Abstract
The first of the contributions in this booklet dates back to March 2008, when Markus Christen, James Breiding and myself became concerned about the stability of the financial system that we felt urged to write a newspaper article to alert the public (see the English translation in Chap. 4). Unfortunately, at that time, the public was not ready to listen. Newspaper editors found our analysis too complex. We responded that a financial crisis would be impossible to prevent, if newspapers failed to explain the complexity of problems like this to their audience. Just a few months later, Lehmann Brothers collapsed, which gave rise to a large-scale crisis. It made me think about the root causes of economic problems and of global crises in general (see Chaps. 4, 5, and 7). But my collaborators and I saw not only the financial crisis coming. We also voiced the surveillance problem early on and the political vulnerability of European gas supply. We studied conflict in Israel, the spreading of diseases, and new response strategies to earthquakes and other disasters. Shortly after, all of this turned out to be highly relevant, almost visionary…
This chapter first appeared in the FuturICT Blog on September 10, 2014, see http://futurict.blogspot.ch/2014/09/have-we-opened-pandoras-box_10.html , and is reproduced here with minor stylistic improvements. Acknowledgments: I would like to thank many friends and colleagues, in particular the world-wide FuturICT community, for the inspiring discussions and the continued support. I am also grateful to Stefano Balietti, James Breiding, and Markus Christen for their reprint permissions regarding two of the chapters in this booklet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Just imagine the mass surveillance data would get in control of extreme political parties, and they would use these to terrorize the people. Germany has had a Nazi and a Stasi regime, and knows, how terrible this can end.
References
D. Helbing, S. Balietti, Fundamental and real-world challenges in economics. Sci. Cult. 76(9–10), 399–417 (2010). http://www.saha.ac.in/cmp/camcs/Sci_Cul_091010/1720%Dirk%20Helbing.pdf
P. Ormerod, D. Helbing, Back to the drawing board for macroeconomics. in Whats the Use of Economics? Teaching the Dismal Science after the Crisis, ed. D. Coyle (London Publishing Partnership, 2012), http://volterra.co.uk/wp-content/uploads/2013/03/2_Back-to-the-Drawing-Board-for-Macroeconomics.pdf
D. Helbing, A. Kirman, Rethinking economics using complexity theory. Real-World Econ. Rev. 64, 23–52 (2013), http://www.paecon.net/PAEReview/issue64/HelbingKirman64.pdf; http://futurict.blogspot.ch/2013/04/how-and-why-our-conventional-economic_8.html
D. Helbing, Economics 2.0: The natural step towards a self-regulating, participatory market society. Evol. Inst. Econ. Rev. 10, 3–41 (2013), https://www.jstage.jst.go.jp/article/eier/10/1/10_D2013002/_pdf; http://www.todayonline.com/singapore/new-kind-economy-born
D. Helbing, Globally networked risks and how to respond. Nature. 497, 51–59 (2013), http://www.researchgate.net/publication/236602842_Globally_networked_risks_and_how_to_respond/file/60b7d52ada0b3d1494.pdf; http://www.sciencedaily.com/releases/2013/05/130501131943.htm
D. Helbing, Systemic Risks in Society and Economics. International Risk Governance Council (irgc). (2010), http://www.researchgate.net/publication/228666065_Systemic_risks_in_society_and_economics/file/9fcfd50bafbc5375d6.pdf
OECD Global Science Forum, Applications of Complexity Science for Public Policy: New Tools for Finding Unanticipated Consequences and Unrealized Opportunities (2008), http://www.oecd.org/science/sci-tech/43891980.pdf
The FuturIcT Knowledge Accelerator: Unleashing the Power of Information for a Sustainable Future, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1597095; http://arxiv.org/abs/1304.0788
D. Helbing, S. Balietti, et al., Visioneer special issue: How can we Learn to Understand, Create and Manage Complex Techno-Socio-Economic Systems? (2011), http://epjst.epj.org/index.php?option=com_toc&url=/articles/epjst/abs/2011/04/contents/contents.html
D. Helbing, S. Balietti, Big Data, Privacy, and Trusted Web: What Needs to Be Done, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2322082
J. van den Hoven, et al., FuturICT—The road towards ethical ICT. Eur. Phys. J. Spec. Top. 214, 153–181 (2012), http://link.springer.com/article/10.1140/epjst/e2012-01691-2#page-1
S. Buckingham Shum, et al., Towards a global participatory platform. Eur. Phys. J. Spec. Top. 214, 109-1-52 (2012), http://link.springer.com/article/10.1140/epjst/e2012-01690-3#page-1
For an overview of the Snowden revelations, http://www.theguardian.com/world/the-nsa-files
Heise Online, Bundesprsident Gauck “sehr beunruhigt” ber US-Überwachung (July 25, 2013), http://www.heise.de/newsticker/meldung/Bundespraesident-Gauck-sehr-beunruhigt-ueber-US-Ueberwachung-1924026.html; for further interesting quotes see http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html
D. Helbing, What the Digital Revolution Means for Us, Science Business (June 12, 2014), http://www.sciencebusiness.net/news/76591/What-the-digital-revolution-means-for-us, see also [16]
The Intercept, Barack Obamas secret terrorist-tracking system, by the numbers (August 5, 2014), https://firstlook.org/theintercept/article/2014/08/05/watch-commander/
Foreign Policy, 3 degrees of separation is enough to have you watched by the NSA (July 17, 2013), http://complex.foreignpolicy.com/posts/2013/07/17/3_degrees_of_separation_is_enough_to_have_you_watched_by_the_nsa; see also “Three degrees of separation” in http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsafiles-surveillance-revelat-ions-decoded#section/1
The Washington Post, NSA phone record collection does little to prevent terrorist attacks, group says (January 12, 2014), http://www.washingtonpost.com/world/national-security/nsa-phone-recordcollection-does-little-to-prevent-terrorist-attacks-group-says/2014/01/12/8aa860aa-77dd-11e3-8963-b4b654bc-c9b2_story.html?hpid=z4; http://securitydata.newamerica.net/nsa/analysis
M. Gill, Spriggs: Assessing the impact of CCTV. Home Office Research, Development and Statistics Directorate (2005), https://www.cctvusergroup.com/downloads/file/Martin%20gill.pdf; see also BBC News (August 24, 2009), 1000 cameras ‘solve one crime’, http://news.bbc.co.uk/2/hi/uk_news/england/london/8219022.stm
Home Office, Review of the Operation of Schedule 7 (September 2012), https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/157896/consultation-document.pdf
National Geographic, The war on drugs is a “miserable failure” (January 22, 2013), http://newswatch.nationalgeographic.com/2013/01/22/the-war-on-drugs-is-a-miserable-failure/
Electronic Frontier Foundation, DEA and NSA team up to share intelligence, leading to secret use of surveillance in ordinary investigations (August 6, 2013), https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering
The Guardian, Eric Holder unveils new reforms aimed at curbing US prison population (August 12, 2013), http://www.theguardian.com/world/2013/aug/12/eric-holder-smart-crime-reform-us-prisons
The Intercept, Guilty until proven innocent (March 7, 2014), https://firstlook.org/theintercept/document/2014/03/07/guilty-proven-innocent/; http://www.huffingtonpost.com/2014/08/15/unlawfularrests-police_n_5678829.html
J. Schmieder, Mit einem Bein im Knast (2013), http://www.amazon.com/Mit-einem-Bein-Knast-gesetzestreu-ebook/dp/B0-0BOAFXKM/ref=sr_1_1?ie=UTF8; http://www.spiegel.tv/filme/magazin-29122013-verboten/
Spiegel, Redtube.com: Massenabmahnungen wegen Porno-Stream (December 9, 2013), http://www.spiegel.de/netzwelt/web/porno-seite-redtube-abmahnungen-gegen-viele-nutzer-a-938077.html; http://www.spiegel.de/netzwelt/web/massenabm-ahnungen-koennen-lautgerichtsurteil-ein-rechtsmissbrauch-sein-a-939764.html
International Business Times, Microsoft tip leads to child porn arrest; Google, Facebook also scan for vile images (August 7, 2014), http://www.ibtimes.com/microsoft-tip-leads-child-porn-arrest-google-facebook-also-scan-vile-images-1651756
