Technocreep

Home > Other > Technocreep > Page 25
Technocreep Page 25

by Thomas P. Keenan


  I owe special thanks to John Oakes of OR Books for instantly believing in this project and for shepherding me through the journey of being a first-time book author. Staff members Justin Humphries, Courtney Andujar, Natasha Lewis, and Emily Freyer have also contributed greatly to this book.

  Finally, I’d like to thank all my colleagues in the media. They asked many of the pesky, probing questions that led to this book. Even when they wanted me in the TV studio at 4 AM for a live interview, their provocation was exactly what I needed to stay sharp in this constantly changing field.

  Bibliography

  Albrecht, Katherine, McIntyre, Liz. Spychips: How Major ­Corporations and Government Plan to Track Your Every Purchase and Watch Your Every Move. Nashville, TN: Nelson Current, 2005.

  Angwin, Julia. Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. New York: Times Books, 2014.

  Assange, Julian, et al. Cypherpunks: Freedom and the Future of the Internet. New York: OR Books, 2012.

  Benjamin, Medea. Drone Warfare: Killing by Remote Control. New York: OR Books, 2012

  Cavoukian, Ann, Tapscott, Don. Who Knows: Safeguarding Your Privacy in a Networked World. New York: McGraw Hill, 1997.

  Davies, Kevin. The $1,000 Genome: The Revolution in DNA Sequencing and the New Era of Personalized Medicine. New York: Free Press, 2010.

  Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books, 2014.

  Greenberg, Andy. This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information. New York: Penguin Group, 2012.

  Kurzweil, Raymond. The Singularity is Near: When Humans Transcend Biology. New York: Viking Penguin, 2005.

  Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press, 2010.

  Schneier, Bruce. Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Copernicus, 2003.

  Spar, Debora. The Baby Business: How Money, Science and Politics Drive the Commerce of Conception. Cambridge, MA: Harvard University Press, 2006.

  Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books, 2011.

  Whitaker, Reg. The End of Privacy: How Total Surveillance is Becoming a Reality. New York: The New Press, 1999.

  References

  All online resources accessed and verified in early 2014, but subject to change and deletion.

  1. Blackwell, Tom. “Do-it-yourself brain stimulation has scientists ­worried as healthy people try to make their minds work better,” National Post, June 12, 2013, accessed at http://news.nationalpost.com/2013/06/12/transcranial-direct-current-stimulation-tdcs-technology/

  2. Clark, Liat. “Facebook is using AI to analyze the emotions behind your posts,” wired.co.uk, September 23, 2013, accessed at http://www.wired.co.uk/news/archive/2013-09/23/facebook-deep-learning

  3. Gannes, Liz. “Passwords on Your Skin and in Your Stomach: Inside Google’s Wild Motorola Research Projects (Video),” All Things D, June 3, 2013, accessed at http://allthingsd.com/20130603/passwords-on-your-skin-and-in-your-stomach-inside-googles-wild-motorola-research-projects-video/

  4. Eadicicco, Lisa. “Google Glass Will Track Your Gaze, Patent Hints,” Laptop, August 14, 2013, accessed at http://blog.laptopmag.com/google-glass-patent, and describing U.S. Patent 8,510,166, issued August 13, 2013 and assigned to Google, Inc

  5. BBC. “Tesco petrol stations use face-scan tech to target ads,” November 4, 2013, accessed at http://www.bbc.com/news/technology-24803378

  6. Hood, Leroy. Personal communication, Chicago, IL, February 14, 2014.

  7. Carr, David. “Giving Viewers What They Want,” New York Times, February 24, 2013, accessed at http://www.nytimes.com/2013/02/25/business/media/for-house-of-cards-using-big-data-to-guarantee-its-popularity.html

  8. Gymrek, Melissa, et al. “Identifying Personal Genomes by Surname Inference,” Science, January 18, 2013, 339(6117) p. 321-324, accessed at www.sciencemag.org/content/339/6117/321.abstract.

