The third industiral revolution. Life as a product.

Many years ago, the German philosopher Günther Anders already described the historical situation in which the homo creator and homo materia coincide as the "third industrial revolution". Anders, who spent many years exiled in the USA after fleeing from the Nazis, made issue of the ambivalence of modern science and technology as early as in the 1950s, and many of the concerns which today form part of the debates around the implications of computer technology are already polemically discussed in his work.

The "third industrial revolution" is characterized by men becoming the "raw material" of their own industries. Product and producer, production and consumption, technology and nature are no longer meaningful pairs of opposites. The third is also the last revolution, as it is difficult to think of further revolutions when the distinction between subject and object becomes blurred. The world is becoming a Bestand and the human body and mind are no protected zones. They are something like the last safety zone of human being which is now itself becoming a basis for technological innovation. When the subject is weakened by its technical environment, the use of technical crooks for body and mind becomes an obvious "solution", even if the technically strengthened subject is strengthened at the cost of no longer being a "subject" in the traditional, metaphysical sense. Biological processes are dissected and subjected to technical control. This technical control is technical in two senses: it is not only control through technology but by ttechnology itsself, since it is not carried out by unaided human minds, but increasingly by intelligent machines.

The point where this Andersian third industrial revolution reaches an unprecedented logic seems to lie within the realm of genetic engeneering. This example shows that the dissection of humanness - the decoding of genetic information - is tantamount to commodification. The purpose of the commercial genetic research projects is the use of genetic information as a resource for the development of new products, e.g. in pharmaceutics. Genetic products carry the promise of offering a solution to so-far uncurable diseases such as cancer, Alzeheimer, heart disorders, schizophrenia, and others, but they also open up the possibility of "breaking the chains of evolution", of actively manipulating the genetic structure of human beings and of "designing" healthy, long-living, beautiful, hard-working etc. beings. Here, the homo creator and the homo materia finally become indistinguishable and we are being to merge with our products in such a way that it "we" loses the remains of its meaning.

Since 1990 research on human genetics is organised in the Human Genome Project where universities from various countries cooperate in transcribing the entire genetic information of the predecessor of the homo sapiens , composed of 80,000 genes and more than 3 billion DNA sequences. The objective of the project is to complet the transcription process by the year 2003. One of the rationales of organising Genome research in an international fashion has been its extremely high cost, and also an ethical consideration, according to which human genetic information must not be a private property, which would be the case when genetic information becomes patentised.

But exactly this patentising is of paramount importance in the emerging "post-industrial" society where knowledge becomes the most important resource. A patent is nothing else than a property title to a piece of "know-how", and an necessary consequence commodification. When life no longer simply a natural creation but a product, it, too, will be patented and becomes a commodity.

Against the idea of the human genome as a public good, or an "open source", there is a growing competion on the part of private industry. Companies such as Celera deloped deciphering technologies which may allow an earlier completion of the project. In the case that human genetic information actually becomes patentised, then the technical possibility of interfering in human evolution would at leasst be partly in the hands of private business. What has been called a "quintessentially public resource" Iceland. In this nordic country, the government decided to allow the American genetics company DeCode to access and commercially exploit the anonymised genetic information of the entire population of Iceland. The Icelandic population provides a particularly good "sample" for research, because there has been almost no immigration since the times of the Vikings, and therefore genetic variations can be more easily detected than in populations with a more diverse genome. Also, Iceland possesses a wealth of genealogical information - many families are able to trace their origins back to the 12th century. Here modern science has found optimal laboratory conditions. Perhaps, had European history taken a different course in the 1930s and 40s, the frontier of commercial gentetic research would have found optimal conditions in an "ethnically clean" centre of Euorpe? The requirement of "purity", of "eliminating" difference prior to constructing knowledge, inscribed in the modern science since its beginnings, also applies to genome research. Except that in this kind of research humankind itself needs to fulfill laboratory standards of cleanliness, and that the biological transcription of humanness, the biological "nucleus" of the species, becomes the object of research, much like the nucleus of matter, the atom, in the 1940s and 50s.

But the commodification of life is not limited ot the human species. Genetically altered animals and plants are also suffering the same fate, and in most industrialised nations it is now possible to patent genetically engeneered species and crops. The promises of the "Green Revolution" of the 1960s are now repeated in the genetic revolution. Genetic engeneering, so it is argued, will be able to breed animals and plants which resist disease and yield more "food" and will therfore help to tackle problems of undernutrition and starvation. Companies such as Monsanto are at the forefront of developing genetically altered ("enhanced") food crops and promise to solve not only the problem of world hunger, but to improve the safety and even the taste of food. Convinced of the opposite of such high-flown promises, Vandana Shiva from the Indian Research Foundation for Science, Technology and Ecology emphasises the relationship between post-colonial style exploitation of so-called "third world" countries. She also stresses the adverse ecological impact of biotechnology: "Today, the world is on the brink of a biological diversity crisis. The constantly diminishing store of biodiversity on our planet poses an enormous environmental threat"http://www.cnn.com/bioethics/9902/iceland.dna/template.html, 22 February 1999

http://www.indiaserver.com/betas/vshiva/title.htm, 9 February 2000

TEXTBLOCK 1/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658827
 
Sponsorship Models

With new sponsorship models being developed, even further influence over content from the corporate side can be expected. Co-operating with Barnes & Nobel Booksellers, the bookish e-zine FEED for instance is in part relying on sponsoring. Whenever a specific title is mentioned in the editorial, a link is placed in the margin - under the heading "Commerce" - to an appropriate page on Barnes & Noble. Steve Johnson, editor of FEED, says "We do not take a cut of any merchandise sold through those links.", but admits that the e-zine does indirectly profit from putting those links there.

TEXTBLOCK 2/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658034
 
Pressures and Attacks against Independent Content Providers: Serbia

The independent Belgrade based FM radio-station B2-92, which from December 1996 on also broadcasts over the Internet, repeatedly has been the target of suppression and attacks by the Serbian government.

B2-92 offices have been raided on numerous occasions and members of staff have been repeatedly harassed or arrested. In March 1999 the transmitter of radio B2-92 was confiscated yet again by the Serbian authorities and editor-in-chief, Veran Matic, was taken and held in custody at a police station. Ten days after the confiscation of B2-92's transmitter, Serbian police entered and sealed their offices. All members of staff were sent home and a new General Manager was appointed by Serbian officials. Although by closing B2-92, the Serbian regime may have succeeded in softening the voice of the independent content provider, with the distributive nature of the Internet and the international help of media activists, the regime will have little chance of silencing the entire flood of independent content coming out of former Yugoslavia.

TEXTBLOCK 3/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659225
 
On-line Advertising and the Internet Content Industry

Applied to on-line content the advertising model leads to similar problems like in the traditional media. Dependence on advertising revenue puts pressure on content providers to consider advertising interests. Nevertheless new difficulties caused by the technical structure of online media, missing legal regulation and not yet established ethical rules, appear.

TEXTBLOCK 4/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658181
 
FREEnet (The Network for Research, Education and Engineering)

FREEnet is an academic and research network, interconnecting computer networks of research institutes of the Russian Academy of Sciences, universities, colleges, and other research and academic institutions. It was established in 1991 by the N.D. Zelinsky Institute of Organic Chemistry at the Center of Computer Assistance to Chemical Research. It provides its more than 350 members of the academic and educational community with all types of basic Internet services and various information services.

