Identificaiton in history In biometric technology, the subject is reduced to its physical and therefore inseparable properties. The subject is a subject in so far as it is objectified; that is, in so far as is identified with its own res extensa, Descartes' "extended thing". The subject exists in so far as it can be objectified, if it resists the objectification that comes with measurement, it is rejected or punished. Biometrics therefore provides the ultimate tool for control; in it, the dream of hermetic identity control seems to become a reality, a modern technological reconstruction of traditional identification techniques such as the handshake or the look into somebody's eyes. The use of identification by states and other institutions of authority is evidently not simply a modern phenomenon. The ancient Babylonians and Chinese already made use of finger printing on clay to identify authors of documents, while the Romans already systematically compared handwritings. Body measurement has long been used by the military. One of the first measures after entering the military is the identification and appropriation of the body measurements of a soldier. These measurements are filed and combined with other data and make up what today we would call the soldier's data body. With his data body being in possession of the authority, a soldier is no longer able freely socialise and is instead dependent on the disciplinary structure of the military institution. The soldier's social being in the world is defined by the military institution. However, the military and civilian spheres of modern societies are no longer distinct entities. The very ambivalence of advanced technology (dual use technologies) has meant that "good" and "bad" uses of technology can no longer be clearly distinguished. The measurement of physical properties and the creation of data bodies in therefore no longer a military prerogative, it has become diffused into all areas of modern societies. If the emancipatory potential of weak identities is to be of use, it is therefore necessary to know how biometric technologies work and what uses they are put to. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
2000 A.D. 2000 Digital technologies are used to combine previously separated communication and media systems such as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence". Classical dichotomies as the one of computing and telephony and traditional categorizations no longer apply, because these new services no longer fit traditional categories. Convergence and Regulatory Institutions Digital technology permits the integration of telecommunications with computing and audiovisual technologies. New services that extend existing communication systems emerge. The convergence of communication and media systems corresponds to a convergence of corporations. Recently, For further information on this issue see Natascha Just and Michael Latzer, The European Policy Response to Convergence with Special Consideration of Competition Policy and Market Power Control, http://www.soe.oeaw.ac.at/workpap.htm or | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Private data bunkers On the other hand are the data bunkers of the private sector, whose position is different. Although these are fast-growing engines of data collection with a much greater degree of dynamism, they may not have the same privileged position - although one has to differentiate among the general historical and social conditions into which a data bunker is embedded. For example, it can safely be assumed that the databases of a large credit card company or bank are more protected than the bureaucracies of small developing countries. Private data bunkers include
Credit bureaus Credit card companies Direct marketing companies Insurance companies Telecom service providers Mail order stores Online stores | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Who owns the Internet and who is in charge? The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet. The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g. Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed. For a detailed report on Internet governance, click here. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Databody convergence In the phrase "the rise of the citizen as a consumer", to be found on the When the citizen becomes a consumer, the state must become a business. In the data body business, the key word behind this new identity of government is "outsourcing". Functions, that are not considered core functions of government activity are put into the hands of private contractors. There have long been instances where privately owned data companies, e.g. credit card companies, are allowed access to public records, e.g. public registries or electoral rolls. For example, in a normal credit card transaction, credit card companies have had access to public records in order to verify identity of a customer. For example, in the UK citizen's personal data stored on the Electoral Roll have been used for commercial purposes for a long time. The new British Data Protection Act now allows people to "opt out" of this kind of commercialisation - a legislation that has prompted protests on the part of the data industry: While this may serve as an example of an increased public awareness of privacy issues, the trend towards outsourcing seems to lead to a complete breakdown of the barriers between commercial and public use of personal data. This trend can be summarised by the term "outsourcing" of government functions. Governments increasingly outsource work that is not considered core function of government, e.g. cooking meals in hospitals or mowing lawns in public parks. Such peripheral activities marked a first step of outsourcing. In a further step, governmental functions were divided between executive and judgemental functions, and executive functions increasingly entrusted to private agencies. For these