INDEX
Aadhaar
Abbottabad, Pakistan, 2.1, 5.1
Abkhaz nationalists
Abuja, Nigeria
Academi, LLC
accountability, 2.1, 4.1, 6.1, 7.1
activist groups
additive manufacturing
Advanced Research Projects Agency (ARPA), n
Afghanistan, 1.1, 4.1, 5.1, 5.2, 5.3, 6.1, 6.2, 7.1
reconstruction of, 7.1, 7.2, 7.3
Africa, 3.1, 4.1, 4.2
African Americans
African National Congress (ANC)
African Sahel
African Union
Age of Spiritual Machines, The: When Computers Exceed Human Intelligence (Kurzweil), con.1
Agha-Soltan, Neda
Agie, Mullah Akbar
Agreement on Trade-Related Aspects of Intellectual Property Rights (1994)
Ahmadinejad, Mahmoud
al-Aqsa Martyrs Brigades
al-Assad, Bashar
Alcatel-Lucent
AlertNet
Algeria, 3.1, 4.1
alienation
Al Jazeera
al-Qaeda, 5.1, 5.2, 5.3, 5.4, 5.5, con.1
al-Shabaab, 2.1, 5.1, 7.1, 7.2
Amazon, itr.1, 1.1, 1.2
data safeguarded by
Amazon Web Services
American Sentinel drone
Android
anonymity, 2.1, 3.1, 4.1
Anonymous, 5.1, 5.2
Anti-Ballistic Missile Treaty
antiradicalization
antiterrorism units, 5.1, 5.2, 5.3, 5.4
Apple, itr.1, 5.1
data safeguarded by
apps, 2.1, 5.1
Arab Spring, itr.1, 4.1, 4.2, 4.3, 4.4, 4.5
AR.Drone quadricopter
Argentina
Armenia
arms-for-minerals trade
arrests
artificial intelligence (AI), itr.1, 1.1
artificial pacemakers
Asia
Asia-Pacific Economic Cooperation (APEC)
Assange, Julian, 2.1, 2.2, 2.3, 2.4, 5.1
Astroturfing
Atatürk, Mustafa Kemal, 3.1, 3.2
Athar, Sohaib, n, 269
ATMs
augmented reality (AR), itr.1, 2.1
autocracies, 2.1, 3.1, 3.2
data revolution in
dissent in
information shared by
online discussions in
Ayalon, Danny
Baghdad
Baghdad Museum
Bahrain
Baidu.com, n
Bamiyan Buddhas
Bangladesh
bank loans
Basque separatists
Batbold, Sukhbaatar
battery life
Bechtel
Belarus
Belgium
Ben Ali, Zine el-Abidine, 4.1, 4.2
Berezovsky, Boris
Better Angels of Our Nature, The (Pinker), 6.1
big data challenge
Bill of Guarantees
bin Laden, Osama, 2.1, 5.1, 5.2, 6.1, nts.1
biometric information, 2.1, 2.2, 6.1, 6.2, 6.3
Bitcoin, 2.1, nts.1
BlackBerry Messenger (BBM), 2.1, 2.2, 4.1, 5.1
Black Hat
Blackwater
Blockbuster, n
Bloomberg News
Bluetooth, 2.1, 2.2, 6.1
body scan
body temperatures
Boko Haram
Bosnia
brand
Brand, Stewart, n
Brazil, 5.1, 5.2, 5.3
Bush, George H. W., n
Bush, George W.
