The Filter Bubble - Eli Pariser [108]
Chapter Five: The Public Is Irrelevant
137 “others who see what we see”: Hannah Arendt, The Portable Hannah Arendt (New York: Penguin, 2000), 199.
137 “neutralize the influence of the newspapers”: Alexis de Tocqueville, Democracy in America (New York: Penguin, 2001).
138 “a gross violation of Chinese sovereignty”: “NATO Hits Chinese Embassy,” BBC News, May 8, 1999, accessed Dec. 17, 2010, http://news.bbc.co.uk/2/hi/europe/338424.stm.
138 “most vital are the largely anonymous online forums”: Tom Downey, “China’s Cyberposse,” New York Times, Mar. 3, 2010, accessed Dec. 17, 2010, www.nytimes.com/2010/03/07/magazine/07Human-t.html?pagewanted=1.
138 “an elite, wired section of the population”: Shanthi Kalathil and Taylor Boas, “Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule,” First Monday 8, no. 1–6 (2003).
139 “Shareholders want to make money”: Clive Thompson, “Google’s China Problem (and China’s Google Problem),” New York Times, Apr. 23, 2006, accessed Dec. 17, 2010, www.nytimes.com/2006/04/23/magazine/23google.html.
139 “What the government cares about”: James Fallows, “The Connection Has Been Reset,” Atlantic, Mar. 2008, accessed Dec. 17, 2010, www.theatlantic.com/magazine/archive/2008/03/-ldquo-the-connection-has-been-reset-rdquo/6650.
139 “peer pressure, and self-censorship”: Fallows, “Connection Has Been Reset.”
140 “sense that they’re looking at everything”: Thompson, “Google’s China Problem.”
140 “Internet Police will maintain order”: Hong Yan, “Image of Internet Police: JingJang and Chacha Online,” China Digital Times, Feb. 8, 2006, accessed Dec. 17, 2010, http://chinadigitaltimes.net/china/internet-police/page/2.
140 “see my friends, live happily”: Thompson, “Google’s China Problem.”
140 “if Internet users have some porn”: Associated Press, “Web Porn Seeps Through China’s Great Firewall,” July 22, 2010, accessed Dec. 17, 2010, www.cbsnews.com/stories/2010/07/22/tech/main6703860.shtml.
141 “trying to nail Jell-O to the wall”: Bill Clinton, “America’s Stake in China,” Blueprint, June 1, 2000, accessed Dec. 17, 2010, www.dlc.org/ndol_ci.cfm?kaid=108&subid=128&contentid=963.
142 “able to get handheld American flags?”: Laura Miller and Sheldon Rampton, “The Pentagon’s Information Warrior: Rendon to the Rescue,” PR Watch 8, no. 4 (2001).
142 “border patrols [are] replaced by beaming patrols”: John Rendon, as quoted in Franklin Foer, “Flacks Americana,” New Republic, May 20, 2002, accessed Feb. 9, 2011, www.tnr.com/article/politics/flacks-americana?page=0,2.
142 thesaurus: John Rendon, phone interview by author, Nov. 1, 2010.
143 “consume, distribute, and create”: Eric Schmidt and Jared Cohen, “The Digital Disruption: Connectivity and the Diffusion of Power,” Foreign Affairs (Nov.–Dec. 2010).
144 Flatow was an Olympic gymnast: Stephen P. Halbrook, “‘Arms in the Hands of Jews Are a Danger to Public Safety’: Nazism, Firearm Registration, and the Night of the Broken Glass, St. Thomas Law Review 21 (2009): 109–41, 110, www.stephenhalbrook.com/law_review_articles/Halbrook_macro_final_3_29.pdf.
145 the cloud “is actually just a handful of companies”: Clive Thompson, interview with author, Brooklyn, NY, Aug. 13, 2010.
145 there was nowhere to go: Peter Svensson, “WikiLeaks Down? Cables Go Offline After Site Switches Servers,” Huffington Post, Dec. 1, 2010, accessed Feb. 9, 2011, www.huffingtonpost.com/2010/12/01/wikileaks-down-cables-go-_n_790589.html.
145 “lose your constitutional protections immediately”: Christopher Ketcham and Travis Kelly, “The More You Use Google, the More Google Knows About You,” AlterNet, Apr. 9, 2010, accessed Dec. 17, 2010, www.alternet.org/investigations/146398/total_information_awareness:_the_more_you_use_google,_the_more_google_knows_about_you _?page=entire.
146 “cops will love this”: “Does Cloud Computing Mean More Risks to Privacy?,” New York Times, Feb. 23, 2009, accessed Feb. 8, 2011, http://bits.blogs.nytimes.com/2009/02/23/does-cloud-computing-mean-more-risks-to-privacy.