A digital object identifier (DOI) gives an electronic document a unique number. Whenever a publisher has assigned one of these sources a DOI, a number has been provided. If you search a library database or the internet for a source by using this DOI number, you will quickly find the correct document.
Preface
1. Twenty-six billion devices: “Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units by 2020,” Gartner.com, December 12, 2013, accessed September 30, 2014, http://www.gartner.com/newsroom/id/2636073; thirty billion connected devices: ABI Research, “More Than 30 Billion Devices Will Wirelessly Connect to the Internet of Everything in 2020,” May 9, 2013, accessed September 30, 2014, https://www.abiresearch.com/press/more-than-30-billion-devices-will-wirelessly-conne; fifty billion devices and objects: “The Internet of Things,” Cisco, accessed June 16, 2014, http://share.cisco.com/internet-of-things.html; “nanosats”: “Space: The Next Startup Frontier,” Economist, June 7, 2014, accessed September 30, 2014, http://www.economist.com/news/leaders/21603441-where-nanosats-boldly-go-new-businesses-will-followunless-they-are-smothered-excessive; OECD, Building Blocks for Smart Networks, OECD Digital Economy Papers (Paris: Organisation for Economic Co-operation and Development, January 17, 2013), accessed September 30, 2014, http://www.oecd-ilibrary.org/content/workingpaper/5k4dkhvnzv35-en.
2. “The Internet of Things.”
3. Marcus Wohlsen, “What Google Really Gets Out of Buying Nest for $3.2 Billion,” Wired, January 14, 2014, accessed September 30, 2014, http://www.wired.com/2014/01/googles-3-billion-nest-buy-finally-make-internet-things-real-us/.
1. Empire of Connected Things
1. Internet Census 2012: Port Scanning /0 Using Insecure Embedded Devices, 2012, accessed September 15, 2014, http://internetcensus2012.bitbucket.org/paper.html.
2. Edith Penrose and Christos Pitelis, The Theory of the Growth of the Firm (Oxford: Oxford University Press, 2009); “Edith Penrose,” Wikipedia, accessed June 23, 2014, http://en.wikipedia.org/wiki/Edith_Penrose.
3. “Hudson’s Bay Company,” Wikipedia, accessed June 15, 2014, http://en.wikipedia.org/wiki/Hudson’s_Bay_Company; “East India Company (English Trading Company),” Encyclopedia Britannica, accessed June 16, 2014, http://www.britannica.com/EBchecked/topic/176643/East-India-Company.
4. “ITU: Committed to Connecting the World,” accessed June 16, 2014, http://www.itu.int/.
5. “Internet Users in the World,” Internet World Stats: Usage and Population Statistics, June 30, 2012, http://www.internetworldstats.com/stats.htm.
6. “Hooking up,” Economist, January 31, 2013, accessed September 30, 2014, http://www.economist.com/news/international/21571126-new-data-flows-highlight-relative-decline-west-hooking-up.
7. Anne-Marie Slaughter, A New World Order (Princeton: Princeton University Press, 2009).
8. World Affairs Council, “Press Conference” (Regent Beverly Wilshire Hotel, April 19, 1994); Francis Fukuyama, The End of History and the Last Man (New York: Simon and Schuster, 2006); G. John Ikenberry, “The Myth of Post–Cold War Chaos,” Foreign Affairs 75, no. 3 (May 1996): 79–91.
9. James Ball, “Meet the Seven People Who Hold the Keys to Worldwide Internet Security,” Guardian, February 28, 2014, accessed September 30, 2014, http://www.theguardian.com/technology/2014/feb/28/seven-people-keys-worldwide-internet-security-web; “Internet Society,” accessed June 16, 2014, http://www.internetsociety.org/; “ICANN,” accessed June 16, 2014, https://www.icann.org/.
10. Harold Adams Innis, Empire and Communications (Lanham, MD: Rowman and Littlefield, 2007); Marshall McLuhan, The Gutenberg Galaxy: The Making of Typographic Man (Toronto: University of Toronto Press, 2011).
11. “Twitter Saves Lives in Mexico,” Americas Quarterly, accessed September 10, 2014, http://www.americasquarterly.org/node/2576.
12. “Bloqueos,” Google Maps, accessed June 16, 2014, https://maps.google.com/maps/ms?ie=UTF8&hl=en&msa=0&msid=117897461681645229195.0004822dd7b250a595b99&ll=25.705578,-100.26947&spn=0.224894,0.308647&z=12&dg=feature.
13. “Superstorm Sandy: NYC,” Google Maps, accessed June 16, 2014, http://google.org/crisismap/2012-sandy-nyc?hl=en&llbox=40.8579,40.5237,-73.9334,-74.3728&t=roadmap&layers=layer1,layer0,8,9,1330918331511,5&promoted.
14. “How to Use Technology to Counter Rumors During Crises: Anecdotes from Kyrgyzstan,” iRevolution, March 26, 2011, accessed June 30, 2014, http://irevolution.net/2011/03/26/technology-to-counter-rumors/. Short Message Service (SMS) is a tool that allows for text messages between telephones.
15. “Rassd News Network (RNN),” Wikipedia, accessed May 21, 2014, http://en.wikipedia.org/wiki/Rassd_News_Network_(RNN).
16. “WITNESS: Cameras Everywhere Report,” 2011, accessed September 30, 2014, http://www3.witness.org/cameras-everywhere/report-2011.
17. Andrés Monroy-Hernández et al., “The New War Correspondents: The Rise of Civic Media Curation in Urban Warfare,” in Proceedings of the 2013 Conference on Computer Supported Cooperative Work (ACM, 2013), 1443–52, doi:10.1145/2441776.2441938, http://dl.acm.org/citation.cfm?id=2441938.
18. Joe Davidson, “Too Many People with Security Clearances, but Cuts Could Help Some Feds, Hurt Others,” Washington Post, March 20, 2014, accessed September 30, 2014, http://www.washingtonpost.com/politics/federal_government/too-many-people-with-security-clearances-but-cuts-could-help-some-feds-hurt-others/2014/03/20/1f1d011a-b05e-11e3-a49e-76adc9210f19_story.html.
19. Dana Priest and William M. Arkin, “A Hidden World, Growing Beyond Control,” Washington Post, 2010, accessed September 30, 2014, http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/.
20. Michael Eisen, “What Exactly Are the NSA’s ‘Groundbreaking Cryptanalytic Capabilities’?” WIRED, September 4, 2013, accessed September 30, 2014, http://www.wired.com/2013/09/black-budget-what-exactly-are-the-nsas-cryptanalytic-capabilities/.
21. Declan McCullagh, “How the U.S. Forces Net Firms to Cooperate on Surveillance,” CNET, July 12, 2013, accessed September 30, 2014, http://www.cnet.com/news/how-the-u-s-forces-net-firms-to-cooperate-on-surveillance/.
22. Kim Zetter, “Google Takes on Rare Fight Against National Security Letters,” Wired, April 4, 2013, accessed September 30, 2014, http://www.wired.com/2013/04/google-fights-nsl/.
23. “Lavabit,” accessed June 16, 2014, http://lavabit.com/; “Silent Circle,” accessed June 16, 2014, http://silentcircle.com/.
24. Author’s calculations based on the transparency reports available from Facebook (https://govtrequests.facebook.com/, accessed September 24, 2014), Google (http://www.google.com/transparencyreport/, accessed September 24, 2014), and Twitter (https://transparency.twitter.com, accessed September 21, 2014).
25. Anas Qtiesh, “Spam Bots Flooding Twitter to Drown Info About #Syria Protests,” Global Voices Advocacy, April 18, 2011, accessed September 30, 2014, http://advocacy.globalvoicesonline.org/2011/04/18/spam-bots-flooding-twitter-to-drown-info-about-syria-protests/;Neal Ungerleider, “Behind the Mystery of Spam Tweets Clogging Syrian Protesters’ Streams,” Fast Company, April 21, 2011, accessed September 30, 2014, http://www.fastcompany.com/1748827/behind-mystery-spam-tweets-clogging-syrian-protesters-streams.
26. “Who Is Using EGHNA Media Server,” EGHNA Media Server, accessed September 30, 2014, http://media.eghna.com/success_stories.
27. “A Call to Harm: New Malware Attacks Target the Syrian Opposition,” Citizen Lab, June 21, 2013, accessed September 30, 2014, https://citizenlab.org/2013/06/a-call-to-harm/.
28. Alex Cheng and Mark Evans, Inside Twitter: An In-Depth Look at the 5% of Most Active Users (Toronto: Sysomos, August 2009), accessed September 30, 2014, http://www.sysomos.com/insidetwitter/mostactiveusers/.
29. Brian Krebs, “Twitter Bots Target Tibetan Protests,” Krebs on Security, March 20, 2012, accessed September 30, 2014, http://krebsonsecurity.com/2012/03/twitter-bots-target-tibetan-protests/.
30. Mike Orcutt, “Twitter Mischief Plagues Mexico’s Election,” MIT Technology Review, June 21, 2012, accessed September 30, 2014, http://www.technologyreview.com/news/428286/twitter-mischief-plagues-mexicos-election/.
31. Inside Croydon, “Jasper Admits to Using Twitter Bots to Drive Election Bid,” Inside Croydon, accessed September 30, 2014, http://insidecroydon.com/2012/11/26/jasper-admits-to-using-twitter-bots-to-drive-election-bid/.
32. Jillian C. York, “Dangerous Social Media Games,” Al Jazeera, January 13, 2012, accessed September 30, 2014, http://www.aljazeera.com/indepth/opinion/2012/01/201211111642310699.html.
33. “Joint Threat Research Intelligence Group,” Wikipedia, accessed June 20, 2014, http://en.m.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group.
34. Associated Press, “US Secretly Created ‘Cuban Twitter’ to Stir Unrest and Undermine Government,” Guardian, April 3, 2014, accessed September 30, 2014, http://www.theguardian.com/world/2014/apr/03/us-cuban-twitter-zunzuneo-stir-unrest.
