Authors: Al Gore
129
depending on how they are used and who uses them to greatest effect
Evgeny Morozov, “The Dark Side of Internet for Egyptian and Tunisian Protesters,”
Globe and Mail
, January 28, 2011; Louis Klaveras, “The Coming Twivolutions? Social
Media in the Recent Uprisings in Tunisia and Egypt,”
Huffington Post
, January 31, 2011,
http://www.huffingtonpost.com/louis-klarevas/post_1647_b_815749.html
.
130
have even experimented with Internet voting in elections and referenda
Sutton Meagher, “Comment: When Personal Computers Are Transformed into Ballot Boxes: How Internet Elections in Estonia Comply with the United Nations International Covenant on Civil and Political Rights,”
American University International Law Review
23 (2008).
131
proposals placed by citizens on a government website
Freedom House—Latvia, 2012,
http://www.freedomhouse.org/report/nations-transit/2012/latvia
.
132
achieve higher levels of quality in the services they deliver
Tina Rosenberg, “Armed with Data, Fighting More Than Crime,”
New York Times
, Opinionator blog, May 2, 2012,
http://opinionator.blogs.nytimes.com/2012/05/02/armed-with-data-fighting-more-than-crime/
.
133
productive dialogues and arguments about issues and legislation
Clay Shirky, “How the Internet Will (One Day) Transform Government,” TEDGlobal 2012, June 2012.
134
watch Internet videos on television screens
Jenna Wortham, “More Are Watching Internet Video on Actual TVs, Research Shows,”
New York Times
, September 26, 2012.
135
“be appropriated into the realm of the digital”
William Gibson, “Back from the Future,”
New York Times Magazine
, August 19, 2007.
136
any other activity besides sleeping and working
Joe Light, “Leisure Trumps Learning in Time-Use Survey,”
Wall Street Journal
, June 22, 2011.
137
watches television more than five hours per day
Nielsen, “State of the Media: Consumer Usage Report,” 2011, p. 3. The American Video Viewer, 32 hours, 47 minutes of TV viewing weekly = 4.7 hours per day,
http://www.nielsen.com/content/dam/corporate/us/en/reports-downloads/2011-Reports/StateofMediaConsumerUsageReport.pdf
.
138
spends 80 percent of his or her campaign money
eMarketer, “Are Political Ad Dollars Going Online?,” May 14, 2008,
http://www.emarketer.com/Article.aspx?id=1006271&R=1006271
.
139
Philadelphia and easily find several low-cost print shops
Christopher Munden, “A Brief History of Early Publishing in Philadelphia,” Philly Fiction,
http://phillyfiction.com/more/brief_history_of_early_days_of_philadelphia_publishing.html
.
140
destructive trend is likely to get much worse before it gets better
Citizens United v. FEC
, 130 S. Ct. 876 (2010); Adam Liptak, “Justices, 5-4, Reject Corporate Spending Limit,”
New York Times
, January 22, 2010.
141
television is much more tightly controlled than the Internet
Charles Clover, “Internet Subverts Russian TV’s Message,”
Financial Times
, December 1, 2011.
142
“There is one face: Putin”
David M. Herszenhorn, “Putin Wins, but Opposition Keeps Pressing,”
New York Times
, March 4, 2012.
143
people aged sixty-five and older watch, on average
Alana Semuels, “Television Viewing at All-Time High,”
Los Angeles Times
, February 24, 2009.
144
most major cities that people used to read
Donald A. Ritchie,
Reporting from Washington: The History of the Washington Press Corps
(New York: Oxford University Press, 2005), p. 131.
145
the morning newspapers began to go bankrupt as well
Mark Fitzgerald, “How Did Newspapers Get in This Pickle?,”
Editor & Publisher
, March 18, 2009.
146
digital news stories already reach more people
David Carr, “Tired Cries of Bias Don’t Help Romney,”
New York Times
, October 1, 2012.
147
staring at chalk on a blackboard
“Why Do 60% of Students Find Their Lectures Boring?,”
Guardian
, May 11, 2009.
148
sharp declines in budgets for public education
“Education Takes a Beating Nationwide,”
Los Angeles Times
, July 31, 2011.