Strategies and Policies

FREEnets general intention is to become a backbone infrastructure providing:

Open networking services for efficient access to the network and information resources located both in Russia and all over the Internet.

Reliable network connectivity for research, academic and educational communities in Russia and abroad.

Worldwide access to science and information resources of the Russian Academy of Sciences, universities and colleges in Russia.

Assistance to the progress of Russian based fundamental research.

Assistance to the development and application of modern information technologies in education.

TEXTBLOCK 5/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659253
 
Virtual cartels; mergers

In parallel to the deregulation of markets, there has been a trend towards large-scale mergers which ridicules dreams of increased competition.

Recent mega-mergers and acquisitions include

SBC Communications - Ameritech, $ 72,3 bn

Bell Atlantic - GTE, $ 71,3

AT&T - Media One, $ 63,1

AOL - Time Warner, $ 165 bn

MCI Worldcom - Spring, $ 129 bn

The total value of all major mergers since the beginnings of the 1990s has been 20 trillion Dollars, 2,5 times the size of the USA's GIP.

The AOL- Time Warner reflects a trend which can be observed everywhere: the convergence of the ICT and the content industries. This represents the ultimate advance in complete market domination, and a alarming threat to independent content.

"Is TIME going to write something negative about AOL? Will AOL be able to offer anything other than CNN sources? Is the Net becoming as silly and unbearable as television?"

(Detlev Borchers, journalist)

TEXTBLOCK 6/27 // URL: http://world-information.org/wio/infostructure/100437611709/100438658959
 
The Role of the Media

To be able to participate in community life and make political choices citizens heavily rely on information. They need to know what is going on and the options that they should weigh, debate and act upon. An essential element for a functioning public sphere therefore is information.

Whereas formerly communication mostly happened on a face-to-face basis in large and complex societies (mass) media have evolved as the principal source of information. They act as a transport medium for the information necessary for a citizen's participation in the public sphere. Ideally there should be a wide range of media, that represent the diverse opinions and viewpoints on issues of public interest existent in a society and which are independent of the state and society's dominant economic forces.

TEXTBLOCK 7/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438658499
 
The Advertising Industry

The advertising industry is dominated by three huge advertising networks, which offer their services throughout the world. Gross income of the three leading agencies is twice as much, as the one of places four to ten.

Table: World's Top 10 Advertising Organizations 1999

(figures in millions of U.S. dollars)

Rank 1999

Advertising Organization

Headquarters

World-Wide Gross Income 1999

1

Omnicom

New York, USA

$ 5,743.4

2

Interpublic Group of Cos.

New York, USA

$ 5,079.3

3

WPP Group

London, UK

$ 4,819.3

4

Havas Advertising

Levallois-Perret, France

$ 2,385.1

5

Dentsu

Tokyo, Japan

$ 2,106.8

6

B Com3 Group

Chicago, USA

$ 1,933.8

7

Young & Rubicam Inc.

New York, USA

$ 1,870.1

8

Grey Advertising

New York, USA

$ 1,577.9

9

True North

Chicago, USA

$ 1,489.2

10

Publicis SA

Paris, France

$ 1,434.6



Table: Top 10 Global Marketers 1998

(figures in millions of U.S. dollars)

Rank 1998

Advertiser

Headquarters

World-Wide Media Spending 1998

1

Procter & Gamble Co.

Cincinnati (US)

$ 4,747.6

2

Unilever

Rotterdam (NL)/London (UK)

$ 3,428.5

3

General Motors Corp.

Detroit (US)

$ 3,193.5

4

Ford Motor Co.

Darborn (US)

$ 2,229.5

5

Philip Morris Cos.

New York

$ 1,980.3

6

Daimler Chrysler

Stuttgart (GER)/Auburn Hills (US

$ 1,922.2

7

Nestle

Vevey (SUI)

$ 1,833.0

8

Toyota Motor Corp.

Toyota City (JP)

$ 1,692.4

9

Sony Corp.

Tokyo (JP)

$ 1,337.7

10

Coca-Cola Co.

Atlanta (US)

$ 1,327.3



On the other hand the three biggest advertisers only spend about US$ 2 millions less than places four to ten together. Whereas money spent on advertising in traditional media comes from very diverse categories, companies offering computer hard- and software, peripherals or Internet services mainly pay for on-line advertisements.

Table: Top 10 Internet Advertisers 1998

(figures in millions of U.S. dollars)

Rank 1998

Advertiser

Internet Spending 1998

1998 - 1997 % Change

1

Microsoft Corp.

$ 34.9

9.4

2

IBM Corp.

$ 28.5

58.6

3

Compaq Computer Corp.

$ 16.2

169.8

4

General Motors Corp.

$ 12.7

84.8

5

Excite

$ 12.4

1.5

6

Infoseek Corp.

$ 9.3

22.3

7

AT&T Corp.

$ 9.3

43.5

8

Ford Motor Co.

$ 8.6

46.7

9

Hewlett-Packard Co.

$ 8.1

102.9

10

Barnes & Noble

$ 7.6

280.2



Source: Advertising Age

TEXTBLOCK 8/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438657954
 
Commercial vs. Independent Content

Commercial media aim towards economies of scale and scope, with the goal to maximize profits. As advertising money usually is their primary source of revenue their content very often is attuned to meet the needs of advertisers and marketers. Information necessary for a citizen's participation in the public sphere usually only plays a minor role in their programming, as it does not comply with the demands of an economic system whose principal aim is the generation of profit. They also virtually always are structured in accord with and to help reinforce society's defining hierarchical social relationships, and are generally controlled by and controlling of other major social institutions, particularly corporations.

Independent content provider on the other hand mostly act on a non-profit basis and try to avoid dependence on corporate powers and the state. One of their main concerns is the critical observation of public interest issues. The central aim of independent content provider's activities usually is to bring aspects and standpoints neglected by the (commercial) mainstream media to the public and subvert society's defining hierarchical social relationships. Promoting public debate and an active civil society they engage in the organization of alert actions and information campaigns or create subversive art

TEXTBLOCK 9/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659280
 
Economic structure; digital euphoria

The dream of a conflict-free capitalism appeals to a diverse audience. No politician can win elections without eulogising the benefits of the information society and promising universal wealth through informatisation. "Europe must not lose track and should be able to make the step into the new knowledge and information society in the 21st century", said Tony Blair.

The US government has declared the construction of a fast information infrastructure network the centerpiece of its economic policies

In Lisbon the EU heads of state agreed to accelerate the informatisation of the European economies

The German Chancellor Schröder has requested the industry to create 20,000 new informatics jobs.

The World Bank understands information as the principal tool for third world development

Electronic classrooms and on-line learning schemes are seen as the ultimate advance in education by politicians and industry leaders alike.

But in the informatised economies, traditional exploitative practices are obscured by the glamour of new technologies. And the nearly universal acceptance of the ICT message has prepared the ground for a revival of 19th century "adapt-or-perish" ideology.

