Znet ZNet provides forum facilities for online discussion and chatting on various topics ranging from culture and ecology to international relations and economics. ZNet also publishes daily commentaries and maintains a Web-zine, which addresses current news and events as well as many other topics, trying to be provocative, informative and inspiring to its readers. Strategies and Policies Daily Commentaries: Znet's commentaries address current news and events, cultural happenings, and organizing efforts, providing context, critique, vision, and analysis, but also references to or reviews of broader ideas, new books, activism, the Internet, and other topics that strike the diverse participating authors as worthy of attention. Forum System: Znet provides a private (and soon also a public) forum system. The fora are among others concerned with topics such as: activism, cultural, community/race/religion/ethnicity, ecology, economics/class, gender/kinship/sexuality, government/polity, international relations, ParEcon, vision/strategy and popular culture. Each forum has a set of threaded discussions, also the fora hosted by commentary writers like Chomsky, Ehrenreich, Cagan, Peters and Wise. ZNet Daily WebZine: ZNet Daily WebZine offers commentaries in web format. Z Education Online (planned): The Z Education Online site will provide instructionals and courses of diverse types as well as other university-like, education-aimed features. | ||||||||||||||||
| ||||||||||||||||
Changes Still, disinformation and propaganda are nothing magic. They can change things, but supposedly only if those things/meanings/opinions are not fixed completely. It is never just a single idea that changes. Society is following the changes. Thinking about disinformation brings us to the word truth, of course, and to the doubt that there is no definite truth. And truth can easily be manipulated to another truth. Just present some facts that seem to be logic and there you've got a new truth. And if the facts can supposedly be proved by empirical studies then the quality of the truth definitely rises. That's what ideologies do all the time. And the media like to do the same thing - as a game with power or mere presentation of power? But of course there also exist bits of disinformation which are more amusing than evil or dangerous: - the theory of the celestro-centric world/"Hohlwelttheorie" - the story of the German philosopher who invented an Italian philosopher, wrote books about him, even reprinted "his" texts, which had gone lost pretendedly 100 years ago - and finally lost his job and all his career when other scientists found out that everything had been made up. | ||||||||||||||||
| ||||||||||||||||
History: Communist Tradition Following the communist revolutions of the 20th century all "means of production" became the property of the state as representative of "the masses". Private property ceased to exist. While moral rights of the creator were recognized and economic rights acknowledged with a one-time cash award, all subsequent rights reverted to the state. With the transformation of many communist countries to a market system most of them have now introduced laws establishing markets in intellectual property rights. Still the high rate of piracy reflects a certain lack of legal tradition. | ||||||||||||||||
| ||||||||||||||||
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: | ||||||||||||||||
| ||||||||||||||||
Product Placement With television still being very popular, commercial entertainment has transferred the concept of soap operas onto the Web. The first of this new species of "Cybersoaps" was | ||||||||||||||||
| ||||||||||||||||
Biometrics applications: physical access This is the largest area of application of biometric technologies, and the most direct lineage to the feudal gate keeping system. Initially mainly used in military and other "high security" territories, physical access control by biometric technology is spreading into a much wider field of application. Biometric access control technologies are already being used in schools, supermarkets, hospitals and commercial centres, where the are used to manage the flow of personnel. Biometric technologies are also used to control access to political territory, as in immigration (airports, Mexico-USA border crossing). In this case, they can be coupled with camera surveillance systems and artificial intelligence in order to identify potential suspects at unmanned border crossings. Examples of such uses in remote video inspection systems can be found at A gate keeping system for airports relying on digital fingerprint and hand geometry is described at An electronic reconstruction of feudal gate keeping capable of singling out high-risk travellers from the rest is already applied at various border crossing points in the USA. "All enrolees are compared against national lookout databases on a daily basis to ensure that individuals remain low risk". As a side benefit, the economy of time generated by the inspection system has meant that "drug seizures ... have increased since Inspectors are able to spend more time evaluating higher risk vehicles". However, biometric access control can not only prevent people from gaining access on to a territory or building, they can also prevent them from getting out of buildings, as in the | ||||||||||||||||
