The Egyptians ...

Besides ordinary religious manipulation-tools the Egyptians were masters of using architecture for propaganda. In Egypt, most of all, architecture was used as a media to demonstrated power, whereas the Greek and Romans used other types of art, like statues, for political propaganda.
The pyramids, palaces, tombs became tools for power demonstrations. Paintings and carvings (like on obelisks) proved the might of the rulers.
All those signs of power were done to make people compare their ruling dynasty to gods and keep them politically silent, because religion was used for justifying mortal power. Marble, gold, jewelry and artists were the tools for those maneuvers. Whereas questions for the truth were not even asked or listened to.
Finally it was the masses who were used for propaganda, when they were not only forced to work as slaves on those signs of power but also were abused for those power demonstrations, when they had to accompany the dead king into his tomb - dying of hunger, thirst, lack of oxygen and in darkness. The more religious disinformation the more luxury. The more luxury the better. The more luxury the more power.

TEXTBLOCK 1/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658370
 
The Tools of Disinformation and Propaganda

"In wartime they attack a part of the body that other weapons cannot reach in an attempt to affect the way which participants perform on the field of battle." (Taylor, Munitions of the Mind, p. 9)
Therefore the demonstrated tools refer to political propaganda in the two World Wars.

Propaganda has the ability to change a war, a natural evil, into a so-called "just" war. Violence then is supposedly defense, no more aggression.

TEXTBLOCK 2/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658552
 
Gait recognition

The fact that an individual's identity is expressed not only by the way he/she looks or sounds, but also by the manner of walking is a relatively new discovery of in biometrics.

Unlike the more fully developed biometric technologies whose scrutiny is directed at stationary parts of the body, gait recognition has the added difficulty of having to sample and identify movement. Scientists at the University of Southampton, UK (http://www.isis.ecs.soton.ac.uk/research/gait/) have developed a model which likens the movement of legs to those of a pendulum and uses hip inclination as a variable.

Another model considers the shape and length of legs as well as the velocity of joint movements. The objective is to combine both models into one, which would make gait recognition a fully applicable biometric technology.

Given that gait recognition is applied to "moving preambulatory subjects" it is a particularly interesting technology for surveillance. People can no longer hide their identity by covering themselves or moving. Female shop lifters who pretend pregnancy will be detected because they walk differently than those who are really pregnant. Potential wrongdoers might resort walking techniques as developed in Monty Pythons legendary "Ministry of Silly Walks" (http://www.stone-dead.asn.au/sketches/sillwalk.htm)

TEXTBLOCK 3/21 // URL: http://world-information.org/wio/infostructure/100437611729/100438658388
 
1950: The Turing Test

Alan Turing, an English mathematician and logician, advocated the theory that eventually computers could be created that would be capable of human thought. To cut through the long philosophical debate about exactly how to define thinking he proposed the "imitation game" (1950), now known as Turing test. His test consisted of a person asking questions via keyboard to both a person and an intelligent machine within a fixed time frame. After a series of tests the computers success at "thinking" could be measured by its probability of being misidentified as the human subject. Still today Turing's papers on the subject are widely acknowledged as the foundation of research in artificial intelligence.

TEXTBLOCK 4/21 // URL: http://world-information.org/wio/infostructure/100437611663/100438659354
 
Basics: Rights Recognized

Copyright protection generally means that certain uses of a work are lawful only if they are done with the authorization of the owner of the copyright. The most typical are the following:

- copying or reproducing a work
- performing a work in public
- making a sound recording of a work
- making a motion picture of a work
- broadcasting a work
- translating a work
- adapting a work

Under certain national laws, some of these rights, which are referred to, as "economic rights'" are not exclusive rights of authorization but in specific cases, merely rights to remuneration. Some strictly determined uses (for example quotations or the use of works by way of illustration for teaching) are completely free, that is, they require neither authorization of, nor remuneration for, the owner of the copyright. This practice is described as fair use.

In addition to economic rights, authors enjoy "moral rights" on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. They also have the right to oppose the mutilation or deformation of their creations.

The owner of a copyright may usually transfer his right or may license certain uses of his work. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.

