Tag Archives: law enforcement

Article: “The Militarization of Language: Cryptographic Politics and the War of All against All”

boundary 2 cover

I have an article in the latest boundary 2 titled “The Militarization of Language: Cryptographic Politics and the War of All against All.” It is my most sustained attempt to locate and critique a political philosophy in the discourse of encryption advocates, a project I’ve addressed as well in pieces like “Code Is Not Speech” […]

Posted in "hacking", cyberlibertarianism, privacy, rhetoric of computation, surveillance | Also tagged , , , , , , , , , , | Leave a comment

Are “Backdoors” Real or Virtual? The Logical Flaw in #AppleVsFBI

Apple Vs FBI protest

I’ve been working for quite a while on a longer piece about the argument that “backdoors make us less secure,” an article of faith among cryptographers, hackers and computer scientists that is adhered to with such condescension, vehemence (and at times, venom) that I can’t help but want to subject it to the closest scrutiny […]

Posted in "hacking", cyberlibertarianism, surveillance | Also tagged , , , , , , , , , | 1 Response

Encryption and Responsibility: A Note on Symphony

Typically, those of us concerned about the widespread use of encryption and anonymization technologies like Tor are depicted by crypto advocates as “anti-encryption” or “freedom haters” or “mind-murdering censors” or worse. Despite the level of detail these people can bring to technological matters, they often portray the political options as very stark: either “encryption” or […]

Posted in cyberlibertarianism, materality of computation, privacy, surveillance | Also tagged , , , , , , , , , , , , , , | 1 Response

More Harassment of Computing Heroes

I almost can’t believe I’m reading this. Superhero outfit LulzSec is being arrested and detained and investigated by everyone from the FBI to Scotland Yard to Interpol. It’s a complete outrage, as all good humanities scholars working in New Media know. LulzSec is only trying to do good for society. Their political program is one […]

Posted in "hacking", rhetoric of computation | Also tagged , , , , | Leave a comment