agencies to be able to carry out the work assigned to them, the need data. Data that one was stored in public places, and whose handling was therefore subject to democratic accountability. Outsourcing has produced gains in efficiency, and a decrease of accountability. Outsourced data are less secure, what use they are put to is difficult to control. The world's largest data corporation, Technically the linking of different systems is already possible. It would also create more efficiency, which means generate more income. The question, then, whether democracy concerns will prevent it from happening is one that is capable of creating But what the EDS example shows is something that applies everywhere, and that is that the data industry is whether by intention or whether by default, a project with profound political implications. The current that drives the global economy deeper and deeper into becoming a global data body economy may be too strong to be stopped by conventional means. However, the convergence of political and economic data bodies also has technological roots. The problem is that politically motivated surveillance and economically motivated data collection are located in the same area of information and communication technologies. For example, monitoring internet use requires more or less the same technical equipment whether done for political or economic purposes. Data mining and data warehousing techniques are almost the same. Creating transparency of citizens and customers is therefore a common objective of intelligence services and the data body industry. Given that data are exchanged in electronic networks, a compatibility among the various systems is essential. This is another factor that encourages "leaks" between state-run intelligence networks and the private data body business. And finally, given the secretive nature of state intelligence and commercial data capturing , there is little transparency. Both structures occupy an opaque zone. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
0 - 1400 A.D. 150 A The Roman smoke signals network consisted of towers within a visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling. For a similar telegraph network in ancient Greece see About 750 In Japan block printing is used for the first time. 868 In China the world's first dated book, the Diamond Sutra, is printed. 1041-1048 In China moveable types made from clay are invented. 1088 The first of the great medieval universities was established in Bologna. At the beginning universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so that you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Feeding the data body | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Data bunkers Personal data are collected, appropriated, processed and used for commercial purposes on a global scale. In order for such a global system to operate smoothly, there a server nodes at which the data streams converge. Among the foremost of these are the data bases of credit card companies, whose operation has long depended on global networking. On top of credit card companies such as Visa, American Express, Master Card, and others. It would be erroneous to believe that the primary purpose of business of these companies is the provision of credit, and the facilitation of credit information for sale transactions. In fact, Information means much more than just credit information. In an advertisement of 1982, American Express described itself in these terms: ""Our product is information ...Information that charges airline tickets, hotel rooms, dining out, the newest fashions ...information that grows money funds buys and sells equities ...information that pays life insurance annuities ...information that schedules entertainment on cable television and electronically guards houses ...information that changes kroners into guilders and figures tax rates in Bermuda ..." Information has become something like the gospel of the New Economy, a doctrine of salvation - the life blood of society, as Bill Gates expresses it. But behind information there are always data that need to be generated and collected. Because of the critical importance of data to the economy, their possession amounts to power and their loss can cause tremendous damage. The data industry therefore locates its data warehouses behind fortifications that bar physical or electronic access. Such structures are somewhat like a digital reconstruction of the medieval fortress Large amounts of data are concentrated in fortress-like structures, in data bunkers. As the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Global data bodies - intro - Education files, insurance files, tax files, communication files, consumption files, medical files, travel files, criminal files, investment files, files into infinity ... Critical Art Ensemble Global data bodies 1. Introduction Informatisation has meant that things that once were "real", i.e. whose existence could be experienced sensually, are becoming virtual. Instead of the real existence of a thing, the virtual refers to its possibility of existence. As this process advances, an increasing identification of the possible with the real occurs. Reality migrates into a dim and dematerialised grey area. In the end, the possible counts for the real, virtualisation creates an "as-if" experience. The experience of the body is also affected by this process. For example, in bio-technology, the human body and its functions are digitised, which prepares and understanding of the body exlusively in terms of its potential manipulation, the body becomes whatever it could be. But digitisation has not only affected the understanding and the social significance of the body, it has also altered the meaning of presence, traditionally identified with the body. The advance of information and communication technologies (ICTs) has meant that for an increasing number of activities we no longer need be physically