The Naked Future (33 page)

Read The Naked Future Online

Authors: Patrick Tucker

BOOK: The Naked Future
4.63Mb size Format: txt, pdf, ePub

11
. R. Guha et al., “Propagation of Trust and Distrust” (presented at the WWW 2004, New York, 2004).

12
. Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg, “Predicting Positive and Negative Links in Online Social Networks,” 2010, 641–60, http://wwwconference.org/proceedings/www2010/www/p641.pdf.

13
. Finkel et al., “Online Dating.”

14
. Yukari Iwatani, “Love: Japanese Style,”
Wired
, June 11, 1998, http://www.wired.com/culture/lifestyle/news/1998/06/12899.

15
. “Bleep at First Sight,”
Reuters
, May 15, 1998, http://www.wired.com/culture/lifestyle/news/1998/05/12342.

16
. Charlotte Kemp, “TAMAGOTCHIS THAT FIND A DATE: Is That a Lovegety in Your Pocket or Are You Just Pleased to See Me?”
Daily Mirror
, July 10, 1998, http://www.thefreelibrary.com/Is%20that%20a%20Lovegety%20in%20your%20pocket%20or%20are%20you%20just%20pleased%20to%20see%20me?; . . . -a060668653.

17
. Nathan Eagle,
Machine Perception and Learning of Complex Social Systems
(Cambridge: Massachusetts Institute of Technology, 2005), http://realitycommons.media.mit.edu/pdfs/thesis.pdf.

18
. Ibid.

19
. Ibid.

20
. “Match.com Releases Its Second Annual Comprehensive Study on Singles,” Match.com, Feb. 2, 2012, http://match.mediaroom.com/index.php?s=43&item=116.

21
. William Von Hippel and Robert Trivers, “The Evolution and Psychology of Self-deception,”
Behavioral and Brain Sciences
34 (2011): 1–56.

22
. Alex Pentland,
Honest Signals: How They Shape Our World
, new ed. (Cambridge, MA: MIT Press, 2010).

23
. Ibid., 28.

24
. Ibid., 125.

25
. Ibid., 132.

26
. “Match.com Releases Its Second Annual Comprehensive Study on Singles,” Match.com, Feb. 2, 2012.

27
. “MIT Media Laboratory: Press Page—Jerk-O-Meter,” accessed Jan. 22, 2013, http://www.media.mit.edu/press/jerk-o-meter.

28
. Cindy Caldwell, “Preventing Catastrophic Incidents by Predicting Where They Are Most Likely to Occur and Why,” Sept. 2012, http://semanticommunity.info/@api/deki/files/19429/Day2_1125_Caldwell_Larmey.pdf.

29
. Josh Gold, “Workforce Instrumentation: The Art and Science of the Rational Enterprise” (presented at the O'Reilly Strata 2012, Santa Clara, CA, Feb. 28–Mar. 1), http://cdn.oreillystatic.com/en/assets/1/event/75/Business%20Intelligence_%20What%20have%20we%20been%20missing_%20Paper.pdf.

30
. Reuben Hill,
Families Under Stress: Adjustment to the Crises of War Separation and Reunion
, rept. (Westport, CT: Greenwood Press, 1971).

31
. Pentland,
Honest Signals
, 42.

32
. Yogananda,
Autobiography of a Yogi
, 163.

CHAPTER 9: CRIME PREDICTION: THE WHERE AND THE WHEN

1
. George L. Kelling and James Q. Wilson, “Broken Windows,”
Atlantic
, Mar. 1982, http://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465.

2
. Andreas Olligschlaeger, “Artificial Neural Networks and Crime Mapping,” in
From Crime Mapping and Crime Prevention
(National Institute of Justice Drug Market Analysis Program United States, 1997), 313–47, https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=170288.

3
. Ibid., 342.

4
. Jayne Marshall,
Zero Tolerance Policing
(Government of South Australia, Office of the Attorney General, Mar. 1999), http://www.ocsar.sa.gov.au/docs/information_bulletins/IB9.pdf.

5
. Colleen McCue,
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
, 1st ed. (Oxford: Butterworth-Heinemann, 2007).

6
. Charlie Beck, “Predictive Policing: What Can We Learn from Wal-Mart and Amazon About Fighting Crime in a Recession?”
Police Chief Magazine
, Nov. 2009, http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1942&issue_id=112009.

7
. Hanna Rosin, “American Murder Mystery,”
Atlantic
, July–Aug. 2008, http://www.theatlantic.com/magazine/archive/2008/07/american-murder-mystery/306872.

8
. Ingrid Ellen, Michael Lens, and Katherine O'Regan,
American Murder Mystery Revisited: Do Housing Voucher Households Cause Crime?
SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, Mar. 6, 2012), http://papers.ssrn.com/abstract=2016444.

9
. Jim Utsler, “The Crime Fighters,”
IBM Systems Magazine
, Feb. 2011, http://www.ibmsystemsmag.com/power/trends/ibmresearch/ibm_research_spss.