| ||||||||||||||||
Legal Protection: WIPO (World Intellectual Property Organization) Presumably the major player in the field of international Information on WIPO administered agreements in the field of industrial property (Paris Convention for the Protection of Industrial Property (1883), Madrid Agreement Concerning the International Registration of Marks (1891) etc.) can be found on: Information on treaties concerning copyright and neighboring rights (Berne Convention for the Protection of Literary and Artistic Works (1886) etc.) is published on: The most recent multilateral agreement on copyright is the 1996 WIPO Copyright Treaty. Among other things it provides that computer programs are protected as literary works and also introduces the protection of databases, which "... by reason of the selection or arrangement of their content constitute intellectual creations." Furthermore the | ||||||||||||||||
| ||||||||||||||||
Biometric technologies In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" ( All biometric technologies are made up of the same basic processes: 1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question. 2. At every new identification, a second sample is collected and its identity with the first one is examined. 3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is. This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body. | ||||||||||||||||
| ||||||||||||||||
Timeline 1600 - 1900 AD 17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card - Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians - the English scientist, magician and astrologer 1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally. 1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code 18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day. 1790's Thomas Jefferson and Robert Patterson invent a wheel cipher 1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs 1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844. 1834 the 1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then 1854 the Playfair cipher is invented by Sir Charles Wheatstone 1859 for the first time a tomographic cipher gets described 1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages 1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army 1895 the invention of the radio changes cryptography-tasks again and makes them even more important | ||||||||||||||||
| ||||||||||||||||
Challenges for Copyright by ICT: Digital Content Providers Providers of digital information might be confronted with copyright related problems when using some of the special features of hypertext media like Framing Frames are often used to help define, and navigate within, a content provider's website. Still, when they are used to present (copyrighted) third party material from other sites issues of passing off and misleading or deceptive conduct, as well as copyright infringement, immediately arise. Hyperlinking It is generally held that the mere creation of a hyperlink does not, of itself, infringe copyright as usually the words indicating a link or the displayed URL are unlikely to be considered a "work". Nevertheless if a link is clicked on the users browser will download a full copy of the material at the linked address creating a copy in the RAM of his computer courtesy of the address supplied by the party that published the link. Although it is widely agreed that the permission to download material over the link must be part of an implied license granted by the person who has made the material available on the web in the first place, the scope of this implied license is still the subject of debate. Another option that has been discussed is to consider linking Furthermore hyperlinks, and other "information location tools", like online directories or search engines could cause their operators trouble if they refer or link users to a site that contains infringing material. In this case it is yet unclear whether providers can be held liable for infringement. | ||||||||||||||||
| ||||||||||||||||
Global Data Flows In the space of flows constituted by today's global data networks the space of places is transcended. Visualizations of these global data flows show arches bridging seas and continents, thereby linking the world's centres of research and development, economics and politics. In the global "Network Society" (Manuel Castells) the traditional centres of power and domination are not discarded, in the opposite, they are strengthened and reinforced by the use of information and communication technologies. Political, economical and symbolical power becomes increasingly linked to the use of modern information and communication technologies. The most sensitive and advanced centres of information and communication technologies are the stock markets. Excluded from the network constituted by modern information and communication technologies, large parts of Africa, Asia and South America, but also the poor of industrialized countries, are ranking increasingly marginal to the world economy. Cities are centres of communications, trade and power. The higher the percentage of urban population, the more it is likely that the telecommunications infrastructure is generally good to excellent. This goes hand in hand with lower telecommunications costs. Those parts of the world with the poorest infrastructure are also the world's poorhouse. In Bangladesh for most parts of the population a personal computer is as expensive as a limousine in European one-month's salary in Europe, they have to pay eight annual salaries. Therefore telecommunications infrastructure is concentrated on the highly industrialized world: Most telephone mainlines, mobile telephones, computers, Internet accounts and Internet hosts (computers connected to the global data networks) can be found here. The same applies to media: the daily circulation of newspapers and the use of TV sets and radios. - Telecommunication and media services affordable to most parts of the population are mostly restricted to industrialized countries. This situation will not change in the foreseeable future: Most expenditure for telecommunications infrastructure will be restricted to the richest countries in the world. In 1998, the world's richest countries consumed 75% of all cables and wires. | ||||||||||||||||
| ||||||||||||||||
Feeding the data body | ||||||||||||||||
| ||||||||||||||||
The 2nd Chechnya-War In the summer of 1999 between 1.200 and 2.000 Muslim rebels from Chechnya fell into Dagestan. Rumors say that Russian soldiers closed their eyes pretending not to see anything. During the fightings that started soon, many persons got killed. The hole issue was blamed on Chechnya. At that time there were rumors that there would be heavy bombing in Moscow in September. And there was. Those two things together brought back the hatred against the Chechnya rebels. The 2nd War between Russia and the Muslim country began. While the first war was lost at home, because the Russians, especially mothers, did not understand why their sons should fight against Chechnya, this time the atmosphere was completely different. In the cities 85% and all over Russia 65% of the Russian population agreed with the war. This time the war was a national issue, a legitimate defense. The media emphasized this. Alexander Zilin, a journalist, found out that the truth was far from the one presented in the media: First of all there was no evidence that the Moscow-bombings were organized by Chechnyans. On the contrary it is more than probable that the crimes were organized by a governmental institution for national security. The disinformation was part of the strategy to make the population support another war with Chechnya. The media were part of the story, maybe without knowing. They kept on the government's and army's side, showing only special and patriotic parts of the war. For example the number of dead Russian soldiers was held back. The U.S.-behavior on this: The USA would like to intervene but they are afraid of ruining the weak relation to Russia. For years the main topic of U.S.-politics has been the struggle against terrorism. Now Russia pretends to be fighting terrorism. How could it be criticized for that? The reason for this war is rather cynical: it worked as a public relations-campaign for At the same time a propaganda-campaign against his rival Y. Primakov (98), formerly the most popular candidate, was spreading lies and bad rumors. Opinion-polls showed very fast that he had lost the elections because of this black propaganda, even before the elections took place. | ||||||||||||||||
| ||||||||||||||||
Key Recovery Systems As stated before the sense of cryptography is a properly designed cryptosystem making it essentially impossible to recover encrypted data without any knowledge of the used key. The issue of lost keys and the being-locked-out from one's own data as a consequence favors key recovery systems. On the other hand the counter argument is confidentiality: as soon as a possibility to recover a key is provided, the chances for abuses grow. Finally it is the state that does not want to provide too much secrecy. On the contrary. During the last 20 years endless discussions about the state's necessity and right to restrict private cryptography have taken place, as the governments rarely care for the benefit of private users if they believe in catching essential informations about any kind of enemy, hence looking for unrestricted access to all keys. The list of "key recovery," "key escrow," and "trusted third-party" as encryption requirements, suggested by governmental agencies, covers all the latest developments and inventions in digital technology. At the same time the NSA, one of the world's most advanced and most secret enterprises for cryptography, worked hard in getting laws through to forbid the private use of strong encryption in one way or the other. Still, it is also organizations like this one that have to admit that key recovery systems are not without any weaknesses, as the U.S. Escrowed Encryption Standard, the basis for the famous and controversially discussed Clipper Chip, showed. The reason for those weaknesses is the high complexity of those systems. Another aspect is that key recovery systems are more expensive and certainly much less secure than other systems. So, why should anyone use them? In that context, one has to understand the legal framework for the use of cryptography, a strict framework in fact, being in high contradiction to the globalised flow of communication. | ||||||||||||||||
