Authors: Thomas P. Keenan
217.
Ramirez, S.,
et al.
“Creating a False Memory in the Hippocampus,”
Science
26 July 2013: 341(6144) pp. 387-391.
218.
Defense Advanced Research Projects Agency. “Narrative Networks,” n.d., accessed at
http://www.darpa.mil/Our_Work/DSO/Programs/Narrative_Networks.aspx
219.
Charles River Analytics. “Charles River Analytics to Support DARPA in Researching the Effects of Narratives on Human Behavior,” July 30, 2012, accessed at
https://www.cra.com/about-us/news.asp?display=detail&id=338
220.
Dillow, Clay. “Brain-Scanning Binoculars Harness Soldiers' Unconscious Minds to Locate Threats,” Popular Science, July 5, 2012, accessed at
www.popsci.com/technology/article/2012-07/new-brain-scanning-binoculars-move-mind-melding-battle-tech-closer-deployment
221.
Weinberger, Sharon. “Mind control moves into battle,”
BBC
, July 5, 2012, accessed at
http://www.bbc.com/future/story/20120704-mind-control-moves-into-battle
222.
Petro, Lucy S.,
et al.
“Decoding face categories in diagnostic subregions of primary visual cortex,” February 3, 2013,
European Journal of Neuroscience
, April 2013, 37(7) p. 1130-1139.
223.
bengood4000. “Body for sale: How much are your chemical components worth?” March 21, 2011, accessed at
http://bgoodscience.wordpress.com/2011/03/21/body-for-sale-how-are-your-chemical-components-worth
224.
http://www.oneplusyou.com/bb/cadaver
225.
Mareedu, Mouli. “Cadavers on sale at Osmania mortuary,”
The New Indian Express
, June 13, 2011, accessed at
http://ibnlive.in.com/news/cadavers-on-sale-at-osmania-mortuary/159031-60-121.html
226.
Science Care. “Understanding Whole Body Donation,” n.d., accessed at
http://www.sciencecare.com/body-donation-overview/
227.
Nanyang Technological University. “Plastic realistic: NTU medical students to use plastinated human bodies for anatomy learning,” May 23, 2013, accessed at
http://media.ntu.edu.sg/NewsReleases/Pages/newsdetail.aspx?news=ad8f3ba0-3fb6-4754-a40e-415ec846b776
228.
The Plastination Company, Inc. “The History of Our Body Donation Program,” n.d., accessed at
http://www.koerperspende.de/en.html
229.
Calandrino, Joseph A,
et al.
“Some Consequences of Paper Fingerprinting for Elections,” n.d., accessed at
http://www.cs.princeton.edu/~jcalandr/papers/paper-evt09.pdf
230.
Rueda, Jorge. “Thumbprint readers stir fears in Venezuela vote,”
Yahoo! Finance
, August 6, 2012, accessed at
http://finance.yahoo.com/news/thumbprint-readers-stir-fears-venezuela-vote-131434477.html
231.
Vice Japan.
“Fake Funerals in South Korea,” July 19, 2013, accessed at
http://www.vice.com/en_ca/vice-news/a-good-day-to-die-fake-funerals-in-south-korea
232.
Merz, Theo. “LivesOn review: can Twitter make you immortal?”
The Telegraph,
August 16, 2013, accessed at
http://www.telegraph.co.uk/technology/mobile-app-reviews/10246708/LivesOn-review-can-Twitter-make-you-immortal.html
233.
http://postrapturepetcare.com
234.
http://www.themonastery.org/catalog/drofdivinitycertificatedd-p-68.html
235.
Kurzweil, Raymond.
The Singularity is Near: When Humans Transcend Biology
. New York: Viking Penguin, 2005.
236.
www.highexistence.com/wireheading-a-world-without-negative-emotion
237.
Roache, Rebecca. “Enhanced punishment: can technology make life sentences longer?,” August 2, 2013, accessed at
http://blog.practicalethics.ox.ac.uk/2013/08/enhanced-punishment-can-technology-make-life-sentences-longer/
238.
Mears, Bill. “Government can't hold NSA surveillance data longer,”
CNN
, March 7, 2014, accessed at
http://edition.cnn.com/2014/03/07/politics/nsa-surveillance-extend/
239.
Galperin, Eva. “How to Remove Your Google Search History Before Google's New Privacy Policy Takes Effect,” blog posting, Feburary 22, 2012, accessed at
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect
240.
