Censorship and Free Speech

There is no society - in the past or in the present - free of censorship, the enforced restriction of speech. It is not restricted to authoritarian regimes. Democratic societies too aim at the control of the publication and distribution of information in order to prevent unwanted expressions. In every society some expressions, ideas or opinions are feared. Censored are books, magazines, films and videos, and computer games, e.g.

In defence of its monopoly of truth, the Catholic Church published a blacklist of books not allowed to be read: the Index librorum prohibitorum. As indicated by the fact that every declaration of human rights - including the United Nations' Declaration of Human Rights and the European Convention on Human Rights - embraces free expression, democratic societies censorship is not imposed to protect a monopoly on truth or to foster the prevailing orthodoxy, as it seems. (With the remarkable exceptions of the prohibition of Nazi or Nazi-like publications and censorship practiced during wartime.) On the contrary, it is the point of free speech that we do not know the truth, that truth is something to strive for in a kind of public discourse or exchange intended to contribute to or even to constitute democracy. So "we cannot think coherently about free speech independently of issues about equality." (Susan Dwyer, A Plea to Ignore the Consequences of Free Speech, in: Computer-Mediated Communication Magazine, January 1, 1996, http://www.december.com/cmc/mag/1996/jan/dwyer.html) Racist expressions prove that. There are good reasons for supporting censorship to avoid violations of human dignity, as there are reasons to support unrestricted discussions of all topics.

To a high degree the Protestant Reformation was made possible by the invention of the printing press. Now those who were capable of writing and reading no longer needed to rely on the priests to know what is written in the Bible. They could compare the Bible with the sermons of the priests. This may be one of the reasons why especially in countries with a strong Protestant or otherwise anti-catholic tradition (with the exception of Germany), free speech is held in such high esteem.

There seems to be no alternative: free speech without restriction or censorship. But censorship is not the only kind of restriction of speech. Speech codes as politically correct speech are restrictions, sometimes similar to censorship; copyright, accessibility and affordability of means of communication are other ones. Because of such restrictions different to censorship, we cannot think coherently about free speech independently of issues about social justice. Many campaigns for free speech, the right of free expression are backed by the concept of free speech as unconstrained speech. That is perfectly well understood under the auspices of regimes prominently, which try to silence their critics and restrict access to their publications. But the concept of free speech should not solely focus on such constrains. Thinking of free speech as unconstrained speech, we tend to forget to take into account - to campaign against - these other restrictions. Additionally, free expression understood in that way offers no clue how to practice this freedom of expression and what free speech is good for.

In liberal democratic societies censorship is not justified by recurring to absolute truth. Its necessity is argued by referring to personal integrity. Some kind of expression might do harm to individuals, especially to children, by traumatize them or by disintegrating personal morality. Some published information, such as the names of rape victims, might infringe some people's right on privacy or some, as others say, such as pornographic images or literature, e.g., infringes some people's right on equality (how?).

For more information on the history of censorship see The File Room Project.

TEXTBLOCK 1/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438658951
 
Late 1970s - Present: Fourth Generation Computers

Following the invention of the first integrated circuits always more and more components could be fitted onto one chip. LSI (Large Scale Integration) was followed by VLSI (Very Large Scale Integration) and ULSI (Ultra-Large Scale Integration), which increased the number of components squeezed onto one chip into the millions and helped diminish the size as well as the price of computers. The new chips took the idea of the integrated circuit one step further as they allowed to manufacture one microprocessor which could then be programmed to meet any number of demands.

Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used.

Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. LANs (Local Area Network) permitted computers to share memory space, information, software and communicate with each other. Although already LANs could reach enormous proportions with the invention of the Internet an information and communication-network on a global basis was established for the first time.

TEXTBLOCK 2/27 // URL: http://world-information.org/wio/infostructure/100437611663/100438659451
 
Biotechnology: robotics and artificial intelligence

TEXTBLOCK 3/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658765
 
Advertising and the Media System

Media systems (especially broadcasting) can be classified in two different types:

Public Media Systems: Government control over broadcasting through ownership, regulation, and partial funding of public broadcasting services.

Private Media System: Ownership and control lies in the hands of private companies and shareholders.

Both systems can exist in various forms, according to the degree of control by governments and private companies, with mixed systems (public and private) as the third main kind.

Whereas public media systems are usually at least partially funded by governments, private broadcasting solely relies on advertising revenue. Still also public media systems cannot exclude advertising as a source of revenue. Therefore both types are to a certain degree dependent on money coming in by advertisers.

And this implies consequences on the content provided by the media. As the attraction of advertisers becomes critically important, interests of the advertising industry frequently play a dominant role concerning the structure of content and the creation of environments favorable for advertising goods and services within the media becomes more and more common.

TEXTBLOCK 4/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438657942
 
Content Choice and Selective Reporting

Media as today's main information sources unarguably have the power to influence political agenda-setting and public opinion. They decide which topics and issues are covered and how they are reported. Still, in many cases those decisions are not primarily determined by journalistic criteria, but affected by external factors. The importance of shareholders forces media to generate more profit every quarter, which can chiefly be raised by enlarging audiences and hence attracting more advertising money. Therefore the focus of media's programming in many cases shifts towards audience alluring content like entertainment, talk-shows, music and sports.

Further pressure regarding the selection of content occurs from advertisers and marketers, who often implicitly or explicitly suggest to refrain from programming which could show them or their products and services (e.g. tobacco) in an unfavorable light. Interlocking directorships and outright ownerships can moreover be responsible for a selective coverage. Financial connections with defense, banking, insurance, gas, oil, and nuclear power, repeatedly lead (commercial) media to the withholding of information, which could offend their corporate partners. In totalitarian regimes also pressure from political elites may be a reason for the suppression or alteration of certain facts.

TEXTBLOCK 5/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438658492
 
Convergence

The convergence of biology and technology is not an entirely new phenomenon but and has its origin in the concept of modern technology itself. This concept understands technology as something bigger, stronger, and more reliable than ourselves. But, unlike human beings, technologies are always tied to specific men-defined purposes. In so far as men define purposes and build the technology to achieve those purposes, technology is smaller than ourselves. The understanding of technology as a man-controlled tool has been called the instrumental and anthropological understanding of technology.

However, this understanding is becoming insufficient when technologies become fast and interdependent, i.e. when fast technologies form systems and global networks. Powerful modern technologies, especially in the field of informatics, have long ceased to be mere instruments and have created constraints for human action which act to predetermine activity and predefine purposes.

As a consequence, the metaphysical distinction between subject and object has become blurred. In the 1950s Heidegger already speaks of modern technology not as the negation but as the culmination of metaphysical thought which provokes men to "overcome" metaphysics. The weakening of metaphysical determinations which occurs in the project of modern technology has also meant that it become impossible to clearly define what being human is, and to determine the line that separates non-human from human being. These changes are not progressing at a controllable rate, but they are undergoing constant acceleration. The very efficiency and power of calculation of modern technologies means that acceleration itself is being accelerated. Every new technological development produces new shortcuts in socio-technical systems and in communication.

TEXTBLOCK 6/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658463
 
Pressures and Attacks against Independent Content Providers: Pakistan

The Pakistan Telecommunication Authority (PTA), the licensing authority for electronic services, has imposed a number of restrictions of the use of the Internet. Licenses to ISPs (Internet Service Provider) will be issued under the terms of the highly restrictive Telephone and Telegraph Act of 1885.

Under the terms of the agreement, users are prohibited from using any sort of data encryption and have to agree that their electronic communications may be monitored by government agencies. Transmission or reception of obscene or objectionable material is also prohibited and may lead not only to immediate disconnection of service but also to prosecution by authorities.

Users of electronic services will also have to submit to service provider's copies of the National Identity Card. According to the terms of issuance of licenses, service providers will also be responsible for ensuring that the programs and information provided through electronic services do not "come into direct clash with accepted standards of morality and social values in Pakistan."

TEXTBLOCK 7/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659238
 
Economic structure; digital euphoria

The dream of a conflict-free capitalism appeals to a diverse audience. No politician can win elections without eulogising the benefits of the information society and promising universal wealth through informatisation. "Europe must not lose track and should be able to make the step into the new knowledge and information society in the 21st century", said Tony Blair.

