The New Digital Age

Home > Other > The New Digital Age > Page 40
The New Digital Age Page 40

by Jared Cohen

Abkhaz nationalists

  Abuja, Nigeria

  Academi, LLC

  accountability, 2.1, 4.1, 6.1, 7.1

  activist groups

  additive manufacturing

  Advanced Research Projects Agency (ARPA), n

  Afghanistan, 1.1, 4.1, 5.1, 5.2, 5.3, 6.1, 6.2, 7.1

  reconstruction of, 7.1, 7.2, 7.3

  Africa, 3.1, 4.1, 4.2

  African Americans

  African National Congress (ANC)

  African Sahel

  African Union

  Age of Spiritual Machines, The: When Computers Exceed Human Intelligence (Kurzweil), con.1

  Agha-Soltan, Neda

  Agie, Mullah Akbar

  Agreement on Trade-Related Aspects of Intellectual Property Rights (1994)

  Ahmadinejad, Mahmoud

  al-Aqsa Martyrs Brigades

  al-Assad, Bashar

  Alcatel-Lucent

  AlertNet

  Algeria, 3.1, 4.1

  alienation

  Al Jazeera

  al-Qaeda, 5.1, 5.2, 5.3, 5.4, 5.5, con.1

  al-Shabaab, 2.1, 5.1, 7.1, 7.2

  Amazon, itr.1, 1.1, 1.2

  data safeguarded by

  Amazon Web Services

  American Sentinel drone

  Android

  anonymity, 2.1, 3.1, 4.1

  Anonymous, 5.1, 5.2

  Anti-Ballistic Missile Treaty

  antiradicalization

  antiterrorism units, 5.1, 5.2, 5.3, 5.4

  Apple, itr.1, 5.1

  data safeguarded by

  apps, 2.1, 5.1

  Arab Spring, itr.1, 4.1, 4.2, 4.3, 4.4, 4.5

  AR.Drone quadricopter

  Argentina

  Armenia

  arms-for-minerals trade

  arrests

  artificial intelligence (AI), itr.1, 1.1

  artificial pacemakers

  Asia

  Asia-Pacific Economic Cooperation (APEC)

  Assange, Julian, 2.1, 2.2, 2.3, 2.4, 5.1

  Astroturfing

  Atatürk, Mustafa Kemal, 3.1, 3.2

  Athar, Sohaib, n, 269

  ATMs

  augmented reality (AR), itr.1, 2.1

  autocracies, 2.1, 3.1, 3.2

  data revolution in

  dissent in

  information shared by

  online discussions in

  Ayalon, Danny

  Baghdad

  Baghdad Museum

  Bahrain

  Baidu.com, n

  Bamiyan Buddhas

  Bangladesh

  bank loans

  Basque separatists

  Batbold, Sukhbaatar

  battery life

  Bechtel

  Belarus

  Belgium

  Ben Ali, Zine el-Abidine, 4.1, 4.2

  Berezovsky, Boris

  Better Angels of Our Nature, The (Pinker), 6.1

  big data challenge

  Bill of Guarantees

  bin Laden, Osama, 2.1, 5.1, 5.2, 6.1, nts.1

  biometric information, 2.1, 2.2, 6.1, 6.2, 6.3

  Bitcoin, 2.1, nts.1

  BlackBerry Messenger (BBM), 2.1, 2.2, 4.1, 5.1

  Black Hat

  Blackwater

  Blockbuster, n

  Bloomberg News

  Bluetooth, 2.1, 2.2, 6.1

  body scan

  body temperatures

  Boko Haram

  Bosnia

  brand

  Brand, Stewart, n

  Brazil, 5.1, 5.2, 5.3

  Bush, George H. W., n

  Bush, George W.

  Cain, Herman

  calendar reminders

  California

  camera phones

  Cameron, David

  Canada

  Carnegie Mellon

  Carvin, Andy

  celebrities, 2.1, 2.2

  cell towers

  censorship, 5.1, 6.1

  censorship-circumvention applications

  Central Asia

  centralized authority

  Chalabi, Ahmed

  charities

  Charity Navigator, 7.1, nts.1

  Chavez, Hugo

  Chechnya, 3.1, 3.2

  Chemical Weapons Convention

  Cherry, Steven, n

  Chery Automobiles

  Chile, 3.1, 6.1

  China, 2.1, 3.1, 3.2, 3.3n, 141, 4.1, 6.1, 7.1

  censorship in

  cyber attacks of, itr.1, 3.1, 3.2

  “human-flesh search engines” in, 6.1, 6.2

  intellectual property in

  Internet in, 3.1, 4.1

  news covered up in

  shanzhai network in, 1.1

  choices

  cholera

  Christian Science Monitor, 209

  Church of Scientology

  CIA, 5.1, con.1

  circulatory system

  Cisco

  citizen journalism

  citizen participation

  citizenship

  Clarke, Richard

  Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)

