by Jared Cohen
Abkhaz nationalists
Abuja, Nigeria
Academi, LLC
accountability, 2.1, 4.1, 6.1, 7.1
activist groups
additive manufacturing
Advanced Research Projects Agency (ARPA), n
Afghanistan, 1.1, 4.1, 5.1, 5.2, 5.3, 6.1, 6.2, 7.1
reconstruction of, 7.1, 7.2, 7.3
Africa, 3.1, 4.1, 4.2
African Americans
African National Congress (ANC)
African Sahel
African Union
Age of Spiritual Machines, The: When Computers Exceed Human Intelligence (Kurzweil), con.1
Agha-Soltan, Neda
Agie, Mullah Akbar
Agreement on Trade-Related Aspects of Intellectual Property Rights (1994)
Ahmadinejad, Mahmoud
al-Aqsa Martyrs Brigades
al-Assad, Bashar
Alcatel-Lucent
AlertNet
Algeria, 3.1, 4.1
alienation
Al Jazeera
al-Qaeda, 5.1, 5.2, 5.3, 5.4, 5.5, con.1
al-Shabaab, 2.1, 5.1, 7.1, 7.2
Amazon, itr.1, 1.1, 1.2
data safeguarded by
Amazon Web Services
American Sentinel drone
Android
anonymity, 2.1, 3.1, 4.1
Anonymous, 5.1, 5.2
Anti-Ballistic Missile Treaty
antiradicalization
antiterrorism units, 5.1, 5.2, 5.3, 5.4
Apple, itr.1, 5.1
data safeguarded by
apps, 2.1, 5.1
Arab Spring, itr.1, 4.1, 4.2, 4.3, 4.4, 4.5
AR.Drone quadricopter
Argentina
Armenia
arms-for-minerals trade
arrests
artificial intelligence (AI), itr.1, 1.1
artificial pacemakers
Asia
Asia-Pacific Economic Cooperation (APEC)
Assange, Julian, 2.1, 2.2, 2.3, 2.4, 5.1
Astroturfing
Atatürk, Mustafa Kemal, 3.1, 3.2
Athar, Sohaib, n, 269
ATMs
augmented reality (AR), itr.1, 2.1
autocracies, 2.1, 3.1, 3.2
data revolution in
dissent in
information shared by
online discussions in
Ayalon, Danny
Baghdad
Baghdad Museum
Bahrain
Baidu.com, n
Bamiyan Buddhas
Bangladesh
bank loans
Basque separatists
Batbold, Sukhbaatar
battery life
Bechtel
Belarus
Belgium
Ben Ali, Zine el-Abidine, 4.1, 4.2
Berezovsky, Boris
Better Angels of Our Nature, The (Pinker), 6.1
big data challenge
Bill of Guarantees
bin Laden, Osama, 2.1, 5.1, 5.2, 6.1, nts.1
biometric information, 2.1, 2.2, 6.1, 6.2, 6.3
Bitcoin, 2.1, nts.1
BlackBerry Messenger (BBM), 2.1, 2.2, 4.1, 5.1
Black Hat
Blackwater
Blockbuster, n
Bloomberg News
Bluetooth, 2.1, 2.2, 6.1
body scan
body temperatures
Boko Haram
Bosnia
brand
Brand, Stewart, n
Brazil, 5.1, 5.2, 5.3
Bush, George H. W., n
Bush, George W.
