Virtual body and data body The result of this informatisation is the creation of a virtual body which is the exterior of a man or woman's social existence. It plays the same role that the physical body, except located in virtual space (it has no real location). The virtual body holds a certain emancipatory potential. It allows us to go to places and to do things which in the physical world would be impossible. It does not have the weight of the physical body, and is less conditioned by physical laws. It therefore allows one to create an identity of one's own, with much less restrictions than would apply in the physical world. But this new freedom has a price. In the shadow of virtualisation, the data body has emerged. The data body is a virtual body which is composed of the files connected to an individual. As the The virtual character of the data body means that social regulation that applies to the real body is absent. While there are limits to the manipulation and exploitation of the real body (even if these limits are not respected everywhere), there is little regulation concerning the manipulation and exploitation of the data body, although the manipulation of the data body is much easier to perform than that of the real body. The seizure of the data body from outside the concerned individual is often undetected as it has become part of the basic structure of an informatised society. But data bodies serve as raw material for the "New Economy". Both business and governments claim access to data bodies. Power can be exercised, and democratic decision-taking procedures bypassed by seizing data bodies. This totalitarian potential of the data body makes the data body a deeply problematic phenomenon that calls for an understanding of data as social construction rather than as something representative of an objective reality. How data bodies are generated, what happens to them and who has control over them is therefore a highly relevant political question. |
|
Cryptography's Terms and background "All nature is merely a cipher and a secret writing." Blaise de Vigenère In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security. Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work. The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected. We want to communicate with everybody - but do not want anybody to know. Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well. With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers. While the potential of global information is regarded as endless, it is those elements that reduce it. There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data. During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics. "Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw) For an introduction into cryptography and the mathematical tasks see: |
|
AOL Time Warner The largest media conglomerate in the world, Time Warner resulted from the merger of the publisher Time Inc. and the media company Turner Broadcasting Systems, Inc. in 1996. Time Inc. founded in 1922 primarily concentrated on magazines and books and in the 1950s moved into the broadcasting and entertainment industry, but in the 1970s announced that it was selling its broadcasting holdings and concentrating on cable television. In 1989 Time Inc. merged with Warner Communications Inc., which besides being a major motion-picture and television studio, was also one of the biggest U.S. music recordings producers and cable-television operators. In January 2000 Time Warner merged with AOL (America Online) in a US$ 243.3 billion deal. Although AOL so far generated far less profit and turnover than Time Warner its quotation on the stock exchange was clearly higher, making Time Warner the junior partner (45 percent) in the new company. Through its merger with AOL, which is a major player in the online-business and owns several Internet-services like Compuserve, Netscape and Netcenter, the new media conglomerate could significantly enlarge its online presence and also complement its traditional media activities. |
|
Legal Protection: Multilateral Agreements With the rise of a global economic system a desire to establish agreements, which protect works not only within national borders, but also within a "Union" of countries or on an international level, has been expressed. As a consequence a variety of multilateral treaties have been negotiated and adopted by governments. Those shall simplify practice through international standardization and mutual recognition of rights and duties among nations. |
|
Centralization of the Content Industry Following the 1980s a sweeping restructuring of commercial media power has happened. While some firms have grown through expansion others extended through mergers and acquisitions. Examples are In recent years those developments have led to the rise of transnational media giants, resulting in the domination of the global media system by about ten huge conglomerates. These have interests in numerous media industries, ranging from film production, magazines, newspapers, book publishing and recorded music to TV and radio channels and networks, but also include retail stores, amusement parks and digital media products. Behind these firms are about three or four dozen smaller media companies, which primarily engage in local, national or niche markets. In short, the overwhelming majority of the world's content production facilities and distribution channels lies in the hands of approximately fifty enterprises. |
|
Intellectual Property: A Definition Intellectual property, very generally, relates to the output, which result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) Industrial Property a) b) c) d) Unfair competition (trade secrets) e) Geographical indications (indications of source and appellations of origin) 2) Copyright The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products. Those rights apply to the intellectual creation as such, and not to the physical object in which the work may be embodied. |
|
DES The U.S. Data Encryption Standard (= DES) is the most widely used encryption algorithm, especially used for protection of financial transactions. It was developed by IBM in 1971. It is a symmetric-key cryptosystem. The DES algorithm uses a 56-bit encryption key, meaning that there are 72,057,594,037,927,936 possible keys. for more information see: |
|
Viacom One of the largest and foremost communications and media conglomerates in the world. Founded in 1971, the present form of the corporation dates from 1994 when Viacom Inc., which owned radio and television stations and cable television programming services and systems, acquired the entertainment and publishing giant Paramount Communications Inc. and then merged with the video and music retailer Blockbuster Entertainment Corp. Headquarters are in New York City. |
|
CNN CNN is a U.S.-TV-enterprise, probably the world's most famous one. Its name has become the symbol for the mass-media, but also the symbol of a power that can decide which news are important for the world and which are not worth talking about. Every message that is published on CNN goes around the world. The Gulf War has been the best example for this until now, when a CNN-reporter was the one person to do the countdown to a war. The moments when he stood on the roof of a hotel in Baghdad and green flashes surrounded him, went around the world. |
|
News Corporation The News Corporation Ltd., a global media holding company, which governed News Limited (Australia), News International (U.K.), and News America Holdings Inc. (U.S.) was founded by the Australian-born newspaper publisher and media entrepreneur, Rupert Murdoch. Murdoch's corporate interests center on newspaper, magazine, book, and electronic publishing; television broadcasting; and film and video production, principally in the United States, the United Kingdom, and Australia. |
|
PGP A |
|
Bruce Schneier Bruce Schneier is president of Counterpane Systems in Minneapolis. This consulting enterprise specialized in cryptography and computer security. He is the author of the book Applied Cryptography and inventor of the Blowfish and Twofish encryption algorithms. |
|