Chapter 15: The Political Economy of Digital Ground — Who Controls the Infrastructure?


Opening: The Day the Domain Disappeared

In 2010, the United States government seized the domain mooo.com—a URL shortener popular with music fans and file sharers. Without warning, without trial, without due process, the Department of Homeland Security simply took control of the domain and replaced the site with a banner: "This domain name has been seized by ICE—Homeland Security Investigations."

Thousands of links across the internet broke instantly. Blog posts, forum threads, social media shares—all pointed to dead URLs. The content those links pointed to still existed on other servers, but the naming system had been captured. The government didn't need to touch the actual files; they just seized the address that pointed to them.

This wasn't an isolated incident:

The lesson: Even if you own your content, if you don't control the infrastructure that makes it accessible, you don't truly have Ground.

This chapter explores the political economy of digital infrastructure—who controls the layers that make the internet work, how that control is exercised, and how we might redesign those layers to resist capture.

We'll introduce the Sovereignty Stack: six layers of digital infrastructure, each with different ownership models and vulnerabilities. Then we'll examine case studies of each layer being captured or contested. Finally, we'll explore alternatives being built to resist centralized control.


Part I: The Sovereignty Stack — Six Layers of Digital Infrastructure

Digital sovereignty isn't just about owning a domain or hosting a website. It requires control (or at least resilience) across six interconnected layers:

Layer 1: Physical Infrastructure (Bottom Layer)

What it is:

Who controls it:

Sovereignty implications:

Vulnerability:

Resistance strategies:

Layer 2: Network Protocols (Transport Layer)

What it is:

Who controls it:

Sovereignty implications:

Vulnerability:

Resistance strategies:

Layer 3: Identity Systems (Authentication Layer)

What it is:

Who controls it:

Sovereignty implications:

Vulnerability:

Resistance strategies:

Layer 4: Data Storage (Persistence Layer)

What it is:

Who controls it:

Sovereignty implications:

Vulnerability:

Resistance strategies:

Layer 5: Application Layer (Interface Layer)

What it is:

Who controls it:

Sovereignty implications:

Vulnerability:

Resistance strategies:

Layer 6: Economic Layer (Value Layer)

What it is:

Who controls it:

Sovereignty implications:

Vulnerability:

Resistance strategies:


Part II: The Stack in Practice — Case Studies of Control and Resistance

Case Study 1: DNS Control — The .ly Seizure (Layer 2)

What Happened:

In 2010, Libya (which controls the .ly top-level domain) seized vb.ly, a popular URL shortener, for "violating Libyan Islamic morality laws." The site had shortened links to content Libya deemed offensive.

Impact:

Sovereignty Stack Analysis:

Layer Vulnerability Lesson
Physical Content was fine (on US servers) Not the issue
Network (DNS) CRITICAL FAILURE Libya controlled .ly TLD, seized the domain
Identity Vb.ly users lost identity (their short URLs) Dependent on DNS
Storage Content still existed But unreachable
Application URL shortener app still worked But domain gone
Economic Vb.ly lost revenue Revenue depends on domain access

Lesson: Even if you control Layers 4-6 (storage, apps, payment), if Layer 2 (DNS) is captured, you're toast.

Resistance: Use domains under TLDs controlled by stable, rights-respecting jurisdictions. Or use alternative naming (onion addresses, IPFS hashes, blockchain names).

Case Study 2: AWS Deplatforming — Parler (Layer 1)

What Happened:

In January 2021, Amazon Web Services (AWS) terminated Parler's hosting contract, citing Terms of Service violations (insufficient moderation of violent content). Parler went offline for a month until they found alternative hosting.

Impact:

Sovereignty Stack Analysis:

Layer Vulnerability Lesson
Physical CRITICAL FAILURE AWS controlled servers, kicked Parler off
Network Parler still had their domain But no servers to point to
Identity User accounts existed (in database) But database offline
Storage Data existed (Parler had backups) But no public access
Application Parler's app still existed But servers offline
Economic Couldn't run ads or process payments Business model dead

Lesson: If you don't own Layer 1 (physical infrastructure), you're vulnerable to hosting providers' decisions. AWS, Google Cloud, and Azure are de facto gatekeepers.

Resistance: Self-host (expensive and technical), use offshore hosting (politically risky), or distribute across multiple providers (complex but resilient).