Cain, Herman
calendar reminders
California
camera phones
Cameron, David
Canada
Carnegie Mellon
Carvin, Andy
celebrities, 2.1, 2.2
cell towers
censorship, 5.1, 6.1
censorship-circumvention applications
Central Asia
centralized authority
Chalabi, Ahmed
charities
Charity Navigator, 7.1, nts.1
Chavez, Hugo
Chechnya, 3.1, 3.2
Chemical Weapons Convention
Cherry, Steven, n
Chery Automobiles
Chile, 3.1, 6.1
China, 2.1, 3.1, 3.2, 3.3n, 141, 4.1, 6.1, 7.1
censorship in
cyber attacks of, itr.1, 3.1, 3.2
“human-flesh search engines” in, 6.1, 6.2
intellectual property in
Internet in, 3.1, 4.1
news covered up in
shanzhai network in, 1.1
choices
cholera
Christian Science Monitor, 209
Church of Scientology
CIA, 5.1, con.1
circulatory system
Cisco
citizen journalism
citizen participation
citizenship
Clarke, Richard
Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)
Clinton, Bill
Clinton, Hillary, itr.1, 4.1
closed-circuit television (CCTV)
cloud-based data storage, 2.1, 2.2, 2.3
cloud storage
CNN Effect, n
Coalition Provisional Authority (CPA)
Code War
Cohen, Rebecca
Colao, Vittorio, 4.1, 4.2, 7.1
Cold War, 3.1, 6.1, 6.2
collaboration
collective editing
Colombia, 5.1, 7.1
commerce, 2.1, 6.1
commercial opportunities
Commonwealth of Independent States (CIS)
communications
communication technologies
advance of
cultural breakthroughs and
Comodohacker
computer modeling, n
computer theft
computer viruses, in Syria
computer worms
confirmation bias
conflict-related internal migration
Congo, 1.1, nts.1
warlords in
connectivity, itr.1, itr.2, itr.3, 1.1, 1.2, 1.3, 1.4, 2.1, con.1
and decline of warfare, 6.1, 6.2
education and
and end of control
exiles and
and government maneuverability
health and
news enhanced by
obstacles to
reconstruction and, 7.1, 7.2
revolutions and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6
for states and citizens
states’ power enhanced by
terrorism aided by
and WikiLeaks-like platforms
Constantine, Larry, n
Constitutional Democratic Rally
copper cables
copyright, 2.1, 2.2, 3.1
Copyright Act (1987)
Copyright Treaty (1996)
corporations, coping strategies for privacy and security concerns
corruption
Côte d’Ivoire
counter-radicalization. See antiradicalization
counterterrorism, 5.1, 5.2, 5.3, 5.4
criminals, 2.1, con.1
criminal syndicates
cross-border weapon-smuggling networks
crowd-sourcing
Cruise, Tom
crystal chips
Cuba
cultural nuance
Currygate
cyber attacks, 3.1, 3.2n, 105, 3.3, 5.1, 6.1
lack of attribution in
cyber-bullying
Cyber Fast Track
cybersecurity
cyber terrorism, 3.1n, 153–5, 5.1
cyber warfare, itr.1, 3.1
see also Code War
Dagan, Meir, n
Dalai Lama, 3.1, 3.2
Danger Room blog
Danish cartoon controversy
/> data, 1.1, con.1
alleged deletion of
databases
data-mining, n, 77
data permanence, 2.1, 6.1, 6.2
data remanence
data revolution, 2.1, 2.2
deep-packet inspection
deep think
Def Con
Defense Advanced Research Projects Agency (DARPA), 3.1, 5.1, 6.1, 6.2, 6.3
Defense Department, U.S., 5.1, 6.1, 6.2
democracy, 2.1, 2.2
protests in
wisdom of crowds in
denial-of-service (DoS) attacks, 3.1, 5.1
Der Spiegel, 179
developing countries
development
diasporas
Dictator’s Learning Curve, The (Dobson), 2.1
Digicel
DigiNotar
digital activism
digital currency
digital marketing, 6.1, 6.2
digital textbooks
digital verification
digital watermarking, 2.1, 6.1
diplomacy, itr.1, 2.1
direct attacks
disarmament, demobilization and reintegration (DDR) program
discretionary power
discrimination
disease detection
disinformation campaigns
dissidents, 2.1, con.1
distributed denial-of-service (DDoS attacks), 2.1, 3.1, 3.2, 3.3n, 162, 6.1
DNA, 1.1, 2.1
Dobson, William J.
document loss
documents
domain name system (DNS), 3.1, 3.2
Downey, Tom
“driver-assist” approach
driverless cars, itr.1, 1.1, 1.2
drones, 5.1, 5.2, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6
drugs, negative reactions to
Dubner, Stephen J.
