Authors: Thomas P. Keenan
21.
Kurzweil, Raymond.
The Singularity is Near: When Humans Transcend Biology
. New York: Viking Penguin, 2005.
22.
Lovelace, Lady Ada. Quoted in Epstein,
et al.
,
Parsing the Turing Test.
New York: Springer Science, 2009, p. 53.
23.
Freud, Sigmund. “Das Unheimlich,” Imago, Bd. V., 1919; reprinted in
Sammlung, Fünfte Folge
. Translated by Alix Strachey, accessed at
http://web.mit.edu/allanmc/www/freud1.pdf
24.
Mori, Mashahiro. “Bukimi no TaniâThe Uncanny Valley,” translated by K.F. MacDorman & T. Minato.
Energy
, 7(4) p. 33â35, accessed at
http://www.androidscience.com/theuncannyvalley/proceedings2005/uncannyvalley.html
25.
Harmon, Amy. “Making Friends With a Robot Named Bina48,”
New York Times
, July 4, 2010, accessed at
www.nytimes.com/2010/07/05/science/05robotside.html
26.
FBI Special Agent Daniel R. Geneck. Criminal Complaint, dated April 21, 2013, accessed
http://www.justice.gov/usao/ma/news/2013/April/criminalcomplaint1304211847.pdf
27.
Klontz, Joshua C., Jain, Anil, K. “A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects,” Technical Report MSU-CSE-13-4, accessed at
http://www.cse.msu.edu/biometrics/Publications/Face/KlontzJain_CaseStudyUnconstrainedFacialRecognition_BostonMarathonBombimgSuspects.pdf
28.
Shick, Shane (interviewer). “Security Lessons learned from the Boston tragedy (video interview),” CIO Association of Canada, accessed at
http://www.youtube.com/watch?v=k5EK-tZlYvo
29.
Wadhwa, Tarun. “The Next Privacy Battle: Cameras That Judge Your Every Move,”
Forbes
, August 30, 2012,
30.
Iwamoto, Kentaro,
et al.,
“Cigarette smoke detection from captured image sequences,” in
Image Processing: Machine Vision Applications III (2010),
accessed at
http://www.sip.tuat.ac.jp/~tanaka/pdf/cigarette.pdf
31.
New York Civil Liberties Union. “Who's Watching? Video Camera Surveillance in New York City and the Need for Public Oversight,” Fall 2006, accessed at
http://www.nyclu.org/pdfs/surveillance_cams_report_121306.pdf
32.
This camera has now moved to 47th and Broadway. See it, and Âthousands of other cameras, live at
http://www.earthcam.com/usa/newyork/timessquare/?cam=tsstreet
33.
Hughes, Mark. “CCTV in the spotlight: one crime solved for every 1,000 cameras,”
The Independent,
August 25, 2009, accessed at
http://www.independent.co.uk/news/uk/crime/cctv-in-the-spotlight-one-crime-solved-for-every-1000-cameras-1776774.html
34.
BBC. “Six crimes a day solved by CCTV, Met says,” accessed at
http://www.bbc.co.uk/news/uk-england-london-12080487
35.
Lorenc, Theo,
et al.,
“Environmental interventions to reduce fear of crime: systematic review of effectiveness,” Systematic Reviews 2(30), 2013, accessed November 24, 2013 at
www.systematicreviewsjournal.com/content/2/1/30
36.
Schneier, Bruce.
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
. Copernicus: New York, 2010.
37.
Hui, Stephen. “ICBC offers facial-recognition technology to Vancouver police's riot investigation,”
Straight.com
, June 17, 2011, accessed at
www.straight.com/news/icbc-offers-facial-recognition-technology-vancouver-polices-riot-investigation
38.
Canadian Press. “Use of ICBC data okayed to identify rioters,” June 22, 2011, accessed at
http://www.cbc.ca/news/canada/british-columbia/use-of-icbc-data-okayed-to-identify-rioters-1.1064189
39.
Vancouver Police Department.“IRIT recommends charges against 350th Âsuspected rioter, July 23, 2013, accessed at
http://mediareleases.vpd.ca/2013/07/23/irit-recommends-charges-against-350th-suspected-rioter/
40.
See
http://www.gigapixel.com/image/gigapan-canucks-g7.html
41.
Savage, Charlie. “Facial Scanning Is Making Gains in Surveillance,”
New York Times,
August 21, 2013, accessed at
http://www.nytimes.com/2013/08/21/us/facial-scanning-is-making-gains-in-surveillance.html
42.