Cain, Herman
calendar reminders
California
camera phones
Cameron, David
Canada
Carnegie Mellon
Carvin, Andy
celebrities, 2.1, 2.2
cell towers
censorship, 5.1, 6.1
censorship-circumvention applications
Central Asia
centralized authority
Chalabi, Ahmed
charities
Charity Navigator, 7.1, nts.1
Chavez, Hugo
Chechnya, 3.1, 3.2
Chemical Weapons Convention
Cherry, Steven, n
Chery Automobiles
Chile, 3.1, 6.1
China, 2.1, 3.1, 3.2, 3.3n, 141, 4.1, 6.1, 7.1
censorship in
cyber attacks of, itr.1, 3.1, 3.2
“human-flesh search engines” in, 6.1, 6.2
intellectual property in
Internet in, 3.1, 4.1
news covered up in
shanzhai network in, 1.1
choices
cholera
Christian Science Monitor, 209
Church of Scientology
CIA, 5.1, con.1
circulatory system
Cisco
citizen journalism
citizen participation
citizenship
Clarke, Richard
Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)
Clinton, Bill
Clinton, Hillary, itr.1, 4.1
closed-circuit television (CCTV)
cloud-based data storage, 2.1, 2.2, 2.3
cloud storage
CNN Effect, n
Coalition Provisional Authority (CPA)
Code War
Cohen, Rebecca
Colao, Vittorio, 4.1, 4.2, 7.1
Cold War, 3.1, 6.1, 6.2
collaboration
collective editing
Colombia, 5.1, 7.1
commerce, 2.1, 6.1
commercial opportunities
Commonwealth of Independent States (CIS)
communications
communication technologies
advance of
cultural breakthroughs and
Comodohacker
computer modeling, n
computer theft
computer viruses, in Syria
computer worms
confirmation bias
conflict-related internal migration
Congo, 1.1, nts.1
warlords in
connectivity, itr.1, itr.2, itr.3, 1.1, 1.2, 1.3, 1.4, 2.1, con.1
and decline of warfare, 6.1, 6.2
education and
and end of control
exiles and
and government maneuverability
health and
news enhanced by
obstacles to
reconstruction and, 7.1, 7.2
revolutions and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6
for states and citizens
states’ power enhanced by
terrorism aided by
and WikiLeaks-like platforms
Constantine, Larry, n
Constitutional Democratic Rally
copper cables
copyright, 2.1, 2.2, 3.1
Copyright Act (1987)
Copyright Treaty (1996)
corporations, coping strategies for privacy and security concerns
corruption
Côte d’Ivoire
counter-radicalization. See antiradicalization
counterterrorism, 5.1, 5.2, 5.3, 5.4
criminals, 2.1, con.1
criminal syndicates
cross-border weapon-smuggling networks
crowd-sourcing
Cruise, Tom
crystal chips
Cuba
cultural nuance
Currygate
cyber attacks, 3.1, 3.2n, 105, 3.3, 5.1, 6.1
lack of attribution in
cyber-bullying
Cyber Fast Track
cybersecurity
cyber terrorism, 3.1n, 153–5, 5.1
cyber warfare, itr.1, 3.1
see also Code War
Dagan, Meir, n
Dalai Lama, 3.1, 3.2
Danger Room blog
Danish cartoon controversy
data, 1.1, con.1
alleged deletion of
databases
data-mining, n, 77
data permanence, 2.1, 6.1, 6.2
data remanence
data revolution, 2.1, 2.2
deep-packet inspection
deep think
Def Con
Defense Advanced Research Projects Agency (DARPA), 3.1, 5.1, 6.1, 6.2, 6.3
Defense Department, U.S., 5.1, 6.1, 6.2
democracy, 2.1, 2.2
protests in
wisdom of crowds in
denial-of-service (DoS) attacks, 3.1, 5.1
Der Spiegel, 179
developing countries
development
diasporas
Dictator’s Learning Curve, The (Dobson), 2.1
Digicel
DigiNotar
digital activism
digital currency
digital marketing, 6.1, 6.2
digital textbooks
digital verification
digital watermarking, 2.1, 6.1
diplomacy, itr.1, 2.1
direct attacks
disarmament, demobilization and reintegration (DDR) program
discretionary power
discrimination
disease detection
disinformation campaigns
dissidents, 2.1, con.1
distributed denial-of-service (DDoS attacks), 2.1, 3.1, 3.2, 3.3n, 162, 6.1
DNA, 1.1, 2.1
Dobson, William J.
document loss
documents
domain name system (DNS), 3.1, 3.2
Downey, Tom
“driver-assist” approach
driverless cars, itr.1, 1.1, 1.2
drones, 5.1, 5.2, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6
drugs, negative reactions to
Dubner, Stephen J.
