1961: Installation of the First Industrial Robot

Industrial robotics, an automation technology relying on the two technologies of numerical control and teleoperators, started to gain widespread attendance in the 1960s. The first industrial robot was installed at General Motors in 1961. Developed by Joe Engelberger and George Devol, UNIMATE obeyed step-by-step commands stored on a magnetic drum and with its 4,000 pound arm sequenced and stacked hot pieces of die-cast metal.

TEXTBLOCK 1/7 // URL: http://world-information.org/wio/infostructure/100437611663/100438659325
 
Late 1950s - Early 1960s: Second Generation Computers

An important change in the development of computers occurred in 1948 with the invention of the transistor. It replaced the large, unwieldy vacuum tube and as a result led to a shrinking in size of electronic machinery. The transistor was first applied to a computer in 1956. Combined with the advances in magnetic-core memory, the use of transistors resulted in computers that were smaller, faster, more reliable and more energy-efficient than their predecessors.

Stretch by IBM and LARC by Sperry-Rand (1959) were the first large-scale machines to take advantage of the transistor technology (and also used assembly language instead of the difficult machine language). Both developed for atomic energy laboratories could handle enormous amounts of data, but still were costly and too powerful for the business sector's needs. Therefore only two LARC's were ever installed.

Throughout the early 1960s there were a number of commercially successful computers (for example the IBM 1401) used in business, universities, and government and by 1965 most large firms routinely processed financial information by using computers. Decisive for the success of computers in business was the stored program concept and the development of sophisticated high-level programming languages like FORTRAN (Formular Translator), 1956, and COBOL (Common Business-Oriented Language), 1960, that gave them the flexibility to be cost effective and productive. The invention of second generation computers also marked the beginning of an entire branch, the software industry, and the birth of a wide range of new types of careers.

TEXTBLOCK 2/7 // URL: http://world-information.org/wio/infostructure/100437611663/100438659439
 
Legal Protection: European Union

Within the EU's goal of establishing a European single market also intellectual property rights are of significance. Therefore the European Commission aims at the harmonization of the respective national laws of the EU member states and for a generally more effective protection of intellectual property on an international level. Over the years it has adopted a variety of Conventions and Directives concerned with different aspects of the protection of industrial property as well as copyright and neighboring rights.

An overview of EU activities relating to intellectual property protection is available on the website of the European Commission (DG Internal Market): http://www.europa.eu.int/comm/internal_market/en/intprop/intprop/index.htm

TEXTBLOCK 3/7 // URL: http://world-information.org/wio/infostructure/100437611725/100438659574
 
The plastic card invasion

The plastic card invasion.

The tendency of modern data-driven economies is to structure economic activity in such a way that an increasing amount of data is generated. For example, the fact that only a few years ago few people in continental Europe used a credit card, and that now almost everybody who has a bank account also has a credit card, shows that payment by credit card is preferred to anonymous cash transaction. If somebody pays by credit card, there are computers that register the transaction. They record who paid what amount where, and for what purpose. This is valuable information. It allows businesses to "better know their customers". Credit card companies today belong to the largest data repositories anywhere. However, credit card companies have tried to introduce cash cards, or "electronic purses", plastic cards which can be used in lieu of cash in shops - a type of payment, that is not really catching on. In the small town of Ennis, Ireland's "information age town" a field test carried out by Visa, found that people are extremely reluctant to change their cash into bits. "It is just too modern", was the conclusion of an Ennis shopkeeper.

Credit cards may be the most common, but certainly not the only way in which an economic activity produces a data surplus. In the end, the data surplus generated by a credit card is limited to just a few indicators. The tendency of the data body industry is to collect as much data as possible from each single transaction. Therefore, a range of new plastic card applications is emerging.

Most big retailers or service industries, offer customer cards which reward customers with certain discounts or gifts when used frequently. However, the cost of these discounts is easily set off by the value consumer data that is generated each time a card is pulled through the magnetic reading device. Frequent-flyer cards are among the most common plastic data-collecting devices. Often such frequent-flyer cards are also credit cards, in which case travel and consumption data are already combined at the point of sale, creating further rationalisation of the process.