  9. Dobbs, Sarah. “50 Genuinely Creepy Horror Movies,” Den of Geek, February 22, 2014, accessed at http://www.denofgeek.us/movies/horror-movies/22381/50-genuinely-creepy-horror-movies

  10. http://www.reddit.com/r/Askreddit/comments/1d2v7i/parents_of_reddit_what_is_the_creepiest_thing/

  11. Gravitz, Lauren. “When Your Diet Needs a Band-Aid,” MIT Technology Review, May 1, 2009, accessed at http://www.technologyreview.com/news/413323/when-your-diet-needs-a-band-aid/

  12. Seltzer, Leslie J., et al. “Social vocalizations can release oxytocin in humans,” September 7, 2010, Proceedings of the Royal Society of Biological Sciences, 277(1694) pp. 2661-2666.

  13. Wallace, Richard S. “From Eliza to A.L.I.C.E.,” accessed at www.alicebot.org/articles/wallace/eliza.html

  14. Foner, Leonard, N. In Dautenhahn, Kirstin, ed., Human Cognition and Social Agent Technology. Amsterdam: John Benjamins Publishing, 2000, p. 326.

  15. Forums of Loathing. Accessed at forums.kingdomofloathing.com/vb/showthread.php?t=97928.J

  16. This demonstrates how Hank’s knowledge base was populated with information to help the Coca-Cola company deal with common rumors, such as being owned by the Mormon Church. See http://www.snopes.com/cokelore/mormon.asp. It also illustrates the limits of Hank’s machine intelligence since he was asked about his own theological beliefs but was triggered by the word “Mormon” to reply about stock ownership

  17. http://coca-cola-corporate.com.yeslab.org/contactus/

  18. University of Reno. “Interactive Catholic Confessional,”

  19. Wade, Peter. “For Yom Kippur, Synagogue Invites Congregation to Tweet Their Sins,” Fast Company, September 13, 2013, accessed at http://www.fastcompany.com/3017468/fast-feed/for-yom-kippur-synagogue-invites-congregation-to-tweet-their-sins

  20. Warren, Tom. “This is Cortana, Microsoft’s answer to Siri,” The Verge, March 3, 2014, accessed at http://www.theverge.com/2014/3/3/5465264/microsoft-cortana-windows-phone-screenshots

  21. Kurzweil, Raymond. The Singularity is Near: When Humans Transcend Biology. New York: Viking Penguin, 2005.

  22. Lovelace, Lady Ada. Quoted in Epstein, et al., Parsing the Turing Test. New York: Springer Science, 2009, p. 53.

  23. Freud, Sigmund. “Das Unheimlich,” Imago, Bd. V., 1919; reprinted in Sammlung, Fünfte Folge. Translated by Alix Strachey, accessed at http://web.mit.edu/allanmc/www/freud1.pdf

  24. Mori, Mashahiro. “Bukimi no Tani–The Uncanny Valley,” translated by K.F. MacDorman & T. Minato. Energy, 7(4) p. 33–35, accessed at http://www.androidscience.com/theuncannyvalley/proceedings2005/uncannyvalley.html

  25. Harmon, Amy. “Making Friends With a Robot Named Bina48,” New York Times, July 4, 2010, accessed at www.nytimes.com/2010/07/05/science/05robotside.html

  26. FBI Special Agent Daniel R. Geneck. Criminal Complaint, dated April 21, 2013, accessed http://www.justice.gov/usao/ma/news/2013/April/criminalcomplaint1304211847.pdf

  27. Klontz, Joshua C., Jain, Anil, K. “A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects,” Technical Report MSU-CSE-13-4, accessed at http://www.cse.msu.edu/biometrics/Publications/Face/KlontzJain_CaseStudyUnconstrainedFacialRecognition_BostonMarathonBombimgSuspects.pdf

  28. Shick, Shane (interviewer). “Security Lessons learned from the Boston tragedy (video interview),” CIO Association of Canada, accessed at http://www.youtube.com/watch?v=k5EK-tZlYvo

