Abstract
In Altheides/Snow’s important book on “media logic” it is stated that “media are the dominant force to which other institutions conform”. This argument is completely convincing, but it implies the difference between “media” and “other institutions.” “Media” is one institution among others. Although this is of course correct from e.g. a systems-theoretical perspective in which “mass media” form one subsystem of society, from the standpoint of Medienkulturwissenschaft it neglects that all institutions are always already based on medial infrastructures. This is shown with the regard to the state, its medial infrastructure of identity documents and the historical development of the defense of the media monopoly of the state
Similar content being viewed by others
Notes
- 1.
- 2.
This also includes interesting information on historical techniques for ensuring authenticity, such as tallies. Also cf. Vogtherr (2002, 154) on the fact that the “standardization of the appearance” of certificates was “a safeguard against the falsification of documents”. He notes on p. 157 that “modern diplomatics, the academic study of documents, emerged around 1700”; “the fundamental question both then and now is discrimen veri ac falsi, the distinction between what is real and what is false”.
- 3.
On the details of this development, cf. Mort (1989). On the founding of Xerox and the growing acceptance of photocopiers, cf. ibid., part. 59 and 62–69.
- 4.
For the best, most comprehensive overview currently available, cf. van Renesse (2005).
- 5.
German identity cards, for example, use the so-called “identigram” technique, cf. Bundesdruckerei (2014).
- 6.
Such as “kinegrams” or security holograms (Wikipedia, 2014). Often these techniques are collectively referred to using the umbrella term “holography” or “holograms”, although strictly speaking this is not correct. Thus “dot matrix holography”, which is often used in security appliances (cf. Johnston, 2006, 220) does not record interference patterns between object waves and reference waves; instead, an interference between two beams is used to draw pixels that constitute diffraction gratings, thus digitally assembling an image. Cf. Andrulevičius, Tamulevičius, and Tamulevičius (2007).
- 7.
Cf. Jens Schröter, “Das holographische Wissen und die Nicht-Reproduzierbarkeit,” in Das holographische Wissen, ed. Stefan Rieger and Jens Schröter (Berlin: diaphanes, 2009): 77–86.
- 8.
Of course there has been no shortage of attempts to forge holograms, but the results were seldom convincing; cf. Pizzanelli (1998).
- 9.
This does not pose a problem for the second and third line of defense, as the second line consists of persons working professionally with money, who are likely more aware of forgeries and also have devices at their disposal able to recognize forgeries (e.g. the counterfeit detectors produced by the company Safescan (cf. Safescan, 2014). The third line of defense are already specialists in counterfeit detection.
- 10.
The governments of authoritarian states were not overly fond of photocopiers, as they made the uncontrolled reproduction of information possible (such as the USSR, cf. Steinschaden, 2012, 112). However, the new options for marking copies make them interesting for dictatorships again.
- 11.
One of the best-known examples of such a taggant is the so-called EURion constellation, a cloud of dots found on Euro banknotes that can be recognized by copiers and the like. The algorithm CDS (Counterfeit Deterrence System) developed by the Central Banks Counterfeit Deterrence Group (Rules for Use, 2014), a working group of 27 central banks and other institutions that produce bank notes, is implemented in software such as Photoshop . For obvious reasons, the exact mechanisms used are secret. Steven J. Murdoch (2009) of Cambridge University has been researching this for some time: Software Detection of Currency.
References
Altheide, D. L., & Snow, R. P. (1979). Media logic. Beverley Hills, CA: SAGE.
Andrulevičius, M., Tamulevičius, T., & Tamulevičius, S. (2007). Formation and analysis of dot-matrix holograms. Materials Science (Medžiagotyra), 13, 278–281.
Benjamin, W. (2006). The work of art in the age of its technological reproducibility. Selected writings, 4, 1938–1940. Cambridge, MA: Harvard University Press, 251–283.
Bundesbank. (2016). Falschgelderkennung. Retrieved from http://www.bundesbank.de/Navigation/DE/Aufgaben/Bargeld/Falschgeld/Falschgelderkennung/falschgelderkennung.html.
Bundesdruckerei. (2014). Das Identigram. Retrieved from https://www.bundesdruckerei.de/sites/default/files/identigramr_flyer.pdf.
Engemann, C. (2011). Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst. Zeitschrift für Medien- und Kulturforschung, 2, 211–228.