Dugan, Regina, 3.1, 5.1, 6.1
Duggan, Mark
DuPont
East Africa
Eastern Europe
East India Company
e-banking, 3.1, 3.2
e-commerce, 3.1, 3.2, 5.1
economic crash, 2008, 2.1
economics, data about
Economist, 96–7
education, 1.1, 1.2, 2.1, 2.2
data about
privacy in
security in
efficiency
e-government
Egypt, 3.1, 4.1, 4.2, 4.3, 4.4, 4.5, 6.1n
Egyptian Credit Bureau, n
Egyptian Stock Exchange, n
El Al Airlines
election irregularity
elections, U.S., 2012, 4.1
elections, Venezuela
electricity
Emergency Information Service
empathy
encryption, 2.1, 2.2, 2.3, 4.1
Ennahda party
entertainment
Equatorial Guinea
Ericsson, 3.1, 3.2
Eritrea
Estonia, 3.1, 6.1
Ethiopia
Etisalat
Etisalat Misr
European Commission
European Union, 2.1, 3.1, 4.1
evolution, 3.1, con.1
exiles
expectations gap
explosive-ordnance-disposal (EOD) robots
extortionists
Facebook, itr.1, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 4.1, 5.1, 5.2, 6.1, 6.2
data safeguarded by
facial-recognition software, 2.1, 2.2, 6.1, con.1
failed states
FARC
Farmer, Paul
FBI, 2.1, 5.1
Ferrari, Bruno
fiber-optic cables, itr.1, 3.1, 4.1, 4.2
filtering, 2.1, 3.1
financial blockades
fingerprinting
Finland
Fixing Failed States (Lockhart and Ghani), 7.1n
Flame virus, 3.1, 3.2
Food and Drug Administration
food prices
foreign aid
forgetfulness
Forum on China-Africa Cooperation (FOCAC)
Foster-Miller
4G, 7.1, 7.2
France, 6.1, 7.1, nts.1
Freakonomics (Levitt and Dubner), 2.1
Fred
freedom of assembly
free expression
free information
French Data Network
Fukushima nuclear crisis, n
gacaca, 249–50
Gadhafi, Muammar, 4.1, 4.2, 7.1
Gallic Wars
“Gangnam Style,” 24n
Gates, Robert
Gaza
General Motors
genocide
virtual
genome sequencing
geography
Georgia (country)
Georgia (state)
Germany
gesture-recognition technology
Ghana
Ghani, Ashraf, n
GiveWell
globalization, 1.1, 3.1
Global System for Mobile Communications (GSM)
Goldsmith, Jack, n
Google, itr.1, 2.1, 3.1, 3.2, 3.3n, 163, 5.1, 7.1
Chinese cyber attacks on, itr.1, 3.1, 3.2
data safeguarded by
driverless cars of
Project Glass in
tweet-by-phone service of
Google App Engine
Google Earth
Google Ideas
Google Map Maker
Google Maps, 6.1, nts.1
Google+
Google Voice
GPS, 6.1, 6.2, 6.3
GPS data
Great Firewall of China, 3.1, 3.2
GreatNonprofits
Green Revolution
GuideStar
hackers, 2.1, 2.2, 5.1, 5.2, 6.1
Hackers’ Conference, n
hacktivists
Hague, 6.1, 7.1, 7.2
haircuts
Haiti, itr.1, 7.1, 7.2, 7.3
Haiti After the Earthquake (Farmer), 7.1
Hama, Syria
Hamas, 5.1, 5.2, 6.1
Han Chinese
handheld mobile devices
Hanseatic League
haptic technology, 1.1, 2.1n, 203–4
harassment, 6.1, 6.2
hard-drive crashes
hawala, 69
Hayden, Michael V.
health, 1.1, 1.2
data about
health care, 2.1, 2.2
heart rate
Hezbollah, 5.1, 5.2
hidden people
high-quality LCD screens
hijacking accounts
hive mind
Hizb ut-Tahrir
Holbrooke, Richard
Holocaust denial
holographic “avatars,” 29
holographic projections, 1.1, 1.2, 2.1, 2.2, 4.1
holographic “tablets,” 29
Homeland Security Department, U.S.
