The article examines government censorship and surveillance of transnational communication in times of war and crisis. At the center of analysis is the monitoring of border-crossing telephony in Denmark during World War II. The system expanded decidedly during the war, in terms of staff and equipment, bureaucratic record-keeping and the forms communication deemed eligible for monitoring. Communication across borders had been perceived as a potential security problem already before September 1939. Yet the context of war made the problem grow in gravity from potential to very real, and people who communicated across the national borders became suspicious through the very act of communicating. Thus, increasing amounts of information were accumulated in an increasingly complex collaborative project between the Danish P&T, the Foreign Ministry, and the German security service Abwehr—information on citizens, foreigners, firms, and news agencies, but also on capital flows, propaganda schemes, and tendencies in foreign media reporting.
...More
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Article
Alison Lynn McManus;
(2022)
Science, Interrupted: Censorship and the Problem of Credit Allocation in the American Advisory Committee on Scientific Publications, 1940–46
(/isis/citation/CBB982908408/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/isis/citation/CBB771724730/)
Article
Peter Andersen;
(2014)
De la devise de Bruno à la mort de Tycho Brahe
(/isis/citation/CBB757868142/)
Article
Tyler Morton;
(2019)
Linguists get Their Wings: Airborne Voice Intercept Operators in World War II
(/isis/citation/CBB219263940/)
Article
Stephan Schwarz;
(2021)
The Occupation of Niels Bohr’s Institute: December 6, 1943–February 3, 1944
(/isis/citation/CBB332875269/)
Article
Betül Açıkgöz;
(2017)
Approval and Disapproval of Textbooks in the Late Ottoman Empire
(/isis/citation/CBB158012138/)
Article
Aderinto, Saheed;
(2012)
Dangerous Aphrodisiac, Restless Sexuality: Venereal Disease, Biomedicine, and Protectionism in Colonial Lagos, Nigeria
(/isis/citation/CBB001200590/)
Essay Review
Chiara Protasi;
(2014)
Gli anni dell'incertezza e delle contraddizioni: dal Concilio Vaticano II alla Commissione di Studio Galileiana
(/isis/citation/CBB280989062/)
Article
Thomas Jepsen;
(2014)
Reversing the whispering galley of Dionysius: A short history of electronic surveillance in the U.S.
(/isis/citation/CBB443893857/)
Chapter
Launius, Roger D.;
(2014)
Space Technology and the Rise of the U.S. Surveillance State
(/isis/citation/CBB001510137/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Book
Jocelyn Wills;
(2017)
Tug of War: Surveillance Capitalism, Military Contracting, and the Rise of the Surveillance State
(/isis/citation/CBB450759154/)
Article
David A. Kirby;
(2017)
Regulating Cinematic Stories about Reproduction: Pregnancy, Childbirth, Abortion and Movie Censorship in the US, 1930–1958
(/isis/citation/CBB136923756/)
Book
Keith Breckenridge;
(2014)
Biometric State: The Global Politics of Identification and Surveillance in South Africa, 1850 to the Present
(/isis/citation/CBB328674013/)
Article
Steger;
(2019)
Institutionalisierte Arbeitsmedizin: Zur Geschichte der universitären Arbeitsmedizin der DDR am Beispiel der Medizinischen Akademie Magdeburg (Institutionalised occupational medicine: On the history of university occupational medicine in the GDR using the Medical Academy Magdeburg as an example)
(/isis/citation/CBB000093849/)
Article
Lyle Fearnley;
(2010)
Epidemic Intelligence. Langmuir and the Birth of Disease Surveillance
(/isis/citation/CBB273735501/)
Article
Judkins, Phil;
(2016)
Sound and fury: sound and vision in early U.K. air defence
(/isis/citation/CBB026434629/)
Article
Brandon Webb;
(2021)
‘How to raise a curtain’: Security, surveillance, and mobility in Canada’s Cold War-era exchanges, 1955–65
(/isis/citation/CBB510505541/)
Book
Robert M. Dienesch;
(2016)
Eyeing the Red Storm: Eisenhower and the First Attempt to Build a Spy
(/isis/citation/CBB217656863/)
Be the first to comment!