by Al Gore
Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (New York: Doubleday, 1999).
170 on the messenger’s scalp, and then “waited for the hair to regrow”
Ibid.
171 cryptography in its various forms
Ibid.; Andrew Lycett, “Breaking Germany’s Enigma Code,” BBC, February 17, 2011, http://www.bbc.co.uk/history/worldwars/wwtwo/enigma_01.shtml.
172 “The system kind of got loose”
Michael Joseph Gross, “World War 3.0,” Vanity Fair, May 2012.
173 four trends have converged to make cybersecurity a problem
James Kaplan, Shantnu Sharma, and Allen Weinberg, “Meeting the Cybersecurity Challenge,” McKinsey Quarterly, June 2011.
174 corporations, government agencies, and organizations
Gross, “Enter the Cyber-Dragon.”
175 “We don’t do that”
Rosenbaum, “Richard Clarke on Who Was Behind the Stuxnet Attack.”
176 373,000 jobs each year—and $16 billion in lost earnings—from the theft of intellectual property
Richard Adler, Report of the 26th Annual Aspen Institute Conference on Communications Policy, Updating Rules of the Digital Road: Privacy, Security, Intellectual Property, 2012, p. 14.
177 worth $1 billion—in a single night
Richard A. Clarke, “How China Steals Our Secrets,” New York Times, April 3, 2012.
178 examined one yet that has not been infected
Nicole Perlroth, “How Much Have Foreign Hackers Stolen?,” New York Times, Bits blog, February 14, 2012, http://bits.blogs.nytimes.com/2012/02/14/how-much-have-foreign-hackers-stolen/?scp=7&sq=cyber%20security&st=cse.
179 “nearly four times the amount of data”
Ibid.
180 “cyberthreat will be the number one threat to the country”
J. Nicholas Hoover, “Cyber Attacks Becoming Top Terror Threat, FBI Says,” Information Week, February 1, 2012.
181 thirteen U.S. defense contractors, and a large number of other corporations
Michael Joseph Gross, “Exclusive: Operation Shady Rat—Unprecedented Cyber-Espionage Campaign and Intellectual-Property Bonanza,” Vanity Fair, August 2, 2011.
182 six weeks’ worth of emails between the Chamber
Nicole Perlroth, “Traveling Light in a Time of Digital Thievery,” New York Times, February 10, 2012.
183 still sending information over the Internet to China
Ibid.
184 individual packages containing the products they produce
Organisation for Economic Co-operation and Development, “Machine-to-Machine Communications: Connecting Billions of Devices,” OECD Digital Economy Papers, No. 192, 2012, http://dx.doi.org/10.1787/5k9gsh2gp043-en.
185 dairy farmers in Switzerland are even connecting
John Tagliabue, “Swiss Cows Send Texts to Announce They’re in Heat,” New York Times, October 2, 2012.
186 “control systems that run these facilities, a nearly fivefold increase from 2010”
John O. Brennan, “Time to Protect Against Dangers of Cyberattack,” Washington Post, April 15, 2012.
187 repeated cyberattacks from an unknown source
Thomas Erdbrink, “Iranian Officials Disconnect Some Oil Terminals from Internet,” New York Times, April 24, 2012.
188 Aramco, was the victim of cyberattacks
Thom Shanker and David E. Sanger, “U.S. Suspects Iran Was Behind a Wave of Cyberattacks,” New York Times, October 14, 2012.
189 The attack on Aramco
Nicole Perlroth, “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back,” New York Times, October 23, 2012.
190 Iranian gas centrifuges that were enriching uranium
William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” New York Times, January 15, 2011.
191 began infecting computers in Iran and several other nations
“ ‘Flame’ Computer Virus Strikes Middle East; Israel Speculation Continues,” Associated Press, May 29, 2012.
192 destructive attacks against Internet-connected machinery
William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” New York Times, January 15, 2011.
193 inadvertently infected by Stuxnet
Rachel King, “Virus Aimed at Iran Infected Chevron Network,” Wall Street Journal, November 9, 2012.