Dugan, Regina, 3.1, 5.1, 6.1
Duggan, Mark
DuPont
East Africa
Eastern Europe
East India Company
e-banking, 3.1, 3.2
e-commerce, 3.1, 3.2, 5.1
economic crash, 2008, 2.1
economics, data about
Economist, 96–7
education, 1.1, 1.2, 2.1, 2.2
data about
privacy in
security in
efficiency
e-government
Egypt, 3.1, 4.1, 4.2, 4.3, 4.4, 4.5, 6.1n
Egyptian Credit Bureau, n
Egyptian Stock Exchange, n
El Al Airlines
election irregularity
elections, U.S., 2012, 4.1
elections, Venezuela
electricity
Emergency Information Service
empathy
encryption, 2.1, 2.2, 2.3, 4.1
Ennahda party
entertainment
Equatorial Guinea
Ericsson, 3.1, 3.2
Eritrea
Estonia, 3.1, 6.1
Ethiopia
Etisalat
Etisalat Misr
European Commission
European Union, 2.1, 3.1, 4.1
evolution, 3.1, con.1
exiles
expectations gap
explosive-ordnance-disposal (EOD) robots
extortionists
Facebook, itr.1, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 4.1, 5.1, 5.2, 6.1, 6.2
data safeguarded by
facial-recognition software, 2.1, 2.2, 6.1, con.1
failed states
FARC
Farmer, Paul
FBI, 2.1, 5.1
Ferrari, Bruno
fiber-optic cables, itr.1, 3.1, 4.1, 4.2
filtering, 2.1, 3.1
financial blockades
fingerprinting
Finland
Fixing Failed States (Lockhart and Ghani), 7.1n
Flame virus, 3.1, 3.2
Food and Drug Administration
food prices
foreign aid
forgetfulness
Forum on China-Africa Cooperation (FOCAC)
Foster-Miller
4G, 7.1, 7.2
France, 6.1, 7.1, nts.1
Freakonomics (Levitt and Dubner), 2.1
Fred
freedom of assembly
free expression
free information
French Data Network
Fukushima nuclear crisis, n
gacaca, 249–50
Gadhafi, Muammar, 4.1, 4.2, 7.1
Gallic Wars
“Gangnam Style,” 24n
Gates, Robert
Gaza
General Motors
genocide
virtual
genome sequencing
geography
Georgia (country)
Georgia (state)
Germany
gesture-recognition technology
Ghana
Ghani, Ashraf, n
GiveWell
globalization, 1.1, 3.1
Global System for Mobile Communications (GSM)
Goldsmith, Jack, n
Google, itr.1, 2.1, 3.1, 3.2, 3.3n, 163, 5.1, 7.1
Chinese cyber attacks on, itr.1, 3.1, 3.2
data safeguarded by
driverless cars of
Project Glass in
tweet-by-phone service of
Google App Engine
Google Earth
Google Ideas
Google Map Maker
Google Maps, 6.1, nts.1
Google+
Google Voice
GPS, 6.1, 6.2, 6.3
GPS data
Great Firewall of China, 3.1, 3.2
GreatNonprofits
Green Revolution
GuideStar
hackers, 2.1, 2.2, 5.1, 5.2, 6.1
Hackers’ Conference, n
hacktivists
Hague, 6.1, 7.1, 7.2
haircuts
Haiti, itr.1, 7.1, 7.2, 7.3
Haiti After the Earthquake (Farmer), 7.1
Hama, Syria
Hamas, 5.1, 5.2, 6.1
Han Chinese
handheld mobile devices
Hanseatic League
haptic technology, 1.1, 2.1n, 203–4
harassment, 6.1, 6.2
hard-drive crashes
hawala, 69
Hayden, Michael V.
health, 1.1, 1.2
data about
health care, 2.1, 2.2
heart rate
Hezbollah, 5.1, 5.2
hidden people
high-quality LCD screens
hijacking accounts
hive mind
Hizb ut-Tahrir
Holbrooke, Richard
Holocaust denial
holographic “avatars,” 29
holographic projections, 1.1, 1.2, 2.1, 2.2, 4.1
holographic “tablets,” 29
Homeland Security Department, U.S.