MailOnline, The terrifying rise of cyber crime: Your computer is currently being targeted by criminal gangs looking to harvest your personal details and steal your money (January 12, 2013), http://www.dailymail.co.uk/home/moslive/article-2260221/Cy-ber-crime-Yourcurrently-targeted-criminal-gangs-looking-steal-money.html; https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
New York Times, Russian Hackers Amass Over a Billion Internet Passwords (August 5, 2014), http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stoleninternet-credentials.html?_r=0
Spiegel Online, Umfrage zum Datenschutz: Online misstrauen die Deutschen dem Staat (June 5, 2014), http://www.spiegel.de/netzwelt/web/umfrage-deutsche-misstrauen-dem-staat-beim-online-datenschutz-a-973522.html
Focus Money Online, Test enthüllt Fehler in jeder zweiten Schufa-Auskunft (August 8, 2014), http://www.focus.de/finanzen/banken/ratenkredit/falsche-daten-teure-gebuehren-te-st-enthuellt-fehler-injeder-zweiten-schufa-auskunft_id_40469-67.html
Versicherungsbote, Wirtschaftsspionage durch amerikanischen Geheimdienst NSA—Deutsche Unternehmen sind besorgt (July 2, 2013), http://www.versicherungsbote.de/id/89486/Wirtschaftsspionage-durch-amerikanischen-Gehe-imdienst-NSA/; http://pretioso-blog.com/der-fall-enercon-in-der-ard-wirtschaftspionage-der-usa-durch-die-nsain-deutschla-nd-jedes-unternehmen-ist-betroffen/ and http://www.tagesschau.de/wirtschaft/wirtschafsspionage100.html
Zeit Online, Blackout (April 17, 2014), http://www.zeit.de/2014/16/blackout-energiehacker-stadtwerk-ettlingen
Stuxnet, http://en.wikipedia.org/wiki/Stuxnet; http://www.zdnet.com/blog/security/stuxnet-attackers-used-4-windows-ze-ro-day-exploits/7347; http://www.itworld.com/security/28155-3/researcher-warnsstuxnet-flame-show-microsoft-may-have-been-infiltrated-nsa-cia
PC News, Researchers warn about ‘BadUSB exploit’ (July 31, 2014), http://www.pcmag.com/article2/0,2817,2461717,00.asp
Mail Online, China is spying on you through your KETTLE: Bugs that scan wi-fi devices found in imported kitchen gadgets (October 31, 2013), http://www.dailymail.co.uk/news/article-2480900/China-spying-KETTLE-Bugs-scan-wi-fi-devices-imported-kitchen-gadgets.html
The Verge, Secret program gives NSA, FBI backdoor access to Apple, Google, Facebook, Microsoft data (June 6, 2013), http://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism; http://techrights.org/2013/06/15/nsa-and-microsoft/, http://techrights.org/2013/08/22/nsa-back-doors-blowback/
MIT Technology Review, NSAs own hardware backdoors may still be a “Problem from hell” (October 8, 2013), http://www.technologyreview.com/news/519661/nsas-own-hardware-backdoors-may-still-be-a-problem-from-hell/; http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security, http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/, http://en.wikipedia.org/wiki/NSA_ANT_catalog
RT, NSA sued for hoarding details on use of zero day exploits (July 3, 2014), http://rt.com/usa/170264-eff-nsa-lawsuit-0day/; http://www.wired.com/2014/04/obama-zero-day/
Private Wifi, New drone can hack into your mobile device (March 31, 2014), http://www.privatewifi.com/new-drone-can-hack-into-your-mobile-device/; http://www.privatewifi.com/new-drone-can-hack-into-your-mobile-device/, http://securitywatch.pcmag.com/hacking/314370-black-hat-intercepting-calls-and-cloning-phones-with-femtocells, http://www.npr.org/blogs/alltechconsidered/2013/07/15/201490397/How-Hackers-Tapped-Into-My-Verizon-Cellphone-For-250, http://www.alarmspy.com/phone_hacking_9.html
The Guardian, XKeyscore: NSA tool collects ‘nearly everything’ a user does on the internet (July 31, 2013), http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data; http://en.wikipedia.org/wiki/XKeyscore
Business Insider, How a GED-holder managed to get ‘top secret’ government clearance (June 10, 2013), http://www.businessinsider.com/edward-snowden-top-secret-clearance-nsa-whistleblower-2013-6
