Enforcement: Copyright Management and Control Technologies With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of |
|
Implant technology Kevin Warwick at the University of Reading works on implant technologies which could enhance or modify functions of the limbs and the brain, or bring back functionalities lost, for example, in an accident or as a consequence of a stroke. Implants are also used for identification in "intelligent buildings" where they serve to control "personnel flows". However, the real potential of electronic implants seems to lie in the field of electronic drugs. The basics of the brain computer interface are already explored, and there are now efforts to electronically modify the function of the mind. Large software and IT companies are sponsoring this research which could result in the commercialisation of electronic drugs, functioning as anti-depressants, pain killers and the like. Evidently, the same technologies can also be used as narcotic drugs or to modify people's behaviour. The functioning of body and mind can be adapted to pre-defined principles and ideals, their autonomous existence reduced and subjected to direct outside control. |
|
Global Data Flows In the space of flows constituted by today's global data networks the space of places is transcended. Visualizations of these global data flows show arches bridging seas and continents, thereby linking the world's centres of research and development, economics and politics. In the global "Network Society" (Manuel Castells) the traditional centres of power and domination are not discarded, in the opposite, they are strengthened and reinforced by the use of information and communication technologies. Political, economical and symbolical power becomes increasingly linked to the use of modern information and communication technologies. The most sensitive and advanced centres of information and communication technologies are the stock markets. Excluded from the network constituted by modern information and communication technologies, large parts of Africa, Asia and South America, but also the poor of industrialized countries, are ranking increasingly marginal to the world economy. Cities are centres of communications, trade and power. The higher the percentage of urban population, the more it is likely that the telecommunications infrastructure is generally good to excellent. This goes hand in hand with lower telecommunications costs. Those parts of the world with the poorest infrastructure are also the world's poorhouse. In Bangladesh for most parts of the population a personal computer is as expensive as a limousine in European one-month's salary in Europe, they have to pay eight annual salaries. Therefore telecommunications infrastructure is concentrated on the highly industrialized world: Most telephone mainlines, mobile telephones, computers, Internet accounts and Internet hosts (computers connected to the global data networks) can be found here. The same applies to media: the daily circulation of newspapers and the use of TV sets and radios. - Telecommunication and media services affordable to most parts of the population are mostly restricted to industrialized countries. This situation will not change in the foreseeable future: Most expenditure for telecommunications infrastructure will be restricted to the richest countries in the world. In 1998, the world's richest countries consumed 75% of all cables and wires. |
|
Databody convergence In the phrase "the rise of the citizen as a consumer", to be found on the When the citizen becomes a consumer, the state must become a business. In the data body business, the key word behind this new identity of government is "outsourcing". Functions, that are not considered core functions of government activity are put into the hands of private contractors. There have long been instances where privately owned data companies, e.g. credit card companies, are allowed access to public records, e.g. public registries or electoral rolls. For example, in a normal credit card transaction, credit card companies have had access to public records in order to verify identity of a customer. For example, in the UK citizen's personal data stored on the Electoral Roll have been used for commercial purposes for a long time. The new British Data Protection Act now allows people to "opt out" of this kind of commercialisation - a legislation that has prompted protests on the part of the data industry: While this may serve as an example of an increased public awareness of privacy issues, the trend towards outsourcing seems to lead to a complete breakdown of the barriers between commercial and public use of personal data. This trend can be summarised by the term "outsourcing" of government functions. Governments increasingly outsource work that is not considered core function of government, e.g. cooking meals in hospitals or mowing lawns in public parks. Such peripheral activities marked a first step of outsourcing. In a further step, governmental functions were divided between executive and judgemental functions, and executive functions increasingly entrusted to private agencies. For these agencies to be able to carry out the work assigned to them, the need data. Data that one was