| ||||||||||||||||
Virtual cartels; mergers In parallel to the deregulation of markets, there has been a trend towards large-scale mergers which ridicules dreams of increased competition. Recent mega-mergers and acquisitions include SBC Communications - Ameritech, $ 72,3 bn Bell Atlantic - GTE, $ 71,3 AT&T - Media One, $ 63,1 AOL - Time Warner, $ 165 bn MCI Worldcom - Spring, $ 129 bn The total value of all major mergers since the beginnings of the 1990s has been 20 trillion Dollars, 2,5 times the size of the USA's GIP. The AOL- Time Warner reflects a trend which can be observed everywhere: the convergence of the ICT and the content industries. This represents the ultimate advance in complete market domination, and a alarming threat to independent content. "Is TIME going to write something negative about AOL? Will AOL be able to offer anything other than CNN sources? Is the Net becoming as silly and unbearable as television?" (Detlev Borchers, journalist) | ||||||||||||||||
| ||||||||||||||||
The North against the South? "Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market." (UNESCO, World Communication Report) The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else. Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left? | ||||||||||||||||
| ||||||||||||||||
Basics: Introduction Copyright law is a branch of | ||||||||||||||||
| ||||||||||||||||
Basics: Protected Persons Generally copyright vests in the author of the work. Certain national laws provide for exceptions and, for example, regard the employer as the original owner of a copyright if the author was, when the work was created, an employee and employed for the purpose of creating that work. In the case of some types of creations, particularly audiovisual works, several national laws provide for different solutions to the question that should be the first holder of copyright in such works. Many countries allow copyright to be assigned, which means that the owner of the copyright transfers it to another person or entity, which then becomes its holder. When the national law does not permit assignment it usually provides the possibility to license the work to someone else. Then the owner of the copyright remains the holder, but authorizes another person or entity to exercise all or some of his rights subject to possible limitations. Yet in any case the " | ||||||||||||||||
| ||||||||||||||||
Databody convergence In the phrase "the rise of the citizen as a consumer", to be found on the When the citizen becomes a consumer, the state must become a business. In the data body business, the key word behind this new identity of government is "outsourcing". Functions, that are not considered core functions of government activity are put into the hands of private contractors. There have long been instances where privately owned data companies, e.g. credit card companies, are allowed access to public records, e.g. public registries or electoral rolls. For example, in a normal credit card transaction, credit card companies have had access to public records in order to verify identity of a customer. For example, in the UK citizen's personal data stored on the Electoral Roll have been used for commercial purposes for a long time. The new British Data Protection Act now allows people to "opt out" of this kind of commercialisation - a legislation that has prompted protests on the part of the data industry: While this may serve as an example of an increased public awareness of privacy issues, the trend towards outsourcing seems to lead to a complete breakdown of the barriers between commercial and public use of personal data. This trend can be summarised by the term "outsourcing" of government functions. Governments increasingly outsource work that is not considered core function of government, e.g. cooking meals in hospitals or mowing lawns in public parks. Such peripheral activities marked a first step of outsourcing. In a further step, governmental functions were divided between executive and judgemental functions, and executive functions increasingly entrusted to private agencies. For these agencies to be able to carry out the work assigned to them, the need data. Data that one was stored in public places, and whose handling was therefore subject to democratic accountability. Outsourcing has produced gains in efficiency, and a decrease of accountability. Outsourced data are less secure, what use they are put to is difficult to control. The world's largest data corporation, Technically the linking of different systems is already possible. It would also create more efficiency, which means generate more income. The question, then, whether democracy concerns will prevent it from happening is one that is capable of creating But what the EDS example shows is something that applies everywhere, and that is that the data industry is whether by intention or whether by default, a project with profound political implications. The current that drives the global economy deeper and deeper into becoming a global data body economy may be too strong to be stopped by conventional means. However, the convergence of political and economic data bodies also has technological roots. The problem is that politically motivated surveillance and economically motivated data collection are located in the same area of information and communication technologies. For example, monitoring internet use requires more or less the same technical equipment whether done for political or economic purposes. Data mining and data warehousing techniques are almost the same. Creating transparency of citizens and customers is therefore a common objective of intelligence services and the data body industry. Given that data are exchanged in electronic networks, a compatibility among the various systems is essential. This is another factor that encourages "leaks" between state-run intelligence networks and the private data body business. And finally, given the secretive nature of state intelligence and commercial data capturing , there is little transparency. Both structures occupy an opaque zone. | ||||||||||||||||
