Authors: Patrick Tucker
11
. R. Guha et al., “Propagation of Trust and Distrust” (presented at the WWW 2004, New York, 2004).
12
. Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg, “Predicting Positive and Negative Links in Online Social Networks,” 2010, 641â60, http://wwwconference.org/proceedings/www2010/www/p641.pdf.
13
. Finkel et al., “Online Dating.”
14
. Yukari Iwatani, “Love: Japanese Style,”
Wired
, June 11, 1998, http://www.wired.com/culture/lifestyle/news/1998/06/12899.
15
. “Bleep at First Sight,”
Reuters
, May 15, 1998, http://www.wired.com/culture/lifestyle/news/1998/05/12342.
16
. Charlotte Kemp, “TAMAGOTCHIS THAT FIND A DATE: Is That a Lovegety in Your Pocket or Are You Just Pleased to See Me?”
Daily Mirror
, July 10, 1998, http://www.thefreelibrary.com/Is%20that%20a%20Lovegety%20in%20your%20pocket%20or%20are%20you%20just%20pleased%20to%20see%20me?; . . . -a060668653.
17
. Nathan Eagle,
Machine Perception and Learning of Complex Social Systems
(Cambridge: Massachusetts Institute of Technology, 2005), http://realitycommons.media.mit.edu/pdfs/thesis.pdf.
18
. Ibid.
19
. Ibid.
20
. “Match.com Releases Its Second Annual Comprehensive Study on Singles,” Match.com, Feb. 2, 2012, http://match.mediaroom.com/index.php?s=43&item=116.
21
. William Von Hippel and Robert Trivers, “The Evolution and Psychology of Self-deception,”
Behavioral and Brain Sciences
34 (2011): 1â56.
22
. Alex Pentland,
Honest Signals: How They Shape Our World
, new ed. (Cambridge, MA: MIT Press, 2010).
23
. Ibid., 28.
24
. Ibid., 125.
25
. Ibid., 132.
26
. “Match.com Releases Its Second Annual Comprehensive Study on Singles,” Match.com, Feb. 2, 2012.
27
. “MIT Media Laboratory: Press PageâJerk-O-Meter,” accessed Jan. 22, 2013, http://www.media.mit.edu/press/jerk-o-meter.
28
. Cindy Caldwell, “Preventing Catastrophic Incidents by Predicting Where They Are Most Likely to Occur and Why,” Sept. 2012, http://semanticommunity.info/@api/deki/files/19429/Day2_1125_Caldwell_Larmey.pdf.
29
. Josh Gold, “Workforce Instrumentation: The Art and Science of the Rational Enterprise” (presented at the O'Reilly Strata 2012, Santa Clara, CA, Feb. 28âMar. 1), http://cdn.oreillystatic.com/en/assets/1/event/75/Business%20Intelligence_%20What%20have%20we%20been%20missing_%20Paper.pdf.
30
. Reuben Hill,
Families Under Stress: Adjustment to the Crises of War Separation and Reunion
, rept. (Westport, CT: Greenwood Press, 1971).
31
. Pentland,
Honest Signals
, 42.
32
. Yogananda,
Autobiography of a Yogi
, 163.
CHAPTER 9: CRIME PREDICTION: THE WHERE AND THE WHEN
1
. George L. Kelling and James Q. Wilson, “Broken Windows,”
Atlantic
, Mar. 1982, http://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465.
2
. Andreas Olligschlaeger, “Artificial Neural Networks and Crime Mapping,” in
From Crime Mapping and Crime Prevention
(National Institute of Justice Drug Market Analysis Program United States, 1997), 313â47, https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=170288.
3
. Ibid., 342.
4
. Jayne Marshall,
Zero Tolerance Policing
(Government of South Australia, Office of the Attorney General, Mar. 1999), http://www.ocsar.sa.gov.au/docs/information_bulletins/IB9.pdf.
5
. Colleen McCue,
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
, 1st ed. (Oxford: Butterworth-Heinemann, 2007).
6
. Charlie Beck, “Predictive Policing: What Can We Learn from Wal-Mart and Amazon About Fighting Crime in a Recession?”
Police Chief Magazine
, Nov. 2009, http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1942&issue_id=112009.
7
. Hanna Rosin, “American Murder Mystery,”
Atlantic
, JulyâAug. 2008, http://www.theatlantic.com/magazine/archive/2008/07/american-murder-mystery/306872.
8
. Ingrid Ellen, Michael Lens, and Katherine O'Regan,
American Murder Mystery Revisited: Do Housing Voucher Households Cause Crime?
SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, Mar. 6, 2012), http://papers.ssrn.com/abstract=2016444.
9
. Jim Utsler, “The Crime Fighters,”
IBM Systems Magazine
, Feb. 2011, http://www.ibmsystemsmag.com/power/trends/ibmresearch/ibm_research_spss.