10
. Matthew Freedman and Emily Owens, “Your Friends and Neighbors: Localized Economic Development, Inequality, and Criminal Activity,” 2012, http://works.bepress.com/matthew_freedman/17.

11
. Utsler, “The Crime Fighters.”

12
. “NYPD and Microsoft Build Hi-tech Crime Fighting ‘Dashboard,'”
Telegraph
, Feb. 20, 2013, http://www.telegraph.co.uk/technology/news/9884479/NYPD-and-Microsoft-build-hi-tech-crime-fighting-dashboard.html.

13
. CCTV Based Remote Biometric and Behavioral Suspect Detection: Technologies and Global Markets—2011–2016, Homeland Security Market Research
(Homeland Security Research, Q1 2011), http://www.homelandsecurityresearch.com/2013/08/china-homeland-security-public-safety-market-2013-edition; for more details https://www.wfs.org/futurist/2013-issues-futurist/march-april-2013-vol-47-no-2/chinas-closed-circuits.

14
. John L. Rep Mica,
H.R.658—FAA Modernization and Reform Act of 2012
, 2011, http://thomas.loc.gov/cgi-bin/bdquery/z?d112:h.r.658.

15
. “Subcommittee Hearing: Using Unmanned Aerial Systems Within the Homeland: Security Game Changer?” accessed Jan. 22, 2013, http://homeland.house.gov/hearing/subcommittee-hearing-using-unmanned-aerial-systems-within-homeland-security-game-changer.

16
. William Bratton,
Zero Tolerance: Policing a Free Society
, IEA Health and Welfare Unit: Choice in Welfare, No. 35 (IEA Health and Welfare Unit London, Apr. 1997), http://www.civitas.org.uk/pdf/cw35.pdf.

17
. Marta Molina, “Yo Soy 132 Rejects Election Results, Continues Organizing,”
Indy Blog
, July 13, 2012, http://www.indypendent.org/2012/07/13/yo-soy-132-rejects-election-results-continues-organizing.

18
. Feng Chen et al.,
Spatial Surrogates to Forecast Social Mobilization and Civil Unrests1
(Virginia Tech, 2012), http://people.cs.vt.edu/~naren/papers/CCC-VT-Updated-Version.pdf.

19
. David Joachim, “What Is Intelligence Chatter, Anyway?”
Slate Explainer
, Sept. 12, 2003, http://www.slate.com/articles/news_and_politics/explainer/2003/09/what_is_intelligence_chatter_anyway.html.

20
. Making the World a Witness: Report on the Pilot Phase, Satellite Sentinel Project
, Dec. 2010, http://www.satsentinel.org/report/making-world-witness-report-pilot-phase-report.

21
. Andrew Zammit-Mangion et al., “Point Process Modelling of the Afghan War Diary,”
Proceedings of the National Academy of Sciences
(July 16, 2012), doi:10.1073/pnas.1203177109.

22
. Kalev Leetaru, “Culturomics 2.0: Forecasting Large-scale Human Behavior Using Global Media Tone in Time and Space,”
First Monday
16, no. 9 (Sept. 2011), http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3663/3040.

23
. Marco Lagi, Karla Z. Bertrand, and Yaneer Bar-Yam, “The Food Crises and Political Instability in North Africa and the Middle East,”
New England Complex Systems Institute
(July 19, 2011).

CHAPTER 10: CRIME: PREDICTING THE WHO

1
. Adam Higginbotham, “Deception Is Futile When Big Brother's Lie Detector Turns Its Eyes on You,”
Wired
, Feb. 2013, http://www.wired.com/threatlevel/2013/01/ff-lie-detector.

2
. Ralph Chatham, “Ralph Chatham's Informal Summary of the Insights and Findings from DARPA's Rapid Checkpoint Screening Program,” Jan. 2007,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CDIQFjAA&url=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~rja14%2Fshb08%2Fchatham1.doc&ei=1AT_UPamCIyq0AHoioHwCQ&usg=AFQjCNFzJAlk-NVHrcb6DcE9SRnREq6NWQ&sig2=21WFlClt-ekMk7qmlCAFsw&bvm=bv.41248874,d.dmQ.

3
. I. Pavlidis, J. Levine, and P. Baukol, “Thermal Image Analysis for Anxiety Detection,” in
2001 International Conference on Image Processing, 2001, Proceedings
, vol. 2, 2001, 315–18, doi:10.1109/ICIP.2001.958491.

4
. Hearing on Behavioral Science and Security: Evaluating TSA's SPOT Program
, 2011, http://science.house.gov/sites/republicans.science.house.gov/files/documents/hearings/2011%2003%2030%20Ekman%20Testimony.pdf.

5
. Michael Kimlick,
Privacy Impact Assessment for the Screening of Passengers by Observation Techniques (SPOT) Program
(Washington, DC: U.S. Department of Homeland Security, Aug. 5, 2008), http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_tsa_spot.pdf.

6
. Eric Lipton, “Faces, Too, Are Searched at U.S. Airports,”
New York Times
, Aug. 17, 2006, http://www.nytimes.com/2006/08/17/washington/17screeners.html.

7
. Anthony Kimery, “TSA's SPOT Program Not Scientifically Grounded GAO Told Congress: TSA, Experts Disagree,”
Homeland Security Today
, Apr. 7, 2011, http://www.hstoday.us/briefings/daily-news-briefings/single-article/tsa-s-spot-program-not-scientifically-grounded-gao-told-congress-tsa-experts-disagree/66b9300d981c1b1a39ac475411d38739.html.

8
. “Majority Views NSA Phone Tracking as Acceptable Anti-Terror Tactic,”
Pew Research Center for the People and the Press
, June 10, 2013, http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic.

9
. Scott Huddleston, “Hasan Sought Gun with ‘High Magazine Capacity,'”
My San Antonio
, Oct. 21, 2010, http://blog.mysanantonio.com/military/2010/10/hasan-sought-gun-with-high-magazine-capacity.

10
. James C. McKinley Jr. and James Dao, “Fort Hood Gunman Gave Signals Before His Rampage,”
New York Times
, Nov. 9, 2009, http://www.nytimes.com/2009/11/09/us/09reconstruct.html.

11
. Christine Baker, “A Change of Detection: To Find the Terrorist Within the Identification of the U.S. Army's Insider Threat” (U.S. Army Command and General Staff College), accessed Jan. 22, 2013, http://www.hsdl.org/?view&did=723130.

12
. “Executive Order 13587—Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information,” Oct. 7, 2011, http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks.

13
. “DARPA—Anomaly Detection at Multiple Scales (ADAMS),” Oct. 19, 2010,
Scribd
, http://www.scribd.com/doc/40392649/DARPA-Anomaly-Detection-at-Multiple-Scales-ADAMS.

14
. Robert H. Anderson and Richard Brackney,
Understanding the Insider Threat
(RAND Corporation, 2004), http://www.rand.org/pubs/conf_proceedings/CF196.html.

15
. Claire Cain Miller, “Tech Companies Concede to Surveillance Program,”
New York Times
, June 7, 2013, http://www.nytimes.com/2013/06/08/technology/tech-companies-bristling-concede-to-government-surveillance-efforts.html.

16
. Baker, “A Change of Detection.”

17
. Ibid.

18
. O. Brdiczka et al., “Proactive Insider Threat Detection Through Graph Learning and Psychological Context,” in
2012 IEEE Symposium on Security and Privacy Workshops (SPW)
, 2012, 142–49, doi:10.1109/SPW.2012.29.

19
. Nate Berg, “Want to Shame a Terrible Parker? There's an App for That,”
Atlantic Cities
, May 21, 2012, http://www.theatlanticcities.com/technology/2012/05/want-report-terrible-parker-theres-app/2055.

20
. “Mining Social Networks: Untangling the Social Web,”
Economist
, Sept. 2, 2010, http://www.economist.com/node/16910031.

21
. Julia Angwin, “U.S. Terrorism Agency to Tap a Vast Database of Citizens,”
Wall Street Journal
, Dec. 13, 2012, http://online.wsj.com/article/SB10001424127887324478304578171623040640006.html?user=welcome&mg=id-wsj.

22
. David Thissen and Howard Wainer, “Toward the Measurement and Prediction of Victim Proneness,”
Journal of Research in Crime and Delinquency
20, no. 2 (July 1, 1983): 243–61, doi:10.1177/002242788302000206.

CHAPTER 11: THE WORLD THAT ANTICIPATES YOUR EVERY MOVE

1
. Mike Orcutt, “The Pressure's on for Intel,”
MIT Technology Review
, Nov. 9, 2012, http://www.technologyreview.com/news/507011/the-pressures-on-for-intel.

2
. Jeff Hawkins and Sandra Blakeslee,
On Intelligence
, 1st ed. (New York: Times Books, 2004), 6.

3
. Jason P. Gallivan et al., “Decoding Action Intentions from Preparatory Brain Activity in Human Parieto-Frontal Networks,”
The Journal of Neuroscience
31, no. 26 (June 29, 2011): 9599–610, doi:10.1523/JNEUROSCI.0080-11.2011.

4
. Moshe Bar, “The Proactive Brain: Memory for Predictions,”
Philosophical Transactions of the Royal Society B: Biological Sciences
364, no. 1521 (May 12, 2009): 1235–43, doi:10.1098/rstb.2008.0310.

5
. Ibid.

6
. Scott A. Huettel, Peter B. Mack, and Gregory McCarthy, “Perceiving Patterns in Random Series: Dynamic Processing of Sequence in Prefrontal Cortex,”
Nature Neuroscience
5, no. 5 (May 2002): 485–90, doi:10.1038/nn841.

Other books

Ice Cold by Tess Gerritsen
All Shook Up by Susan Andersen
The Fall: Victim Zero by Joshua Guess
Adam Haberberg by Yasmina Reza
Team Challenge by Janet Rising
The Ticket Out by Helen Knode
Luck in the Shadows by Lynn Flewelling
Invisible Love by Eric-Emmanuel Schmitt, Howard Curtis