Abstract Disinformation is part of human communication. Thousands of years ago it was already used as a political medium. In the age of mass-communication and information its possibilities have grown tremendously. It plays an important role in many different fields, together with its "companion" propaganda. Some of these fields are: politics, international relations, the (mass-)media and the internet, but also art and science. There is no evidence at all for a disappearance of disinformation. On this account it is important to understand where it comes from, what its tools are and how nations (democratic as well as totalitarian systems), international organizations and the media work with it or against it. This report tries to give a short insight into this topic: on a theoretical level by demonstrating cases of disinformation, like the 2nd Chechnya War in 1999. |
|
Disinformation - A Definition First of all disinformation can be explained as something that has to do with fears: it frightens us by taking away our individuality, as disinformation is not done for one single person. It is a manipulation; a manipulation the influenced persons did not ask for. Disinformation is never the launching of one single information/message. Several - and in most cases many - different pieces make up a puzzle of deception. One single message can be called true or false, but only the combination of several and more informations makes up a system that has the power to influence opinions. The purpose is what produces the disinformation, whereas a wrong information (even as a number of wrong informations) happening by accident represents simply a false information. The person or group presenting a disinformation knows very well what he/it is doing. The aim is that the person who receives the disinformation gets influenced into a certain and well-planned direction. Therefore the wrong information has to reach the unconscious part of the mind, has to be integrated into personal thoughts. A good way to reach that goal is to use a commonly known information, something familiar to reach the confidence of the recipient. The best is to use a quasi neutral message. Afterwards the real disinformation is woven into that other information. The mixture between truth, half-truth and lie is the most adequate method to get a disinformation into people's minds. The knowledge about how to use material and how to slightly change it until the statement turns against someone or some idea, is a type of art to cope with words. |
|
The Post-World-War II-period After World War II the importance of propaganda still increased, on the commercial level as well as on a political level, in the era of the Cold War. The propaganda institutions of the different countries wanted their people to think the right way, which meant, the national way. In the USA the McCarthy-era started, a totalitarian system in struggle against communism. Cold War brought the era of spies with it, which was the perfect tool of disinformation. But the topic as a movie-genre seems still popular today, as the unchanged success of James Bond-movies show. A huge net of propaganda was built up for threatening with the nuclear bomb: pretending that the enemy was even more dangerous than the effect of such a bomb. And later, after the fall of the Iron Curtain, disinformation found other fields of work, like the wars of the 1990s showed us. |
|
Credibility The magic word is credibility. Disinformation can mean leaving out important informations. Telling lies is not the only method of disinformation. The not telling also creates thoughts and delegates them into certain directions, whereas other models of thinking are left out. Like this, the deaths on the own side are adjusted downwards whereas the victims of the enemy are counted proudly - as long as they are not civilians. The post-Gulf War period demonstrated how the population reacts if the number of innocent victims is much higher than expected. It was the fact of those numbers that provoked the biggest part of the post-war critique. The media in democratic states tend to criticize this, which does not mean that they always want to be free of governmental influence. They can choose to help the government in a single case by not writing anything against it or by writing pro-government stories. At the same time every democracy has undemocratic parts in it - which is already part of democracy itself. There are situations when a democratic government may find it essential to put pressure on the media to inform the population in a certain way; and also censorship is nothing that can only be connected to dictatorship; just think of the Falkland War, the Gulf-War or the Kosovo-War. |
|
1940s - Early 1950s: First Generation Computers Probably the most important contributor concerning the theoretical basis for the digital computers that were developed in the 1940s was The onset of the Second World War led to an increased funding for computer projects, which hastened technical progress, as governments sought to develop computers to exploit their potential strategic importance. By 1941 the German engineer Konrad Zuse had developed a computer, the Z3, to design airplanes and missiles. Two years later the British completed a secret code-breaking computer called Colossus to Also spurred by the war the Electronic Numerical Integrator and Computer (ENIAC), a general-purpose computer, was produced by a partnership between the U.S. government and the University of Pennsylvania (1943). Consisting of 18.000 Concepts in computer design that remained central to computer engineering for the next 40 years were developed by the Hungarian-American mathematician Characteristic for first generation computers was the fact, that instructions were made-to-order for the specific task for which the computer was to be used. Each computer had a different |
|
