#Securitization

AltAndPaper EN|Satire NewsAltAndPaperEN
2025-12-30

Gov to IPO Anxiety: 'Minister for Vulnerability Business' Appointed

"National Vulnerability Fund" bundles data breaches to cracked bridges. Citizens ask when their My Number becomes a stock ticker.

alt.andpaper.net/en/articles/2

www.sei.org/wp-content/u... "offers a “third way”–between a strictly #territorial approach to adaptation, and an already emerging and riskier #securitization approach to #adaptation dominated by #defence logics, which has the potential to lead to less #collaborative policies and less effective..."

sei.org/wp-content/upl...

TinJarTinJar
2025-11-11

sei.org/wp-content/uploads/202

Sound advice!

"The authors suggest that such an approach offers a “third way” forward – between a strictly approach to adaptation, and an already emerging and riskier approach to dominated by logics, which has the potential to lead to less policies and less effective ."

humanrights

Yonhap Infomax Newsinfomaxkorea
2025-06-10

The Korea Housing Finance Corporation is set to launch a covered bond securitization program in H2 2025, aiming to boost long-term mortgage issuance by banks and stabilize household debt amid shifting market conditions.

en.infomaxai.com/news/articleV

Headlines Africaafrica@journa.host
2025-01-22

Africa: Infrastructure Lender AFC Eyes $500m Emerging Market Securitization: [Daba Finance] Africa Finance Corporation (AFC) is planning a transaction involving at least $500 million in synthetic asset-backed securities Synthetic ABS allows lenders to transfer loan-loss risks to investors, such as pension and hedge funds, via credit-linked notes The corporation recently priced a $500 million perpetual hybrid… newsfeed.facilit8.network/THVY #Africa #Finance #Investment #EmergingMarkets #Securitization

Alec Muffettalecmuffett
2024-11-20

“Here, the firewall is not merely a tool—it is an actor within a neoliberal technocratic order, enforcing compliance with a constructed vision of ‘secure communication’ while erasing alternate possibilities for networked interaction” — Michel Foucault, Network Architect
alecmuffett.com/article/110675

2024-11-19

“Here, the firewall is not merely a tool—it is an actor within a neoliberal technocratic order, enforcing compliance with a constructed vision of ‘secure communication’ while erasing alternate possibilities for networked interaction” — Michel Foucault, Network Architect

I got ChatGPT to role-play what Michel Foucault would say if tasked to present a threat model for an internet-connected enterprise firewall.

There is a legit reason for this, I swear.

Also: Perhaps I could get a job teaching CS at the LSE?

Slide 1: Title – “Introduction to the Firewall”

Bullet Points:

  • “A ‘firewall’—so named for its metaphorical invocation of a barrier—is not merely a technical apparatus but an enactment of boundary-making. It separates the ‘inside’ from the ‘outside,’ privileging one space while marginalizing the other.”
  • “While ostensibly ‘protective,’ the firewall is a site of power relations, determining which flows of information are deemed legitimate and which are excluded as ‘threats.'”
  • Image: A clip-art firewall with the label “Gatekeeper or Oppressor?”

Speaker Notes:
“The corporate firewall’s role is neither neutral nor passive. It does not merely ‘exist’ to block malware—it actively produces the outside as dangerous and the inside as pure. Who defines this? Whose interests are served?”

Slide 2: Title – “Threat Models as Power/Knowledge”

Bullet Points:

  • “The ‘threat model’ ostensibly guides the firewall’s configuration, but this is a regime of truth reflecting the priorities of the system’s architects.”
  • “Examples of prioritized threats:
    • External hackers (scapegoating the ‘other’).
    • Malicious code (a discourse of infection).
    • Unauthorized users (a Foucauldian criminalization of curiosity).”
  • “But note the exclusions: insider threats, systemic failures, and the user’s own complicity in reproducing insecurity are often discursively erased.

Speaker Notes:
“The firewall is thus not an objective measure of ‘security’ but a mechanism of epistemological violence, erasing alternative models of what could be considered safe, collaborative, or open.”

Slide 3: Title – “Firewall Policies and Governance”

Bullet Points:

  • “Permit/Deny Rules: These binaries exemplify a digital biopolitics, in which flows of data are subjected to constant surveillance and categorization.”
  • “Packet Inspection: A form of digital discipline, reminiscent of Bentham’s panopticon, wherein every communication is subject to the watchful gaze of protocols designed to detect deviance.”
  • “Default Deny: Not a mere security measure, but an act of pre-emptive exclusion—a declaration of guilt until innocence can be algorithmically proven.”

Speaker Notes:
“Do these governance models serve ‘security,’ or do they function to perpetuate asymmetries of power between the corporation and the data it surveils? By what right does the firewall scrutinize the packet, and at whose expense?”

Slide 4: Title – “The Firewall’s Duality”

Bullet Points:

  • “The firewall embodies both the sovereign power of exclusion and the disciplinary power of normalization.
  • “As a sovereign, it decrees what is permissible:
    • No unauthorized logins.
    • No unencrypted traffic.
    • No access from the ‘Global South IP ranges’ (geo-blocking as digital colonialism?).”
  • “As a disciplinarian, it inspects and reforms:
    • Rewriting headers (policing identity).
    • Flagging anomalies (the construction of deviance).”

Speaker Notes:
“Here, the firewall is not merely a tool—it is an actor within a neoliberal technocratic order, enforcing compliance with a constructed vision of ‘secure communication’ while erasing alternate possibilities for networked interaction.”

Slide 5: Title – “Conclusion: The Firewall as a Site of Contestation”

Bullet Points:

  • “The firewall does not simply block threats; it produces and reproduces the category of ‘threat’ within the corporate discourse of risk management.”
  • “It reinforces a regime of visibility—where the act of observing creates the very conditions of danger it purports to neutralize.”
  • “In resisting this, we must ask: Who benefits from this architecture of digital exclusion? What alternatives exist to this form of boundary-making?”

Speaker Notes:
“Let us not merely audit the firewall for misconfigurations, but interrogate its very existence. What does the firewall secure? For whom, and against whom? The answers lie not in the system logs, but in the broader structures of control that it embodies.”

Final Slide:
Title: “Questions? Or Are Questions Already Precluded by the System?”
(Contact: michel.f@criticalnetworks.org)

#criticalTheory #foucault #infosec #securitization

2024-06-19

OnlineFirst - "The state as a market maker: The rise (and fall) of Brazilian securitization in the 21st century" by Marlon Altavini de Abreu, Jeroen Johannes Klink, and Manuel B Aalbers:

#Brazil #securitization #financialization #socialhousing

journals.sagepub.com/doi/abs/1

2023-03-15

JUST PUBLISHED in Communist and Post-Communist Studies: #Securitization in the Shadow of Armed Conflict: The Internal Othering and Electoral Rights of #IDPs in #Ukraine
by Marta Jaroszewicz & Jan Grzymski

Free to access for one week:
doi.org/10.1525/cpcs.2022.1775

2023-02-20

🎧 #TheEzraKleinShow #podcast has an amazing interview with #KatharinaPistor @KAPistor about the key concepts from her book The Code of Capital:
- how the legal framework of #capital was created
- what capital actually means
- the legal underpinnings of the #GlobalFinancialSystem
- how the #LegalFramework enabling #securitization led to the #FinancialCrisis
- and so much more, definitely worth your time and attention.

The book itself is a must-read as well.

open.spotify.com/episode/2apjf

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst