Stephen E. Arnold: Google Implants — You Will Buy What We Are Paid to Tell You to Buy….

07 Other Atrocities, Commerce, Commercial Intelligence, Corporations, Cyberscams, malware, spam, Ethics, IO Impotency, Power Behind-the-Scenes/Special Interests
Stephen E. Arnold
Stephen E. Arnold

Google Implants By 2030?

From Marketplace Tech comes an interesting article on Google Glass and the projections into the future in regards to similar projects. The article, “Google’s Ray Kurzweil on the Computers that will Live in our Brains,” discusses how everything Google puts its hands on is changing how we search, retrieve and interact with information. As in nearly all articles these days discussing Google Glass Ray Kurzweil, the director of engineering at Google, leads the conversation.

Kurzweil posits that we will eventually move beyond devices that simply allow us to look at the world through a keyhole. Instead, he forecasts that people will be online all the time. He projects that devices post-Glass will ultimately be the size of blood cells able to be sent inside the brain and connect to the cloud around the mid-2030’s.

The article tells us more:

“In Kurzweil’s vision, these advances don’t simply bring computers closer to our biological systems. Machines become more like us. ‘Your personality, your skills are contained in information in your neocortex, and it is information,’ Kurzweil says. ‘These technologies will be a million times more powerful in 20 years and we will be able to manipulate the information inside your brain.’ As that data locked up inside our brain becomes searchable, inimitable human qualities suddenly become easier to emulate. Kurzweil denies that the searching and backup up of the brain itself is a bloodless pursuit, depleted of human emotion.”

Artificial intelligence and the melding of biology and machine is increasingly discussed in the media in reference to Google Glass. Will Glass evolve to Google impants? The bigger question is touched upon in this particular article: is it altruistic intentions or advertising that is driving this kind of technology?

Megan Feil, May 20, 2013

Sponsored by, developer of Beyond Search

Richard Wright: It’s Only Money – Why the IC Continues to Fail & Robert Steele: 10% Grade – A Dishonorable Discharge Needed

03 Economy, 07 Other Atrocities, 10 Security, 11 Society, Corruption, Cyberscams, malware, spam, Director of National Intelligence et al (IC), Government, InfoOps (IO), Intelligence (government), IO Impotency
Richard Wright

Its Only Money

The posting of Jim Bamford’s Politico article on today’s Public Intelligence Blog or rather the accompanying comment on it by Robert Steele [Jim Bamford: How 9/11 Fearmongering Grew NSA Into a Very Expensive Domestic Surveillance Monster] identifies the principal problem with the outrageously expensive NSA.  His comment is directly related to earlier comments he made on a Wall Street Journal article written by General Jim Clapper (USAF ret.) the Director of National Intelligence (DNI) [David Isenberg: Jim Clapper Claims Transformation — Robert Steele Comments on Each Misrepresentation]  Steele did a brilliant job of refuting the claims that General Clapper advanced in this article about how much the U.S. Intelligence Community (IC) has improved since 9/11. Yet the article really wasn’t serious to begin with because it obviously was written with the purpose of telling the American people what the General wanted them to know. I am sure it was vetted carefully by his staff and possibly CIA as well.

In the interests of clearing the air a bit I would like to add a couple of comments of my own to supplement those that Steele has made.

In the wake of 9/11 people, who did not know what they were talking about, had a good deal to say concerning the “lack of sharing” within the IC. In point of fact NSA and its technical counterpart the National Geo-spatial [Intelligence] Agency (NGA) are required by law to make their products available to analysts holding the proper clearances in entire IC as well as the President and his National Security Staff. The real lack of sharing was and is between the FBI and CIA. The FBI is unwilling to share because its agents fear damaging ongoing investigations while CIA is unwilling to share because its intelligence officers fear compromising sensitive sources. Had this issue been approached with integrity and directly between the two agencies it could have been resolved years ago.

General Clapper argued that the changed “culture” within the intelligence community had made its members much more efficient at dealing transnational terrorist and criminal organizations.  Neither CIA nor NSA has a clue on how to deal with widely dispersed networked type of organizations. Indeed CIA has yet to build a realistic model of the organizational structure or personnel staffing of al Qaeda. CIA’s current methodology of using ‘targeters’ to find and track individual al Qaeda members is simply doing what the original CIA Counter Terrorism Center (CTC) was doing in the 1990s. Indeed their analytic approach is the same as used during the Cold War with “Soviet Type Armed Forces” (the actual name of a class that many of us attended).

Finally there are Bamford’s article and Steele’s comments on it.  Steele in his comments went right to the heart of the matter by noting that NSA was incapable of processing more than a small percentage of the material it collects on a 24/7 basis. This goes directly to an issue that General Clapper clearly did not wish to discuss in his article: for all the money being poured into NSA specifically and the IC more broadly, how much return in enhanced security are we really getting?  It would not seem to make much sense to continue to spend even more money for collection systems to collect ever more traffic if what is being gathered now can’t be adequately processed.

Robert David STEELE Vivas

Robert Steele:  Emphasis added above.  Richard Wright (Retired Reader at Amazon) focuses on the longest largest divide in the US intelligence community itself, as well as the complete abject failure of analysis as a whole and analysis in relation to crime and terrorism, but it bears mention that other divides are equally unattended to by the current leadership:

1)  The secret world ignores 90% of the full-spectrum threat to obsess on counter-terrorism (badly).

2)  The secret world ignores 90% of the Whole of Government customer base, while badly serving the President and a few senior national security officials.  It is worthless on strategy, acquisition, campaign planning, and tactical real-time actionable intelligence in 183 languages.

3)  The secret world ignores 90% of the relevant sources (in 183 languages) and methods (modern human and machine processing that is commonplace within major insurance and financial companies).

On a scale of 100%, ten years after 9/11, the US secret intelligence world earns a grade of 10% (not just failing, but a dishonorable discharge and shame for all eternity).  The Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) are been impotent since their inception, and appear content to continue in that fashion.

Marcus Aurelius: In Detail, How Stuxnet Virus Uncovered

Cyberscams, malware, spam
Marcus Aurelius

Great article, reads like a thriller.  The bottom line:

“In the end, Stuxnet’s creators invested years and perhaps hundreds of thousands of dollars in an attack that was derailed by a single rebooting PC, a trio of naive researchers who knew nothing about centrifuges, and a brash-talking German who didn’t even have an internet connection at home.”

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

By Kim Zetter

WIRED, July 11, 2011

Read full article (seven screens).

Marcus Aurelius: Israel Plots to Cripple Iranian Cyber

04 Inter-State Conflict, 05 Iran, 07 Other Atrocities, 08 Wild Cards, 09 Justice, 10 Security, 11 Society, Computer/online security, Corruption, Cyberscams, malware, spam, IO Deeds of War, Military, Peace Intelligence, Power Behind-the-Scenes/Special Interests, Technologies
Marcus Aurelius

(1) Wish the Israelis every success, but their chances are likely decreased thanks to leaks;

(2) Wonder if GEN Alexander of USCYBERCOM will seek to re-negotiate his deal IOT report directly to POTUS?

Israeli Military Reportedly Plotting to Cripple Iran in Cyberspace

Published August 07, 2011


“Israel has two principal targets in Iran’s cyberspace,” said a defense source with close knowledge of the cyber war preparations. “The first is its military nuclear program and its military establishment. The second is Iran’s civil infrastructure. Attacking both, we hope, will cripple the entire country’s cyberspace.”

Phi Beta Iota:  What Israel is saying, particularly with regard to its second target spread, is that it is waging undeclared unjust war against Iran and the people of Iran.  To blithely announce that the civil infrastructure of another country is “fair game” should call into question the sanity and legitimacy of the perpetrators.

Doc Searls on user-driven democracy

07 Other Atrocities, 11 Society, Advanced Cyber/IO, Civil Society, Collective Intelligence, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Cyberscams, malware, spam, Government, InfoOps (IO), IO Sense-Making, Power Behind-the-Scenes/Special Interests, Privacy, Secrecy & Politics of Secrecy, Technologies, Tools
Jon Lebkowsky Bio

Doc Searls on user-driven democracy

by jonl

Speaking at the 2011 Personal Democracy Forum, Doc talks about how power relationships work in markets vs how they should  and could work. Markets are conversations, and they should be symmetrical conversations. Note his bit about how the language of marketing parallels the language of slavery….and the part where all their cookies end up giving them 50% completely wrong information.

Doc is the co-author of the Clue-Train Manifesto.

Direct Link to Personal Democracy Video

See Also:

48 Recordings on Tap from Personal Democracy 2011

Cyber-Security Politics, Business, Ethics…

02 China, 03 Economy, 07 Other Atrocities, 10 Security, Advanced Cyber/IO, Commerce, Commercial Intelligence, Computer/online security, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Mobile, Politics of Science & Science of Politics, Technologies
DefDog Recommends....

Is it just me, or does it appear that we’re okay with selling our cyber-soul to China (and Russia), as long as we can also blow tens of billions on US firms pretending to do cyber-security?

Report: Despite status as U.S. security threat, China’s Huawei partnering with Symantec, April 27, 2011

The Chinese telecom giant Huawei Technologies, which has been linked to the Chinese military, is working with the U.S. software security giant Symantec, which is engaged in securing hundreds of thousands of U.S. computer systems against outside intrusions, according to a report last week in the Diplomat newsletter.

The report said “China and Russia are leveraging U.S. multinational corporations’ economic requirements to accomplish strategic goals that could quite plausibly include covert technology transfer of intellectual property, access to source code for use in malware creation and backdoor access to critical infrastructure.”

Huawei was blocked from buying the U.S. telecom 3Leaf last year by the Committee on Foreign Investment in the United States (CFIUS) and also was blocked in 2008 from buying 3Com over security concerns. The U.S. National Security Agency also stepped in to dissuade AT&T from buying Huawei telephone equipment.

Despite those actions, Huawei formed a joint venture with Symantec in 2007 called Huawei Symantec Technologies Co. Ltd. (HS), the report said. Huawei is the majority partner with 51 percent ownership, with the entity being headquartered in Chengdu, China.

The report said a 2008 report identified HS as developing “China’s first laboratory of attack and defense for networks and applications.”

The result is that Symantec is assisting China’s cyber development of computer warfare capability.

The report was produced by cyber security expert Jeffrey Carr, author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly, 2009).

Phi Beta Iota: The US Government compounds its lack of a strategic analytic model and the requisite integrity to actually pay attention to whatever findings might emerge, with an abysmal inattention to the most basic aspects of counter-intelligence, not just within government, but across the private sector, which does not actually take counter-intelligence seriously either.  Creating a Smart and Safe Nation is not difficult–it requires only a uniform commitment to intelligence and integrity across all boundaries.

US Intelligence a Clipping Agency–A Bad One

02 Diplomacy, 03 Economy, 04 Education, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Budgets & Funding, Corruption, Cultural Intelligence, Cyberscams, malware, spam, Government, Intelligence (government), IO Impotency, Military, Officers Call
Mario Profaca Recommends...

Dr. Stephen Blank, one of America’s top experts on Russia and the former satellites of the USSR, likens US Intelligence to a clipping service, a very bad one.  He itemizes the recent failures of US Intelligence and observes that anyone in the audience he was addressing in NYC could have written a better threat estimate than that presented by the Director of National Intelligence recently to Congress.  Includes video of his full answer to the question about US Intelligence.

Army college expert likens US intelligence to ‘clipping agency’

By Asia Society Mar 18, 2011 5:30PM UTC

Continue reading “US Intelligence a Clipping Agency–A Bad One”

Rule 1: Don’t Throw Stones From a Glass House

07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Advanced Cyber/IO, Articles & Chapters, Computer/online security, Corruption, Cyberscams, malware, spam, Government, IO Technologies, Military, Technologies
DefDog Recommends...


Lessons from Anonymous on cyberwar

A cyberwar is brewing, and Anonymous reprisal attacks on HBGary Federal shows how deep the war goes.

Haroon Meer 10 Mar 2011 16:11 GMT

Al Jazeera

. . . . . . .

Even while Barr was proclaiming victory and threatening to “take the gloves off”, Anonymous were burrowing deeper into his network.

By the end of the attack, Barr’s iPad was reputedly erased, his LinkedIn and Twitter accounts were hijacked, the HBGary Federal website was defaced, proprietary HBGary source code was stolen and with over 71,000 private emails now published to the internet, HBGary was laid bare.

In this, was our first lesson: The asymmetry of cyber warfare.

. . . . . . .

Read entire REFERENCE piece….

Continue reading “Rule 1: Don’t Throw Stones From a Glass House”

USA Spectrum Out of Control & Self-Destructing

07 Other Atrocities, 10 Security, Advanced Cyber/IO, Computer/online security, Corruption, Cyberscams, malware, spam, InfoOps (IO), Military, Mobile, Officers Call, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Real Time, Secrecy & Politics of Secrecy, Standards, Technologies
DefDog Recommends...

Interesting, and if the point about Garmin is true, what is the relationship between them and the Air Force? The Air Force has gotten into a lot of areas that include tracking to the individual level (RFI) under the guise of tracking logistics….

US Air Force raises concerns over LightSquared’s LTE network messing with GPS

Following a navigation system’s instructions without driving into a ravine is hard enough as it is — can you even imagine how hard it’d be if you kept losing GPS reception every time you drove within range of an LTE tower? There have been a few anecdotal concerns raised over the last several weeks that LightSquared’s proposed LTE network — which would repurpose L-band spectrum formerly used for satellite — is too close to the spectrum used by the Global Positioning System, leading to unintentional jamming when the towers overpower the much weaker GPS signals. Things have gotten a little more interesting, though, now that the US Air Force Space Command has officially piped in. General William Shelton has gone on record saying that “a leading GPS receiver manufacturer just … has concluded that within 3 to 5 miles on the ground and within about 12 miles in the air GPS is jammed by those towers,” calling the situation “unbelievable” and saying he’s “hopeful the FCC does the right thing.”

Read rest of article….

Phi Beta Iota: Electromagnetic conflicts have been a known issue since the 1980’s.  The Soviets had emission control standards ten times tougher than the US, which had (and continues to have) virtually no standards at all.  This is one reason why US forces in Afghanistan are so severely hampered, with drones, aircraft, radars, and various other “systems” all interfering with one another.  Elsewhere, notably in England, modern cars come to a complete stop within a  couple of kilometers of certain Royal Air Force emitting stations.  All of this can be attributed to at least four root problems:

1.  An acquisition archipelago (nothing sytematic about it) so stupid and out of control as to defy belief.  No standards, no brains, no integrity.

2.  Service-centric and mission-centric “preferred contractor” and “proprietary single point solutions” standard operating processes that are deliberately not orchestrated with other services, civilian elements of the government, or other nations.

3.  A lack of integrity among senior officers who should know better.

4.  A lack of integrity in Congress, where the focus is on collecting the 5% kick-back from delivered programs, not on actually serving the public interest by insuring affordability, interoperability, sustainability, and utility.

See Also:

Continue reading “USA Spectrum Out of Control & Self-Destructing”

Revolution Kickstarted by Facebook Generation

Advanced Cyber/IO, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Cyberscams, malware, spam, Ethics, Journalism/Free-Press/Censorship, Key Players, Methods & Process, Mobile, Officers Call, Open Government, Policies, Real Time, Reform, Strategy, Threats
Mona Eltahawy

We’ve waited for this revolution for years. Other despots should quail

Change is sweeping though the Middle East and it’s the Facebook generation that has kickstarted it

Guardian, 29 January 2011

EXTRACT: Meanwhile, the uprisings are curing the Arab world of an opiate, the obsession with Israel. For years, successive Arab dictators have tried to keep discontent at bay by distracting people with the Israeli-Arab conflict. Israel’s bombardment of Gaza in 2009 increased global sympathy for Palestinians. Mubarak faced the issue of both guarding the border of Gaza, helping Israel enforce its siege, and continuing to use the conflict as a distraction. Enough with dictators hijacking sympathy for Palestinians and enough with putting our lives on hold for that conflict.

Read entire long and very thoughtful article….

Phi Beta Iota: The Assisi Peace Summit would do well to integrate the Facebook Generation.  Ms. Eltahawy raises the prospect of Arab youth no longer tolerating an Arab-Israeli conflict (as well as genocide by both Israel and the Arab dictators against the Palestinians).  The question now for us is this: where is the Jewish Facebook Generation?  They need to pay attention and participate.  By the by, this is what Advanced Cyber/Information Operations should be focusing on, not the expensive and fraudulent cyber-terror/cyber-security now a cancer within Cyber-Command circles.

Gerald Celente: Forecasting Revolution in 2011

01 Poverty, 03 Economy, 08 Wild Cards, Augmented Reality, Collective Intelligence, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cyberscams, malware, spam, Journalism/Free-Press/Censorship, Technologies, Videos/Movies/Documentaries

When reform becomes impossible, revolution becomes inevitable.

Phi Beta Iota: This guy is amazing.  Visit his website.

See Also:

Preconditions of Revolution in the USA Today

Gerald Celente: Forecasted Panic in Dec 2007; EIN PDB forecasted crash in Oct 2007

2011 Top 10 Cyber Predictions (and Then Some)

Collaboration Zones, Communities of Practice, Computer/online security, Cyberscams, malware, spam, InfoOps (IO), IO Multinational, IO Sense-Making, IO Technologies, Key Players, Methods & Process, Mobile, Officers Call, Policies, Real Time, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Threats

2011 Top 10 Cyber Predictions

Posted by Anup Ghosh on December 16, 2010

Everybody is putting out their Top 10 lists of predictions for 2011. Not to be left out of the party, below is a list of what we expect to see in 2011 in Cyber Security.

1.  Malware.

2.  Blame the User.

3.  Reactive approaches to security will continue to fail.

4.  Major Breaches in Sectors with Intellectual Property.

5.  Hacktivists will bask in their new-found glory.

6.  Critical Infrastructure Attacks.

7.  Hello Android.

8.  Windows Kernel Exploits.

9.  Organized Crime rises.

10.  Congress will rear its head.

Read full paragraph that goes with each of the above….

Phi Beta Iota: Nothing wrong with any of the above, except that they are out of context.  As the still-valid cyber-threat slide created by Mitch Kabay in the 1990’s shows, 70% of our losses have nothing to do with disgruntled or dishonest insiders, or external attacks including viruses.  Cyber has not been defined, in part because the Human Intelligence crowd does not compute circuits, and the circuit crowd do not computer human intelligence.  We are at the very beginning of a startling renaissance in cyber/Information Operations (IO) in which–we predict–existing and near-term hardware and software vulnerabilities will be less than 30% of the problem.  Getting analog Cold War leaders into new mind-sets, and educating all hands toward sharing rather than hoarding, toward multinational rather than unilateral, will be key aspects of our progress.  Cyber is life, life is cyber–it’s all connected.  Stove-piped “solutions” make it worse.

See Also:

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Journal: 1 in 4 Fail US Army Extrance Exam

Journal: Development at Gunpoint? Wasteful & Wrong

Undersea Cables: The Achilles Heel of our Economies

Journal: NSA Assumes It Has Been Compromised…Correct!

Reference: Frog 6 Guidance 2010-2020

Journal: Cyber-Idiocy Wipes Out Productivity

07 Other Atrocities, 10 Security, Cyberscams, malware, spam, InfoOps (IO), Military, Secrecy & Politics of Secrecy, Standards, Technologies
Chuck Spinney Recommends....

Information has never been so free. Even in authoritarian countries information networks are helping people discover new facts and making governments more accountable. — US Secretary of State Hillary Clinton, January 21, 2010

So much for that….

Military Bans Disks, Threatens Courts-Martial to Stop New Leaks

By Noah Shachtman, Wired, December 9, 2010  |  7:02 pm<

It’s too late to stop WikiLeaks from publishing thousands more classified documents, nabbed from the Pentagon’s secret network. But the U.S. military is telling its troops to stop using CDs, DVDs, thumb drives and every other form of removable media — or risk a court martial.

Maj. Gen. Richard Webber, commander of Air Force Network Operations, issued the Dec. 3 “Cyber Control Order” — obtained by Danger Room — which directs airmen to “immediately cease use of removable media on all systems, servers, and stand alone machines residing on SIPRNET,” the Defense Department’s secret network. Similar directives have gone out to the military’s other branches.

Read the rest of this sorry tale….

See Also:

Graphic: Cyber-Threat 101

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Journal: WikiLeaks Collaboration, WikiLeaks Attacked + CYBER RECAP

07 Other Atrocities, Collaboration Zones, Communities of Practice, Cyberscams, malware, spam, InfoOps (IO), IO Multinational, Standards, Technologies
DefDog Recommends...

Respected media outlets collaborate with WikiLeaks (NewsMeat)

WikiLeaks turned over all of the classified State Department cables it obtained to Le Monde, El Pais in Spain, The Guardian in Britain and Der Spiegel in Germany. The Guardian shared the material with the New York
Times, and the five news organizations have been working together to plan the timing of their reports.

They also have been advising WikiLeaks on which documents to release publicly and what redactions to make to those documents, Kauffmann and others involved in the arrangement said.

WikiLeaks switches to Swiss domain after attacks (NewsMeat)

Wikileaks was forced Friday to switch over to a Swiss domain name,, after a new round of hacker attacks on its system prompted its American domain name provider to withdraw service.

WikiLeaks’ U.S. domain name system provider, EveryDNS, withdrew service to the name late Thursday, saying it took the action because the new hacker attacks threatened the rest of its network.

“ has become the target of multiple distributed denial of service attacks. These attacks have, and future attacks would, threaten the stability of the infrastructure,” EveryDNS said in a statement.

Phi Beta Iota: The first story represents the emergence of hybrid governance and hybrid capabilities networks that will over time displace the inherently corrupt hierarchical stovepipes of the Industrial “Rule by Secrecy” era.  The second story represents both the emergence of jackals in cyber-space, attacking “because they can,” and the abject failure of both the Internet Service Providers (ISP) and the US Government to provide order, discipline, and security in cyberspace.  We recommend that WikiLeaks seek severe financial damages from both Amazon and EveryDNS–both have failed to be honest and diligent.  At the same time, this is an opportunity: any country, such as Chile, that can integrated unlimited low-cost renewable energy, massive data storage & services, and multinational intelligence, all in a cyber-cocoon of absolute confidence immune to attack, will bury the US and EU ISP and telecommunications industries.

See Also:

Reference: Bruce Schneier on Cyber War & Cyber Crime

Journal: Cyber-Heist 2nd Generation

Journal: Pentagon Network Attacks–Cloud Truth?

Journal: Who Controls (and Secures) the Internet?

Journal: US Research & Development in the Toilet

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Worth a Look: History of the Internet

Counter-Oppression/Counter-Dictatorship Practices, Cyberscams, malware, spam, InfoOps (IO), Methods & Process, Research resources, Standards, Technologies, Tools, Worth A Look
Berto Jongman Recommends...

A great adjustment in human affairs is underway. Political, commercial and cultural life is changing from the centralized, hierarchical and standardized structures of the industrial age to something radically different: the economy of the emerging digital era.

Amazon Page

A History of the Internet and the Digital Future tells the story of the development of the Internet from the 1950s to the present, and examines how the balance of power has shifted between the individual and the state in the areas of censorship, copyright infringement, intellectual freedom and terrorism and warfare. Johnny Ryan explains how the Internet has revolutionized political campaigns; how the development of the World Wide Web enfranchised a new online population of assertive, niche consumers; and how the dot-com bust taught smarter firms to capitalize on the power of digital artisans.

In the coming years, platforms such as the iPhone and Android rise or fall depending on their treading the line between proprietary control and open innovation. The trends of the past may hold out hope for the record and newspaper industry. From the government-controlled systems of the ColdWar to today’s move towards cloud computing, user-driven content and the new global commons, this book reveals the trends that are shaping the businesses, politics, and media of the digital future.

See Also:

On the Way to the Web: The Secret History of the Internet and Its Founders (2008)

The Internet Revolution: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet (2005)

Inventing the Internet (Inside Technology) (2000)

History of the Internet: A Chronology, 1843 to Present (1999)

Where Wizards Stay Up Late: The Origins Of The Internet (1998)