World War I ... With World War I an entire system of ideas how wars work collapsed. Suddenly it was no longer mostly soldiers who had to fight. War became an engagement of every day's life. Everybody got involved. Propaganda therefore changed as well. The campaigns were no longer temporarily and recent but had to be planned for years. Who failed in organizing it or used the wrong keywords failed. Masters of modern propaganda became the British, whereas the Germans failed completely in the beginning. |
|
The Catholic Church In the beginnings of Christianity most people were illiterate. Therefore the Bible had to be transformed into pictures and symbols; and not only the stories but also the moral duties of everybody. Images and legends of the Saints turned out as useful models for human behavior - easy to tell and easy to understand. Later, when the crusades began, the Christian Church used propaganda against Muslims, creating pictures of evil, pagan and bloodcurdling people. While the knights and others were fighting abroad, people in Europe were told to pray for them. Daily life was connected to the crusades, also through money-collections - more for the cause of propaganda than for the need of money. During the period of the Counter-Reformation Catholic propaganda no longer was against foreigners but turned against people at home - the Protestants; and against their publications/books, which got prohibited by starting the so-called index. By then both sides were using disinformation for |
|
The ancient Greek Disinformation was seen as an appropriate tool of politics and rhetoric in ancient Greece. Most of all persuasion was used, which then was considered a type of art. Religion was (and in many ways still is) the best disinformer or manipulator; prophecies were constructed to manipulate the population. The important thing was to use emotions and more than anything else fear as a tool for manipulation. If the oracle of Delphi said a war was to fight and would be won, then the Greek population - because of religious motives - was prepared to fight that war. Propaganda was not only used in wars but also in daily life to bring people together and create a nation. But poets, playwrights and other artists were manipulating as well. Their pieces of literature and plays were full of political messages with different ideologies behind. In the way how theatre at that time was part of life, it can be understood easily that those messages had not only entertainment's character but also a lot of political and social influence. A different and very famous part of disinformation in ancient Greek history was the story of |
|
The British Propaganda Campaign in World War I The British set up a unique system for propaganda, involving GB, the USA and all the colonies. Most different agencies and civilians worked together, the civilians not always knowing about the machinery behind. During the first years of the war the main goal was to achieve a U.S.-entry to the war on Britain's side of the battle. All propaganda was working on this, which meant to destroy Germany's reputation and create dark stereotypes about them, which was an easy task as the Germans were not only fatally unlucky but also very weak in propaganda. At the same time the U.S.-citizens' opinion about the war had to be influenced. The most promising way to do so was by starting with the men in power. One of the most beloved tools at that time was the use of atrocity stories; and most popular among the masses were cartoons, furthermore posters, an element perfectioned by the USSR in World War I and II, and movies. The particular thing was that British propaganda finally had an effect on the German population. Soldiers at the front and people at home received the disinformation messages, mostly pamphlets that had been dropped by aeroplanes or balloons. Together with the development of the fightings turning against the Germans this kind of propaganda was able to discourage the people and make the German government lose its power of propaganda. "Allied propaganda had caused a collapse of morale at home." ( After all this success it is hardly understandable that the British committed a huge error right after the war, an error that had bad consequences for the next war: being regarded as a tool of war and therefore regarded as inappropriate for times of peace, the propaganda institutions were closed. At about the same time similar ones were built up in Germany - first of all on paper, in |
|
The Post-World-War II-period After World War II the importance of propaganda still increased, on the commercial level as well as on a political level, in the era of the Cold War. The propaganda institutions of the different countries wanted their people to think the right way, which meant, the national way. In the USA the McCarthy-era started, a totalitarian system in struggle against communism. Cold War brought the era of spies with it, which was the perfect tool of disinformation. But the topic as a movie-genre seems still popular today, as the unchanged success of James Bond-movies show. A huge net of propaganda was built up for threatening with the nuclear bomb: pretending that the enemy was even more dangerous than the effect of such a bomb. And later, after the fall of the Iron Curtain, disinformation found other fields of work, like the wars of the 1990s showed us. |
|
