Challenges for Copyright by ICT: Introduction

Traditional copyright and the practice of paying royalties to the creators of intellectual property have emerged with the introduction of the printing press (1456). Therefore early copyright law has been tailored to the technology of print and the (re) production of works in analogue form. Over the centuries legislation concerning the protection of intellectual property has been adapted several times in order to respond to the technological changes in the production and distribution of information.

Yet again new technologies have altered the way of how (copyrighted) works are produced, copied, made obtainable and distributed. The emergence of global electronic networks and the increased availability of digitalized intellectual property confront existing copyright with a variety of questions and challenges. Although the combination of several types of works within one larger work or on one data carrier, and the digital format (although this may be a recent development it has been the object of detailed legal scrutiny), as well as networking (telephone and cable networks have been in use for a long time, although they do not permit interactivity) are nothing really new, the circumstance that recent technologies allow the presentation and storage of text, sound and visual information in digital form indeed is a novel fact. Like that the entire information can be generated, altered and used by and on one and the same device, irrespective of whether it is provided online or offline.


TEXTBLOCK 1/9 // URL: http://world-information.org/wio/infostructure/100437611725/100438659517
 
Highlights on the Way to a Global Commercial Media Oligopoly: 1990s

-1994

Viacom multimedia and industrial corporation takes control of Paramount Communications for US$ 9.6 billion, as well as Blockbuster Entertainment, a huge video store chain, for US$ 8.4. billion.

1995

Entertainment giant Disney buys Capital Cities-ABC for US$ 19 billion.

The industrial and broadcasting company Westinghouse Corp. buys out CBS for US$ 5.4 billion.

In a US$ 7.2 billion deal, Time Warner acquires Turner Communications, owner of prime cable TV channels CNN, TBS and TNT and a major classic American film library.

1996

Westinghouse/CBS buys Infinity Broadcasting's large group of radio stations.

Murdoch and News Corp. acquire ten more TV stations and TV production studios with the US$ 2.5 billion purchase of New World Communications Group.

Viacom buys half of UPN-TV network, adding that to its other holdings, which include eleven TV stations, along with MTV, VH-1, and other cable TV channels and Paramount movie studios.

1997

Radio Groups Chancellor Media and Evergreen merge and are linked by ownership with Capstar Broadcasting; they also buy ten radio stations from Viacom. By mid-1997 Chancellor/Capstar controls no fewer than 325 radio stations around the United States.

Chancellor/Capstar's controlling ownership group, Hicks Muse Tate & Furst, buys the seventh largest radio group, SFX, adding another seventy-two radio stations, making a total of nearly four hundred stations controlled by this one source.

Westinghouse-CBS buys out American Radio Systems, the fourth largest radio chain in total audience, which gives Westinghouse-CBS over 170 radio stations with a total audience nearly equal to that of the Chancellor/Capstar group.

Giant European-based print and electronic publishing and data base corporations Reed Elsevier and Wolters Kluwer merge.

1998

Bertelsmann buys the Random House-Alfred A. Knopf-Crown Publishing group of book publishers from Newhouse/Advance Publications, adding to its Bantam-Doubleday-Dell publishing group and giving Bertelsmann by far the largest English-language publishing operations.

1999

AOL, the worlds leading Internet service provider and Time Warner, the worlds leading classical media company merge in a US$ 243.3 billion deal.

TEXTBLOCK 2/9 // URL: http://world-information.org/wio/infostructure/100437611795/100438659183
 
Advertising and the Content Industry - The Coca-Cola Case

Attempts to dictate their rules to the media has become a common practice among marketers and the advertising industry. Similar as in the Chrysler case, where the company demanded that magazines give advance notice about controversial articles, recent attempts to put pressure on content providers have been pursued by the Coca-Cola Company.

According to a memo published by the New York Post, Coca-Cola demands a free ad from any publication that publishes a Coke ad adjacent to stories on religion, politics, disease, sex, food, drugs, environmental issues, health, or stories that employ vulgar language. "Inappropriate editorial matter" will result in the publisher being liable for a "full make good," said the memo by Coke advertising agency McCann-Erickson. Asked about this practice, a Coke spokes person said the policy has long been in effect.

(Source: Odwyerpr.com: Coke Dictates nearby Editorial. http://www.odwyerpr.com)

TEXTBLOCK 3/9 // URL: http://world-information.org/wio/infostructure/100437611652/100438657998
 
Doubls Bind Messages

Double bind messages are extremely effective.
For example in Nicaragua the Sandinistas were seen as the personification of the evil. Demonization was the tool to make the U.S.-population to believe that. And the propaganda, called "Operation Truth", succeeded - and is successful until today. The Sandinistas are still considered an enemy in the head of the people. The media played the role of spreading propaganda - nearly without any criticism.
By the end of the 1980s the USA even paid Nicaraguans for voting other parties than the Sandinistas.

El Salvador was a similar case. Again the guerrilla got demonized. The difference was the involvement of the Catholic Church, which was highly fought against by the ruling parties of El Salvador - and those again were financially and organizationally supported by the USA. The elections in the 1980s were more or less paid by the USA.
U.S.-politicians were afraid El Salvador could end up being a second Cuba or Nicaragua. Every means was correct to fight this tendency, no matter what it cost.
On the 21st of September 1996, the Washington Post published several documents proofing an old rumor: not only that Central American soldiers had been educated in a U.S.-army school (the SOA), they also were taught to use torture as a method against revolutionaries. Some of the Salvadorian "students" of that school became very famous for being extremely cruel, one of them being General Roberto d'Aubuisson (35), the person who ordered the killing of Archbishop Oscar Romero in 1980.

TEXTBLOCK 4/9 // URL: http://world-information.org/wio/infostructure/100437611661/100438658752
 
Asymmetric or Public-Key-Cryptosystems

Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one.
For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will.

"The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol)

very famous examples for public-key systems are:

· RSA:
The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided.
The mathematics behind are supposedly quite easy to understand (see: http://world.std.com/~franl/crypto/rsa-guts.html.

· PGP:
PGP is a public key encryption program. Most of all it is used for e-mail encryption.
It is supposed to be quite safe - until now.

· PGPi is simply the international variation of PGP.

for further information about the RSA and other key-systems visit the RSA homepage:
http://www.rsa.com/rsalabs/faq/
http://www.rsa.com/rsalabs/faq/questions.html
or:
http://www.pgpi.org

All of those tools, like hash functions, too, can help to enhance security and prevent crime.
They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed.
For more information see:
http://news.voila.fr/news/fr.misc.cryptologie

Still, cryptography can help privacy.
On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy.

TEXTBLOCK 5/9 // URL: http://world-information.org/wio/infostructure/100437611776/100438659074
 
Digital Commercial Content

Starting in the mid 1990s today most traditional media can also be found online. The overwhelming majority of bigger newspapers and periodicals, but also radio and TV stations now complement their classic media formats with digital programming. For the most part they transform existing analogue information in digital form, with some additional features.

Especially the big media conglomerates, having realized the economic potential of the Internet, have started to get into the business of digital content. Not surprisingly their engagement in the virtual sphere has not brought much new concerning their programming. They offer entertainment, music, sports and some news channels. One of the reasons for this development might be, that the big commercial media companies are able to re-use already existing programming from their other ventures. Examples are Viacom's MTV Network, which now has a twin online or Time Warner's CNN, which on the Web is called CNN Interactive. Considering business economic factors this move suggests itself as hardly any further resources are needed and the already existing programming can be put in the Internet at little extra cost. Also, regarding the undeniable success of their traditional content in terms of revenue generation the digital reproduction of their classic programming concept seems to be an obvious step.

TEXTBLOCK 6/9 // URL: http://world-information.org/wio/infostructure/100437611795/100438658958
 
The 19th Century: Machine-Assisted Manufacturing

Eli Whitney's proposal for a simplification and standardization of component parts marked a further milestone in the advance of the automation of work processes. In 1797 he suggested the manufacture of muskets with completely interchangeable parts. As opposed to the older method under which each gun was the individual product of a highly skilled gunsmith and each part hand-fitted, his method permitted large production runs of parts that were readily fitted to other parts without adjustment and could relatively easy be performed by machines.

By the middle of the 19th century the general concepts of division of labor, assembly of standardized parts and machine-assisted manufacture were well established. On both sides of the Atlantic large factories were in operation, which used specialized machines to improve costs, quality and quantity of their products.

TEXTBLOCK 7/9 // URL: http://world-information.org/wio/infostructure/100437611663/100438659364
 
Extract of Disney’s Content Production and Distribution Holdings

Although the traditional media companies first steps into the digital sphere were fairly clumsy, they have quickly learned from their mistakes and continued to enlarge their Internet presence. Time Warner now for instance operates about 130 Web-Sites (http://www.timewarner.com/corp/about/pubarchive/websites.html). Anyhow the stronger online-engagement of the big media conglomerates by 1998 has led to the establishment of a new pattern: "More than three-quarters of the 31 most visited news and entertainment websites were affiliated with large media firms, and most of the rest were connected to outfits like AOL and Microsoft." (Broadcasting and Cable, 6/22/98).

During the last years many of the smaller players in the field of digital media have been driven out of competition by the huge media conglomerates. This mainly is a result of the advantages that the commercial media giants have over their less powerful counterparts:

    As engagement in online activities mostly does not lead to quick profits, investors must be able to take losses, which only powerful companies are able to.



    Traditional media outlets usually have huge stocks of digital programming, which they can easily plug into the Internet at little extra cost.



    To generate audience, the big media conglomerates constantly promote their Websites and other digital media products on their traditional media holdings.



    As possessors of the hottest "brands" commercial media companies often get premier locations from browser software makers, Internet service providers, search engines and portals.



    Having the financial resources at their disposition the big media firms are aggressive investors in start-up Internet media companies.



Commercial media companies have close and long ties to advertisers, which enables them to seize most of these revenues.

TEXTBLOCK 8/9 // URL: http://world-information.org/wio/infostructure/100437611795/100438659167
 
The 17th Century: The Invention of the First "Computers"

The devices often considered the first "computers" in our understanding were rather calculators than the sophisticated combination of hard- and software we call computers today.

In 1642 Blaise Pascal, the son of a French tax collector, developed a device to perform additions. His numerical wheel calculator was a brass rectangular box and used eight movable dials to add sums up to eight figures long. Designed to help his father with his duties, the big disadvantage of the Pascaline was its limitation to addition.

Gottfried Wilhelm von Leibniz, a German mathematician and philosopher, in 1694 improved the Pascaline by creating a machine that could also multiply. As its predecessor Leibniz's mechanical multiplier likewise worked by a system of gears and dials. Leibniz also formulated a model that may be considered the theoretical ancestor of some modern computers. In De Arte Combinatoria (1666) Leibniz argued that all reasoning, all discover, verbal or not, is reducible to an ordered combination of elements, such as numbers, words, colors, or sounds.

Further improvements in the field of early computing devices were made by Charles Xavier Thomas de Colmar, a Frenchmen. His arithometer could not only add and multiply, but perform the four basic arithmetic functions and was widely used up until the First World War.

TEXTBLOCK 9/9 // URL: http://world-information.org/wio/infostructure/100437611663/100438659397
 
Sandinistas

The Sandinistas overthrew the right wing Somoza regime of corruption that had support from the U.S.-government, in 1979. The followers of Somoza, who was killed in 1980, formed the Contras and began a guerrilla warfare against the government. Many of them were trained in the School of the Americas (= SOA). The Sandinist government realized social reforms, but these did not convince the USA - and so the war went on for many years, costing between 30,000 and 50,000 lives. When the war finally ended the Sandinistas were beaten in (partly incorrect) elections.

INDEXCARD, 1/19
 
SOA

The U.S.-Army School of Americas (= SOA) is based in Fort Benning (Georgia); it trains Latin American and U.S. soldiers in the working-field of counter-insurgency. Some of the nearly 60.000 SOA-Graduates have been responsible for many of the worst human rights abuses and crimes in Latin America. The list of famous dictators and murderers who went through the education of that institution is tremendous. In 1996 the U.S.-Government that always tried to deny the tasks of SOA, had to admit its work - but never closed it.

For more information see the website of SOA-Watch: http://www.soaw.org

http://www.soaw.org/
INDEXCARD, 2/19
 
Clipper Chip

The Clipper Chip is a cryptographic device proposed by the U.S. government that purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone
would be used to encrypt data. The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA).

INDEXCARD, 3/19
 
PGP

A cryptographic software application that was developed by Phil Zimmerman at the Massachusetts Institute of Technology. Pretty Good Privacy (PGP) is a cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.

INDEXCARD, 4/19
 
Assembly line

An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in mass production operations. An assembly line is designed by determining the sequences of operations for manufacture of each product component as well as the final product. Each movement of material is made as simple and short as possible with no cross flow or backtracking. Work assignments, numbers of machines, and production rates are programmed so that all operations performed along the line are compatible.

INDEXCARD, 5/19
 
Telnet

Telnet allows you to login remotely on a computer connected to the Internet.

INDEXCARD, 6/19
 
America Online

Founded in 1985, America Online is the world's biggest Internet service provider serving almost every second user. Additionally, America Online operates CompuServe, the Netscape Netcenter and several AOL.com portals. As the owner of Netscape, Inc. America Online plays also an important role in the Web browser market. In January 2000 America Online merged with Time Warner, the worlds leading media conglomerate, in a US$ 243,3 billion deal, making America Online the senior partner with 55 percent in the new company.

http://www.aol.com

http://www.aol.com/
INDEXCARD, 7/19
 
Ron Rivest

Ronald L. Rivest is Webster Professor of Electrical Engineering and Computer Science in MIT's EECS Department. He was one of three persons in a team to invent the RSA public-key cryptosystem. The co-authors were Adi Shamir and Leonard M. Adleman.

