Skip to main content

Abstract

The first of the contributions in this booklet dates back to March 2008, when Markus Christen, James Breiding and myself became concerned about the stability of the financial system that we felt urged to write a newspaper article to alert the public (see the English translation in Chap. 4). Unfortunately, at that time, the public was not ready to listen. Newspaper editors found our analysis too complex. We responded that a financial crisis would be impossible to prevent, if newspapers failed to explain the complexity of problems like this to their audience. Just a few months later, Lehmann Brothers collapsed, which gave rise to a large-scale crisis. It made me think about the root causes of economic problems and of global crises in general (see Chaps. 4, 5, and 7). But my collaborators and I saw not only the financial crisis coming. We also voiced the surveillance problem early on and the political vulnerability of European gas supply. We studied conflict in Israel, the spreading of diseases, and new response strategies to earthquakes and other disasters. Shortly after, all of this turned out to be highly relevant, almost visionary…

This chapter first appeared in the FuturICT Blog on September 10, 2014, see http://futurict.blogspot.ch/2014/09/have-we-opened-pandoras-box_10.html , and is reproduced here with minor stylistic improvements. Acknowledgments: I would like to thank many friends and colleagues, in particular the world-wide FuturICT community, for the inspiring discussions and the continued support. I am also grateful to Stefano Balietti, James Breiding, and Markus Christen for their reprint permissions regarding two of the chapters in this booklet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 29.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Just imagine the mass surveillance data would get in control of extreme political parties, and they would use these to terrorize the people. Germany has had a Nazi and a Stasi regime, and knows, how terrible this can end.

References

  1. D. Helbing, S. Balietti, Fundamental and real-world challenges in economics. Sci. Cult. 76(9–10), 399–417 (2010). http://www.saha.ac.in/cmp/camcs/Sci_Cul_091010/1720%Dirk%20Helbing.pdf

  2. P. Ormerod, D. Helbing, Back to the drawing board for macroeconomics. in Whats the Use of Economics? Teaching the Dismal Science after the Crisis, ed. D. Coyle (London Publishing Partnership, 2012), http://volterra.co.uk/wp-content/uploads/2013/03/2_Back-to-the-Drawing-Board-for-Macroeconomics.pdf

  3. D. Helbing, A. Kirman, Rethinking economics using complexity theory. Real-World Econ. Rev. 64, 23–52 (2013), http://www.paecon.net/PAEReview/issue64/HelbingKirman64.pdf; http://futurict.blogspot.ch/2013/04/how-and-why-our-conventional-economic_8.html

  4. D. Helbing, Economics 2.0: The natural step towards a self-regulating, participatory market society. Evol. Inst. Econ. Rev. 10, 3–41 (2013), https://www.jstage.jst.go.jp/article/eier/10/1/10_D2013002/_pdf; http://www.todayonline.com/singapore/new-kind-economy-born

  5. D. Helbing, Globally networked risks and how to respond. Nature. 497, 51–59 (2013), http://www.researchgate.net/publication/236602842_Globally_networked_risks_and_how_to_respond/file/60b7d52ada0b3d1494.pdf; http://www.sciencedaily.com/releases/2013/05/130501131943.htm

  6. D. Helbing, Systemic Risks in Society and Economics. International Risk Governance Council (irgc). (2010), http://www.researchgate.net/publication/228666065_Systemic_risks_in_society_and_economics/file/9fcfd50bafbc5375d6.pdf

  7. OECD Global Science Forum, Applications of Complexity Science for Public Policy: New Tools for Finding Unanticipated Consequences and Unrealized Opportunities (2008), http://www.oecd.org/science/sci-tech/43891980.pdf

  8. The FuturIcT Knowledge Accelerator: Unleashing the Power of Information for a Sustainable Future, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1597095; http://arxiv.org/abs/1304.0788

  9. D. Helbing, S. Balietti, et al., Visioneer special issue: How can we Learn to Understand, Create and Manage Complex Techno-Socio-Economic Systems? (2011), http://epjst.epj.org/index.php?option=com_toc&url=/articles/epjst/abs/2011/04/contents/contents.html

  10. D. Helbing, S. Balietti, Big Data, Privacy, and Trusted Web: What Needs to Be Done, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2322082

  11. J. van den Hoven, et al., FuturICT—The road towards ethical ICT. Eur. Phys. J. Spec. Top. 214, 153–181 (2012), http://link.springer.com/article/10.1140/epjst/e2012-01691-2#page-1