"There is nothing more relentlessly ideological than the apparently anti-ideological rhetoric of information technology"

(Arthur and Marilouise Kroker, media theorists)

TEXTBLOCK 10/27 // URL: http://world-information.org/wio/infostructure/100437611726/100438658999
 
ZaMir.net

ZaMir.net started in 1992 trying to enable anti-war and human rights groups of former Yugoslavia to communicate with each other and co-ordinate their activities. Today there are an estimated 1,700 users in 5 different Bulletin Board Systems (Zagreb, Belgrade, Ljubljana, Sarajevo and Pristiana). Za-mir Transnational Network (ZTN) offers e-mail and conferences/newsgroups. The ZTN has its own conferences, which are exchanged between the 5 BBS, and additionally offers more than 150 international conferences. ZTN aim is to help set up systems in other cities in the post-Yugoslav countries that have difficulty connecting to the rest of the world.

History

With the war in Yugoslavia anti-war and human rights groups of former Yugoslavia found it very difficult to organize and met huge problems to co-ordinate their activities due to immense communication difficulties. So in 1992 foreign peace groups together with Institutions in Ljubljana, Zagreb and Belgrade launched the Communications Aid project. Modems were distributed to peace and anti-war groups in Ljubljana, Zagreb, Belgrade and Sarajevo and a BBS (Bulletin Board System) installed.

As after spring 1992 no directs connections could be made they were done indirectly through Austria, Germany or Britain, which also enabled a connection with the worldwide networks of BBS's. Nationalist dictators therefore lost their power to prevent communication of their people. BBS were installed in Zagreb and Belgrade and connected to the APC Network and associated networks. Za-mir Transnational Network (ZTN) was born.

Strategies and Policies

With the help of ZaMir's e-mail network it have been possible to find and coordinate humanitarian aid for some of the many refugees of the war. It has become an important means of communication for humanitarian organizations working in the war region and sister organizations form other countries. It helps co-ordinate work of activists form different countries of former Yugoslavia, and it also helps to coordinate the search for volunteers to aid in war reconstruction. ZTN also helped facilitate exchange of information undistorted by government propaganda between Croatia, Serbia and Bosnia. Independent magazines like Arkzin (Croatia) and Vreme (Serbia) now publish electronic editions on ZTN.

TEXTBLOCK 11/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659208
 
c2o (Community Communications Online)

c2o, founded in 1997, provides consultancy, training and web hosting services to community-based organizations in the Australasian region. c2o's focus lies on addressing the issues and needs that have arisen from the transition from connectivity to information management.

Strategies and Policies

Content and Delivery: c2o focuses on the development and maintenance of content delivery services that assist in the publication and dissemination of information, particularly that of community interest including environment, social development, human rights and social justice.

Publishing Support: c2o designs online publishing systems that provide a means for user maintenance and tools that enhance an organizations existing information systems. c2o seeks seamless integration and user empowerment.

Asia-Pacific Networking: c2o supports networking initiatives throughout Australia and the Asia Pacific region. It promotes and encourages public and equitable access to networking technologies.

TEXTBLOCK 12/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659247
 
Anonymity

"Freedom of anonymous speech is an essential component of free speech."

Ian Goldberg/David Wagner, TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web, in: First Monday 3,4, 1999

Someone wants to hide one's identity, to remain anonymous, if s/he fears to be holding accountable for something, say, a publication, that is considered to be prohibited. Anonymous publishing has a long tradition in European history. Writers of erotic literature or pamphlets, e. g., preferred to use pseudonyms or publish anonymously. During the Enlightenment books as d'Alembert's and Diderot's famous Encyclopaedia were printed and distributed secretly. Today Book Locker, a company selling electronic books, renews this tradition by allowing to post writings anonymously, to publish without the threat of being perishing for it. Sometimes anonymity is a precondition for reporting human rights abuses. For example, investigative journalists and regime critics may rely on anonymity. But we do not have to look that far; even you might need or use anonymity sometimes, say, when you are a woman wanting to avoid sexual harassment in chat rooms.

The original design of the Net, as far as it is preserved, offers a relatively high degree of privacy, because due to the client-server model all what is known about you is a report of the machine from which information was, respectively is requested. But this design of the Net interferes with the wish of corporations to know you, even to know more about you than you want them to know. What is euphemistically called customer relationship management systems means the collection, compilation and analysis of personal information about you by others.

In 1997 America Online member Timothy McVeigh, a Navy employee, made his homosexuality publicly known in a short autobiographical sketch. Another Navy employee reading this sketch informed the Navy. America Online revealed McVeigh's identity to the Navy, who discharged McVeigh. As the consequence of a court ruling on that case, Timothy McVeigh was allowed to return to the Navy. Sometimes anonymity really matters.

On the Net you still have several possibilities to remain anonymous. You may visit web sites via an anonymizing service. You might use a Web mail account (given the personal information given to the web mail service provider is not true) or you might use an anonymous remailing service which strips off the headers of your mail to make it impossible to identify the sender and forward your message. Used in combination with encryption tools and technologies like FreeHaven or Publius anonymous messaging services provide a powerful tool for countering censorship.

In Germany, in 1515, printers had to swear not to print or distribute any publication bypassing the councilmen. Today repressive regimes, such as China and Burma, and democratic governments, such as the France and Great Britain, alike impose or already have imposed laws against anonymous publishing on the Net.

Anonymity might be used for abuses, that is true, but "the burden of proof rests with those who would seek to limit it. (Rob Kling, Ya-ching Lee, Al Teich, Mark S. Frankel, Assessing Anonymous Communication on the Internet: Policy Deliberations, in: The Information Society, 1999).

TEXTBLOCK 13/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438659040
 
Governmental Regulations

The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit DES and similar products are allowed after a technical review, just like encryption commodities and software with key lengths of 64-bits or less which meet the mass market requirements.
For more information see:
http://www.wassenaar.org/

Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries.

This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently.

For more information on this see:
http://www.heise.de/ct/97/04/032/
http://www.fitug.de/ulf/krypto/verbot.html#welt

Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom.
The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily.

"Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible."
(Arnold G. Reinhold)


The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the PGP, stay under governmental control.

The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably?
Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands.
What about civil rights or Human Rights?

TEXTBLOCK 14/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438659135
 
Beautiful bodies

However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". Nadia Thalman's hopes for beautiful robots may become reality in the work of MIRALab, a research laboratory attached to the University of Geneva dedicated to realistic modelling of human functionalities. The laboratory has produced an artificial Marylyn Monroe showing just how beautiful artificial creatures can be, and there is a biography featuring details of her career and her - however virtual - love life. Yet beautiful creatures have been made before, at leas on the movie screen. Frank-N-furter, the protagonist of the Rocky Horror picture show ("I've been making a man / with blond hair and a tan / and he is good for relieving my /tension) did set remakrable esthetic standards.

While in Hindu mythology, avatars are bodies chosen by gods for their representation on earth, often animals such as swans or horses, the avatars populating cyberspace have a different function. The cyber bodies of real people, often 3 dimensional images of creatures whose aesthetics reflects both the tastes prevalent in the entertainment and advertising industries as the state of art in visual representation.

