airport security

115 results back to index

pages: 309 words: 100,573

Cockpit Confidential: Everything You Need to Know About Air Travel: Questions, Answers, and Reflections by Patrick Smith


airline deregulation, airport security, Atul Gawande, call centre, Captain Sullenberger Hudson, collective bargaining, inflight wifi, low cost carrier, Maui Hawaii, Mercator projection, New Urbanism, pattern recognition, race to the bottom, Skype, Tenerife airport disaster

Tough-as-nails prison guards cannot keep knives out of maximum security cell blocks, never mind the idea of guards trying to root out every conceivable weapon at an overcrowded terminal. The second flaw is our lingering preoccupation with the tactics used by the terrorists on September 11—the huge and tragic irony being that the success of the 2001 attacks had almost nothing to do with airport security in the first place. As conventional wisdom has it, the 9/11 terrorists exploited a weakness in airport security by smuggling aboard box cutters. But conventional wisdom is wrong. It was not a failure of airport security that allowed those men to hatch their takeover scheme. It was, instead, a failure of national security—a breakdown of communication and oversight at the FBI and CIA levels. What the men actually exploited was a weakness in our mindset—a set of presumptions based on the decades-long track record of hijackings and how they were expected to unfold.

• The glorious glory • Dogs and cats below • The story on cell phones and PEDs • Those damn dings • Listening in on cockpit chatter • Public address madness and the babble of the safety briefing • Class struggles: first, business, economy, and beyond • The trials and tribulations of boarding, and how to make it better • A round of applause Looking Out: Memorable Views from Aloft 6. …Must Come Down: Disasters, Mishaps, and Fatuous Flights of Fancy Terminal Madness: What Is Airport Security? The Ten Deadliest Air Disasters of All Time Terrorism perspective: the golden age of air crimes • Fear and reason: encouragement for nervous flyers • What pilots dread • Emergencies, real and imagined • Where airlines fear to tread • The ten worst disasters of all time • Foreign airline safety • The myth of the Immaculate Qantas • Budget carrier safety • Flight and punishment • Exploding tires and other nightmares • Could a nonpilot land a jetliner?

I once received an email asking me about a supposed “tacit agreement” between pilots that says we will not openly discuss UFO sightings out of fear of embarrassment and, as the emailer put it, “possible career suicide.” I had to laugh at the notion of there being a tacit agreement among pilots over anything, let alone flying saucers. And although plenty of things in aviation are tantamount to career suicide, withholding information about UFOs isn’t one of them. 6 …MUST COME DOWN Disasters, Mishaps, and Fatuous Flights of Fancy TERMINAL MADNESS: WHAT IS AIRPORT SECURITY? In America and across much of the world, the security enhancements put in place following the catastrophe of September 11, 2001, have been drastic and of two kinds: those practical and effective, and those irrational and pointless. The first variety have taken place almost entirely behind the scenes. Comprehensive explosives scanning for checked luggage, for instance, was long overdue and is perhaps the most welcome addition.


pages: 249 words: 79,740

The Next Decade: Where We've Been . . . And Where We're Going by George Friedman


airport security, Ayatollah Khomeini, Berlin Wall, British Empire, Deng Xiaoping, facts on the ground, Fall of the Berlin Wall, full employment, hydraulic fracturing, illegal immigration, Monroe Doctrine, Ronald Reagan, South China Sea

Once again, in the face of terror, the president must convince the public that he shares their sentiments while taking actions that appear to satisfy their cravings both for security and for revenge. One such largely symbolic action taken since September 11 has been the attempt to bolster the airport security system. Despite billions of dollars and untold measures of passenger frustration, a terrorist with training can still devise any number of ways to get explosives or other devices through the system. Some terrorists might be deterred, and the system will find others. But while increased airport security can decrease the threat, it cannot stop it. There is simply no security system that is both granular enough to detect terrorists reliably and efficient enough to allow the air transport system to function. El Al, Israel’s airline, is frequently held up as an example, but El Al has thirty-five planes.

It could conduct an intelligence war against al Qaeda, as the Israelis had done with Black September in Europe in the 1970s; but without contributing partners in the region, the U.S. intelligence capability against al Qaeda was extremely constrained. A second option was for the United States to move into a purely defensive mode, relying on Homeland Security while hoping that the Afghan operation had disrupted al Qaeda’s command structure enough to prevent new attacks. Theoretically, the FBI could round up sleeper cells while the borders were protected from infiltration and airports secured against terrorists. Attractive on paper, this plan was impossible in practice. The FBI could never guarantee that there were no more sleeper cells in the country, and points of entry into the United States could never be completely secured. Any illusion of safety this effort gave the American public, and any support it might buy the president for a job well done, would last only until the next terrorist attack, the timing and nature of which were completely unknown.

The Transportation Security Administration says it screened 1.8 million passengers per day on average in 2009. These are staggering numbers. What the limitations of airport screening tell us is that if al Qaeda failed to strike the United States again during the first decade of the twenty-first century, it was not because of security precautions per se. It is even doubtful that the people who design the airport security system expect it to work. Their real objective is to calm the public by ostentatiously demonstrating that steps are being taken. The greater the ostentation and inconvenience, the more comforting the system appears. But the increasing sophistication of explosives makes it possible to kill dozens of people with a device carried by an individual, hundreds of people with a device hidden in a car or truck, and thousands of people with an aircraft that acts as an explosive.


pages: 310 words: 91,151

Leaving Microsoft to Change the World: An Entrepreneur's Odyssey to Educate the World's Children by John Wood


airport security, British Empire, call centre, clean water, corporate social responsibility, Deng Xiaoping, Donald Trump, fear of failure, glass ceiling, high net worth, income per capita, Jeff Bezos, Johann Wolfgang von Goethe, microcredit, Own Your Own Home, random walk, rolodex, shareholder value, Silicon Valley, Skype, Steve Ballmer

It would have been easy for this group of Chicagoans to justify turning inward and adopting an us-versus-them mentality. They instead displayed resilience and generosity of spirit. These values are so deeply ingrained in the American psyche that no terrorist could ever hope to wipe them out. The positive and proactive forces in this universe will always defeat the dark and nihilistic ones. We simply must create the spaces in which concerned citizens are offered a way to take action. THE ENHANCED AIRPORT SECURITY AFTER SEPTEMBER 11 MADE IT ALL the more difficult to be a road warrior. Two weeks after the Chicago event I was in New York’s JFK Airport feeling bleary-eyed. The airlines were recommending that travelers show up two hours before their scheduled departure. To assure that I could catch my 7:30 a.m. flight, I had been awake since 5 a.m. and at the airport since 5:30. The check-in line moved all too slowly.

With warm regards, Brent He had written Room to Read a check for $1,000. I shook my head in disbelief. My intention in helping Brent was not to gain a funder, but as a result of our chance encounter we had just gained half of what was needed to set up a school library serving several hundred children. If only those kids could know the story of how a random meet-up, combined with heightened airport security, had been turned from a negative into a positive. Brent’s donation, combined with the success of our Chicago event, convinced me that we could continue to grow, even in the post–September 11 era. People seemed more eager than ever to find ways to bring some positive energy back to the world. I was grateful to all the donors who were sending us a signal not to shrink, but to continue to expand our work.

(CML) Colorado Commodore PET computers Computer Room program of Room to Read Cambodia of Room to Read Nepal of Room to Read Vietnam computers for china memory in programming of shortcut keys of Confucius Congressional Committee on Human Rights Continental Bank Dalai Lama data-driven approach Deng Xiaoping Devkota, Kripali Digantar Dim Boramy disasters, human responses to Donohoe, Robin Richards Dostoyevksy, Fyodor dot-com bubble Draper, William H., III Draper Richards Foundation (DRF) drinking water, safe Edelman Edison, Thomas 85 Broads Eisenhower, Mary employee stock ownership plans (ESOP) Erensel, Brent Flynn, John Foege, William France Francis de Sales, Saint Friedman, Thomas fund-raising annual amount of cash flow and challenge grants as form of by children core principles in DRF pledge in enhanced airport security and Global Catalyst Foundation grant in global travelers and maintaining positive reputation in Microsoft grant in multiple donor sources as goal of optimistic emphasis in passionate attitude in post-9/11 rejections in for Room to Grow for Room to Read Sri Lanka for Room to Read Vietnam salesmanship in Sponsored Silence as technique of tax-deductible charity status needed for tenacious employees needed for thinking big in Tibet Fund grant in virtuous circle in volunteer fund-raisers in see also “Adopt a Project” model fund-raising events as “awareness raisers” in Boston in Chicago in Hong Kong in London at Mount Everest in New York City post-9/11 for Room to Grow for Room to Read Cambodia slide shows at in Vancouver fund-raising network city chapters of competitive spirit in international for large-scale philanthropy motivation for involvement in Nepali-Americans in planning of super-empowered individuals in Ganju, Erin Keown, (chief operating officer) Gates, Bill “batboy” of charities of clothing of as data-driven haircut of net worth of personality of Gates, Bill, China visited by Chinese youth and clothing sent ahead in Hong Kong border crossing of Microsoft Venus launch in photo ops in preparations for press conference on schedule of Shui Junyi television interview of Gates, Melinda French JW’s job interview with Gates Foundation Gehrig, Lou girls, long-term scholarships for, see Room to Grow girls’ scholarship program Global Catalyst Foundation Goethe, Johann Wolfgang von Goldman Sachs 85 Broads of Grameen Bank guinea worm, eradication of Habitat for Humanity Haman, Anja Hanson, Janet Harris, Ed Hillary, Sir Edmund Himalayan Primary School Himalayan Trust Hong Kong Hong Kong fund-raising chapter fund-raising event of Hue IBM illiteracy immigrants, U.S.


