292. LinkedIn. “Our New User Agreement and Privacy Policy,” September 12, 2013, accessed at http://blog.linkedin.com/2013/08/19/updates-to-linkedins-terms-of-service/
293. Cluely, Graham. “Shameful and creepy. LinkedIn opens its doors to kids as young as 13 years,” blog posting, August 20, 2013, accessed at http://grahamcluley.com/2013/08/linkedin-kids-13-years-old/
294. Rivlin, Jack. “LinkedIn is signing up children–it’s official, we’ve ruined childhood,” August 21, 2013, accessed at http://blogs.telegraph.co.uk/technology/jackrivlin/100009930/linkedin-is-signing-up-children-its-official-weve-ruined-childhood/
295. Canadian Press. “Facebook considering opening site to preteens,” CBC News, October 22, 2013, accessed at http://www.cbc.ca/news/technology/facebook-considers-opening-site-to-preteens-1.2158439
296. Oliver, Gabriel. “The 5 Most Unsettling Disney Theme Park Easter Eggs,” July 1997, accessed at www.cracked.com/article_19977_the-5-most-unsettling-disney-theme-park-easter-eggs.html
297. Sato, Munehiko, et al. “Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects,” May 5, 2012, accessed at http://www.disneyresearch.com/wp-content/uploads/touchechi2012.pdf
298. Disney Research. “Inshin-Den-Shin, Transmitting Sound Through Touch,” story and video, n.d., accessed at http://www.disneyresearch.com/project/ishin-den-shin/
299. Weiser, M. “The computer for the 21st century.” Scientific American, (9)September 1991, pp. 94-104.
300. McMahon, Tamsin. “Open secrets online: What’s personal and what’s corporate?,” Macleans, March 8, 2014, accessed at http://www.macleans.ca/economy/business/open-secrets-3/
301. Chan, Sewell. “Leona Helmsley’s Unusual Last Will,” New York Times City Room blog posting, August 29, 2007, accessed at http://cityroom.blogs.nytimes.com/2007/08/29/leona-helmsleys-unusual-last-will/
302. Associated Press. “Trouble, the millionaire Maltese, dies,” The Guardian, June 9, 2011, accessed at http://www.theguardian.com/world/2011/jun/09/trouble-millionaire-maltese-dies
303. Jermyn, Diane. “How to write a ‘fur kid’ into your will,” Globe and Mail, July 31, 2012, accessed at http://www.theglobeandmail.com/globe-investor/personal-finance/financial-road-map/how-to-write-a-fur-kid-into-your-will/article4449089/
304. http://www.formalwill.ca/will-products-canada
305. Horn L, et al. “The Importance of the Secure Base Effect for Domestic Dogs–Evidence from a Manipulative Problem-Solving Task,” PLoS ONE 8(5): e65296.
306. Miller, Greg A. Going … Going … Nuts!: The Story Had to Be Told, 2004, PublishAmerica, Frederick, MD.
307. http://www.improbable.com/ig/winners/#ig2005
308. Google. “Google Voice Expands to new Markets,” blog posting, April 1, 2012, accessed at http://googlevoiceblog.blogspot.ca/2012/04/google-voice-expands-to-new-markets.html
309. Garber, Megan. “Animal Behaviorist: We’ll Soon Have Devices That Let Us Talk With Our Pets,” The Atlantic, June 4, 2013, accessed at http://www.theatlantic.com/technology/archive/2013/06/animal-behaviorist-well-soon-have-devices-that-let-us-talk-with-our-pets/276532/
310. Ibid.
311. BBC. “World: Americas: Furby toy or Furby spy?” January 13, 1999, accessed at http://news.bbc.co.uk/2/hi/americas/254094.stm
312. Assange, Julian. Cypherpunks: Freedom and Future of the Internet. New York: OR Books, 2012.
313. Hoover, Dwayne. “6 Things You Won’t Believe Got Banned by Modern Governments, cracked.com, May 12, 2011, accessed at http://www.cracked.com/article_19192_6-things-you-wonE28099t-believe-got-banned-by-modern-governments.html
314. Furby Central. “Furby Cheats,” blog posting, n.d., accessed at http://www.virtualpet.com/vp/farm/furby/furby.htm
315. Mimitchi.com. “What does ‘Kitty Kitty’ mean?,” blog posting, n.d, accessed at http://www.mimitchi.com/html/ffaq4.htm
316. BBC. “Disposing of a Furby,” blog posting, n.d., accessed at http://www.bbc.co.uk/dna/place-london/plain/A71641
317. Silvanovich, Natalie. “What Will the Tamagotchi Become? and Other Questions of Tamagotchi Life,” blog posting, n.d., accessed at http://www.kwartzlab.ca/2013/06/what-will-tamagotchi-become-and-other-questions-tamagotchi-life/
318. Brewster, Signe. “Cyborg insects could map collapsed buildings for first responders,” Gigaom, October 16, 2013, accessed at http://gigaom.com/2013/10/16/cyborg-insects-could-map-collapsed-buildings-for-first-responders/
