1-20 of 22 Search Results for

encryption

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
Social Text (2018) 36 (1 (134)): 81–89.
Published: 01 March 2018
...After Globalism Writing Group This section examines how we recount our lives, particularly those lost and forgotten in history. Oftentimes, the one who recounts is expected to do so with clarity and truthfulness. We turn here to other acts of recollection that involve amnesia and encryption...
FIGURES
Journal Article
Social Text (2016) 34 (3 (128)): 137–152.
Published: 01 September 2016
... of the father and its necessary repression of desire in modern, cinematic capitalism. Norman is an algorithmic encryption of the law placed under duress by cine-mediated scopophilia and the mobilization of desire beyond the capacities of the symbolic order to contain it. What would Norman’s name...
Journal Article
Social Text (2018) 36 (1 (134)): 15–23.
Published: 01 March 2018
... of religious encryption matters in the here and now. What is a planetary framework of futurity not predicated upon the reduction of life? A planet based on liquid swirls with the particular molecular structure that sustains us. Nowadays, the architecture of the Durham Cathedral signifies in broader...
Journal Article
Social Text (2004) 22 (3 (80)): 51–73.
Published: 01 September 2004
... Communication beyond Meaning 55 (telegraphy, telephony, radio, and television) and its military applications (command and control systems and encryption).8 Yet information theory also had larger implications for our...
Journal Article
Social Text (2018) 36 (1 (134)): 45–54.
Published: 01 March 2018
... systems. It’s all of social relations — the sordid history of “the human” — that has been encrypted into the machine architecture at the level of the code. All those punch cards perfected in the management of the colonial census and genocide. These relations go back to the women who were computers...
FIGURES
Journal Article
Social Text (2017) 35 (4): 113–152.
Published: 01 December 2017
..., stone-floored, Aga-heated, shabby coziness of the domestic settings and the apparatuses not only of cyberdissidence but also of sovereign control and surveillance distributed throughout: mountains of USB sticks and burner mobile phones; a painfully slow, encrypted Internet connection, sticker-covered...
FIGURES | View All (15)
Journal Article
Social Text (2009) 27 (3 (100)): 219–222.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2009) 27 (3 (100)): 223–229.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 230.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 231–241.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 242–245.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2009) 27 (3 (100)): 247–250.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2009) 27 (3 (100)): 251–256.
Published: 01 September 2009
... and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body of the nation-state citizen, rendering it both mutable and a hostage. Mam- dani posed a structuring enemy as an in situ yet disavowed parasitical core of state reproduction...
Journal Article
Social Text (2009) 27 (3 (100)): 257–262.
Published: 01 September 2009
... and the subsequent hegemonic expansion of the war on terror, this model mutates into a distinction between the citizen as a fully present, frequently biopo- liticized subject and the dangerous encrypted and collectivized body of the infiltrating minoritized sleeper or mole who infests the host body...
Journal Article
Social Text (2022) 40 (1 (150)): 135–155.
Published: 01 March 2022
... and security during preparations, using code names, encrypted communication, and technology-free in-person meetings. This implied a careful navigation of the complex balance between agility and safety. As the date approached, the European network of allies cooperated in the organization of meetings...
Journal Article
Social Text (2010) 28 (1 (102)): 35–58.
Published: 01 March 2010
...- ter, director of “Project X” — in which vocoder technology was used for speech encryption — also coordinated a wartime cryptanalysis project. His team built the sound spectrograph as the vocoder’s twin, a code- breaker. When Potter introduced the sound spectrograph to readers...
Journal Article
Social Text (2016) 34 (2 (127)): 21–44.
Published: 01 June 2016
... that are amortized and thus encrypted in the abstractions that they dialectically engender. 39 With Robinson, and with work devoted to marshaling the currently untranscendable horizon of race against the failings endemic to those who would leave racialism as is or ignore it completely, we can begin to sense...
FIGURES
Journal Article
Social Text (2013) 31 (4 (117)): 25–47.
Published: 01 December 2013
...”: the accumulation of cultural leavings or the “polyvocal manifestations of the passage of people through time and space.”19 Indeed, there are unnamed yet powerfully present absences encrypted in the structures inherited from the Marcos regime.20...
Journal Article
Social Text (2010) 28 (4 (105)): 65–89.
Published: 01 December 2010
... alone defeat. As Siva Vaidhyanathan notes, “The rhetorical value of alleging a ‘network’ at the heart of a threat to security or identity is clear: It’s impossible to tell when a war against a network is over because it can’t be seen. A network can be dispersed, distributed, encrypted...
Journal Article
Social Text (2023) 41 (2 (155)): 45–73.
Published: 01 June 2023
... (or at least encrypting) an older language of blood and soil based in a sense of endangered social solidarity, derivative fascisms address deracinated and isolated financialized subjects, habituated to participate by and in derivative sociality. With this in mind, and in light of the discussion...