|
4000 - 1000 B.C. 4th millennium B.C. In Sumer Writing and calculating came into being at about the same time. The first pictographs carved into clay tablets were used for administrative purposes. As an instrument for the administrative bodies of early empires, which began to rely on the collection, storage, processing and transmission of data, the skill of writing was restricted to only very few. Being more or less separated tasks, writing and calculating converge in today's computers. Letters are invented so that we might be able to converse even with the absent, says Saint Augustine. The invention of writing made it possible to transmit and store information. No longer the ear predominates; face-to-face communication becomes more and more obsolete for administration and bureaucracy. Standardization and centralization become the constituents of high culture and vast empires as Sumer and China. 3200 B.C. In Sumer the seal is invented. About 3000 B.C. In Egypt papyrus scrolls and About 1350 B.C. In Assyria the cuneiform script is invented. 1200 B.C. According to Aeschylus, the conquest of the town of Troy was transmitted via torch signals. About 1100 B.C. Egyptians use homing pigeons to deliver military information. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Gait recognition The fact that an individual's identity is expressed not only by the way he/she looks or sounds, but also by the manner of walking is a relatively new discovery of in biometrics. Unlike the more fully developed biometric technologies whose scrutiny is directed at stationary parts of the body, gait recognition has the added difficulty of having to sample and identify movement. Scientists at the University of Southampton, UK ( Another model considers the shape and length of legs as well as the velocity of joint movements. The objective is to combine both models into one, which would make gait recognition a fully applicable biometric technology. Given that gait recognition is applied to "moving preambulatory subjects" it is a particularly interesting technology for surveillance. People can no longer hide their identity by covering themselves or moving. Female shop lifters who pretend pregnancy will be detected because they walk differently than those who are really pregnant. Potential wrongdoers might resort walking techniques as developed in Monty Pythons legendary "Ministry of Silly Walks" ( | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
The 2nd Chechnya-War In the summer of 1999 between 1.200 and 2.000 Muslim rebels from Chechnya fell into Dagestan. Rumors say that Russian soldiers closed their eyes pretending not to see anything. During the fightings that started soon, many persons got killed. The hole issue was blamed on Chechnya. At that time there were rumors that there would be heavy bombing in Moscow in September. And there was. Those two things together brought back the hatred against the Chechnya rebels. The 2nd War between Russia and the Muslim country began. While the first war was lost at home, because the Russians, especially mothers, did not understand why their sons should fight against Chechnya, this time the atmosphere was completely different. In the cities 85% and all over Russia 65% of the Russian population agreed with the war. This time the war was a national issue, a legitimate defense. The media emphasized this. Alexander Zilin, a journalist, found out that the truth was far from the one presented in the media: First of all there was no evidence that the Moscow-bombings were organized by Chechnyans. On the contrary it is more than probable that the crimes were organized by a governmental institution for national security. The disinformation was part of the strategy to make the population support another war with Chechnya. The media were part of the story, maybe without knowing. They kept on the government's and army's side, showing only special and patriotic parts of the war. For example the number of dead Russian soldiers was held back. The U.S.-behavior on this: The USA would like to intervene but they are afraid of ruining the weak relation to Russia. For years the main topic of U.S.-politics has been the struggle against terrorism. Now Russia pretends to be fighting terrorism. How could it be criticized for that? The reason for this war is rather cynical: it worked as a public relations-campaign for At the same time a propaganda-campaign against his rival Y. Primakov (98), formerly the most popular candidate, was spreading lies and bad rumors. Opinion-polls showed very fast that he had lost the elections because of this black propaganda, even before the elections took place. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Late 1970s - Present: Fourth Generation Computers Following the invention of the first Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used. Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
The Romans The Romans can be called the great inventors of myths with the purpose of propaganda. Think of Or Augustus: he reunited the Roman Empire; part of his power was due to huge efforts in propaganda, visible e.g. in the mass of coins showing his face, being sent all over the empire. He understood very well, that different cultures used different symbols - and he used them for his propaganda. Politically the Roman army was an important factor. Propaganda in that case was used for the soldiers on the one hand, but on the other hand also for demonstrating the power of the army to the people, so they could trust in its strength. Even then security was an essential factor of politics. As long as the army functioned, the Roman Empire did as well ( | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
The history of propaganda Thinking of propaganda some politicians' names are at once remembered, like The history of propaganda has to tell then merely mentioning those names: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Credibility The magic word is credibility. Disinformation can mean leaving out important informations. Telling lies is not the only method of disinformation. The not telling also creates thoughts and delegates them into certain directions, whereas other models of thinking are left out. Like this, the deaths on the own side are adjusted downwards whereas the victims of the enemy are counted proudly - as long as they are not civilians. The post-Gulf War period demonstrated how the population reacts if the number of innocent victims is much higher than expected. It was the fact of those numbers that provoked the biggest part of the post-war critique. The media in democratic states tend to criticize this, which does not mean that they always want to be free of governmental influence. They can choose to help the government in a single case by not writing anything against it or by writing pro-government stories. At the same time every democracy has undemocratic parts in it - which is already part of democracy itself. There are situations when a democratic government may find it essential to put pressure on the media to inform the population in a certain way; and also censorship is nothing that can only be connected to dictatorship; just think of the Falkland War, the Gulf-War or the Kosovo-War. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Hieroglyphs Hieroglyphs are pictures, used for writing in ancient Egypt. First of all those pictures were used for the names of kings, later more and more signs were added, until a number of 750 pictures | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Computer programming language A computer programming language is any of various languages for expressing a set of detailed instructions for a digital computer. Such a language consists of characters and rules for combining them into symbols and words. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
IDEA IDEA is another symmetric-key system. It is a block cipher, operating on 64-bit plaintext blocks, having a key-length of 128 bits. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Federal Networking Council Being an organization established in the name of the US government, the Federal Networking Council (FNC) acts as a forum for networking collaborations among Federal agencies to meet their research, education, and operational mission goals and to bridge the gap between the advanced networking technologies being developed by research FNC agencies and the ultimate acquisition of mature version of these technologies from the commercial sector. Its members are representatives of agencies as the National Security Agency, the Department of Energy, the http://www.fnc.gov | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
NATO The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
David Kahn David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Backbone Networks Backbone networks are central networks usually of very high bandwidth, that is, of very high transmitting capacity, connecting regional networks. The first backbone network was the | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
Polybius Checkerboard
It is a system, where letters get converted into numeric characters. The numbers were not written down and sent but signaled with torches. for example: A=1-1 B=1-2 C=1-3 W=5-2 for more information see: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||