  29. Wadhwa, Tarun. “The Next Privacy Battle: Cameras That Judge Your Every Move,” Forbes, August 30, 2012,

  30. Iwamoto, Kentaro, et al., “Cigarette smoke detection from captured image sequences,” in Image Processing: Machine Vision Applications III (2010), accessed at http://www.sip.tuat.ac.jp/~tanaka/pdf/cigarette.pdf

  31. New York Civil Liberties Union. “Who’s Watching? Video Camera Surveillance in New York Ci
ty and the Need for Public Oversight,” Fall 2006, accessed at http://www.nyclu.org/pdfs/surveillance_cams_report_121306.pdf

  32. This camera has now moved to 47th and Broadway. See it, and ­thousands of other cameras, live at http://www.earthcam.com/usa/newyork/timessquare/?cam=tsstreet

  33. Hughes, Mark. “CCTV in the spotlight: one crime solved for every 1,000 cameras,” The Independent, August 25, 2009, accessed at http://www.independent.co.uk/news/uk/crime/cctv-in-the-spotlight-one-crime-solved-for-every-1000-cameras-1776774.html

  34. BBC. “Six crimes a day solved by CCTV, Met says,” accessed at http://www.bbc.co.uk/news/uk-england-london-12080487

  35. Lorenc, Theo, et al., “Environmental interventions to reduce fear of crime: systematic review of effectiveness,” Systematic Reviews 2(30), 2013, accessed November 24, 2013 at www.systematicreviewsjournal.com/content/2/1/30

  36. Schneier, Bruce. Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Copernicus: New York, 2010.

  37. Hui, Stephen. “ICBC offers facial-recognition technology to Vancouver police’s riot investigation,” Straight.com, June 17, 2011, accessed at www.straight.com/news/icbc-offers-facial-recognition-technology-vancouver-polices-riot-investigation

  38. Canadian Press. “Use of ICBC data okayed to identify rioters,” June 22, 2011, accessed at http://www.cbc.ca/news/canada/british-columbia/use-of-icbc-data-okayed-to-identify-rioters-1.1064189

  39. Vancouver Police Department.“IRIT recommends charges against 350th ­suspected rioter, July 23, 2013, accessed at http://mediareleases.vpd.ca/2013/07/23/irit-recommends-charges-against-350th-suspected-rioter/

  40. See http://www.gigapixel.com/image/gigapan-canucks-g7.html

  41. Savage, Charlie. “Facial Scanning Is Making Gains in Surveillance,” New York Times, August 21, 2013, accessed at http://www.nytimes.com/2013/08/21/us/facial-scanning-is-making-gains-in-surveillance.html

  42. Merchant, Brian. “We’re ‘Five Years Off’ From Homeland Security Using Facial Recognition to Profile U.S. Citizens,” Motherboard, August 21, 2013, accessed at http://motherboard.vice.com/blog/were-five-years-off-from-homeland-security-using-facial-recognition-to-profile-us-citizens

  43. Langfitt, Frank. “In China, Beware: A Camera May Be Watching You,” National Public Radio, January 29, 2013, accessed at http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you

  44. Keenan, Jordan. “The End of Anonymity and the Quest for Better Gadgets,” Motherboard.tv, accessed at http://motherboard.vice.com/blog/the-end-of-anonymity-and-the-quest-for-better-gadgets

  45. Crowson, Scott. “Police hunt for mom in B.C.,” Calgary Herald, August 18, 2001, p. A1.

  46. Weber, Peter. “Watch why Russians put dashboard cameras in their cars,” The Week, September 25, 2013, accessed at http://theweek.com/article/index/250148/watch-why-russians-put-dashboard-cameras-in-their-cars

  47. Shachtman, Noah. “Pentagon Kills LifeLog Project,” Wired, February 4, 2004, accessed at http://archive.wired.com/politics/security/news/2004/02/62158

