Liars and Outliers (52 page)

Read Liars and Outliers Online

Authors: Bruce Schneier

BOOK: Liars and Outliers
9.72Mb size Format: txt, pdf, ePub

farm these eels Japan Times
(10 Apr 2010), “Japan Succeeds in World's First Complete Cultivation of Eels.”

In ancient Rome
Robert L. Wilken (1985),
The Christians as the Romans Saw Them
, Yale University Press. Peter Brown (1995),
Authority and the Sacred: Aspects of the Christianization of the Roman World
, Cambridge University Press.

Norms can change quickly
Ayelet Gneezy and Daniel M.T. Fessler (2011), “Conflict, Sticks, and Carrots: War Increases Prosocial Punishments and Rewards,”
Proceedings of the Royal Society B: Biological Sciences
, published online before print, 8 Jun 2011:1–5.

women or slaves
Barbara C. Jordan (24 Jul 1974), “Statement on House Judiciary Proceedings to Impeach President Richard Nixon,” House Judiciary Committee.

political debates
Howard Fineman (2008),
The Thirteen American Arguments: Enduring Debates That Define and Inspire Our Country
, Random House.

Chapter 16

have more flaws
Bruce Schneier (Mar 2000), “Software Complexity and Security,”
Crypto-Gram.

fail in surprising
Charles Perrow (1984),
Normal Accidents: Living with High-Risk Technologies
, Basic Books. Dietrich Dörner (1996),
The Logic of Failure: Recognizing and Avoiding Error in Complex Situations
, Perseus Books.

This aspect of scale
Jane Wakefield (22 Aug 2011), “When Algorithms Control the World,”
BBC News.

tend to minimize
Daniel Gilbert (2 Jul 2006), “If Only Gay Sex Caused Global Warming,”
Los Angeles Times
.

pretending to eliminate
Frank Furedi (1997),
The Culture of Fear,
Continuum International Publishing Group.

knobs being twiddled
Bruce Schneier (2003),
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
, Copernicus Books, Chapter 7.

hackers to find
Ron Rosenbaum (Oct 1971), “Secrets of the Little Blue Box,”
Esquire,
117–25, 222–36. Gary D. Robson (Spring 2004), “The Origins of Phreaking,”
Blacklisted 411,
6:17–23.

Criminals can form
Allan Castle (1997), “Transnational Organized Crime and International Security,” Institute of International Relations, The University of British Columbia Working Paper No. 19. Phil Williams (2001), “Transnational Criminal Networks,” in John Arquilla and David F. Ronfeldt, eds.,
Networks and Netwars: The Future of Terror, Crime, and Militancy,
RAND Corporation, 61–97. Oded Löwenheim (2002), “Transnational Criminal Organizations and Security: The Case Against Inflating the Threat,”
International Journal
, 57:513–36.

Criminals were simply
Warwick Ashford (6 Oct 2010), “ISSE 2010: Police Are Playing Catch-Up as Criminals Embrace IT,”
Computer Weekly.
Stephen Pritchard (2 Jun 2011), “Vulnerabilities: Battle Is Joined on Two Fronts,”
Financial Times.

position of the interior
Carl von Clausewitz (1832),
On War.

Alvin Toffler wrote
Alvin Toffler (1970),
Future Shock,
Random House.

People learn how
Michael Anissimov (2004), “Future Shock Level Analysis,”
AcceleratingFuture.com
.

new type of grifter
David Maurer (1940),
The Big Con: The Story of the Confidence Man
, Bobbs Merrill.

Other cities followed
J.L. Lyman (1964), “The Metropolitan Police Act of 1829: An Analysis of Certain Events Influencing the Passage and Character of the Metropolitan Police Act in England,”
The Journal of Criminal Law, Criminology, & Police Science,
55:141–54.

Internet worm Stuxnet
Kim Zetter (2011), “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,”
Threat Level
blog, Wired.com.

salami attacks
Michael E. Kabay (24 Jul 2002), “Salami Fraud,”
Network World.

just use software
Bruce Schneier (2000),
Secrets & Lies: Digital Security in a Networked World
, John Wiley & Sons.

delayed publishing
Eric Lichtblau (26 Mar 2008), “The Education of a 9/11 Reporter: The Inside Drama Behind the Times' Warrantless Wiretapping Story,”
Slate.

