Technocreep (39 page)

Read Technocreep Online

Authors: Thomas P. Keenan

BOOK: Technocreep
3.53Mb size Format: txt, pdf, ePub

347.
Sanger, David E., and Shanker, Thom. “N.S.A. Devises Radio Pathway Into Computers,”
New York Times
, January 14, 2014, accessed January 15, 2014 at
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html

348.
Leafkiller,
et al.
“How to See Who Views Your Facebook Profile the Most,” WikiHow, n.d., accessed at
http://www.wikihow.com/See-Who-Views-Your-Facebook-Profile-the-Most

349.
http://www.unfriendfinderfacebook.com

350.
http://www.eyelock.com/index.php/products/myris

351.
Monks, Kieron. “The guns that know who is firing them: Can smart tech make firearms safer?,” CNN, March 26, 2014, accessed at
http://edition.cnn.com/2014/03/26/tech/innovation/smart-guns-know-whos-firing/index.html?hpt=hp_c6

352.
Phillips v. Telus Corp., 2002 BCPC 499, in which Lila Dawn Phillips was awarded damages of one dollar because her phone company refused to accept payment of her bill in cash at its retail outlet.

353.
Slade, Daryl. “Accused killer searched ‘how to dissolve a body',”
Calgary Herald,
December 11, 2013, p. A8.

354.
Barbaro, Michael, Zeller, Tom Jr. “A Face Is Exposed for AOL Searcher No. 4417749,”
New York Times
, August 9, 2006, accessed at
http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=2&

355.
http://www.priv.gc.ca/cf-dc/2014/2014_001_0114_e.asp

356.
http://classactiondefense.jmbm.com/pineda_class_action_defense_cal.pdf

357.
Mabe, Tom. “The Angel of Death cemetery prank call,” n.d., accessed at
https://www.youtube.com/watch?v=oLnQXmkR3dI

358.
Schwartz, John. “Consumers Finding Ways to Zap Telemarketer Calls,” New York Times, December 18, 2002, accessed January 15, 2014 at
http://www.nytimes.com/2002/12/18/business/consumers-finding-ways-to-zap-telemarketer-calls.html?src=pm

359.
Bradford University. “Can Tattoos Cause Harm?,” accessed January 15, 2014 at
http://www.bradford.ac.uk/about/news/tattoo-risk/?bnr.

360.
Tattoo Archive. “Identification,” accessed January 15, 2014 at
http://www.tattooarchive.com/tattoo_history/identification.html

361.
FBI. “Image-Based Matching Technology Offers Identification and Intelligence Prospects,” accessed January 15, 2014 at
http://www.fbi.gov/about-us/cjis/cjis-link/december-2012/Image-Based%20Matching%20Technology%20Offers%20Identification%20and%20Intelligence%20Prospects

362.
Rebuttal evidence in re:
California v. Michael Joe Jackson
, accessed January 15, 2014 at
http://www.sbscpublicaccess.org/docs/ctdocs/052505pltmotchandler.pdf

363.
Bhardwaj, Julian. “What is your phone saying behind your back?,” Naked Security, October 2, 2012, accessed January 15, 2014 at
http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/

364.
http://www.cockeyed.com/ebay/safeway_card/ebay_copy.html

365.
Terdiman, Daniel. “Gaming the Safeway Club Card,”
Wired
, July 11, 2003, accessed at
http://www.wired.com/techbiz/media/news/2003/07/59589

366.
www.directlabs.com
, accessed January 15, 2014.

