Satyrs, Frankenstein, Machine Men, Cyborgs

The idea of hybrid beings between man and non-human entities can be traced back to mythology: mythologies, European and non-European are populated with beings which are both human and non-human, and which, because of this non-humanness, have served as reference points in the human endeavour of understanding what it means to be human. Perhaps "being human" is not even a meaningful phrase without the possibility to identify ourselves also with the negation of humanness, that is, to be human through the very possibility of identification with the non-human.

While in classical mythology, such being were usually between the man and animal kingdoms, or between the human and the divine, the advent of modern technology in the past two centuries has countered any such irrational representations of humanness. The very same supremacy of rationality which deposited the hybrid beings of mythology (and of religion) on the garbage heap of the modern period and which attempted a "pure" understanding of humanness, has also been responsible for the rapid advance of technology and which in turn prepared a "technical" understanding of the human.

The only non-human world which remains beyond the animal and divine worlds is the world of technology. The very attempt of a purist definition of the human ran encountered difficulty; the theories of Darwin and Freud undermined the believe that there was something essentially human in human beings, something that could be defined without references to the non-human.

Early representations of half man - half machine creatures echo the fear of the violent use of machinery, as in wars. Mary Shelley published Frankenstein in 1818, only a few years after the end of the Napoleonic wars. But machines are not only a source of fear exploited in fiction literature, their power and makes their non-humanness super-humanness. The French philosopher and doctor Julien de La Mettrie argues in his famous Machine Man that human beings are essentially constructed like machines and that they obey to the same principles. Machine Man provides a good example of how the ideas of the Enlightenment of human autonomy are interwoven with a technical discourse of perfection.

What human minds have later dreamed up about - usually hostile - artificial beings has segmented in the literary genre of science fiction. Science fiction seems to have provided the "last" protected zone for the strong emotions and hard values which in standard fiction literature would relegate a story into the realm of kitsch. Violent battles, strong heroes, daring explorations, infinity and solitude, clashes of right and wrong and whatever else makes up the aesthetic repertoire of metaphysics has survived unscathed in science fiction.

However, science fiction also seems to mark the final sequence of pure fiction: the Cyborg heroes populating this genre have transcended the boundary between fact and fiction, ridiculing most established social theories of technology based on technological instrumentalism. Donna Haraway has gone a long way in coming to terms with the cultural and social implications of this development. "By the late twentieth century, our time, a mythic time, we are all chimeras, theorized and fabricated hybrids of machine and organism; in short, we are cyborgs", Haraway states in her Cyborg Manifesto. In cyber culture, the boundaries between organisms and machines, between nature and culture become as ambivalent as the borderline between he physical and the non-physical: "Our best machines are made of sunshine; they are all light and clean because they are nothing but signals".

In the Flesh Machine the Critial Art Ensemble analyses the mapping of the body, as in genetics, as one aspect of keeping state power in place, the other two aspects being the "war machine" and the "sight machine". The mapping of the flesh machine is a logical and necessary consequence of the development of the other two "machines". Cyborgisation is in the words of CEA, the "coming of age of the flesh machine", which, although it has "intersected both the sight and war machine since ancient times ... is the slowest to develop. " Representation is a necessary preliminary to violence, since "Any successful offensive military action begins with visualization and representation. The significant principle here .... is that vision equals control."

TEXTBLOCK 1/4 // URL: http://world-information.org/wio/infostructure/100437611777/100438658891
 
Positions Towards the Future of Copyright in the "Digital Age"

With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified:

Eliminate Copyright

Anti-copyrightists believe that any intellectual property should be in the public domain and available for all to use. "Information wants to be free" and copyright restricts people's possibilities concerning the utilization of digital content. An enforced copyright will lead to a further digital divide as copyright creates unjust monopolies in the basic commodity of the "information age". Also the increased ease of copying effectively obviates copyright, which is a relict of the past and should be expunged.

Enlarge Copyright

Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other core copyright industries) - and therefore recipients of the royalties - adhere to the idea of enlarging copyright. In their view the basic foundation of copyright - the response to the need to provide protection to authors so as to give them an incentive to invest the time and effort required to produce creative works - is also relevant in a digital environment.

TEXTBLOCK 2/4 // URL: http://world-information.org/wio/infostructure/100437611725/100438659711
 
ECHELON Facts

What: A highly automated global system and surveillance network for processing data retrieved through interception of communication traffic from all over the world. In the days of the cold war, ECHELON's primary purpose was to keep an eye/ear on the U.S.S.R. In the wake of the fall of the U.S.S.R. ECHELON is officially said to being used to fight terrorism ann crimes, but it seems to be evident that the main focus lies in political and economic espionage.

When: ECHELON had been rumored to be in development since 1947, the result of the UKUSA treaty signed by the governments of the United States, the United Kingdom, Canada, Australia and New Zealand.



Who: It is coordinated by the NSA, with participation of the CIA, USAF, NSG, GCHQ, DSD, CSE, GCSB. It seems that NSA is the only "contractor" who has access to the whole of information, whereas the other participants only get a comparingly small portion of information.

