The New Digital Age

Home > Other > The New Digital Age > Page 41
The New Digital Age Page 41

by Jared Cohen


  Mali, 2.1, 7.1

  malware

  state-initiated, 2.1, 2.2

  Mandela, Nelson

  “man-in-the-middle” attacks

  Manning, Bradley

  Mao Zedong

  MasterCard, 5.1, 5.2

  Mauritania, 3.1, 3.2

  Mbeki, Thabo

  MCI

  Mechanical Turk

  media:

  disaggregated

  mainstream

  media cycles

  medicine

  Megaupload

  Mehr, 95

  memory prosthetics

  Mexico, 2.1, 5.1, 6.1

  microblogs

  microphones

  Microsoft, 1.1, 3.1, 3.2

  Middle East

  military-industrial complex

  Milošević, Slobodan

  mine-resistant, ambush-protected (MRAP) vehicles

  Ministry of Posts and Telecommunications, North Korea

  minority groups, 6.1, con.1

  Minority Report (film), 1.1

  misinformation, 3.1, 3.2, 6.1

  MIT Media Lab

  Mitnick, Kevin, n

  Mobile Giving Foundation

  “mobile health” revolution

  mobile money credits

  mobile phones, 1.1, 4.1, 5.1, 5.2, 5.3, 7.1, 7.2, con.1

  banned in Iraq

  in Congo

  education and

  health and

  see also smart phones

  Money for Good report, nts.1

  Mongolia

  Monopoly (film), 4.1

  monuments

  Moore’s Law, itr.1, con.1

  moral sense

  Moro Islamic Liberation Front

  Morsi, Mohamed

  Motorola

  MTC-Vodafone

  Mubarak, Hosni, 3.1, 3.2, 4.1, 4.2, 4.3, 7.1

  Mugabe, Robert

  multilayer backup systems

  Mumbai attacks

  Mundie, Craig, 3.1, 3.2, 3.3

  Muslim Brotherhood, 4.1, 4.2, 4.3

  Mutua, Anthony

  myths

  names, 2.1, nts.1

  Napster

  narco-terrorists, 5.1, 5.2

  nasal implants

  Natanz nuclear enrichment facility

  National Security Agency (NSA)

  National Security Law

  National Transitional Council (NTC)

  NATO, 3.1, 4.1, 5.1, 6.1, 6.2, 6.3

  Navalny, Alexei

  Navy SEAL Team Six, 5.1, 5.2

  Nawaz, Maajid

  near-permanent data storage

  Neda video, 6.1, 6.2

  Netflix

  Netherlands

  net neutrality

  Nevada

  New York City subway, n

  New York Times, 33, 3.1, 3.2, 4.1, 5.1, 7.1

  New York Times Magazine, 197

  NGO Ratings

  Nigeria

  Nightmare

  Nixon, Richard

  noise

  Nokia Siemens Networks (NSN)

  nongovernmental organizations (NGOs), 1.1, 2.1, 2.2, 3.1, 6.1, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, con.1, nts.1

  nonprofits

  non-state actors, coping strategies for privacy and security concerns

  Noor Group, n

  North Korea, 2.1, 3.1, 3.2, 3.3

  Northrop Grumman

  Norway

  Nuclear Nonproliferation Treaty

  Obama, Barack, 3.1, 3.2, 6.1

  unauthorized leaks and

  official profiles

  Ohio State University

  Olympic Games (attack code name)

  One World Trust

  online cadastral systems

  online reputations

  active management of

  black markets in

  insurance for

  open networks

  open-source movement

  open-source software, 6.1, 7.1

  Operation Avenge Assange

  optimism

  options

  Orascom, 3.1, 3.2

  Otpor

  Ottoman empire, 6.1, 7.1

  outsourcing

  oversights

  OxOmar

  PackBot

  Pakistan, 3.1, 3.2, 4.1, 5.1, 5.2, 5.3, 5.4, 6.1

  Palestinian Islamic Jihad

  paparazzi

  Paraguay

  parents

  Parrot

  passwords, 2.1, 2.2

  patents

  PayPal, 5.1, 5.2

  peer-to-peer (P2P) networking, 2.1, 4.1, nts.1

  Philanthropedia

  philanthropic organizations

  Philippines, 3.1, 4.1

  photographs

  photonics

  photos

  physical infrastructure

  Picciolini, Christian

  Pinker, Steven

  piracy (online)