  48. Kallstrom, Martin. “How Lifelogging is Transforming the Way We Remember, Track Our Lives,” Wired, June 10, 2013, accessed at http://www.wired.com/insights/2013/06/how-lifelogging-is-transforming-the-way-we-remember-track-our-lives/

  49. Barber, Nick. “Exclusive: MIT’s ‘Kinect of the Future’ looks through walls with X-ray like vision,” IDG News Service, October 11, 2013, accessed at http://www.youtube.com/watch?v=caVZZYbZV_4

  50. O’Brien, Terrence. “Creepy new Air Force camera can identify and track you from far, far away,” Engadget, May 20, 2011, accessed at http://www.engadget.com/2011/05/20/creepy-new-air-force-camera-can-identify-and-track-you-from-far/

  51. Photon-X. Demo video, accessed at http://www.photon-x.com/flash/robinspin.html

  52. As explained in Steven J. Levy’s book, Hackers: Heroes of the Computer Revolution, the term “hacker” was originally an honorific reserved for skilled programmers who could “hack away” at virtually any problem. However, the word has largely been re-purposed to mean someone who uses technology in a ­malevolent way. In this book, both senses are implied at various points.

  53. Rastreador de Namorado, app (in Portuguese), accessed at http://rastreadordenamorado.com.br/

  54. Laird, Lorelei, “Victims are taking on ‘revenge porn’ websites for posting photos they didn’t consent to,” ABA Journal, November 1, 2013, accessed at http://www.abajournal.com/magazine/article/victims_are_taking_on_revenge_porn_websites_for_posting_photos_they_didnt_c/

  55. Federal Bureau of Investigation. Press release, September 26, 2013, accessed at http://www.fbi.gov/losangeles/press-releases/2013/temecula-student-arrested-in-sextortion-case-involving-multiple-victims

  56. US Federal Trade Commission. “FTC Approves Final Order Settling Charges Against Software and Rent-to-Own Companies Accused of Computer Spying,” April 15, 2013, accessed at www.ftc.gov/opa/2013/04/designerware.shtm

  57. Neil, Martha. “7 Retailers Settle with FTC, Agree to Stop Spying on Up to 400,000 Computer Rental Customers,” Sept 26, 2012, accessed at http://www.abajournal.com/news/article/7_Companies_Settle_With_FTC_Agree_to_Stop_Using_Rental_Computer_Webcams_to/

  58. Ilgrenfritz, Richard. “LMSD reaches agreement in Webcam case,” Mainline Media News, October 13, 2010, accessed at http://www.mainlinemedianews.com/articles/2010/10/13/main_line_times/news/doc4cb3a75f46e9f675801205.txt

  59. Accessed at http://www.keralacm.gov.in/

  60. Accessed at http://cam.f-arts.co.jp

  61. Young, Nora. “Always-on Video Portal with Danny Robinson (Full interview),” CBC Radio’s Spark, September 13, 2013, accessed at http://www.cbc.ca/player/Radio/Spark/Extended+Interviews/ID/2406044767/

  62. iStrategyLabs. “Take an Instant Selfie With This Magical Mirror,” blog posting, April 7, 2014, accessed at http://istrategylabs.com/2014/04/take-an-instant-selfie-with-this-magical-mirror/

  63. Farrar, W., Ariel, B. “Self-Awareness to Being Watched and Socially-Desirable Behavior: A Field Experiment on the Effect of Body-Worn Cameras on Police Use-of-Force,” accessed at http://www.policefoundation.org/sites/g/files/g798246/f/201303/The%20Effect%20of%20Body-Worn%20Cameras%20on%20Police%20Use-of-Force.pdf

  64. Stross, Randall. “Wearing a Badge, and a Video Camera,” New York Times, April 6, 2013, accessed at http://www.nytimes.com/2013/04/07/business/wearable-video-cameras-for-police-officers.html?_r=2&

  65. Vancouver Police Department. “2011 Stanley Cup Riot Review,” September 6, 2011, accessed at http://vancouver.ca/police/assets/pdf/reports-policies/vpd-riot-review.pdf

