by Al Gore
201 targets have failed to take action to protect themselves
Michaela L. Sozio, “Cyber Liability—a Real Threat to Your Business,” California Business Law Confidential, March 2012; Preet Bharara, “Asleep at the Laptop,” New York Times, June 4, 2012.
202 collecting information about their own customers and users
Alexis Madrigal, “I’m Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web,” Atlantic, February 29, 2012.
203 tailor advertising to match each person’s individual collection of interests
Ibid.
204 online interests without offering them an opportunity to give their consent
Riva Richmond, “As ‘Like’ Buttons Spread, So Do Facebook’s Tentacles,” New York Times, Bits blog, September 27, 2011, http://bits.blogs.nytimes.com/2011/09/27/as-like-buttons-spread-so-do-facebooks-tentacles/.
205 “simply tools to improve the grip strength of the Invisible Hand”
Madrigal, “I’m Being Followed.”
206 discover information that one would not necessarily want
Jeffrey Rosen, “The Web Means the End of Forgetting,” New York Times Magazine, July 21, 2010.
207 their Facebook accounts so that private sites can also be accessed
Michelle Singletary, “Would You Give Potential Employers Your Facebook Password?,” Washington Post, March 29, 2012.
208 policy is to never give out such passwords
Joanna Stern, “Demanding Facebook Passwords May Break Law, Say Senators,” ABC News, March 26, 2012, http://abcnews.go.com/Technology/facebook-passwords-employers-schools-demand-access-facebook-senators/story?id=16005565#.UCPKWY40jdk.
209 many employees have been subjected to cybersurveillance
Tam Harbert, “Employee Monitoring: When IT Is Asked to Spy,” Computer World, June 16, 2010.
210 especially the Internet, increases exponentially as more people connect to it
James Hendler and Jennifer Golbeck, “Metcalfe’s Law, Web 2.0, and the Semantic Web,” Web Semantics 6, no. 1 (February, 2008): 14–20.
211 actually increases as the square of the number of people who connect to it
Ibid.
212 options for changing settings that some sites offer
Alexis Madrigal, “Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days,” Atlantic, March 1, 2012; Elaine Rigoli, “Most People Worried About Online Privacy, Personal Data, Employer Bias, Privacy Policies,” Consumer Reports, April 25, 2012.
213 But users who try to opt out of the tracking itself
Julia Angwin and Emily Steel, “Web’s Hot New Commodity: Privacy,” Wall Street Journal, February 28, 2011.
214 due to persistent lobbying pressure from the advertising industry
Tanzina Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking,” New York Times, February 26, 2012; Madrigal, “I’m Being Followed.”
215 but there are so many clicks that billions of dollars are at stake
Madrigal, “I’m Being Followed”; Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking.”
216 report information about a user’s online activities
“What They Know” Series, Wall Street Journal, http://online.wsj.com/public/page/what-they-know-digital-privacy.html.
217 about the user’s online activity to advertisers and others who purchase the data
Julia Angwin, “The Web’s New Gold Mine: Your Secrets,” Wall Street Journal, July 30, 2010.
218 matching individual computer numbers with the name, address, and telephone numbers
Madrigal, “I’m Being Followed.”
219 has spoken out against the use of DPI
Olivia Solon, “Tim Berners-Lee: Deep Packet Inspection a ‘Really Serious’ Privacy Breach,” Wired, April 18, 2012.
220 tragically, the gay student committed suicide soon after
Ian Parker, “The Story of a Suicide: Two College Roommates, a Webcam, and a Tragedy,” New Yorker, February 6, 2012.
221 tag people when they appear in photos on the site
“Facebook ‘Face Recognition’ Feature Draws Privacy Scrutiny,” Bloomberg News, June 8, 2011.
222 now used by many sites to identify people when they speak
Natasha Singer, “The Human Voice, as Game Changer,” New York Times, March 31, 2012.
223 improve the accuracy with which the machine interprets
Ibid.
224 which information can be delivered with relevance to the user’s location
“Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location,” Nielsen, April 21, 2011, http://blog.nielsen.com/nielsenwire/online_mobile/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location/.
225 25,000 U.S. citizens are also victims of “GPS stalking” each year
Justin Scheck, “Stalkers Exploit Cellphone GPS,” Wall Street Journal, August 3, 2010.