194 Leon Panetta publicly warned that a “cyber–Pearl harbor”
Elisabeth Bumiller and Thom Shanker, “Panetta Warns of Dire Threat of Cyberattack on U.S.,” New York Times, October 11, 2012.
195 “only they’re making it 30 percent cheaper”
Perlroth, “Traveling Light in a Time of Digital Thievery.”
196 then steal some of its most valuable customers
Steve Fishman, “Floored by News Corp.: Who Hacked a Rival’s Computer System?,” New York, September 28, 2011.
197 emails of individuals to gather information for news stories
Sarah Lyall and Ravi Somaiya, “British Broadcaster with Murdoch Link Admits to Hacking,” New York Times, April 5, 2012.
198 hacking into the telephone voicemails
Don Van Natta Jr., Jo Becker, and Graham Bowley, “Tabloid Hack Attack on Royals, and Beyond,” New York Times, September 1, 2010.
199 hack into supposedly secure videoconferences
Nicole Perlroth, “Cameras May Open Up the Board Room to Hackers,” New York Times, January 22, 2012.
200 theft of important information because they have a financial incentive
James Kaplan, Shantnu Sharma, and Allen Weinberg, “Meeting the Cybersecurity Challenge,” McKinsey Quarterly, June 2011.
201 targets have failed to take action to protect themselves
Michaela L. Sozio, “Cyber Liability—a Real Threat to Your Business,” California Business Law Confidential, March 2012; Preet Bharara, “Asleep at the Laptop,” New York Times, June 4, 2012.
202 collecting information about their own customers and users
Alexis Madrigal, “I’m Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web,” Atlantic, February 29, 2012.
203 tailor advertising to match each person’s individual collection of interests
Ibid.
204 online interests without offering them an opportunity to give their consent
Riva Richmond, “As ‘Like’ Buttons Spread, So Do Facebook’s Tentacles,” New York Times, Bits blog, September 27, 2011, http://bits.blogs.nytimes.com/2011/09/27/as-like-buttons-spread-so-do-facebooks-tentacles/.
205 “simply tools to improve the grip strength of the Invisible Hand”
Madrigal, “I’m Being Followed.”
206 discover information that one would not necessarily want
Jeffrey Rosen, “The Web Means the End of Forgetting,” New York Times Magazine, July 21, 2010.
207 their Facebook accounts so that private sites can also be accessed
Michelle Singletary, “Would You Give Potential Employers Your Facebook Password?,” Washington Post, March 29, 2012.
208 policy is to never give out such passwords
Joanna Stern, “Demanding Facebook Passwords May Break Law, Say Senators,” ABC News, March 26, 2012, http://abcnews.go.com/Technology/facebook-passwords-employers-schools-demand-access-facebook-senators/story?id=16005565#.UCPKWY40jdk.
209 many employees have been subjected to cybersurveillance
Tam Harbert, “Employee Monitoring: When IT Is Asked to Spy,” Computer World, June 16, 2010.
210 especially the Internet, increases exponentially as more people connect to it
James Hendler and Jennifer Golbeck, “Metcalfe’s Law, Web 2.0, and the Seman
tic Web,” Web Semantics 6, no. 1 (February, 2008): 14–20.
211 actually increases as the square of the number of people who connect to it
Ibid.
212 options for changing settings that some sites offer
Alexis Madrigal, “Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days,” Atlantic, March 1, 2012; Elaine Rigoli, “Most People Worried About Online Privacy, Personal Data, Employer Bias, Privacy Policies,” Consumer Reports, April 25, 2012.
213 But users who try to opt out of the tracking itself
Julia Angwin and Emily Steel, “Web’s Hot New Commodity: Privacy,” Wall Street Journal, February 28, 2011.
214 due to persistent lobbying pressure from the advertising industry
Tanzina Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking,” New York Times, February 26, 2012; Madrigal, “I’m Being Followed.”
215 but there are so many clicks that billions of dollars are at stake
Madrigal, “I’m Being Followed”; Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking.”
