RTMark and Adbusters at the WTO Conference in Seattle

The 1999 WTO (World Trade Organization) Conference in Seattle not only attracted a multitude of demonstrators, but also artistic and cultural activists like RTMark and Adbusters.

Adbusters, well known as fighters against corporate disinformation, injustices in the global economy and "physical and mental pollution", timely for the WTO Conference purchased three billboards in downtown Seattle. Featuring an image with the text "System Error - Type 2000 (progress)", the billboards were meant to challenge "... the WTO's agenda of global corporate growth and expose what isn't reflected in the United State's GNP - human and environmental capital."

At the same time RTMark went on-line with its spoof WTO website http://gatt.org. Shortly after its release WTO Director-General Mike Moore accused RTMark of attempting to "undermine WTO transparency" by copying the WTO website's design and using "domain names such as `www.gatt.org` and page titles such as 'World Trade Organization / GATT Home Page' which make it difficult for visitors to realize that these are fake pages." http://gatt.org is not the first time that RTMark has used website imitation aiming at rendering an entity more transparent. RTMark has performed the same "service" for George W. Bush, Rudy Giuliani, Shell Oil, and others with the principal purpose of publicizing corporate abuses of democratic processes.

TEXTBLOCK 1/16 // URL: http://world-information.org/wio/infostructure/100437611652/100438658922
 
The Copyright Industry

Copyright is not only about protecting the rights of creators, but has also become a major branch of industry with significant contributions to the global economy. According to the International Intellectual Property Alliance the U.S. copyright industry has grown almost three times as fast as the economy as a whole for the past 20 years. In 1997, the total copyright industries contributed an estimated US$ 529.3 billion to the U.S. economy with the core copyright industries accounting for US$ 348.4 billion. Between 1977 and 1997, the absolute growth rate of value added to the U.S. GDP by the core copyright industries was 241 %. Also the copyright industry's foreign sales in 1997 (US$ 66.85 billion for the core copyright industries) were larger than the U.S. Commerce Department International Trade Administration's estimates of the exports of almost all other leading industry sectors. They exceeded even the combined automobile and automobile parts industries, as well as the agricultural sector.

In an age where knowledge and information become more and more important and with the advancement of new technologies, transmission systems and distribution channels a further increase in the production of intellectual property is expected. Therefore as copyright establishes ownership in intellectual property it is increasingly seen as the key to wealth in the future.

TEXTBLOCK 2/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438658710
 
fingerprint identification

Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion.

As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment.

Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device (http://www.ddsi-cpc.com) which translates the characteristics of a fingerprint into a digitised image.

As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies.

TEXTBLOCK 3/16 // URL: http://world-information.org/wio/infostructure/100437611729/100438658358
 
Public Relations

Often public relations are described as the effort to influence the public or relevant parts of it by representing self-interests to reach certain goals. This view of PR is most commonly found, when acting within the economic sphere. On the other hand organizations like the PRSA (Public Relations Society of America) as well as several PR theorists and practitioners see themselves as social engineers, responsible for societal harmony. "Public relations help our complex, pluralistic society to reach decisions and function more effectively by contributing to mutual understanding among institutions. It serves to bring public and public policies into harmony...", the PRSA announced in one of their official statements on public relations.

TEXTBLOCK 4/16 // URL: http://world-information.org/wio/infostructure/100437611652/100438658047
 
Challenges for Copyright by ICT: Internet Service Providers

ISPs (Internet Service Providers) (and to a certain extent also telecom operators) are involved in the copyright debate primarily because of their role in the transmission and storage of digital information. Problems arise particularly concerning caching, information residing on systems or networks of ISPs at the directions of users and transitory communication.

Caching

Caching it is argued could cause damage because the copies in the cache are not necessarily the most current ones and the delivery of outdated information to users could deprive website operators of accurate "hit" information (information about the number of requests for a particular material on a website) from which advertising revenue is frequently calculated. Similarly harms such as defamation or infringement that existed on the original page may propagate for years until flushed from each cache where they have been replicated.

Although different concepts, similar issues to caching arise with mirroring (establishing an identical copy of a website on a different server), archiving (providing a historical repository for information, such as with newsgroups and mailing lists), and full-text indexing (the copying of a document for loading into a full-text or nearly full-text database which is searchable for keywords or concepts).

Under a literal reading of some copyright laws caching constitutes an infringement of copyright. Yet recent legislation like the DMCA or the proposed EU Directive on copyright and related rights in the information society (amended version) have provided exceptions for ISPs concerning particular acts of reproduction that are considered technical copies (caching). Nevertheless the exemption of liability for ISPs only applies if they meet a variety of specific conditions. In the course of the debate about caching also suggestions have been made to subject it to an implied license or fair use defense or make it (at least theoretically) actionable.

