ECHELON Facts

What: A highly automated global system and surveillance network for processing data retrieved through interception of communication traffic from all over the world. In the days of the cold war, ECHELON's primary purpose was to keep an eye/ear on the U.S.S.R. In the wake of the fall of the U.S.S.R. ECHELON is officially said to being used to fight terrorism ann crimes, but it seems to be evident that the main focus lies in political and economic espionage.

When: ECHELON had been rumored to be in development since 1947, the result of the UKUSA treaty signed by the governments of the United States, the United Kingdom, Canada, Australia and New Zealand.



Who: It is coordinated by the NSA, with participation of the CIA, USAF, NSG, GCHQ, DSD, CSE, GCSB. It seems that NSA is the only "contractor" who has access to the whole of information, whereas the other participants only get a comparingly small portion of information.

Where: Headquarters of the ECHELON system are at Fort Meade in Maryland, which is the NSA Headquarter. The NSA operates many interception stations all over the world, with or without the knowledge of the host country.

How: Each station in the ECHELON network has computers that automatically search through millions of intercepted data for containing pre-programmed keywords or fax, telex and email addresses. Every word of every message is

automatically searched. Computers that can search for keywords have existed since at least the 1970s, but the ECHELON system has been designed to interconnect all these computers and allow the stations to function as components of an integrated whole.

The scale of the collection system was described by the former Director of the NSA, Vice Admiral William Studeman, in 1992 (http://www.menwithhill.com/find.html). At that time the NSA's collection system generated about 2 million intercepted messages per hour. Of these, all but about 13,000 an hour were discarded. Of these about 2,000 met forwarding criteria, of which some 20 are selected by analysts, who then write 2 reports for further distribution. Therefore, in 1992 MenwithHillSation was intercepting 17.5 billion messages a year. Of these some 17.5 million may have been studied for analysis.

How much: ECHELON justifies obviousely multi-billion dollar expenses. But no detailed figures are available yet.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611746/100438658879
 
Znet

ZNet provides forum facilities for online discussion and chatting on various topics ranging from culture and ecology to international relations and economics. ZNet also publishes daily commentaries and maintains a Web-zine, which addresses current news and events as well as many other topics, trying to be provocative, informative and inspiring to its readers.

Strategies and Policies

Daily Commentaries: Znet's commentaries address current news and events, cultural happenings, and organizing efforts, providing context, critique, vision, and analysis, but also references to or reviews of broader ideas, new books, activism, the Internet, and other topics that strike the diverse participating authors as worthy of attention.

Forum System: Znet provides a private (and soon also a public) forum system. The fora are among others concerned with topics such as: activism, cultural, community/race/religion/ethnicity, ecology, economics/class, gender/kinship/sexuality, government/polity, international relations, ParEcon, vision/strategy and popular culture. Each forum has a set of threaded discussions, also the fora hosted by commentary writers like Chomsky, Ehrenreich, Cagan, Peters and Wise.

ZNet Daily WebZine: ZNet Daily WebZine offers commentaries in web format.

Z Education Online (planned): The Z Education Online site will provide instructionals and courses of diverse types as well as other university-like, education-aimed features.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611734/100438659288
 
Copyright Management and Control Systems: Pre-Infringement

Pre-infringement copyright management and control systems that inhibit or control infringement of intellectual property may be put into place by copyright owners before distributing their works. Examples are:

Contracts

Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws.

Copy Protection

This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations.

Limited Functionality

This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor.

Date Bombs

Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659616
 
Invention

According to the WIPO an invention is a "... novel idea which permits in practice the solution of a specific problem in the field of technology." Concerning its protection by law the idea "... must be new in the sense that is has not already been published or publicly used; it must be non-obvious in the sense that it would not have occurred to any specialist in the particular industrial field, had such a specialist been asked to find a solution to the particular problem; and it must be capable of industrial application in the sense that it can be industrially manufactured or used." Protection can be obtained through a patent (granted by a government office) and typically is limited to 20 years.

INDEXCARD, 1/1