Выбрать главу

computer theft

computer viruses, in Syria

computer worms

confirmation bias

conflict-related internal migration

Congo, 1.1, nts.1

warlords in

connectivity, itr.1, itr.2, itr.3, 1.1, 1.2, 1.3, 1.4, 2.1, con.1

and decline of warfare, 6.1, 6.2

education and

and end of control

exiles and

and government maneuverability

health and

news enhanced by

obstacles to

reconstruction and, 7.1, 7.2

revolutions and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6

for states and citizens

states’ power enhanced by

terrorism aided by

and WikiLeaks-like platforms

Constantine, Larry, n

Constitutional Democratic Rally

copper cables

copyright, 2.1, 2.2, 3.1

Copyright Act (1987)

Copyright Treaty (1996)

corporations, coping strategies for privacy and security concerns

corruption

Côte d’Ivoire

counter-radicalization. See antiradicalization

counterterrorism, 5.1, 5.2, 5.3, 5.4

criminals, 2.1, con.1

criminal syndicates

cross-border weapon-smuggling networks

crowd-sourcing

Cruise, Tom

crystal chips

Cuba

cultural nuance

Currygate

cyber attacks, 3.1, 3.2n, 105, 3.3, 5.1, 6.1

lack of attribution in

cyber-bullying

Cyber Fast Track

cybersecurity

cyber terrorism, 3.1n, 153–5, 5.1

cyber warfare, itr.1, 3.1

see also Code War

Dagan, Meir, n

Dalai Lama, 3.1, 3.2

Danger Room blog

Danish cartoon controversy

data, 1.1, con.1

alleged deletion of

databases

data-mining, n, 77

data permanence, 2.1, 6.1, 6.2

data remanence

data revolution, 2.1, 2.2

deep-packet inspection

deep think

Def Con

Defense Advanced Research Projects Agency (DARPA), 3.1, 5.1, 6.1, 6.2, 6.3

Defense Department, U.S., 5.1, 6.1, 6.2

democracy, 2.1, 2.2

protests in

wisdom of crowds in

denial-of-service (DoS) attacks, 3.1, 5.1

Der Spiegel, 179

developing countries

development

diasporas

Dictator’s Learning Curve, The (Dobson), 2.1

Digicel

DigiNotar

digital activism

digital currency

digital marketing, 6.1, 6.2

digital textbooks

digital verification

digital watermarking, 2.1, 6.1

diplomacy, itr.1, 2.1

direct attacks

disarmament, demobilization and reintegration (DDR) program

discretionary power

discrimination

disease detection

disinformation campaigns

dissidents, 2.1, con.1

distributed denial-of-service (DDoS attacks), 2.1, 3.1, 3.2, 3.3n, 162, 6.1

DNA, 1.1, 2.1

Dobson, William J.

document loss

documents

domain name system (DNS), 3.1, 3.2

Downey, Tom

“driver-assist” approach

driverless cars, itr.1, 1.1, 1.2

drones, 5.1, 5.2, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6

drugs, negative reactions to

Dubner, Stephen J.

Dugan, Regina, 3.1, 5.1, 6.1

Duggan, Mark

DuPont

East Africa

Eastern Europe

East India Company

e-banking, 3.1, 3.2

e-commerce, 3.1, 3.2, 5.1

economic crash, 2008, 2.1

economics, data about

Economist, 96–7

education, 1.1, 1.2, 2.1, 2.2

data about

privacy in

security in

efficiency

e-government

Egypt, 3.1, 4.1, 4.2, 4.3, 4.4, 4.5, 6.1n

Egyptian Credit Bureau, n

Egyptian Stock Exchange, n

El Al Airlines

election irregularity

elections, U.S., 2012, 4.1

elections, Venezuela

electricity

Emergency Information Service

empathy

encryption, 2.1, 2.2, 2.3, 4.1

Ennahda party

entertainment

Equatorial Guinea

Ericsson, 3.1, 3.2

Eritrea

Estonia, 3.1, 6.1

Ethiopia

Etisalat

Etisalat Misr

European Commission

European Union, 2.1, 3.1, 4.1

evolution, 3.1, con.1

exiles

expectations gap

explosive-ordnance-disposal (EOD) robots

extortionists

Facebook, itr.1, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 4.1, 5.1, 5.2, 6.1, 6.2

data safeguarded by

facial-recognition software, 2.1, 2.2, 6.1, con.1

failed states

FARC

Farmer, Paul

FBI, 2.1, 5.1

Ferrari, Bruno

fiber-optic cables, itr.1, 3.1, 4.1, 4.2

filtering, 2.1, 3.1

financial blockades

fingerprinting

Finland

Fixing Failed States (Lockhart and Ghani), 7.1n

Flame virus, 3.1, 3.2

Food and Drug Administration

food prices

foreign aid

forgetfulness

Forum on China-Africa Cooperation (FOCAC)

Foster-Miller

4G, 7.1, 7.2

France, 6.1, 7.1, nts.1

Freakonomics (Levitt and Dubner), 2.1

Fred

freedom of assembly

free expression

free information

French Data Network

Fukushima nuclear crisis, n

gacaca, 249–50

Gadhafi, Muammar, 4.1, 4.2, 7.1

Gallic Wars

“Gangnam Style,” 24n

Gates, Robert

Gaza

General Motors

genocide

virtual

genome sequencing

geography

Georgia (country)

Georgia (state)

Germany

gesture-recognition technology

Ghana

Ghani, Ashraf, n

GiveWell

globalization, 1.1, 3.1

Global System for Mobile Communications (GSM)

Goldsmith, Jack, n

Google, itr.1, 2.1, 3.1, 3.2, 3.3n, 163, 5.1, 7.1

Chinese cyber attacks on, itr.1, 3.1, 3.2

data safeguarded by

driverless cars of

Project Glass in

tweet-by-phone service of

Google App Engine

Google Earth

Google Ideas

Google Map Maker

Google Maps, 6.1, nts.1

Google+

Google Voice

GPS, 6.1, 6.2, 6.3

GPS data

Great Firewall of China, 3.1, 3.2

GreatNonprofits

Green Revolution

GuideStar

hackers, 2.1, 2.2, 5.1, 5.2, 6.1

Hackers’ Conference, n

hacktivists

Hague, 6.1, 7.1, 7.2

haircuts

Haiti, itr.1, 7.1, 7.2, 7.3

Haiti After the Earthquake (Farmer), 7.1

Hama, Syria

Hamas, 5.1, 5.2, 6.1

Han Chinese

handheld mobile devices

Hanseatic League

haptic technology, 1.1, 2.1n, 203–4

harassment, 6.1, 6.2

hard-drive crashes

hawala, 69

Hayden, Michael V.

health, 1.1, 1.2

data about

health care, 2.1, 2.2

heart rate

Hezbollah, 5.1, 5.2

hidden people

high-quality LCD screens

hijacking accounts

hive mind

Hizb ut-Tahrir

Holbrooke, Richard

Holocaust denial

holographic “avatars,” 29

holographic projections, 1.1, 1.2, 2.1, 2.2, 4.1

holographic “tablets,” 29

Homeland Security Department, U.S.

Hormuud

https encryption protocols

Huawei

human rights, 1.1, 3.1

humiliation

Hussein, Saddam, itr.1, 7.1, 7.2, 7.3, 7.4

Hutus

Identity Cards Act

identity theft