Book Read Free

The Future: Six Drivers of Global Change

Page 55

by Al Gore


  201 targets have failed to take action to protect themselves

  Michaela L. Sozio, “Cyber Liability—a Real Threat to Your Business,” California Business Law Confidential, March 2012; Preet Bharara, “Asleep at the Laptop,” New York Times, June 4, 2012.

  202 collecting information about their own customers and users

  Alexis Madrigal, “I’m Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web,” Atlantic, February 29, 2012.

  203 tailor advertising to match each person’s individual collection of interests

  Ibid.

  204 online interests without offering them an opportunity to give their consent

  Riva Richmond, “As ‘Like’ Buttons Spread, So Do Facebook’s Tentacles,” New York Times, Bits blog, September 27, 2011, http://bits.blogs.nytimes.com/2011/09/27/as-like-buttons-spread-so-do-facebooks-tentacles/.

  205 “simply tools to improve the grip strength of the Invisible Hand”

  Madrigal, “I’m Being Followed.”

  206 discover information that one would not necessarily want

  Jeffrey Rosen, “The Web Means the End of Forgetting,” New York Times Magazine, July 21, 2010.

  207 their Facebook accounts so that private sites can also be accessed

  Michelle Singletary, “Would You Give Potential Employers Your Facebook Password?,” Washington Post, March 29, 2012.

  208 policy is to never give out such passwords

  Joanna Stern, “Demanding Facebook Passwords May Break Law, Say Senators,” ABC News, March 26, 2012, http://abcnews.go.com/Technology/facebook-passwords-employers-schools-demand-access-facebook-senators/story?id=16005565#.UCPKWY40jdk.

  209 many employees have been subjected to cybersurveillance

  Tam Harbert, “Employee Monitoring: When IT Is Asked to Spy,” Computer World, June 16, 2010.

  210 especially the Internet, increases exponentially as more people connect to it

  James Hendler and Jennifer Golbeck, “Metcalfe’s Law, Web 2.0, and the Semantic Web,” Web Semantics 6, no. 1 (February, 2008): 14–20.

  211 actually increases as the square of the number of people who connect to it

  Ibid.

  212 options for changing settings that some sites offer

  Alexis Madrigal, “Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days,” Atlantic, March 1, 2012; Elaine Rigoli, “Most People Worried About Online Privacy, Personal Data, Employer Bias, Privacy Policies,” Consumer Reports, April 25, 2012.

  213 But users who try to opt out of the tracking itself

  Julia Angwin and Emily Steel, “Web’s Hot New Commodity: Privacy,” Wall Street Journal, February 28, 2011.

  214 due to persistent lobbying pressure from the advertising industry

  Tanzina Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking,” New York Times, February 26, 2012; Madrigal, “I’m Being Followed.”

  215 but there are so many clicks that billions of dollars are at stake

  Madrigal, “I’m Being Followed”; Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking.”

  216 report information about a user’s online activities

  “What They Know” Series, Wall Street Journal, http://online.wsj.com/public/page/what-they-know-digital-privacy.html.

  217 about the user’s online activity to advertisers and others who purchase the data

  Julia Angwin, “The Web’s New Gold Mine: Your Secrets,” Wall Street Journal, July 30, 2010.

  218 matching individual computer numbers with the name, address, and telephone numbers

  Madrigal, “I’m Being Followed.”

  219 has spoken out against the use of DPI

  Olivia Solon, “Tim Berners-Lee: Deep Packet Inspection a ‘Really Serious’ Privacy Breach,” Wired, April 18, 2012.

  220 tragically, the gay student committed suicide soon after

  Ian Parker, “The Story of a Suicide: Two College Roommates, a Webcam, and a Tragedy,” New Yorker, February 6, 2012.

  221 tag people when they appear in photos on the site

  “Facebook ‘Face Recognition’ Feature Draws Privacy Scrutiny,” Bloomberg News, June 8, 2011.

  222 now used by many sites to identify people when they speak

  Natasha Singer, “The Human Voice, as Game Changer,” New York Times, March 31, 2012.

  223 improve the accuracy with which the machine interprets

  Ibid.

  224 which information can be delivered with relevance to the user’s location

  “Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location,” Nielsen, April 21, 2011, http://blog.nielsen.com/nielsenwire/online_mobile/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location/.