Gait recognition The fact that an individual's identity is expressed not only by the way he/she looks or sounds, but also by the manner of walking is a relatively new discovery of in biometrics. Unlike the more fully developed biometric technologies whose scrutiny is directed at stationary parts of the body, gait recognition has the added difficulty of having to sample and identify movement. Scientists at the University of Southampton, UK ( Another model considers the shape and length of legs as well as the velocity of joint movements. The objective is to combine both models into one, which would make gait recognition a fully applicable biometric technology. Given that gait recognition is applied to "moving preambulatory subjects" it is a particularly interesting technology for surveillance. People can no longer hide their identity by covering themselves or moving. Female shop lifters who pretend pregnancy will be detected because they walk differently than those who are really pregnant. Potential wrongdoers might resort walking techniques as developed in Monty Pythons legendary "Ministry of Silly Walks" ( |
|
Disinformation and Science Disinformation's tools emerged from science and art. And furthermore: disinformation can happen in politics of course, but also in science: for example by launching ideas which have not been proven exactly until the moment of publication. e.g. the thought that time runs backwards in parts of the universe: |
|
Changes Still, disinformation and propaganda are nothing magic. They can change things, but supposedly only if those things/meanings/opinions are not fixed completely. It is never just a single idea that changes. Society is following the changes. Thinking about disinformation brings us to the word truth, of course, and to the doubt that there is no definite truth. And truth can easily be manipulated to another truth. Just present some facts that seem to be logic and there you've got a new truth. And if the facts can supposedly be proved by empirical studies then the quality of the truth definitely rises. That's what ideologies do all the time. And the media like to do the same thing - as a game with power or mere presentation of power? But of course there also exist bits of disinformation which are more amusing than evil or dangerous: - the theory of the celestro-centric world/"Hohlwelttheorie" - the story of the German philosopher who invented an Italian philosopher, wrote books about him, even reprinted "his" texts, which had gone lost pretendedly 100 years ago - and finally lost his job and all his career when other scientists found out that everything had been made up. |
|
The Theory of the Celestro-Centric World In 1870 the U.S.-American for further details see: Those who believe in it, call it the truth, those who simply like the idea, may call it a parallel science. Others call it disinformation, asking for the reasons to spread it. The turning to the inside, where there is no way out, produces a different reality. It shows that realities are always produced. Political conservatives and racists like |
|
Introduction Political and economic agendas change. People leave, get exchanged. Whereas one of the things that never seem to change is disinformation. Watching different kinds of cultures and regimes throughout history you will always find disinformation. Its use is variable just like its tools. First of all it does not necessarily need words. It is possible to disinform in any kind of language (sounds, symbols, letters or with the help of the body). As it seems to have come into existence together with human communication, we need not even hope that it will disappear once in a while. One could rather say: disinformation has always been there. Instead of hoping to stop it we need to learn to live with it, detect it, restore it to consciousness. Even this will not be any insurance for not walking into the trap. It is an attempt, nothing else. For detecting disinformation one needs to know what types of disinformation are possible and how they work. This site gives you some ideas about the history, tendencies and different types of disinformation, with the restriction that it will mostly be about the Western types of disinformation, as it is still harder to understand the media of disinformation in other cultures; and anyhow, many methods and tools run parallel in different cultures. |
|
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: |
|
Movies as a Propaganda- and Disinformation-Tool in World War I and II Movies produced in Hollywood in 1918/19 were mainly anti-German. They had some influence but the bigger effect was reached in World War II-movies. The first propaganda movie of World War II was British. At that time all films had to pass censoring. Most beloved were entertaining movies with propaganda messages. The enemy was shown as a beast, an animal-like creature, a brutal person without soul and as an idiot. Whereas the own people were the heroes. That was the new form of atrocity. U.S.-President In the late twenties, movies got more and more important, in the USSR, too, like |
|
Face recognition In order to be able to recognize a person, one commonly looks at this persons face, for it is there where the visual features which distinguish one person from another are concentrated. Eyes in particular seem to tell a story not only about who somebody is, but also about how that persons feel, where his / her attention is directed, etc. People who do not want to show who they are or what is going on inside of them must mask themselves. Consequently, face recognition is a kind of electronic unmasking. "Real" face-to-face communication is a two-way process. Looking at somebody's face means exposing ones own face and allowing the other to look at oneself. It is a mutual process which is only suspended in extraordinary and voyeuristic situations. Looking at somebody without being looked at places the person who is visually exposed in a vulnerable position vis-à-vis the watcher. In face recognition this extraordinary situation is normal. Looking at the machine, you only see yourself looking at the machine. Face biometrics are extracted anonymously and painlessly by a mask without a face. Therefore the resistance against the mass appropriation of biometrical data through surveillance cameras is confronted with particular difficulties. The surveillance structure is largely invisible, it is not evident what the function of a particular camera is, nor whether it is connected to a face recognition system. In a protest action against the face recognition specialist According to |