Electronic networks have created a general tendency to move to move marketing decisions to the point of sale, rather than locating them in central locations. This way, the marketing process becomes cheaper and more efficient for the company.

The ideal situation for the data body industry and for government bureaucracy would be a complete centralised storage and management of people's data, and a collection process the pass unnoticed and ensures that the data in question are always current. Many efforts in this direction have been undertaken. One of the most recent such projects is called the smart card. Also referred to as chip cards (because it operates not just with a magnetic stripe but also an computer chip) smart cards are multi-application "intelligent" plastic cards that carry a lot more than the usual information about its holder. For example, a smart card can carry details about right of access to facilities, credit information, social security, and electoral status all in one. Technically there are no limits to the type of information stored on smart cards. In principle it is possible to store an individual's entire data body on a card. Not surprisingly, smart card technologies have been most readily accepted in places with a lack of a privacy protection culture, such as the US, the UK, Spain, and some Latin American Countries.

The Irish town of Ennis, although striving to become "one of the technologically most advanced towns in the world" may have frustrated the expectations of the plastic card industry. Yet this is only a minute, if embarrassing, setback on the path towards global rationalisation of data collection. The economic benefits which the plastic card data collection technologies promises for retailers, E-commerce, marketing and bureaucracies all over the world have given rise to a wealth of research programmes, field tests, projects and government policies, all aimed at promoting the data body economy and adopting it as the business model of the future.

Links to plastic card trade associations:

Card Europe - Association for Smart Card and Related Industries

AIM - Global Trade Association for Automatic Identification and Data Collection

Card Forum

Smart Card Industry Association

Links to plastic card research programmes:

MIT (Massachusetts Institute of Technology)

Ohio University

Pittsburgh University

Cranfield University

Links to publications:

Card Technology Magazine

Links to EU research programmes

ADEPT2

COCLICO

COST219

DISTINCT

SAMPO

SATURN

SOSCARD

Producers

Schlumberger

Gemplus

Bull

TEXTBLOCK 4/7 // URL: http://world-information.org/wio/infostructure/100437611761/100438659752
 
Virtual body and data body



The result of this informatisation is the creation of a virtual body which is the exterior of a man or woman's social existence. It plays the same role that the physical body, except located in virtual space (it has no real location). The virtual body holds a certain emancipatory potential. It allows us to go to places and to do things which in the physical world would be impossible. It does not have the weight of the physical body, and is less conditioned by physical laws. It therefore allows one to create an identity of one's own, with much less restrictions than would apply in the physical world.

But this new freedom has a price. In the shadow of virtualisation, the data body has emerged. The data body is a virtual body which is composed of the files connected to an individual. As the Critical Art Ensemble observe in their book Flesh Machine, the data body is the "fascist sibling" of the virtual body; it is " a much more highly developed virtual form, and one that exists in complete service to the corporate and police state."

The virtual character of the data body means that social regulation that applies to the real body is absent. While there are limits to the manipulation and exploitation of the real body (even if these limits are not respected everywhere), there is little regulation concerning the manipulation and exploitation of the data body, although the manipulation of the data body is much easier to perform than that of the real body. The seizure of the data body from outside the concerned individual is often undetected as it has become part of the basic structure of an informatised society. But data bodies serve as raw material for the "New Economy". Both business and governments claim access to data bodies. Power can be exercised, and democratic decision-taking procedures bypassed by seizing data bodies. This totalitarian potential of the data body makes the data body a deeply problematic phenomenon that calls for an understanding of data as social construction rather than as something representative of an objective reality. How data bodies are generated, what happens to them and who has control over them is therefore a highly relevant political question.