216 report information about a user’s online activities
“What They Know” Series, Wall Street Journal, http://online.wsj.com/public/page/what-they-know-digital-privacy.html.
217 about the user’s online activity to advertisers and others who purchase the data
Julia Angwin, “The Web’s New Gold Mine: Your Secrets,” Wall Street Journal, July 30, 2010.
218 matching individual computer numbers with the name, address, and telephone numbers
Madrigal, “I’m Being Followed.”
219 has spoken out against the use of DPI
Olivia Solon, “Tim Berners-Lee: Deep Packet Inspection a ‘Really Serious’ Privacy Breach,” Wired, April 18, 2012.
220 tragically, the gay student committed suicide soon after
Ian Parker, “The Story of a Suicide: Two College Roommates, a Webcam, and a Tragedy,” New Yorker, February 6, 2012.
221 tag people when they appear in photos on the site
“Facebook ‘Face Recognition’ Feature Draws Privacy Scrutiny,” Bloomberg News, June 8, 2011.
222 now used by many sites to identify people when they speak
Natasha Singer, “The Human Voice, as Game Changer,” New York Times, March 31, 2012.
223 improve the accuracy with which the machine interprets
Ibid.
224 which information can be delivered with relevance to the user’s location
“Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location,” Nielsen, April 21, 2011, http://blog.nielsen.com/nielsenwire/online_mobile/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location/.
225 25,000 U.S. citizens are also victims of “GPS stalking” each year
Justin Scheck, “Stalkers Exploit Cellphone GPS,” Wall Street Journal, August 3, 2010.
226 1,200 pages of information, most of which he thought he had deleted
Kevin J. O’Brien, “Austrian Law Student Faces Down Facebook,” New York Times, February 5, 2012.
227 designed to steal information from the user’s computer or mobile device
Matt Richtel and Verne G. Kopytoff, “E-Mail Fraud Hides Behind Friendly Face,” New York Times, June 2, 2011.
228 all the private information about individuals
Ann Carrns, “Careless Social Media Use May Raise Risk of Identity Fraud,” New York Times, February 29, 2012.
229 which have reported large losses as a result of cybercrime
“IMF Is Victim of ‘Sophisticated Cyberattack,’ Says Report,” IDG Reporter, June 13, 2011; “US Senate Orders Security Review After LulzSec Hacking,” Guardian, June 14, 2011; Julianne Pepitone and Leigh Remizowski, “ ‘Massive’ Credit Card Data Breach Involves All Major Brands,” CNN, April 2, 2012, http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm; “Heartland Payment Systems Hacked,” Associated Press, January 20, 2009; Bianca Dima, “Top 5: Corporate Losses Due to Hacking,” HOT for Security, May 17, 2012.
230 more than $7.2 million, with the cost increasing each year
“The Real Cost of Cyber Attacks,” Atlantic, February 16, 2012.
231 “more than the annual global market for marijuana, cocaine, and heroin combined”
Symantec, press release, “Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” September 7, 2011, http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02. However, some analysts note that some estimates of cybercrime are unreliable. Dinei Florêncio and Cormac Herley, “The Cybercrime Wave That Wasn’t,” New York Times, April 14, 2012.
232 LinkedIn
Ian Paul, “LinkedIn Confirms Account Passwords Hacked,” PC World, June 6, 2012.
233 eHarmony
Salvador Rodriguez, “Like LinkedIn, eHarmony Is Hacked; 1.5 Million Passwords Stolen,” Los Angeles Times, June 6, 2012.
234 Google’s Gmail
Nicole Perlroth, “Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users,” New York Times, July 12, 2012.
235 Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC
David Goldman, “Major Banks Hit with Biggest Cyberattacks in History,” CNN, September 28, 2012; “Week-Long Cyber Attacks Cripple US Banks,” Associated Press, September 29, 2012.
236 store Internet and telephone communications
Brian Wheeler, “Communications Data Bill Creates ‘a Virtual Giant Database,’ ” BBC, July 19, 2012, http://www.bbc.co.uk/news/uk-politics-18884460.
