Legal Protection: National Legislation

Intellectual property - comprising industrial property and copyright - in general is protected by national legislation. Therefore those rights are limited territorially and can be exercised only within the jurisdiction of the country or countries under whose laws they are granted.

TEXTBLOCK 1/15 // URL: http://world-information.org/wio/infostructure/100437611725/100438659540
 
Timeline BC

~ 1900 BC: Egyptian writers use non-standard Hieroglyphs in inscriptions of a royal tomb; supposedly this is not the first but the first documented example of written cryptography

1500 an enciphered formula for the production of pottery is done in Mesopotamia

parts of the Hebrew writing of Jeremiah's words are written down in "atbash", which is nothing else than a reverse alphabet and one of the first famous methods of enciphering

4th century Aeneas Tacticus invents a form of beacons, by introducing a sort of water-clock

487 the Spartans introduce the so called "skytale" for sending short secret messages to and from the battle field

170 Polybius develops a system to convert letters into numerical characters, an invention called the Polybius Chequerboard.

50-60 Julius Caesar develops an enciphering method, later called the Caesar Cipher, shifting each letter of the alphabet an amount which is fixed before. Like atbash this is a monoalphabetic substitution.

TEXTBLOCK 2/15 // URL: http://world-information.org/wio/infostructure/100437611776/100438659084
 
Identificaiton in history

In biometric technology, the subject is reduced to its physical and therefore inseparable properties. The subject is a subject in so far as it is objectified; that is, in so far as is identified with its own res extensa, Descartes' "extended thing". The subject exists in so far as it can be objectified, if it resists the objectification that comes with measurement, it is rejected or punished. Biometrics therefore provides the ultimate tool for control; in it, the dream of hermetic identity control seems to become a reality, a modern technological reconstruction of traditional identification techniques such as the handshake or the look into somebody's eyes.

The use of identification by states and other institutions of authority is evidently not simply a modern phenomenon. The ancient Babylonians and Chinese already made use of finger printing on clay to identify authors of documents, while the Romans already systematically compared handwritings.

Body measurement has long been used by the military. One of the first measures after entering the military is the identification and appropriation of the body measurements of a soldier. These measurements are filed and combined with other data and make up what today we would call the soldier's data body. With his data body being in possession of the authority, a soldier is no longer able freely socialise and is instead dependent on the disciplinary structure of the military institution. The soldier's social being in the world is defined by the military institution.

However, the military and civilian spheres of modern societies are no longer distinct entities. The very ambivalence of advanced technology (dual use technologies) has meant that "good" and "bad" uses of technology can no longer be clearly distinguished. The measurement of physical properties and the creation of data bodies in therefore no longer a military prerogative, it has become diffused into all areas of modern societies.

If the emancipatory potential of weak identities is to be of use, it is therefore necessary to know how biometric technologies work and what uses they are put to.

TEXTBLOCK 3/15 // URL: http://world-information.org/wio/infostructure/100437611729/100438658096
 
Basics: Introduction

Copyright law is a branch of intellectual property law and deals with the rights of intellectual creators in their works. The scope of copyright protection as laid down in Article 2 of the 1996 WIPO Copyright Treaty "... extends to expressions and not to ideas, procedures, methods of operation or mathematical concepts as such." Copyright law protects the creativity concerning the choice and arrangement of words, colors, musical notes etc. It grants the creators of certain specified works exclusive rights relating to the "copying" and use of their original creation.


TEXTBLOCK 4/15 // URL: http://world-information.org/wio/infostructure/100437611725/100438659520
 
The Romans

The Romans can be called the great inventors of myths with the purpose of propaganda. Think of Caesar, Augustus or Nero. Caesar wrote his war-documentation by using incredible (e.g. the numbers of hostile soldiers) but he also emphasized the barbarity of the foe, creating images of hatred. People back at home had to believe these manipulative stories.
Or Augustus: he reunited the Roman Empire; part of his power was due to huge efforts in propaganda, visible e.g. in the mass of coins showing his face, being sent all over the empire. He understood very well, that different cultures used different symbols - and he used them for his propaganda.
Politically the Roman army was an important factor. Propaganda in that case was used for the soldiers on the one hand, but on the other hand also for demonstrating the power of the army to the people, so they could trust in its strength. Even then security was an essential factor of politics. As long as the army functioned, the Roman Empire did as well (Taylor, Munitions of the Mind, p. 48).

TEXTBLOCK 5/15 // URL: http://world-information.org/wio/infostructure/100437611661/100438658320
 
Who owns the Internet and who is in charge?

