Skip to main content

On the Media Logic of the State

Part of the Transforming Communications – Studies in Cross-Media Research book series (TCSCMR)

Abstract

In Altheides/Snow’s important book on “media logic” it is stated that “media are the dominant force to which other institutions conform”. This argument is completely convincing, but it implies the difference between “media” and “other institutions.” “Media” is one institution among others. Although this is of course correct from e.g. a systems-theoretical perspective in which “mass media” form one subsystem of society, from the standpoint of Medienkulturwissenschaft it neglects that all institutions are always already based on medial infrastructures. This is shown with the regard to the state, its medial infrastructure of identity documents and the historical development of the defense of the media monopoly of the state

This is a preview of subscription content, access via your institution.

Fig. 8.1
Fig. 8.2

Notes

  1. 1.

    On the rise in “identity theft”, which constitutes a serious problem, particularly for finance (cf. Hoofnagle, 2007; cf. also Wisse, 2007).

  2. 2.

    This also includes interesting information on historical techniques for ensuring authenticity, such as tallies. Also cf. Vogtherr (2002, 154) on the fact that the “standardization of the appearance” of certificates was “a safeguard against the falsification of documents”. He notes on p. 157 that “modern diplomatics, the academic study of documents, emerged around 1700”; “the fundamental question both then and now is discrimen veri ac falsi, the distinction between what is real and what is false”.

  3. 3.

    On the details of this development, cf. Mort (1989). On the founding of Xerox and the growing acceptance of photocopiers, cf. ibid., part. 59 and 62–69.

  4. 4.

    For the best, most comprehensive overview currently available, cf. van Renesse (2005).

  5. 5.

    German identity cards, for example, use the so-called “identigram” technique, cf. Bundesdruckerei (2014).

  6. 6.

    Such as “kinegrams” or security holograms (Wikipedia, 2014). Often these techniques are collectively referred to using the umbrella term “holography” or “holograms”, although strictly speaking this is not correct. Thus “dot matrix holography”, which is often used in security appliances (cf. Johnston, 2006, 220) does not record interference patterns between object waves and reference waves; instead, an interference between two beams is used to draw pixels that constitute diffraction gratings, thus digitally assembling an image. Cf. Andrulevičius, Tamulevičius, and Tamulevičius (2007).

  7. 7.

    Cf. Jens Schröter, “Das holographische Wissen und die Nicht-Reproduzierbarkeit,” in Das holographische Wissen, ed. Stefan Rieger and Jens Schröter (Berlin: diaphanes, 2009): 77–86.

  8. 8.

    Of course there has been no shortage of attempts to forge holograms, but the results were seldom convincing; cf. Pizzanelli (1998).

  9. 9.

    This does not pose a problem for the second and third line of defense, as the second line consists of persons working professionally with money, who are likely more aware of forgeries and also have devices at their disposal able to recognize forgeries (e.g. the counterfeit detectors produced by the company Safescan (cf. Safescan, 2014). The third line of defense are already specialists in counterfeit detection.

  10. 10.

    The governments of authoritarian states were not overly fond of photocopiers, as they made the uncontrolled reproduction of information possible (such as the USSR, cf. Steinschaden, 2012, 112). However, the new options for marking copies make them interesting for dictatorships again.

  11. 11.

    One of the best-known examples of such a taggant is the so-called EURion constellation, a cloud of dots found on Euro banknotes that can be recognized by copiers and the like. The algorithm CDS (Counterfeit Deterrence System) developed by the Central Banks Counterfeit Deterrence Group (Rules for Use, 2014), a working group of 27 central banks and other institutions that produce bank notes, is implemented in software such as Photoshop . For obvious reasons, the exact mechanisms used are secret. Steven J. Murdoch (2009) of Cambridge University has been researching this for some time: Software Detection of Currency.

References

  • Altheide, D. L., & Snow, R. P. (1979). Media logic. Beverley Hills, CA: SAGE.

    Google Scholar 

  • Andrulevičius, M., Tamulevičius, T., & Tamulevičius, S. (2007). Formation and analysis of dot-matrix holograms. Materials Science (Medžiagotyra), 13, 278–281.

    Google Scholar 

  • Benjamin, W. (2006). The work of art in the age of its technological reproducibility. Selected writings, 4, 1938–1940. Cambridge, MA: Harvard University Press, 251–283.

    Google Scholar 

  • Bundesbank. (2016). Falschgelderkennung. Retrieved from http://www.bundesbank.de/Navigation/DE/Aufgaben/Bargeld/Falschgeld/Falschgelderkennung/falschgelderkennung.html.

  • Bundesdruckerei. (2014). Das Identigram. Retrieved from https://www.bundesdruckerei.de/sites/default/files/identigramr_flyer.pdf.

  • Engemann, C. (2011). Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst. Zeitschrift für Medien- und Kulturforschung, 2, 211–228.

    Google Scholar 

  • Engemann, C. (2013). Write me down, make me real. Zur Gouvernemedialität digitaler Identität. In H.Passoth & J. Wehner (Eds.), Quoten, Kurven und Profile. Zur Vermessung der sozialen Welt (pp. 205–227). Wiesbaden: Springer.