The US government has declared the construction of a fast information infrastructure network the centerpiece of its economic policies

In Lisbon the EU heads of state agreed to accelerate the informatisation of the European economies

The German Chancellor Schröder has requested the industry to create 20,000 new informatics jobs.

The World Bank understands information as the principal tool for third world development

Electronic classrooms and on-line learning schemes are seen as the ultimate advance in education by politicians and industry leaders alike.

But in the informatised economies, traditional exploitative practices are obscured by the glamour of new technologies. And the nearly universal acceptance of the ICT message has prepared the ground for a revival of 19th century "adapt-or-perish" ideology.

"There is nothing more relentlessly ideological than the apparently anti-ideological rhetoric of information technology"

(Arthur and Marilouise Kroker, media theorists)

TEXTBLOCK 8/27 // URL: http://world-information.org/wio/infostructure/100437611726/100438658999
 
some essential definitions

some essential definitions in the field of cryptography are:
- cryptoanalysis
- cryptology
- ciphers

"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break." (David Kahn)

codes
plaintext
ciphertext
to encipher/encode
to decipher/decode

The variants of encryption systems are endless.
For deciphering there exists always the same game of trial and error (first guessing the encryption method, then the code). A help to do so is pruning. Once, after a more or less long or short period a code/cipher breaks. Monoalphabetic ciphers can be broken easily and of course are no longer used today but for games.

for further information on codes and ciphers etc. see:
http://www.optonline.com/comptons/ceo/01004A.html
http://www.ridex.co.uk/cryptology/#_Toc439908851

TEXTBLOCK 9/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438659070
 
ZaMir.net

ZaMir.net started in 1992 trying to enable anti-war and human rights groups of former Yugoslavia to communicate with each other and co-ordinate their activities. Today there are an estimated 1,700 users in 5 different Bulletin Board Systems (Zagreb, Belgrade, Ljubljana, Sarajevo and Pristiana). Za-mir Transnational Network (ZTN) offers e-mail and conferences/newsgroups. The ZTN has its own conferences, which are exchanged between the 5 BBS, and additionally offers more than 150 international conferences. ZTN aim is to help set up systems in other cities in the post-Yugoslav countries that have difficulty connecting to the rest of the world.

History

With the war in Yugoslavia anti-war and human rights groups of former Yugoslavia found it very difficult to organize and met huge problems to co-ordinate their activities due to immense communication difficulties. So in 1992 foreign peace groups together with Institutions in Ljubljana, Zagreb and Belgrade launched the Communications Aid project. Modems were distributed to peace and anti-war groups in Ljubljana, Zagreb, Belgrade and Sarajevo and a BBS (Bulletin Board System) installed.

As after spring 1992 no directs connections could be made they were done indirectly through Austria, Germany or Britain, which also enabled a connection with the worldwide networks of BBS's. Nationalist dictators therefore lost their power to prevent communication of their people. BBS were installed in Zagreb and Belgrade and connected to the APC Network and associated networks. Za-mir Transnational Network (ZTN) was born.

Strategies and Policies

With the help of ZaMir's e-mail network it have been possible to find and coordinate humanitarian aid for some of the many refugees of the war. It has become an important means of communication for humanitarian organizations working in the war region and sister organizations form other countries. It helps co-ordinate work of activists form different countries of former Yugoslavia, and it also helps to coordinate the search for volunteers to aid in war reconstruction. ZTN also helped facilitate exchange of information undistorted by government propaganda between Croatia, Serbia and Bosnia. Independent magazines like Arkzin (Croatia) and Vreme (Serbia) now publish electronic editions on ZTN.

TEXTBLOCK 10/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659208
 
Eliminating online censorship: Freenet, Free Haven and Publius

Protecting speech on the global data networks attracts an increasing attention. The efforts and the corresponding abilities of governmental authorities, corporations and copyright enforcement agencies are countered by similar efforts and abilities of researchers and engineers to provide means for anonymous and uncensored communication, as Freenet, Free Haven and Publius. All three of them show a similar design. Content is split up and spread on several servers. When a file is requested, the pieces are reassembled. This design makes it difficult to censor content. All of these systems are not commercial products.

The most advanced system seems to be Publius. Because of being designed by researchers and engineers at the prestigious AT&T Labs, Publius is a strong statement against online censorship. No longer can it be said that taking a firm stand against the use of technologies limiting the freedom of individuals is a position of radical leftists only.

For more information on Publius, see John Schwartz, Online and Unidentifiable? in: The Washington Post, June 30, 2000, http://www.washingtonpost.com/wp-dyn/articles/A21689-2000Jun29.html .

Freenet web site: http://freenet.sourceforge.net

Free Haven web site: http://www.freehaven.net

Publius web site: http://www.cs.nyu.edu/waldman/publius

TEXTBLOCK 11/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438658749
 
RTMark

RTMark is a group of culture jammers applying a brokerage-system that benefits from "limited liability" like any other corporation. Using this principle, RTMark supports the sabotage (informative alternation) of corporate products, from dolls and children's learning tools to electronic action games, by channeling funds from investors to workers. RTMark searches for solutions that go beyond public relations and defines its "bottom line" in improving culture. It seeks cultural and not financial profit.

Strategies and Policies

RTMark is engaged in a whole lot of projects, which are designed to lead to a positive social change. Projects with roughly similar intent, risk, or likelihood of accomplishment are grouped into "fund families", like for example "The Frontier Fund". This fund is dedicated to challenge naive, utopic visions of the "global village", focusing on the implications of allowing corporations and other multinational interests to operate free of social context.

RTMark pursues its projects through donations by individuals, which can invest in a certain fund, whereby an exact specification of how the donated money should be used can be made. RTMark has repeatedly gained attention through its projects, especially with its spoof websites, like the ones of Rudy Giuliani and the WTO, or its campaign against eToys, which prevents the Internet art group etoy from using the domain etoy.com.

TEXTBLOCK 12/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659283
 
The Cassini Case

In 1997 NASA's Cassini mission to Saturn and its moons led to heated controversies, because it was fueled by plutonium, a substance that could cause serious environmental and health problems if it were released into the atmosphere.

Still no major U.S. news outlet in broadcasting or print reported in depth on the risks of the Cassini mission. Westinghouse-owned media like CBS and NBC (also partly owned by General Electric) for example had only reported that children were invited to sign a plaque inside Cassini. Not surprisingly Westinghouse and General Electric are two of the largest corporations with defense contracts and nuclear interests.

TEXTBLOCK 13/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438658562
 
Advertising

Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology.

TEXTBLOCK 14/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658361
 
Beautiful bodies

However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". Nadia Thalman's hopes for beautiful robots may become reality in the work of MIRALab, a research laboratory attached to the University of Geneva dedicated to realistic modelling of human functionalities. The laboratory has produced an artificial Marylyn Monroe showing just how beautiful artificial creatures can be, and there is a biography featuring details of her career and her - however virtual - love life. Yet beautiful creatures have been made before, at leas on the movie screen. Frank-N-furter, the protagonist of the Rocky Horror picture show ("I've been making a man / with blond hair and a tan / and he is good for relieving my /tension) did set remakrable esthetic standards.

While in Hindu mythology, avatars are bodies chosen by gods for their representation on earth, often animals such as swans or horses, the avatars populating cyberspace have a different function. The cyber bodies of real people, often 3 dimensional images of creatures whose aesthetics reflects both the tastes prevalent in the entertainment and advertising industries as the state of art in visual representation.

TEXTBLOCK 15/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658861
 
Institute for Global Communications (IGC)

IGC's vision is to actively promote change toward a healthy society, which is founded on the principals of social justice, broadly shared economic opportunity, a robust democratic process, and sustainable environmental practices. IGC believes that healthy societies rely fundamentally on respect for individual rights, the vitality of communities and diversity. IGC's aim is to advance the work of progressive organizations and individuals for peace justice economic opportunity, human rights, democracy and environmental sustainability through strategic use of online technologies.