|
The Right to get Disinformed Disinformation might also be welcome: While the ones criticize disinformation and try to fight against it, others do nothing against it. And others again seem to enjoy getting disinformed. How this works? It is the result of a society that does no longer want to live under the pressure of doing and hearing everything at the same time. Acceleration of life seems too fast. The only way to get out is to refuse certain things/messages/truths. Receiving disinformation can be more comfortable than getting so-called correct information. This is especially true for the readers of the yellow press. The yellow press lives on that perspective, the commodity of getting light news, mostly wrong news and lies - but those being wrapped up in nice pictures and stories about those who seem to reign the world. The aim is the escape out of reality. A surplus of information, information terror, can produce disinformation. The profusion can get exploited for disinformation. This works in that way that in the mass of information the individual has no possibility to get an overview of the different ways of thinking and to reach a stage of objective knowledge. |
|
The Gulf War By the end of our century a new method of disinformation is gaining importance: disinformation by an overflow of information. In the Gulf War, similar to the Vietnam War, journalists had little chance to report neutrally and correctly from the battlefields. Many times they staid in places far from the actual fightings - due to censorship. In many ways the so-called video-war reminded of a series of commercials. No wonder, the Gulf War was the first war to have a commercial advertisement agency to do the war-propaganda for the USA. They worked hard in preventing the government from a destiny like the one of the Vietnam War, when the war most of all was lost in the American homes because of anti-war propaganda. In an interview, And this is true for both sides: the baby milk plant: Western bombs had destroyed a chemical weapon factory - that's what they claimed. ( the life guard: In December 1990, the French newspaper Nouvel Observateur published the story of Karim Abdallah al-Jabouri, Saddam Hussein's Life Guard who had fled from Iraq right after Iraq's invasion in Kuwait. Soon afterwards he was in a French TV-show, where he told atrocity stories about the baby-incubator-story of Najirah On the 10th of October 1991 a young refugee, called Najirah, from Kuwait spoke in front of the U.S.-congress. With a lot of tears she told that she had been working in a Kuwaiti hospital, when Iraqi soldiers came in, tore the babies out of the incubators and let them die on the floor. The pictures of this declaration went around the world and were one of the reasons why the U.S.-population wanted an intervention. In 1992 the journalist R. MacArthur was able to proof that the presented witness had been the daughter of the Kuwait-ambassador in the USA and that she had not been in that hospital or in Kuwait at the mentioned time. By then the war was over and the manipulation of the population had taken place long ago. For reading about the U.S.-propaganda tools during that war, like surrender passes, balloons, fake banknotes, threats and many more visit: |
|
The Privatization of Censorship According to a still widely held conviction, the global data networks constitute the long desired arena for uncensorable expression. This much is true: Because of the Net it has become increasingly difficult to sustain cultural and legal standards. Geographical proximity and territorial boundaries prove to be less relevant, when it does not affect a document's availability if it is stored on your desktop or on a host some thousand kilometers away. There is no international agreement on non-prohibited contents, so human rights organizations and nazi groups alike can bypass restrictions. No single authority or organization can impose its rules and standards on all others. This is why the Net is public space, a political arena where free expression is possible. This freedom is conditioned by the design of the Net. But the Net's design is not a given, as When the World Wide Web was introduced, soon small independent media and human rights organizations began to use this platform for drawing worldwide attention to their publications and causes. It seemed to be the dawning of a new era with authoritarian regimes and multinational media corporations on the looser side. But now the Net's design is changing according to their needs. "In every context that it can, the entertaining industry is trying to force the Internet into its own business model: the perfect control of content. From music (fighting MP3) and film (fighting the portability of DVD) to television, the industry is resisting the Net's original design. It was about the free flow of content; Hollywood wants perfect control instead" (Lawrence Lessig, In the United States, Hollywood and For small independent media it will become very hard to be heard, especially for those offering streaming video and music. Increasingly faster data transmissions just apply to download capacities; upload capacities are much - on the average about eight times - lower than download capacities. As an AT&T executive said in response to criticism: "We haven't built a 56 billion dollar cable network to have the blood sucked from our veins" ( Consumers, not producers are preferred. For corporations what remains to be done to control the Net is mainly to cope with the fact that because of the