What's New? War, Censorship and Global Transmission

@article{Hills2006WhatsNW,
  title={What's New? War, Censorship and Global Transmission},
  author={J. Hills},
  journal={International Communication Gazette},
  year={2006},
  volume={68},
  pages={195 - 216}
}
  • J. Hills
  • Published 1 June 2006
  • Sociology
  • International Communication Gazette
Perceptions of threats to national security have always been the basis for governments to enter the business of what, in 1900, was called ‘censorship’ of person to person communications and what, today, we call surveillance. The first direct intervention came during the Boer War in 1900, was expanded during the First World War and formed the basis of current policy. This article looks at the introduction of ‘censorship’ of electrical communications in time of war and compares the current… 
Trawling the Wires: Mass Surveillance of Border-crossing Communication in Denmark during World War II
TLDR
Monitoring of border-crossing telephony in Denmark during World War II revealed increasing amounts of information were accumulated in an increasingly complex collaborative project between the Danish P&T, the Foreign Ministry, and the German security service Abwehr.
Listening for the state: censoring communications in Scandinavia during World War I
Abstract During the Great War, Denmark functioned as a neutral hub of telegraph communications across northern Europe. And from the first day of August 1914, the country’s Telegraph Directory issued
Where the Wild Things Are: Evolving Futures of Communications Regulation in the Current National Security Context
In March 2008, the Australian Communications and Media Authority (ACMA) released a report dealing with the possible implications of the 'top six trends' in communications and media technologies,
Soft Sister and the Rationalization of the World: The Driving Forces Behind Increased Surveillance
In the discussions concerning the emergence of the surveillance state it is often the "Big Brother" perspective that comes to the fore. The idea is that responses to security threats cause
Communications Disruption & Censorship under International Law: History Lessons
  • J. Penney
  • Computer Science, Political Science
    FOCI
  • 2012
TLDR
This paper examines case studies wherein global communications technologies have been disrupted or censored and how the world community responded to that disruption or censorship through international law and law making, and extrapolate lessons and insights for the challenges posed by Internet censorship today.
Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror
Known cases of cyber-attacks on sovereign powers are rare, thus examination of cyber-terror remains somewhat anecdotal. Terrorism discourse itself remains mired in ambiguity as little agreement
The internet vs. the nation-state: Prevention and prosecution challenges on the Internet in Republic of Turkiye
THE INTERNET VS. THE NATION-STATE: PREVENTION AND PROSECUTION CHALLENGES ON THE INTERNET IN REPUBLIC OF TURKIYE Ersin Elibol Old Dominion University, 2014 Director: Dr. David Earnest Social,
Subverting Surveillance or Accessing the Dark Web? Interest in the Tor Anonymity Network in U.S. States, 2006–2015
The U.S. government engaged in unprecedented forms of mass surveillance in the twenty-first century. Users of the The Onion Router (Tor), an anonymity-granting technology, mask themselves from state
Violent organizations in contemporary Europe : a comparison of mafia and paramilitary organizations in Northern Ireland and Sicily
This thesis compares paramilitary organizations in Northern Ireland and mafia organizations in Sicily as violent organizations. It demonstrates the numerous similarities between these types of
Telecommunications interception and access regulation framework in the US and the UK
As telecommunication interception and access technology has evolved and become more widely used, the need for effective interception of telecommunications and access laws has increased.
...
1
2
...

References

SHOWING 1-10 OF 64 REFERENCES
The Sources of Laws: Policy Dynamics in a Digital and Terrorized World
  • I. Hosein
  • Sociology, Computer Science
    Inf. Soc.
  • 2004
TLDR
A number of policy mechanisms used to take advantage of international dimensions of the authors' current environment are presented, tracing the influence of national and international actors, and the implications for national discourse.
The Ties That Bind : Intelligence Cooperation Between the UK/USA Countries
The Ties That Bind : Intelligence Cooperation Between the UK/USA Countries PDF Are you searching for The Ties That Bind : Intelligence Cooperation Between the UK/USA Countries Books? Now, you will be
GCHQ: The Secret Wireless War 1900-1980. London: Weidenfeld and Nicolson
  • 1986
Espousing Their Own Cause’, The Guardian 9 November
  • 2005
BT Condemned for Listing Cables to US SIGINT Station
  • dc.htm (accessed
  • 2004
With a Whisper and a Bang: Bush Signs Parts of Patriot II into Law
  • Current
  • 2004
With a Whisper and a Bang: Bush Signs Parts of Patriot II into Law -Stealthily', 24 November; at: www.sacurrent.com/site.news.cfm?
  • 2004
Public Little Concerned about Patriot Act’, 9 September; at: www.gallup
  • 2003
Trap and trace" devices monitor the source of all incoming calls. Neither reveals the content of communication
  • 2003
UK Swamped by Data Rules’, Computing 17 September; at: www.computing
  • co.uk/nes/1143687 (accessed
  • 2003
...
1
2
3
4
5
...