35. “Storm Botnet,” Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/wiki/Storm_botnet.
36. “Kraken Botnet,” Wikipedia, accessed June 19, 2014, http://en.wikipedia.org/wiki/Kraken_botnet.
37. “The Spamhaus Project,” accessed June 20, 2014, http://www.spamhaus.org/.
38. Raphael Satter, “Spamhaus Hit with ‘Largest Publicly Announced DDoS Attack’ Ever, Affecting Internet Users Worldwide,” Huffington Post, March 27, 2013, accessed September 30, 2014, http://www.huffingtonpost.com/2013/03/27/spamhaus-cyber-attack_n_2963632.html?utm_hp_ref=tw.
39. “ITU”; “ICANN”; “IGF,” Internet Governance Forum, accessed June 20, 2014, http://www.intgovforum.org/cms/.
40. Philip N. Howard, New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005).
41. David Karpf, The MoveOn Effect: The Unexpected Transformation of American Political Advocacy (New York: Oxford University Press, 2012); Daniel Kreiss, Taking Our Country Back: The Crafting of Networked Politics from Howard Dean to Barack Obama (New York: Oxford University Press, 2012).
42. Mohamed El Dahshan, “Concerned Citizens and Bounty Hunters: The Lebanese Army Has an App for You,” Foreign Policy Blogs, September 6, 2013, accessed September 30, 2014, http://transitions.foreignpolicy.com/posts/2013/09/06/concerned_citizens_and_bounty_hunters_the_lebanese_army_has_an_app_for_you.
43. Tim Fernholz, “The Secret Financial Market Only Robots Can See,” Quartz, September 17, 2013, accessed September 30, 2014, http://qz.com/124721/the-secret-financial-market-only-robots-can-see/.
2. Internet Interregnum
1. Philip N. Howard and Muzammil M. Hussain, Democracy’s Fourth Wave? Digital Media and the Arab Spring (New York: Oxford University Press, 2013).
2. Mandiant, APT1: Exposing One of China’s Cyber Espionage Units (Alexandria, VA: Mandiant, March 2013), accessed September 30, 2014, http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.
3. Andy Greenberg, “Researchers Name Three Hackers Tied to One Of China’s Most Active Military Intrusion Teams,” Forbes, February 19, 2013, accessed September 30, 2014, http://www.forbes.com/sites/andygreenberg/2013/02/19/researchers-name-three-hackers-tied-to-one-of-chinas-most-active-military-intrusion-teams/.
4. “Getting Ugly: If China Wants Respect Abroad, It Must Rein In Its Hackers,” Economist, February 21, 2013, accessed September 30, 2014, http://www.economist.com/news/leaders/21572200-if-china-wants-respect-abroad-it-must-rein-its-hackers-getting-ugly.
5. Lisa Ferguson et al., “Netizen Report: Tibetan Internet Users Targeted with Malware,” Global Voices Advocacy, April 9, 2013, accessed September 30, 2014, http://advocacy.globalvoicesonline.org/2013/04/09/netizen-report-tibetan-internet-users-targeted-with-malware/.
6. Chris Strom, Dave Michaels, and Eric Engleman, “Cyberattacks Abound Yet Companies Tell SEC Losses Are Few,” Bloomberg, April 3, 2013, accessed September 30, 2014, http://www.bloomberg.com/news/2013–04-04/cyberattacks-abound-yet-companies-tell-sec-losses-are-few.html.
7. “Smoking Gun,” Economist, February 21, 2013, accessed September 30, 2014, http://www.economist.com/news/china/21572228-evidence-mounting-chinas-government-sponsoring-cybertheft-western-corporate.
8. Erik Kirschbaum, “Snowden Says NSA Engages in Industrial Espionage: TV,” Reuters, January 26, 2014, accessed September 30, 2014, http://www.reuters.com/article/2014/01/26/us-security-snowden-germany-idUSBREA0P0DE20140126.
9. Nicole Perlroth, “Cyberattack on Saudi Oil Firm Disquiets U.S.,” The New York Times, October 24, 2012, accessed September 30, 2014, http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html.
10. “Stuxnet,” Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/wiki/Stuxnet.
11. Nicole Perlroth, “Virus Seeking Bank Data Is Tied to Attack on Iran,” Bits, August 9, 2012, http://bits.blogs.nytimes.com/2012/08/09/researchers-find-possible-state-sponsored-virus-in-mideast/.
12. Federal Bureau of Investigation, “Wanted by the FBI: Wang Dong,” FBI, accessed June 30, 2014, http://www.fbi.gov/wanted/cyber/wang-dong.
13. William J. Dobson, The Dictator’s Learning Curve: Inside the Global Battle for Democracy (New York: Random House, 2012).
14. “Obama Upbraids China on Hack Attacks,” BBC News, March 13, 2013, accessed September 30, 2014, http://www.bbc.co.uk/news/world-us-canada-21772596.
15. Christian Sandvig, “Corrupt Personalization,” Social Media Collective, accessed July 5, 2014, http://socialmediacollective.org/2014/06/26/corrupt-personalization/; Jonathan Zittrain, “Facebook Could Decide an Election Without Anyone Ever Finding Out,” New Republic, June 1, 2014, accessed September 30, 2014, http://www.newrepublic.com/article/117878/information-fiduciary-solution-facebook-digital-gerrymandering.
16. “Anonymous (group),” Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/wiki/Anonymous_(group).
17. Nicole Perlroth, “Hackers Take Down World Cup Site in Brazil,” Bits, June 20, 2014, accessed September 30, 2014, http://bits.blogs.nytimes.com/2014/06/20/hackers-take-down-world-cup-site-in-brazil/.
18. “Hack into Child Porn Sites Instead, DOJ Urges Hacktivists,” GMA News Online, October 10, 2012, accessed September 30, 2014, http://www.gmanetwork.com/news/story/277629/scitech/technology/hack-into-child-porn-sites-instead-doj-urges-hacktivists.
19. Malcolm Gladwell, “Small Change,” New Yorker, October 4, 2010, http://www.newyorker.com/magazine/2010/10/04/small-change-3; Evgeny Morozov, “The Folly of Kindle Diplomacy,” Slate, June 21, 2012, http://www.slate.com/articles/technology/future_tense/2012/06/state_department_s_amazon_kindle_plan_won_t_help_dissidents_.html; Gina Neff and Peter Nagy, “Imagined Affordances: Reconstructing a Keyword for Technology Studies,” Center for Media, Data, and Society, Central European University, Working Paper 2014.2, September 2014, accessed September 30, 2014.
20. Aaron Smith, Civic Engagement in a Digital Age (Washington, DC: Pew Research, April 2013), accessed September 12, 2014, http://www.pewinternet.org/2013/04/25/civic-engagement-in-the-digital-age/.
21. Tim Bradshaw, “YouTube Reaches Billion Users Milestone,” Financial Times, March 21, 2013, accessed September 30, 2014, http://www.ft.com/intl/cms/s/0/8f06331a-91ca-11e2-b4c9–00144feabdc0.html.
22. “Syria Internet Usage and Telecommunications Report,” Internet World Stats, accessed June 20, 2014, http://www.internetworldstats.com/me/sy.htm.
23. Open Signal, Global Network Maps, accessed September 24, 2014, http://opensignal.com/networks/.
24. Cisco, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013–2018 (San Jose, CA: Cisco, February 2014), accessed September 30, 2014, http://cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11–520862.html.
25. Larry Diamond, “Why Are There No Arab Democracies?” Journal of Democracy 21, no. 1 (2010): 93–112.
26. Howard and Hussain, Democracy’s Fourth Wave?
27. Francis Fukuyama, The End of History and the Last Man, reissue ed. (New York: Free Press, 2006).
28. Clive Southey, “The Staples Thesis, Common Property, and Homesteading,” Canadian Journal of Economics 11, no. 3 (1978): 547–59, doi:10.2307/134323.
29. Lita Person, Mobile Wallet (NFC, Digital Wallet) Market (Applications, Mode of Payment, Stakeholders, and Geography)—Global Share, Size, Industry Analysis, Trends, Opportunities, Growth, and Forecast, 2012–2020 (Portland, OR: Allied Market Research, November 2013), accessed September 30, 2014, http://www.alliedmarketresearch.com/mobile-wallet-market; Marion Williams, “The Regulatory Tension over Mobile Money,” Australian Banking and Finance, February 17, 2014, accessed September 30, 2014, http://www.australianbankingfinance.com/banking/the-regulatory-tension-over-mobile-money/.
30. “University of Cumbria Becomes First in World to Accept Tuition Fees in Bitcoin,” India Today, January 22, 2014, accessed September 30, 2014, http://indiatoday.intoday.in/story/british-university-to-accept-tuition-fees-in-bitcoin/1/339087.html.
31. Philip N. Howard and Nimah Mazaheri, “Telecommunications Reform, Internet Use, and Mobile Phone Adoption in the Developing World,” World Development 37, no. 7 (2009): 1159–69, doi:10.1016/j.worlddev.2008.12.005.
32. “The Big Mobile-Phone Reset,” Economist, September 7, 2013, accessed September 30, 2014, http://www.economist.com/news/business/21585006-weeks-two-telecoms-deals-will-be-followed-others-industry-undergoes-big.
33. @IDFSpokesperson, microblog, Twitter, November 14, 2012, accessed September 30, 2014, https://twitter.com/IDFSpokesperson/status/268722403989925888.
34. @IDFSpokesperson, microblog, Twitter, November 14, 2012, accessed September 30, 2014, https://twitter.com/IDFSpokesperson/status/268780918209118208.
35. John Timpane, “Israel vs. Hamas: The First Social-Media War,” Philly.com, October 17, 2012, accessed September 30, 2014, http://articles.philly.com/2012-11-17/news/35157659_1_hamas-tweets-alqassambrigade.
