Biometrics applications: privacy issues

All biometric technologies capture biometric data from individuals. Once these date have been captured by a system, they can, in principle, be forwarded to other locations and put to many different uses which are capable of compromising on an individuals privacy.

Technically it is easy to match biometric data with other personal data stored in government or corporate files, and to come a step closer to the counter-utopia of the transparent citizen and customer whose data body is under outside control.

While biometric technologies are often portrayed as protectors of personal data and safeguards against identity theft, they can thus contribute to an advance in "Big Brother" technology.

The combination of personalised data files with biometric data would amount to an enormous control potential. While nobody in government and industry would admit to such intentions, leading data systems companies such as EDS (Electronic Data Systems; http://www.eds.com) are also suppliers of biometric systems to the intelligence agencies of government and industry.

Biometric technologies have the function of identification. Historically, identification has been a prerequisite for the exercise of power and serves as a protection only to those who are in no conflict with this power. If the digitalisation of the body by biometric technologies becomes as widespread as its proponents hope, a new electronic feudal system could be emerging, in which people are reduced to subjects dispossessed of their to their bodies, even if these, unlike in the previous one, are data bodies. Unlike the gatekeepers of medieval towns, wear no uniforms by they might be identified; biometric technologies are pure masks.

TEXTBLOCK 1/38 // URL: http://world-information.org/wio/infostructure/100437611729/100438658826
 
Economic structure; transparent customers

Following the dynamics of informatised economies, the consumption habits and lifestyles if customers are of great interest. New technologies make it possible to store and combine collected data of an enormous amount of people.

User profiling helps companies understand what potential customers might want. Often enough, such data collecting takes place without the customer's knowledge and amounts to spying.

"Much of the information collection that occurs on the Internet is invisible to the consumer, which raises serious questions of fairness and informed consent."

(David Sobel, Electronic Privacy Information Center)

TEXTBLOCK 2/38 // URL: http://world-information.org/wio/infostructure/100437611726/100438658925
 
Intellectual Property and the "Information Society" Metaphor

Today the talk about the so-called "information society" is ubiquitous. By many it is considered as the successor of the industrial society and said to represent a new form of societal and economical organization. This claim is based on the argument, that the information society uses a new kind of resource, which fundamentally differentiates from that of its industrial counterpart. Whereas industrial societies focus on physical objects, the information society's raw material is said to be knowledge and information. Yet the conception of the capitalist system, which underlies industrial societies, also continues to exist in an information-based environment. Although there have been changes in the forms of manufacture, the relations of production remain organized on the same basis. The principle of property.

In the context of a capitalist system based on industrial production the term property predominantly relates to material goods. Still even as in an information society the raw materials, resources and products change, the concept of property persists. It merely is extended and does no longer solely consider physical objects as property, but also attempts to put information into a set of property relations. This new kind of knowledge-based property is widely referred to as "intellectual property". Although intellectual property in some ways represents a novel form of property, it has quickly been integrated in the traditional property framework. Whether material or immaterial products, within the capitalist system they are both treated the same - as property.

TEXTBLOCK 3/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659429
 
Intellectual Property: A Definition

Intellectual property, very generally, relates to the output, which result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches:

1) Industrial Property

a) Inventions
b) Marks (trademarks and service marks)
c) Industrial designs
d) Unfair competition (trade secrets)
e) Geographical indications (indications of source and appellations of origin)

2) Copyright

The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products. Those rights apply to the intellectual creation as such, and not to the physical object in which the work may be embodied.

TEXTBLOCK 4/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659434
 
Identificaiton in history

In biometric technology, the subject is reduced to its physical and therefore inseparable properties. The subject is a subject in so far as it is objectified; that is, in so far as is identified with its own res extensa, Descartes' "extended thing". The subject exists in so far as it can be objectified, if it resists the objectification that comes with measurement, it is rejected or punished. Biometrics therefore provides the ultimate tool for control; in it, the dream of hermetic identity control seems to become a reality, a modern technological reconstruction of traditional identification techniques such as the handshake or the look into somebody's eyes.

The use of identification by states and other institutions of authority is evidently not simply a modern phenomenon. The ancient Babylonians and Chinese already made use of finger printing on clay to identify authors of documents, while the Romans already systematically compared handwritings.

Body measurement has long been used by the military. One of the first measures after entering the military is the identification and appropriation of the body measurements of a soldier. These measurements are filed and combined with other data and make up what today we would call the soldier's data body. With his data body being in possession of the authority, a soldier is no longer able freely socialise and is instead dependent on the disciplinary structure of the military institution. The soldier's social being in the world is defined by the military institution.

However, the military and civilian spheres of modern societies are no longer distinct entities. The very ambivalence of advanced technology (dual use technologies) has meant that "good" and "bad" uses of technology can no longer be clearly distinguished. The measurement of physical properties and the creation of data bodies in therefore no longer a military prerogative, it has become diffused into all areas of modern societies.

If the emancipatory potential of weak identities is to be of use, it is therefore necessary to know how biometric technologies work and what uses they are put to.

TEXTBLOCK 5/38 // URL: http://world-information.org/wio/infostructure/100437611729/100438658096
 
Biometrics applications: gate keeping

Identity has to do with "place". In less mobile societies, the place where a person finds him/herself tells us something about his/her identity. In pre-industrial times, gatekeepers had the function to control access of people to particular places, i.e. the gatekeepers function was to identify people and then decide whether somebody's identity would allow that person to physically occupy another place - a town, a building, a vehicle, etc.

In modern societies, the unambiguous nature of place has been weakened. There is a great amount of physical mobility, and ever since the emergence and spread of electronic communication technologies there has been a "virtualisation" of places in what today we call "virtual space" (unlike place, space has been a virtual reality from the beginning, a mathematical formula) The question as to who one is no longer coupled to the physical abode. Highly mobile and virtualised social contexts require a new generation of gatekeepers which biometric technology aims to provide.

TEXTBLOCK 6/38 // URL: http://world-information.org/wio/infostructure/100437611729/100438658757
 
Problems of Copyright Management and Control Technologies

Profiling and Data Mining

At their most basic copyright management and control technologies might simply be used to provide pricing information, negotiate the purchase transaction, and release a copy of a work for downloading to the customer's computer. Still, from a technological point of view, such systems also have the capacity to be employed for digital monitoring. Copyright owners could for example use the transaction records generated by their copyright management systems to learn more about their customers. Profiles, in their crudest form consisting of basic demographic information, about the purchasers of copyrighted material might be created. Moreover copyright owners could use search agents or complex data mining techniques to gather more information about their customers that could either be used to market other works or being sold to third parties.

Fair Use

Through the widespread use of copyright management and control systems the balance of control could excessively be shifted in favor of the owners of intellectual property. The currently by copyright law supported practice of fair use might potentially be restricted or even eliminated. While information in analogue form can easily be reproduced, the protection of digital works through copyright management systems might complicate or make impossible the copying of material for purposes, which are explicitly exempt under the doctrine of fair use.

Provisions concerning technological protection measures and fair use are stated in the DMCA, which provides that "Since copying of a work may be a fair use under appropriate circumstances, section 1201 does not prohibit the act of circumventing a technological measure that prevents copying. By contrast, since the fair use doctrine is not a defense e to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited." Also the proposed EU Directive on copyright and related rights in the information society contains similar clauses. It distinguishes between the circumvention of technical protection systems for lawful purposes (fair use) and the circumvention to infringe copyright. Yet besides a still existing lack of legal clarity also very practical problems arise. Even if the circumvention of technological protection measures under fair use is allowed, how will an average user without specialized technological know-how be able to gain access or make a copy of a work? Will the producers of copyright management and control systems provide fair use versions that permit the reproduction of copyrighted material? Or will users only be able to access and copy works if they hold a digital "fair use license" ("fair use licenses" have been proposed by Mark Stefik, whereby holders of such licenses could exercise some limited "permissions" to use a digital work without a fee)?

TEXTBLOCK 7/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659629
 
Copyright Management and Control Systems: Post-Infringement

Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:

Steganography

Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.

Agents

Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.

Copyright Litigation

While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.

TEXTBLOCK 8/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
 
Legal Protection: European Union

Within the EU's goal of establishing a European single market also intellectual property rights are of significance. Therefore the European Commission aims at the harmonization of the respective national laws of the EU member states and for a generally more effective protection of intellectual property on an international level. Over the years it has adopted a variety of Conventions and Directives concerned with different aspects of the protection of industrial property as well as copyright and neighboring rights.

An overview of EU activities relating to intellectual property protection is available on the website of the European Commission (DG Internal Market): http://www.europa.eu.int/comm/internal_market/en/intprop/intprop/index.htm

TEXTBLOCK 9/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659574
 
Timeline Cryptography - Introduction

Besides oral conversations and written language many other ways of information-transport are known: like the bush telegraph, drums, smoke signals etc. Those methods are not cryptography, still they need en- and decoding, which means that the history of language, the history of communication and the history of cryptography are closely connected to each other
The timeline gives an insight into the endless fight between enciphering and deciphering. The reasons for them can be found in public and private issues at the same time, though mostly connected to military maneuvers and/or political tasks.

One of the most important researchers on Cryptography through the centuries is David Kahn; many parts of the following timeline are originating from his work.

TEXTBLOCK 10/38 // URL: http://world-information.org/wio/infostructure/100437611776/100438658824
 
Databody convergence

In the phrase "the rise of the citizen as a consumer", to be found on the EDS website, the cardinal political problem posed by the databody industry is summarised: the convergence of commercial and political interest in the data body business, the convergence of bureaucratic and commercial data bodies, the erosion of privacy, and the consequent undermining of democratic politics by private business interest.

When the citizen becomes a consumer, the state must become a business. In the data body business, the key word behind this new identity of government is "outsourcing". Functions, that are not considered core functions of government activity are put into the hands of private contractors.

There have long been instances where privately owned data companies, e.g. credit card companies, are allowed access to public records, e.g. public registries or electoral rolls. For example, in a normal credit card transaction, credit card companies have had access to public records in order to verify identity of a customer. For example, in the UK citizen's personal data stored on the Electoral Roll have been used for commercial purposes for a long time. The new British Data Protection Act now allows people to "opt out" of this kind of commercialisation - a legislation that has prompted protests on the part of the data industry: Experian has claimed to lose LST 500 mn as a consequence of this restriction - a figure that, even if exaggerated, may help to understand what the value of personal data actually is.

While this may serve as an example of an increased public awareness of privacy issues, the trend towards outsourcing seems to lead to a complete breakdown of the barriers between commercial and public use of personal data. This trend can be summarised by the term "outsourcing" of government functions.