Association for Progressive Communication (APC) The APC is a global federation of 24 non-profit Internet providers serving over 50,000 NGOs in 133 countries. Since 1990, APC has been supporting people and organizations worldwide, working together online for social, environmental and economic justice. The APC's network of members and partners spans the globe, with significant presence in Central and Eastern Europe, Africa, Asia and Latin America. History Between 1982 and 1987 several independent, national, non-profit computer networks emerged as viable information and communication resources for activists and NGOs. The networks were founded to make new communication techniques available to movements working for social change. In 1987, people at GreenNet in England began collaborating with their counterparts at the Institute for Global Communications (IGC) in the United States. These two networks started sharing electronic conference material and demonstrated that transnational electronic communications could serve international as well as domestic communities working for peace, human rights and the environment. This innovation proved so successful that by late 1989, networks in Sweden, Canada, Brazil, Nicaragua and Australia were exchanging information with each other and with IGC and GreenNet. In the spring of 1990, these seven organizations founded the Association for Progressive communications to co-ordinate the operation and development of this emerging global network of networks. Strategies and Policies The APC defends and promotes non-commercial, productive online space for NGOs and collaborates with like-minded organizations to ensure that the information and communication needs of civil society are considered in telecommunications, donor and investment policy. The APC is committed to freedom of expression and exchange of information on the Internet. The APC helps to build capacity between existing and emerging communication service providers. The APC Women's Networking Support Program promotes gender-aware Internet design, implementation and use. Through its African members, the APC is trying to strengthen indigenous information sharing and independent networking capacity on the continent. Members of APC develop Internet products, resources and tools to meet the advocacy, collaboration and information publishing and management needs of civil society. Recent APC initiatives have included the APC Toolkit Project: Online Publishing and Collaboration for Activists and the Mission-Driven Business Planning Toolkit. The APC also runs special projects like the Beijing+5, which shall enable non-governmental organizations to actively participate in the review of the Beijing Platform for Action. |
|
The "Corpse-Conversion Factory"-rumor Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. ( |
|
1940s - Early 1950s: First Generation Computers Probably the most important contributor concerning the theoretical basis for the digital computers that were developed in the 1940s was The onset of the Second World War led to an increased funding for computer projects, which hastened technical progress, as governments sought to develop computers to exploit their potential strategic importance. By 1941 the German engineer Konrad Zuse had developed a computer, the Z3, to design airplanes and missiles. Two years later the British completed a secret code-breaking computer called Colossus to Also spurred by the war the Electronic Numerical Integrator and Computer (ENIAC), a general-purpose computer, was produced by a partnership between the U.S. government and the University of Pennsylvania (1943). Consisting of 18.000 Concepts in computer design that remained central to computer engineering for the next 40 years were developed by the Hungarian-American mathematician Characteristic for first generation computers was the fact, that instructions were made-to-order for the specific task for which the computer was to be used. Each computer had a different |
|
Introduction Political and economic agendas change. People leave, get exchanged. Whereas one of the things that never seem to change is disinformation. Watching different kinds of cultures and regimes throughout history you will always find disinformation. Its use is variable just like its tools. First of all it does not necessarily need words. It is possible to disinform in any kind of language (sounds, symbols, letters or with the help of the body). As it seems to have come into existence together with human communication, we need not even hope that it will disappear once in a while. One could rather say: disinformation has always been there. Instead of hoping to stop it we need to learn to live with it, detect it, restore it to consciousness. Even this will not be any insurance for not walking into the trap. It is an attempt, nothing else. For detecting disinformation one needs to know what types of disinformation are possible and how they work. This site gives you some ideas about the history, tendencies and different types of disinformation, with the restriction that it will mostly be about the Western types of disinformation, as it is still harder to understand the media of disinformation in other cultures; and anyhow, many methods and tools run parallel in different cultures. |
|
Late 1970s - Present: Fourth Generation Computers Following the invention of the first Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used. Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. |
|