| ||||||||||||||||
Enforcement: Copyright Management and Control Technologies With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of | ||||||||||||||||
| ||||||||||||||||
Face recognition In order to be able to recognize a person, one commonly looks at this persons face, for it is there where the visual features which distinguish one person from another are concentrated. Eyes in particular seem to tell a story not only about who somebody is, but also about how that persons feel, where his / her attention is directed, etc. People who do not want to show who they are or what is going on inside of them must mask themselves. Consequently, face recognition is a kind of electronic unmasking. "Real" face-to-face communication is a two-way process. Looking at somebody's face means exposing ones own face and allowing the other to look at oneself. It is a mutual process which is only suspended in extraordinary and voyeuristic situations. Looking at somebody without being looked at places the person who is visually exposed in a vulnerable position vis-à-vis the watcher. In face recognition this extraordinary situation is normal. Looking at the machine, you only see yourself looking at the machine. Face biometrics are extracted anonymously and painlessly by a mask without a face. Therefore the resistance against the mass appropriation of biometrical data through surveillance cameras is confronted with particular difficulties. The surveillance structure is largely invisible, it is not evident what the function of a particular camera is, nor whether it is connected to a face recognition system. In a protest action against the face recognition specialist According to | ||||||||||||||||
| ||||||||||||||||
World War II ... Never before propaganda had been as important as in the 2nd World War. From now on education was one more field of propaganda: its purpose was to teach how to think, while pure propaganda was supposed to show what to think. Every nation founded at least one ministry of propaganda - of course without calling it that way. For example the British called it the Ministry of Information (= MOI), the U.S. distinguished between the Office of Strategic Services (= OSS) and the Office of War Information (= OWI), the Germans created a Ministry of Propaganda and Public Enlightenment (= RMVP) and the Japanese called their disinformation and propaganda campaign the "Thought War". British censorship was so strict that the text of an ordinary propaganda leaflet, that had been dropped from planes several million times, was not given to a journalist who asked for it. Atrocity stories were no longer used the same way as in the 1st World War. Instead, German war propaganda had started long before the war. In the middle of the 1930s Some of the pictures of fear, hatred and intolerance still exist in people's heads. Considering this propaganda did a good job, unfortunately it was the anti-national-socialist propaganda that failed at that time. | ||||||||||||||||
| ||||||||||||||||
The British Propaganda Campaign in World War I The British set up a unique system for propaganda, involving GB, the USA and all the colonies. Most different agencies and civilians worked together, the civilians not always knowing about the machinery behind. During the first years of the war the main goal was to achieve a U.S.-entry to the war on Britain's side of the battle. All propaganda was working on this, which meant to destroy Germany's reputation and create dark stereotypes about them, which was an easy task as the Germans were not only fatally unlucky but also very weak in propaganda. At the same time the U.S.-citizens' opinion about the war had to be influenced. The most promising way to do so was by starting with the men in power. One of the most beloved tools at that time was the use of atrocity stories; and most popular among the masses were cartoons, furthermore posters, an element perfectioned by the USSR in World War I and II, and movies. The particular thing was that British propaganda finally had an effect on the German population. Soldiers at the front and people at home received the disinformation messages, mostly pamphlets that had been dropped by aeroplanes or balloons. Together with the development of the fightings turning against the Germans this kind of propaganda was able to discourage the people and make the German government lose its power of propaganda. "Allied propaganda had caused a collapse of morale at home." ( After all this success it is hardly understandable that the British committed a huge error right after the war, an error that had bad consequences for the next war: being regarded as a tool of war and therefore regarded as inappropriate for times of peace, the propaganda institutions were closed. At about the same time similar ones were built up in Germany - first of all on paper, in | ||||||||||||||||
