Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: | ||||||||||||||||
| ||||||||||||||||
Biometrics applications: physical access This is the largest area of application of biometric technologies, and the most direct lineage to the feudal gate keeping system. Initially mainly used in military and other "high security" territories, physical access control by biometric technology is spreading into a much wider field of application. Biometric access control technologies are already being used in schools, supermarkets, hospitals and commercial centres, where the are used to manage the flow of personnel. Biometric technologies are also used to control access to political territory, as in immigration (airports, Mexico-USA border crossing). In this case, they can be coupled with camera surveillance systems and artificial intelligence in order to identify potential suspects at unmanned border crossings. Examples of such uses in remote video inspection systems can be found at A gate keeping system for airports relying on digital fingerprint and hand geometry is described at An electronic reconstruction of feudal gate keeping capable of singling out high-risk travellers from the rest is already applied at various border crossing points in the USA. "All enrolees are compared against national lookout databases on a daily basis to ensure that individuals remain low risk". As a side benefit, the economy of time generated by the inspection system has meant that "drug seizures ... have increased since Inspectors are able to spend more time evaluating higher risk vehicles". However, biometric access control can not only prevent people from gaining access on to a territory or building, they can also prevent them from getting out of buildings, as in the | ||||||||||||||||
| ||||||||||||||||
1500 - 1700 A.D. 1588 Agostino Ramelli designed a "reading wheel", which allowed browsing through a large number of documents without moving from one spot to another. The device presented a large number of books - a small library - laid open on lecterns on a kind of ferry-wheel. It allowed skipping chapters and browsing through pages by turning the wheel to bring lectern after lectern before the eyes. Ramelli's reading wheel thus linked ideas and texts and reminds of today's browsing software used to navigate the 1597 The first newspaper is printed in Europe. | ||||||||||||||||
| ||||||||||||||||
What is the Internet? Each definition of the Internet is a simplified statement and runs the risk of being outdated within a short time. What is usually referred to as the Internet is a network of thousands of computer networks (so called autonomous systems) run by governmental authorities, companies, and universities, etc. Generally speaking, every time a user connects to a computer networks, a new Internet is created. Technically speaking, the Internet is a What constitutes the Internet is constantly changing. Certainly the state of the future Net will be different to the present one. Some years ago the Internet could still be described as a network of computer networks using a common communication protocol, the so-called Also, the Internet is not solely constituted by computers connected to other computers, because there are also point-of-sale terminals, cameras, robots, telescopes, cellular phones, TV sets and and an assortment of other hardware components that are connected to the Internet. At the core of the Internet are so-called Since these networks are often privately owned, any description of the Internet as a public network is not an accurate. It is easier to say what the Internet is not than to say what it is. On 24 October, 1995 the U.S. What is generally and in a simplyfiying manner called the Internet, may be better referred to as the Matrix, a term introduced by science fiction writer Strictly speaking, the Matrix is not a medium; it is a platform for resources: for media and services. The Matrix is mainly a very powerful means for making information easily accessible worldwide, for sending and receiving messages, videos, texts and audio files, for transferring funds and trading securities, for sharing resources, for collecting weather condition data, for For a comprehensive view of uses of the Matrix, especially the World Wide Web, see " | ||||||||||||||||
| ||||||||||||||||
Znet ZNet provides forum facilities for online discussion and chatting on various topics ranging from culture and ecology to international relations and economics. ZNet also publishes daily commentaries and maintains a Web-zine, which addresses current news and events as well as many other topics, trying to be provocative, informative and inspiring to its readers. Strategies and Policies Daily Commentaries: Znet's commentaries address current news and events, cultural happenings, and organizing efforts, providing context, critique, vision, and analysis, but also references to or reviews of broader ideas, new books, activism, the Internet, and other topics that strike the diverse participating authors as worthy of attention. Forum System: Znet provides a private (and soon also a public) forum system. The fora are among others concerned with topics such as: activism, cultural, community/race/religion/ethnicity, ecology, economics/class, gender/kinship/sexuality, government/polity, international relations, ParEcon, vision/strategy and popular culture. Each forum has a set of threaded discussions, also the fora hosted by commentary writers like Chomsky, Ehrenreich, Cagan, Peters and Wise. ZNet Daily WebZine: ZNet Daily WebZine offers commentaries in web format. Z Education Online (planned): The Z Education Online site will provide instructionals and courses of diverse types as well as other university-like, education-aimed features. | ||||||||||||||||