Net it has become increasingly difficult to sustain cultural and legal standards. On Nov 11, 1995 the German prosecuting attorney's office searched Compuserve Germany, the branch of an international Internet service provider, because the company was suspected of having offered access to child pornography. Consequently Compuserve blocked access to more than 200 Also in 1995, as an attack on US Vice-President Al Gore's intention to supply all public schools with Internet access, Republican Senator Charles Grassley warned of the lurking dangers for children on the Net. By referring to a Time magazine cover story by Philip Elmer-Dewitt from July 3 on pornography on the Net, he pointed out that 83,5% of all images online are pornographic. But Elmer-Dewitt was wrong. Obviously unaware of the difference between Almost inevitably anxieties accompany the introduction of new technologies. In the 19th century it was said that traveling by train is bad for health. The debate produced by Time magazine's cover story and Senator Grassley's attack caused the impression that the Net has multiplied possible dangers for children. The global communication networks seem to be a inexhaustible source of mushrooming child pornography. Later would-be bomb recipes found on the Net added to already prevailing anxieties. As even in industrialized countries most people still have little or no first-hand experience with the Net, anxieties about child pornography or terrorist attacks can be stirred up and employed easily. A similar and related debate is going on about the glorification of violence and erotic depictions in media. Pointing to a "toxic popular culture" shaped by media that "distort children's view of reality and even undermine their character growth", US right-wing social welfare organizations and think tanks call for strong media censorship. (See An Appeal to Hollywood, The intentions for stimulating a debate on child pornography on the Net were manifold: Inter alia, it served the Republican Party to attack Democrat Al Gore's initiative to supply all public schools with Internet access; additionally, the big media corporations realized that because of the Net they might have to face new competitors and rushed to press for content regulation. Taking all these intentions together, we can say that this still ongoing debate constitutes the first and most well known attempt to impose content regulation on the Net. Consequently, at least in Western countries, governments and media corporations refer to child pornography for justifying legal requirement and the implementation of technologies for the surveillance and monitoring of individuals, the filtering, rating and blocking of content, and the prohibition of anonymous publishing on the Net. In the name of "cleaning" the Net of child pornography, our basic rights are restricted. It is the insistence on unrestricted basic rights that needs to be justified, as it may seem. Underlying the campaign to control the Net are several assumptions. Inter alia: The Net lacks control and needs to be made safe and secure; we may be exposed inadvertently to pornographic content; this content is harmful to children. Remarkably, racism seems to be not an issue. The Net, especially the World Wide Web, is not like television (although it is to be feared this is what it might become like within the next years). Say, little Mary types "Barbie" in a search engine. Click In reaction to these anxieties, but in absence of data how children use the Internet, the US government released the Communications Decency Act (CDA) in 1996. In consequence the So, after the failing of the CDA the US government has shifted its responsibility to the industry by inviting corporations to taking on governmental tasks. Bearing in the mind the CompuServe case and its possible consequences, the industry welcomed this decision and was quick to call this newly assumed responsibility "self-regulation". Strictly speaking, "self-regulation" as meant by the industry does not amount to the regulation of the behaviour of corporations by themselves. On the opposite, "self-regulation" is to be understood as the regulation of users' behaviour by the rating, filtering and blocking of Internet content considered being inappropriate. The Internet industry tries to show that technical solutions are more favourable than legislation und wants to be sure, not being held responsible and liable for illegal, offensive or harmful content. A new CompuServe case and a new Communications Decency Act shall be averted. In the Memorandum In fact, the "self-regulation" of the Internet industry is privatized censorship performed by corporations and right-wing NGOs. Censorship has become a business. "Crucially, the lifting of restrictions on market competition hasn't advanced the cause of freedom of expression at all. On the contrary, the privatisation of cyberspace seems to be taking place alongside the introduction of heavy censorship." ( While trying to convince us that its technical solutions are appropriate alternatives to government regulation, the Internet industry cannot dispense of governmental backing to enforce the proposed measures. This adds to and enforces the censorship measures already undertaken by governments. We are encouraged to use today's information and communication technologies, while the flow of information is restricted. According to a report by Reporters Sans Frontières, quoted by Leonard R. Sussman in his essay |
|
The North against the South? "Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market." (UNESCO, World Communication Report) The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else. Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left? |
|