226 1,200 pages of information, most of which he thought he had deleted
Kevin J. O’Brien, “Austrian Law Student Faces Down Facebook,” New York Times, February 5, 2012.
227 designed to steal information from the user’s computer or mobile device
Matt Richtel and Verne G. Kopytoff, “E-Mail Fraud Hides Behind Friendly Face,” New York Times, June 2, 2011.
228 all the private information about individuals
Ann Carrns, “Careless Social Media Use May Raise Risk of Identity Fraud,” New York Times, February 29, 2012.
229 which have reported large losses as a result of cybercrime
“IMF Is Victim of ‘Sophisticated Cyberattack,’ Says Report,” IDG Reporter, June 13, 2011; “US Senate Orders Security Review After LulzSec Hacking,” Guardian, June 14, 2011; Julianne Pepitone and Leigh Remizowski, “ ‘Massive’ Credit Card Data Breach Involves All Major Brands,” CNN, April 2, 2012, http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm; “Heartland Payment Systems Hacked,” Associated Press, January 20, 2009; Bianca Dima, “Top 5: Corporate Losses Due to Hacking,” HOT for Security, May 17, 2012.
230 more than $7.2 million, with the cost increasing each year
“The Real Cost of Cyber Attacks,” Atlantic, February 16, 2012.
231 “more than the annual global market for marijuana, cocaine, and heroin combined”
Symantec, press release, “Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” September 7, 2011, http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02. However, some analysts note that some estimates of cybercrime are unreliable. Dinei Florêncio and Cormac Herley, “The Cybercrime Wave That Wasn’t,” New York Times, April 14, 2012.
232 LinkedIn
Ian Paul, “LinkedIn Confirms Account Passwords Hacked,” PC World, June 6, 2012.
233 eHarmony
Salvador Rodriguez, “Like LinkedIn, eHarmony Is Hacked; 1.5 Million Passwords Stolen,” Los Angeles Times, June 6, 2012.
234 Google’s Gmail
Nicole Perlroth, “Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users,” New York Times, July 12, 2012.
235 Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC
David Goldman, “Major Banks Hit with Biggest Cyberattacks in History,” CNN, September 28, 2012; “Week-Long Cyber Attacks Cripple US Banks,” Associated Press, September 29, 2012.
236 store Internet and telephone communications
Brian Wheeler, “Communications Data Bill Creates ‘a Virtual Giant Database,’ ” BBC, July 19, 2012, http://www.bbc.co.uk/news/uk-politics-18884460.
237 already installed 60,000 security cameras
Heather Brooke, “Investigation: A Sharp Focus on CCTV,” Wired UK, April 1, 2010.
238 “restrictions that fence in even the most disinterested”
Justice Felix Frankfurter, Concurring Opinion, Youngstown Sheet & Tube Co. v. Sawyer,
343 U.S. 579 (1952).
239 “Knowledge is power”
Georg Henrik Wright, The Tree of Knowledge and Other Essays (Leiden: Brill, 1993), p. 127–28.
240 ability to eavesdrop on telephone calls as they were taking place
James Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, March 15, 2012.
241 “began to rapidly turn the United States of America”
Jason Reed, “NSA Whistleblowers: Government Spying on Every Single American,” Reuters, July 25, 2012.
242 has intercepted “between 15 and 20 trillion” communications
Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”
243 The formal state of emergency
President of the United States, “Notice—Continuation of the National Emergency with Respect to Certain Terrorist Attacks,” September 11, 2012.
244 “I think there’s really something at a deep level creepy”
Matt Sledge, “Warrantless Electronic Surveillance Surges Under Obama Justice Department,” Huffington Post, September 28, 2012.
245 riding a bicycle with a defective “audible bell”
Brief for the Petitioner in the United States Supreme Court, Albert W. Florence v. Board of Chosen Freeholders of the County of Burlington et al., No. 10-945, http://www.americanbar.org/content/dam/aba/publishing/previewbriefs/Other_Brief_Updates/10-945_petitioner.authcheckdam.pdf. Justice Stephen Breyer dissented from the strip search decision in a powerful rebuke of the expansive powers granted to law enforcement by the Court’s action. See Florence v. Board of Chosen Freeholders, April 2, 2012, http://www.supremecourt.gov/opinions/11pdf/10-945.pdf.
