|
The 19th Century: Machine-Assisted Manufacturing Eli Whitney's proposal for a simplification and standardization of component parts marked a further milestone in the advance of the By the middle of the 19th century the general concepts of |
|
|
|
Like that car? The tricks of the data body industry 2. Like that car? The tricks of the data body industry In the New Economy, data have become a primary resource. Businesses unable to respond to the pressure of informatisation are quickly left behind. "Information is everything" has become the war-cry of the New Economy. More than ever, business companies now collect data related to their customers, their competitors, economic indicators, etc., and compile them in However, there are also many companies that specialise in data body economics as the main line of business. They collect huge amount of data process and enhance them (thereby increasing the value of the data) and offer them on to other companies. For example, somebody who has been attracted by a car on display in an airport terminal and completes a card with name and address to participate in a draw reveals a lot of economically valuable information about him / herself. Apart from name and address, and other data that is completed on the card, this person also can be assumed to be a potential car buyer (evidently he / she wants a car) and to be relatively affluent (the poor do not normally travel by plane). The time when you complete the card also provides information: in July and August, you are more likely to be a holiday maker than in November. Possibly in small print somewhere on the ticket you complete you agree to receive more information about this and other products, and you agree also that your data are "electronically processed". The data acquired this way can normally be expected to be much more valuable than the car the is offered in the draw. Most people who completed the cards will not win in the draw, but instead end up on directs marketing data warehouses and one day receive offers of products and services which they never knew they wanted. |
|
|
|
Basics: Rights Recognized Copyright protection generally means that certain uses of a work are lawful only if they are done with the authorization of the owner of the copyright. The most typical are the following: - copying or reproducing a work - performing a work in public - making a sound recording of a work - making a motion picture of a work - broadcasting a work - translating a work - adapting a work Under certain national laws, some of these rights, which are referred to, as "economic rights'" are not exclusive rights of authorization but in specific cases, merely rights to remuneration. Some strictly determined uses (for example quotations or the use of works by way of illustration for teaching) are completely free, that is, they require neither authorization of, nor remuneration for, the owner of the copyright. This practice is described as In addition to economic rights, authors enjoy "moral rights" on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. They also have the right to oppose the mutilation or deformation of their creations. The owner of a copyright may usually transfer his right or may license certain uses of his work. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise. Furthermore there exist rights related to copyright that are referred to as "neighboring rights". In general there are three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. |
|
|
|
Governmental Regulations The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit For more information see: Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries. This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently. For more information on this see: Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom. The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily. "Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible." (Arnold G. Reinhold) The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably? Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands. What about civil rights or Human Rights? |
|
|
|
Pine Gap Station Pine Gap, run by the CIA, is near Alice Springs in central Australia and mostly an underground facility. Pine Gap was mainly established to serve as the groundstation and downlink for reconnaissance satellites like the RHYOLITE and ORION system. The facility consists of more than 7 large antennas in randomes. In Pine Gap's Signals Processing Office transmitted signals are received and transformed for further analysis.There is a no fly zone 4km around PG, and local land holders have agreed not to allow "visitors" access to there properties. It is said that Pine Gap employs nearly 1000 people, mainly from the CIA and the U.S. National Reconnaissance Office (NRO). Source: Jeffrey T. Richelson, The U.S. Intelligence Community, (Westview Press, 4th ed., 1999)p190 Nicky Hager, Secret Power, New Zealand's role in the internatinal spy network, (Craig Potton, 1996)p34ff Pictures of Pine Gap |
|
|
|
RSA The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, |
|
|