Blown to bits nieman lab

Pdf File 26,457.44 KByte, 294 Pages

Blown to Bits

Your Life, Liberty, and Happiness After the Digital Explosion

Hal Abelson Ken Ledeen Harry Lewis

Upper Saddle River, NJ ? Boston ? Indianapolis ? San Francisco New York ? Toronto ? Montreal ? London ? Munich ? Paris ? Madrid

Cape Town ? Sydney ? Tokyo ? Singapore ? Mexico City

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.

The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.

The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:

U.S. Corporate and Government Sales (800) 382-3419 corpsales@

For sales outside the United States, please contact:

International Sales international@

Visit us on the Web: aw

Library of Congress Cataloging-in-Publication Data:

Abelson, Harold. Blown to bits : your life, liberty, and happiness after the digital explosion / Hal Abelson,

Ken Ledeen, Harry Lewis. p. cm.

ISBN 0-13-713559-9 (hardback : alk. paper) 1. Computers and civilization. 2. Information technology--Technological innovations. 3. Digital media. I. Ledeen, Ken, 1946- II. Lewis, Harry R. III. Title.

QA76.9.C66A245 2008 303.48'33--dc22


Copyright ? 2008 Hal Abelson, Ken Ledeen, and Harry Lewis

This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. To view a copy of this license visit or send a letter to Creative Commons 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

For information regarding permissions, write to:

Pearson Education, Inc. Rights and Contracts Department 501 Boylston Street, Suite 900 Boston, MA 02116 Fax (617) 671 3447

ISBN-13: 978-0-13-713559-2 ISBN-10: 0-13-713559-9 Text printed in the United States on recycled paper at RR Donnelley in Crawfordsville, Indiana. Third printing December 2008

This Book Is Safari Enabled The Safari? Enabled icon on the cover of your favorite technology book means the book is available through Safari Bookshelf. When you buy this book, you get free access to the online edition for 45 days.

Safari Bookshelf is an electronic reference library that lets you easily search thousands of technical books, find code samples, download chapters, and access technical information whenever and wherever you need it.

To gain 45-day Safari Enabled access to this book:

? Go to ? Complete the brief registration form ? Enter the coupon code 9SD6-IQLD-ZDNI-AGEC-AG6L

If you have difficulty registering on Safari Bookshelf or accessing the online edition, please e-mail customer-service@.

Editor in Chief Mark Taub

Acquisitions Editor Greg Doench

Development Editor Michael Thurston

Managing Editor Gina Kanouse

Senior Project Editor Kristy Hart

Copy Editor Water Crest Publishing, Inc.

Indexer Erika Millen

Proofreader Williams Woods Publishing Services

Publishing Coordinator Michelle Housley

Interior Designer and Composition Nonie Ratcliff

Cover Designer Chuti Prasertsith


Digital Explosion

Why Is It Happening, and What Is at Stake?

On September 19, 2007, while driving alone near Seattle on her way to work, Tanya Rider went off the road and crashed into a ravine.* For eight days, she was trapped upside down in the wreckage of her car. Severely dehydrated and suffering from injuries to her leg and shoulder, she nearly died of kidney failure. Fortunately, rescuers ultimately found her. She spent months recuperating in a medical facility. Happily, she was able to go home for Christmas.

Tanya's story is not just about a woman, an accident, and a rescue. It is a story about bits--the zeroes and ones that make up all our cell phone conversations, bank records, and everything else that gets communicated or stored using modern electronics.

Tanya was found because cell phone companies keep records of cell phone locations. When you carry your cell phone, it regularly sends out a digital "ping," a few bits conveying a "Here I am!" message. Your phone keeps "pinging" as long as it remains turned on. Nearby cell phone towers pick up the pings and send them on to your cellular service provider. Your cell phone company uses the pings to direct your incoming calls to the right cell phone towers. Tanya's cell phone company, Verizon, still had a record of the last location of her cell phone, even after the phone had gone dead. That is how the police found her.

So why did it take more than a week? If a woman disappears, her husband can't just make the police find her by tracing her cell phone records. She has a privacy right, and maybe she has good reason to leave town without telling her husband where she is going. In

* Citations of facts and sources appear at the end of the book. A page number and a phrase identify the passage.