The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet.
The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g.
Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as communication protocols, e.g., cooperatively, so that compatibility of software is guaranteed. But they have no binding legal authority, nor can they enforce the standards they have agreed upon, nor are they wholly representative for the community of Internet users. The Internet has no official governing body or organization; most parts are still administered by volunteers.
Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Netiquette, are due to individual efforts and mostly just expressively stating the prevailing consent. Violations of accepted standards are fiercely rejected, as reactions to misbehavior in mailing lists and newsgroups prove daily.
Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed.
For a detailed report on Internet governance, click here.

TEXTBLOCK 6/15 // URL: http://world-information.org/wio/infostructure/100437611791/100438658447
 
Enforcement: Copyright Management and Control Technologies

With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of copyright management systems. Technological protection for their works, the copyright industry argues, is necessary to prevent widespread infringement, thus giving them the incentive to make their works available online. In their view the ideal technology should be "capable of detecting, preventing, and counting a wide range of operations, including open, print, export, copying, modifying, excerpting, and so on." Additionally such systems could be used to maintain "records indicating which permissions have actually been granted and to whom".

TEXTBLOCK 7/15 // URL: http://world-information.org/wio/infostructure/100437611725/100438659674
 
Definition

During the last 20 years the old Immanuel Wallerstein-paradigm of center - periphery and semi-periphery found a new costume: ICTs. After Colonialism, Neo-Colonialism and Neoliberalism a new method of marginalization is emerging: the digital divide.

"Digital divide" describes the fact that the world can be divided into people who
do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide.
More than 80% of all computers with access to the Internet are situated in larger cities.

"The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium."
(Izumi Aizi)

for more information see:
http://www.whatis.com/digital_divide.htm

TEXTBLOCK 8/15 // URL: http://world-information.org/wio/infostructure/100437611730/100438659300
 
Timeline Cryptography - Introduction

Besides oral conversations and written language many other ways of information-transport are known: like the bush telegraph, drums, smoke signals etc. Those methods are not cryptography, still they need en- and decoding, which means that the history of language, the history of communication and the history of cryptography are closely connected to each other
The timeline gives an insight into the endless fight between enciphering and deciphering. The reasons for them can be found in public and private issues at the same time, though mostly connected to military maneuvers and/or political tasks.

One of the most important researchers on Cryptography through the centuries is David Kahn; many parts of the following timeline are originating from his work.

TEXTBLOCK 9/15 // URL: http://world-information.org/wio/infostructure/100437611776/100438658824
 
Internet, Intranets, Extranets, and Virtual Private Networks

With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are proprietary networks.

Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term "proprietary networks" into terms to be explained and speak of Intranets, Extranets, and Virtual Private Networks.

Cable TV networks and online services as Europe Online, America Online, and Microsoft Network are also proprietary networks. Although their services resemble Internet services, they offer an alternative telecommunication infrastructure with access to Internet services for their subscribers.
America Online is selling its service under the slogan "We organize the Web for you!" Such promises are more frightening than promising because "organizing" is increasingly equated with "filtering" of seemingly objectionable messages and "rating" of content. For more information on these issues, click here If you want to know more about the technical nature of computer networks, here is a link to the corresponding article in the Encyclopaedia Britannica.

Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Society for Worldwide Interbank Financial Telecommunication (SWIFT). According to SWIFT, in 1998 the average daily value of payments messages was estimated to be above U$ 2 trillion.

Electronic Communications Networks as Instinet force stock exchanges to redefine their positions in trading of equities. They offer faster trading at reduced costs and better prices on trades for brokers and institutional investors as mutual funds and pension funds. Last, but not least clients are not restricted to trading hours and can trade anonymously and directly, thereby bypassing stock exchanges.

TEXTBLOCK 10/15 // URL: http://world-information.org/wio/infostructure/100437611791/100438658384
 
Biometrics applications: gate keeping

Identity has to do with "place". In less mobile societies, the place where a person finds him/herself tells us something about his/her identity. In pre-industrial times, gatekeepers had the function to control access of people to particular places, i.e. the gatekeepers function was to identify people and then decide whether somebody's identity would allow that person to physically occupy another place - a town, a building, a vehicle, etc.

In modern societies, the unambiguous nature of place has been weakened. There is a great amount of physical mobility, and ever since the emergence and spread of electronic communication technologies there has been a "virtualisation" of places in what today we call "virtual space" (unlike place, space has been a virtual reality from the beginning, a mathematical formula) The question as to who one is no longer coupled to the physical abode. Highly mobile and virtualised social contexts require a new generation of gatekeepers which biometric technology aims to provide.

TEXTBLOCK 11/15 // URL: http://world-information.org/wio/infostructure/100437611729/100438658757
 
Feeding the data body

TEXTBLOCK 12/15 // URL: http://world-information.org/wio/infostructure/100437611761/100438659644
 
Challenges for Copyright by ICT: Copyright Owners

The main concern of copyright owners as the (in terms of income generation) profiteers of intellectual property protection is the facilitation of pirate activities in digital environments.