History

In 1987 the Institute for Global Communications was officially formed to manage PeaceNet and the newly acquired EcoNet, which was the world's first computer network dedicated to environmental preservation and sustainability. In 1988 IGC began to collaborate with like-minded organizations outside the states and in partnership with six international organizations, IGC co-founded the Association of Progressive Communications (APC).

ConflictNet, incorporated by IGC in 1989, to provide information and communications for people by promoting the constructive resolution of conflicts is now enfolded in the PeaceNet network. LaborNet, a full network of IGC from 1992 through August 1999, serves the labor community by working for the human rights and economic justice of workers. WomensNet, launched in 1995 is an online community of individuals and organizations who use computer technology to advance the interests of women worldwide. Also the Anti-racism.Net forms part of IGC network family.

Strategies and Policies

IGC's aim is to offer progressive individuals and groups a place on the Internet to learn, meet and organize. IGC focuses on content, information sharing and collaborative tools and provides Internet access services, e-mail discussions and newsletters. The Institute for Global Communications aims at bringing Internet tools and online services to organizations and activists working on peace, economic and social justice, human rights, environmental protection, labor issues and conflict resolution. IGC also provides alternative news and political analysis as well as information about other progressive organizations.

TEXTBLOCK 16/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659240
 
c2o (Community Communications Online)

c2o, founded in 1997, provides consultancy, training and web hosting services to community-based organizations in the Australasian region. c2o's focus lies on addressing the issues and needs that have arisen from the transition from connectivity to information management.

Strategies and Policies

Content and Delivery: c2o focuses on the development and maintenance of content delivery services that assist in the publication and dissemination of information, particularly that of community interest including environment, social development, human rights and social justice.

Publishing Support: c2o designs online publishing systems that provide a means for user maintenance and tools that enhance an organizations existing information systems. c2o seeks seamless integration and user empowerment.

Asia-Pacific Networking: c2o supports networking initiatives throughout Australia and the Asia Pacific region. It promotes and encourages public and equitable access to networking technologies.

TEXTBLOCK 17/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659247
 
1970s: Computer-Integrated Manufacturing (CIM)

Since the 1970s there had been a growing trend towards the use of computer programs in manufacturing companies. Especially functions related to design and production, but also business functions should be facilitated through the use of computers.

Accordingly the CAD/CAM technology, related to the use of computer systems for design and production, was developed. CAD (computer-aided design) was created to assist in the creation, modification, analysis, and optimization of design. CAM (computer-aided manufacturing) was designed to help with the planning, control, and management of production operations. CAD/CAM technology, since the 1970s, has been applied in many industries, including machined components, electronics products, equipment design and fabrication for chemical processing.

To enable a more comprehensive use of computers in firms the CIM (computer-integrated manufacturing) technology, which also includes applications concerning the business functions of companies, was created. CIM systems can handle order entry, cost accounting, customer billing and employee time records and payroll. The scope of CIM technology includes all activities that are concerned with production. Therefore in many ways CIM represents the highest level of automation in manufacturing.

TEXTBLOCK 18/27 // URL: http://world-information.org/wio/infostructure/100437611663/100438659495
 
Epilogue

As scientists are working hard on a quantum computer and also on quantum cryptography one can imagine that another revolution in the study of encryption has to be expected within the next years. By then today's hardware and software tools will look extraordinary dull. At the moment it is impossible to foresee the effects on cryptography and democratic developments by those means; the best and the worst can be expected at the same time. A certain ration of pessimism and prosecution mania are probably the right mixture of emotions about those tendencies, as the idea of big brother has come into existence long ago.

At the same time it will - in part - be a decision of the people to let science work against them or not. Acceleration of data-transmission calls for an acceleration of encryption-methods. And this again falls back on us, on an acceleration of daily life, blurring the private and the public for another time.
We live in an intersection, job and private life growing together. Cryptography cannot help us in that case. The privacy in our mind, the virtuality of all private and public lies in the field of democracy, or at least what is - by connection to the Human Rights - regarded as democracy.

TEXTBLOCK 19/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438658875
 
Censored links: Linking as a crime

The World Wide Web is constituted by documents linked with other documents, thus allowing access to referred documents. Censorship affects hyperlinks as well. Say, you publish an essay on racist propaganda on the Net and make link references to neo-nazi web sites. It goes without saying that you do not endorse neo-nazi pamphlets. By linking to these web sites you want your readers to get an idea of what you are writing about. Linking does not necessarily mean approving. Is this not evident?

According to Swiss and German prosecuting attorneys you may have committed a crime without having illegal intentions. From his web site Thomas Stricker, director of the Institute of Computer Systems at the ETH Zurich, has linked to an anti-racist web site with links to racist content in order to draw the attention to the difficulties legal regulation of the Net has to face. Neglecting his intentions, Swiss authorities instituted a criminal action against Stricker.

Another case, reported by the Global Internet Liberty Campaign, proves that not just links to racist resources or to resources with links to such resources are under prosecution. The Motion Picture Association of America sued to prevent Internet users from linking to websites that have DeCSS, a program helping Linux users play DVDs on their computers. The trial is scheduled for December.

References:

Global Internet Liberty Campaign, Hollywood wants end to links, in: GILC Alert 4,4, April 24, 2000, http://www.gilc.org/alert/alert44.html

Wolfgang Näser, Allgemeines zum Thema "Homepage", http://staff-www.uni-marburg.de/naeser/allgem.htm

Florian Rötzer, Ab wann ist ein externer Link auf strafrechtlich relevante Inhalte selbst strafbar?, in: Telepolis, December 1, 1997

Florian Rötzer, Strafverfahren gegen ETH-Professor wegen Links zu rassistischen Websites, in: Telepolis, February 24, 2000

Florian Rötzer, Ab wievielen Zwischenschritten ist ein Link auf eine rechtswidrige Website strafbar, in: Telepolis, February 24, 2000

TEXTBLOCK 20/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438659361
 
Commercial vs. Independent Content: Human and Financial Resources

Concerning their human and financial resources commercial media and independent content provider are an extremely unequal pair. While the 1998 revenues of the world's leading media conglomerates (AOL Time Warner, Disney, Bertelsmann, Viacom and the News Corporation) amounted to US$ 91,144,000,000 provider of independent content usually act on a non-profit basis and to a considerable extent depend on donations and contributions.

Also the human resources they have at their disposal quite differ. Viacom for example employs 112,000 people. Alternative media conversely are mostly run by a small group of activists, most of them volunteers. Moreover the majority of the commercial media giants has a multitude of subsidiaries (Bertelsmann for instance has operations in 53 countries), while independent content provider in some cases do not even have proper office spaces. Asked about their offices number of square meters Frank Guerrero from RTMark comments "We have no square meters at all, because we are only on the web. I guess if you add up all of our servers and computers we would take up about one or two square meters."

TEXTBLOCK 21/27 // URL: http://world-information.org/wio/infostructure/100437611734/100438659145
 
Advertising and the Content Industry - The Coca-Cola Case

Attempts to dictate their rules to the media has become a common practice among marketers and the advertising industry. Similar as in the Chrysler case, where the company demanded that magazines give advance notice about controversial articles, recent attempts to put pressure on content providers have been pursued by the Coca-Cola Company.

According to a memo published by the New York Post, Coca-Cola demands a free ad from any publication that publishes a Coke ad adjacent to stories on religion, politics, disease, sex, food, drugs, environmental issues, health, or stories that employ vulgar language. "Inappropriate editorial matter" will result in the publisher being liable for a "full make good," said the memo by Coke advertising agency McCann-Erickson. Asked about this practice, a Coke spokes person said the policy has long been in effect.

(Source: Odwyerpr.com: Coke Dictates nearby Editorial. http://www.odwyerpr.com)

TEXTBLOCK 22/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438657998
 
Governmental Influence

Agencies like the NSA are currently able to eavesdrop on anyone with few restrictions only - though other messages are spread by the NSA.
Theoretically cryptography can make that difficult. Hence those agencies speak up for actions like introducing trapdoors to make it possible to get access to everybody's data.