pages: 249 words: 77,027

Glock: The Rise of America's Gun by Paul M. Barrett


airport security, forensic accounting, hiring and firing, interchangeable parts, offshore financial centre, Ralph Nader, Ronald Reagan, union organizing

Cowritten with his assistant and leg man, Dale Van Atta, the column reported that “Gaddafi is in the process of buying more than 100 plastic handguns that would be difficult for airport security forces to detect.” An unnamed “top” US official told Anderson and Van Atta: “ ‘This is crazy. To let a madman like Gaddafi have access to such a pistol! Once it is in his hands, he’ll give it to terrorists throughout the Middle East.’ ” The official was none other than Noel Koch, the Pentagon’s counterterrorism chief. “The handgun in question is the Glock 17, a 9mm pistol invented and manufactured by Gaston Glock in the village of Deutsch-Wagram, just outside Vienna,” the column continued. “It is accurate, reliable, and made almost entirely of hardened plastic. Only the barrel, slide, and one spring are metal. Dismantled, it is frighteningly easy to smuggle past airport security.” Cloaking Koch’s identity, the column described his experiment at Washington National: “One Pentagon security expert decided to demonstrate just how easy it would be to sneak a Glock 17 aboard an airliner.”

Within months of the original Anderson column in January 1986, questions about the pistol’s unusual design and materials become a major selling point. Civilian orders continued to pour in, as thousands of gun buyers decided to see what all the commotion was about. Karl Walter also tallied more than one thousand requests for free samples from law enforcement agencies in 1986 alone. Some came from small municipal police departments; others, from large state prisons and international airport-security offices. The US Capitol Police obtained a Glock and passed it along to the Federal Law Enforcement Training Center in Glynco, Georgia. Soon Walter was holding seminars with representatives from the Customs Service, the Border Patrol, the Marshals Service, the Bureau of Prisons, and the Drug Enforcement Administration. All of them wanted Glock 17s for closer study and tryouts on the range. Nine out of ten of the recipients eventually sent a check, saying they would like to keep the test guns.


Bringing Down the House: The Inside Story of Six M.I.T. Students Who Took Vegas for Millions by Ben Mezrich


airport security, Silicon Valley, upwardly mobile

Above the stacks of hundred-dollar bills, I felt something shaped like an enormous suppository. Shit. I had forgotten about my cell phone. My fingers shook as I reached into my coat and fumbled for my Nokia. I could feel the woman’s eyes on me. If she asked me to take off my jacket, I was dead. She’d see the bulges and all hell would break loose. I’d spent the past six months researching stories involving attempts at sneaking undeclared fortunes through airport-security checkpoints, and I knew all about customs law. The security agents can detain you for forty-eight hours. They drag you to a windowless room, sometimes handcuff you to a chair. They call in agents from the DEA and the FBI. They confiscate your stake, sometimes without even giving you a receipt. It will take lawyers and letters and appearances in court to get the money back. Maybe six months, maybe a year.

Certainly, they’d finish the look. Then he heard the distinct rip of Velcro, and Martinez’s hands reappeared. Kevin’s heart thumped as he saw the roll of bills. At least four inches thick, twice as large as the roll Martinez had shown him back at their apartment. And again, the visible bills were hundreds. As much as twenty grand taped inside his shirt. Had Martinez worn the money on him the whole trip from Boston? Through airport security, through the metal detector—shit, the kid hadn’t even raised a sweat. By now, Kevin was beginning to realize that Fisher and Martinez were, at the very least, serious gamblers. Was it possible that they had made all their cash playing casino games? He knew there were people who made a living at cards—hell, there’d been movies about it, books, even newspaper articles. But he understood from what he had read that professional gamblers usually just eked out a living, playing carefully for tiny odds.