Clay Shirky referred
Clay Shirky (31 Dec 2010), “Half-Formed Thought on WikiLeaks & Global Action,”
Shirky.com
.

other business considerations
Alfred Rappaport (2005), “The Economics of Short-Term Performance Obsession,”
Financial Analysts Journal,
61:65–79. Thomas P. Byrne (2010), “False Profits: Reviving the Corporation's Public Purpose,”
UCLA Law Review Discourse,
25:25–49. Patrick Bolton, Jose Scheinkman, and Wei Xiong (2006), “Executive Compensation and Short-Termist Behaviour in Speculative Markets,”
Review of Economic Studies
, 73:577–610. Lynne Dallas (2011), “Short-Termism, the Financial Crisis and Corporate Governance,” San Diego Legal Studies Paper No. 11–052. Lawrence Mitchell (2011),
Corporate Irresponsibility: America's Newest Export,
Yale University Press. Alfred Rappaport (2011),
Saving Capitalism from Short-Termism,
McGraw-Hill.

investors have access
John C. Bogle (2005),
The Battle for the Soul of Capitalism,
Yale University Press.

wicked problems
C. West Churchman (1967), “Wicked Problems,”
Management Science,
14:141–2. Horst Rittel and Melvin Webber (1973), “Dilemmas in a General Theory of Planning,”
Policy Sciences
, 4:155–69. E. Jeffrey Conklin (2006),
Dialog Mapping: Building a Shared Understanding of Wicked Problems,
John Wiley & Sons.

ubiquity of data
Charles Stross (2011), “Network Security in the Medium Term, 2061–2561 AD,” paper presented at USENIX Security.

better off spending
Bruce Schneier (2009), “Beyond Security Theater,”
New Internationalist,
427:10–13.

Yochai Benkler
Yochai Benkler (2011),
The Penguin and the Leviathan: How Cooperation Trumphs Over Self-Interest,
Crown Business, 25–6.

security is a process
Bruce Schneier (2000),
Secrets and Lies: Digital Security in a Networked World
, John Wiley & Sons, 273, 395.

Chapter 17

Trust in things
Bart Nooteboom (2002),
Trust: Forms, Foundations, Functions, Failures and Figures
, Edward Elgar, 45.

trust is a social good
Sissela Bok (1978),
Lying: Moral Choice in Private and Public Life
, Pantheon Books, 26–7.

trust is the key
James Colman (1988),
Foundations of Social Theory,
Harvard University Press. Francis Fukuyama (1995), “Social Capital and the Global Economy: A Redrawn Map of the World,”
Foreign Affairs,
75:89–103. Luigi Guiso, Paola Sapienza, and Luigi Zingales (2004), “The Role of Social Capital in Financial Development,”
American Economic Review
, 94:426–56.

this parable
Richard Beck (2011), “Tales of the Demonic,”
Experimental Theology
.

do not follow
Tom Zeller, Jr. (26 Jul 2011), “Tim De Christopher: Is Civil Disobedience the Key to Climate Change Action?”
The Huffington Post
.

Medal of Honor
Michael A. Memoli and Michael Muskal (15 Sep 2011), “Obama Awards Medal of Honor to Kentucky Marine,”
Los Angeles Times.

contact a reporter
Richard L. Rashke (2000),
The Killing of Karen Silkwood: The Story Behind the Kerr-McGee Plutonium Case
, Second Edition, Cornell University Press.

Notes

Chapter 1

five levels of trust
Steven M.R. Covey (2006),
The Speed of Trust: The One Thing That Changes Everything
, Free Press.

To trust is to bet
Piero Ferrucci (2006),
The Power of Kindness: The Unexpected Benefits of Leading a Compassionate Life
, Tarcher, 80–1.

When we say we trust
Diego Gambetta (1988), “Can We Trust Trust?” in Diego Gambetta, ed.,
Trust: Making and Breaking Cooperative Relations
, Blackwell Publishers, 213–37.

We will define trust
David M. Messick and Roderick M. Kramer (2001), “Trust as a Form of Shallow Morality,” in Karen S. Cook, ed.,
Trust in Society
, Russell Sage Foundation, 89–117.

three-level progression
Anthony Giddens (1990),
The Consequences of Modernity
, Stanford University Press, 114–24.

Piotr Cofta covered
Piotr Cofta (2007),
Trust, Complexity, and Control: Confidence in a Convergent World
, John Wiley & Sons.

findings are false
John P.A. Ioannidis (2005), “Why Most Published Research Findings Are False,”
PLoS Medicine
, 2(8): e124.

sloppy methodology
Eric-Jan Wagenmakers, Rudd Wetzels, Denny Borsboom, and Han van der Maas (2011), “Why Psychologists Must Change the Way They Analyze Their Data: The Case of Psi,”
Journal of Personality and Social Psychology,
100:426–32. Joseph P. Simmons, Leif D. Nelson, and Uri Simonsohn (2011), “False Positive Psychology: Undisclosed Flexibility in Data Collection and Analaysis Allows Presenting Anything as Significant,”
Psychological Science,
22:1359–66.

narrow and unrepresentative
Joseph Henrich, Steven J. Heine, and Ara Norenzayan (2010), “The Weirdest People in the World?”
Behavioral & Brain Sciences
, 33:61–83.

