Skip to main content
Top

2018 | OriginalPaper | Chapter

8. On the Media Logic of the State

Author : Jens Schröter

Published in: Media Logic(s) Revisited

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In Altheides/Snow’s important book on “media logic” it is stated that “media are the dominant force to which other institutions conform”. This argument is completely convincing, but it implies the difference between “media” and “other institutions.” “Media” is one institution among others. Although this is of course correct from e.g. a systems-theoretical perspective in which “mass media” form one subsystem of society, from the standpoint of Medienkulturwissenschaft it neglects that all institutions are always already based on medial infrastructures. This is shown with the regard to the state, its medial infrastructure of identity documents and the historical development of the defense of the media monopoly of the state

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
On the rise in “identity theft”, which constitutes a serious problem, particularly for finance (cf. Hoofnagle, 2007; cf. also Wisse, 2007).
 
2
This also includes interesting information on historical techniques for ensuring authenticity, such as tallies. Also cf. Vogtherr (2002, 154) on the fact that the “standardization of the appearance” of certificates was “a safeguard against the falsification of documents”. He notes on p. 157 that “modern diplomatics, the academic study of documents, emerged around 1700”; “the fundamental question both then and now is discrimen veri ac falsi, the distinction between what is real and what is false”.
 
3
On the details of this development, cf. Mort (1989). On the founding of Xerox and the growing acceptance of photocopiers, cf. ibid., part. 59 and 62–69.
 
4
For the best, most comprehensive overview currently available, cf. van Renesse (2005).
 
5
German identity cards, for example, use the so-called “identigram” technique, cf. Bundesdruckerei (2014).
 
6
Such as “kinegrams” or security holograms (Wikipedia, 2014). Often these techniques are collectively referred to using the umbrella term “holography” or “holograms”, although strictly speaking this is not correct. Thus “dot matrix holography”, which is often used in security appliances (cf. Johnston, 2006, 220) does not record interference patterns between object waves and reference waves; instead, an interference between two beams is used to draw pixels that constitute diffraction gratings, thus digitally assembling an image. Cf. Andrulevičius, Tamulevičius, and Tamulevičius (2007).
 
7
Cf. Jens Schröter, “Das holographische Wissen und die Nicht-Reproduzierbarkeit,” in Das holographische Wissen, ed. Stefan Rieger and Jens Schröter (Berlin: diaphanes, 2009): 77–86.
 
8
Of course there has been no shortage of attempts to forge holograms, but the results were seldom convincing; cf. Pizzanelli (1998).
 
9
This does not pose a problem for the second and third line of defense, as the second line consists of persons working professionally with money, who are likely more aware of forgeries and also have devices at their disposal able to recognize forgeries (e.g. the counterfeit detectors produced by the company Safescan (cf. Safescan, 2014). The third line of defense are already specialists in counterfeit detection.
 
10
The governments of authoritarian states were not overly fond of photocopiers, as they made the uncontrolled reproduction of information possible (such as the USSR, cf. Steinschaden, 2012, 112). However, the new options for marking copies make them interesting for dictatorships again.
 
11
One of the best-known examples of such a taggant is the so-called EURion constellation, a cloud of dots found on Euro banknotes that can be recognized by copiers and the like. The algorithm CDS (Counterfeit Deterrence System) developed by the Central Banks Counterfeit Deterrence Group (Rules for Use, 2014), a working group of 27 central banks and other institutions that produce bank notes, is implemented in software such as Photoshop. For obvious reasons, the exact mechanisms used are secret. Steven J. Murdoch (2009) of Cambridge University has been researching this for some time: Software Detection of Currency.
 