The logistics of bringing twelve people to Vegas who weren’t supposed to know one another, along with over a million dollars in cash and chips, was a problem challenging enough for any engineering major. As the newest—and largest—member on the team, Andrew Tay became the “donkey boy,” carrying most of the stash taped to his body. In this role, his paranoia came in handy; he carried the bags of money as if they were filled with unstable explosives, and worked his way through airport security with a drug smuggler’s intensity. Fisher took over for Micky from the moment they arrived in Vegas; he gave a shortened version of Micky’s speech, then made out the assignments that he and Martinez had prepared the night before. Kevin stuck with his squad—Tay, Dylan, and Jill—and usually rotated among the Mirage, the Stardust, and the MGM Grand. He knew most of the pit bosses by name and became familiar with a good percentage of the dealers.


pages: 640 words: 177,786

Against All Enemies by Tom Clancy, Peter Telep


airport security, augmented reality, back-to-the-land, Captain Sullenberger Hudson, illegal immigration, Iridium satellite

That information was then data-mined to connect dots and hunt for names and identities. If that process yielded more results, then the intelligence would be passed on to the Terrorist Screening Center, also in Virginia, for more analysis. Each day more than three hundred names were sent to the center. If, at that point, a suspect’s information caused a “reasonable suspicion,” he might wind up on the FBI’s terrorist watchlist used by airport security personnel to add extra screening for some travelers, but yes, he could still fly. The Taliban had discovered that in order for someone to get on the actual no-fly list, authorities had to have their full names, their ages, and information that they were a threat to aviation or national security. While the Taliban couldn’t confirm it, they’d heard that the final decision for adding a name to the list rested with six administrators from the Transportation Safety Administration (TSA).

He reached an intersection, ducked around the right corner, and an alarm began to blare inside the terminal and voices rattled through loudspeakers. A male French voice finally ordered all passengers to remain at their gates. Ahead lay a bank of glass doors, but beyond was a maintenance area with baggage trucks lined up in neat rows. The sign said something about restricted access. He didn’t care. Outside. He needed to get outside. But then he nearly ran head-on into an airport security officer. He tried to shift around the portly man, but the guy tackled him, and Ahmad dropped to the ground, his hands fumbling for and finding the man’s pistol. He got it, wrenched himself away, and fired two shots into the man’s chest. He sprang to his feet, and people screamed around him and cleared away, the shots still echoing, the Americans behind him hollering—and then a crackling like fireworks … Sharp, stabbing pain woke in his back and drove him down to the tile once more.

Equipping all commercial airliners with military-style countermeasures, such as white-hot flares (chaff) and/or infrared jammers, high-powered lasers to burn out the seeker heads on missiles, or using fighter planes to escort jets in and out of the highest-risk areas, were all extremely cost-prohibitive in view of what government officials called a “lack of actionable intelligence.” The Federal Aviation Administration did state that the government provided some “war risk” insurance to the airlines, but they were unclear if the program accounted for surface-to-air missile strikes. Samad could only chuckle to himself. While five-year-olds were being patted down at airport security checkpoints, nothing—absolutely nothing—was being done to secure planes against such missile strikes. Allahu Akbar! The Israelis had not allowed themselves to be caught in the legal and political quagmire concerning this subject, in part because they knew they would forever have targets on their backs. They had equipped their El Al planes with sophisticated antimissile systems that had already proven themselves in one notable case of a 757-300 managing to evade not one but two missiles.


pages: 503 words: 131,064

Liars and Outliers: How Security Holds Society Together by Bruce Schneier


airport security, barriers to entry, Berlin Wall, Bernie Madoff, Bernie Madoff, Bernie Sanders, Brian Krebs, Broken windows theory, carried interest, Cass Sunstein, Chelsea Manning, corporate governance, crack epidemic, credit crunch, crowdsourcing, cuban missile crisis, Daniel Kahneman / Amos Tversky, David Graeber, desegregation, don't be evil, Douglas Hofstadter, experimental economics, Fall of the Berlin Wall, financial deregulation, George Akerlof, hydraulic fracturing, impulse control, income inequality, invention of agriculture, invention of gunpowder, iterative process, Jean Tirole, John Nash: game theory, joint-stock company, Julian Assange, meta-analysis, microcredit, moral hazard, mutually assured destruction, Nate Silver, Network effects, Nick Leeson, offshore financial centre, patent troll, phenotype, pre–internet, principal–agent problem, prisoner's dilemma, profit maximization, profit motive, race to the bottom, Ralph Waldo Emerson, RAND corporation, RFID, Richard Thaler, risk tolerance, security theater, shareholder value, slashdot, statistical model, Steven Pinker, technological singularity, The Market for Lemons, The Nature of the Firm, The Spirit Level, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, too big to fail, transaction costs, ultimatum game, UNCLOS, union organizing, Vernor Vinge, WikiLeaks, World Values Survey, Y2K

Fraud detection would be unnecessary: the parts of our welfare and healthcare system that make sure people fairly benefit from those services and don't abuse them; and all of the anti-shoplifting systems in retail stores. Entire industries would be unnecessary, like private security guards, security cameras, locksmithing, burglar alarms, automobile anti-theft, computer security, corporate security, airport security, and so on. And those are just the obvious ones; financial auditing, document authentication, and many other things would also be unnecessary. Not being angels is expensive. We don't pay a lot of these costs directly. The vast majority of them are hidden in the price of the things we buy. Groceries cost more because some people shoplift. Plane tickets cost more because some people try to blow planes up.