10
. Matthew Freedman and Emily Owens, “Your Friends and Neighbors: Localized Economic Development, Inequality, and Criminal Activity,” 2012, http://works.bepress.com/matthew_freedman/17.
11
. Utsler, “The Crime Fighters.”
12
. “NYPD and Microsoft Build Hi-tech Crime Fighting âDashboard,'”
Telegraph
, Feb. 20, 2013, http://www.telegraph.co.uk/technology/news/9884479/NYPD-and-Microsoft-build-hi-tech-crime-fighting-dashboard.html.
13
. CCTV Based Remote Biometric and Behavioral Suspect Detection: Technologies and Global Marketsâ2011â2016, Homeland Security Market Research
(Homeland Security Research, Q1 2011), http://www.homelandsecurityresearch.com/2013/08/china-homeland-security-public-safety-market-2013-edition; for more details https://www.wfs.org/futurist/2013-issues-futurist/march-april-2013-vol-47-no-2/chinas-closed-circuits.
14
. John L. Rep Mica,
H.R.658âFAA Modernization and Reform Act of 2012
, 2011, http://thomas.loc.gov/cgi-bin/bdquery/z?d112:h.r.658.
15
. “Subcommittee Hearing: Using Unmanned Aerial Systems Within the Homeland: Security Game Changer?” accessed Jan. 22, 2013, http://homeland.house.gov/hearing/subcommittee-hearing-using-unmanned-aerial-systems-within-homeland-security-game-changer.
16
. William Bratton,
Zero Tolerance: Policing a Free Society
, IEA Health and Welfare Unit: Choice in Welfare, No. 35 (IEA Health and Welfare Unit London, Apr. 1997), http://www.civitas.org.uk/pdf/cw35.pdf.
17
. Marta Molina, “Yo Soy 132 Rejects Election Results, Continues Organizing,”
Indy Blog
, July 13, 2012, http://www.indypendent.org/2012/07/13/yo-soy-132-rejects-election-results-continues-organizing.
18
. Feng Chen et al.,
Spatial Surrogates to Forecast Social Mobilization and Civil Unrests1
(Virginia Tech, 2012), http://people.cs.vt.edu/~naren/papers/CCC-VT-Updated-Version.pdf.
19
. David Joachim, “What Is Intelligence Chatter, Anyway?”
Slate Explainer
, Sept. 12, 2003, http://www.slate.com/articles/news_and_politics/explainer/2003/09/what_is_intelligence_chatter_anyway.html.
20
. Making the World a Witness: Report on the Pilot Phase, Satellite Sentinel Project
, Dec. 2010, http://www.satsentinel.org/report/making-world-witness-report-pilot-phase-report.
21
. Andrew Zammit-Mangion et al., “Point Process Modelling of the Afghan War Diary,”
Proceedings of the National Academy of Sciences
(July 16, 2012), doi:10.1073/pnas.1203177109.
22
. Kalev Leetaru, “Culturomics 2.0: Forecasting Large-scale Human Behavior Using Global Media Tone in Time and Space,”
First Monday
16, no. 9 (Sept. 2011), http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3663/3040.
23
. Marco Lagi, Karla Z. Bertrand, and Yaneer Bar-Yam, “The Food Crises and Political Instability in North Africa and the Middle East,”
New England Complex Systems Institute
(July 19, 2011).
CHAPTER 10: CRIME: PREDICTING THE WHO
1
. Adam Higginbotham, “Deception Is Futile When Big Brother's Lie Detector Turns Its Eyes on You,”
Wired
, Feb. 2013, http://www.wired.com/threatlevel/2013/01/ff-lie-detector.
2
. Ralph Chatham, “Ralph Chatham's Informal Summary of the Insights and Findings from DARPA's Rapid Checkpoint Screening Program,” Jan. 2007,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CDIQFjAA&url=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~rja14%2Fshb08%2Fchatham1.doc&ei=1AT_UPamCIyq0AHoioHwCQ&usg=AFQjCNFzJAlk-NVHrcb6DcE9SRnREq6NWQ&sig2=21WFlClt-ekMk7qmlCAFsw&bvm=bv.41248874,d.dmQ.
3
. I. Pavlidis, J. Levine, and P. Baukol, “Thermal Image Analysis for Anxiety Detection,” in
2001 International Conference on Image Processing, 2001, Proceedings
, vol. 2, 2001, 315â18, doi:10.1109/ICIP.2001.958491.
4
. Hearing on Behavioral Science and Security: Evaluating TSA's SPOT Program
, 2011, http://science.house.gov/sites/republicans.science.house.gov/files/documents/hearings/2011%2003%2030%20Ekman%20Testimony.pdf.
5
. Michael Kimlick,
Privacy Impact Assessment for the Screening of Passengers by Observation Techniques (SPOT) Program
(Washington, DC: U.S. Department of Homeland Security, Aug. 5, 2008), http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_tsa_spot.pdf.