Merchant, Brian. “We're âFive Years Off' From Homeland Security Using Facial Recognition to Profile U.S. Citizens,” Motherboard, August 21, 2013, accessed at
http://motherboard.vice.com/blog/were-five-years-off-from-homeland-security-using-facial-recognition-to-profile-us-citizens
43.
Langfitt, Frank. “In China, Beware: A Camera May Be Watching You,” National Public Radio, January 29, 2013, accessed at
http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you
44.
Keenan, Jordan. “The End of Anonymity and the Quest for Better Gadgets,”
Motherboard.tv
, accessed at
http://motherboard.vice.com/blog/the-end-of-anonymity-and-the-quest-for-better-gadgets
45.
Crowson, Scott. “Police hunt for mom in B.C.,”
Calgary Herald
, August 18, 2001, p. A1.
46.
Weber, Peter. “Watch why Russians put dashboard cameras in their cars,”
The Week,
September 25, 2013, accessed at
http://theweek.com/article/index/250148/watch-why-russians-put-dashboard-cameras-in-their-cars
47.
Shachtman, Noah. “Pentagon Kills LifeLog Project,”
Wired,
February 4, 2004, accessed at
http://archive.wired.com/politics/security/news/2004/02/62158
48.
Kallstrom, Martin. “How Lifelogging is Transforming the Way We Remember, Track Our Lives,” Wired, June 10, 2013, accessed at
http://www.wired.com/insights/2013/06/how-lifelogging-is-transforming-the-way-we-remember-track-our-lives/
49.
Barber, Nick. “Exclusive: MIT's âKinect of the Future' looks through walls with X-ray like vision,”
IDG News Service
, October 11, 2013, accessed at
http://www.youtube.com/watch?v=caVZZYbZV_4
50.
O'Brien, Terrence. “Creepy new Air Force camera can identify and track you from far, far away,”
Engadget
, May 20, 2011, accessed at
http://www.engadget.com/2011/05/20/creepy-new-air-force-camera-can-identify-and-track-you-from-far/
51.
Photon-X. Demo video, accessed at
http://www.photon-x.com/flash/robinspin.html
52.
As explained in Steven J. Levy's book,
Hackers: Heroes of the Computer Revolution,
the term “hacker” was originally an honorific reserved for skilled programmers who could “hack away” at virtually any problem. However, the word has largely been re-purposed to mean someone who uses technology in a Âmalevolent way. In this book, both senses are implied at various points.
53.
Rastreador de Namorado, app (in Portuguese), accessed at
http://rastreadordenamorado.com.br
/
54.
Laird, Lorelei, “Victims are taking on ârevenge porn' websites for posting photos they didn't consent to,”
ABA Journal
, November 1, 2013, accessed at
http://www.abajournal.com/magazine/article/victims_are_taking_on_revenge_porn_websites_for_posting_photos_they_didnt_c/
55.
Federal Bureau of Investigation. Press release, September 26, 2013, accessed at
http://www.fbi.gov/losangeles/press-releases/2013/temecula-student-arrested-in-sextortion-case-involving-multiple-victims
56.
US Federal Trade Commission. “FTC Approves Final Order Settling Charges Against Software and Rent-to-Own Companies Accused of Computer Spying,” April 15, 2013, accessed at
www.ftc.gov/opa/2013/04/designerware.shtm
57.
Neil, Martha. “7 Retailers Settle with FTC, Agree to Stop Spying on Up to 400,000 Computer Rental Customers,” Sept 26, 2012, accessed at
http://www.abajournal.com/news/article/7_Companies_Settle_With_FTC_Agree_to_Stop_Using_Rental_Computer_Webcams_to
/
58.
Ilgrenfritz, Richard. “LMSD reaches agreement in Webcam case,”
Mainline Media News
, October 13, 2010, accessed at
http://www.mainlinemedianews.com/articles/2010/10/13/main_line_times/news/doc4cb3a75f46e9f675801205.txt
59.
Accessed at
http://www.keralacm.gov.in
/
60.
Accessed at
http://cam.f-arts.co.jp
61.
Young, Nora. “Always-on Video Portal with Danny Robinson (Full interview),” CBC Radio's Spark, September 13, 2013, accessed at
http://www.cbc.ca/player/Radio/Spark/Extended+Interviews/ID/2406044767/
62.
iStrategyLabs. “Take an Instant Selfie With This Magical Mirror,” blog posting, April 7, 2014, accessed at
http://istrategylabs.com/2014/04/take-an-instant-selfie-with-this-magical-mirror/
63.
