Book Read Free

The Future

Page 55

by Al Gore


  Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (New York: Doubleday, 1999).

  170 on the messenger’s scalp, and then “waited for the hair to regrow”

  Ibid.

  171 cryptography in its various forms

  Ibid.; Andrew Lycett, “Breaking Germany’s Enigma Code,” BBC, February 17, 2011, http://​www.​bbc.​co.​uk/​history/​worldwars/​wwtwo/​enigma_01.​shtml.

  172 “The system kind of got loose”

  Michael Joseph Gross, “World War 3.0,” Vanity Fair, May 2012.

  173 four trends have converged to make cybersecurity a problem

  James Kaplan, Shantnu Sharma, and Allen Weinberg, “Meeting the Cybersecurity Challenge,” McKinsey Quarterly, June 2011.

  174 corporations, government agencies, and organizations

  Gross, “Enter the Cyber-Dragon.”

  175 “We don’t do that”

  Rosenbaum, “Richard Clarke on Who Was Behind the Stuxnet Attack.”

  176 373,000 jobs each year—and $16 billion in lost earnings—from the theft of intellectual property

  Richard Adler, Report of the 26th Annual Aspen Institute Conference on Communications Policy, Updating Rules of the Digital Road: Privacy, Security, Intellectual Property, 2012, p. 14.

  177 worth $1 billion—in a single night

  Richard A. Clarke, “How China Steals Our Secrets,” New York Times, April 3, 2012.

  178 examined one yet that has not been infected

  Nicole Perlroth, “How Much Have Foreign Hackers Stolen?,” New York Times, Bits blog, February 14, 2012, http://​bits.​blogs.​nytimes.​com/​2012/​02/​14/​how-​much-​have-​foreign-​hackers-​stolen/​?scp=​7&sq=cyber%20​security&st=​cse.

  179 “nearly four times the amount of data”

  Ibid.

  180 “cyberthreat will be the number one threat to the country”

  J. Nicholas Hoover, “Cyber Attacks Becoming Top Terror Threat, FBI Says,” Information Week, February 1, 2012.

  181 thirteen U.S. defense contractors, and a large number of other corporations

  Michael Joseph Gross, “Exclusive: Operation Shady Rat—Unprecedented Cyber-Espionage Campaign and Intellectual-Property Bonanza,” Vanity Fair, August 2, 2011.

  182 six weeks’ worth of emails between the Chamber

  Nicole Perlroth, “Traveling Light in a Time of Digital Thievery,” New York Times, February 10, 2012.

  183 still sending information over the Internet to China

  Ibid.

  184 individual packages containing the products they produce

  Organisation for Economic Co-operation and Development, “Machine-to-Machine Communications: Connecting Billions of Devices,” OECD Digital Economy Papers, No. 192, 2012, http://​dx.​doi.​org/​10.​1787/​5k9gsh​2gp043-​en.

  185 dairy farmers in Switzerland are even connecting

  John Tagliabue, “Swiss Cows Send Texts to Announce They’re in Heat,” New York Times, October 2, 2012.

  186 “control systems that run these facilities, a nearly fivefold increase from 2010”

  John O. Brennan, “Time to Protect Against Dangers of Cyberattack,” Washington Post, April 15, 2012.

  187 repeated cyberattacks from an unknown source

  Thomas Erdbrink, “Iranian Officials Disconnect Some Oil Terminals from Internet,” New York Times, April 24, 2012.

  188 Aramco, was the victim of cyberattacks

  Thom Shanker and David E. Sanger, “U.S. Suspects Iran Was Behind a Wave of Cyberattacks,” New York Times, October 14, 2012.

  189 The attack on Aramco

  Nicole Perlroth, “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back,” New York Times, October 23, 2012.

  190 Iranian gas centrifuges that were enriching uranium

  William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” New York Times, January 15, 2011.

  191 began infecting computers in Iran and several other nations

  “ ‘Flame’ Computer Virus Strikes Middle East; Israel Speculation Continues,” Associated Press, May 29, 2012.

  192 destructive attacks against Internet-connected machinery

  William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” New York Times, January 15, 2011.

  193 inadvertently infected by Stuxnet

  Rachel King, “Virus Aimed at Iran Infected Chevron Network,” Wall Street Journal, November 9, 2012.

