Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights)

Another important multilateral treaty concerned with intellectual property rights is the TRIPS agreement, which was devised at the inauguration of the Uruguay Round negotiations of the WTO in January 1995. It sets minimum standards for the national protection of intellectual property rights and procedures as well as remedies for their enforcement (enforcement measures include the potential for trade sanctions against non-complying WTO members). The TRIPS agreement has been widely criticized for its stipulation that biological organisms be subject to intellectual property protection. In 1999, 44 nations considered it appropriate to treat plant varieties as intellectual property.

The complete TRIPS agreement can be found on: http://www.wto.org/english/tratop_e/trips_e/t_agm1_e.htm

TEXTBLOCK 1/4 // URL: http://world-information.org/wio/infostructure/100437611725/100438659758
 
Extract of AOL Time Warner’s Content Production and Distribution Holdings

The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes.

Cable TV Systems and Channels/Networks

Time Warner Cable has 12.6 million subscribers in the U.S. and also runs 5 local 24-hour news stations.

Cable TV channels/networks (some part-owned): HBO, HBO Plus, HBO Signature, HBO Family, HBO Comedy, HBO Zone, Cinemax, MoreMAX, ActionMAX, ThrillerMAX, HBO en Espa-ol, Comedy Central, Court TV, HBO Ole, HBO Asia, HBO Central Europe, CNN, CNN Headline News, CNN International, CNNfN, CNN/Sports Illustrated, CNN en Espa-ol, CNN Airport Network, CNN Radio, CNN Radio Noticias, CNN Interactive TBS Superstation, Turner Network Television, Cartoon Network, Turner Classic Movies, TNT Europe, Cartoon Network Europe, TNT Latin America, Cartoon Network Latin America, TNT & Cartoon Network/Asia Pacific, CNN+, n-tv

Movies, TV, Video Production, and Movie Theaters

Warner Bros. film studio

Warner Bros. Television production studios

Warner Bros. Home Video

Turner worldwide Home Video

Turner Pictures

Castle Rock Entertainment movie production company

New Line Cinema movie production company

Warner Bros. film library

Turner Film Library

Hanna Barbera Cartoons

Owns many movie houses, with over 1,000 screens, around the world

Book Publishing

Time Life Inc.

Book-of-the-Month Club

Warner Books

Little, Brown and Company

Oxmoor House

Leisure Arts

Sunset Books

Magazines

Time, People, Sports Illustrated, Fortune, Life, Money, Parenting, In Style, Entertainment Weekly, Cooking Light, Baby Talk, First Moments, Coastal Living, Health, Progressive Farmer, Southern Accents, Southern Living, Sports Illustrated, For Kids, Sunset, Teen People, Time for Kids, Weight Watchers, Mutual Funds, Your Company, Asiaweek, President, Wallpaper. Hippocrates

Recorded Music

Warner Music Group

The Atlantic Group

Elektra Entertainment Group

Rhino Entertainment

Sire Records Group

Warner Bros. Records

Warner Music International

WEA Inc.

WEA Corp.

WEA Manufacturing

Ivy Hill Corp.

Warner Special Products

Alternative Distribution Alliance

Giant Merchandising

Deals with record labels include:

Maverick records

Tommy Boy Sub Pop

Qwest

143 Records

Internet and New Media

About 130 Websites including: CNN.com, AllPolitics.com, CNNSI.com, Time Digital, People, Southern Living, Sports Illustrated

Turner New Media

Online Services including: Compuserve, Netscape, Netcenter

Pro Sports Teams and Promotions

Atlanta Braves major league baseball team

Atlanta Hawks NBA basketball team

World Championship Wrestling

Goodwill Games

Other

Six Flags entertainment/excursion parks

Warner Bros. Movie World theme park

Over 150 Warner Bros. stores, plus Turner Retail Group

25 % stake in Atari

14 % stake in Hasbro

Business Connections with Other Media Companies

Joint ventures, equity interests or major arrangements with Viacom, Sony, Bertelsmann, News Corp., Kirch, EMI, Tribune Co., and others.