Information Residing on Systems or Networks at the Direction of Users

ISPs may be confronted with problems if infringing material on websites (of users) is hosted on their systems. Although some copyright laws like the DMCA provide for limitations on the liability of ISPs if certain conditions are met, it is yet unclear if ISPs should generally be accountable for the storage of infringing material (even if they do not have actual knowledge) or exceptions be established under specific circumstances.

Transitory Communication

In the course of transmitting digital information from one point on a network to another ISPs act as a data conduit. If a user requests information ISPs engage in the transmission, providing of a connection, or routing thereof. In the case of a person sending infringing material over a network, and the ISP merely providing facilities for the transmission it is widely held that they should not be liable for infringement. Yet some copyright laws like the DMCA provide for a limitation (which also covers the intermediate and transient copies that are made automatically in the operation of a network) of liability only if the ISPs activities meet certain conditions.

For more information on copyright (intellectual property) related problems of ISPs (BBSs (Bulletin Board Service Operators), systems operators and other service providers) see:

Harrington, Mark E.: On-line Copyright Infringement Liability for Internet Service Providers: Context, Cases & Recently Enacted Legislation. In: Intellectual Property and Technology Forum. June 4, 1999.

Teran, G.: Who is Vulnerable to Suit? ISP Liability for Copyright Infringement. November 2, 1999.

TEXTBLOCK 5/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438659550
 
The Piracy "Industry"

Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of intellectual property by permitting still easier copying, electronic sales and transmissions of illegally reproduced copyrighted works on a grand scale.

This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent copy-protection security measures.

Lately the International Intellectual Property Alliance has published a new report on the estimated trade losses due to piracy. (The IIPA assumes that their report actually underestimates the loss of income due to the unlawful copying and distribution of copyrighted works. Yet it should be taken into consideration that the IIPA is the representative of the U.S. core copyright industries (business software, films, videos, music, sound recordings, books and journals, and interactive entertainment software).)

Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)





Motion Pictures

Records & Music

Business Applications

Entertainment Software

Books





1999

1998

1999

1998

1999

1998

1999

1998

1999

1998

Total Losses

1323

1421

1684

1613

3211

3437

3020

2952

673

619



Total Losses (core copyright industries)

1999

1998

9910.0

10041.5




TEXTBLOCK 6/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438659531
 
Exchange of the Text

One of the easiest tools for disinformation is to exchange the words written below a photograph. The entire meaning of the picture can be varied like this:

- The visit of a school-group at a former international camp can change into a camp, where children are imprisoned (which happened in the Russian city of Petroskoy in 1944).

- Victims of war can change nationality. The picture of the brutal German soldier in World War II that was shown in many newspapers to demonstrate the so-called typical face of a murderer, turned out to be French and a victim in other newspapers.

- In 1976 a picture of children in a day-nursery in the GDR is taken: The children, coming out of the shower, were dressed up in terry cloth suits with stripes. The same year the photograph with the happily laughing boys and girls wins the contest "a beautiful picture". Two years later a small part of the photograph can be seen in a Christian magazine in West-Germany, supposedly showing children from a concentration camp in the USSR. The smiling faces now seem to scream. (source: Stiftung Haus der Geschichte der Bundesrepublik Deutschland (ed.): Bilder, die lügen. Begleitbuch zur Ausstellung im Haus der Geschichte der Bundesrepublik Deutschland. Bonn 1998, p. 79)

TEXTBLOCK 7/16 // URL: http://world-information.org/wio/infostructure/100437611661/100438658773
 
Individualized Audience Targeting

New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like Amazon.Com have already started to exploit individualized audience targeting for their purposes.

TEXTBLOCK 8/16 // URL: http://world-information.org/wio/infostructure/100437611652/100438658450
 
Positions Towards the Future of Copyright in the "Digital Age"

With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified:

Eliminate Copyright

Anti-copyrightists believe that any intellectual property should be in the public domain and available for all to use. "Information wants to be free" and copyright restricts people's possibilities concerning the utilization of digital content. An enforced copyright will lead to a further digital divide as copyright creates unjust monopolies in the basic commodity of the "information age". Also the increased ease of copying effectively obviates copyright, which is a relict of the past and should be expunged.