TEXTBLOCK 15/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658861
 
biotechnology introduction



One of the most critical trends in the western culture what might be called the "fusion of flesh and machine". Increasingly, technological artifacts such as computers, rather than being used as tools by people, are functioning as parts of the human organism. On the other hand, human functionalities such as intelligence, emotion, adaptability or reproductivity are integrated into technological artifacts: the days when computers where only able to count apples and pears and their intelligence was not even matching an insect's are rapidly becoming history. Today, the boundaries between organisms and technology are losing their significance.

As new technologies are no longer mere instruments, or "extensions" of the organism, they acquire the capability of modifying the human organism - body and mind - from within according to certain pre-established principles. The history of the evolution of the human species is hastily being re-written as artificial beings begin to mock the categories of evolution and seem to work their way towards historical subjectivity. The German philosopher Günther Anders has extensively reflected on the changes of the human condition provoked by the development of modern technology speaks of an "antiquatedness of history" at a time when technology itself becomes a historical subject and men are becoming co-historical.

However, the softening of the biological definition of the human race is a theme which has accompanied western thinking ever since its origins. Beings half man-half animal crowd the tales of classical mythology and transcend the boundary between the human from below, while divine creatures, temporarily occupying humanoid bodies, relativise humanness form "above". What exactly "being human" meant and who "human beings" could be "defined" is a question with a long history. "Der Mensch ist das nicht festgestellte Thier" as Nietzsche commented.

Just as the boundaries between human and non-human are being crossed by technological development, so also the boundaries between the classical episteme are becoming permeable. Psychology is occupying itself with the emotions of machines, while physics and cybernetics is applied to the human mind and body. The "nicht festgestellte "character of humanness has meant that imagination has become just as relevant a factor in understanding humanness as science. Science fiction as a literary genre is no longer merely a depository of phantasies about a technisised world our of control. As the human monopoly on history seems to dissolve, the baroque narratives of science fiction have also become a resource for understanding history.

However, it is evident that the potentials of the new technologies gives rise not only to wild hopes and dreams and to bizarre stories; they also harbour some real ambiguities of a political and ethical nature. Not only does the merging of previously distinct realities - the human and the non-human worlds - unhinge theories and institutions based upon a clear distinction and separation of the two, it also is placing political practice on a different footing. Will artificial life have rights? Will artificial entities have political power? How will social relationships change?

TEXTBLOCK 16/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658433
 
The Cassini Case

In 1997 NASA's Cassini mission to Saturn and its moons led to heated controversies, because it was fueled by plutonium, a substance that could cause serious environmental and health problems if it were released into the atmosphere.

Still no major U.S. news outlet in broadcasting or print reported in depth on the risks of the Cassini mission. Westinghouse-owned media like CBS and NBC (also partly owned by General Electric) for example had only reported that children were invited to sign a plaque inside Cassini. Not surprisingly Westinghouse and General Electric are two of the largest corporations with defense contracts and nuclear interests.

TEXTBLOCK 17/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438658562
 
Eliminating online censorship: Freenet, Free Haven and Publius

Protecting speech on the global data networks attracts an increasing attention. The efforts and the corresponding abilities of governmental authorities, corporations and copyright enforcement agencies are countered by similar efforts and abilities of researchers and engineers to provide means for anonymous and uncensored communication, as Freenet, Free Haven and Publius. All three of them show a similar design. Content is split up and spread on several servers. When a file is requested, the pieces are reassembled. This design makes it difficult to censor content. All of these systems are not commercial products.

The most advanced system seems to be Publius. Because of being designed by researchers and engineers at the prestigious AT&T Labs, Publius is a strong statement against online censorship. No longer can it be said that taking a firm stand against the use of technologies limiting the freedom of individuals is a position of radical leftists only.

For more information on Publius, see John Schwartz, Online and Unidentifiable? in: The Washington Post, June 30, 2000, http://www.washingtonpost.com/wp-dyn/articles/A21689-2000Jun29.html .

Freenet web site: http://freenet.sourceforge.net

Free Haven web site: http://www.freehaven.net

Publius web site: http://www.cs.nyu.edu/waldman/publius

TEXTBLOCK 18/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438658749
 
Individualized Audience Targeting

New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like Amazon.Com have already started to exploit individualized audience targeting for their purposes.

TEXTBLOCK 19/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658450
 
Cryptography's Terms and background

"All nature is merely a cipher and a secret writing."
Blaise de Vigenère

In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security.
Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work.
The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected.
We want to communicate with everybody - but do not want anybody to know.

Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well.
With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers.
While the potential of global information is regarded as endless, it is those elements that reduce it.

There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data.

During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics.

"Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw)

For an introduction into cryptography and the mathematical tasks see:
http://www.sbox.tu-graz.ac.at/home/j/jonny/projects/crypto/index.htm
http://www.ccc.de/CCC-CA/policy.html

TEXTBLOCK 20/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438658895
 
Steganography

Ciphers as well as codes are transmitted openly. Everyone can see that they exist. Not so with steganograms.
Steganography is the art and science of communicating in a way which hides the existence of the secret part in that communication. During the Italian Renaissance and the time of the Elizabethan Age in England cryptography was very popular, for political reasons as well as for amusements (see John Dee).
In literature steganography played an important role. Many steganographs of that period have only been deciphered recently like some of the Shakespearean sonnets, which now seem to proof that the actor William Shakespeare was not the author of the famous poems and dramas, but that the latter' name was, and Francis Bacon, or even Francis Tudor, as some ciphers and other sources talk of him as Queen Elisabeth I.'s secret son.

for further details see:
http://home.att.net/~tleary/
http://www.thur.de/ulf/stegano/
http://www2.prestel.co.uk/littleton/gm2_rw.htm

One kind of steganogram is digital watermarking:
Watermarks protect digital images, videos, but also audio and multimedia products. They are made out of digital signals, put into other digital signals. They try to be invisible on first sight and should be nearly impossible to remove. The process of producing watermarks is to overlay some sort of identifying image over the original image (non-digital watermarks, like on money can be seen by holding the paper against light). Copying the image destroys the watermark, which cannot be copied. Any alteration of the original destroys the watermark, too.

Watermarking is one of the typical inventions of cryptography to assist the biggest content owners, but advertised as something necessary and helpful for everybody. Who in fact gets any advantage out of watermarking? The private user most of the time will not really need it except for small entities of pictures maybe.
But the big enterprises do. There is a tendency to watermark more and more information in the Internet, which until now was considered as free and as a cheap method to receive information. Watermarking could stop this democratic development.

for further information see:
http://www.isse.gmu.edu/~njohnson/Steganography

TEXTBLOCK 21/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438659021
 
The Privatization of Censorship

According to a still widely held conviction, the global data networks constitute the long desired arena for uncensorable expression. This much is true: Because of the Net it has become increasingly difficult to sustain cultural and legal standards. Geographical proximity and territorial boundaries prove to be less relevant, when it does not affect a document's availability if it is stored on your desktop or on a host some thousand kilometers away. There is no international agreement on non-prohibited contents, so human rights organizations and nazi groups alike can bypass restrictions. No single authority or organization can impose its rules and standards on all others. This is why the Net is public space, a political arena where free expression is possible.

This freedom is conditioned by the design of the Net. But the Net's design is not a given, as Lawrence Lessig reminds us. Originally the design of the Net allowed a relatively high degree of privacy and communication was not controlled directly. But now this design is changing and this invisible agora in electronic space is endangered. Governments - even elected ones - and corporations introduce new technologies that allow us to be identified, monitored and tracked, that identify and block content, and that can allow our behaviour to be efficiently controlled.

