Advertising

Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology.

TEXTBLOCK 1/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658361
 
Virtual cartels; mergers

In parallel to the deregulation of markets, there has been a trend towards large-scale mergers which ridicules dreams of increased competition.

Recent mega-mergers and acquisitions include

SBC Communications - Ameritech, $ 72,3 bn

Bell Atlantic - GTE, $ 71,3

AT&T - Media One, $ 63,1

AOL - Time Warner, $ 165 bn

MCI Worldcom - Spring, $ 129 bn

The total value of all major mergers since the beginnings of the 1990s has been 20 trillion Dollars, 2,5 times the size of the USA's GIP.

The AOL- Time Warner reflects a trend which can be observed everywhere: the convergence of the ICT and the content industries. This represents the ultimate advance in complete market domination, and a alarming threat to independent content.

"Is TIME going to write something negative about AOL? Will AOL be able to offer anything other than CNN sources? Is the Net becoming as silly and unbearable as television?"

(Detlev Borchers, journalist)

TEXTBLOCK 2/27 // URL: http://world-information.org/wio/infostructure/100437611709/100438658959
 
Disinformation and Science

Disinformation's tools emerged from science and art.
And furthermore: disinformation can happen in politics of course, but also in science:
for example by launching ideas which have not been proven exactly until the moment of publication. e.g. the thought that time runs backwards in parts of the universe:
http://www.newscientist.com/ns/19991127/newsstory3.html

TEXTBLOCK 3/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658699
 
1500 - 1700 A.D.

1588
Agostino Ramelli's reading wheel

Agostino Ramelli designed a "reading wheel", which allowed browsing through a large number of documents without moving from one spot to another.

The device presented a large number of books - a small library - laid open on lecterns on a kind of ferry-wheel. It allowed skipping chapters and browsing through pages by turning the wheel to bring lectern after lectern before the eyes. Ramelli's reading wheel thus linked ideas and texts and reminds of today's browsing software used to navigate the World Wide Web.

1597
The first newspaper is printed in Europe.

TEXTBLOCK 4/27 // URL: http://world-information.org/wio/infostructure/100437611796/100438659704
 
Movies as a Propaganda- and Disinformation-Tool in World War I and II

Movies produced in Hollywood in 1918/19 were mainly anti-German. They had some influence but the bigger effect was reached in World War II-movies.
The first propaganda movie of World War II was British.
At that time all films had to pass censoring. Most beloved were entertaining movies with propaganda messages. The enemy was shown as a beast, an animal-like creature, a brutal person without soul and as an idiot. Whereas the own people were the heroes. That was the new form of atrocity.
Leni Riefenstahl was a genius in this respect. Her movies still have an incredible power, while the majority of the other movies of that time look ridiculous today. The combination of light and shadow, the dramatic music and the mass-scenes that resembled ballet, had its effect and political consequences. Some of the German movies of that period still are on the index.

U.S.-President Theodore Roosevelt considered movies the best propaganda-instrument, as they are more subtle than other tools.

In the late twenties, movies got more and more important, in the USSR, too, like Sergei Eisenstein demonstrated with his movies. Historic events were changed into symbolism, exactly the way propaganda should function. It was disinformation - but in its most artistic form, especially in comparison to most U.S.- and European movies of that time.

TEXTBLOCK 5/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658547
 
Biometric technologies

In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" (http://www.icsa.net/services/consortia/cbdc/bg/introduction.shtml); biometrics is the study and application of such measurable characteristics. In IT environments, biometrics are categorised as "security" technologies meant to limit access to information, places and other resources to a specific group of people.

All biometric technologies are made up of the same basic processes:

1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question.

2. At every new identification, a second sample is collected and its identity with the first one is examined.

3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is.

This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body.

TEXTBLOCK 6/27 // URL: http://world-information.org/wio/infostructure/100437611729/100438658188
 
Key Recovery Systems

As stated before the sense of cryptography is a properly designed cryptosystem making it essentially impossible to recover encrypted data without any knowledge of the used key. The issue of lost keys and the being-locked-out from one's own data as a consequence favors key recovery systems. On the other hand the counter argument is confidentiality: as soon as a possibility to recover a key is provided, the chances for abuses grow.
Finally it is the state that does not want to provide too much secrecy. On the contrary. During the last 20 years endless discussions about the state's necessity and right to restrict private cryptography have taken place, as the governments rarely care for the benefit of private users if they believe in catching essential informations about any kind of enemy, hence looking for unrestricted access to all keys.

The list of "key recovery," "key escrow," and "trusted third-party" as encryption requirements, suggested by governmental agencies, covers all the latest developments and inventions in digital technology.
At the same time the NSA, one of the world's most advanced and most secret enterprises for cryptography, worked hard in getting laws through to forbid the private use of strong encryption in one way or the other. Still, it is also organizations like this one that have to admit that key recovery systems are not without any weaknesses, as the U.S. Escrowed Encryption Standard, the basis for the famous and controversially discussed Clipper Chip, showed. The reason for those weaknesses is the high complexity of those systems.