319. Backyard Brains. “The Roboroach,” n.d., accessed at https://backyardbrains.com/products/roboroach
320. Lockwood, Jeffery. Six-Legged Soldiers: Using Insects as Weapons of War. New York: Oxford University Press, 2009.
321. Edwards, Lin. “Cyborg beetles to be U.S. military’s latest weapon (w/Video),” phys.org, October 15, 2009, accessed at http://phys.org/news174812133.html
322. Brandon, Elicia. “Jules Says Goodbye,” video, YouTube, November 20, 2006, accessed at http://www.youtube.com/watch?v=xRR33WDFi_k
323. Annie. “US Army Robots Will Outnumber Human Soldiers in a Decade,” blog posting, November 25, 2013, accessed at http://news.filehippo.com/2013/11/us-army-robots-will-outnumber-human-soldiers-in-a-decade/
324. NIMA TV. “Android brothels: robot prostitutes could replace humans by 2050,” YouTube, April 23, 2012.
325. Yeoman, Ian, Mars, Michelle. “Robots, Men and Sex Tourism,” Futures, 44(2012)pp. 365-371, Elsevier, 2011.
326. YouGov. “Omnibus Poll,” February 20-21, 2013, accessed at http://big.assets.huffingtonpost.com/toplinesbrobots.pdf
327. Blain, Loz. “[NSFW] Realtouch Interactive: Remote sex is no longer a thing of the future (Part 2),” gizmag, May 30, 2013, accessed at http://www.gizmag.com/realtouch-interactive-remote-sex-teledildonics/27441/
328. Efee Link. “App Controlled Interactive Sex Toys for Long Distance Lover Over the Internet,” https://www.youtube.com/watch?v=RymJS60xGlo
329. Ikeda, Hayato. “VR Tenga Demo (1): Oculus Rift + Novint Falcon + Tenga,” accessed at http://www.youtube.com/watch?v=nLXVinyXjgA
330. Lin, Patrick, et al. Robot Ethics. Cambridge, MA: MIT Press.
331. Turkle, Sherry. “Sociable Robots,” talk at 2013 AAAS meeting, video, at 54:30, accessed at http://www.solvingforpattern.org/2013/02/17/sherry-turkle-aaas-talk-on-sociable-robotics/
332. Erick Schonfeld. “Eric Schmidt Tells Charlie Rose Google Is ‘Unlikely’ To Buy Twitter And Wants To Turn Phones Into TVs,” TechCrunch, March 7, 2009, accessed at http://techcrunch.com/2009/03/07/eric-schmidt-tells-charlie-rose-google-is-unlikely-to-buy-twitter-and-wants-to-turn-phones-into-tvs/
333. Champeau, Rachel. “UCLA study finds that searching the Internet increases brain function,” UCLA Newsroom, October 14, 2008, accessed at http://newsroom.ucla.edu/portal/ucla/ucla-study-finds-that-searching-64348.aspx
334. Small, Gary, Vorgan, Gigi. iBrain: Surviving the Technological Alteration of the Modern Mind, New York: Harper Collins, 2008.
335. http://money.cnn.com/2013/04/08/technology/security/shodan/index.html
336. Chazan, M, et al. “Microstratigraphic evidence of in situ fire in the Acheulean strata of Wonderwerk Cave, Northern Cape province, South Africa,” PNAS 2012 109 (20) E1215–E1220.