See the U.S. discussion about the Clipper Chip some years ago:
http://www.epic.org/crypto/clipper/
http://www.cdt.org/crypto/admin/041693whpress.txt

While encryption offers us privacy for the transmission of data, we do not only wish to have it but also need it if we want to transport data which shall not be seen by anyone else but the recipient of our message. Given this, the governments and governmental institutions/organizations fear to lose control. Strict laws are the consequence. The often repeated rumor that the Internet was a sphere of illegality has been proven wrong. Some parts are controlled by law very clearly. One of them is cryptography. Prohibition of cryptography or at least its restriction are considered an appropriate tool against criminality. Or one should say: had been considered that. In the meantime also governmental institutions have to admit that those restrictions most of all work against the population instead against illegal actors. Therefore laws have been changed in many states during the last five years. Even the USA, the Master of cryptography-restriction, liberated its laws in December 1999 to be more open-minded now.

for an insight into the discussion having gone on for years see:
http://www.cdt.org/crypto/new2crypto/3.shtml

the final text of the new U.S. Encryption Regulations you will find under:
http://www.cdt.org/crypto/admin/000110cryptoregs.shtml
http://www.cdt.org/crypto/admin/000114cryptoregs.txt

an explanation of the regulations can be found under:
http://www.cdt.org/crypto/admin/000112commercefactsheet.shtml

TEXTBLOCK 23/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438659102
 
The Privatization of Censorship

According to a still widely held conviction, the global data networks constitute the long desired arena for uncensorable expression. This much is true: Because of the Net it has become increasingly difficult to sustain cultural and legal standards. Geographical proximity and territorial boundaries prove to be less relevant, when it does not affect a document's availability if it is stored on your desktop or on a host some thousand kilometers away. There is no international agreement on non-prohibited contents, so human rights organizations and nazi groups alike can bypass restrictions. No single authority or organization can impose its rules and standards on all others. This is why the Net is public space, a political arena where free expression is possible.

This freedom is conditioned by the design of the Net. But the Net's design is not a given, as Lawrence Lessig reminds us. Originally the design of the Net allowed a relatively high degree of privacy and communication was not controlled directly. But now this design is changing and this invisible agora in electronic space is endangered. Governments - even elected ones - and corporations introduce new technologies that allow us to be identified, monitored and tracked, that identify and block content, and that can allow our behaviour to be efficiently controlled.

When the World Wide Web was introduced, soon small independent media and human rights organizations began to use this platform for drawing worldwide attention to their publications and causes. It seemed to be the dawning of a new era with authoritarian regimes and multinational media corporations on the looser side. But now the Net's design is changing according to their needs.

"In every context that it can, the entertaining industry is trying to force the Internet into its own business model: the perfect control of content. From music (fighting MP3) and film (fighting the portability of DVD) to television, the industry is resisting the Net's original design. It was about the free flow of content; Hollywood wants perfect control instead" (Lawrence Lessig, Cyberspace Prosecutor, in: The Industry Standard, February 2000).

In the United States, Hollywood and AT&T, after its merger with MediaOne becoming the biggest US cable service provider, return to their prior positions in the Seventies: the control of content and infrastructure. If most people will access the Net via set up boxes connected to a TV set, it will become a kind of television, at least in the USA.

For small independent media it will become very hard to be heard, especially for those offering streaming video and music. Increasingly faster data transmissions just apply to download capacities; upload capacities are much - on the average about eight times - lower than download capacities. As an AT&T executive said in response to criticism: "We haven't built a 56 billion dollar cable network to have the blood sucked from our veins" (Lawrence Lessig, The Law in the Code: How the Net is Regulated, Lecture at the Institute for Human Sciences, Vienna, May 29th, 2000).

Consumers, not producers are preferred.

For corporations what remains to be done to control the Net is mainly to cope with the fact that because of the Net it has become increasingly difficult to sustain cultural and legal standards. On Nov 11, 1995 the German prosecuting attorney's office searched Compuserve Germany, the branch of an international Internet service provider, because the company was suspected of having offered access to child pornography. Consequently Compuserve blocked access to more than 200 newsgroups, all containing "sex" or "gay" in their names, for all its customers. But a few days later, an instruction for access to these blocked newsgroups via Compuserve came into circulation. On February 26, 1997, Felix Somm, the Chief Executive Officer of Compuserve Germany, was accused of complicity with the distribution of child and animal pornography in newsgroups. In May 1998 he received a prison sentence for two years. This sentence was suspended against a bail of about 51.000 Euro. The sentence was justified by pointing to the fact that Compuserve Germany offered access to its US parent company's servers hosting child pornography. Felix Somm was held responsible for access to forbidden content he could not know of. (For further information (in German) click here.)

Also in 1995, as an attack on US Vice-President Al Gore's intention to supply all public schools with Internet access, Republican Senator Charles Grassley warned of the lurking dangers for children on the Net. By referring to a Time magazine cover story by Philip Elmer-Dewitt from July 3 on pornography on the Net, he pointed out that 83,5% of all images online are pornographic. But Elmer-Dewitt was wrong. Obviously unaware of the difference between Bulletin Board Systems and the Net, he referred misleadingly to Marty Rimm's article Marketing Pornography on the Information Superhighway, published in the prestigious Georgetown Law Journal (vol. 83, June 1995, pp. 1849-1935). Rimm knew of this difference, of course, and stated it clearly. (For further information see Hoffman & Novak, The Cyberporn debate, http://ecommerce.vanderbilt.edu/cyberporn.debate.html and Franz Wegener, Cyberpornographie: Chronologie einer Hexenjagd; http://www.intro-online.de/c6.html)

Almost inevitably anxieties accompany the introduction of new technologies. In the 19th century it was said that traveling by train is bad for health. The debate produced by Time magazine's cover story and Senator Grassley's attack caused the impression that the Net has multiplied possible dangers for children. The global communication networks seem to be a inexhaustible source of mushrooming child pornography. Later would-be bomb recipes found on the Net added to already prevailing anxieties. As even in industrialized countries most people still have little or no first-hand experience with the Net, anxieties about child pornography or terrorist attacks can be stirred up and employed easily.

A similar and related debate is going on about the glorification of violence and erotic depictions in media. Pointing to a "toxic popular culture" shaped by media that "distort children's view of reality and even undermine their character growth", US right-wing social welfare organizations and think tanks call for strong media censorship. (See An Appeal to Hollywood, http://www.media-appeal.org/appeal.htm) Media, especially films and videos, are already censored and rated, so it is more censorship that is wanted.

The intentions for stimulating a debate on child pornography on the Net were manifold: Inter alia, it served the Republican Party to attack Democrat Al Gore's initiative to supply all public schools with Internet access; additionally, the big media corporations realized that because of the Net they might have to face new competitors and rushed to press for content regulation. Taking all these intentions together, we can say that this still ongoing debate constitutes the first and most well known attempt to impose content regulation on the Net. Consequently, at least in Western countries, governments and media corporations refer to child pornography for justifying legal requirement and the implementation of technologies for the surveillance and monitoring of individuals, the filtering, rating and blocking of content, and the prohibition of anonymous publishing on the Net.

In the name of "cleaning" the Net of child pornography, our basic rights are restricted. It is the insistence on unrestricted basic rights that needs to be justified, as it may seem.

Underlying the campaign to control the Net are several assumptions. Inter alia: The Net lacks control and needs to be made safe and secure; we may be exposed inadvertently to pornographic content; this content is harmful to children. Remarkably, racism seems to be not an issue.

The Net, especially the World Wide Web, is not like television (although it is to be feared this is what it might become like within the next years). Say, little Mary types "Barbie" in a search engine. Click here to see what happens. It is true, sometimes you might have the opportunity to see that pornography is just a few mouse clicks away, but it is not likely that you might be exposed to pornographic content unless you make deliberate mouse clicks.

In reaction to these anxieties, but in absence of data how children use the Internet, the US government released the Communications Decency Act (CDA) in 1996. In consequence the Electronic Frontier Foundation (EFF) launched the famous Blue Ribbon Campaign and, among others, America Online and Microsoft Corporation supported a lawsuit of the American Civil Liberties Union (ACLU) against this Act. On June 26, 1997, the US Supreme Court ruled the CDA as unconstitutional under the provisions of the First Amendment to the Constitution: The Communications Decency Act violated the basic right to free expression. After a summit with the US government industry leaders announced the using of existing rating and blocking systems and the development of new ones for "inappropriate" online resources.

