Abstract

What we seem to fear most is to get into a status of insecurity - given that the definitions of the word security vary extremely. Thus methods of securing ideas, people, things or data increase their popularity and necessity tremendously. One of them is cryptography - as well as the prohibition/restriction of cryptography.
Questions whether cryptography is absolutely inevitable or on the contrary supports certain criminals more than the ordinary internet-user, are arising. And as the last developments in international and national law showed, Northern governments are changing opinion about that, due to economic tasks.
Business needs cryptography.
Still, the use of cryptography is no recent invention. Already the first steps in writing or even in human communication itself meant developing codes for keeping secrets at the same time as providing information.

This site gives a timeline for the history of cryptography, provides an introduction into the most important terms of tools and devices connected to that topic, and finally tries to interpret necessities for and ideas against cryptography or in other words leads through the current discussions concerning democracy and governmental fears and doubts regarding the security of data-transmission.

TEXTBLOCK 1/4 // URL: http://world-information.org/wio/infostructure/100437611776/100438658887
 
Disinformation and Science

Disinformation's tools emerged from science and art.
And furthermore: disinformation can happen in politics of course, but also in science:
for example by launching ideas which have not been proven exactly until the moment of publication. e.g. the thought that time runs backwards in parts of the universe:
http://www.newscientist.com/ns/19991127/newsstory3.html

TEXTBLOCK 2/4 // URL: http://world-information.org/wio/infostructure/100437611661/100438658699
 
Introduction

"A man is crazy who writes a secrete
in any other way than one which
will conceal it from the vulgar."
Roger Bacon (~1250 AD)



The essence of human communication is not only the social behavior to give or get messages (of whatever meaning) but also how to give and get them, and to include certain people by excluding others from the process of informing.
e.g. whispering is an effective way of talking to exclude the majority.
What about ways of writing?
Already some of the first written messages in human history obviously found special forms of hiding contents from the so-called others. When the knowledge of writing meant a privilege in a stronger sense as it is true today (in China for a long period writing was forbidden to people not working for the government), the alphabet itself was a kind of cryptography (that is why Catholic churches were painted with pictures explaining the stories of the Bible).

Certainly the methods of deciphering and enciphering improved a lot during the last 4.000 years. In the meantime cryptography has become a topic without end and with less technological limits every day. On the one hand there is the field of biometrics, which is highly related to cryptography but still in its beginnings, on the other hand there emerge so-called infowars, which intend to substitute or at least accompany war and are unthinkable without cryptography.
But there is much more to detect, like the different forms of de- and encoding. And very important, too, there is the history of cryptography that tells us about the basics to make it easier to understand today's issues.

In the actual age of (dis-)information storing and transporting electronic information safely increases its importance. Governments, institutions, economy and individuals rely on the hope that no-one can read or falsify their messages/data as it is much more difficult to detect and proof abuses in electronic media than in elder forms of written communication.

TEXTBLOCK 3/4 // URL: http://world-information.org/wio/infostructure/100437611776/100438658802
 
Examples of Mainly Corporate Funded Think Tanks: Brookings Institution

With a budget of US$ 23 million and assets worth US$ 192 million the Brookings Institution, based in Washington D.C., in 1998 was funded by: Corporate and private donations (38 %), endowment (30 %), revenue from conferences and seminars (18 %), sales of publications (9 %), government support (2 %).

Among the 138 corporate donors are: Bell Atlantic, Citibank, J.P. Morgan, Goldman Sachs, NationsBank, Exxon, Chevron, Microsoft, Hewlett Packard, Toyota, Pfizer, Johnson & Johnson, Dupont, Mobil and Lockheed Martin, and the foundations of companies like American Express, Travelers, AT&T and McDonnell Douglas. A few media conglomerates, like Time Warner and the Washington Post Co.. Contributions of individual donors include executives from Visa, Procter and Gamble, BankAmerica and U.S. Airways.

TEXTBLOCK 4/4 // URL: http://world-information.org/wio/infostructure/100437611704/100438658213
 
WIPO

The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights.

INDEXCARD, 1/3
 
Optical communication system by Aeneas Tacitus, 4th century B.C.

Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook.

With communication separated from transportation, the distant became near.

Tacitus' telegraph system was very fast and not excelled until the end of the 18th century.

For further information see Joanne Chang & Anna Soellner, Decoding Device, http://www.smith.edu/hsc/museum/ancient_inventions/decoder2.html

http://www.smith.edu/hsc/museum/ancient_inven...
INDEXCARD, 2/3
 
Intellectual property

Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property (inventions, marks, industrial designs, unfair competition and geographical indications), and 2) copyright. The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products.

INDEXCARD, 3/3