| ||||||||||||||||
Iris recognition Iris recognition relies upon the fact that every individuals retina has a unique structure. The iris landscape is composed of a corona, crypts, filaments, freckles, pits radial furrows and striatations. Iris scanning is considered a particularly accurate identification technology because the characteristics of the iris do not change during a persons lifetime, and because there are several hundred variables in an iris which can be measured. In addition, iris scanning is fast: it does not take longer than one or two seconds. These are characteristics which have made iris scanning an attractive technology for high-security applications such as prison surveillance. Iris technology is also used for online identification where it can substitute identification by password. As in other biometric technologies, the use of iris scanning for the protection of privacy is a two-edged sword. The prevention of identity theft applies horizontally but not vertically, i.e. in so far as the data retrieval that accompanies identification and the data body which is created in the process has nothing to do with identity theft. | ||||||||||||||||
| ||||||||||||||||
Biometric technologies In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" ( All biometric technologies are made up of the same basic processes: 1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question. 2. At every new identification, a second sample is collected and its identity with the first one is examined. 3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is. This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body. | ||||||||||||||||
| ||||||||||||||||
The "Corpse-Conversion Factory"-rumor Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. ( | ||||||||||||||||
| ||||||||||||||||
Further Tools: Photography Art has always contributed a lot to disinformation. Many modern tools for disinformation are used in art/photography. Trillions of photographs have been taken in the 20th century. Too many to look at, too many to control them and their use. A paradise for manipulation. We have to keep in mind: There is the world, and there exist pictures of the world, which does not mean that both are the same thing. Photographs are not objective, because the photographer selects the part of the world which is becoming a picture. The rest is left out. Some tools for manipulation of photography are: morphing (71) wet operation (73) neutralizing (74) masks (75) damnatio memoriae (78) Some of those are digital ways of manipulation, which helps to change pictures in many ways without showing the manipulation. Pictures taken from the internet could be anything and come from anywhere. To proof the source is nearly impossible. Therefore scientists created on watermarks for pictures, which make it impossible to "steal" or manipulate a picture out of the net. | ||||||||||||||||
| ||||||||||||||||
Late 1960s - Early 1970s: Third Generation Computers One of the most important advances in the development of computer hardware in the late 1960s and early 1970s was the invention of the Another type of computer developed at the time was the minicomputer. It profited from the progresses in microelectronics and was considerably smaller than the standard mainframe, but, for instance, powerful enough to control the instruments of an entire scientific laboratory. Furthermore | ||||||||||||||||
| ||||||||||||||||
Biometric applications: surveillance Biometric technologies are not surveillance technologies in themselves, but as identification technologies they provide an input into surveillance which can make such as face recognition are combined with camera systems and criminal data banks in order to supervise public places and single out individuals. Another example is the use of biometrics technologies is in the supervision of probationers, who in this way can carry their special hybrid status between imprisonment and freedom with them, so that they can be tracked down easily. Unlike biometric applications in access control, where one is aware of the biometric data extraction process, what makes biometrics used in surveillance a particularly critical issue is the fact that biometric samples are extracted routinely, unnoticed by the individuals concerned. | ||||||||||||||||
| ||||||||||||||||
