186 / NOTES TO CHAPTER 2 3
Chapter 23 / The Volkswagen Emissions Scandal
1 Jack Ewing, Faster, Higher, Farther: The Inside Story of the Volkswagen Scandal (New
York: W. W. Norton, 2017), e-book, p. 310, chap. “Exposure.”
2 Jennifer Chu, “Study: Volkswagen’s Excess Emissions Will Lead to 1,200 Pre-
mature Deaths in Europe,” MIT News, March 3, 2017, https://news.mit.edu
/2017/volkswagen-emissions-premature-deaths-europe-0303#:~:text=The
%20researchers%20estimate%20that%201%2C200,affected%20cars%20
sold%20in%20Germany.
3 Lee Vinsel, Moving Violations: Automobiles, Experts, and Regulations in the United States
(Baltimore: Johns Hopkins University Press, 2019), 176–77; Scott H. Dewey, “ ‘The
Antitrust Case of the Century’: Kenneth F. Hahn and the Fight Against Smog,”
Southern California Quarterly, 81, no.3 (Fall 1999): 341–76.
4 Vinsel, Moving Violations, 189–90.
5 Warren Brown and Pierre Thomas, “Emissions Case Costs GM Fine, Cadillac
Recall,” Washington Post, December 1, 1995.
6 Ewing, Faster, Higher, Farther, chap. 6.
7 M. Contag et al., “How They Did It: An Analysis of Emission Defeat Devices in
Modern Automobiles,” 2017 IEEE Symposium on Security and Privacy (SP), 2017: 231.
8 M. C. Forelle, in conversation with author, April 1, 2021.
Chapter 24 / The Code That Brought a Language Online
1 “Shahbag Protests,” Wikipedia, revised October 23, 2021, https://e n. w ikipedia. org
/w iki/2 013_Shahbag_protests.
2 “Ahmed Rajib Haider,” Wikipedia, revised November 23, 2021, https:// e n. w ikipedia
.org/wiki/ Ahmed_Rajib_Haider.
3 Rohit Khanna, “ ‘Atheist’ Tag Used to Attack Bloggers,” Times of India, June 10, 2015,
https://timesofindia.indiatimes.com/india/atheist-tag-used-to-attack-bloggers
/articleshow/4 7606967.c ms.
4 Arafatul Islam, “Bangladesh Gags Award-W inning Blogger,” Deutsche Welle, March
25, 2013, https://www.dw.com/en/bangladesh-gags-award-winning-blogger
/a-1 6697713.
5 “Hefazat Enforces Dawn-to-Dusk Hartal for Monday,” RisingBD.com, April 7, 2013,
https://www.risingbd.com/english/Hefazat_enforces_dawn-to-dusk_hartal_for
_Monday/1536.
6 Joshua Hammer, “The Imperiled Bloggers of Bangladesh,” New York Times, De-
cember 29, 2015, https:// w ww.nytimes. com/2016/ 0 1/03/ m agazine/the- p rice- of
-s ecularism- in-bangladesh. html.
7 Jana Syeda Gulshan Ferdous, “BTRC Attempts to Silence the Voice of Bloggers,”
OurTimeBD.com, February 22, 2019, https://www.ourtimebd.com/beta/btrc
-attempts- to-silence- the-voice-o f-bloggers/ .
8 Arild Klokkerhaug, “Transparency Report,” SomewhereinBlog.net, February 29,
2013, https:// www.somewhereinblog. n et/t ransparency_report#.
NOTES TO CHAPTER 2 5 / 187
Chapter 25 / Telegram
1 “Iran: Tightening the Net 2020,” ARTICLE 19, September 16, 2020, https://w ww
.a rticle19.org/ttn-i ran- november- s hutdown/.
2 Ali Khamenei, “Supreme Leader’s Speech on November 25, 2009,” Khamenei.ir,
https://farsi. k hamenei.ir/s peech-content?id=8430.
3 Shaun Walker, “Founder of Vkontakte Leaves after Dispute with Kremlin-L inked
Owners,” Guardian, April 2, 2014, http://www. t heguardian. c om/ m edia/2 014/ apr
/02/ founder-pavel- durov- l eaves- r ussian- social-network- site- vkontakte.
4 Catherine Shu, “Meet Telegram, a Secure Messaging App from the Founders
of VK, Russia’s Largest Social Network,” TechCrunch, October 28, 2013, https://
t echcrunch. com/ 2013/ 1 0/ 27/ meet- t elegram- a- secure- messaging- a pp- from- the
-founders- o f- v k-russias- largest- social- network/.
5 Ryan Gallagher, “Data Breach Shows Iranians Use Chat Apps to Spy, Researchers
Say,” Bloomberg, April 17, 2020, https://w ww. bloomberg.com/ news/a rticles/ 2 020
-04- 17/ data-breach- s hows-i ranians- u se- chat-a pps- t o- spy-r esearchers-s ay.