Furthermore there exist rights related to copyright that are referred to as "neighboring rights". In general there are three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

TEXTBLOCK 5/21 // URL: http://world-information.org/wio/infostructure/100437611725/100438659584
 
The Romans

The Romans can be called the great inventors of myths with the purpose of propaganda. Think of Caesar, Augustus or Nero. Caesar wrote his war-documentation by using incredible (e.g. the numbers of hostile soldiers) but he also emphasized the barbarity of the foe, creating images of hatred. People back at home had to believe these manipulative stories.
Or Augustus: he reunited the Roman Empire; part of his power was due to huge efforts in propaganda, visible e.g. in the mass of coins showing his face, being sent all over the empire. He understood very well, that different cultures used different symbols - and he used them for his propaganda.
Politically the Roman army was an important factor. Propaganda in that case was used for the soldiers on the one hand, but on the other hand also for demonstrating the power of the army to the people, so they could trust in its strength. Even then security was an essential factor of politics. As long as the army functioned, the Roman Empire did as well (Taylor, Munitions of the Mind, p. 48).

TEXTBLOCK 6/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658320
 
The history of propaganda

Thinking of propaganda some politicians' names are at once remembered, like Caesar, Napoleon, Adolf Hitler, Joseph Stalin or Saddam Hussein.
The history of propaganda has to tell then merely mentioning those names:

TEXTBLOCK 7/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658185
 
Key Recovery Systems

As stated before the sense of cryptography is a properly designed cryptosystem making it essentially impossible to recover encrypted data without any knowledge of the used key. The issue of lost keys and the being-locked-out from one's own data as a consequence favors key recovery systems. On the other hand the counter argument is confidentiality: as soon as a possibility to recover a key is provided, the chances for abuses grow.
Finally it is the state that does not want to provide too much secrecy. On the contrary. During the last 20 years endless discussions about the state's necessity and right to restrict private cryptography have taken place, as the governments rarely care for the benefit of private users if they believe in catching essential informations about any kind of enemy, hence looking for unrestricted access to all keys.

The list of "key recovery," "key escrow," and "trusted third-party" as encryption requirements, suggested by governmental agencies, covers all the latest developments and inventions in digital technology.
At the same time the NSA, one of the world's most advanced and most secret enterprises for cryptography, worked hard in getting laws through to forbid the private use of strong encryption in one way or the other. Still, it is also organizations like this one that have to admit that key recovery systems are not without any weaknesses, as the U.S. Escrowed Encryption Standard, the basis for the famous and controversially discussed Clipper Chip, showed. The reason for those weaknesses is the high complexity of those systems.

Another aspect is that key recovery systems are more expensive and certainly much less secure than other systems. So, why should anyone use them?

In that context, one has to understand the legal framework for the use of cryptography, a strict framework in fact, being in high contradiction to the globalised flow of communication.

TEXTBLOCK 8/21 // URL: http://world-information.org/wio/infostructure/100437611776/100438659037
 
Cartoons

Cartoons' technique is simplicity.
Images are easier to remember than texts.
Frequently they show jokes about politicians, friendly or against the person shown. In the first decades of this century, cartoons were also used for propaganda against artists; remember the famous cartoons of Oscar Wilde being portrayed as a criminal, aiming to destroy his popularity.
As a tool in politics it had fatal consequences by determining stereotypes, which never again could be erased even if detected as pure disinformation. Most famous got the cartoons about Jews, which were not only distributed by Germans and Austrians but all over Europe; and already in the tens and twenties of our century. Most horrifying is the fact that many of those old, fascist and racist cartoons are coming back now, in slightly different design only.

TEXTBLOCK 9/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658509
 
Face recognition

In order to be able to recognize a person, one commonly looks at this persons face, for it is there where the visual features which distinguish one person from another are concentrated. Eyes in particular seem to tell a story not only about who somebody is, but also about how that persons feel, where his / her attention is directed, etc. People who do not want to show who they are or what is going on inside of them must mask themselves. Consequently, face recognition is a kind of electronic unmasking.

"Real" face-to-face communication is a two-way process. Looking at somebody's face means exposing ones own face and allowing the other to look at oneself. It is a mutual process which is only suspended in extraordinary and voyeuristic situations. Looking at somebody without being looked at places the person who is visually exposed in a vulnerable position vis-à-vis the watcher.

In face recognition this extraordinary situation is normal. Looking at the machine, you only see yourself looking at the machine. Face biometrics are extracted anonymously and painlessly by a mask without a face.

Therefore the resistance against the mass appropriation of biometrical data through surveillance cameras is confronted with particular difficulties. The surveillance structure is largely invisible, it is not evident what the function of a particular camera is, nor whether it is connected to a face recognition system.