The Gulf War By the end of our century a new method of disinformation is gaining importance: disinformation by an overflow of information. In the Gulf War, similar to the Vietnam War, journalists had little chance to report neutrally and correctly from the battlefields. Many times they staid in places far from the actual fightings - due to censorship. In many ways the so-called video-war reminded of a series of commercials. No wonder, the Gulf War was the first war to have a commercial advertisement agency to do the war-propaganda for the USA. They worked hard in preventing the government from a destiny like the one of the Vietnam War, when the war most of all was lost in the American homes because of anti-war propaganda. In an interview, And this is true for both sides: the baby milk plant: Western bombs had destroyed a chemical weapon factory - that's what they claimed. ( the life guard: In December 1990, the French newspaper Nouvel Observateur published the story of Karim Abdallah al-Jabouri, Saddam Hussein's Life Guard who had fled from Iraq right after Iraq's invasion in Kuwait. Soon afterwards he was in a French TV-show, where he told atrocity stories about the baby-incubator-story of Najirah On the 10th of October 1991 a young refugee, called Najirah, from Kuwait spoke in front of the U.S.-congress. With a lot of tears she told that she had been working in a Kuwaiti hospital, when Iraqi soldiers came in, tore the babies out of the incubators and let them die on the floor. The pictures of this declaration went around the world and were one of the reasons why the U.S.-population wanted an intervention. In 1992 the journalist R. MacArthur was able to proof that the presented witness had been the daughter of the Kuwait-ambassador in the USA and that she had not been in that hospital or in Kuwait at the mentioned time. By then the war was over and the manipulation of the population had taken place long ago. For reading about the U.S.-propaganda tools during that war, like surrender passes, balloons, fake banknotes, threats and many more visit: |
|
The Kosovo-Crisis During the Kosovo Crisis and during the war that followed, and probably also after it, all sides of the conflict were manipulating their people and others as well, whenever they could. Some of the propaganda shown on TV was as primitive as in World War II, others were subtler. This propaganda started by telling the history of the geographic point of discussion from the own point of view, it went on with the interpretation of the motives of the enemy and finally came to censorship, manipulation of the number of victims ( for more information see: Many journalists and scientists are still working to detect more propaganda and disinformation stories. An interesting detail about this war was that more people than ever before took their information about the war out of the internet. In part this had to do with the biased TV-reports on all sides. All parties put their ideas and perspectives in the net, so one could get an overview of the different thoughts and types of disinformation. One of the big lies of The Serbs were not better than Western governments and media, which worked together closely. Serb TV showed the bombed targets and compared persons like More: |
|
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: |
|
Introduction: The Substitution of Human Faculties with Technology: Computers and Robots With the development of modern computing, starting in the 1940s, the substitution of human abilities with technology obtained a new dimension. The focus shifted from the replacement of pure physical power to the substitution of mental faculties. Following the early 1980s personal computers started to attain widespread use in offices and quickly became indispensable tools for office workers. The development of powerful computers combined with progresses in |
|
Iris recognition Iris recognition relies upon the fact that every individuals retina has a unique structure. The iris landscape is composed of a corona, crypts, filaments, freckles, pits radial furrows and striatations. Iris scanning is considered a particularly accurate identification technology because the characteristics of the iris do not change during a persons lifetime, and because there are several hundred variables in an iris which can be measured. In addition, iris scanning is fast: it does not take longer than one or two seconds. These are characteristics which have made iris scanning an attractive technology for high-security applications such as prison surveillance. Iris technology is also used for online identification where it can substitute identification by password. As in other biometric technologies, the use of iris scanning for the protection of privacy is a two-edged sword. The prevention of identity theft applies horizontally but not vertically, i.e. in so far as the data retrieval that accompanies identification and the data body which is created in the process has nothing to do with identity theft. |
|
