Book Read Free

The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?

Page 52

by David Brin


  costs and benefits of

  dangers of

  defined

  gender-based attitudes toward

  history of

  vs. pseudonymity

  remailers and

  AOL, databases of

  Applied Cryptography

  Arnett, Nick

  ARPANET

  Arquilla, John

  Artificial nose

  ASCAP

  At Large

  Audio surveillance

  Australia, privacy protections in

  Authority

  accountability and

  suspicion of

  Back doors

  Bacon, Francis

  Banks, Iain M.

  Baran, Paul

  Barlow, John Perry

  Barram, David

  Baruch, Bernard

  BBC World Service

  Bernal, J. D.

  Berra, Yogi

  Bill of Rights

  Biology, future of

  Biometric identification

  Bit taxes

  Blackmail, fighting

  Blaze, Matthew

  Bly, Nelly

  Body odor parsing

  Bohr, Niels

  Bork, Robert H.

  Brain, evolution of

  Branch Davidians

  Brand, Stewart

  Brandeis, Louis D.

  Branscomb, Anne Wells

  Brin, David

  Brin, David (another)

  Bronowski, Jacob

  Brunner, John

  Burke, James

  Burns, Ken

  Bush, Vannevar

  Business

  accountability of

  relation to open society

  threat to privacy by

  Cable television, encryption in

  Caller ID,

  Cameras, miniature

  Cameron, James

  Campbell, John W.

  Campbell, Joseph

  Canada, privacy protections in

  Capitalism, characteristics of

  Carroll, Lewis

  Cash flow, electronic tracking of

  Cassini mission, NASA

  Caste rule, danger of

  Cato Institute

  Census, privacy issues in

  Center for Democracy and Technology

  CERT (Computer Emergency Response Team)

  Certification authorities

  Chaum, David

  Chemical companies, accountability of

  Chicago police, privacy violations of

  Children, video surveillance of

  China, imperial

  meritocracy of

  Ciphers. See also Encryption

  Citizen truth squads

  Civilizing Cyberspace

  Clarke, Roger

  Clipper chip

  government backing of

  media scuttling of

  procedural issues regarding

  reasoning behind

  Clipper II,

  Cold War

  Commerce, digitally based

  Common carriers, vs. publishers

  Commons, metaphor of

  Communications Decency Act

  unconstitutionality of

  Computers, Freedom, and Privacy (CFP)

  Concealed-weapons detectors

  Concealment, value of

  Conformity, spurs to

  Constitution

  original goals of

  privacy issues in

  Consumer Credit Database

  Consumer groups

  Consumer Reports

  Control, perceptions of

  Cooper, Jeff

  Copyright

  future of

  history of

  suggestions to implement

  suggestions to replace

  Crackers

  Creative Incentive Coalition (CIC)

  Creativity, future of

  Credibility ratings

  Credit ratings

  Crime

  attitudes toward

  penalties for

  statistics on

  Criticism

  difficulties surrounding

  importance of

  Cryptography. See also Encryption

  basics of

  future of

  Currency, electronic

  Cyberaristocracy

  Cyberjocks

  Cybermarketplace

  Cyberpunks

  Cyberwar

  Cypherpunk Manifesto

  Cypherpunks

  DARPA (U.S. Defense Advanced Research Projects Agency)

  Data impresarios

  Data smog

  on Internet

  Databases

  lack of public access to

  proliferation of

  Dawkins, Richard

  Declaration of Independence, original goals of

  Declaration of Independence for Cyberspace

  Declassification of documents

  Defense Department, hacker attacks on

  Delphi polling

  Demarchy

  Democracy

  ancient

  evolution of

  hardiness of

  warand

  Democracy against Itself

  Denning, Dorothy

  DES (data encryption standard), cracking of

  Descartes, René

  Detectives, abuse by

  Deterrence, against crime

  Devil’s dichotomies

  Dialogues

  Dickens, Charles

  Diffie, Whitfield

  Digital Future Coalition (DFC)

  Digital signatures

  Dilbert Future, The

  Dirty Harry

  Disclosure of private facts, as tort

  Disputations

  modern

  DNA, ownership issues regarding

  Dossier society, possibilities for

  Doyle, Michael W.

  Drug testing, workplace

  Du Pont, Pierre

  “Dudgeon addiction,”

  drawbacks of

  Dyson, Esther

  Dyson, Freeman

  e-mail. See Internet

  e-mail stalking

  Earth

  ecash

  disadvantages of

  open transactions and

  Eco, Umberto

  Economic Espionage Act

  Eisenhower, Dwight D.