In a protest action against the face recognition specialist Visionics, the Surveillance Camera Players therefor adopted the strategy of re-masking: in front of the cameras, they perfomed the play "The Masque of the Red Death" an adaption of Edgar Allen Poe's classic short story by Art Toad.

According to Visionics, whose slogan is "enabling technology with a mass appeal", there are alrady 1.1 bn digitised face images stored on identification data banks world wide. When combined with wide area surveillance camera networks, face recognition is capable of creating a transparent social space that can be controlled by a depersonalised, undetected and unaccountable centre. It is a technology, of which the surveillance engeneers of sunken totalitarian regimes may have dreamt, and one that today is being adopted by democratic governments.

TEXTBLOCK 10/21 // URL: http://world-information.org/wio/infostructure/100437611729/100438658118
 
1980s: Artificial Intelligence (AI) - From Lab to Life

Following the commercial success of expert systems, which started in the 1970s, also other AI technologies began to make their way into the marketplace. In 1986, U.S. sales of AI-related hardware and software rose to U.S.$ 425 million. Especially expert systems, because of their efficiency, were still in demand. Yet also other fields of AI turned out to be successful in the corporate world.

Machine vision systems for example were used for the cameras and computers on assembly lines to perform quality control. By 1985 over a hundred companies offered machine vision systems in the U.S., and sales totaled U.S.$ 80 million. Although there was a breakdown in the market for AI-systems in 1986 - 1987, which led to a cut back in funding, the industry slowly recovered.

New technologies were being invented in Japan. Fuzzy logic pioneered in the U.S. and also neural networks were being reconsidered for achieving artificial intelligence. The probably most important development of the 1980s was, that it showed that AI technology had real life uses. AI applications like voice and character recognition systems or steadying camcorders using fuzzy logic were not only made available to business and industry, but also to the average customer.

TEXTBLOCK 11/21 // URL: http://world-information.org/wio/infostructure/100437611663/100438659445
 
New Forms of Propaganda (in the 19th Century)

As soon as governments found out that newspapers were a fantastic and very often unsuspicious medium for supporting propaganda they tried to pull them to their side.
Two ways existed:
a) to have one's own newspaper, which implies that mostly friends of the government read it. Nothing is regarded as something neutral.
b) to keep a good relationship to the most powerful/most frequently read newspapers and then try to make one's opinion theirs.
Today mostly elected is b), trying to set up alliances. CNN and the USA during the Gulf War demonstrated an example of that.

TEXTBLOCK 12/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658170
 
Biometric technologies

In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" (http://www.icsa.net/services/consortia/cbdc/bg/introduction.shtml); biometrics is the study and application of such measurable characteristics. In IT environments, biometrics are categorised as "security" technologies meant to limit access to information, places and other resources to a specific group of people.

All biometric technologies are made up of the same basic processes:

1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question.

2. At every new identification, a second sample is collected and its identity with the first one is examined.

3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is.

This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body.

TEXTBLOCK 13/21 // URL: http://world-information.org/wio/infostructure/100437611729/100438658188
 
Disinformation and Science

Disinformation's tools emerged from science and art.
And furthermore: disinformation can happen in politics of course, but also in science:
for example by launching ideas which have not been proven exactly until the moment of publication. e.g. the thought that time runs backwards in parts of the universe:
http://www.newscientist.com/ns/19991127/newsstory3.html

TEXTBLOCK 14/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658699
 
Disinformation - A Definition

First of all disinformation can be explained as something that has to do with fears: it frightens us by taking away our individuality, as disinformation is not done for one single person. It is a manipulation; a manipulation the influenced persons did not ask for.

Disinformation is never the launching of one single information/message. Several - and in most cases many - different pieces make up a puzzle of deception. One single message can be called true or false, but only the combination of several and more informations makes up a system that has the power to influence opinions.
The purpose is what produces the disinformation, whereas a wrong information (even as a number of wrong informations) happening by accident represents simply a false information.
The person or group presenting a disinformation knows very well what he/it is doing. The aim is that the person who receives the disinformation gets influenced into a certain and well-planned direction. Therefore the wrong information has to reach the unconscious part of the mind, has to be integrated into personal thoughts.
A good way to reach that goal is to use a commonly known information, something familiar to reach the confidence of the recipient. The best is to use a quasi neutral message. Afterwards the real disinformation is woven into that other information. The mixture between truth, half-truth and lie is the most adequate method to get a disinformation into people's minds.
The knowledge about how to use material and how to slightly change it until the statement turns against someone or some idea, is a type of art to cope with words.

