Timeline 1600 - 1900 AD

17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card

- Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians

- the English scientist, magician and astrologer John Dee works on the ancient Enochian alphabet; he also possesses an encrypted writing that could not been broken until today

1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally.

1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code

18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day.

1790's Thomas Jefferson and Robert Patterson invent a wheel cipher

1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs

1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844.

1834 the Braille Code for blind people is developed in today's form by Louis Braille

1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then

1854 the Playfair cipher is invented by Sir Charles Wheatstone

1859 for the first time a tomographic cipher gets described

1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages

1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army

1895 the invention of the radio changes cryptography-tasks again and makes them even more important

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658974
 
RTMark and Adbusters at the WTO Conference in Seattle

The 1999 WTO (World Trade Organization) Conference in Seattle not only attracted a multitude of demonstrators, but also artistic and cultural activists like RTMark and Adbusters.

Adbusters, well known as fighters against corporate disinformation, injustices in the global economy and "physical and mental pollution", timely for the WTO Conference purchased three billboards in downtown Seattle. Featuring an image with the text "System Error - Type 2000 (progress)", the billboards were meant to challenge "... the WTO's agenda of global corporate growth and expose what isn't reflected in the United State's GNP - human and environmental capital."

At the same time RTMark went on-line with its spoof WTO website http://gatt.org. Shortly after its release WTO Director-General Mike Moore accused RTMark of attempting to "undermine WTO transparency" by copying the WTO website's design and using "domain names such as `www.gatt.org` and page titles such as 'World Trade Organization / GATT Home Page' which make it difficult for visitors to realize that these are fake pages." http://gatt.org is not the first time that RTMark has used website imitation aiming at rendering an entity more transparent. RTMark has performed the same "service" for George W. Bush, Rudy Giuliani, Shell Oil, and others with the principal purpose of publicizing corporate abuses of democratic processes.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611652/100438658922
 
History: Anglo-American Tradition

With the introduction of the printing press into England in 1476 printing was made easier and faster and made copies less expensive. By the early 16th century two trades dominated the industry: independent printers and booksellers or stationers many of whom were vertically integrated as printers. At the time, the Crown was concerned about sedition and the Church about heresy. In 1557 by royal charter the Stationers' Company of London was created and exclusive rights granted. Approved printers were given the right to copy approved works. Accordingly the roots of copyright were censorship.

The Statute of Queen Ann, the first formal copyright law, was passed in 1710. Copyright was then conferred on the author of a work, but still the owner of copyright was nearly always the bookseller. Only in 1775 the House of Lords replaced the common law of printing rights in favor of the author.

In this tradition the underlying concept of copyright is monopoly, first granted to printers, then to booksellers and later to individual creators. Copyright is treated as a commodity to be bought and sold and inspired by a need to protect the public from the power of the artist.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659467
 
The World Wide Web History Project

The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the World Wide Web. As result a vast of collection of historic video, audio, documents, and software is expected. The project's digital archive is currently under development.

http://www.webhistory.org/home.html

INDEXCARD, 1/4
 
Satellites

Communications satellites are relay stations for radio signals and provide reliable and distance-independent high-speed connections even at remote locations without high-bandwidth infrastructure.

On point-to-point transmission, the transmission method originally employed on, satellites face increasing competition from fiber optic cables, so point-to-multipoint transmission increasingly becomes the ruling satellite technology. Point-to-multipoint transmission enables the quick implementation of private networks consisting of very small aperture terminals (VSAT). Such networks are independent and make mobile access possible.

In the future, satellites will become stronger, cheaper and their orbits will be lower; their services might become as common as satellite TV is today.

For more information about satellites, see How Satellites Work (http://octopus.gma.org/surfing/satellites) and the Tech Museum's satellite site (http://www.thetech.org/hyper/satellite).

http://www.whatis.com/vsat.htm
http://octopus.gma.org/surfing/satellites
INDEXCARD, 2/4
 
VISA

Visa International's over 21,000 member financial institutions have made VISA one of the world's leading full-service payment network. Visa's products and services include Visa Classic card, Visa Gold card, Visa debit cards, Visa commercial cards and the Visa Global ATM Network. VISA operates in 300 countries and territories and also provides a large consumer payments processing system.

INDEXCARD, 3/4
 
Hieroglyphs

Hieroglyphs are pictures, used for writing in ancient Egypt. First of all those pictures were used for the names of kings, later more and more signs were added, until a number of 750 pictures

INDEXCARD, 4/4