The Future (72 page)

Read The Future Online

Authors: Al Gore

BOOK: The Future
7.9Mb size Format: txt, pdf, ePub

187
repeated cyberattacks from an unknown source
Thomas Erdbrink, “Iranian Officials Disconnect Some Oil Terminals from Internet,”
New York Times
, April 24, 2012.

188
Aramco, was the victim of cyberattacks
Thom Shanker and David E. Sanger, “U.S. Suspects Iran Was Behind a Wave of Cyberattacks,”
New York Times
, October 14, 2012.

189
The attack on Aramco
Nicole Perlroth, “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back,”
New York Times
, October 23, 2012.

190
Iranian gas centrifuges that were enriching uranium
William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,”
New York Times
, January 15, 2011.

191
began infecting computers in Iran and several other nations
“ ‘Flame’ Computer Virus Strikes Middle East; Israel Speculation Continues,” Associated Press, May 29, 2012.

192
destructive attacks against Internet-connected machinery
William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,”
New York Times
, January 15, 2011.

193
inadvertently infected by Stuxnet
Rachel King, “Virus Aimed at Iran Infected Chevron Network,”
Wall Street Journal
, November 9, 2012.

194
Leon Panetta publicly warned that a “cyber–Pearl harbor”
Elisabeth Bumiller and Thom Shanker, “Panetta Warns of Dire Threat of Cyberattack on U.S.,”
New York Times
, October 11, 2012.

195
“only they’re making it 30 percent cheaper”
Perlroth, “Traveling Light in a Time of Digital Thievery.”

196
then steal some of its most valuable customers
Steve Fishman, “Floored by News Corp.: Who Hacked a Rival’s Computer System?,”
New York
, September 28, 2011.

197
emails of individuals to gather information for news stories
Sarah Lyall and Ravi Somaiya, “British Broadcaster with Murdoch Link Admits to Hacking,”
New York Times
, April 5, 2012.

198
hacking into the telephone voicemails
Don Van Natta Jr., Jo Becker, and Graham Bowley, “Tabloid Hack Attack on Royals, and Beyond,”
New York Times
, September 1, 2010.

199
hack into supposedly secure videoconferences
Nicole Perlroth, “Cameras May Open Up the Board Room to Hackers,”
New York Times
, January 22, 2012.

200
theft of important information because they have a financial incentive
James Kaplan, Shantnu Sharma, and Allen Weinberg, “Meeting the Cybersecurity Challenge,”
McKinsey Quarterly
, June 2011.

201
targets have failed to take action to protect themselves
Michaela L. Sozio, “Cyber Liability—a Real Threat to Your Business,”
California
Business Law Confidential
, March 2012; Preet Bharara, “Asleep at the Laptop,”
New York Times
, June 4, 2012.

202
collecting information about their own customers and users
Alexis Madrigal, “I’m Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web,”
Atlantic
, February 29, 2012.

203
tailor advertising to match each person’s individual collection of interests
Ibid.

204
online interests without offering them an opportunity to give their consent
Riva Richmond, “As ‘Like’ Buttons Spread, So Do Facebook’s Tentacles,”
New York Times
, Bits blog, September 27, 2011,
http://​bits.​blogs.​nytimes.​com/​2011/​09/​27/​as-​like-​buttons-​spread-​so-​do-​facebooks-​tentacles/
.

205
“simply tools to improve the grip strength of the Invisible Hand”
Madrigal, “I’m Being Followed.”

206
discover information that one would not necessarily want
Jeffrey Rosen, “The Web Means the End of Forgetting,”
New York Times Magazine
, July 21, 2010.

207
their Facebook accounts so that private sites can also be accessed
Michelle Singletary, “Would You Give Potential Employers Your Facebook Password?,”
Washington Post
, March 29, 2012.

208
policy is to never give out such passwords
Joanna Stern, “Demanding Facebook Passwords May Break Law, Say Senators,” ABC News, March 26, 2012,
http://​abcnews.​go.​com/​Technology/​facebook-​passwords-​employers-​schools-​demand-​access-​facebook-​senators/​story?​id=​16005565#.​UCPKWY40jdk
.