Tanya's case, her bank account showed some activity (more bits!) after her disappearance, and the police could not classify her as a "missing person." In fact, that activity was by her husband. Through some misunderstanding, the police thought he did not have access to the account. Only when the police suspected Tanya's husband of involvement in her disappearance did they have legal access to the cell phone records. Had they continued to act on the true presumption that he was blameless, Tanya might never have been found.

New technologies interacted in an odd way with evolving standards of privacy, telecommunications, and criminal law. The explosive combination almost cost Tanya Rider her life. Her story is dramatic, but every day we encounter unexpected consequences of data flows that could not have happened a few years ago.

When you have finished reading this book, you should see the world in a different way. You should hear a story from a friend or on a newscast and say to yourself, "that's really a bits story," even if no one mentions anything digital. The movements of physical objects and the actions of flesh and blood human beings are only the surface. To understand what is really going on, you have to see the virtual world, the eerie flow of bits steering the events of life.

This book is your guide to this new world.

The Explosion of Bits, and Everything Else

The world changed very suddenly. Almost everything is stored in a computer somewhere. Court records, grocery purchases, precious family photos, pointless radio programs.... Computers contain a lot of stuff that isn't useful today but somebody thinks might someday come in handy. It is all being reduced to zeroes and ones--"bits." The bits are stashed on disks of home computers and in the data centers of big corporations and government agencies. The disks can hold so many bits that there is no need to pick and choose what gets remembered.

So much digital information, misinformation, data, and garbage is being squirreled away that most of it will be seen only by computers, never by human eyes. And computers are getting better and better at extracting meaning from all those bits--finding patterns that sometimes solve crimes and make useful suggestions, and sometimes reveal things about us we did not expect others to know.

The March 2008 resignation of Eliot Spitzer as Governor of New York is a bits story as well as a prostitution story. Under anti-money laundering (AML) rules, banks must report transactions of more than $10,000 to federal regulators. None of Spitzer's alleged payments reached that threshold, but his


bank's computer found that transfers of smaller sums formed a suspicious pattern. The AML rules exist to fight terrorism and organized crime. But while the computer was monitoring small banking transactions in search of big-time crimes, it exposed a simple payment for services rendered that brought down the Governor.

Once something is on a computer, it can replicate and move around the world in a heartbeat. Making a million perfect copies takes but an instant-- copies of things we want everyone in the world to see, and also copies of things that weren't meant to be copied at all.

The digital explosion is changing the world as much as printing once did-- and some of the changes are catching us unaware, blowing to bits our assumptions about the way the world works.

When we observe the digital explosion at all, it can seem benign, amusing, or even utopian. Instead of sending prints through the mail to Grandma, we put pictures of our children on a photo album web site such as Flickr. Then not only can Grandma see them--so can Grandma's friends and anyone else. So what? They are cute and harmless. But suppose a tourist takes a vacation snapshot and you just happen to appear in the background, at a restaurant where no one knew you were dining. If the tourist uploads his photo, the whole world could know where you were, and when you were there.

Data leaks. Credit card records are supposed to stay locked up in a data warehouse, but escape into the hands of identity thieves. And we sometimes give information away just because we get something back for doing so. A company will give you free phone calls to anywhere in the world--if you don't mind watching ads for the products its computers hear you talking about.

And those are merely things that are happening today. The explosion, and the social disruption it will create, have barely begun.

We already live in a world in which there is enough memory just in digital cameras to store every word of every book in the Library of Congress a hundred times over. So much email is being sent that it could transmit the full text of the Library of Congress in ten minutes. Digitized pictures and sounds take more space than words, so emailing all the images, movies, and sounds might take a year--but that is just today. The explosive growth is still happening. Every year we can store more information, move it more quickly, and do far more ingenious things with it than we could the year before.

So much disk storage is being produced every year that it could be used to record a page of information, every minute or two, about you and every other human being on earth. A remark made long ago can come back to haunt a political candidate, and a letter jotted quickly can be a key discovery for a

Download Pdf File