remailers and
   AOL, databases of
   Applied Cryptography
   Arnett, Nick
   ARPANET
   Arquilla, John
   Artificial nose
   ASCAP
   At Large
   Audio surveillance
   Australia, privacy protections in
   Authority
   accountability and
   suspicion of
   Back doors
   Bacon, Francis
   Banks, Iain M.
   Baran, Paul
   Barlow, John Perry
   Barram, David
   Baruch, Bernard
   BBC World Service
   Bernal, J. D.
   Berra, Yogi
   Bill of Rights
   Biology, future of
   Biometric identification
   Bit taxes
   Blackmail, fighting
   Blaze, Matthew
   Bly, Nelly
   Body odor parsing
   Bohr, Niels
   Bork, Robert H.
   Brain, evolution of
   Branch Davidians
   Brand, Stewart
   Brandeis, Louis D.
   Branscomb, Anne Wells
   Brin, David
   Brin, David (another)
   Bronowski, Jacob
   Brunner, John
   Burke, James
   Burns, Ken
   Bush, Vannevar
   Business
   accountability of
   relation to open society
   threat to privacy by
   Cable television, encryption in
   Caller ID,
   Cameras, miniature
   Cameron, James
   Campbell, John W.
   Campbell, Joseph
   Canada, privacy protections in
   Capitalism, characteristics of
   Carroll, Lewis
   Cash flow, electronic tracking of
   Cassini mission, NASA
   Caste rule, danger of
   Cato Institute
   Census, privacy issues in
   Center for Democracy and Technology
   CERT (Computer Emergency Response Team)
   Certification authorities
   Chaum, David
   Chemical companies, accountability of
   Chicago police, privacy violations of
   Children, video surveillance of
   China, imperial
   meritocracy of
   Ciphers. See also Encryption
   Citizen truth squads
   Civilizing Cyberspace
   Clarke, Roger
   Clipper chip
   government backing of
   media scuttling of
   procedural issues regarding
   reasoning behind
   Clipper II,
   Cold War
   Commerce, digitally based
   Common carriers, vs. publishers
   Commons, metaphor of
   Communications Decency Act
   unconstitutionality of
   Computers, Freedom, and Privacy (CFP)
   Concealed-weapons detectors
   Concealment, value of
   Conformity, spurs to
   Constitution
   original goals of
   privacy issues in
   Consumer Credit Database
   Consumer groups
   Consumer Reports
   Control, perceptions of
   Cooper, Jeff
   Copyright
   future of
   history of
   suggestions to implement
   suggestions to replace
   Crackers
   Creative Incentive Coalition (CIC)
   Creativity, future of
   Credibility ratings
   Credit ratings
   Crime
   attitudes toward
   penalties for
   statistics on
   Criticism
   difficulties surrounding
   importance of
   Cryptography. See also Encryption
   basics of
   future of
   Currency, electronic
   Cyberaristocracy
   Cyberjocks
   Cybermarketplace
   Cyberpunks
   Cyberwar
   Cypherpunk Manifesto
   Cypherpunks
   DARPA (U.S. Defense Advanced Research Projects Agency)
   Data impresarios
   Data smog
   on Internet
   Databases
   lack of public access to
   proliferation of
   Dawkins, Richard
   Declaration of Independence, original goals of
   Declaration of Independence for Cyberspace
   Declassification of documents
   Defense Department, hacker attacks on
   Delphi polling
   Demarchy
   Democracy
   ancient
   evolution of
   hardiness of
   warand
   Democracy against Itself
   Denning, Dorothy
   DES (data encryption standard), cracking of
   Descartes, René
   Detectives, abuse by
   Deterrence, against crime
   Devil’s dichotomies
   Dialogues
   Dickens, Charles
   Diffie, Whitfield
   Digital Future Coalition (DFC)
   Digital signatures
   Dilbert Future, The
   Dirty Harry
   Disclosure of private facts, as tort
   Disputations
   modern
   DNA, ownership issues regarding
   Dossier society, possibilities for
   Doyle, Michael W.
   Drug testing, workplace
   Du Pont, Pierre
   “Dudgeon addiction,”
   drawbacks of
   Dyson, Esther
   Dyson, Freeman
   e-mail. See Internet
   e-mail stalking
   Earth
   ecash
   disadvantages of
   open transactions and
   Eco, Umberto
   Economic Espionage Act
   Eisenhower, Dwight D.
   Electronic Frontier Foundation (EFF)
   Electronic Privacy Information Center (EPIC)
   reading list of
   Electronic tagging
   Encryption
   back doors and
   Clipper chip and
   government attitudes toward
   history of
   insecurity of
   as protection against tyranny
   public-key
   regulation of
   taxation of
   trusted third party
   Engineered society, possibilities for
   Enigma encryption
   Equifax Corp.
