The Future: six drivers of global change

Chapter 41

157 "Faustian bargains"

Herman Kahn, "Technology and the Faustian Bargain," January 1, 1976, http://www.hudson.org/index.cfm?fuseaction=publication_details&id=2218; Lance Morrow, "The Faustian Bargain of Stem Cell Research," Time, July 12, 2001.

158 read by the government without a warrant

John Seabrook, "Petraeus and the Cloud," New Yorker, November 14, 2012.

159 reliance on the cloud creates new potential choke points

Nicole Perlroth, "Amazon Cloud Service Goes Down and Takes Popular Sites with It," New York Times, October 22, 2012.

160 "So you have these two fighting against each other"

Richard Siklos, "Information Wants to Be Free... and Expensive," CNN, July 20, 2009, http://tech.fortune.cnn.com/2009/07/20/information-wants-to-be-free-and-expensive/

161 on servers based in Sweden, Iceland, and possibly other locations

Andy Greenberg, "Wikileaks Servers Move to Underground Nuclear Bunker," Forbes, August 30, 2010.

162 broke into numerous other government and corporate

"WikiLeaks Backlash: The First Global Cyber War Has Begun, Claim Hackers," Guardian, December 11, 2010.

163 Independent groups of hacktivists

Hayley Tsukayama, "Anonymous Claims Credit for Cras.h.i.+ng FBI, DOJ Sites," Was.h.i.+ngton Post, January 20, 1012; Ellen Nakas.h.i.+ma, "CIA Web Site Hacked; Group LulzSec Takes Credit," Was.h.i.+ngton Post, June 15, 2011; Thom Shanker and Elisabeth b.u.miller, "Hackers Gained Access to Sensitive Military Files," New

164 hackers recorded the call and put it on the web

Duncan Gardham, " 'Anonymous' Hackers Intercept Conversation Between FBI and Scotland Yard on How to Deal with Hackers," Telegraph, February 3, 2012.

165 penetrated by a cyberattack believed to have originated in China

Michael Joseph Gross, "Enter the Cyber-Dragon," Vanity Fair, September 2011.

166 "fifth domain" for potential military conflict

Susan P. Crawford, "When We Wage Cyberwar, the Whole Web Suffers," Bloomberg, April 25, 2012.

167 "a global cyber arms race"

David Alexander, "Global Cyber Arms Race Engulfing Web-Defense Official," Reuters, April 11, 2012.

168 cybersecurity technology, offense has the advantage over defense

Ibid.; Ron Rosenbaum, "Richard Clarke on Who Was Behind the Stuxnet Attack," Smithsonian, April 2, 2012.

169 which prevented ancient Greece's conquest by Persia

Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (New York: Doubleday, 1999).

170 on the messenger's scalp, and then "waited for the hair to regrow"

Ibid.

171 cryptography in its various forms

Ibid.; Andrew Lycett, "Breaking Germany's Enigma Code," BBC, February 17, 2011, http://www.bbc.co.uk/history/worldwars/wwtwo/enigma_01.shtml.

172 "The system kind of got loose"

Michael Joseph Gross, "World War 3.0," Vanity Fair, May 2012.

173 four trends have converged to make cybersecurity a problem

James Kaplan, Shantnu Sharma, and Allen Weinberg, "Meeting the Cybersecurity Challenge," McKinsey Quarterly, June 2011.



Theme Customizer


Customize & Preview in Real Time

Menu Color Options

Layout Options

Navigation Color Options
Solid
Gradient

Solid

Gradient