Challenges for Copyright by ICT: Introduction

Traditional copyright and the practice of paying royalties to the creators of intellectual property have emerged with the introduction of the printing press (1456). Therefore early copyright law has been tailored to the technology of print and the (re) production of works in analogue form. Over the centuries legislation concerning the protection of intellectual property has been adapted several times in order to respond to the technological changes in the production and distribution of information.

Yet again new technologies have altered the way of how (copyrighted) works are produced, copied, made obtainable and distributed. The emergence of global electronic networks and the increased availability of digitalized intellectual property confront existing copyright with a variety of questions and challenges. Although the combination of several types of works within one larger work or on one data carrier, and the digital format (although this may be a recent development it has been the object of detailed legal scrutiny), as well as networking (telephone and cable networks have been in use for a long time, although they do not permit interactivity) are nothing really new, the circumstance that recent technologies allow the presentation and storage of text, sound and visual information in digital form indeed is a novel fact. Like that the entire information can be generated, altered and used by and on one and the same device, irrespective of whether it is provided online or offline.


TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659517
 
ECHELON Main Stations

Location

Country

Target/Task

Relations

MORWENSTOW

UK

INTELSAT, Atlantic, Europe, Indian Ocean

NSA, GCHQ

SUGAR GROVE

USA

INTELSAT, Atlantic, North and South America

NSA

YAKIMA FIRING CENTER

USA

INTELSAT, Pacific

NSA

WAIHOPAI

NEW ZEALAND

INTELSAT, Pacific

NSA, GCSB

GERALDTON

AUSTRALIA

INTELSAT, Pacific

NSA, DSD

















MENWITH HILL

UK

Sat, Groundstation, Microwave(land based)

NSA, GCHQ

SHOAL BAY

AUSTRALIA

Indonesian Sat

NSA, DSD

LEITRIM

CANADA

Latin American Sat

NSA, CSE

BAD AIBLING

GERMANY

Sat, Groundstation

NSA

MISAWA

JAPAN

Sat

NSA

















PINE GAP

AUSTRALIA

Groundstation

CIA

















FORT MEADE

USA

Dictionary Processing

NSA Headquarters

WASHINGTON

USA

Dictionary Processing

NSA

OTTAWA

CANADA

Dictionary Processing

CSE

CHELTENHAM

UK

Dictionary Processing

GCHQ

CANBERRA

AUSTRALIA

Dictionary Processing

DSD

WELLINGTON

NEW ZEALAND

Dictionary Processing

GCSB Headquarters



TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611746/100438659207
 
Asymmetric or Public-Key-Cryptosystems

Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one.
For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will.

"The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol)

very famous examples for public-key systems are:

· RSA:
The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided.
The mathematics behind are supposedly quite easy to understand (see: http://world.std.com/~franl/crypto/rsa-guts.html.

· PGP:
PGP is a public key encryption program. Most of all it is used for e-mail encryption.
It is supposed to be quite safe - until now.

· PGPi is simply the international variation of PGP.

for further information about the RSA and other key-systems visit the RSA homepage:
http://www.rsa.com/rsalabs/faq/
http://www.rsa.com/rsalabs/faq/questions.html
or:
http://www.pgpi.org

All of those tools, like hash functions, too, can help to enhance security and prevent crime.
They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed.
For more information see:
http://news.voila.fr/news/fr.misc.cryptologie

Still, cryptography can help privacy.
On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438659074
 
Frederick Taylor

b. March 20, 1856, Philadelphia, Pa., U.S.
d. March 21, 1915, Philadelphia

American inventor and engineer who is known as the father of scientific management. His system of industrial management has influenced the development of virtually every country. In 1881, he introduced time study at the Midvale plant. The profession of time study was founded on the success of this project, which also formed the basis of Taylor's subsequent theories of management science. Essentially, Taylor suggested that production efficiency in a shop or factory could be greatly enhanced by close observation of the individual worker and elimination of waste time and motion in his operation. Though the Taylor system provoked resentment and opposition from labor when carried to extremes, its value in rationalizing production was indisputable and its impact on the development of mass production techniques immense.

INDEXCARD, 1/3
 
Neural network

A bottom-up artificial intelligence approach, a neural network is a network of many very simple processors ("units" or "neurons"), each possibly having a (small amount of) local memory. The units are connected by unidirectional communication channels ("connections"), which carry numeric data. The units operate only on their local data and on the inputs they receive via the connections. A neural network is a processing device, either an algorithm, or actual hardware, whose design was inspired by the design and functioning of animal brains and components thereof. Most neural networks have some sort of "training" rule whereby the weights of connections are adjusted on the basis of presented patterns. In other words, neural networks "learn" from examples and exhibit some structural capability for generalization.

INDEXCARD, 2/3
 
Telnet

Telnet allows you to login remotely on a computer connected to the Internet.

INDEXCARD, 3/3