209
many employees have been subjected to cybersurveillance
Tam Harbert, “Employee Monitoring: When IT Is Asked to Spy,”
Computer World
, June 16, 2010.

210
especially the Internet, increases exponentially as more people connect to it
James Hendler and Jennifer Golbeck, “Metcalfe’s Law, Web 2.0, and the Semantic Web,”
Web Semantics
6, no. 1 (February, 2008): 14–20.

211
actually increases as the
square
of the number of people who connect to it
Ibid.

212
options for changing settings that some sites offer
Alexis Madrigal, “Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days,”
Atlantic
, March 1, 2012; Elaine Rigoli, “Most People Worried About Online Privacy, Personal Data, Employer Bias, Privacy Policies,”
Consumer Reports
, April 25, 2012.

213
But users who try to opt out of the tracking itself
Julia Angwin and Emily Steel, “Web’s Hot New Commodity: Privacy,”
Wall Street Journal
, February 28, 2011.

214
due to persistent lobbying pressure from the advertising industry
Tanzina Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking,”
New York Times
, February 26, 2012; Madrigal, “I’m Being Followed.”

215
but there are so many clicks that billions of dollars are at stake
Madrigal, “I’m Being Followed”; Vega, “Opt-Out Provision Would Halt Some, but Not All, Web Tracking.”

216
report information about a user’s online activities
“What They Know” Series,
Wall Street Journal
,
http://​online.​wsj.​com/​/files/09/02/90/f090290/public/​page/​what-​they-​know-​digital-​privacy.​html
.

217
about the user’s online activity to advertisers and others who purchase the data
Julia Angwin, “The Web’s New Gold Mine: Your Secrets,”
Wall Street Journal
, July 30, 2010.

218
matching individual computer numbers with the name, address, and telephone numbers
Madrigal, “I’m Being Followed.”

219
has spoken out against the use of DPI
Olivia Solon, “Tim Berners-Lee: Deep Packet Inspection a ‘Really Serious’ Privacy Breach,”
Wired
, April 18, 2012.

220
tragically, the gay student committed suicide soon after
Ian Parker, “The Story of a Suicide: Two College Roommates, a Webcam, and a Tragedy,”
New Yorker
, February 6, 2012.

221
tag people when they appear in photos on the site
“Facebook ‘Face Recognition’ Feature Draws Privacy Scrutiny,” Bloomberg News, June 8, 2011.

222
now used by many sites to identify people when they speak
Natasha Singer, “The Human Voice, as Game Changer,”
New York Times
, March 31, 2012.

223
improve the accuracy with which the machine interprets
Ibid.

224
which information can be delivered with relevance to the user’s location
“Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location,” Nielsen, April 21, 2011,
http://​blog.​nielsen.​com/​nielsenwire/​online_​mobile/​privacy-​please-​u-​s-​smartphone-​app-​users-​concerned-​with-​privacy-​when-​it-​comes-​to-​location/
.

225
25,000 U.S. citizens are also victims of “GPS stalking” each year
Justin Scheck, “Stalkers Exploit Cellphone GPS,”
Wall Street Journal
, August 3, 2010.

226
1,200 pages of information, most of which he thought he had deleted
Kevin J. O’Brien, “Austrian Law Student Faces Down Facebook,”
New York Times
, February 5, 2012.

227
designed to steal information from the user’s computer or mobile device
Matt Richtel and Verne G. Kopytoff, “E-Mail Fraud Hides Behind Friendly Face,”
New York Times
, June 2, 2011.

228
all the private information about individuals
Ann Carrns, “Careless Social Media Use May Raise Risk of Identity Fraud,”
New York Times
, February 29, 2012.

229
which have reported large losses as a result of cybercrime
“IMF Is Victim of ‘Sophisticated Cyberattack,’ Says Report,”
IDG Reporter
, June 13, 2011; “US Senate Orders Security Review After LulzSec Hacking,”
Guardian
, June 14, 2011; Julianne Pepitone and Leigh Remizowski, “ ‘Massive’ Credit Card Data Breach Involves All Major Brands,” CNN, April 2, 2012,
http://​money.​cnn.​com/​2012/​03/​30/​technology/​credit-​card-​data-​breach/​index.​htm
; “Heartland Payment
Systems Hacked,” Associated Press, January 20, 2009; Bianca Dima, “Top 5: Corporate Losses Due to Hacking,” HOT for Security, May 17, 2012.