Another aspect is that key recovery systems are more expensive and certainly much less secure than other systems. So, why should anyone use them?

In that context, one has to understand the legal framework for the use of cryptography, a strict framework in fact, being in high contradiction to the globalised flow of communication.

TEXTBLOCK 7/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438659037
 
Content as Transport Medium for Values and Ideologies

With the dissemination of their content commercial media are among other things also able to transport values and ideologies. Usually their programming reflects society's dominant social, political, ethical, cultural and economical values. A critical view of the prevalent ideologies often is sacrificed so as not to offend the existing political elites and corporate powers, but rather satisfy shareholders and advertisers.

With most of the worlds content produced by a few commercial media conglomerates, with the overwhelming majority of companies (in terms of revenue generation) concentrated in Europe, the U.S., Japan and Australia there is also a strong flow of content from the 'North-West' to the 'South-East'. Popular culture developed in the world's dominant commercial centers and Western values and ideologies are so disseminated into the most distant corners of the earth with far less coming back.

TEXTBLOCK 8/27 // URL: http://world-information.org/wio/infostructure/100437611795/100438659066
 
The "Corpse-Conversion Factory"-rumor

Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. (Taylor, Munitions of the Mind, p.180)

TEXTBLOCK 9/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658427
 
Racism on the Internet

The internet can be regarded as a mirror of the variety of interests, attitudes and needs of human kind. Propaganda and disinformation in that way have to be part of it, whether they struggle for something good or evil. But the classifications do no longer function.
During the last years the internet opened up a new source for racism as it can be difficult to find the person who gave a certain message into the net. The anarchy of the internet provides racists with a lot of possibilities to reach people which they do not possess in other media, for legal and other reasons.

In the 1980s racist groups used mailboxes to communicate on an international level; the first ones to do so were supposedly the Ku Klux Klan and mailboxes like the Aryan Nations Liberty Net. In the meantime those mailboxes can be found in the internet. In 1997 about 600 extreme right websites were in the net, the number is growing, most of them coming from the USA. The shocking element is not the number of racist pages, because still it is a very small number compared to the variety of millions of pages one can find in this media, it is the evidence of intentional disinformation, the language and the hatred that makes it dangerous.
A complete network of anti-racist organizations, including a high number of websites are fighting against racism. For example:

http://motlc.wiesenthal.com/text/x32/xr3257.html

http://www.aranet.org/

http://www.freespeech.org/waronracism/files/allies.htm
http://www.nsdapmuseum.com
http://www.globalissues.org/HumanRights/Racism.asp

TEXTBLOCK 10/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658620
 
Palm recognition

In palm recognition a 3-dimensional image of the hand is collected and compared to the stored sample. Palm recognition devices are cumbersome artefacts (unlike fingerprint and iris recognition devices) but can absorb perform a great amount of identification acts in a short time. They are therefore preferably installed in situations where a large number of people is identified, as in airports.

TEXTBLOCK 11/27 // URL: http://world-information.org/wio/infostructure/100437611729/100438658375
 
Iris recognition

Iris recognition relies upon the fact that every individuals retina has a unique structure. The iris landscape is composed of a corona, crypts, filaments, freckles, pits radial furrows and striatations. Iris scanning is considered a particularly accurate identification technology because the characteristics of the iris do not change during a persons lifetime, and because there are several hundred variables in an iris which can be measured. In addition, iris scanning is fast: it does not take longer than one or two seconds.

These are characteristics which have made iris scanning an attractive technology for high-security applications such as prison surveillance. Iris technology is also used for online identification where it can substitute identification by password. As in other biometric technologies, the use of iris scanning for the protection of privacy is a two-edged sword. The prevention of identity theft applies horizontally but not vertically, i.e. in so far as the data retrieval that accompanies identification and the data body which is created in the process has nothing to do with identity theft.

TEXTBLOCK 12/27 // URL: http://world-information.org/wio/infostructure/100437611729/100438658334
 
Public Relations and Propaganda

Public relations usually is associated with the influencing of public opinion. Therefore it has subsequently been linked with propaganda. Using one of the many definitions of propaganda "... the manipulation of symbols as a means of influencing attitudes on controversial matters" (Harold D. Lasswell), the terms propaganda and PR seem to be easily interchangeable.

Still many authors explicitly distinguish between public relations, advertising and propaganda. Unlike PR, which is often described as objective and extensive information of the public, advertising and propaganda are associated with manipulative activities. Nevertheless to treat public relations and propaganda as equivalents stands in the tradition of PR. Edward L. Bernays, one of the founders of public relations wrote "The only difference between propaganda and education, really, is the point of view. The advocacy of what we believe in is education. The advocacy of what we don't believe is propaganda."

Also institutions like the German Bundeswehr use the terms publics relations and propaganda synonymously. After a 1990 legislation of the former minister of defense Stoltenberg, the "psychological influence of the enemy" was ceased during peace time and the Academy for Psychological Defense renamed to Academy for Information and Communication, among other things responsible for scientific research in the field of public relations.