present, our "virtual" presence, achieved by logging onto a electronic information network, is sufficient. This development, trumpeted as the pinnacle of convenience by the ICT industries and governments interested in attracting investment, has deeply problematic aspects as well. For example, when it is no longer "necessary" to be physically present, it may soon no longer be possible or allowed. Online-banking, offered to customers as a convenience, is also serves as a justification for charging higher fees from those unwilling or unable to add banking to their household chores. Online public administration may be expected to lead to similar effects. The reason for this is that the digitalisation of the economy relies on the production of surplus data. Data has become the most important raw material of modern economies. In modern economies, informatisation and virtualisation mean that people are structurally forced to carry out their business and life their lives in such a way as to generate data. Data are the most important resource for the New Economy. By contrast, activities which do not leave behind a trace of data, as for example growing your own carrots or paying cash rather than by plastic card, are discouraged and structurally suppressed. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Timeline 1900-1970 AD 1913 the wheel cipher gets re-invented as a strip 1917 - an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys 1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin - Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected 1919 Hugo Alexander Koch invents a rotor cipher machine 1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded 1923 Arthur Scherbius founds an enterprise to construct and finally sell his late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly 1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts 1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939 1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of 1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett - at the same time the British develop the Typex machine, similar to the German Enigma machine 1943 Colossus, a code breaking computer is put into action at Bletchley Park 1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type 1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems 1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ) late 1960's the IBM Watson Research Lab develops the Lucifer cipher 1969 James Ellis develops a system of separate public-keys and private-keys | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Internet, Intranets, Extranets, and Virtual Private Networks With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term Cable TV networks and online services as Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Electronic Communications Networks as | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Hill & Knowlton Although it is generally hard to distinguish between public relations and propaganda, It furthermore played a central role in the Gulf War. On behalf of the Kuwaiti government it presented a 15-year-old girl to testify before Congress about human rights violations in a Kuwaiti hospital. The girl, later found out to be the daughter of Kuwait's ambassador to the U.S., and its testimony then became the centerpiece of a finely tuned PR campaign orchestrated by Hill & Knowlton and co-ordinated with the White House on behalf of the government of Kuwait an the Citizens for a Free Kuwait group. Inflaming public opinion against Iraq and bringing the U.S. Congress in favor of war in the Gulf, this probably was one of the largest and most effective public relations campaigns in history. Running campaigns against abortion for the Catholic Church and representing the Accused of pursuing potentially illegal proxy spying operation for intelligence agencies, Richard Cheney, head of Hill & Knowltons New York office, denied this allegations, but said that "... in such a large organization you never know if there's not some sneak operation going on." On the other hand former (Source: Carlisle, Johan: Public Relationships: Hill & Knowlton, Robert Gray, and the CIA. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Intellectual Property: A Definition Intellectual property, very generally, relates to the output, which result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) Industrial Property a) b) c) d) Unfair competition (trade secrets) e) Geographical indications (indications of source and appellations of origin) 2) Copyright The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products. Those rights apply to the intellectual creation as such, and not to the physical object in which the work may be embodied. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Biometrics applications: physical access This is the largest area of application of biometric technologies, and the most direct lineage to the feudal gate keeping system. Initially mainly used in military and other "high security" territories, physical access control by biometric technology is spreading into a much wider field of application. Biometric access control technologies are already being used in schools, supermarkets, hospitals and commercial centres, where the are used to manage the flow of personnel. Biometric technologies are also used to control access to political territory, as in immigration (airports, Mexico-USA border crossing). In this case, they can be coupled with camera surveillance systems and artificial intelligence in order to identify potential suspects at unmanned border crossings. Examples of such uses in remote video inspection systems can be found at A gate keeping system for airports relying on digital fingerprint and hand geometry is described at An electronic reconstruction of feudal gate keeping capable of singling out high-risk travellers from the rest is already applied at various border crossing points in the USA. "All enrolees are compared