Technocreep (34 page)

Read Technocreep Online

Authors: Thomas P. Keenan

BOOK: Technocreep
3.84Mb size Format: txt, pdf, ePub

21.
Kurzweil, Raymond.
The Singularity is Near: When Humans Transcend Biology
. New York: Viking Penguin, 2005.

22.
Lovelace, Lady Ada. Quoted in Epstein,
et al.
,
Parsing the Turing Test.
New York: Springer Science, 2009, p. 53.

23.
Freud, Sigmund. “Das Unheimlich,” Imago, Bd. V., 1919; reprinted in
Sammlung, Fünfte Folge
. Translated by Alix Strachey, accessed at
http://web.mit.edu/allanmc/www/freud1.pdf

24.
Mori, Mashahiro. “Bukimi no Tani–The Uncanny Valley,” translated by K.F. MacDorman & T. Minato.
Energy
, 7(4) p. 33–35, accessed at
http://www.androidscience.com/theuncannyvalley/proceedings2005/uncannyvalley.html

25.
Harmon, Amy. “Making Friends With a Robot Named Bina48,”
New York Times
, July 4, 2010, accessed at
www.nytimes.com/2010/07/05/science/05robotside.html

26.
FBI Special Agent Daniel R. Geneck. Criminal Complaint, dated April 21, 2013, accessed
http://www.justice.gov/usao/ma/news/2013/April/criminalcomplaint1304211847.pdf

27.
Klontz, Joshua C., Jain, Anil, K. “A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects,” Technical Report MSU-CSE-13-4, accessed at
http://www.cse.msu.edu/biometrics/Publications/Face/KlontzJain_CaseStudyUnconstrainedFacialRecognition_BostonMarathonBombimgSuspects.pdf

28.
Shick, Shane (interviewer). “Security Lessons learned from the Boston tragedy (video interview),” CIO Association of Canada, accessed at
http://www.youtube.com/watch?v=k5EK-tZlYvo

29.
Wadhwa, Tarun. “The Next Privacy Battle: Cameras That Judge Your Every Move,”
Forbes
, August 30, 2012,

30.
Iwamoto, Kentaro,
et al.,
“Cigarette smoke detection from captured image sequences,” in
Image Processing: Machine Vision Applications III (2010),
accessed at
http://www.sip.tuat.ac.jp/~tanaka/pdf/cigarette.pdf

31.
New York Civil Liberties Union. “Who's Watching? Video Camera Surveillance in New York City and the Need for Public Oversight,” Fall 2006, accessed at
http://www.nyclu.org/pdfs/surveillance_cams_report_121306.pdf

32.
This camera has now moved to 47th and Broadway. See it, and ­thousands of other cameras, live at
http://www.earthcam.com/usa/newyork/timessquare/?cam=tsstreet

33.
Hughes, Mark. “CCTV in the spotlight: one crime solved for every 1,000 cameras,”
The Independent,
August 25, 2009, accessed at
http://www.independent.co.uk/news/uk/crime/cctv-in-the-spotlight-one-crime-solved-for-every-1000-cameras-1776774.html

34.
BBC. “Six crimes a day solved by CCTV, Met says,” accessed at
http://www.bbc.co.uk/news/uk-england-london-12080487

35.
Lorenc, Theo,
et al.,
“Environmental interventions to reduce fear of crime: systematic review of effectiveness,” Systematic Reviews 2(30), 2013, accessed November 24, 2013 at
www.systematicreviewsjournal.com/content/2/1/30

36.
Schneier, Bruce.
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
. Copernicus: New York, 2010.

37.
Hui, Stephen. “ICBC offers facial-recognition technology to Vancouver police's riot investigation,”
Straight.com
, June 17, 2011, accessed at
www.straight.com/news/icbc-offers-facial-recognition-technology-vancouver-polices-riot-investigation

38.
Canadian Press. “Use of ICBC data okayed to identify rioters,” June 22, 2011, accessed at
http://www.cbc.ca/news/canada/british-columbia/use-of-icbc-data-okayed-to-identify-rioters-1.1064189

39.
Vancouver Police Department.“IRIT recommends charges against 350th ­suspected rioter, July 23, 2013, accessed at
http://mediareleases.vpd.ca/2013/07/23/irit-recommends-charges-against-350th-suspected-rioter/

40.
See
http://www.gigapixel.com/image/gigapan-canucks-g7.html

41.
Savage, Charlie. “Facial Scanning Is Making Gains in Surveillance,”
New York Times,
August 21, 2013, accessed at
http://www.nytimes.com/2013/08/21/us/facial-scanning-is-making-gains-in-surveillance.html

42.
Merchant, Brian. “We're ‘Five Years Off' From Homeland Security Using Facial Recognition to Profile U.S. Citizens,” Motherboard, August 21, 2013, accessed at
http://motherboard.vice.com/blog/were-five-years-off-from-homeland-security-using-facial-recognition-to-profile-us-citizens

43.
Langfitt, Frank. “In China, Beware: A Camera May Be Watching You,” National Public Radio, January 29, 2013, accessed at
http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you

44.
Keenan, Jordan. “The End of Anonymity and the Quest for Better Gadgets,”
Motherboard.tv
, accessed at
http://motherboard.vice.com/blog/the-end-of-anonymity-and-the-quest-for-better-gadgets

45.
Crowson, Scott. “Police hunt for mom in B.C.,”
Calgary Herald
, August 18, 2001, p. A1.

46.
Weber, Peter. “Watch why Russians put dashboard cameras in their cars,”
The Week,
September 25, 2013, accessed at
http://theweek.com/article/index/250148/watch-why-russians-put-dashboard-cameras-in-their-cars

47.
Shachtman, Noah. “Pentagon Kills LifeLog Project,”
Wired,
February 4, 2004, accessed at
http://archive.wired.com/politics/security/news/2004/02/62158

48.
Kallstrom, Martin. “How Lifelogging is Transforming the Way We Remember, Track Our Lives,” Wired, June 10, 2013, accessed at
http://www.wired.com/insights/2013/06/how-lifelogging-is-transforming-the-way-we-remember-track-our-lives/

49.
Barber, Nick. “Exclusive: MIT's ‘Kinect of the Future' looks through walls with X-ray like vision,”
IDG News Service
, October 11, 2013, accessed at
http://www.youtube.com/watch?v=caVZZYbZV_4

50.
O'Brien, Terrence. “Creepy new Air Force camera can identify and track you from far, far away,”
Engadget
, May 20, 2011, accessed at
http://www.engadget.com/2011/05/20/creepy-new-air-force-camera-can-identify-and-track-you-from-far/

51.
Photon-X. Demo video, accessed at
http://www.photon-x.com/flash/robinspin.html

52.
As explained in Steven J. Levy's book,
Hackers: Heroes of the Computer Revolution,
the term “hacker” was originally an honorific reserved for skilled programmers who could “hack away” at virtually any problem. However, the word has largely been re-purposed to mean someone who uses technology in a ­malevolent way. In this book, both senses are implied at various points.

53.
Rastreador de Namorado, app (in Portuguese), accessed at
http://rastreadordenamorado.com.br
/

54.
Laird, Lorelei, “Victims are taking on ‘revenge porn' websites for posting photos they didn't consent to,”
ABA Journal
, November 1, 2013, accessed at
http://www.abajournal.com/magazine/article/victims_are_taking_on_revenge_porn_websites_for_posting_photos_they_didnt_c/

55.
Federal Bureau of Investigation. Press release, September 26, 2013, accessed at
http://www.fbi.gov/losangeles/press-releases/2013/temecula-student-arrested-in-sextortion-case-involving-multiple-victims

56.
US Federal Trade Commission. “FTC Approves Final Order Settling Charges Against Software and Rent-to-Own Companies Accused of Computer Spying,” April 15, 2013, accessed at
www.ftc.gov/opa/2013/04/designerware.shtm

57.
Neil, Martha. “7 Retailers Settle with FTC, Agree to Stop Spying on Up to 400,000 Computer Rental Customers,” Sept 26, 2012, accessed at
http://www.abajournal.com/news/article/7_Companies_Settle_With_FTC_Agree_to_Stop_Using_Rental_Computer_Webcams_to
/

58.
Ilgrenfritz, Richard. “LMSD reaches agreement in Webcam case,”
Mainline Media News
, October 13, 2010, accessed at
http://www.mainlinemedianews.com/articles/2010/10/13/main_line_times/news/doc4cb3a75f46e9f675801205.txt

59.
Accessed at
http://www.keralacm.gov.in
/

60.
Accessed at
http://cam.f-arts.co.jp

61.
Young, Nora. “Always-on Video Portal with Danny Robinson (Full interview),” CBC Radio's Spark, September 13, 2013, accessed at
http://www.cbc.ca/player/Radio/Spark/Extended+Interviews/ID/2406044767/

62.
iStrategyLabs. “Take an Instant Selfie With This Magical Mirror,” blog posting, April 7, 2014, accessed at
http://istrategylabs.com/2014/04/take-an-instant-selfie-with-this-magical-mirror/