TEXTBLOCK 13/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658084
 
1940s - 1950s: The Development of Early Robotics Technology

During the 1940s and 1950s two major developments enabled the design of modern robots. Robotics generally is based on two related technologies: numerical control and teleoperators.

Numerical control was invented during the late 1940s and early 1950s. It is a method of controlling machine tool axes by means of numbers that have been coded on media. The first numerical control machine was presented in 1952 at the Massachusetts Institute of Technology (MIT), whose subsequent research led to the development of APT (Automatically Programmed Tools). APT, a language for programming machine tools, was designed for use in computer-assisted manufacturing (CAM).

First teleoperators were developed in the early 1940s. Teleoperators are mechanical manipulators which are controlled by a human from a remote location. In its typical application a human moves a mechanical arm and hand with its moves being duplicated at another location.

TEXTBLOCK 14/27 // URL: http://world-information.org/wio/infostructure/100437611663/100438659348
 
Who owns the Internet and who is in charge?

The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet.
The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g.
Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as communication protocols, e.g., cooperatively, so that compatibility of software is guaranteed. But they have no binding legal authority, nor can they enforce the standards they have agreed upon, nor are they wholly representative for the community of Internet users. The Internet has no official governing body or organization; most parts are still administered by volunteers.
Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Netiquette, are due to individual efforts and mostly just expressively stating the prevailing consent. Violations of accepted standards are fiercely rejected, as reactions to misbehavior in mailing lists and newsgroups prove daily.
Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed.
For a detailed report on Internet governance, click here.

TEXTBLOCK 15/27 // URL: http://world-information.org/wio/infostructure/100437611791/100438658447
 
Znet

ZNet provides forum facilities for online discussion and chatting on various topics ranging from culture and ecology to international relations and economics. ZNet also publishes daily commentaries and maintains a Web-zine, which addresses current news and events as well as many other topics, trying to be provocative, informative and inspiring to its readers.

Strategies and Policies

Daily Commentaries: Znet's commentaries address current news and events, cultural happenings, and organizing efforts, providing context, critique, vision, and analysis, but also references to or reviews of broader ideas, new books, activism, the Internet, and other topics that strike the diverse participating authors as worthy of attention.

Forum System: Znet provides a private (and soon also a public) forum system. The fora are among others concerned with topics such as: activism, cultural, community/race/religion/ethnicity, ecology, economics/class, gender/kinship/sexuality, government/polity, international relations, ParEcon, vision/strategy and popular culture. Each forum has a set of threaded discussions, also the fora hosted by commentary writers like Chomsky, Ehrenreich, Cagan, Peters and Wise.

ZNet Daily WebZine: ZNet Daily WebZine offers commentaries in web format.

Z Education Online (planned): The Z Education Online site will provide instructionals and courses of diverse types as well as other university-like, education-aimed features.

TEXTBLOCK 16/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659288
 
The Secret Behind

The secret behind all this is the conception that nothing bad could ever be referred to the own nation. All the bad words belong to the enemy, whereas the "we" is the good one, the one who never is the aggressor but always defender, the savior - not only for ones own sake but also for the others, even if they never asked for it, like the German population during World War I and II.
The spiritualization of such thinking leads to the point that it gets nearly impossible to believe that this could be un-true, a fake. To imagine injustice committed by the own nation gets more and more difficult, the longer the tactic of this kind of propaganda goes on. U.S.-Americans voluntarily believe in its politics, believing also the USA works as the police of the world, defending the morally good against those who just do not have reached the same level of civilization until today.
To keep up this image, the enemy must be portrayed ugly and bad, like in fairy-tales, black-and-white-pictures. Any connection between oneself and the enemy must be erased and made impossible. In the case of Slobodan Milosevic or Saddam Hussein this meant to delete the positive contact of the last years from the consciousness of the population. Both had received a high amount of money and material help as long as they kept to the rules of the Western game. Later, when the image of the friend/confederate was destroyed, the contact had to be denied. The media, who had reported that help, no longer seemed to remember and did not write anything about that strange change of mind. And if any did, they were not really listened to, because people tend to hear what they want to hear. And who would want to hear that high amounts of his taxes had formerly gone to "a man" (this personification of the war to one single man is the next disinformation) who now is the demon in one's mind.

All of this is no invention of several politicians. Huge think tanks and different governmental organizations are standing behind that. Part of their work is to hide their own work, or to deny it.

TEXTBLOCK 17/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658637
 
Face recognition

In order to be able to recognize a person, one commonly looks at this persons face, for it is there where the visual features which distinguish one person from another are concentrated. Eyes in particular seem to tell a story not only about who somebody is, but also about how that persons feel, where his / her attention is directed, etc. People who do not want to show who they are or what is going on inside of them must mask themselves. Consequently, face recognition is a kind of electronic unmasking.

"Real" face-to-face communication is a two-way process. Looking at somebody's face means exposing ones own face and allowing the other to look at oneself. It is a mutual process which is only suspended in extraordinary and voyeuristic situations. Looking at somebody without being looked at places the person who is visually exposed in a vulnerable position vis-à-vis the watcher.