246 other digital device when he or she reenters the country
Glenn Greenwald, “U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012, http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/.
247 and no reasonable cause for allowing the search is required
Ibid.
248 whose digital information has been searched and seized
Ibid.
249 “marketing a catalog of ‘surveillance fees’ ”
Eric Lichtblau, “Police Are Using Phone Tracking as a Routine Tool,” New York Times, April 1, 2012.
250 plans to sell the data to private investigators, insurers, and others
Julia Angwin and Jennifer Valentino-Devries, “New Tracking Frontier: Your License Plates,” Wall Street Journal, October 2, 2012.
251 The market for these technologies has grown
Nicole Perlroth, “Software Meant to Fight Crime Is Used to Spy on Dissidents,” New York Times, August 31, 2012.
252 including Iran, Syria, and China
Rebecca MacKinnon, “Internet Freedom Starts at Home,” Foreign Policy, April 3, 2012; Cindy Cohn, Trevor Timm, and Jillian C. York, Electronic Frontier Foundation, “Human Rights and Technology Sales: How Corporations Can Avoid Assisting Repressive Regimes,” April 2012, https://www.eff.org/document/human-rights-and-technology-sales; Jon Evans, “Selling Software That Kills,” TechCrunch, May 26, 2012, http://techcrunch.com/2012/05/26/selling-software-that-kills/.
253 video cameras will become commonplace tools
Francis Fukuyama, “Why We All Need a Drone of Our Own,” Financial Times, February 24, 2012.
254 sixty-three active drone sites in the U.S.
“Is There a Drone in Your Neighbourhood? Rise of Spy Planes Exposed After FAA Is Forced to Reveal 63 Launch Sites Across U.S.,” Daily Mail, April 24, 2012.
255 awareness—even if the device has been turned off
David Kushner, “The Hacker Is Watching,” GQ, January 2012.
256 have also been used to monitor the conversations of some suspects
Declan McCullagh, “Court to FBI: No Spying on In-Car Computers,” CNET, November 19, 2003, http://news.cnet.com/2100-1029_3-5109435.html. The Ninth Circuit Court of Appeals has ruled that this instance of surveillance is illegal.
257 other confidential information as it is typed
Nicole Perlroth, “Malicious Software Attacks Security Cards Used by Pentagon,” New York Times, Bits blog, January 12, 2012, http://bits.blogs.nytimes.com/2012/01/12/malicious-software-attacks-security-cards-used-by-pentagon/.
258 powerful data collection system that the world has ever known
Bamford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”
259 caused public outrage and resulted in congressional action
American Civil Liberties Union, “Congress Dismantles Total Information Awareness Spy Program; ACLU Applauds Victory, Calls for Continued Vigilance Against Snoop Programs,” September 25, 2003, http://www.aclu.org/national-security/congress-dismantles-total-information-awareness-spy-program-aclu-applauds-victory-.
260 against these proposals, resulted in the withdrawal of both
Jonathan Weisman, “After an Online Firestorm, Congress Shelves Antipiracy Bills,” New York Times, January 21, 2012.
261 eavesdrop on any online communication
Robert Pear, “House Votes to Approve Disputed Hacking Bill,” New York Times, April 27, 2012.
262 “habits of the heart and resisting the allure of the ideology of technology”
Michael Sacasas, “Technology in America,” American, April 13, 2012.
263 norms and values that reflect the American tradition of free speech and robust free markets
Gross, “World War 3.0.”
264 Brazil, India, and South Africa are following
Georgina Prodhan, “BRIC Nations Push for Bigger Say in Policing of Internet,” Globe and Mail, September 6, 2012.
265 as a last resort for protecting confidential, high-value information
Gross, “World War 3.0.”
266 “walled garden” approach
Ryan Nakashima, “Ex-AOL Exec Calls Facebook New ‘Walled Garden,’ ” Associated Press, May 1, 2012.
267 attempted to slow down or make more expensive
Claire Cain Miller and Miguel Helft, “Web Plan from Google and Verizon Is Criticized,” New York Times, August 10, 2010.