So, after the failing of the CDA the US government has shifted its responsibility to the industry by inviting corporations to taking on governmental tasks. Bearing in the mind the CompuServe case and its possible consequences, the industry welcomed this decision and was quick to call this newly assumed responsibility "self-regulation". Strictly speaking, "self-regulation" as meant by the industry does not amount to the regulation of the behaviour of corporations by themselves. On the opposite, "self-regulation" is to be understood as the regulation of users' behaviour by the rating, filtering and blocking of Internet content considered being inappropriate. The Internet industry tries to show that technical solutions are more favourable than legislation und wants to be sure, not being held responsible and liable for illegal, offensive or harmful content. A new CompuServe case and a new Communications Decency Act shall be averted.

In the Memorandum Self-regulation of Internet Content released in late 1999 by the Bertelsmann Foundation it is recommended that the Internet industry joins forces with governmental institutions for enforcing codes of conduct and encouraging the implementation of filters and ratings systems. For further details on the Memorandum see the study by the Center for Democracy and Technology, An Analysis of the Bertelsmann Foundation Memorandum on Self-Regulation of Internet Content: Concerns from a User Empowerment Perspective.

In fact, the "self-regulation" of the Internet industry is privatized censorship performed by corporations and right-wing NGOs. Censorship has become a business. "Crucially, the lifting of restrictions on market competition hasn't advanced the cause of freedom of expression at all. On the contrary, the privatisation of cyberspace seems to be taking place alongside the introduction of heavy censorship." (Richard Barbrook and Andy Cameron, The Californian Ideology)

While trying to convince us that its technical solutions are appropriate alternatives to government regulation, the Internet industry cannot dispense of governmental backing to enforce the proposed measures. This adds to and enforces the censorship measures already undertaken by governments. We are encouraged to use today's information and communication technologies, while the flow of information is restricted.

According to a report by Reporters Sans Frontières, quoted by Leonard R. Sussman in his essay Censor Dot Gov. The Internet and Press Freedom 2000, the following countries totally or largely control Internet access: Azerbaijan, Belarus, Burma, China, Cuba, Iran, Iraq, Kazakhstan, Kirghizstan, Libya, North Korea, Saudi Arabia, Sierra Leone, Sudan, Syria, Tajikistan, Tunisia, Turkmenistan, Uzbekistan, and Vietnam.

TEXTBLOCK 24/27 // URL: http://world-information.org/wio/infostructure/100437611742/100438658968
 
On-line Advertising and the Internet Content Industry

Applied to on-line content the advertising model leads to similar problems like in the traditional media. Dependence on advertising revenue puts pressure on content providers to consider advertising interests. Nevertheless new difficulties caused by the technical structure of online media, missing legal regulation and not yet established ethical rules, appear.

TEXTBLOCK 25/27 // URL: http://world-information.org/wio/infostructure/100437611652/100438658181
 
The Private against the Public?

"The multiple human needs and desires that demand privacy
among two or more people in the midst of social life must
inevitably lead to cryptology wherever men thrive
and wherever they write."

David Kahn, The Codebreakers

In the age of the vitreous man, whose data are not only collected by different institutions but kept under disclosure, out of reach, uncontrollable and unmanageable for the individual, privacy obtains new importance, receives a much higher value again.
The irony behind is that those who long for cryptography in order to preserve more privacy actually have to trust the same people who first created the methods to "produce" something like that vitreous man; of course not the same individual but persons of the same area of science. It is the reign of experts.
So far about self-determination.

for a rather aesthetic view on privacy and cryptography see:
http://www.t0.or.at/franck/d_franck.htm

TEXTBLOCK 26/27 // URL: http://world-information.org/wio/infostructure/100437611776/100438658809
 
biotechnology introduction



One of the most critical trends in the western culture what might be called the "fusion of flesh and machine". Increasingly, technological artifacts such as computers, rather than being used as tools by people, are functioning as parts of the human organism. On the other hand, human functionalities such as intelligence, emotion, adaptability or reproductivity are integrated into technological artifacts: the days when computers where only able to count apples and pears and their intelligence was not even matching an insect's are rapidly becoming history. Today, the boundaries between organisms and technology are losing their significance.

As new technologies are no longer mere instruments, or "extensions" of the organism, they acquire the capability of modifying the human organism - body and mind - from within according to certain pre-established principles. The history of the evolution of the human species is hastily being re-written as artificial beings begin to mock the categories of evolution and seem to work their way towards historical subjectivity. The German philosopher Günther Anders has extensively reflected on the changes of the human condition provoked by the development of modern technology speaks of an "antiquatedness of history" at a time when technology itself becomes a historical subject and men are becoming co-historical.

However, the softening of the biological definition of the human race is a theme which has accompanied western thinking ever since its origins. Beings half man-half animal crowd the tales of classical mythology and transcend the boundary between the human from below, while divine creatures, temporarily occupying humanoid bodies, relativise humanness form "above". What exactly "being human" meant and who "human beings" could be "defined" is a question with a long history. "Der Mensch ist das nicht festgestellte Thier" as Nietzsche commented.

Just as the boundaries between human and non-human are being crossed by technological development, so also the boundaries between the classical episteme are becoming permeable. Psychology is occupying itself with the emotions of machines, while physics and cybernetics is applied to the human mind and body. The "nicht festgestellte "character of humanness has meant that imagination has become just as relevant a factor in understanding humanness as science. Science fiction as a literary genre is no longer merely a depository of phantasies about a technisised world our of control. As the human monopoly on history seems to dissolve, the baroque narratives of science fiction have also become a resource for understanding history.

However, it is evident that the potentials of the new technologies gives rise not only to wild hopes and dreams and to bizarre stories; they also harbour some real ambiguities of a political and ethical nature. Not only does the merging of previously distinct realities - the human and the non-human worlds - unhinge theories and institutions based upon a clear distinction and separation of the two, it also is placing political practice on a different footing. Will artificial life have rights? Will artificial entities have political power? How will social relationships change?

TEXTBLOCK 27/27 // URL: http://world-information.org/wio/infostructure/100437611777/100438658433
 
The Flesh Machine

This is the tile of a book by the Critical Art Ensemble which puts the development of artifical life into a critical historical and political context, defining the power vectors which act as the driving force behind this development. The book is available in a print version (New York, Autonomedia 1998) and in an online version at http://www.critical-art.net/fles/book/index.html

INDEXCARD, 1/67
 
Nadia Thalman

Nadia Thalman is director of MIRAlab at the University of Geneva, Switzerland. Thalmann has become known as the creator of "virtual Marylyn", an installation which allowed visitors to literally to slip into Marylyn's shoes. Thalman's work is located at interface between science and art. It is about modelling human bodies for science and creative purposes, e.g. as virtual actors in movies. Thalman insists that artificial beings must be beautiful, in addition to being useful, as we will be living with them at close quarters.

INDEXCARD, 2/67
 
Sun Microsystems

Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, servers, and software.

http://www.sun.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/9/0,5716,108249+1+105909,00.html .

http://www.sun.com/
http://www.britannica.com/bcom/eb/article/9/0...
INDEXCARD, 3/67
 
Enigma

Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra.

INDEXCARD, 4/67
 
Blaise Pascal

b. June 19, 1623, Clermont-Ferrand, France
d. August 19, 1662, Paris, France

French mathematician, physicist, religious philosopher, and master of prose. He laid the foundation for the modern theory of probabilities, formulated what came to be known as Pascal's law of pressure, and propagated a religious doctrine that taught the experience of God through the heart rather than through reason. The establishment of his principle of intuitionism had an impact on such later philosophers as Jean-Jacques Rousseau and Henri Bergson and also on the Existentialists.