  66. Lee, Hyunho. “Korean researchers demonstrate a new class of transparent, stretchable electrodes,” Asia Research News, May 30, 2013, accessed at http://www.researchsea.com/html/article.php/aid/7724/cid/2/research/korean_researchers_demonstrate_a_new_class_of_transparent__stretchable_electrodes.html

  67. Accessed at http://www.prserve.com/sunshade/

  68. Barrett, Chris. “Google Glass - The First Fight & Arrest Caught on Glass - July 4 Wildwood, NJ boardwalk,” July 14, 2013, accessed at https://www.youtube.com/watch?v=4isOSntnpo8

  69. Google. Glass (etiquette guidelines). n.d., accessed at https://sites.google.com/site/glasscomms/glass-explorers

  70. Rosenblum, Andrew. “Spy vs. Spy: Casinos Can’t See The Cameras Hidden Up Gamblers’ Sleeves,” Popular Science, August 8, 2011, accessed at http://www.popsci.com/technology/article/2011-06/spy-vs-spy-casinos-cant-see-cameras-hidden-gamblers-sleeves

  71. MiKandi. “First-Ever Google Glass Porn,” accessed at http://www.youtube.com/watch?v=Xxt24JoLlPE

  72. LA Times. “Burger King does not want its employees to take baths,” August 13, 2008, accessed at http://opinion.latimes.com/opinionla/2008/08/burger-king-doe.html

  73. Sachs, Wendy. “The secret life of my sixth grader,” CNN, November 27, 2012, accessed at http://edition.cnn.com/2012/11/27/living/child-social-media

  74. The National Campaign, “Sex and Tech,” 2008, accessed
at http://www.­thenationalcampaign.org/

  75. Bulatovic, Peja. “Nudity filter helps Chatroulette clean up,” January 20, 2011, at http://www.cbc.ca/news/technology/story/2011/01/20/algorithm-tech-nudity-chatroulette-filter-flashers.html

  76. Badabing!, iTunes store, accessed at https://itunes.apple.com/us/app/badabing!/id548536602?mt=8

  77. SnapChat Save Pics, March 2014, accessed at https://play.google.com/store/apps/details?id=com.appztastic.snapchatsavepics

  78. Acquisti, A., Gross, R., Stutzman, F. “Faces of Facebook: Or, How The Largest Real ID Database In The World Came To Be,” research paper accessed at http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/

  79. Walters, Helen. “The battle between public and private: Alessandro Acquisti at TEDGlobal 2013,” accessed at http://blog.ted.com/2013/06/14/the-battle-between-public-and-private-alessandro-acquisti-at-tedglobal-2013

  80. Vale, Jack. “Social Media Experiment,” November 18, 2013, accessed at http://www.youtube.com/watch?feature=player_embedded&v=5P_0s1TYpJU

  81. Belgian Financial Sector Federation, “Amazing mind reader reveals his ‘gift,” accessed at http://www.youtube.com/watch?v=F7pYHN9iC9I

  82. Kim, Susanna. “Tenn. Family Sues After Seeing Altered, ‘Offensive’ Images of Son with Down Syndrome,” ABC News, April 29, 2013, accessed at http://abcnews.go.com/Business/tenn-family-sues-alter-images-son-syndrome/story?id=19050815#.UYFcHUqNAR8

  83. Oved, Macro Chown. “Stolen Instagram baby photos used for sexual role play,” Toronto Star, May 1, 2013, accessed at http://www.thestar.com/life/technology/2013/05/01/stolen_instagram_baby_photos_used_for_sexual_role_play.html

  84. Ibid.

  85. Gruchawka, Steve. “Using the Deep Web,” techdeepweb.com, n.d., accessed at http://techdeepweb.com,

  86. Paglieri, Jose. “The Deep Web you don’t know about,” CNN Money, March 10, 2014, accessed at http://money.cnn.com/2014/03/10/technology/deep-web/

 

‹ Prev