367.
As countless presenters have declared in their slide decks: IANAL/IANYL–“I am not a lawyer/I am not your lawyer.”

368.
New York Law, ypdcrime.com, n.d., accessed at
http://ypdcrime.com/penal.law/article190.htm

369.
http://www.howtogetitincanada.com/how-to-get-the-us-version-of-itunes-in-canada/

370.
Rayman, Graham. “Ken Tarr Launches a Hoax Campaign on an Industry Immune to Shame,”
Village Voice
, June 5, 2013, accessed January 15, 2014 at
www.villagevoice.com/2013-06-05/news/ken-tarr-reality-tv/full/

371.
Applebaum, Yoni. “How the Professor Who Fooled Wikipedia Got Caught by Reddit,”
The Atlantic
, May 15, 2012, accessed January 15, 2014 at
www.theatlantic.com/technology/archive/2012/05/how-the-professor-who-fooled-wikipedia-got-caught-by-reddit/257134/

372.
www.reddit.com/r/AskReddit/comments/sxkig/opinions_please_reddit_do_you_think_my_uncle_joe/c4htt9n

373.
Hansell, Saul. “TiVo is Watching When You Don't Watch, and It Tattles,”
New York Times
, July 26, 2006, accessed January 15, 2014 at
http://www.nytimes.com/2006/07/26/technology/26adco.html?ex=1311566400&en=143cb4893c1c45a9&ei=5090&partner=rssuserland&emc=rss

374.
Watson, Julie. “Cecilia Abadie, California Motorist, Cleared In Google Glass Case,” January 16,2014, accessed January 18, 2014 at
http://www.huffingtonpost.com/2014/01/16/cecilia-abadie_n_4613257.html

375.
Ball, James. “NSA collects millions of text messages daily in ‘untargeted' global sweep,”
The Guardian
, January 16, 2014, accessed January 16, 2014 at
www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep

376.
www.007voip.com
/

377.
Schneier, Bruce. “How the NSA Attacks TOR/Firefox Users with QUANTUM AND FOXACID,” October 7, 2013, accessed at
www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html

378.
http://getnarrative.com/

379.
Google, Inc. “Introducing our smart contact lens project,” Google Official Blog, January 16, 2014, accessed at
http://googleblog.blogspot.com/2014/01/introducing-our-smart-contact-lens.html

380.
Prey. “Amazing creativity: Use Prey to Track Your Bike,” The Prey Blog, n.d., accessed at
http://preyproject.com/blog/2012/09/amazing-ingenuity-using-prey-to-track-your-bicycle

381.
Huffington Post UK. “‘Brainless Thief' Steals Phone Then Uploads Selfie To Whatsapp,” Huffington Post UK, January 23, 2014, accessed at
http://www.huffingtonpost.co.uk/2013/10/13/brainless-thief-steals-phone-uploads-selfie-whatsapp_n_4094357.html

382.
Associated Press, “New York City man sets dating app honey trap to recover iPhone,” January 5, 2013, accessed January 15, 2014 at
http://www.cbc.ca/news/world/nyc-man-sets-dating-app-honey-trap-to-recover-iphone-1.1304693

383.
In re: Google Cookie Placement Consumer Privacy Litigation, 12-md-02358, U.S. District Court, District of Delaware (Wilmington).

384.
Sons of Maxwell. “United Breaks Guitars,” YouTube, July 6, 2009, accessed at
http://www.youtube.com/watch?v=5YGc4zOqozo

385.
Pfeiffer, Eric. “Woman gets $3,500 fine and bad credit score for writing negative review of business,” Yahoo! News, November 15, 2013, accessed at
http://news.yahoo.com/woman-gets–3-500-fine-and-bad-credit-score-for-writing-negative-review-of-business-233833012.html

386.
tripper61PA. “Skyauction Scam,” Tripadvisor.com, June 28, 2011, accessed at
http://www.tripadvisor.ca/ShowTopic-g499445-i9177-k4596925-Skyauction_Scam-Akumal_Yucatan_Peninsula.html

387.
http://nyc2600.net/about

388.
https://defcon.org/html/defcon-21/dc-21-speakers.html#Keenan

389.
http://www.blackhat.com/asia-14/briefings.html#Keenan

390.
https://www.defcon.org/html/defcon-21/dc-21-vendors.html

Other books

No More Sweet Surrender by Caitlin Crews
Bargaining for Baby by Robyn Grady
Swordpoint by Ellen Kushner
Never, Never by Brianna Shrum
King by R. J. Larson
Turn Signal by Howard Owen
Daughter of the Reef by Coleman, Clare;