Governments increasingly outsource work that is not considered core function of government, e.g. cooking meals in hospitals or mowing lawns in public parks. Such peripheral activities marked a first step of outsourcing. In a further step, governmental functions were divided between executive and judgemental functions, and executive functions increasingly entrusted to private agencies. For these agencies to be able to carry out the work assigned to them, the need data. Data that one was stored in public places, and whose handling was therefore subject to democratic accountability. Outsourcing has produced gains in efficiency, and a decrease of accountability. Outsourced data are less secure, what use they are put to is difficult to control.

The world's largest data corporation, EDS, is also among the foremost outsourcing companies. In an article about EDS' involvement in government outsourcing in Britain, Simon Davies shows how the general trend towards outsourcing combined with advances in computer technology allow companies EDS, outside of any public accountability, to create something like blueprints for the societies of the 21st century. But the problem of accountability is not the only one to be considered in this context. As Davies argues, the data business is taking own its own momentum "a ruthless company could easily hold a government to ransom". As the links between government agencies and citizens thin out, however, the links among the various agencies might increase. Linking the various government information systems would amount to further increase in efficiency, and a further undermining of democracy. The latter, after all, relies upon the separation of powers - matching government information systems would therefore pave the way to a kind of electronic totalitarianism that has little to do with the ideological bent of George Orwell's 1984 vision, but operates on purely technocratic principles.

Technically the linking of different systems is already possible. It would also create more efficiency, which means generate more income. The question, then, whether democracy concerns will prevent it from happening is one that is capable of creating

But what the EDS example shows is something that applies everywhere, and that is that the data industry is whether by intention or whether by default, a project with profound political implications. The current that drives the global economy deeper and deeper into becoming a global data body economy may be too strong to be stopped by conventional means.

However, the convergence of political and economic data bodies also has technological roots. The problem is that politically motivated surveillance and economically motivated data collection are located in the same area of information and communication technologies. For example, monitoring internet use requires more or less the same technical equipment whether done for political or economic purposes. Data mining and data warehousing techniques are almost the same. Creating transparency of citizens and customers is therefore a common objective of intelligence services and the data body industry. Given that data are exchanged in electronic networks, a compatibility among the various systems is essential. This is another factor that encourages "leaks" between state-run intelligence networks and the private data body business. And finally, given the secretive nature of state intelligence and commercial data capturing , there is little transparency. Both structures occupy an opaque zone.

TEXTBLOCK 11/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659769
 
Feeding the data body

TEXTBLOCK 12/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659644
 
Acessing the Internet

The Net connections can be based on wire-line and wireless access technolgies.

Wire-line access

Wire-less access

copper wires

Satellites

coaxial cables

mobile terrestrial antennas

electric power lines

fixed terrestrial antennas

fiber-optic cables







Usually several kinds of network connections are employed at once. Generally speaking, when an E-mail message is sent it travels from the user's computer via copper wires or coaxial cables ISDN lines, etc., to an Internet Service Provider, from there, via fibre-optic cables, to the nearest Internet exchange, and on into a backbone network, tunneling across the continent und diving through submarine fibre-optic cables across the Atlantic to another Internet exchange, from there, via another backbone network and across another regional network to the Internet Service Provider of the supposed message recipient, from there via cables and wires of different bandwidth arriving at its destination, a workstation permanently connected to the Internet. Finally a sound or flashing icon informs your virtual neighbor that a new message has arrived.

Satellite communication

Although facing competition from fiber-optic cables as cost-effective solutions for broadband data transmission services, the space industry is gaining increasing importance in global communications. As computing, telephony, and audiovisual technologies converge, new wireless technologies are rapidly deployed occupying an increasing market share and accelerating the construction of high-speed networks.

Privatization of satellite communication

Until recently transnational satellite communication was provided exclusively by intergovernmental organizations as Intelsat, Intersputnik and Inmarsat.

Scheduled privatization of intergovernmental satellite consortia:

Satellite consortia

Year of foundation

Members

Scheduled date for privatization

Intelsat

1964

200 nations under the leadership of the USA

2001

Intersputnik

1971

23 nations under the leadership of Russia

?

Inmarsat

1979

158 nations (all members of the International Maritime Organization)

privatized since 1999

Eutelsat

1985

Nearly 50 European nations

2001



When Intelsat began to accumulate losses because of management failures and the increasing market share of fiber-optic cables, this organizational scheme came under attack. Lead by the USA, the Western industrialized countries successfully pressed for the privatization of all satellite consortia they are members of and for competition by private carriers.

As of February 2000, there are 2680 satellites in service. Within the next four years a few hundred will be added by the new private satellite systems. Most of these systems will be so-called Low Earth Orbit satellite systems, which are capable of providing global mobile data services on a high-speed level at low cost.

Because of such technological improvements and increasing competition, experts expect satellite-based broadband communication to be as common, cheap, and ubiquitous as satellite TV today within the next five or ten years.

Major satellite communication projects

Project name

Main investors

Expected cost

Number of satellites

Date of service start-up

Astrolink

Lockheed Martin, TRW, Telespazio, Liberty Media Group

US$ 3.6 billion

9

2003

Globalstar

13 investors including Loral Space & Communications, Qualcomm, Hyundai, Alcatel, France Telecom, China Telecom, Daimler Benz and Vodafone/Airtouch

US$ 3.26 billion

48

1998

ICO

57 investors including British Telecom, Deutsche Telecom, Inmarsat, TRW and Telefonica

US$ 4.5 billion

10

2001

Skybridge

9 investors including Alcatel Space, Loral Space & Communications, Toshiba, Mitsubishi and Sharp

US$ 6.7 billion

80

2002

Teledesic

Bill Gates, Craig McCaw, Prince Alwaleed Bin Talal Bin Abdul Aziz Alsaud, Abu Dhabi Investment Company

US$ 9 billion

288

2004


Source: Analysys Satellite Communications Database

TEXTBLOCK 13/38 // URL: http://world-information.org/wio/infostructure/100437611791/100438659839
 
Data bunkers

Personal data are collected, appropriated, processed and used for commercial purposes on a global scale. In order for such a global system to operate smoothly, there a server nodes at which the data streams converge. Among the foremost of these are the data bases of credit card companies, whose operation has long depended on global networking.

On top of credit card companies such as Visa, American Express, Master Card, and others. It would be erroneous to believe that the primary purpose of business of these companies is the provision of credit, and the facilitation of credit information for sale transactions. In fact, Information means much more than just credit information. In an advertisement of 1982, American Express described itself in these terms: ""Our product is information ...Information that charges airline tickets, hotel rooms, dining out, the newest fashions ...information that grows money funds buys and sells equities ...information that pays life insurance annuities ...information that schedules entertainment on cable television and electronically guards houses ...information that changes kroners into guilders and figures tax rates in Bermuda ..."

Information has become something like the gospel of the New Economy, a doctrine of salvation - the life blood of society, as Bill Gates expresses it. But behind information there are always data that need to be generated and collected. Because of the critical importance of data to the economy, their possession amounts to power and their loss can cause tremendous damage. The data industry therefore locates its data warehouses behind fortifications that bar physical or electronic access. Such structures are somewhat like a digital reconstruction of the medieval fortress

Large amounts of data are concentrated in fortress-like structures, in data bunkers. As the Critical Art Ensemble argue in Electronic Civil Disobedience: "The bunker is the foundation of homogeneity, and allows only a singular action within a given situation." All activities within data bunker revolve around the same principle of calculation. Calculation is the predominant mode of thinking in data-driven societies, and it reaches its greatest density inside data bunkers. However, calculation is not a politically neutral activity, as it provides the rational basis - and therefore the formal legitimisation most every decision taken. Data bunkers therefore have an essentially conservative political function, and function to maintain and strengthen the given social structures.

TEXTBLOCK 14/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659754
 
The Copyright Industry

Copyright is not only about protecting the rights of creators, but has also become a major branch of industry with significant contributions to the global economy. According to the International Intellectual Property Alliance the U.S. copyright industry has grown almost three times as fast as the economy as a whole for the past 20 years. In 1997, the total copyright industries contributed an estimated US$ 529.3 billion to the U.S. economy with the core copyright industries accounting for US$ 348.4 billion. Between 1977 and 1997, the absolute growth rate of value added to the U.S. GDP by the core copyright industries was 241 %. Also the copyright industry's foreign sales in 1997 (US$ 66.85 billion for the core copyright industries) were larger than the U.S. Commerce Department International Trade Administration's estimates of the exports of almost all other leading industry sectors. They exceeded even the combined automobile and automobile parts industries, as well as the agricultural sector.

In an age where knowledge and information become more and more important and with the advancement of new technologies, transmission systems and distribution channels a further increase in the production of intellectual property is expected. Therefore as copyright establishes ownership in intellectual property it is increasingly seen as the key to wealth in the future.

TEXTBLOCK 15/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438658710
 
Legal Protection: WIPO (World Intellectual Property Organization)

Presumably the major player in the field of international intellectual property protection and administrator of various multilateral treaties dealing with the legal and administrative aspects of intellectual property is the WIPO.

Information on WIPO administered agreements in the field of industrial property (Paris Convention for the Protection of Industrial Property (1883), Madrid Agreement Concerning the International Registration of Marks (1891) etc.) can be found on: http://www.wipo.org/eng/general/index3.htm

Information on treaties concerning copyright and neighboring rights (Berne Convention for the Protection of Literary and Artistic Works (1886) etc.) is published on: http://www.wipo.org/eng/general/index5.htm

The most recent multilateral agreement on copyright is the 1996 WIPO Copyright Treaty. Among other things it provides that computer programs are protected as literary works and also introduces the protection of databases, which "... by reason of the selection or arrangement of their content constitute intellectual creations." Furthermore the 1996 WIPO Copyright Treaty contains provisions concerning technological measures, rights management information and establishes a new "right of communication to the public". It is available on: http://www.wipo.org/eng/diplconf/distrib/treaty01.htm

TEXTBLOCK 16/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659588
 
Basics: Protected Persons

Generally copyright vests in the author of the work. Certain national laws provide for exceptions and, for example, regard the employer as the original owner of a copyright if the author was, when the work was created, an employee and employed for the purpose of creating that work. In the case of some types of creations, particularly audiovisual works, several national laws provide for different solutions to the question that should be the first holder of copyright in such works.

Many countries allow copyright to be assigned, which means that the owner of the copyright transfers it to another person or entity, which then becomes its holder. When the national law does not permit assignment it usually provides the possibility to license the work to someone else. Then the owner of the copyright remains the holder, but authorizes another person or entity to exercise all or some of his rights subject to possible limitations. Yet in any case the "moral rights" always belong to the author of the work, whoever may be the owner of the copyright (and therefore of the "economic rights").