The Kosovo-Crisis During the Kosovo Crisis and during the war that followed, and probably also after it, all sides of the conflict were manipulating their people and others as well, whenever they could. Some of the propaganda shown on TV was as primitive as in World War II, others were subtler. This propaganda started by telling the history of the geographic point of discussion from the own point of view, it went on with the interpretation of the motives of the enemy and finally came to censorship, manipulation of the number of victims ( for more information see: Many journalists and scientists are still working to detect more propaganda and disinformation stories. An interesting detail about this war was that more people than ever before took their information about the war out of the internet. In part this had to do with the biased TV-reports on all sides. All parties put their ideas and perspectives in the net, so one could get an overview of the different thoughts and types of disinformation. One of the big lies of The Serbs were not better than Western governments and media, which worked together closely. Serb TV showed the bombed targets and compared persons like More: |
|
Late 1970s - Present: Fourth Generation Computers Following the invention of the first Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used. Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. |
|
Introduction: The Substitution of Human Faculties with Technology: Computers and Robots With the development of modern computing, starting in the 1940s, the substitution of human abilities with technology obtained a new dimension. The focus shifted from the replacement of pure physical power to the substitution of mental faculties. Following the early 1980s personal computers started to attain widespread use in offices and quickly became indispensable tools for office workers. The development of powerful computers combined with progresses in |
|
Association for Progressive Communication (APC) The APC is a global federation of 24 non-profit Internet providers serving over 50,000 NGOs in 133 countries. Since 1990, APC has been supporting people and organizations worldwide, working together online for social, environmental and economic justice. The APC's network of members and partners spans the globe, with significant presence in Central and Eastern Europe, Africa, Asia and Latin America. History Between 1982 and 1987 several independent, national, non-profit computer networks emerged as viable information and communication resources for activists and NGOs. The networks were founded to make new communication techniques available to movements working for social change. In 1987, people at GreenNet in England began collaborating with their counterparts at the Institute for Global Communications (IGC) in the United States. These two networks started sharing electronic conference material and demonstrated that transnational electronic communications could serve international as well as domestic communities working for peace, human rights and the environment. This innovation proved so successful that by late 1989, networks in Sweden, Canada, Brazil, Nicaragua and Australia were exchanging information with each other and with IGC and GreenNet. In the spring of 1990, these seven organizations founded the Association for Progressive communications to co-ordinate the operation and development of this emerging global network of networks. Strategies and Policies The APC defends and promotes non-commercial, productive online space for NGOs and collaborates with like-minded organizations to ensure that the information and communication needs of civil society are considered in telecommunications, donor and investment policy. The APC is committed to freedom of expression and exchange of information on the Internet. The APC helps to build capacity between existing and emerging communication service providers. The APC Women's Networking Support Program promotes gender-aware Internet design, implementation and use. Through its African members, the APC is trying to strengthen indigenous information sharing and independent networking capacity on the continent. Members of APC develop Internet products, resources and tools to meet the advocacy, collaboration and information publishing and management needs of civil society. Recent APC initiatives have included the APC Toolkit Project: Online Publishing and Collaboration for Activists and the Mission-Driven Business Planning Toolkit. The APC also runs special projects like the Beijing+5, which shall enable non-governmental organizations to actively participate in the review of the Beijing Platform for Action. |
|
Biometric technologies In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" ( All biometric technologies are made up of the same basic processes: 1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question. 2. At every new identification, a second sample is collected and its identity with the first one is examined. 3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is. This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body. |
|
Media Giants Online The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes. Broadcasting ABC TV Network with 223 affiliated TV stations covering the entire U.S. ABC Radio Network, with 2,900 affiliated stations throughout the U.S. Owner of 9 VHF TV stations Owner of 11 AM and 10 FM stations Cable TV Systems and Channels/Networks 80 % of ESPN cable TV channel and ESPN International 50 % of Lifetime cable TV channel Internet/Interactive Disney Interactive - entertainment and educational computer software and video games, plus development of content for on-line services. Partnership with 3 phone companies to provide video programming and interactive services. ABC Online TV Production, Movies, Video, Music Disney Television Production studios and Walt Disney Pictures movie studio Buena Vista Television production company Buena Vista Home Video Miramax and Touchstone movie production companies Buena Vista Pictures Distribution and Buena Vista International, distributors for Disney and Touchstone movies Walt Disney Records, and Hollywood Records Publishing 6 daily newspapers About 40 weekly magazines, including: Discover, Women's Wear Daily, Los Angeles and Institutional Investor. Chilton Publications Guilford Publishing Co. Hitchcock Publishing Co. Theme Parks, Resorts, and Travel Disneyland Disney World and Disney World Resort Part owner of Disneyland-Paris and Tokyo Disneyland 12 resort hotels Disney Vacation Club Cruise Lines International TV, Film, and Broadcasting 50 % owner of Tele-München Fernseh GmbH & Co. 50 % owner of RTL Disney Fernseh GmbH & Co. 23 % owner of RTL 2 Fernseh GmbH & Co. 37,5 % owner of TM3 Fernseh GmbH & Co. 20-33 % stake in Eurosport network, Spanish Tesauro SA TV company, and Scandinavian Broadcasting System SA 20 % owner of TVA Other Over 500 Disney Stores, and licensing of Disney products The Mighty Ducks professional hockey team 25 % ownership of California Angels major league baseball team Business Connections with Other Media Companies Joint ventures, equity interests, or major arrangements with |
