The Future: six drivers of global change - Part 45
Library

Part 45

224 which information can be delivered with relevance to the user's location

"Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location," Nielsen, April 21, 2011, http://blog.nielsen.com/nielsenwire/online_mobile/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location/.

225 25,000 U.S. citizens are also victims of "GPS stalking" each year

Justin Scheck, "Stalkers Exploit Cellphone GPS," Wall Street Journal, August 3, 2010.

226 1,200 pages of information, most of which he thought he had deleted

Kevin J. O'Brien, "Austrian Law Student Faces Down Facebook," New York Times, February 5, 2012.

227 designed to steal information from the user's computer or mobile device

Matt Richtel and Verne G. Kopytoff, "E-Mail Fraud Hides Behind Friendly Face," New York Times, June 2, 2011.

228 all the private information about individuals

Ann Carrns, "Careless Social Media Use May Raise Risk of Ident.i.ty Fraud," New York Times, February 29, 2012.

229 which have reported large losses as a result of cybercrime

"IMF Is Victim of 'Sophisticated Cyberattack,' Says Report," IDG Reporter, June 13, 2011; "US Senate Orders Security Review After LulzSec Hacking," Guardian, June 14, 2011; Julianne Pepitone and Leigh Remizowski, " 'Ma.s.sive' Credit Card Data Breach Involves All Major Brands," CNN, April 2, 2012, http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm; "Heartland Payment Systems Hacked," a.s.sociated Press, January 20, 2009; Bianca Dima, "Top 5: Corporate Losses Due to Hacking," HOT for Security, May 17, 2012.

230 more than $7.2 million, with the cost increasing each year

"The Real Cost of Cyber Attacks," Atlantic, February 16, 2012.

231 "more than the annual global market for marijuana, cocaine, and heroin combined"

Symantec, press release, "Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually," September 7, 2011, http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02. However, some a.n.a.lysts note that some estimates of cybercrime are unreliable. Dinei Florencio and Cormac Herley, "The Cybercrime Wave That Wasn't," New York Times, April 14, 2012.

232 LinkedIn

Ian Paul, "LinkedIn Confirms Account Pa.s.swords Hacked," PC World, June 6, 2012.

233 eHarmony

Salvador Rodriguez, "Like LinkedIn, eHarmony Is Hacked; 1.5 Million Pa.s.swords Stolen," Los Angeles Times, June 6, 2012.

234 Google's Gmail

Nicole Perlroth, "Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users," New York Times, July 12, 2012.

235 Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC

David Goldman, "Major Banks. .h.i.t with Biggest Cyberattacks in History," CNN, September 28, 2012; "Week-Long Cyber Attacks Cripple US Banks," a.s.sociated Press, September 29, 2012.

236 store Internet and telephone communications

Brian Wheeler, "Communications Data Bill Creates 'a Virtual Giant Database,' " BBC, July 19, 2012, http://www.bbc.co.uk/news/uk-politics-18884460.

237 already installed 60,000 security cameras

Heather Brooke, "Investigation: A Sharp Focus on CCTV," Wired UK, April 1, 2010.

238 "restrictions that fence in even the most disinterested"

Justice Felix Frankfurter, Concurring Opinion, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952).

239 "Knowledge is power"

Georg Henrik Wright, The Tree of Knowledge and Other Essays (Leiden: Brill, 1993), p. 12728.

240 ability to eavesdrop on telephone calls as they were taking place