Basics: Rights Recognized

Copyright protection generally means that certain uses of a work are lawful only if they are done with the authorization of the owner of the copyright. The most typical are the following:

- copying or reproducing a work
- performing a work in public
- making a sound recording of a work
- making a motion picture of a work
- broadcasting a work
- translating a work
- adapting a work

Under certain national laws, some of these rights, which are referred to, as "economic rights'" are not exclusive rights of authorization but in specific cases, merely rights to remuneration. Some strictly determined uses (for example quotations or the use of works by way of illustration for teaching) are completely free, that is, they require neither authorization of, nor remuneration for, the owner of the copyright. This practice is described as fair use.

In addition to economic rights, authors enjoy "moral rights" on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. They also have the right to oppose the mutilation or deformation of their creations.

The owner of a copyright may usually transfer his right or may license certain uses of his work. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.

Furthermore there exist rights related to copyright that are referred to as "neighboring rights". In general there are three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

TEXTBLOCK 1/19 // URL: http://world-information.org/wio/infostructure/100437611725/100438659584
 
More and more, faster and faster, but...

Since the invention of appropriate means and technologies, communication no longer requires face-to-face meetings.

From writing and reading to using computers, expanding and exhausting one's possibilities to communicate relies more and more on the application of skills we have to learn. With the increasing importance of communication technologies, learning to apply them properly becomes a kind of rite of passage.

A Small World

From the very beginning - the first Sumerian pictographs on clay tablets - to today's state of the art technologies - broadband communication via fiber-optic cables and satellites - the amount of information collected, processed and stored, the capabilities to do so, as well as the possible speed of information transmission exponentially accelerate.

Since the invention of the electrical telegraph, but especially with today's growing digital communication networks, every location on earth seems to be close, however distant it may be, and also time no longer remains a significant dimension.

Threatened Cultural Memory

More and more information is transmitted and produced faster and faster, but the shelf life of information becomes more and more fragile. For more than 4500 years Sumerian pictographs written on clay tablets remained intact, but newspapers and books, printed some decades ago, crumble into pieces; film reels, video tapes and cassettes corrode. Digitalization of information is not a cure; on the contrary it even intensifies the danger of destroying cultural heritage. Data increasingly requires specific software and hardware, but to regularly convert all available digitized information is an unexecutable task.

Compared to the longevity of pictographs on clay tablets, digitized information is produced for instant one-time use. The increasing production and processing of information causes a problem hitherto unknown: the loss of our cultural memory.

For further information see T. Matthew Ciolek, Global Networking Timeline.

For another history of communication systems see Friedrich Kittler, The History of Communication Media.

TEXTBLOCK 2/19 // URL: http://world-information.org/wio/infostructure/100437611796/100438659807
 
The Egyptians ...

Besides ordinary religious manipulation-tools the Egyptians were masters of using architecture for propaganda. In Egypt, most of all, architecture was used as a media to demonstrated power, whereas the Greek and Romans used other types of art, like statues, for political propaganda.
The pyramids, palaces, tombs became tools for power demonstrations. Paintings and carvings (like on obelisks) proved the might of the rulers.
All those signs of power were done to make people compare their ruling dynasty to gods and keep them politically silent, because religion was used for justifying mortal power. Marble, gold, jewelry and artists were the tools for those maneuvers. Whereas questions for the truth were not even asked or listened to.
Finally it was the masses who were used for propaganda, when they were not only forced to work as slaves on those signs of power but also were abused for those power demonstrations, when they had to accompany the dead king into his tomb - dying of hunger, thirst, lack of oxygen and in darkness. The more religious disinformation the more luxury. The more luxury the better. The more luxury the more power.

TEXTBLOCK 3/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658370
 
1950: The Turing Test

Alan Turing, an English mathematician and logician, advocated the theory that eventually computers could be created that would be capable of human thought. To cut through the long philosophical debate about exactly how to define thinking he proposed the "imitation game" (1950), now known as Turing test. His test consisted of a person asking questions via keyboard to both a person and an intelligent machine within a fixed time frame. After a series of tests the computers success at "thinking" could be measured by its probability of being misidentified as the human subject. Still today Turing's papers on the subject are widely acknowledged as the foundation of research in artificial intelligence.

