|
Eliminating online censorship: Freenet, Free Haven and Publius Protecting speech on the global data networks attracts an increasing attention. The efforts and the corresponding abilities of governmental authorities, corporations and copyright enforcement agencies are countered by similar efforts and abilities of researchers and engineers to provide means for anonymous and uncensored communication, as Freenet, Free Haven and Publius. All three of them show a similar design. Content is split up and spread on several servers. When a file is requested, the pieces are reassembled. This design makes it difficult to censor content. All of these systems are not commercial products. The most advanced system seems to be Publius. Because of being designed by researchers and engineers at the prestigious For more information on Publius, see John Schwartz, Online and Unidentifiable? in: The Washington Post, June 30, 2000, Freenet web site: Free Haven web site: Publius web site: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Changes Still, disinformation and propaganda are nothing magic. They can change things, but supposedly only if those things/meanings/opinions are not fixed completely. It is never just a single idea that changes. Society is following the changes. Thinking about disinformation brings us to the word truth, of course, and to the doubt that there is no definite truth. And truth can easily be manipulated to another truth. Just present some facts that seem to be logic and there you've got a new truth. And if the facts can supposedly be proved by empirical studies then the quality of the truth definitely rises. That's what ideologies do all the time. And the media like to do the same thing - as a game with power or mere presentation of power? But of course there also exist bits of disinformation which are more amusing than evil or dangerous: - the theory of the celestro-centric world/"Hohlwelttheorie" - the story of the German philosopher who invented an Italian philosopher, wrote books about him, even reprinted "his" texts, which had gone lost pretendedly 100 years ago - and finally lost his job and all his career when other scientists found out that everything had been made up. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
The North against the South? "Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market." (UNESCO, World Communication Report) The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else. Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left? | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Commercial vs. Independent Content: Power and Scope Regarding the dimension of their financial and human resources commercial media companies are at any rate much more powerful players than their independent counterparts. Still those reply with an extreme multiplicity and diversity. Today thousands of newsgroups, mailing-list and e-zines covering a wide range of issues from the environment to politics, social and human rights, culture, art and democracy are run by alternative groups. Moreover independent content provider have started to use digital media for communication, information and co-ordination long before they were discovered by corporate interest. They regularly use the Internet and other networks to further public discourse and put up civic resistance. And in many cases are very successful with their work, as initiatives like widerst@ndMUND's (AT) co-ordination of the critics of the participation of the Freedom Party in the Austrian government via mailing-lists, an online-magazine and discussion forums, show. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Further Tools: Photography Art has always contributed a lot to disinformation. Many modern tools for disinformation are used in art/photography. Trillions of photographs have been taken in the 20th century. Too many to look at, too many to control them and their use. A paradise for manipulation. We have to keep in mind: There is the world, and there exist pictures of the world, which does not mean that both are the same thing. Photographs are not objective, because the photographer selects the part of the world which is becoming a picture. The rest is left out. Some tools for manipulation of photography are: morphing (71) wet operation (73) neutralizing (74) masks (75) damnatio memoriae (78) Some of those are digital ways of manipulation, which helps to change pictures in many ways without showing the manipulation. Pictures taken from the internet could be anything and come from anywhere. To proof the source is nearly impossible. Therefore scientists created on watermarks for pictures, which make it impossible to "steal" or manipulate a picture out of the net. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Commercial Content Commercial media aim towards economies of scale and scope and the satisfaction of their shareholders. As most of the private media companies' revenues come from advertising, much of their content is designed to allure audiences, whose size and composition is decisive for advertisers and marketers. Those revenues being of vital importance for commercial media firms, their programming in many cases is tailored to the needs of the advertising industry. In their self-interest commercial media also often accept pressure from marketers and advertisers. "... for example, Hence, so as not to interfere with the commercial message, most media conglomerates concentrate on easy-to-consume programming with entertainment, music and sports forming most of their content. Although they also offer news and documentaries, programs focusing on topics of public interest or minority issues hardly play more than a supporting role as they do not comply with the demands of a profit oriented system. One of the most serious effects of this development is that citizens are substantially deprived of an essential element for their participation in the public sphere: objective, exhaustive and diverse information on issues of public concern. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Anonymity "Freedom of anonymous speech is an essential component of free speech." Ian Goldberg/David Wagner, Someone wants to hide one's identity, to remain anonymous, if s/he fears to be holding accountable for something, say, a publication, that is considered to be prohibited. Anonymous publishing has a long tradition in European history. Writers of erotic literature or pamphlets, e. g., preferred to use pseudonyms or publish anonymously. During the Enlightenment books as d'Alembert's and Diderot's famous Encyclopaedia were printed and distributed secretly. Today The original design of the Net, as far as it is preserved, offers a relatively high degree of privacy, because due to the client-server model all what is known about you is a report of the machine from which information was, respectively is requested. But this design of the Net interferes with the wish of corporations to know you, even to know more about you than you want them to know. What is euphemistically called customer relationship management systems means the collection, compilation and analysis of personal information about you by others. In 1997 America Online member Timothy McVeigh, a Navy employee, made his homosexuality publicly known in a short autobiographical sketch. Another Navy employee reading this sketch informed the Navy. America Online revealed McVeigh's identity to the Navy, who discharged McVeigh. As the consequence of a court ruling on that case, Timothy McVeigh was allowed to return to the Navy. Sometimes anonymity really matters. On the Net you still have several possibilities to remain anonymous. You may visit web sites via an In Germany, in 1515, printers had to swear not to print or distribute any publication bypassing the councilmen. Today repressive regimes, such as Anonymity might be used for abuses, that is true, but "the burden of proof rests with those who would seek to limit it. (Rob Kling, Ya-ching Lee, Al Teich, Mark S. Frankel, Assessing Anonymous Communication on the Internet: Policy Deliberations, in: The Information Society, 1999). | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
The "Corpse-Conversion Factory"-rumor Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. ( | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Beautiful bodies However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". While in Hindu mythology, | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
some essential definitions some essential definitions in the field of cryptography are: - - - "Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break." (David Kahn) The variants of encryption systems are endless. For deciphering there exists always the same game of trial and error (first guessing the encryption method, then the code). A help to do so is pruning. Once, after a more or less long or short period a code/cipher breaks. Monoalphabetic ciphers can be broken easily and of course are no longer used today but for games. for further information on codes and ciphers etc. see: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Identity vs. Identification It has become a commonplace observation that the history of modernity has been accompanied by what one might call a general weakening of identity, both as a theoretical concept and as a social and cultural reality. This blurring of identity has come to full fruition in the 20th century. As a theoretical concept, identity has lost its metaphysical foundation of "full correspondence" following the destruction of metaphysics by thinkers such as Nietzsche, Heidegger, Witgenstein or Davidson. Nietzsche's "dead god", his often-quoted metaphor for the demise of metaphysics, has left western cultures not only with the problem of having to learn how to think without permanent foundations; it has left them with both the liberty of constructing identities, and the structural obligation to do so. The dilemmas arising out of this ambivalent situation have given rise to the comment that "god is dead, and men is not doing so well himself". The new promise of freedom is accompanied by the threat of enslavement. Modern, technologically saturated cultures survive and propagate and emancipate themselves by acting as the gatekeepers of their own technological prisons. On the social and cultural levels, traditional clear-cut identities have become weakened as traditional cultural belonging has been undermined or supplanted by modern socio-technological structures. The question as to "who one is" has become increasingly difficult to answer: hybrid identities are spreading, identities are multiple, temporary, fleeting rather than reflecting an inherited sense of belonging. The war cry of modern culture industry "be yourself" demands the impossible and offers a myriad of tools all outcompeting each other in their promise to fulfil the impossible. For many, identity has become a matter of choice rather than of cultural or biological heritage, although being able to chose may not have been the result of a choice. A large superstructure of purchasable identification objects caters for an audience finding itself propelled into an ever accelerating and vertiginous spiral of identification and estrangement. In the supermarket of identities, what is useful and cool today is the waste of tomorrow. What is offered as the latest advance in helping you to "be yourself" is as ephemeral as your identification with it; it is trash in embryonic form. Identity has become both problematic and trivial, causing modern subjects a sense of thrownness and uprootedness as well as granting them the opportunity of overcoming established authoritarian structures. In modern, technologically saturated societies, the general weakening of identities is a prerequisite for emancipation. The return to "strong" clear-cut "real" identities is the way of new fundamentalism demanding a rehabilitation of "traditional values" and protected zones for metaphysical thought, both of which are to be had only at the price of suppression and violence. It has become difficult to know "who one is", but this difficulty is not merely a private problem. It is also a problem for the exercise of