  Electronic Frontier Foundation (EFF)

  Electronic Privacy Information Center (EPIC)

  reading list of

  Electronic tagging

  Encryption

  back doors and

  Clipper chip and

  government attitudes toward

  history of

  insecurity of

  as protection against tyranny

  public-key

  regulation of

  taxation of

  trusted third party

  Engineered society, possibilities for

  Enigma encryption

  Equifax Corp.

  EU, privacy guidelines of

  European model of data protection

  Exhortation, ineffectiveness of

  Experian

  Extortion

  Face recognition systems

  Fair Credit Reporting Act

  Fair use, doctrine of

  False light, as tort

  Falsification

  FBI, privacy violations of

  Federalist Papers

  Fingerprinting systems

  Finney, Hal

  Firewalls

  Flames, defined

  Florence, medieval

  Forecasting, assessing

  Forest Journey

  Foster, Vincent

  Frailty thesis

  Frankenstein syndrome

  Franklin, Benjamin

  Freedman, David

  Freedom

  history of

  relation to privacy

  Freedom of Information Act (FOIA)

  Freedom of speech,
reasons for

  Freeh, Louis

  Gabriel, Peter

  Galileo

  Game theory

  Garfinkel, Simson

  Gates, Bill

  GATT (General Agreement on Tariffs and Trade)

  Gedankenexperimenten

  Gibson, William

  Gilmore, John

  Gingrich, Newt

  Givens, Beth

  Global Information Infrastructure (GII)

  Global Positioning Systems (GPS)

  Godwin, Michael

  Golding, William

  Gore, Al

  on cryptography

  Government

  attitudes toward encryption

  future of

  monopolies of

  open society’s effect on

  relation to open society

  Great Game of Business: Unlocking the Power and Profitability of Open-Book Management

  Gulliver’s Travels

  Gutenberg, Johannes

  Hacker Crackdown

  Hackers

  Hamilton, Alexander

  Hand geometry

  Hanson, Robin

  Harbs, Christine

  Hardin, Garrett

  Heaven’s Gate

  Hegel, G. W. F.

  Heinlein, Robert

  Heisenberg uncertainty principle

  Helsingius, Johan

  Helsinki incident

  Henry, Buck

  Hitler, Adolf

  HIV, as privacy issue

  Hoover, J. Edgar

  Hughes, Eric

  Human Genome Project

  Human nature

  aspects of

  in opposition to open society

  Human rights, self-interest and

  Hussein, Saddam

  “I See You,”

  Ideas

  criticism as essential to

  enlightened ideas about

  fostering rebellion

  good or evil as inherent in

  perceived toxicity of

  Identity

  fraud regarding

  theftof

  Ideologs, birth of

  Individualism

  Internet and

  Information

  asymmetric flow of

  commercial traffic in

  as commodity

  as “currency,”

  financial value of

  and freedom

  importance of free flow of

  increasing flow of

  municipal supply of

  obstruction of flow of

  ownership of

  persistence of

  World Wide Web

  Information Age

  Information systems, vulnerability of

  Informers

  Innovation, changing attitudes toward

  Intellectual property

  history of

  future of

  Intellectual property law

  Internal Revenue Service, abuses by

  Internet

  addresses of

  and aficionados

  “anarchy” of

  anonymity on

  chaos and redundancy in

  creativity on

  data smog on

  debate on

  dirty tricks on

  dystopic visions of

  growing pains of

  history of

  idealistic visions of

  individuality and

  integrative capabilities of

  international aspect of

  lying on

  netiquette on

  obstruction of data flow on

  personal information collection on

  as populist tool

  proposals to tax

  risksinvolved in

  security breaches in

  Intimacy, defined

  Intrusion, as tort

  Inventions, encouragement of

  Jackson, Steve

  James, William

  Japan

  privacy protections in

  video surveillance in

  Jefferson, Thomas

  Jones, Stefan

  Jonestown

  Juror anonymity

  Juvenal

  Kantrowitz, Arthur

  Kaplan, Robert D.

  Katz, Jon

  Keillor, Garrison

  Kelly, Kevin

  Kennedy, Caroline

  Kennedy, John F.

  Kevs

  escrow holding of

  length of

  Keystroke dynamics

  Kidnapping, fighting

  Kindercam

  King, Martin Luther

  King, Rodney

  King’s Lynn, video surveillance in

  Kissinger, Henry

  Knight, Damon

  Knowledge. See Information

  !Kung people

  Lanier, Jaron

  Lawyers

  Learning, theory of

  Lending institutions, accountability of

  Leopold, King of Belgium

  Levy, Steven

  Lexis-Nexis Corp.

  Liberal education

  Libertarian Party

  Liberty, and privacy

  Liddy, G. Gordon

  Lie detectors

  gender-based attitudes toward

  Limbaugh, Rush

  Lord of the Flies

  Love, American Style

 

‹ Prev