TEXTBLOCK 4/19 // URL: http://world-information.org/wio/infostructure/100437611663/100438659354
 
Changes

Still, disinformation and propaganda are nothing magic. They can change things, but supposedly only if those things/meanings/opinions are not fixed completely. Galileo Galilee was not capable of changing people's opinion about the world being flat until some persons got suspicious that this long-believed-in truth was a mistake. The propaganda of his experiments which made him famous was not enough. On the other hand later all the propaganda of his enemies could not turn back the wheel of enlightenment, as people thought it was more logic to believe in a round world than in a flat one.
It is never just a single idea that changes. Society is following the changes.

Thinking about disinformation brings us to the word truth, of course, and to the doubt that there is no definite truth. And truth can easily be manipulated to another truth. Just present some facts that seem to be logic and there you've got a new truth. And if the facts can supposedly be proved by empirical studies then the quality of the truth definitely rises.
That's what ideologies do all the time. And the media like to do the same thing - as a game with power or mere presentation of power?

But of course there also exist bits of disinformation which are more amusing than evil or dangerous:
- the theory of the celestro-centric world/"Hohlwelttheorie"
- the story of the German philosopher who invented an Italian philosopher, wrote books about him, even reprinted "his" texts, which had gone lost pretendedly 100 years ago - and finally lost his job and all his career when other scientists found out that everything had been made up.

TEXTBLOCK 5/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658633
 
Key Recovery Systems

As stated before the sense of cryptography is a properly designed cryptosystem making it essentially impossible to recover encrypted data without any knowledge of the used key. The issue of lost keys and the being-locked-out from one's own data as a consequence favors key recovery systems. On the other hand the counter argument is confidentiality: as soon as a possibility to recover a key is provided, the chances for abuses grow.
Finally it is the state that does not want to provide too much secrecy. On the contrary. During the last 20 years endless discussions about the state's necessity and right to restrict private cryptography have taken place, as the governments rarely care for the benefit of private users if they believe in catching essential informations about any kind of enemy, hence looking for unrestricted access to all keys.

The list of "key recovery," "key escrow," and "trusted third-party" as encryption requirements, suggested by governmental agencies, covers all the latest developments and inventions in digital technology.
At the same time the NSA, one of the world's most advanced and most secret enterprises for cryptography, worked hard in getting laws through to forbid the private use of strong encryption in one way or the other. Still, it is also organizations like this one that have to admit that key recovery systems are not without any weaknesses, as the U.S. Escrowed Encryption Standard, the basis for the famous and controversially discussed Clipper Chip, showed. The reason for those weaknesses is the high complexity of those systems.

Another aspect is that key recovery systems are more expensive and certainly much less secure than other systems. So, why should anyone use them?

In that context, one has to understand the legal framework for the use of cryptography, a strict framework in fact, being in high contradiction to the globalised flow of communication.

TEXTBLOCK 6/19 // URL: http://world-information.org/wio/infostructure/100437611776/100438659037
 
The Tools of Disinformation and Propaganda

"In wartime they attack a part of the body that other weapons cannot reach in an attempt to affect the way which participants perform on the field of battle." (Taylor, Munitions of the Mind, p. 9)
Therefore the demonstrated tools refer to political propaganda in the two World Wars.

Propaganda has the ability to change a war, a natural evil, into a so-called "just" war. Violence then is supposedly defense, no more aggression.

TEXTBLOCK 7/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658552
 
The North against the South?

"Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market."
(UNESCO, World Communication Report)

The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else.

Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left?

TEXTBLOCK 8/19 // URL: http://world-information.org/wio/infostructure/100437611730/100438659376
 
Late 1970s - Present: Fourth Generation Computers

Following the invention of the first integrated circuits always more and more components could be fitted onto one chip. LSI (Large Scale Integration) was followed by VLSI (Very Large Scale Integration) and ULSI (Ultra-Large Scale Integration), which increased the number of components squeezed onto one chip into the millions and helped diminish the size as well as the price of computers. The new chips took the idea of the integrated circuit one step further as they allowed to manufacture one microprocessor which could then be programmed to meet any number of demands.

Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used.

Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. LANs (Local Area Network) permitted computers to share memory space, information, software and communicate with each other. Although already LANs could reach enormous proportions with the invention of the Internet an information and communication-network on a global basis was established for the first time.

TEXTBLOCK 9/19 // URL: http://world-information.org/wio/infostructure/100437611663/100438659451
 
The Romans

The Romans can be called the great inventors of myths with the purpose of propaganda. Think of Caesar, Augustus or Nero. Caesar wrote his war-documentation by using incredible (e.g. the numbers of hostile soldiers) but he also emphasized the barbarity of the foe, creating images of hatred. People back at home had to believe these manipulative stories.
Or Augustus: he reunited the Roman Empire; part of his power was due to huge efforts in propaganda, visible e.g. in the mass of coins showing his face, being sent all over the empire. He understood very well, that different cultures used different symbols - and he used them for his propaganda.
Politically the Roman army was an important factor. Propaganda in that case was used for the soldiers on the one hand, but on the other hand also for demonstrating the power of the army to the people, so they could trust in its strength. Even then security was an essential factor of politics. As long as the army functioned, the Roman Empire did as well (Taylor, Munitions of the Mind, p. 48).

TEXTBLOCK 10/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658320
 
fingerprint identification

Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion.

As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment.

Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device (http://www.ddsi-cpc.com) which translates the characteristics of a fingerprint into a digitised image.

As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies.

TEXTBLOCK 11/19 // URL: http://world-information.org/wio/infostructure/100437611729/100438658358
 
The history of propaganda

Thinking of propaganda some politicians' names are at once remembered, like Caesar, Napoleon, Adolf Hitler, Joseph Stalin or Saddam Hussein.
The history of propaganda has to tell then merely mentioning those names:

TEXTBLOCK 12/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658185
 
Identity vs. Identification

It has become a commonplace observation that the history of modernity has been accompanied by what one might call a general weakening of identity, both as a theoretical concept and as a social and cultural reality. This blurring of identity has come to full fruition in the 20th century. As a theoretical concept, identity has lost its metaphysical foundation of "full correspondence" following the destruction of metaphysics by thinkers such as Nietzsche, Heidegger, Witgenstein or Davidson. Nietzsche's "dead god", his often-quoted metaphor for the demise of metaphysics, has left western cultures not only with the problem of having to learn how to think without permanent foundations; it has left them with both the liberty of constructing identities, and the structural obligation to do so. The dilemmas arising out of this ambivalent situation have given rise to the comment that "god is dead, and men is not doing so well himself". The new promise of freedom is accompanied by the threat of enslavement. Modern, technologically saturated cultures survive and propagate and emancipate themselves by acting as the gatekeepers of their own technological prisons.

On the social and cultural levels, traditional clear-cut identities have become weakened as traditional cultural belonging has been undermined or supplanted by modern socio-technological structures. The question as to "who one is" has become increasingly difficult to answer: hybrid identities are spreading, identities are multiple, temporary, fleeting rather than reflecting an inherited sense of belonging. The war cry of modern culture industry "be yourself" demands the impossible and offers a myriad of tools all outcompeting each other in their promise to fulfil the impossible.

For many, identity has become a matter of choice rather than of cultural or biological heritage, although being able to chose may not have been the result of a choice. A large superstructure of purchasable identification objects caters for an audience finding itself propelled into an ever accelerating and vertiginous spiral of identification and estrangement. In the supermarket of identities, what is useful and cool today is the waste of tomorrow. What is offered as the latest advance in helping you to "be yourself" is as ephemeral as your identification with it; it is trash in embryonic form.

Identity has become both problematic and trivial, causing modern subjects a sense of thrownness and uprootedness as well as granting them the opportunity of overcoming established authoritarian structures. In modern, technologically saturated societies, the general weakening of identities is a prerequisite for emancipation. The return to "strong" clear-cut "real" identities is the way of new fundamentalism demanding a rehabilitation of "traditional values" and protected zones for metaphysical thought, both of which are to be had only at the price of suppression and violence.

