Credibility

The magic word is credibility.

NATO took away part of its credibility by extending more and more the definition of military facilities, which where to be destroyed in order to end the Serb power.

Disinformation can mean leaving out important informations. Telling lies is not the only method of disinformation. The not telling also creates thoughts and delegates them into certain directions, whereas other models of thinking are left out.

Like this, the deaths on the own side are adjusted downwards whereas the victims of the enemy are counted proudly - as long as they are not civilians. The post-Gulf War period demonstrated how the population reacts if the number of innocent victims is much higher than expected. It was the fact of those numbers that provoked the biggest part of the post-war critique.

The media in democratic states tend to criticize this, which does not mean that they always want to be free of governmental influence. They can choose to help the government in a single case by not writing anything against it or by writing pro-government stories.

At the same time every democracy has undemocratic parts in it - which is already part of democracy itself. There are situations when a democratic government may find it essential to put pressure on the media to inform the population in a certain way; and also censorship is nothing that can only be connected to dictatorship; just think of the Falkland War, the Gulf-War or the Kosovo-War.

TEXTBLOCK 1/4 // URL: http://world-information.org/wio/infostructure/100437611661/100438658709
 
Copyright Management and Control Systems: Metering

Metering systems allow copyright owners to ensure payment to or at the time of a consumer's use of the work. Those technologies include:

Hardware Devices

Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works.

Digital Certificates

Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides information on the identity of the holder can also include rights associated with a particular person. Vendors can so control access system resources, including copyrighted files, by making them available only to users who can provide a digital certificate with specified rights (e.g. access, use, downloading).

Centralized Computing

Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access.

Access Codes

Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.

Copyright Clearinghouses

Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property.


TEXTBLOCK 2/4 // URL: http://world-information.org/wio/infostructure/100437611725/100438659615
 
1900 - 2000 A.D.

1904
First broadcast talk

1918
Invention of the short-wave radio

1929
Invention of television in Germany and Russia

1941
Invention of microwave transmission

1946
Long-distance coaxial cable systems and mobile telephone services are introduced in the USA.

1957
Sputnik, the first satellite, is launched by the USSR
First data transmissions over regular phone circuits.

At the beginning of the story of today's global data networks is the story of the development of satellite communication.

In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it in the end it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defense. As the US Department of Defense encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry.

The same year as the USA launched their first satellite - Explorer I - data was transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks.

Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. Yet up to now, most satellites are designed for military purposes such as reconnaissance.

1969
ARPAnet online

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. An experimental network it mainly served the purpose of testing the feasibility of wide area networks and the possibility of remote computing. It was created for resource sharing between research institutions and not for messaging services like E-mail. Although US military sponsored its research, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and linked the first two computers, one located at the University of California, Los Angeles, the other at the Stanford Research Institute.

Yet ARPAnet did not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers started offering access to NSFnet to a general public. After having become the backbone of the Internet in the USA, in 1995 NSFnet was turned into a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA it was already in 1994 that commercial users outnumbered military and academic users.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

1971
Invention of E-Mail

1979
Introduction of fiber-optic cable systems

1992
Launch of the World Wide Web

TEXTBLOCK 3/4 // URL: http://world-information.org/wio/infostructure/100437611796/100438659828
 
Recent "Digital Copyright" Legislation: European Union

Directive on Copyright and Related Rights in the Information Society

In November 1996 the European Commission adopted a communication concerning the follow-up to the Green Paper on copyright and related rights in the information society. The proposed Directive aims at transposing into Community law the main international obligations arising from the two treaties on copyright and related rights adopted within the framework of the WIPO in December 1996 (WIPO Performances and Phonogram Treaty and WIPO Copyright Treaty). It applies to provisions relating to:

- the legal protection of computer programs

- rental right, lending right and certain rights related to copyright in the field of intellectual property

- copyright and related rights applicable to broadcasting of programs by satellite and cable retransmission

- the term of protection of copyright and certain related rights

- the legal protection of databases

The proposal was first presented by the Commission in January 1998, amended in May 1999 and currently is at second reading before the Parliament. Final adoption of the Directive could take place at the end of 2000 or the beginning of 2001 respectively.