TEXTBLOCK 15/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658013
 
The "Corpse-Conversion Factory"-rumor

Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. (Taylor, Munitions of the Mind, p.180)

TEXTBLOCK 16/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658427
 
The North against the South?

"Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market."
(UNESCO, World Communication Report)

The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else.

Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left?

TEXTBLOCK 17/21 // URL: http://world-information.org/wio/infostructure/100437611730/100438659376
 
Iris recognition

Iris recognition relies upon the fact that every individuals retina has a unique structure. The iris landscape is composed of a corona, crypts, filaments, freckles, pits radial furrows and striatations. Iris scanning is considered a particularly accurate identification technology because the characteristics of the iris do not change during a persons lifetime, and because there are several hundred variables in an iris which can be measured. In addition, iris scanning is fast: it does not take longer than one or two seconds.

These are characteristics which have made iris scanning an attractive technology for high-security applications such as prison surveillance. Iris technology is also used for online identification where it can substitute identification by password. As in other biometric technologies, the use of iris scanning for the protection of privacy is a two-edged sword. The prevention of identity theft applies horizontally but not vertically, i.e. in so far as the data retrieval that accompanies identification and the data body which is created in the process has nothing to do with identity theft.

TEXTBLOCK 18/21 // URL: http://world-information.org/wio/infostructure/100437611729/100438658334
 
The Secret Behind

The secret behind all this is the conception that nothing bad could ever be referred to the own nation. All the bad words belong to the enemy, whereas the "we" is the good one, the one who never is the aggressor but always defender, the savior - not only for ones own sake but also for the others, even if they never asked for it, like the German population during World War I and II.
The spiritualization of such thinking leads to the point that it gets nearly impossible to believe that this could be un-true, a fake. To imagine injustice committed by the own nation gets more and more difficult, the longer the tactic of this kind of propaganda goes on. U.S.-Americans voluntarily believe in its politics, believing also the USA works as the police of the world, defending the morally good against those who just do not have reached the same level of civilization until today.
To keep up this image, the enemy must be portrayed ugly and bad, like in fairy-tales, black-and-white-pictures. Any connection between oneself and the enemy must be erased and made impossible. In the case of Slobodan Milosevic or Saddam Hussein this meant to delete the positive contact of the last years from the consciousness of the population. Both had received a high amount of money and material help as long as they kept to the rules of the Western game. Later, when the image of the friend/confederate was destroyed, the contact had to be denied. The media, who had reported that help, no longer seemed to remember and did not write anything about that strange change of mind. And if any did, they were not really listened to, because people tend to hear what they want to hear. And who would want to hear that high amounts of his taxes had formerly gone to "a man" (this personification of the war to one single man is the next disinformation) who now is the demon in one's mind.

All of this is no invention of several politicians. Huge think tanks and different governmental organizations are standing behind that. Part of their work is to hide their own work, or to deny it.

TEXTBLOCK 19/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658637
 
Movies as a Propaganda- and Disinformation-Tool in World War I and II

Movies produced in Hollywood in 1918/19 were mainly anti-German. They had some influence but the bigger effect was reached in World War II-movies.
The first propaganda movie of World War II was British.
At that time all films had to pass censoring. Most beloved were entertaining movies with propaganda messages. The enemy was shown as a beast, an animal-like creature, a brutal person without soul and as an idiot. Whereas the own people were the heroes. That was the new form of atrocity.
Leni Riefenstahl was a genius in this respect. Her movies still have an incredible power, while the majority of the other movies of that time look ridiculous today. The combination of light and shadow, the dramatic music and the mass-scenes that resembled ballet, had its effect and political consequences. Some of the German movies of that period still are on the index.

U.S.-President Theodore Roosevelt considered movies the best propaganda-instrument, as they are more subtle than other tools.

In the late twenties, movies got more and more important, in the USSR, too, like Sergei Eisenstein demonstrated with his movies. Historic events were changed into symbolism, exactly the way propaganda should function. It was disinformation - but in its most artistic form, especially in comparison to most U.S.- and European movies of that time.

