|
The Post-World-War II-period After World War II the importance of propaganda still increased, on the commercial level as well as on a political level, in the era of the Cold War. The propaganda institutions of the different countries wanted their people to think the right way, which meant, the national way. In the USA the McCarthy-era started, a totalitarian system in struggle against communism. Cold War brought the era of spies with it, which was the perfect tool of disinformation. But the topic as a movie-genre seems still popular today, as the unchanged success of James Bond-movies show. A huge net of propaganda was built up for threatening with the nuclear bomb: pretending that the enemy was even more dangerous than the effect of such a bomb. And later, after the fall of the Iron Curtain, disinformation found other fields of work, like the wars of the 1990s showed us. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Commercial vs. Independent Content: Power and Scope Regarding the dimension of their financial and human resources commercial media companies are at any rate much more powerful players than their independent counterparts. Still those reply with an extreme multiplicity and diversity. Today thousands of newsgroups, mailing-list and e-zines covering a wide range of issues from the environment to politics, social and human rights, culture, art and democracy are run by alternative groups. Moreover independent content provider have started to use digital media for communication, information and co-ordination long before they were discovered by corporate interest. They regularly use the Internet and other networks to further public discourse and put up civic resistance. And in many cases are very successful with their work, as initiatives like widerst@ndMUND's (AT) co-ordination of the critics of the participation of the Freedom Party in the Austrian government via mailing-lists, an online-magazine and discussion forums, show. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Transparent customers. Direct marketing online This process works even better on the Internet because of the latter's interactive nature. "The Internet is a dream to direct marketers", said Wil Lansing, CEO of the American retailer Many web sites also are equipped with One frequent way of obtaining such personal information of a user is by offering free web mail accounts offered by a great many companies, internet providers and web portals (e.g. However, the intention of collecting users personal data and create consumer profiles based on online behaviour can also take on more creative and playful forms. One such example is The particular way in which sites such as sixdegrees.com and others are structured mean that not only to users provide initial information about them, but also that this information is constantly updated and therefore becomes even more valuable. Consequently, many free online services or web mail providers cancel a user's account if it has not been uses for some time. There are also other online services which offer free services in return for personal information which is then used for marketing purposes, e.g. Yahoo's A further way of collecting consumer data that has recently become popular is by offering free PCs. Users are provided with a PC for free or for very little money, and in return commit themselves to using certain services rather than others (e.g. a particular internet provider), providing information about themselves, and agree to have their online behaviour monitored by the company providing the PC, so that accurate user profiles can be compiled. For example, the A good inside view of the world of direct marketing can be gained at the website of the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Late 1970s - Present: Fourth Generation Computers Following the invention of the first Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used. Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The "Corpse-Conversion Factory"-rumor Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The North against the South? "Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market." (UNESCO, World Communication Report) The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else. Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left? | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Biometric technologies In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" ( All biometric technologies are made up of the same basic processes: 1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question. 2. At every new identification, a second sample is collected and its identity with the first one is examined. 3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is. This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Association for Progressive Communication (APC) The APC is a global federation of 24 non-profit Internet providers serving over 50,000 NGOs in 133 countries. Since 1990, APC has been supporting people and organizations worldwide, working together online for social, environmental and economic justice. The APC's network of members and partners spans the globe, with significant presence in Central and Eastern Europe, Africa, Asia and Latin America. History Between 1982 and 1987 several independent, national, non-profit computer networks emerged as viable information and communication resources for activists and NGOs. The networks were founded to make new communication techniques available to movements working for social change. In 1987, people at GreenNet in England began collaborating with their counterparts at the Institute for Global Communications (IGC) in the United States. These two networks started sharing electronic conference material and demonstrated that transnational electronic communications could serve international as well as domestic communities working for peace, human rights and the environment. This innovation proved so successful that by late 1989, networks in Sweden, Canada, Brazil, Nicaragua and Australia were exchanging information with each other and with IGC and GreenNet. In the spring of 1990, these seven organizations founded the Association for Progressive communications to co-ordinate the operation and development of this emerging global network of networks. Strategies and Policies The APC defends and promotes non-commercial, productive online space for NGOs and collaborates with like-minded organizations to ensure that the information and communication needs of civil society are considered in telecommunications, donor and investment policy. The APC is committed to freedom of expression and exchange of information on the Internet. The APC helps to build capacity between existing and emerging communication service providers. The APC Women's Networking Support Program promotes gender-aware Internet design, implementation and use. Through its African members, the APC is trying to strengthen indigenous information sharing and independent networking capacity on the continent. Members of APC develop Internet products, resources and tools to meet the advocacy, collaboration and information publishing and management needs of civil society. Recent APC initiatives have included the APC Toolkit Project: Online Publishing and Collaboration for Activists and the Mission-Driven Business Planning Toolkit. The APC also runs special projects like the Beijing+5, which shall enable non-governmental organizations to actively participate in the review of the Beijing Platform for Action. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Media Giants Online The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes. Broadcasting ABC TV Network with 223 affiliated TV stations covering the entire U.S. ABC Radio Network, with 2,900 affiliated stations throughout the U.S. Owner of 9 VHF TV stations Owner of 11 AM and 10 FM stations Cable TV Systems and Channels/Networks 80 % of ESPN cable TV channel and ESPN International 50 % of Lifetime cable TV channel Internet/Interactive Disney Interactive - entertainment and educational computer software and video games, plus development of content for on-line services. Partnership with 3 phone companies to provide video programming and interactive services. ABC Online TV Production, Movies, Video, Music Disney Television Production studios and Walt Disney Pictures movie studio Buena Vista Television production company Buena Vista Home Video Miramax and Touchstone movie production companies Buena Vista Pictures Distribution and Buena Vista International, distributors for Disney and Touchstone movies Walt Disney Records, and Hollywood Records Publishing 6 daily newspapers About 40 weekly magazines, including: Discover, Women's Wear Daily, Los Angeles and Institutional Investor. Chilton Publications Guilford Publishing Co. Hitchcock Publishing Co. Theme Parks, Resorts, and Travel Disneyland Disney World and Disney World Resort Part owner of Disneyland-Paris and Tokyo Disneyland 12 resort hotels Disney Vacation Club Cruise Lines International TV, Film, and Broadcasting 50 % owner of Tele-München Fernseh GmbH & Co. 50 % owner of RTL Disney Fernseh GmbH & Co. 23 % owner of RTL 2 Fernseh GmbH & Co. 37,5 % owner of TM3 Fernseh GmbH & Co. 20-33 % stake in Eurosport network, Spanish Tesauro SA TV company, and Scandinavian Broadcasting System SA 20 % owner of TVA Other Over 500 Disney Stores, and licensing of Disney products The Mighty Ducks professional hockey team 25 % ownership of California Angels major league baseball team Business Connections with Other Media Companies Joint ventures, equity interests, or major arrangements with | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
ciphers the word "cipher" comes from the Hebrew word "saphar", meaning "to number". Ciphers are mere substitutions. Each letter of the alphabet gets substituted; maybe by one letter or two or more. an example: PLAINTEXT a b c d e f g h i j k l m n o p q r s t u v w x y z CIPHERTEXT D E F G H I J K L M N O P Q R S T U V W X Y Z A B C | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
CIA CIA's mission is to support the President, the National Security Council, and all officials who make and execute U.S. national security policy by: Providing accurate, comprehensive, and timely foreign intelligence on national security topics; Conducting counterintelligence activities, special activities, and other functions related to foreign intelligence and national security, as directed by the President. To accomplish its mission, the CIA engages in research, development, and deployment of high-leverage technology for intelligence purposes. As a separate agency, CIA serves as an independent source of analysis on topics of concern and works closely with the other organizations in the Intelligence Community to ensure that the intelligence consumer--whether Washington policymaker or battlefield commander--receives the adaequate intelligence information. http://www.cia.gov | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Walter Benjamin The German philosopher Walter Benjamin (1892-1940) and author believed in the duty to educate people (including children) politically. In the German radio he had a series where he tried to do this. These texts are most important for Radio work - even today. Still he is more famous for his critiques on literature and art. Benjamin immigrated to Paris in 1934 and killed himself in 1940 at the boarder between Spain and France as he was afraid to get caught by German troops. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Internet Engineering Task Force The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Society: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
George Boole b. Nov. 2, 1815, Lincoln, Lincolnshire, England d. Dec. 8, 1864, Ballintemple, County Cork, Ireland English mathematician who helped establish modern symbolic logic and whose algebra of logic, now called Boolean algebra, is basic to the design of digital computer circuits. One of the first Englishmen to write on logic, Boole pointed out the analogy between the algebraic symbols and those that can represent logical forms and syllogisms, showing how the symbols of quantity can be separated from those of operation. With Boole in 1847 and 1854 began the algebra of logic, or what is now called Boolean algebra. It is basically two-valued in that it involves a subdivision of objects into separate classes, each with a given property. Different classes can then be treated as to the presence or absence of the same property. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
MIRALab MIRALab is a research laboratory attached to the University of Geneva. Its motto is "where research meets creativity". MIRAlab's objective is to model human functionalities, such as movement or facial expression, in a realistic way. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
David Kahn David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet Engineering Steering Group On behalf of the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Framing Framing is the practice of creating a frame or window within a web page where the content of a different web page can be display. Usually when a link is clicked on, the new web page is presented with the reminders of the originating page. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Fuzzy logic A superset of Boolean logic ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Computer programming language A computer programming language is any of various languages for expressing a set of detailed instructions for a digital computer. Such a language consists of characters and rules for combining them into symbols and words. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Assembly line An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Fair use Certain | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
IBM IBM (International Business Machines Corporation) manufactures and develops cumputer hardware equipment, application and sysem software, and related equipment. IBM produced the first PC (Personal Computer), and its decision to make Microsoft DOS the standard operating system initiated Microsoft's rise to global dominance in PC software. Business indicators: 1999 Sales: $ 86,548 (+ 7,2 % from 1998) Market capitalization: $ 181 bn Employees: approx. 291,000 Corporate website: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||