| ||||||||||||||||
Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights) Another important multilateral treaty concerned with The complete TRIPS agreement can be found on: | ||||||||||||||||
| ||||||||||||||||
Global hubs of the data body industry While most data bunkers are restricted to particular areas or contexts, there are others which act as global data nodes. Companies such as
The size of these data repositories is constantly growing, so it is only a matter of time when everybody living in the technologically saturated part of the world will be registered in one of these data bunkers. Among these companies, For many years, EDS has been surrounded by rumours concerning sinister involvement with intelligence agencies. Beyond the rumours, though, there are also facts. EDS has a special division for | ||||||||||||||||
| ||||||||||||||||
The "Corpse-Conversion Factory"-rumor Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. ( | ||||||||||||||||
| ||||||||||||||||
Palm recognition In palm recognition a 3-dimensional image of the hand is collected and compared to the stored sample. Palm recognition devices are cumbersome artefacts (unlike fingerprint and iris recognition devices) but can absorb perform a great amount of identification acts in a short time. They are therefore preferably installed in situations where a large number of people is identified, as in airports. | ||||||||||||||||
| ||||||||||||||||
Timeline Cryptography - Introduction Besides oral conversations and written language many other ways of information-transport are known: like the bush telegraph, drums, smoke signals etc. Those methods are not cryptography, still they need en- and decoding, which means that the history of language, the history of communication and the history of cryptography are closely connected to each other The timeline gives an insight into the endless fight between enciphering and deciphering. The reasons for them can be found in public and private issues at the same time, though mostly connected to military maneuvers and/or political tasks. One of the most important researchers on Cryptography through the centuries is | ||||||||||||||||
| ||||||||||||||||
Movies as a Propaganda- and Disinformation-Tool in World War I and II Movies produced in Hollywood in 1918/19 were mainly anti-German. They had some influence but the bigger effect was reached in World War II-movies. The first propaganda movie of World War II was British. At that time all films had to pass censoring. Most beloved were entertaining movies with propaganda messages. The enemy was shown as a beast, an animal-like creature, a brutal person without soul and as an idiot. Whereas the own people were the heroes. That was the new form of atrocity. U.S.-President In the late twenties, movies got more and more important, in the USSR, too, like | ||||||||||||||||
| ||||||||||||||||
Clipper Chip The Clipper Chip is a cryptographic device proposed by the U.S. government that purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone would be used to encrypt data. The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA). | ||||||||||||||||
| ||||||||||||||||
Internet Exchanges Internet exchanges are intersecting points between major networks. List of the World's Public Internet exchanges ( | ||||||||||||||||
| ||||||||||||||||
Cookie A cookie is an information package assigned to a client program (mostly a Web browser) by a server. The cookie is saved on your hard disk and is sent back each time this server is accessed. The cookie can contain various information: preferences for site access, identifying authorized users, or tracking visits. In online advertising, cookies serve the purpose of changing advertising banners between visits, or identifying a particular Advertising banners can be permanently eliminated from the screen by filtering software as offered by Cookies are usually stored in a separate file of the browser, and can be erased or permanently deactivated, although many web sites require cookies to be active. | ||||||||||||||||
| ||||||||||||||||
Internet Engineering Steering Group On behalf of the | ||||||||||||||||
| ||||||||||||||||
Enigma Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra. | ||||||||||||||||
| ||||||||||||||||
National Association of Securities Dealers Automated Quotation (NASDAQ) Incepted in 1971, The NASDAQ Stock Market was the world's first electronic stock market and has since attracted many technology companies from countries all over the world, some of them as legendary as NASDAQ is the largest stock market in the world. | ||||||||||||||||
| ||||||||||||||||
COMECON The Council for Mutual Economic Aid (COMECON) was set up in 1949 consisting of six East European countries: Bulgaria, Czechoslovakia, Hungary, Poland, Romania, and the USSR, followed later by the German Democratic Republic (1950), Mongolia (1962), Cuba (1972), and Vietnam (1978). Its aim was, to develop the member countries' economies on a complementary basis for the purpose of achieving self-sufficiency. In 1991, Comecon was replaced by the Organization for International Economic Cooperation. | ||||||||||||||||
