Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.
Important questions are raised such as: How much information will we be allowed to keep private through the use of encryption on our computational devices? What rights do we have to secure and personalized channels of communication, and how should those be balanced by the state's interests in maintaining order and degrading the capacity of criminals and rival state actors to organize through data channels? What new regimes may be required for states to conduct digital searches, and how does encryption act as countersurveillance? How have key debates relied on racialized social constructions in their discourse? What transformations in journalistic media and practices have occurred with the development of encryption tools? How are the digital footprints of consumers tracked and targeted?
Scholars and students from many backgrounds as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to questions of privacy and encryption encompassing research from Communication, Sociology, Critical Data Studies, and Advertising and Public Relations.
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere â even offline. Perfect for commutes or when youâre on the go. Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Privacy by Michael Filimowicz in PDF and/or ePUB format, as well as other popular books in Social Sciences & Sociology. We have over one million books available in our catalogue for you to explore.
1 Distributing Journalism Digital Disclosure, Secrecy, and Crypto-Cultures
Luke Heemsbergen and Alexia Maddox
DOI: 10.4324/9781003173335-1
Introduction
This chapter engages with documenting how digital secrets and distributed disclosures are evolving cultures of journalistic and civic practice. The rise and shifts of new forms of distributing journalism trace a movement from private disclosures and exclusive stories to distributed disclosures and public made stories. Often, large datasets and diverse actors factor into the creation of such news stories. These shifts have occurred across techno-cultural contexts of openness and secrecy that have intertwined to redefine the work and identity of journalists.
The practice and promise of journalism in the western world has worn thin. Rosen (1999) suggests that a frame of competent professional bystander who reports on the events of public interest that roll by had fallen out of grace long before algorithmic steering and audience microcasting redefined news.
As the advertising market disappears into a fragmented world of digital outlets and readers consume news for free, there is little if any money available to subsidise quality journalism. A lack of resources undermines reporting quality and fact-checking practices. Bureau cuts, fewer news correspondents and the abuse of information received from agencies are simply a few consequences of this situation (Brogan, 2010; Starr, 2009). The one thing that can be capitalised is the demand for news products that continue to remain scarce, such as investigative reporting.
But WikiLeaksâ wiki did not last. Wikileaks.orgâs distinct phases created permutations and combinations of journalism practice that drew light not only to new ways of making news, but the evolutionary complexity of claiming to be a force of transparency and truth in a data-rich world (Heemsbergen, 2021). Part of the complexity had to do with how these cultures attached to cryptography. The cypherpunks â a like-minded, liberty-focused group of computer scientists, coders, and civil libertarians, willed WikiLeaks into existence â rubbed up against structural powers of the state (Follis & Fish, 2020) and the market (Cammaerts, 2013). Paradoxically, part of the new digital machines that âkilled secretsâ (Greenberg, 2012) was a suite of cryptographic technologies that enabled the many to share data and communicate with each other in private or anonymously. This afforded new ways to organize secrets that in turn created new public information. The ethos that drove these cryptographic practices was not always aligned with traditional journalistic practice or ethics, or the traditional power differentials between western states and their journalists. We turn now from our brief introduction of journalism distributed to focus on cryptographic cultures themselves.
Figure1.1Washington Post website.
Note that as this chapter unpacks the ethos in distributed journalism, we highlight a set of techno-cultural practices that were not apparent or were potentially unprofessional in the earlier iterations of what was dubbed network journalism. We break from a networked journalism that acknowledges multi-platform, multi-voice, always on digital content machines (Beckett & Mansell, 2008) that is understood through a frame of convergence culture. Closer is how Van Der Haak, Parks, and Castells (2012, p. 2927) describe a âdiffused capacity to record information, share it, and distribute itâ that includes as novel digital tools crowdsourcing, data analytics, and automated writing tools, among other digital capacities offered to the journalist subject.