Disinformation - A Definition First of all disinformation can be explained as something that has to do with fears: it frightens us by taking away our individuality, as disinformation is not done for one single person. It is a manipulation; a manipulation the influenced persons did not ask for. Disinformation is never the launching of one single information/message. Several - and in most cases many - different pieces make up a puzzle of deception. One single message can be called true or false, but only the combination of several and more informations makes up a system that has the power to influence opinions. The purpose is what produces the disinformation, whereas a wrong information (even as a number of wrong informations) happening by accident represents simply a false information. The person or group presenting a disinformation knows very well what he/it is doing. The aim is that the person who receives the disinformation gets influenced into a certain and well-planned direction. Therefore the wrong information has to reach the unconscious part of the mind, has to be integrated into personal thoughts. A good way to reach that goal is to use a commonly known information, something familiar to reach the confidence of the recipient. The best is to use a quasi neutral message. Afterwards the real disinformation is woven into that other information. The mixture between truth, half-truth and lie is the most adequate method to get a disinformation into people's minds. The knowledge about how to use material and how to slightly change it until the statement turns against someone or some idea, is a type of art to cope with words. |
|
Advertising Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology. |
|
Media Giants Online The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes. Broadcasting ABC TV Network with 223 affiliated TV stations covering the entire U.S. ABC Radio Network, with 2,900 affiliated stations throughout the U.S. Owner of 9 VHF TV stations Owner of 11 AM and 10 FM stations Cable TV Systems and Channels/Networks 80 % of ESPN cable TV channel and ESPN International 50 % of Lifetime cable TV channel Internet/Interactive Disney Interactive - entertainment and educational computer software and video games, plus development of content for on-line services. Partnership with 3 phone companies to provide video programming and interactive services. ABC Online TV Production, Movies, Video, Music Disney Television Production studios and Walt Disney Pictures movie studio Buena Vista Television production company Buena Vista Home Video Miramax and Touchstone movie production companies Buena Vista Pictures Distribution and Buena Vista International, distributors for Disney and Touchstone movies Walt Disney Records, and Hollywood Records Publishing 6 daily newspapers About 40 weekly magazines, including: Discover, Women's Wear Daily, Los Angeles and Institutional Investor. Chilton Publications Guilford Publishing Co. Hitchcock Publishing Co. Theme Parks, Resorts, and Travel Disneyland Disney World and Disney World Resort Part owner of Disneyland-Paris and Tokyo Disneyland 12 resort hotels Disney Vacation Club Cruise Lines International TV, Film, and Broadcasting 50 % owner of Tele-München Fernseh GmbH & Co. 50 % owner of RTL Disney Fernseh GmbH & Co. 23 % owner of RTL 2 Fernseh GmbH & Co. 37,5 % owner of TM3 Fernseh GmbH & Co. 20-33 % stake in Eurosport network, Spanish Tesauro SA TV company, and Scandinavian Broadcasting System SA 20 % owner of TVA Other Over 500 Disney Stores, and licensing of Disney products The Mighty Ducks professional hockey team 25 % ownership of California Angels major league baseball team Business Connections with Other Media Companies Joint ventures, equity interests, or major arrangements with |
|
Late 1960s - Early 1970s: Third Generation Computers One of the most important advances in the development of computer hardware in the late 1960s and early 1970s was the invention of the Another type of computer developed at the time was the minicomputer. It profited from the progresses in microelectronics and was considerably smaller than the standard mainframe, but, for instance, powerful enough to control the instruments of an entire scientific laboratory. Furthermore |
|
The 2nd Chechnya-War In the summer of 1999 between 1.200 and 2.000 Muslim rebels from Chechnya fell into Dagestan. Rumors say that Russian soldiers closed their eyes pretending not to see anything. During the fightings that started soon, many persons got killed. The hole issue was blamed on Chechnya. At that time there were rumors that there would be heavy bombing in Moscow in September. And there was. Those two things together brought back the hatred against the Chechnya rebels. The 2nd War between Russia and the Muslim country began. While the first war was lost at home, because the Russians, especially mothers, did not understand why their sons should fight against Chechnya, this time the atmosphere was completely different. In the cities 85% and all over Russia 65% of the Russian population agreed with the war. This time the war was a national issue, a legitimate defense. The media emphasized this. Alexander Zilin, a journalist, found out that the truth was far from the one presented in the media: First of all there was no evidence that the Moscow-bombings were organized by Chechnyans. On the contrary it is more than probable that the crimes were organized by a governmental institution for national security. The disinformation was part of the strategy to make the population support another war with Chechnya. The media were part of the story, maybe without knowing. They kept on the government's and army's side, showing only special and patriotic parts of the war. For example the number of dead Russian soldiers was held back. The U.S.-behavior on this: The USA would like to intervene but they are afraid of ruining the weak relation to Russia. For years the main topic of U.S.-politics has been the struggle against terrorism. Now Russia pretends to be fighting terrorism. How could it be criticized for that? The reason for this war is rather cynical: it worked as a public relations-campaign for At the same time a propaganda-campaign against his rival Y. Primakov (98), formerly the most popular candidate, was spreading lies and bad rumors. Opinion-polls showed very fast that he had lost the elections because of this black propaganda, even before the elections took place. |