  Pirate Bay, 2.1, 3.1

  pirates

  Plataforma México

  Poland, 4.1, 7.1

  police

  police brutality

  police cars

  popular uprisings

  pornography

  postcrisis societies, 3.1, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 7.10

  poverty

  power, centralization of

  power grids

  Powers, Jonathan

  power vacuums

  precision geo-location

  Predator drones

  predictive analytics

  Presidential Records Act

  privacy, itr.1, 2.1, 2.2, 2.3

  in autocracies

  company policy on, 2.1, 2.2

  litigation and

  in schools

  security vs., itr.1, 5.1, 5.2

  private telecommunications companies

  processors

  productivity, 1.1, 1.2

  Project Glass

  property rights

  Proteus Digital Health

  proxy servers

  Psy, n

  PTSD

  Pul-e-Charkhi prison

  Putin, Vladimir

  Qatar

  quality of life, 1.1, 1.2

  Queen Boat, n

  racism

  radio frequency identification (RFID) chips

  Raytheon

  real-time collective editing

  Reaper drones

  reconstruction

  connectivity and, 7.1, 7.2

  of telecommunications

  Red Cross, 7.1, 7.2

  refugee camps

  REM cycle

  remote warfare

  Renesys, n

  renrou sousuo yinqing, 197

  Reporters Without Borders

  Reputation.com

  Research in Motion (RIM), 2.1, 2.2

  Resource 207

  Responsibility to Protect (RtoP) doctrine

  restraining orders

  Revolutionary Armed Forces of Colombia (FARC)

  revolutions, itr.1, 4.1

  connectivity and, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6

  finish of

  public awareness of

  start of

  robotic surgical suites, n

  robots, 1.1, 1.2, 6.1, 6.2, 6.3, 6.4, 6.5

  Rodong Sinmun, 97

  Roma, 6.1, nts.1

  Romania

  Roomba, 1.1, 6.1

  Rosenberg, Tina

  Roshan

  Ross, Alec

  routers

  RQ-170 Sentinel

  Rubin, Andy

  Russia, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6

  liberal opposition in

  revolution in

  state-owned media in

  Rwanda

  genocide in, 6.1, 7.1

  safe zones

  sakoku, 93

  Salafis, n

  Saleh, Ali Abdullah

  Salem, Mahmoud

  Samasource

  Sanger, David E.

  Sarkozy, Nicolas

>   satellite positioning

  Saud, Alwaleed bin Talal al-

  Saudi Arabia, 2.1, 2.2, 3.1, 4.1, 6.1

  “Saudi People Demand Hamza Kashgari’s Execution, The” (Facebook group)

  Save the Children

  scale effects

  Schengen Agreement

  Scott-Railton, John

  search-engine optimization (SEO), n

  secession movements

  secure sockets layer (SSL)

  security, 2.1, 2.2, 2.3, 2.4

  in autocracies

  censorship and

  company policy on, 2.1, 2.2

  privacy vs., itr.1, 5.1, 5.2

  in schools

  selective memory

  self-control

  self-driving cars, itr.1, 1.1, 1.2

  September 11, 2001, terrorist attacks of, 3.1, 5.1

  Serbia, 4.1, 6.1

  servers

  Shafik, Ahmed

  shanzhai network, 1.1

  sharia

  Shia Islam

  Shia uprising

  Shiites

  Shock Doctrine, The (Klein), 7.1n

  short-message-service (SMS) platform, 4.1, 7.1

  Shukla, Prakash

  Sichuan Hongda

  SIM cards, 5.1, 5.2, 5.3, 6.1, 6.2, nts.1

  Singapore, 2.1, 4.1

  Singer, Peter, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8

  singularity

  SkyGrabber

  Skype, 2.1, 2.2, 2.3, 3.1, 5.1

  sleeping rhythms

  Slim Helú, Carlos

  smart phones, itr.1, 1.1, 1.2, 5.1, 5.2, 7.1

  in failed states

  peer-to-peer capability on

  Snapchat

  Snoad, Nigel

  social networking, 2.1, 4.1, 5.1

  social-networking profiles

  social prosthetics

  social robots

  “socioeconomically at risk” people

  Solidarity

  Somalia, 2.1, 5.1, 5.2, 5.3, 6.1n, 210, 7.1, 7.2, 7.3

  Sony

  South Africa, 4.1, 7.1

  South Central Los Angeles

  Southern African Development Community (SADC)