TEXTBLOCK 20/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658547
 
The Catholic Church

In the beginnings of Christianity most people were illiterate. Therefore the Bible had to be transformed into pictures and symbols; and not only the stories but also the moral duties of everybody. Images and legends of the Saints turned out as useful models for human behavior - easy to tell and easy to understand.
Later, when the crusades began, the Christian Church used propaganda against Muslims, creating pictures of evil, pagan and bloodcurdling people. While the knights and others were fighting abroad, people in Europe were told to pray for them. Daily life was connected to the crusades, also through money-collections - more for the cause of propaganda than for the need of money.
During the period of the Counter-Reformation Catholic propaganda no longer was against foreigners but turned against people at home - the Protestants; and against their publications/books, which got prohibited by starting the so-called index. By then both sides were using disinformation for black propaganda about the other side.

TEXTBLOCK 21/21 // URL: http://world-information.org/wio/infostructure/100437611661/100438658307
 
Computer programming language

A computer programming language is any of various languages for expressing a set of detailed instructions for a digital computer. Such a language consists of characters and rules for combining them into symbols and words.

INDEXCARD, 1/47
 
UNIVAC

Built by Remington Rand in 1951 the UNIVAC I (Universal Automatic Computer) was one of the first commercially available computers to take advantage of the development of the central processing unit (CPU). Both the U.S. Census bureau and General Electric owned UNIVACs. Speed: 1,905 operations per second; input/output: magnetic tape, unityper, printer; memory size: 1,000 12-digit words in delay line; technology: serial vacuum tubes, delay lines, magnetic tape; floor space: 943 cubic feet; cost: F.O.B. factory U.S.$ 750,000 plus U.S.$ 185,000 for a high speed printer.

INDEXCARD, 2/47
 
George Boole

b. Nov. 2, 1815, Lincoln, Lincolnshire, England
d. Dec. 8, 1864, Ballintemple, County Cork, Ireland

English mathematician who helped establish modern symbolic logic and whose algebra of logic, now called Boolean algebra, is basic to the design of digital computer circuits. One of the first Englishmen to write on logic, Boole pointed out the analogy between the algebraic symbols and those that can represent logical forms and syllogisms, showing how the symbols of quantity can be separated from those of operation. With Boole in 1847 and 1854 began the algebra of logic, or what is now called Boolean algebra. It is basically two-valued in that it involves a subdivision of objects into separate classes, each with a given property. Different classes can then be treated as to the presence or absence of the same property.


INDEXCARD, 3/47
 
Polybius Checkerboard


 

1

2

3

4

5

1

A

B

C

D

E

2

F

G

H

I

K

3

L

M

N

O

P

4

Q

R

S

T

U

5

V

W

X

Y

Z



It is a system, where letters get converted into numeric characters.
The numbers were not written down and sent but signaled with torches.

for example:
A=1-1
B=1-2
C=1-3
W=5-2

for more information see:
http://www.ftech.net/~monark/crypto/crypt/polybius.htm

http://www.ftech.net/~monark/crypto/crypt/pol...
INDEXCARD, 4/47
 
Technological measures

As laid down in the proposed EU Directive on copyright and related rights in the information society technological measures mean "... any technology, device, or component that, in the normal course of its operations, is designed to prevent or inhibit the infringement of any copyright..." The U.S. DMCA (Digital Millennium Copyright Act) divides technological measures in two categories: 1) measures that prevent unauthorized access to a copyrighted work, and 2) measures that prevent unauthorized copying of a copyrighted work. Also the making or selling of devices or services that can be used to circumvent either category of technological measures is prohibited under certain circumstances in the DMCA. Furthermore the 1996 WIPO Copyright Treaty states that the "... contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors..."

INDEXCARD, 5/47
 
Whitfield Diffie

Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and Martin Hellman developed public key cryptography, a system to send information without leaving it open to be read by everyone.

INDEXCARD, 6/47
 
Cisco, Inc.

Being the worldwide leader in networking for the Internet, Cisco Systems is one of the most prominent companies of the Internet industry.

http://www.cisco.com

INDEXCARD, 7/47
 
Gateway

A gateway is a computer supplying point-to-multipoint connections between computer networks.

INDEXCARD, 8/47
 
Barnes and Noble

Massive online retail bookstore housing more than a million titles. Includes a book recommendation "personalizer,", a comprehensive list of The New York Times bestsellers, a "live" community events calendar with a daily survey and several forums, "highlighted" books from 19 subject areas, browsable categories such as antiques, ethnic studies, and pop culture, Books in the News, and weekly features such as reviews, excerpts, recommendations, interviews, events, "roundups" of popular titles, and quizzes.