INDEXCARD, 5/67
 
Coca-Cola Company

American corporation founded in 1892 and today engaged primarily in the manufacture and sale of syrup and concentrate for Coca-Cola, a sweetened, carbonated beverage that is a cultural institution in the United States and a symbol around the world of American tastes. The company also produces and sells other soft drinks and citrus beverages. Corporate headquarters are in Atlanta, Ga. The post-World War II years saw diversification in the packaging of Coca-Cola and also in the development or acquisition of new products. In 1946 the company purchased rights to the Fanta soft drink, previously developed in Germany. It introduced the lemon-lime drink Sprite in 1961 and the sugar-free cola Tab in 1963. By purchase of Minute Maid Corporation in 1960, it entered the citrus beverage market. In 1982 the company acquired a controlling interest in Columbia Pictures, a motion picture and entertainment company, but sold its interest to Sony Corporation in 1989.

INDEXCARD, 6/67
 
PGP

A cryptographic software application that was developed by Phil Zimmerman at the Massachusetts Institute of Technology. Pretty Good Privacy (PGP) is a cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.

INDEXCARD, 7/67
 
AT&T Labs-Research

The research and development division of AT&T. Inventions made at AT&T Labs-Research include so important ones as stereo recording, the transistor and the communications satellite.

http://www.research.att.com/

INDEXCARD, 8/67
 
Internet Research Task Force

Being itself under the umbrella of the Internet Society, the Internet Research Task Force is an umbrella organization of small research groups working on topics related to Internet protocols, applications, architecture and technology. It is governed by the Internet Research Steering Group.

http://www.irtf.org

http://www.irtf.org/
INDEXCARD, 9/67
 
plaintext

the original, legible text

INDEXCARD, 10/67
 
Polybius

Polybius was one of the greatest historians of the ancient Greek. he lived from 200-118 BC. see: Polybius Checkerboard.

INDEXCARD, 11/67
 
Celera

Celera is an American company dedicated to the full sequencing and exploitation of the humane genome according to private business criteria. The company whose slogan is "Speed matters", is run by the Vietnam veteran Craig Ventor, whose declarations and business practices have given rise to widespread criticism. Unlike the Humane Genome Project, which is mapping the entire genome, Dr Ventor's method focuses on the genome information contained in messenger molecules. In keeping with Celera's slogan, this allows a much faster sequencing rate. The aggressive manoeuvring of Celera, coupled with Dr Ventor's unchecked self-esteem which lead him to compare himself to Nobel Prize winners, has meant that Dr. Ventor has been ostracised within the scientific community. James Watson, the co-discoverer of DNA, refers to Dr. Ventor's fast but relatively crude results as work that "any monkey could do" (source: BBC)

http://www.celera.com

INDEXCARD, 12/67
 
Internet Society

Founded in 1992, the Internet Society is an umbrella organization of several mostly self-organized organizations dedicated to address the social, political, and technical issues, which arise as a result of the evolution and the growth of the Net. Its most important subsidiary organizations are the Internet Architecture Board, the Internet Engineering Steering Group, the Internet Engineering Task Force, the Internet Research Task Force, and the Internet Societal Task Force.

Its members comprise companies, government agencies, foundations, corporations and individuals. The Internet Society is governed by elected trustees.

http://www.isoc.org

http://www.isoc.org/
INDEXCARD, 13/67
 
Internet Societal Task Force

The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Internet Architecture Board, the Internet Engineering Steering Group and the Internet Engineering Task Force.

Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation.

http://www.istf.isoc.org/

http://www.istf.isoc.org/
INDEXCARD, 14/67
 
Human Genome Project

The Human Genome Project is an international colaborative research project that aims to map the human genome. It's goal is to idenitfy the 100,000 genes of the human DNA as well as to sequence the 3 billion chemical base pairs that make up the DNA. The HGP is designed on an open source basis, i.e. the information that is obtained and stored in databases should, in principle, be available to researchers and businesses all over the world. However, the HGP's work has been challenged by private businesses such as Celera whose objective is the private exploitation of genome information.

INDEXCARD, 15/67
 
Invention

According to the WIPO an invention is a "... novel idea which permits in practice the solution of a specific problem in the field of technology." Concerning its protection by law the idea "... must be new in the sense that is has not already been published or publicly used; it must be non-obvious in the sense that it would not have occurred to any specialist in the particular industrial field, had such a specialist been asked to find a solution to the particular problem; and it must be capable of industrial application in the sense that it can be industrially manufactured or used." Protection can be obtained through a patent (granted by a government office) and typically is limited to 20 years.

INDEXCARD, 16/67
 
Wide Application Protocol (WAP)

The WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat (IRC).

While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate.

Source: Whatis.com

INDEXCARD, 17/67
 
atbash

Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing.

for further explanations see:
http://www.ftech.net/~monark/crypto/crypt/atbash.htm

http://www.ftech.net/~monark/crypto/crypt/atb...
INDEXCARD, 18/67
 
Economic rights

The economic rights (besides moral rights and in some cases also neighboring rights) granted to the owners of copyright usually include 1) copying or reproducing a work, 2) performing a work in public, 3) making a sound recording of a work, 4) making a motion picture of a work, 5) broadcasting a work, 6) translating a work and 7) adapting a work. Under certain national laws some of these rights are not exclusive rights of authorization but in specific cases, merely rights to remuneration.

INDEXCARD, 19/67
 
Donna Haraway

Ever since the publication of her Cyborg Manifesto Donna Haraway has been providing widely received theoretical contributions to the debate around artificial life. In the "Manifesto" she considers the political and social implications of the advent of artificial beings. A radical feminist, Haraway combines in her theoretical approach philosophy, cultural studies and gender studies.

Hyperlink to Donna Haraway: http://www.asahi-net.or.jp/~RF6T-TYFK/haraway.htmlWired Archive interviews with DH: http://www.wired.com/wired/archive//5.02/ffharaway.html?person=donna_haraway&topic_set=wiredpeople

http://www.asahi-net.or.jp/~RF6T-TYFK/haraway...
http://www.wired.com/wired/archive//5.02/ffha...
INDEXCARD, 20/67
 
Neighboring rights

Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

INDEXCARD, 21/67
 
Cisco, Inc.

Being the worldwide leader in networking for the Internet, Cisco Systems is one of the most prominent companies of the Internet industry.

http://www.cisco.com

INDEXCARD, 22/67
 
Gottfried Wilhelm von Leibniz

b. July 1, 1646, Leipzig
d. November 14, 1716, Hannover, Hanover

German philosopher, mathematician, and political adviser, important both as a metaphysician and as a logician and distinguished also for his independent invention of the differential and integral calculus. 1661, he entered the University of Leipzig as a law student; there he came into contact with the thought of men who had revolutionized science and philosophy--men such as Galileo, Francis Bacon, Thomas Hobbes, and René Descartes. In 1666 he wrote De Arte Combinatoria ("On the Art of Combination"), in which he formulated a model that is the theoretical ancestor of some modern computers.

INDEXCARD, 23/67
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 24/67
 
The European Convention on Human Rights and its Five Protocols

As can be read in the Convention's preamble, the member states of the Council of Europe, the European Convention on Human Rights is intended as a follow-up of the Universal Declaration of Human Rights proclaimed by the General Assembly of the United Nations on 10 December 1948 and as an official act of "securing the universal and effective recognition and observance of the Rights therein declared." Because it is stated "that the aim of the Council of Europe is the achievement of greater unity between its Members and that one of the methods by which the aim is to be pursued is the maintenance and further realization of Human Rights and Fundamental Freedoms", the European Convention on Human Rights can be read as the political sibling to the biblical Ten Commandments on which effective and legitimate European democratic government are based. The European Convention on Human Rights is intended to represent the essence of the common heritage of European political traditions and ideals.

Signed in Rome on November 4, 1950, the Convention is supplemented by five protocols dated from March 20, 1952 (Paris), May 6, 1963, September 16, 1963, and January 20, 1966 (Strasbourg).

http://www.hri.org/docs/ECHR50.html

INDEXCARD, 25/67
 
Chrysler Corporation

American automotive company first incorporated in 1925 and reorganized and newly incorporated in 1986. It has long been the third largest automaker in the United States (after General Motors and the Ford Motor Company). Founded by Walter P. Chrysler, it took over the business and properties of Maxwell Motor Company, Inc. (first formed in 1913). Today its major subsidiaries include Chrysler Automotive Operations, Inc., which manufactures Plymouth, Dodge, and Chrysler passenger cars, Dodge trucks, and auto parts and accessories; and the Chrysler Financial Corporation. Headquarters are in Highland Park, Mich., U.S.