230
more than $7.2 million, with the cost increasing each year
“The Real Cost of Cyber Attacks,”
Atlantic
, February 16, 2012.

231
“more than the annual global market for marijuana, cocaine, and heroin combined”
Symantec, press release, “Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” September 7, 2011,
http://​www.​symantec.​com/​about/​news/​release/​article.​jsp?​prid=​20110907_​02
. However, some analysts note that some estimates of cybercrime are unreliable. Dinei Florêncio and Cormac Herley, “The Cybercrime Wave That Wasn’t,”
New York Times
, April 14, 2012.

232
LinkedIn
Ian Paul, “LinkedIn Confirms Account Passwords Hacked,”
PC World
, June 6, 2012.

233
eHarmony
Salvador Rodriguez, “Like LinkedIn, eHarmony Is Hacked; 1.5 Million Passwords Stolen,”
Los Angeles Times
, June 6, 2012.

234
Google’s Gmail
Nicole Perlroth, “Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users,”
New York Times
, July 12, 2012.

235
Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC
David Goldman, “Major Banks Hit with Biggest Cyberattacks in History,” CNN, September 28, 2012; “Week-Long Cyber Attacks Cripple US Banks,” Associated Press, September 29, 2012.

236
store Internet and telephone communications
Brian Wheeler, “Communications Data Bill Creates ‘a Virtual Giant Database,’ ” BBC, July 19, 2012,
http://​www.​bbc.​co.​uk/​news/​uk-​politics-​18884460
.

237
already installed 60,000 security cameras
Heather Brooke, “Investigation: A Sharp Focus on CCTV,”
Wired UK
, April 1, 2010.

238
“restrictions that fence in even the most disinterested”
Justice Felix Frankfurter, Concurring Opinion,
Youngstown Sheet & Tube Co. v. Sawyer
, 343 U.S. 579 (1952).

239
“Knowledge is power”
Georg Henrik Wright,
The Tree of Knowledge and Other Essays
(Leiden: Brill, 1993), p. 127–28.

240
ability to eavesdrop on telephone calls as they were taking place
James Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),”
Wired
, March 15, 2012.

241
“began to rapidly turn the United States of America”
Jason Reed, “NSA Whistleblowers: Government Spying on Every Single American,” Reuters, July 25, 2012.

242
has intercepted “between 15 and 20 trillion” communications
Bradford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”

243
The formal state of emergency
President of the United States, “Notice—Continuation of the National Emergency with Respect to Certain Terrorist Attacks,” September 11, 2012.

244
“I think there’s really something at a deep level creepy”
Matt Sledge, “Warrantless Electronic Surveillance Surges Under Obama Justice Department,”
Huffington Post
, September 28, 2012.

245
riding a bicycle with a defective “audible bell”
Brief for the Petitioner in the United States Supreme Court,
Albert W. Florence v. Board of Chosen Freeholders of the County of Burlington et al.
, No. 10-945,
http://​www.​americanbar.​org/​content/​dam/​aba/​publishing/​previewbriefs/​Other_​Brief_​Updates/​10-​945_​petitioner.​authcheckdam.​pdf
. Justice Stephen Breyer dissented from the strip search decision in a powerful rebuke of the expansive powers granted to law enforcement by the Court’s action. See
Florence v. Board of Chosen Freeholders
, April 2, 2012,
http://​www.​supremecourt.​gov/​opinions/​11pdf/​10-​945.​pdf
.

246
other digital device when he or she reenters the country
Glenn Greenwald, “U.S. Filmmaker Repeatedly Detained at Border,”
Salon
, April 8, 2012,
http://​www.​salon.​com/​2012/​04/​08/​u_s_​filmmaker_​repeatedly_​detained_​at_​border/
.

Other books

Outlander by Diana Gabaldon
Symbionts by William H. Keith
One Night in London by Caroline Linden
Jayded by Shevaun Delucia
The Game of Fates by Joel Babbitt
Caravan to Vaccares by Alistair MacLean