What's New? War, Censorship and Global Transmission
@article{Hills2006WhatsNW, title={What's New? War, Censorship and Global Transmission}, author={J. Hills}, journal={International Communication Gazette}, year={2006}, volume={68}, pages={195 - 216} }
Perceptions of threats to national security have always been the basis for governments to enter the business of what, in 1900, was called ‘censorship’ of person to person communications and what, today, we call surveillance. The first direct intervention came during the Boer War in 1900, was expanded during the First World War and formed the basis of current policy. This article looks at the introduction of ‘censorship’ of electrical communications in time of war and compares the current… CONTINUE READING
14 Citations
Trawling the Wires: Mass Surveillance of Border-crossing Communication in Denmark during World War II
- Medicine, Engineering
- Technology and culture
- 2019
Soft Sister and the Rationalization of the World: The Driving Forces Behind Increased Surveillance
- Political Science
- 2008
- 2
Communications Disruption & Censorship under International Law: History Lessons
- Computer Science, Political Science
- FOCI
- 2012
- 1
- PDF
Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror
- Political Science
- 2012
- 12
The internet vs. the nation-state: Prevention and prosecution challenges on the Internet in Republic of Turkiye
- Political Science
- 2014
- PDF
Subverting Surveillance or Accessing the Dark Web? Interest in the Tor Anonymity Network in U.S. States, 2006–2015
- Political Science
- 2020
- 1
Violent organizations in contemporary Europe : a comparison of mafia and paramilitary organizations in Northern Ireland and Sicily
- Political Science
- 2010
- PDF
Telecommunications interception and access regulation framework in the US and the UK
- Engineering
- 2012
- 1
- Highly Influenced
Perceptions of power: A comparison of perceptions of the organizational power of IT departments
- Sociology
- 2009
- Highly Influenced
References
SHOWING 1-10 OF 64 REFERENCES
The Sources of Laws: Policy Dynamics in a Digital and Terrorized World
- Sociology, Computer Science
- Inf. Soc.
- 2004
- 44
GCHQ: The Secret Wireless War 1900-1980. London: Weidenfeld and Nicolson
- 1986
Espousing Their Own Cause’, The Guardian 9 November
- 2005
BT Condemned for Listing Cables to US SIGINT Station
- dc.htm (accessed
- 2004
With a Whisper and a Bang: Bush Signs Parts of Patriot II into Law
- Current
- 2004
With a Whisper and a Bang: Bush Signs Parts of Patriot II into Law -Stealthily', 24 November; at: www.sacurrent.com/site.news.cfm?
- 2004
Public Little Concerned about Patriot Act’, 9 September; at: www.gallup
- 2003
Trap and trace" devices monitor the source of all incoming calls. Neither reveals the content of communication
- 2003
UK Swamped by Data Rules’, Computing 17 September; at: www.computing
- co.uk/nes/1143687 (accessed
- 2003