| ||||||||||||||||
Cooperative Association of Internet Data Analysis (CAIDA) Based at the University of California's San Diego Supercomputer Center, CAIDA supports cooperative efforts among the commercial, government and research communities aimed at promoting a scalable, robust Internet infrastructure. It is sponsored by the | ||||||||||||||||
| ||||||||||||||||
Leonard M. Adleman Leonard M. Adleman was one of three persons in a team to invent the | ||||||||||||||||
| ||||||||||||||||
Electronic Data Interchange (EDI) EDI is an international standard relating to the exchange of trade goods and services. It enables trading partners to conduct routine business transactions, such as purchase orders, invoices and shipping notices independent of the computer platform used by the trading partners. Standardization by EDI translation software assures the correct interpretation of data. EDI might become increasingly important to electronic commerce. | ||||||||||||||||
| ||||||||||||||||
National Science Foundation (NSF) Established in 1950, the National Science Foundation is an independent agency of the U.S. government dedicated to the funding in basic research and education in a wide range of sciences and in mathematics and engineering. Today, the NSF supplies about one quarter of total federal support of basic scientific research at academic institutions. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/0/0,5716,2450+1+2440,00.html | ||||||||||||||||
| ||||||||||||||||
blowfish encryption algorithm Blowfish is a symmetric key block cipher that can vary its length. The idea behind is a simple design to make the system faster than others. | ||||||||||||||||
| ||||||||||||||||
Internet Relay Chat (IRC) IRC is a text-based chat system used for live discussions of groups. For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, | ||||||||||||||||
| ||||||||||||||||
Virtual Private Networks Virtual Private Networks provide secured connections to a corporate site over a public network as the Internet. Data transmitted through secure connections are encrypted and therefore have to be encrypted before they can be read. These networks are called virtual because connections are provided only when you connect to a corporate site; they do not rely on dedicated lines and support mobile use. | ||||||||||||||||
| ||||||||||||||||
National Laboratory for Applied Network Research NLANR, initially a collaboration among supercomputer sites supported by the Today NLANR offers support and services to institutions that are qualified to use high performance network service providers - such as Internet 2 and http://www.nlanr.net | ||||||||||||||||
| ||||||||||||||||
The Spot | ||||||||||||||||
| ||||||||||||||||
water-clocks The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message. | ||||||||||||||||
| ||||||||||||||||
atbash Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing. for further explanations see: | ||||||||||||||||
| ||||||||||||||||
William Frederick Friedman Friedman is considered the father of U.S.-American cryptoanalysis - he also was the one to start using this term. | ||||||||||||||||
| ||||||||||||||||
Leni Riefenstahl Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. | ||||||||||||||||
| ||||||||||||||||
Themistocles Themistocles, a Greek politician and general, conquered the Persians in the battle of Salamis, in 480 BC. The Persians, under their King For further details see: | ||||||||||||||||
| ||||||||||||||||
Newsgroups Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet. For more information, click here ( | ||||||||||||||||
| ||||||||||||||||
Vladimir Putin Vladimir Putin is Russian President, | ||||||||||||||||
| ||||||||||||||||
Harold. D. Lasswell Harold. D. Lasswell (* 1902) studied at the London School of Economics. He then became a professor of social sciences at different Universities, like the University of Chicago, Columbia University, and Yale University. He also was a consultant for several governments. One of Lasswell's many famous works was Propaganda Technique in World War. In this he defines propaganda. He also discussed major objectives of propaganda, like to mobilize hatred against the enemy, to preserve the friendship of allies, to procure the co-operation of neutrals and to demoralize the enemy. | ||||||||||||||||
| ||||||||||||||||
Amazon.Com Amazon.Com was one of the first online bookstores. With thousands of books, CDs and videos ordered via the Internet every year, Amazon.Com probably is the most successful Internet bookstore. | ||||||||||||||||
| ||||||||||||||||
Agostino Ramelli's reading wheel, 1588 Agostino Ramelli designed a "reading wheel" which allowed browsing through a large number of documents without moving from one spot. Presenting a large number of books, a small library, laid open on lecterns on a kind of ferry-wheel, allowing us to skip chapters and to browse through pages by turning the wheel to bring lectern after lectern before our eyes, thus linking ideas and texts together, Ramelli's reading wheel reminds of today's browsing software used to navigate the | ||||||||||||||||
| ||||||||||||||||