Выбрать главу

identity-theft protection, 2.1, 2.2

IEDs (improvised explosive devices), 5.1, 6.1

IEEE Spectrum, 107n

income inequality, 1.1, 4.1

India, 2.1, 2.2, 3.1

individuals, transfer of power to

Indonesia

infiltration

information

blackouts of

exchange of

free movement of

see also specific information technologies

Information and Communications Technologies Authority

Information Awareness Office

information-technology (IT) security experts

infrastructure, 2.1, 7.1

Innocence of Muslims (video), 4.1, 6.1

innovation

Institute of Electrical and Electronics Engineers, n

insurance, for online reputation

integrated clothing machine

intellectual property, 2.1, 3.1

intelligence

intelligent pills

internally displaced persons (IDP), 7.1, 7.2

International Criminal Court, 6.1, 7.1, 7.2

internationalized domain names (IDN)

International Telecommunications Union

Internet, 2.1, 6.1, 6.2, 6.3, 6.4

Balkanization of

as becoming cheaper

and changing understanding of life

impact of

as network of networks

Internet asylum seekers

Internet Corporation for Assigned Names and Numbers (ICANN)

internet protocol (IP) activity logs

internet protocol (IP) address, 3.1, 3.2, 6.1

Internet service provider (ISP), 3.1, 3.2, 6.1, 7.1

Iran, 2.1, 2.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 5.1, 6.1, 6.2, 6.3, 7.1

cyber warfare on

“halal Internet” in

Iraq, itr.1, 3.1, 4.1, 6.1, 6.2

reconstruction of, 7.1, 7.2

Ireland

iRobot

Islam

Israel, 3.1, 3.2, 3.3, 3.4, 6.1, 6.2, 6.3

iTunes

Japan, 3.1, 6.1n, 246

earthquake in

Jasmine Revolution

JavaOne Conference

Jebali, Hamadi

Jibril, Mahmoud

Jim’ale, Ali Ahmed Nur

Join the Club: How Peer Pressure Can Transform the World (Rosenberg), 4.1

Joint Tactical Networking Center

Joint Tactical Radio System

Julius Caesar

justice system

Kabul

Kagame, Paul, 7.1, 7.2

Kansas State University

Karzai, Hamid

Kashgari, Hamza

Kaspersky Lab

Kenya, 3.1, 7.1, 7.2

Khan Academy

Khartoum

Khodorkovsky, Mikhail

Khomeini, Ayatollah

Kickstarter

kidnapping, 2.1, 5.1

virtual

Kinect

Kissinger, Henry, 4.1, 4.2

Kiva, 7.1, 7.2, 7.3

Klein, Naomi, n

Kony 2012, 7.1

Koran

Koryolink

“kosher Internet,” 187

Kosovo

Kurds, 3.1, 3.2, 4.1

Kurzweil, Ray

Kyrgyzstan

Laârayedh, Ali

Lagos

language translation, 1.1, 4.1, 4.2

laptops

Latin America, 3.1, 4.1, 4.2, 5.1

law enforcement

Law of Accelerating Returns

Lebanon, 5.1, 7.1, 7.2

Lee Hsien Loong

legal options, coping strategies for privacy and security concerns

legal prosecution

Lenin, Vladimir

Levitt, Steven D.

Libya, 4.1, 4.2, 4.3, 6.1, 7.1, 7.2

life expectancy

Lindhout, Amanda

LinkedIn

Link Egypt

litigation

lobbying groups

Lockhart, Clare, n

Lockheed Martin

Lord’s Resistance Army

loyalties, 2.1, 2.2

LulzSec

Maasai, 1.1, nts.1

McAfee, John

McChrystal, Stanley

Malaysia, 3.1, 4.1, 6.1n

Mali, 2.1, 7.1

malware

state-initiated, 2.1, 2.2

Mandela, Nelson

“man-in-the-middle” attacks

Manning, Bradley

Mao Zedong

MasterCard, 5.1, 5.2

Mauritania, 3.1, 3.2

Mbeki, Thabo

MCI

Mechanical Turk

media:

disaggregated

mainstream

media cycles

medicine

Megaupload

Mehr, 95

memory prosthetics

Mexico, 2.1, 5.1, 6.1

microblogs

microphones

Microsoft, 1.1, 3.1, 3.2

Middle East

military-industrial complex

Milošević, Slobodan

mine-resistant, ambush-protected (MRAP) vehicles

Ministry of Posts and Telecommunications, North Korea

minority groups, 6.1, con.1

Minority Report (film), 1.1

misinformation, 3.1, 3.2, 6.1

MIT Media Lab

Mitnick, Kevin, n

Mobile Giving Foundation

“mobile health” revolution

mobile money credits

mobile phones, 1.1, 4.1, 5.1, 5.2, 5.3, 7.1, 7.2, con.1

banned in Iraq

in Congo

education and

health and

see also smart phones

Money for Good report, nts.1

Mongolia

Monopoly (film), 4.1

monuments

Moore’s Law, itr.1, con.1

moral sense

Moro Islamic Liberation Front

Morsi, Mohamed

Motorola

MTC-Vodafone

Mubarak, Hosni, 3.1, 3.2, 4.1, 4.2, 4.3, 7.1

Mugabe, Robert

multilayer backup systems

Mumbai attacks

Mundie, Craig, 3.1, 3.2, 3.3

Muslim Brotherhood, 4.1, 4.2, 4.3

Mutua, Anthony

myths

names, 2.1, nts.1

Napster

narco-terrorists, 5.1, 5.2

nasal implants

Natanz nuclear enrichment facility

National Security Agency (NSA)

National Security Law

National Transitional Council (NTC)

NATO, 3.1, 4.1, 5.1, 6.1, 6.2, 6.3

Navalny, Alexei

Navy SEAL Team Six, 5.1, 5.2

Nawaz, Maajid

near-permanent data storage

Neda video, 6.1, 6.2

Netflix

Netherlands

net neutrality

Nevada

New York City subway, n

New York Times, 33, 3.1, 3.2, 4.1, 5.1, 7.1

New York Times Magazine, 197

NGO Ratings

Nigeria

Nightmare

Nixon, Richard

noise

Nokia Siemens Networks (NSN)

nongovernmental organizations (NGOs), 1.1, 2.1, 2.2, 3.1, 6.1, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, con.1, nts.1

nonprofits

non-state actors, coping strategies for privacy and security concerns

Noor Group, n

North Korea, 2.1, 3.1, 3.2, 3.3

Northrop Grumman

Norway

Nuclear Nonproliferation Treaty

Obama, Barack, 3.1, 3.2, 6.1

unauthorized leaks and

official profiles

Ohio State University

Olympic Games (attack code name)

One World Trust

online cadastral systems

online reputations

active management of

black markets in

insurance for

open networks

open-source movement

open-source software, 6.1, 7.1

Operation Avenge Assange

optimism

options

Orascom, 3.1, 3.2

Otpor

Ottoman empire, 6.1, 7.1

outsourcing

oversights

OxOmar

PackBot

Pakistan, 3.1, 3.2, 4.1, 5.1, 5.2, 5.3, 5.4, 6.1

Palestinian Islamic Jihad

paparazzi

Paraguay

parents

Parrot

passwords, 2.1, 2.2

patents

PayPal, 5.1, 5.2

peer-to-peer (P2P) networking, 2.1, 4.1, nts.1

Philanthropedia

philanthropic organizations

Philippines, 3.1, 4.1

photographs

photonics

photos

physical infrastructure

Picciolini, Christian

Pinker, Steven