Adam Smith
Adam Smith (1759),
The Theory of Moral Sentiments.

Chapter 2

sticks as weapons
Jill D. Pruetz and Paco Bertolani (2007), “Savanna Chimpanzees, Pan
troglodytes verus
, Hunt with Tools,”
Current Biology
, 17:412–17.

using rocks
Giacomo Bernardi (2011), “The Use of Tools by Wrasses (
Labridae
),”
Coral Reefs
, published online before print.

Brants' whistling rat
Tim P. Jackson (2000), “Adaptation to Living in an Open Arid Environment: Lessons from the Burrow Structure of the Two Southern African Whistling Rats,
Parotomys brantsii
and
P. littledalei,

Journal of Arid Environments
, 46:345–55.

African rat
Jonathan Kingdon, Bernard Agwanda, Margaret Kinnaird, Timothy O'Brien, Christopher Holland, Thomas Gheysens, Maxime Boulet-Audet, and Fritz Vollrath (2011), “A Poisonous Surprise under the Coat of the African Crested Rat,”
Proceedings of the Royal Society B: Biological Sciences
, published online before print.

entirely separate
R. Jansen, J.D. Embden, W. Gaastra, L.M. Schouls (2002), “Identification of Genes That Are Associated with DNA Repeats in Prokaryotes,”
Molecular Microbiology
, 43:1565–75.

earlier book
Bruce Schneier (2006),
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
, Copernicus.

picture of a snake
Vanessa LoBue and Judy DeLoache (2008), “Detecting the Snake in the Grass: Attention to Fear-Relevant Stimuli by Adults and Young Children,”
Psychological Science
, 19:284–9.

cause and effect
Gema Martin-Ordas, Josep Call, and Fernando Colmenares (2007), “Tubes, Tables, and Traps: Great Apes Solve Two Functionally Equivalent Trap Tasks but Show No Evidence of Transfer Across Tasks,”
Animal Cognition
, 11:423–30.

time binding species
Alfred Korzybski (1933),
Science and Sanity: An Introduction to Non-Aristotelian Systems and General Semantics
, International Non-Aristotelian Library Publishing Corp.

intentional stance
Daniel C. Dennett (1987),
The Intentional Stance
, MIT Press.

social group size
Kimberly A. Pollard and Daniel T. Blumstein (2011), “Social Group Size Predicts the Evolution of Individuality,”
Current Biology
, 21:413–7.

win arguments
Hugo Mercier and Dan Sperber (2011), “Why Do Humans Reason? Arguments for an Argumentative Theory,”
Behavioral & Brain Sciences
, 34:54–74.

Others posit
Christopher McCarty, Peter D. Killworth, H. Russell Bernard, Eugene C. Johnsen, and Gene A. Shelley (2000), “Comparing Two Methods for Estimating Network Size,”
Human Organization
, 60:28–39. H. Russell Bernard, Gene Ann Shelley, and Peter Killworth (1987), “How Much of a Network Does the GSS and RSW Dredge Up?”
Social Networks
, 9:49–63.

primitive peoples
Mervyn J. Meggitt (1977),
Blood Is Their Argument
, Mayfield.

Yanomamö
Napoleon A. Chagnon (1974),
Studying the Yanomamo
, Holt, Rinehart & Winston.

Big-game hunting
David A. Byers and Andrew Ugan (2005), “Should We Expect Large Game Specialization in the Late Pleistocene? An Optimal Foraging Perspective on Early Paleoindian Prey Choice,”
Journal of Archaeological Science
, 32:1624–40. Kristen Hawkes, James F. O'Connell, and Nicholas G. Blurton-Jones (1991), “Hunting Income Patterns among the Hadza: Big Game, Common Goods, Foraging Goals and the Evolution of the Human Diet,”
Philosophical Transactions of the Royal Society B: Biological Sciences
, 33:243–50. John D. Speth, Khori Newlander, Andrew A. White, Ashley K. Lemke, and Lars E. Anderson (2010), “Early Paleoindian Big-Game Hunting in North America: Provisioning or Politics?”
Quaternary International
, published online before print. Mary C. Stiner, Natalie D. Munro, and Todd A. Surovell (2000), “The Tortoise and the Hare: Small-Game Use, the Broad-Spectrum Revolution, and Paleolithic Demography,”
Current Anthropology
, 41: 39–73.

Other books

Hidden by Tara Taylor Quinn
City of Spades by Colin MacInnes
Olivia by R. Lee Smith
City of Jade by McKiernan, Dennis
The Matchmaker of Kenmare by Frank Delaney
The Snake Tattoo by Linda Barnes
Highland Surrender by Halliday, Dawn