Read Technocreep Online

Authors: Thomas P. Keenan

Technocreep (37 page)

217.
Ramirez, S.,
et al.
“Creating a False Memory in the Hippocampus,”
Science
26 July 2013: 341(6144) pp. 387-391.

218.
Defense Advanced Research Projects Agency. “Narrative Networks,” n.d., accessed at
http://www.darpa.mil/Our_Work/DSO/Programs/Narrative_Networks.aspx

219.
Charles River Analytics. “Charles River Analytics to Support DARPA in Researching the Effects of Narratives on Human Behavior,” July 30, 2012, accessed at
https://www.cra.com/about-us/news.asp?display=detail&id=338

220.
Dillow, Clay. “Brain-Scanning Binoculars Harness Soldiers' Unconscious Minds to Locate Threats,” Popular Science, July 5, 2012, accessed at
www.popsci.com/technology/article/2012-07/new-brain-scanning-binoculars-move-mind-melding-battle-tech-closer-deployment

221.
Weinberger, Sharon. “Mind control moves into battle,”
BBC
, July 5, 2012, accessed at
http://www.bbc.com/future/story/20120704-mind-control-moves-into-battle

222.
Petro, Lucy S.,
et al.
“Decoding face categories in diagnostic subregions of primary visual cortex,” February 3, 2013,
European Journal of Neuroscience
, April 2013, 37(7) p. 1130-1139.

223.
bengood4000. “Body for sale: How much are your chemical components worth?” March 21, 2011, accessed at
http://bgoodscience.wordpress.com/2011/03/21/body-for-sale-how-are-your-chemical-components-worth

224.
http://www.oneplusyou.com/bb/cadaver

225.
Mareedu, Mouli. “Cadavers on sale at Osmania mortuary,”
The New Indian Express
, June 13, 2011, accessed at
http://ibnlive.in.com/news/cadavers-on-sale-at-osmania-mortuary/159031-60-121.html

226.
Science Care. “Understanding Whole Body Donation,” n.d., accessed at
http://www.sciencecare.com/body-donation-overview/

227.
Nanyang Technological University. “Plastic realistic: NTU medical students to use plastinated human bodies for anatomy learning,” May 23, 2013, accessed at
http://media.ntu.edu.sg/NewsReleases/Pages/newsdetail.aspx?news=ad8f3ba0-3fb6-4754-a40e-415ec846b776

228.
The Plastination Company, Inc. “The History of Our Body Donation Program,” n.d., accessed at
http://www.koerperspende.de/en.html

229.
Calandrino, Joseph A,
et al.
“Some Consequences of Paper Fingerprinting for Elections,” n.d., accessed at
http://www.cs.princeton.edu/~jcalandr/papers/paper-evt09.pdf

230.
Rueda, Jorge. “Thumbprint readers stir fears in Venezuela vote,”
Yahoo! Finance
, August 6, 2012, accessed at
http://finance.yahoo.com/news/thumbprint-readers-stir-fears-venezuela-vote-131434477.html

231.
Vice Japan.
“Fake Funerals in South Korea,” July 19, 2013, accessed at
http://www.vice.com/en_ca/vice-news/a-good-day-to-die-fake-funerals-in-south-korea

232.
Merz, Theo. “LivesOn review: can Twitter make you immortal?”
The Telegraph,
August 16, 2013, accessed at
http://www.telegraph.co.uk/technology/mobile-app-reviews/10246708/LivesOn-review-can-Twitter-make-you-immortal.html

233.
http://postrapturepetcare.com

234.
http://www.themonastery.org/catalog/drofdivinitycertificatedd-p-68.html

235.
Kurzweil, Raymond.
The Singularity is Near: When Humans Transcend Biology
. New York: Viking Penguin, 2005.

236.
www.highexistence.com/wireheading-a-world-without-negative-emotion

237.
Roache, Rebecca. “Enhanced punishment: can technology make life sentences longer?,” August 2, 2013, accessed at
http://blog.practicalethics.ox.ac.uk/2013/08/enhanced-punishment-can-technology-make-life-sentences-longer/

238.
Mears, Bill. “Government can't hold NSA surveillance data longer,”
CNN
, March 7, 2014, accessed at
http://edition.cnn.com/2014/03/07/politics/nsa-surveillance-extend/

239.
Galperin, Eva. “How to Remove Your Google Search History Before Google's New Privacy Policy Takes Effect,” blog posting, Feburary 22, 2012, accessed at
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect

240.
CBC News. “How a Hamilton woman lost then won a $50m lotto ticket,” December 5, 2013, accessed at
www.cbc.ca/news/canada/hamilton/news/how-a-hamilton-woman-lost-then-won-a-50m-lotto-ticket-1.2449082