., and it could do anything—anything—it wanted to in that name. After the September 11 attacks, people became much more scared of airplane terrorism. The data didn't back up their increased fears—airplane terrorism was actually a much larger risk in the 1980s—but 9/11 was a huge emotional event and it really knocked people's feeling of security out of whack. So society, in the form of the government, tried to improve airport security. George W. Bush signed the Aviation and Transportation Security Act on November 19, 2001, creating the Transportation Security Administration. Societal Dilemma: Airplane terrorism. Society: Society as a whole. Group interest: Safe air travel. Competing interest: Blowing up airplanes is believed to be an effective way to make a political point or advance a political agenda.3 Group norm: Not to blow up airplanes.

These institutions have been delegated responsibility for implementing institutional pressure on behalf of society as a whole, but because their interests are different, they end up implementing security at a greater or lesser level than society would have. Exaggerating the threat, and oversecuring—or at least overspending—as a result of that exaggeration, is by far the most common outcome. The TSA, for instance, would never suggest returning airport security to pre-9/11 levels and giving the rest of its budget back so it could be spent on broader anti-terrorism measures that might make more sense, such as intelligence, investigation, and emergency response. It's a solution that goes against the interests of the TSA as an institution. This dynamic is hardly limited to government institutions. For example, corporate security officers exhibit the same behavior.


pages: 317 words: 84,400

Automate This: How Algorithms Came to Rule Our World by Christopher Steiner


23andMe, Ada Lovelace, airport security, Al Roth, algorithmic trading, backtesting, big-box store, Black-Scholes formula, call centre, cloud computing, collateralized debt obligation, Credit Default Swap, credit default swaps / collateralized debt obligations, delta neutral, Donald Trump, Douglas Hofstadter, dumpster diving, Flash crash, Gödel, Escher, Bach, High speed trading, Howard Rheingold, index fund, John Maynard Keynes: technological unemployment, knowledge economy, late fees, Mark Zuckerberg, market bubble, medical residency, PageRank, pattern recognition, Paul Graham, prediction markets, quantitative hedge fund, Renaissance Technologies, ride hailing / ride sharing, risk tolerance, Sergey Aleynikov, side project, Silicon Valley, Skype, speech recognition, Spread Networks laid a new fibre optics cable between New York and Chicago, transaction costs, upwardly mobile, Watson beat the top human players on Jeopardy!, Y Combinator

“Exchange to Rush New Ticker System,” New York Times, August 11, 1929. 7. “High-Speed Stock Tickers to Call for Rise in Rental,” New York Times, March 2, 1930. CHAPTER 5: GAMING THE SYSTEM 1. IBM corporate Web site: 2. Scott Patterson, The Quants (New York: Crown, 2010). 3. Sean D. Hamill, “Research on Poker a Good Deal for Airport Security,” Pittsburgh Post-Gazette, August 2, 2010. 4. Michael Kaplan, “Wall Street Firm Uses Algorithms to Make Sports Betting Like Stock Trading,” Wired, November 1, 2010. 5. Bueno de Mesquita’s Mubarak prediction was fact-checked with multiple sources. The name of the Wall Street firm is not disclosed to honor nondisclosure agreements. 6. IBM chronicles of Deep Blue: 7.