  Clinton, Bill

  Clinton, Hillary, itr.1, 4.1

  closed-circuit television (CCTV)

  cloud-based data storage, 2.1, 2.2, 2.3

  cloud storage

  CNN Effect, n

  Coalition Provisional Authority (CPA)

  Code War

  Cohen, Rebecca

  Colao, Vittorio, 4.1, 4.2, 7.1

  Cold War, 3.1, 6.1, 6.2

  collaboration

  collective editing

  Colombia, 5.1, 7.1

  commerce, 2.1, 6.1

  commercial opportunities

  Commonwealth of Independent States (CIS)

  communications

  communication technologies

  advance of

  cultural breakthroughs and

  Comodohacker

  computer modeling, n

  computer theft

  computer viruses, in Syria

  computer worms

  confirmation bias

  conflict-related internal migration

  Congo, 1.1, nts.1

  warlords in

  connectivity, itr.1, itr.2, itr.3, 1.1, 1.2, 1.3, 1.4, 2.1, con.1

  and decline of warfare, 6.1, 6.2

  education and

  and end of control

  exiles and

  and government maneuverability

  health and

  news enhanced by

  obstacles to

  reconstruction and, 7.1, 7.2

  revolutions and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6

  for states and citizens

  states’ power enhanced by

  terrorism aided by

  and WikiLeaks-like platforms

  Constantine, Larry, n

  Constitutional Democratic Rally

  copper cables

  copyright, 2.1, 2.2, 3.1

  Copyright Act (1987)

  Copyright Treaty (1996)

  corporations, coping strategies for privacy and security concerns

  corruption

  Côte d’Ivoire

  counter-radicalization. See antiradicalization

  counterterrorism, 5.1, 5.2, 5.3, 5.4

  criminals, 2.1, con.1

  criminal syndicates

  cross-border weapon-smuggling networks

  crowd-sourcing

  Cruise, Tom

  crystal chips

  Cuba

  cultural nuance

  Currygate

  cyber attacks, 3.1, 3.2n, 105, 3.3, 5.1, 6.1

  lack of attribution in

  cyber-bullying

  Cyber Fast Track

  cybersecurity

  cyber terrorism, 3.1n, 153–5, 5.1

  cyber warfare, itr.1, 3.1

  see also Code War

  Dagan, Meir, n

  Dalai Lama, 3.1, 3.2

  Danger Room blog

  Danish cartoon controversy

/>   data, 1.1, con.1

  alleged deletion of

  databases

  data-mining, n, 77

  data permanence, 2.1, 6.1, 6.2

  data remanence

  data revolution, 2.1, 2.2

  deep-packet inspection

  deep think

  Def Con

  Defense Advanced Research Projects Agency (DARPA), 3.1, 5.1, 6.1, 6.2, 6.3

  Defense Department, U.S., 5.1, 6.1, 6.2

  democracy, 2.1, 2.2

  protests in

  wisdom of crowds in

  denial-of-service (DoS) attacks, 3.1, 5.1

  Der Spiegel, 179

  developing countries

  development

  diasporas

  Dictator’s Learning Curve, The (Dobson), 2.1

  Digicel

  DigiNotar

  digital activism

  digital currency

  digital marketing, 6.1, 6.2

  digital textbooks

  digital verification

  digital watermarking, 2.1, 6.1

  diplomacy, itr.1, 2.1

  direct attacks

  disarmament, demobilization and reintegration (DDR) program

  discretionary power

  discrimination

  disease detection

  disinformation campaigns

  dissidents, 2.1, con.1

  distributed denial-of-service (DDoS attacks), 2.1, 3.1, 3.2, 3.3n, 162, 6.1

  DNA, 1.1, 2.1

  Dobson, William J.

  document loss

  documents

  domain name system (DNS), 3.1, 3.2

  Downey, Tom

  “driver-assist” approach

  driverless cars, itr.1, 1.1, 1.2

  drones, 5.1, 5.2, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6

  drugs, negative reactions to

  Dubner, Stephen J.

