What's New? War, Censorship and Global Transmission

@article{Hills2006WhatsNW,
  title={What's New? War, Censorship and Global Transmission},
  author={J. Hills},
  journal={International Communication Gazette},
  year={2006},
  volume={68},
  pages={195 - 216}
}
  • J. Hills
  • Published 2006
  • Sociology
  • International Communication Gazette
  • Perceptions of threats to national security have always been the basis for governments to enter the business of what, in 1900, was called ‘censorship’ of person to person communications and what, today, we call surveillance. The first direct intervention came during the Boer War in 1900, was expanded during the First World War and formed the basis of current policy. This article looks at the introduction of ‘censorship’ of electrical communications in time of war and compares the current… CONTINUE READING
    14 Citations
    Communications Disruption & Censorship under International Law: History Lessons
    • J. Penney
    • Computer Science, Political Science
    • FOCI
    • 2012
    • 1
    • PDF
    Telecommunications interception and access regulation framework in the US and the UK
    • 1
    • Highly Influenced
    Perceptions of power: A comparison of perceptions of the organizational power of IT departments
    • Highly Influenced

    References

    SHOWING 1-10 OF 64 REFERENCES
    The Sources of Laws: Policy Dynamics in a Digital and Terrorized World
    • I. Hosein
    • Sociology, Computer Science
    • Inf. Soc.
    • 2004
    • 44
    GCHQ: The Secret Wireless War 1900-1980. London: Weidenfeld and Nicolson
    • 1986
    Espousing Their Own Cause’, The Guardian 9 November
    • 2005
    BT Condemned for Listing Cables to US SIGINT Station
    • dc.htm (accessed
    • 2004
    With a Whisper and a Bang: Bush Signs Parts of Patriot II into Law
    • Current
    • 2004
    With a Whisper and a Bang: Bush Signs Parts of Patriot II into Law -Stealthily', 24 November; at: www.sacurrent.com/site.news.cfm?
    • 2004
    Public Little Concerned about Patriot Act’, 9 September; at: www.gallup
    • 2003
    Trap and trace" devices monitor the source of all incoming calls. Neither reveals the content of communication
    • 2003
    UK Swamped by Data Rules’, Computing 17 September; at: www.computing
    • co.uk/nes/1143687 (accessed
    • 2003