6 Martim Lobao, “Telegram v3.2 Brings Channels for Broadcasting Your Mes-
sages to the World,” Android Police (blog), September 22, 2015, https://www
.androidpolice.com/2015/09/22/telegram-v3-2-brings-channels-broadcasting
-messages-w orld/ .
7 Farhad Fatemi, “Feasibility Study for the Transfer of Telegram’s Traffic to Iran:
The Public Benefit,” Arvan Cloud (blog), September 6, 2017, https://www.arvan
cloud.c om/ blog/ای-به- تلگرا م-ترافی ک-انتقا ل-امکا نسنج ی/.
8 Mahsa Alimardani, “The Chilling Effect of Officials Discussing Telegram’s Immi-
nent Ban in Iran,” Global Voices Advox (blog), April 25, 2018, https:// a dvox. global
voices.org/2018/04/25/the-chilling-effect-of-officials-discussing-telegrams
-imminent-b an-i n-iran/ .
9 Mahsa Alimardani, “Is Telegram’s Compliance with Iran Compromising the
Digital Security of Its Users?” Global Voices Advox (blog), accessed July 30, 2021,
https://advox.globalvoices.org/2015/08/28/is-telegrams-compliance-with-iran
-compromising-the- digital-s ecurity- of- i ts- users/ .
10 Mahsa Alimardani, “What Telegram Owes Iranians,” Politico Magazine, January
1, 2018, https://www.politico.com/magazine/story/2018/01/01/irans-telegram
-r evolution- 216206/.
11 Amir Vahdat, “Telegram Denies Iran’s Claim It Installed Servers There,” Associated
Press, July 30, 2017, https:// a pnews. c om/ a rticle/ c 41a64ac397941dfa16f5267960
f1258.
1 2 “Iran: Block on Telegram is a blow to freedom of expression,” ARTICLE19, May 11,
2018, https://w ww. a rticle19. o rg/ resources/ iran- t he- b lock- o n- t elegram- i n- i ran- i s
-a- blow- t o-freedom-o f- e xpression/ .
1 3 Alimardani, “What Telegram Owes Iranians.”
1 4 Lily Hay Newman, “Iran’s Telegram Ban Has Impacted All Corners of the Country,”
Wired, June 19, 2018, https://w ww. w ired.com/ story/i ran- t elegram-b an/ .
15 “73.6% of People over the Age of 18 in the Country Currently Use Social Media /
WhatsApp Messenger Ranks First,” Islamic Students Polling Agency (ISPA),
188 / NOTES TO CHAPTER 2 6
F ebruary 22, 2021, accessed July 25, 2021, http:// i spa. ir/ D efault/ Details/ f a/2 282
/73. 6 - پیا م- - کنن د- می- استفاده- اجتماع ی- رسانهها ی-ا ز-حاضر-درحال- ،کشور- سال-18-بالا ی- افرا د-درص د
اول- رتب ه-د ر- اپ-واتس-رسا ن-.
1 6 Matt Burgess, “Switched to Telegram? You Need to Know This about Its Encryp-
tion,” Wired UK, January 27, 2021, https://www.wired.co.uk/article/telegram
-encryption- end-to- end-features.
1 7 Alimardani, “Telegram’s Compliance with Iran.”
1 8 Finbarr Toesland, “Iran’s Persecuted LGBTQ Community Seeks Refuge Online,”
Overture Global, accessed July 30, 2021, https:// w ww. overtureglobal. i o/ story/ irans
-p ersecuted- l gbtq- community- seeks-r efuge- o nline.
1 9 “Sodomites Parading on Telegram in Shadow of Officials’ Negligence,” Gerdab,
accessed July 30, 2021, https://g erdab.ir/f a/n ews/23030/ تلگرا م- د ر-بازا ن-همجنس-جولا ن
تصاویر-مسئولان-غفلت- سایه-د ر- .
20 ”Six Telegram Admins Arrested in Ardebil over Promoting Immorality,” خبرگزاری
| تسنیمTasnim News Agency, September 14, 2017, https://www.t asnimnews. com
/fa/n ews/1396/06/2 3/1 518311/6-غیراخلاقی- مسائل-ترویج- اتهام-به- تلگرامی- های-کانا ل-مدی ر
شدند-دستگیر- اردبیل- د ر- .
21 “Apps, Arrests and Abuse in Egypt, Lebanon and Iran,” ARTICLE 19, February
22, 2018, https://w ww. a rticle19. o rg/ resources/ a pps- a rrests- abuse- egypt- l ebanon
-i ran/ .
22 Gallagher, “Data Breach.”
23 “73.6% of People,” ISPA.
Chapter 26 / Encoding Gender
1 Marie Hicks, “Hacking the Cis-T em,” IEEE Annals of the History of Computing 41, no.
1 (January 1, 2019): 20–33, https:// doi. org/1 0. 1109/ M AHC.2019. 2897667.
2 David L. Johnson, “The Role of the Digital Computer in Mechanical Translation of
Languages,” in Proceedings of the May 6–8, 1958, Western Joint Computer Conference:
Contrasts in Computers, IRE-A CM-AIEE ’58 (Western) (New York: Association for
Computing Machinery, 1958), 161–65, https:// d oi. o rg/ 1 0. 1 145/ 1 457769. 1457815.