INDEXCARD, 9/47
 
Enigma

Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra.

INDEXCARD, 10/47
 
Core copyright industries

Those encompass the industries that create copyrighted works as their primary product. These industries include the motion picture industry (television, theatrical, and home video), the recording industry (records, tapes and CDs), the music publishing industry, the book, journal and newspaper publishing industry, and the computer software industry (including data processing, business applications and interactive entertainment software on all platforms), legitimate theater, advertising, and the radio, television and cable broadcasting industries.

INDEXCARD, 11/47
 
WIPO

The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights.

INDEXCARD, 12/47
 
Charles Babbage

b. December 26, 1791, London, England
d. October 18, 1871, London, England

English mathematician and inventor who is credited with having conceived the first automatic digital computer. The idea of mechanically calculating mathematical tables first came to Babbage in 1812 or 1813. Later he made a small calculator that could perform certain mathematical computations to eight decimals. During the mid-1830s Babbage developed plans for the so-called analytical engine, the forerunner of the modern digital computer. In this device he envisioned the capability of performing any arithmetical operation on the basis of instructions from punched cards, a memory unit in which to store numbers, sequential control, and most of the other basic elements of the present-day computer.

INDEXCARD, 13/47
 
Assembly line

An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in mass production operations. An assembly line is designed by determining the sequences of operations for manufacture of each product component as well as the final product. Each movement of material is made as simple and short as possible with no cross flow or backtracking. Work assignments, numbers of machines, and production rates are programmed so that all operations performed along the line are compatible.

INDEXCARD, 14/47
 
Friedrich Kittler, The History of Communication Media

In this essay, Friedrich Kittler, one of the world's leading media theorists and media historicist, offers a concise and fascinating history of communication technologies in general terms from its beginnings up to now, provoking new insights by showing interesting interdependencies.

http://www.ctheory.com/ga1.14.html

INDEXCARD, 15/47
 
VISA

Visa International's over 21,000 member financial institutions have made VISA one of the world's leading full-service payment network. Visa's products and services include Visa Classic card, Visa Gold card, Visa debit cards, Visa commercial cards and the Visa Global ATM Network. VISA operates in 300 countries and territories and also provides a large consumer payments processing system.

INDEXCARD, 16/47
 
RIPE

The RIPE Network Coordination Centre (RIPE NCC) is one of three Regional Internet

Registries (RIR), which exist in the world today, providing allocation and registration services which support the operation of the Internet globally, mainly the allocation of IP address space for Europe.

http://www.ripe.net

INDEXCARD, 17/47
 
Division of labor

The term refers to the separation of a work process into a number of tasks, with each task performed by a separate person or group of persons. It is most often applied to mass production systems, where it is one of the basic organizing principles of the assembly line. Breaking down work into simple, repetitive tasks eliminates unnecessary motion and limits the handling of tools and parts. The consequent reduction in production time and the ability to replace craftsmen with lower-paid, unskilled workers result in lower production costs and a less expensive final product. The Scottish economist Adam Smith saw in this splitting of tasks a key to economic progress by providing a cheaper and more efficient means of producing economic goods.

INDEXCARD, 18/47
 
FEED

http://www.feed.com/

http://www.feed.com/
INDEXCARD, 19/47
 
Kosov@

The "word" Kosov@ is a compromise between the Serb name KosovO and the Albanian KosovA. It is mostly used by international people who want to demonstrate a certain consciousness about the conflict including some sort of neutrality, believing that neither the one side nor the other (and maybe not even NATO) is totally right. Using the word Kosov@ is seen as a symbol of peace.

For more explanations (in German) see: http://www.zivildienst.at/kosov@.htm

http://www.zivildienst.at/kosov@.htm
INDEXCARD, 20/47
 
Network Information Center (NIC)

Network information centers are organizations responsible for registering and maintaining the domain names on the World Wide Web. Until competition in domain name registration was introduced, they were the only ones responsible. Most countries have their own network information center.

INDEXCARD, 21/47
 
Wide Application Protocol (WAP)

The WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat (IRC).

While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate.

Source: Whatis.com

INDEXCARD, 22/47
 
Clipper Chip

The Clipper Chip is a cryptographic device proposed by the U.S. government that purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone
would be used to encrypt data. The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA).

INDEXCARD, 23/47
 
William Frederick Friedman

Friedman is considered the father of U.S.-American cryptoanalysis - he also was the one to start using this term.