  194 Leon Panetta publicly warned that a “cyber–Pearl harbor”

  Elisabeth Bumiller and Thom Shanker, “Panetta Warns of Dire Threat of Cyberattack on U.S.,” New York Times, October 11, 2012.

  195 “only they’re making it 30 percent cheaper”

  Perlroth, “Traveling Light in a Time of Digital Thievery.”

  196 then steal some of its most valuable customers

  Steve Fishman, “Floored by News Corp.: Who Hacked a Rival’s Computer System?,” New York, September 28, 2011.

  197 emails of individuals to gather information for news stories

  Sarah Lyall and Ravi Somaiya, “British Broadcaster with Murdoch Link Admits to Hacking,” New York Times, April 5, 2012.

  198 hacking into the telephone voicemails

  Don Van Natta Jr., Jo Becker, and Graham Bowley, “Tabloid Hack Attack on Royals, and Beyond,” New York Times, September 1, 2010.

  199 hack into supposedly secure videoconferences

  Nicole Perlroth, “Cameras May Open Up the Board Room to Hackers,” New York Times, January 22, 2012.

  200 theft of important information because they have a financial incentive

  James Kaplan, Shantnu Sharma, and Allen Weinberg, “Meeting the Cybersecurity Challenge,” McKinsey Quarterly, June 2011.

  201 targets have failed to take action to protect themselves

  Michaela L. Sozio, “Cyber Liability—a Real Threat to Your Business,” California Business Law Confidential, March 2012; Preet Bharara, “Asleep at the Laptop,” New York Times, June 4, 2012.

  202 collecting information about their own customers and users

  Alexis Madrigal, “I’m Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web,” Atlantic, February 29, 2012.

  203 tailor advertising to match each person’s individual collection of interests

  Ibid.

  204 online interests without offering them an opportunity to give their consent

  Riva Richmond, “As ‘Like’ Buttons Spread, So Do Facebook’s Tentacles,” New York Times, Bits blog, September 27, 2011, http://​bits.​blogs.​nytimes.​com/​2011/​09/​27/​as-​like-​buttons-​spread-​so-​do-​facebooks-​tentacles/.

  205 “simply tools to improve the grip strength of the Invisible Hand”

  Madrigal, “I’m Being Followed.”

  206 discover information that one would not necessarily want

  Jeffrey Rosen, “The Web Means the End of Forgetting,” New York Times Magazine, July 21, 2010.

  207 their Facebook accounts so that private sites can also be accessed

  Michelle Singletary, “Would You Give Potential Employers Your Facebook Password?,” Washington Post, March 29, 2012.

  208 policy is to never give out such passwords

  Joanna Stern, “Demanding Facebook Passwords May Break Law, Say Senators,” ABC News, March 26, 2012, http://​abcnews.​go.​com/​Technology/​facebook-​passwords-​employers-​schools-​demand-​access-​facebook-​senators/​story?​id=​16005565#.​UCPKWY40jdk.

  209 many employees have been subjected to cybersurveillance

  Tam Harbert, “Employee Monitoring: When IT Is Asked to Spy,” Computer World, June 16, 2010.

  210 especially the Internet, increases exponentially as more people connect to it

  James Hendler and Jennifer Golbeck, “Metcalfe’s Law, Web 2.0, and the Seman
tic Web,” Web Semantics 6, no. 1 (February, 2008): 14–20.

  211 actually increases as the square of the number of people who connect to it

  Ibid.

  212 options for changing settings that some sites offer

  Alexis Madrigal, “Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days,” Atlantic, March 1, 2012; Elaine Rigoli, “Most People Worried About Online Privacy, Personal Data, Employer Bias, Privacy Policies,” Consumer Reports, April 25, 2012.

  213 But users who try to opt out of the tracking itself

  Julia Angwin and Emily Steel, “Web’s Hot New Commodity: Privacy,” Wall Street Journal, February 28, 2011.

  214 due to persistent lobbying pressure from the advertising industry

  Tanzina Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking,” New York Times, February 26, 2012; Madrigal, “I’m Being Followed.”

  215 but there are so many clicks that billions of dollars are at stake

  Madrigal, “I’m Being Followed”; Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking.”

  216 report information about a user’s online activities

  “What They Know” Series, Wall Street Journal, http://​online.​wsj.​com/​public/​page/​what-​they-​know-​digital-​privacy.​html.