Reproduction and Distribution

Unlike copies of works made using analog copiers (photocopy machines, video recorders etc.) digital information can be reproduced extremely fast, at low cost and without any loss in quality. Since each copy is a perfect copy, no quality-related limits inhibit pirates from making as many copies as they please, and recipients of these copies have no incentive to return to authorized sources to get another qualitatively equal product. Additionally the costs of making one extra copy of intellectual property online are insignificant, as are the distribution costs if the copy is moved to the end user over the Internet.

Control and Manipulation

In cross-border, global data networks it is almost impossible to control the exploitation of protected works. Particularly the use of anonymous remailers and other existing technologies complicates the persecution of pirates. Also digital files are especially vulnerable to manipulation, of the work itself, and of the (in some cases) therein-embedded copyright management information.

TEXTBLOCK 13/15 // URL: http://world-information.org/wio/infostructure/100437611725/100438659526
 
Individualized Audience Targeting

New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like Amazon.Com have already started to exploit individualized audience targeting for their purposes.

TEXTBLOCK 14/15 // URL: http://world-information.org/wio/infostructure/100437611652/100438658450
 
Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights)

Another important multilateral treaty concerned with intellectual property rights is the TRIPS agreement, which was devised at the inauguration of the Uruguay Round negotiations of the WTO in January 1995. It sets minimum standards for the national protection of intellectual property rights and procedures as well as remedies for their enforcement (enforcement measures include the potential for trade sanctions against non-complying WTO members). The TRIPS agreement has been widely criticized for its stipulation that biological organisms be subject to intellectual property protection. In 1999, 44 nations considered it appropriate to treat plant varieties as intellectual property.

The complete TRIPS agreement can be found on: http://www.wto.org/english/tratop_e/trips_e/t_agm1_e.htm

TEXTBLOCK 15/15 // URL: http://world-information.org/wio/infostructure/100437611725/100438659758
 
American Express

U.S. company founded on March 18, 1850, as an express-transportation company, but today operating as a worldwide organization providing primarily travel-related and insurance services and international finance operations and banking. Headquarters are in New York City.

INDEXCARD, 1/15
 
McCarthy

Born in Grand Chute, Wisconsin, Joe McCarthy graduated from Marquette in 1935. In 1939, he won election as a circuit court judge. During World War II, he enlisted in the Marines and served in the Pacific. In 1944, he campaigned for senator but lost in the Republican primary. In 1946, he ran for Wisconsin's other senate seat.

In a 1950 speech, McCarthy entered the public spotlight by claiming that communists had "infested" the State Department, dramatically waving a sheet of paper which purportedly contained the traitors' names. A special Senate committee investigated the charges and found them groundless. Unfazed, McCarthy used his position to wage a relentless anti-communist crusade, denouncing numerous public figures and holding a series of highly confrontational hearings, ruining the careers of many people.

He died at the age of 49 of complications related to alcoholism.

http://us.history.wisc.edu/hist102/bios/31.html

http://us.history.wisc.edu/hist102/bios/31.ht...
INDEXCARD, 2/15
 
Electronic Data Interchange (EDI)

EDI is an international standard relating to the exchange of trade goods and services. It enables trading partners to conduct routine business transactions, such as purchase orders, invoices and shipping notices independent of the computer platform used by the trading partners. Standardization by EDI translation software assures the correct interpretation of data.

EDI might become increasingly important to electronic commerce.

INDEXCARD, 3/15
 
Chevron

Chevron is a U.S. petroleum corporation formed in 1926 with the merger of Standard Oil Company of California and Pacific Oil Company. Headquartered in San Francisco, it operates today in more than 90 countries, either directly or through affiliates.

INDEXCARD, 4/15
 
Vladimir Putin

Vladimir Putin is Russian President, Boris Yeltsin's. Until his appointment as Prime Minister in August 1999, he was nearly unknown. He had been working for the Soviet Security Service, the KGB. In July 1998 he took charge of the Federal Security Service, FSB. In March 1999 he became secretary of the Security Council. He has no experience in being at all. Where he demonstrated power until now is the Chechnya War. Soon after the beginning of this 2nd war in the region his popularity rose.

INDEXCARD, 5/15
 
Amoco Corporation

American petroleum corporation that was founded in 1889 by the Standard Oil trust to direct the refining and marketing of oil in the Midwestern states. By the late 20th century, American operations still accounted for more than half of Amoco's total assets, though the company has been active in some 40 other countries in the areas of production, refining, and marketing. In addition to refining crude oil, Amoco is one of the largest producers of natural gas in the North American continent.

