Copyright Management and Control Systems: Post-Infringement

Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:

Steganography

Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.

Agents

Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.

Copyright Litigation

While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
 
Voice recognition

The only biometric technology which does not measure the visual features of the human body. In voice recognition the sound vibrations of a person is measured and compared to an existing sample. The person to be identified is usually required to pronounce a designated password or phrase which facilitates the verification process. Voice recognition can be used on the phone, but has the weakness of technology is its susceptibility to interference by background noise.

TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611729/100438658314
 
GCHQ

GCHQ is the British Government Communication Headquarters, which is in fact an electronic monitoring centre which intercepts communications using spy satellites, listening devices and code-cracking equipment. The 1994 Intelligence Services Act defines GCHQ's role in the post Cold War world. National security, economic well-being and the prevention and detection of serious crime are its headline interests. It routinely gathers information on drug-dealing, terrorism, and the movement of arms and key resources such as oil, but is also said to be heavily involved in ECHELON. GCHG praises itself to use and design high end technology such as Cray systems, Tandem based storage and high-end workstations, as well as software for Signals Analysis, Complex Data Manipulation, Translation and Transcription.

http://www.gchq.gov.uk/

http://www.gchq.gov.uk/
INDEXCARD, 1/2
 
Misawa Air Base

Latitude: 40.771, Longitude: 141.3776

Misawa Air Base is located in Misawa City, on the shores of Lake Ogawara in northeastern Honshu, Japan's main island. The Department of Defense presence at Misawa includes more than 15,000 military and civilian personnel and family members, including 4500 military personnel. The installation has experienced significant growth and development over the past ten years. From Misawa the NSA monitors Russian and other regional communications satellites.

The Misawa Passive Radio Frequency (RF) space surveillance site tracks satellites using RF signal emmisions to compute angle of arrival observations. This site provides coverage of geosynchronous satellites utilizing the Deep Space Tracking System (DSTS).

http://www.fas.org/spp/military/program/nssrm/initiatives/misawa.htm

http://www.fas.org/spp/military/program/nssrm...
INDEXCARD, 2/2