Literature
go back to reference Altheide, D. L., & Snow, R. P. (1979). Media logic. Beverley Hills, CA: SAGE. Altheide, D. L., & Snow, R. P. (1979). Media logic. Beverley Hills, CA: SAGE.
go back to reference Andrulevičius, M., Tamulevičius, T., & Tamulevičius, S. (2007). Formation and analysis of dot-matrix holograms. Materials Science (Medžiagotyra), 13, 278–281. Andrulevičius, M., Tamulevičius, T., & Tamulevičius, S. (2007). Formation and analysis of dot-matrix holograms. Materials Science (Medžiagotyra), 13, 278–281.
go back to reference Benjamin, W. (2006). The work of art in the age of its technological reproducibility. Selected writings, 4, 1938–1940. Cambridge, MA: Harvard University Press, 251–283. Benjamin, W. (2006). The work of art in the age of its technological reproducibility. Selected writings, 4, 1938–1940. Cambridge, MA: Harvard University Press, 251–283.
go back to reference Engemann, C. (2011). Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst. Zeitschrift für Medien- und Kulturforschung, 2, 211–228. Engemann, C. (2011). Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst. Zeitschrift für Medien- und Kulturforschung, 2, 211–228.
go back to reference Engemann, C. (2013). Write me down, make me real. Zur Gouvernemedialität digitaler Identität. In H.Passoth & J. Wehner (Eds.), Quoten, Kurven und Profile. Zur Vermessung der sozialen Welt (pp. 205–227). Wiesbaden: Springer. Engemann, C. (2013). Write me down, make me real. Zur Gouvernemedialität digitaler Identität. In H.Passoth & J. Wehner (Eds.), Quoten, Kurven und Profile. Zur Vermessung der sozialen Welt (pp. 205–227). Wiesbaden: Springer.
go back to reference Groebner, V. (2004). Der Schein der Person. Steckbrief, Ausweis und Kontrolle im Mittelalter. München: C. H. Beck. Groebner, V. (2004). Der Schein der Person. Steckbrief, Ausweis und Kontrolle im Mittelalter. München: C. H. Beck.
go back to reference Higgs, E. (2007). From frankpledge to chip and pin: Identification and identity in England, 1475–2005. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 243–262). Amsterdam, Oxford: Elsevier.CrossRef Higgs, E. (2007). From frankpledge to chip and pin: Identification and identity in England, 1475–2005. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 243–262). Amsterdam, Oxford: Elsevier.CrossRef
go back to reference Hoofnagle, C. J. (2007). Identity theft. Making the known unknowns known. Harvard Journal of Law & Technology, 21, 98–122. Hoofnagle, C. J. (2007). Identity theft. Making the known unknowns known. Harvard Journal of Law & Technology, 21, 98–122.
go back to reference Johnston, S. (2006). Holographic visions. A history of new science. Oxford: Oxford University Press.CrossRef Johnston, S. (2006). Holographic visions. A history of new science. Oxford: Oxford University Press.CrossRef
go back to reference Krajina, Z., Moores, S., & Morley, D. (2014). Non-media-centric media studies: A cross-generational conversation. European Journal of Cultural Studies, 17, 682–700.CrossRef Krajina, Z., Moores, S., & Morley, D. (2014). Non-media-centric media studies: A cross-generational conversation. European Journal of Cultural Studies, 17, 682–700.CrossRef
go back to reference Lancaster, I. M., & Mitchell, A. (2004). The Growth of Optically Variable Features on Banknotes. In SPIE Proceedings, 5310 (pp. 34–45). Lancaster, I. M., & Mitchell, A. (2004). The Growth of Optically Variable Features on Banknotes. In SPIE Proceedings, 5310 (pp. 34–45).
go back to reference Mort, J. (1989). The anatomy of xerography. Its invention and evolution. Jefferson/NC: MacFarland. Mort, J. (1989). The anatomy of xerography. Its invention and evolution. Jefferson/NC: MacFarland.
go back to reference Owen, D. (2004). Copies in seconds. Chester carlson and the birth of the Xerox machine. New York: Simon & Schuster. Owen, D. (2004). Copies in seconds. Chester carlson and the birth of the Xerox machine. New York: Simon & Schuster.