  225 25,000 U.S. citizens are also victims of “GPS stalking” each year

  Justin Scheck, “Stalkers Exploit Cellphone GPS,” Wall Street Journal, August 3, 2010.

  226 1,200 pages of information, most of which he thought he had deleted

  Kevin J. O’Brien, “Austrian Law Student Faces Down Facebook,” New York Times, February 5, 2012.

  227 designed to steal information from the user’s computer or mobile device

  Matt Richtel and Verne G. Kopytoff, “E-Mail Fraud Hides Behind Friendly Face,” New York Times, June 2, 2011.

  228 all the private information about individuals

  Ann Carrns, “Careless Social Media Use May Raise Risk of Identity Fraud,” New York Times, February 29, 2012.

  229 which have reported large losses as a result of cybercrime

  “IMF Is Victim of ‘Sophisticated Cyberattack,’ Says Report,” IDG Reporter, June 13, 2011; “US Senate Orders Security Review After LulzSec Hacking,” Guardian, June 14, 2011; Julianne Pepitone and Leigh Remizowski, “ ‘Massive’ Credit Card Data Breach Involves All Major Brands,” CNN, April 2, 2012, http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm; “Heartland Payment Systems Hacked,” Associated Press, January 20, 2009; Bianca Dima, “Top 5: Corporate Losses Due to Hacking,” HOT for Security, May 17, 2012.

  230 more than $7.2 million, with the cost increasing each year

  “The Real Cost of Cyber Attacks,” Atlantic, February 16, 2012.

  231 “more than the annual global market for marijuana, cocaine, and heroin combined”

  Symantec, press release, “Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” September 7, 2011, http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02. However, some analysts note that some estimates of cybercrime are unreliable. Dinei Florêncio and Cormac Herley, “The Cybercrime Wave That Wasn’t,” New York Times, April 14, 2012.

  232 LinkedIn

  Ian Paul, “LinkedIn Confirms Account Passwords Hacked,” PC World, June 6, 2012.

  233 eHarmony

  Salvador Rodriguez, “Like LinkedIn, eHarmony Is Hacked; 1.5 Million Passwords Stolen,” Los Angeles Times, June 6, 2012.

  234 Google’s Gmail

  Nicole Perlroth, “Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users,” New York Times, July 12, 2012.

  235 Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC

  David Goldman, “Major Banks Hit with Biggest Cyberattacks in History,” CNN, September 28, 2012; “Week-Long Cyber Attacks Cripple US Banks,” Associated Press, September 29, 2012.

  236 store Internet and telephone communications

  Brian Wheeler, “Communications Data Bill Creates ‘a Virtual Giant Database,’ ” BBC, July 19, 2012, http://www.bbc.co.uk/news/uk-politics-18884460.

  237 already installed 60,000 security cameras

  Heather Brooke, “Investigation: A Sharp Focus on CCTV,” Wired UK, April 1, 2010.

  238 “restrictions that fence in even the most disinterested”

  Justice Felix Frankfurter, Concurring Opinion, Youngstown Sheet & Tube Co. v. Sawyer,
343 U.S. 579 (1952).

  239 “Knowledge is power”

  Georg Henrik Wright, The Tree of Knowledge and Other Essays (Leiden: Brill, 1993), p. 127–28.

  240 ability to eavesdrop on telephone calls as they were taking place

  James Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, March 15, 2012.

  241 “began to rapidly turn the United States of America”

  Jason Reed, “NSA Whistleblowers: Government Spying on Every Single American,” Reuters, July 25, 2012.

  242 has intercepted “between 15 and 20 trillion” communications

  Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”

  243 The formal state of emergency

  President of the United States, “Notice—Continuation of the National Emergency with Respect to Certain Terrorist Attacks,” September 11, 2012.

  244 “I think there’s really something at a deep level creepy”

  Matt Sledge, “Warrantless Electronic Surveillance Surges Under Obama Justice Department,” Huffington Post, September 28, 2012.

  245 riding a bicycle with a defective “audible bell”

  Brief for the Petitioner in the United States Supreme Court, Albert W. Florence v. Board of Chosen Freeholders of the County of Burlington et al., No. 10-945, http://www.americanbar.org/content/dam/aba/publishing/previewbriefs/Other_Brief_Updates/10-945_petitioner.authcheckdam.pdf. Justice Stephen Breyer dissented from the strip search decision in a powerful rebuke of the expansive powers granted to law enforcement by the Court’s action. See Florence v. Board of Chosen Freeholders, April 2, 2012, http://www.supremecourt.gov/opinions/11pdf/10-945.pdf.