INDEXCARD, 26/67
 
Wide Area Network (WAN)

A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too.

INDEXCARD, 27/67
 
Internet Engineering Steering Group

On behalf of the Internet Society, the Internet Engineering Steering Group is responsible for the technical management of the evolution of the architecture, the standards and the protocols of the Net.

http://www.ietf.org/iesg.html

http://www.ietf.org/iesg.html
INDEXCARD, 28/67
 
Gateway

A gateway is a computer supplying point-to-multipoint connections between computer networks.

INDEXCARD, 29/67
 
Gaius Julius Caesar

Gaius Julius Caesar (100-44 BC) was a Roman Statesman who came to power through a military career and by buying of votes. His army won the civil war, run over Spain, Sicily and Egypt, where he made Cleopatra a Queen. For reaching even more power he increased the number of senators. But he also organized social measures to improve the people's food-situation. In February 44 BC he did not accept the kingship offered by Marc Anthony, which made him even more popular. One month later he was murdered during a senate sitting.

INDEXCARD, 30/67
 
Sony Corporation

Japanese SONY KK, major Japanese manufacturer of consumer electronics products. Headquarters are in Tokyo. The company was incorporated in 1946 and spearheaded Japan's drive to become the world's dominant consumer electronics manufacturer in the late 20th century. The company was one of the first to recognize the potential of the consumer videotape market. In 1972 it formed an affiliate to market its Betamax colour videocassette system. In 1987-88 Sony purchased the CBS Records Group from CBS Inc., thus acquiring the world's largest record company. It followed that purchase with the purchase in 1989 of Columbia Pictures Entertainment Inc.

INDEXCARD, 31/67
 
The Rocky Horror Picture Show

The story of Frank-N-furter, Brad and Janet ... Don't dream it, be it!

http://www.rockyhorrorpictureshow.com/

INDEXCARD, 32/67
 
ciphertext

the enciphered/encoded and primarily illegible text

INDEXCARD, 33/67
 
Expert system

Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.

INDEXCARD, 34/67
 
Chappe's fixed optical network

Claude Chappe built a fixed optical network between Paris and Lille. Covering a distance of about 240kms, it consisted of fifteen towers with semaphores.

Because this communication system was destined to practical military use, the transmitted messages were encoded. The messages were kept such secretly, even those who transmit them from tower to tower did not capture their meaning, they just transmitted codes they did not understand. Depending on weather conditions, messages could be sent at a speed of 2880 kms/hr at best.

Forerunners of Chappe's optical network are the Roman smoke signals network and Aeneas Tacitus' optical communication system.

For more information on early communication networks see Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks.

INDEXCARD, 35/67
 
Avatar

Traditionally, an avatar is a mythical figure half man half god. In Hindu mythology, avatars are the form that deities assume when they descend on earth. Greek and Roman mythologies also contain avatars in animal form or half animal, half man. In virtual space, the word avatar refers to a "virtual identity" that a user can construct for him / herself, e.g. in a chat-room. Avatars have also been a preferred object of media art.

INDEXCARD, 36/67
 
MIRALab

MIRALab is a research laboratory attached to the University of Geneva. Its motto is "where research meets creativity". MIRAlab's objective is to model human functionalities, such as movement or facial expression, in a realistic way.

INDEXCARD, 37/67
 
to encipher/encode

to put a word or text into ciphers/codes

INDEXCARD, 38/67
 
Censorship of Online Content in China

During the Tian-an men massacre reports and photos transmitted by fax machines gave notice of what was happening only with a short delay. The Chinese government has learned his lesson well and "regulated" Internet access from the beginning. All Internet traffic to and out of China passes through a few gateways, a few entry-points, thus making censorship a relatively easy task. Screened out are web sites of organizations and media which express dissident viewpoints: Taiwan's Democratic Progress Party and Independence Party, The New York Times, CNN, and sites dealing with Tibetan independence and human rights issues.

Users are expected not to "harm" China's national interests and therefore have to apply for permission of Internet access; Web pages have to be approved before being published on the Net. For the development of measures to monitor and control Chinese content providers, China's state police has joined forces with the MIT.

For further information on Internet censorship, see Human Rights Watch, World Report 1999.

http://www.dpp.org/
http://www.nytimes.com/
http://www.hrw.org/worldreport99/special/inte...
INDEXCARD, 39/67
 
French laws against anonymity on the Net

Since the end of June in France anonymous publishing - on the World Wide Web, in newsgroups, mailing lists or chat rooms - is prohibited. The use of pseudonyms, so popular in chat rooms, e.g., is not restricted, but the true identities of those who "publish" on the Net must be known to the users' Internet service and Internet content providers. Additionally, Internet providers are obliged to point out the possibility of blocking access to material to their customers and to offer them appropriate technology for blocking access.

Loi sur la communication audiovisuelle, http://www.legalis.net/jnet/2000/loi-audio/projetloi-fin.htm

Source: Florian Rötzer, Frankreich hat mit der Anonymität im internet Schluss gemacht, in: Telepolis, July 2, 2000

http://www.heise.de/tp
INDEXCARD, 40/67
 
Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks

This book gives a fascinating glimpse of the many documented attempts throughout history to develop effective means for long distance communications. Large-scale communication networks are not a twentieth-century phenomenon. The oldest attempts date back to millennia before Christ and include ingenious uses of homing pigeons, mirrors, flags, torches, and beacons. The first true nationwide data networks, however, were being built almost two hundred years ago. At the turn of the 18th century, well before the electromagnetic telegraph was invented, many countries in Europe already had fully operational data communications systems with altogether close to one thousand network stations. The book shows how the so-called information revolution started in 1794, with the design and construction of the first true telegraph network in France, Chappe's fixed optical network.

http://www.it.kth.se/docs/early_net/

INDEXCARD, 41/67
 
Sputnik

At the beginning of the story of today's global data networks is the story of the development of satellite communication.

In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defence. As the US Department of Defence encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry.

In the same year the USA launched their first satellite - Explorer I - data were transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks.

Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. But up to now, most satellites are designed for military purposes such as reconnaissance.

INDEXCARD, 42/67
 
Jürgen Habermas

Jürgen Habermas (b. 1929) is the leading scholar of the second generation of the Frankfurt School, a group of philosophers, cultural critics and social scientists associated with the Institute for Social Research, founded in Frankfurt in 1929. The Frankfurt School is best known for its program of developing a "critical theory of society". Habermas was a student of Adorno, becoming his assistant in 1956. He first taught philosophy at Heidelberg before becoming a professor of philosophy and sociology at the University of Frankfurt. In 1972, he moved to the Max-Planck Institute in Starnberg, but in the mid-1980s, he returned to his post at Frankfurt.

INDEXCARD, 43/67
 
Telephone

The telephone was not invented by Alexander Graham Bell, as is widely held to be true, but by Philipp Reiss, a German teacher. When he demonstrated his invention to important German professors in 1861, it was not enthusiastically greeted. Because of this dismissal, no financial support for further development was provided to him.

And here Bell comes in: In 1876 he successfully filed a patent for the telephone. Soon afterwards he established the first telephone company.

INDEXCARD, 44/67
 
Next Generation Internet Program

A research and development program funded by the US government. Goal is the development of advanced networking technologies and applications requiring advanced networking with capabilities that are 100 to 1,000 times faster end-to-end than today's Internet.

http://www.ngi.gov

INDEXCARD, 45/67
 
MIT

The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by Vannevar Bush) and aeronautics (led by Charles Stark Draper). During World War II, MIT administered the Radiation Laboratory, which became the nation's leading center for radar research and development, as well as other military laboratories. After the war, MIT continued to maintain strong ties with military and corporate patrons, who supported basic and applied research in the physical sciences, computing, aerospace, and engineering. MIT has numerous research centers and laboratories. Among its facilities are a nuclear reactor, a computation center, geophysical and astrophysical observatories, a linear accelerator, a space research center, supersonic wind tunnels, an artificial intelligence laboratory, a center for cognitive science, and an international studies center. MIT's library system is extensive and includes a number of specialized libraries; there are also several museums.