268 laws that protect free speech and free competition
“Protecting the Internet,” editorial, New York Times, December 18, 2010.
CHAPTER 3: POWER IN THE BALANCE
1 “closing of a 500-year cycle in economic history”
“China Became World’s Top Manufacturing Nation, Ending 110 Year US Leadership,” MercoPress, March 15, 2011, http://en.mercopress.com/2011/03/15/china-became-world-s-top-manufacturing-nation-ending-110-year-us-leadership.
2 first time since 1890 that any economy
Charles Kenny, “China vs. the U.S.: The Case for Second Place,” BloombergBusinessweek, October 13, 2011.
3 International Monetary Fund require support from 85 percent
“Profile: IMF and World Bank,” BBC News, April 17, 2012, http://news.bbc.co.uk/2/hi/americas/country_profiles/3670465.stm; Thomas J. Bollyky, “How to Fix the World Bank,” op-ed, New York Times, April 9, 2012; David Bosco, “A Primer on World Bank Voting Procedures,” Foreign Policy, March 28, 2012.
4 it has effective veto power over their decisions
BBC News, “Profile: IMF and World Bank,” BBC News; World Bank, “World Bank Group Voice Reform: Enhancing Voice and Participation in Developing and Transition Countries in 2010 and Beyond,” April 25, 2010, http://siteresources.worldbank.org/NEWS/Resources/IBRD2010VotingPowerRealignmentFINAL.pdf.
5 members of the U.N. Security Council when Brazil
CIA, The World Factbook, https://www.cia.gov/library/publications/the-world-factbook/rankorder/2001rank.html.
6 some have already preemptively labeled it the “G2”
C. Fred Bergsten, “Two’s Company,” Foreign Affairs, September/October 2009.
7 there were episodic warnings that American power was waning
Josef Joffe, “Declinism’s Fifth Wa
ve,” American Interest, January/February 2012; Samuel P. Huntington, “The U.S.—Decline or Renewal?,” Foreign Affairs, Winter 1988/1989; Victor Davis Hanson, “Beware the Boom in American ‘Declinism,’ ” CBS News, November 14, 2011, http://www.cbsnews.com/8301-215_162-57324071/beware-the-boom-in-american-declinism/.
8 the U.S. was in danger of quickly falling
Joffe, “Declinism’s Fifth Wave”; Huntington, “The U.S.—Decline or Renewal?”; Victor Hanson, “Beware the Boom in American ‘Declinism.’ ”
9 1940s to roughly 25 percent in the early 1970s
Stephen M. Walt, “The End of the American Era,” National Interest, October 25, 2011; Robert Kagan, “Not Fade Away,” New Republic, January 11, 2012.
10 remained at that same level for the last forty years
Kagan, “Not Fade Away.”
11 largely at the expense of Europe, not of the United States
Ibid.
12 when it first became the world’s largest economy
Charles Kenny, “China vs. the U.S.: The Case for Second Place,” BloombergBusinessweek, October 13, 2011.
13 suffered casualties 100 times greater than those of the United States
Irina Titova, “Medvedev Orders Precise Soviet WWII Death Toll,” Associated Press, January 27, 2009; Anne Leland, Mari-Jana Oboroceanu, Congressional Research Service, “American War and Military Operations Casualties: Lists and Statistics,” February 2010, http://www.fas.org/sgp/crs/natsec/RL32492.pdf.
14 Stalin’s 1939 pact with Hitler
“The Day in History: August 23rd, 1939. The Hitler-Stalin Pact,” History.com, 2012.
15 which formalized the U.S. dollar as the world’s reserve currency
“Beyond Bretton Woods 2,” Economist, November 4, 2010.
16 which later evolved into the Common Market and the European Union
European Commission, “Treaty Establishing the European Coal and Steel Community, ECSC Treaty,” October 15, 2010, http://europa.eu/legislation_summaries/institutional_affairs/treaties/treaties_ecsc_en.htm.
17 “the father of the United Nations”
Cordell Hull Foundation, “Cordell Hull Biography,” http://www.cordellhull.org/english/About_Us/Biography.asp.
18 “when goods cross borders, armies do not”
Jill Lerner, “Free Trade’s Champion,” Atlanta Business Chronicle, February 13, 2006.