INDEXCARD, 24/47
 
Proprietary Network

Proprietary networks are computer networks with standards different to the ones proposed by the International Standardization Organization (ISO), the Open Systems Interconnection (OSI). Designed to conform to standards implemented by the manufacturer, compatibility to other network standards is not assured.

INDEXCARD, 25/47
 
CIM

To perform manufacturing firm's functions related to design and production the CAD/CAM technology, for computer-aided design and computer-aided manufacturing, was developed. Today it is widely recognized that the scope of computer applications must extend beyond design and production to include the business functions of the firm. The name given to this more comprehensive use of computers is computer-integrated manufacturing (CIM).

INDEXCARD, 26/47
 
German Bundeswehr

The German contribution to the Western defence system, apart from playing host and contributing to the continued presence of allied troops on its soil, takes the form of its combined arm of defence known as the Federal Armed Forces (Bundeswehr). Constituting the largest contingent of NATO troops in Europe, the armed forces are divided into an army, navy, and air force. From its inception it was envisioned as a "citizens' " defence force, decisively under civilian control through the Bundestag, and its officers and soldiers trained to be mindful of the role of the military in a democracy. Conscription for males is universal, the military liability beginning at 18 and ending at 45 years of age.

INDEXCARD, 27/47
 
Sperry

Formerly (1955 - 1979) Sperry Rand Corporation, American corporation that merged with the Burroughs Corporation in 1986 to form Unisys Corporation, a large computer manufacturer.

INDEXCARD, 28/47
 
Convergence, 2000-

Digital technologies are used to combine previously separated communication and media systems as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence".

Classical dichotomies as the one of computing and telephony and traditional categorisations no longer apply, because these new services no longer fit traditional categories.

INDEXCARD, 29/47
 
Expert system

Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.

INDEXCARD, 30/47
 
National Association of Securities Dealers Automated Quotation (NASDAQ)

Incepted in 1971, The NASDAQ Stock Market was the world's first electronic stock market and has since attracted many technology companies from countries all over the world, some of them as legendary as Apple, Inc. and Microsoft, Inc., e.g., to go public.
NASDAQ is the largest stock market in the world.
http://www.nasdaq.com

http://www.nasdaq.com/
INDEXCARD, 31/47
 
Aeneas Tacticus

Supposedly his real name was Aeneas of Stymphalus. He was a Greek military scientist and cryptographer. He invented an optical system for communication similar to a telegraph: the water-clocks.

INDEXCARD, 32/47
 
Edward L. Bernays

Born 1891 in Vienna, Bernays was one of the founders of modern public relations. An enigmatic character, he was a master of mise en scène with far-reaching contacts in the world of business and politics. The nephew of Sigmund Freund and related with Heinrich Heine, he was also among the first to pursue PR for governments and to produce pseudo-events. Bernays considered the manipulation of public opinion as an important element of mass democracies and was of the opinion that only through PR a society's order can be kept.

INDEXCARD, 33/47
 
Time Warner

The largest media and entertainment conglomerate in the world. The corporation resulted from the merger of the publisher Time Inc. and the media conglomerate Warner Communications Inc. in 1989. It acquired the Turner Broadcasting System, Inc. (TBS) in 1996. Time Warner Inc.'s products encompass magazines, hardcover books, comic books, recorded music, motion pictures, and broadcast and cable television programming and distribution. The company's headquarters are in New York City. In January 2000 Time Warner merged with AOL (America Online), which owns several online-services like Compuserve, Netscape and Netcenter in a US$ 243,3 billion deal.

INDEXCARD, 34/47
 
Alan Turing

b. June 23, 1912, London, England
d. June 7, 1954, Wilmslow, Cheshire

English mathematician and logician who pioneered in the field of computer theory and who contributed important logical analyses of computer processes. Many mathematicians in the first decades of the 20th century had attempted to eliminate all possible error from mathematics by establishing a formal, or purely algorithmic, procedure for establishing truth. The mathematician Kurt Gödel threw up an obstacle to this effort with his incompleteness theorem. Turing was motivated by Gödel's work to seek an algorithmic method of determining whether any given propositions were undecidable, with the ultimate goal of eliminating them from mathematics. Instead, he proved in his seminal paper "On Computable Numbers, with an Application to the Entscheidungsproblem [Decision Problem]" (1936) that there cannot exist any such universal method of determination and, hence, that mathematics will always contain undecidable propositions. During World War II he served with the Government Code and Cypher School, at Bletchley, Buckinghamshire, where he played a significant role in breaking the codes of the German "Enigma Machine". He also championed the theory that computers eventually could be constructed that would be capable of human thought, and he proposed the Turing test, to assess this capability. Turing's papers on the subject are widely acknowledged as the foundation of research in artificial intelligence. In 1952 Alan M. Turing committed suicide, probably because of the depressing medical treatment that he had been forced to undergo (in lieu of prison) to "cure" him of homosexuality.