|
Disinformation and Science Disinformation's tools emerged from science and art. And furthermore: disinformation can happen in politics of course, but also in science: for example by launching ideas which have not been proven exactly until the moment of publication. e.g. the thought that time runs backwards in parts of the universe: |
|
Movies as a Propaganda- and Disinformation-Tool in World War I and II Movies produced in Hollywood in 1918/19 were mainly anti-German. They had some influence but the bigger effect was reached in World War II-movies. The first propaganda movie of World War II was British. At that time all films had to pass censoring. Most beloved were entertaining movies with propaganda messages. The enemy was shown as a beast, an animal-like creature, a brutal person without soul and as an idiot. Whereas the own people were the heroes. That was the new form of atrocity. U.S.-President In the late twenties, movies got more and more important, in the USSR, too, like |
|
Economic structure; digital euphoria The dream of a conflict-free capitalism appeals to a diverse audience. No politician can win elections without eulogising the benefits of the information society and promising universal wealth through informatisation. "Europe must not lose track and should be able to make the step into the new knowledge and information society in the 21st century", said Tony Blair. The US government has declared the construction of a fast information infrastructure network the centerpiece of its economic policies In Lisbon the EU heads of state agreed to accelerate the informatisation of the European economies The German Chancellor Schröder has requested the industry to create 20,000 new informatics jobs. The World Bank understands information as the principal tool for third world development Electronic classrooms and on-line learning schemes are seen as the ultimate advance in education by politicians and industry leaders alike. But in the informatised economies, traditional exploitative practices are obscured by the glamour of new technologies. And the nearly universal acceptance of the ICT message has prepared the ground for a revival of 19th century "adapt-or-perish" ideology. "There is nothing more relentlessly ideological than the apparently anti-ideological rhetoric of information technology" (Arthur and Marilouise Kroker, media theorists) |
|
The Right to get Disinformed Disinformation might also be welcome: While the ones criticize disinformation and try to fight against it, others do nothing against it. And others again seem to enjoy getting disinformed. How this works? It is the result of a society that does no longer want to live under the pressure of doing and hearing everything at the same time. Acceleration of life seems too fast. The only way to get out is to refuse certain things/messages/truths. Receiving disinformation can be more comfortable than getting so-called correct information. This is especially true for the readers of the yellow press. The yellow press lives on that perspective, the commodity of getting light news, mostly wrong news and lies - but those being wrapped up in nice pictures and stories about those who seem to reign the world. The aim is the escape out of reality. A surplus of information, information terror, can produce disinformation. The profusion can get exploited for disinformation. This works in that way that in the mass of information the individual has no possibility to get an overview of the different ways of thinking and to reach a stage of objective knowledge. |
|
Netiquette Although referred to as a single body of rules, there is not just one Netiquette, but there are several, though overlapping largely. Proposing general guidelines for posting messages to newsgroups and mailing lists and using the Well-known Netiquettes are the |
|
Fiber-optic cable networks Fiber-optic cable networks may become the dominant method for high-speed Internet connections. Since the first fiber-optic cable was laid across the Atlantic in 1988, the demand for faster Internet connections is growing, fuelled by the growing network traffic, partly due to increasing implementation of corporate networks spanning the globe and to the use of graphics-heavy contents on the Fiber-optic cables have not much more in common with copper wires than the capacity to transmit information. As copper wires, they can be terrestrial and submarine connections, but they allow much higher transmission rates. Copper wires allow 32 telephone calls at the same time, but fiber-optic cable can carry 40,000 calls at the same time. A capacity, Copper wires will not come out of use in the foreseeable future because of technologies as For technical information from the Encyclopaedia Britannica on telecommunication cables, click An entertaining report of the laying of the FLAG submarine cable, up to now the longest fiber-optic cable on earth, including detailed background information on the cable industry and its history, Neal Stephenson has written for Wired: Mother Earth Mother Board. Click Susan Dumett has written a short history of undersea cables for Pretext magazine, Evolution of a Wired World. Click A timeline history of submarine cables and a detailed list of seemingly all submarine cables of the world, operational, planned and out of service, can be found on the Web site of the For maps of fiber-optic cable networks see the website of |
|
