Private data bunkers On the other hand are the data bunkers of the private sector, whose position is different. Although these are fast-growing engines of data collection with a much greater degree of dynamism, they may not have the same privileged position - although one has to differentiate among the general historical and social conditions into which a data bunker is embedded. For example, it can safely be assumed that the databases of a large credit card company or bank are more protected than the bureaucracies of small developing countries. Private data bunkers include
Credit bureaus Credit card companies Direct marketing companies Insurance companies Telecom service providers Mail order stores Online stores |
|
Atrocity Stories Atrocity stories are nothing else than lies; the two words "atrocity stories" simply pretend to be more diplomatic. The purpose is to destroy an image of the enemy, to create a new one, mostly a bad one. The story creating the image is not necessarily made up completely. It can also be a changed into a certain variable direction. The most important thing about atrocity stories is to follow the line of possibility. Even if the whole story is made up it must be probable or at least possible, following rumors. Most successful might it be if a rumor is spread on purpose, some time before the atrocity story is launched, because as soon as something seems to be familiar, it is easier to believe it. |
|
Basics: Protected Persons Generally copyright vests in the author of the work. Certain national laws provide for exceptions and, for example, regard the employer as the original owner of a copyright if the author was, when the work was created, an employee and employed for the purpose of creating that work. In the case of some types of creations, particularly audiovisual works, several national laws provide for different solutions to the question that should be the first holder of copyright in such works. Many countries allow copyright to be assigned, which means that the owner of the copyright transfers it to another person or entity, which then becomes its holder. When the national law does not permit assignment it usually provides the possibility to license the work to someone else. Then the owner of the copyright remains the holder, but authorizes another person or entity to exercise all or some of his rights subject to possible limitations. Yet in any case the " |
|
Other biometric technologies Other biometric technologies not specified here include ear recognition, signature dynamics, key stroke dynamics, vein pattern recognition, retinal scan, body odour recognition, and DNA recognition. These are technologies which are either in early stages of development or used in highly specialised and limited contexts. |
|
Another Question of Security Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day. Therefore the decision to elect a certain method of enciphering finally is a matter of trust. For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide. The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge. The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy. It is especially the latter that touches the main elements of democracy. for the question of security see: |
|
Identificaiton in history In biometric technology, the subject is reduced to its physical and therefore inseparable properties. The subject is a subject in so far as it is objectified; that is, in so far as is identified with its own res extensa, Descartes' "extended thing". The subject exists in so far as it can be objectified, if it resists the objectification that comes with measurement, it is rejected or punished. Biometrics therefore provides the ultimate tool for control; in it, the dream of hermetic identity control seems to become a reality, a modern technological reconstruction of traditional identification techniques such as the handshake or the look into somebody's eyes. The use of identification by states and other institutions of authority is evidently not simply a modern phenomenon. The ancient Babylonians and Chinese already made use of finger printing on clay to identify authors of documents, while the Romans already systematically compared handwritings. Body measurement has long been used by the military. One of the first measures after entering the military is the identification and appropriation of the body measurements of a soldier. These measurements are filed and combined with other data and make up what today we would call the soldier's data body. With his data body being in possession of the authority, a soldier is no longer able freely socialise and is instead dependent on the disciplinary structure of the military institution. The soldier's social being in the world is defined by the military institution. However, the military and civilian spheres of modern societies are no longer distinct entities. The very ambivalence of advanced technology (dual use technologies) has meant that "good" and "bad" uses of technology can no longer be clearly distinguished. The measurement of physical properties and the creation of data bodies in therefore no longer a military prerogative, it has become diffused into all areas of modern societies. If the emancipatory potential of weak identities is to be of use, it is therefore necessary to know how biometric technologies work and what uses they are put to. |
|
Definition During the last 20 years the old "Digital divide" describes the fact that the world can be divided into people who do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide. More than 80% of all computers with access to the Internet are situated in larger cities. "The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium." (Izumi Aizi) for more information see: |
|
Individualized Audience Targeting New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like |
|
Positions Towards the Future of Copyright in the "Digital Age" With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified: Eliminate Copyright Anti-copyrightists believe that any Enlarge Copyright Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other |
|