It has become difficult to know "who one is", but this difficulty is not merely a private problem. It is also a problem for the exercise of power, for the state and other power institutions also need to know "who you are". With the spread of weak identities, power is exercised in a different manner. Power cannot be exercised without being clear who it addresses; note the dual significance of "subject". A weakened, hybrid undefined subject (in the philosophical sense) cannot be a "good" subject (in the political sense), it is not easy to sub-ject. Without identification, power cannot be exercised. And while identification is itself not a sufficient precondition for authoritarianism, it is certainly a necessary one.

Identities are therefore reconstructed using technologies of identification in order to keep the weakened and hence evasive subjects "sub-jected". States have traditionally employed bureaucratic identification techniques and sanctioned those who trying to evade the grip of administration. Carrying several passports has been the privilege of spies and of dubious outlaws, and not possessing an "ID" at all is the fate of millions of refugees fleeing violence or economic destitution. Lack of identification is structurally sanctioned by placelessness.

The technisised acceleration of societies and the weakening of identities make identification a complicated matter. On the one hand, bureaucratic identification techniques can be technologically bypassed. Passports and signatures can be forged; data can be manipulated and played with. On the other hand, traditional bureaucratic methods are slow. The requirements resulting from these constraints are met by biometric technology.

TEXTBLOCK 13/19 // URL: http://world-information.org/wio/infostructure/100437611729/100438658075
 
The Big Five of Commercial Media

After a number of mergers and acquisitions five powerful media conglomerates lead the world's content production and distribution. They operate on an international basis with subsidiaries all around the globe and engage in every imaginable kind of media industry.

Table: The World's Leading Media Companies

Media Company

1998 Revenues

(in US$)

Property/Corporate Information

AOL Time Warner (US)

26,838.000.000*

http://www.timewarner.com/corp/about/timewarnerinc/corporate/index.html

Disney (US)

22,976.000.000

http://www.disney.com

Bertelsmann (GER)

16,389.000.000

http://www.bertelsmann.com/facts/report/report.cfm

News Corporation (AUS)

12,841.000.000

http://www.newscorp.com/public/cor/cor_m.htm

Viacom (US)

12,100.000.000

http://www.viacom.com/global.tin



(* Revenues of Time Warner only (merger with AOL took place in January 2000)

TEXTBLOCK 14/19 // URL: http://world-information.org/wio/infostructure/100437611795/100438659010
 
The Secret Behind

The secret behind all this is the conception that nothing bad could ever be referred to the own nation. All the bad words belong to the enemy, whereas the "we" is the good one, the one who never is the aggressor but always defender, the savior - not only for ones own sake but also for the others, even if they never asked for it, like the German population during World War I and II.
The spiritualization of such thinking leads to the point that it gets nearly impossible to believe that this could be un-true, a fake. To imagine injustice committed by the own nation gets more and more difficult, the longer the tactic of this kind of propaganda goes on. U.S.-Americans voluntarily believe in its politics, believing also the USA works as the police of the world, defending the morally good against those who just do not have reached the same level of civilization until today.
To keep up this image, the enemy must be portrayed ugly and bad, like in fairy-tales, black-and-white-pictures. Any connection between oneself and the enemy must be erased and made impossible. In the case of Slobodan Milosevic or Saddam Hussein this meant to delete the positive contact of the last years from the consciousness of the population. Both had received a high amount of money and material help as long as they kept to the rules of the Western game. Later, when the image of the friend/confederate was destroyed, the contact had to be denied. The media, who had reported that help, no longer seemed to remember and did not write anything about that strange change of mind. And if any did, they were not really listened to, because people tend to hear what they want to hear. And who would want to hear that high amounts of his taxes had formerly gone to "a man" (this personification of the war to one single man is the next disinformation) who now is the demon in one's mind.

All of this is no invention of several politicians. Huge think tanks and different governmental organizations are standing behind that. Part of their work is to hide their own work, or to deny it.

TEXTBLOCK 15/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658637
 
Public Relations and Propaganda

Public relations usually is associated with the influencing of public opinion. Therefore it has subsequently been linked with propaganda. Using one of the many definitions of propaganda "... the manipulation of symbols as a means of influencing attitudes on controversial matters" (Harold D. Lasswell), the terms propaganda and PR seem to be easily interchangeable.