retouch The retouch is the simplest way to change a picture. Small corrections can be made through this way. A well-known example is the correction of a picture from a Bill Clinton-visit in Germany. In the background of the photograph stood some people, holding a sign with critical comments. In some newspapers the picture was printed like this, in others a retouch had erased the sign. Another example happened in Austria in 1999: The right wing party FPÖ had a poster for the Parliamentarian elections which said: 1999 reasons to vote for Haider. Others answered by producing a retouch saying: 1938 reasons to not vote for Haider (pointing to the year 1939, when the vast majority of the Austrians voted for the "Anschluss" to Germany). |
|
Newsgroups Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet. For more information, click here ( |
|
Black Propaganda Black propaganda does not tell its source. The recipient cannot find out the correct source. Rather would it be possible to get a wrong idea about the sender. It is very helpful for separating two allies. |
|
Noam Chomsky Noam Chomsky (* 1928) works as a U.S.-linguist, writer, political activist and journalist. He is teaching at the MIT (= Massachusetts Institute of Technology) as a professor of linguistics, specializing on structural grammar and the change of language through technology and economy - and the social results of that. When he stood up against the Vietnam War he became famous as a "radical leftist". Since then he has been one of the most famous critics of his country. |
|
Richard Barbrook and Andy Cameron, The Californian Ideology According to Barbrook and Cameron there is an emerging global orthodoxy concerning the relation between society, technology and politics. In this paper they are calling this orthodoxy the Californian Ideology in honor of the state where it originated. By naturalizing and giving a technological proof to a political philosophy, and therefore foreclosing on alternative futures, the Californian ideologues are able to assert that social and political debates about the future have now become meaningless and - horror of horrors - unfashionable. - This paper argues for an interactive future. http://www.wmin.ac.uk/media/HRC/ci/calif.html |
|
Colouring In November 1997, after the assassination of (above all Swiss) tourists in Egypt, the Swiss newspaper Blick showed a picture of the place where the attack had happened, with a tremendous pool of blood, to emphasize the cruelty of the Muslim terrorists. In other newspapers the same picture could be seen - with a pool of water, like in the original. Of course the manipulated coloured version of the Blick fit better into the mind of the shocked Swiss population. The question about death penalty arose quickly .... |
|
Enochian alphabet Also "Angelic" language. Archaic language alphabet composed of 21 letters, discovered by John Dee and his partner Edward Kelley. It has its own grammar and syntax, but only a small sample of it has ever been translated to English. |
|
Open Systems Interconnection (OSI) Open Systems Interconnection (OSI) is a standard reference model for communication between two end users in a network. It is used in developing products and understanding networks. Source: Whatis.com |
|
Leni Riefenstahl Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. |
|
Network Information Center (NIC) Network information centers are organizations responsible for registering and maintaining the domain names on the |
|
Medieval universities and copying of books The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|
Economic rights The economic rights (besides |
|
blowfish encryption algorithm Blowfish is a symmetric key block cipher that can vary its length. The idea behind is a simple design to make the system faster than others. |
|
PGP A |
|
International Standardization Organization ISO (International Organization for Standardization), founded in 1946, is a worldwide federation of national standards bodies from some 100 countries, one from each country. Among the standards it fosters is Source: Whatis.com |
|
Apple Founded by Steve Jobs and Steve Wozniak and headquartered in Cupertino, USA, Apple Computer was the first commercially successful personal computer company. In 1978 Wozniak invented the first personal computer, the Apple II. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/6/0,5716,115726+1+108787,00.html |
|
Telnet Telnet allows you to login remotely on a computer connected to the Internet. |
|
Leonard M. Adleman Leonard M. Adleman was one of three persons in a team to invent the |
|
Transistor A transistor is a solid-state device for amplifying, controlling, and generating electrical signals. Transistors are used in a wide array of electronic equipment, ranging from pocket |
|
AT&T AT&T Corporation provides voice, data and video communications services to large and small businesses, consumers and government entities. AT&T and its subsidiaries furnish domestic and international long distance, regional, local and wireless communications services, cable television and Internet communications services. AT&T also provides billing, directory and calling card services to support its communications business. AT&T's primary lines of business are business services, consumer services, broadband services and wireless services. In addition, AT&T's other lines of business include network management and professional services through AT&T Solutions and international operations and ventures. In June 2000, AT&T completed the acquisition of MediaOne Group. With the addition of MediaOne's 5 million cable subscribers, AT&T becomes the country's largest cable operator, with about 16 million customers on the systems it owns and operates, which pass nearly 28 million American homes. (source: Yahoo) Slogan: "It's all within your reach" Business indicators: Sales 1999: $ 62.391 bn (+ 17,2 % from 1998) Market capitalization: $ 104 bn Employees: 107,800 Corporate website: |