INDEXCARD, 46/67
 
Center for Democracy and Technology

The Center for Democracy and Technology works to promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, the Center seeks practical solutions to enhance free expression and privacy in global communications technologies. The Center is dedicated to building consensus among all parties interested in the future of the Internet and other new communications media.

http://www.cdt.org

INDEXCARD, 47/67
 
McCann Erickson

Alfred W. Erickson founded the advertising agency McCann Erickson in 1902. In1913 McCann opened a San Francisco office and a Detroit office that moved to Cleveland in 1915. With operations in 127 countries, McCann reaches across the globe and continues to expand its capabilities through start-up units and acquisitions. McCann has recently added creative resources in the local, pan-regional and global arenas and also extended its expertise in specialized marketing categories, such as business-to-business and high-tech communications.

INDEXCARD, 48/67
 
Integrated circuit

Also called microcircuit, the integrated circuit is an assembly of electronic components, fabricated as a single unit, in which active semiconductor devices (transistors and diodes) and passive devices (capacitors and resistors) and their interconnections are built up on a chip of material called a substrate (most commonly made of silicon). The circuit thus consists of a unitary structure with no connecting wires. The individual circuit elements are microscopic in size.

INDEXCARD, 49/67
 
Vandana Shiva

Vandana Shiva is the Director of the Research Foundation for Science, Technology and Ecology in New Delhi. She has been a tireless and one of the most original campaigners for ecological diversity, eco-feminism and against "official" development policies and commercial exploitation. Book publications include Ecofeminism (1993), Monocultures of the Mind (1993) and Biopiracy : The Plunder of Nature and Knowledge (1997

INDEXCARD, 50/67
 
Internet Architecture Board

On behalf of the Internet Society, the Internet Architecture Board oversees the evolution of the architecture, the standards and the protocols of the Net.

Internet Society: http://www.isoc.org/iab

http://www.isoc.org/
INDEXCARD, 51/67
 
The Internet Engineering Task Force

The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Engineering Steering Group.

Internet Society: http://www.ietf.org

http://www.ietf.org/
INDEXCARD, 52/67
 
Punch card, 1801

Invented by Joseph Marie Jacquard, an engineer and architect in Lyon, France, the punch cards laid the ground for automatic information processing. For the first time information was stored in binary format on perforated cardboard cards. In 1890 Hermann Hollerith used Joseph-Marie Jacquard's punch card technology for processing statistical data retrieved from the US census in 1890, thus speeding up data analysis from eight to three years. His application of Jacquard's invention was also used for programming computers and data processing until electronic data processing was introduced in the 1960's. - As with writing and calculating, administrative purposes account for the beginning of modern automatic data processing.

Paper tapes are a medium similar to Jacquard's punch cards. In 1857 Sir Charles Wheatstone applied them as a medium for the preparation, storage, and transmission of data for the first time. By their means, telegraph messages could be prepared off-line, sent ten times quicker (up to 400 words per minute), and stored. Later similar paper tapes were used for programming computers.

INDEXCARD, 53/67
 
Telnet

Telnet allows you to login remotely on a computer connected to the Internet.

INDEXCARD, 54/67
 
Above.net

Headquartered in San Jose, USA, AboveNet Communications is a backbone service provider. Through its extensive peering relationships, the company has built a network with the largest aggregated bandwidth in the world.

http://www.above.net

INDEXCARD, 55/67
 
Optical communication system by Aeneas Tacitus, 4th century B.C.

Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook.

With communication separated from transportation, the distant became near.

Tacitus' telegraph system was very fast and not excelled until the end of the 18th century.

For further information see Joanne Chang & Anna Soellner, Decoding Device, http://www.smith.edu/hsc/museum/ancient_inventions/decoder2.html

http://www.smith.edu/hsc/museum/ancient_inven...
INDEXCARD, 56/67
 
Network Information Center (NIC)

Network information centers are organizations responsible for registering and maintaining the domain names on the World Wide Web. Until competition in domain name registration was introduced, they were the only ones responsible. Most countries have their own network information center.

INDEXCARD, 57/67
 
About Wines

http://www.aboutwine.com/

http://www.aboutwine.com/
INDEXCARD, 58/67
 
FEED

http://www.feed.com/

http://www.feed.com/
INDEXCARD, 59/67
 
DES

The U.S. Data Encryption Standard (= DES) is the most widely used encryption algorithm, especially used for protection of financial transactions. It was developed by IBM in 1971. It is a symmetric-key cryptosystem. The DES algorithm uses a 56-bit encryption key, meaning that there are 72,057,594,037,927,936 possible keys.

for more information see:
http://www.britannica.com/bcom/eb/article/3/0,5716,117763+5,00.html
http://www.cryptography.com/des/

http://www.britannica.com/bcom/eb/article/3/0...
http://www.cryptography.com/des/
INDEXCARD, 60/67
 
Polybius Checkerboard


 

1

2

3

4

5

1

A

B

C

D

E

2

F

G

H

I

K

3

L

M

N

O

P

4

Q

R

S

T

U

5

V

W

X

Y

Z



It is a system, where letters get converted into numeric characters.
The numbers were not written down and sent but signaled with torches.

for example:
A=1-1
B=1-2
C=1-3
W=5-2

for more information see:
http://www.ftech.net/~monark/crypto/crypt/polybius.htm

http://www.ftech.net/~monark/crypto/crypt/pol...
INDEXCARD, 61/67
 
Virtual Marylin Monroe

This is the story of the virtual Marylyn Monroe created by MRALab in Switzerland. The biography features her personal and professional stories. This being the biography of a virtual being, it does not end with the present and includes, instead, a chapter on her destiny.

http://www.miralab.unige.ch/MARILYN/VIRTUAL/virtual.html

http://www.miralab.unige.ch/MARILYN/VIRTUAL/v...
INDEXCARD, 62/67
 
Roman smoke telegraph network, 150 A.D.

The Roman smoke signals network consisted of towers within visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling.

For a similar telegraph network in ancient Greece see Aeneas Tacitus' optical communication system.

INDEXCARD, 63/67
 
John Dee

b. July 13, 1527, London, England
d. December 1608, Mortlake, Surrey

English alchemist, astrologer, and mathematician who contributed greatly to the revival of interest in mathematics in England. After lecturing and studying on the European continent between 1547 and 1550, Dee returned to England in 1551 and was granted a pension by the government. He became astrologer to the queen, Mary Tudor, and shortly thereafter was imprisoned for being a magician but was released in 1555. Dee later toured Poland and Bohemia (1583-89), giving exhibitions of magic at the courts of various princes. He became warden of Manchester College in 1595.

INDEXCARD, 64/67
 
CNN

CNN is a U.S.-TV-enterprise, probably the world's most famous one. Its name has become the symbol for the mass-media, but also the symbol of a power that can decide which news are important for the world and which are not worth talking about. Every message that is published on CNN goes around the world. The Gulf War has been the best example for this until now, when a CNN-reporter was the one person to do the countdown to a war. The moments when he stood on the roof of a hotel in Baghdad and green flashes surrounded him, went around the world.

INDEXCARD, 65/67
 
Mark

A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." (WIPO) To be protected a mark must be registered in a government office whereby generally the duration is limited in time, but can be periodically (usually every 10 years) renewed.

INDEXCARD, 66/67
 
Barnes and Noble

Massive online retail bookstore housing more than a million titles. Includes a book recommendation "personalizer,", a comprehensive list of The New York Times bestsellers, a "live" community events calendar with a daily survey and several forums, "highlighted" books from 19 subject areas, browsable categories such as antiques, ethnic studies, and pop culture, Books in the News, and weekly features such as reviews, excerpts, recommendations, interviews, events, "roundups" of popular titles, and quizzes.

INDEXCARD, 67/67