  246 other digital device when he or she reenters the country

  Glenn Greenwald, “U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012, http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/.

  247 and no reasonable cause for allowing the search is required

  Ibid.

  248 whose digital information has been searched and seized

  Ibid.

  249 “marketing a catalog of ‘surveillance fees’ ”

  Eric Lichtblau, “Police Are Using Phone Tracking as a Routine Tool,” New York Times, April 1, 2012.

  250 plans to sell the data to private investigators, insurers, and others

  Julia Angwin and Jennifer Valentino-Devries, “New Tracking Frontier: Your License Plates,” Wall Street Journal, October 2, 2012.

  251 The market for these technologies has grown

  Nicole Perlroth, “Software Meant to Fight Crime Is Used to Spy on Dissidents,” New York Times, August 31, 2012.

  252 including Iran, Syria, and China

  Rebecca MacKinnon, “Internet Freedom Starts at Home,” Foreign Policy, April 3, 2012; Cindy Cohn, Trevor Timm, and Jillian C. York, Electronic Frontier Foundation, “Human Rights and Technology Sales: How Corporations Can Avoid Assisting Repressive Regimes,” April 2012, https://www.eff.org/document/human-rights-and-technology-sales; Jon Evans, “Selling Software That Kills,” TechCrunch, May 26, 2012, http://techcrunch.com/2012/05/26/selling-software-that-kills/.

  253 video cameras will become commonplace tools

  Francis Fukuyama, “Why We All Need a Drone of Our Own,” Financial Times, February 24, 2012.

  254 sixty-three active drone sites in the U.S.

  “Is There a Drone in Your Neighbourhood? Rise of Spy Planes Exposed After FAA Is Forced to Reveal 63 Launch Sites Across U.S.,” Daily Mail, April 24, 2012.

  255 awareness—even if the device has been turned off

  David Kushner, “The Hacker Is Watching,” GQ, January 2012.

  256 have also been used to monitor the conversations of some suspects

  Declan McCullagh, “Court to FBI: No Spying on In-Car Computers,” CNET, November 19, 2003, http://news.cnet.com/2100-1029_3-5109435.html. The Ninth Circuit Court of Appeals has ruled that this instance of surveillance is illegal.

  257 other confidential information as it is typed

  Nicole Perlroth, “Malicious Software Attacks Security Cards Used by Pentagon,” New York Times, Bits blog, January 12, 2012, http://bits.blogs.nytimes.com/2012/01/12/malicious-software-attacks-security-cards-used-by-pentagon/.

  258 powerful data collection system that the world has ever known

  Bamford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”

  259 caused public outrage and resulted in congressional action

  American Civil Liberties Union, “Congress Dismantles Total Information Awareness Spy Program; ACLU Applauds Victory, Calls for Continued Vigilance Against Snoop Programs,” September 25, 2003, http://www.aclu.org/national-security/congress-dismantles-total-information-awareness-spy-program-aclu-applauds-victory-.

  260 against these proposals, resulted in the withdrawal of both

  Jonathan Weisman, “After an Online Firestorm, Congress Shelves Antipiracy Bills,” New York Times, January 21, 2012.

  261 eavesdrop on any online communication

  Robert Pear, “House Votes to Approve Disputed Hacking Bill,” New York Times, April 27, 2012.

  262 “habits of the heart and resisting the allure of the ideology of technology”

  Michael Sacasas, “Technology in America,” American, April 13, 2012.

  263 norms and values that reflect the American tradition of free speech and robust free markets

  Gross, “World War 3.0.”

  264 Brazil, India, and South Africa are following

  Georgina Prodhan, “BRIC Nations Push for Bigger Say in Policing of Internet,” Globe and Mail, September 6, 2012.

  265 as a last resort for protecting confidential, high-value information

  Gross, “World War 3.0.”

  266 “walled garden” approach

  Ryan Nakashima, “Ex-AOL Exec Calls Facebook New ‘Walled Garden,’ ” Associated Press, May 1, 2012.

  267 attempted to slow down or make more expensive

  Claire Cain Miller and Miguel Helft, “Web Plan from Google and Verizon Is Criticized,” New York Times, August 10, 2010.