CBC News. “How a Hamilton woman lost then won a $50m lotto ticket,” December 5, 2013, accessed at
www.cbc.ca/news/canada/hamilton/news/how-a-hamilton-woman-lost-then-won-a-50m-lotto-ticket-1.2449082
241.
Cavoukian, Ann. “Guidelines for the Use of Video Surveillance Cameras in Public Places,” September 2007, accessed at
www.ipc.on.ca/images/Resources/video-e.pdf
242.
Accessed at
http://quux.org:70/Archives/usenet-a-news/FA.sf-lovers/81.06.23_ucbvax.1870_fa.sf-lovers.txt
243.
Accessed at
https://support.google.com/chat/answer/29290?hl=en
244.
Black Hat. “Black Hat USA 2013 Keynote - Gen. Alexander,” accessed at
http://www.youtube.com/watch?v=xvVIZ4OyGnQ
245.
Keenan, Thomas P. “Can We Ever Have Technological Security,” Canadian Defence and Foreign Affairs Institute and Canadian International Council, October 2013, accessed at
http://www.cdfai.org/PDF/CanWeHaveTechnological%20Security.pdf
246.
Goldstein, Brett. “When Government Joins the Internet of Things,”
New York Times
, September 8, 2013, accessed at
http://www.nytimes.com/roomfordebate/2013/09/08/privacy-and-the-internet-of-things/when-government-joins-the-internet-of-things
247.
Flagg, Kathryn. “Broken Records? Vermont Takes Its First Steps in the Direction of âOpen Data',”
Seven Days
, October 13, 2013, accessed at
http://www.7dvt.com/2013broken-records-vermont-takes-its-first-steps-direction-open-data
248.
Saunders, Laura. “Is Your Political Donation Deductible?,”
Wall
Street Journal
, September 28, 2012, accessed at
online.wsj.com/news/articles/SB10000872396390444549204578022201425205738
249.
Privacy Rights Clearing House. “Fact Sheet 11: From Cradle to Grave. Government Records and Your Privacy,” Revised December 2013, accessed December 6, 2013 at
www.privacyrights.org/cradle-grave-government-records-and-your-privacy
250.
Calgary Herald. “Tough sledding built up festival founder,”
Calgary Herald
, April 27, 2007, accessed at
http://www.canada.com/story_print.html?id=23e005c5-2940-46cd-9be9-eb3076d8101f
251.
Singer, Natasha. “Mapping, and Sharing, the Consumer Genome,”
New York Times,
June 16, 2012, accessed at
http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html
252.
Acxiom. “PersonicX Cluster, Perspectives,” n.d., accessed at
reference.mapinfo.com/software/anysite_segmentation/english/2_0_1/PersonicX_Binder.pdf
253.
The granddaddy of these sites is
http://www.wasarrested.com
, which has been around since 2001
254.
Dewey, Caitlin. “Hunter Moore is in jail, but that just means some other Âdespicable character is âthe most-hated man on the Internet' now,”
Washington Post
, January 24, 2014, accessed at
http://www.washingtonpost.com/blogs/style-blog/wp/2014/01/24/hunter-moore-is-in-jail-but-that-just-means-some-other-despicable-character-is-the-most-hated-man-on-the-internet-now/
255.
Wlasuk, Alan. “The top 10 hackers of all time,”
TechRepublic,
July 26, 2011, accessed at
http://www.techrepublic.com/blog/10-things/the-top-10-hackers-of-all-time/
256.
Montgomery, James. “Justin Bieber Is Not Going To North Korea, Rep Confirms,”
MTV.com
, July 7, 2010, accessed at
http://www.mtv.com/news/articles/1643113/justin-bieber-not-going-north-korea-rep-confirms.jhtml
257.
Geller, Wendy. “Internet Campaign Helps âFat Old Guy' in Quest to Achieve Taylor Swift Dream,”
Rolling Stone,
July 18, 2013, accessed at
http://www.Ârollingstone.com/music/news/internet-campaign-helps-fat-old-guy-in-quest-to-achieve-taylor-swift-dream-20130718
258.
Topping, David. “Something Awful, Something New,”
Torontoist.com
, July 16, 2008 accessed at
http://torontoist.com/2008/07/logan_aubes_hockey_night_theme/
259.
The Economist
. “Masters of the cyber-universe,”
The Economist,
April 6, 2013, accessed at
http://convertpdftoword.net/convertpdftoword.aspx/
260.
Ibid.
261.
Naughton, John. “US fears back-door routes into the net because it's building them too,”
The Guardian,
October 13, 2013, accessed at
http://www.theguardian.com/technology/2013/oct/13/us-scared-back-door-routes-computers-snowden-nsa
262.