In face recognition this extraordinary situation is normal. Looking at the machine, you only see yourself looking at the machine. Face biometrics are extracted anonymously and painlessly by a mask without a face.

Therefore the resistance against the mass appropriation of biometrical data through surveillance cameras is confronted with particular difficulties. The surveillance structure is largely invisible, it is not evident what the function of a particular camera is, nor whether it is connected to a face recognition system.

In a protest action against the face recognition specialist Visionics, the Surveillance Camera Players therefor adopted the strategy of re-masking: in front of the cameras, they perfomed the play "The Masque of the Red Death" an adaption of Edgar Allen Poe's classic short story by Art Toad.

According to Visionics, whose slogan is "enabling technology with a mass appeal", there are alrady 1.1 bn digitised face images stored on identification data banks world wide. When combined with wide area surveillance camera networks, face recognition is capable of creating a transparent social space that can be controlled by a depersonalised, undetected and unaccountable centre. It is a technology, of which the surveillance engeneers of sunken totalitarian regimes may have dreamt, and one that today is being adopted by democratic governments.

TEXTBLOCK 18/27 // URL: http://world-information.org/wio/infostructure/100437611729/100438658118
 
Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights)

Another important multilateral treaty concerned with intellectual property rights is the TRIPS agreement, which was devised at the inauguration of the Uruguay Round negotiations of the WTO in January 1995. It sets minimum standards for the national protection of intellectual property rights and procedures as well as remedies for their enforcement (enforcement measures include the potential for trade sanctions against non-complying WTO members). The TRIPS agreement has been widely criticized for its stipulation that biological organisms be subject to intellectual property protection. In 1999, 44 nations considered it appropriate to treat plant varieties as intellectual property.

The complete TRIPS agreement can be found on: http://www.wto.org/english/tratop_e/trips_e/t_agm1_e.htm

TEXTBLOCK 19/27 // URL: http://world-information.org/wio/infostructure/100437611725/100438659758
 
fingerprint identification

Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion.

As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment.

Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device (http://www.ddsi-cpc.com) which translates the characteristics of a fingerprint into a digitised image.

As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies.

TEXTBLOCK 20/27 // URL: http://world-information.org/wio/infostructure/100437611729/100438658358
 
Cartoons

Cartoons' technique is simplicity.
Images are easier to remember than texts.
Frequently they show jokes about politicians, friendly or against the person shown. In the first decades of this century, cartoons were also used for propaganda against artists; remember the famous cartoons of Oscar Wilde being portrayed as a criminal, aiming to destroy his popularity.
As a tool in politics it had fatal consequences by determining stereotypes, which never again could be erased even if detected as pure disinformation. Most famous got the cartoons about Jews, which were not only distributed by Germans and Austrians but all over Europe; and already in the tens and twenties of our century. Most horrifying is the fact that many of those old, fascist and racist cartoons are coming back now, in slightly different design only.

TEXTBLOCK 21/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658509
 
History: Communist Tradition

Following the communist revolutions of the 20th century all "means of production" became the property of the state as representative of "the masses". Private property ceased to exist. While moral rights of the creator were recognized and economic rights acknowledged with a one-time cash award, all subsequent rights reverted to the state.

With the transformation of many communist countries to a market system most of them have now introduced laws establishing markets in intellectual property rights. Still the high rate of piracy reflects a certain lack of legal tradition.

TEXTBLOCK 22/27 // URL: http://world-information.org/wio/infostructure/100437611725/100438659483
 
Gait recognition

The fact that an individual's identity is expressed not only by the way he/she looks or sounds, but also by the manner of walking is a relatively new discovery of in biometrics.

Unlike the more fully developed biometric technologies whose scrutiny is directed at stationary parts of the body, gait recognition has the added difficulty of having to sample and identify movement. Scientists at the University of Southampton, UK (http://www.isis.ecs.soton.ac.uk/research/gait/) have developed a model which likens the movement of legs to those of a pendulum and uses hip inclination as a variable.

Another model considers the shape and length of legs as well as the velocity of joint movements. The objective is to combine both models into one, which would make gait recognition a fully applicable biometric technology.

Given that gait recognition is applied to "moving preambulatory subjects" it is a particularly interesting technology for surveillance. People can no longer hide their identity by covering themselves or moving. Female shop lifters who pretend pregnancy will be detected because they walk differently than those who are really pregnant. Potential wrongdoers might resort walking techniques as developed in Monty Pythons legendary "Ministry of Silly Walks" (http://www.stone-dead.asn.au/sketches/sillwalk.htm)

TEXTBLOCK 23/27 // URL: http://world-information.org/wio/infostructure/100437611729/100438658388
 
2000 A.D.

2000
Convergence of telephony, audiovisual technologies and computing

Digital technologies are used to combine previously separated communication and media systems such as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence".

Classical dichotomies as the one of computing and telephony and traditional categorizations no longer apply, because these new services no longer fit traditional categories.