|
Economic rights The economic rights (besides |
|
Industrial design Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for |
|
Galileo Galilee Galileo Galilee (1564-1642), the Italian Mathematician and Physicist is called the father of Enlightenment. He proofed the laws of the free fall, improved the technique for the telescope and so on. Galilee is still famous for his fights against the Catholic Church. He published his writings in Italian instead of writing in Latin. Like this, everybody could understand him, which made him popular. As he did not stop talking about the world as a ball (the Heliocentric World System) instead of a disk, the Inquisition put him on trial twice and forbid him to go on working on his experiments. |
|
New World Order |
|
Enigma Machine The Enigma Encryption Machine was famous for its insecurities as for the security that it gave to German ciphers. It was broken, first by the Poles in the 1930s, then by the British in World War II. |
|
Leni Riefenstahl Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. |
|
DMCA The DMCA (Digital Millennium Copyright Act) was signed into law by U.S. President Clinton in 1998 and implements the two 1996 |
|
Invention According to the |
|
water-clocks The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message. |
|
General Electric GE is a major American corporation and one of the largest and most diversified corporations in the world. Its products include electrical and electronic equipment, plastics, aircraft engines, medical imaging equipment, and financial services. The company was incorporated in 1892, and in 1986 GE purchased the RCA Corporation including the RCA-owned television network, the National Broadcasting Company, Inc. In 1987, however, GE sold RCA's consumer electronics division to Thomson SA, a state-owned French firm, and purchased Thomson's medical technology division. In 1989 GE agreed to combine its European business interests in appliances, medical systems, electrical distribution, and power systems with the unrelated British corporation General Electric Company. Headquarters are in Fairfield, Conn., U.S. |
|
William Frederick Friedman Friedman is considered the father of U.S.-American cryptoanalysis - he also was the one to start using this term. |
|
Local Area Network (LAN) A Local Area Network is an office network, a network restricted to a building area. |
|
Transmission Control Protocol/Internet Protocol (TCP/IP) TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet. More detailed information can be found |
|
RIPE The RIPE Network Coordination Centre (RIPE NCC) is one of three Regional Internet Registries (RIR), which exist in the world today, providing allocation and registration services which support the operation of the Internet globally, mainly the allocation of http://www.ripe.net |
|
WIPO The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights. |
|
Adi Shamir Adi Shamir was one of three persons in a team to invent the |
|
Enigma Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra. |
|
RSA The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, |
|
Europe Online Established in 1998 and privately held, Europe Online created and operates the world's largest broadband "Internet via the Sky" network. The Europe Online "Internet via the Sky" service is available to subscribers in English, French, German, Dutch and Danish with more languages to come. http://www.europeonline.com |
|
Vinton Cerf Addressed as one of the fathers of the Internet, Vinton Cerf together with Robert Kahn developed the In 1992, he co-founded the Today, Vinton Cerf is Senior Vice President for Internet Architecture and Technology at Vinton Cerf's web site: http://www.wcom.com/about_the_company/cerfs_up/ |
|
Automation Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, |
|
COMECON The Council for Mutual Economic Aid (COMECON) was set up in 1949 consisting of six East European countries: Bulgaria, Czechoslovakia, Hungary, Poland, Romania, and the USSR, followed later by the German Democratic Republic (1950), Mongolia (1962), Cuba (1972), and Vietnam (1978). Its aim was, to develop the member countries' economies on a complementary basis for the purpose of achieving self-sufficiency. In 1991, Comecon was replaced by the Organization for International Economic Cooperation. |
|
Optical communication system by Aeneas Tacitus, 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, |
|
Richard Barbrook and Andy Cameron, The Californian Ideology According to Barbrook and Cameron there is an emerging global orthodoxy concerning the relation between society, technology and politics. In this paper they are calling this orthodoxy the Californian Ideology in honor of the state where it originated. By naturalizing and giving a technological proof to a political philosophy, and therefore foreclosing on alternative futures, the Californian ideologues are able to assert that social and political debates about the future have now become meaningless and - horror of horrors - unfashionable. - This paper argues for an interactive future. http://www.wmin.ac.uk/media/HRC/ci/calif.html |
|