Hormuud
https encryption protocols
Huawei
human rights, 1.1, 3.1
humiliation
Hussein, Saddam, itr.1, 7.1, 7.2, 7.3, 7.4
Hutus
Identity Cards Act
identity theft
identity-theft protection, 2.1, 2.2
IEDs (improvised explosive devices), 5.1, 6.1
IEEE Spectrum, 107n
income inequality, 1.1, 4.1
India, 2.1, 2.2, 3.1
individuals, transfer of power to
Indonesia
infiltration
information
blackouts of
exchange of
free movement of
see also specific information technologies
Information and Communications Technologies Authority
Information Awareness Office
information-technology (IT) security experts
infrastructure, 2.1, 7.1
Innocence of Muslims (video), 4.1, 6.1
innovation
Institute of Electrical and Electronics Engineers, n
insurance, for online reputation
integrated clothing machine
intellectual property, 2.1, 3.1
intelligence
intelligent pills
internally displaced persons (IDP), 7.1, 7.2
International Criminal Court, 6.1, 7.1, 7.2
internationalized domain names (IDN)
International Telecommunications Union
Internet, 2.1, 6.1, 6.2, 6.3, 6.4
Balkanization of
as becoming cheaper
and changing understanding of life
impact of
as network of networks
Internet asylum seekers
Internet Corporation for Assigned Names and Numbers (ICANN)
internet protocol (IP) activity logs
internet protocol (IP) address, 3.1, 3.2, 6.1
Internet service provider (ISP), 3.1, 3.2, 6.1, 7.1
Iran, 2.1, 2.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 5.1, 6.1, 6.2, 6.3, 7.1
cyber warfare on
“halal Internet” in
Iraq, itr.1, 3.1, 4.1, 6.1, 6.2
reconstruction of, 7.1, 7.2
Ireland
iRobot
Islam
Israel, 3.1, 3.2, 3.3, 3.4, 6.1, 6.2, 6.3
iTunes
Japan, 3.1, 6.1n, 246
earthquake in
Jasmine Revolution
JavaOne Conference
Jebali, Hamadi
Jibril, Mahmoud
Jim’ale, Ali Ahmed Nur
Join the Club: How Peer Pressure Can Transform the World (Rosenberg), 4.1
Joint Tactical Networking Center
Joint Tactical Radio System
Julius Caesar
justice system
Kabul
Kagame, Paul, 7.1, 7.2
Kansas State University
Karzai, Hamid
Kashgari, Hamza
Kaspersky Lab
Kenya, 3.1, 7.1, 7.2
Khan Academy
Khartoum
Khodorkovsky, Mikhail
Khomeini, Ayatollah
Kickstarter
kidnapping, 2.1, 5.1
virtual
Kinect
Kissinger, Henry, 4.1, 4.2
Kiva, 7.1, 7.2, 7.3
Klein, Naomi, n
Kony 2012, 7.1
Koran
Koryolink
“kosher Internet,” 187
Kosovo
Kurds, 3.1, 3.2, 4.1
Kurzweil, Ray
Kyrgyzstan
Laârayedh, Ali
Lagos
language translation, 1.1, 4.1, 4.2
laptops
Latin America, 3.1, 4.1, 4.2, 5.1
law enforcement
Law of Accelerating Returns
Lebanon, 5.1, 7.1, 7.2
Lee Hsien Loong
legal options, coping strategies for privacy and security concerns
legal prosecution
Lenin, Vladimir
Levitt, Steven D.
