Technocreep
eBook - ePub

Technocreep

The Surrender of Privacy and the Capitalization of Intimacy

  1. 224 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Technocreep

The Surrender of Privacy and the Capitalization of Intimacy

About this book

“Technology is rapidly moving into our bodies,” writes cyber expert Keenan, “and this book gives a chilling look ahead into where that road may lead us – on a one way trip to the total surrender of privacy and the commoditization of intimacy.” Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door.

Take, for example, “Girls Around Me”: a Russian-made iPhone App that allowed anyone to scan the immediate vicinity for girls and women who checked in on Foursquare and had poorly secured Facebook profiles. It combined this information in a way never intended by the original poster. Going to a Disney theme park? Your creepy new “MagicBand” will alert Minnie Mouse that you’re on the way and she’ll know your kid’s name when you approach her. Thinking about sending your DNA off to Ancestry.com for some “genetic genealogy”? Perhaps you should think again: your genetic information could be used against you.

With security scares like the Heartbleed bug (which compromised even supposedly safe internet behemoths like Google and Yahoo!) becoming more commonplace, this book is a must-read for anybody who values their privacy in a wired world.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Technocreep by Thomas P. Keenan in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

References

All online resources accessed and verified in early 2014, but subject to change and deletion.
1. Blackwell, Tom. “Do-it-yourself brain stimulation has scientists ­worried as healthy people try to make their minds work better,” National Post, June 12, 2013, accessed at http://news.nationalpost.com/2013/06/12/transcranial-direct-current-stimulation-tdcs-technology/
2. Clark, Liat. “Facebook is using AI to analyze the emotions behind your posts,” wired.co.uk, September 23, 2013, accessed at http://www.wired.co.uk/news/archive/2013-09/23/facebook-deep-learning
3. Gannes, Liz. “Passwords on Your Skin and in Your Stomach: Inside Google’s Wild Motorola Research Projects (Video),” All Things D, June 3, 2013, accessed at http://allthingsd.com/20130603/passwords-on-your-skin-and-in-your-stomach-inside-googles-wild-motorola-research-projects-video/
4. Eadicicco, Lisa. “Google Glass Will Track Your Gaze, Patent Hints,” Laptop, August 14, 2013, accessed at http://blog.laptopmag.com/google-glass-patent, and describing U.S. Patent 8,510,166, issued August 13, 2013 and assigned to Google, Inc
5. BBC. “Tesco petrol stations use face-scan tech to target ads,” November 4, 2013, accessed at http://www.bbc.com/news/technology-24803378
6. Hood, Leroy. Personal communication, Chicago, IL, February 14, 2014.
7. Carr, David. “Giving Viewers What They Want,” New York Times, February 24, 2013, accessed at http://www.nytimes.com/2013/02/25/business/media/for-house-of-cards-using-big-data-to-guarantee-its-popularity.html
8. Gymrek, Melissa, et al. “Identifying Personal Genomes by Surname Inference,” Science, January 18, 2013, 339(6117) p. 321-324, accessed at www.sciencemag.org/content/339/6117/321.abstract.
9. Dobbs, Sarah. “50 Genuinely Creepy Horror Movies,” Den of Geek, February 22, 2014, accessed at http://www.denofgeek.us/movies/horror-movies/22381/50-genuinely-creepy-horror-movies
10. http://www.reddit.com/r/Askreddit/comments/1d2v7i/parents_of_reddit_what_is_the_creepiest_thing/
11. Gravitz, Lauren. “When Your Diet Needs a Band-Aid,” MIT Technology Review, May 1, 2009, accessed at http://www.technologyreview.com/news/413323/when-your-diet-needs-a-band-aid/
12. Seltzer, Leslie J., et al. “Social vocalizations can release oxytocin in humans,” September 7, 2010, Proceedings of the Royal Society of Biological Sciences, 277(1694) pp. 2661-2666.
13. Wallace, Richard S. “From Eliza to A.L.I.C.E.,” accessed at www.alicebot.org/articles/wallace/eliza.html
14. Foner, Leonard, N. In Dautenhahn, Kirstin, ed., Human Cognition and Social Agent Technology. Amsterdam: John Benjamins Publishing, 2000, p. 326.
15. Forums of Loathing. Accessed at forums.kingdomofloathing.com/vb/showthread.php?t=97928.J
16. This demonstrates how Hank’s knowledge base was populated with information to help the Coca-Cola company deal with common rumors, such as being owned by the Mormon Church. See http://www.snopes.com/cokelore/mormon.asp. It also illustrates the limits of Hank’s machine intelligence since he was asked about his own theological beliefs but was triggered by the word “Mormon” to reply about stock ownership
17. http://coca-cola-corporate.com.yeslab.org/contactus/
18. University of Reno. “Interactive Catholic Confessional,”
19. Wade, Peter. “For Yom Kippur, Synagogue Invites Congregation to Tweet Their Sins,” Fast Company, September 13, 2013, accessed at http://www.fastcompany.com/3017468/fast-feed/for-yom-kippur-synagogue-invites-congregation-to-tweet-their-sins
20. Warren, Tom. “This is Cortana, Microsoft’s answer to Siri,” The Verge, March 3, 2014, accessed at http://www.theverge.com/2014/3/3/5465264/microsoft-cortana-windows-phone-screenshots
21. Kurzweil, Raymond. The Singularity is Near: When Humans Transcend Biology. New York: Viking Penguin, 2005.
22. Lovelace, Lady Ada. Quoted in Epstein, et al., Parsing the Turing Test. New York: Springer Science, 2009, p. 53.
23. Freud, Sigmund. “Das Unheimlich,” Imago, Bd. V., 1919; reprinted in Sammlung, Fünfte Folge. Translated by Alix Strachey, accessed at http://web.mit.edu/allanmc/www/freud1.pdf
24. Mori, Mashahiro. “Bukimi no Tani–The Uncanny Valley,” translated by K.F. MacDorman & T. Minato. Energy, 7(4) p. 33–35, accessed at http://www.androidscience.com/theuncannyvalley/proceedings2005/uncannyvalley.html
25. Harmon, Amy. “Making Friends With a Robot Named Bina48,” New York Times, July 4, 2010, accessed at www.nytimes.com/2010/07/05/science/05robotside.html
26. FBI Special Agent Daniel R. Geneck. Criminal Complaint, dated April 21, 2013, accessed http://www.justice.gov/usao/ma/news/2013/April/criminalcomplaint1304211847.pdf
27. Klontz, Joshua C., Jain, Anil, K. “A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects,” Technical Report MSU-CSE-13-4, accessed at http://www.cse.msu.edu/biometrics/Publications/Face/KlontzJain_CaseStudyUnconstrainedFacialRecognition_BostonMarathonBombimgSuspects.pdf
28. Shick, Shane (interviewer). “Security Lessons learned from the Boston tragedy (video interview),” CIO Association of Canada, accessed at http://www.youtube.com/watch?v=k5EK-tZlYvo
29. Wadhwa, Tarun. “The Next Privacy Battle: Cameras That Judge Your Every Move,” Forbes, August 30, 2012,
30. Iwamoto, Kentaro, et al., “Cigarette smoke detection from captured image sequences,” in Image Processing: Mach...

Table of contents

  1. Title Page
  2. Contents
  3. Preface
  4. Introduction
  5. Intelligence Creep
  6. Camera Creep
  7. Image Creep
  8. Sensor Creep
  9. Tracking Creep
  10. Sensation Creep
  11. Bio Creep
  12. Body Creep
  13. Time Creep
  14. Government Creep
  15. Deception Creep
  16. Physible Creep
  17. Child Creep
  18. Pet Creep
  19. Robot Creep
  20. Creep Theory
  21. Anti-Creep
  22. Acknowledgments
  23. Bibliography
  24. References