Chappe's fixed optical network Claude Chappe built a fixed optical network between Paris and Lille. Covering a distance of about 240kms, it consisted of fifteen towers with semaphores. Because this communication system was destined to practical military use, the transmitted messages were encoded. The messages were kept such secretly, even those who transmit them from tower to tower did not capture their meaning, they just transmitted codes they did not understand. Depending on weather conditions, messages could be sent at a speed of 2880 kms/hr at best. Forerunners of Chappe's optical network are the For more information on early communication networks see |
|
PGP A |
|
Alexander Graham Bell b., March 3, 1847, Edinburgh d. Aug. 2, 1922, Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada American audiologist and inventor wrongly remembered for having invented the telephone in 1876. Although Bell introduced the first commercial application of the telephone, in fact a German teacher called Reiss invented it. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/1/0,5716,15411+1+15220,00.html |
|
Black Propaganda Black propaganda does not tell its source. The recipient cannot find out the correct source. Rather would it be possible to get a wrong idea about the sender. It is very helpful for separating two allies. |
|
Censorship of Online Content in China During the Tian-an men massacre reports and photos transmitted by fax machines gave notice of what was happening only with a short delay. The Chinese government has learned his lesson well and "regulated" Internet access from the beginning. All Internet traffic to and out of China passes through a few Users are expected not to "harm" China's national interests and therefore have to apply for permission of Internet access; Web pages have to be approved before being published on the Net. For the development of measures to monitor and control Chinese content providers, China's state police has joined forces with the MIT. For further information on Internet censorship, see Human Rights Watch, |
|
Intranet As a |
|
Instinet Instinet, a wholly owned subsidiary of |
|
Proxy Servers A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that security, administrative control, and caching service can be ensured. A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own Source: Whatis.com |
|
Network Information Center (NIC) Network information centers are organizations responsible for registering and maintaining the domain names on the |
|
Cutting The cutting of pictures in movies or photographs is highly manipulative: it is easy to produce a new video out of an already existing one. The result is a form of manipulation that is difficult to contradict. A reputation destroyed by this, is nearly impossible to heal. |
|
AT&T AT&T Corporation provides voice, data and video communications services to large and small businesses, consumers and government entities. AT&T and its subsidiaries furnish domestic and international long distance, regional, local and wireless communications services, cable television and Internet communications services. AT&T also provides billing, directory and calling card services to support its communications business. AT&T's primary lines of business are business services, consumer services, broadband services and wireless services. In addition, AT&T's other lines of business include network management and professional services through AT&T Solutions and international operations and ventures. In June 2000, AT&T completed the acquisition of MediaOne Group. With the addition of MediaOne's 5 million cable subscribers, AT&T becomes the country's largest cable operator, with about 16 million customers on the systems it owns and operates, which pass nearly 28 million American homes. (source: Yahoo) Slogan: "It's all within your reach" Business indicators: Sales 1999: $ 62.391 bn (+ 17,2 % from 1998) Market capitalization: $ 104 bn Employees: 107,800 Corporate website: |
|
Time Warner The largest media and entertainment conglomerate in the world. The corporation resulted from the merger of the publisher Time Inc. and the media conglomerate Warner Communications Inc. in 1989. It acquired the Turner Broadcasting System, Inc. (TBS) in 1996. Time Warner Inc.'s products encompass magazines, hardcover books, comic books, recorded music, motion pictures, and broadcast and cable television programming and distribution. The company's headquarters are in New York City. In January 2000 Time Warner merged with AOL (America Online), which owns several online-services like Compuserve, Netscape and Netcenter in a US$ 243,3 billion deal. |
|
First Amendment Handbook The First Amendment to the US Constitution, though short, lists a number of rights. Only a handful of words refer to freedoms of speech and the press, but those words are of incalculable significance. To understand the current subtleties and controversies surrounding this right, check out this First Amendment site. This detailed handbook of legal information, mostly intended for journalists, should be of interest to anyone who reads or writes. For example, the chapter Invasion of Privacy shows the limits of First Amendment rights, and the balance between the rights of the individual and the rights of the public - or, more crudely, the balance of Tabloid vs. Celebrity. Each section is carefully emended with relevant legal decisions. http://www.rcfp.org/handbook/viewpage.cgi |
|
Royalties Royalties refer to the payment made to the owners of certain types of rights by those who are permitted by the owners to exercise the rights. The |
|
Ross Perot Ross Perot, founder of Official website: Unofficial website: |
|
Hieroglyphs Hieroglyphs are pictures, used for writing in ancient Egypt. First of all those pictures were used for the names of kings, later more and more signs were added, until a number of 750 pictures |
|
NATO The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of |
|