337. Nissenbaum, Helen. “Privacy as Contextual Integrity,” 79 Wash. Law Review, 119 (2004) pp. 119-157.
338. Madrigal, Alexis C. “The Philosopher Whose Fingerprints Are All Over the FTC’s New Approach to Privacy,” The Atlantic, March 29, 2012, accessed at http://www.theatlantic.com/technology/archive/2012/03/the-philosopher-whose-fingerprints-are-all-over-the-ftcs-new-approach-to-privacy/254365/
339. Bilton, Nick. “Girls Around Me: An App Takes Creepy to a New Level,” New York Times, March 30, 2012, accessed at http://bits.blogs.nytimes.com/2012/03/30/girls-around-me-ios-app-takes-creepy-to-a-new-level/
340. Jentsch, Ernst Anton. “On the Psychology of the Uncanny,” Psychiatrisch-Neurologische Wochenschrift 8.22 (25 Aug. 1906): 195-98 and 8.23 (1 Sept. 1906): 203-
05, translated by Roy Sellars, accessed at http://art3idea.psu.edu/locus/Jentsch_uncanny.pdf
341. Colon, Alex. “Foursquare and the future of check-ins,” Gigaom, March 19, 2014, accessed at http://gigaom.com/2014/03/19/foursquare-and-the-future-of-check-ins/
342. Perez, Sarah. “Social Travel App Jetpac Ditches Facebook, Pivots To Instagram-Based ‘City Guides’ For At-A-Glance Recommendations,” TechCrunch, December 5, 2013, accessed at http://techcrunch.com/2013/12/05/social-travel-app-jetpac-ditches-facebook-pivots-to-instagram-based-city-guides-for-at-a-glance-recommendations/
343. Ackerman, Spencer, Ball, James. “Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ,” The Guardian, February 28, 2014, accessed at http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
344. Canada Research Chair in Electronic Health Information, accessed at http://www.chairs-chaires.gc.ca/chairholders-titulaires/profile-eng.aspx?profileID=1690
345. Teotonio, Isabel. “Canadian woman denied entry to U.S. because of suicide attempt,” Toronto Star, January 29, 2011, accessed at http://www.thestar.com/news/gta/2011/01/29/canadian_woman_denied_entry_to_us_because_of_suicide_attempt.html
346. Bradley, Simon, “Whistleblowers and Spying Experts Talk Privacy,” Swiss Broadcasting Corporation, October 1, 2013, accessed January 15, 2014 at www.swissinfo.ch/eng/whistleblowers-and-spying-experts-talk-privacy/37016178
347. Sanger, David E., and Shanker, Thom. “N.S.A. Devises Radio Pathway Into Computers,” New York Times, January 14, 2014, accessed January 15, 2014 at http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html
348. Leafkiller, et al. “How to See Who Views Your Facebook Profile the Most,” WikiHow, n.d., accessed at http://www.wikihow.com/See-Who-Views-Your-Facebook-Profile-the-Most
349. http://www.unfriendfinderfacebook.com
350. http://www.eyelock.com/index.php/products/myris
351. Monks, Kieron. “The guns that know who is firing them: Can smart tech make firearms safer?,” CNN, March 26, 2014, accessed at http://edition.cnn.com/2014/03/26/tech/innovation/smart-guns-know-whos-firing/index.html?hpt=hp_c6
352. Phillips v. Telus Corp., 2002 BCPC 499, in which Lila Dawn Phillips was awarded damages of one dollar because her phone company refused to accept payment of her bill in cash at its retail outlet.
353. Slade, Daryl. “Accused killer searched ‘how to dissolve a body’,” Calgary Herald, December 11, 2013, p. A8.
354. Barbaro, Michael, Zeller, Tom Jr. “A Face Is Exposed for AOL Searcher No. 4417749,” New York Times, August 9, 2006, accessed at http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=2&
355. http://www.priv.gc.ca/cf-dc/2014/2014_001_0114_e.asp
356. http://classactiondefense.jmbm.com/pineda_class_action_defense_cal.pdf
357. Mabe, Tom. “The Angel of Death cemetery prank call,” n.d., accessed at https://www.youtube.com/watch?v=oLnQXmkR3dI
358. Schwartz, John. “Consumers Finding Ways to Zap Telemarketer Calls,” New York Times, December 18, 2002, accessed January 15, 2014 at http://www.nytimes.com/2002/12/18/business/consumers-finding-ways-to-zap-telemarketer-calls.html?src=pm
359. Bradford University. “Can Tattoos Cause Harm?,” accessed January 15, 2014 at http://www.bradford.ac.uk/about/news/tattoo-risk/?bnr.
360. Tattoo Archive. “Identification,” accessed January 15, 2014 at http://www.tattooarchive.com/tattoo_history/identification.html
361. FBI. “Image-Based Matching Technology Offers Identification and Intelligence Prospects,” accessed January 15, 2014 at http://www.fbi.gov/about-us/cjis/cjis-link/december-2012/Image-Based%20Matching%20Technology%20Offers%20Identification%20and%20Intelligence%20Prospects
362. Rebuttal evidence in re: California v. Michael Joe Jackson, accessed January 15, 2014 at http://www.sbscpublicaccess.org/docs/ctdocs/052505pltmotchandler.pdf
363. Bhardwaj, Julian. “What is your phone saying behind your back?,” Naked Security, October 2, 2012, accessed January 15, 2014 at http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/
364. http://www.cockeyed.com/ebay/safeway_card/ebay_copy.html
365. Terdiman, Daniel. “Gaming the Safeway Club Card,” Wired, July 11, 2003, accessed at http://www.wired.com/techbiz/media/news/2003/07/59589
366. www.directlabs.com, accessed January 15, 2014.
