Sarah Myers West (Author)
In 1976, two researchers declared a revolution in cryptography: With the invention of public key encryption, cryptography could be used not only to share secret messages, but to secure and authenticate communications networks, and, eventually, to enable radically new kinds of social relationships facilitated by networked communication technology. This article explores a series of transformations in the meaning of cryptography in the 1960s and 1970s that led to the declaration of a revolution. Drawing on archival materials, the article considers how public key cryptography was the product of an emerging consensus among cryptographers of the importance of privacy in the wake of abuses of surveillance powers by government agencies. Shaped by a changing technological and political environment, it situates cryptography at the center of a focused effort to assert control over information in an era of sociopolitical upheaval, concluding that the invention of public key encryption both marked a change in the imaginary surrounding cryptography and offered a technical solution that foreclosed other approaches to addressing the problem of surveillance.
...More
Article
Astrid Mager;
(April 2017)
Search engine imaginary: Visions and values in the co-production of search technology and Europe
(/p/isis/citation/CBB569340330/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/p/isis/citation/CBB181826170/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/p/isis/citation/CBB981384434/)
Article
Carsten Ochs;
Barbara Büttner;
Jörn Lamla;
(May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform”
(/p/isis/citation/CBB474517087/)
Article
Thomas Jepsen;
(2014)
Reversing the whispering galley of Dionysius: A short history of electronic surveillance in the U.S.
(/p/isis/citation/CBB443893857/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/p/isis/citation/CBB001567169/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/p/isis/citation/CBB775086796/)
Book
Mary F. E. Ebeling;
(2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance
(/p/isis/citation/CBB663965321/)
Book
Josh Lauer;
Kenneth Lipartito;
(2021)
Surveillance Capitalism in America
(/p/isis/citation/CBB401959068/)
Article
Vijay Sivaraman;
Hassan Habibi Gharakheili;
Clinton Fernandes;
Narelle Clark;
Tanya Karliychuk;
(June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications
(/p/isis/citation/CBB353680957/)
Book
Lennon, Brian;
(2018)
Passwords: philology, security, authentication
(/p/isis/citation/CBB427866448/)
Article
Weiner, Amir;
Rahi-Tamm, Aigi;
(2013)
Getting to Know You: The Soviet Surveillance System, 1939--57
(/p/isis/citation/CBB001200564/)
Article
Arntfield, Mike;
(2008)
Wikisurveillance: A Genealogy of Cooperative Watching in the West
(/p/isis/citation/CBB000932319/)
Article
Christy Spackman;
(June 2020)
In smell’s shadow: Materials and politics at the edge of perception
(/p/isis/citation/CBB826002581/)
Article
Kjetil Rommetveit;
Niels van Dijk;
(2022)
Privacy engineering and the techno-regulatory imaginary
(/p/isis/citation/CBB677677741/)
Article
Philip Olson;
Christine Labuski;
(August 2018)
‘There’s always a [white] man in the loop’: The gendered and racialized politics of civilian drones
(/p/isis/citation/CBB568832607/)
Article
Rebecca J. Hester;
(2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology
(/p/isis/citation/CBB548068287/)
Article
Karin Bijsterveld;
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989
(/p/isis/citation/CBB388750124/)
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/p/isis/citation/CBB734944273/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/p/isis/citation/CBB447859564/)
Be the first to comment!