36. Ian Steadman, “Big Data, Language and the Death of the Theorist,” Wired UK, January 25, 2013, accessed September 30, 2014, http://www.wired.co.uk/news/archive/2013-01/25/big-data-end-of-theory.
37. David Axe, “With Drones and Satellites, U.S. Zeroed in on Bin Laden,” Wired, May 3, 2011, accessed September 30, 2014, http://www.wired.com/2011/05/with-drones-and-satellites-u-s-zeroed-in-on-bin-laden/.
38. Arthur L. Stinchcombe, “Ending Revolutions and Building New Governments,” Annual Review of Political Science 2, no. 1 (1999): 49–73, doi: 10.1146/annurev.polisci.2.1.49.
39. Philip N. Howard, The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam (New York: Oxford University Press, 2010).
40. Yoani Sánchez, Generación Y, accessed June 20, 2014, http://generacionyen.wordpress.com/.
41. Eric Schmidt and Jared Cohen, “The Digital Disruption: Connectivity and the Diffusion of Power,” Foreign Affairs 89 (November 2010): 79.
42. Katherine Maher, “The New Westphalian Web,” Foreign Policy, February 25, 2013, accessed September 30, 2014, http://www.foreignpolicy.com/articles/2013/02/25/the_new_westphalian_web.
43. Bruce Schneier, “Feudal Security,” Schneier on Security, December 3, 2012, accessed September 30, 2014, https://www.schneier.com/blog/archives/2012/12/feudal_sec.html.
3. New Maps for the New World
1. “United Nations Stabilisation Mission in Haiti,” Wikipedia, accessed June 18, 2014, http://en.wikipedia.org/wiki/United_Nations_Stabilisation_Mission_in_Haiti.
2. “The Rise of the Humanitarian Drone: Giving Content to an Emerging Concept,” iRevolution, June 30, 2014, accessed September 30, 2014, http://irevolution.net/2014/06/30/rise-of-humanitarian-uav/.
3. Oran R. Young, “Political Leadership and Regime Formation: On the Development of Institutions in International Society,” International Organization 45, no. 03 (1991): 281–308, doi:10.1017/S0020818300033117.
4. Latifa Al-Zayyat, The Open Door (Cairo: American University in Cairo Press, 2002).
5. Mohamed Hossam Ismail, “Laila’s Soft Screaming: A Discourse Analysis of Cyber-Feminist Resistance on the Egyptian Women Blogsphere,” Kolena Laila, June 9, 2010, accessed September 30, 2014, http://kolenalaila.com/en/.
6. Doug McAdam, Political Process and the Development of Black Insurgency, 1930–1970 (Chicago: University of Chicago Press, 1982).
7. “Bring Back Our Girls,” Facebook, accessed June 30, 2014, https://www.facebook.com/bringbackourgirls; “Kony 2012,” Know Your Meme, accessed June 30, 2014, http://knowyourmeme.com/memes/events/kony-2012.
8. Lee Rainie et al., “The Viral Kony 2012 Video,” Pew Research Internet Project (Washington, DC: Pew Research, March 15, 2012), accessed October 10, 2014, http://pewinternet.org/Reports/2012/Kony-2012-Video/Main-report.aspx.
9. Jarrett Murphy, “1 Billion Live in Slums,” CBS News, October 8, 2003, accessed September 30, 2014, http://www.cbsnews.com/news/1-billion-live-in-slums/.
10. “Global Issues: Refugees,” UN Global Issues, accessed June 20, 2014, http://www.un.org/en/globalissues/refugees/; Imogen Foulkes, “Global Refugee Figures Highest Since WW2, UN Says,” News, June 20, 2014, accessed September 30, 2014, http://www.bbc.com/news/world-27921938.
11. Howard Rheingold, Smart Mobs: The Next Social Revolution (New York: Basic, 2003).
12. F. Edwards, Philip N. Howard, and Mary Joyce, Digital Activism and Non-Violent Conflict (Seattle: Digital Activism Research Project, November 2013), accessed September 30, 2014, http://digital-activism.org/2013/11/report-on-digital-activism-and-non-violent-conflict/.
13. Jason Motlagh, “Protesters Broaden Tactics as Belarus Cracks Down,” Christian Science Monitor, July 12, 2011, http://www.csmonitor.com/World/Europe/2011/0712/Protesters-broaden-tactics-as-Belarus-cracks-down.
14. Oksana Grytsenko, “Ukrainians Crowdfund to Raise Cash for ‘People’s Drone’ to Help Outgunned Army,” Guardian, June 29, 2014, accessed September 30, 2014, http://www.theguardian.com/world/2014/jun/29/outgunned-ukrainian-army-crowdfunding-people-drone.
15. “Map Kibera,” accessed June 20, 2014, http://mapkibera.org/.
16. Brian Ekdale, “Slum Tourism in Kibera: Education or Exploitation?” Brian Ekdale’s Blog, July 13, 2010, accessed September 30, 2014, http://www.brianekdale.com/slum-tourism-in-kibera-education-or-exploitation/.
17. Robert Neuwirth, The Hidden World of Shadow Cities, TEDGlobal, 2005, accessed September 30, 2014, http://www.ted.com/talks/robert_neuwirth_on_our_shadow_cities.
18. “Spatial Collective,” accessed June 20, 2014, http://spatialcollective.com/.
19. Philip N. Howard, “The Dictator’s Dead Pool for 2013: Will China’s Investments Pay Off in Political Clout?” Huffington Post, December 31, 2012, accessed September 30, 2014, http://www.huffingtonpost.com/philip-n-howard/the-dictators-dead-pool-for-2013-will-chinas-investments-pay-off-in-political-clout_b_2374668.html.
20. Carter Center, Study Mission to the October 7, 2012 Presidential Election in Venezuela (Atlanta: Carter Center, October 2012), accessed September 30, 2014, http://www.cartercenter.org/resources/pdfs/news/peace_publications/election_reports/venezuela-2012-election-study-mission-final-rpt.pdf.
21. John P. Sullivan, From Drug Wars to Criminal Insurgency: Mexican Cartels, Criminal Enclaves, and Criminal Insurgency in Mexico and Central America, and Their Implications for Global Security (Paris: Fondation Maison des sciences de l’homme, January 2012).
22. Ibid.
23. Vincenzo Bove, “Opium Market, Revenue Opportunities, and Insurgency in Afghanistan’s Provinces,” Essex: University of Essex, 2011, 1–27.
24. Benjamin A. Olken and Patrick Barron, The Simple Economics of Extortion: Evidence from Trucking in Aceh (Washington, DC: National Bureau of Economic Research, June 2007), accessed September 30, 2014, http://www.nber.org/papers/w13145.
25. Moises Naim, “Mafia States: Organized Crime Takes Office,” Foreign Affairs 91 (May 2012): 112.
26. Ibid.
27. Symantec, Norton Report 2013: Cost per Cybercrime Victim Up 50 Percent (Mountain View, CA: Symantec, October 2013), accessed September 30, 2014, http://www.symantec.com/about/news/release/article.jsp?prid=20131001_01.
28. Luke Harding, “WikiLeaks Cables: Russian Government ‘Using Mafia for Its Dirty Work,’” Guardian, December 1, 2010, accessed September 30, 2014, http://www.theguardian.com/world/2010/dec/01/wikileaks-cable-spain-russian-mafia.
29. Homi Kharas and Andrew Rogerson, Horizon 2025: Creative Destruction in the Aid Industry (London: Overseas Development Institute, July 2012), accessed September 30, 2014, http://www.aidmonitor.org.np/reports/horizon%202012.pdf.
30. “Where Life Is Cheap and Talk Is Loose,” Economist, March 17, 2011, accessed September 30, 2014, http://www.economist.com/node/18396240.
31. “Hung, Drawn, and Quartered,” Economist, November 10, 2012, accessed September 30, 2014, http://www.economist.com/news/international/21565927-better-deterrents-are-putting-somali-pirates-business-under-strain-hung-drawn-and.
32. National Democratic Institute, “Election Stories Unfold on a Map,” National Democratic Institute, Spring 2011, accessed September 30, 2014, https://www.ndi.org/election-stories-unfold-on-a-map.
33. Voter Fraud Clip, 2012, accessed September 30, 2014, http://youtu.be/jxf-nRTDvGQ.
34. “Crowdmap,” Ushahidi, accessed June 30, 2014, http://www.ushahidi.com/product/crowdmap/.
35. “Ushahidi Haiti Project Map,” National Geographic, accessed June 27, 2014, http://newswatch.nationalgeographic.com/2012/07/02/crisis-mapping-haiti/uhp2/; “Russian Fires,” accessed June 27, 2014, http://russian-fires.ru/; “LizaAlert,” accessed June 27, 2014, http://lizaalert.org/.
36. Joel S. Migdal, Strong Societies and Weak States: State-Society Relations and State Capabilities in the Third World (Princeton: Princeton University Press, 1988).
37. World Bank, “Mobile Payments Go Viral: M-Pesa in Kenya,” Yes Africa Can: Stories from a Dynamic Continent (Washington, DC: World Bank, January 2013), accessed September 30, 2014, http://web.worldbank.org/WBSITE/EXTERNAL/COUNTRIES/AFRICAEXT/0,,contentMDK:22551641~pagePK:146736~piPK:146830~theSitePK:258644,00.html.
38. Philip N. Howard, “If Your Government Fails, Can You Create a New One with Your Phone?” The Atlantic, July 31, 2013, accessed September 30, 2014, http://www.theatlantic.com/international/archive/2013/07/if-your-government-fails-can-you-create-a-new-one-with-your-phone/278216/.
39. Ibid.
40. Ibid.
41. Sara Corbett, “Can the Cellphone Help End Global Poverty?” New York Times, April 13, 2008, accessed September 30, 2014, http://www.nytimes.com/2008/04/13/magazine/13anthropology-t.html.
42. Human Rights Watch, You Can Die Any Time: Death Squad Killings in Mindanao (New York: Human Rights Watch, April 2009), accessed September 30, 2014, http://www.hrw.org/sites/default/files/reports/philippines0409webwcover_0.pdf; “Davao Death Squads,” Wikipedia, accessed September 14, 2014, http://en.wikipedia.org/wiki/Davao_death_squads.
43. “The Project on Extrajudicial Executions,” accessed June 27, 2014, http://www.extrajudicialexecutions.org/.
44. Peter van der Windt, “From Crowdsourcing to Crowdseeding: The Cutting Edge of Empowerment?” in Bits and Atoms: Information and Communication Technology in Areas of Limited Statehood, ed. Steven Livingston and Gregor Walter-Drop (New York: Oxford University Press, 2013), 144–56.
45. “Communities @ Risk: Targeted Digital Threats Against Civil Society,” Citizen Lab, November 11, 2014, accessed January 4, 2015, https://citizenlab.org/2014/11/civil-society-organizations-face-onslaught-persistent-computer-espionage-attacks/.
46. Computational Propaganda, accessed January 4, 2015, http://politicalbots.org/.
4. Five Premises for the Pax Technica
1. Alexis de Tocqueville, The Recollections of Alexis de Tocqueville, trans. Alexander Teixeira de Mattos (n.p.: Project Gutenberg, 2011), accessed September 30, 2014, http://www.gutenberg.org/ebooks/37892.
2. Steven Pfaff, Exit-Voice Dynamics and the Collapse of East Germany: The Crisis of Leninism and the Revolution of 1989 (Durham, NC: Duke University Press, 2006).
3. Nancy Dahlberg, “It’s Prime Time for Hackathons and Other Technology Events,” Miami Herald, February 10, 2014, accessed September 30, 2014, http://miamiherald.typepad.com/the-starting-gate/2014/02/miguel-chateloin-participates-in-the-hackathon-for-cuba-event-on-feb-1-at-the-lab-miami-hackathons-are-beco.html; Will Mari, “Hacking for Jesus: Top Projects from ‘Code for the Kingdom,’ a Faith-Based Hackathon for Spiritual Geeks,” GeekWire, March 24, 2014, accessed September 30, 2014, http://www.geekwire.com/2014/faith-based-hackathon-meets-impact-hub/.
4. Jon Kolko, Wicked Problems: Problems Worth Solving (Austin: Ac4d, 2012).
5. Bruce Schneier, “The NSA Is Commandeering the Internet,” The Atlantic, August 12, 2013, accessed September 30, 2014, http://www.theatlantic.com/technology/archive/2013/08/the-nsa-is-commandeering-the-internet/278572/.
6. “Yahya Ayyash,” Wikipedia, accessed June 25, 2014, http://en.wikipedia.org/wiki/yahya_Ayyash.
7. Kat Hannaford, “How Osama Bin Laden Was Found,” Gizmodo, May 2, 2011, accessed September 30, 2014, http://gizmodo.com/5797588/how-osama-bin-laden-was-found.
8. “Euromaidan,” Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/wiki/Euromaidan.
9. Heather Murphy, “Ominous Text Message Sent to Protesters in Kiev Sends Chills Around the Internet,” Lede, January 22, 2014, accessed September 30, 2014, http://thelede.blogs.nytimes.com/2014/01/22/ominous-text-message-sent-to-protesters-in-kiev-sends-chills-around-the-internet/.
10. Jonathan Fildes, “MEPs Condemn Iran ‘Surveillance,’” BBC, February 11, 2010, accessed September 30, 2014, http://news.bbc.co.uk/2/hi/8511035.stm.
11. Andrei Aliaksandrau and Alaksiej Lavoncyk, “Belarus: Pulling the Plug,” Xindex: The Voice of Free Expression (Budapest, HU, January 2013), accessed September 30, 2014, http://www.indexoncensorship.org/wp-content/uploads/2013/01/IDX_Belarus_ENG_WebRes.pdf.
12. “Stuxnet,” Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/wiki/Stuxnet.
13. “Türk Genelkurmay Başkanlığı 27 Nisan 2007 Tarihli Basın Açıklaması,” Wikisource, accessed June 30, 2014, accessed September 30, 2014, http://tr.wikisource.org/wiki/T%C3%BCrk_Genelkurmay_Ba%C5%9Fkanl%C4%B1%C4%9F%C4%B1_27_Nisan_2007_tarihli_bas%C4%B1n_a%C3%A7%C4%B1klamas%C4%B1.
14. “Turkey PM Erdogan Defiant over Twitter Ban,” Al Jazeera, March 23, 2014, accessed September 30, 2014, http://www.aljazeera.com/news/middleeast/2014/03/turkey-pm-erdogan-defiant-over-twitter-ban-2014323164138586620.html.
15. Xeni Jardin, “Pro-Assad ‘Syrian Electronic Army’ Boasts of Attacks on NYT, Twitter, Huffington Post,” Boing Boing, August 27, 2013, accessed September 30, 2014, http://boingboing.net/2013/08/27/syrian-electronic-army-boa.html; Christine Haughney and Nicole Perlroth, “Times Site Is Disrupted in Attack by Hackers,” New York Times, August 27, 2013, accessed September 30, 2014, http://www.nytimes.com/2013/08/28/business/media/hacking-attack-is-suspected-on-times-web-site.html.
16. Karen Deyoung and Claudia Duque, “U.S. Aid Implicated in Abuses of Power in Colombia,” Washington Post, August 20, 2011, accessed September 30, 2014, http://www.washingtonpost.com/pb/national/national-security/us-aid-implicated-in-abuses-of-power-in-colombia/2011/06/21/gIQABrZpSJ_story.html.
17. Fruzsina Eördögh, “Israeli Defense Forces Announce Major Assault on Gaza via Twitter, Live-Blog the Whole Thing,” Slate, November 14, 2012, accessed September 30, 2014, http://www.slate.com/blogs/future_tense/2012/11/14/idf_announces_gaza_assault_death_of_ahmed_al_jabari_via_twitter.html.
18. Tactical Technology Collective, accessed June 27, 2014, https://www.tacticaltech.org/.
19. “Images Reveal Nigeria Army Abuse,” BBC News, May 1, 2013, accessed September 30, 2014, http://www.bbc.co.uk/news/world-africa-22366016.
20. “Human Rights Watch Identifies Isis Execution Sites Based on Satellite Images,” Guardian, June 27, 2014, accessed September 30, 2014, http://www.theguardian.com/world/video/2014/jun/27/human-rights-watch-isis-execution-sites-satellite-images-iraq-video.
21. “1/2 Drone Launched by Protesters at Warsaw, Poland,” YouTube, November 18, 2011, accessed September 30, 2014, http://youtu.be/o3OB_4BT1LA.
22. Brittany Fiore-Silfvast, “User-Generated Warfare: A Case of Converging Wartime Information Networks and Coproductive Regulation on YouTube,” International Journal of Communication 6 (2012), 1965–88, accessed September 30, 2014, http://ijoc.org/index.php/ijoc/article/view/1436.
23. Tactical Technology Collective.
24. FrontlineSMS: FrontlineCloud, accessed June 27, 2014, http://www. frontlinesms.com/.
25. Mobilisation Lab, accessed June 27, 2014, http://www.mobilisationlab.org/.
26. James C. Scott, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed (New Haven: Yale University Press, 1998).
27. Merlyna Lim, “Clicks, Cabs, and Coffee Houses: Social Media and Oppositional Movements in Egypt, 2004–2011,” Journal of Communication 62, no. 2 (April 1, 2012): 231–48, doi:10.1111/j.1460–2466.2012.01628.x; Zeynep Tufekci and Christopher Wilson, “Social Media and the Decision to Participate in Political Protest: Observations From Tahrir Square,” Journal of Communication 62, no. 2 (April 1, 2012): 363–79, doi:10.1111/j.1460–2466.2012.01629.x.
28. Catie Snow Bailard, “A Field Experiment on the Internet’s Effect in an African Election: Savvier Citizens, Disaffected Voters, or Both?” Journal of Communication 62, no. 2 (April 1, 2012): 330–44, doi:10.1111/j.1460–2466.2012.01632.x.
29. Jonathan Hassid, “Safety Valve or Pressure Cooker? Blogs in Chinese Political Life,” Journal of Communication 62, no. 2 (April 1, 2012): 212–30, doi:10.1111/j.1460–2466.2012.01634.x; Sebastián Valenzuela, Arturo Arriagada, and Andrés Scherman, “The Social Media Basis of Youth Protest Behavior: The Case of Chile,” Journal of Communication 62, no. 2 (April 1, 2012): 299–314, doi:10.1111/j.1460–2466.2012.01635.x.
30. “Nigeria: Hints of a New Chapter,” Economist, November 12, 2009, accessed September 14, 2014, http://www.economist.com/node/14843563.
31. Robert Jensen, “The Digital Provide: Information (Technology), Market Performance, and Welfare in the South Indian Fisheries Sector,” Quarterly Journal of Economics 122, no. 3 (August 1, 2007): 879–924, doi:10.1162/qjec.122.3.879; Aparajita Goyal, Information, Direct Access to Farmers, and Rural Market Performance in Central India (Rochester, NY: World Bank, May 2010), accessed September 30, 2014, http://papers.ssrn.com/abstract=1613083.
32. Beth Simone Noveck, Wiki Government: How Technology Can Make Government Better, Democracy Stronger, and Citizens More Powerful (Washington, DC: Brookings Institution Press, 2010).
33. Mike Nizza and Patrick Lyon, “In an Iranian Image, a Missile Too Many,” Lede, July 10, 2008, http://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-too-many/.
34. Josh Chin, “Tiananmen Effect: ‘Big Yellow Duck’ a Banned Term,” China Real Time Report, June 4, 2013, accessed September 30, 2014, http://blogs.wsj.com/chinarealtime/2013/06/04/tiananmen-effect-big-yellow-duck-a-banned-term/.
35. Ibid.
36. Jean Comaroff and John L. Comaroff, Of Revelation and Revolution, vol. 1, Christianity, Colonialism, and Consciousness in South Africa (Chicago: University of Chicago Press, 1991).