TEXTBLOCK 2/4 // URL: http://world-information.org/wio/infostructure/100437611795/100438659100
 
Governmental Regulations

The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit DES and similar products are allowed after a technical review, just like encryption commodities and software with key lengths of 64-bits or less which meet the mass market requirements.
For more information see:
http://www.wassenaar.org/

Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries.

This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently.

For more information on this see:
http://www.heise.de/ct/97/04/032/
http://www.fitug.de/ulf/krypto/verbot.html#welt

Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom.
The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily.

"Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible."
(Arnold G. Reinhold)


The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the PGP, stay under governmental control.

The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably?
Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands.
What about civil rights or Human Rights?

TEXTBLOCK 3/4 // URL: http://world-information.org/wio/infostructure/100437611776/100438659135
 
Timeline 1900-1970 AD

1913 the wheel cipher gets re-invented as a strip

1917 William Frederick Friedman starts working as a cryptoanalyst at Riverbank Laboratories, which also works for the U.S. Government. Later he creates a school for military cryptoanalysis

- an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys

1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin

- Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected

1919 Hugo Alexander Koch invents a rotor cipher machine

1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded

1923 Arthur Scherbius founds an enterprise to construct and finally sell his Enigma machine for the German Military

late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly

1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts

1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939

1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of William Frederick Friedman. As the Japanese were unable to break the US codes, they imagined their own codes to be unbreakable as well - and were not careful enough.

1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett

- at the same time the British develop the Typex machine, similar to the German Enigma machine

1943 Colossus, a code breaking computer is put into action at Bletchley Park

1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type

1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems

1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ)

late 1960's the IBM Watson Research Lab develops the Lucifer cipher

1969 James Ellis develops a system of separate public-keys and private-keys

TEXTBLOCK 4/4 // URL: http://world-information.org/wio/infostructure/100437611776/100438658921
 
Codices, 1th century B.C.

The transformation of writings from scrolls to codices, in basic the hardcover book as we know it today, is an essential event in European history. Quoting accurately by page number, browsing through pages and skipping chapters, all impossible while reading scrolls, become possible.

In the computer age we are witnesses to a kind of revival of the scrolls as we scroll upwards and downwards a document we just see a portion of. Maybe the introduction of hypertext is the beginning of a similar change as the replacement of scrolls by codices.

INDEXCARD, 1/5
 
Artificial Intelligence

Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support decision taking in highly complex environments.
Yahoo AI sites: http://dir.yahoo.com/Science/Computer_Science/Artificial_Intelligence/
MIT AI lab: http://www.ai.mit.edu/


http://dir.yahoo.com/Science/Computer_Science...
http://www.ai.mit.edu/
INDEXCARD, 2/5
 
Microsoft Corporation

Founded by Bill Gates and Paul Allen and headquartered in Redmond, USA, Microsoft Corporation is today's world-leading developer of personal-computer software systems and applications. As MS-DOS, the first operating system released by Microsoft, before, Windows, its successor, has become the de-facto standard operating system for personal computer. According to critics and following a recent court ruling this is due to unfair competition.

http://www.microsoft.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/4/0,5716,1524+1+1522,00.html

http://www.microsoft.com/
http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 3/5
 
George Bush

b. June 12, 1924

41st President of the United States. In 1954, George Bush co-founded and became the president of Zapata Offshore Company. By 1964, he became chairman of the Republican Party of Harris County. That same year, he ran for the U.S. Senate, but was defeated in the Democratic landslide. Bush had better luck in the election of 1966, when he became the first Republican ever to represent Houston in Texas. Presidents Nixon and Ford selected Bush for a series of high-profile appointments: Ambassador to the United Nations in 1971, Chairman of the Republican National Committee in 1973, envoy to China in 1974 and Director of Central Intelligence in 1976. When Jimmy Carter was elected President in 1976, he appointed a new Director and George Bush returned to private life. In 1980, Bush made his own run for the Presidency. George Bush sought the Presidency again in 1988, and won the Republican nomination over a large field of candidates. His election that November was a decisive one, though not the landslide he and Reagan had enjoyed in 1984.

INDEXCARD, 4/5
 
Whitfield Diffie

Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and Martin Hellman developed public key cryptography, a system to send information without leaving it open to be read by everyone.

INDEXCARD, 5/5