Challenges for Copyright by ICT: Introduction Traditional copyright and the practice of paying Yet again new technologies have altered the way of how (copyrighted) works are produced, copied, made obtainable and distributed. The emergence of global electronic networks and the increased availability of digitalized intellectual property confront existing copyright with a variety of questions and challenges. Although the combination of several types of works within one larger work or on one data carrier, and the digital format (although this may be a recent development it has been the object of detailed legal scrutiny), as well as networking (telephone and cable networks have been in use for a long time, although they do not permit interactivity) are nothing really new, the circumstance that recent technologies allow the presentation and storage of text, sound and visual information in digital form indeed is a novel fact. Like that the entire information can be generated, altered and used by and on one and the same device, irrespective of whether it is provided online or offline. | ||||||||||||||||
| ||||||||||||||||
Palm recognition In palm recognition a 3-dimensional image of the hand is collected and compared to the stored sample. Palm recognition devices are cumbersome artefacts (unlike fingerprint and iris recognition devices) but can absorb perform a great amount of identification acts in a short time. They are therefore preferably installed in situations where a large number of people is identified, as in airports. | ||||||||||||||||
| ||||||||||||||||
Other biometric technologies Other biometric technologies not specified here include ear recognition, signature dynamics, key stroke dynamics, vein pattern recognition, retinal scan, body odour recognition, and DNA recognition. These are technologies which are either in early stages of development or used in highly specialised and limited contexts. | ||||||||||||||||
| ||||||||||||||||
Timeline 1600 - 1900 AD 17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card - Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians - the English scientist, magician and astrologer 1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally. 1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code 18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day. 1790's Thomas Jefferson and Robert Patterson invent a wheel cipher 1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs 1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844. 1834 the 1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then 1854 the Playfair cipher is invented by Sir Charles Wheatstone 1859 for the first time a tomographic cipher gets described 1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages 1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army 1895 the invention of the radio changes cryptography-tasks again and makes them even more important | ||||||||||||||||
| ||||||||||||||||
Internet, Intranets, Extranets, and Virtual Private Networks With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term Cable TV networks and online services as Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Electronic Communications Networks as | ||||||||||||||||
| ||||||||||||||||
Who owns the Internet and who is in charge? The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet. The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g. Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed. For a detailed report on Internet governance, click here. | ||||||||||||||||
| ||||||||||||||||
Racism on the Internet The internet can be regarded as a mirror of the variety of interests, attitudes and needs of human kind. Propaganda and disinformation in that way have to be part of it, whether they struggle for something good or evil. But the classifications do no longer function. During the last years the internet opened up a new source for racism as it can be difficult to find the person who gave a certain message into the net. The anarchy of the internet provides racists with a lot of possibilities to reach people which they do not possess in other media, for legal and other reasons. In the 1980s racist groups used mailboxes to communicate on an international level; the first ones to do so were supposedly the A complete network of anti-racist organizations, including a high number of websites are fighting against racism. For example: | ||||||||||||||||
| ||||||||||||||||
fingerprint identification Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion. As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment. Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device ( As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies. | ||||||||||||||||
| ||||||||||||||||