367. As countless presenters have declared in their slide decks: IANAL/IANYL–“I am not a lawyer/I am not your lawyer.”
368. New York Law, ypdcrime.com, n.d., accessed at http://ypdcrime.com/penal.law/article190.htm
369. http://www.howtogetitincanada.com/how-to-get-the-us-version-of-itunes-in-canada/
370. Rayman, Graham. “Ken Tarr Launches a Hoax Campaign on an Industry Immune to Shame,” Village Voice, June 5, 2013, accessed January 15, 2014 at www.villagevoice.com/2013-06-05/news/ken-tarr-reality-tv/full/
371. Applebaum, Yoni. “How the Professor Who Fooled Wikipedia Got Caught by Reddit,” The Atlantic, May 15, 2012, accessed January 15, 2014 at www.theatlantic.com/technology/archive/2012/05/how-the-professor-who-fooled-wikipedia-got-caught-by-reddit/257134/
372. www.reddit.com/r/AskReddit/comments/sxkig/opinions_please_reddit_do_you_think_my_uncle_joe/c4htt9n
373. Hansell, Saul. “TiVo is Watching When You Don’t Watch, and It Tattles,” New York Times, July 26, 2006, accessed January 15, 2014 at http://www.nytimes.com/2006/07/26/technology/26adco.html?ex=1311566400&en=143cb4893c1c45a9&ei=5090&partner=rssuserland&emc=rss
374. Watson, Julie. “Cecilia Abadie, California Motorist, Cleared In Google Glass Case,” January 16,2014, accessed January 18, 2014 at http://www.huffingtonpost.com/2014/01/16/cecilia-abadie_n_4613257.html
375. Ball, James. “NSA collects millions of text messages daily in ‘untargeted’ global sweep,” The Guardian, January 16, 2014, accessed January 16, 2014 at www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
376. www.007voip.com/
377. Schneier, Bruce. “How the NSA Attacks TOR/Firefox Users with QUANTUM AND FOXACID,” October 7, 2013, accessed at www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html
378. http://getnarrative.com/
379. Google, Inc. “Introducing our smart contact lens project,” Google Official Blog, January 16, 2014, accessed at http://googleblog.blogspot.com/2014/01/introducing-our-smart-contact-lens.html
380. Prey. “Amazing creativity: Use Prey to Track Your Bike,” The Prey Blog, n.d., accessed at http://preyproject.com/blog/2012/09/amazing-ingenuity-using-prey-to-track-your-bicycle
381. Huffington Post UK. “‘Brainless Thief’ Steals Phone Then Uploads Selfie To Whatsapp,” Huffington Post UK, January 23, 2014, accessed at http://www.huffingtonpost.co.uk/2013/10/13/brainless-thief-steals-phone-uploads-selfie-whatsapp_n_4094357.html
382. Associated Press, “New York City man sets dating app honey trap to recover iPhone,” January 5, 2013, accessed January 15, 2014 at http://www.cbc.ca/news/world/nyc-man-sets-dating-app-honey-trap-to-recover-iphone-1.1304693
383. In re: Google Cookie Placement Consumer Privacy Litigation, 12-md-02358, U.S. District Court, District of Delaware (Wilmington).
384. Sons of Maxwell. “United Breaks Guitars,” YouTube, July 6, 2009, accessed at http://www.youtube.com/watch?v=5YGc4zOqozo
385. Pfeiffer, Eric. “Woman gets $3,500 fine and bad credit score for writing negative review of business,” Yahoo! News, November 15, 2013, accessed at http://news.yahoo.com/woman-gets–3-500-fine-and-bad-credit-score-for-writing-negative-review-of-business-233833012.html
386. tripper61PA. “Skyauction Scam,” Tripadvisor.com, June 28, 2011, accessed at http://www.tripadvisor.ca/ShowTopic-g499445-i9177-k4596925-Skyauction_Scam-Akumal_Yucatan_Peninsula.html
387. http://nyc2600.net/about
388. https://defcon.org/html/defcon-21/dc-21-speakers.html#Keenan
389. http://www.blackhat.com/asia-14/br
iefings.html#Keenan
390. https://www.defcon.org/html/defcon-21/dc-21-vendors.html
Technocreep Page 28