|
The Kosovo-Crisis During the Kosovo Crisis and during the war that followed, and probably also after it, all sides of the conflict were manipulating their people and others as well, whenever they could. Some of the propaganda shown on TV was as primitive as in World War II, others were subtler. This propaganda started by telling the history of the geographic point of discussion from the own point of view, it went on with the interpretation of the motives of the enemy and finally came to censorship, manipulation of the number of victims ( for more information see: Many journalists and scientists are still working to detect more propaganda and disinformation stories. An interesting detail about this war was that more people than ever before took their information about the war out of the internet. In part this had to do with the biased TV-reports on all sides. All parties put their ideas and perspectives in the net, so one could get an overview of the different thoughts and types of disinformation. One of the big lies of The Serbs were not better than Western governments and media, which worked together closely. Serb TV showed the bombed targets and compared persons like More: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Doubls Bind Messages Double bind messages are extremely effective. For example in Nicaragua the By the end of the 1980s the USA even paid Nicaraguans for voting other parties than the Sandinistas. El Salvador was a similar case. Again the guerrilla got demonized. The difference was the involvement of the Catholic Church, which was highly fought against by the ruling parties of El Salvador - and those again were financially and organizationally supported by the USA. The elections in the 1980s were more or less paid by the USA. U.S.-politicians were afraid El Salvador could end up being a second Cuba or Nicaragua. Every means was correct to fight this tendency, no matter what it cost. On the 21st of September 1996, the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Timeline 00 - 1600 AD 3rd cent. Leiden papyrus: medical information gets enciphered to stop abuses 8th cent. - Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi finds the solution for a Greek cryptogram by first of all finding out the plaintext behind the encryption, a method which never got out of date. Afterwards he writes a book on cryptography. - cipher alphabets for magicians are published 1250 the English monk Roger Bacon writes cipher-descriptions. At that time the art of enciphering was a popular game in monasteries 1379 Gabrieli di Lavinde develops the nomenclature-code for Clement VII (114); a code-system made out of ciphers and codes, which kept being irreplaceable until the 19th century 1392 (probably) the English poet Geoffrey Chaucer writes the book The Equatorie of the Planetis, which contains several passages in ciphers made out of letters, digits and symbols 1412 for the first time ciphers including different substitutions for each letter are developed (in Arabic) ~1467 invention of the "Captain Midnight Decoder Badge", the first polyalphabetic cipher (disk); the inventor, Leon Battista Alberti, also called the father of Western cryptography, uses his disk for enciphering and deciphering at the same time 15th/16th century nearly every state, especially England and France, has people working on en- and deciphering for them 1518 the first printed book on cryptology is written by the German monk Johannes Trithemius. He also changes the form of polyalphabetic cipher from disks into rectangulars 1533 the idea to take a pass-phrase as the key for polyalphabetic cipher is realized by Giovan Batista Belaso 1563 Giovanni Battista Porta suggests to use synonyms and misspellings to irritate cryptoanalysts 1585 Blaise de Vigenère has the idea to use former plaintexts or ciphertexts as new keys; he invents the 1587 Mary, Queen of Scots, is beheaded for the attempt to organize the murder of Queen Elisabeth I., whose agents find out about Mary's plans with the help of decryption 1588 the first book in shorthand is published | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Governmental Influence Agencies like the NSA are currently able to eavesdrop on anyone with few restrictions only - though other messages are spread by the NSA. Theoretically cryptography can make that difficult. Hence those agencies speak up for actions like introducing trapdoors to make it possible to get access to everybody's data. See the U.S. discussion about the Clipper Chip some years ago: While encryption offers us privacy for the transmission of data, we do not only wish to have it but also need it if we want to transport data which shall not be seen by anyone else but the recipient of our message. Given this, the governments and governmental institutions/organizations fear to lose control. Strict laws are the consequence. The often repeated rumor that the Internet was a sphere of illegality has been proven wrong. Some parts are controlled by law very clearly. One of them is cryptography. Prohibition of cryptography or at least its restriction are considered an appropriate tool against criminality. Or one should say: had been considered that. In the meantime also governmental institutions have to admit that those restrictions most of all work against the population instead against illegal actors. Therefore laws have been changed in many states during the last five years. Even the USA, the Master of cryptography-restriction, liberated its laws in December 1999 to be more open-minded now. for an insight into the discussion having gone on for years see: the final text of the new U.S. Encryption Regulations you will find under: an explanation of the regulations can be found under: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