  12. S. Buckingham Shum, et al., Towards a global participatory platform. Eur. Phys. J. Spec. Top. 214, 109-1-52 (2012), http://link.springer.com/article/10.1140/epjst/e2012-01690-3#page-1

  13. For an overview of the Snowden revelations, http://www.theguardian.com/world/the-nsa-files

  14. Heise Online, Bundesprsident Gauck “sehr beunruhigt” ber US-Überwachung (July 25, 2013), http://www.heise.de/newsticker/meldung/Bundespraesident-Gauck-sehr-beunruhigt-ueber-US-Ueberwachung-1924026.html; for further interesting quotes see http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html

  15. D. Helbing, What the Digital Revolution Means for Us, Science Business (June 12, 2014), http://www.sciencebusiness.net/news/76591/What-the-digital-revolution-means-for-us, see also [16]

  16. The Intercept, Barack Obamas secret terrorist-tracking system, by the numbers (August 5, 2014), https://firstlook.org/theintercept/article/2014/08/05/watch-commander/

  17. Foreign Policy, 3 degrees of separation is enough to have you watched by the NSA (July 17, 2013), http://complex.foreignpolicy.com/posts/2013/07/17/3_degrees_of_separation_is_enough_to_have_you_watched_by_the_nsa; see also “Three degrees of separation” in http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsafiles-surveillance-revelat-ions-decoded#section/1

  18. The Washington Post, NSA phone record collection does little to prevent terrorist attacks, group says (January 12, 2014), http://www.washingtonpost.com/world/national-security/nsa-phone-recordcollection-does-little-to-prevent-terrorist-attacks-group-says/2014/01/12/8aa860aa-77dd-11e3-8963-b4b654bc-c9b2_story.html?hpid=z4; http://securitydata.newamerica.net/nsa/analysis

  19. M. Gill, Spriggs: Assessing the impact of CCTV. Home Office Research, Development and Statistics Directorate (2005), https://www.cctvusergroup.com/downloads/file/Martin%20gill.pdf; see also BBC News (August 24, 2009), 1000 cameras ‘solve one crime’, http://news.bbc.co.uk/2/hi/uk_news/england/london/8219022.stm

  20. Home Office, Review of the Operation of Schedule 7 (September 2012), https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/157896/consultation-document.pdf

  21. National Geographic, The war on drugs is a “miserable failure” (January 22, 2013), http://newswatch.nationalgeographic.com/2013/01/22/the-war-on-drugs-is-a-miserable-failure/

  22. Electronic Frontier Foundation, DEA and NSA team up to share intelligence, leading to secret use of surveillance in ordinary investigations (August 6, 2013), https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering

  23. The Guardian, Eric Holder unveils new reforms aimed at curbing US prison population (August 12, 2013), http://www.theguardian.com/world/2013/aug/12/eric-holder-smart-crime-reform-us-prisons

  24. The Intercept, Guilty until proven innocent (March 7, 2014), https://firstlook.org/theintercept/document/2014/03/07/guilty-proven-innocent/; http://www.huffingtonpost.com/2014/08/15/unlawfularrests-police_n_5678829.html

  25. J. Schmieder, Mit einem Bein im Knast (2013), http://www.amazon.com/Mit-einem-Bein-Knast-gesetzestreu-ebook/dp/B0-0BOAFXKM/ref=sr_1_1?ie=UTF8; http://www.spiegel.tv/filme/magazin-29122013-verboten/

  26. Spiegel, Redtube.com: Massenabmahnungen wegen Porno-Stream (December 9, 2013), http://www.spiegel.de/netzwelt/web/porno-seite-redtube-abmahnungen-gegen-viele-nutzer-a-938077.html; http://www.spiegel.de/netzwelt/web/massenabm-ahnungen-koennen-lautgerichtsurteil-ein-rechtsmissbrauch-sein-a-939764.html

  27. International Business Times, Microsoft tip leads to child porn arrest; Google, Facebook also scan for vile images (August 7, 2014), http://www.ibtimes.com/microsoft-tip-leads-child-porn-arrest-google-facebook-also-scan-vile-images-1651756