When the World Wide Web was introduced, soon small independent media and human rights organizations began to use this platform for drawing worldwide attention to their publications and causes. It seemed to be the dawning of a new era with authoritarian regimes and multinational media corporations on the looser side. But now the Net's design is changing according to their needs.

"In every context that it can, the entertaining industry is trying to force the Internet into its own business model: the perfect control of content. From music (fighting MP3) and film (fighting the portability of DVD) to television, the industry is resisting the Net's original design. It was about the free flow of content; Hollywood wants perfect control instead" (Lawrence Lessig, Cyberspace Prosecutor, in: The Industry Standard, February 2000).

In the United States, Hollywood and AT&T, after its merger with MediaOne becoming the biggest US cable service provider, return to their prior positions in the Seventies: the control of content and infrastructure. If most people will access the Net via set up boxes connected to a TV set, it will become a kind of television, at least in the USA.

For small independent media it will become very hard to be heard, especially for those offering streaming video and music. Increasingly faster data transmissions just apply to download capacities; upload capacities are much - on the average about eight times - lower than download capacities. As an AT&T executive said in response to criticism: "We haven't built a 56 billion dollar cable network to have the blood sucked from our veins" (Lawrence Lessig, The Law in the Code: How the Net is Regulated, Lecture at the Institute for Human Sciences, Vienna, May 29th, 2000).

Consumers, not producers are preferred.

For corporations what remains to be done to control the Net is mainly to cope with the fact that because of the Net it has become increasingly difficult to sustain cultural and legal standards. On Nov 11, 1995 the German prosecuting attorney's office searched Compuserve Germany, the branch of an international Internet service provider, because the company was suspected of having offered access to child pornography. Consequently Compuserve blocked access to more than 200 newsgroups, all containing "sex" or "gay" in their names, for all its customers. But a few days later, an instruction for access to these blocked newsgroups via Compuserve came into circulation. On February 26, 1997, Felix Somm, the Chief Executive Officer of Compuserve Germany, was accused of complicity with the distribution of child and animal pornography in newsgroups. In May 1998 he received a prison sentence for two years. This sentence was suspended against a bail of about 51.000 Euro. The sentence was justified by pointing to the fact that Compuserve Germany offered access to its US parent company's servers hosting child pornography. Felix Somm was held responsible for access to forbidden content he could not know of. (For further information (in German) click here.)

Also in 1995, as an attack on US Vice-President Al Gore's intention to supply all public schools with Internet access, Republican Senator Charles Grassley warned of the lurking dangers for children on the Net. By referring to a Time magazine cover story by Philip Elmer-Dewitt from July 3 on pornography on the Net, he pointed out that 83,5% of all images online are pornographic. But Elmer-Dewitt was wrong. Obviously unaware of the difference between Bulletin Board Systems and the Net, he referred misleadingly to Marty Rimm's article Marketing Pornography on the Information Superhighway, published in the prestigious Georgetown Law Journal (vol. 83, June 1995, pp. 1849-1935). Rimm knew of this difference, of course, and stated it clearly. (For further information see Hoffman & Novak, The Cyberporn debate, http://ecommerce.vanderbilt.edu/cyberporn.debate.html and Franz Wegener, Cyberpornographie: Chronologie einer Hexenjagd; http://www.intro-online.de/c6.html)

Almost inevitably anxieties accompany the introduction of new technologies. In the 19th century it was said that traveling by train is bad for health. The debate produced by Time magazine's cover story and Senator Grassley's attack caused the impression that the Net has multiplied possible dangers for children. The global communication networks seem to be a inexhaustible source of mushrooming child pornography. Later would-be bomb recipes found on the Net added to already prevailing anxieties. As even in industrialized countries most people still have little or no first-hand experience with the Net, anxieties about child pornography or terrorist attacks can be stirred up and employed easily.

A similar and related debate is going on about the glorification of violence and erotic depictions in media. Pointing to a "toxic popular culture" shaped by media that "distort children's view of reality and even undermine their character growth", US right-wing social welfare organizations and think tanks call for strong media censorship. (See An Appeal to Hollywood, http://www.media-appeal.org/appeal.htm) Media, especially films and videos, are already censored and rated, so it is more censorship that is wanted.

The intentions for stimulating a debate on child pornography on the Net were manifold: Inter alia, it served the Republican Party to attack Democrat Al Gore's initiative to supply all public schools with Internet access; additionally, the big media corporations realized that because of the Net they might have to face new competitors and rushed to press for content regulation. Taking all these intentions together, we can say that this still ongoing debate constitutes the first and most well known attempt to impose content regulation on the Net. Consequently, at least in Western countries, governments and media corporations refer to child pornography for justifying legal requirement and the implementation of technologies for the surveillance and monitoring of individuals, the filtering, rating and blocking of content, and the prohibition of anonymous publishing on the Net.

In the name of "cleaning" the Net of child pornography, our basic rights are restricted. It is the insistence on unrestricted basic rights that needs to be justified, as it may seem.

Underlying the campaign to control the Net are several assumptions. Inter alia: The Net lacks control and needs to be made safe and secure; we may be exposed inadvertently to pornographic content; this content is harmful to children. Remarkably, racism seems to be not an issue.

The Net, especially the World Wide Web, is not like television (although it is to be feared this is what it might become like within the next years). Say, little Mary types "Barbie" in a search engine. Click here to see what happens. It is true, sometimes you might have the opportunity to see that pornography is just a few mouse clicks away, but it is not likely that you might be exposed to pornographic content unless you make deliberate mouse clicks.

In reaction to these anxieties, but in absence of data how children use the Internet, the US government released the Communications Decency Act (CDA) in 1996. In consequence the Electronic Frontier Foundation (EFF) launched the famous Blue Ribbon Campaign and, among others, America Online and Microsoft Corporation supported a lawsuit of the American Civil Liberties Union (ACLU) against this Act. On June 26, 1997, the US Supreme Court ruled the CDA as unconstitutional under the provisions of the First Amendment to the Constitution: The Communications Decency Act violated the basic right to free expression. After a summit with the US government industry leaders announced the using of existing rating and blocking systems and the development of new ones for "inappropriate" online resources.

So, after the failing of the CDA the US government has shifted its responsibility to the industry by inviting corporations to taking on governmental tasks. Bearing in the mind the CompuServe case and its possible consequences, the industry welcomed this decision and was quick to call this newly assumed responsibility "self-regulation". Strictly speaking, "self-regulation" as meant by the industry does not amount to the regulation of the behaviour of corporations by themselves. On the opposite, "self-regulation" is to be understood as the regulation of users' behaviour by the rating, filtering and blocking of Internet content considered being inappropriate. The Internet industry tries to show that technical solutions are more favourable than legislation und wants to be sure, not being held responsible and liable for illegal, offensive or harmful content. A new CompuServe case and a new Communications Decency Act shall be averted.

In the Memorandum Self-regulation of Internet Content released in late 1999 by the Bertelsmann Foundation it is recommended that the Internet industry joins forces with governmental institutions for enforcing codes of conduct and encouraging the implementation of filters and ratings systems. For further details on the Memorandum see the study by the Center for Democracy and Technology, An Analysis of the Bertelsmann Foundation Memorandum on Self-Regulation of Internet Content: Concerns from a User Empowerment Perspective.

