computer theft
computer viruses, in Syria
computer worms
confirmation bias
conflict-related internal migration
Congo, 1.1, nts.1
warlords in
connectivity, itr.1, itr.2, itr.3, 1.1, 1.2, 1.3, 1.4, 2.1, con.1
and decline of warfare, 6.1, 6.2
education and
and end of control
exiles and
and government maneuverability
health and
news enhanced by
obstacles to
reconstruction and, 7.1, 7.2
revolutions and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6
for states and citizens
states’ power enhanced by
terrorism aided by
and WikiLeaks-like platforms
Constantine, Larry, n
Constitutional Democratic Rally
copper cables
copyright, 2.1, 2.2, 3.1
Copyright Act (1987)
Copyright Treaty (1996)
corporations, coping strategies for privacy and security concerns
corruption
Côte d’Ivoire
counter-radicalization. See antiradicalization
counterterrorism, 5.1, 5.2, 5.3, 5.4
criminals, 2.1, con.1
criminal syndicates
cross-border weapon-smuggling networks
crowd-sourcing
Cruise, Tom
crystal chips
Cuba
cultural nuance
Currygate
cyber attacks, 3.1, 3.2n, 105, 3.3, 5.1, 6.1
lack of attribution in
cyber-bullying
Cyber Fast Track
cybersecurity
cyber terrorism, 3.1n, 153–5, 5.1
cyber warfare, itr.1, 3.1
see also Code War
Dagan, Meir, n
Dalai Lama, 3.1, 3.2
Danger Room blog
Danish cartoon controversy
data, 1.1, con.1
alleged deletion of
databases
data-mining, n, 77
data permanence, 2.1, 6.1, 6.2
data remanence
data revolution, 2.1, 2.2
deep-packet inspection
deep think
Def Con
Defense Advanced Research Projects Agency (DARPA), 3.1, 5.1, 6.1, 6.2, 6.3
Defense Department, U.S., 5.1, 6.1, 6.2
democracy, 2.1, 2.2
protests in
wisdom of crowds in
denial-of-service (DoS) attacks, 3.1, 5.1
Der Spiegel, 179
developing countries
development
diasporas
Dictator’s Learning Curve, The (Dobson), 2.1
Digicel
DigiNotar
digital activism
digital currency
digital marketing, 6.1, 6.2
digital textbooks
digital verification
digital watermarking, 2.1, 6.1
diplomacy, itr.1, 2.1
direct attacks
disarmament, demobilization and reintegration (DDR) program
discretionary power
discrimination
disease detection
disinformation campaigns
dissidents, 2.1, con.1
distributed denial-of-service (DDoS attacks), 2.1, 3.1, 3.2, 3.3n, 162, 6.1
DNA, 1.1, 2.1
Dobson, William J.
document loss
documents
domain name system (DNS), 3.1, 3.2
Downey, Tom
“driver-assist” approach
driverless cars, itr.1, 1.1, 1.2
drones, 5.1, 5.2, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6
drugs, negative reactions to
Dubner, Stephen J.
Dugan, Regina, 3.1, 5.1, 6.1
Duggan, Mark
DuPont
East Africa
Eastern Europe
East India Company
e-banking, 3.1, 3.2
e-commerce, 3.1, 3.2, 5.1
economic crash, 2008, 2.1
economics, data about
Economist, 96–7
education, 1.1, 1.2, 2.1, 2.2
data about
privacy in
security in
efficiency
e-government
Egypt, 3.1, 4.1, 4.2, 4.3, 4.4, 4.5, 6.1n
Egyptian Credit Bureau, n
Egyptian Stock Exchange, n
El Al Airlines
election irregularity
elections, U.S., 2012, 4.1
elections, Venezuela
electricity
Emergency Information Service
empathy
encryption, 2.1, 2.2, 2.3, 4.1
Ennahda party
entertainment
Equatorial Guinea
Ericsson, 3.1, 3.2
Eritrea
Estonia, 3.1, 6.1
Ethiopia
Etisalat
Etisalat Misr
European Commission
European Union, 2.1, 3.1, 4.1
evolution, 3.1, con.1
exiles
expectations gap
explosive-ordnance-disposal (EOD) robots
extortionists
Facebook, itr.1, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 4.1, 5.1, 5.2, 6.1, 6.2
data safeguarded by
facial-recognition software, 2.1, 2.2, 6.1, con.1
failed states
FARC
Farmer, Paul
FBI, 2.1, 5.1
Ferrari, Bruno
fiber-optic cables, itr.1, 3.1, 4.1, 4.2
filtering, 2.1, 3.1
financial blockades
fingerprinting
Finland
Fixing Failed States (Lockhart and Ghani), 7.1n
Flame virus, 3.1, 3.2
Food and Drug Administration
food prices
foreign aid
forgetfulness
Forum on China-Africa Cooperation (FOCAC)
Foster-Miller
4G, 7.1, 7.2
France, 6.1, 7.1, nts.1
Freakonomics (Levitt and Dubner), 2.1
Fred
freedom of assembly
free expression
free information
French Data Network
Fukushima nuclear crisis, n
gacaca, 249–50
Gadhafi, Muammar, 4.1, 4.2, 7.1
Gallic Wars
“Gangnam Style,” 24n
Gates, Robert
Gaza
General Motors
genocide
virtual
genome sequencing
geography
Georgia (country)
Georgia (state)
Germany
gesture-recognition technology
Ghana
Ghani, Ashraf, n
GiveWell
globalization, 1.1, 3.1
Global System for Mobile Communications (GSM)
Goldsmith, Jack, n
Google, itr.1, 2.1, 3.1, 3.2, 3.3n, 163, 5.1, 7.1
Chinese cyber attacks on, itr.1, 3.1, 3.2
data safeguarded by
driverless cars of
Project Glass in
tweet-by-phone service of
Google App Engine
Google Earth
Google Ideas
Google Map Maker
Google Maps, 6.1, nts.1
Google+
Google Voice
GPS, 6.1, 6.2, 6.3
GPS data
Great Firewall of China, 3.1, 3.2
GreatNonprofits
Green Revolution
GuideStar
hackers, 2.1, 2.2, 5.1, 5.2, 6.1
Hackers’ Conference, n
hacktivists
Hague, 6.1, 7.1, 7.2
haircuts
Haiti, itr.1, 7.1, 7.2, 7.3
Haiti After the Earthquake (Farmer), 7.1
Hama, Syria
Hamas, 5.1, 5.2, 6.1
Han Chinese
handheld mobile devices
Hanseatic League
haptic technology, 1.1, 2.1n, 203–4
harassment, 6.1, 6.2
hard-drive crashes
hawala, 69
Hayden, Michael V.
health, 1.1, 1.2
data about
health care, 2.1, 2.2
heart rate
Hezbollah, 5.1, 5.2
hidden people
high-quality LCD screens
hijacking accounts
hive mind
Hizb ut-Tahrir
Holbrooke, Richard
Holocaust denial
holographic “avatars,” 29
holographic projections, 1.1, 1.2, 2.1, 2.2, 4.1
holographic “tablets,” 29
Homeland Security Department, U.S.
Hormuud
https encryption protocols
Huawei
human rights, 1.1, 3.1
humiliation
Hussein, Saddam, itr.1, 7.1, 7.2, 7.3, 7.4
Hutus
Identity Cards Act
identity theft