., 65 Liber Abaci (The Book of Calculation) (Fibonacci), 56–57 Library of Congress, 193 Lin, Jeremy, 142–43 linguistics, 187 liquidity crisis, potential, 51–52 Lisp, 12, 93, 94 lit fiber, 114, 120 lithium hydroxide, 166 Lithuania, 69 litigation: health insurers and, 181 stock prices and potential, 27 Walgreens and, 156 logic: algorithms and, 71 broken down into mechanical operations, 58–59 logic theory, 73 logic trees, 171 London, 59, 66–67, 68, 121, 198 Los Angeles International Airport, security algorithm at, 135 Los Angeles Lakers, 143 loudness, 93, 106 Lovelace, Ada, 73 Lovell, James, 165–67 Lulea, Sweden, 204 lunar module, 166 lung cancer, 154 McAfee, Andrew P., 217–18 McCartney, Paul, 104, 105, 107 “In My Life” claimed by, 110–11 as math savant, 103 McCready, Mike, 78–83, 85–89 McGuire, Terry, 145, 168–72, 174–76 machine-learning algorithms, 79, 100 Magnetar Capital, 3–4, 10 Mahler, Gustav, 98 Major Market Index, 40, 41 Making of a Fly, The (Lawrence), prices of, 1–2 Malyshev, Mikhail, 190 management consultants, 189 margin, trading with, 51 market cap, price swings and, 49 market makers: bids and offers by, 35–36 Peterffy as, 31, 35–36, 38, 51 market risk, 66 Maroon 5, 85 Marseille, 147, 149 Marshall, Andrew, 140 Martin, George, 108–10 Martin, Max (Martin Sandberg), 88–89 math: behind algorithms, 6, 53 education in, 218–20 mathematicians: algorithms and, 6, 71 online, 53 on Wall Street, 13, 23, 24, 27, 71, 179, 185, 201–3 Mattingly, Ken, 167 MBAs: eLoyalty’s experience with, 187 Peterffy’s refusal to hire, 47 MDCT scans, 154 measurement errors, distribution of, 63 medical algorithms, 54, 146 in diagnosis and testing, 151–56, 216 in organ sharing, 147–51 patient data and home monitoring in, 158–59 physicians’ practice and, 156–62 medical residencies, game theory and matching for, 147 medicine, evidence-based, 156 Mehta, Puneet, 200, 201 melodies, 82, 87, 93 Mercer, Robert, 178–80 Merrill Lynch, 191, 192, 200 Messiah, 68 metal: trading of, 27 volatility of, 22 MGM, 135 Miami University, 91 Michigan, 201 Michigan, University of, 136 Microsoft, 67, 124, 209 microwaves, 124 Midas (algorithm), 134 Miller, Andre, 143 mind-reading bots, 178, 181–83 Minneapolis, Minn., 192–93 minor-league statistics, baseball, 141 MIT, 24, 73, 128, 160, 179, 188, 217 Mocatta & Goldsmid, 20 Mocatta Group, 20, 21–25, 31 model building, predictive, 63 modifiers, 71 Boolean, 72–73 Mojo magazine, 110 Moneyball (Lewis), 141 money markets, 214 money streams, present value of future, 57 Montalenti, Andrew, 200–201 Morgan Stanley, 116, 128, 186, 191, 200–201, 204 mortgage-backed securities, 203 mortgages, 57 defaults on, 65 quantitative, 202 subprime, 65, 202, 216 Mosaic, 116 movies, algorithms and, 75–76 Mozart, Wolfgang Amadeus, 77, 89, 90, 91, 96 MP3 sharing, 83 M Resort Spa, sports betting at, 133–35 Mubarak, Hosni, 140 Muller, Peter, 128 music, 214 algorithms in creation of, 76–77, 89–103 decoding Beatles’, 70, 103–11 disruptors in, 102–3 homogenization or variety in, 88–89 outliers in, 102 predictive algorithms for success of, 77–89 Music X-Ray, 86–87 Musikalisches Würfelspiel, 91 mutual funds, 50 MyCityWay, 200 Najarian, John A., 119 Naples, 121 Napoleon I, emperor of France, 121 Napster, 81 Narrative Science, 218 NASA: Houston mission control of, 166, 175 predictive science at, 61, 164, 165–72, 174–77, 180, 194 Nasdaq, 177 algorithm dominance of, 49 Peterffy and, 11–17, 32, 42, 47–48, 185 terminals of, 14–17, 42 trading method at, 14 National Heart, Lung, and Blood Institute, 159 Nationsbank, Chicago Research and Trading Group bought by, 46 NBA, 142–43 Neanderthals, human crossbreeding with, 161 Nebraska, 79–80, 85 Netflix, 112, 207 Netherlands, 121 Netscape, 116, 188 Nevermind, 102 New England Patriots, 134 New Jersey, 115, 116 Newsweek, 126 Newton, Isaac, 57, 58, 59, 64, 65 New York, N.Y., 122, 130, 192, 201–2, 206 communication