<div>  Preface     xvii </div> <div>  <br> </div> <div>  Chapter 1  Digital Explosion </div> <div>  <br> </div> <div>  Why Is It Happening, and What Is at Stake?     1 </div> <div>  <br> </div> <div>  The Explosion of Bits, and Everything Else     4 </div> <div>  <br> </div> <div>  The Koans of Bits     7 </div> <div>  <br> </div> <div>  Good and Ill, Promise and Peril     17 </div> <div>  <br> </div> <div>  Endnotes     19 </div> <div>  <br> </div> <div>  Chapter 2  Naked in the Sunlight </div> <div>  <br> </div> <div>  Privacy Lost, Privacy Abandoned     21 </div> <div>  <br> </div> <div>  1984 Is Here, and We Like It     21 </div> <div>  <br> </div> <div>  Location, Location, Location     27 </div> <div>  <br> </div> <div>  Big Brother, Abroad and in the United States     32 </div> <div>  <br> </div> <div>  The Internet of Things     42 </div> <div>  <br> </div> <div>  Endnotes     48 </div> <div>  <br> </div> <div>  Chapter 3  Who Owns Your Privacy? </div> <div>  <br> </div> <div>  The Commercialization of Personal Data     51 </div> <div>  <br> </div> <div>  What Kind of Vegetable Are You?     51 </div> <div>  <br> </div> <div>  Footprints and Fingerprints     57 </div> <div>  <br> </div> <div>  Fair Information Practice Principles     64 </div> <div>  <br> </div> <div>  Always On     70 </div> <div>  <br> </div> <div>  Endnotes     71 </div> <div>  <br> </div> <div>  Chapter 4  Gatekeepers </div> <div>  <br> </div> <div>  Who's in Charge Here?     75 </div> <div>  <br> </div> <div>  Who Controls the Flow of Bits?     75 </div> <div>  <br> </div> <div>  The Open Internet?     76 </div> <div>  <br> </div> <div>  Connecting the Dots: Designed for Sharing and Survival     79 </div> <div>  <br> </div> <div>  The Internet Has No Gatekeepers?     85 </div> <div>  <br> </div> <div>  Links Gatekeepers: Getting Connected     86 </div> <div>  <br> </div> <div>  Search Gatekeepers: If You Can't Find It, Does It Exist?     94 </div> <div>  <br> </div> <div>  Social Gatekeepers: Known by the Company You Keep     104 </div> <div>  <br> </div> <div>  Endnotes     112 </div> <div>  <br> </div> <div>  Chapter 5  Secret Bits </div> <div>  <br> </div> <div>  How Codes Became Unbreakable     117 </div> <div>  <br> </div> <div>  Going Dark     117 </div> <div>  <br> </div> <div>  Historical Cryptography     122 </div> <div>  <br> </div> <div>  Lessons for the Internet Age     131 </div> <div>  <br> </div> <div>  Secrecy Changes Forever     135 </div> <div>  <br> </div> <div>  Cryptography Unsettled     147 </div> <div>  <br> </div> <div>  Endnotes     148 </div> <div>  <br> </div> <div>  Chapter 6  Balance Toppled </div> <div>  <br> </div> <div>  Who Owns the Bits?     153 </div> <div>  <br> </div> <div>  Stealing Music     153 </div> <div>  <br> </div> <div>  Automated Crimes, Automated Justice     155 </div> <div>  <br> </div> <div>  The Peer-to-Peer Upheaval     160 </div> <div>  <br> </div> <div>  No Commercial Skipping     167 </div> <div>  <br> </div> <div>  Authorized Use Only     168 </div> <div>  <br> </div> <div>  Forbidden Technology     172 </div> <div>  <br> </div> <div>  Copyright Koyaanisqatsi: Life Out of Balance     177 </div> <div>  <br> </div> <div>  The Limits of Property     183 </div> <div>  <br> </div> <div>  Endnotes     187 </div> <div>  <br> </div> <div>  Chapter 7  You Can't Say That on the Internet </div> <div>  <br> </div> <div>  Guarding the Frontiers of Digital Expression     193 </div> <div>  <br> </div> <div>  Child Sex Trafficking Goes Digital     193 </div> <div>  <br> </div> <div>  Publisher or Distributor?     198 </div> <div>  <br> </div> <div>  Protecting Good Samaritans—and a Few Bad Ones     205 </div> <div>  <br> </div> <div>  Digital Protection, Digital Censorship, and Self-Censorship     215 </div> <div>  <br> </div> <div>  What About Social Media?     219 </div> <div>  <br> </div> <div>  Takedowns     221 </div> <div>  <br> </div> <div>  Endnotes     222 </div> <div>  <br> </div> <div>  Chapter 8  Bits in the Air </div> <div>  <br> </div> <div>  Old Metaphors, New Technologies, and Free Speech     227 </div> <div>  <br> </div> <div>  Censoring the Candidate     227 </div> <div>  <br> </div> <div>  How Broadcasting Became Regulated     228 </div> <div>  <br> </div> <div>  The Path to Spectrum Deregulation     241 </div> <div>  <br> </div> <div>  The Most Beautiful Inventor in the World     245 </div> <div>  <br> </div> <div>  What Does the Future Hold for Radio?     255 </div> <div>  <br> </div> <div>  Endnotes     261 </div> <div>  <br> </div> <div>  Chapter 9  The Next Frontier </div> <div>  <br> </div> <div>  AI and the Bits World of the Future     265 </div> <div>  <br> </div> <div>  Thrown Under a Jaywalking Bus     266 </div> <div>  <br> </div> <div>  What's Intelligent About Artificial Intelligence?     267 </div> <div>  <br> </div> <div>  Machine Learning: I'll Figure It Out     268 </div> <div>  <br> </div> <div>  Algorithmic Decisions: I Thought Only People Could Do That     273 </div> <div>  <br> </div> <div>  What's Next     277 </div> <div>  <br> </div> <div>  Bits Lighting Up the World     282 </div> <div>  <br> </div> <div>  A Few Bits in Conclusion     287 </div> <div>  <br> </div> <div>  Endnotes     288 </div> <div>  <br> </div> <div>  Index     293 </div> <div>  <br> </div> <div>  <br> </div> <div>  <br> </div> <div>  <br> </div>