  28. MailOnline, The terrifying rise of cyber crime: Your computer is currently being targeted by criminal gangs looking to harvest your personal details and steal your money (January 12, 2013), http://www.dailymail.co.uk/home/moslive/article-2260221/Cy-ber-crime-Yourcurrently-targeted-criminal-gangs-looking-steal-money.html; https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/

  29. New York Times, Russian Hackers Amass Over a Billion Internet Passwords (August 5, 2014), http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stoleninternet-credentials.html?_r=0

  30. Spiegel Online, Umfrage zum Datenschutz: Online misstrauen die Deutschen dem Staat (June 5, 2014), http://www.spiegel.de/netzwelt/web/umfrage-deutsche-misstrauen-dem-staat-beim-online-datenschutz-a-973522.html

  31. Focus Money Online, Test enthüllt Fehler in jeder zweiten Schufa-Auskunft (August 8, 2014), http://www.focus.de/finanzen/banken/ratenkredit/falsche-daten-teure-gebuehren-te-st-enthuellt-fehler-injeder-zweiten-schufa-auskunft_id_40469-67.html

  32. Versicherungsbote, Wirtschaftsspionage durch amerikanischen Geheimdienst NSA—Deutsche Unternehmen sind besorgt (July 2, 2013), http://www.versicherungsbote.de/id/89486/Wirtschaftsspionage-durch-amerikanischen-Gehe-imdienst-NSA/; http://pretioso-blog.com/der-fall-enercon-in-der-ard-wirtschaftspionage-der-usa-durch-die-nsain-deutschla-nd-jedes-unternehmen-ist-betroffen/ and http://www.tagesschau.de/wirtschaft/wirtschafsspionage100.html

  33. Zeit Online, Blackout (April 17, 2014), http://www.zeit.de/2014/16/blackout-energiehacker-stadtwerk-ettlingen

  34. Stuxnet, http://en.wikipedia.org/wiki/Stuxnet; http://www.zdnet.com/blog/security/stuxnet-attackers-used-4-windows-ze-ro-day-exploits/7347; http://www.itworld.com/security/28155-3/researcher-warnsstuxnet-flame-show-microsoft-may-have-been-infiltrated-nsa-cia

  35. PC News, Researchers warn about ‘BadUSB exploit’ (July 31, 2014), http://www.pcmag.com/article2/0,2817,2461717,00.asp

  36. Mail Online, China is spying on you through your KETTLE: Bugs that scan wi-fi devices found in imported kitchen gadgets (October 31, 2013), http://www.dailymail.co.uk/news/article-2480900/China-spying-KETTLE-Bugs-scan-wi-fi-devices-imported-kitchen-gadgets.html

  37. The Verge, Secret program gives NSA, FBI backdoor access to Apple, Google, Facebook, Microsoft data (June 6, 2013), http://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism; http://techrights.org/2013/06/15/nsa-and-microsoft/, http://techrights.org/2013/08/22/nsa-back-doors-blowback/

  38. MIT Technology Review, NSAs own hardware backdoors may still be a “Problem from hell” (October 8, 2013), http://www.technologyreview.com/news/519661/nsas-own-hardware-backdoors-may-still-be-a-problem-from-hell/; http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security, http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/, http://en.wikipedia.org/wiki/NSA_ANT_catalog

  39. RT, NSA sued for hoarding details on use of zero day exploits (July 3, 2014), http://rt.com/usa/170264-eff-nsa-lawsuit-0day/; http://www.wired.com/2014/04/obama-zero-day/

  40. Private Wifi, New drone can hack into your mobile device (March 31, 2014), http://www.privatewifi.com/new-drone-can-hack-into-your-mobile-device/; http://www.privatewifi.com/new-drone-can-hack-into-your-mobile-device/, http://securitywatch.pcmag.com/hacking/314370-black-hat-intercepting-calls-and-cloning-phones-with-femtocells, http://www.npr.org/blogs/alltechconsidered/2013/07/15/201490397/How-Hackers-Tapped-Into-My-Verizon-Cellphone-For-250, http://www.alarmspy.com/phone_hacking_9.html

  41. The Guardian, XKeyscore: NSA tool collects ‘nearly everything’ a user does on the internet (July 31, 2013), http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data; http://en.wikipedia.org/wiki/XKeyscore

  42. Business Insider, How a GED-holder managed to get ‘top secret’ government clearance (June 10, 2013), http://www.businessinsider.com/edward-snowden-top-secret-clearance-nsa-whistleblower-2013-6