Libya, 4.1, 4.2, 4.3, 6.1, 7.1, 7.2
life expectancy
Lindhout, Amanda
Link Egypt
litigation
lobbying groups
Lockhart, Clare, n
Lockheed Martin
Lord’s Resistance Army
loyalties, 2.1, 2.2
LulzSec
Maasai, 1.1, nts.1
McAfee, John
McChrystal, Stanley
Malaysia, 3.1, 4.1, 6.1n
Mali, 2.1, 7.1
malware
state-initiated, 2.1, 2.2
Mandela, Nelson
“man-in-the-middle” attacks
Manning, Bradley
Mao Zedong
MasterCard, 5.1, 5.2
Mauritania, 3.1, 3.2
Mbeki, Thabo
MCI
Mechanical Turk
media:
disaggregated
mainstream
media cycles
medicine
Megaupload
Mehr, 95
memory prosthetics
Mexico, 2.1, 5.1, 6.1
microblogs
microphones
Microsoft, 1.1, 3.1, 3.2
Middle East
military-industrial complex
Milošević, Slobodan
mine-resistant, ambush-protected (MRAP) vehicles
Ministry of Posts and Telecommunications, North Korea
minority groups, 6.1, con.1
Minority Report (film), 1.1
misinformation, 3.1, 3.2, 6.1
MIT Media Lab
Mitnick, Kevin, n
Mobile Giving Foundation
“mobile health” revolution
mobile money credits
mobile phones, 1.1, 4.1, 5.1, 5.2, 5.3, 7.1, 7.2, con.1
banned in Iraq
in Congo
education and
health and
see also smart phones
Money for Good report, nts.1
Mongolia
Monopoly (film), 4.1
monuments
Moore’s Law, itr.1, con.1
moral sense
Moro Islamic Liberation Front
Morsi, Mohamed
Motorola
MTC-Vodafone
Mubarak, Hosni, 3.1, 3.2, 4.1, 4.2, 4.3, 7.1
Mugabe, Robert
multilayer backup systems
Mumbai attacks
Mundie, Craig, 3.1, 3.2, 3.3
Muslim Brotherhood, 4.1, 4.2, 4.3
Mutua, Anthony
myths
names, 2.1, nts.1
Napster
narco-terrorists, 5.1, 5.2
nasal implants
Natanz nuclear enrichment facility
National Security Agency (NSA)
National Security Law
National Transitional Council (NTC)
NATO, 3.1, 4.1, 5.1, 6.1, 6.2, 6.3
Navalny, Alexei
Navy SEAL Team Six, 5.1, 5.2
Nawaz, Maajid
near-permanent data storage
Neda video, 6.1, 6.2
Netflix
Netherlands
net neutrality
Nevada
New York City subway, n
New York Times, 33, 3.1, 3.2, 4.1, 5.1, 7.1
New York Times Magazine, 197
NGO Ratings
Nigeria
Nightmare
Nixon, Richard
noise
Nokia Siemens Networks (NSN)
nongovernmental organizations (NGOs), 1.1, 2.1, 2.2, 3.1, 6.1, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, con.1, nts.1
nonprofits
non-state actors, coping strategies for privacy and security concerns
Noor Group, n
North Korea, 2.1, 3.1, 3.2, 3.3
Northrop Grumman
Norway
Nuclear Nonproliferation Treaty
Obama, Barack, 3.1, 3.2, 6.1
unauthorized leaks and
official profiles
Ohio State University
Olympic Games (attack code name)
One World Trust
online cadastral systems
online reputations
active management of
black markets in
insurance for
open networks
open-source movement
open-source software, 6.1, 7.1
Operation Avenge Assange
optimism
options
Orascom, 3.1, 3.2
Otpor
Ottoman empire, 6.1, 7.1
outsourcing
oversights
OxOmar
PackBot
Pakistan, 3.1, 3.2, 4.1, 5.1, 5.2, 5.3, 5.4, 6.1
Palestinian Islamic Jihad
paparazzi
Paraguay
parents
Parrot
passwords, 2.1, 2.2
patents
PayPal, 5.1, 5.2
peer-to-peer (P2P) networking, 2.1, 4.1, nts.1
Philanthropedia
philanthropic organizations
Philippines, 3.1, 4.1
photographs
photonics
photos
physical infrastructure
Picciolini, Christian
Pinker, Steven
piracy (online)
Pirate Bay, 2.1, 3.1
pirates
Plataforma México
Poland, 4.1, 7.1
police
police brutality
police cars
popular uprisings
pornography
postcrisis societies, 3.1, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 7.10
poverty
power, centralization of
power grids
Powers, Jonathan
power vacuums
precision geo-location
Predator drones
predictive analytics
Presidential Records Act
privacy, itr.1, 2.1, 2.2, 2.3
in autocracies
company policy on, 2.1, 2.2
litigation and
in schools
security vs., itr.1, 5.1, 5.2
private telecommunications companies
processors
productivity, 1.1, 1.2
Project Glass
property rights
Proteus Digital Health
proxy servers
Psy, n
PTSD
Pul-e-Charkhi prison
Putin, Vladimir
Qatar
quality of life, 1.1, 1.2
Queen Boat, n
racism
radio frequency identification (RFID) chips
Raytheon
real-time collective editing
Reaper drones
reconstruction
connectivity and, 7.1, 7.2
of telecommunications
Red Cross, 7.1, 7.2
refugee camps
REM cycle
remote warfare
Renesys, n
renrou sousuo yinqing, 197
Reporters Without Borders
Reputation.com
Research in Motion (RIM), 2.1, 2.2
Resource 207
Responsibility to Protect (RtoP) doctrine
restraining orders
Revolutionary Armed Forces of Colombia (FARC)
revolutions, itr.1, 4.1
connectivity and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6
finish of
public awareness of
start of
robotic surgical suites, n
robots, 1.1, 1.2, 6.1, 6.2, 6.3, 6.4, 6.5
Rodong Sinmun, 97
Roma, 6.1, nts.1
Romania
Roomba, 1.1, 6.1
Rosenberg, Tina
Roshan
Ross, Alec
routers
RQ-170 Sentinel
Rubin, Andy
Russia, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6
liberal opposition in
revolution in
state-owned media in
Rwanda
genocide in, 6.1, 7.1
safe zones
sakoku, 93
Salafis, n
Saleh, Ali Abdullah
Salem, Mahmoud
Samasource
Sanger, David E.