Convergence and Regulatory Institutions

Digital technology permits the integration of telecommunications with computing and audiovisual technologies. New services that extend existing communication systems emerge. The convergence of communication and media systems corresponds to a convergence of corporations. Recently, America Online, the world's largest online service provider, merged with Time Warner, the world's largest media corporation. For such corporations the classical approach to regulation - separate institutions regulate separate markets - is no longer appropriate, because the institutions' activities necessarily overlap. The current challenges posed to these institutions are not solely due to the convergence of communication and media systems made possible by digital technologies; they are also due to the liberalization and internationalization of the electronic communications sector. For regulation to be successful, new categorizations and supranational agreements are needed.
For further information on this issue see Natascha Just and Michael Latzer, The European Policy Response to Convergence with Special Consideration of Competition Policy and Market Power Control, http://www.soe.oeaw.ac.at/workpap.htm or http://www.soe.oeaw.ac.at/WP01JustLatzer.doc.

TEXTBLOCK 24/27 // URL: http://world-information.org/wio/infostructure/100437611796/100438659802
 
Internet, Intranets, Extranets, and Virtual Private Networks

With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are proprietary networks.

Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term "proprietary networks" into terms to be explained and speak of Intranets, Extranets, and Virtual Private Networks.

Cable TV networks and online services as Europe Online, America Online, and Microsoft Network are also proprietary networks. Although their services resemble Internet services, they offer an alternative telecommunication infrastructure with access to Internet services for their subscribers.
America Online is selling its service under the slogan "We organize the Web for you!" Such promises are more frightening than promising because "organizing" is increasingly equated with "filtering" of seemingly objectionable messages and "rating" of content. For more information on these issues, click here If you want to know more about the technical nature of computer networks, here is a link to the corresponding article in the Encyclopaedia Britannica.

Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Society for Worldwide Interbank Financial Telecommunication (SWIFT). According to SWIFT, in 1998 the average daily value of payments messages was estimated to be above U$ 2 trillion.

Electronic Communications Networks as Instinet force stock exchanges to redefine their positions in trading of equities. They offer faster trading at reduced costs and better prices on trades for brokers and institutional investors as mutual funds and pension funds. Last, but not least clients are not restricted to trading hours and can trade anonymously and directly, thereby bypassing stock exchanges.

TEXTBLOCK 25/27 // URL: http://world-information.org/wio/infostructure/100437611791/100438658384
 
More and more, faster and faster, but...

Since the invention of appropriate means and technologies, communication no longer requires face-to-face meetings.

From writing and reading to using computers, expanding and exhausting one's possibilities to communicate relies more and more on the application of skills we have to learn. With the increasing importance of communication technologies, learning to apply them properly becomes a kind of rite of passage.

A Small World

From the very beginning - the first Sumerian pictographs on clay tablets - to today's state of the art technologies - broadband communication via fiber-optic cables and satellites - the amount of information collected, processed and stored, the capabilities to do so, as well as the possible speed of information transmission exponentially accelerate.

Since the invention of the electrical telegraph, but especially with today's growing digital communication networks, every location on earth seems to be close, however distant it may be, and also time no longer remains a significant dimension.

Threatened Cultural Memory

More and more information is transmitted and produced faster and faster, but the shelf life of information becomes more and more fragile. For more than 4500 years Sumerian pictographs written on clay tablets remained intact, but newspapers and books, printed some decades ago, crumble into pieces; film reels, video tapes and cassettes corrode. Digitalization of information is not a cure; on the contrary it even intensifies the danger of destroying cultural heritage. Data increasingly requires specific software and hardware, but to regularly convert all available digitized information is an unexecutable task.

Compared to the longevity of pictographs on clay tablets, digitized information is produced for instant one-time use. The increasing production and processing of information causes a problem hitherto unknown: the loss of our cultural memory.

For further information see T. Matthew Ciolek, Global Networking Timeline.

For another history of communication systems see Friedrich Kittler, The History of Communication Media.

TEXTBLOCK 26/27 // URL: http://world-information.org/wio/infostructure/100437611796/100438659807
 
The 2nd Chechnya-War

In the summer of 1999 between 1.200 and 2.000 Muslim rebels from Chechnya fell into Dagestan. Rumors say that Russian soldiers closed their eyes pretending not to see anything. During the fightings that started soon, many persons got killed. The hole issue was blamed on Chechnya.
At that time there were rumors that there would be heavy bombing in Moscow in September. And there was. Those two things together brought back the hatred against the Chechnya rebels. The 2nd War between Russia and the Muslim country began. While the first war was lost at home, because the Russians, especially mothers, did not understand why their sons should fight against Chechnya, this time the atmosphere was completely different. In the cities 85% and all over Russia 65% of the Russian population agreed with the war. This time the war was a national issue, a legitimate defense.
The media emphasized this.
Alexander Zilin, a journalist, found out that the truth was far from the one presented in the media: First of all there was no evidence that the Moscow-bombings were organized by Chechnyans. On the contrary it is more than probable that the crimes were organized by a governmental institution for national security. The disinformation was part of the strategy to make the population support another war with Chechnya. The media were part of the story, maybe without knowing. They kept on the government's and army's side, showing only special and patriotic parts of the war. For example the number of dead Russian soldiers was held back.

