Case<\/strong>
\nIn 2021, the Digital Covid-19 contact tracing and testing infrastructure in the Netherlands was flawed at all stages. Outdated contact tracing database systems were scaled up without apt security. Personal data was leaked and sold on the Darkweb. And negative test certificates could be generated by users in a web browser and loaded onto the official vaccine passport app.\u00a0The Dutch government did implement a privacy-preserving contact tracing system using the Google-Apple Exposure Notification framework. The app is promoted with a \u2018privacy by design\u2019 approach and has been developed under guidance from a committee ranging from epidemiologists to legal practitioners and cybersecurity experts.<\/p>\nHowever, most contact tracing efforts never involve the app. Contact tracing is still being carried out overwhelmingly by humans who call potentially infected persons up by phone. For example, in week 34 of 2021, less than 2% of positive tests were reported following a notification by the contact tracing app during that week. The government has since concluded that the effect of the app was not significant.\u00a0What is more, the privacy promise of the app was also nullified by the flawed infrastructure it was embedded in. After an exposure notification by the app, citizens were encouraged to get a Covid-19 test. When doing so, their unique citizen service number, which is used across all domains of public services, was entered into the outdated contact tracing systems mentioned above. The privacy-by-design approach ended there.<\/p>\n
Breakdowns<\/strong>
\nHow are we to make sense of these flaws and breakdowns, beyond the immediate rights infringements? As Star and Ruhleder point out, infrastructure becomes visible on breakdown. Accordingly, one may analyze the dynamics that are laid bare.
\nBroadly speaking, capital requires that infrastructure is kept operational. How public and private actors pre-empt and manage breakdowns of infrastructure is indicative of their operations. By paying close attention to breakdowns of computational infrastructure used in epidemiology, we can analyze which actors operate on the technical materialities and political economic interests at play.<\/p>\nOperations<\/strong>
\nIn the case of flawed contact tracing infrastructure in the Netherlands, we can distinguish three operations by disparate actors.<\/p>\n\n- Data leaks<\/strong>: insufficiently protected personal contact tracing data were stolen from state-run databases and sold on the Darkweb by private individuals.<\/li>\n
- Provision of data protection<\/strong>: a privacy-preserving contact tracing product was implemented, as a collaboration of Apple, Google and state actors.<\/li>\n
- Provision of health services<\/strong>: contact tracing apps are part of a move of corporations such as Apple into digital epidemiology, and the health sector.<\/li>\n<\/ol>\n
Conclusion<\/strong>
\nThe case of the failing testing and tracing infrastructure in the Netherlands illustrates that corporations such as Apple and Google are moving towards operations that include the provision of privacy. While big tech corporations are moving into the health sector, they also tone down their data mining activities. Their move into health requires a different stance towards privacy: it becomes part of the product. The work of defining the boundaries of the private self is and will be increasingly dominated by corporations, because only well equipped actors have the capacity to respond to breakdowns of the public-private boundaries, materialized in the form of computational infrastructure.<\/p>\nReferences<\/strong><\/p>\n\n- Klinkenberg, D., Leung, K., & Wallinga, J. (2021). CoronaMelder \u2013 modelstudie naar effectiviteit. Digitaal contactonderzoek in de bestrijding van COVID-19<\/em>. RIVM.<\/li>\n
- Mezzadra, S., & Neilson, B. (2019). The Politics of Operations: Excavating Contemporary Capitalism<\/em>. Duke University Press Books.<\/li>\n
- Mitropoulos, A. (2012). Contract & Contagion: From Biopolitics to Oikonomia<\/em>. Autonomedia.
\nStar, S. L., & Ruhleder, K. (1996). Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces<\/em>. Information Systems Research, 7(1), 111\u2013134.<\/li>\n- Verlaan, D. (2021, July 18). Groot lek testbedrijf: Iedereen kon valse toegangsbewijzen in app CoronaCheck krijgen<\/em>. RTL Nieuws. https:\/\/www.rtlnieuws.nl\/nieuws\/nederland\/artikel\/5242193\/valse-coronacheck-bewijzen-datalek-testcoronanu<\/li>\n<\/ul>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Conference poster by Arif Kornweitz<\/p>\n","protected":false},"author":14,"featured_media":6191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[30,37,35],"_links":{"self":[{"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/posts\/6194"}],"collection":[{"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/comments?post=6194"}],"version-history":[{"count":11,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/posts\/6194\/revisions"}],"predecessor-version":[{"id":6237,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/posts\/6194\/revisions\/6237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/media\/6191"}],"wp:attachment":[{"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/media?parent=6194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/categories?post=6194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kim.hfg-karlsruhe.de\/wp-json\/wp\/v2\/tags?post=6194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}