  217 about the user’s online activity to advertisers and others who purchase the data

  Julia Angwin, “The Web’s New Gold Mine: Your Secrets,” Wall Street Journal, July 30, 2010.

  218 matching individual computer numbers with the name, address, and telephone numbers

  Madrigal, “I’m Being Followed.”

  219 has spoken out against the use of DPI

  Olivia Solon, “Tim Berners-Lee: Deep Packet Inspection a ‘Really Serious’ Privacy Breach,” Wired, April 18, 2012.

  220 tragically, the gay student committed suicide soon after

  Ian Parker, “The Story of a Suicide: Two College Roommates, a Webcam, and a Tragedy,” New Yorker, February 6, 2012.

  221 tag people when they appear in photos on the site

  “Facebook ‘Face Recognition’ Feature Draws Privacy Scrutiny,” Bloomberg News, June 8, 2011.

  222 now used by many sites to identify people when they speak

  Natasha Singer, “The Human Voice, as Game Changer,” New York Times, March 31, 2012.

  223 improve the accuracy with which the machine interprets

  Ibid.

  224 which information can be delivered with relevance to the user’s location

  “Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location,” Nielsen, April 21, 2011, http://​blog.​nielsen.​com/​nielsenwire/​online_​mobile/​privacy-​please-​u-​s-​smartphone-​app-​users-​concerned-​with-​privacy-​when-​it-​comes-​to-​location/.

  225 25,000 U.S. citizens are also victims of “GPS stalking” each year

  Justin Scheck, “Stalkers Exploit Cellphone GPS,” Wall Street Journal, August 3, 2010.

  226 1,200 pages of information, most of which he thought he had deleted

  Kevin J. O’Brien, “Austrian Law Student Faces Down Facebook,” New York Times, February 5, 2012.

  227 designed to steal information from the user’s computer or mobile device

  Matt Richtel and Verne G. Kopytoff, “E-Mail Fraud Hides Behind Friendly Face,” New York Times, June 2, 2011.

  228 all the private information about individuals

  Ann Carrns, “Careless Social Media Use May Raise Risk of Identity Fraud,” New York Times, February 29, 2012.

  229 which have reported large losses as a result of cybercrime

  “IMF Is Victim of ‘Sophisticated Cyberattack,’ Says Report,” IDG Reporter, June 13, 2011; “US Senate Orders Security Review After LulzSec Hacking,” Guardian, June 14, 2011; Julianne Pepitone and Leigh Remizowski, “ ‘Massive’ Credit Card Data Breach Involves All Major Brands,” CNN, April 2, 2012, http://​money.​cnn.​com/​2012/​03/​30/​technology/​credit-​card-​data-​breach/​index.​htm; “Heartland Payment Systems Hacked,” Associated Press, January 20, 2009; Bianca Dima, “Top 5: Corporate Losses Due to Hacking,” HOT for Security, May 17, 2012.

  230 more than $7.2 million, with the cost increasing each year

  “The Real Cost of Cyber Attacks,” Atlantic, February 16, 2012.

  231 “more than the annual global market for marijuana, cocaine, and heroin combined”

  Symantec, press release, “Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” September 7, 2011, http://​www.​symantec.​com/​about/​news/​release/​article.​jsp?​prid=​20110907_​02. However, some analysts note that some estimates of cybercrime are unreliable. Dinei Florêncio and Cormac Herley, “The Cybercrime Wave That Wasn’t,” New York Times, April 14, 2012.

  232 LinkedIn

  Ian Paul, “LinkedIn Confirms Account Passwords Hacked,” PC World, June 6, 2012.

  233 eHarmony

  Salvador Rodriguez, “Like LinkedIn, eHarmony Is Hacked; 1.5 Million Passwords Stolen,” Los Angeles Times, June 6, 2012.

  234 Google’s Gmail

  Nicole Perlroth, “Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users,” New York Times, July 12, 2012.

  235 Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC

  David Goldman, “Major Banks Hit with Biggest Cyberattacks in History,” CNN, September 28, 2012; “Week-Long Cyber Attacks Cripple US Banks,” Associated Press, September 29, 2012.

  236 store Internet and telephone communications

  Brian Wheeler, “Communications Data Bill Creates ‘a Virtual Giant Database,’ ” BBC, July 19, 2012, http://​www.​bbc.​co.​uk/​news/​uk-​politics-​18884460.

