longer enforced solely through legal text and institutions, but increasingly through technical architectures. In times of digital constitutionalism, constitutional principles do not merely regulate digital technologies but are operationalized through code, protocols, and standards. At the same time, shifting geopolitical security dynamics are transforming how digital infrastructures are imagined: from enablers of openness and integration to strategic assets requiring resilience and control.
Against this backdrop, the project investigates how evolving security dynamics shape the technical design of digital infrastructures. How do threat perceptions influence the value systems embedded in the classification systems of technical standards? What trade-offs emerge between freedom, privacy, security, and state control? And how are changing imaginaries of international order translated into technical specifications?
The project develops a conceptual framework that bridges digital constitutionalism and science and technology studies, foregrounding technical standardization as a key site where constitutional values materialize. It focuses on standardization processes at the European Telecommunications Standards Institute (ETSI), a central arena in which value-laden classification systems become embedded in binding technical norms. Through an in-depth case study of ETSI’s standard-setting practices, the project traces how security concerns are translated into concrete design choices that shape digital infrastructures across Europe.
(Note: Contribution to the workshop format)
Short abstract
In 2022 a group of cybersecurity researchers found that trains produced by Polish company Newag cease to function due to wireless and wired mechanism hardcoded by the producer. This paper is a discourse analysis on the case when cybersecurity research attempts to take stance in public sphere.
Long abstract
The paper analyses discourse enveloped in Newag Impuls controversy in Poland from 2022 to 2025. Using cybersecurity research materials, institutional documents and public communications of company and politicians, the paper will show what happens when cybersecurity research is reported seriously as a civic engagement in a public sphere.
Regulatory agencies were purposefully avoiding taking a public stance and risking conflict with a politically connected company. Neither side of the political conflict in Poland was interested in pursuing investigations, so the cybersecurity researchers briefed two Prime Minister cabinets, at least 5 state intelligence and/or regulatory agencies and 2 parliamentary committees. What was the result was not the disapproval of their claims, but a civic lawsuits engaged by the company as strategic lawsuits against public participation (SLAPPs).
Thesis of the paper are simple: reverse engineering is an interface work not only because it shows alignments between various wireless and wired systems, but because has a capacity to show misalignments and unresolved conflicts within systems interoperable by conflicting actors, such as the conflict between producer of the train and the railroad maintenance yard, which won the bid for post-purchase service.
Implications shown in the paper clearly demonstrate that the recent call for protection for ethical cybersecurity research (Rampášek, M., Andraško, J., Sokol, P., & Hamulak, O. 2026), not only as an issue of new form of technological practice, but also in terms of new theories of the public sphere and freedom for scientific inquires done by citizens.
Short abstract
The article examines Palestinian cyberspace as an empirical case in which asymmetries in infrastructural control and platform governance shape the interface environments in which violence unfolds. By foregrounding interfaces, the article theorises the violence of cyber conflict.
Long abstract
Cyber conflict is commonly analysed through a martial gaze. As a result, scholarly and policy work focuses on operations that cause material disruption or physical harm, with a particular emphasis on technical infrastructure, malware, and state capabilities. Such an approach overlooks how contemporary cyber conflict unfolds within the everyday technological environments through which people interact with digital systems. This article introduces the concept of interfaces of cyber conflict to examine how agency and violence emerge at the socio-technical boundaries where humans, platforms, and computational systems (do not) interact. Drawing on science and technology studies and theories of violent conflict, the article conceptualises interfaces not simply as technical affordances mediating conflict through harm, but as enactors of such violence through denial. The article examines Palestinian cyberspace as an empirical case in which asymmetries in infrastructural control and platform governance shape the interface environments in which violence unfolds. By foregrounding interfaces, the article theorises the violence of cyber conflict beyond traditional embodied forms associated with military logics or technical-infrastructural affordances. Rather, it argues that such violence emerges through socio-technical arrangements that organise how agency unfolds in cyberspace.