  Dugan, Regina, 3.1, 5.1, 6.1

  Duggan, Mark

  DuPont

  East Africa

  Eastern Europe

  East India Company

  e-banking, 3.1, 3.2

  e-commerce, 3.1, 3.2, 5.1

  economic crash, 2008, 2.1

  economics, data about

  Economist, 96–7

  education, 1.1, 1.2, 2.1, 2.2

  data about

  privacy in

  security in

  efficiency

  e-government

  Egypt, 3.1, 4.1, 4.2, 4.3, 4.4, 4.5, 6.1n

  Egyptian Credit Bureau, n

  Egyptian Stock Exchange, n

  El Al Airlines

  election irregularity

  elections, U.S., 2012, 4.1

  elections, Venezuela

  electricity

  Emergency Information Service

  empathy

  encryption, 2.1, 2.2, 2.3, 4.1

  Ennahda party

  entertainment

  Equatorial Guinea

  Ericsson, 3.1, 3.2

  Eritrea

  Estonia, 3.1, 6.1

  Ethiopia

  Etisalat

  Etisalat Misr

  European Commission

  European Union, 2.1, 3.1, 4.1

  evolution, 3.1, con.1

  exiles

  expectations gap

  explosive-ordnance-disposal (EOD) robots

  extortionists

  Facebook, itr.1, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 4.1, 5.1, 5.2, 6.1, 6.2

  data safeguarded by

  facial-recognition software, 2.1, 2.2, 6.1, con.1

  failed states

  FARC

  Farmer, Paul

  FBI, 2.1, 5.1

  Ferrari, Bruno

  fiber-optic cables, itr.1, 3.1, 4.1, 4.2

  filtering, 2.1, 3.1

  financial blockades

  fingerprinting

  Finland

  Fixing Failed States (Lockhart and Ghani), 7.1n

  Flame virus, 3.1, 3.2

  Food and Drug Administration

  food prices

  foreign aid

  forgetfulness

  Forum on China-Africa Cooperation (FOCAC)

  Foster-Miller

  4G, 7.1, 7.2

  France, 6.1, 7.1, nts.1

  Freakonomics (Levitt and Dubner), 2.1

  Fred

  freedom of assembly

  free expression

  free information

  French Data Network

  Fukushima nuclear crisis, n

  gacaca, 249–50

  Gadhafi, Muammar, 4.1, 4.2, 7.1

  Gallic Wars

  “Gangnam Style,” 24n

  Gates, Robert

  Gaza

  General Motors

  genocide

  virtual

  genome sequencing

  geography

  Georgia (country)

  Georgia (state)

  Germany

  gesture-recognition technology

  Ghana

  Ghani, Ashraf, n

  GiveWell

  globalization, 1.1, 3.1

  Global System for Mobile Communications (GSM)

  Goldsmith, Jack, n

  Google, itr.1, 2.1, 3.1, 3.2, 3.3n, 163, 5.1, 7.1

  Chinese cyber attacks on, itr.1, 3.1, 3.2

  data safeguarded by

  driverless cars of

  Project Glass in

  tweet-by-phone service of

  Google App Engine

  Google Earth

  Google Ideas

  Google Map Maker

  Google Maps, 6.1, nts.1

  Google+

  Google Voice

  GPS, 6.1, 6.2, 6.3

  GPS data

  Great Firewall of China, 3.1, 3.2

  GreatNonprofits

  Green Revolution

  GuideStar

  hackers, 2.1, 2.2, 5.1, 5.2, 6.1

  Hackers’ Conference, n

  hacktivists

  Hague, 6.1, 7.1, 7.2

  haircuts

  Haiti, itr.1, 7.1, 7.2, 7.3

  Haiti After the Earthquake (Farmer), 7.1

  Hama, Syria

  Hamas, 5.1, 5.2, 6.1

  Han Chinese

  handheld mobile devices

  Hanseatic League

  haptic technology, 1.1, 2.1n, 203–4

  harassment, 6.1, 6.2

  hard-drive crashes

  hawala, 69

  Hayden, Michael V.

  health, 1.1, 1.2

  data about

  health care, 2.1, 2.2

  heart rate

  Hezbollah, 5.1, 5.2

  hidden people

  high-quality LCD screens

  hijacking accounts

  hive mind

  Hizb ut-Tahrir

  Holbrooke, Richard

  Holocaust denial

  holographic “avatars,” 29

  holographic projections, 1.1, 1.2, 2.1, 2.2, 4.1

  holographic “tablets,” 29

  Homeland Security Department, U.S.