  South Korea, 3.1, 3.2

  South Sudan

  Soviet Union, 4.1, 6.1

  Spain

  Speak2Tweet

  Special Weapons Observation Reconnaissance Detection System (SWORDS), 6.1, 6.2

  speech-recognition technology

  spoofing

  Spotify

  Sputnik

  spyware, 3.1, 6.1

  Stanford University

  statecraft

  State Department, U.S., 5.1, 7.1

  states:

  ambition of

  future of

  Storyful, n

  Strategic Arms Limitation Talks (SALT)

  Stuxnet worm, 3.1, 3.2

  suborbital space travel

  Sudan

  suggestion engines

  Summit Against Violent Extremism

  Sunni Web

  supersonic tube commutes

  supplements

  supply chains

  Supreme Council of the Armed Forces (SCAF)

  surveillance cameras

  Sweden

  switches

  Switzerland

  synthetic skin grafts

  Syria, 2.1, 3.1, 4.1, 4.2

  uprising in

  Syrian Telecommunications Establishment

  tablets, 1.1, 1.2, 7.1

  holographic

  Tacocopter

  Tahrir Square, 4.1, 4.2, 4.3

  Taiwan

  Taliban, 2.1, 5.1, 7.1

  TALON

  Tanzania

  technology companies, 2.1, 3.1

  Tehran

  Telecom Egypt

  telecommunications, reconstruction of

  telecommunications companies

  Télécoms Sans Frontières

  television

  terrorism, terrorists, 4.1, 5.1, con.1

  chat rooms of

  connectivity and

  cyber, 3.1n, 153–5, 5.1

  hacking by

  Thailand

  Thomson Reuters Foundation

  thought-controlled robotic motion

  3-D printing, 1.1, 2.1, 2.2, 5.1

  thumbprints

  Tiananmen Square protest, 3.1, 4.1

  Tibet

  time zones

  tissue engineers

  to-do lists

  Tor service, 2.1, 2.2, 2.3, 3.1, 5.1n

  Total Information Awareness (TIA)

  trade

  transmission towers

  transparency, 2.1, 4.1

  “trespass to chattels” tort, n

  Trojan horse viruses, 2.1, 3.1

  tsunami

  Tuareg fighters

  Tumblr

  Tunisia, 4.1, 4.2, 4.3, 4.4, 4.5

  Turkey, 3.1, 3.2, 4.1, 5.1, 6.1

  Tutsis

  Twa

  Twitter, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 4.1, 4.2, 5.1, 5.2, 6.1, 7.1, 7.2, nts.1

  Uganda

  Uighurs, 3.1, 6.1

  Ukraine

  unemployment

  UNESCO World Heritage Centre

  unique identification (UID) program

  United Arab Emirates, 2.1, 2.2, 2.3

  United Kingdom, 2.1, 2.2, 2.3, 3.1

  United Nations, 4.1, 5.1, 6.1, 7.1

  United Nations Security Council, 3.1n, 214, 7.1

  United Russia party

  United States, 3.1, 3.2, 3.3, 4.1, 5.1, 7.1

  engineering sector in

  United States Agency for International Development (USAID)