TEXTBLOCK 17/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659527
 
Global Data Flows

Fiber-optic cables, coaxial cables, copper wires, electric power lines, microwaves, satellite communication, mobile telephony, computer networks: Various telecommunication networks following a variety of standards with bewildering abbreviations - DSL, WAP, GSM, UMTS, Ipv4 etc. - and carrying endless flows of capital and information are the blood veins of modern societies.

In the space of flows constituted by today's global data networks the space of places is transcended. Visualizations of these global data flows show arches bridging seas and continents, thereby linking the world's centres of research and development, economics and politics. In the global "Network Society" (Manuel Castells) the traditional centres of power and domination are not discarded, in the opposite, they are strengthened and reinforced by the use of information and communication technologies. Political, economical and symbolical power becomes increasingly linked to the use of modern information and communication technologies. The most sensitive and advanced centres of information and communication technologies are the stock markets. Excluded from the network constituted by modern information and communication technologies, large parts of Africa, Asia and South America, but also the poor of industrialized countries, are ranking increasingly marginal to the world economy.

Cities are centres of communications, trade and power. The higher the percentage of urban population, the more it is likely that the telecommunications infrastructure is generally good to excellent. This goes hand in hand with lower telecommunications costs. Those parts of the world with the poorest infrastructure are also the world's poorhouse. In Bangladesh for most parts of the population a personal computer is as expensive as a limousine in European one-month's salary in Europe, they have to pay eight annual salaries. Therefore telecommunications infrastructure is concentrated on the highly industrialized world: Most telephone mainlines, mobile telephones, computers, Internet accounts and Internet hosts (computers connected to the global data networks) can be found here. The same applies to media: the daily circulation of newspapers and the use of TV sets and radios. - Telecommunication and media services affordable to most parts of the population are mostly restricted to industrialized countries.

This situation will not change in the foreseeable future: Most expenditure for telecommunications infrastructure will be restricted to the richest countries in the world. In 1998, the world's richest countries consumed 75% of all cables and wires.

TEXTBLOCK 18/38 // URL: http://world-information.org/wio/infostructure/100437611791/100438658776
 
Global data bodies - intro

- Education files, insurance files, tax files, communication files, consumption files, medical files, travel files, criminal files, investment files, files into infinity ...

Critical Art Ensemble

Global data bodies

1. Introduction

Informatisation has meant that things that once were "real", i.e. whose existence could be experienced sensually, are becoming virtual. Instead of the real existence of a thing, the virtual refers to its possibility of existence. As this process advances, an increasing identification of the possible with the real occurs. Reality migrates into a dim and dematerialised grey area. In the end, the possible counts for the real, virtualisation creates an "as-if" experience.

The experience of the body is also affected by this process. For example, in bio-technology, the human body and its functions are digitised, which prepares and understanding of the body exlusively in terms of its potential manipulation, the body becomes whatever it could be. But digitisation has not only affected the understanding and the social significance of the body, it has also altered the meaning of presence, traditionally identified with the body. The advance of information and communication technologies (ICTs) has meant that for an increasing number of activities we no longer need be physically present, our "virtual" presence, achieved by logging onto a electronic information network, is sufficient.

This development, trumpeted as the pinnacle of convenience by the ICT industries and governments interested in attracting investment, has deeply problematic aspects as well. For example, when it is no longer "necessary" to be physically present, it may soon no longer be possible or allowed. Online-banking, offered to customers as a convenience, is also serves as a justification for charging higher fees from those unwilling or unable to add banking to their household chores. Online public administration may be expected to lead to similar effects. The reason for this is that the digitalisation of the economy relies on the production of surplus data. Data has become the most important raw material of modern economies.

In modern economies, informatisation and virtualisation mean that people are structurally forced to carry out their business and life their lives in such a way as to generate data.

Data are the most important resource for the New Economy. By contrast, activities which do not leave behind a trace of data, as for example growing your own carrots or paying cash rather than by plastic card, are discouraged and structurally suppressed.

TEXTBLOCK 19/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659649
 
Another Question of Security

Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day.
Therefore the decision to elect a certain method of enciphering finally is a matter of trust.

For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide.
The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge.

The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy.
It is especially the latter that touches the main elements of democracy.

for the question of security see:
http://www-db.stanford.edu/pub/gio/CS99I/security.html

TEXTBLOCK 20/38 // URL: http://world-information.org/wio/infostructure/100437611776/100438658850
 
Global hubs of the data body industry

While most data bunkers are restricted to particular areas or contexts, there are others which act as global data nodes. Companies such as EDS (Electronic Data Systems), Experian, First Data Corporation and Equifax operate globally and run giant databases containing personal information. They are the global hubs of the data body economy.

Company

Sales in USD billions

Size of client database in million datasets





Equifax





1,7





360





Experian





1,5





779





Fist Data Corporation





5,5





260





EDS





18,5









(not disclosed)

(Sales and database sizes, 1998)

The size of these data repositories is constantly growing, so it is only a matter of time when everybody living in the technologically saturated part of the world will be registered in one of these data bunkers.

Among these companies, EDS, founded by the former US presidential candidate Ross Perot, known for his right-wing views and direct language, is of particular importance. Not only is it the world's largest data body company, it is also secretive about the size of its client database - a figure disclosed by the other companies either in company publications or upon enquiry. After all, the size of such a data base makes a company more attractive for potential customers.

For many years, EDS has been surrounded by rumours concerning sinister involvement with intelligence agencies. Beyond the rumours, though, there are also facts. EDS has a special division for government services. EDS does business with all military agencies of the US, as well as law enforcement agencies, justice agencies, and many others. The company also maintains a separate division for military equipment In 1984, the company became a subsidiary of General Motors, itself a leading manufacturer of military and intelligence systems. EDS is listed by the Federation of American Scientist's intelligence resource program as contractor to US intelligence agencies, and prides itself, amongst other things, to respond to the "rise of the citizen as a consumer".

TEXTBLOCK 21/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659778
 
Linking and Framing: Cases

Mormon Church v. Sandra and Jerald Tanner

In a ruling of December 1999, a federal judge in Utah temporarily barred two critics of the Mormon Church from posting on their website the Internet addresses of other sites featuring pirated copies of a Mormon text. The Judge said that it was likely that Sandra and Jerald Tanner had engaged in contributory copyright infringement when they posted the addresses of three Web sites that they knew, or should have known, contained the copies.

Kaplan, Carl S.: Copyright Decision Threatens Freedom to Link. In: New York Times. December 10, 1999.

Universal Studios v. Movie-List

The website Movie-List, which features links to online, externally hosted movie trailers has been asked to completely refrain from linking to any of Universal Studio's servers containing the trailers as this would infringe copyright.

Cisneros, Oscar S.: Universal: Don't Link to Us. In: Wired. July 27, 1999.

More cases concerned with the issue of linking, framing and the infringement of intellectual property are published in:

Ross, Alexandra: Copyright Law and the Internet: Selected Statutes and Cases.

TEXTBLOCK 22/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659639
 
Challenges for Copyright by ICT: Copyright Owners

The main concern of copyright owners as the (in terms of income generation) profiteers of intellectual property protection is the facilitation of pirate activities in digital environments.

Reproduction and Distribution

Unlike copies of works made using analog copiers (photocopy machines, video recorders etc.) digital information can be reproduced extremely fast, at low cost and without any loss in quality. Since each copy is a perfect copy, no quality-related limits inhibit pirates from making as many copies as they please, and recipients of these copies have no incentive to return to authorized sources to get another qualitatively equal product. Additionally the costs of making one extra copy of intellectual property online are insignificant, as are the distribution costs if the copy is moved to the end user over the Internet.

Control and Manipulation

In cross-border, global data networks it is almost impossible to control the exploitation of protected works. Particularly the use of anonymous remailers and other existing technologies complicates the persecution of pirates. Also digital files are especially vulnerable to manipulation, of the work itself, and of the (in some cases) therein-embedded copyright management information.

TEXTBLOCK 23/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659526
 
Transparent customers. Direct marketing online



This process works even better on the Internet because of the latter's interactive nature. "The Internet is a dream to direct marketers", said Wil Lansing, CEO of the American retailer Fingerhut Companies. Many services require you to register online, requiring users to provide as much information about them as possible. And in addition, the Internet is fast, cheap and used by people who tend to be young and on the search for something interesting.

Many web sites also are equipped with user tracking technology that registers a users behaviour and preferences during a visit. For example, user tracking technology is capable of identifying the equipment and software employed by a user, as well as movements on the website, visit of links etc. Normally such information is anonymous, but can be personalised when it is coupled with online registration, or when personal identifcation has been obtained from other sources. Registration is often a prerequisite not just for obtaining a free web mail account, but also for other services, such as personalised start pages. Based on the information provided by user, the start page will then include advertisements and commercial offers that correspond to the users profile, or to the user's activity on the website.

One frequent way of obtaining such personal information of a user is by offering free web mail accounts offered by a great many companies, internet providers and web portals (e.g. Microsoft, Yahoo, Netscape and many others). In most cases, users get "free" accounts in return for submitting personal information and agreeing to receive marketing mails. Free web mail accounts are a simple and effective direct marketing and data capturing strategy which is, however, rarely understood as such. However, the alliances formed between direct advertising and marketing agencies on the one hand, and web mail providers on the other hand, such as the one between DoubleClick and Yahoo, show the common logic of data capturing and direct marketing. The alliance between DoubleClick and Yahoo eventually attracted the US largest direct marketing agency, Abacus Direct, who ended up buying DoubleClick.

However, the intention of collecting users personal data and create consumer profiles based on online behaviour can also take on more creative and playful forms. One such example is sixdegrees.com. This is a networking site based on the assumption that everybody on the planet is connected to everybody else by a chain of six people at most. The site offers users to get to know a lot of new people, the friends of their friends of their friends, for example, and if they try hard enough, eventually Warren Beatty or Claudia Schiffer. But of course, in order to make the whole game more useful for marketing purposes, users are encouraged to join groups which share common interests, which are identical with marketing categories ranging from arts and entertainment to travel and holiday. Evidently, the game becomes more interesting the more new people a user brings into the network. What seems to be fun for the 18 to 24 year old college student customer segment targeted by sixdegrees is, of course, real business. While users entertain themselves they are being carefully profiled. After all, data of young people who can be expected to be relatively affluent one day are worth more than money.