The 2nd Chechnya-War In the summer of 1999 between 1.200 and 2.000 Muslim rebels from Chechnya fell into Dagestan. Rumors say that Russian soldiers closed their eyes pretending not to see anything. During the fightings that started soon, many persons got killed. The hole issue was blamed on Chechnya. At that time there were rumors that there would be heavy bombing in Moscow in September. And there was. Those two things together brought back the hatred against the Chechnya rebels. The 2nd War between Russia and the Muslim country began. While the first war was lost at home, because the Russians, especially mothers, did not understand why their sons should fight against Chechnya, this time the atmosphere was completely different. In the cities 85% and all over Russia 65% of the Russian population agreed with the war. This time the war was a national issue, a legitimate defense. The media emphasized this. Alexander Zilin, a journalist, found out that the truth was far from the one presented in the media: First of all there was no evidence that the Moscow-bombings were organized by Chechnyans. On the contrary it is more than probable that the crimes were organized by a governmental institution for national security. The disinformation was part of the strategy to make the population support another war with Chechnya. The media were part of the story, maybe without knowing. They kept on the government's and army's side, showing only special and patriotic parts of the war. For example the number of dead Russian soldiers was held back. The U.S.-behavior on this: The USA would like to intervene but they are afraid of ruining the weak relation to Russia. For years the main topic of U.S.-politics has been the struggle against terrorism. Now Russia pretends to be fighting terrorism. How could it be criticized for that? The reason for this war is rather cynical: it worked as a public relations-campaign for At the same time a propaganda-campaign against his rival Y. Primakov (98), formerly the most popular candidate, was spreading lies and bad rumors. Opinion-polls showed very fast that he had lost the elections because of this black propaganda, even before the elections took place. | ||||||||||||||||
| ||||||||||||||||
Global hubs of the data body industry While most data bunkers are restricted to particular areas or contexts, there are others which act as global data nodes. Companies such as
The size of these data repositories is constantly growing, so it is only a matter of time when everybody living in the technologically saturated part of the world will be registered in one of these data bunkers. Among these companies, For many years, EDS has been surrounded by rumours concerning sinister involvement with intelligence agencies. Beyond the rumours, though, there are also facts. EDS has a special division for | ||||||||||||||||
| ||||||||||||||||
Internet Relay Chat (IRC) IRC is a text-based chat system used for live discussions of groups. For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, | ||||||||||||||||
| ||||||||||||||||
Aeneas Tacticus Supposedly his real name was Aeneas of Stymphalus. He was a Greek military scientist and cryptographer. He invented an optical system for communication similar to a telegraph: the | ||||||||||||||||
| ||||||||||||||||
John Dee b. July 13, 1527, London, England d. December 1608, Mortlake, Surrey English alchemist, astrologer, and mathematician who contributed greatly to the revival of interest in mathematics in England. After lecturing and studying on the European continent between 1547 and 1550, Dee returned to England in 1551 and was granted a pension by the government. He became astrologer to the queen, Mary Tudor, and shortly thereafter was imprisoned for being a magician but was released in 1555. Dee later toured Poland and Bohemia (1583-89), giving exhibitions of magic at the courts of various princes. He became warden of Manchester College in 1595. | ||||||||||||||||
| ||||||||||||||||
Artificial Intelligence Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support Yahoo AI sites: MIT AI lab: | ||||||||||||||||
| ||||||||||||||||
1996 WIPO Copyright Treaty (WCT) The 1996 | ||||||||||||||||
| ||||||||||||||||
Machine language Initially computer programmers had to write instructions in machine language. This | ||||||||||||||||
| ||||||||||||||||
Cisco, Inc. Being the worldwide leader in networking for the Internet, Cisco Systems is one of the most prominent companies of the Internet industry. http://www.cisco.com | ||||||||||||||||
| ||||||||||||||||
Internet Protocol Number (IP Number) Every computer using IP numbers are divided into three classes. Class A is restricted for big-sized organizations, Class B to medium-sized ones as universities, and Class C is dedicated to small networks. Because of the increasing number of networks worldwide, networks belonging together, as | ||||||||||||||||
| ||||||||||||||||
Terrestrial antennas Microwave transmission systems based on terrestrial antennas are similar to satellite transmission system. Providing reliable high-speed access, they are used for cellular phone networks. The implementation of the | ||||||||||||||||
| ||||||||||||||||
Next Generation Internet Program A research and development program funded by the US government. Goal is the development of advanced networking technologies and applications requiring advanced networking with capabilities that are 100 to 1,000 times faster end-to-end than today's Internet. http://www.ngi.gov | ||||||||||||||||
| ||||||||||||||||