Still many authors explicitly distinguish between public relations, advertising and propaganda. Unlike PR, which is often described as objective and extensive information of the public, advertising and propaganda are associated with manipulative activities. Nevertheless to treat public relations and propaganda as equivalents stands in the tradition of PR. Edward L. Bernays, one of the founders of public relations wrote "The only difference between propaganda and education, really, is the point of view. The advocacy of what we believe in is education. The advocacy of what we don't believe is propaganda."

Also institutions like the German Bundeswehr use the terms publics relations and propaganda synonymously. After a 1990 legislation of the former minister of defense Stoltenberg, the "psychological influence of the enemy" was ceased during peace time and the Academy for Psychological Defense renamed to Academy for Information and Communication, among other things responsible for scientific research in the field of public relations.

TEXTBLOCK 16/19 // URL: http://world-information.org/wio/infostructure/100437611652/100438658084
 
Introduction: The Substitution of Human Faculties with Technology: Computers and Robots

With the development of modern computing, starting in the 1940s, the substitution of human abilities with technology obtained a new dimension. The focus shifted from the replacement of pure physical power to the substitution of mental faculties. Following the early 1980s personal computers started to attain widespread use in offices and quickly became indispensable tools for office workers. The development of powerful computers combined with progresses in artificial intelligence research also led to the construction of sophisticated robots, which enabled a further rationalization of manufacturing processes.

TEXTBLOCK 17/19 // URL: http://world-information.org/wio/infostructure/100437611663/100438659302
 
Timeline 1970-2000 AD

1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= DES)

1976 Whitfield Diffie and Martin Hellman publish their book New Directions in Cryptography, playing with the idea of public key cryptography

1977/78 the RSA algorithm is developed by Ron Rivest, Adi Shamir and Leonard M. Adleman and is published

1984 Congress passes Comprehensive Crime Control Act

- The Hacker Quarterly is founded

1986 Computer Fraud and Abuse Act is passed in the USA

- Electronic Communications Privacy Act

1987 Chicago prosecutors found Computer Fraud and Abuse Task Force

1988 U.S. Secret Service covertly videotapes a hacker convention

1989 NuPrometheus League distributes Apple Computer software

1990 - IDEA, using a 128-bit key, is supposed to replace DES

- Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography

- Martin Luther King Day Crash strikes AT&T long-distance network nationwide


1991 PGP (= Pretty Good Privacy) is released as freeware on the Internet, soon becoming worldwide state of the art; its creator is Phil Zimmermann

- one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco

- AT&T phone crash; New York City and various airports get affected

1993 the U.S. government announces to introduce the Clipper Chip, an idea that provokes many political discussions during the following years

1994 Ron Rivest releases another algorithm, the RC5, on the Internet

- the blowfish encryption algorithm, a 64-bit block cipher with a key-length up to 448 bits, is designed by Bruce Schneier

1990s work on quantum computer and quantum cryptography

- work on biometrics for authentication (finger prints, the iris, smells, etc.)

1996 France liberates its cryptography law: one now can use cryptography if registered

- OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products

1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption

1997 June PGP 5.0 Freeware widely available for non-commercial use

1997 June 56-bit DES code cracked by a network of 14,000 computers

1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment

1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy

1998 March PGP announces plans to sell encryption products outside the USA

1998 April NSA issues a report about the risks of key recovery systems

1998 July DES code cracked in 56 hours by researchers in Silicon Valley

1998 October Finnish government agrees to unrestricted export of strong encryption

1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA

- National Institute of Standards and Technologies announces that 56-bit DES is not safe compared to Triple DES

- 56-bit DES code is cracked in 22 hours and 15 minutes

1999 May 27 United Kingdom speaks out against key recovery

1999 Sept: the USA announce to stop the restriction of cryptography-exports

2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law

- computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses

for further information about the history of cryptography see:
http://www.clark.net/pub/cme/html/timeline.html
http://www.math.nmsu.edu/~crypto/Timeline.html
http://fly.hiwaay.net/~paul/cryptology/history.html
http://www.achiever.com/freehmpg/cryptology/hocryp.html
http://all.net/books/ip/Chap2-1.html
http://cryptome.org/ukpk-alt.htm
http://www.iwm.org.uk/online/enigma/eni-intro.htm
http://www.achiever.com/freehmpg/cryptology/cryptofr.html
http://www.cdt.org/crypto/milestones.shtml

for information about hacker's history see:
http://www.farcaster.com/sterling/chronology.htm:

TEXTBLOCK 18/19 // URL: http://world-information.org/wio/infostructure/100437611776/100438658960
 
Cartoons

Cartoons' technique is simplicity.
Images are easier to remember than texts.
Frequently they show jokes about politicians, friendly or against the person shown. In the first decades of this century, cartoons were also used for propaganda against artists; remember the famous cartoons of Oscar Wilde being portrayed as a criminal, aiming to destroy his popularity.
As a tool in politics it had fatal consequences by determining stereotypes, which never again could be erased even if detected as pure disinformation. Most famous got the cartoons about Jews, which were not only distributed by Germans and Austrians but all over Europe; and already in the tens and twenties of our century. Most horrifying is the fact that many of those old, fascist and racist cartoons are coming back now, in slightly different design only.

TEXTBLOCK 19/19 // URL: http://world-information.org/wio/infostructure/100437611661/100438658509
 
Bertelsmann

The firm began in Germany in 1835, when Carl Bertelsmann founded a religious print shop and publishing establishment in the Westphalian town of Gütersloh. The house remained family-owned and grew steadily for the next century, gradually adding literature, popular fiction, and theology to its title list. Bertelsmann was shut down by the Nazis in 1943, and its physical plant was virtually destroyed by Allied bombing in 1945. The quick growth of the Bertelsmann empire after World War II was fueled by the establishment of global networks of book clubs (from 1950) and music circles (1958). By 1998 Bertelsmann AG comprised more than 300 companies concentrated on various aspects of media. During fiscal year 1997-98, Bertelsmann earned more than US$15 billion in revenue and employed 58.000 people, of whom 24.000 worked in Germany.

INDEXCARD, 1/32
 
COMECON

The Council for Mutual Economic Aid (COMECON) was set up in 1949 consisting of six East European countries: Bulgaria, Czechoslovakia, Hungary, Poland, Romania, and the USSR, followed later by the German Democratic Republic (1950), Mongolia (1962), Cuba (1972), and Vietnam (1978). Its aim was, to develop the member countries' economies on a complementary basis for the purpose of achieving self-sufficiency. In 1991, Comecon was replaced by the Organization for International Economic Cooperation.

INDEXCARD, 2/32
 
Open Systems Interconnection (OSI)

Open Systems Interconnection (OSI) is a standard reference model for communication between two end users in a network. It is used in developing products and understanding networks.

Source: Whatis.com

INDEXCARD, 3/32
 
Leni Riefenstahl

Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. Adolf Hitler appointed her the top film executive of the Nazi Party. Her two most famous works were done in that period, Triumph of the Will (1935) and the two films about the Olympic Games in Berlin in 1936. Later, when she tried to get rid of her image as a NAZI-movie maker, she worked as a photographer in Africa, making pictures of indigenous people and under-water landscape.

INDEXCARD, 4/32
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 5/32
 
Ron Rivest

Ronald L. Rivest is Webster Professor of Electrical Engineering and Computer Science in MIT's EECS Department. He was one of three persons in a team to invent the RSA public-key cryptosystem. The co-authors were Adi Shamir and Leonard M. Adleman.

INDEXCARD, 6/32
 
Barnes and Noble

Massive online retail bookstore housing more than a million titles. Includes a book recommendation "personalizer,", a comprehensive list of The New York Times bestsellers, a "live" community events calendar with a daily survey and several forums, "highlighted" books from 19 subject areas, browsable categories such as antiques, ethnic studies, and pop culture, Books in the News, and weekly features such as reviews, excerpts, recommendations, interviews, events, "roundups" of popular titles, and quizzes.

INDEXCARD, 7/32
 
Neural network

A bottom-up artificial intelligence approach, a neural network is a network of many very simple processors ("units" or "neurons"), each possibly having a (small amount of) local memory. The units are connected by unidirectional communication channels ("connections"), which carry numeric data. The units operate only on their local data and on the inputs they receive via the connections. A neural network is a processing device, either an algorithm, or actual hardware, whose design was inspired by the design and functioning of animal brains and components thereof. Most neural networks have some sort of "training" rule whereby the weights of connections are adjusted on the basis of presented patterns. In other words, neural networks "learn" from examples and exhibit some structural capability for generalization.