ECHELON and COMSAT COMSAT Communications Satellite Cooperation Until this decade the U.S.-based Comsat, Intelsat and Inmarsat organizations, in fact, shared nearly all international satellite traffic. So it was easy for NSA to eavesdropping on all communications to and from the United states. Less than 60 miles from Sugar Grove COMSAT runs a station in Etam, West Virginia, where more than half of the commercial, international satellite communication entering and leaving the US each day pass by. COMSAT provides international communications solutions via the global, 19-satellite INTELSAT system and 4-satellite Inmarsat satellite systems . Through the INTELSAT system, COMSAT provides telecommunications, broadcast and digital networking services between the U.S. and the rest of the world. These services are used by Internet service providers, multinational corporations, telecommunications carriers and U.S. and foreign governments to extend their networks globally. Inmarsat satellites lie in geostationary orbit 22,223 miles (35,786 km) out in space. Each satellite covers up to one third of the Earth's surface and is strategically positioned above one of the four ocean regions. Calls are beamed up to the satellite and back down to Earth, where special gateway land earth stations re-route them through the appropriate local or international telephone network. COMSAT operates Earth Stations in each part of the world to route calls efficiently within each ocean region. Earth Stations are located in Santa Paula, California; Southbury, Connecticut; Ankara, Turkey; and Kuantan, Malaysia. Sugar Grove Naval Communications Facility, near Sugar Grove, WV, may intercept Pacific INTELSAT/COMSAT satellite communications traffic routed through the COMSAT ground station at Etam, WV. NSG station in Winter Harbor, Maine serves as an excellent platform from which to intercept signals to and from COMSATs Andover station, 125 miles to the west. On the Westcost, COMSATs northern groundstation is situated in Brewster, near to Yakima, so from the Yakima Research Station the Pacific INTELSAT communications traffic can be intercepted. The other west-coast station is in Jamesburg, California, not so far away from the Army Security Agency intercept station at Two Rock Ranch. The international communications network with its limited gateways will probably always be easier to monitor than the large domestic networks like in the US. But the use of microwave and domestic satellites is increasing, and the construction of land lines is decreasing. Sources: STOA Report by Duncan Campbell: Interception Capabilities 2000 James Bamford, The Puzzle Palace, Boston, Houghton Mifflin, 1982,p222-228 | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
some essential definitions some essential definitions in the field of cryptography are: - - - "Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break." (David Kahn) The variants of encryption systems are endless. For deciphering there exists always the same game of trial and error (first guessing the encryption method, then the code). A help to do so is pruning. Once, after a more or less long or short period a code/cipher breaks. Monoalphabetic ciphers can be broken easily and of course are no longer used today but for games. for further information on codes and ciphers etc. see: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Pressures and Attacks against Independent Content Providers: Serbia The independent Belgrade based FM radio-station B2-92, which from December 1996 on also broadcasts over the Internet, repeatedly has been the target of suppression and attacks by the Serbian government. B2-92 offices have been raided on numerous occasions and members of staff have been repeatedly harassed or arrested. In March 1999 the transmitter of radio B2-92 was confiscated yet again by the Serbian authorities and editor-in-chief, Veran Matic, was taken and held in custody at a police station. Ten days after the confiscation of B2-92's transmitter, Serbian police entered and sealed their offices. All members of staff were sent home and a new General Manager was appointed by Serbian officials. Although by closing B2-92, the Serbian regime may have succeeded in softening the voice of the independent content provider, with the distributive nature of the Internet and the international help of media activists, the regime will have little chance of silencing the entire flood of independent content coming out of former Yugoslavia. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Bandwagon To bandwagon is a form of persuasion by telling that one should do something as the others are doing the same thing. for more informations see: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet, Intranets, Extranets, and Virtual Private Networks With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term Cable TV networks and online services as Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Electronic Communications Networks as | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Legal Protection: WIPO (World Intellectual Property Organization) Presumably the major player in the field of international Information on WIPO administered agreements in the field of industrial property (Paris Convention for the Protection of Industrial Property (1883), Madrid Agreement Concerning the International Registration of Marks (1891) etc.) can be found on: Information on treaties concerning copyright and neighboring rights (Berne Convention for the Protection of Literary and Artistic Works (1886) etc.) is published on: The most recent multilateral agreement on copyright is the 1996 WIPO Copyright Treaty. Among other things it provides that computer programs are protected as literary works and also introduces the protection of databases, which "... by reason of the selection or arrangement of their content constitute intellectual creations." Furthermore the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Post-World-War II-period After World War II the importance of propaganda still increased, on the commercial level as well as on a political level, in the era of the Cold War. The propaganda institutions of the different countries wanted their people to think the right way, which meant, the national way. In the USA the McCarthy-era started, a totalitarian system in struggle against communism. Cold War brought the era of spies with it, which was the perfect tool of disinformation. But the topic as a movie-genre seems still popular today, as the unchanged success of James Bond-movies show. A huge net of propaganda was built up for threatening with the nuclear bomb: pretending that the enemy was even more dangerous than the effect of such a bomb. And later, after the fall of the Iron Curtain, disinformation found other fields of work, like the wars of the 1990s showed us. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Problems of Copyright Management and Control Technologies Profiling and Data Mining At their most basic Fair Use Through the widespread use of copyright management and control systems the balance of control could excessively be shifted in favor of the owners of Provisions concerning technological protection measures and fair use are stated in the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Linking and Framing: Cases Mormon Church v. Sandra and Jerald Tanner In a ruling of December 1999, a federal judge in Utah temporarily barred two critics of the Mormon Church from posting on their website the Internet addresses of other sites featuring pirated copies of a Mormon text. The Judge said that it was likely that Sandra and Jerald Tanner had engaged in contributory copyright infringement when they posted the addresses of three Web sites that they knew, or should have known, contained the copies. Kaplan, Carl S.: Universal Studios v. Movie-List The website Movie-List, which features links to online, externally hosted movie trailers has been asked to completely refrain from linking to any of Universal Studio's servers containing the trailers as this would infringe copyright. Cisneros, Oscar S.: Universal: Don't Link to Us. In: More cases concerned with the issue of linking, Ross, Alexandra: Copyright Law and the Internet: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Online data capturing Hardly a firm today can afford not to engage in electronic commerce if it does not want to be swept out of business by competitors. "Information is everything" has become something like the Lord's prayer of the New Economy. But how do you get information about your customer online? Who are the people who visit a website, where do they come from, what are they looking for? How much money do they have, what might they want to buy? These are key questions for a company doing electronic business. Obviously not all of this information can be obtained by monitoring the online behaviour of web users, but there are always little gimmicks that, when combined with common tracking technologies, can help to get more detailed information about a potential customer. These are usually online registration forms, either required for entry to a site, or competitions, sometimes a combination of the two. Obviously, if you want to win that weekend trip to New York, you want to provide your contact details. The most common way of obtaining information about a user online is a But cookies record enough information to fine-tune advertising strategies according to a user's preferences and interests, e.g. by displaying certain commercial banners rather than others. For example, if a user is found to respond to a banner of a particular kind, he / she may find two of them at the next visit. Customizing the offers on a website to the particular user is part of one-to-one marketing, a type of One-to-one marketing can create very different realities that undermine traditional concepts of demand and supply. The ideal is a "frictionless market", where the differential between demand and supply is progressively eliminated. If a market is considered a structure within which demand / supply differentials are negotiated, this amounts to the abolition of the established notion of the nature of a market. Demand and supply converge, desire and it fulfilment coincide. In the end, there is profit without labour. However, such a structure is a hermetic structure of unfreedom. It can only function when payment is substituted by credit, and the exploitation of work power by the exploitation of data. In fact, in modern economies there is great pressure to increase spending on credit. Using credit cards and taking up loans generates a lot of data around a person's economic behaviour, while at the same restricting the scope of social activity and increasing dependence. On the global level, the consequences of credit spirals can be observed in many of the developing countries that have had to abandon most of their political autonomy. As the data body economy advances, this is also the fate of people in western societies when they are structurally driven into credit spending. It shows that data bodies are not politically neutral. The interrelation between data, profit and unfreedom is frequently overlooked by citizens and customers. Any company in a modern economy will apply data collecting strategies for profit, with dependence and unfreedom as a "secondary effect". The hunger for data has made IT companies eager to profit from e-business rather resourceful. "Getting to know the customer" - this is a catchphrase that is heard frequently, and which suggests that there are no limits to what a company may want to about a customer. In large online shops, such as But there are more advanced and effective ways of identification. The German company Bu there are much less friendly ways of extracting data from a user and feeding the data body. Less friendly means: these methods monitor users in situations where the latter are likely not to want to be monitored. Monitoring therefore takes place in a concealed manner. One of these monitoring methods are so-called