INDEXCARD, 8/19
 
Roberto d'Aubuisson

Roberto D'Aubuisson is another Salvadorian graduate of the SOA. In 1980 he organized the assassination of Archbishop Oscar Romero, voice of the poor and marginalized. In 1981 he founded the extreme right wing party ARENA as a weapon against the guerrilla. Between 1978 and 1992 he was the (not so) secret head of the Salvadorian Death Squads. He died of cancer in 1992, but his ideas are still followed by a new group of death squads, which was founded in 1996 (Fuerza Nacionalista Mayor Roberto D'Aubuisson = FURODA).

INDEXCARD, 9/19
 
CIM

To perform manufacturing firm's functions related to design and production the CAD/CAM technology, for computer-aided design and computer-aided manufacturing, was developed. Today it is widely recognized that the scope of computer applications must extend beyond design and production to include the business functions of the firm. The name given to this more comprehensive use of computers is computer-integrated manufacturing (CIM).

INDEXCARD, 10/19
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 11/19
 
Saddam Hussein

Saddam Hussein joined the revolutionary Baath party when he was a university student. In 1958 he had the head of Iraq, Abdul-Karim Qassim, killed. Since 1979 he has been President of Iraq. Under his reign Iraq fought a decade-long war with Iran. Because of his steady enmity with extreme Islamic leaders the West supported him first of all, until his army invaded Kuwait in August 1990, an incident that the USA led to the Gulf War. Since then many rumors about a coup d'état have been launched, but Saddam Hussein is still in unrestricted power.

INDEXCARD, 12/19
 
Chrysler Corporation

American automotive company first incorporated in 1925 and reorganized and newly incorporated in 1986. It has long been the third largest automaker in the United States (after General Motors and the Ford Motor Company). Founded by Walter P. Chrysler, it took over the business and properties of Maxwell Motor Company, Inc. (first formed in 1913). Today its major subsidiaries include Chrysler Automotive Operations, Inc., which manufactures Plymouth, Dodge, and Chrysler passenger cars, Dodge trucks, and auto parts and accessories; and the Chrysler Financial Corporation. Headquarters are in Highland Park, Mich., U.S.

INDEXCARD, 13/19
 
Machine language

Initially computer programmers had to write instructions in machine language. This coded language, which can be understood and executed directly by the computer without conversion or translation, consists of binary digits representing operation codes and memory addresses. Because it is made up of strings of 1s and 0s, machine language is difficult for humans to use.

INDEXCARD, 14/19
 
News Corporation

The News Corporation Ltd., a global media holding company, which governed News Limited (Australia), News International (U.K.), and News America Holdings Inc. (U.S.) was founded by the Australian-born newspaper publisher and media entrepreneur, Rupert Murdoch. Murdoch's corporate interests center on newspaper, magazine, book, and electronic publishing; television broadcasting; and film and video production, principally in the United States, the United Kingdom, and Australia.

INDEXCARD, 15/19
 
Automation

Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, automation generally implies the integration of machines into a self-governing system. Automation has revolutionized those areas in which it has been introduced, and there is scarcely an aspect of modern life that has been unaffected by it. Nearly all industrial installations of automation, and in particular robotics, involve a replacement of human labor by an automated system. Therefore, one of the direct effects of automation in factory operations is the dislocation of human labor from the workplace. The long-term effects of automation on employment and unemployment rates are debatable. Most studies in this area have been controversial and inconclusive. As of the early 1990s, there were fewer than 100,000 robots installed in American factories, compared with a total work force of more than 100 million persons, about 20 million of whom work in factories.

INDEXCARD, 16/19
 
Machine vision

A branch of artificial intelligence and image processing concerned with the identification of graphic patterns or images that involves both cognition and abstraction. In such a system, a device linked to a computer scans, senses, and transforms images into digital patterns, which in turn are compared with patterns stored in the computer's memory. The computer processes the incoming patterns in rapid succession, isolating relevant features, filtering out unwanted signals, and adding to its memory new patterns that deviate beyond a specified threshold from the old and are thus perceived as new entities.

INDEXCARD, 17/19
 
German Bundeswehr

The German contribution to the Western defence system, apart from playing host and contributing to the continued presence of allied troops on its soil, takes the form of its combined arm of defence known as the Federal Armed Forces (Bundeswehr). Constituting the largest contingent of NATO troops in Europe, the armed forces are divided into an army, navy, and air force. From its inception it was envisioned as a "citizens' " defence force, decisively under civilian control through the Bundestag, and its officers and soldiers trained to be mindful of the role of the military in a democracy. Conscription for males is universal, the military liability beginning at 18 and ending at 45 years of age.

INDEXCARD, 18/19
 
Convergence, 2000-

Digital technologies are used to combine previously separated communication and media systems as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence".

Classical dichotomies as the one of computing and telephony and traditional categorisations no longer apply, because these new services no longer fit traditional categories.

INDEXCARD, 19/19