3 Os Keyes, “The Misgendering Machines: Trans/HCI Implications of Automatic
Gender Recognition,” Proceedings of the ACM on Human-Computer Interaction 2,
CSCW (November 2018): 1–22, https://d oi.org/10. 1145/ 3 274357.
4 Michael Hill, “NY Social Service Agency Sued for Not Allowing X Gender Mark,”
AP NEWS, March 29, 2021, https://apnews.com/article/n ew-y ork-lawsuits-social
-services- coronavirus- p andemic- m edicaid- 3e2f1cbae9d2acf2f3994df5039375b8.
Contributors
Mahsa Alimardani is an Internet researcher focusing on free-
dom of expression and access to information online in Iran. Her
research aims to understand communications ecologies within
Iran’s information control space.
Elena Botella, a principal at Omidyar Network, is the author
of Delinquent: Inside America’s Debt Machine. Her work on technol-
ogy and finance has appeared in the New Republic, Slate, Forbes,
and elsewhere.
Meredith Broussard is associate professor at the Arthur L.
Carter Journalism Institute of New York University and the au-
thor of Artificial Unintelligence: How Computers Misunderstand the
World. Her research focuses on artificial intelligence in investi-
gative reporting, with particular interests in AI ethics and using
data analysis for social good.
David Cassel has been writing about technology for more than
25 years, with articles appearing everywhere from CNN and the
Wall Street Journal’s site to popular tech news sites like Wired,
Gizmodo, and Salon. Since 2015 he’s also been a contributing
writer for The New Stack, covering the culture of technology
(and ways it intersects the broader popular culture), while also
expanding his interests into computer programming and app
development.
Arthur Daemmrich is the director of the Lemelson Center for
the Study of Invention and Innovation at the Smithsonian In-
stitution. He has published in the fields of science and tech-
nology studies, history of technology, and business policy, with
an emphasis on the interplay of innovation and risk-b ased
regulation.
1 9 0 / L IST O F C O NTRI B U TO RS
Charles Duan is a postdoctoral associate at Cornell Tech, where
he researches technology and intellectual property law. He is
also a senior policy fellow with the Program on Information Jus-
tice and Intellectual Property at American University Washing-
ton College of Law, a senior fellow for technology and innovation
policy with the R Street Institute, and the author of A Five Part
Plan for Patent Reform.
Quinn DuPont has over a decade of experience researching and
writing about crypto. His publications include Cryptocurrencies
and Blockchains (Polity Press, 2019). Previously he was an assis-
tant professor of business at University College Dublin.
Claire L. Evans is a writer and musician based in Los Ange-
les. She is the singer and coauthor of the Grammy-nominated
pop group YACHT and the author of Broad Band: The Untold Story
of the Women Who Made the Internet (Penguin Random House).
Hany Farid is a professor at the University of California, Berke-
ley with a joint appointment in Electrical Engineering & Com-
puter Sciences and the School of Information. He is the author
of Fake Photos and Photo Forensics.
James Grimmelmann is a professor at Cornell Law School and
Cornell Tech who studies Internet and intellectual property law.
Katie Hafner is a longtime science and technology writer who
has published seven books, including Cyberpunk: Outlaws and
Hackers on the Computer Frontier (with John Markoff) and Where
Wizards Stay Up Late: The Origins of the Internet (with Matthew
Lyon). She is host and co-executive producer of the narrative
podcast Lost Women of Science.
Susan C. Herring is professor of information science and
linguistics and director of the Center for Computer-Mediated
L IST O F CONTRIBUTORS / 191
Communication at Indiana University, Bloomington. She is the
editor of Computer-M ediated Communication: Linguistic, Social and
Cross-Cultural Perspectives, The Multilingual Internet: Language, Cul-
ture, and Communication Online (with B. Danet), and The Handbook
of Pragmatics of Computer-M ediated Conversation (with D. Stein and
T. Virtanen).
Syeda Gulshan Ferdous Jana, a Bangladeshi journalist, is
the cofounder and editor of somewhereinblog.net, the world’s
first Bengali language blogging platform. Her work has had a
significant impact on the freedom of expression and social ac-
tivism throughout Bangladesh and resulted in several national
and international awards.
Lowen Liu is an editor at Slate, with an interest in the impact
of technology on everyday lives.
John MacCormick is professor of computer science at Dickin-
son College. He is the author of Nine Algorithms That Changed the
Future: The Ingenious Ideas That Drive Today’s Computers and What
Can Be Computed? A Practical Guide to the Theory of Computation.
Brian McCullough is the host of the Techmeme Ride Home
podcast, Silicon Valley’s daily news podcast of record. He is the
author of How The Internet Happened: From Netscape to the iPhone.
Charlton McIlwain is Professor of Media, Culture, and Com-
munication at New York University and author of Black Software:
The Internet & Racial Justice, From the Afronet to Black Lives Matter.