against national lookout databases on a daily basis to ensure that individuals remain low risk". As a side benefit, the economy of time generated by the inspection system has meant that "drug seizures ... have increased since Inspectors are able to spend more time evaluating higher risk vehicles". However, biometric access control can not only prevent people from gaining access on to a territory or building, they can also prevent them from getting out of buildings, as in the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Enforcement: Copyright Management and Control Technologies With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights) Another important multilateral treaty concerned with The complete TRIPS agreement can be found on: | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Timeline 1600 - 1900 AD 17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card - Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians - the English scientist, magician and astrologer 1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally. 1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code 18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day. 1790's Thomas Jefferson and Robert Patterson invent a wheel cipher 1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs 1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844. 1834 the 1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then 1854 the Playfair cipher is invented by Sir Charles Wheatstone 1859 for the first time a tomographic cipher gets described 1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages 1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army 1895 the invention of the radio changes cryptography-tasks again and makes them even more important | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
History: "Indigenous Tradition" In preliterate societies the association of rhythmic or repetitively patterned utterances with supernatural knowledge endures well into historic times. Knowledge is passed from one generation to another. Similar as in the Southern tradition | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Legal Protection: European Union Within the EU's goal of establishing a European single market also An overview of EU activities relating to intellectual property protection is available on the website of the European Commission (DG Internal Market): | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
In Search of Reliable Internet Measurement Data Newspapers and magazines frequently report growth rates of Internet usage, number of users, hosts, and domains that seem to be beyond all expectations. Growth rates are expected to accelerate exponentially. However, Internet measurement data are anything thant reliable and often quite fantastic constructs, that are nevertheless jumped upon by many media and decision makers because the technical difficulties in measuring Internet growth or usage are make reliable measurement techniques impossible. Equally, predictions that the Internet is about to collapse lack any foundation whatsoever. The researchers at the Size and Growth In fact, "today's Internet industry lacks any ability to evaluate trends, identity performance problems beyond the boundary of a single ISP (Internet service provider, M. S.), or prepare systematically for the growing expectations of its users. Historic or current data about traffic on the Internet infrastructure, maps depicting ... there is plenty of measurement occurring, albeit of questionable quality", says K. C. Claffy in his paper Internet measurement and data analysis: topology, workload, performance and routing statistics (http://www.caida.org/Papers/Nae/, Dec 6, 1999). Claffy is not an average researcher; he founded the well-known So his statement is a slap in the face of all market researchers stating otherwise. In a certain sense this is ridiculous, because since the inception of the So what are the reasons for this inability to evaluate trends, identity performance problems beyond the boundary of a single ISP? First, in early 1995, almost simultaneously with the worldwide introduction of the "There are many estimates of the size and growth rate of the Internet that are either implausible, or inconsistent, or even clearly wrong", K. G. Coffman and Andrew, both members of different departments of What is measured and what methods are used? Many studies are devoted to the number of users; others look at the number of computers connected to the Internet or count You get the clue of their focus when you bear in mind that the Internet is just one of many networks of networks; it is only a part of the universe of computer networks. Additionally, the Internet has public (unrestricted) and private (restricted) areas. Most studies consider only the public Internet, Coffman and Odlyzko consider the long-distance private line networks too: the corporate networks, the Hosts The Despite the small sample, this method has at least one flaw: Internet Weather Like daily weather, traffic on the Internet, the conditions for data flows, are monitored too, hence called Internet weather. One of the most famous Internet Hits, Page Views, Visits, and Users Let us take a look at how these hot lists of most visited Web sites may be compiled. I say, may be, because the methods used for data retrieval are mostly not fully disclosed. For some years it was seemingly common sense to report requested files from a Web site, so called "hits". A method not very useful, because a document can consist of several files: graphics, text, etc. Just compile a document from some text and some twenty flashy graphical files, put it on the Web and you get twenty-one hits per visit; the more graphics you add, the more hits and traffic (not automatically to your Web site) you generate. In the meantime page views, also called page impressions are preferred, which are said to avoid these flaws. But even page views are not reliable. Users might