  268 laws that protect free speech and free competition

  “Protecting the Internet,” editorial, New York Times, December 18, 2010.

  CHAPTER 3: POWER IN THE BALANCE

  1 “closing of a 500-year cycle in economic history”

  “China Became World’s Top Manufacturing Nation, Ending 110 Year US Leadership,” MercoPress, March 15, 2011, http://en.mercopress.com/2011/03/15/china-became-world-s-top-manufacturing-nation-ending-110-year-us-leadership.

  2 first time since 1890 that any economy

  Charles Kenny, “China vs. the U.S.: The Case for Second Place,” BloombergBusinessweek, October 13, 2011.

  3 International Monetary Fund require support from 85 percent

  “Profile: IMF and World Bank,” BBC News, April 17, 2012, http://news.bbc.co.uk/2/hi/americas/country_profiles/3670465.stm; Thomas J. Bollyky, “How to Fix the World Bank,” op-ed, New York Times, April 9, 2012; David Bosco, “A Primer on World Bank Voting Procedures,” Foreign Policy, March 28, 2012.

  4 it has effective veto power over their decisions

  BBC News, “Profile: IMF and World Bank,” BBC News; World Bank, “World Bank Group Voice Reform: Enhancing Voice and Participation in Developing and Transition Countries in 2010 and Beyond,” April 25, 2010, http://siteresources.worldbank.org/NEWS/Resources/IBRD2010VotingPowerRealignmentFINAL.pdf.

  5 members of the U.N. Security Council when Brazil

  CIA, The World Factbook, https://www.cia.gov/library/publications/the-world-factbook/rankorder/2001rank.html.

  6 some have already preemptively labeled it the “G2”

  C. Fred Bergsten, “Two’s Company,” Foreign Affairs, September/October 2009.

  7 there were episodic warnings that American power was waning

  Josef Joffe, “Declinism’s Fifth Wa
ve,” American Interest, January/February 2012; Samuel P. Huntington, “The U.S.—Decline or Renewal?,” Foreign Affairs, Winter 1988/1989; Victor Davis Hanson, “Beware the Boom in American ‘Declinism,’ ” CBS News, November 14, 2011, http://www.cbsnews.com/8301-215_162-57324071/beware-the-boom-in-american-declinism/.

  8 the U.S. was in danger of quickly falling

  Joffe, “Declinism’s Fifth Wave”; Huntington, “The U.S.—Decline or Renewal?”; Victor Hanson, “Beware the Boom in American ‘Declinism.’ ”

  9 1940s to roughly 25 percent in the early 1970s

  Stephen M. Walt, “The End of the American Era,” National Interest, October 25, 2011; Robert Kagan, “Not Fade Away,” New Republic, January 11, 2012.

  10 remained at that same level for the last forty years

  Kagan, “Not Fade Away.”

  11 largely at the expense of Europe, not of the United States

  Ibid.

  12 when it first became the world’s largest economy

  Charles Kenny, “China vs. the U.S.: The Case for Second Place,” BloombergBusinessweek, October 13, 2011.

  13 suffered casualties 100 times greater than those of the United States

  Irina Titova, “Medvedev Orders Precise Soviet WWII Death Toll,” Associated Press, January 27, 2009; Anne Leland, Mari-Jana Oboroceanu, Congressional Research Service, “American War and Military Operations Casualties: Lists and Statistics,” February 2010, http://www.fas.org/sgp/crs/natsec/RL32492.pdf.

  14 Stalin’s 1939 pact with Hitler

  “The Day in History: August 23rd, 1939. The Hitler-Stalin Pact,” History.com, 2012.

  15 which formalized the U.S. dollar as the world’s reserve currency

  “Beyond Bretton Woods 2,” Economist, November 4, 2010.

  16 which later evolved into the Common Market and the European Union

  European Commission, “Treaty Establishing the European Coal and Steel Community, ECSC Treaty,” October 15, 2010, http://europa.eu/legislation_summaries/institutional_affairs/treaties/treaties_ecsc_en.htm.

  17 “the father of the United Nations”

  Cordell Hull Foundation, “Cordell Hull Biography,” http://www.cordellhull.org/english/About_Us/Biography.asp.

  18 “when goods cross borders, armies do not”

  Jill Lerner, “Free Trade’s Champion,” Atlanta Business Chronicle, February 13, 2006.

 

‹ Prev