241.
Cavoukian, Ann. “Guidelines for the Use of Video Surveillance Cameras in Public Places,” September 2007, accessed at
www.ipc.on.ca/images/Resources/video-e.pdf

242.
Accessed at
http://quux.org:70/Archives/usenet-a-news/FA.sf-lovers/81.06.23_ucbvax.1870_fa.sf-lovers.txt

243.
Accessed at
https://support.google.com/chat/answer/29290?hl=en

244.
Black Hat. “Black Hat USA 2013 Keynote - Gen. Alexander,” accessed at
http://www.youtube.com/watch?v=xvVIZ4OyGnQ

245.
Keenan, Thomas P. “Can We Ever Have Technological Security,” Canadian Defence and Foreign Affairs Institute and Canadian International Council, October 2013, accessed at
http://www.cdfai.org/PDF/CanWeHaveTechnological%20Security.pdf

246.
Goldstein, Brett. “When Government Joins the Internet of Things,”
New York Times
, September 8, 2013, accessed at
http://www.nytimes.com/roomfordebate/2013/09/08/privacy-and-the-internet-of-things/when-government-joins-the-internet-of-things

247.
Flagg, Kathryn. “Broken Records? Vermont Takes Its First Steps in the Direction of ‘Open Data',”
Seven Days
, October 13, 2013, accessed at
http://www.7dvt.com/2013broken-records-vermont-takes-its-first-steps-direction-open-data

248.
Saunders, Laura. “Is Your Political Donation Deductible?,”
Wall
Street Journal
, September 28, 2012, accessed at
online.wsj.com/news/articles/SB10000872396390444549204578022201425205738

249.
Privacy Rights Clearing House. “Fact Sheet 11: From Cradle to Grave. Government Records and Your Privacy,” Revised December 2013, accessed December 6, 2013 at
www.privacyrights.org/cradle-grave-government-records-and-your-privacy

250.
Calgary Herald. “Tough sledding built up festival founder,”
Calgary Herald
, April 27, 2007, accessed at
http://www.canada.com/story_print.html?id=23e005c5-2940-46cd-9be9-eb3076d8101f

251.
Singer, Natasha. “Mapping, and Sharing, the Consumer Genome,”
New York Times,
June 16, 2012, accessed at
http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html

252.
Acxiom. “PersonicX Cluster, Perspectives,” n.d., accessed at
reference.mapinfo.com/software/anysite_segmentation/english/2_0_1/PersonicX_Binder.pdf

253.
The granddaddy of these sites is
http://www.wasarrested.com
, which has been around since 2001

254.
Dewey, Caitlin. “Hunter Moore is in jail, but that just means some other ­despicable character is ‘the most-hated man on the Internet' now,”
Washington Post
, January 24, 2014, accessed at
http://www.washingtonpost.com/blogs/style-blog/wp/2014/01/24/hunter-moore-is-in-jail-but-that-just-means-some-other-despicable-character-is-the-most-hated-man-on-the-internet-now/

255.
Wlasuk, Alan. “The top 10 hackers of all time,”
TechRepublic,
July 26, 2011, accessed at
http://www.techrepublic.com/blog/10-things/the-top-10-hackers-of-all-time/

256.
Montgomery, James. “Justin Bieber Is Not Going To North Korea, Rep Confirms,”
MTV.com
, July 7, 2010, accessed at
http://www.mtv.com/news/articles/1643113/justin-bieber-not-going-north-korea-rep-confirms.jhtml

257.
Geller, Wendy. “Internet Campaign Helps ‘Fat Old Guy' in Quest to Achieve Taylor Swift Dream,”
Rolling Stone,
July 18, 2013, accessed at
http://www.­rollingstone.com/music/news/internet-campaign-helps-fat-old-guy-in-quest-to-achieve-taylor-swift-dream-20130718

258.
Topping, David. “Something Awful, Something New,”
Torontoist.com
, July 16, 2008 accessed at
http://torontoist.com/2008/07/logan_aubes_hockey_night_theme/

259.
The Economist
. “Masters of the cyber-universe,”
The Economist,
April 6, 2013, accessed at
http://convertpdftoword.net/convertpdftoword.aspx/

260.
Ibid.

261.
Naughton, John. “US fears back-door routes into the net because it's building them too,”
The Guardian,
October 13, 2013, accessed at
http://www.theguardian.com/technology/2013/oct/13/us-scared-back-door-routes-computers-snowden-nsa

262.
Simonite, Tom. “A Computer Infection that Can Never Be Cured,”
MIT Technology Review,
August 1, 2012, accessed at
www.technologyreview.com/news/428652/a-computer-infection-that-can-never-be-cured/