   EU, privacy guidelines of
   European model of data protection
   Exhortation, ineffectiveness of
   Experian
   Extortion
   Face recognition systems
   Fair Credit Reporting Act
   Fair use, doctrine of
   False light, as tort
   Falsification
   FBI, privacy violations of
   Federalist Papers
   Fingerprinting systems
   Finney, Hal
   Firewalls
   Flames, defined
   Florence, medieval
   Forecasting, assessing
   Forest Journey
   Foster, Vincent
   Frailty thesis
   Frankenstein syndrome
   Franklin, Benjamin
   Freedman, David
   Freedom
   history of
   relation to privacy
   Freedom of Information Act (FOIA)
   Freedom of speech, reasons for
   Freeh, Louis
   Gabriel, Peter
   Galileo
   Game theory
   Garfinkel, Simson
   Gates, Bill
					     					 			 />   GATT (General Agreement on Tariffs and Trade)
   Gedankenexperimenten
   Gibson, William
   Gilmore, John
   Gingrich, Newt
   Givens, Beth
   Global Information Infrastructure (GII)
   Global Positioning Systems (GPS)
   Godwin, Michael
   Golding, William
   Gore, Al
   on cryptography
   Government
   attitudes toward encryption
   future of
   monopolies of
   open society’s effect on
   relation to open society
   Great Game of Business: Unlocking the Power and Profitability of Open-Book Management
   Gulliver’s Travels
   Gutenberg, Johannes
   Hacker Crackdown
   Hackers
   Hamilton, Alexander
   Hand geometry
   Hanson, Robin
   Harbs, Christine
   Hardin, Garrett
   Heaven’s Gate
   Hegel, G. W. F.
   Heinlein, Robert
   Heisenberg uncertainty principle
   Helsingius, Johan
   Helsinki incident
   Henry, Buck
   Hitler, Adolf
   HIV, as privacy issue
   Hoover, J. Edgar
   Hughes, Eric
   Human Genome Project
   Human nature
   aspects of
   in opposition to open society
   Human rights, self-interest and
   Hussein, Saddam
   “I See You,”
   Ideas
   criticism as essential to
   enlightened ideas about
   fostering rebellion
   good or evil as inherent in
   perceived toxicity of
   Identity
   fraud regarding
   theftof
   Ideologs, birth of
   Individualism
   Internet and
   Information
   asymmetric flow of
   commercial traffic in
   as commodity
   as “currency,”
   financial value of
   and freedom
   importance of free flow of
   increasing flow of
   municipal supply of
   obstruction of flow of
   ownership of
   persistence of
   World Wide Web
   Information Age
   Information systems, vulnerability of
   Informers
   Innovation, changing attitudes toward
   Intellectual property
   history of
   future of
   Intellectual property law
   Internal Revenue Service, abuses by
   Internet
   addresses of
   and aficionados
   “anarchy” of
   anonymity on
   chaos and redundancy in
   creativity on
   data smog on
   debate on
   dirty tricks on
   dystopic visions of
   growing pains of
   history of
   idealistic visions of
   individuality and
   integrative capabilities of
   international aspect of
   lying on
   netiquette on
   obstruction of data flow on
   personal information collection on
   as populist tool
   proposals to tax
   risksinvolved in
   security breaches in
   Intimacy, defined
   Intrusion, as tort
   Inventions, encouragement of
   Jackson, Steve
   James, William
   Japan
   privacy protections in
   video surveillance in
   Jefferson, Thomas
   Jones, Stefan
   Jonestown
   Juror anonymity
   Juvenal
   Kantrowitz, Arthur
   Kaplan, Robert D.
   Katz, Jon
   Keillor, Garrison
   Kelly, Kevin
   Kennedy, Caroline
   Kennedy, John F.
   Kevs
   escrow holding of
   length of
   Keystroke dynamics
   Kidnapping, fighting
   Kindercam
   King, Martin Luther
   King, Rodney
   King’s Lynn, video surveillance in
   Kissinger, Henry
   Knight, Damon
   Knowledge. See Information
   !Kung people
   Lanier, Jaron
   Lawyers
   Learning, theory of
   Lending institutions, accountability of
   Leopold, King of Belgium
   Levy, Steven
   Lexis-Nexis Corp.
   Liberal education
   Libertarian Party
   Liberty, and privacy
   Liddy, G. Gordon
   Lie detectors
   gender-based attitudes toward
   Limbaugh, Rush
   Lord of the Flies
   Love, American Style
   Lovecraft, H. P.
   Lying
   detection of
   Internet and
   phenomenon of
   Machiavelli, Niccolo