6
. Eric Lipton, “Faces, Too, Are Searched at U.S. Airports,”
New York Times
, Aug. 17, 2006, http://www.nytimes.com/2006/08/17/washington/17screeners.html.
7
. Anthony Kimery, “TSA's SPOT Program Not Scientifically Grounded GAO Told Congress: TSA, Experts Disagree,”
Homeland Security Today
, Apr. 7, 2011, http://www.hstoday.us/briefings/daily-news-briefings/single-article/tsa-s-spot-program-not-scientifically-grounded-gao-told-congress-tsa-experts-disagree/66b9300d981c1b1a39ac475411d38739.html.
8
. “Majority Views NSA Phone Tracking as Acceptable Anti-Terror Tactic,”
Pew Research Center for the People and the Press
, June 10, 2013, http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic.
9
. Scott Huddleston, “Hasan Sought Gun with âHigh Magazine Capacity,'”
My San Antonio
, Oct. 21, 2010, http://blog.mysanantonio.com/military/2010/10/hasan-sought-gun-with-high-magazine-capacity.
10
. James C. McKinley Jr. and James Dao, “Fort Hood Gunman Gave Signals Before His Rampage,”
New York Times
, Nov. 9, 2009, http://www.nytimes.com/2009/11/09/us/09reconstruct.html.
11
. Christine Baker, “A Change of Detection: To Find the Terrorist Within the Identification of the U.S. Army's Insider Threat” (U.S. Army Command and General Staff College), accessed Jan. 22, 2013, http://www.hsdl.org/?view&did=723130.
12
. “Executive Order 13587âStructural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information,” Oct. 7, 2011, http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks.
13
. “DARPAâAnomaly Detection at Multiple Scales (ADAMS),” Oct. 19, 2010,
Scribd
, http://www.scribd.com/doc/40392649/DARPA-Anomaly-Detection-at-Multiple-Scales-ADAMS.
14
. Robert H. Anderson and Richard Brackney,
Understanding the Insider Threat
(RAND Corporation, 2004), http://www.rand.org/pubs/conf_proceedings/CF196.html.
15
. Claire Cain Miller, “Tech Companies Concede to Surveillance Program,”
New York Times
, June 7, 2013, http://www.nytimes.com/2013/06/08/technology/tech-companies-bristling-concede-to-government-surveillance-efforts.html.
16
. Baker, “A Change of Detection.”
17
. Ibid.
18
. O. Brdiczka et al., “Proactive Insider Threat Detection Through Graph Learning and Psychological Context,” in
2012 IEEE Symposium on Security and Privacy Workshops (SPW)
, 2012, 142â49, doi:10.1109/SPW.2012.29.
19
. Nate Berg, “Want to Shame a Terrible Parker? There's an App for That,”
Atlantic Cities
, May 21, 2012, http://www.theatlanticcities.com/technology/2012/05/want-report-terrible-parker-theres-app/2055.
20
. “Mining Social Networks: Untangling the Social Web,”
Economist
, Sept. 2, 2010, http://www.economist.com/node/16910031.
21
. Julia Angwin, “U.S. Terrorism Agency to Tap a Vast Database of Citizens,”
Wall Street Journal
, Dec. 13, 2012, http://online.wsj.com/article/SB10001424127887324478304578171623040640006.html?user=welcome&mg=id-wsj.
22
. David Thissen and Howard Wainer, “Toward the Measurement and Prediction of Victim Proneness,”
Journal of Research in Crime and Delinquency
20, no. 2 (July 1, 1983): 243â61, doi:10.1177/002242788302000206.
CHAPTER 11: THE WORLD THAT ANTICIPATES YOUR EVERY MOVE
1
. Mike Orcutt, “The Pressure's on for Intel,”
MIT Technology Review
, Nov. 9, 2012, http://www.technologyreview.com/news/507011/the-pressures-on-for-intel.
2
. Jeff Hawkins and Sandra Blakeslee,
On Intelligence
, 1st ed. (New York: Times Books, 2004), 6.
3
. Jason P. Gallivan et al., “Decoding Action Intentions from Preparatory Brain Activity in Human Parieto-Frontal Networks,”
The Journal of Neuroscience
31, no. 26 (June 29, 2011): 9599â610, doi:10.1523/JNEUROSCI.0080-11.2011.
4
. Moshe Bar, “The Proactive Brain: Memory for Predictions,”
Philosophical Transactions of the Royal Society B: Biological Sciences
364, no. 1521 (May 12, 2009): 1235â43, doi:10.1098/rstb.2008.0310.
5
. Ibid.
6
. Scott A. Huettel, Peter B. Mack, and Gregory McCarthy, “Perceiving Patterns in Random Series: Dynamic Processing of Sequence in Prefrontal Cortex,”
Nature Neuroscience
5, no. 5 (May 2002): 485â90, doi:10.1038/nn841.