share computers and corresponding Especially the editors of some electronic journals (e-journals) rely on page views as a kind of ratings or circulation measure, Rick Marin reports in the More advanced, but just slightly better at best, is counting visits, the access of several pages of a Web site during one session. The problems already mentioned apply here too. To avoid them, newspapers, e.g., establish registration services, which require password authentication and therefore prove to be a kind of access obstacle. But there is a different reason for these services. For content providers users are virtual users, not unique persons, because, as already mentioned, computers and For If you like to play around with Internet statistics instead, you can use Robert Orenstein's Measuring the Density of Measuring the Density of Dodge and Shiode used data on the ownership of IP addresses from | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Product Placement With television still being very popular, commercial entertainment has transferred the concept of soap operas onto the Web. The first of this new species of "Cybersoaps" was | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Challenges for Copyright by ICT: Digital Content Providers Providers of digital information might be confronted with copyright related problems when using some of the special features of hypertext media like Framing Frames are often used to help define, and navigate within, a content provider's website. Still, when they are used to present (copyrighted) third party material from other sites issues of passing off and misleading or deceptive conduct, as well as copyright infringement, immediately arise. Hyperlinking It is generally held that the mere creation of a hyperlink does not, of itself, infringe copyright as usually the words indicating a link or the displayed URL are unlikely to be considered a "work". Nevertheless if a link is clicked on the users browser will download a full copy of the material at the linked address creating a copy in the RAM of his computer courtesy of the address supplied by the party that published the link. Although it is widely agreed that the permission to download material over the link must be part of an implied license granted by the person who has made the material available on the web in the first place, the scope of this implied license is still the subject of debate. Another option that has been discussed is to consider linking Furthermore hyperlinks, and other "information location tools", like online directories or search engines could cause their operators trouble if they refer or link users to a site that contains infringing material. In this case it is yet unclear whether providers can be held liable for infringement. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Virtual body and data body The result of this informatisation is the creation of a virtual body which is the exterior of a man or woman's social existence. It plays the same role that the physical body, except located in virtual space (it has no real location). The virtual body holds a certain emancipatory potential. It allows us to go to places and to do things which in the physical world would be impossible. It does not have the weight of the physical body, and is less conditioned by physical laws. It therefore allows one to create an identity of one's own, with much less restrictions than would apply in the physical world. But this new freedom has a price. In the shadow of virtualisation, the data body has emerged. The data body is a virtual body which is composed of the files connected to an individual. As the The virtual character of the data body means that social regulation that applies to the real body is absent. While there are limits to the manipulation and exploitation of the real body (even if these limits are not respected everywhere), there is little regulation concerning the manipulation and exploitation of the data body, although the manipulation of the data body is much easier to perform than that of the real body. The seizure of the data body from outside the concerned individual is often undetected as it has become part of the basic structure of an informatised society. But data bodies serve as raw material for the "New Economy". Both business and governments claim access to data bodies. Power can be exercised, and democratic decision-taking procedures bypassed by seizing data bodies. This totalitarian potential of the data body makes the data body a deeply problematic phenomenon that calls for an understanding of data as social construction rather than as something representative of an objective reality. How data bodies are generated, what happens to them and who has control over them is therefore a highly relevant political question. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Late 1950s - Early 1960s: Second Generation Computers An important change in the development of computers occurred in 1948 with the invention of the Stretch by Throughout the early 1960s there were a number of commercially successful computers (for example the IBM 1401) used in business, universities, and government and by 1965 most large firms routinely processed financial information by using computers. Decisive for the success of computers in business was the stored program concept and the development of sophisticated high-level | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Legal Protection: National Legislation | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Other biometric technologies Other biometric technologies not specified here include ear recognition, signature dynamics, key stroke dynamics, vein pattern recognition, retinal scan, body odour recognition, and DNA recognition. These are technologies which are either in early stages of development or used in highly specialised and limited contexts. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Virtual cartels; mergers In parallel to the deregulation of markets, there has been a trend towards large-scale mergers which ridicules dreams of increased competition. Recent mega-mergers and acquisitions include SBC Communications - Ameritech, $ 72,3 bn Bell Atlantic - GTE, $ 71,3 AT&T - Media One, $ 63,1 AOL - Time Warner, $ 165 bn MCI Worldcom - Spring, $ 129 bn The total value of all major mergers since the beginnings of the 1990s has been 20 trillion Dollars, 2,5 times the size of the USA's GIP. The AOL- Time Warner reflects a trend which can be observed everywhere: the convergence of the ICT and the content industries. This represents the ultimate advance in complete market domination, and a alarming threat to independent content. "Is TIME going to write something negative about AOL? Will AOL be able to offer anything other than CNN sources? Is the Net becoming as silly and unbearable as television?" (Detlev Borchers, journalist) | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Biometrics applications: gate keeping Identity has to do with "place". In less mobile societies, the place where a person finds him/herself tells us something about his/her identity. In pre-industrial times, gatekeepers had the function to control access of people to particular places, i.e. the gatekeepers function was to identify people and then decide whether somebody's identity would allow that person to physically occupy another place - a town, a building, a vehicle, etc. In modern societies, the unambiguous nature of place has been weakened. There is a great amount of physical mobility, and ever since the emergence and spread of electronic communication technologies there has been a "virtualisation" of places in what today we call "virtual space" (unlike place, space has been a virtual reality from the beginning, a mathematical formula) The question as to who one is no longer coupled to the physical abode. Highly mobile and virtualised social contexts require a new generation of gatekeepers which biometric technology aims to provide. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Biometric applications: surveillance Biometric technologies are not surveillance technologies in themselves, but as identification technologies they provide an input into surveillance which can make such as face recognition are combined with camera systems and criminal data banks in order to supervise public places and single out individuals. Another example is the use of biometrics technologies is in the supervision of probationers, who in this way can carry their special hybrid status between imprisonment and freedom with them, so that they can be tracked down easily. Unlike biometric applications in access control, where one is aware of the biometric data extraction process, what makes biometrics used in surveillance a particularly critical issue is the fact that biometric samples are extracted routinely, unnoticed by the individuals concerned. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Transparent customers. Direct marketing online This process works even better on the Internet because of the latter's interactive nature. "The Internet is a dream to direct marketers", said Wil Lansing, CEO of the American retailer Many web sites also are equipped with One frequent way of obtaining such personal information of a user is by offering free web mail accounts offered by a great many companies, internet providers and web portals (e.g. However, the intention of collecting users personal data and create consumer profiles based on online behaviour can also take on more creative and playful forms. One such example is The particular way in which sites such as sixdegrees.com and others are structured mean that not only to users provide initial information about them, but also that this information is constantly updated and therefore becomes even more valuable. Consequently, many free online services or web mail providers cancel a user's account if it has not been uses for some time. There are also other online services which offer free services in return for personal information which is then used for marketing purposes, e.g. Yahoo's A further way of collecting consumer data that has recently become popular is by offering free PCs. Users are provided with a PC for free or for very little money, and in return commit themselves to using certain services rather than others (e.g. a particular internet provider), providing information about themselves, and agree to have their online behaviour monitored by the company providing the PC, so that accurate user profiles can be compiled. For example, the A good inside view of the world of direct marketing can be gained at the website of the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Sperry Formerly (1955 - 1979) Sperry Rand Corporation, American corporation that merged with the Burroughs Corporation in 1986 to form Unisys Corporation, a large computer manufacturer. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Calculator Calculators are machines for automatically performing arithmetical operations and certain mathematical functions. Modern calculators are descendants of a digital arithmetic machine devised by | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Fair use Certain | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Caching Caching generally refers to the process of making an extra copy of a file or a set of files for more convenient retrieval. On the Internet caching of third party files can occur either locally on the user's client computer (in the RAM or on the hard drive) or at the server level ("proxy caching"). A requested file that has been cached will then be delivered from the cache rather than a fresh copy being retrieved over the Internet. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Industrial design Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The Internet Engineering Task Force The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Society: | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Satellites Communications satellites are relay stations for radio signals and provide reliable and distance-independent high-speed connections even at remote locations without high-bandwidth infrastructure. On point-to-point transmission, the transmission method originally employed on, satellites face increasing competition from In the future, satellites will become stronger, cheaper and their orbits will be lower; their services might become as common as satellite TV is today. For more information about satellites, see How Satellites Work ( | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Caching Caching is a mechanism that attempts to decrease the time it takes to retrieve data by storing a copy at a closer location. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Invention According to the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
AT&T Labs-Research The research and development division of http://www.research.att.com/ | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Copyright management information Copyright management information refers to information which identifies a work, the author of a work, the owner of any right in a work, or information about the terms and conditions of the use of a work, and any numbers or codes that represent such information, when any of these items of information are attached to a copy of a work or appear in connection with the communication of a work to the public. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Robot Robot relates to any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. The term is derived from the Czech word robota, meaning "forced labor." Modern use of the term stems from the play R.U.R., written in 1920 by the Czech author Karel Capek, which depicts society as having become dependent on mechanical workers called robots that are capable of doing any kind of mental or physical work. Modern robot devices descend through two distinct lines of development--the early | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Telnet Telnet allows you to login remotely on a computer connected to the Internet. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Transmission Control Protocol/Internet Protocol (TCP/IP) TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet. More detailed information can be found | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Machine language Initially computer programmers had to write instructions in machine language. This | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Martin Hellman Martin Hellman was | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Java Applets Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Bandwidth The bandwidth of a transmitted communications signal is a measure of the range of frequencies the signal occupies. The term is also used in reference to the frequency-response characteristics of a communications receiving system. All transmitted signals, whether analog or digital, have a certain bandwidth. The same is true of receiving systems. Generally speaking, bandwidth is directly proportional to the amount of data transmitted or received per unit time. In a qualitative sense, bandwidth is proportional to the complexity of the data for a given level of system performance. For example, it takes more bandwidth to download a photograph in one second than it takes to download a page of text in one second. Large sound files, computer programs, and animated videos require still more bandwidth for acceptable system performance. Virtual reality (VR) and full-length three-dimensional audio/visual presentations require the most bandwidth of all. In digital systems, bandwidth is data speed in bits per second (bps). Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
World Wide Web (WWW) Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes According to the Internet domain survey of the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Electronic Messaging (E-Mail) Electronic messages are transmitted and received by computers through a network. By E-Mail texts, images, sounds and videos can be sent to single users or simultaneously to a group of users. Now texts can be sent and read without having them printed. E-Mail is one of the most popular and important services on the Internet. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Local Area Network (LAN) A Local Area Network is an office network, a network restricted to a building area. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Internet Research Task Force Being itself under the umbrella of the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Time Warner The largest media and entertainment conglomerate in the world. The corporation resulted from the merger of the publisher Time Inc. and the media conglomerate Warner Communications Inc. in 1989. It acquired the Turner Broadcasting System, Inc. (TBS) in 1996. Time Warner Inc.'s products encompass magazines, hardcover books, comic books, recorded music, motion pictures, and broadcast and cable television programming and distribution. The company's headquarters are in New York City. In January 2000 Time Warner merged with AOL (America Online), which owns several online-services like Compuserve, Netscape and Netcenter in a US$ 243,3 billion deal. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The World Wide Web History Project The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the http://www.webhistory.org/home.html | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
IIPA The International | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