The U.S.-behavior on this:
The USA would like to intervene but they are afraid of ruining the weak relation to Russia. For years the main topic of U.S.-politics has been the struggle against terrorism. Now Russia pretends to be fighting terrorism. How could it be criticized for that?

The reason for this war is rather cynical: it worked as a public relations-campaign for Vladimir Putin, candidate for the president's elections in. When Putin came into power as minister-president of Russia in August 1999, opinion polls gave him 2% for the elections in summer 2000. By the end of November he got already 46%! And finally he won. The public relations war worked well.
At the same time a propaganda-campaign against his rival Y. Primakov (98), formerly the most popular candidate, was spreading lies and bad rumors. Opinion-polls showed very fast that he had lost the elections because of this black propaganda, even before the elections took place.

TEXTBLOCK 27/27 // URL: http://world-information.org/wio/infostructure/100437611661/100438658639
 
Seneca

Lucius Annaeus Seneca (~4 BC - 65 AD), originally coming from Spain, was a Roman philosopher, statesman, orator and playwright with a lot of influence on the Roman cultural life of his days. Involved into politics, his pupil Nero forced him to commit suicide. The French Renaissance brought his dramas back to stage.

INDEXCARD, 1/37
 
First Amendment Handbook

The First Amendment to the US Constitution, though short, lists a number of rights. Only a handful of words refer to freedoms of speech and the press, but those words are of incalculable significance. To understand the current subtleties and controversies surrounding this right, check out this First Amendment site. This detailed handbook of legal information, mostly intended for journalists, should be of interest to anyone who reads or writes. For example, the chapter Invasion of Privacy shows the limits of First Amendment rights, and the balance between the rights of the individual and the rights of the public - or, more crudely, the balance of Tabloid vs. Celebrity. Each section is carefully emended with relevant legal decisions.

http://www.rcfp.org/handbook/viewpage.cgi

INDEXCARD, 2/37
 
Reuters Group plc

Founded in 1851 in London, Reuters is the world's largest news and television agency with 1,946 journalists, photographers and camera operators in 183 bureaus serving newspapers, other news agencies, and radio and television broadcasters in 157 countries.
In addition to its traditional news-agency business, over its network Reuters provides financial information and a wide array of electronic trading and brokering services to banks, brokering houses, companies, governments, and individuals worldwide.

http://www.reuters.com

INDEXCARD, 3/37
 
to decipher/decode

to put the ciphers/codes back into the plaintext

INDEXCARD, 4/37
 
William Gibson

American science fiction author. Most famous novel: Neuromancer.

For resources as writings and interviews available on the Internet see http://www.lib.loyno.edu/bibl/wgibson.htm

INDEXCARD, 5/37
 
Telephone

The telephone was not invented by Alexander Graham Bell, as is widely held to be true, but by Philipp Reiss, a German teacher. When he demonstrated his invention to important German professors in 1861, it was not enthusiastically greeted. Because of this dismissal, no financial support for further development was provided to him.

And here Bell comes in: In 1876 he successfully filed a patent for the telephone. Soon afterwards he established the first telephone company.

INDEXCARD, 6/37
 
Telnet

Telnet allows you to login remotely on a computer connected to the Internet.

INDEXCARD, 7/37
 
Internet Exchanges

Internet exchanges are intersecting points between major networks.

List of the World's Public Internet exchanges (http://www.ep.net)

http://www.ep.net/
INDEXCARD, 8/37
 
Oscar Wilde

Oscar Flingal O'Flahertie Wills (1854-1900) is one of the best and most famous poets and novelists of England of his time. His satirical and amusing texts exposed the false moral of the Bourgeoisie publicly. Besides, his life as a dandy made him the leader of aesthetics in England, until he was sent to prison because of homosexuality. Afterwards he lived in Paris where he died lonely and nearly forgotten in a hotel in 1900. His poems, fairy tales, novels and dramas survived.

INDEXCARD, 9/37
 
The Internet Engineering Task Force

The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Engineering Steering Group.

Internet Society: http://www.ietf.org

http://www.ietf.org/
INDEXCARD, 10/37
 
Above.net

Headquartered in San Jose, USA, AboveNet Communications is a backbone service provider. Through its extensive peering relationships, the company has built a network with the largest aggregated bandwidth in the world.

http://www.above.net

INDEXCARD, 11/37
 
Apple

Founded by Steve Jobs and Steve Wozniak and headquartered in Cupertino, USA, Apple Computer was the first commercially successful personal computer company.