INDEXCARD, 8/32
 
atbash

Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing.

for further explanations see:
http://www.ftech.net/~monark/crypto/crypt/atbash.htm

http://www.ftech.net/~monark/crypto/crypt/atb...
INDEXCARD, 9/32
 
Bulletin Board Systems

A BBS (bulletin board system) is a computer that can be reached by computer modem dialing (you need to know the phone number) or, in some cases, by Telnet for the purpose of sharing or exchanging messages or other files. Some BBSs are devoted to specific interests; others offer a more general service. The definitive BBS List says that there are 40,000 BBSs worldwide.

Bulletin board systems originated and generally operate independently of the Internet.

Source: Whatis.com

INDEXCARD, 10/32
 
Operating system

An operating system is software that controls the many different operations of a computer and directs and coordinates its processing of programs. It is a remarkably complex set of instructions that schedules the series of jobs (user applications) to be performed by the computer and allocates them to the computer's various hardware systems, such as the central processing unit, main memory, and peripheral systems. The operating system directs the central processor in the loading, storage, and execution of programs and in such particular tasks as accessing files, operating software applications, controlling monitors and memory storage devices, and interpreting keyboard commands. When a computer is executing several jobs simultaneously, the operating system acts to allocate the computer's time and resources in the most efficient manner, prioritizing some jobs over others in a process called time-sharing. An operating system also governs a computer's interactions with other computers in a network.

INDEXCARD, 11/32
 
Intranet

As a local area network (LAN), an Intranet is a secured network of computers based on the IP protocol and with restricted access.

INDEXCARD, 12/32
 
Division of labor

The term refers to the separation of a work process into a number of tasks, with each task performed by a separate person or group of persons. It is most often applied to mass production systems, where it is one of the basic organizing principles of the assembly line. Breaking down work into simple, repetitive tasks eliminates unnecessary motion and limits the handling of tools and parts. The consequent reduction in production time and the ability to replace craftsmen with lower-paid, unskilled workers result in lower production costs and a less expensive final product. The Scottish economist Adam Smith saw in this splitting of tasks a key to economic progress by providing a cheaper and more efficient means of producing economic goods.

INDEXCARD, 13/32
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 14/32
 
News Corporation

The News Corporation Ltd., a global media holding company, which governed News Limited (Australia), News International (U.K.), and News America Holdings Inc. (U.S.) was founded by the Australian-born newspaper publisher and media entrepreneur, Rupert Murdoch. Murdoch's corporate interests center on newspaper, magazine, book, and electronic publishing; television broadcasting; and film and video production, principally in the United States, the United Kingdom, and Australia.

INDEXCARD, 15/32
 
Oscar Wilde

Oscar Flingal O'Flahertie Wills (1854-1900) is one of the best and most famous poets and novelists of England of his time. His satirical and amusing texts exposed the false moral of the Bourgeoisie publicly. Besides, his life as a dandy made him the leader of aesthetics in England, until he was sent to prison because of homosexuality. Afterwards he lived in Paris where he died lonely and nearly forgotten in a hotel in 1900. His poems, fairy tales, novels and dramas survived.

INDEXCARD, 16/32
 
Clipper Chip

The Clipper Chip is a cryptographic device proposed by the U.S. government that purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone
would be used to encrypt data. The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA).

INDEXCARD, 17/32
 
National Science Foundation (NSF)

Established in 1950, the National Science Foundation is an independent agency of the U.S. government dedicated to the funding in basic research and education in a wide range of sciences and in mathematics and engineering. Today, the NSF supplies about one quarter of total federal support of basic scientific research at academic institutions.

http://www.nsf.gov

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/0/0,5716,2450+1+2440,00.html

http://www.nsf.gov/
INDEXCARD, 18/32
 
Friedrich Kittler, The History of Communication Media

In this essay, Friedrich Kittler, one of the world's leading media theorists and media historicist, offers a concise and fascinating history of communication technologies in general terms from its beginnings up to now, provoking new insights by showing interesting interdependencies.

http://www.ctheory.com/ga1.14.html

INDEXCARD, 19/32
 
NATO

The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of COMECON became members of NATO (the Czech Republic, Hungary and Poland), which makes 19 members now. Around its 50th anniversary NATO changed its goals and tasks by intervening in the Kosovo Crisis.