The Guardian, Academics criticise NSA and GCHQ for weakening online encryption (September 16, 2013), http://www.theguardian.com/technology/2013/sep/16/nsa-gchq-undermine-internet-security
BBC News, Heartbleed bug: What you need to know (April 10, 2014), http://www.bbc.com/news/technology-26969629; see also http://en.wikipedia.org/wiki/Heartbleed
Huff Post, Apple May Be Spying On You Through Your iPhone (July 25, 2014), http://www.huffingtonpost.com/2014/07/26/apple-iphonesallow-extra_n_5622524.html; http://tech.firstpost.com/news-analysis/chinese-media-calls-apples-iphone-a-national-security-concern-227246.html
The Guardian, Chinese military officials charged with stealing US data as tensions escalate (May 20, 2014), http://www.theguardian.com/technology/2014/may/19/us-chinese-military-officials-cyber-espionage; http://www.nytimes.com/2006/06/07/washington/07identity.html, http://blog.techgenie.com/editors-pick/data-theft-incidents-to-prevent-or-to-cure.html, http://articles.economictimes.indiatimes.com/keyword/data-theft/recent/5
See http://en.wikipedia.org/wiki/Cyberwarfare and http://en.wikipedia.org/wiki/Cyber-attack and http://www.wired.com/2013/06/general-keith-alexander-cyberwar/all/
The National Interest, Cyberwar and the nuclear option (June 24, 2013), http://nationalinterest.org/commentary/cyberwar-the-nuclear-option-8638
Wired, Meet MonsterMind, the NSA Bot That Could Wage Cyberwar Autonomously (August 13, 2014), http://www.wired.com/2014/08/nsa-monstermind-cyberwarfare/
InfoWorld, The real story of how big data analytics helped Obama win (February 14, 2013), http://www.infoworld.com/d/big-data/the-real-story-of-how-big-data-analytics-helped-obama-win-212862; http://www.technologyreview.com/featuredstory/509026/how-obamas-team-used-big-data-to-rally-voters/; Nature, Facebook experiment boosts US voter turnout (September 12, 2012), http://www.nature.com/news/facebook-experiment-boosts-us-voter-turnout-1.11401; http://www.sbs.com.au/news/article/2012/09/13/us-election-can-twitter-and-facebook-influence-voters
RT, Western spy agencies build ‘cyber magicians’ to manipulate online discourse (February 25, 2014), http://rt.com/news/five-eyes-online-manipulation-deception-564/; https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/, https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/, http://praag.org/?p=13752
NZZ, Ins Amt gezwischert? (August 18, 2014) www.nzz.ch/aktuell/startseite/ins-amt-gezwitschert-1.18202760
Secret services are there to stabilize democracies? The reality looks different, https://www.facebook.com/FuturICT/posts/576176715754340
DW, Bulgarians protest government of ‘oligarchs’ (June 26, 2013), http://www.dw.de/bulgarians-protest-government-of-oligarchs/a-16909751; Tagesschau.de, Zorn vieler Bulgaren ebbt nicht ab (July 24, 2013), http://www.tagesschau.de/ausland/bulgarienkrise102.html
Mit dem Recht auf informationelle Selbstbestimmung wären eine Gesellschaftsordnung und eine diese ermöglichende Rechtsordnung nicht vereinbar, in der Bürger nicht mehr wissen können, wer was wann und bei welcher Gelegenheit über sie weiß. Wer unsicher ist, ob abweichende Verhaltensweisen jederzeit notiert und als Information dauerhaft gespeichert, verwendet oder weitergegeben werden, wird versuchen, nicht durch solche Verhaltensweisen aufzufallen. […] Dies würde nicht nur die individuellen Entfaltungschancen des Einzelnen beeinträchtigen, sondern auch das Gemeinwohl, weil Selbstbestimmung eine elementare Funktionsbedingung eines auf Handlungsfähigkeit und Mitwirkungsfähigkeit seiner Bürger begründeten freiheitlichen demokratischen Gemeinwesens ist. Hieraus folgt: Freie Entfaltung der Persönlichkeit setzt unter den modernen Bedingungen der Datenverarbeitung den Schutz des Einzelnen gegen unbegrenzte Erhebung, Speicherung, Verwendung und Weitergabe seiner persönlichen Daten voraus. Dieser Schutz ist daher von dem Grundrecht des Art. 2 Abs. 1 in Verbindung mit Art. 1 Abs. 1 GG umfasst. Das Grundrecht gewährleistet insoweit die Befugnis des Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. See also Alexander Rossnagel (August 28, 2013) “Big Data und das Konzept der Datenschutzgesetze”, http://www.privacy-security.ch/2013/Download/Default.htm