  237 already installed 60,000 security cameras

  Heather Brooke, “Investigation: A Sharp Focus on CCTV,” Wired UK, April 1, 2010.

  238 “restrictions that fence in even the most disinterested”

  Justice Felix Frankfurter, Concurring Opinion, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952).

  239 “Knowledge is power”

  Georg Henrik Wright, The Tree of Knowledge and Other Essays (Leiden: Brill, 1993), p. 127–28.

  240 ability to eavesdrop on telephone calls as they were taking place

  James Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, March 15, 2012.

  241 “began to rapidly turn the United States of America”

  Jason Reed, “NSA Whistleblowers: Government Spying on Every Single American,” Reuters, July 25, 2012.

  242 has intercepted “between 15 and 20 trillion” communications

  Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”

  243 The formal state of emergency

  President of the United States, “Notice—Continuation of the National Emergency with Respect to Certain Terrorist Attacks,” September 11, 2012.

  244 “I think there’s really something at a deep level creepy”

  Matt Sledge, “Warrantless Electronic Surveillance Surges Under Obama Justice Department,” Huffington Post, September 28, 2012.

  245 riding a bicycle with a defective “audible bell”

  Brief for the Petitioner in the United States Supreme Court, Albert W. Florence v. Board of Chosen Freeholders of the County of Burlington et al., No. 10-945, http://​www.​americanbar.​org/​content/​dam/​aba/​publishing/​previewbriefs/​Other_​Brief_​Updates/​10-​945_​petitioner.​authcheckdam.​pdf. Justice Stephen Breyer dissented from the strip search decision in a powerful rebuke of the expansive powers granted to law enforcement by the Court’s action. See Florence v. Board of Chosen Freeholders, April 2, 2012, http://​www.​supremecourt.​gov/​opinions/​11pdf/​10-​945.​pdf.

  246 other digital device when he or she reenters the country

  Glen
n Greenwald, “U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012, http://​www.​salon.​com/​2012/​04/​08/​u_s_​filmmaker_​repeatedly_​detained_​at_​border/.

  247 and no reasonable cause for allowing the search is required

  Ibid.

  248 whose digital information has been searched and seized

  Ibid.

  249 “marketing a catalog of ‘surveillance fees’ ”

  Eric Lichtblau, “Police Are Using Phone Tracking as a Routine Tool,” New York Times, April 1, 2012.

  250 plans to sell the data to private investigators, insurers, and others

  Julia Angwin and Jennifer Valentino-Devries, “New Tracking Frontier: Your License Plates,” Wall Street Journal, October 2, 2012.

  251 The market for these technologies has grown

  Nicole Perlroth, “Software Meant to Fight Crime Is Used to Spy on Dissidents,” New York Times, August 31, 2012.

  252 including Iran, Syria, and China

  Rebecca MacKinnon, “Internet Freedom Starts at Home,” Foreign Policy, April 3, 2012; Cindy Cohn, Trevor Timm, and Jillian C. York, Electronic Frontier Foundation, “Human Rights and Technology Sales: How Corporations Can Avoid Assisting Repressive Regimes,” April 2012, https://www.eff.org/document/human-rights-and-technology-sales; Jon Evans, “Selling Software That Kills,” TechCrunch, May 26, 2012, http://​techcrunch.​com/​2012/​05/​26/​selling-​software-​that-​kills/.

  253 video cameras will become commonplace tools

  Francis Fukuyama, “Why We All Need a Drone of Our Own,” Financial Times, February 24, 2012.

  254 sixty-three active drone sites in the U.S.

  “Is There a Drone in Your Neighbourhood? Rise of Spy Planes Exposed After FAA Is Forced to Reveal 63 Launch Sites Across U.S.,” Daily Mail, April 24, 2012.

  255 awareness—even if the device has been turned off

  David Kushner, “The Hacker Is Watching,” GQ, January 2012.

  256 have also been used to monitor the conversations of some suspects

  Declan McCullagh, “Court to FBI: No Spying on In-Car Computers,” CNET, November 19, 2003, http://​news.​cnet.​com/​2100-​1029_3-​5109435.​html. The Ninth Circuit Court of Appeals has ruled that this instance of surveillance is illegal.

  257 other confidential information as it is typed

 

‹ Prev