First Amendment Handbook The First Amendment to the US Constitution, though short, lists a number of rights. Only a handful of words refer to freedoms of speech and the press, but those words are of incalculable significance. To understand the current subtleties and controversies surrounding this right, check out this First Amendment site. This detailed handbook of legal information, mostly intended for journalists, should be of interest to anyone who reads or writes. For example, the chapter Invasion of Privacy shows the limits of First Amendment rights, and the balance between the rights of the individual and the rights of the public - or, more crudely, the balance of Tabloid vs. Celebrity. Each section is carefully emended with relevant legal decisions. http://www.rcfp.org/handbook/viewpage.cgi | ||||||||||||||||
| ||||||||||||||||
DES The U.S. Data Encryption Standard (= DES) is the most widely used encryption algorithm, especially used for protection of financial transactions. It was developed by IBM in 1971. It is a symmetric-key cryptosystem. The DES algorithm uses a 56-bit encryption key, meaning that there are 72,057,594,037,927,936 possible keys. for more information see: | ||||||||||||||||
| ||||||||||||||||
WTO An international organization designed to supervise and liberalize world trade. The WTO (World Trade Organization) is the successor to the General Agreement on Tariffs and Trade (GATT), which was created in 1947 and liberalized the world's trade over the next five decades. The WTO came into being on Jan. 1, 1995, with 104 countries as its founding members. The WTO is charged with policing member countries' adherence to all prior GATT agreements, including those of the last major GATT trade conference, the Uruguay Round (1986-94), at whose conclusion GATT had formally gone out of existence. The WTO is also responsible for negotiating and implementing new trade agreements. The WTO is governed by a Ministerial Conference, which meets every two years; a General Council, which implements the conference's policy decisions and is responsible for day-to-day administration; and a director-general, who is appointed by the Ministerial Conference. The WTO's headquarters are in Geneva, Switzerland. | ||||||||||||||||
| ||||||||||||||||
cryptology also called "the study of code". It includes both, cryptography and cryptoanalysis | ||||||||||||||||
| ||||||||||||||||
Framing Framing is the practice of creating a frame or window within a web page where the content of a different web page can be display. Usually when a link is clicked on, the new web page is presented with the reminders of the originating page. | ||||||||||||||||
| ||||||||||||||||
Bulletin Board Systems A BBS (bulletin board system) is a computer that can be reached by computer modem dialing (you need to know the phone number) or, in some cases, by Bulletin board systems originated and generally operate independently of the Internet. Source: Whatis.com | ||||||||||||||||
| ||||||||||||||||
CIA CIA's mission is to support the President, the National Security Council, and all officials who make and execute U.S. national security policy by: Providing accurate, comprehensive, and timely foreign intelligence on national security topics; Conducting counterintelligence activities, special activities, and other functions related to foreign intelligence and national security, as directed by the President. To accomplish its mission, the CIA engages in research, development, and deployment of high-leverage technology for intelligence purposes. As a separate agency, CIA serves as an independent source of analysis on topics of concern and works closely with the other organizations in the Intelligence Community to ensure that the intelligence consumer--whether Washington policymaker or battlefield commander--receives the adaequate intelligence information. http://www.cia.gov | ||||||||||||||||
| ||||||||||||||||
IBM IBM (International Business Machines Corporation) manufactures and develops cumputer hardware equipment, application and sysem software, and related equipment. IBM produced the first PC (Personal Computer), and its decision to make Microsoft DOS the standard operating system initiated Microsoft's rise to global dominance in PC software. Business indicators: 1999 Sales: $ 86,548 (+ 7,2 % from 1998) Market capitalization: $ 181 bn Employees: approx. 291,000 Corporate website: | ||||||||||||||||
| ||||||||||||||||
User tracking User tracking is a generic term that covers all the techniques of monitoring the movements of a user on a web site. User tracking has become an essential component in online commerce, where no personal contact to customers is established, leaving companies with the predicament of not knowing who they are talking to. Some companies, such as Whenever user tracking is performed without the explicit agreement of the user, or without laying open which data are collected and what is done with them, considerable | ||||||||||||||||
| ||||||||||||||||
Royalties Royalties refer to the payment made to the owners of certain types of rights by those who are permitted by the owners to exercise the rights. The | ||||||||||||||||
| ||||||||||||||||
Gateway A gateway is a computer supplying point-to-multipoint connections between computer networks. | ||||||||||||||||
| ||||||||||||||||
Adi Shamir Adi Shamir was one of three persons in a team to invent the | ||||||||||||||||
| ||||||||||||||||