  Hormuud

  https encryption protocols

  Huawei

  human rights, 1.1, 3.1

  humiliation

  Hussein, Saddam, itr.1, 7.1, 7.2, 7.3, 7.4

  Hutus

  Identity Cards Act

  identity theft

  identity-theft protection, 2.1, 2.2

  IEDs (improvised explosive devices), 5.1, 6.1

  IEEE Spectrum, 107n

  income inequality, 1.1, 4.1

  India, 2.1, 2.2, 3.1

  individuals, transfer of power to

  Indonesia

  infiltration

  information

  blackouts of

  exchange of

  free movement of

  see also specific information technologies

  Information and Communications Technologies Authority

  Information Awareness Office

  information-technology (IT) security experts

  infrastructure, 2.1, 7.1

&nbs
p; Innocence of Muslims (video), 4.1, 6.1

  innovation

  Institute of Electrical and Electronics Engineers, n

  insurance, for online reputation

  integrated clothing machine

  intellectual property, 2.1, 3.1

  intelligence

  intelligent pills

  internally displaced persons (IDP), 7.1, 7.2

  International Criminal Court, 6.1, 7.1, 7.2

  internationalized domain names (IDN)

  International Telecommunications Union

  Internet, 2.1, 6.1, 6.2, 6.3, 6.4

  Balkanization of

  as becoming cheaper

  and changing understanding of life

  impact of

  as network of networks

  Internet asylum seekers

  Internet Corporation for Assigned Names and Numbers (ICANN)

  internet protocol (IP) activity logs

  internet protocol (IP) address, 3.1, 3.2, 6.1

  Internet service provider (ISP), 3.1, 3.2, 6.1, 7.1

  Iran, 2.1, 2.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 5.1, 6.1, 6.2, 6.3, 7.1

  cyber warfare on

  “halal Internet” in

  Iraq, itr.1, 3.1, 4.1, 6.1, 6.2

  reconstruction of, 7.1, 7.2

  Ireland

  iRobot

  Islam

  Israel, 3.1, 3.2, 3.3, 3.4, 6.1, 6.2, 6.3

  iTunes

  Japan, 3.1, 6.1n, 246

  earthquake in

  Jasmine Revolution

  JavaOne Conference

  Jebali, Hamadi

  Jibril, Mahmoud

  Jim’ale, Ali Ahmed Nur

  Join the Club: How Peer Pressure Can Transform the World (Rosenberg), 4.1

  Joint Tactical Networking Center

  Joint Tactical Radio System

  Julius Caesar

  justice system

  Kabul

  Kagame, Paul, 7.1, 7.2

  Kansas State University

  Karzai, Hamid

  Kashgari, Hamza

  Kaspersky Lab

  Kenya, 3.1, 7.1, 7.2

  Khan Academy

  Khartoum

  Khodorkovsky, Mikhail

  Khomeini, Ayatollah

  Kickstarter

  kidnapping, 2.1, 5.1

  virtual

  Kinect

  Kissinger, Henry, 4.1, 4.2

  Kiva, 7.1, 7.2, 7.3

  Klein, Naomi, n

  Kony 2012, 7.1

  Koran

  Koryolink

  “kosher Internet,” 187

  Kosovo

  Kurds, 3.1, 3.2, 4.1

  Kurzweil, Ray

  Kyrgyzstan

  Laârayedh, Ali

  Lagos

  language translation, 1.1, 4.1, 4.2

  laptops

  Latin America, 3.1, 4.1, 4.2, 5.1

  law enforcement

  Law of Accelerating Returns

  Lebanon, 5.1, 7.1, 7.2

  Lee Hsien Loong

  legal options, coping strategies for privacy and security concerns

  legal prosecution

  Lenin, Vladimir

  Levitt, Steven D.

  Libya, 4.1, 4.2, 4.3, 6.1, 7.1, 7.2

  life expectancy

  Lindhout, Amanda

  LinkedIn

  Link Egypt

  litigation

  lobbying groups

  Lockhart, Clare, n

  Lockheed Martin

  Lord’s Resistance Army

  loyalties, 2.1, 2.2

  LulzSec

  Maasai, 1.1, nts.1

  McAfee, John

  McChrystal, Stanley

  Malaysia, 3.1, 4.1, 6.1n

 

‹ Prev