|
Boris Yeltsin Boris Yeltsin was Russian President until the end of 1999. After many years of work for the Communist Party, he joined the Politburo in 1986. His sharp critique on Mikhail Gorbachev forced that one to resign. Yeltsin won the 1990 election into Russian presidency and quit the Communist Party. Quarrels with the Parliament could not destroy his popularity until the secession war with Chechnya. When the Russian economy collapsed in 1998, he dismissed his entire government. In the end the sick old man of Russian politics had lost all his popularity as a president and resigned for the benefit of his political son Vladimir Putin. |
|
Extranet An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g. |
|
ARPAnet ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute. But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972. Before it was decommissioned in 1990, In the USA commercial users already outnumbered military and academic users in 1994. Despite the rapid growth of the Net, most computers linked to it are still located in the United States. |
|
John Dee b. July 13, 1527, London, England d. December 1608, Mortlake, Surrey English alchemist, astrologer, and mathematician who contributed greatly to the revival of interest in mathematics in England. After lecturing and studying on the European continent between 1547 and 1550, Dee returned to England in 1551 and was granted a pension by the government. He became astrologer to the queen, Mary Tudor, and shortly thereafter was imprisoned for being a magician but was released in 1555. Dee later toured Poland and Bohemia (1583-89), giving exhibitions of magic at the courts of various princes. He became warden of Manchester College in 1595. |
|
World Wide Web (WWW) Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes According to the Internet domain survey of the |
|
Europe Online Established in 1998 and privately held, Europe Online created and operates the world's largest broadband "Internet via the Sky" network. The Europe Online "Internet via the Sky" service is available to subscribers in English, French, German, Dutch and Danish with more languages to come. http://www.europeonline.com |
|
water-clocks The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message. |
|
Harold. D. Lasswell Harold. D. Lasswell (* 1902) studied at the London School of Economics. He then became a professor of social sciences at different Universities, like the University of Chicago, Columbia University, and Yale University. He also was a consultant for several governments. One of Lasswell's many famous works was Propaganda Technique in World War. In this he defines propaganda. He also discussed major objectives of propaganda, like to mobilize hatred against the enemy, to preserve the friendship of allies, to procure the co-operation of neutrals and to demoralize the enemy. |
|
William Frederick Friedman Friedman is considered the father of U.S.-American cryptoanalysis - he also was the one to start using this term. |
|
Operating system An operating system is software that controls the many different operations of a computer and directs and coordinates its processing of programs. It is a remarkably complex set of instructions that schedules the series of jobs (user applications) to be performed by the computer and allocates them to the computer's various hardware systems, such as the |
|
Chappe's fixed optical network Claude Chappe built a fixed optical network between Paris and Lille. Covering a distance of about 240kms, it consisted of fifteen towers with semaphores. Because this communication system was destined to practical military use, the transmitted messages were encoded. The messages were kept such secretly, even those who transmit them from tower to tower did not capture their meaning, they just transmitted codes they did not understand. Depending on weather conditions, messages could be sent at a speed of 2880 kms/hr at best. Forerunners of Chappe's optical network are the For more information on early communication networks see |
|
French laws against anonymity on the Net Since the end of June in France anonymous publishing - on the World Wide Web, in newsgroups, mailing lists or chat rooms - is prohibited. The use of pseudonyms, so popular in chat rooms, e.g., is not restricted, but the true identities of those who "publish" on the Net must be known to the users' Internet service and Internet content providers. Additionally, Internet providers are obliged to point out the possibility of blocking access to material to their customers and to offer them appropriate technology for blocking access. Loi sur la communication audiovisuelle, http://www.legalis.net/jnet/2000/loi-audio/projetloi-fin.htm Source: Florian Rötzer, Frankreich hat mit der Anonymität im internet Schluss gemacht, in: |
|
Montage Certain elements of two or more photographs can be put together, mixed, and the outcome is a new picture. Like this, people can appear in the same picture, even "sit at the same table" though they have never met in reality. |
|
Cisco, Inc. Being the worldwide leader in networking for the Internet, Cisco Systems is one of the most prominent companies of the Internet industry. http://www.cisco.com |
|