{"version":"1.0","provider_name":"HIIG","provider_url":"https:\/\/www.hiig.de\/en\/","title":"Narrative der digitalen \u00dcberwachung &#8211; HIIG","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jBJAOfmSY3\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/narrative-der-digitalen-ueberwachung\/\">Narrative der digitalen \u00dcberwachung<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.hiig.de\/en\/publication\/narrative-der-digitalen-ueberwachung\/embed\/#?secret=jBJAOfmSY3\" width=\"600\" height=\"338\" title=\"&#8220;Narrative der digitalen \u00dcberwachung&#8221; &#8212; HIIG\" data-secret=\"jBJAOfmSY3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.hiig.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Surveillance protects us \u2013 surveillance controls us: Whether we regard surveillance technologies and practices as either a safeguard of or a threat to individual freedoms and liberal societies is heavily shaped by long-standing and powerful narratives. This is particularly the case for digital technologies, as the value-laden expectations that are projected onto them combine modernist and Enlightenment ideas with traditional Judeo-Christian motifs. As will be argued, they form the foundation for political, journalistic and scientific discourses interpreting digital surveillance as objective and omniscient, capable of laying bare the truth about the individual self, offering God-like providence, an omnipotent, even manipulative force."}