Helft, M. Google Uses Web Searches to Track Flu’s Spread
// New York Times, November 11, 2008.Hille, K. Censorship Fears Grow as IBM Tool Bolsters Chinese Spam Curb
// Financial Times, March 25, 2010.Hille, K. Censorship Fears over China Spam Curb
// Financial Times, March 24, 2010.Hille, K. China Bolsters Internet Censors’ Scrutiny
// Financial Times, January 5, 2009.Holland, H. B. Privacy Paradox
2.0 // 19 Widener Law Journal 893 (2010).Home Office Targets Terror-Related Websites
// BBC News, February 1, 2010.Huber, M., Kowalski, S., Nohlberg, M., and S. Tjoa To-wards Automating Social Engineering Using Social Networking Sites
/ In: 2009 International Conference on Computational Science and Engineering, 117–124.India Bans Chinese Telecom Equipment
// Associated Press, April 30, 2010. Iran’s Police Vow No Tolerance Towards Protesters // Reuters, Febru-ary 6, 2010.Johnson, C. Y. Project “Gaydar”: An MIT Experiment Raises New Questions About Online Privacy
// Boston Globe, September 20, 2009.Jonietz, E. Augmented Identity
// Technology Review, February 23,2010. www.technologyreview.com/computing/24639/?a=f. Kazmin, A. Police Threaten Kashmiri Facebook Users
// FinancialTimes, July 19, 2010.
Kirk, J. Vietnam Rebuffs Hacking Claims from Google
// IDG News Service, April 6, 2010.Krishna, Jai India Minister: Security Agencies Have Concerns over Blackberry Services
// Wall Street Journal, July 27, 2010.Lemos, Robert Your Groups Tell Hackers Who You Are
// Technology Review, July 23, 2010. www.technologyreview.com/printer_friendly_ article.aspx?id=25852&channel=web§ion=.Lukyanenko, Peter, and Cathy Young Tricks of the KGB trade
// Harper’s Magazine, January 1992.Mayer-Schonberger, Viktor Delete: The Virtue of Forgetting in the Digital Age
. Princeton, NJ: Princeton University Press, 2009.McMillan, Robert Activists Worry About a New “Green Dam” in Vietnam
// IDG News Service, June 4, 2010.Morar, Natalia Blog for Democracy, from the Streets of Moldova
// Open-Democracy, April 8, 2009. www.opendemocracy.net/arti-cle/email/blog-for-democracy-from-the-streets-of-moldova.Mumford, Lewis The Pentagon of Power
. New York: Harcourt Brace Jovanovich, 1974.Nigeria: New Policy on Mobile Phone SIM Cards
// Daily Trust, Janu-ary 11, 2010. allafrica.com/stories/201001110286.html.Note to Readers
// New York Times, September 13, 2009. www.nytimes. com/2009/09/13/business/media/13note.html?_r=1.Owad, Tom Data Mining
101: Finding Subversives with Amazon Wishlists // Applefritter, January 4, 2006. www.applefritter.com/ bannedbooks.P
2P Comes to the Aid of Audiovisual Search // PhysOrg.com. Novem-ber 18, 2009. www.physorg.com/news177780052.html.Page, Lewis NSA Offering “Billions” for Skype Eavesdrop Solution
// Register, February 12, 2009. www.theregister.co.uk/2009/02/12/ nsa_offers_billions_for_skype_pwnage/.Palmer, Maija Face Recognition Software Gaining a Broader Can-vas
// Financial Times, May 22, 2010.Palmer, Maija Google Debates Face Recognition Technology After Privacy Blunders
// Financial Times, May 20, 2010.Peterson, Kristina Intelligence Agents Borrow Wall Street Trading Technology
// Wall Street Journal, May 28, 2010.Scheck, Justin Stalkers Exploit Cellphone GPS
// What They Know series, Wall Street Journal, August 3, 2010.Sharma, A. Cyber Wars: A Paradigm Shift from Means to Ends
// Stra-tegic Analysis 34, no. 1 (2010): 62–73.Simonite, Tom Surveillance Software Knows What a Camera Sees
// Technology Review, June 1, 2010. www.technologyreview. com/computing/25439/?a=f.