149
college-level instruction on the Internet
Tamar Lewin, “Questions Follow Leader of For-Profit Colleges,”
New York Times
, May 27, 2011; Tamar Lewin, “For-Profit College Group Sued as U.S. Lays Out Wide Fraud,”
New York Times
, August 9, 2011.
150
The school was later prosecuted and shut down
“Degrees for Sale at Spam U.,” CBS News, February 11, 2009,
http://www.cbsnews.com/2100-205_162-659418.html
; “Diploma Mill Operators Hit with Court Judgments,”
Consumer Affairs
, March 18, 2005,
http://www.consumeraffairs.com/news04/2005/diploma_mill.html
.
151
emergence of chronic disease states that account for most medical problems
“Counting Every Moment,”
Economist
, March 3, 2012.
152
beginning to improve the allocation and deployment of public health resources
Andrea Freyer Dugas et al., “Google Flu Trends: Correlation with Emergency Department Influenza Rates and Crowding Metrics,”
Clinical Infectious Diseases
54, no. 4 (January 8, 2012).
153
insurance companies have begun to use data mining techniques
“Very Personal Finance,”
Economist
, June 2, 2012.
154
for customers whose data profiles classify them as low-risk
Ibid.
155
the legend of Doctor Faust first appeared
Christopher Marlowe,
The Tragical History of Doctor Faustus
, 1604, edited by Rev. Alexander Dyce,
http://www.gutenberg.org/files/779/779-h/779-h.htm
.
156
historians claim that Faust was based
Philip B. Meggs and Alston W. Purvis,
Meggs’ History of Graphic Design
, 5th ed. (Hoboken, NJ: Wiley, 2012), p. 76–77.
157
“Faustian bargains”
Herman Kahn, “Technology and the Faustian Bargain,” January 1, 1976,
http://www.hudson.org/index.cfm?fuseaction=publication_details&id=2218
; Lance Morrow, “The Faustian Bargain of Stem Cell Research,”
Time
, July 12, 2001.
158
read by the government without a warrant
John Seabrook, “Petraeus and the Cloud,”
New Yorker
, November 14, 2012.
159
reliance on the cloud creates new potential choke points
Nicole Perlroth, “Amazon Cloud Service Goes Down and Takes Popular Sites with It,”
New York Times
, October 22, 2012.
160
“So you have these two fighting against each other”
Richard Siklos, “Information Wants to Be Free … and Expensive,” CNN, July 20, 2009,
http://tech.fortune.cnn.com/2009/07/20/information-wants-to-be-free-and-expensive/
161
on servers based in Sweden, Iceland, and possibly other locations
Andy Greenberg, “Wikileaks Servers Move to Underground Nuclear Bunker,”
Forbes
, August 30, 2010.
162
broke into numerous other government and corporate
“WikiLeaks Backlash: The First Global Cyber War Has Begun, Claim Hackers,”
Guardian
, December 11, 2010.
163
Independent groups of hacktivists
Hayley Tsukayama, “Anonymous Claims Credit for Crashing FBI, DOJ Sites,”
Washington Post
, January 20, 1012; Ellen Nakashima, “CIA Web Site Hacked; Group LulzSec Takes Credit,”
Washington Post
, June 15, 2011; Thom Shanker and Elisabeth Bumiller, “Hackers Gained Access to Sensitive Military Files,”
New York Times
, July 14, 2011; David E. Sanger and John Markoff, “I.M.F. Reports Cyberattack Led to ‘Very Major Breach,’ ”
New York Times
, June 11, 2011; David Batty, “Vatican Becomes Latest Anonymous Hacking Victim,”
Guardian
, March 7, 2012; Melanie Hick, “Anonymous Hacks Interpol Site After 25 Arrests,”
Huffington Post
, January 3, 2012,
http://www.huffingtonpost.co.uk/2012/03/01/anonymous-hacks-interpol-_n_1312544.html
; Martin Beckford, “Downing Street Website Also Taken Down by Anonymous,”
Telegraph
, April 8, 2012; Tom Brewster, “Anonymous Strikes Downing Street and Ministry of Justice,”
TechWeek Europe
, April 10, 2012,
http://www.techweekeurope.co.uk/news/anonymous-government-downing-street-moj-71979
; “NASA Says Was Hacked 13 Times Last Year,” Reuters, March 2, 2012.
