Timeline 1970-2000 AD
1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= DES)
1976 Whitfield Diffie and Martin Hellman publish their book New Directions in Cryptography, playing with the idea of public key cryptography
1977/78 the RSA algorithm is developed by Ron Rivest, Adi Shamir and Leonard M. Adleman and is published
1984 Congress passes Comprehensive Crime Control Act
- The Hacker Quarterly is founded
1986 Computer Fraud and Abuse Act is passed in the USA
- Electronic Communications Privacy Act
1987 Chicago prosecutors found Computer Fraud and Abuse Task Force
1988 U.S. Secret Service covertly videotapes a hacker convention
1989 NuPrometheus League distributes Apple Computer software
1990 - IDEA, using a 128-bit key, is supposed to replace DES
- Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography
- Martin Luther King Day Crash strikes AT&T long-distance network nationwide
1991 PGP (= Pretty Good Privacy) is released as freeware on the Internet, soon becoming worldwide state of the art; its creator is Phil Zimmermann
- one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco
- AT&T phone crash; New York City and various airports get affected
1993 the U.S. government announces to introduce the Clipper Chip, an idea that provokes many political discussions during the following years
1994 Ron Rivest releases another algorithm, the RC5, on the Internet
- the blowfish encryption algorithm, a 64-bit block cipher with a key-length up to 448 bits, is designed by Bruce Schneier
1990s work on quantum computer and quantum cryptography
- work on biometrics for authentication (finger prints, the iris, smells, etc.)
1996 France liberates its cryptography law: one now can use cryptography if registered
- OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products
1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption
1997 June PGP 5.0 Freeware widely available for non-commercial use
1997 June 56-bit DES code cracked by a network of 14,000 computers
1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment
1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy
1998 March PGP announces plans to sell encryption products outside the USA
1998 April NSA issues a report about the risks of key recovery systems
1998 July DES code cracked in 56 hours by researchers in Silicon Valley
1998 October Finnish government agrees to unrestricted export of strong encryption
1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA
- National Institute of Standards and Technologies announces that 56-bit DES is not safe compared to Triple DES
- 56-bit DES code is cracked in 22 hours and 15 minutes
1999 May 27 United Kingdom speaks out against key recovery
1999 Sept: the USA announce to stop the restriction of cryptography-exports
2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law
- computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses
for further information about the history of cryptography see:
http://www.clark.net/pub/cme/html/timeline.html
http://www.math.nmsu.edu/~crypto/Timeline.html
http://fly.hiwaay.net/~paul/cryptology/history.html
http://www.achiever.com/freehmpg/cryptology/hocryp.html
http://all.net/books/ip/Chap2-1.html
http://cryptome.org/ukpk-alt.htm
http://www.iwm.org.uk/online/enigma/eni-intro.htm
http://www.achiever.com/freehmpg/cryptology/cryptofr.html
http://www.cdt.org/crypto/milestones.shtml
for information about hacker's history see:
http://www.farcaster.com/sterling/chronology.htm:
|
TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658960
|
|
Beautiful bodies
However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". Nadia Thalman's hopes for beautiful robots may become reality in the work of MIRALab, a research laboratory attached to the University of Geneva dedicated to realistic modelling of human functionalities. The laboratory has produced an artificial Marylyn Monroe showing just how beautiful artificial creatures can be, and there is a biography featuring details of her career and her - however virtual - love life. Yet beautiful creatures have been made before, at leas on the movie screen. Frank-N-furter, the protagonist of the Rocky Horror picture show ("I've been making a man / with blond hair and a tan / and he is good for relieving my /tension) did set remakrable esthetic standards.
While in Hindu mythology, avatars are bodies chosen by gods for their representation on earth, often animals such as swans or horses, the avatars populating cyberspace have a different function. The cyber bodies of real people, often 3 dimensional images of creatures whose aesthetics reflects both the tastes prevalent in the entertainment and advertising industries as the state of art in visual representation.
|
TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611777/100438658861
|
|
Extract of Disney’s Content Production and Distribution Holdings
Although the traditional media companies first steps into the digital sphere were fairly clumsy, they have quickly learned from their mistakes and continued to enlarge their Internet presence. Time Warner now for instance operates about 130 Web-Sites (http://www.timewarner.com/corp/about/pubarchive/websites.html). Anyhow the stronger online-engagement of the big media conglomerates by 1998 has led to the establishment of a new pattern: "More than three-quarters of the 31 most visited news and entertainment websites were affiliated with large media firms, and most of the rest were connected to outfits like AOL and Microsoft." (Broadcasting and Cable, 6/22/98).
During the last years many of the smaller players in the field of digital media have been driven out of competition by the huge media conglomerates. This mainly is a result of the advantages that the commercial media giants have over their less powerful counterparts:
As engagement in online activities mostly does not lead to quick profits, investors must be able to take losses, which only powerful companies are able to.
Traditional media outlets usually have huge stocks of digital programming, which they can easily plug into the Internet at little extra cost.
To generate audience, the big media conglomerates constantly promote their Websites and other digital media products on their traditional media holdings.
As possessors of the hottest "brands" commercial media companies often get premier locations from browser software makers, Internet service providers, search engines and portals.
Having the financial resources at their disposition the big media firms are aggressive investors in start-up Internet media companies.
Commercial media companies have close and long ties to advertisers, which enables them to seize most of these revenues.
|
TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611795/100438659167
|
|
Whitfield Diffie
Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and Martin Hellman developed public key cryptography, a system to send information without leaving it open to be read by everyone.
|
INDEXCARD, 1/3
|
|
Technological measures
As laid down in the proposed EU Directive on copyright and related rights in the information society technological measures mean "... any technology, device, or component that, in the normal course of its operations, is designed to prevent or inhibit the infringement of any copyright..." The U.S. DMCA (Digital Millennium Copyright Act) divides technological measures in two categories: 1) measures that prevent unauthorized access to a copyrighted work, and 2) measures that prevent unauthorized copying of a copyrighted work. Also the making or selling of devices or services that can be used to circumvent either category of technological measures is prohibited under certain circumstances in the DMCA. Furthermore the 1996 WIPO Copyright Treaty states that the "... contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors..."
|
INDEXCARD, 2/3
|
|
Mark
A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." ( WIPO) To be protected a mark must be registered in a government office whereby generally the duration is limited in time, but can be periodically (usually every 10 years) renewed.
|
INDEXCARD, 3/3
|
|