In fact, the "self-regulation" of the Internet industry is privatized censorship performed by corporations and right-wing NGOs. Censorship has become a business. "Crucially, the lifting of restrictions on market competition hasn't advanced the cause of freedom of expression at all. On the contrary, the privatisation of cyberspace seems to be taking place alongside the introduction of heavy censorship." (Richard Barbrook and Andy Cameron, The Californian Ideology)

While trying to convince us that its technical solutions are appropriate alternatives to government regulation, the Internet industry cannot dispense of governmental backing to enforce the proposed measures. This adds to and enforces the censorship measures already undertaken by governments. We are encouraged to use today's information and communication technologies, while the flow of information is restricted.

According to a report by Reporters Sans Frontières, quoted by Leonard R. Sussman in his essay Censor Dot Gov. The Internet and Press Freedom 2000, the following countries totally or largely control Internet access: Azerbaijan, Belarus, Burma, China, Cuba, Iran, Iraq, Kazakhstan, Kirghizstan, Libya, North Korea, Saudi Arabia, Sierra Leone, Sudan, Syria, Tajikistan, Tunisia, Turkmenistan, Uzbekistan, and Vietnam.

TEXTBLOCK 22/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438658968
 
Advertising and the Content Industry - The Coca-Cola Case

Attempts to dictate their rules to the media has become a common practice among marketers and the advertising industry. Similar as in the Chrysler case, where the company demanded that magazines give advance notice about controversial articles, recent attempts to put pressure on content providers have been pursued by the Coca-Cola Company.

According to a memo published by the New York Post, Coca-Cola demands a free ad from any publication that publishes a Coke ad adjacent to stories on religion, politics, disease, sex, food, drugs, environmental issues, health, or stories that employ vulgar language. "Inappropriate editorial matter" will result in the publisher being liable for a "full make good," said the memo by Coke advertising agency McCann-Erickson. Asked about this practice, a Coke spokes person said the policy has long been in effect.

(Source: Odwyerpr.com: Coke Dictates nearby Editorial. http://www.odwyerpr.com)

TEXTBLOCK 23/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438657998
 
Timeline 1600 - 1900 AD

17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card

- Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians

- the English scientist, magician and astrologer John Dee works on the ancient Enochian alphabet; he also possesses an encrypted writing that could not been broken until today

1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally.

1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code

18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day.

1790's Thomas Jefferson and Robert Patterson invent a wheel cipher

1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs

1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844.

1834 the Braille Code for blind people is developed in today's form by Louis Braille

1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then

1854 the Playfair cipher is invented by Sir Charles Wheatstone

1859 for the first time a tomographic cipher gets described

1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages

1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army

1895 the invention of the radio changes cryptography-tasks again and makes them even more important

TEXTBLOCK 24/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438658974
 
Advertising

Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology.

TEXTBLOCK 25/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658361
 
Timeline 1900-1970 AD

1913 the wheel cipher gets re-invented as a strip

1917 William Frederick Friedman starts working as a cryptoanalyst at Riverbank Laboratories, which also works for the U.S. Government. Later he creates a school for military cryptoanalysis

- an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys

1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin

- Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected

1919 Hugo Alexander Koch invents a rotor cipher machine

1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded

1923 Arthur Scherbius founds an enterprise to construct and finally sell his Enigma machine for the German Military

late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly

1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts

1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939

1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of William Frederick Friedman. As the Japanese were unable to break the US codes, they imagined their own codes to be unbreakable as well - and were not careful enough.

1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett

- at the same time the British develop the Typex machine, similar to the German Enigma machine

1943 Colossus, a code breaking computer is put into action at Bletchley Park

1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type

1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems

1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ)

late 1960's the IBM Watson Research Lab develops the Lucifer cipher

1969 James Ellis develops a system of separate public-keys and private-keys

TEXTBLOCK 26/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438658921
 
On-line Advertising Revenues

Although Internet advertising only really started in 1994, revenues showed a steady and fast growth. In 1997 US$ 906.5 million were spent on on-line advertising. Compared with advertising revenue for the television industry in equivalent dollars for its third year, the Internet was slightly ahead, at US$ 907 million compared to television's US$ 834 million. 1998 on-line advertising grew by 112 percent to US$ 1.92 billion in revenues, and is on track to hit US$ 4 billion in 1999, which would put Internet advertising at about 2 percent of the U.S. ad market.

Table: Spending on On-Line Advertising by Category

(first quarter 1999)

Category

Percent

Consumer-related

27 %

Financial services

21 %

Computing

20 %

Retail/mail order

13 %

New media

8 %



Table: Types of On-Line Advertising

(first quarter 1999)

Type of Advertising

Percent

Banners

58 %

Sponsorships

29 %

Interstitials

6 %

E-mail

1 %

Others

6 %



Source: Internet Advertising Bureau (IAB).

TEXTBLOCK 27/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438657944
 
Telephone

The telephone was not invented by Alexander Graham Bell, as is widely held to be true, but by Philipp Reiss, a German teacher. When he demonstrated his invention to important German professors in 1861, it was not enthusiastically greeted. Because of this dismissal, no financial support for further development was provided to him.

And here Bell comes in: In 1876 he successfully filed a patent for the telephone. Soon afterwards he established the first telephone company.

INDEXCARD, 1/50
 
William Frederick Friedman

Friedman is considered the father of U.S.-American cryptoanalysis - he also was the one to start using this term.

INDEXCARD, 2/50
 
Braille

Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris.

INDEXCARD, 3/50
 
Next Generation Internet Program

A research and development program funded by the US government. Goal is the development of advanced networking technologies and applications requiring advanced networking with capabilities that are 100 to 1,000 times faster end-to-end than today's Internet.

http://www.ngi.gov

INDEXCARD, 4/50
 
Java Applets

Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Sun Microsystems, Inc.

Source: Whatis.com

INDEXCARD, 5/50
 
Jürgen Habermas

Jürgen Habermas (b. 1929) is the leading scholar of the second generation of the Frankfurt School, a group of philosophers, cultural critics and social scientists associated with the Institute for Social Research, founded in Frankfurt in 1929. The Frankfurt School is best known for its program of developing a "critical theory of society". Habermas was a student of Adorno, becoming his assistant in 1956. He first taught philosophy at Heidelberg before becoming a professor of philosophy and sociology at the University of Frankfurt. In 1972, he moved to the Max-Planck Institute in Starnberg, but in the mid-1980s, he returned to his post at Frankfurt.

INDEXCARD, 6/50
 
codes

an algorithm for bringing a legible message into an illegible form. There has to exist some sort of code book to encode/decode it.

INDEXCARD, 7/50
 
Artificial Intelligence

Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support decision taking in highly complex environments.
Yahoo AI sites: http://dir.yahoo.com/Science/Computer_Science/Artificial_Intelligence/
MIT AI lab: http://www.ai.mit.edu/


http://dir.yahoo.com/Science/Computer_Science...
http://www.ai.mit.edu/
INDEXCARD, 8/50
 
Gaius Julius Caesar

Gaius Julius Caesar (100-44 BC) was a Roman Statesman who came to power through a military career and by buying of votes. His army won the civil war, run over Spain, Sicily and Egypt, where he made Cleopatra a Queen. For reaching even more power he increased the number of senators. But he also organized social measures to improve the people's food-situation. In February 44 BC he did not accept the kingship offered by Marc Anthony, which made him even more popular. One month later he was murdered during a senate sitting.