  United States Cyber Command (USCYBERCOM)

  unmanned aerial vehicles (UAVs), 6.1, 6.2, 6.3, 6.4, 6.5

  Ürümqi riots

  user-generated content

  Ushahidi

  vacuuming, 1.1, 1.2

  Valspar Corporation

  Venezuela, 2.1, 2.2, 6.1

  verification

  video cameras

  video chats

  video games

  videos

  Vietcong

  Vietnam

  vigilantism

  violence

  virtual espionage

  virtual governance

  virtual identities, itr.1, 2.1, 2.2

  virtual juvenile records

  virtual kidnapping

  virtual private networks (VPNs), 2.1, 3.1

  virtual reality

  virtual statehood

  viruses

  vitamins

  Vodafone, 4.1, 7.1

  Vodafone/Raya

  voice-over-Internet-protocol (VoIP) calls, 2.1, 5.1

  voice-recognition software, 1.1, 2.1, 5.1

  Voilà

  VPAA statute, n

  Walesa, Lech

  walled garden

  Wall Street Journal, 97

  war, itr.1, itr.2, 6.1

  decline in

  Wardak, Abdul Rahim

  warfare:

  automated

  remote

  warlords, 2.1, 2.2

  Watergate

  Watergate break-in

  Waters, Carol

  weapons of mass destruction

  wearable technology

  weibos, 62

  Wen Jiabao

  Wenzhou, China

  West Africa

  whistle-blowers

  whistle-blowing websites

  Who Controls the Internet?: Illusions of a Borderless World (Goldsmith and Wu), 3.1n

  Whole Earth Catalog (Brand), 2.1n

  Wi-Fi networks

  WikiLeaks, itr.1, 2.1, 5.1, 5.2

  Wikipedia, 1.1, 6.1

  wikis

  Windows operating system

  Wingo, Harry

  Wired, 203

  Wired for War: The Robotics Revolution and Conflict in the 21st Century (Singer), 6.1, 6.2

  wisdom of the crowds, 2.1, 6.1
/>   women

  Women2Drive Campaign

  women’s rights

  World Food Program (WFP)

  World Intellectual Property Organization (WIPO), 3.1, 3.2

  World Trade Organization (WTO), 3.1, 3.2

  World War I

  World War II

  World Wide Web, 3.1, 3.2, 3.3

  worms, 3.1, 6.1

  Wu, Tim, n

  Xbox 360 video-game console

  Xi Jinping

  Yahoo!

  Yemen, 2.1, 3.1, 4.1, 5.1, 6.1

  youthful indiscretions

  YouTube, 1.1, 2.1, 3.1, 4.1, 4.2, 5.1, 5.2, 6.1, 6.2, 6.3n, 195

  Zaeim Electronic Industries Co.

  ZANU-PF party

  Zimbabwe, 3.1, 4.1

  Zuma, Jacob

  A Note About the Authors

  Eric Schmidt is executive chairman of Google, where he served as chief executive officer from 2001 to 2011. A member of the President’s Council of Advisors on Science and Technology, Schmidt also chairs the board of the New America Foundation and is a trustee of the Institute for Advanced Study in Princeton, New Jersey.

  Jared Cohen is director of Google Ideas and an Adjunct Senior Fellow at the Council on Foreign Relations. He is a Rhodes Scholar and the author of several books, including Children of Jihad and One Hundred Days of Silence. He is a member of the Director’s Advisory Board at the National Counterterrorism Center.

  Follow: @JaredCohen, @ericschmidt

  For more information, please visit www.aaknopf.com

  ALSO BY JARED COHEN

  Children of Jihad: A Young American’s Travels

  Among the Youth of the Middle East

  One Hundred Days of Silence: America

  and the Rwanda Genocide

  FB2 document info

  Document ID: 6db9f5ea-9d9d-48f1-8846-00f06b04c111

  Document version: 1

  Document creation date: 27.8.2013

  Created using: calibre 0.9.22 software

  Document authors :

  Jared Cohen

  Eric Schmidt

  About

  This file was generated by Lord KiRon's FB2EPUB converter version 1.1.5.0.

  (This book might contain copyrighted material, author of the converter bears no responsibility for it's usage)

  Этот файл создан при помощи конвертера FB2EPUB версии 1.1.5.0 написанного Lord KiRon.

  (Эта книга может содержать материал который защищен авторским правом, автор конвертера не несет ответственности за его использование)

  http://www.fb2epub.net

  https://code.google.com/p/fb2epub/

 

 

 


‹ Prev