Lily Hay Newman is a senior writer at Wired focused on infor-
mation security, digital privacy, and hacking. Previously she
was a technology reporter at Slate magazine, and her work has
also appeared in Gizmodo, Fast Company, IEEE Spectrum, and
Popular Mechanics.
1 9 2 / L IST O F C O NTRI B U TO RS
Margaret O’Mara is the Howard & Frances Keller Endowed
Professor of History at the University of Washington, where she
writes and teaches about the technology industry and its rela-
tionship to modern American politics and society. She is the
author of Cities of Knowledge: Cold War Science and the Search for
the Next Silicon Valley and The Code: Silicon Valley and the Remaking
of America.
Will Oremus is technology news analysis writer for the Wash-
ington Post, focusing on the ideas, products, and power strug-
gles shaping the digital world. Before joining the Post in 2021,
he spent eight years writing about tech for Slate magazine and
two years as a senior writer for the tech and science magazine
OneZero.
Nick Partridge is a writer and science communicator at the
Smithsonian’s National Air and Space Museum where he leads
partnerships and special projects, including the national cele-
bration of the 50th anniversary of Apollo 11. He was previously
a public radio host at WUGA in Athens, GA.
Benjamin Pope is a Lecturer in Astrophysics and ARC DECRA
Fellow at the University of Queensland, in Brisbane, Australia.
He applies modern statistical methods to searching for planets
around other stars.
Joy Lisi Rankin, PhD, wrote A People’s History of Computing
in the United States. She leads research at AI Now, focusing on
gender, race, and power in artificial intelligence and other al-
gorithmic technologies.
Afsaneh Rigot is an analyst, researcher, and advocate cover-
ing issues of law, technology, and LGBTQ, refugee, and human
rights. She is a senior researcher at ARTICLE 19 focusing on
L IST O F CONTRIBUTORS / 193
the Middle East and North African (MENA) human rights is-
sues and international corporate responsibility. She is also a
Fellow at the Harvard Kennedy School’s Technology and Pub-
lic Purpose Project (TAPP), an Affiliate at the Berkman Klein
Centre (BKC) at Harvard, and an advisor at the Cyberlaw Clinic
at Harvard.
Ellen R. Stofan, PhD, is the Undersecretary for Research
and Science at the Smithsonian Institution where she over-
sees the Institution’s research centers and sciences museums;
Smithsonian Libraries and Archives; Office of International
Relations; Smithsonian Scholarly Press; and Scientific Diving
Program. She previously led the National Air and Space Mu-
seum, served as Chief Scientist at NASA, and currently is on
the science team of the NASA Dragonfly mission to Saturn’s
moon Titan.
Ellen Ullman is a former software engineer whose essays and
opinion pieces have been widely published. She is the author
of the memoir Close to the Machine; of two novels, The Bug and By
Blood; and of the nonfiction collection Life in Code.
Lee Vinsel is an associate professor of Science, Technology,
and Society at Virginia Tech. He is the author of Moving Viola-
tions: Automobiles, Experts, and Regulations in the United States and
coauthor with Andrew L. Russell of The Innovation Delusion: How
Our Obsession with the New Has Disrupted the Work That Matters Most.
Josephine Wolff is associate professor of cybersecurity pol-
icy at the Tufts Fletcher School of Law and Diplomacy. She is
the author of Cyberinsurance Policy: Rethinking Risk in an Age of
Ransomware, Computer Fraud, Data Breaches, and Cyberattacks and
You’ll See This Message When It Is Too Late: The Legal and Economic
Aftermath of Cybersecurity Breaches.
1 9 4 / L IST O F C O NTRI B U TO RS
Ethan Zuckerman is associate professor of public policy, in-
formation and communication at the University of Massachu-
setts, Amherst. He is the author of Mistrust: Why Losing Faith In
Institutions Provides the Tools to Transform Them and Digital Cos-
mopolitans: Why We Think the Internet Connects Us, Why It Doesn’t
and How to Rewire It.
Index
A page number in italics refers to an illustration.