The particular way in which sites such as sixdegrees.com and others are structured mean that not only to users provide initial information about them, but also that this information is constantly updated and therefore becomes even more valuable. Consequently, many free online services or web mail providers cancel a user's account if it has not been uses for some time.

There are also other online services which offer free services in return for personal information which is then used for marketing purposes, e.g. Yahoo's Geocities, where users may maintain their own free websites, Bigfoot, where people are offered a free e-mail address for life, that acts as a relais whenever a customer's residence or e-mail address changes. In this way, of course, the marketers can identify friendship and other social networks, and turn this knowledge into a marketing advantage. People finders such as WhoWhere? operate along similar lines.

A further way of collecting consumer data that has recently become popular is by offering free PCs. Users are provided with a PC for free or for very little money, and in return commit themselves to using certain services rather than others (e.g. a particular internet provider), providing information about themselves, and agree to have their online behaviour monitored by the company providing the PC, so that accurate user profiles can be compiled. For example, the Free PC Network offers advertisers user profiles containing "over 60 individual demographics". There are literally thousands of variations of how a user's data are extracted and commercialised when online. Usually this happens quietly in the background.

A good inside view of the world of direct marketing can be gained at the website of the American Direct Marketing Association and the Federation of European Direct Marketing.

TEXTBLOCK 24/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659667
 
Atrocity Stories

Atrocity stories are nothing else than lies; the two words "atrocity stories" simply pretend to be more diplomatic.
The purpose is to destroy an image of the enemy, to create a new one, mostly a bad one. The story creating the image is not necessarily made up completely. It can also be a changed into a certain variable direction.
The most important thing about atrocity stories is to follow the line of possibility. Even if the whole story is made up it must be probable or at least possible, following rumors. Most successful might it be if a rumor is spread on purpose, some time before the atrocity story is launched, because as soon as something seems to be familiar, it is easier to believe it.

TEXTBLOCK 25/38 // URL: http://world-information.org/wio/infostructure/100437611661/100438658524
 
In Search of Reliable Internet Measurement Data

Newspapers and magazines frequently report growth rates of Internet usage, number of users, hosts, and domains that seem to be beyond all expectations. Growth rates are expected to accelerate exponentially. However, Internet measurement data are anything thant reliable and often quite fantastic constructs, that are nevertheless jumped upon by many media and decision makers because the technical difficulties in measuring Internet growth or usage are make reliable measurement techniques impossible.

Equally, predictions that the Internet is about to collapse lack any foundation whatsoever. The researchers at the Internet Performance Measurement and Analysis Project (IPMA) compiled a list of news items about Internet performance and statistics and a few responses to them by engineers.

Size and Growth

In fact, "today's Internet industry lacks any ability to evaluate trends, identity performance problems beyond the boundary of a single ISP (Internet service provider, M. S.), or prepare systematically for the growing expectations of its users. Historic or current data about traffic on the Internet infrastructure, maps depicting ... there is plenty of measurement occurring, albeit of questionable quality", says K. C. Claffy in his paper Internet measurement and data analysis: topology, workload, performance and routing statistics (http://www.caida.org/Papers/Nae/, Dec 6, 1999). Claffy is not an average researcher; he founded the well-known Cooperative Association for Internet Data Analysis (CAIDA).

So his statement is a slap in the face of all market researchers stating otherwise.
In a certain sense this is ridiculous, because since the inception of the ARPANet, the offspring of the Internet, network measurement was an important task. The very first ARPANet site was established at the University of California, Los Angeles, and intended to be the measurement site. There, Leonard Kleinrock further on worked on the development of measurement techniques used to monitor the performance of the ARPANet (cf. Michael and Ronda Hauben, Netizens: On the History and Impact of the Net). And in October 1991, in the name of the Internet Activities Board Vinton Cerf proposed guidelines for researchers considering measurement experiments on the Internet stated that the measurement of the Internet. This was due to two reasons. First, measurement would be critical for future development, evolution and deployment planning. Second, Internet-wide activities have the potential to interfere with normal operation and must be planned with care and made widely known beforehand.
So what are the reasons for this inability to evaluate trends, identity performance problems beyond the boundary of a single ISP? First, in early 1995, almost simultaneously with the worldwide introduction of the World Wide Web, the transition of the stewardship role of the National Science Foundation over the Internet into a competitive industry (bluntly spoken: its privatization) left no framework for adequate tracking and monitoring of the Internet. The early ISPs were not very interested in gathering and analyzing network performance data, they were struggling to meet demands of their rapidly increasing customers. Secondly, we are just beginning to develop reliable tools for quality measurement and analysis of bandwidth or performance. CAIDA aims at developing such tools.
"There are many estimates of the size and growth rate of the Internet that are either implausible, or inconsistent, or even clearly wrong", K. G. Coffman and Andrew, both members of different departments of AT & T Labs-Research, state something similar in their paper The Size and Growth Rate of the Internet, published in First Monday. There are some sources containing seemingly contradictory information on the size and growth rate of the Internet, but "there is no comprehensive source for information". They take a well-informed and refreshing look at efforts undertaken for measuring the Internet and dismantle several misunderstandings leading to incorrect measurements and estimations. Some measurements have such large error margins that you might better call them estimations, to say the least. This is partly due to the fact that data are not disclosed by every carrier and only fragmentarily available.
What is measured and what methods are used? Many studies are devoted to the number of users; others look at the number of computers connected to the Internet or count IP addresses. Coffman and Odlyzko focus on the sizes of networks and the traffic they carry to answer questions about the size and the growth of the Internet.
You get the clue of their focus when you bear in mind that the Internet is just one of many networks of networks; it is only a part of the universe of computer networks. Additionally, the Internet has public (unrestricted) and private (restricted) areas. Most studies consider only the public Internet, Coffman and Odlyzko consider the long-distance private line networks too: the corporate networks, the Intranets, because they are convinced (that means their assertion is put forward, but not accompanied by empirical data) that "the evolution of the Internet in the next few years is likely to be determined by those private networks, especially by the rate at which they are replaced by VPNs (Virtual Private Networks) running over the public Internet. Thus it is important to understand how large they are and how they behave." Coffman and Odlyzko check other estimates by considering the traffic generated by residential users accessing the Internet with a modem, traffic through public peering points (statistics for them are available through CAIDA and the National Laboratory for Applied Network Research), and calculating the bandwidth capacity for each of the major US providers of backbone services. They compare the public Internet to private line networks and offer interesting findings. The public Internet is currently far smaller, in both capacity and traffic, than the switched voice network (with an effective bandwidth of 75 Gbps at December 1997), but the private line networks are considerably larger in aggregate capacity than the Internet: about as large as the voice network in the U. S. (with an effective bandwidth of about 330 Gbps at December 1997), they carry less traffic. On the other hand, the growth rate of traffic on the public Internet, while lower than is often cited, is still about 100% per year, much higher than for traffic on other networks. Hence, if present growth trends continue, data traffic in the U. S. will overtake voice traffic around the year 2002 and will be dominated by the Internet. In the future, growth in Internet traffic will predominantly derive from people staying longer and from multimedia applications, because they consume more bandwidth, both are the reason for unanticipated amounts of data traffic.

Hosts

The Internet Software Consortium's Internet Domain Survey is one of the most known efforts to count the number of hosts on the Internet. Happily the ISC informs us extensively about the methods used for measurements, a policy quite rare on the Web. For the most recent survey the number of IP addresses that have been assigned a name were counted. At first sight it looks simple to get the accurate number of hosts, but practically an assigned IP address does not automatically correspond an existing host. In order to find out, you have to send a kind of message to the host in question and wait for a reply. You do this with the PING utility. (For further explanations look here: Art. PING, in: Connected: An Internet Encyclopaedia) But to do this for every registered IP address is an arduous task, so ISC just pings a 1% sample of all hosts found and make a projection to all pingable hosts. That is ISC's new method; its old method, still used by RIPE, has been to count the number of domain names that had IP addresses assigned to them, a method that proved to be not very useful because a significant number of hosts restricts download access to their domain data.
Despite the small sample, this method has at least one flaw: ISC's researchers just take network numbers into account that have been entered into the tables of the IN-ADDR.ARPA domain, and it is possible that not all providers know of these tables. A similar method is used for Telcordia's Netsizer.

Internet Weather

Like daily weather, traffic on the Internet, the conditions for data flows, are monitored too, hence called Internet weather. One of the most famous Internet weather report is from The Matrix, Inc. Another one is the Internet Traffic Report displaying traffic in values between 0 and 100 (high values indicate fast and reliable connections). For weather monitoring response ratings from servers all over the world are used. The method used is to "ping" servers (as for host counts, e. g.) and to compare response times to past ones and to response times of servers in the same reach.

Hits, Page Views, Visits, and Users

Let us take a look at how these hot lists of most visited Web sites may be compiled. I say, may be, because the methods used for data retrieval are mostly not fully disclosed.
For some years it was seemingly common sense to report requested files from a Web site, so called "hits". A method not very useful, because a document can consist of several files: graphics, text, etc. Just compile a document from some text and some twenty flashy graphical files, put it on the Web and you get twenty-one hits per visit; the more graphics you add, the more hits and traffic (not automatically to your Web site) you generate.
In the meantime page views, also called page impressions are preferred, which are said to avoid these flaws. But even page views are not reliable. Users might share computers and corresponding IP addresses and host names with others, she/he might access not the site, but a cached copy from the Web browser or from the ISP's proxy server. So the server might receive just one page request although several users viewed a document.

Especially the editors of some electronic journals (e-journals) rely on page views as a kind of ratings or circulation measure, Rick Marin reports in the New York Times. Click-through rates - a quantitative measure - are used as a substitute for something of intrinsically qualitative nature: the importance of a column to its readers, e. g. They may read a journal just for a special column and not mind about the journal's other contents. Deleting this column because of not receiving enough visits may cause these readers to turn their backs on their journal.
More advanced, but just slightly better at best, is counting visits, the access of several pages of a Web site during one session. The problems already mentioned apply here too. To avoid them, newspapers, e.g., establish registration services, which require password authentication and therefore prove to be a kind of access obstacle.
But there is a different reason for these services. For content providers users are virtual users, not unique persons, because, as already mentioned, computers and IP addresses can be shared and the Internet is a client-server system; in a certain sense, in fact computers communicate with each other. Therefore many content providers are eager to get to know more about users accessing their sites. On-line registration forms or WWW user surveys are obvious methods of collecting additional data, sure. But you cannot be sure that information given by users is reliable, you can just rely on the fact that somebody visited your Web site. Despite these obstacles, companies increasingly use data capturing. As with registration services cookies come here into play.