stored in public places, and whose handling was therefore subject to democratic accountability. Outsourcing has produced gains in efficiency, and a decrease of accountability. Outsourced data are less secure, what use they are put to is difficult to control. The world's largest data corporation, Technically the linking of different systems is already possible. It would also create more efficiency, which means generate more income. The question, then, whether democracy concerns will prevent it from happening is one that is capable of creating But what the EDS example shows is something that applies everywhere, and that is that the data industry is whether by intention or whether by default, a project with profound political implications. The current that drives the global economy deeper and deeper into becoming a global data body economy may be too strong to be stopped by conventional means. However, the convergence of political and economic data bodies also has technological roots. The problem is that politically motivated surveillance and economically motivated data collection are located in the same area of information and communication technologies. For example, monitoring internet use requires more or less the same technical equipment whether done for political or economic purposes. Data mining and data warehousing techniques are almost the same. Creating transparency of citizens and customers is therefore a common objective of intelligence services and the data body industry. Given that data are exchanged in electronic networks, a compatibility among the various systems is essential. This is another factor that encourages "leaks" between state-run intelligence networks and the private data body business. And finally, given the secretive nature of state intelligence and commercial data capturing , there is little transparency. Both structures occupy an opaque zone. |
|
ECHELON Timeline 1948 Formalization of UKUSA agreement. 1949 Establishment of the Armed Forces Security Agency (AFSA) to direct communications intelligence and electronic intelligence activities of the military service signals units (ASA, NSG, AFSS) 1952 President Truman sent out a top secret memorandum to abolish the AFSA and to create the National Security Agency NSA. The main focuses lied on: control, coordination, collection and processing of Communication Intelligence. The NSA was considered to be within, but not a part of the Department of Defense. .(Jeffrey T. Richelson, The U.S. Intelligence Community, Westview Press, 4th ed., 1999, p 31) 1954 The WS-117L program (for the development of reconnaissance satellites for the AirForce an CIA) was approved by President Eisenhower. It also included the development of signal intercept equipment within the framework of the project Pioneer Ferret 1957 Official acknowledgement of NSA in the Government Organization Manual 1961 Establishment of the National Reconnaissance Office NRO as a joint Air Force and CIA operation. Ist existance was classified secret till 1992. Ist tasks werde focused on overseeing and funding the research and development of reconnaissance spacecraft and their sensors, procuring the space systems and their associated ground stations, determinig launch vehicle requirements, operating spacecraft and disseinating the data collected.(Jeffrey T. Richelson, The U.S. Intelligence Community, Westview Press, 4th ed., 1999, p 37) 1972 Scope of NSA's SIGINT activities was redefined in Communication Intelligence and Electronic Intelligence and Communication Security (In the 80s the term changed to Information Security). Perry Fellwock, former NSA analyst, gives an interview for Ramparts on NSA electronic interception: http://jya.com/nsa-elint.htm 1976 Duncan Campbell published an article in Time Out called "The Eavesdroppers" which was a description of what GCHQ was and did. From that time on Campbell published many articles concerning illiegal communication interception done by the secret services. 1978/79 American Foreign Intelligence Surveillance Act is a law that permits secret buggings and wiretaps of individuals suspected of being agents of a hostile foreign government or international terrorist organization. (http://www.nara.gov/fedreg/eos/e12139.html) 1982 David Burnham, The New York Times, writes: Washington, Nov 6 --- A Federal appeals court has ruled that the National Security Agency may lawfully intercept messages between United States citizens and people overseas, even if there is no cause to believe they Americans are foreign agents, and then provide summaries of these messages to the Federal Bureau of Investigation.( http://www-douzzer.ai.mit.edu:8080/cm/cm1.html) 1983 James Bamford publishes The Puzzle Palace: A Report on America's Most Secret Agency. 1985 Jeffrey T. Richelson and Desmond Ball bring out The Ties That Bind: Intelligence Cooperation Between the UKUSA Countries 1987 William Burrows publishes Deep Black: Space Espionage and National Security 1988 ECHELON (as terminus) was first revealed by Duncan Campbell in 1988 in a 'New Statesman' article. 