Foreign Policy, The Social Laborary (2014), http://www.foreignpolicy.com/articles/2014/07/29/the_social_laboratory_singapore_surveillance_state; also see D. Helbing, Google as God? Opportunities and Risks of the Information Age (March 27, 2013), http://futurict.blogspot.ie/2013/03/google-as-god-opportunities-and-risks.html; see also From crystal ball to magic wand: The new world order in times of digital revolution, https://www.youtube.com/watch?v=AErRh_yDr-Q
See the videos, http://www.youtube.com/watch?v=I_Lphxknozc and http://www.youtube.com/watch?v=AErRh_yDr-Q
live science, U.S. torture techniques unethical, ineffective (January 6, 2011), http://www.livescience.com/9209-study-torture-techniques-unethical-ineffective.html; http://en.wikipedia.org/wiki/Effectiveness_of_torture_for_interrogation and http://www.huffingtonpost.com/2014/04/11/cia-harsh-interrogations_n_5130218.html; The Guardian, US drone attacks ‘counter-productive’, former Obama security adviser claims (January 7, 2013), http://www.theguardian.com/world/2013/jan/07/obama-adviser-criticises-drone-policy; http://www.huffingtonpost. com/2013/05/21/us-drone-strikes-ineffective_n_3313407.html and http://sustainablesecurity.org/2013/10/24/us-drone-strikes-inpakistan/; http://www.huffingtonpost.com/2013/05/21/us-drone-strikes-ineffective_n_3313407.html and http://sustainablesecurity.org/2013/10/24/us-drone-strikes-inpakistan/; and http://sustainablesecurity.org/2013/10/24/us-drone-strikes-in-pakistan/; NationalJournal, The NSA isn’t just spying on us, it’s also undermining Internet security (April 30, 2014), http://www.nationaljournal.com/daily/the-nsa-isn-t-just-spying-on-us-it-s-also-undermining-internet-security-20140429; http://www.slate.com/blogs/future_tense/2014/07/31/usa_freedom_act_update_how_the_nsa_hurts_our_economy_cybersecurity_and_foreign.html
D. Helbing, et al., Saving human lives: What complexity science and information systems can contribute. J. Stat. Phys. (2014), http://link.springer.com/article/10.1007%2Fs10955-014-1024-9
Time, S&P: Income Inequality Is Damaging the Economy (August 5, 2014), http://time.com/3083100/income-inequality/
physicstoday, Qualified trust, not surveillance, is the basis of a stable society (July 2013), http://scitation.aip.org/content/aip/magazine/physicstoday/news/10.1063/PT.4.2508; the Foreword in Consumer Data Privacy in a Networked World, (February 2012) http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, which starts: “Trust is essential to maintaining the social and economic benefits that networked technologies bring to the United States and the rest of the world.”
World Economic Forum, Personal Data: Emergence of a New Asset Class, (2011) http://www.weforum.org/reports/personal-data-emergence-new-asset-class
Y.-A. de Montjoye, E. Shmueli, S.S. Wang, A.S. Pentland, openPDS: Protecting the Privacy of Metadata through SafeAnswers (2014), http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0098790 ftp://131.107.65.22/pub/debull/A12dec/large-scale.pdf, http://infoclose.com/protecting-privacy-online-new-system-would-give-individuals-more-control-over-shared-digital-data/, http://www.taz.de/!131892/, http://www.taz.de/!143055/
D. Helbing, The world after Big Data: Building the self-regulating society (August 14, 2014), https://www.youtube.com/watch?v=I_Q_-Pk-btY or https://www.youtube.com/watch?v=I_Lphxknozc
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Helbing, D. (2015). Introduction—Have We Opened Pandora’s Box?. In: Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society. Springer, Cham. https://doi.org/10.1007/978-3-319-15078-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-15078-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15077-2
Online ISBN: 978-3-319-15078-9
eBook Packages: Computer ScienceComputer Science (R0)