Simonite, Tom. “A Computer Infection that Can Never Be Cured,”
MIT Technology Review,
August 1, 2012, accessed at
www.technologyreview.com/news/428652/a-computer-infection-that-can-never-be-cured/
263.
Karger, Paul A., Schell, Roger R. “Multics Security Evaluation,” U.S. Air Force, Electronic Systems Division report ESD-TR-193, Vol. II, June 1974, accessed at
csrc.nist.gov/publications/history/karg74.pdf
264.
Wetter, Dirk. “Research: Stored XSS Vulnerability @ Amazon,” December 18, 2010, accessed at
http://drwetter.eu/amazon
265.
Love, Dylan. “A Certain String Of Arabic Characters Will Crash Your Mac And iPhone Apps,” September 3, 2013, accessed at
http://www.businessinsider.com/arabic-characters-ios-bug-2013-9#ixzz2fApGYxUX
266.
Collinson, Patrick. “Is this the most wicked scam yet?”
The Guardian
, April 5, 2008, accessed at
http://www.theguardian.com/money/2008/apr/05/scamsandfraud
267.
Brignull, Harry. “Ryanair trick insurance opt-out trick question (August 2010),” August 4, 2010, accessed at
http://darkpatterns.org/ryan-air-trick-insurance-opt-out-trick-question-august-2010/
268.
Malware Tips. “Conduit SearchâVirus Removal Guide,” n.d., accessed at
http://malwaretips.com/blogs/remove-conduit-search-virus/
269.
Barisani, Andrea, Bianco, Daniele. “Unusual Car Navigation Tricks: Injecting RDS-TMC Traffic Information Signals,” Inverse Path, 2007, accessed at
http://dev.inversepath.com/rds/cansecwest_2007.pdf
270.
Ozer, Nicole. A. “Note to Self: Siri Not Just Working for Me, Working Full-Time for Apple, Too,” blog posting, March 12, 2012, accessed at
http://www.aclunc.org/issues/technology/blog/note_to_self_siri_not_just_working_for_me,_working_full-time_for_apple,_too.shtml
271.
Gay, Alicia. “Apple's Latest iPhone Has No Problem Pointing Users to Viagra, But Comes Up Blank on Birth Control, Abortion,” blog posting, November 30, 2011, accessed at
www.aclu.org/blog/reproductive-freedom/apples-latest-iphone-has-no-problem-pointing-users-viagra-comes-blank/
272.
ProgramYourKeys.com. “BMW 3 SeriesâKey Remote Programming,” n.d., accessed at
http://www.programyourkeys.com/BMW_3-Series_Key_Remote_Control_Fob_Programming.html
273.
Obias, Rudie. “11 Google Services With Hidden Easter Eggs,” Mental Floss, August 20, 2013, accessed at
http://mentalfloss.com/article/52191/11-google-services-hidden-easter-eggs
274.
Mead, Derek. “How Reddit Got Huge: Tons of Fake Accounts,”
Motherboard.tv
,
June 21, 2012, accessed at
motherboard.vice.com/read/how-reddit-got-huge-tons-of-fake-accountsâ2
275.
Results of this “scam-baiting” can be viewed at
http://forum.419eater.com/forum/album.php
276.
Defense Distributed. “DD History,” n.d., accessed at
defdist.org/dd-history/
277.
Van Zuylen-Wood, Simon. “Philly Becomes First City to Ban 3-D Gun Printing,” Philadelphia Magazine, November 21, 2013, accessed at
http://www.phillymag.com/2013/11/21/philly-becomes-first-city-ban-3-d-gun-printing
278.
Walters, Ray. “The Pirate Bay declares 3D printed âphysibles' as the next frontier of piracy,”
ExtremeTech,
January 24, 2012, accessed at
http://www.extremetech.com/electronics/115185-the-pirate-bay-declares-3d-printed-physibles-as-the-next-frontier-of-piracy
279.
Wittbrodt, B.T.,
et al.
“Life-cycle economic analysis of distributed manufacturing with open-source 3-D printers,”
Mechatronics
, June 2013, Elsevier, accessed at
www.timelab.org/sites/all/files/studie3Dprinting_0.pdf
280.
Daw, David. “Criminals Finding New Uses for 3D Printing,”
PC World,
October 10, 2011, accessed at
http://www.pcworld.com/article/241605/criminals_find_new_uses_for_3d_printing.html