164
hackers recorded the call and put it on the web
Duncan Gardham, “ ‘Anonymous’ Hackers Intercept Conversation Between FBI and Scotland Yard on How to Deal with Hackers,”
Telegraph
, February 3, 2012.
165
penetrated by a cyberattack believed to have originated in China
Michael Joseph Gross, “Enter the Cyber-Dragon,”
Vanity Fair
, September 2011.
166
“fifth domain” for potential military conflict
Susan P. Crawford, “When We Wage Cyberwar, the Whole Web Suffers,” Bloomberg, April 25, 2012.
167
“a global cyber arms race”
David Alexander, “Global Cyber Arms Race Engulfing Web—Defense Official,” Reuters, April 11, 2012.
168
cybersecurity technology, offense has the advantage over defense
Ibid.; Ron Rosenbaum, “Richard Clarke on Who Was Behind the Stuxnet Attack,”
Smithsonian
, April 2, 2012.
169
which prevented ancient Greece’s conquest by Persia
Simon Singh,
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
(New York: Doubleday, 1999).
170
on the messenger’s scalp, and then “waited for the hair to regrow”
Ibid.
171
cryptography in its various forms
Ibid.; Andrew Lycett, “Breaking Germany’s Enigma Code,” BBC, February 17, 2011,
http://www.bbc.co.uk/history/worldwars/wwtwo/enigma_01.shtml
.
172
“The system kind of got loose”
Michael Joseph Gross, “World War 3.0,”
Vanity Fair
, May 2012.
173
four trends have converged to make cybersecurity a problem
James Kaplan, Shantnu Sharma, and Allen Weinberg, “Meeting the Cybersecurity Challenge,”
McKinsey Quarterly
, June 2011.
174
corporations, government agencies, and organizations
Gross, “Enter the Cyber-Dragon.”
175
“We don’t do that”
Rosenbaum, “Richard Clarke on Who Was Behind the Stuxnet Attack.”
176
373,000 jobs each year—and $16 billion in lost earnings—from the theft of intellectual property
Richard Adler, Report of the 26th Annual Aspen Institute Conference on Communications Policy,
Updating Rules of the Digital Road: Privacy, Security, Intellectual Property
, 2012, p. 14.
177
worth $1 billion—in a single night
Richard A. Clarke, “How China Steals Our Secrets,”
New York Times
, April 3, 2012.
178
examined one yet that has not been infected
Nicole Perlroth, “How Much Have Foreign Hackers Stolen?,”
New York Times
, Bits blog, February 14, 2012,
http://bits.blogs.nytimes.com/2012/02/14/how-much-have-foreign-hackers-stolen/?scp=7&sq=cyber%20security&st=cse
.
179
“nearly four times the amount of data”
Ibid.
180
“cyberthreat will be the number one threat to the country”
J. Nicholas Hoover, “Cyber Attacks Becoming Top Terror Threat, FBI Says,”
Information Week
, February 1, 2012.
181
thirteen U.S. defense contractors, and a large number of other corporations
Michael Joseph Gross, “Exclusive: Operation Shady Rat—Unprecedented Cyber-Espionage Campaign and Intellectual-Property Bonanza,”
Vanity Fair
, August 2, 2011.
182
six weeks’ worth of emails between the Chamber
Nicole Perlroth, “Traveling Light in a Time of Digital Thievery,”
New York Times
, February 10, 2012.
183
still sending information over the Internet to China
Ibid.
184
individual packages containing the products they produce
Organisation for Economic Co-operation and Development, “Machine-to-Machine Communications: Connecting Billions of Devices,” OECD Digital Economy Papers, No. 192, 2012,
http://dx.doi.org/10.1787/5k9gsh2gp043-en
.
185
dairy farmers in Switzerland are even connecting
John Tagliabue, “Swiss Cows Send Texts to Announce They’re in Heat,”
New York Times
, October 2, 2012.
186
“control systems that run these facilities, a nearly fivefold increase from 2010”
John O. Brennan, “Time to Protect Against Dangers of Cyberattack,”
Washington Post
, April 15, 2012.