237 already installed 60,000 security cameras
Heather Brooke, “Investigation: A Sharp Focus on CCTV,” Wired UK, April 1, 2010.
238 “restrictions that fence in even the most disinterested”
Justice Felix Frankfurter, Concurring Opinion, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952).
239 “Knowledge is power”
Georg Henrik Wright, The Tree of Knowledge and Other Essays (Leiden: Brill, 1993), p. 127–28.
240 ability to eavesdrop on telephone calls as they were taking place
James Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, March 15, 2012.
241 “began to rapidly turn the United States of America”
Jason Reed, “NSA Whistleblowers: Government Spying on Every Single American,” Reuters, July 25, 2012.
242 has intercepted “between 15 and 20 trillion” communications
Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”
243 The formal state of emergency
President of the United States, “Notice—Continuation of the National Emergency with Respect to Certain Terrorist Attacks,” September 11, 2012.
244 “I think there’s really something at a deep level creepy”
Matt Sledge, “Warrantless Electronic Surveillance Surges Under Obama Justice Department,” Huffington Post, September 28, 2012.
245 riding a bicycle with a defective “audible bell”
Brief for the Petitioner in the United States Supreme Court, Albert W. Florence v. Board of Chosen Freeholders of the County of Burlington et al., No. 10-945, http://www.americanbar.org/content/dam/aba/publishing/previewbriefs/Other_Brief_Updates/10-945_petitioner.authcheckdam.pdf. Justice Stephen Breyer dissented from the strip search decision in a powerful rebuke of the expansive powers granted to law enforcement by the Court’s action. See Florence v. Board of Chosen Freeholders, April 2, 2012, http://www.supremecourt.gov/opinions/11pdf/10-945.pdf.
246 other digital device when he or she reenters the country
Glen
n Greenwald, “U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012, http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/.
247 and no reasonable cause for allowing the search is required
Ibid.
248 whose digital information has been searched and seized
Ibid.
249 “marketing a catalog of ‘surveillance fees’ ”
Eric Lichtblau, “Police Are Using Phone Tracking as a Routine Tool,” New York Times, April 1, 2012.
250 plans to sell the data to private investigators, insurers, and others
Julia Angwin and Jennifer Valentino-Devries, “New Tracking Frontier: Your License Plates,” Wall Street Journal, October 2, 2012.
251 The market for these technologies has grown
Nicole Perlroth, “Software Meant to Fight Crime Is Used to Spy on Dissidents,” New York Times, August 31, 2012.
252 including Iran, Syria, and China
Rebecca MacKinnon, “Internet Freedom Starts at Home,” Foreign Policy, April 3, 2012; Cindy Cohn, Trevor Timm, and Jillian C. York, Electronic Frontier Foundation, “Human Rights and Technology Sales: How Corporations Can Avoid Assisting Repressive Regimes,” April 2012, https://www.eff.org/document/human-rights-and-technology-sales; Jon Evans, “Selling Software That Kills,” TechCrunch, May 26, 2012, http://techcrunch.com/2012/05/26/selling-software-that-kills/.
253 video cameras will become commonplace tools
Francis Fukuyama, “Why We All Need a Drone of Our Own,” Financial Times, February 24, 2012.
254 sixty-three active drone sites in the U.S.
“Is There a Drone in Your Neighbourhood? Rise of Spy Planes Exposed After FAA Is Forced to Reveal 63 Launch Sites Across U.S.,” Daily Mail, April 24, 2012.
255 awareness—even if the device has been turned off
David Kushner, “The Hacker Is Watching,” GQ, January 2012.
256 have also been used to monitor the conversations of some suspects
Declan McCullagh, “Court to FBI: No Spying on In-Car Computers,” CNET, November 19, 2003, http://news.cnet.com/2100-1029_3-5109435.html. The Ninth Circuit Court of Appeals has ruled that this instance of surveillance is illegal.
257 other confidential information as it is typed