between markets in Chicago and, 42, 113–18, 123–24 financial markets in, 20, 198 high school matching algorithm in, 147–48 McCready’s move to, 85 Mocatta’s headquarters in, 26 Peterffy’s arrival in, 19 tech startups in, 210 New York Commodities Exchange (NYCE), 26 New Yorker, 156 New York Giants, 134 New York Knicks, 143 New York magazine, 34 New York State, health department of, 160 New York Stock Exchange (NYSE), 3, 38–40, 44–45, 49, 83, 123, 184–85 New York Times, 123, 158 New York University, 37, 132, 136, 201, 202 New Zealand, 77, 100, 191 Nietzsche, Friedrich, 69 Nirvana, 102 Nixon, Richard M., 140, 165 Nobel Prize, 23, 106 North Carolina, 48, 204 Northwestern University, 145, 186 Kellogg School of Management at, 10 Novak, Ben, 77–79, 83, 85, 86 NSA, 137 NuclearPhynance, 124 nuclear power, 139 nuclear weapons, in Iran, 137, 138–39 number theory, 65 numerals: Arabic-Indian, 56 Roman, 56 NYSE composite index, 40, 41 Oakland Athletics, 141 Obama, Barack, 46, 218–19 Occupy Wall Street, 210 O’Connor & Associates, 40, 46 OEX, see S&P 100 index Ohio, 91 oil prices, 54 OkCupid, 144–45 Olivetti home computers, 27 opera, 92, 93, 95 Operation Match, 144 opinions-driven people, 173, 174, 175 OptionMonster, 119 option prices, probability and statistics in, 27 options: Black-Scholes formula and, 23 call, 21–22 commodities, 22 definition of, 21 pricing of, 22 put, 22 options contracts, 30 options trading, 36 algorithms in, 22–23, 24, 114–15 Oregon, University of, 96–97 organ donor networks: algorithms in, 149–51, 152, 214 game theory in, 147–49 oscilloscopes, 32 Outkast, 102 outliers, 63 musical, 102 outputs, algorithmic, 54 Pacific Exchange, 40 Page, Larry, 213 PageRank, 213–14 pairs matching, 148–51 pairs trading, 31 Pakistan, 191 Pandora, 6–7, 83 Papanikolaou, Georgios, 153 Pap tests, 152, 153–54 Parham, Peter, 161 Paris, 56, 59, 121 Paris Stock Exchange, 122, 201 partial differential equations, 23 Pascal, Blaise, 59, 66–67 pathologists, 153 patient data, real-time, 158–59 patterns, in music, 89, 93, 96 Patterson, Nick, 160–61 PayPal, 188 PCs, Quotron data for, 33, 37, 39 pecking orders, social, 212–14 Pennsylvania, 115, 116 Pennsylvania, University of, 49 pension funds, 202 Pentagon, 168, 144 Perry, Katy, 89 Persia, 54 Peru, 91 Peterffy, Thomas: ambitions of, 27 on AMEX, 28–38 automated trading by, 41–42, 47–48, 113, 116 background and early career of, 18–20 Correlator algorithm of, 42–45 early handheld computers developed by, 36–39, 41, 44–45 earnings of, 17, 37, 46, 48, 51 fear that algorithms have gone too far by, 51 hackers hired by, 24–27 independence retained by, 46–47 on index funds, 41–46 at Interactive Brokers, 47–48 as market maker, 31, 35–36, 38, 51 at Mocatta, 20–28, 31 Nasdaq and, 11–18, 32, 42, 47–48, 185 new technology innovated by, 15–16 options trading algorithm of, 22–23, 24 as outsider, 31–32 profit guidelines of, 29 as programmer, 12, 15–16, 17, 20–21, 26–27, 38, 48, 62 Quotron hack of, 32–35 stock options algorithm as goal of, 27 Timber Hill trading operation of, see Timber Hill traders eliminated by, 12–18 trading floor methods of, 28–34 trading instincts of, 18, 26 World Trade Center offices of, 11, 39, 42, 43, 44 Petty, Tom, 84 pharmaceutical companies, 146, 155, 186 pharmacists, automation and, 154–56 Philips, 159 philosophy, Leibniz on, 57 phone lines: cross-country, 41 dedicated, 39, 42 phones, cell, 124–25 phosphate levels, 162 Physicians’ Desk Reference (PDR), 146 physicists, 62, 157 algorithms and, 6 on Wall Street, 14, 37, 119, 185, 190, 207 pianos, 108–9 Pincus, Mark, 206 Pisa, 56 pitch, 82, 93, 106 Pittsburgh International Airport, security algorithm at, 136 Pittsburgh Pirates, 141 Pius II, Pope, 69 Plimpton, George, 141–42 pneumonia, 158 poetry, composed by algorithm, 100–101 poker, 127–28 algorithms for, 129–35, 147, 150 Poland, 69, 91 Polyphonic HMI, 77–79, 82–83, 85 predictive