  43. The Guardian, Academics criticise NSA and GCHQ for weakening online encryption (September 16, 2013), http://www.theguardian.com/technology/2013/sep/16/nsa-gchq-undermine-internet-security

  44. BBC News, Heartbleed bug: What you need to know (April 10, 2014), http://www.bbc.com/news/technology-26969629; see also http://en.wikipedia.org/wiki/Heartbleed

  45. Huff Post, Apple May Be Spying On You Through Your iPhone (July 25, 2014), http://www.huffingtonpost.com/2014/07/26/apple-iphonesallow-extra_n_5622524.html; http://tech.firstpost.com/news-analysis/chinese-media-calls-apples-iphone-a-national-security-concern-227246.html

  46. The Guardian, Chinese military officials charged with stealing US data as tensions escalate (May 20, 2014), http://www.theguardian.com/technology/2014/may/19/us-chinese-military-officials-cyber-espionage; http://www.nytimes.com/2006/06/07/washington/07identity.html, http://blog.techgenie.com/editors-pick/data-theft-incidents-to-prevent-or-to-cure.html, http://articles.economictimes.indiatimes.com/keyword/data-theft/recent/5

  47. See http://en.wikipedia.org/wiki/Cyberwarfare and http://en.wikipedia.org/wiki/Cyber-attack and http://www.wired.com/2013/06/general-keith-alexander-cyberwar/all/

  48. The National Interest, Cyberwar and the nuclear option (June 24, 2013), http://nationalinterest.org/commentary/cyberwar-the-nuclear-option-8638

  49. Wired, Meet MonsterMind, the NSA Bot That Could Wage Cyberwar Autonomously (August 13, 2014), http://www.wired.com/2014/08/nsa-monstermind-cyberwarfare/

  50. InfoWorld, The real story of how big data analytics helped Obama win (February 14, 2013), http://www.infoworld.com/d/big-data/the-real-story-of-how-big-data-analytics-helped-obama-win-212862; http://www.technologyreview.com/featuredstory/509026/how-obamas-team-used-big-data-to-rally-voters/; Nature, Facebook experiment boosts US voter turnout (September 12, 2012), http://www.nature.com/news/facebook-experiment-boosts-us-voter-turnout-1.11401; http://www.sbs.com.au/news/article/2012/09/13/us-election-can-twitter-and-facebook-influence-voters

  51. RT, Western spy agencies build ‘cyber magicians’ to manipulate online discourse (February 25, 2014), http://rt.com/news/five-eyes-online-manipulation-deception-564/; https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/, https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/, http://praag.org/?p=13752

  52. NZZ, Ins Amt gezwischert? (August 18, 2014) www.nzz.ch/aktuell/startseite/ins-amt-gezwitschert-1.18202760

  53. Secret services are there to stabilize democracies? The reality looks different, https://www.facebook.com/FuturICT/posts/576176715754340

  54. DW, Bulgarians protest government of ‘oligarchs’ (June 26, 2013), http://www.dw.de/bulgarians-protest-government-of-oligarchs/a-16909751; Tagesschau.de, Zorn vieler Bulgaren ebbt nicht ab (July 24, 2013), http://www.tagesschau.de/ausland/bulgarienkrise102.html

  55. Mit dem Recht auf informationelle Selbstbestimmung wären eine Gesellschaftsordnung und eine diese ermöglichende Rechtsordnung nicht vereinbar, in der Bürger nicht mehr wissen können, wer was wann und bei welcher Gelegenheit über sie weiß. Wer unsicher ist, ob abweichende Verhaltensweisen jederzeit notiert und als Information dauerhaft gespeichert, verwendet oder weitergegeben werden, wird versuchen, nicht durch solche Verhaltensweisen aufzufallen. […] Dies würde nicht nur die individuellen Entfaltungschancen des Einzelnen beeinträchtigen, sondern auch das Gemeinwohl, weil Selbstbestimmung eine elementare Funktionsbedingung eines auf Handlungsfähigkeit und Mitwirkungsfähigkeit seiner Bürger begründeten freiheitlichen demokratischen Gemeinwesens ist. Hieraus folgt: Freie Entfaltung der Persönlichkeit setzt unter den modernen Bedingungen der Datenverarbeitung den Schutz des Einzelnen gegen unbegrenzte Erhebung, Speicherung, Verwendung und Weitergabe seiner persönlichen Daten voraus. Dieser Schutz ist daher von dem Grundrecht des Art. 2 Abs. 1 in Verbindung mit Art. 1 Abs. 1 GG umfasst. Das Grundrecht gewährleistet insoweit die Befugnis des Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. See also Alexander Rossnagel (August 28, 2013) “Big Data und das Konzept der Datenschutzgesetze”, http://www.privacy-security.ch/2013/Download/Default.htm

