Advertising and the Media System

Media systems (especially broadcasting) can be classified in two different types:

Public Media Systems: Government control over broadcasting through ownership, regulation, and partial funding of public broadcasting services.

Private Media System: Ownership and control lies in the hands of private companies and shareholders.

Both systems can exist in various forms, according to the degree of control by governments and private companies, with mixed systems (public and private) as the third main kind.

Whereas public media systems are usually at least partially funded by governments, private broadcasting solely relies on advertising revenue. Still also public media systems cannot exclude advertising as a source of revenue. Therefore both types are to a certain degree dependent on money coming in by advertisers.

And this implies consequences on the content provided by the media. As the attraction of advertisers becomes critically important, interests of the advertising industry frequently play a dominant role concerning the structure of content and the creation of environments favorable for advertising goods and services within the media becomes more and more common.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611652/100438657942
 
Security Measures?

The more so-called security measures are taken the more control and the less freedom is granted. Whereas criminals are flexible in their computer work/digital existence, the average person cannot be. So it is her/him who gets punished with an increase of control.
Of course security can be in favor of the population as well - and this is the case if cryptography is legal so that everyone has access to it to protect his/her data. This one needs for e-commerce, secure payments and transmission of private data, mostly e-mails or access to websites where one needs a password. E-mails are nothing else than postcards, letters without envelopes. Without encryption they are easy to open, read and trace back, even without knowing the password. Rumors that Echelon works with a list of key-words, controlling any e-mail in the world and reacting to words of that list, led to actions like the Jam Eschelon Day, last time held on October 21st, 1999, to confuse the espionage system.

for more information on Jam Eschelon Day see:
http://www.hacktivism.org
http://www.echelon.wiretapped.net/
http://www.heise.de/tp/deutsch/inhalt/te/5358/1.html

But the respect for privacy stands for an essential values in democratic societies.
So, how can it be regarded a governmental risk?

At a conference:
"How many people here fear a greater risk
from government abuses of power
than from criminal activity?"
The majority raised their hands,
one participant shouted "What's the difference?"
(anonymous)

If governments really care for the people and want to fight against cybercriminality they should rather support the work on the latest technologies for encryption than to restrict their access. Or even better: they should not intervene at all - to make sure they do not build in any trapdoors. Though it is already too late for discussion like this one as the trapdoors are already part of most of the key-systems. Rumors about PGP and trapdoors do not help the confidence in cryptology.

for information about the risks of cryptography see:
http://www.cdt.org/crypto/risks98/

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438659190
 
Commercial vs. Independent Content: Human and Financial Resources

Concerning their human and financial resources commercial media and independent content provider are an extremely unequal pair. While the 1998 revenues of the world's leading media conglomerates (AOL Time Warner, Disney, Bertelsmann, Viacom and the News Corporation) amounted to US$ 91,144,000,000 provider of independent content usually act on a non-profit basis and to a considerable extent depend on donations and contributions.

Also the human resources they have at their disposal quite differ. Viacom for example employs 112,000 people. Alternative media conversely are mostly run by a small group of activists, most of them volunteers. Moreover the majority of the commercial media giants has a multitude of subsidiaries (Bertelsmann for instance has operations in 53 countries), while independent content provider in some cases do not even have proper office spaces. Asked about their offices number of square meters Frank Guerrero from RTMark comments "We have no square meters at all, because we are only on the web. I guess if you add up all of our servers and computers we would take up about one or two square meters."

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611734/100438659145
 
Sandinistas

The Sandinistas overthrew the right wing Somoza regime of corruption that had support from the U.S.-government, in 1979. The followers of Somoza, who was killed in 1980, formed the Contras and began a guerrilla warfare against the government. Many of them were trained in the School of the Americas (= SOA). The Sandinist government realized social reforms, but these did not convince the USA - and so the war went on for many years, costing between 30,000 and 50,000 lives. When the war finally ended the Sandinistas were beaten in (partly incorrect) elections.

INDEXCARD, 1/4
 
Internet Software Consortium

The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community.

http://www.isc.org

INDEXCARD, 2/4
 
Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks

This book gives a fascinating glimpse of the many documented attempts throughout history to develop effective means for long distance communications. Large-scale communication networks are not a twentieth-century phenomenon. The oldest attempts date back to millennia before Christ and include ingenious uses of homing pigeons, mirrors, flags, torches, and beacons. The first true nationwide data networks, however, were being built almost two hundred years ago. At the turn of the 18th century, well before the electromagnetic telegraph was invented, many countries in Europe already had fully operational data communications systems with altogether close to one thousand network stations. The book shows how the so-called information revolution started in 1794, with the design and construction of the first true telegraph network in France, Chappe's fixed optical network.

http://www.it.kth.se/docs/early_net/

INDEXCARD, 3/4
 
Pine Gap Station



Pine Gap, run by the CIA, is near Alice Springs in central Australia and mostly an underground facility. Pine Gap was mainly established to serve as the groundstation and downlink for reconnaissance satellites like the RHYOLITE and ORION system. The facility consists of more than 7 large antennas in randomes. In Pine Gap's Signals Processing Office transmitted signals are received and transformed for further analysis.There is a no fly zone 4km around PG, and local land holders have agreed not to allow "visitors" access to there properties. It is said that Pine Gap employs nearly 1000 people, mainly from the CIA and the U.S. National Reconnaissance Office (NRO).

Source:

Jeffrey T. Richelson, The U.S. Intelligence Community, (Westview Press, 4th ed., 1999)p190

Nicky Hager, Secret Power, New Zealand's role in the internatinal spy network, (Craig Potton, 1996)p34ff

Pictures of Pine Gap

http://www.networx.com.au/home/slider/Pine-Gap.htm

http://www.networx.com.au/home/slider/Pine-Ga...
INDEXCARD, 4/4