International Standardization Organization ISO (International Organization for Standardization), founded in 1946, is a worldwide federation of national standards bodies from some 100 countries, one from each country. Among the standards it fosters is Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Royalties Royalties refer to the payment made to the owners of certain types of rights by those who are permitted by the owners to exercise the rights. The | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Core copyright industries Those encompass the industries that create copyrighted works as their primary product. These industries include the motion picture industry (television, theatrical, and home video), the recording industry (records, tapes and CDs), the music publishing industry, the book, journal and newspaper publishing industry, and the computer software industry (including data processing, business applications and interactive entertainment software on all platforms), legitimate theater, advertising, and the radio, television and cable broadcasting industries. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Adolf Hitler Adolf Hitler (1889-1945) was the head of the NSdAP, the National Socialist Workers' Party. Originally coming from Austria, he started his political career in Germany. As the Reichskanzler of Germany he provoked World War II. His hatred against all non-Aryans and people thinking in a different way killed millions of human beings. Disinformation about his personality and an unbelievable machinery of propaganda made an entire people close its eyes to the most cruel crimes on human kind. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Josef Goebbels Josef Goebbels (1897-1945) was Hitler's Minister for Propaganda and Public Enlightenment. He had unlimited influence on the press, the radio, movies and all kind of literary work in the whole Reich. In 1944 he received all power over the Total War. At the same time he was one of the most faithful followers of Hitler - and he followed him into death in 1945. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
NATO The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Fiber-optic cable networks Fiber-optic cable networks may become the dominant method for high-speed Internet connections. Since the first fiber-optic cable was laid across the Atlantic in 1988, the demand for faster Internet connections is growing, fuelled by the growing network traffic, partly due to increasing implementation of corporate networks spanning the globe and to the use of graphics-heavy contents on the Fiber-optic cables have not much more in common with copper wires than the capacity to transmit information. As copper wires, they can be terrestrial and submarine connections, but they allow much higher transmission rates. Copper wires allow 32 telephone calls at the same time, but fiber-optic cable can carry 40,000 calls at the same time. A capacity, Copper wires will not come out of use in the foreseeable future because of technologies as For technical information from the Encyclopaedia Britannica on telecommunication cables, click An entertaining report of the laying of the FLAG submarine cable, up to now the longest fiber-optic cable on earth, including detailed background information on the cable industry and its history, Neal Stephenson has written for Wired: Mother Earth Mother Board. Click Susan Dumett has written a short history of undersea cables for Pretext magazine, Evolution of a Wired World. Click A timeline history of submarine cables and a detailed list of seemingly all submarine cables of the world, operational, planned and out of service, can be found on the Web site of the For maps of fiber-optic cable networks see the website of | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Kosov@ The "word" Kosov@ is a compromise between the Serb name KosovO and the Albanian KosovA. It is mostly used by international people who want to demonstrate a certain consciousness about the conflict including some sort of neutrality, believing that neither the one side nor the other (and maybe not even For more explanations (in German) see: | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Multiple User Dungeons MUDs are virtual spaces, usually a kind of adventurous ones, you can log into, enabling you to chat with others, to explore and sometimes to create rooms. Each user takes on the identity of an avatar, a computerized character. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
User tracking User tracking is a generic term that covers all the techniques of monitoring the movements of a user on a web site. User tracking has become an essential component in online commerce, where no personal contact to customers is established, leaving companies with the predicament of not knowing who they are talking to. Some companies, such as Whenever user tracking is performed without the explicit agreement of the user, or without laying open which data are collected and what is done with them, considerable | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
RIPE The RIPE Network Coordination Centre (RIPE NCC) is one of three Regional Internet Registries (RIR), which exist in the world today, providing allocation and registration services which support the operation of the Internet globally, mainly the allocation of http://www.ripe.net | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
National Science Foundation (NSF) Established in 1950, the National Science Foundation is an independent agency of the U.S. government dedicated to the funding in basic research and education in a wide range of sciences and in mathematics and engineering. Today, the NSF supplies about one quarter of total federal support of basic scientific research at academic institutions. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/0/0,5716,2450+1+2440,00.html | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Braille Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Above.net Headquartered in San Jose, USA, AboveNet Communications is a http://www.above.net | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Wide Application Protocol (WAP) The WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate. Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||