Bugs monitoring users have also been packaged in seemingly harmless toys made available on the Internet. For example, The cursor image technology relies on what is called a GUID (global unique identifier). This is an identification number which is assigned to a customer at the time of registration, or when downloading a product. Many among the online community were alarmed when in 1999 it was discovered that However, in the meantime, another possible infringement on user anonymity by Microsoft was discovered, when it as found out that MS Office documents, such as Word, Excel or Powerpoint, contain a bug that is capable of tracking the documents as they are sent through the net. The bug sends information about the user who opens the document back to the originating server. A document that contains the bug can be tracked across the globe, through thousands of stopovers. In detailed description of the bug and how it works can be found at the Of course there are many other ways of collecting users' data and creating appropriating data bodies which can then be used for economic purposes. Indeed, as Bill Gates commented, "information is the lifeblood of business". The electronic information networks are becoming the new frontier of capitalism. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Transparent customers. Direct marketing online This process works even better on the Internet because of the latter's interactive nature. "The Internet is a dream to direct marketers", said Wil Lansing, CEO of the American retailer Many web sites also are equipped with One frequent way of obtaining such personal information of a user is by offering free web mail accounts offered by a great many companies, internet providers and web portals (e.g. However, the intention of collecting users personal data and create consumer profiles based on online behaviour can also take on more creative and playful forms. One such example is The particular way in which sites such as sixdegrees.com and others are structured mean that not only to users provide initial information about them, but also that this information is constantly updated and therefore becomes even more valuable. Consequently, many free online services or web mail providers cancel a user's account if it has not been uses for some time. There are also other online services which offer free services in return for personal information which is then used for marketing purposes, e.g. Yahoo's A further way of collecting consumer data that has recently become popular is by offering free PCs. Users are provided with a PC for free or for very little money, and in return commit themselves to using certain services rather than others (e.g. a particular internet provider), providing information about themselves, and agree to have their online behaviour monitored by the company providing the PC, so that accurate user profiles can be compiled. For example, the A good inside view of the world of direct marketing can be gained at the website of the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Commercial vs. Independent Content: Power and Scope Regarding the dimension of their financial and human resources commercial media companies are at any rate much more powerful players than their independent counterparts. Still those reply with an extreme multiplicity and diversity. Today thousands of newsgroups, mailing-list and e-zines covering a wide range of issues from the environment to politics, social and human rights, culture, art and democracy are run by alternative groups. Moreover independent content provider have started to use digital media for communication, information and co-ordination long before they were discovered by corporate interest. They regularly use the Internet and other networks to further public discourse and put up civic resistance. And in many cases are very successful with their work, as initiatives like widerst@ndMUND's (AT) co-ordination of the critics of the participation of the Freedom Party in the Austrian government via mailing-lists, an online-magazine and discussion forums, show. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Invention According to the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
ARPAnet ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute. But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972. Before it was decommissioned in 1990, In the USA commercial users already outnumbered military and academic users in 1994. Despite the rapid growth of the Net, most computers linked to it are still located in the United States. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Apple Founded by Steve Jobs and Steve Wozniak and headquartered in Cupertino, USA, Apple Computer was the first commercially successful personal computer company. In 1978 Wozniak invented the first personal computer, the Apple II. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/6/0,5716,115726+1+108787,00.html | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
World Wide Web (WWW) Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes According to the Internet domain survey of the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
cryptology also called "the study of code". It includes both, cryptography and cryptoanalysis | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
MIT The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Microsoft Corporation Founded by Bill Gates and Paul Allen and headquartered in Redmond, USA, Microsoft Corporation is today's world-leading developer of personal-computer software systems and applications. As MS-DOS, the first operating system released by Microsoft, before, Windows, its successor, has become the de-facto standard operating system for personal computer. According to critics and following a recent court ruling this is due to unfair competition. For more detailed information see the Encyclopaedia Britannica: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Telephone The telephone was not invented by Alexander Graham Bell, as is widely held to be true, but by Philipp Reiss, a German teacher. When he demonstrated his invention to important German professors in 1861, it was not enthusiastically greeted. Because of this dismissal, no financial support for further development was provided to him. And here Bell comes in: In 1876 he successfully filed a patent for the telephone. Soon afterwards he established the first telephone company. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
