identity-theft protection, 2.1, 2.2
IEDs (improvised explosive devices), 5.1, 6.1
IEEE Spectrum, 107n
income inequality, 1.1, 4.1
India, 2.1, 2.2, 3.1
individuals, transfer of power to
Indonesia
infiltration
information
blackouts of
exchange of
free movement of
see also specific information technologies
Information and Communications Technologies Authority
Information Awareness Office
information-technology (IT) security experts
infrastructure, 2.1, 7.1
Innocence of Muslims (video), 4.1, 6.1
innovation
Institute of Electrical and Electronics Engineers, n
insurance, for online reputation
integrated clothing machine
intellectual property, 2.1, 3.1
intelligence
intelligent pills
internally displaced persons (IDP), 7.1, 7.2
International Criminal Court, 6.1, 7.1, 7.2
internationalized domain names (IDN)
International Telecommunications Union
Internet, 2.1, 6.1, 6.2, 6.3, 6.4
Balkanization of
as becoming cheaper
and changing understanding of life
impact of
as network of networks
Internet asylum seekers
Internet Corporation for Assigned Names and Numbers (ICANN)
internet protocol (IP) activity logs
internet protocol (IP) address, 3.1, 3.2, 6.1
Internet service provider (ISP), 3.1, 3.2, 6.1, 7.1
Iran, 2.1, 2.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 5.1, 6.1, 6.2, 6.3, 7.1
cyber warfare on
“halal Internet” in
Iraq, itr.1, 3.1, 4.1, 6.1, 6.2
reconstruction of, 7.1, 7.2
Ireland
iRobot
Islam
Israel, 3.1, 3.2, 3.3, 3.4, 6.1, 6.2, 6.3
iTunes
Japan, 3.1, 6.1n, 246
earthquake in
Jasmine Revolution
JavaOne Conference
Jebali, Hamadi
Jibril, Mahmoud
Jim’ale, Ali Ahmed Nur
Join the Club: How Peer Pressure Can Transform the World (Rosenberg), 4.1
Joint Tactical Networking Center
Joint Tactical Radio System
Julius Caesar
justice system
Kabul
Kagame, Paul, 7.1, 7.2
Kansas State University
Karzai, Hamid
Kashgari, Hamza
Kaspersky Lab
Kenya, 3.1, 7.1, 7.2
Khan Academy
Khartoum
Khodorkovsky, Mikhail
Khomeini, Ayatollah
Kickstarter
kidnapping, 2.1, 5.1
virtual
Kinect
Kissinger, Henry, 4.1, 4.2
Kiva, 7.1, 7.2, 7.3
Klein, Naomi, n
Kony 2012, 7.1
Koran
Koryolink
“kosher Internet,” 187
Kosovo
Kurds, 3.1, 3.2, 4.1
Kurzweil, Ray
Kyrgyzstan
Laârayedh, Ali
Lagos
language translation, 1.1, 4.1, 4.2
laptops
Latin America, 3.1, 4.1, 4.2, 5.1
law enforcement
Law of Accelerating Returns
Lebanon, 5.1, 7.1, 7.2
Lee Hsien Loong
legal options, coping strategies for privacy and security concerns
legal prosecution
Lenin, Vladimir
Levitt, Steven D.
Libya, 4.1, 4.2, 4.3, 6.1, 7.1, 7.2
life expectancy
Lindhout, Amanda
Link Egypt
litigation
lobbying groups
Lockhart, Clare, n
Lockheed Martin
Lord’s Resistance Army
loyalties, 2.1, 2.2
LulzSec
Maasai, 1.1, nts.1
McAfee, John
McChrystal, Stanley
Malaysia, 3.1, 4.1, 6.1n
Mali, 2.1, 7.1
malware
state-initiated, 2.1, 2.2
Mandela, Nelson
“man-in-the-middle” attacks
Manning, Bradley
Mao Zedong
MasterCard, 5.1, 5.2
Mauritania, 3.1, 3.2
Mbeki, Thabo
MCI
Mechanical Turk
media:
disaggregated
mainstream
media cycles
medicine
Megaupload
Mehr, 95
memory prosthetics
Mexico, 2.1, 5.1, 6.1
microblogs
microphones
Microsoft, 1.1, 3.1, 3.2
Middle East
military-industrial complex
Milošević, Slobodan
mine-resistant, ambush-protected (MRAP) vehicles
Ministry of Posts and Telecommunications, North Korea
minority groups, 6.1, con.1
Minority Report (film), 1.1
misinformation, 3.1, 3.2, 6.1
MIT Media Lab
Mitnick, Kevin, n
Mobile Giving Foundation
“mobile health” revolution
mobile money credits
mobile phones, 1.1, 4.1, 5.1, 5.2, 5.3, 7.1, 7.2, con.1
banned in Iraq
in Congo
education and
health and
see also smart phones
Money for Good report, nts.1
Mongolia
Monopoly (film), 4.1
monuments
Moore’s Law, itr.1, con.1
moral sense
Moro Islamic Liberation Front
Morsi, Mohamed
Motorola
MTC-Vodafone
Mubarak, Hosni, 3.1, 3.2, 4.1, 4.2, 4.3, 7.1
Mugabe, Robert
multilayer backup systems
Mumbai attacks
Mundie, Craig, 3.1, 3.2, 3.3
Muslim Brotherhood, 4.1, 4.2, 4.3
Mutua, Anthony
myths
names, 2.1, nts.1
Napster
narco-terrorists, 5.1, 5.2
nasal implants
Natanz nuclear enrichment facility
National Security Agency (NSA)
National Security Law
National Transitional Council (NTC)
NATO, 3.1, 4.1, 5.1, 6.1, 6.2, 6.3
Navalny, Alexei
Navy SEAL Team Six, 5.1, 5.2
Nawaz, Maajid
near-permanent data storage
Neda video, 6.1, 6.2
Netflix
Netherlands
net neutrality
Nevada
New York City subway, n
New York Times, 33, 3.1, 3.2, 4.1, 5.1, 7.1
New York Times Magazine, 197
NGO Ratings
Nigeria
Nightmare
Nixon, Richard
noise
Nokia Siemens Networks (NSN)
nongovernmental organizations (NGOs), 1.1, 2.1, 2.2, 3.1, 6.1, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, con.1, nts.1
nonprofits
non-state actors, coping strategies for privacy and security concerns
Noor Group, n
North Korea, 2.1, 3.1, 3.2, 3.3
Northrop Grumman
Norway
Nuclear Nonproliferation Treaty
Obama, Barack, 3.1, 3.2, 6.1
unauthorized leaks and
official profiles
Ohio State University
Olympic Games (attack code name)
One World Trust
online cadastral systems
online reputations
active management of
black markets in
insurance for
open networks
open-source movement
open-source software, 6.1, 7.1
Operation Avenge Assange
optimism
options
Orascom, 3.1, 3.2
Otpor
Ottoman empire, 6.1, 7.1
outsourcing
oversights
OxOmar
PackBot
Pakistan, 3.1, 3.2, 4.1, 5.1, 5.2, 5.3, 5.4, 6.1
Palestinian Islamic Jihad
paparazzi
Paraguay
parents
Parrot
passwords, 2.1, 2.2
patents
PayPal, 5.1, 5.2
peer-to-peer (P2P) networking, 2.1, 4.1, nts.1
Philanthropedia
philanthropic organizations
Philippines, 3.1, 4.1
photographs
photonics
photos
physical infrastructure
Picciolini, Christian
Pinker, Steven