INDEXCARD, 35/47
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 36/47
 
Boris Yeltsin

Boris Yeltsin was Russian President until the end of 1999. After many years of work for the Communist Party, he joined the Politburo in 1986. His sharp critique on Mikhail Gorbachev forced that one to resign. Yeltsin won the 1990 election into Russian presidency and quit the Communist Party. Quarrels with the Parliament could not destroy his popularity until the secession war with Chechnya. When the Russian economy collapsed in 1998, he dismissed his entire government. In the end the sick old man of Russian politics had lost all his popularity as a president and resigned for the benefit of his political son Vladimir Putin.

INDEXCARD, 37/47
 
Neighboring rights

Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

INDEXCARD, 38/47
 
David Kahn

David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography.

INDEXCARD, 39/47
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 40/47
 
Proxy Servers

A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that security, administrative control, and caching service can be ensured.

A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

Source: Whatis.com

INDEXCARD, 41/47
 
Internet Societal Task Force

The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Internet Architecture Board, the Internet Engineering Steering Group and the Internet Engineering Task Force.

Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation.

http://www.istf.isoc.org/

http://www.istf.isoc.org/
INDEXCARD, 42/47
 
Machine vision

A branch of artificial intelligence and image processing concerned with the identification of graphic patterns or images that involves both cognition and abstraction. In such a system, a device linked to a computer scans, senses, and transforms images into digital patterns, which in turn are compared with patterns stored in the computer's memory. The computer processes the incoming patterns in rapid succession, isolating relevant features, filtering out unwanted signals, and adding to its memory new patterns that deviate beyond a specified threshold from the old and are thus perceived as new entities.

INDEXCARD, 43/47
 
Cookie

A cookie is an information package assigned to a client program (mostly a Web browser) by a server. The cookie is saved on your hard disk and is sent back each time this server is accessed. The cookie can contain various information: preferences for site access, identifying authorized users, or tracking visits.

In online advertising, cookies serve the purpose of changing advertising banners between visits, or identifying a particular direct marketing strategy based on a user's preferences and responses.

Advertising banners can be permanently eliminated from the screen by filtering software as offered by Naviscope or Webwash

Cookies are usually stored in a separate file of the browser, and can be erased or permanently deactivated, although many web sites require cookies to be active.

http://www.naviscope.com/
http://www.webwash.com/
INDEXCARD, 44/47
 
Oscar Wilde

Oscar Flingal O'Flahertie Wills (1854-1900) is one of the best and most famous poets and novelists of England of his time. His satirical and amusing texts exposed the false moral of the Bourgeoisie publicly. Besides, his life as a dandy made him the leader of aesthetics in England, until he was sent to prison because of homosexuality. Afterwards he lived in Paris where he died lonely and nearly forgotten in a hotel in 1900. His poems, fairy tales, novels and dramas survived.

INDEXCARD, 45/47
 
DES

The U.S. Data Encryption Standard (= DES) is the most widely used encryption algorithm, especially used for protection of financial transactions. It was developed by IBM in 1971. It is a symmetric-key cryptosystem. The DES algorithm uses a 56-bit encryption key, meaning that there are 72,057,594,037,927,936 possible keys.

for more information see:
http://www.britannica.com/bcom/eb/article/3/0,5716,117763+5,00.html
http://www.cryptography.com/des/

http://www.britannica.com/bcom/eb/article/3/0...
http://www.cryptography.com/des/
INDEXCARD, 46/47
 
Vacuum tube

The first half of the 20th century was the era of the vacuum tube in electronics. This variety of electron tube permitted the development of radio broadcasting, long-distance telephony, television, and the first electronic digital computers. These early electronic computers were, in fact, the largest vacuum-tube systems ever built. Perhaps the best-known representative is the ENIAC (Electronic Numerical Integrator and Computer, completed in 1946).

INDEXCARD, 47/47