Enlarge Copyright

Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other core copyright industries) - and therefore recipients of the royalties - adhere to the idea of enlarging copyright. In their view the basic foundation of copyright - the response to the need to provide protection to authors so as to give them an incentive to invest the time and effort required to produce creative works - is also relevant in a digital environment.

TEXTBLOCK 9/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438659711
 
Biometrics applications: access to rights

Biometric technologies are increasingly used in order to control access to political rights, such as voting, welfare benefits, etc.

Identification cards with digitised fingerprints are being used in elector identification of voters in some countries (e.g. Mexico and Spain).

Biometric identification is also being introduced in national health care systems, as for example in the Canadian province of Ontario, in Los Angeles and Connecticut. Spain is developing a smart card for all welfare and pension benefits.

TEXTBLOCK 10/16 // URL: http://world-information.org/wio/infostructure/100437611729/100438658821
 
Copyright Management and Control Systems: Post-Infringement

Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:

Steganography

Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.

Agents

Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.

Copyright Litigation

While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.

TEXTBLOCK 11/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
 
The Role of the Media

To be able to participate in community life and make political choices citizens heavily rely on information. They need to know what is going on and the options that they should weigh, debate and act upon. An essential element for a functioning public sphere therefore is information.

Whereas formerly communication mostly happened on a face-to-face basis in large and complex societies (mass) media have evolved as the principal source of information. They act as a transport medium for the information necessary for a citizen's participation in the public sphere. Ideally there should be a wide range of media, that represent the diverse opinions and viewpoints on issues of public interest existent in a society and which are independent of the state and society's dominant economic forces.

TEXTBLOCK 12/16 // URL: http://world-information.org/wio/infostructure/100437611734/100438658499
 
Virtual body and data body



The result of this informatisation is the creation of a virtual body which is the exterior of a man or woman's social existence. It plays the same role that the physical body, except located in virtual space (it has no real location). The virtual body holds a certain emancipatory potential. It allows us to go to places and to do things which in the physical world would be impossible. It does not have the weight of the physical body, and is less conditioned by physical laws. It therefore allows one to create an identity of one's own, with much less restrictions than would apply in the physical world.

But this new freedom has a price. In the shadow of virtualisation, the data body has emerged. The data body is a virtual body which is composed of the files connected to an individual. As the Critical Art Ensemble observe in their book Flesh Machine, the data body is the "fascist sibling" of the virtual body; it is " a much more highly developed virtual form, and one that exists in complete service to the corporate and police state."

The virtual character of the data body means that social regulation that applies to the real body is absent. While there are limits to the manipulation and exploitation of the real body (even if these limits are not respected everywhere), there is little regulation concerning the manipulation and exploitation of the data body, although the manipulation of the data body is much easier to perform than that of the real body. The seizure of the data body from outside the concerned individual is often undetected as it has become part of the basic structure of an informatised society. But data bodies serve as raw material for the "New Economy". Both business and governments claim access to data bodies. Power can be exercised, and democratic decision-taking procedures bypassed by seizing data bodies. This totalitarian potential of the data body makes the data body a deeply problematic phenomenon that calls for an understanding of data as social construction rather than as something representative of an objective reality. How data bodies are generated, what happens to them and who has control over them is therefore a highly relevant political question.

TEXTBLOCK 13/16 // URL: http://world-information.org/wio/infostructure/100437611761/100438659695
 
Legal Protection: Multilateral Agreements

With the rise of a global economic system a desire to establish agreements, which protect works not only within national borders, but also within a "Union" of countries or on an international level, has been expressed. As a consequence a variety of multilateral treaties have been negotiated and adopted by governments. Those shall simplify practice through international standardization and mutual recognition of rights and duties among nations.


TEXTBLOCK 14/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438659570
 
History: European Tradition

Only in Roman times the first rights referring to artistic works appeared. Regulations resembling a lasting exclusive right to copy did not occur until the 17th century. Before copyright was a private arrangement between guilds able to reproduce copies in commercial quantities.

In France and Western European countries "droits d'auteur" or author's rights is the core of what in the Anglo-American tradition is called copyright. Such rights are rooted in the republican revolution of the late 18th century, and the Rights of Man movement. Today in the European system the creator is front and center; later exploiters are only secondary players.

France

During the 18th century France gradually lost the ability to restrict intellectual property. Before the Revolution, all books, printers and booksellers had to have a royal stamp of approval, called a "privilege". In return for their lucrative monopoly, the French guild of printers and booksellers helped the police to suppress anything that upset royal sensibilities or ran contrary to their interests. Still there were also a whole lot of underground printers who flooded the country with pirated, pornographic and seditious literature. And thousands of writers, most at the edge of starvation.