For

If you like to play around with Internet statistics instead, you can use Robert Orenstein's Web Statistics Generator to make irresponsible predictions or visit the Internet Index, an occasional collection of seemingly statistical facts about the Internet.

Measuring the Density of IP Addresses

Measuring the Density of IP Addresses or domain names makes the geography of the Internet visible. So where on earth is the most density of IP addresses or domain names? There is no global study about the Internet's geographical patterns available yet, but some regional studies can be found. The Urban Research Initiative and Martin Dodge and Narushige Shiode from the Centre for Advanced Spatial Analysis at the University College London have mapped the Internet address space of New York, Los Angeles and the United Kingdom (http://www.geog.ucl.ac.uk/casa/martin/internetspace/paper/telecom.html and http://www.geog.ucl.ac.uk/casa/martin/internetspace/paper/gisruk98.html).
Dodge and Shiode used data on the ownership of IP addresses from RIPE, Europe's most important registry for Internet numbers.





TEXTBLOCK 26/38 // URL: http://world-information.org/wio/infostructure/100437611791/100438658352
 
Virtual body and data body



The result of this informatisation is the creation of a virtual body which is the exterior of a man or woman's social existence. It plays the same role that the physical body, except located in virtual space (it has no real location). The virtual body holds a certain emancipatory potential. It allows us to go to places and to do things which in the physical world would be impossible. It does not have the weight of the physical body, and is less conditioned by physical laws. It therefore allows one to create an identity of one's own, with much less restrictions than would apply in the physical world.

But this new freedom has a price. In the shadow of virtualisation, the data body has emerged. The data body is a virtual body which is composed of the files connected to an individual. As the Critical Art Ensemble observe in their book Flesh Machine, the data body is the "fascist sibling" of the virtual body; it is " a much more highly developed virtual form, and one that exists in complete service to the corporate and police state."

The virtual character of the data body means that social regulation that applies to the real body is absent. While there are limits to the manipulation and exploitation of the real body (even if these limits are not respected everywhere), there is little regulation concerning the manipulation and exploitation of the data body, although the manipulation of the data body is much easier to perform than that of the real body. The seizure of the data body from outside the concerned individual is often undetected as it has become part of the basic structure of an informatised society. But data bodies serve as raw material for the "New Economy". Both business and governments claim access to data bodies. Power can be exercised, and democratic decision-taking procedures bypassed by seizing data bodies. This totalitarian potential of the data body makes the data body a deeply problematic phenomenon that calls for an understanding of data as social construction rather than as something representative of an objective reality. How data bodies are generated, what happens to them and who has control over them is therefore a highly relevant political question.

TEXTBLOCK 27/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659695
 
Definition

During the last 20 years the old Immanuel Wallerstein-paradigm of center - periphery and semi-periphery found a new costume: ICTs. After Colonialism, Neo-Colonialism and Neoliberalism a new method of marginalization is emerging: the digital divide.

"Digital divide" describes the fact that the world can be divided into people who
do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide.
More than 80% of all computers with access to the Internet are situated in larger cities.

"The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium."
(Izumi Aizi)

for more information see:
http://www.whatis.com/digital_divide.htm

TEXTBLOCK 28/38 // URL: http://world-information.org/wio/infostructure/100437611730/100438659300
 
Legal Protection: National Legislation

Intellectual property - comprising industrial property and copyright - in general is protected by national legislation. Therefore those rights are limited territorially and can be exercised only within the jurisdiction of the country or countries under whose laws they are granted.

TEXTBLOCK 29/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659540
 
Virtual cartels, oligopolistic structures

Global networks require global technical standards ensuring the compatibility of systems. Being able to define such standards makes a corporation extremely powerful. And it requires the suspension of competitive practices. Competition is relegated to the symbolic realm. Diversity and pluralism become the victims of the globalisation of baroque sameness.

The ICT market is dominated by incomplete competition aimed at short-term market domination. In a very short time, new ideas can turn into best-selling technologies. Innovation cycles are extremely short. But today's state-of-the-art products are embryonic trash.

    According to the Computer and Communications Industry Association, Microsoft is trying to aggressively take over the network market. This would mean that AT&T would control 70 % of all long distance phone calls and 60 % of cable connections.



    AOL and Yahoo are lone leaders in the provider market. AOL has 21 million subscribers in 100 countries. In a single month, AOL registers 94 million visits. Two thirds of all US internet users visited Yahoo in December 1999.



    The world's 13 biggest internet providers are all American.



    AOL and Microsoft have concluded a strategic cross-promotion deal. In the US, the AOL icon is installed on every Windows desktop. AOL has also concluded a strategic alliance with Coca Cola.


TEXTBLOCK 30/38 // URL: http://world-information.org/wio/infostructure/100437611709/100438658963
 
How the Internet works

On the Internet, when you want to retrieve a document from another computer, you request a service from this computer. Your computer is the client, the computer on which the information you want to access is stored, is called the server. Therefore the Internet's architecture is called client-server architecture.

A common set of standards allows the exchange of data and commands independent from locations, time, and operating systems through the Internet. These standards are called communication protocols, or the Internet Protocol Suite, and are implemented in Internet software. Sometimes the Internet Protocol Suite is erroneously identified with TCP/IP (Transmission Control Protocol / Internet Protocol).

Any information to be transferred is broken down into pieces, so-called packets, and the Internet Protocol figures out how the data is supposed to get from A to B by passing through routers.

Each packet is "pushed" from router to router via gateways and might take a different route. It is not possible to determine in advance which ways these packets will take. At the receiving end the packets are checked and reassembled.

The technique of breaking down all messages and requests into packets has the advantage that a large data bundle (e.g. videos) sent by a single user cannot block a whole network, because the bandwidth needed is deployed on several packets sent on different routes. Detailed information about routing in the Internet can be obtained at http://www.scit.wlv.ac.uk/~jphb/comms/iproute.html.

One of the Internet's (and of the Matrix's) beginnings was the ARPANet, whose design was intended to withstand any disruption, as for example in military attacks. The ARPANet was able to route data around damaged areas, so that the disruption would not impede communication. This design, whith its origin in strategic and military considerations, remained unchanged for the Internet. Yet the design of the ARPANet's design cannot be completely applied to the Internet.

Routing around depends on the location of the interruption and on the availability of intersecting points between networks. If, for example, an E-mail message is sent from Brussels to Athens and in Germany a channel is down, it will not affect access very much, the message will be routed around this damage, as long as a major Internet exchange is not affected. However, if access depends on a single backbone connection to the Internet and this connection is cut off, there is no way to route around.

In most parts of the world the Internet is therefore vulnerable to disruption. "The idea of the Internet as a highly distributed, redundant global communications system is a myth. Virtually all communications between countries take place through a very small number of bottlenecks, and the available bandwidth isn't that great," says Douglas Barnes. These bottlenecks are the network connections to neighboring countries. Many countries rely on a one single connection to the Net, and in some places, such as the Suez Canal, there is a concentration of fiber-optic cables of critical importance.

TEXTBLOCK 31/38 // URL: http://world-information.org/wio/infostructure/100437611791/100438659870
 
Timeline 1600 - 1900 AD

17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card

- Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians

- the English scientist, magician and astrologer John Dee works on the ancient Enochian alphabet; he also possesses an encrypted writing that could not been broken until today

1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally.

1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code

18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day.

1790's Thomas Jefferson and Robert Patterson invent a wheel cipher

1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs

1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844.

1834 the Braille Code for blind people is developed in today's form by Louis Braille

1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then

1854 the Playfair cipher is invented by Sir Charles Wheatstone

1859 for the first time a tomographic cipher gets described

1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages

1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army

1895 the invention of the radio changes cryptography-tasks again and makes them even more important

TEXTBLOCK 32/38 // URL: http://world-information.org/wio/infostructure/100437611776/100438658974
 
Individualized Audience Targeting

New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like Amazon.Com have already started to exploit individualized audience targeting for their purposes.

TEXTBLOCK 33/38 // URL: http://world-information.org/wio/infostructure/100437611652/100438658450
 
fingerprint identification

Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion.

As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment.

Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device (http://www.ddsi-cpc.com) which translates the characteristics of a fingerprint into a digitised image.

As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies.

TEXTBLOCK 34/38 // URL: http://world-information.org/wio/infostructure/100437611729/100438658358
 
Bureaucratic data bunkers



Among the foremost of the data bunkers government bureaucracies. Bureaucracies are the oldest forms of bunkers and are today deeply engrained in modern societies. Bureaucracies have always had the function of collecting and administering the data of subjects. What make this process more problematic in the age of ICT is that a lot more data can be collected, they can be collected in clandestine ways (e.g. in surveillance situations), and the can be combined and merged using advanced data mining technologies. In addition, there is a greater rationale for official data collecting, as a lot more data is required for the functioning of public administration as in previous periods, as societies rush to adopt increasingly complex technologies, above all ICTs. The increasing complexity of modern societies means that an increasing number of bureaucratic decision is taken, all of which require a calculation process. Complexity, viewed through government spectacles, generates insecurity - a great deal of the bureaucratic activity therefore revolves around the topic of security.

In spite of the anti-bureaucratic rhetoric of most governments, these factors provides the bureaucracies with an increased hold on society. Foremost bureaucratic data bunkers include the following:

    Law enforcement agencies

    Fiscal agencies

    Intelligence agencies

    Social welfare agencies

    Social insurance institutions

    Public health agencies

    Educational institutions



These are agencies that enjoy the privileged protection of the state. Those among them that operate in the field of security are further protected against public scrutiny, as they operate in an area to which democratic reason has no access.

What makes the data repositories of these institutions different from private data bunkers is their "official", i.e. their politically binding and definitive character. CAE speak of the bureaucracy as a "concrete form of uninterruptible, official and legitimised memory."

TEXTBLOCK 35/38 // URL: http://world-information.org/wio/infostructure/100437611761/100438659721
 
Positions Towards the Future of Copyright in the "Digital Age"

With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified:

Eliminate Copyright

Anti-copyrightists believe that any intellectual property should be in the public domain and available for all to use. "Information wants to be free" and copyright restricts people's possibilities concerning the utilization of digital content. An enforced copyright will lead to a further digital divide as copyright creates unjust monopolies in the basic commodity of the "information age". Also the increased ease of copying effectively obviates copyright, which is a relict of the past and should be expunged.

Enlarge Copyright

Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other core copyright industries) - and therefore recipients of the royalties - adhere to the idea of enlarging copyright. In their view the basic foundation of copyright - the response to the need to provide protection to authors so as to give them an incentive to invest the time and effort required to produce creative works - is also relevant in a digital environment.