Yet even further, we suggest that cryptography brings a new suite of affordances to journalism that is worth identifying and exploring in technical and cultural affect. Here we align to Costa (2018) and Heemsbergen (2019) and suggest that rather than focus on cryptographyâs specific technical architectures, it is useful to focus on cryptographic practices of use within situated environments, namely how cultures of cryptography pervade and interface with journalism practice. How do cryptographic affordances in practice facilitate a model of distributed journalism? In summary, the early promise of networked journalism gave way to a cacophony of feedback loops and even disinformation that were afforded by the corporate interests of Web 2.0 products focusing attention on the most divisive content (Ribeiro et al., 2019) to drive engagement. Some of what is left of the original networked journalism promise remains at the margins, present in a set of techno-cultural cypherpunk practices that open new ways of seeking, protecting, and then widely sharing what makes news, news. We are interested in showing how far the liminal and periphery of journalistic practice around cryptography has come. Note that we signal distributing journalism as a practice and action rather than a noun or standard of âdistributed journalismâ. Its essence is tactical pushes into new distributions of making secret information public and then crafting public information. Cryptography helps with the former, and cryptographic cultures with the latter.
Strictly speaking, cryptography is the use and study of techniques to secure communications from being read by third parties or the public. In the digital age, these techniques form a ubiquitous layer of invisible digital infrastructures that enable and secure everything from banking online to watching DVDs and streaming Netflix. Yet as Bruun, Andersen, and Mannov (2020, p. 13) point out, employing cryptographic security systems âinto the telecommunication data of millions of people reveal that data infrastructures and cryptographic systems are not just technical but also social and political formsâ. It is not just certain products and their corporate interests that are protected by cryptography, but our capacity to communicate as we intend in a digital world. Cryptography is utilized to retain the levels of privacy and security present in the analogue world (Narayanan, 2013) by offering a technical solution to the expectation of a whispered conversation, sealed envelope, or locked box. However, cryptography constitutes a method of rearranging power in ways that were previously unavailable. These new power relations have confused states, offered moral panics for law enforcement, and in their ideal deployment enabled a utopian zero-trust society tied to libertarian ideologies. As Bauman et al. (2014) have it, there is a tension between the concerns raised in public debates about data security and the promises of emerging cryptographic protocols. Similarly, Bruun et al. (2020, p. 13) observe that in political speeches and public debates, citizensâ trust that governments and tech companies will protect their data is framed as important and essential. In the environments of emerging cryptographic technologies, such as blockchains, bitcoin, and multiparty computation (MPC), a promise to provide âtrustless trustâ and abandon the need for trusted intermediaries, authorities, and institutions is articulated (Bruun et al., 2020). In the next section, we more fully explore these ideologies and cultures to frame how they might relate to the cryptographic distribution of journalism.
Crypto-cultures and the public interest
How such techniques and cultures of cryptography distribute journalismâs practice and worth is a question of public interest. Follis and Fish (2020) argue that contradictory relationships emerge through the entanglements of hacking, journalism, the state, and political action that we discuss in this chapter. We contend that these relationships are not always contradictory and at times represent a convergence of politics within and across institutions, services, and people that bridge between the technopolitics of cypherpunks and journalism. This section will introduce the cultural milieu surrounding cryptography, present a typology of crypto-cultures, and then signpost the merger of these practices and politics with journalism. Moving through the realism of the scientific journalism spruiked by WikiLeaks founder Julian Assange, this section will lead us into the more diverse realm of crypto-journalism.
Turning for a moment to the history of technical cryptography is useful to describe the conditions created by cryptographic cultures and the cypherpunk moment. Before the 1970s, governments, particularly that of the US, stifled public pursuits in crypto (Levy, 2001). However, under pressure from industry and various organizations, in 1973 the US Government instigated work toward the Data Encryption Standard. In 1975, a proposal put forward by IBM was accepted and a modified version was adopted as the Federal Information Processing Standard 46 (FIPS-46) in 1977 and renamed the US Federal Data Encryption Standard (DES)1 (Dooley, 2018, p. 169). The DES became the most widely used computer encryption algorithm of the twentieth century, to be replaced more recently with the Advanced Encryption Standard (AES) in 2001 (Dooley, 2018, p. 167). Durin...
Table of contents
Cover
Half Title Page
Series Page
Title Page
Copyright Page
Table of Contents
List of illustrations
List of contributors
Series Preface: Algorithms and Society
Volume introduction
Acknowledgment
1 Distributing Journalism: Digital Disclosure, Secrecy, and Crypto-Cultures
2 Centering Race in Analyses and Practices of Countersurveillance Advocacy: Mythologies of the Racialized Other in the Crypto Wars
3 Data Privacy in Digital Advertising: Towards a Post-Third-Party Cookie Era
4 Smartphones, APIs & GNSS (Not GPS) Location Data