TEXTBLOCK 5/7 // URL: http://world-information.org/wio/infostructure/100437611761/100438659695
 
How the Internet works

On the Internet, when you want to retrieve a document from another computer, you request a service from this computer. Your computer is the client, the computer on which the information you want to access is stored, is called the server. Therefore the Internet's architecture is called client-server architecture.

A common set of standards allows the exchange of data and commands independent from locations, time, and operating systems through the Internet. These standards are called communication protocols, or the Internet Protocol Suite, and are implemented in Internet software. Sometimes the Internet Protocol Suite is erroneously identified with TCP/IP (Transmission Control Protocol / Internet Protocol).

Any information to be transferred is broken down into pieces, so-called packets, and the Internet Protocol figures out how the data is supposed to get from A to B by passing through routers.

Each packet is "pushed" from router to router via gateways and might take a different route. It is not possible to determine in advance which ways these packets will take. At the receiving end the packets are checked and reassembled.

The technique of breaking down all messages and requests into packets has the advantage that a large data bundle (e.g. videos) sent by a single user cannot block a whole network, because the bandwidth needed is deployed on several packets sent on different routes. Detailed information about routing in the Internet can be obtained at http://www.scit.wlv.ac.uk/~jphb/comms/iproute.html.

One of the Internet's (and of the Matrix's) beginnings was the ARPANet, whose design was intended to withstand any disruption, as for example in military attacks. The ARPANet was able to route data around damaged areas, so that the disruption would not impede communication. This design, whith its origin in strategic and military considerations, remained unchanged for the Internet. Yet the design of the ARPANet's design cannot be completely applied to the Internet.

Routing around depends on the location of the interruption and on the availability of intersecting points between networks. If, for example, an E-mail message is sent from Brussels to Athens and in Germany a channel is down, it will not affect access very much, the message will be routed around this damage, as long as a major Internet exchange is not affected. However, if access depends on a single backbone connection to the Internet and this connection is cut off, there is no way to route around.

In most parts of the world the Internet is therefore vulnerable to disruption. "The idea of the Internet as a highly distributed, redundant global communications system is a myth. Virtually all communications between countries take place through a very small number of bottlenecks, and the available bandwidth isn't that great," says Douglas Barnes. These bottlenecks are the network connections to neighboring countries. Many countries rely on a one single connection to the Net, and in some places, such as the Suez Canal, there is a concentration of fiber-optic cables of critical importance.

TEXTBLOCK 6/7 // URL: http://world-information.org/wio/infostructure/100437611791/100438659870
 
Examples of Mainly Corporate Funded Think Tanks: Manhattan Institute

The Manhattan Institute, founded by William Casey, who later became President Reagan's CIA director, besides subsidies from a number of large conservative foundations has gained funding from such corporate sources as: The Chase Manhattan Bank, Citicorp, Time Warner, Procter & Gamble and State Farm Insurance, as well as the Lilly Endowment and philantropic arms of American Express, Bristol-Myers Squibb, CIGNA and Merrill Lynch. Boosted by major firms, the Manhattan Institute budget reached US$ 5 million a year by the early 1990s.

TEXTBLOCK 7/7 // URL: http://world-information.org/wio/infostructure/100437611704/100438658245
 
Yakima

YAKIMA, USA

Latitude: 46.592633, Longitude: -120.528908

The Yakima Research Station was established in the early 1970s inside the 100,000-hectare United States Army Yakima Firing Center, 200 kilometers south-east

of Seattle. The facility, located between the Saddle Mountains and Rattlesnake Hills, initially consisted of a long operations building and a single large dish pointing

west to enable collection against the Pacific Intelsat satellite. By 1995 the Yakima station had expanded to five dish antennae, three facing west to the Pacific and two, including the original large 1970s dish, facing east. In addition to the original operations building several newer buildings had been added, the largest a two-story windowless concrete structure. The Yakima station has been monitoring Pacific Intelsat communications since it opened, and also monitors the Pacific Ocean area Inmarsat-2 satellite.

