The Future: six drivers of global change

Chapter 43

William J. Broad, John Markoff, and David E. Sanger, "Israeli Test on Worm Called Crucial in Iran Nuclear Delay," New York Times, January 15, 2011.

191 began infecting computers in Iran and several other nations

" 'Flame' Computer Virus Strikes Middle East; Israel Speculation Continues," a.s.sociated Press, May 29, 2012.

192 destructive attacks against Internet-connected machinery

William J. Broad, John Markoff, and David E. Sanger, "Israeli Test on Worm Called Crucial in Iran Nuclear Delay," New York Times, January 15, 2011.

193 inadvertently infected by Stuxnet

Rachel King, "Virus Aimed at Iran Infected Chevron Network," Wall Street Journal, November 9, 2012.

194 Leon Panetta publicly warned that a "cyberPearl harbor"

Elisabeth b.u.miller and Thom Shanker, "Panetta Warns of Dire Threat of Cyberattack on U.S.," New York Times, October 11, 2012.

195 "only they're making it 30 percent cheaper"

Perlroth, "Traveling Light in a Time of Digital Thievery."

196 then steal some of its most valuable customers

Steve Fishman, "Floored by News Corp.: Who Hacked a Rival's Computer System?," New York, September 28, 2011.

197 emails of individuals to gather information for news stories

Sarah Lyall and Ravi Somaiya, "British Broadcaster with Murdoch Link Admits to Hacking," New York Times, April 5, 2012.

198 hacking into the telephone voicemails

Don Van Natta Jr., Jo Becker, and Graham Bowley, "Tabloid Hack Attack on Royals, and Beyond," New York Times, September 1, 2010.

199 hack into supposedly secure videoconferences

Nicole Perlroth, "Cameras May Open Up the Board Room to Hackers," New York Times, January 22, 2012.

200 theft of important information because they have a financial incentive

James Kaplan, Shantnu Sharma, and Allen Weinberg, "Meeting the Cybersecurity Challenge," McKinsey Quarterly, June 2011.

201 targets have failed to take action to protect themselves

Michaela L. Sozio, "Cyber Liability-a Real Threat to Your Business," California Business Law Confidential, March 2012; Preet Bharara, "Asleep at the Laptop," New York Times, June 4, 2012.

202 collecting information about their own customers and users

Alexis Madrigal, "I'm Being Followed: How Google-and 104 Other Companies-Are Tracking Me on the Web," Atlantic, February 29, 2012.

203 tailor advertising to match each person's individual collection of interests

Ibid.

204 online interests without offering them an opportunity to give their consent

Riva Richmond, "As 'Like' b.u.t.tons Spread, So Do Facebook's Tentacles," New York Times, Bits blog, September 27, 2011, http://bits.blogs.nytimes.com/2011/09/27/as-like-b.u.t.tons-spread-so-do-facebooks-tentacles/.

205 "simply tools to improve the grip strength of the Invisible Hand"

Madrigal, "I'm Being Followed."

206 discover information that one would not necessarily want

Jeffrey Rosen, "The Web Means the End of Forgetting," New York Times Magazine, July 21, 2010.



Theme Customizer


Customize & Preview in Real Time

Menu Color Options

Layout Options

Navigation Color Options
Solid
Gradient

Solid

Gradient