TEXTBLOCK 36/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659711
 
Basics: Introduction

Copyright law is a branch of intellectual property law and deals with the rights of intellectual creators in their works. The scope of copyright protection as laid down in Article 2 of the 1996 WIPO Copyright Treaty "... extends to expressions and not to ideas, procedures, methods of operation or mathematical concepts as such." Copyright law protects the creativity concerning the choice and arrangement of words, colors, musical notes etc. It grants the creators of certain specified works exclusive rights relating to the "copying" and use of their original creation.


TEXTBLOCK 37/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659520
 
The Piracy "Industry"

Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of intellectual property by permitting still easier copying, electronic sales and transmissions of illegally reproduced copyrighted works on a grand scale.

This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent copy-protection security measures.

Lately the International Intellectual Property Alliance has published a new report on the estimated trade losses due to piracy. (The IIPA assumes that their report actually underestimates the loss of income due to the unlawful copying and distribution of copyrighted works. Yet it should be taken into consideration that the IIPA is the representative of the U.S. core copyright industries (business software, films, videos, music, sound recordings, books and journals, and interactive entertainment software).)

Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)





Motion Pictures

Records & Music

Business Applications

Entertainment Software

Books





1999

1998

1999

1998

1999

1998

1999

1998

1999

1998

Total Losses

1323

1421

1684

1613

3211

3437

3020

2952

673

619



Total Losses (core copyright industries)

1999

1998

9910.0

10041.5




TEXTBLOCK 38/38 // URL: http://world-information.org/wio/infostructure/100437611725/100438659531
 
1996 WIPO Copyright Treaty (WCT)

The 1996 WIPO Copyright Treaty, which focused on taking steps to protect copyright "in the digital age" among other provisions 1) makes clear that computer programs are protected as literary works, 2) the contracting parties must protect databases that constitute intellectual creations, 3) affords authors with the new right of making their works "available to the public", 4) gives authors the exclusive right to authorize "any communication to the public of their works, by wire or wireless means ... in such a way that members of the public may access these works from a place and at a time individually chosen by them." and 5) requires the contracting states to protect anti-copying technology and copyright management information that is embedded in any work covered by the treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm



http://www.wipo.int/documents/en/diplconf/dis...
INDEXCARD, 1/73
 
Economic rights

The economic rights (besides moral rights and in some cases also neighboring rights) granted to the owners of copyright usually include 1) copying or reproducing a work, 2) performing a work in public, 3) making a sound recording of a work, 4) making a motion picture of a work, 5) broadcasting a work, 6) translating a work and 7) adapting a work. Under certain national laws some of these rights are not exclusive rights of authorization but in specific cases, merely rights to remuneration.

INDEXCARD, 2/73
 
Gottfried Wilhelm von Leibniz

b. July 1, 1646, Leipzig
d. November 14, 1716, Hannover, Hanover

German philosopher, mathematician, and political adviser, important both as a metaphysician and as a logician and distinguished also for his independent invention of the differential and integral calculus. 1661, he entered the University of Leipzig as a law student; there he came into contact with the thought of men who had revolutionized science and philosophy--men such as Galileo, Francis Bacon, Thomas Hobbes, and René Descartes. In 1666 he wrote De Arte Combinatoria ("On the Art of Combination"), in which he formulated a model that is the theoretical ancestor of some modern computers.

INDEXCARD, 3/73
 
Digital Subscriber Line (DSL)

DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( http://www.britannica.com/bcom/eb/article/4/0,5716,129614+15,00.html )).

http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 4/73
 
Machine language

Initially computer programmers had to write instructions in machine language. This coded language, which can be understood and executed directly by the computer without conversion or translation, consists of binary digits representing operation codes and memory addresses. Because it is made up of strings of 1s and 0s, machine language is difficult for humans to use.

INDEXCARD, 5/73
 
RSA

The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, Pretty Good Privacy (PGP). It is also employed in both the Netscape Navigator and Microsoft Explorer web browsing programs in their implementations of the Secure Sockets Layer (SSL), and by Mastercard and VISA in the Secure Electronic Transactions (SET) protocol for credit card transactions.

INDEXCARD, 6/73
 
Adolf Hitler

Adolf Hitler (1889-1945) was the head of the NSdAP, the National Socialist Workers' Party. Originally coming from Austria, he started his political career in Germany. As the Reichskanzler of Germany he provoked World War II. His hatred against all non-Aryans and people thinking in a different way killed millions of human beings. Disinformation about his personality and an unbelievable machinery of propaganda made an entire people close its eyes to the most cruel crimes on human kind.

INDEXCARD, 7/73
 
Adi Shamir

Adi Shamir was one of three persons in a team to invent the RSA public-key cryptosystem. The other two authors were Ron Rivest and Leonard M. Adleman.

INDEXCARD, 8/73
 
Ron Rivest

Ronald L. Rivest is Webster Professor of Electrical Engineering and Computer Science in MIT's EECS Department. He was one of three persons in a team to invent the RSA public-key cryptosystem. The co-authors were Adi Shamir and Leonard M. Adleman.

INDEXCARD, 9/73
 
Framing

Framing is the practice of creating a frame or window within a web page where the content of a different web page can be display. Usually when a link is clicked on, the new web page is presented with the reminders of the originating page.

INDEXCARD, 10/73
 
ARPAnet

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of wide area networks, the possibility of remote computing, it was created for resource sharing between research institutions, not for messaging services like E-mail. Although research was sponsored by US military, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute.

But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers offered a general public access to NSFnet. Beginning in 1995, after having become the backbone of the Internet in the USA, NSFnet was turned over to a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA commercial users already outnumbered military and academic users in 1994.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

INDEXCARD, 11/73
 
Sony Corporation

Japanese SONY KK, major Japanese manufacturer of consumer electronics products. Headquarters are in Tokyo. The company was incorporated in 1946 and spearheaded Japan's drive to become the world's dominant consumer electronics manufacturer in the late 20th century. The company was one of the first to recognize the potential of the consumer videotape market. In 1972 it formed an affiliate to market its Betamax colour videocassette system. In 1987-88 Sony purchased the CBS Records Group from CBS Inc., thus acquiring the world's largest record company. It followed that purchase with the purchase in 1989 of Columbia Pictures Entertainment Inc.

INDEXCARD, 12/73
 
WTO

An international organization designed to supervise and liberalize world trade. The WTO (World Trade Organization) is the successor to the General Agreement on Tariffs and Trade (GATT), which was created in 1947 and liberalized the world's trade over the next five decades. The WTO came into being on Jan. 1, 1995, with 104 countries as its founding members. The WTO is charged with policing member countries' adherence to all prior GATT agreements, including those of the last major GATT trade conference, the Uruguay Round (1986-94), at whose conclusion GATT had formally gone out of existence. The WTO is also responsible for negotiating and implementing new trade agreements. The WTO is governed by a Ministerial Conference, which meets every two years; a General Council, which implements the conference's policy decisions and is responsible for day-to-day administration; and a director-general, who is appointed by the Ministerial Conference. The WTO's headquarters are in Geneva, Switzerland.



INDEXCARD, 13/73
 
International Cable Protection Committee (ICPC)

The ICPC aims at reducing the number of incidents of damages to submarine telecommunications cables by hazards.

The Committee also serves as a forum for the exchange of technical and legal information pertaining to submarine cable protection methods and programs and funds projects and programs, which are beneficial for the protection of submarine cables.

Membership is restricted to authorities (governmental administrations or commercial companies) owning or operating submarine telecommunications cables. As of May 1999, 67 members representing 38 nations were members.

http://www.iscpc.org

INDEXCARD, 14/73
 
Amazon.Com

Amazon.Com was one of the first online bookstores. With thousands of books, CDs and videos ordered via the Internet every year, Amazon.Com probably is the most successful Internet bookstore.

INDEXCARD, 15/73
 
Caching

Caching is a mechanism that attempts to decrease the time it takes to retrieve data by storing a copy at a closer location.

INDEXCARD, 16/73
 
William Gibson

American science fiction author. Most famous novel: Neuromancer.

For resources as writings and interviews available on the Internet see http://www.lib.loyno.edu/bibl/wgibson.htm

INDEXCARD, 17/73
 
Transistor

A transistor is a solid-state device for amplifying, controlling, and generating electrical signals. Transistors are used in a wide array of electronic equipment, ranging from pocket calculators and radios to industrial robots and communications satellites.

INDEXCARD, 18/73
 
Internet Relay Chat (IRC)

IRC is a text-based chat system used for live discussions of groups.

For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, http://www.skypoint.com/~gimonca/irc2.html

http://www.skypoint.com/~gimonca/irc2.html
INDEXCARD, 19/73
 
Writing

Writing and calculating came into being at about the same time. The first pictographs carved into clay tablets are used for administrative purposes. As an instrument for the administrative bodies of early empires, who began to rely on the collection, storage, processing and transmission of data, the skill of writing was restricted to a few. Being more or less separated tasks, writing and calculating converge in today's computers.

Letters are invented so that we might be able to converse even with the absent, says Saint Augustine. The invention of writing made it possible to transmit and store information. No longer the ear predominates; face-to-face communication becomes more and more obsolete for administration and bureaucracy. Standardization and centralization become the constituents of high culture and vast empires as Sumer and China.

INDEXCARD, 20/73
 
America Online

Founded in 1985, America Online is the world's biggest Internet service provider serving almost every second user. Additionally, America Online operates CompuServe, the Netscape Netcenter and several AOL.com portals. As the owner of Netscape, Inc. America Online plays also an important role in the Web browser market. In January 2000 America Online merged with Time Warner, the worlds leading media conglomerate, in a US$ 243,3 billion deal, making America Online the senior partner with 55 percent in the new company.

http://www.aol.com

http://www.aol.com/
INDEXCARD, 21/73
 
CNN

CNN is a U.S.-TV-enterprise, probably the world's most famous one. Its name has become the symbol for the mass-media, but also the symbol of a power that can decide which news are important for the world and which are not worth talking about. Every message that is published on CNN goes around the world. The Gulf War has been the best example for this until now, when a CNN-reporter was the one person to do the countdown to a war. The moments when he stood on the roof of a hotel in Baghdad and green flashes surrounded him, went around the world.

INDEXCARD, 22/73
 
Mass production

The term mass production refers to the application of the principles of specialization, division of labor, and standardization of parts to the manufacture of goods. The use of modern methods of mass production has brought such improvements in the cost, quality, quantity, and variety of goods available that the largest global population in history is now sustained at the highest general standard of living. A moving conveyor belt installed in a Dearborn, Michigan, automobile plant in 1913 cut the time required to produce flywheel magnetos from 18 minutes to 5 and was the first instance of the use of modern integrated mass production techniques.