INDEXCARD, 20/32
 
Critical Art Ensemble

Critical Art Ensemble is a collective of five artists of various specializations dedicated to exploring the intersections between art, technology, radical politics, and critical theory. CAE have published a number of books and carried out innovative art projects containing insightful and ironic theoretical contributions to media art. Projects include Addictionmania, Useless Technology, The Therapeutic State, Diseases of Consciousness, Machineworld, As Above So Below, and Flesh Machine.

http://www.critical-art.net

INDEXCARD, 21/32
 
T. Matthew Ciolek, Global Networking: A Timeline

This document, intended as a reliable electronic reference tool, provides a timeline for three types of developments and milestones: (1) advances in long distance person-to-person communication; (2) advances in storage, replication, cataloguing, finding, and retrieval of data; and (3) standardization of concepts and tools for long distance interaction.

The advancements may have a technical (hardware), conceptual (software), or an organizational aspect, or represent an important milestone in the history of a given invention, and are annotated as such in the timeline.

The period covered ranges from 30000 BC up to now.

http://www.ciolek.com/PAPERS/milestones.html

INDEXCARD, 22/32
 
FEED

http://www.feed.com/

http://www.feed.com/
INDEXCARD, 23/32
 
Network Information Center (NIC)

Network information centers are organizations responsible for registering and maintaining the domain names on the World Wide Web. Until competition in domain name registration was introduced, they were the only ones responsible. Most countries have their own network information center.

INDEXCARD, 24/32
 
Caching

Caching is a mechanism that attempts to decrease the time it takes to retrieve data by storing a copy at a closer location.

INDEXCARD, 25/32
 
Java Applets

Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Sun Microsystems, Inc.

Source: Whatis.com

INDEXCARD, 26/32
 
David Kahn

David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography.

INDEXCARD, 27/32
 
Artificial intelligence approaches

Looking for ways to create intelligent machines, the field of artificial intelligence (AI) has split into several different approaches based on the opinions about the most promising methods and theories. The two basic AI approaches are: bottom-up and top-down. The bottom-up theory suggests that the best way to achieve artificial intelligence is to build electronic replicas of the human brain's complex network of neurons (through neural networks and parallel computing) while the top-down approach attempts to mimic the brain's behavior with computer programs (for example expert systems).

INDEXCARD, 28/32
 
Edward L. Bernays

Born 1891 in Vienna, Bernays was one of the founders of modern public relations. An enigmatic character, he was a master of mise en scène with far-reaching contacts in the world of business and politics. The nephew of Sigmund Freund and related with Heinrich Heine, he was also among the first to pursue PR for governments and to produce pseudo-events. Bernays considered the manipulation of public opinion as an important element of mass democracies and was of the opinion that only through PR a society's order can be kept.

INDEXCARD, 29/32
 
Enochian alphabet

Also "Angelic" language. Archaic language alphabet composed of 21 letters, discovered by John Dee and his partner Edward Kelley. It has its own grammar and syntax, but only a small sample of it has ever been translated to English.

INDEXCARD, 30/32
 
Next Generation Internet Program

A research and development program funded by the US government. Goal is the development of advanced networking technologies and applications requiring advanced networking with capabilities that are 100 to 1,000 times faster end-to-end than today's Internet.

http://www.ngi.gov

INDEXCARD, 31/32
 
1996 WIPO Copyright Treaty (WCT)

The 1996 WIPO Copyright Treaty, which focused on taking steps to protect copyright "in the digital age" among other provisions 1) makes clear that computer programs are protected as literary works, 2) the contracting parties must protect databases that constitute intellectual creations, 3) affords authors with the new right of making their works "available to the public", 4) gives authors the exclusive right to authorize "any communication to the public of their works, by wire or wireless means ... in such a way that members of the public may access these works from a place and at a time individually chosen by them." and 5) requires the contracting states to protect anti-copying technology and copyright management information that is embedded in any work covered by the treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm



http://www.wipo.int/documents/en/diplconf/dis...
INDEXCARD, 32/32