Source: http://www.fas.org/irp/facility/yakima.htm

http://www.fas.org/irp/facility/yakima.htm
INDEXCARD, 1/15
 
Royalties

Royalties refer to the payment made to the owners of certain types of rights by those who are permitted by the owners to exercise the rights. The rights concerned are literary, musical, and artistic copyright and patent rights in inventions and designs (as well as rights in mineral deposits, including oil and natural gas). The term originated from the fact that in Great Britain for centuries gold and silver mines were the property of the crown and such "royal" metals could be mined only if a payment ("royalty") were made to the crown.

INDEXCARD, 2/15
 
Pine Gap Station



Pine Gap, run by the CIA, is near Alice Springs in central Australia and mostly an underground facility. Pine Gap was mainly established to serve as the groundstation and downlink for reconnaissance satellites like the RHYOLITE and ORION system. The facility consists of more than 7 large antennas in randomes. In Pine Gap's Signals Processing Office transmitted signals are received and transformed for further analysis.There is a no fly zone 4km around PG, and local land holders have agreed not to allow "visitors" access to there properties. It is said that Pine Gap employs nearly 1000 people, mainly from the CIA and the U.S. National Reconnaissance Office (NRO).

Source:

Jeffrey T. Richelson, The U.S. Intelligence Community, (Westview Press, 4th ed., 1999)p190

Nicky Hager, Secret Power, New Zealand's role in the internatinal spy network, (Craig Potton, 1996)p34ff

Pictures of Pine Gap

http://www.networx.com.au/home/slider/Pine-Gap.htm

http://www.networx.com.au/home/slider/Pine-Ga...
INDEXCARD, 3/15
 
Bad Aibling Station

Latitude: 47.86353, Longitude: 12.00983

RSOC - Bad Aibling is a ground station for the interception of civil and military satellite communications traffic operated by the NSA. About 1000 personnel are on the staff at the Bad Aibling Regional SIGINT Operations Center in Germany, which conducts satellite communications interception activities and is also a downlink station for geostationary SIGINT satellites, like the CANYON program or the MAGNUM/ORION system. Operational responsibility of the groundstation was transfered to the ARMY Intelligence and Security Command in 1995, but there is also influence from the Air Force's 402nd Intelligence Squadron. Till the end of the cold war the main target was the Soviet Union.

for more information:

Description by FAS intelligence resource program.

http://www.fas.org/irp/facility/bad_aibling.htm

Description of the tasks of the Signals Intelligence Brigade.

http://www.fas.org/irp/doddir/army/fm34-37_97/6-chap.htm

Look at a detailed guide for military newbies at Bad Aibling.

http://www.dmdc.osd.mil/sites/owa/Installation.prc_Home?p_SID=&p_DB=P

http://www.fas.org/irp/facility/bad_aibling.h...
http://www.fas.org/irp/doddir/army/fm34-37_97...
http://www.dmdc.osd.mil/sites/owa/Installatio...
INDEXCARD, 4/15
 
CIGNA

CIGNA was formed in 1982 through the combination of INA Corporation and Connecticut General Corporation. CIGNA's formation in 1982 combined a leading property-casualty insurer with a leading supplier of life insurance and employee benefits. CIGNA has tightened its focus on employee benefits, divesting its individual life insurance business in 1998, and its domestic and international property and casualty operations in 1999.

INDEXCARD, 5/15
 
Viacom

One of the largest and foremost communications and media conglomerates in the
world. Founded in 1971, the present form of the corporation dates from 1994 when Viacom Inc., which owned radio and television stations and cable television programming services and systems, acquired the entertainment and publishing giant Paramount Communications Inc. and then merged with the video and music retailer Blockbuster Entertainment Corp. Headquarters are in New York City.

INDEXCARD, 6/15
 
Misawa Air Base

Latitude: 40.771, Longitude: 141.3776

Misawa Air Base is located in Misawa City, on the shores of Lake Ogawara in northeastern Honshu, Japan's main island. The Department of Defense presence at Misawa includes more than 15,000 military and civilian personnel and family members, including 4500 military personnel. The installation has experienced significant growth and development over the past ten years. From Misawa the NSA monitors Russian and other regional communications satellites.