37. Manuel Castells, Communication Power (Oxford: Oxford University Press, 2011).
38. Christopher M. Schroeder, Startup Rising: The Entrepreneurial Revolution Remaking the Middle East (New York: Palgrave Macmillan, 2013).
39. Daniela Stockmann, Media Commercialization and Authoritarian Rule in China (New York: Cambridge University Press, 2013).
40. Cathy Hong, “New Political Tool: Text Messaging,” Christian Science Monitor, June 30, 2005, accessed September 14, 2014, http://www.csmonitor.com/2005/0630/p13s01-stct.html.
41. Cathy Hong, “New Political Tool: Text Messaging,” USA Today, June 30, 2005, accessed September 30, 2014, http://usatoday30.usatoday.com/tech/news/2005-06-30-politics-text-tool_x.htm.
42. Jason Gilmore and Philip N. Howard, Does Social Media Make a Difference in Political Campaigns? Digital Dividends in Brazil’s 2010 National Elections (Seattle: Center for Communication and Civic Engagement, June 2013), accessed September 30, 2014, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2273832; James Elliot, Robert O’Brien, and Jean Stockard, eds., Sociological Perspectives (Thousand Oaks, CA: Sage, n.d.).
43. Fabio Rojas, “More Tweets, More Votes—It Works for Google Searches, Too!” Orgtheory.net, February 14, 2014, accessed September 30, 2014, http://orgtheory.wordpress.com/2014/02/14/more-tweets-more-votes-it-works-for-google-searches-too/.
44. Liu Yazhou, “The Internet Has Become the Main Battlefield of Ideological Struggle,” China Scope, no. 66 (October 15, 2013): 32; John Garnaut, “China Must Reform or Die,” Sydney Morning Herald, August 12, 2010, accessed September 30, 2014, http://www.smh.com.au/world/china-must-reform-or-die-20100811-11zxd.html.
45. “A Dangerous Year,” Economist, January 28, 2012, accessed September 30, 2014, http://www.economist.com/node/21543477.
46. Philip N. Howard and Adrienne Massanari, “Learning to Search and Searching to Learn: Income, Education, and Experience Online,” Journal of Computer-Mediated Communication 12, no. 3 (April 1, 2007): 846–65, doi:10.1111/j.1083–6101.2007.00353.x.
47. Adrienne L. Massanari and Philip N. Howard, “Information Technologies and Omnivorous News Diets over Three U.S. Presidential Elections,” Journal of Information Technology & Politics 8, no. 2 (2011): 177–98, doi: 10.1080/19331681.2011.541702.
48. Philip N. Howard and Steve Jones, Society Online: The Internet in Context (Thousand Oaks, CA: Sage, 2004).
49. Lev Muchnik, Sinan Aral, and Sean J. Taylor, “Social Influence Bias: A Randomized Experiment,” Science 341, no. 6146 (2013): 647–51, doi: 10.1126/science.1240466.
50. Nic Halverson, “Ex-Neo-Nazis, Ex-Terrorists Get Social Network,” Discovery News, April 26, 2012, accessed September 30, 2014, http://news.discovery.com/tech/against-violent-extremism-120426.htm.
51. “Quilliam Foundation,” accessed June 27, 2014, http://www. quilliamfoundation.org/.
52. Leopoldina Fotunati, Raul Pertierra, and Jane Vincent, Migration, Diaspora, and Information Technology in Global Societies (New York: Routledge, 2012).
53. “Stingray Tracking Devices: Who’s Got Them?” American Civil Liberties Union, accessed June 23, 2014, https://www.aclu.org/maps/stingray-tracking-devices-whos-got-them.
54. Laura Payton, “Spy Agencies, Prime Minister’s Adviser Defend Wi-FiData Collection,” CBC News, February 3, 2014, accessed September 30, 2014, http://www.cbc.ca/1.2521166.
55. Google, Google Transparency Report, accessed September 30, 2014, http://www.google.com/transparencyreport/.
56. “A Threat to the Entire Country,” Economist, September 29, 2012, accessed September 30, 2014, http://www.economist.com/node/21563751.
57. Heba Afify, “Khaled Said’s Killing Draws 7-Year Sentences for 2 Officers,” New York Times, October 26, 2011, accessed September 30, 2014, http://www.nytimes.com/2011/10/27/world/middleeast/khaled-saids-killing-draws-7-year-sentences-for-2-officers.html.
58. “Death of Neda Agha-Soltan,” Wikipedia, accessed June 26, 2014, http://en.wikipedia.org/wiki/Death_of_Neda_Agha-Soltan.
59. Liam Stack, “Video of Tortured Boy’s Corpse Deepens Anger in Syria,” New York Times, May 30, 2011, accessed September 30, 2014, http://www.nytimes.com/2011/05/31/world/middleeast/31syria.html.
60. Mancur Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Cambridge: Harvard University Press, 2009).
61. Ethan Zuckerman, Rewire: Digital Cosmopolitans in the Age of Connection (New York: Norton, 2013).
62. W. Lance Bennett and Alexandra Segerberg, The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics (New York: Cambridge University Press, 2014).
63. “DeadUshahidi: Neither Dead Right nor Dead Wrong,” iRevolution, July 5, 2012, http://irevolution.net/2012/07/05/deadushahidi/.
64. F. Edwards, Philip N. Howard, and Mary Joyce, Digital Activism and Non-Violent Conflict (Seattle: Digital Activism Research Project, November 2013), accessed September 30, 2014, http://digital-activism.org/2013/11/report-on-digital-activism-and-non-violent-conflict/.
65. David M. Lazer et al., “The Parable of Google Flu: Traps in Big Data Analysis,” Science 343, no. 6176 (2014): 1203–5, doi:10.1126/science.1248506.
66. June Gates, “Federal Reserve Banks Announce New Study to Examine Nation’s Payments Usage” (Washington, DC: Federal Reserve Financial Services Policy Committee, January 17, 2013), accessed September 30, 2014, http://www.federalreserve.gov/newsevents/press/other/20130117a.htm.
67. Philip N. Howard, New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005).
68. Premise, accessed June 30, 2014, http://www.premise.com/.
69. Monty Munford, “M-Paisa: Ending Afghan Corruption, One Text at a Time,” TechCrunch, October 17, 2010, accessed September 30, 2014, http://techcrunch.com/2010/10/17/m-paisa-ending-afghan-corruption-one-text-at-a-time/.
70. “Warmed-up Numbers,” Economist, June 23, 2012, accessed September 30, 2014, http://www.economist.com/node/21557366#.
71. Bernd Debusmann, “Betting on Syria’s Assad Staying in Power,” Reuters, February 10, 2012, accessed September 30, 2014, http://in.reuters.com/article/2012/02/10/column-debusmann-idINDEE8190FA20120210;“What Makes Heroic Strife,” Economist, April 21, 2012, accessed September 30, 2014, http://www.economist.com/node/21553006.
5. Five Consequences of the Pax Technica
1. For more on the empires of contemporary media, see Tim Wu, The Master Switch: The Rise and Fall of Information Empires (New York: Vintage, 2010).
2. Boston Consulting Group, The Internet Economy in the G-20, 2012, accessed September 30, 2014, http://www.bcg.com/documents/file100409.pdf.
3. “IPv6,” Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/wiki/IPv6.
4. “State Enemies Archive—The Enemies of Internet,” The Enemies of the Internet: Reporters Without Borders, 2012, accessed September 30, 2014, http://surveillance.rsf.org/en/category/state-enemies/.
5. Brian Fung, “Reporters Without Borders: For the First Time, America Is an Enemy of the Internet,” Washington Post, March 14, 2014, accessed September 30, 2014, http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/14/reporters-without-borders-for-the-first-time-america-is-an-enemy-of-the-internet/.
6. “Greatest Hits,” Economist, May 24, 2007, accessed September 30, 2014, http://www.economist.com/node/9228794.
7. U.S. Department of State, Saudi Arabia, Report (Washington, DC: Department 0f State, Office of Website Management, Bureau of Public Affairs, June 2012), accessed September 30, 2014, http://www.state.gov/e/eb/rls/othr/ics/2012/191229.htm.
8. World Bank, “Mobile Payments Go Viral: M-Pesa in Kenya,” Yes Africa Can: Stories from a Dynamic Continent (Washington, DC: World Bank, January 2013), accessed September 30, 2014, http://web.worldbank.org/WBSITE/EXTERNAL/COUNTRIES/AFRICAEXT/0,,contentMDK:22551641~pagePK:146736~piPK:146830~theSitePK:258644,00.html.
9. “Airtime—Cellphone Banking—FNB,” accessed June 30, 2014, https://www.fnb.co.za/ways-to-bank/airtime.html.
10. “iHub,” accessed June 30, 2014, http://www.ihub.co.ke/research.
11. “Vital for the Poor,” Economist, November 10, 2012, accessed September 30, 2014, http://www.economist.com/news/middle-east-and-africa/21566022-report-describes-sacrifices-poor-make-keep-mobile-phone-vital.
12. World Bank, “Mobile Usage at the Base of the Pyramid in Kenya,” infoDev: Growing Innovation (Washington, DC: World Bank, December 2012), accessed September 30, 2014, http://www.infodev.org/infodev-files/final_kenya_bop_study_web_jan_02_2013_0.pdf.
13. “Map Kibera,” accessed June 20, 2014, http://mapkibera.org/.
14. David Daw, “10 Twitter Bot Services to Simplify Your Life,” TechHive, October 23, 2011, accessed September 30, 2014, http://www.techhive.com/article/242338/10_twitter_bot_services_to_simplify_your_life.html.
15. Rachel Haot, “Open Government Initiatives Helped New Yorkers Stay Connected During Hurricane Sandy,” TechCrunch, January 11, 2013, accessed September 30, 2014, http://techcrunch.com/2013/01/11/data-and-digital-saved-lives-in-nyc-during-hurricane-sandy/.