Internet Software Consortium The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community. http://www.isc.org |
|
Mark A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." ( |
|
Internet Society Founded in 1992, the Internet Society is an umbrella organization of several mostly self-organized organizations dedicated to address the social, political, and technical issues, which arise as a result of the evolution and the growth of the Net. Its most important subsidiary organizations are the Its members comprise companies, government agencies, foundations, corporations and individuals. The Internet Society is governed by elected trustees. |
|
Saddam Hussein Saddam Hussein joined the revolutionary Baath party when he was a university student. In 1958 he had the head of Iraq, Abdul-Karim Qassim, killed. Since 1979 he has been President of Iraq. Under his reign Iraq fought a decade-long war with Iran. Because of his steady enmity with extreme Islamic leaders the West supported him first of all, until his army invaded Kuwait in August 1990, an incident that the USA led to the Gulf War. Since then many rumors about a coup d'état have been launched, but Saddam Hussein is still in unrestricted power. |
|
NSFNet Developed under the auspices of |
|
John von Neumann b. December 3, 1903, Budapest, Hungary d. February 8, 1957, Washington, D.C., U.S. Mathematician who made important contributions in quantum physics, logic, meteorology, and computer science. His theory of games had a significant influence upon economics. In computer theory, von Neumann did much of the pioneering work in logical design, in the problem of obtaining reliable answers from a machine with unreliable components, the function of "memory," machine imitation of "randomness," and the problem of constructing automata that can reproduce their own kind. |
|
Internet Architecture Board On behalf of the Internet Society: |
|
America Online Founded in 1985, America Online is the world's biggest Internet service provider serving almost every second user. Additionally, America Online operates CompuServe, the Netscape Netcenter and several AOL.com portals. As the owner of Netscape, Inc. America Online plays also an important role in the Web browser market. In January 2000 America Online merged with Time Warner, the worlds leading media conglomerate, in a US$ 243,3 billion deal, making America Online the senior partner with 55 percent in the new company. |
|
Fiber-optic cable networks Fiber-optic cable networks may become the dominant method for high-speed Internet connections. Since the first fiber-optic cable was laid across the Atlantic in 1988, the demand for faster Internet connections is growing, fuelled by the growing network traffic, partly due to increasing implementation of corporate networks spanning the globe and to the use of graphics-heavy contents on the Fiber-optic cables have not much more in common with copper wires than the capacity to transmit information. As copper wires, they can be terrestrial and submarine connections, but they allow much higher transmission rates. Copper wires allow 32 telephone calls at the same time, but fiber-optic cable can carry 40,000 calls at the same time. A capacity, Copper wires will not come out of use in the foreseeable future because of technologies as For technical information from the Encyclopaedia Britannica on telecommunication cables, click An entertaining report of the laying of the FLAG submarine cable, up to now the longest fiber-optic cable on earth, including detailed background information on the cable industry and its history, Neal Stephenson has written for Wired: Mother Earth Mother Board. Click Susan Dumett has written a short history of undersea cables for Pretext magazine, Evolution of a Wired World. Click A timeline history of submarine cables and a detailed list of seemingly all submarine cables of the world, operational, planned and out of service, can be found on the Web site of the For maps of fiber-optic cable networks see the website of |
|
Federal Networking Council Being an organization established in the name of the US government, the Federal Networking Council (FNC) acts as a forum for networking collaborations among Federal agencies to meet their research, education, and operational mission goals and to bridge the gap between the advanced networking technologies being developed by research FNC agencies and the ultimate acquisition of mature version of these technologies from the commercial sector. Its members are representatives of agencies as the National Security Agency, the Department of Energy, the http://www.fnc.gov |
|
CIM To perform manufacturing firm's functions related to design and production the CAD/CAM technology, for computer-aided design and computer-aided manufacturing, was developed. Today it is widely recognized that the scope of computer applications must extend beyond design and production to include the business functions of the firm. The name given to this more comprehensive use of computers is computer-integrated manufacturing (CIM). |
|
Integrated circuit Also called microcircuit, the integrated circuit is an assembly of electronic components, fabricated as a single unit, in which active semiconductor devices ( |
|
Binary number system In mathematics, the term binary number system refers to a positional numeral system employing 2 as the base and requiring only two different symbols, 0 and 1. The importance of the binary system to information theory and computer technology derives mainly from the compact and reliable manner in which data can be represented in electromechanical devices with two states--such as "on-off," "open-closed," or "go-no go." |
|
National Laboratory for Applied Network Research NLANR, initially a collaboration among supercomputer sites supported by the Today NLANR offers support and services to institutions that are qualified to use high performance network service providers - such as Internet 2 and http://www.nlanr.net |
|
Extranet An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g. |
|