Adelman, Leonard, 104 batch processing, 38–39, 44
advertising: to support user-g enerated Bell Labs: C language developed at,
content, 96–97, 98, 99; targeted, 3; Unix comment and, 64; Unix
93–95, 99, 136 created at, 3, 65, 66
Ahmed, Nasir, 88 Bergin, Tim, 28–29
Aldrin, Buzz, 56 Berners-L ee, Tim, 82, 83, 84–85
AltaVista, 108, 109 Bernstein, Daniel, 105–6
Amazon, and Heartbleed, 139, binary represent ation: of all code,
143–44 18; of data, 18, 165; of gender,
amplitude of oscillations, 87, 88 162–68
Analytical Engine, 15–16 Bitcoin: blockchain and, 126, 127–28;
Android phones, and Heartbleed, 140 Nakamoto and, 124–26, 125, 127,
Angle, Colin, 119, 121–23 129–30; new values and, 129–30;
AOL, 48 privacy and, 126; trust and, 125–27
API (Application Programming Inter- Black people: framed as responsible for
face), 157 crime, 50–51, 53–54, 55; prevalent
Apollo 10, 62 in early computing, 41–42. See also
Apollo 11, 56–62, 61 communities of color; race; racism
Apollo 13, 5–6 blockchain, 85, 107, 126, 127–29
Apollo Guidance Computer (AGC), Blockstream, 107
56–62, 61 Bohnet, David, 99
Apple: HyperCard for Macintosh, 82; Boltzmann f actor, 21
targeted marketing and, 94 Boole, Charles, 165
Armstrong, Neil, 56, 60 Boolean values, 165
ARPANET, 3, 45–47, 67, 69, 73 Boolean variables, 166–67
ASCII, 165 Bosworth, Andrew, 131, 133–34, 135
Association for Computing Machinery bots, on Iran’s Telegram, 157, 158
(ACM), 29–30, 163 Bouchon, Basile, 13–15, 15, 16, 17–18
Asteroids video game, 36 Boyle, Willard, 88
Atabey, Zemí Yukiyú, 167 Brin, Sergey, 108, 110, 111, 112
Atari, 34, 35–36 Brooks, Rodney, 121
audio compression, 89 bugs, 2–3; Morris worm based on, 70
Busch, Michael, 38, 40
Babbage, Charles, 15–16 Bush, Vannevar, 81–82
Back, Adam, 102, 107 Bushnell, Nolan, 34
Backus, John, 1, 5, 10
Bangla language blog community, C, memory management in, 3, 141–42
Callahan, Ezra, 131, 134, 138
151–55 Cambridge Analytica scandal, 99
Banu Musa brothers, 18 cars, computerization of, 147–48
BASIC, 40–43
1 9 6 / IND E X
Cascading Style Sheets (CSS), 91 CompuServe, 47
cat videos, 7, 119–20, 122, 123 Computer History Museum, 36, 67
Census Bureau, US: punch cards used computer security industry, 74
Computer Space arcade game, 34–36
in 1890, 17; UNIVAC used in 1951, context switching, 63
162 cookies, 92, 93, 95, 99
channels: on Internet Relay Chat, 75; on copyright on software, 37, 107, 149
Teleg ram, 157–58 Core Infrastructure Initiative, 144
Chappelle, Dave, 119 COVID-19: Markov Chain Monte Carlo
charge-c oupled device (CCD), 88
chat, 75–80 and, 23–24; shortage of COBOL
check engine light, 148 p rogrammers and, 29
Chiappetta, Mark, 121 Cox, Rebekah, 133
Chrome, third-party cookies in, 95 CPUs, types of computations and, 17
cisgender heteronormativity, 166–67 Creeper worm, 73
civil rights movement, 49, 50, 59 crime: Black people framed as
Clean Air Act Amendments of 1970, responsible for, 50–51, 53–54, 55;
146–47 proposed computational solutions
click, and hyperlink concept, 83, 84 to, 51–55, 54
climate change, and blockchain, 129 crowdsourcing, 7, 8, 110
Clinton administration, and telephone cryptoeconomics, 129
encryption, 106 Cuervo, Soleio, 135
Clipper, 106 cypherpunks, 103, 106, 124
COBOL, 29, 30, 37, 40–41
CODASYL, 26, 30 Dabney, Ted, 34
code: binary represent at ion of, 18; Dartmouth College Time-Sharing Sys-
definition of, 13, 16–17. See also
software tem, 39–40, 41, 42
CodeCov, 4–5 data: analyzed with MCMC algorithm,
Codenomicon, 140
code vulnerabilities, 4–5; Heartbleed, 22–24; binary repres ent ation of, 18,
139–44, 141 165; types of, 165
coding empowerment, illusion of, databases: gender in, 162–68;
41–43 LGBTQIA+ identities in, 163; types
comet trajectory, 22–23, 23 of variables in, 165–66
command line, 83 decentralized finance (DeFi), 127
comments, 63–68 DeCSS, 107
communities of color: surveillance of, Defender video game, 36
49, 53, 55. See also Black people; Digg, 134
race; racism Digital Equipment Corporation (DEC),
Compatible Time-Sharing System 32, 34, 36
(CTSS), 44–45 digital images, 86–90, 90
compilers, 26, 30; rewritten for Dijkstra, Edsger W., 29
Roomba, 121; run-time compiler Discrete Cosine Transform (DCT), 88,
trick, 32–33 89, 90
compression schemes, 86–88; JPEG Dorner, Steve, 47–48
standard, 86, 88–90, 90 dot-c om boom, 48
DuckDuckGo, Email Protection feature,
94
INDEX / 197
Durov, Nikolai, 156–57 forensic analysis of images, 86, 90
Durov, Pavel, 156–57 forks, and Iranian Internet, 157, 160
DVDs, encryption of, 107 FORTRAN, 1, 5, 40–41
Fourier, Jean-B aptiste Joseph, 87
Edwards, Dan, 32–33 Fourier transform, 89
eigenvalue probl em, 111 freedom of expression: in Bangladesh,
elegant code, 4, 167
Elizabeth II, 47 154, 155; on Iran’s Teleg ram chan-
Email, 44–48; interoperability and, nels, 157–58
frequency of oscillations, 87–88; JPEG
117; origin of @ notation in, 46; standard and, 89–90
tracking pixels in, 91–92, 92, 93, Friendfeed, 134
94
emojis, 79–80 Galaxy Game arcade game, 34
encryption: Heartbleed vulnerability game theory, and public goods, 129
and, 139–40, 142; Iran’s Internet gaming culture, 31–37
and, 158; RSA algorithm for, 102–7. Gass, Saul I., 52, 54
See also Internet security Gasser, Urs, 117
Engelbart, Douglas, 82 gender binary in databases, 162–68
ENIAC, 19, 29 gender identity: and government
Environmental Protection Agency, 146,
147, 148 documents, 168; vs. legal sex, 167.