power, for the state and other power institutions also need to know "who you are". With the spread of weak identities, power is exercised in a different manner. Power cannot be exercised without being clear who it addresses; note the dual significance of "subject". A weakened, hybrid undefined subject (in the philosophical sense) cannot be a "good" subject (in the political sense), it is not easy to sub-ject. Without identification, power cannot be exercised. And while identification is itself not a sufficient precondition for authoritarianism, it is certainly a necessary one. Identities are therefore reconstructed using technologies of identification in order to keep the weakened and hence evasive subjects "sub-jected". States have traditionally employed bureaucratic identification techniques and sanctioned those who trying to evade the grip of administration. Carrying several passports has been the privilege of spies and of dubious outlaws, and not possessing an "ID" at all is the fate of millions of refugees fleeing violence or economic destitution. Lack of identification is structurally sanctioned by placelessness. The technisised acceleration of societies and the weakening of identities make identification a complicated matter. On the one hand, bureaucratic identification techniques can be technologically bypassed. Passports and signatures can be forged; data can be manipulated and played with. On the other hand, traditional bureaucratic methods are slow. The requirements resulting from these constraints are met by biometric technology. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Advertising Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Association for Progressive Communication (APC) The APC is a global federation of 24 non-profit Internet providers serving over 50,000 NGOs in 133 countries. Since 1990, APC has been supporting people and organizations worldwide, working together online for social, environmental and economic justice. The APC's network of members and partners spans the globe, with significant presence in Central and Eastern Europe, Africa, Asia and Latin America. History Between 1982 and 1987 several independent, national, non-profit computer networks emerged as viable information and communication resources for activists and NGOs. The networks were founded to make new communication techniques available to movements working for social change. In 1987, people at GreenNet in England began collaborating with their counterparts at the Institute for Global Communications (IGC) in the United States. These two networks started sharing electronic conference material and demonstrated that transnational electronic communications could serve international as well as domestic communities working for peace, human rights and the environment. This innovation proved so successful that by late 1989, networks in Sweden, Canada, Brazil, Nicaragua and Australia were exchanging information with each other and with IGC and GreenNet. In the spring of 1990, these seven organizations founded the Association for Progressive communications to co-ordinate the operation and development of this emerging global network of networks. Strategies and Policies The APC defends and promotes non-commercial, productive online space for NGOs and collaborates with like-minded organizations to ensure that the information and communication needs of civil society are considered in telecommunications, donor and investment policy. The APC is committed to freedom of expression and exchange of information on the Internet. The APC helps to build capacity between existing and emerging communication service providers. The APC Women's Networking Support Program promotes gender-aware Internet design, implementation and use. Through its African members, the APC is trying to strengthen indigenous information sharing and independent networking capacity on the continent. Members of APC develop Internet products, resources and tools to meet the advocacy, collaboration and information publishing and management needs of civil society. Recent APC initiatives have included the APC Toolkit Project: Online Publishing and Collaboration for Activists and the Mission-Driven Business Planning Toolkit. The APC also runs special projects like the Beijing+5, which shall enable non-governmental organizations to actively participate in the review of the Beijing Platform for Action. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
ECHELON and COMSAT COMSAT Communications Satellite Cooperation Until this decade the U.S.-based Comsat, Intelsat and Inmarsat organizations, in fact, shared nearly all international satellite traffic. So it was easy for NSA to eavesdropping on all communications to and from the United states. Less than 60 miles from Sugar Grove COMSAT runs a station in Etam, West Virginia, where more than half of the commercial, international satellite communication entering and leaving the US each day pass by. COMSAT provides international communications solutions via the global, 19-satellite INTELSAT system and 4-satellite Inmarsat satellite systems . Through the INTELSAT system, COMSAT provides telecommunications, broadcast and digital networking services between the U.S. and the rest of the world. These services are used by Internet service providers, multinational corporations, telecommunications carriers and U.S. and foreign governments to extend their networks globally. Inmarsat satellites lie in geostationary orbit 22,223 miles (35,786 km) out in space. Each satellite covers up to one third of the Earth's surface and is strategically positioned above one of the four ocean regions. Calls are beamed up to the satellite and back down to Earth, where special gateway land earth stations re-route them through the appropriate local or international telephone network. COMSAT operates Earth Stations in each part of the world to route calls efficiently within each ocean region. Earth Stations are located in Santa Paula, California; Southbury, Connecticut; Ankara, Turkey; and Kuantan, Malaysia. Sugar Grove Naval Communications Facility, near Sugar Grove, WV, may intercept Pacific INTELSAT/COMSAT satellite communications traffic routed through the COMSAT ground station at Etam, WV. NSG station in Winter Harbor, Maine serves as an excellent platform from which to intercept signals to and from COMSATs Andover station, 125 miles to the west. On the Westcost, COMSATs northern groundstation is situated in Brewster, near to Yakima, so from the Yakima Research Station the Pacific INTELSAT communications traffic can be intercepted. The other west-coast station is in Jamesburg, California, not so far away from the Army Security Agency intercept station at Two Rock Ranch. The international communications network with its limited gateways will probably always be easier to monitor than the large domestic networks like in the US. But the use of microwave and domestic satellites is increasing, and the construction of land lines is decreasing. Sources: STOA Report by Duncan Campbell: Interception Capabilities 2000 James Bamford, The Puzzle Palace, Boston, Houghton Mifflin, 1982,p222-228 | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
fingerprint identification Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion. As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment. Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device ( As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
A Republican Example In 1994 the U.S.-Republicans demonstrated how parties tend to manipulate people instead of standing for certain political thoughts: The Republican party contracted a consultant to find out the most-wanted topics of the U.S.-population, and afterwards the same consultant wrote a paper, called the Contract with America. Out of this, Republican Politicians all received a positive list of words they were told to use in speeches about themselves and a list of negative words for political competitors. This kind of thought control plays with the issue that words with negative/positive connotations go deeper than neutral words. They get integrated into the listening person's way of thinking. Even if someone understands the strategy, it will still be difficult to forget the black-and-white-images, as soon as they have been listened to. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
COMECON The Council for Mutual Economic Aid (COMECON) was set up in 1949 consisting of six East European countries: Bulgaria, Czechoslovakia, Hungary, Poland, Romania, and the USSR, followed later by the German Democratic Republic (1950), Mongolia (1962), Cuba (1972), and Vietnam (1978). Its aim was, to develop the member countries' economies on a complementary basis for the purpose of achieving self-sufficiency. In 1991, Comecon was replaced by the Organization for International Economic Cooperation. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
First Amendment Handbook The First Amendment to the US Constitution, though short, lists a number of rights. Only a handful of words refer to freedoms of speech and the press, but those words are of incalculable significance. To understand the current subtleties and controversies surrounding this right, check out this First Amendment site. This detailed handbook of legal information, mostly intended for journalists, should be of interest to anyone who reads or writes. For example, the chapter Invasion of Privacy shows the limits of First Amendment rights, and the balance between the rights of the individual and the rights of the public - or, more crudely, the balance of Tabloid vs. Celebrity. Each section is carefully emended with relevant legal decisions. http://www.rcfp.org/handbook/viewpage.cgi | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Richard Barbrook and Andy Cameron, The Californian Ideology According to Barbrook and Cameron there is an emerging global orthodoxy concerning the relation between society, technology and politics. In this paper they are calling this orthodoxy the Californian Ideology in honor of the state where it originated. By naturalizing and giving a technological proof to a political philosophy, and therefore foreclosing on alternative futures, the Californian ideologues are able to assert that social and political debates about the future have now become meaningless and - horror of horrors - unfashionable. - This paper argues for an interactive future. http://www.wmin.ac.uk/media/HRC/ci/calif.html | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Harold. D. Lasswell Harold. D. Lasswell (* 1902) studied at the London School of Economics. He then became a professor of social sciences at different Universities, like the University of Chicago, Columbia University, and Yale University. He also was a consultant for several governments. One of Lasswell's many famous works was Propaganda Technique in World War. In this he defines propaganda. He also discussed major objectives of propaganda, like to mobilize hatred against the enemy, to preserve the friendship of allies, to procure the co-operation of neutrals and to demoralize the enemy. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Polybius Polybius was one of the greatest historians of the ancient Greek. he lived from 200-118 BC. see: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Computer programming language A computer programming language is any of various languages for expressing a set of detailed instructions for a digital computer. Such a language consists of characters and rules for combining them into symbols and words. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Fair use Certain | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
WIPO The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Sperry Formerly (1955 - 1979) Sperry Rand Corporation, American corporation that merged with the Burroughs Corporation in 1986 to form Unisys Corporation, a large computer manufacturer. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Intellectual property Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property ( | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
AT&T AT&T Corporation provides voice, data and video communications services to large and small businesses, consumers and government entities. AT&T and its subsidiaries furnish domestic and international long distance, regional, local and wireless communications services, cable television and Internet communications services. AT&T also provides billing, directory and calling card services to support its communications business. AT&T's primary lines of business are business services, consumer services, broadband services and wireless services. In addition, AT&T's other lines of business include network management and professional services through AT&T Solutions and international operations and ventures. In June 2000, AT&T completed the acquisition of MediaOne Group. With the addition of MediaOne's 5 million cable subscribers, AT&T becomes the country's largest cable operator, with about 16 million customers on the systems it owns and operates, which pass nearly 28 million American homes. (source: Yahoo) Slogan: "It's all within your reach" Business indicators: Sales 1999: $ 62.391 bn (+ 17,2 % from 1998) Market capitalization: $ 104 bn Employees: 107,800 Corporate website: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Java Applets Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Source: Whatis.com | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Ross Perot Ross Perot, founder of Official website: Unofficial website: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
Polybius Checkerboard
It is a system, where letters get converted into numeric characters. The numbers were not written down and sent but signaled with torches. for example: A=1-1 B=1-2 C=1-3 W=5-2 for more information see: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Invention According to the | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
NATO The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Censorship of Online Content in China During the Tian-an men massacre reports and photos transmitted by fax machines gave notice of what was happening only with a short delay. The Chinese government has learned his lesson well and "regulated" Internet access from the beginning. All Internet traffic to and out of China passes through a few Users are expected not to "harm" China's national interests and therefore have to apply for permission of Internet access; Web pages have to be approved before being published on the Net. For the development of measures to monitor and control Chinese content providers, China's state police has joined forces with the MIT. For further information on Internet censorship, see Human Rights Watch, | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Federal Networking Council Being an organization established in the name of the US government, the Federal Networking Council (FNC) acts as a forum for networking collaborations among Federal agencies to meet their research, education, and operational mission goals and to bridge the gap between the advanced networking technologies being developed by research FNC agencies and the ultimate acquisition of mature version of these technologies from the commercial sector. Its members are representatives of agencies as the National Security Agency, the Department of Energy, the http://www.fnc.gov | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
William Frederick Friedman Friedman is considered the father of U.S.-American cryptoanalysis - he also was the one to start using this term. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Boris Yeltsin Boris Yeltsin was Russian President until the end of 1999. After many years of work for the Communist Party, he joined the Politburo in 1986. His sharp critique on Mikhail Gorbachev forced that one to resign. Yeltsin won the 1990 election into Russian presidency and quit the Communist Party. Quarrels with the Parliament could not destroy his popularity until the secession war with Chechnya. When the Russian economy collapsed in 1998, he dismissed his entire government. In the end the sick old man of Russian politics had lost all his popularity as a president and resigned for the benefit of his political son Vladimir Putin. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Technological measures As laid down in the proposed EU Directive on copyright and related | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Aeneas Tacticus Supposedly his real name was Aeneas of Stymphalus. He was a Greek military scientist and cryptographer. He invented an optical system for communication similar to a telegraph: the | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Leni Riefenstahl Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
1996 WIPO Copyright Treaty (WCT) The 1996 | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Whitfield Diffie Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
water-clocks The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Automation Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Artificial Intelligence Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support Yahoo AI sites: MIT AI lab: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
The World Wide Web History Project The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the http://www.webhistory.org/home.html | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
PGP A | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
atbash Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing. for further explanations see: | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
David Kahn David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography. | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Hieroglyphs Hieroglyphs are pictures, used for writing in ancient Egypt. First of all those pictures were used for the names of kings, later more and more signs were added, until a number of 750 pictures | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||
|
Server A server is program, not a computer, as it sometimes said, dedicated to store files, manage printers and network traffic, or process database queries. Web sites, the nodes of the | |||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||