Where: Headquarters of the ECHELON system are at Fort Meade in Maryland, which is the NSA Headquarter. The NSA operates many interception stations all over the world, with or without the knowledge of the host country.

How: Each station in the ECHELON network has computers that automatically search through millions of intercepted data for containing pre-programmed keywords or fax, telex and email addresses. Every word of every message is

automatically searched. Computers that can search for keywords have existed since at least the 1970s, but the ECHELON system has been designed to interconnect all these computers and allow the stations to function as components of an integrated whole.

The scale of the collection system was described by the former Director of the NSA, Vice Admiral William Studeman, in 1992 (http://www.menwithhill.com/find.html). At that time the NSA's collection system generated about 2 million intercepted messages per hour. Of these, all but about 13,000 an hour were discarded. Of these about 2,000 met forwarding criteria, of which some 20 are selected by analysts, who then write 2 reports for further distribution. Therefore, in 1992 MenwithHillSation was intercepting 17.5 billion messages a year. Of these some 17.5 million may have been studied for analysis.

How much: ECHELON justifies obviousely multi-billion dollar expenses. But no detailed figures are available yet.

TEXTBLOCK 3/4 // URL: http://world-information.org/wio/infostructure/100437611746/100438658879
 
Timeline 1900-1970 AD

1913 the wheel cipher gets re-invented as a strip

1917 William Frederick Friedman starts working as a cryptoanalyst at Riverbank Laboratories, which also works for the U.S. Government. Later he creates a school for military cryptoanalysis

- an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys

1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin

- Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected

1919 Hugo Alexander Koch invents a rotor cipher machine

1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded

1923 Arthur Scherbius founds an enterprise to construct and finally sell his Enigma machine for the German Military

late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly

1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts

1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939

1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of William Frederick Friedman. As the Japanese were unable to break the US codes, they imagined their own codes to be unbreakable as well - and were not careful enough.

1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett

- at the same time the British develop the Typex machine, similar to the German Enigma machine

1943 Colossus, a code breaking computer is put into action at Bletchley Park

1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type

1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems

1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ)

late 1960's the IBM Watson Research Lab develops the Lucifer cipher

1969 James Ellis develops a system of separate public-keys and private-keys

TEXTBLOCK 4/4 // URL: http://world-information.org/wio/infostructure/100437611776/100438658921
 
Frankenstein

Written by Mary Shelley, Frankenstein tells the story of a doctor who builds a creature half man and half machine. While at first the creature is celebrated a s big success, it soon realizes that it is awakens fear among humans. As a result of the growing distance between Frankenstein's creature and the people, its longing for love and affection remains unfulfilled. Frankenstein's creature eventually turns hostile to its human environment and kills its own maker.

http://www.boutell.com/frankenstein/

http://www.boutell.com/frankenstein/
INDEXCARD, 1/6
 
ARPAnet

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of wide area networks, the possibility of remote computing, it was created for resource sharing between research institutions, not for messaging services like E-mail. Although research was sponsored by US military, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute.

But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers offered a general public access to NSFnet. Beginning in 1995, after having become the backbone of the Internet in the USA, NSFnet was turned over to a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA commercial users already outnumbered military and academic users in 1994.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

INDEXCARD, 2/6
 
DMCA

The DMCA (Digital Millennium Copyright Act) was signed into law by U.S. President Clinton in 1998 and implements the two 1996 WIPO treaties (WIPO Performances and Phonograms Treaty and WIPO Copyright Treaty). Besides other issues the DMCA addresses the influence of new technologies on traditional copyright. Of special interest in the context of the digitalization of intellectual property are the titles no. 2, which refers to the limitation on the liability of online service providers for copyright infringement (when certain conditions are met), no. 3, that creates an exemption for making a copy of a computer program in case of maintenance and repair, and no. 4 which is concerned with the status of libraries and webcasting. The DCMA has been widely criticized for giving copyright-holders even more power and damage the rights and freedom of consumers, technological innovation, and the free market for information.

INDEXCARD, 3/6
 
Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet.

More detailed information can be found here

http://www.anu.edu/people/Roger.Clarke/II/Pri...
INDEXCARD, 4/6
 
Cyborg manifesto

The full title of Dona Haraway's Cyborg Manifesto is "A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century", published by Routledge, New York, in 1991. Online e excerpts of this classic are located at

http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html

http://www.stanford.edu/dept/HPS/Haraway/Cybo...
INDEXCARD, 5/6
 
Netiquette

Although referred to as a single body of rules, there is not just one Netiquette, but there are several, though overlapping largely. Proposing general guidelines for posting messages to newsgroups and mailing lists and using the World Wide Web and FTP, Netiquettes address civility topics (i.e., avoiding hate speech) and comprise technical advises (i.e., using simple and platform-independent file formats).
Well-known Netiquettes are the Request for Comment #1855 and The Net: User Guidelines and Netiquette by Arlene H. Rinaldi.

ftp://ftp.isi.edu/in-notes/rfc1855.txt
http://www.fau.edu/netiquette/net/index.html
INDEXCARD, 6/6