Farrar, W., Ariel, B. “Self-Awareness to Being Watched and Socially-Desirable Behavior: A Field Experiment on the Effect of Body-Worn Cameras on Police Use-of-Force,” accessed at
http://www.policefoundation.org/sites/g/files/g798246/f/201303/The%20Effect%20of%20Body-Worn%20Cameras%20on%20Police%20Use-of-Force.pdf
64.
Stross, Randall. “Wearing a Badge, and a Video Camera,”
New York Times
, April 6, 2013, accessed at
http://www.nytimes.com/2013/04/07/business/wearable-video-cameras-for-police-officers.html?_r=2&
65.
Vancouver Police Department. “2011 Stanley Cup Riot Review,” September 6, 2011, accessed at
http://vancouver.ca/police/assets/pdf/reports-policies/vpd-riot-review.pdf
66.
Lee, Hyunho. “Korean researchers demonstrate a new class of transparent, stretchable electrodes,”
Asia Research News
, May 30, 2013, accessed at
http://www.researchsea.com/html/article.php/aid/7724/cid/2/research/korean_researchers_demonstrate_a_new_class_of_transparent__stretchable_electrodes.html
67.
Accessed at
http://www.prserve.com/sunshade/
68.
Barrett, Chris. “Google Glass - The First Fight & Arrest Caught on Glass - July 4 Wildwood, NJ boardwalk,” July 14, 2013, accessed at
https://www.youtube.com/watch?v=4isOSntnpo8
69.
Google. Glass (etiquette guidelines). n.d., accessed at
https://sites.google.com/site/glasscomms/glass-explorers
70.
Rosenblum, Andrew. “Spy vs. Spy: Casinos Can't See The Cameras Hidden Up Gamblers' Sleeves,”
Popular Science
, August 8, 2011, accessed at
http://www.popsci.com/technology/article/2011-06/spy-vs-spy-casinos-cant-see-cameras-hidden-gamblers-sleeves
71.
MiKandi. “First-Ever Google Glass Porn,” accessed at
http://www.youtube.com/watch?v=Xxt24JoLlPE
72.
LA Times
. “Burger King does not want its employees to take baths,” August 13, 2008, accessed at
http://opinion.latimes.com/opinionla/2008/08/burger-king-doe.html
73.
Sachs, Wendy. “The secret life of my sixth grader,” CNN, November 27, 2012, accessed at
http://edition.cnn.com/2012/11/27/living/child-social-media
74.
The National Campaign, “Sex and Tech,” 2008, accessed at
http://www.Âthenationalcampaign.org/
75.
Bulatovic, Peja. “Nudity filter helps Chatroulette clean up,” January 20, 2011, at
http://www.cbc.ca/news/technology/story/2011/01/20/algorithm-tech-nudity-chatroulette-filter-flashers.html
76.
Badabing!, iTunes store, accessed at
https://itunes.apple.com/us/app/badabing!/id548536602?mt=8
77.
SnapChat Save Pics, March 2014, accessed at https://play.google.com/store/apps/details?id=com.appztastic.snapchatsavepics
78.
Acquisti, A., Gross, R., Stutzman, F. “Faces of Facebook: Or, How The Largest Real ID Database In The World Came To Be,” research paper accessed at
http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/
79.
Walters, Helen. “The battle between public and private: Alessandro Acquisti at TEDGlobal 2013,” accessed at
http://blog.ted.com/2013/06/14/the-battle-between-public-and-private-alessandro-acquisti-at-tedglobal-2013
80.
Vale, Jack. “Social Media Experiment,” November 18, 2013, accessed at
http://www.youtube.com/watch?feature=player_embedded&v=5P_0s1TYpJU
81.
Belgian Financial Sector Federation, “Amazing mind reader reveals his âgift,” accessed at
http://www.youtube.com/watch?v=F7pYHN9iC9I
82.
Kim, Susanna. “Tenn. Family Sues After Seeing Altered, âOffensive' Images of Son with Down Syndrome,” ABC News, April 29, 2013, accessed at
http://abcnews.go.com/Business/tenn-family-sues-alter-images-son-syndrome/story?id=19050815#.UYFcHUqNAR8
83.
Oved, Macro Chown. “Stolen Instagram baby photos used for sexual role play,”
Toronto Star
, May 1, 2013, accessed at
http://www.thestar.com/life/technology/2013/05/01/stolen_instagram_baby_photos_used_for_sexual_role_play.html