Data bunkers Personal data are collected, appropriated, processed and used for commercial purposes on a global scale. In order for such a global system to operate smoothly, there a server nodes at which the data streams converge. Among the foremost of these are the data bases of credit card companies, whose operation has long depended on global networking. On top of credit card companies such as Visa, American Express, Master Card, and others. It would be erroneous to believe that the primary purpose of business of these companies is the provision of credit, and the facilitation of credit information for sale transactions. In fact, Information means much more than just credit information. In an advertisement of 1982, American Express described itself in these terms: ""Our product is information ...Information that charges airline tickets, hotel rooms, dining out, the newest fashions ...information that grows money funds buys and sells equities ...information that pays life insurance annuities ...information that schedules entertainment on cable television and electronically guards houses ...information that changes kroners into guilders and figures tax rates in Bermuda ..." Information has become something like the gospel of the New Economy, a doctrine of salvation - the life blood of society, as Bill Gates expresses it. But behind information there are always data that need to be generated and collected. Because of the critical importance of data to the economy, their possession amounts to power and their loss can cause tremendous damage. The data industry therefore locates its data warehouses behind fortifications that bar physical or electronic access. Such structures are somewhat like a digital reconstruction of the medieval fortress Large amounts of data are concentrated in fortress-like structures, in data bunkers. As the |
|
Salomon Smith Barney Investment banking firm and securities dealer. Founded in the 19th century in Philadelphia, in 1993 Smith Barney became a wholly owned subsidiary of Travelers Group Inc. The 1998 merger of Citicorp and Travelers Group brought together Citibank, Travelers, Salomon Smith Barney, Commercial Credit and Primerica under Citigroup's trademark red umbrella. |
|
Independent Institute The Independent Institute officially is a "non-politicized, non-partisan, scholarly, public policy research organization" that sponsors studies of social and economic issues. The resulting studies are widely distributed as books and other publications, and are debated in the Institutes conferences and media programs. Areas of research are: Economic issues, social issues, environment and natural resources, industry policy, health and welfare. |
|
State Farm Insurance Comprehensive insurance provider. Covers health, automobile, life, homeowners, and farmers services. State Farm Insurance Companies' corporate headquarters are in Bloomington, Ill. Today there are 27 regional offices and more than 1,000 claim service centers. State Farm has grown to include 76,500 employees and more than 16,000 agents servicing 66.2 million policies in the United States and Canada. |
|
Casey, William J. b. March 13, 1913, Elmhurst, Queens, N.Y., U.S. d. May 6, 1987, Glen Cove, N.Y. Powerful and controversial director of the U.S. Central Intelligence Agency (CIA) from 1981 to 1987 during the Ronald Reagan administration. While affiliated with the law firm Rogers & Wells (1976-81), Casey became Reagan's presidential campaign manager and was subsequently awarded the directorship of the CIA in 1981. Under his leadership, covert action increased in such places as Afghanistan, Central America, and Angola, and the agency stepped up its support for various anticommunist insurgent organizations. He was viewed as a pivotal figure in the CIA's secret involvement in the Iran-Contra Affair, in which U.S. weapons were sold to Iran and in which money from the sale was funneled to Nicaraguan rebels, in possible violation of U.S. law. Just before he was to testify in Congress on the matter in December 1986, he suffered seizures and then underwent brain surgery; he died from nervous-system lymphoma without ever testifying. |
|
CIGNA CIGNA was formed in 1982 through the combination of INA Corporation and Connecticut General Corporation. CIGNA's formation in 1982 combined a leading property-casualty insurer with a leading supplier of life insurance and employee benefits. CIGNA has tightened its focus on employee benefits, divesting its individual life insurance business in 1998, and its domestic and international property and casualty operations in 1999. |
|
Chemical Banking Corporation In 1996 the firm, which was by then the second-largest bank in the United States, merged with another New York-based bank, The Chase Manhattan Corporation, to form the largest bank in the nation. Though the Chemical Banking Corporation had been the larger partner in the merger, the resulting firm was called The Chase Manhattan Corporation. |
|
Royal Dutch/Shell Group One of the world's largest corporate entities in sales, consisting of companies in more than 100 countries, whose shares are owned by NV Koninklijke Nederlandsche Petroleum Maatschappij (Royal Dutch Petroleum Company Ltd.) of The Hague and by the "Shell" Transport and Trading Company, PLC, of London. Below these two parent companies are two holding companies, Shell Petroleum NV and the Shell Petroleum Company Limited, whose shares are owned 60 percent by Royal Dutch and 40 percent by "Shell" Transport and Trading. The holding companies, in turn, hold shares in and administer the subsidiary service companies and operating companies around the world, which engage in oil, petrochemical, and associated industries, from research and exploration to production and marketing. Several companies also deal in metals, nuclear energy, solar energy, coal, and consumer products. |
|
American Petroleum Institute Major national trade association representing petroleum industry efforts in exploration and production, transportation, refining, and marketing. |
|
Viacom One of the largest and foremost communications and media conglomerates in the world. Founded in 1971, the present form of the corporation dates from 1994 when Viacom Inc., which owned radio and television stations and cable television programming services and systems, acquired the entertainment and publishing giant Paramount Communications Inc. and then merged with the video and music retailer Blockbuster Entertainment Corp. Headquarters are in New York City. |
|
General Electric GE is a major American corporation and one of the largest and most diversified corporations in the world. Its products include electrical and electronic equipment, plastics, aircraft engines, medical imaging equipment, and financial services. The company was incorporated in 1892, and in 1986 GE purchased the RCA Corporation including the RCA-owned television network, the National Broadcasting Company, Inc. In 1987, however, GE sold RCA's consumer electronics division to Thomson SA, a state-owned French firm, and purchased Thomson's medical technology division. In 1989 GE agreed to combine its European business interests in appliances, medical systems, electrical distribution, and power systems with the unrelated British corporation General Electric Company. Headquarters are in Fairfield, Conn., U.S. |
|