16. Samuel P. Huntington, The Clash of Civilizations and the Remaking of World Order (New York: Simon and Schuster, 2011).
17. “Global Voices,” accessed June 30, 2014, http://globalvoicesonline.org.
18. John Perry Barlows, “Declaration of Independence of Cyberspace,” 1996, accessed September 30, 2014, http://wac.colostate.edu/rhetnet/barlow/barlow_declaration.html; Hillary Clinton, “Internet Freedom: The Prepared Text of Secretary of State Hillary Rodham Clinton’s Speech, Delivered at the Newseum in Washington, DC,” Foreign Policy, January 21, 2010, accessed September 30, 2014, http://www.foreignpolicy.com/articles/2010/01/21/internet_freedom.
19. “Aga Khan Development Network,” accessed June 30, 2014, http://www. akdn.org/.
20. “Telecomix,” accessed June 30, 2014, http://telecomix.org/; “Centre for Applied Nonviolent Action and Strategies,” Wikipedia, accessed June 6, 2014, http://en.wikipedia.org/wiki/Centre_for_Applied_Nonviolent_Action_and_Strategies.
21. “Nawaat,” accessed June 30, 2014, http://nawaat.org/portail/; Gigi Ibrahim, “Piggiepedia,” Tahrir and Beyond, July 5, 2011, accessed September 30, 2014, http://theangryegyptian.wordpress.com/category/piggiepedia/.
22. Muzammil M. Hussain and Philip N. Howard, State Power 2.0 (London: Ashgate, 2013).
23. “Access: Mobilizing for Global Digital Freedom,” accessed June 30, 2014, https://www.accessnow.org/.
24. “Pirate Party International,” accessed June 30, 2014, http://www.pp-international.net/.
25. Ibid.
26. CBC News, “Higgins on Social Media and Syria,” accessed June 30, 2014, http://podcast.cbc.ca/mp3/podcasts/current_20131216_73168.mp3.
27. “Uchaguzi,” accessed June 30, 2014, https://uchaguzi.co.ke/.
28. Steven Livingston, Africa’s Information Revolution: Implications for Crime, Policing, and Citizen Security (Washington, DC: Africa Center for Strategic Studies, November 2013), accessed September 30, 2014, http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA588374.
29. “India Kanoon,” accessed June 30, 2014, http://www.indiankanoon.org/about.html.
30. “LizaAlert,” accessed June 27, 2014, http://lizaalert.org/.
31. “Holoda Rynda,” accessed June 30, 2014, http://holoda.rynda.org/; “Rynda,” accessed June 30, 2014, http://rynda.org/.
32. “Not in My Country,” accessed June 30, 2014, https://www.notinmycountry.org/.
33. “I Paid a Bribe,” accessed June 30, 2014, http://www.ipaidabribe.com/#gsc.tab=0; “I Paid a Bribe: Kenya,” accessed June 30, 2014, http://ipaidabribe.or.ke/; “I Paid a Bribe: Pakistan,” accessed June 30, 2014, http://www.ipaidbribe.pk/.
34. “Kiirti,” accessed June 30, 2014, http://www.kiirti.org/static/view/whatiskiirti.
35. Zeynep Tufekci and Christopher Wilson, “Social Media and the Decision to Participate in Political Protest: Observations from Tahrir Square,” Journal of Communication 62, no. 2 (April 1, 2012): 363–79, doi: 10.1111/j.1460–2466.2012.01629.x.
36. W. Lance Bennett, Regina G. Lawrence, and Steven Livingston, When the Press Fails: Political Power and the News Media from Iraq to Katrina (Chicago: University of Chicago Press, 2008).
37. “Safecast,” accessed June 30, 2014, http://blog.safecast.org/.
38. John Sutter, “Google Takes on the Drug Cartels,” CNN, July 19, 2012, accessed September 30, 2014, http://www.cnn.com/2012/07/19/tech/web/google-ideas-crime/index.html.
39. Alex Pentland, Social Physics: How Good Ideas Spread—The Lessons from a New Science (New York: Penguin, 2014).
40. danah boyd and Kate Crawford, “Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon,” Information, Communication, and Society 15, no. 5 (2012): 662–79, doi:0.10 80/1369118X.2012.678878.
41. Lee Rainie et al., Anonymity, Privacy, and Security Online, Internet Project (Washington, DC: Pew Research, September 2013), accessed September 30, 2014, http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/.
42. Ronald J. Deibert, Black Code: Inside the Battle for Cyberspace (Toronto: Signal, 2013).
43. Stacey Knobler et al., Learning from SARS: Preparing for the Next Disease Outbreak: Workshop Summary (Washington, DC: National Academies Press, January 2004), accessed September 30, 2014, http://www.nap.edu/openbook.php?record_id=10915.
44. David Leinweber, “Stupid Data Miner Tricks: How Quants Fool Themselves and the Economic Indicator in Your Pants,” Forbes, July 24, 2012, accessed September 30, 2014, http://www.forbes.com/sites/davidleinweber/2012/07/24/stupid-data-miner-tricks-quants-fooling-themselves-the-economic-indicator-in-your-pants/.
45. Juan O. Tamayo, “Fiber-Optic Cable Benefiting Only Cuban Government,” Miami Herald, May 26, 2012, accessed September 30, 2014, http://www.miamiherald.com/2012/05/25/2817534/fiber-optic-cable-benefiting-only.html.
46. Adam Tanner, “U.S.-Style Personal Data Gathering Is Spreading Worldwide,” Forbes, October 16, 2013, accessed September 30, 2014, http://www.forbes.com/sites/adamtanner/2013/10/16/u-s-style-personal-data-gathering-spreading-worldwide/.
47. Tom Bateman, “Police Warn over Drugs Cyber-Attack,” BBC News, October 16, 2013, accessed September 30, 2014, http://www.bbc.co.uk/news/world-europe-24539417.
6. Network Competition and the Challenges Ahead
1. Xiaoying Zhou, “A Hilarious Coded Riff on China’s Government: ‘Going Shopping for the 18th Time,’” Tea Leaf Nation, October 14, 2012, accessed September 30, 2014, http://www.tealeafnation.com/2012/11/a-hilarious-coded-riff-on-chinas-government-going-shopping-for-the-18th-time/.
2. Lily Kuo, “China Has More Internet Monitors Than Soldiers,” Quartz, October 8, 2013, accessed September 30, 2014, http://qz.com/132590/china-has-more-internet-monitors-than-active-army-personnel/.
3. Ibid.
4. Brian Kretal, Paton Adams, and George Bakos, Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage (Falls Church, VA: Northrop Grumman Corporation, March 2012), accessed September 30, 2014, http://origin.www.uscc.gov/sites/default/files/Research/USCC_Report_Chinese_Capabilities_for_Computer_Network_Operations_and_Cyber_%20Espionage.pdf.
5. Graham Webster, “Five Points on the Deeply Flawed U.S. Congress Huawei Report,” Transpacifica, October 10, 2012, accessed September 30, 2014, http://transpacifica.net/2012/10/10/five-points-on-the-deeply-flawed-u-s-congress-huawei-report/.
6. Gary King, Jennifer Pan, and Margaret E. Roberts, “How Censorship in China Allows Government Criticism but Silences Collective Expression,” American Political Science Review 107, no. 02 (2013): 326–43, doi:10.1017/S0003055413000014.
7. “Internet Censorship in China,” Wikipedia, accessed September 30, 2014, http://en.wikipedia.org/wiki/Internet_censorship_in_China.
8. James Fallows, “On the ‘Slow’ Chinese Internet and the Prospects for China: One More Round,” Atlantic, May 30, 2012, accessed September 30, 2014, http://www.theatlantic.com/international/archive/2012/05/on-the-slow-chinese-internet-and-the-prospects-for-china-one-more-round/257878/.
9. Akamai State of the Internet Report Quarter 1: 2014 (Cambridge, MA: Akamai, January 2014), accessed September 30, 2014, http://www. akamai.com/stateoftheinternet/; Brian Spegele and Paul Mozur, “China Hardens Grip Before Meeting,” Wall Street Journal, November 10, 2012, accessed September 30, 2014, http://online.wsj.com/news/articles/SB10001424052970204707104578092461228569642.
10. Adam Segal, “The People’s Republic of Hacking,” Foreign Policy, January 31, 2013, accessed September 30, 2014, http://www.foreignpolicy.com/articles/2013/01/31/the_people_s_republic_of_hacking_china_new_york_times?wp_login_redirect=0.
11. Douglas Farah and Andy Mosher, Winds from the East: How the People’s Republic of China Seeks to Influence the Media in Africa, Latin America, and Southeast Asia (Washington, DC: Center for International Media Assistance, September 2010), accessed September 30, 2014, http://cima.ned.org/sites/default/files/CIMA-China-Report_1.pdf.
12. http://www.tealeafnation.com/tealeafnation.com.
13. Keith Bradsher, “China Blocks Web Access to Times,” New York Times, October 25, 2012, accessed September 30, 2014, http://www.nytimes.com/2012/10/26/world/asia/china-blocks-web-access-to-new-york-times.html.
14. Bloomberg News, “Xi Jinping Millionaire Relations Reveal Fortunes of Elite,” Bloomberg, June 29, 2012, accessed September 30, 2014, http://www.bloomberg.com/news/2012-06-29/xi-jinping-millionaire-relations-reveal-fortunes-of-elite.html.
15. William Wan, “Georgetown Students Shed Light on China’s Tunnel System for Nuclear Weapons,” Washington Post, November 29, 2009, accessed September 30, 2014, http://www.washingtonpost.com/world/national-security/georgetown-students-shed-light-on-chinas-tunnel-system-for-nuclear-weapons/2011/11/16/gIQA6AmKAO_story.html.
16. http://personaldemocracy.com/jessica-beinecke.
17. http://youtu.be/TorXQUb0SXo, http://youtu.be/LPIovmLzGWo.