Sarkozy, Nicolas
satellite positioning
Saud, Alwaleed bin Talal al-
Saudi Arabia, 2.1, 2.2, 3.1, 4.1, 6.1
“Saudi People Demand Hamza Kashgari’s Execution, The” (Facebook group)
Save the Children
scale effects
Schengen Agreement
Scott-Railton, John
search-engine optimization (SEO), n
secession movements
secure sockets layer (SSL)
security, 2.1, 2.2, 2.3, 2.4
in autocracies
censorship and
company policy on, 2.1, 2.2
privacy vs., itr.1, 5.1, 5.2
in schools
selective memory
self-control
self-driving cars, itr.1, 1.1, 1.2
September 11, 2001, terrorist attacks of, 3.1, 5.1
Serbia, 4.1, 6.1
servers
Shafik, Ahmed
shanzhai network, 1.1
sharia
Shia Islam
Shia uprising
Shiites
Shock Doctrine, The (Klein), 7.1n
short-message-service (SMS) platform, 4.1, 7.1
Shukla, Prakash
Sichuan Hongda
SIM cards, 5.1, 5.2, 5.3, 6.1, 6.2, nts.1
Singapore, 2.1, 4.1
Singer, Peter, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8
singularity
SkyGrabber
Skype, 2.1, 2.2, 2.3, 3.1, 5.1
sleeping rhythms
Slim Helú, Carlos
smart phones, itr.1, 1.1, 1.2, 5.1, 5.2, 7.1
in failed states
peer-to-peer capability on
Snapchat
Snoad, Nigel
social networking, 2.1, 4.1, 5.1
social-networking profiles
social prosthetics
social robots
“socioeconomically at risk” people
Solidarity
Somalia, 2.1, 5.1, 5.2, 5.3, 6.1n, 210, 7.1, 7.2, 7.3
Sony
South Africa, 4.1, 7.1
South Central Los Angeles
Southern African Development Community (SADC)
South Korea, 3.1, 3.2
South Sudan
Soviet Union, 4.1, 6.1
Spain
Speak2Tweet
Special Weapons Observation Reconnaissance Detection System (SWORDS), 6.1, 6.2
speech-recognition technology
spoofing
Spotify
Sputnik
spyware, 3.1, 6.1
Stanford University
statecraft
State Department, U.S., 5.1, 7.1
states:
ambition of
future of
Storyful, n
Strategic Arms Limitation Talks (SALT)
Stuxnet worm, 3.1, 3.2
suborbital space travel
Sudan
suggestion engines
Summit Against Violent Extremism
Sunni Web
supersonic tube commutes
supplements
supply chains
Supreme Council of the Armed Forces (SCAF)
surveillance cameras
Sweden
switches
Switzerland
synthetic skin grafts
Syria, 2.1, 3.1, 4.1, 4.2
uprising in
Syrian Telecommunications Establishment
tablets, 1.1, 1.2, 7.1
holographic
Tacocopter
Tahrir Square, 4.1, 4.2, 4.3
Taiwan
Taliban, 2.1, 5.1, 7.1
TALON
Tanzania
technology companies, 2.1, 3.1
Tehran
Telecom Egypt
telecommunications, reconstruction of
telecommunications companies
Télécoms Sans Frontières
television
terrorism, terrorists, 4.1, 5.1, con.1
chat rooms of
connectivity and
cyber, 3.1n, 153–5, 5.1
hacking by
Thailand
Thomson Reuters Foundation
thought-controlled robotic motion
3-D printing, 1.1, 2.1, 2.2, 5.1
thumbprints
Tiananmen Square protest, 3.1, 4.1
Tibet
