|
Who owns the Internet and who is in charge? The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet. The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g. Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed. For a detailed report on Internet governance, click here. |
|
|
|
ECHELON Introduction The end of the Cold War and the fall of the Berlin wall marked the end of a whole fictional genre: the spy novel. But as writers such as John Le Carre and Frederick Forsyth have since moved their field of interest to issues such as Islamic fundamentalism or ethnic separatist struggles against Western superpowers, the legacy of the spy network which was allegedly built for military operations only throughout the Cold War period, promises to outdo all fictional blue prints of espionage thrillers. Over the past decades and especially throughout the 90s, a series of facts have surfaced, providing considerable evidence that a network of spy agencies, IT industries, governmental officials and research laboratories have developed a vast network which today serves mainly the purpose of industrial espionage. It's name is ECHELON, a highly automated global system and surveillance network for processing data retrieved through interception of communication traffic from all over the world. In the days of the cold war, ECHELON's primary purpose was to keep an eye/ear on the U.S.S.R. In the wake of the fall of the U.S.S.R. ECHELON is officially said to being used to fight terrorism and crimes, but it seems to be evident that the main focus lies in political and economic espionage. A few people have played key roles in the uncovering of the mechanisms behind the closed doors of Western military operations. And still today, the evidence that has been brought into the sunlight has not forced any official body to give an official statement acknowledging or denying the existence of ECHELON. ECHELON had been rumored to be in development since 1947, the result of the UKUSA treaty signed by the governments of the United States, the United Kingdom, Canada, Australia and New Zealand. Only in 1976 the British journalist Duncan Campbell published an article in London based magazine Time Out which was called 'The Eavesdroppers'. This article contained a detailed description of what the GCHQ was and did. Starting from this research, Campbell continued to publish many articles concerning illegal communication interception conducted by the secret services. But these first suspicions and truths about the nature of the spy network raised little media attention across the world. It was only in 1996, when the New Zealand journalist Nicky Hager published his book 'Secret Power: New Zealand's Role In the International Spy Network' containing detailed notes of meetings and agreements of army officials and private industries, ECHELON began to raise interest and eyebrows of politicians mainly in Europe and the media, mostly in Europe and America. However, the saga continues and until today, despite official reports, elaborate research and founded claims, the existence of ECHELON has maintained to be one of the secrets of Western superpowers. And on a European level, the subject matter seems to create a divide across most political parties and governments. Even in 1998, the European Parliament keeps its head down. In the STOA report, Assessment of the Technologies of Political Control, Martin Bangemann sums up the fears and strategies of official bodies dealing with the subject in his closing statement: "I think that there is a difference between someone writing a book, or - if you allow me to say this - a member of parliament who voices a concern and a representative of an institution which can only act within a democratic system if he or she knows something for sure. That level of knowledge we do not have." Campaigning for the disclosure of ECHELON has been coming a long way. Starting in the early 90s, mainly grassroots activists have been instrumental in raising the public awareness. The most prominent case today is still the American base in Menwith Hill, Yorkshire UK. The community around Menwith Hill, Yorkshire UK has played a central role in pushing for official enquiries concerning the activities of UK based American bases. As there seemed to be a very concrete threat, the "Provision of (...) hazardous storage buildings" [ The following report of World Information brings together various sources which on the whole indicate the extension and functioning of a network for industrial espionage under the cover of military and governmental operations which would seriously challenge any fictional writing of the cold war era. |
|
|
|
Internet Software Consortium The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community. http://www.isc.org |
|
|
|
Transmission Control Protocol/Internet Protocol (TCP/IP) TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet. More detailed information can be found |
|
|