SOA The U.S.-Army School of Americas (= SOA) is based in Fort Benning (Georgia); it trains Latin American and U.S. soldiers in the working-field of counter-insurgency. Some of the nearly 60.000 SOA-Graduates have been responsible for many of the worst human rights abuses and crimes in Latin America. The list of famous dictators and murderers who went through the education of that institution is tremendous. In 1996 the U.S.-Government that always tried to deny the tasks of SOA, had to admit its work - but never closed it. For more information see the website of | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Satellites Communications satellites are relay stations for radio signals and provide reliable and distance-independent high-speed connections even at remote locations without high-bandwidth infrastructure. On point-to-point transmission, the transmission method originally employed on, satellites face increasing competition from In the future, satellites will become stronger, cheaper and their orbits will be lower; their services might become as common as satellite TV is today. For more information about satellites, see How Satellites Work ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet Research Task Force Being itself under the umbrella of the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet Architecture Board On behalf of the Internet Society: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
David Kahn David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet Societal Task Force The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Mark A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Neural network A bottom-up | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
cryptoanalysis the study of breaking others' codes to transform a message back into a legible form without knowing the key from the beginning | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
codes an algorithm for bringing a legible message into an illegible form. There has to exist some sort of code book to encode/decode it. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
plaintext the original, legible text | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Sputnik At the beginning of the story of today's global data networks is the story of the development of In 1955 President Eisenhower announced the USA's intention to launch a In the same year the USA launched their first Today's | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
ciphertext the enciphered/encoded and primarily illegible text | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Assembly line An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Vigenère tableau a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q R S T U V W X Y Z A B C D E F G H I J K L M N O P W X Y Z A B C D E F G H I J K L M N O P Q R S T U V S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z A B C D E F C H I J K L M N O P Q R S T U V W X Y source: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
COMECON The Council for Mutual Economic Aid (COMECON) was set up in 1949 consisting of six East European countries: Bulgaria, Czechoslovakia, Hungary, Poland, Romania, and the USSR, followed later by the German Democratic Republic (1950), Mongolia (1962), Cuba (1972), and Vietnam (1978). Its aim was, to develop the member countries' economies on a complementary basis for the purpose of achieving self-sufficiency. In 1991, Comecon was replaced by the Organization for International Economic Cooperation. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Liability of ISPs ISPs (Internet Service Provider), BBSs (Bulletin Board Service Operators), systems operators and other service providers (in the U.S.) can usually be hold liable for infringing activities that take place through their facilities under three theories: 1) direct liability: to establish direct infringement liability there must be some kind of a direct volitional act, 2) contributory liability: a party may be liable for contributory infringement where "... with knowledge of the infringing activity, [it] induces, causes or materially contributes to the infringing activity of another." Therefore a person must know or have reason to know that the subject matter is copyrighted and that particular uses violated copyright law. There must be a direct infringement of which the contributory infringer has knowledge, and encourages or facilitates for contributory infringement to attach, and 3) vicarious liability: a party may be vicariously liable for the infringing acts of another if it a) has the right and ability to control the infringer's acts and b) receives a direct financial benefit from the infringement. Unlike contributory infringement, knowledge is not an element of vicarious liability. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
User tracking User tracking is a generic term that covers all the techniques of monitoring the movements of a user on a web site. User tracking has become an essential component in online commerce, where no personal contact to customers is established, leaving companies with the predicament of not knowing who they are talking to. Some companies, such as Whenever user tracking is performed without the explicit agreement of the user, or without laying open which data are collected and what is done with them, considerable | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||