Timeline BC
~ 1900 BC: Egyptian writers use non-standard Hieroglyphs in inscriptions of a royal tomb; supposedly this is not the first but the first documented example of written cryptography
1500 an enciphered formula for the production of pottery is done in Mesopotamia
parts of the Hebrew writing of Jeremiah's words are written down in " atbash", which is nothing else than a reverse alphabet and one of the first famous methods of enciphering
4th century Aeneas Tacticus invents a form of beacons, by introducing a sort of water-clock
487 the Spartans introduce the so called " skytale" for sending short secret messages to and from the battle field
170 Polybius develops a system to convert letters into numerical characters, an invention called the Polybius Chequerboard.
50-60 Julius Caesar develops an enciphering method, later called the Caesar Cipher, shifting each letter of the alphabet an amount which is fixed before. Like atbash this is a monoalphabetic substitution.
|
TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438659084
|
| |
Global hubs of the data body industry
While most data bunkers are restricted to particular areas or contexts, there are others which act as global data nodes. Companies such as EDS (Electronic Data Systems), Experian, First Data Corporation and Equifax operate globally and run giant databases containing personal information. They are the global hubs of the data body economy.
Company
| Sales in USD billions
| Size of client database in million datasets
|
Equifax
|
1,7
|
360
|
Experian
|
1,5
|
779
|
Fist Data Corporation
|
5,5
|
260
|
EDS
|
18,5
|
(not disclosed)
| | (Sales and database sizes, 1998)
The size of these data repositories is constantly growing, so it is only a matter of time when everybody living in the technologically saturated part of the world will be registered in one of these data bunkers.
Among these companies, EDS, founded by the former US presidential candidate Ross Perot, known for his right-wing views and direct language, is of particular importance. Not only is it the world's largest data body company, it is also secretive about the size of its client database - a figure disclosed by the other companies either in company publications or upon enquiry. After all, the size of such a data base makes a company more attractive for potential customers.
For many years, EDS has been surrounded by rumours concerning sinister involvement with intelligence agencies. Beyond the rumours, though, there are also facts. EDS has a special division for government services. EDS does business with all military agencies of the US, as well as law enforcement agencies, justice agencies, and many others. The company also maintains a separate division for military equipment In 1984, the company became a subsidiary of General Motors, itself a leading manufacturer of military and intelligence systems. EDS is listed by the Federation of American Scientist's intelligence resource program as contractor to US intelligence agencies, and prides itself, amongst other things, to respond to the "rise of the citizen as a consumer".
|
TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611761/100438659778
|
| |
Enforcement: Copyright Management and Control Technologies
With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of copyright management systems. Technological protection for their works, the copyright industry argues, is necessary to prevent widespread infringement, thus giving them the incentive to make their works available online. In their view the ideal technology should be "capable of detecting, preventing, and counting a wide range of operations, including open, print, export, copying, modifying, excerpting, and so on." Additionally such systems could be used to maintain "records indicating which permissions have actually been granted and to whom".
|
TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659674
|
| |
Netiquette
Although referred to as a single body of rules, there is not just one Netiquette, but there are several, though overlapping largely. Proposing general guidelines for posting messages to newsgroups and mailing lists and using the World Wide Web and FTP, Netiquettes address civility topics (i.e., avoiding hate speech) and comprise technical advises (i.e., using simple and platform-independent file formats). Well-known Netiquettes are the Request for Comment #1855 and The Net: User Guidelines and Netiquette by Arlene H. Rinaldi.
ftp://ftp.isi.edu/in-notes/rfc1855.txt
http://www.fau.edu/netiquette/net/index.html
|
INDEXCARD, 1/3
|
| |
PGP
A cryptographic software application that was developed by Phil Zimmerman at the Massachusetts Institute of Technology. Pretty Good Privacy (PGP) is a cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.
|
INDEXCARD, 2/3
|
| |
Extranet
An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g.
|
INDEXCARD, 3/3
|
| |