Copyright Management and Control Systems: Post-Infringement

Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:

Steganography

Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.

Agents

Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.

Copyright Litigation

While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.

TEXTBLOCK 1/1 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
 
Bad Aibling Station

Latitude: 47.86353, Longitude: 12.00983

RSOC - Bad Aibling is a ground station for the interception of civil and military satellite communications traffic operated by the NSA. About 1000 personnel are on the staff at the Bad Aibling Regional SIGINT Operations Center in Germany, which conducts satellite communications interception activities and is also a downlink station for geostationary SIGINT satellites, like the CANYON program or the MAGNUM/ORION system. Operational responsibility of the groundstation was transfered to the ARMY Intelligence and Security Command in 1995, but there is also influence from the Air Force's 402nd Intelligence Squadron. Till the end of the cold war the main target was the Soviet Union.

for more information:

Description by FAS intelligence resource program.

http://www.fas.org/irp/facility/bad_aibling.htm

Description of the tasks of the Signals Intelligence Brigade.

http://www.fas.org/irp/doddir/army/fm34-37_97/6-chap.htm

Look at a detailed guide for military newbies at Bad Aibling.

http://www.dmdc.osd.mil/sites/owa/Installation.prc_Home?p_SID=&p_DB=P

http://www.fas.org/irp/facility/bad_aibling.h...
http://www.fas.org/irp/doddir/army/fm34-37_97...
http://www.dmdc.osd.mil/sites/owa/Installatio...
INDEXCARD, 1/1