INDEXCARD, 9/50
 
Alexander Graham Bell

b., March 3, 1847, Edinburgh

d. Aug. 2, 1922, Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada

American audiologist and inventor wrongly remembered for having invented the telephone in 1876. Although Bell introduced the first commercial application of the telephone, in fact a German teacher called Reiss invented it.

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/1/0,5716,15411+1+15220,00.html

INDEXCARD, 10/50
 
Roman smoke telegraph network, 150 A.D.

The Roman smoke signals network consisted of towers within visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling.

For a similar telegraph network in ancient Greece see Aeneas Tacitus' optical communication system.

INDEXCARD, 11/50
 
plaintext

the original, legible text

INDEXCARD, 12/50
 
Robot

Robot relates to any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. The term is derived from the Czech word robota, meaning "forced labor." Modern use of the term stems from the play R.U.R., written in 1920 by the Czech author Karel Capek, which depicts society as having become dependent on mechanical workers called robots that are capable of doing any kind of mental or physical work. Modern robot devices descend through two distinct lines of development--the early automation, essentially mechanical toys, and the successive innovations and refinements introduced in the development of industrial machinery.

INDEXCARD, 13/50
 
Internet Exchanges

Internet exchanges are intersecting points between major networks.

List of the World's Public Internet exchanges (http://www.ep.net)

http://www.ep.net/
INDEXCARD, 14/50
 
atbash

Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing.

for further explanations see:
http://www.ftech.net/~monark/crypto/crypt/atbash.htm

http://www.ftech.net/~monark/crypto/crypt/atb...
INDEXCARD, 15/50
 
The European Convention on Human Rights and its Five Protocols

As can be read in the Convention's preamble, the member states of the Council of Europe, the European Convention on Human Rights is intended as a follow-up of the Universal Declaration of Human Rights proclaimed by the General Assembly of the United Nations on 10 December 1948 and as an official act of "securing the universal and effective recognition and observance of the Rights therein declared." Because it is stated "that the aim of the Council of Europe is the achievement of greater unity between its Members and that one of the methods by which the aim is to be pursued is the maintenance and further realization of Human Rights and Fundamental Freedoms", the European Convention on Human Rights can be read as the political sibling to the biblical Ten Commandments on which effective and legitimate European democratic government are based. The European Convention on Human Rights is intended to represent the essence of the common heritage of European political traditions and ideals.

Signed in Rome on November 4, 1950, the Convention is supplemented by five protocols dated from March 20, 1952 (Paris), May 6, 1963, September 16, 1963, and January 20, 1966 (Strasbourg).

http://www.hri.org/docs/ECHR50.html

INDEXCARD, 16/50
 
Virtual Private Networks

Virtual Private Networks provide secured connections to a corporate site over a public network as the Internet. Data transmitted through secure connections are encrypted and therefore have to be encrypted before they can be read.
These networks are called virtual because connections are provided only when you connect to a corporate site; they do not rely on dedicated lines and support mobile use.

INDEXCARD, 17/50
 
Digital Subscriber Line (DSL)

DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( http://www.britannica.com/bcom/eb/article/4/0,5716,129614+15,00.html )).

http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 18/50
 
Moral rights

Authors of copyrighted works (besides economic rights) enjoy moral rights on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.

INDEXCARD, 19/50
 
Virtual Marylin Monroe

This is the story of the virtual Marylyn Monroe created by MRALab in Switzerland. The biography features her personal and professional stories. This being the biography of a virtual being, it does not end with the present and includes, instead, a chapter on her destiny.

http://www.miralab.unige.ch/MARILYN/VIRTUAL/virtual.html

http://www.miralab.unige.ch/MARILYN/VIRTUAL/v...
INDEXCARD, 20/50
 
Calculator

Calculators are machines for automatically performing arithmetical operations and certain mathematical functions. Modern calculators are descendants of a digital arithmetic machine devised by Blaise Pascal in 1642. Later in the 17th century, Gottfried Wilhelm von Leibniz created a more advanced machine, and, especially in the late 19th century, inventors produced calculating machines that were smaller and smaller and less and less laborious to use.

INDEXCARD, 21/50
 
CNN

CNN is a U.S.-TV-enterprise, probably the world's most famous one. Its name has become the symbol for the mass-media, but also the symbol of a power that can decide which news are important for the world and which are not worth talking about. Every message that is published on CNN goes around the world. The Gulf War has been the best example for this until now, when a CNN-reporter was the one person to do the countdown to a war. The moments when he stood on the roof of a hotel in Baghdad and green flashes surrounded him, went around the world.

INDEXCARD, 22/50
 
ciphers

the word "cipher" comes from the Hebrew word "saphar", meaning "to number". Ciphers are mere substitutions. Each letter of the alphabet gets substituted; maybe by one letter or two or more.

an example:
PLAINTEXT a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHERTEXT D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

INDEXCARD, 23/50
 
Dieter Dörner

Professor of theoretical psychology at the University of Bamberg, Germany. He defends the idea that the soul can be simulated by an information system. Artificial life will be able to reproduce itself and will therefore need a right to life just as biological life. Artificial life will also be able to feel pain, and there will have to be a new form of interaction between humans and artificial life forms. Dörner is conducting a research project on human action in situations of insecurity and complexity and has published "The logic of failure. Why things go wrong and what we can do to make them right" as well as "The Logic of Failure: Recognizing and avoiding error in complex situations."

http://www.uni-bamberg.de/ppp/insttheopsy/adressen.htm

http://www.uni-bamberg.de/ppp/insttheopsy/adr...
INDEXCARD, 24/50
 
Electronic Messaging (E-Mail)

Electronic messages are transmitted and received by computers through a network. By E-Mail texts, images, sounds and videos can be sent to single users or simultaneously to a group of users. Now texts can be sent and read without having them printed.

E-Mail is one of the most popular and important services on the Internet.

INDEXCARD, 25/50
 
Internet Relay Chat (IRC)

IRC is a text-based chat system used for live discussions of groups.

For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, http://www.skypoint.com/~gimonca/irc2.html

http://www.skypoint.com/~gimonca/irc2.html
INDEXCARD, 26/50
 
water-clocks

The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message.

INDEXCARD, 27/50
 
ciphertext

the enciphered/encoded and primarily illegible text

INDEXCARD, 28/50
 
Punch card, 1801

Invented by Joseph Marie Jacquard, an engineer and architect in Lyon, France, the punch cards laid the ground for automatic information processing. For the first time information was stored in binary format on perforated cardboard cards. In 1890 Hermann Hollerith used Joseph-Marie Jacquard's punch card technology for processing statistical data retrieved from the US census in 1890, thus speeding up data analysis from eight to three years. His application of Jacquard's invention was also used for programming computers and data processing until electronic data processing was introduced in the 1960's. - As with writing and calculating, administrative purposes account for the beginning of modern automatic data processing.

