Chapter 41
157 "Faustian bargains"
Herman Kahn, "Technology and the Faustian Bargain," January 1, 1976, http://www.hudson.org/index.cfm?fuseaction=publication_details&id=2218; Lance Morrow, "The Faustian Bargain of Stem Cell Research," Time, July 12, 2001.
158 read by the government without a warrant
John Seabrook, "Petraeus and the Cloud," New Yorker, November 14, 2012.
159 reliance on the cloud creates new potential choke points
Nicole Perlroth, "Amazon Cloud Service Goes Down and Takes Popular Sites with It," New York Times, October 22, 2012.
160 "So you have these two fighting against each other"
Richard Siklos, "Information Wants to Be Free... and Expensive," CNN, July 20, 2009, http://tech.fortune.cnn.com/2009/07/20/information-wants-to-be-free-and-expensive/
161 on servers based in Sweden, Iceland, and possibly other locations
Andy Greenberg, "Wikileaks Servers Move to Underground Nuclear Bunker," Forbes, August 30, 2010.
162 broke into numerous other government and corporate
"WikiLeaks Backlash: The First Global Cyber War Has Begun, Claim Hackers," Guardian, December 11, 2010.
163 Independent groups of hacktivists
Hayley Tsukayama, "Anonymous Claims Credit for Cras.h.i.+ng FBI, DOJ Sites," Was.h.i.+ngton Post, January 20, 1012; Ellen Nakas.h.i.+ma, "CIA Web Site Hacked; Group LulzSec Takes Credit," Was.h.i.+ngton Post, June 15, 2011; Thom Shanker and Elisabeth b.u.miller, "Hackers Gained Access to Sensitive Military Files," New
164 hackers recorded the call and put it on the web
Duncan Gardham, " 'Anonymous' Hackers Intercept Conversation Between FBI and Scotland Yard on How to Deal with Hackers," Telegraph, February 3, 2012.
165 penetrated by a cyberattack believed to have originated in China
Michael Joseph Gross, "Enter the Cyber-Dragon," Vanity Fair, September 2011.
166 "fifth domain" for potential military conflict
Susan P. Crawford, "When We Wage Cyberwar, the Whole Web Suffers," Bloomberg, April 25, 2012.
167 "a global cyber arms race"
David Alexander, "Global Cyber Arms Race Engulfing Web-Defense Official," Reuters, April 11, 2012.
168 cybersecurity technology, offense has the advantage over defense
Ibid.; Ron Rosenbaum, "Richard Clarke on Who Was Behind the Stuxnet Attack," Smithsonian, April 2, 2012.
169 which prevented ancient Greece's conquest by Persia
Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (New York: Doubleday, 1999).
170 on the messenger's scalp, and then "waited for the hair to regrow"
Ibid.
171 cryptography in its various forms
Ibid.; Andrew Lycett, "Breaking Germany's Enigma Code," BBC, February 17, 2011, http://www.bbc.co.uk/history/worldwars/wwtwo/enigma_01.shtml.
172 "The system kind of got loose"
Michael Joseph Gross, "World War 3.0," Vanity Fair, May 2012.
173 four trends have converged to make cybersecurity a problem
James Kaplan, Shantnu Sharma, and Allen Weinberg, "Meeting the Cybersecurity Challenge," McKinsey Quarterly, June 2011.