equation of state, 20–22 See also White men, and access to
Ethereum, 128 computing; women
Eudora, 47–48 genderqueer identification, 167
Evans, Claire L., 42 General Motors, emissions deceit by,
Ewing, Jack, 148 148
export-c ontrol laws, 102–4, 106–7 Gen Z, and Bitcoin, 130
GeoCities, 97, 99
Facebook: death threats toward Bangla global economic crisis of 2008, 124,
bloggers on, 155; gender identity 130
and, 164; like button on, 85, 93–94, Gmail, setting to block external images,
131–38, 132; and news feed algo- 94
rithm, 134, 135, 136, 137; open- Google: “Don’t be evil” motto of, 135;
source software and, 143–44; popu- invisible cross-app tracking on, 95;
list politicians and, 137–38; virtual open-s ource software and, 143–44;
performatives on, 79 and PageRank algorithm, 108–12,
109; ranking issues on, 7–8;
Facebook Beacon, 134 reverse-e ngineered hyperlinking
Facebook Pixel, 94 and, 85; social media in Bangladesh
facial recognition, 55 and, 155; and surveillance capi-
failure, 1–2 talism, 100; third-p arty cookies in
fast and slow thinking, 2 Chrome and, 95
Faulkner, Roger, 67–68 governance, and blockchain, 129
Ferguson, Jonathan, 162 GPU (graphics card), 17
file format incompatibility, 117 Graetz, Martin, 31, 33
financial crisis of 2008, 124, 130 graphical user interface, 82–83
Forelle, M. C., 149 Greenspan, Alan, 124
1 9 8 / IND E X
hackers, 3–5 and, 69–74, 71; multibillion-d ollar
Hacker’s Dictionary, 65, 66–67 industry for, 74. See also encryption
hacks, good use of, 3–4, 5–6, 11 interoperability, 116–18; development
Haider, Hasin, 152 of programming language for, 27–
Hastings, W. K., 22 29; hyperlinks and, 85; shift away
Hawes, Mary K., 27 from, 117–18
Heartbleed vulnerability, 139–44, 141 invisible GIFs. See tracking pixels
Hicks, Mar, 162 iOS15, and Email web bugs, 94
Higinbotham, William, 37 Iran, Internet in, 156–61, 159
Holberton, Betty, 29 iRobot, 119, 120, 122
Hollerith, Herman, 17, 18
Hopper, Grace, 26–29, 42 Jacquard, Joseph Marie, 14
HTML: Cascading Style Sheets and, 91; Jacquard Loom, 14–15, 17
January 6 invasion of US Capitol, 99
interoperability and, 85; as not Johnson, Lyndon, 50, 52
Turing complete, 17 Johnson, Steve, 65–66
hydrogen bomb, 19–20 Jones, Joe, 120, 121, 122
HyperCard, 82 JPEG compression standard, 86, 88–90,
hyperlinks, 81–85
hypertext, 82 90
Junger, Peter, 105
IBM: buying Lotus for $3.5 billion, 48;
COBOL development and, 28, 29; Kahneman, Daniel, 2
first manned US space mission and, Kaminsky, Daniel, 6
52; focus on problem-solving at, Karhunen-Loeve transform (KLT), 88
49–50; FORTRAN and, 40; growth Kelty, Christopher M., 65
of a fter Second World War, 27; Hol- Kemeny, John, 39, 42, 43
lerith’s 1889 system and, 17; MIT Kennedy, John F., 56, 61
and, 32; open-s ource software and, Kernighan, Brian, 3
143–44 Keyes, Os, 166
Khamenei, Ali, 156
images, digital, 86–90, 90 Kint, Jason, 92
imagination, 1–2 kludges, 4
ine quality, and blockchain, 129 Kotok, Alan, 32
Instagram, 137 Kurtz, Tom, 38, 39, 43
Internet: audio, images, and video
Landsteiner, Norbert, 36
on, 88; commercialization of, 47; law enforcement technologies, 55
evolution from ARPANET of, 3, LGBTQIA+ p eople: and database design,
69; interoperability and, 117; in
Iran, 156–61, 159; as military tool, 163–64, 166–68; in Iran, 159–60
5; need for hyperlinks on, 83–84; Licklider, J.C.R., 45–46
tracking pixels on, 91–95, 92. See like button, 131–38, 132; c ounter of,
also targeted advertising
Internet Relay Chat (IRC), 75–80 134, 138; flaws of, 137–38; as a link,
Internet security: emergency DNS 85; tracking pixel and, 93–94
patch in 2008, 6; and hacking of link, software concept of, 81–82
security companies, 4–5; Iran’s link rot, 85
Telegram and, 158; Morris worm Linux, expletives in source code of, 67
INDEX / 199
Lions, John, 64–65 Monte Carlo method, 19, 20, 21–24
listserv, 45 Morgenstern, Jared, 136
LOL: as early computer slang, 58; emoji Morris, Bob, 70
Morris, Noel, 45
for, 79; in Internet Relay Chat, 75, Morris, Robert Tappan, 69–74
77, 78, 79 Morris worm, 69–74, 71
loops, precursors of, 18 Moussouris, Katie, 93
Los Alamos nuclear weapons program, movie industry, and decryption of
19–20
Lotus Notes, 47–48 DVDs, 107
Lovelace, Ada, 15–16 MP3, 89
Lovell, James, 6 MPEG, 89
Lycos, 108, 109 multitasking, of running programs, 64
m usic, encoded, 18
MacCárthaigh, Colm, 139, 140 Muskie, Edmund, 146
machine code, 27 MySpace, 131, 135
MAIL command, 44, 45, 46, 48
mainframe computers: batch pro Nader, Ralph, 146
Nakamoto, Satoshi, 124–26, 125, 127,
cessing for, 38–39, 44; for calcu-
lation, not correspondence, 44; of 129–30
Dartmouth time-sharing system, Napoleon Bonaparte, 14
38–40 Nelsen, Arvid, 42
maintenance, ignored in our culture, 29 Nelson, Ted, 81, 82
Mandiberg, Michael, 84 Neumann, Peter G., 4, 69
MANIAC, 21 The New Hacker’s Dictionary, 65, 67;
marketing on the Internet. See targeted
advertising original version of, 66–67
Mark I computer, 26 Nixon, Richard, 146
Markov Chain Monte Carlo (MCMC), norming, 53
21–24 Northcutt, Poppy, 56
Mars Climate Orbiter, 113–16, 114, 117 nuclear weapons program, 19–20
Mars Global Surveyor, 115
Masswerk, 36 Okelola, Ola, 133
McCarthy, John, 32, 44 open-s ource software: for Bangla text
McGeachie, John, 38, 40
Mehta, Neel, 140 entry, 152; Bitcoin and, 126; Heart-
Metropolis, Nick, 21 bleed vulnerability and, 139–44,
Metropolis algorithm, 21 141; institutional support for, 141,
Microsoft: open-source software and, 143–44
143–44; Windows XP’s lines of code, OpenSSL software library, 139–40, 141,
63; Word for Windows, 67, 117 142, 144
Millennial generation, and Bitcoin, 130 operating systems, lines of code in, 63
Minsky, Marvin, 32 Ozzie, Ray, 47
Minskytron hyperspace signature, 33,
35, 36 Page, Larry, 7, 108, 110, 111, 112
Missile Command video game, 36 PageRank algorithm, 108–12, 109
Mitchell, Jaime, 168 Palfrey, John, 117
PDP-1, 32–34, 36
PDP-11, 34
2 0 0 / IND E X
Pearlman, Leah, 131, 133, 134, 135, Rosenbluth, Marshall, 19, 20–21, 24
136, 138 Rosenstein, Justin, 131, 133
RSA encryption algorithm, 102, 104–5
Perlroth, Nicole, 5 RSA security company, 5
Perseverance Rover, 10–11 RSA T-shirt, 102–3, 103, 106–7
phase of oscillations, 87 Ruckelshaus, William, 147
Piner, Steven, 33 run-t ime compiler trick, 32–33
Pines, Jonathan, 136 Russell, Steven, 31, 32, 34, 36
Pitts, Bill, 34 Russ ian interference in 2016 US elec-
player pianos, 18
Police Beat Algorithm, 49–55, 54 tion, 99
police brutality, 50–51
Pong, 35 same-sex marriage, 164
populist politicians, 137–38 Sammet, Jean, 25–30, 42
pop-up ads, 96–101, 97 Samson, Peter, 33, 36
pornography: appearing in Zoom meet- Schneier, Bruce, 4
Scott, David, 57
ings, 4; censored in Iran, 158 search engines: benefits and hazards
privacy: Facebook like button and, 134;
of, 8; dynamic query-dependent
Iranian authorities and, 157; motive scores in, 112; before Google,
for Bitcoin and, 126; tracking pixels 1 08–9, 112. See also Google
and, 92–93, 94–95 Secure Sockets Layer (SSL), 140
profiling, for police, 52, 53 Shamir, Adi, 104–5
programming languages: BASIC, 40–43; Shetterly, Margot Lee, 42
binary data and, 165–66; C, 3, Silver, Nate, 23
141–42; COBOL, 29, 30, 37, 40–41; Simmel, Georg, 127
FORTRAN, 1, 5, 40–41; origin of, Smith, George, 88
26–30; Turing complete, 17 Smith, Richard M., 92
Proje ct Xanadu, 81, 82 Snuffle, 105, 106
proxy serv ices, and Iranian censorship, social media: alternative models for,
160 100–101; in Bangladesh, 151–55;
public-key algorithms, 104–5 current dysfunctions of, 99; hyper-
punch cards, 14, 16, 17, 18, 38–39 links and, 85; Internet Relay Chat
and, 75, 78, 79; replacement of
race: computing access and, 43; gam- Email communications by, 48; Tele
ing culture and, 37. See also Black gram application in Iran, 156–61.