    Google Scholar 

  • Groebner, V. (2004). Der Schein der Person. Steckbrief, Ausweis und Kontrolle im Mittelalter. München: C. H. Beck.

    Google Scholar 

  • Higgs, E. (2007). From frankpledge to chip and pin: Identification and identity in England, 1475–2005. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 243–262). Amsterdam, Oxford: Elsevier.

    CrossRef  Google Scholar 

  • Hoofnagle, C. J. (2007). Identity theft. Making the known unknowns known. Harvard Journal of Law & Technology, 21, 98–122.

    Google Scholar 

  • Johnston, S. (2006). Holographic visions. A history of new science. Oxford: Oxford University Press.

    CrossRef  Google Scholar 

  • Krajina, Z., Moores, S., & Morley, D. (2014). Non-media-centric media studies: A cross-generational conversation. European Journal of Cultural Studies, 17, 682–700.

    CrossRef  Google Scholar 

  • Lancaster, I. M., & Mitchell, A. (2004). The Growth of Optically Variable Features on Banknotes. In SPIE Proceedings, 5310 (pp. 34–45).

    Google Scholar 

  • Mort, J. (1989). The anatomy of xerography. Its invention and evolution. Jefferson/NC: MacFarland.

    Google Scholar 

  • Murdoch, S. J. (2009). Software detection of currency. Last modified October 12. Retrieved from https://www.cl.cam.ac.uk/~sjm217/projects/currency/.

  • Owen, D. (2004). Copies in seconds. Chester carlson and the birth of the Xerox machine. New York: Simon & Schuster.

    Google Scholar 

  • Paul, H. (2010). Hologramme auf die Maschinen.  Um sich vor Plagiatoren zu schützen, setzen die deutschen Maschinenbauer vor allem auf technologischen Vorsprung. Das reicht nicht aus, findet ihr Verband. Frankfurter Allgemeine Zeitung, January 19.

    Google Scholar 

  • Pizzanelli, D. (1998). Counterfeit Holograms and Simulations. In SPIE Proceedings, 3314 (pp. 86–96).

    Google Scholar 

  • Polizeiliche Kriminalprävention der Länder und des Bundes. (2014). Themen und Tricks: Betrug: Falschgeld. Retrieved from http://www.polizei-beratung.de/themen-und-tipps/betrug/falschgeld.html.

  • Renesse, R. L. V. (2005). Optical document security. Boston, London: Artech House.

    Google Scholar 

  • Rosengart, F. (2005). Datenspur Papier. Die Datenschleuder, 86, 19–21.

    Google Scholar 

  • Rules For Use. (2014). Banknoten und Fälschungsbekämpfung. Retrieved from http://www.rulesforuse.org.

  • Safescan. (2014). Automatische Geldscheinprüfgeräte. Retrieved from https://www.safescan.com/de/products/30/automatische-geldscheinprufer/.

  • Schell, K. J. (2007). History of Document Security. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 198–241). Amsterdam, Oxford: Elsevier.

    Google Scholar 

  • Schröter, J. (2009). Das holographische Wissen und die Nicht-Reproduzierbarkeit. In S. Rieger & J. Schröter (Eds.), Das holographische Wissen (pp. 77–86). Berlin: diaphanes.

    Google Scholar 

  • Steinschaden, J. (2012). Digitaler Frühling. Wer das Netz hat, hat die Macht? Vienna: Ueberreuter.

    Google Scholar 

  • Strasser, G. F. (2007). The rise of cryptology in the European Renaissance. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 277–325). Amsterdam and Oxford: Elsevier.

    CrossRef  Google Scholar 

  • Torpey, J. (2000). The invention of the passport. Cambridge: Cambridge University Press.

    Google Scholar 

  • Vogtherr, T. (2002). Urkunden und Akten. In M. Maurer (Ed.), Aufriß der Historischen Wissenschaften in sieben Bänden, 4 (pp. 146–167). Stuttgart: Reclam.

    Google Scholar 

  • Werner, T. (2009). Urkunde. In G. Ueding (Ed.), Historisches Wörterbuch der Rhetorik, 9 (pp. 934–941). WBG: Darmstadt.

    Google Scholar 

  • Wikipedia, s.v. (2014). Kinegramme. Retrieved from http://de.wikipedia.org/wiki/Kinegramme.

  • Winston, B. (1998). Media technology and society. A history from the telegraph to the internet. London, New York: Routledge.

    Google Scholar 

  • Wisse, P. (2007). Semiotics of identity management. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 167–196). Elsvier: Amsterdam, Oxford.

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jens Schröter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2018 The Author(s)

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Schröter, J. (2018). On the Media Logic of the State. In: Thimm, C., Anastasiadis, M., Einspänner-Pflock, J. (eds) Media Logic(s) Revisited. Transforming Communications – Studies in Cross-Media Research. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-65756-1_8

Download citation