Paper tapes are a medium similar to Jacquard's punch cards. In 1857 Sir Charles Wheatstone applied them as a medium for the preparation, storage, and transmission of data for the first time. By their means, telegraph messages could be prepared off-line, sent ten times quicker (up to 400 words per minute), and stored. Later similar paper tapes were used for programming computers.

INDEXCARD, 29/50
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 30/50
 
Sun Microsystems

Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, servers, and software.

http://www.sun.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/9/0,5716,108249+1+105909,00.html .

http://www.sun.com/
http://www.britannica.com/bcom/eb/article/9/0...
INDEXCARD, 31/50
 
Immanuel Wallerstein

Immanuel Wallerstein (* 1930) is director of the Fernand Braudel Center for the Study of Economies, Historical Systems, and Civilizations. He is one of the most famous sociologists in the Western World. With his book The Modern World-System: Capitalist Agriculture and the Origins of the European World-Economy in the Sixteenth Century (1976), which led to the expression World-System Theory about centers, peripheries and semi-peripheries in the capitalist world system, he did not only influence a whole generation of scientists, but this theory seems to get popular again, due to globalization.

INDEXCARD, 32/50
 
Vandana Shiva

Vandana Shiva is the Director of the Research Foundation for Science, Technology and Ecology in New Delhi. She has been a tireless and one of the most original campaigners for ecological diversity, eco-feminism and against "official" development policies and commercial exploitation. Book publications include Ecofeminism (1993), Monocultures of the Mind (1993) and Biopiracy : The Plunder of Nature and Knowledge (1997

INDEXCARD, 33/50
 
Cooperative Association of Internet Data Analysis (CAIDA)

Based at the University of California's San Diego Supercomputer Center, CAIDA supports cooperative efforts among the commercial, government and research communities aimed at promoting a scalable, robust Internet infrastructure. It is sponsored by the Defense Advanced Research Project Agency (DARPA) through its Next Generation Internet program, by the National Science Foundation, Cisco, Inc., and Above.net.

INDEXCARD, 34/50
 
Mark

A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." (WIPO) To be protected a mark must be registered in a government office whereby generally the duration is limited in time, but can be periodically (usually every 10 years) renewed.

INDEXCARD, 35/50
 
Critical Art Ensemble

Critical Art Ensemble is a collective of five artists of various specializations dedicated to exploring the intersections between art, technology, radical politics, and critical theory. CAE have published a number of books and carried out innovative art projects containing insightful and ironic theoretical contributions to media art. Projects include Addictionmania, Useless Technology, The Therapeutic State, Diseases of Consciousness, Machineworld, As Above So Below, and Flesh Machine.

http://www.critical-art.net

INDEXCARD, 36/50
 
Network Information Center (NIC)

Network information centers are organizations responsible for registering and maintaining the domain names on the World Wide Web. Until competition in domain name registration was introduced, they were the only ones responsible. Most countries have their own network information center.

INDEXCARD, 37/50
 
Gateway

A gateway is a computer supplying point-to-multipoint connections between computer networks.

INDEXCARD, 38/50
 
The Spot

http://www.thespot.com/

http://www.thespot.com/
INDEXCARD, 39/50
 
Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks

This book gives a fascinating glimpse of the many documented attempts throughout history to develop effective means for long distance communications. Large-scale communication networks are not a twentieth-century phenomenon. The oldest attempts date back to millennia before Christ and include ingenious uses of homing pigeons, mirrors, flags, torches, and beacons. The first true nationwide data networks, however, were being built almost two hundred years ago. At the turn of the 18th century, well before the electromagnetic telegraph was invented, many countries in Europe already had fully operational data communications systems with altogether close to one thousand network stations. The book shows how the so-called information revolution started in 1794, with the design and construction of the first true telegraph network in France, Chappe's fixed optical network.

http://www.it.kth.se/docs/early_net/

INDEXCARD, 40/50
 
Wide Application Protocol (WAP)

The WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat (IRC).

While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate.

Source: Whatis.com

INDEXCARD, 41/50
 
Wide Area Network (WAN)

A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too.

INDEXCARD, 42/50
 
Nadia Thalman

Nadia Thalman is director of MIRAlab at the University of Geneva, Switzerland. Thalmann has become known as the creator of "virtual Marylyn", an installation which allowed visitors to literally to slip into Marylyn's shoes. Thalman's work is located at interface between science and art. It is about modelling human bodies for science and creative purposes, e.g. as virtual actors in movies. Thalman insists that artificial beings must be beautiful, in addition to being useful, as we will be living with them at close quarters.

INDEXCARD, 43/50
 
WIPO

The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights.

INDEXCARD, 44/50
 
1996 WIPO Copyright Treaty (WCT)

The 1996 WIPO Copyright Treaty, which focused on taking steps to protect copyright "in the digital age" among other provisions 1) makes clear that computer programs are protected as literary works, 2) the contracting parties must protect databases that constitute intellectual creations, 3) affords authors with the new right of making their works "available to the public", 4) gives authors the exclusive right to authorize "any communication to the public of their works, by wire or wireless means ... in such a way that members of the public may access these works from a place and at a time individually chosen by them." and 5) requires the contracting states to protect anti-copying technology and copyright management information that is embedded in any work covered by the treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm



http://www.wipo.int/documents/en/diplconf/dis...
INDEXCARD, 45/50
 
Sputnik

At the beginning of the story of today's global data networks is the story of the development of satellite communication.

In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defence. As the US Department of Defence encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry.

In the same year the USA launched their first satellite - Explorer I - data were transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks.

Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. But up to now, most satellites are designed for military purposes such as reconnaissance.

INDEXCARD, 46/50
 
Intranet

As a local area network (LAN), an Intranet is a secured network of computers based on the IP protocol and with restricted access.

INDEXCARD, 47/50
 
to decipher/decode

to put the ciphers/codes back into the plaintext

INDEXCARD, 48/50
 
MIT

The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by Vannevar Bush) and aeronautics (led by Charles Stark Draper). During World War II, MIT administered the Radiation Laboratory, which became the nation's leading center for radar research and development, as well as other military laboratories. After the war, MIT continued to maintain strong ties with military and corporate patrons, who supported basic and applied research in the physical sciences, computing, aerospace, and engineering. MIT has numerous research centers and laboratories. Among its facilities are a nuclear reactor, a computation center, geophysical and astrophysical observatories, a linear accelerator, a space research center, supersonic wind tunnels, an artificial intelligence laboratory, a center for cognitive science, and an international studies center. MIT's library system is extensive and includes a number of specialized libraries; there are also several museums.

INDEXCARD, 49/50
 
Automation

Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, automation generally implies the integration of machines into a self-governing system. Automation has revolutionized those areas in which it has been introduced, and there is scarcely an aspect of modern life that has been unaffected by it. Nearly all industrial installations of automation, and in particular robotics, involve a replacement of human labor by an automated system. Therefore, one of the direct effects of automation in factory operations is the dislocation of human labor from the workplace. The long-term effects of automation on employment and unemployment rates are debatable. Most studies in this area have been controversial and inconclusive. As of the early 1990s, there were fewer than 100,000 robots installed in American factories, compared with a total work force of more than 100 million persons, about 20 million of whom work in factories.

INDEXCARD, 50/50