In 1978 Wozniak invented the first personal computer, the Apple II. IBM countered its successful introduction to the market by introducing a personal computer running MS-DOS, the operating system supplied by Microsoft Corporation. And IBM gained leadership again. Although by introducing the first graphical user interface affordable to consumers having started the desktop publishing revolution, Apple could not regain leadership again.

http://www.apple.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/6/0,5716,115726+1+108787,00.html

http://www.apple.com/
INDEXCARD, 12/37
 
The Flesh Machine

This is the tile of a book by the Critical Art Ensemble which puts the development of artifical life into a critical historical and political context, defining the power vectors which act as the driving force behind this development. The book is available in a print version (New York, Autonomedia 1998) and in an online version at http://www.critical-art.net/fles/book/index.html

INDEXCARD, 13/37
 
Transistor

A transistor is a solid-state device for amplifying, controlling, and generating electrical signals. Transistors are used in a wide array of electronic equipment, ranging from pocket calculators and radios to industrial robots and communications satellites.

INDEXCARD, 14/37
 
Digital Subscriber Line (DSL)

DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( http://www.britannica.com/bcom/eb/article/4/0,5716,129614+15,00.html )).

http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 15/37
 
1996 WIPO Copyright Treaty (WCT)

The 1996 WIPO Copyright Treaty, which focused on taking steps to protect copyright "in the digital age" among other provisions 1) makes clear that computer programs are protected as literary works, 2) the contracting parties must protect databases that constitute intellectual creations, 3) affords authors with the new right of making their works "available to the public", 4) gives authors the exclusive right to authorize "any communication to the public of their works, by wire or wireless means ... in such a way that members of the public may access these works from a place and at a time individually chosen by them." and 5) requires the contracting states to protect anti-copying technology and copyright management information that is embedded in any work covered by the treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm



http://www.wipo.int/documents/en/diplconf/dis...
INDEXCARD, 16/37
 
Assembly line

An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in mass production operations. An assembly line is designed by determining the sequences of operations for manufacture of each product component as well as the final product. Each movement of material is made as simple and short as possible with no cross flow or backtracking. Work assignments, numbers of machines, and production rates are programmed so that all operations performed along the line are compatible.

INDEXCARD, 17/37
 
Enigma Machine

The Enigma Encryption Machine was famous for its insecurities as for the security that it gave to German ciphers. It was broken, first by the Poles in the 1930s, then by the British in World War II.

INDEXCARD, 18/37
 
Boris Yeltsin

Boris Yeltsin was Russian President until the end of 1999. After many years of work for the Communist Party, he joined the Politburo in 1986. His sharp critique on Mikhail Gorbachev forced that one to resign. Yeltsin won the 1990 election into Russian presidency and quit the Communist Party. Quarrels with the Parliament could not destroy his popularity until the secession war with Chechnya. When the Russian economy collapsed in 1998, he dismissed his entire government. In the end the sick old man of Russian politics had lost all his popularity as a president and resigned for the benefit of his political son Vladimir Putin.

INDEXCARD, 19/37
 
Whitfield Diffie

Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and Martin Hellman developed public key cryptography, a system to send information without leaving it open to be read by everyone.

INDEXCARD, 20/37
 
Alan Turing

b. June 23, 1912, London, England
d. June 7, 1954, Wilmslow, Cheshire

English mathematician and logician who pioneered in the field of computer theory and who contributed important logical analyses of computer processes. Many mathematicians in the first decades of the 20th century had attempted to eliminate all possible error from mathematics by establishing a formal, or purely algorithmic, procedure for establishing truth. The mathematician Kurt Gödel threw up an obstacle to this effort with his incompleteness theorem. Turing was motivated by Gödel's work to seek an algorithmic method of determining whether any given propositions were undecidable, with the ultimate goal of eliminating them from mathematics. Instead, he proved in his seminal paper "On Computable Numbers, with an Application to the Entscheidungsproblem [Decision Problem]" (1936) that there cannot exist any such universal method of determination and, hence, that mathematics will always contain undecidable propositions. During World War II he served with the Government Code and Cypher School, at Bletchley, Buckinghamshire, where he played a significant role in breaking the codes of the German "Enigma Machine". He also championed the theory that computers eventually could be constructed that would be capable of human thought, and he proposed the Turing test, to assess this capability. Turing's papers on the subject are widely acknowledged as the foundation of research in artificial intelligence. In 1952 Alan M. Turing committed suicide, probably because of the depressing medical treatment that he had been forced to undergo (in lieu of prison) to "cure" him of homosexuality.

INDEXCARD, 21/37
 
UNIVAC

Built by Remington Rand in 1951 the UNIVAC I (Universal Automatic Computer) was one of the first commercially available computers to take advantage of the development of the central processing unit (CPU). Both the U.S. Census bureau and General Electric owned UNIVACs. Speed: 1,905 operations per second; input/output: magnetic tape, unityper, printer; memory size: 1,000 12-digit words in delay line; technology: serial vacuum tubes, delay lines, magnetic tape; floor space: 943 cubic feet; cost: F.O.B. factory U.S.$ 750,000 plus U.S.$ 185,000 for a high speed printer.

INDEXCARD, 22/37
 
Extranet

An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g.