18. Pontus Wallin, “Crowd Sourcing or Cadre Sourcing: Why the Chinese Government Cannot Rely on the Internet for Information” (presented at the International Studies Association, San Diego, 2012).
19. http://www.interseliger.com/.
20. Philip N. Howard, “Social Media and the New Cold War,” The Great Debate, 2012, accessed September 30, 2014, http://blogs.reuters.com/great-debate/2012/08/01/social-media-and-the-new-cold-war/.
21. http://www.pinterest.com/pin/379569074817799499/.
22. Thomas Grove, “Russian Wikipedia Closes Site to Protest Internet Law,” Reuters, July 10, 2012, accessed September 30, 2014, http://www.reuters.com/article/2012/07/10/net-us-russia-wikipedia-protest-idUSBRE8690NY20120710.
23. http://youtu.be/jxf-nRTDvGQ.
24. Paul Roderick Gregory, “Inside Putin’s Campaign of Social Media Trolling and Faked Ukrainian Crimes,” Forbes, May 11, 2014, accessed September 30, 2014, http://www.forbes.com/sites/paulroderickgregory/2014/05/11/inside-putins-campaign-of-social-media-trolling-and-faked-ukrainian-crimes/.
25. Freedom House, Venezuela, Freedom on the Net 2013 (Washington, DC: Freedom House, January 2013), accessed September 30, 2014, http://www.freedomhouse.org/report/freedom-net/2013/venezuela#.U7Dv0vmSxad.
26. Katherine Musslewhite, “Webcams Can Record Secretly,” Washington Post, accessed June 30, 2014, accessed September 30, 2014, http://www.washingtonpost.com/posttv/business/technology/webcams-can-record-secretly/2013/12/18/3a48220c-6771–11e3-ae56–22de072140a2_video.html.
27. Dean Nelson, “China ‘Hacking Websites in Hunt for Tibetan Dissidents,’” Telegraph, August 13, 2013, accessed September 30, 2014, http://www.telegraph.co.uk/news/worldnews/asia/china/10240404/China-hacking-websites-in-hunt-for-Tibetan-dissidents.html.
28. Iain Thomson, “AntiLeaks Boss: We’ll Keep Pummeling WikiLeaks and Assange,” Register, August 13, 2012, accessed September 30, 2014, http://www.theregister.co.uk/2012/08/13/antileaks_wikileaks_attack_response/.
29. Brian Krebs, “Amnesty International Site Serving Java Exploit,” Krebs on Security, December 22, 2011, accessed September 30, 2014, http://krebsonsecurity.com/2011/12/amnesty-international-site-serving-java-exploit/.
30. @indiankanoon, “IK Servers Are Getting DDoSed Using the DNS Reflection Attack,” Indian Kanoon (October 19, 2013), accessed September 30, 2014, https://twitter.com/indiankanoon/status/391497714451492865.
31. Eli Pariser, The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think (London: Penguin, 2011).
32. Keith Wagstaff, “1 in 10 Twitter Accounts Is Fake, Say Researchers,” NBC News, November 26, 2013, accessed September 30, 2014, http://www.nbcnews.com/technology/1-10-twitter-accounts-fake-say-researchers-2D11655362; Won Kim et al., “On Botnets,” in Proceedings of the 12th International Conference on Information Integration and Web-Based Applications and Services (New York: ACM, 2010), 5–10, accessed September 30, 2014, http://dl.acm.org/citation.cfm?id=1967488.
33. Zi Chu et al., “Who Is Tweeting on Twitter: Human, Bot, or Cyborg?” in Proceedings of the 26th Annual Computer Security Applications Conference (New York: ACM, 2010), 21–30, accessed September 30, 2014, http://dl.acm.org/citation.cfm?id=1920265.
34. Joan Woodbrey Crocker, “What’s Your Egg Count? Block Spam Bots Following You on Twitter,” Flyte New Media, accessed September 30, 2014, http://www.takeflyte.com/flyte/2011/08/whats-your-egg-count-block-spam-bots-following-you-on-twitter.html.
35. Rob Dubbin, “The Rise of Twitter Bots,” New Yorker Blogs, November 15, 2013, accessed September 30, 2014, http://www.newyorker.com/online/blogs/elements/2013/11/the-rise-of-twitter-bots.html.
36. Anas Qtiesh, “Spam Bots Flooding Twitter to Drown Info About #Syria Protests,” Anas Qtiesh’s Blog, April 18, 2011, accessed September 30, 2014, http://www.anasqtiesh.com/2011/04/spam-bots-flooding-twitter-to-drown-info-about-syria-protests/; Taylor Casti, “How to Spot a Twitter Spambot,” Mashable, November 8, 2013, accessed September 30, 2014, http://mashable.com/2013/11/08/twitter-spambots/; Jillian C. York, “Syria’s Twitter Spambots,” Guardian, April 21, 2011, accessed September 30, 2014, http://www.theguardian.com/commentisfree/2011/apr/21/syria-twitter-spambots-pro-revolution.
37. Qtiesh, “Spam Bots Flooding Twitter to Drown Info About #Syria Protests.”
38. Brian Krebs, “Twitter Bots Drown Out Anti-Kremlin Tweets,” Krebs on Security, December 8, 2011, accessed September 30, 2014, http://krebsonsecurity.com/2011/12/twitter-bots-drown-out-anti-kremlin-tweets/;Mike Orcutt, “Twitter Mischief Plagues Mexico’s Election,” MIT Technology Review, June 21, 2012, accessed September 30, 2014, http://www.technologyreview.com/news/428286/twitter-mischief-plagues-mexicos-election/; Brian Krebs, “Twitter Bots Target Tibetan Protests,” Krebs on Security, March 20, 2012, accessed September 30, 2014, http://krebsonsecurity.com/2012/03/twitter-bots-target-tibetan-protests/; Torin Peel, “The Coalition’s Twitter Fraud and Deception,” Independent Australia, August 26, 2013, accessed September 30, 2014, http://www.independentaustralia.net/politics/politics-display/the-coalitions-twitter-fraud-and-deception,5660; “Jasper Admits to Using Twitter Bots to Drive Election Bid,” Inside Croydon, November 26, 2012, accessed September 30, 2014, http://insidecroydon.com/2012/11/26/jasper-admits-to-using-twitter-bots-to-drive-election-bid/; W. Oremus, “Mitt Romney’s Fake Twitter Follower Problem,” Slate, July 25, 2012, accessed September 30, 2014, http://www.slate.com/blogs/future_tense/2012/07/25/mitt_romney_fake_twitter_followers_who_s_buying_them_.html; Katy Pearce, “Cy ber fuckery in Azerbaijan,” Adventures in Research, March 10, 2013, accessed September 30, 2014, http://www.katypearce.net/cyberfuckery-in-azerbaijan/; York, “Syria’s Twitter Spambots”; Choe Sang-hun, “Prosecutors Detail Attempt to Sway South Korean Election,” New York Times, November 21, 2013, accessed September 30, 2014, http://www.nytimes.com/2013/11/22/world/asia/prosecutors-detail-bid-to-sway-south-korean-election.html.
39. Kim et al., “On Botnets.”
40. Chu et al., “Who Is Tweeting on Twitter?”
41. Philip N. Howard, “Let’s Make Candidates Pledge Not to Use Bots,” Reuters Blogs—The Great Debate, January 2, 2014, accessed September 30, 2014, http://blogs.reuters.com/great-debate/2014/01/02/lets-make-candidates-pledge-not-to-use-bots/.
42. American Association of Public Opinion Researchers, “The Problem of So-Called ‘Push Polls’: When Advocacy Calls Are Made Under the Guise of Research,” 2007, accessed September 30, 2014, http://aapor.org/AAPOR_Statements_on_Push_Polls1/3850.htm#.U7ErMfmSxad.
43. Julie Johnsson and Mary Schlangenstein, “Malaysian Air Said to Opt Out of Boeing Jet-Data Service,” Bloomberg, March 12, 2014, accessed September 30, 2014, http://www.bloomberg.com/news/2014–03–12/malaysian-air-said-to-opt-out-of-boeing-plan-to-share-jets-data.html.
44. “LG Smart TVs Logging USB Filenames and Viewing Info to LG Servers,” DoctorBeet’s Blog, November 18, 2013, accessed September 30, 2014, http://doctorbeet.blogspot.hu/2013/11/lg-smart-tvs-logging-usb-filenames-and.html.
45. “Smart TVs That Send Data Without Consent Will Be Fixed: LG,” CBC News, October 21, 2013, accessed September 30, 2014, http://www.cbc.ca/1.2434710.
46. Ericka Chickowski, “Researchers Demo How Smart TVs Can Watch You,” Guardian, 2014, accessed September 30, 2014, http://www. theguardian.com/media-network/partner-zone-infosecurity/smart-tv-security-risks?CMP=twt_gu.
47. Tarleton Gillespie, Wired Shut: Copyright and the Shape of Digital Culture, rpt. ed. (Cambridge: MIT Press, 2009).
48. Lucas Radicella, “Bolivia: Borders Will Have Biometric Security Measures,” Argentina Independent, October 24, 2012, accessed September 30, 2014, http://www.argentinaindependent.com/currentaffairs/newsfromlatinamerica/bolivia-borders-will-have-biometric-security-measures/.
49. Silvia Higuera, “Colombia’s Supreme Court Drops 2 Charges Against Former Intelligence Director in Wire Tapping Scandal Case,” Knight Center for Journalism in the Americas, October 9, 2013, accessed September 30, 2014, https://knightcenter.utexas.edu/blog/00–14561-colombias-supreme-court-drops-2-charges-against-former-intelligence-director-wire-tapp.
50. Human Rights Watch, “They Know Everything We Do”: Telecom and Internet Surveillance in Ethiopia (New York: Human Rights Watch, March 2014), accessed September 30, 2014, http://www.hrw.org/node/123977.