263.
Karger, Paul A., Schell, Roger R. “Multics Security Evaluation,” U.S. Air Force, Electronic Systems Division report ESD-TR-193, Vol. II, June 1974, accessed at
csrc.nist.gov/publications/history/karg74.pdf

264.
Wetter, Dirk. “Research: Stored XSS Vulnerability @ Amazon,” December 18, 2010, accessed at
http://drwetter.eu/amazon

265.
Love, Dylan. “A Certain String Of Arabic Characters Will Crash Your Mac And iPhone Apps,” September 3, 2013, accessed at
http://www.businessinsider.com/arabic-characters-ios-bug-2013-9#ixzz2fApGYxUX

266.
Collinson, Patrick. “Is this the most wicked scam yet?”
The Guardian
, April 5, 2008, accessed at
http://www.theguardian.com/money/2008/apr/05/scamsandfraud

267.
Brignull, Harry. “Ryanair trick insurance opt-out trick question (August 2010),” August 4, 2010, accessed at
http://darkpatterns.org/ryan-air-trick-insurance-opt-out-trick-question-august-2010/

268.
Malware Tips. “Conduit Search–Virus Removal Guide,” n.d., accessed at
http://malwaretips.com/blogs/remove-conduit-search-virus/

269.
Barisani, Andrea, Bianco, Daniele. “Unusual Car Navigation Tricks: Injecting RDS-TMC Traffic Information Signals,” Inverse Path, 2007, accessed at
http://dev.inversepath.com/rds/cansecwest_2007.pdf

270.
Ozer, Nicole. A. “Note to Self: Siri Not Just Working for Me, Working Full-Time for Apple, Too,” blog posting, March 12, 2012, accessed at
http://www.aclunc.org/issues/technology/blog/note_to_self_siri_not_just_working_for_me,_working_full-time_for_apple,_too.shtml

271.
Gay, Alicia. “Apple's Latest iPhone Has No Problem Pointing Users to Viagra, But Comes Up Blank on Birth Control, Abortion,” blog posting, November 30, 2011, accessed at
www.aclu.org/blog/reproductive-freedom/apples-latest-iphone-has-no-problem-pointing-users-viagra-comes-blank/

272.
ProgramYourKeys.com. “BMW 3 Series–Key Remote Programming,” n.d., accessed at
http://www.programyourkeys.com/BMW_3-Series_Key_Remote_Control_Fob_Programming.html

273.
Obias, Rudie. “11 Google Services With Hidden Easter Eggs,” Mental Floss, August 20, 2013, accessed at
http://mentalfloss.com/article/52191/11-google-services-hidden-easter-eggs

274.
Mead, Derek. “How Reddit Got Huge: Tons of Fake Accounts,”
Motherboard.tv
,
June 21, 2012, accessed at
motherboard.vice.com/read/how-reddit-got-huge-tons-of-fake-accounts–2

275.
Results of this “scam-baiting” can be viewed at
http://forum.419eater.com/forum/album.php

276.
Defense Distributed. “DD History,” n.d., accessed at
defdist.org/dd-history/

277.
Van Zuylen-Wood, Simon. “Philly Becomes First City to Ban 3-D Gun Printing,” Philadelphia Magazine, November 21, 2013, accessed at
http://www.phillymag.com/2013/11/21/philly-becomes-first-city-ban-3-d-gun-printing

278.
Walters, Ray. “The Pirate Bay declares 3D printed ‘physibles' as the next frontier of piracy,”
ExtremeTech,
January 24, 2012, accessed at
http://www.extremetech.com/electronics/115185-the-pirate-bay-declares-3d-printed-physibles-as-the-next-frontier-of-piracy

279.
Wittbrodt, B.T.,
et al.
“Life-cycle economic analysis of distributed manufacturing with open-source 3-D printers,”
Mechatronics
, June 2013, Elsevier, accessed at
www.timelab.org/sites/all/files/studie3Dprinting_0.pdf

280.
Daw, David. “Criminals Finding New Uses for 3D Printing,”
PC World,
October 10, 2011, accessed at
http://www.pcworld.com/article/241605/criminals_find_new_uses_for_3d_printing.html

Other books

Sara's Child by Susan Elle
Just a Corpse at Twilight by Janwillem Van De Wetering
His Private Nurse by Arlene James
The Last Houseparty by Peter Dickinson
The Strength of Three by Annmarie McKenna
The Twelfth Imam by Joel C.Rosenberg
Los barcos se pierden en tierra by Arturo Pérez-Reverte
Marriage by Deception by Sara Craven
The Forever War by Joe Haldeman


readsbookonline.com Copyright 2016 - 2024