INDEXCARD, 23/73
 
The Internet Engineering Task Force

The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Engineering Steering Group.

Internet Society: http://www.ietf.org

http://www.ietf.org/
INDEXCARD, 24/73
 
Neighboring rights

Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

INDEXCARD, 25/73
 
Critical Art Ensemble

Critical Art Ensemble is a collective of five artists of various specializations dedicated to exploring the intersections between art, technology, radical politics, and critical theory. CAE have published a number of books and carried out innovative art projects containing insightful and ironic theoretical contributions to media art. Projects include Addictionmania, Useless Technology, The Therapeutic State, Diseases of Consciousness, Machineworld, As Above So Below, and Flesh Machine.

http://www.critical-art.net

INDEXCARD, 26/73
 
Internet Societal Task Force

The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Internet Architecture Board, the Internet Engineering Steering Group and the Internet Engineering Task Force.

Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation.

http://www.istf.isoc.org/

http://www.istf.isoc.org/
INDEXCARD, 27/73
 
Calculator

Calculators are machines for automatically performing arithmetical operations and certain mathematical functions. Modern calculators are descendants of a digital arithmetic machine devised by Blaise Pascal in 1642. Later in the 17th century, Gottfried Wilhelm von Leibniz created a more advanced machine, and, especially in the late 19th century, inventors produced calculating machines that were smaller and smaller and less and less laborious to use.

INDEXCARD, 28/73
 
Gateway

A gateway is a computer supplying point-to-multipoint connections between computer networks.

INDEXCARD, 29/73
 
Caching

Caching generally refers to the process of making an extra copy of a file or a set of files for more convenient retrieval. On the Internet caching of third party files can occur either locally on the user's client computer (in the RAM or on the hard drive) or at the server level ("proxy caching"). A requested file that has been cached will then be delivered from the cache rather than a fresh copy being retrieved over the Internet.

INDEXCARD, 30/73
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 31/73
 
Saddam Hussein

Saddam Hussein joined the revolutionary Baath party when he was a university student. In 1958 he had the head of Iraq, Abdul-Karim Qassim, killed. Since 1979 he has been President of Iraq. Under his reign Iraq fought a decade-long war with Iran. Because of his steady enmity with extreme Islamic leaders the West supported him first of all, until his army invaded Kuwait in August 1990, an incident that the USA led to the Gulf War. Since then many rumors about a coup d'état have been launched, but Saddam Hussein is still in unrestricted power.

INDEXCARD, 32/73
 
IIPA

The International Intellectual Property Alliance formed in 1984 is a private sector coalition and represents the U.S. copyright-based industries. It is comprised of seven trade associations: Association of American Publishers, AFMA, Business Software Alliance, Interactive Digital Software Association, Motion Picture Association of America, National Music Publishers' Association and Recording Industry Association of America. IIPA and its member's track copyright legislative and enforcement developments in over 80 countries and aim at a legal and enforcement regime for copyright that deters piracy. On a national level IIPA cooperates with the U.S. Trade Representative and on the multilateral level has been involved in the development of the TRIPS (Trade-Related Aspects of Intellectual Property Rights) agreement of the WTO (World Trade Organization) and also participates in the copyright discussion of the WIPO (World Intellectual Property Organization).

INDEXCARD, 33/73
 
Colouring

In November 1997, after the assassination of (above all Swiss) tourists in Egypt, the Swiss newspaper Blick showed a picture of the place where the attack had happened, with a tremendous pool of blood, to emphasize the cruelty of the Muslim terrorists. In other newspapers the same picture could be seen - with a pool of water, like in the original. Of course the manipulated coloured version of the Blick fit better into the mind of the shocked Swiss population. The question about death penalty arose quickly ....

INDEXCARD, 34/73
 
Intelsat

Intelsat, the world's biggest communication satellite services provider, is still mainly owned by governments, but will be privatised during 2001, like Eutelsat. A measure already discussed 1996 at an OECD competition policy roundtable in 1996. Signatory of the Intelsat treaty for the United States of America is Comsat, a private company listed on the New York Stock Exchange. Additionally Comsat is one of the United Kingdom's signatories. Aggregated, Comsat owns about 20,5% of Intelsat already and is Intelsat's biggest shareholder. In September 1998 Comsat agreed to merge with Lockheed Martin. After the merger, Lockheed Martin will hold at least 49% of Comsat share capital.

http://www.intelsat.int/index.htm

http://www.eutelsat.org/
http://www.oecd.org//daf/clp/roundtables/SATS...
http://www.comsat.com/
http://www.nyse.com/
http://www.comsat.com/
http://www.comsat.com/
http://www.comsat.com/
http://www.comsat.com/
INDEXCARD, 35/73
 
General Motors

American corporation that was the world's largest automotive manufacturer and perhaps the largest industrial corporation throughout most of the 20th century. It was founded in 1908 to consolidate several motorcar companies and today operates manufacturing and assembly plants and distribution centers throughout the United States and Canada and many other countries. Its major products include automobiles and trucks, a wide range of automotive components, engines, and defense and aerospace material. In 1996 it sold Electronic Data Systems, and in 1997 it sold the defense units of its Hughes Electronics subsidiary to the Raytheon Company, thus leaving the computer-services and defense-aerospace fields in order to concentrate on its automotive businesses. The company's headquarters are in Detroit, Michigan.

INDEXCARD, 36/73
 
Computer programming language

A computer programming language is any of various languages for expressing a set of detailed instructions for a digital computer. Such a language consists of characters and rules for combining them into symbols and words.

INDEXCARD, 37/73
 
Network Information Center (NIC)

Network information centers are organizations responsible for registering and maintaining the domain names on the World Wide Web. Until competition in domain name registration was introduced, they were the only ones responsible. Most countries have their own network information center.

INDEXCARD, 38/73
 
Server

A server is program, not a computer, as it sometimes said, dedicated to store files, manage printers and network traffic, or process database queries.

Web sites, the nodes of the World Wide Web (WWW), e.g., are stored on servers.

INDEXCARD, 39/73
 
International Standardization Organization

ISO (International Organization for Standardization), founded in 1946, is a worldwide federation of national standards bodies from some 100 countries, one from each country. Among the standards it fosters is Open Systems Interconnection (OSI), a universal reference model for communication protocols. Many countries have national standards organizations that participate in and contribute to ISO standards making.

http://www.iso.ch

Source: Whatis.com

http://www.iso.ch/
INDEXCARD, 40/73
 
Braille

Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris.

INDEXCARD, 41/73
 
Expert system

Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.

INDEXCARD, 42/73
 
Copyright management information

Copyright management information refers to information which identifies a work, the author of a work, the owner of any right in a work, or information about the terms and conditions of the use of a work, and any numbers or codes that represent such information, when any of these items of information are attached to a copy of a work or appear in connection with the communication of a work to the public.

INDEXCARD, 43/73
 
Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet.

More detailed information can be found here

http://www.anu.edu/people/Roger.Clarke/II/Pri...
INDEXCARD, 44/73
 
Liability of ISPs

ISPs (Internet Service Provider), BBSs (Bulletin Board Service Operators), systems operators and other service providers (in the U.S.) can usually be hold liable for infringing activities that take place through their facilities under three theories: 1) direct liability: to establish direct infringement liability there must be some kind of a direct volitional act, 2) contributory liability: a party may be liable for contributory infringement where "... with knowledge of the infringing activity, [it] induces, causes or materially contributes to the infringing activity of another." Therefore a person must know or have reason to know that the subject matter is copyrighted and that particular uses violated copyright law. There must be a direct infringement of which the contributory infringer has knowledge, and encourages or facilitates for contributory infringement to attach, and 3) vicarious liability: a party may be vicariously liable for the infringing acts of another if it a) has the right and ability to control the infringer's acts and b) receives a direct financial benefit from the infringement. Unlike contributory infringement, knowledge is not an element of vicarious liability.


INDEXCARD, 45/73
 
Apple

Founded by Steve Jobs and Steve Wozniak and headquartered in Cupertino, USA, Apple Computer was the first commercially successful personal computer company.

In 1978 Wozniak invented the first personal computer, the Apple II. IBM countered its successful introduction to the market by introducing a personal computer running MS-DOS, the operating system supplied by Microsoft Corporation. And IBM gained leadership again. Although by introducing the first graphical user interface affordable to consumers having started the desktop publishing revolution, Apple could not regain leadership again.

http://www.apple.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/6/0,5716,115726+1+108787,00.html

http://www.apple.com/
INDEXCARD, 46/73
 
Internet Protocol Number (IP Number)

Every computer using TCP/IP has a 32 bit-Internet address, an IP number. This number consists of a network identifier and of a host identifier. The network identifier is registered at and allocated by a Network Information Center (NIC), the host identifier is allocated by the local network administration.

IP numbers are divided into three classes. Class A is restricted for big-sized organizations, Class B to medium-sized ones as universities, and Class C is dedicated to small networks.

Because of the increasing number of networks worldwide, networks belonging together, as LANs forming a corporate network, are allocated a single IP number.

INDEXCARD, 47/73
 
Galileo Galilee

Galileo Galilee (1564-1642), the Italian Mathematician and Physicist is called the father of Enlightenment. He proofed the laws of the free fall, improved the technique for the telescope and so on. Galilee is still famous for his fights against the Catholic Church. He published his writings in Italian instead of writing in Latin. Like this, everybody could understand him, which made him popular. As he did not stop talking about the world as a ball (the Heliocentric World System) instead of a disk, the Inquisition put him on trial twice and forbid him to go on working on his experiments.

INDEXCARD, 48/73
 
Louis Braille

b. Jan. 4, 1809, Coupvray, near Paris, France
d. Jan. 6, 1852, Paris, France

Educator who developed a system of printing and writing that is extensively used by the blind and that was named for him. Himself blind Braille became interested in a system of writing, exhibited at the school by Charles Barbier, in which a message coded in dots was embossed on cardboard. When he was 15, he worked out an adaptation, written with a simple instrument, that met the needs of the sightless. He later took this system, which consists of a six-dot code in various combinations, and adapted it to musical notation. He published treatises on his type system in 1829 and 1837.