Case Study 3: Platform Identity Control — Facebook's Real Name Policy (Layer 3)

What Happened:

Facebook required users to use their legal names (2014 policy enforcement wave). Thousands of accounts suspended:

Impact:

Sovereignty Stack Analysis:

Layer Vulnerability Lesson
Physical Not the issue Servers worked fine
Network Not the issue DNS worked fine
Identity CRITICAL FAILURE Facebook controlled identity, could revoke it
Storage Data existed but locked Users couldn't access their own content
Application Facebook app worked But identity removed
Economic Lost business pages Revenue tied to identity

Lesson: Platform-controlled identity is leased, not owned. If the platform can delete your identity, you have no Declaration (Pillar 1).

Resistance: Use federated identity (@user@your-domain.com), self-host identity, use cryptographic keys (not platform usernames).

Case Study 4: Payment Processor Deplatforming — WikiLeaks (Layer 6)

What Happened:

In 2010, after WikiLeaks published classified US documents, Visa, Mastercard, PayPal, and Bank of America all cut off WikiLeaks' payment processing. Donations plummeted 95%.

Impact:

Sovereignty Stack Analysis:

Layer Vulnerability Lesson
Physical Hosting providers also pressured But WikiLeaks migrated
Network Domain pressured but survived DNS remained
Identity Not the issue WikiLeaks identity intact
Storage Archives remained accessible Data fine
Application Website worked Accessible
Economic CRITICAL FAILURE Payment processors cut off revenue

Lesson: Economic sovereignty (Layer 6) is essential. If payment processors can deplatform you, you're economically vulnerable no matter how technically sovereign you are.

Resistance: Bitcoin (WikiLeaks adopted it, later profited from appreciation), direct bank transfers (slow, high fees), cash/checks (physical, not scalable).

Case Study 5: Mastodon Federation — Distributed Resilience (Layers 2-5)

What Happened:

Mastodon launched in 2016 as a federated alternative to Twitter. Anyone can run a Mastodon instance (server); instances communicate via ActivityPub protocol.

Resilience across layers:

Layer How Mastodon Resists Capture
Physical Distributed servers (no single company owns all hosting)
Network Open protocol (ActivityPub—any server can join)
Identity Federated (@user@instance.com—tied to instance, but migratable)
Storage Instance admin controls data (users can export, migrate)
Application Open source (anyone can fork, improve, or run their own version)
Economic Varied models (donations, subscriptions, volunteer-run)

Advantages:

Challenges:

Lesson: Federation distributes sovereignty but doesn't eliminate all vulnerabilities. Still better than centralized platforms.


Part III: Redesigning the Stack — Alternatives to Centralized Control

Layer 1 Alternatives: Physical Infrastructure

Problem: Cloud oligopoly (AWS, Google Cloud, Azure control most hosting)

Alternatives:

Community-Owned ISPs:

Peer-to-Peer Hosting:

Mesh Networks:

Layer 2 Alternatives: Network Protocols

Problem: DNS centralization (ICANN controls root servers, domain seizures possible)

Alternatives:

Blockchain-Based Naming:

Onion Routing:

Content-Addressed Networking:

Layer 3 Alternatives: Identity Systems

Problem: Platform-controlled identity (Facebook, Google can delete your account)

Alternatives:

Federated Identity:

Decentralized Identifiers (DIDs):

Self-Hosted Email:

Layer 4 Alternatives: Data Storage

Problem: Cloud lock-in (Google, Dropbox, iCloud can delete your data or change terms)

Alternatives:

Self-Hosted Storage:

Distributed Storage:

Local-First Software:

Layer 5 Alternatives: Application Layer

Problem: Proprietary apps (Twitter, Facebook control how you use their platforms)

Alternatives:

Open Source Apps:

Protocol-Based Tools:

Layer 6 Alternatives: Economic Layer

Problem: Payment processor oligopoly (Visa/PayPal can deplatform you)

Alternatives:

Cryptocurrency:

Cooperatively-Owned Payment Systems:

Direct Transactions:

Platform Cooperatives:


Part IV: The Sovereignty Stack as Design Framework

When building new tools, platforms, or institutions, use the Sovereignty Stack as a design checklist:

Sovereignty Audit Template

For each layer, ask:

Layer 1: Physical Infrastructure

Layer 2: Network Protocols

Layer 3: Identity

Layer 4: Storage

Layer 5: Application

Layer 6: Economic

Example Audit: Ghost vs. Medium

Ghost (High Sovereignty):

Layer Assessment
Physical Self-hosted option (users run their own servers) OR Ghost(Pro) hosting (can migrate away)
Network Custom domains supported (users own their URLs)
Identity Domain-based (you@yourblog.com)
Storage Users own data, full export tools
Application Open source (can fork if Ghost Ltd dies)
Economic Subscriptions (users pay Ghost, or self-host for free), no ads

Medium (Low Sovereignty):

Layer Assessment
Physical Medium's servers only
Network medium.com/@username (don't own domain)
Identity Platform-controlled (Medium can ban you)
Storage Data on Medium's servers (export exists but limited)
Application Proprietary (can't fork, can't self-host)
Economic Ad/subscription-based (users don't control revenue model)

Result: Ghost embodies more sovereignty across all layers.


Part V: The Political Economy Question — Who Should Own Infrastructure?

Three Models of Ownership

Model 1: Corporate Ownership (Status Quo)

Model 2: State Ownership

Model 3: Commons Ownership

Archaeobytology's Position: Pluralism

We need all three models for different layers and contexts:

No single model is perfect. The goal is pluralism: multiple ownership structures coexisting, so users aren't dependent on any one.


Part VI: Threat Modeling — Attacks on Each Layer

Threat 1: State Surveillance (All Layers)

Attack Vector: Governments compel infrastructure providers to surveil users

Examples:

Defenses:

Threat 2: Corporate Extraction (Layers 4-6)

Attack Vector: Companies monetize user data and attention

Examples:

Defenses:

Threat 3: Platform Capture (Layers 3-5)

Attack Vector: Dominant platforms use network effects to lock in users

Examples:

Defenses:

Threat 4: Infrastructure Fragility (Layer 1)

Attack Vector: Physical infrastructure fails or is attacked

Examples:

Defenses:


Conclusion: Sovereignty Requires Stack Thinking

You cannot achieve digital sovereignty by fixing one layer. Even if you:

...you're still vulnerable if:

Sovereignty requires thinking across all six layers. It's not enough to own one part of the stack; you need resilience at every level.

This is hard. Full-stack sovereignty is expensive, technical, and time-consuming. Most people will accept some vulnerability in exchange for convenience. That's okay—sovereignty is a spectrum, not binary.

But the Sovereignty Stack helps you:

In the next chapter, we'll explore movement building—how to turn individual sovereignty into collective power. Because infrastructure isn't just technical; it's political. Changing who controls the stack requires organizing, advocacy, and policy change.

The political economy of Ground isn't just about building alternatives. It's about fighting for a different kind of internet—one where users, not corporations or states, have power.

That fight begins with understanding the Stack. Now you do.


Discussion Questions

  1. Personal Sovereignty Audit: Use the Sovereignty Stack to audit your own digital life. Which layers are you most vulnerable on? Which are you most secure on?

  2. Trade-offs: Would you accept less convenience for more sovereignty? Where's your breaking point? (e.g., Would you run your own email server?)

  3. Threat Prioritization: Which threat is most dangerous: state surveillance, corporate extraction, platform capture, or infrastructure fragility? Does it depend on your context?

  4. Ownership Models: Should critical infrastructure (DNS, payment systems, cloud hosting) be owned by corporations, governments, or commons? What's best for sovereignty?

  5. Layer Interdependence: If you could only secure ONE layer of the stack, which would you choose? Why?

  6. Future Scenario: Imagine 2040. What does digital infrastructure look like if Archaeobytology succeeds? What if it fails?


Exercise: Redesign One Layer

Task: Choose one layer of the Sovereignty Stack. Redesign it to maximize sovereignty while remaining practically viable.

Part 1: Critique Current State (500 words)

Part 2: Design Alternative (1000 words)

Part 3: Adoption Strategy (500 words)

Part 4: Threat Model (500 words)

Part 5: Reflect (300 words)


Further Reading

On Infrastructure and Power

On Specific Layers

On Alternatives

Primary Sources


End of Chapter 15

Next: Chapter 16 — From Practice to Discipline: Movement Building