people; communities of color See also Facebook
software: for Apollo Guidance Com-
racism: Police Beat Algorithm and, 55; puter, 56–62, 61; to cheat emissions
uprisings against, 50–51, 52 tests, 145–46, 149; copyright for, 37,
107, 149; export laws and, 102–4,
random surfing algorithm, 109, 111 107; hardwired, 58, 62; interoper-
RankDex, 112 able, 27, 116–17; long-term use of,
Raymond, Eric S., 67 37; as protected speech, 106–7. See
regulations, circumvented with com- also code; open-source software
software crisis, 27
puters, 149–50 Soltani, Ashkan, 93, 95
Ritchie, Dennis, 3, 65–66, 66
Rivest, Ron, 104–5
Roomba, 7, 119–23, 122
Rosenbluth, Arianna, 19, 21, 23–24
INDEX / 201
“Somewhere in . . .” social media com Twitter: as imitator of Facebook, 137;
pany, 151–52, 155 virtual performatives on, 79–80
Space Invaders arcade game, 35 TX-0, 32
Spacewar, 31–37, 35
SSL (Secure Sockets Layer), 140 Ulam, Stanislaw, 20, 23
surveillance: advertising and, 95, 98, UNIVAC, 26, 162
universal machine, 16–17
99; by Iran ian authorities, 156; po- Unix: comments in, 63–68; creators
lice algorithms and, 49, 53, 55
surveillance capitalism, 98, 99–100 of, 3, 65, 66; Morris worm and, 70;
Syzygy Engineering, 34 time-s haring systems in, 63–64;
unavailable source code for, 64–65
Tanaka, Brian, 64 Usher, Abbot Payson, 14
targeted advertising: giving users more
vampire worm, 73
control over, 94–95; like button and, Van Vleck, Tom, 45
93–94, 136; pop-up ads and, 99; variables in a program, 165–66
tracking pixels and, 93–94, 95 Vezza, Albert, 45–46
Tech Model Railroad Club (TMRC), 32, Viber, 158
33 video compression, 89
Teleg ram application in Iran, 156–61 Vimeo, 134
Teller, Augusta, 21 virtual performatives, 76–80
Teller, Edward, 19–21 virtual private networks, 158, 160
Tennis for Two, 37 Vixie, Paul, 6
Thomas, Arun, 64 Volkswagen emissions scandal, 145–50
Thompson, Ken, 66 von Neumann, John, 20
3D-p rinted firearms, 107
Tierney, Gertrude, 29 Wable, Akhil, 131, 134
TikTok, 137 Watson, Thomas J., 49–50
time-s haring systems: at Dartmouth Watts uprisings, 50–51, 52
College, 39–40, 41, 42; early mail web bugs, 91–95, 92
programs on, 44–45; one-c lick mul- Weber, Max, 127
titasking derived from, 64 weighting, 53
Tomlinson, Ray, 46 WhatsApp, 158, 160
“town crier” worm, 73 White, Kenneth, 94
tracking pixels, 91–95, 92 White men, and access to computing,
transparency report, 155
transparent 1 × 1 pixels, 91–95, 92 41, 42–43
Transport Layer Security (TLS), 140 Whitnah, Tom, 133, 136
Tripod. c om, 96–97, 99 Wiitanen, Wayne, 31
trout-s lap, 75–76, 79, 80 Wikileaks, frozen accounts of, 126
trust: in Bangla blog community, 153–54; Willis, Robert, 14
Bitcoin and, 125–27; blockchain wisdom of the crowd, 7, 8, 110
and, 127–29 women: computing in high schools
Tuck, Hugh, 34
Turing, Alan, 15–16 and, 43; gaming culture and, 37; as
Turing completeness, 16–17 pioneers in computer science, 24,
Turing Test, 16 25–30; prevalence of in early com-
puting, 41–42
2 0 2 / IND E X
word proc essing: PDP-1 program in Yost, Jeffrey R., 29
1960s, 33; Word for Wind ows, 67, 117 “You are not expected to understand
World Wide Web, 82, 83–84 this,” 64–68
worms, 73; Morris worm, 69–74, 71 YouTube, 87, 101, 123
Y2gay, 164 Zuboff, Shoshana, 98, 99–100
Y2K crisis, 30, 164 Zuckerberg, Mark, 99, 134, 135