INDEXCARD, 49/73
 
Automation

Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, automation generally implies the integration of machines into a self-governing system. Automation has revolutionized those areas in which it has been introduced, and there is scarcely an aspect of modern life that has been unaffected by it. Nearly all industrial installations of automation, and in particular robotics, involve a replacement of human labor by an automated system. Therefore, one of the direct effects of automation in factory operations is the dislocation of human labor from the workplace. The long-term effects of automation on employment and unemployment rates are debatable. Most studies in this area have been controversial and inconclusive. As of the early 1990s, there were fewer than 100,000 robots installed in American factories, compared with a total work force of more than 100 million persons, about 20 million of whom work in factories.

INDEXCARD, 50/73
 
Fiber-optic cable networks

Fiber-optic cable networks may become the dominant method for high-speed Internet connections. Since the first fiber-optic cable was laid across the Atlantic in 1988, the demand for faster Internet connections is growing, fuelled by the growing network traffic, partly due to increasing implementation of corporate networks spanning the globe and to the use of graphics-heavy contents on the World Wide Web.

Fiber-optic cables have not much more in common with copper wires than the capacity to transmit information. As copper wires, they can be terrestrial and submarine connections, but they allow much higher transmission rates. Copper wires allow 32 telephone calls at the same time, but fiber-optic cable can carry 40,000 calls at the same time. A capacity, Alexander Graham Bell might have not envisioned when he transmitted the first words - "Mr. Watson, come here. I want you" - over a copper wire.

Copper wires will not come out of use in the foreseeable future because of technologies as DSL that speed up access drastically. But with the technology to transmit signals at more than one wavelength on fiber-optic cables, there bandwidth is increasing, too.

For technical information from the Encyclopaedia Britannica on telecommunication cables, click here. For technical information from the Encyclopaedia Britannica focusing on fiber-optic cables, click here.

An entertaining report of the laying of the FLAG submarine cable, up to now the longest fiber-optic cable on earth, including detailed background information on the cable industry and its history, Neal Stephenson has written for Wired: Mother Earth Mother Board. Click here for reading.

Susan Dumett has written a short history of undersea cables for Pretext magazine, Evolution of a Wired World. Click here for reading.

A timeline history of submarine cables and a detailed list of seemingly all submarine cables of the world, operational, planned and out of service, can be found on the Web site of the International Cable Protection Committee.

For maps of fiber-optic cable networks see the website of Kessler Marketing Intelligence, Inc.

http://www.britannica.com/bcom/eb/article/4/0...
http://www.britannica.com/bcom/eb/article/4/0...
http://www.wired.com/wired/archive/4.12/ffgla...
http://www.pretext.com/mar98/features/story3....
INDEXCARD, 51/73
 
Internet Architecture Board

On behalf of the Internet Society, the Internet Architecture Board oversees the evolution of the architecture, the standards and the protocols of the Net.

Internet Society: http://www.isoc.org/iab

http://www.isoc.org/
INDEXCARD, 52/73
 
Chappe's fixed optical network

Claude Chappe built a fixed optical network between Paris and Lille. Covering a distance of about 240kms, it consisted of fifteen towers with semaphores.

Because this communication system was destined to practical military use, the transmitted messages were encoded. The messages were kept such secretly, even those who transmit them from tower to tower did not capture their meaning, they just transmitted codes they did not understand. Depending on weather conditions, messages could be sent at a speed of 2880 kms/hr at best.

Forerunners of Chappe's optical network are the Roman smoke signals network and Aeneas Tacitus' optical communication system.

For more information on early communication networks see Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks.

INDEXCARD, 53/73
 
Above.net

Headquartered in San Jose, USA, AboveNet Communications is a backbone service provider. Through its extensive peering relationships, the company has built a network with the largest aggregated bandwidth in the world.

http://www.above.net

INDEXCARD, 54/73
 
Artificial Intelligence

Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support decision taking in highly complex environments.
Yahoo AI sites: http://dir.yahoo.com/Science/Computer_Science/Artificial_Intelligence/
MIT AI lab: http://www.ai.mit.edu/


http://dir.yahoo.com/Science/Computer_Science...
http://www.ai.mit.edu/
INDEXCARD, 55/73
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 56/73
 
Extranet

An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g.

INDEXCARD, 57/73
 
Virtual Private Networks

Virtual Private Networks provide secured connections to a corporate site over a public network as the Internet. Data transmitted through secure connections are encrypted and therefore have to be encrypted before they can be read.
These networks are called virtual because connections are provided only when you connect to a corporate site; they do not rely on dedicated lines and support mobile use.

INDEXCARD, 58/73
 
Vinton Cerf

Addressed as one of the fathers of the Internet, Vinton Cerf together with Robert Kahn developed the TCP/IP protocol suite, up to now the de facto-communication standard for the Internet, and also contributed to the development of other important communication standards. The early work on the protocols broke new ground with the realization of a multi-network open architecture.

In 1992, he co-founded the Internet Society where he served as its first President and later Chairman.

Today, Vinton Cerf is Senior Vice President for Internet Architecture and Technology at WorldCom, one of the world's most important ICT companies

Vinton Cerf's web site: http://www.wcom.com/about_the_company/cerfs_up/

http://www.isoc.org/
http://www.wcom.com/
INDEXCARD, 59/73
 
User tracking

User tracking is a generic term that covers all the techniques of monitoring the movements of a user on a web site. User tracking has become an essential component in online commerce, where no personal contact to customers is established, leaving companies with the predicament of not knowing who they are talking to. Some companies, such as Red Eye, Cyber Dialogue, and SAS offer complete technology packages for user tracking and data analysis to online businesses. Technologies include software solutions such as e-mine, e-discovery, or WebHound

Whenever user tracking is performed without the explicit agreement of the user, or without laying open which data are collected and what is done with them, considerable privacy concerns have been raised.

http://www.redeye.co.uk/
http://www.cyberdialogue.com/
http://www.sas.com/
http://www.spss.com/emine/
http://www.sas.com/solutions/e-discovery/inde...
http://www.sas.com/products/webhound/index.ht...
http://www.linuxcare.com.au/mbp/meantime/
INDEXCARD, 60/73
 
Cooperative Association of Internet Data Analysis (CAIDA)

Based at the University of California's San Diego Supercomputer Center, CAIDA supports cooperative efforts among the commercial, government and research communities aimed at promoting a scalable, robust Internet infrastructure. It is sponsored by the Defense Advanced Research Project Agency (DARPA) through its Next Generation Internet program, by the National Science Foundation, Cisco, Inc., and Above.net.

INDEXCARD, 61/73
 
Open Systems Interconnection (OSI)

Open Systems Interconnection (OSI) is a standard reference model for communication between two end users in a network. It is used in developing products and understanding networks.

Source: Whatis.com

INDEXCARD, 62/73
 
Immanuel Wallerstein

Immanuel Wallerstein (* 1930) is director of the Fernand Braudel Center for the Study of Economies, Historical Systems, and Civilizations. He is one of the most famous sociologists in the Western World. With his book The Modern World-System: Capitalist Agriculture and the Origins of the European World-Economy in the Sixteenth Century (1976), which led to the expression World-System Theory about centers, peripheries and semi-peripheries in the capitalist world system, he did not only influence a whole generation of scientists, but this theory seems to get popular again, due to globalization.

INDEXCARD, 63/73
 
Philip M. Taylor

Munitions of the Mind. A history of propaganda from the ancient world to the present era. Manchester 1995 (2nd ed.)
This book gives a quite detailed insight on the tools and tasks of propaganda in European and /or Western history. Starting with ancient times the author goes up till the Gulf War and the meaning of propaganda today. In all those different eras propaganda was transporting similar messages, even when technical possibilities had not been fairly as widespread as today. Taylor's book is leading the reader through those different periods, trying to show the typical elements of each one.

INDEXCARD, 64/73
 
Bandwidth

The bandwidth of a transmitted communications signal is a measure of the range of frequencies the signal occupies. The term is also used in reference to the frequency-response characteristics of a communications receiving system. All transmitted signals, whether analog or digital, have a certain bandwidth. The same is true of receiving systems.

Generally speaking, bandwidth is directly proportional to the amount of data transmitted or received per unit time. In a qualitative sense, bandwidth is proportional to the complexity of the data for a given level of system performance. For example, it takes more bandwidth to download a photograph in one second than it takes to download a page of text in one second. Large sound files, computer programs, and animated videos require still more bandwidth for acceptable system performance. Virtual reality (VR) and full-length three-dimensional audio/visual presentations require the most bandwidth of all.

In digital systems, bandwidth is data speed in bits per second (bps).

Source: Whatis.com

INDEXCARD, 65/73
 
Center for Democracy and Technology

The Center for Democracy and Technology works to promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, the Center seeks practical solutions to enhance free expression and privacy in global communications technologies. The Center is dedicated to building consensus among all parties interested in the future of the Internet and other new communications media.

http://www.cdt.org

INDEXCARD, 66/73
 
Medieval universities and copying of books

The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service.

Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too.

For further details see History of the Idea of a University, http://quarles.unbc.edu/ideas/net/history/history.html

http://quarles.unbc.edu/ideas/net/history/his...
INDEXCARD, 67/73
 
Blaise Pascal

b. June 19, 1623, Clermont-Ferrand, France
d. August 19, 1662, Paris, France

French mathematician, physicist, religious philosopher, and master of prose. He laid the foundation for the modern theory of probabilities, formulated what came to be known as Pascal's law of pressure, and propagated a religious doctrine that taught the experience of God through the heart rather than through reason. The establishment of his principle of intuitionism had an impact on such later philosophers as Jean-Jacques Rousseau and Henri Bergson and also on the Existentialists.

INDEXCARD, 68/73
 
Alexander Graham Bell

b., March 3, 1847, Edinburgh

d. Aug. 2, 1922, Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada

American audiologist and inventor wrongly remembered for having invented the telephone in 1876. Although Bell introduced the first commercial application of the telephone, in fact a German teacher called Reiss invented it.

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/1/0,5716,15411+1+15220,00.html

INDEXCARD, 69/73
 
Total copyright industries

The total copyright industries encompass the "core copyright industries" and portions of many other industries that either create, distribute, or depend upon copyrighted works. Examples include retail trade (a portion of which is sales of video, audio, software, and books, for example), the doll and toy industry, and computer manufacturing.


INDEXCARD, 70/73
 
Internet Engineering Steering Group

On behalf of the Internet Society, the Internet Engineering Steering Group is responsible for the technical management of the evolution of the architecture, the standards and the protocols of the Net.

http://www.ietf.org/iesg.html

http://www.ietf.org/iesg.html
INDEXCARD, 71/73
 
Wide Area Network (WAN)

A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too.

INDEXCARD, 72/73
 
First Monday

An English language peer reviewed media studies journal based in Denmark.

http://firstmonday.dk

INDEXCARD, 73/73