The Misawa Passive Radio Frequency (RF) space surveillance site tracks satellites using RF signal emmisions to compute angle of arrival observations. This site provides coverage of geosynchronous satellites utilizing the Deep Space Tracking System (DSTS).

http://www.fas.org/spp/military/program/nssrm/initiatives/misawa.htm

http://www.fas.org/spp/military/program/nssrm...
INDEXCARD, 7/15
 
Sugar Grove Station

Latitude: 38.497387 Longitude: -79.273876

Sugar Grove Naval Communications Facility, near Sugar Grove, WV, intercepts Pacific INTELSAT/COMSAT satellite communications traffic routed through the COMSAT ground station at Etam, WV. This facility has four antenna, with diameters of 9.2, 18.5, 32.3 and 46 meters.

Source: http://www.fas.org/irp/nsa/nsafacil.html

http://www.fas.org/irp/nsa/nsafacil.html
INDEXCARD, 8/15
 
World Bank

The World Bank as well as the International Monetary Fund (IMF) originated during World War II in preparation for postwar international financial and economic cooperation. Initiated by the United States and Great Britain. The principal functions of the World Bank are to assist in the reconstruction and development of its member countries by facilitating capital investment for productive purposes, to promote private foreign investment by guarantees of and participation in loans and other investments made by private investors, and to make loans for productive purposes out of its own resources or funds borrowed by it when private capital is not available on reasonable terms.

INDEXCARD, 9/15
 
RAND

RAND (an acronym for research and development) is a non-profit institution that tries to "improve public policy through research and analysis". RAND was created at the urging of its original sponsor, the Air Force (then the Army Air Forces) and employs more than 500 people. Most work in RAND's Santa Monica, California headquarters, others are based in Washington, D.C. Some operate from RAND's Council for Aid to Education in New York City and from RAND Europe in Delft, the Netherlands. Areas of research are: Foreign relations and diplomacy, security and defense, economic issues, regional studies, social issues, health and welfare, education, labor and human resource development, science and technology.

INDEXCARD, 10/15
 
International Chamber of Commerce

The International Chamber of Commerce (ICC) is the world business organization, the only representative body that speaks with authority on behalf of enterprises from all sectors in every part of the world. ICC promotes an open international trade and investment system and the market economy. Its conviction that trade is a powerful force for peace and prosperity dates from the organization's origins early in the century. The small group of business leaders who founded the ICC called themselves "the merchants of peace".

INDEXCARD, 11/15
 
Center for Strategic and International Studies

CSIS is a private, tax-exempt and public policy research institution dedicated to policy analysis. It covers key functional areas such as international finance, emerging markets, U.S. domestic and economic policy and U.S. foreign policy and national security issues. Policy impact is the basic mission of CSIS. Its goal is to shape selected policy decisions in government and the private sector.

INDEXCARD, 12/15
 
Burson-Marsteller

Burson-Marsteller, the worlds leading public relations firm employs over 2,000 professionals in over 30 countries, operating in multiple functional and industry practice specialties. Its focus is on adding value to its clients through the use of
Perception Management. The goal is to ensure that the perceptions which
surround their clients and influence their stakeholders are consistent with
reality and the clients' desired business objectives.

INDEXCARD, 13/15
 
Porter Novelli

Porter Novelli is the third largest PR firm with 1998 net fees of US$ 183,050,000. The companies focus lies on building brands, enhancing reputation and crisis management. Porter Novelli is specialised in: Food and nutrition, health care, consumer goods, technology, public affairs and social marketing.

INDEXCARD, 14/15
 
Fleishman-Hillard

Fleishman-Hillard, headquartered in St. Louis, Missouri, is the world's fifth largest public relations agency, with offices throughout North America, Europe and Asia, and affiliates in Latin America. Its 1998 net fees accounted for US$ 160,692,000.

INDEXCARD, 15/15