51. Ellen Nakashima, “Report: Web Monitoring Devices Made by U.S. Firm Blue Coat Detected in Iran, Sudan,” Washington Post, July 8, 2013, accessed September 30, 2014, http://www.washingtonpost.com/world/national-security/report-web-monitoring-devices-made-by-us-firm-blue-coat-detected-in-iran-sudan/2013/07/08/09877ad6-e7cf-11e2-a301-ea5a8116d211_story.html.
52. Lisa Anderson, “Demystifying the Arab Spring: Parsing the Differences between Tunisia, Egypt, and Libya,” Foreign Affairs 90, no. 3 (2011): 1–2.
53. Faisal Irshaid, “How Isis Is Spreading Its Message Online,” BBC News, June 19, 2014, accessed September 30, 2014, http://www.bbc.com/news/world-middle-east-27912569.
54. Paisley Dodds, “Extremists Flocking to Facebook for Recruits,” Yahoo News, August 29, 2011, accessed September 30, 2014, http://news.yahoo.com/extremists-flocking-facebook-recruits-151504367.html.
55. “Steganography,” Wikipedia, accessed September 30, 2014, http://en.wikipedia.org/wiki/Steganography.
56. Xu Wu, Chinese Cyber Nationalism: Evolution, Characteristics, and Implications (Lanham, MD: Lexington, 2007).
57. John Kelly and Bruce Etling, Mapping Iran’s Online Public: Politics and Culture in the Persian Blogosphere (Cambridge, MA: Berkman Center for Internet and Society, April 2008), accessed September 30, 2014, http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public.
58. Miriam Elder, “Hacked Emails Allege Russian Youth Group Nashi Paying Bloggers,” Guardian, February 7, 2012, accessed September 30, 2014, http://www.theguardian.com/world/2012/feb/07/hacked-emails-nashi-putin-bloggers.
59. Linda Lye, “Documents Reveal Unregulated Use of Stingrays in California,” American Civil Liberties Union, March 13, 2014, accessed September 30, 2014, https://www.aclu.org/blog/national-security-technology-and-liberty/documents-reveal-unregulated-use-stingrays-california.
60. Christine Clarridge, “Seattle Grounds Police Drone Program,” Seattle Times, February 7, 2013, accessed September 30, 2014, http://seattletimes.com/html/localnews/2020312864_spddronesxml.html; Lye, “Documents Reveal Unregulated Use of Stingrays in California.”
7. Building a Democracy of Our Own Devices
1. Marcus Wohlsen, “Why Copyrighted Coffee May Cripple the Internet of Things,” Wired, March 6, 2014, accessed September 30, 2014, http://www.wired.com/2014/03/copyrighted-coffee-undermine-whole-internet-things/.
2. Tarleton Gillespie, Wired Shut: Copyright and the Shape of Digital Culture, rpt. ed. (Cambridge: MIT Press, 2009).
3. Robert D. Putnam, Robert Leonardi, and Raffaella Y. Nanetti, Making Democracy Work: Civic Traditions in Modern Italy (Princeton: Princeton University Press, 1994).
4. Steve Schifferes, “How Bretton Woods Reshaped the World,” BBC, November 14, 2008, accessed September 30, 2014, http://news.bbc.co.uk/2/hi/7725157.stm.
5. “Edward Gibbon,” Wikipedia, accessed June 27, 2014, accessed September 30, 2014, http://en.wikipedia.org/wiki/Edward_Gibbon; “The History of the Decline and Fall of the Roman Empire,” Wikipedia, accessed June 21, 2014, http://en.wikipedia.org/wiki/The_History_of_the_Decline_and_Fall_of_the_Roman_Empire.
6. OECD, Ensuring Fragile States Are Not Left Behind: 2013 Factsheet on Resource Flows and Trends (Paris: OECD, January 2013), accessed September 30, 2014, http://www.oecd.org/dac/incaf/factsheet%202013%20resource%20flows%20final.pdf.
7. David Unger, “Your Thermostat is About to Get Smart,” Christian Science Monitor, November 5, 2013, accessed September 30, 2014, http://www.csmonitor.com/Environment/Energy-Voices/2013/1105/Your-thermostat-is-about-to-get-smart-video video.
8. Rebecca MacKinnon, Consent of the Networked: The Worldwide Struggle for Internet Freedom (New York: Basic, 2013).
9. Rebecca MacKinnon, “Keynote Speech on Surveillance,” in Opening Ceremony of the Freedom Online Conference, 2013, accessed September 30, 2014, http://consentofthenetworked.com/2013/06/17/freedom-online-keynote/.
10. “Aaron Swartz,” Wikipedia, accessed June 29, 2014, http://en.wikipedia.org/wiki/Aaron_Swartz.
11. “Russian Business Network,” Wikipedia, accessed June 19, 2014, http://en.wikipedia.org/wiki/Russian_Business_Network.
12. “Zero-Day Attack,” Wikipedia, accessed June 21, 2014, http://en.wikipedia.org/wiki/Zero-day_attack.
13. “U.S.-Style Personal Data Gathering Is Spreading Worldwide,” Forbes, accessed June 29, 2014, http://www.forbes.com/sites/adamtanner/2013/10/16/u-s-style-personal-data-gathering-spreading-worldwide/; Paul Schwartz, Managing Global Privacy (Berkeley: ThePrivacyProjects.org, January 2009), accessed September 30, 2014, http://theprivacyprojects.org/wp-content/uploads/2009/08/The-Privacy-Projects-Paul-Schwartz-Global-Data-Flows-20093.pdf.
14. “Computer Says No,” Economist, June 22, 2013, accessed September 30, 2014, http://www.economist.com/news/international/21579816-denial-service-attacks-over-internet-are-growing-easier-and-more-powerful-their.
15. Joe Davidson, “Too Many People with Security Clearances, but Cuts Could Help Some Feds, Hurt Others,” Washington Post, March 20, 2014, accessed September 30, 2014, http://www.washingtonpost.com/politics/federal_government/too-many-people-with-security-clearances-but-cuts-could-help-some-feds-hurt-others/2014/03/20/1f1d011a-b05e-11e3-a49e-76adc9210f19_story.html.
16. Michael Scherer, “The Geeks Who Leak,” Time, June 24, 2013, accessed September 30, 2014, http://content.time.com/time/magazine/article/0,9171,2145506,00.html.
17. “Backdoor Dealings,” Economist, September 14, 2013, accessed September 30, 2014, http://www.economist.com/news/leaders/21586345-covertly-weakening-security-entire-internet-make-snooping-easier-bad.
18. Michael Riley, “NSA Said to Exploit Heartbleed Bug for Intelligence for Years,” Bloomberg, April 12, 2014, accessed September 30, 2014, http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html.
19. US Institute of Peace, Non-Violent Struggle: 50 Crucial Points (Washington, DC: United States Institute of Peace, January 2006), accessed September 30, 2014, http://www.usip.org/publications/non-violent-struggle-50-crucial-points.
20. https://www.tacticaltech.org/, https://citizenlab.org/.
21. Alan Rusbridger, “Glenn Greenwald’s Partner Detained at Heathrow Airport for Nine Hours,” Guardian, August 19, 2013, http://www.theguardian.com/world/2013/aug/18/glenn-greenwald-guardian-partner-detained-heathrow.
22. “American Middle Class,” Wikipedia, accessed June 28, 2014, http://en.wikipedia.org/wiki/Middle_class.
23. Alex Pentland, Social Physics: How Good Ideas Spread: The Lessons from a New Science (New York: Penguin, 2014).
24. Philip N. Howard, New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005).
25. Brett M. Frischmann, Infrastructure: The Social Value of Shared Resources (New York: Oxford University Press, 2012).
26. Richard Kielbowicz, News in the Mail: The Press, Post Office, and Public Information, 1700–1860s (New York: Praeger, 1989).
27. Julian Dibbell, “Internet Freedom Fighters Build a Shadow Web,” Scientific American 306, no. 3 (March 2012).
28. “Light and Shady,” Economist, April 21, 2012, accessed September 30, 2014, http://www.economist.com/node/21553012.
29. http://www.globalwitness.org/campaigns/corruption/anonymous-companies.
30. Kris Erickson and Philip N. Howard, “A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records,” Journal of Computer-Mediated Communication 12, no. 4 (2007): 1229–47.
32. https://www.globalnetworkinitiative.org/.
33. “Carlos Slim,” Wikipedia, accessed June 28, 2014, http://en.wikipedia.org/wiki/Carlos_Slim; “Megahurts,” Economist, February 11, 2012, accessed September 30, 2014, http://www.economist.com/node/21547280.
34. “Light and Shady.”
35. http://www.fcc.gov/encyclopedia/universal-service.
36. “Www.africa.slow,” Economist, August 27, 2011, http://www. economist.com/node/21526937.
37. “Last Mile,” Wikipedia, accessed June 19, 2014, http://en.wikipedia.org/wiki/Last_mile.
38. T. C. Sottek, “Google Now Offers Google Earth, Picasa, and Chrome in Syria,” Verge, May 24, 2012, accessed September 30, 2014, http://www.theverge.com/2012/5/24/3041459/google-earth-picasa-chrome-syria.
39. Monk School of Global Affairs, Internet Filtering in a Failed State: The Case of Netsweeper in Somalia (Toronto: University of Toronto, February 2014), accessed September 30, 2014, https://citizenlab.org/2014/02/internet-filtering-failed-state-case-netsweeper-somalia/; Monk School of Global Affairs, O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-Based Netsweeper’s Role in Pakistan’s Censorship Regime (Toronto: University of Toronto, June 2014), accessed September 30, 2014, https://citizenlab.org/2013/06/o-pakistan/.
40. Kate Crawford et al., “Seven Principles for Big Data and Resilience Projects,” iRevolution, September 23, 2013, accessed September 30, 2014, http://irevolution.net/2013/09/23/principles-for-big-data-and-resilience/.
41. A PGP key allows you to securely send and receive email. “Pretty Good Privacy,” Wikipedia, accessed June 26, 2014, http://en.wikipedia.org/wiki/Pretty_Good_Privacy.