go back to reference Paul, H. (2010). Hologramme auf die Maschinen. Um sich vor Plagiatoren zu schützen, setzen die deutschen Maschinenbauer vor allem auf technologischen Vorsprung. Das reicht nicht aus, findet ihr Verband. Frankfurter Allgemeine Zeitung, January 19. Paul, H. (2010). Hologramme auf die Maschinen.  Um sich vor Plagiatoren zu schützen, setzen die deutschen Maschinenbauer vor allem auf technologischen Vorsprung. Das reicht nicht aus, findet ihr Verband. Frankfurter Allgemeine Zeitung, January 19.
go back to reference Pizzanelli, D. (1998). Counterfeit Holograms and Simulations. In SPIE Proceedings, 3314 (pp. 86–96). Pizzanelli, D. (1998). Counterfeit Holograms and Simulations. In SPIE Proceedings, 3314 (pp. 86–96).
go back to reference Renesse, R. L. V. (2005). Optical document security. Boston, London: Artech House. Renesse, R. L. V. (2005). Optical document security. Boston, London: Artech House.
go back to reference Rosengart, F. (2005). Datenspur Papier. Die Datenschleuder, 86, 19–21. Rosengart, F. (2005). Datenspur Papier. Die Datenschleuder, 86, 19–21.
go back to reference Schell, K. J. (2007). History of Document Security. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 198–241). Amsterdam, Oxford: Elsevier. Schell, K. J. (2007). History of Document Security. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 198–241). Amsterdam, Oxford: Elsevier.
go back to reference Schröter, J. (2009). Das holographische Wissen und die Nicht-Reproduzierbarkeit. In S. Rieger & J. Schröter (Eds.), Das holographische Wissen (pp. 77–86). Berlin: diaphanes. Schröter, J. (2009). Das holographische Wissen und die Nicht-Reproduzierbarkeit. In S. Rieger & J. Schröter (Eds.), Das holographische Wissen (pp. 77–86). Berlin: diaphanes.
go back to reference Steinschaden, J. (2012). Digitaler Frühling. Wer das Netz hat, hat die Macht? Vienna: Ueberreuter. Steinschaden, J. (2012). Digitaler Frühling. Wer das Netz hat, hat die Macht? Vienna: Ueberreuter.
go back to reference Strasser, G. F. (2007). The rise of cryptology in the European Renaissance. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 277–325). Amsterdam and Oxford: Elsevier.CrossRef Strasser, G. F. (2007). The rise of cryptology in the European Renaissance. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 277–325). Amsterdam and Oxford: Elsevier.CrossRef
go back to reference Torpey, J. (2000). The invention of the passport. Cambridge: Cambridge University Press. Torpey, J. (2000). The invention of the passport. Cambridge: Cambridge University Press.
go back to reference Vogtherr, T. (2002). Urkunden und Akten. In M. Maurer (Ed.), Aufriß der Historischen Wissenschaften in sieben Bänden, 4 (pp. 146–167). Stuttgart: Reclam. Vogtherr, T. (2002). Urkunden und Akten. In M. Maurer (Ed.), Aufriß der Historischen Wissenschaften in sieben Bänden, 4 (pp. 146–167). Stuttgart: Reclam.
go back to reference Werner, T. (2009). Urkunde. In G. Ueding (Ed.), Historisches Wörterbuch der Rhetorik, 9 (pp. 934–941). WBG: Darmstadt. Werner, T. (2009). Urkunde. In G. Ueding (Ed.), Historisches Wörterbuch der Rhetorik, 9 (pp. 934–941). WBG: Darmstadt.
go back to reference Winston, B. (1998). Media technology and society. A history from the telegraph to the internet. London, New York: Routledge. Winston, B. (1998). Media technology and society. A history from the telegraph to the internet. London, New York: Routledge.
go back to reference Wisse, P. (2007). Semiotics of identity management. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 167–196). Elsvier: Amsterdam, Oxford.CrossRef Wisse, P. (2007). Semiotics of identity management. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 167–196). Elsvier: Amsterdam, Oxford.CrossRef
Metadata
Title
On the Media Logic of the State
Author
Jens Schröter
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-65756-1_8