Engemann, C. (2013). Write me down, make me real. Zur Gouvernemedialität digitaler Identität. In H.Passoth & J. Wehner (Eds.), Quoten, Kurven und Profile. Zur Vermessung der sozialen Welt (pp. 205–227). Wiesbaden: Springer.
Groebner, V. (2004). Der Schein der Person. Steckbrief, Ausweis und Kontrolle im Mittelalter. München: C. H. Beck.
Higgs, E. (2007). From frankpledge to chip and pin: Identification and identity in England, 1475–2005. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 243–262). Amsterdam, Oxford: Elsevier.
Hoofnagle, C. J. (2007). Identity theft. Making the known unknowns known. Harvard Journal of Law & Technology, 21, 98–122.
Johnston, S. (2006). Holographic visions. A history of new science. Oxford: Oxford University Press.
Krajina, Z., Moores, S., & Morley, D. (2014). Non-media-centric media studies: A cross-generational conversation. European Journal of Cultural Studies, 17, 682–700.
Lancaster, I. M., & Mitchell, A. (2004). The Growth of Optically Variable Features on Banknotes. In SPIE Proceedings, 5310 (pp. 34–45).
Mort, J. (1989). The anatomy of xerography. Its invention and evolution. Jefferson/NC: MacFarland.
Murdoch, S. J. (2009). Software detection of currency. Last modified October 12. Retrieved from https://www.cl.cam.ac.uk/~sjm217/projects/currency/.
Owen, D. (2004). Copies in seconds. Chester carlson and the birth of the Xerox machine. New York: Simon & Schuster.
Paul, H. (2010). Hologramme auf die Maschinen. Um sich vor Plagiatoren zu schützen, setzen die deutschen Maschinenbauer vor allem auf technologischen Vorsprung. Das reicht nicht aus, findet ihr Verband. Frankfurter Allgemeine Zeitung, January 19.
Pizzanelli, D. (1998). Counterfeit Holograms and Simulations. In SPIE Proceedings, 3314 (pp. 86–96).
Polizeiliche Kriminalprävention der Länder und des Bundes. (2014). Themen und Tricks: Betrug: Falschgeld. Retrieved from http://www.polizei-beratung.de/themen-und-tipps/betrug/falschgeld.html.
Renesse, R. L. V. (2005). Optical document security. Boston, London: Artech House.
Rosengart, F. (2005). Datenspur Papier. Die Datenschleuder, 86, 19–21.
Rules For Use. (2014). Banknoten und Fälschungsbekämpfung. Retrieved from http://www.rulesforuse.org.
Safescan. (2014). Automatische Geldscheinprüfgeräte. Retrieved from https://www.safescan.com/de/products/30/automatische-geldscheinprufer/.
Schell, K. J. (2007). History of Document Security. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 198–241). Amsterdam, Oxford: Elsevier.
Schröter, J. (2009). Das holographische Wissen und die Nicht-Reproduzierbarkeit. In S. Rieger & J. Schröter (Eds.), Das holographische Wissen (pp. 77–86). Berlin: diaphanes.
Steinschaden, J. (2012). Digitaler Frühling. Wer das Netz hat, hat die Macht? Vienna: Ueberreuter.
Strasser, G. F. (2007). The rise of cryptology in the European Renaissance. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 277–325). Amsterdam and Oxford: Elsevier.
Torpey, J. (2000). The invention of the passport. Cambridge: Cambridge University Press.
Vogtherr, T. (2002). Urkunden und Akten. In M. Maurer (Ed.), Aufriß der Historischen Wissenschaften in sieben Bänden, 4 (pp. 146–167). Stuttgart: Reclam.
Werner, T. (2009). Urkunde. In G. Ueding (Ed.), Historisches Wörterbuch der Rhetorik, 9 (pp. 934–941). WBG: Darmstadt.
Wikipedia, s.v. (2014). Kinegramme. Retrieved from http://de.wikipedia.org/wiki/Kinegramme.
Winston, B. (1998). Media technology and society. A history from the telegraph to the internet. London, New York: Routledge.
Wisse, P. (2007). Semiotics of identity management. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 167–196). Elsvier: Amsterdam, Oxford.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Schröter, J. (2018). On the Media Logic of the State. In: Thimm, C., Anastasiadis, M., Einspänner-Pflock, J. (eds) Media Logic(s) Revisited. Transforming Communications – Studies in Cross-Media Research. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-65756-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-65756-1_8
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-65755-4
Online ISBN: 978-3-319-65756-1
eBook Packages: Literature, Cultural and Media StudiesLiterature, Cultural and Media Studies (R0)