INDEXCARD, 23/37
 
Memex Animation by Ian Adelman and Paul Kahn


INDEXCARD, 24/37
 
Internet Protocol Number (IP Number)

Every computer using TCP/IP has a 32 bit-Internet address, an IP number. This number consists of a network identifier and of a host identifier. The network identifier is registered at and allocated by a Network Information Center (NIC), the host identifier is allocated by the local network administration.

IP numbers are divided into three classes. Class A is restricted for big-sized organizations, Class B to medium-sized ones as universities, and Class C is dedicated to small networks.

Because of the increasing number of networks worldwide, networks belonging together, as LANs forming a corporate network, are allocated a single IP number.

INDEXCARD, 25/37
 
Optical communication system by Aeneas Tacitus, 4th century B.C.

Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook.

With communication separated from transportation, the distant became near.

Tacitus' telegraph system was very fast and not excelled until the end of the 18th century.

For further information see Joanne Chang & Anna Soellner, Decoding Device, http://www.smith.edu/hsc/museum/ancient_inventions/decoder2.html

http://www.smith.edu/hsc/museum/ancient_inven...
INDEXCARD, 26/37
 
Cyrus Reed Teed

C.R. Teed (New York State) was a doctor of alternative medicine in the last century. He worked on alchemy, too. In 1870 he had the idea that the universe was made out of cells, the earth being the biggest one. Thus he imagined the world as a concave system. Out of this thought he founded a religion, calling it Koreshanity.

INDEXCARD, 27/37
 
Immanuel Wallerstein

Immanuel Wallerstein (* 1930) is director of the Fernand Braudel Center for the Study of Economies, Historical Systems, and Civilizations. He is one of the most famous sociologists in the Western World. With his book The Modern World-System: Capitalist Agriculture and the Origins of the European World-Economy in the Sixteenth Century (1976), which led to the expression World-System Theory about centers, peripheries and semi-peripheries in the capitalist world system, he did not only influence a whole generation of scientists, but this theory seems to get popular again, due to globalization.

INDEXCARD, 28/37
 
Internet Relay Chat (IRC)

IRC is a text-based chat system used for live discussions of groups.

For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, http://www.skypoint.com/~gimonca/irc2.html

http://www.skypoint.com/~gimonca/irc2.html
INDEXCARD, 29/37
 
Copyright management information

Copyright management information refers to information which identifies a work, the author of a work, the owner of any right in a work, or information about the terms and conditions of the use of a work, and any numbers or codes that represent such information, when any of these items of information are attached to a copy of a work or appear in connection with the communication of a work to the public.

INDEXCARD, 30/37
 
Amazon.Com

Amazon.Com was one of the first online bookstores. With thousands of books, CDs and videos ordered via the Internet every year, Amazon.Com probably is the most successful Internet bookstore.

INDEXCARD, 31/37
 
Saddam Hussein

Saddam Hussein joined the revolutionary Baath party when he was a university student. In 1958 he had the head of Iraq, Abdul-Karim Qassim, killed. Since 1979 he has been President of Iraq. Under his reign Iraq fought a decade-long war with Iran. Because of his steady enmity with extreme Islamic leaders the West supported him first of all, until his army invaded Kuwait in August 1990, an incident that the USA led to the Gulf War. Since then many rumors about a coup d'état have been launched, but Saddam Hussein is still in unrestricted power.

INDEXCARD, 32/37
 
ARPAnet

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of wide area networks, the possibility of remote computing, it was created for resource sharing between research institutions, not for messaging services like E-mail. Although research was sponsored by US military, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute.

But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers offered a general public access to NSFnet. Beginning in 1995, after having become the backbone of the Internet in the USA, NSFnet was turned over to a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA commercial users already outnumbered military and academic users in 1994.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

INDEXCARD, 33/37
 
Instinet

Instinet, a wholly owned subsidiary of Reuters Group plc since 1987, is the world's largest agency brokerage firm and the industry brokerage leader in after hours trading. It trades in over 40 global markets daily and is a member of seventeen exchanges in North America, Europe, and Asia. Its institutional clients represent more than 90 percent of the institutional equity funds under management in the United States. Instinet accounts for about 20 percent of the NASDAQ daily trading volume and trades approximately 170 million shares of all U.S. equities daily.

INDEXCARD, 34/37
 
Industrial design

Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for intellectual property protection the design must be novel or original. Protection can be obtained through registration in a government office and usually is given for 10 to 15 years.

INDEXCARD, 35/37
 
Alexander Graham Bell

b., March 3, 1847, Edinburgh

d. Aug. 2, 1922, Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada

American audiologist and inventor wrongly remembered for having invented the telephone in 1876. Although Bell introduced the first commercial application of the telephone, in fact a German teacher called Reiss invented it.

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/1/0,5716,15411+1+15220,00.html

INDEXCARD, 36/37
 
Adi Shamir

Adi Shamir was one of three persons in a team to invent the RSA public-key cryptosystem. The other two authors were Ron Rivest and Leonard M. Adleman.

INDEXCARD, 37/37