63.
Farrar, W., Ariel, B. “Self-Awareness to Being Watched and Socially-Desirable Behavior: A Field Experiment on the Effect of Body-Worn Cameras on Police Use-of-Force,” accessed at
http://www.policefoundation.org/sites/g/files/g798246/f/201303/The%20Effect%20of%20Body-Worn%20Cameras%20on%20Police%20Use-of-Force.pdf

64.
Stross, Randall. “Wearing a Badge, and a Video Camera,”
New York Times
, April 6, 2013, accessed at
http://www.nytimes.com/2013/04/07/business/wearable-video-cameras-for-police-officers.html?_r=2&

65.
Vancouver Police Department. “2011 Stanley Cup Riot Review,” September 6, 2011, accessed at
http://vancouver.ca/police/assets/pdf/reports-policies/vpd-riot-review.pdf

66.
Lee, Hyunho. “Korean researchers demonstrate a new class of transparent, stretchable electrodes,”
Asia Research News
, May 30, 2013, accessed at
http://www.researchsea.com/html/article.php/aid/7724/cid/2/research/korean_researchers_demonstrate_a_new_class_of_transparent__stretchable_electrodes.html

67.
Accessed at
http://www.prserve.com/sunshade/

68.
Barrett, Chris. “Google Glass - The First Fight & Arrest Caught on Glass - July 4 Wildwood, NJ boardwalk,” July 14, 2013, accessed at
https://www.youtube.com/watch?v=4isOSntnpo8

69.
Google. Glass (etiquette guidelines). n.d., accessed at
https://sites.google.com/site/glasscomms/glass-explorers

70.
Rosenblum, Andrew. “Spy vs. Spy: Casinos Can't See The Cameras Hidden Up Gamblers' Sleeves,”
Popular Science
, August 8, 2011, accessed at
http://www.popsci.com/technology/article/2011-06/spy-vs-spy-casinos-cant-see-cameras-hidden-gamblers-sleeves

71.
MiKandi. “First-Ever Google Glass Porn,” accessed at
http://www.youtube.com/watch?v=Xxt24JoLlPE

72.
LA Times
. “Burger King does not want its employees to take baths,” August 13, 2008, accessed at
http://opinion.latimes.com/opinionla/2008/08/burger-king-doe.html

73.
Sachs, Wendy. “The secret life of my sixth grader,” CNN, November 27, 2012, accessed at
http://edition.cnn.com/2012/11/27/living/child-social-media

74.
The National Campaign, “Sex and Tech,” 2008, accessed at
http://www.­thenationalcampaign.org/

75.
Bulatovic, Peja. “Nudity filter helps Chatroulette clean up,” January 20, 2011, at
http://www.cbc.ca/news/technology/story/2011/01/20/algorithm-tech-nudity-chatroulette-filter-flashers.html

76.
Badabing!, iTunes store, accessed at
https://itunes.apple.com/us/app/badabing!/id548536602?mt=8

77.
SnapChat Save Pics, March 2014, accessed at https://play.google.com/store/apps/details?id=com.appztastic.snapchatsavepics

78.
Acquisti, A., Gross, R., Stutzman, F. “Faces of Facebook: Or, How The Largest Real ID Database In The World Came To Be,” research paper accessed at
http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/

79.
Walters, Helen. “The battle between public and private: Alessandro Acquisti at TEDGlobal 2013,” accessed at
http://blog.ted.com/2013/06/14/the-battle-between-public-and-private-alessandro-acquisti-at-tedglobal-2013

80.
Vale, Jack. “Social Media Experiment,” November 18, 2013, accessed at
http://www.youtube.com/watch?feature=player_embedded&v=5P_0s1TYpJU

81.
Belgian Financial Sector Federation, “Amazing mind reader reveals his ‘gift,” accessed at
http://www.youtube.com/watch?v=F7pYHN9iC9I

82.
Kim, Susanna. “Tenn. Family Sues After Seeing Altered, ‘Offensive' Images of Son with Down Syndrome,” ABC News, April 29, 2013, accessed at
http://abcnews.go.com/Business/tenn-family-sues-alter-images-son-syndrome/story?id=19050815#.UYFcHUqNAR8

83.
Oved, Macro Chown. “Stolen Instagram baby photos used for sexual role play,”
Toronto Star
, May 1, 2013, accessed at
http://www.thestar.com/life/technology/2013/05/01/stolen_instagram_baby_photos_used_for_sexual_role_play.html

Other books

Holman Christian Standard Bible by B&H Publishing Group
The Morrigan's Curse by Dianne K. Salerni
Miras Last by Erin Elliott
Sea of Suspicion by Toni Anderson
Mr. Insatiable by Serenity Woods
The Ships of Aleph by Jaine Fenn
Willow Grove Abbey by Mary Christian Payne