In 1777 the King threatened the monopoly by reducing the duration of publisher's privileges to the lifetime of the authors. Accordingly a writer's work would go into the public domain after his death and could be printed by anyone. The booksellers fought back by argumenting that, no authority could take their property from them and give it to someone else. Seven months later, in August 1789, the revolutionary government ended the privilege system and from that time on anyone could print anything. Early in 1790 Marie-Jean-Antoine-Nicolas de Caritat, Marquis de Condorcet proposed giving authors power over their own work lasting until ten years after their deaths. The proposal - the basis for France's first modern copyright law - passed in 1793.

TEXTBLOCK 15/16 // URL: http://world-information.org/wio/infostructure/100437611725/100438659414
 
Definition

During the last 20 years the old Immanuel Wallerstein-paradigm of center - periphery and semi-periphery found a new costume: ICTs. After Colonialism, Neo-Colonialism and Neoliberalism a new method of marginalization is emerging: the digital divide.

"Digital divide" describes the fact that the world can be divided into people who
do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide.
More than 80% of all computers with access to the Internet are situated in larger cities.

"The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium."
(Izumi Aizi)

for more information see:
http://www.whatis.com/digital_divide.htm

TEXTBLOCK 16/16 // URL: http://world-information.org/wio/infostructure/100437611730/100438659300
 
Rudy Giuliani

Born in 1944, Giuliani became famous in the mid Eighties, as a typical Eighties figure: a censor of corruption and greed. In the Seventies he had switched his registration from Democratic to Republican, and served a stint in the Reagan Justice Department. In 1983 he became U.S. Attorney for the southern District of New York, and his career took off. He was aggressive, headline grabbing, none too scrupulous about the finer points of civil liberties, and often effective. He used the RICO Act against organized crime, and pioneered the use of asset forfeiture in prosecuting drug dealers. He also moved against political corruption in New York City, toppling the Democratic leaders of the Bronx and Queens.

INDEXCARD, 1/9
 
WIPO

The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights.

INDEXCARD, 2/9
 
Moral rights

Authors of copyrighted works (besides economic rights) enjoy moral rights on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.

INDEXCARD, 3/9
 
Neighboring rights

Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

INDEXCARD, 4/9
 
Hieroglyphs

Hieroglyphs are pictures, used for writing in ancient Egypt. First of all those pictures were used for the names of kings, later more and more signs were added, until a number of 750 pictures

INDEXCARD, 5/9
 
IDEA

IDEA is another symmetric-key system. It is a block cipher, operating on 64-bit plaintext blocks, having a key-length of 128 bits.

INDEXCARD, 6/9
 
WTO

An international organization designed to supervise and liberalize world trade. The WTO (World Trade Organization) is the successor to the General Agreement on Tariffs and Trade (GATT), which was created in 1947 and liberalized the world's trade over the next five decades. The WTO came into being on Jan. 1, 1995, with 104 countries as its founding members. The WTO is charged with policing member countries' adherence to all prior GATT agreements, including those of the last major GATT trade conference, the Uruguay Round (1986-94), at whose conclusion GATT had formally gone out of existence. The WTO is also responsible for negotiating and implementing new trade agreements. The WTO is governed by a Ministerial Conference, which meets every two years; a General Council, which implements the conference's policy decisions and is responsible for day-to-day administration; and a director-general, who is appointed by the Ministerial Conference. The WTO's headquarters are in Geneva, Switzerland.



INDEXCARD, 7/9
 
Technological measures

As laid down in the proposed EU Directive on copyright and related rights in the information society technological measures mean "... any technology, device, or component that, in the normal course of its operations, is designed to prevent or inhibit the infringement of any copyright..." The U.S. DMCA (Digital Millennium Copyright Act) divides technological measures in two categories: 1) measures that prevent unauthorized access to a copyrighted work, and 2) measures that prevent unauthorized copying of a copyrighted work. Also the making or selling of devices or services that can be used to circumvent either category of technological measures is prohibited under certain circumstances in the DMCA. Furthermore the 1996 WIPO Copyright Treaty states that the "... contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors..."

INDEXCARD, 8/9
 
Core copyright industries

Those encompass the industries that create copyrighted works as their primary product. These industries include the motion picture industry (television, theatrical, and home video), the recording industry (records, tapes and CDs), the music publishing industry, the book, journal and newspaper publishing industry, and the computer software industry (including data processing, business applications and interactive entertainment software on all platforms), legitimate theater, advertising, and the radio, television and cable broadcasting industries.

INDEXCARD, 9/9