A full-text version for download (pdf file) of the amended proposal for a Directive on copyright and related rights in the Information Society is available on the website of the European Commission (DG Internal Market): http://www.europa.eu.int/comm/internal_market/en/intprop/intprop/docs/index.htm

General critique concerning the proposed EU Directive includes:

- Open networks
The new law could require (technological) surveillance of communications to ensure enforcement. Also because Service Providers might be legally liable for transmitting unauthorized copies, the might in turn have to deny access to anybody who could not provide them with financial guaranties or insurance.

- Interoperable systems
The draft could negate the already established right in EU law for software firms to make their systems interoperable with the dominant copyright protected systems. This would be a threat to the democratic and economic rights of users.

- Publicly available information
It is yet unclear whether new legal protections against the bypassing of conditional access technology apply only for content with an exclusive right. If the content is already in the public domain, then there can be no possible violation of copyright law just from gaining access to it.

Comments from the library, archives and documentation community on the amended Directive embrace:

The Library Association
http://www.la-hq.org.uk/directory/prof_issues/dcrris2.html

EBLIDA (European Bureau of Library, Information and Documentation Associations)
http://www.eblida.org/lobby/position/ampos2fi.htm

Society of Archivists (U.K.) and Public Record Office (U.K.)
http://www.pro.gov.uk/about/copyright/copyrightdraft.htm

EFPICC (European Fair Practices In Copyright Campaign) http://www.eblida.org/efpicc/comments.htm

TEXTBLOCK 4/4 // URL: http://world-information.org/wio/infostructure/100437611725/100438659610
 
Cooperative Association of Internet Data Analysis (CAIDA)

Based at the University of California's San Diego Supercomputer Center, CAIDA supports cooperative efforts among the commercial, government and research communities aimed at promoting a scalable, robust Internet infrastructure. It is sponsored by the Defense Advanced Research Project Agency (DARPA) through its Next Generation Internet program, by the National Science Foundation, Cisco, Inc., and Above.net.

INDEXCARD, 1/6
 
Invention

According to the WIPO an invention is a "... novel idea which permits in practice the solution of a specific problem in the field of technology." Concerning its protection by law the idea "... must be new in the sense that is has not already been published or publicly used; it must be non-obvious in the sense that it would not have occurred to any specialist in the particular industrial field, had such a specialist been asked to find a solution to the particular problem; and it must be capable of industrial application in the sense that it can be industrially manufactured or used." Protection can be obtained through a patent (granted by a government office) and typically is limited to 20 years.

INDEXCARD, 2/6
 
International Cable Protection Committee (ICPC)

The ICPC aims at reducing the number of incidents of damages to submarine telecommunications cables by hazards.

The Committee also serves as a forum for the exchange of technical and legal information pertaining to submarine cable protection methods and programs and funds projects and programs, which are beneficial for the protection of submarine cables.

Membership is restricted to authorities (governmental administrations or commercial companies) owning or operating submarine telecommunications cables. As of May 1999, 67 members representing 38 nations were members.

http://www.iscpc.org

INDEXCARD, 3/6
 
1996 WIPO Copyright Treaty (WCT)

The 1996 WIPO Copyright Treaty, which focused on taking steps to protect copyright "in the digital age" among other provisions 1) makes clear that computer programs are protected as literary works, 2) the contracting parties must protect databases that constitute intellectual creations, 3) affords authors with the new right of making their works "available to the public", 4) gives authors the exclusive right to authorize "any communication to the public of their works, by wire or wireless means ... in such a way that members of the public may access these works from a place and at a time individually chosen by them." and 5) requires the contracting states to protect anti-copying technology and copyright management information that is embedded in any work covered by the treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm



http://www.wipo.int/documents/en/diplconf/dis...
INDEXCARD, 4/6
 
Industrial design

Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for intellectual property protection the design must be novel or original. Protection can be obtained through registration in a government office and usually is given for 10 to 15 years.

INDEXCARD, 5/6
 
Virtual Private Networks

Virtual Private Networks provide secured connections to a corporate site over a public network as the Internet. Data transmitted through secure connections are encrypted and therefore have to be encrypted before they can be read.
These networks are called virtual because connections are provided only when you connect to a corporate site; they do not rely on dedicated lines and support mobile use.

INDEXCARD, 6/6