1989 Jeffrey T. Richelson brings out The U.S. Intelligence Community 1992 Members of GCHQ became told the London Observer that the ECHELON dictionaries targeted Amnesty International, Greenpeace, Christian institutions and more. June 1992: FBI produces paper "Law Enforcement REQUIREMENTS for the surveillance of electronic communications" 1993 A presidential conference with Asian leaders was bugged by US intelligence agencies, as goes the rumour, and information was passed from the White House to big corporate donors. A BBC documentary about NSA's Menwith Hill facility in England revealed that peace protestors had broken into the installation and stolen part of this glossary, known as "the Dictionary." The documentary alleged that Menwith Hill -- a sprawling installation covering 560 acres and employing more than 1,200 people -- was ECHELON's nerve center. 1994 Spyworld: Inside the Canadian and American Intelligence Establishments By Mike Frost [NSA trained sigint person] and Michel Gratton 1996 Nicky Hager, Secret Power: New Zealand's Role In the International Spy Network 1997 Further reorganization of NSA INFOSEC activities: Two new groups were introduced. M Group, responsible for assess potential threats to and vulnerabilities of technologies and infrastructures such as telecom systems; W Group, deals with transnational threats. 1997 27 February: A special report by Statewatch published detailed plans for a joint plan drawn up by the Council of the European Union and the US Federal Bureau of Investigations (FBI) to introduce a global system for the surveillance of telecommunications. 4 September: A judge has lambasted British Telecom for revealing detailed information about top secret high capacity cables feeding phone and other messages to and from a Yorkshire monitoring base. BT admitted this week that they have connected three digital optical fibre cables - capable of carrying more than 100,000 telephone calls at once - to the American intelligence base at Menwith Hill, near Harrogate. Media all over the world start covering ECHELON. 1998 European Parliament, STOA report, Assessment of the Technologies of Political Control: http://jya.com/stoa-atpc.htm 1999 World Information Org starts collecting the fragmented data about ECHELON. 2000 ECHELON is covered in gobal news channels and investigated by civil liberty groups as well as government councils throughout Europe. |
|
Challenges for Copyright by ICT: Copyright Owners The main concern of copyright owners as the (in terms of Reproduction and Distribution Unlike copies of works made using analog copiers (photocopy machines, video recorders etc.) digital information can be reproduced extremely fast, at low cost and without any loss in quality. Since each copy is a perfect copy, no quality-related limits inhibit pirates from making as many copies as they please, and recipients of these copies have no incentive to return to authorized sources to get another qualitatively equal product. Additionally the costs of making one extra copy of intellectual property online are insignificant, as are the distribution costs if the copy is moved to the end user over the Internet. Control and Manipulation In cross-border, global data networks it is almost impossible to control the exploitation of protected works. Particularly the use of anonymous remailers and other existing technologies complicates the persecution of pirates. Also digital files are especially vulnerable to manipulation, of the work itself, and of the (in some cases) therein-embedded |
|
Medieval universities and copying of books The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|
Backbone Networks Backbone networks are central networks usually of very high bandwidth, that is, of very high transmitting capacity, connecting regional networks. The first backbone network was the |
|
Assembly line An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in |
|
Intelsat Intelsat, the world's biggest communication satellite services provider, is still mainly owned by governments, but will be privatised during 2001, like http://www.intelsat.int/index.htm |
|
Liability of ISPs ISPs (Internet Service Provider), BBSs (Bulletin Board Service Operators), systems operators and other service providers (in the U.S.) can usually be hold liable for infringing activities that take place through their facilities under three theories: 1) direct liability: to establish direct infringement liability there must be some kind of a direct volitional act, 2) contributory liability: a party may be liable for contributory infringement where "... with knowledge of the infringing activity, [it] induces, causes or materially contributes to the infringing activity of another." Therefore a person must know or have reason to know that the subject matter is copyrighted and that particular uses violated copyright law. There must be a direct infringement of which the contributory infringer has knowledge, and encourages or facilitates for contributory infringement to attach, and 3) vicarious liability: a party may be vicariously liable for the infringing acts of another if it a) has the right and ability to control the infringer's acts and b) receives a direct financial benefit from the infringement. Unlike contributory infringement, knowledge is not an element of vicarious liability. |
|
Artificial Intelligence Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support Yahoo AI sites: MIT AI lab: |
|