Think Tanks and the Internet

As think tanks try to push policy making in their desired direction in such diverse fields as health, education, taxation, regulation and national security it is not surprising, that also the Internet has entered their issue list:

RAND, a center-right U.S. think tank not only argues for the usage of certain guidelines concerning the use of e-mail, but has also released a research report - sponsored by the Office of the Secretary of Defense - entitled "Strategic Information Warfare: A New Face of War". In November 1999 RAND has furthermore launched a co-operation with the International Chamber of Commerce (ICC) aimed at combating the threat of cybercrime. ICCs practical expertise and RANDs research and analytical capacities shall aid at finding solutions to fight hackers, industrial spies, and other criminals who may exploit the Internet to attack commercial and public-sector systems.

Another of the big players in the elite of think tanks, the conservative Washington D.C. based Cato Institute quite surprisingly has started to defend human rights in Cyberspace. Jonathan D. Wallace' "Nameless in Cyberspace: Anonymity on the Internet." sees the constitutionally guaranteed right of freedom of speech and expression in the United States under attack by proposals to limit or restrict the use of anonymity on the Internet.

Yet another conservative think tank, the U.S. based Center for Strategic and International Studies in June 1999 has initiated a Conference (Global Information Infrastructure Commission) to accelerate the development of E-Commerce in India. Among the Conferences participants were not only government representatives from India and the United States, but also the CEO of Global TeleSystems Group Inc., the vice chairman of Fujitsu and the executive president of Siemens A.G., as well as the World Bank and the World Intellectual Property Organization.

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611704/100438658373
 
How the Internet works

On the Internet, when you want to retrieve a document from another computer, you request a service from this computer. Your computer is the client, the computer on which the information you want to access is stored, is called the server. Therefore the Internet's architecture is called client-server architecture.

A common set of standards allows the exchange of data and commands independent from locations, time, and operating systems through the Internet. These standards are called communication protocols, or the Internet Protocol Suite, and are implemented in Internet software. Sometimes the Internet Protocol Suite is erroneously identified with TCP/IP (Transmission Control Protocol / Internet Protocol).

Any information to be transferred is broken down into pieces, so-called packets, and the Internet Protocol figures out how the data is supposed to get from A to B by passing through routers.

Each packet is "pushed" from router to router via gateways and might take a different route. It is not possible to determine in advance which ways these packets will take. At the receiving end the packets are checked and reassembled.

The technique of breaking down all messages and requests into packets has the advantage that a large data bundle (e.g. videos) sent by a single user cannot block a whole network, because the bandwidth needed is deployed on several packets sent on different routes. Detailed information about routing in the Internet can be obtained at http://www.scit.wlv.ac.uk/~jphb/comms/iproute.html.

One of the Internet's (and of the Matrix's) beginnings was the ARPANet, whose design was intended to withstand any disruption, as for example in military attacks. The ARPANet was able to route data around damaged areas, so that the disruption would not impede communication. This design, whith its origin in strategic and military considerations, remained unchanged for the Internet. Yet the design of the ARPANet's design cannot be completely applied to the Internet.

Routing around depends on the location of the interruption and on the availability of intersecting points between networks. If, for example, an E-mail message is sent from Brussels to Athens and in Germany a channel is down, it will not affect access very much, the message will be routed around this damage, as long as a major Internet exchange is not affected. However, if access depends on a single backbone connection to the Internet and this connection is cut off, there is no way to route around.

In most parts of the world the Internet is therefore vulnerable to disruption. "The idea of the Internet as a highly distributed, redundant global communications system is a myth. Virtually all communications between countries take place through a very small number of bottlenecks, and the available bandwidth isn't that great," says Douglas Barnes. These bottlenecks are the network connections to neighboring countries. Many countries rely on a one single connection to the Net, and in some places, such as the Suez Canal, there is a concentration of fiber-optic cables of critical importance.

TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611791/100438659870
 
World Bank

The World Bank as well as the International Monetary Fund (IMF) originated during World War II in preparation for postwar international financial and economic cooperation. Initiated by the United States and Great Britain. The principal functions of the World Bank are to assist in the reconstruction and development of its member countries by facilitating capital investment for productive purposes, to promote private foreign investment by guarantees of and participation in loans and other investments made by private investors, and to make loans for productive purposes out of its own resources or funds borrowed by it when private capital is not available on reasonable terms.

INDEXCARD, 1/1