time zones
tissue engineers
to-do lists
Tor service, 2.1, 2.2, 2.3, 3.1, 5.1n
Total Information Awareness (TIA)
trade
transmission towers
transparency, 2.1, 4.1
“trespass to chattels” tort, n
Trojan horse viruses, 2.1, 3.1
tsunami
Tuareg fighters
Tumblr
Tunisia, 4.1, 4.2, 4.3, 4.4, 4.5
Turkey, 3.1, 3.2, 4.1, 5.1, 6.1
Tutsis
Twa
Twitter, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 4.1, 4.2, 5.1, 5.2, 6.1, 7.1, 7.2, nts.1
Uganda
Uighurs, 3.1, 6.1
Ukraine
unemployment
UNESCO World Heritage Centre
unique identification (UID) program
United Arab Emirates, 2.1, 2.2, 2.3
United Kingdom, 2.1, 2.2, 2.3, 3.1
United Nations, 4.1, 5.1, 6.1, 7.1
United Nations Security Council, 3.1n, 214, 7.1
United Russia party
United States, 3.1, 3.2, 3.3, 4.1, 5.1, 7.1
engineering sector in
United States Agency for International Development (USAID)
United States Cyber Command (USCYBERCOM)
unmanned aerial vehicles (UAVs), 6.1, 6.2, 6.3, 6.4, 6.5
Ürümqi riots
user-generated content
Ushahidi
vacuuming, 1.1, 1.2
Valspar Corporation
Venezuela, 2.1, 2.2, 6.1
verification
video cameras
video chats
video games
videos
Vietcong
Vietnam
vigilantism
violence
virtual espionage
virtual governance
virtual identities, itr.1, 2.1, 2.2
virtual juvenile records
virtual kidnapping
virtual private networks (VPNs), 2.1, 3.1
virtual reality
virtual statehood
viruses
vitamins
Vodafone, 4.1, 7.1
Vodafone/Raya
voice-over-Internet-protocol (VoIP) calls, 2.1, 5.1
voice-recognition software, 1.1, 2.1, 5.1
Voilà
VPAA statute, n
Walesa, Lech
walled garden
Wall Street Journal, 97
war, itr.1, itr.2, 6.1
decline in
Wardak, Abdul Rahim
warfare:
automated
remote
warlords, 2.1, 2.2
Watergate
Watergate break-in
Waters, Carol
weapons of mass destruction
wearable technology
weibos, 62
Wen Jiabao
Wenzhou, China
West Africa
whistle-blowers
whistle-blowing websites
Who Controls the Internet?: Illusions of a Borderless World (Goldsmith and Wu), 3.1n
Whole Earth Catalog (Brand), 2.1n
Wi-Fi networks
WikiLeaks, itr.1, 2.1, 5.1, 5.2
Wikipedia, 1.1, 6.1
wikis
Windows operating system
Wingo, Harry
Wired, 203
Wired for War: The Robotics Revolution and Conflict in the 21st Century (Singer), 6.1, 6.2
wisdom of the crowds, 2.1, 6.1
women
Women2Drive Campaign
women’s rights
World Food Program (WFP)
World Intellectual Property Organization (WIPO), 3.1, 3.2
World Trade Organization (WTO), 3.1, 3.2
World War I
World War II
World Wide Web, 3.1, 3.2, 3.3
worms, 3.1, 6.1
Wu, Tim, n
Xbox 360 video-game console
Xi Jinping
Yahoo!
Yemen, 2.1, 3.1, 4.1, 5.1, 6.1
youthful indiscretions
YouTube, 1.1, 2.1, 3.1, 4.1, 4.2, 5.1, 5.2, 6.1, 6.2, 6.3n, 195
Zaeim Electronic Industries Co.
ZANU-PF party
Zimbabwe, 3.1, 4.1
Zuma, Jacob