INDEXCARD, 6/15
 
Philip Morris

American holding company founded in 1985, the owner of several major American companies, notably Philip Morris Inc., the General Foods Corporation, and Kraft, Inc., with diversified interests in tobacco and food products. In 1988 Philip Morris acquired Kraft, Inc., a large maker of cheeses and grocery products. Philip Morris thus became one of the world's largest corporate producers of consumer goods. Its headquarters are in New York City.

INDEXCARD, 7/15
 
Chase Manhattan

American holding company incorporated Jan. 22, 1969, to acquire, as its main
subsidiary, The Chase Manhattan Bank, NA, and to develop other related financial services and operations. The Chase Manhattan Bank itself had resulted from the merger in 1955 of the Bank of the Manhattan Company (founded 1799) and The Chase National Bank (founded 1877). Its headquarters are in New York City.

INDEXCARD, 8/15
 
R.J. Reynolds

American manufacturer of tobacco products. The origins of the R.J. Reynolds Tobacco Company date to the post-Civil War era, when Richard Joshua Reynolds (1850-1918) began trading in tobacco, first in his native Virginia and then in Winston, N.C., where in 1875 he established his first plug factory. The company began to diversify in the 1960s, acquiring chiefly food and oil concerns, and the tobacco concern became a subsidiary of R.J. Reynolds Industries, Inc., in 1970.

INDEXCARD, 9/15
 
Merck & Co., Inc.

Merck & Co. is a research-driven pharmaceutical company that discovers, develops, manufactures and markets a broad range of human and animal health products, and provides pharmaceutical benefit services through Merck-Medco Managed Care LLC. The Company is comprised of two operating segments. Merck-Medco primarily includes sale of non-Merck products and Merck-Medco pharmaceutical benefit services, principally manages prescription drug programs and programs to help manage patient health. Merck-Medco sells its services to corporations, labor unions and insurance companies. Merck Pharmaceuticals consists of therapeutic and preventive agents, generally sold by prescription, for the treatment of human disorders. The Company's human health products are sold to drug wholesalers and retailers, hospitals, clinics, government agencies, and managed care providers.

INDEXCARD, 10/15
 
Citicorp/Citibank

American holding company (formerly (1967-74) First National City Corporation),
incorporated in 1967, with the City Bank of New York, National Association (a bank tracing to 1812), as its principal subsidiary. The latter's name changed successively to First National City Bank in 1968 and to Citibank, N.A. (i.e., National Association), in 1976. Citicorp was the holding company's popular and trade name from its inception but became the legal name only in 1974. Headquarters are in New York City.

INDEXCARD, 11/15
 
Merrill Lynch & Co., Inc.

American financial-services holding company whose principal subsidiary, Merrill Lynch, Pierce, Fenner & Smith Inc., is the largest retail brokerage house in the United States. Headquarters are in New York City. In the 1970s, under Chairman Donald T. Regan (later treasury secretary under President Ronald Reagan), the firm moved aggressively into such other financial services as insurance and established the nation's largest money-market mutual fund. The holding company was created in 1973. Under Merrill Lynch International, it has several international operations, including Smith New Court PLC, a British securities firm acquired in 1995.

INDEXCARD, 12/15
 
General Electric

GE is a major American corporation and one of the largest and most diversified corporations in the world. Its products include electrical and electronic equipment, plastics, aircraft engines, medical imaging equipment, and financial services. The company was incorporated in 1892, and in 1986 GE purchased the RCA Corporation including the RCA-owned television network, the National Broadcasting Company, Inc. In 1987, however, GE sold RCA's consumer electronics division to Thomson SA, a state-owned French firm, and purchased Thomson's medical technology division. In 1989 GE agreed to combine its European business interests in appliances, medical systems, electrical distribution, and power systems with the unrelated British corporation General Electric Company. Headquarters are in Fairfield, Conn., U.S.

INDEXCARD, 13/15
 
Bristol-Myers Squibb Company

American company resulting from a merger in 1989 and dating to companies
founded in 1858 and 1887. It produces toiletries, cosmetics, household cleaning products, pharmaceuticals, health foods and supplements, and health equipment and prostheses. Headquarters are in New York City. In 1989 the merger of Bristol-Myers Company and Squibb Corporation (descendant of a company founded in 1858) created one of the world's largest pharmaceutical companies.

INDEXCARD, 14/15
 
Salomon Smith Barney

Investment banking firm and securities dealer. Founded in the 19th century in Philadelphia, in 1993 Smith Barney became a wholly owned subsidiary of Travelers Group Inc. The 1998 merger of Citicorp and Travelers Group brought together Citibank, Travelers, Salomon Smith Barney, Commercial Credit and Primerica under Citigroup's trademark red umbrella.

INDEXCARD, 15/15