Hormuud
https encryption protocols
Huawei
human rights, 1.1, 3.1
humiliation
Hussein, Saddam, itr.1, 7.1, 7.2, 7.3, 7.4
Hutus
Identity Cards Act
identity theft
identity-theft protection, 2.1, 2.2
IEDs (improvised explosive devices), 5.1, 6.1
IEEE Spectrum, 107n
income inequality, 1.1, 4.1
India, 2.1, 2.2, 3.1
individuals, transfer of power to
Indonesia
infiltration
information
blackouts of
exchange of
free movement of
see also specific information technologies
Information and Communications Technologies Authority
Information Awareness Office
information-technology (IT) security experts
infrastructure, 2.1, 7.1
&nbs
p; Innocence of Muslims (video), 4.1, 6.1
innovation
Institute of Electrical and Electronics Engineers, n
insurance, for online reputation
integrated clothing machine
intellectual property, 2.1, 3.1
intelligence
intelligent pills
internally displaced persons (IDP), 7.1, 7.2
International Criminal Court, 6.1, 7.1, 7.2
internationalized domain names (IDN)
International Telecommunications Union
Internet, 2.1, 6.1, 6.2, 6.3, 6.4
Balkanization of
as becoming cheaper
and changing understanding of life
impact of
as network of networks
Internet asylum seekers
Internet Corporation for Assigned Names and Numbers (ICANN)
internet protocol (IP) activity logs
internet protocol (IP) address, 3.1, 3.2, 6.1
Internet service provider (ISP), 3.1, 3.2, 6.1, 7.1
Iran, 2.1, 2.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 5.1, 6.1, 6.2, 6.3, 7.1
cyber warfare on
“halal Internet” in
Iraq, itr.1, 3.1, 4.1, 6.1, 6.2
reconstruction of, 7.1, 7.2
Ireland
iRobot
Islam
Israel, 3.1, 3.2, 3.3, 3.4, 6.1, 6.2, 6.3
iTunes
Japan, 3.1, 6.1n, 246
earthquake in
Jasmine Revolution
JavaOne Conference
Jebali, Hamadi
Jibril, Mahmoud
Jim’ale, Ali Ahmed Nur
Join the Club: How Peer Pressure Can Transform the World (Rosenberg), 4.1
Joint Tactical Networking Center
Joint Tactical Radio System
Julius Caesar
justice system
Kabul
Kagame, Paul, 7.1, 7.2
Kansas State University
Karzai, Hamid
Kashgari, Hamza
Kaspersky Lab
Kenya, 3.1, 7.1, 7.2
Khan Academy
Khartoum
Khodorkovsky, Mikhail
Khomeini, Ayatollah
Kickstarter
kidnapping, 2.1, 5.1
virtual
Kinect
Kissinger, Henry, 4.1, 4.2
Kiva, 7.1, 7.2, 7.3
Klein, Naomi, n
Kony 2012, 7.1
Koran
Koryolink
“kosher Internet,” 187
Kosovo
Kurds, 3.1, 3.2, 4.1
Kurzweil, Ray
Kyrgyzstan
Laârayedh, Ali
Lagos
language translation, 1.1, 4.1, 4.2
laptops
Latin America, 3.1, 4.1, 4.2, 5.1
law enforcement
Law of Accelerating Returns
Lebanon, 5.1, 7.1, 7.2
Lee Hsien Loong
legal options, coping strategies for privacy and security concerns
legal prosecution
Lenin, Vladimir
Levitt, Steven D.
Libya, 4.1, 4.2, 4.3, 6.1, 7.1, 7.2
life expectancy
Lindhout, Amanda
LinkedIn
Link Egypt
litigation
lobbying groups
Lockhart, Clare, n
Lockheed Martin
Lord’s Resistance Army
loyalties, 2.1, 2.2
LulzSec
Maasai, 1.1, nts.1
McAfee, John
McChrystal, Stanley
Malaysia, 3.1, 4.1, 6.1n