  56. Foreign Policy, The Social Laborary (2014), http://www.foreignpolicy.com/articles/2014/07/29/the_social_laboratory_singapore_surveillance_state; also see D. Helbing, Google as God? Opportunities and Risks of the Information Age (March 27, 2013), http://futurict.blogspot.ie/2013/03/google-as-god-opportunities-and-risks.html; see also From crystal ball to magic wand: The new world order in times of digital revolution, https://www.youtube.com/watch?v=AErRh_yDr-Q

  57. See the videos, http://www.youtube.com/watch?v=I_Lphxknozc and http://www.youtube.com/watch?v=AErRh_yDr-Q

  58. live science, U.S. torture techniques unethical, ineffective (January 6, 2011), http://www.livescience.com/9209-study-torture-techniques-unethical-ineffective.html; http://en.wikipedia.org/wiki/Effectiveness_of_torture_for_interrogation and http://www.huffingtonpost.com/2014/04/11/cia-harsh-interrogations_n_5130218.html; The Guardian, US drone attacks ‘counter-productive’, former Obama security adviser claims (January 7, 2013), http://www.theguardian.com/world/2013/jan/07/obama-adviser-criticises-drone-policy; http://www.huffingtonpost. com/2013/05/21/us-drone-strikes-ineffective_n_3313407.html and http://sustainablesecurity.org/2013/10/24/us-drone-strikes-inpakistan/; http://www.huffingtonpost.com/2013/05/21/us-drone-strikes-ineffective_n_3313407.html and http://sustainablesecurity.org/2013/10/24/us-drone-strikes-inpakistan/; and http://sustainablesecurity.org/2013/10/24/us-drone-strikes-in-pakistan/; NationalJournal, The NSA isn’t just spying on us, it’s also undermining Internet security (April 30, 2014), http://www.nationaljournal.com/daily/the-nsa-isn-t-just-spying-on-us-it-s-also-undermining-internet-security-20140429; http://www.slate.com/blogs/future_tense/2014/07/31/usa_freedom_act_update_how_the_nsa_hurts_our_economy_cybersecurity_and_foreign.html

  59. D. Helbing, et al., Saving human lives: What complexity science and information systems can contribute. J. Stat. Phys. (2014), http://link.springer.com/article/10.1007%2Fs10955-014-1024-9

  60. Time, S&P: Income Inequality Is Damaging the Economy (August 5, 2014), http://time.com/3083100/income-inequality/

  61. physicstoday, Qualified trust, not surveillance, is the basis of a stable society (July 2013), http://scitation.aip.org/content/aip/magazine/physicstoday/news/10.1063/PT.4.2508; the Foreword in Consumer Data Privacy in a Networked World, (February 2012) http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, which starts: “Trust is essential to maintaining the social and economic benefits that networked technologies bring to the United States and the rest of the world.”

  62. World Economic Forum, Personal Data: Emergence of a New Asset Class, (2011) http://www.weforum.org/reports/personal-data-emergence-new-asset-class

  63. Y.-A. de Montjoye, E. Shmueli, S.S. Wang, A.S. Pentland, openPDS: Protecting the Privacy of Metadata through SafeAnswers (2014), http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0098790 ftp://131.107.65.22/pub/debull/A12dec/large-scale.pdf, http://infoclose.com/protecting-privacy-online-new-system-would-give-individuals-more-control-over-shared-digital-data/, http://www.taz.de/!131892/, http://www.taz.de/!143055/

  64. D. Helbing, The world after Big Data: Building the self-regulating society (August 14, 2014), https://www.youtube.com/watch?v=I_Q_-Pk-btY or https://www.youtube.com/watch?v=I_Lphxknozc

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dirk Helbing .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Helbing, D. (2015). Introduction—Have We Opened Pandora’s Box?. In: Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society. Springer, Cham. https://doi.org/10.1007/978-3-319-15078-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15078-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15077-2

  • Online ISBN: 978-3-319-15078-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics