In order to get more accurate results, our search has the following Google-Type search functionality:
If you use '+' in front of a word, then that word will be present in the search results.
ex: Harry +Potter will return results with the word 'Potter'.
If you use '-' in front of a word, then that word will be absent in the search results.
ex: Harry -Potter will return results without the word 'Potter'.
If you use 'AND' between two words, then both of those words will be present in the search results.
ex: Harry AND Potter will return results with both 'Harry' and 'Potter'.
If you use 'OR' between two words, then bth of those words may or may not be present in the search results.
ex: Harry OR Potter will return results with just 'Harry', results with just 'Potter' and results with both 'Harry' and 'Potter'.
If you use 'NOT' before a word, then that word will be absent in the search results.
ex: Harry NOT Potter will return results without the word 'Potter'.
Placing '""' around words will perform a phrase search. The search results will contain those words in that order.
ex: "Harry Potter" will return any results with 'Harry Potter' in them, but not 'Potter Harry'.
Using '*' in a word will perform a wildcard search. The '*' signifies any number of characters. Searches can not start with a wildcard.
ex: Pot*er will return results with words starting with 'Pot' and ending in 'er'. In this case, 'Potter' will be a match.
Despite the emergence of story after story about politically charged email hacks, corporate-security breaches, and secret drone strikes, we still think of the perpetrators as bad actors. Yet as Yasha Levine shows in this bracing book, the truth is simpler. The internet was built to be a weapon, and it's been getting ever more effective.Since ARPA began building it in the 1960s, internet technology has been synonymous with spying. Levine traces this history, starting with the visionary scientist William Godel, who realized that the key to winning the war in Vietnam was not outgunning the enemy but using new technology to understand and anticipate their movements. As the book spins forward in time, Levine shows that many of the tech-industry giants we think of as social networks, e-tailers, and search companies are doing double duty as military contractors and security outfits.Levine is unafraid to name names: Google, IBM, Facebook, and many others make appearances in the story; in fact, it's difficult to be a big player in Silicon Valley and avoid--at a minimum--providing data on your users to the government. The military and the tech industry are effectively inseparable: a military-digital complex.This book's tight storytelling and provocative arguments will make you see the news in a new light.