algorithms, 54, 61, 62–65 prescriptions, mistakes with, 151, 155–56 present value, of future money streams, 57 pressure, thriving under, 169–70 prime numbers, general distribution pattern of, 65 probability theory, 66–68 in option prices, 27 problem solving, cooperative, 145 Procter & Gamble, 3 programmers: Cope as, 92–93 at eLoyalty, 182–83 Peterffy as, 12, 15–16, 17, 20–21, 26–27, 38, 48, 62 on Wall Street, 13, 14, 24, 46, 47, 53, 188, 191, 203, 207 programming, 188 education for, 218–20 learning, 9–10 simple algorithms in, 54 Progress Energy, 48 Project TACT (Technical Automated Compatibility Testing), 144 proprietary code, 190 proprietary trading, algorithmic, 184 Prussia, 69, 121 PSE, 40 pseudocholinesterase deficiency, 160 psychiatry, 163, 171 psychology, 178 Pu, Yihao, 190 Pulitzer Prize, 97 Purdue University, 170, 172 put options, 22, 43–45 Pythagorean algorithm, 64 quadratic equations, 63, 65 quants (quantitative analysts), 6, 46, 124, 133, 198, 200, 202–3, 204, 205 Leibniz as, 60 Wall Street’s monopoly on, 183, 190, 191, 192 Queen’s College, 72 quizzes, and OkCupid’s algorithms, 145 Quotron machine, 32–35, 37 Rachmaninoff, Sergei, 91, 96 Radiohead, 86 radiologists, 154 radio transmitters, in trading, 39, 41 railroad rights-of-way, 115–17 reactions-based people, 173–74, 195 ReadyForZero, 207 real estate, 192 on Redfin, 207 recruitment, of math and engineering students, 24 Redfin, 192, 206–7, 210 reflections-driven people, 173, 174, 182 refraction, indexes of, 15 regression analysis, 62 Relativity Technologies, 189 Renaissance Technologies, 160, 179–80, 207–8 Medallion Fund of, 207–8 retirement, 50, 214 Reuter, Paul Julius, 122 Rhode Island hold ‘em poker, 131 rhythms, 82, 86, 87, 89 Richmond, Va., 95 Richmond Times-Dispatch, 95 rickets, 162 ride sharing, algorithm for, 130 riffs, 86 Riker, William H., 136 Ritchie, Joe, 40, 46 Rochester, N.Y., 154 Rolling Stones, 86 Rondo, Rajon, 143 Ross, Robert, 143–44 Roth, Al, 147–49 Rothschild, Nathan, 121–22 Royal Society, London, 59 RSB40, 143 runners, 39, 122 Russia, 69, 193 intelligence of, 136 Russian debt default of 1998, 64 Rutgers University, 144 Ryan, Lee, 79 Saint Petersburg Academy of Sciences, 69 Sam Goody, 83 Sandberg, Martin (Max Martin), 88–89 Sandholm, Tuomas: organ donor matching algorithm of, 147–51 poker algorithm of, 128–33, 147, 150 S&P 100 index, 40–41 S&P 500 index, 40–41, 51, 114–15, 218 Santa Cruz, Calif., 90, 95, 99 satellites, 60 Savage Beast, 83 Saverin, Eduardo, 199 Scholes, Myron, 23, 62, 105–6 schools, matching algorithm for, 147–48 Schubert, Franz, 98 Schwartz, Pepper, 144 science, education in, 139–40, 218–20 scientists, on Wall Street, 46, 186 Scott, Riley, 9 scripts, algorithms for writing, 76 Seattle, Wash., 192, 207 securities, 113, 114–15 mortgage-backed, 203 options on, 21 Securities and Exchange Commission (SEC), 185 semiconductors, 60, 186 sentence structure, 62 Sequoia Capital, 158 Seven Bridges of Königsberg, 69, 111 Shannon, Claude, 73–74 Shuruppak, 55 Silicon Valley, 53, 81, 90, 116, 188, 189, 215 hackers in, 8 resurgence of, 198–211, 216 Y Combinator program in, 9, 207 silver, 27 Simons, James, 179–80, 208, 219 Simpson, O.

., 140, 165 Nobel Prize, 23, 106 North Carolina, 48, 204 Northwestern University, 145, 186 Kellogg School of Management at, 10 Novak, Ben, 77–79, 83, 85, 86 NSA, 137 NuclearPhynance, 124 nuclear power, 139 nuclear weapons, in Iran, 137, 138–39 number theory, 65 numerals: Arabic-Indian, 56 Roman, 56 NYSE composite index, 40, 41 Oakland Athletics, 141 Obama, Barack, 46, 218–19 Occupy Wall Street, 210 O’Connor & Associates, 40, 46 OEX, see S&P 100 index Ohio, 91 oil prices, 54 OkCupid, 144–45 Olivetti home computers, 27 opera, 92, 93, 95 Operation Match, 144 opinions-driven people, 173, 174, 175 OptionMonster, 119 option prices, probability and statistics in, 27 options: Black-Scholes formula and, 23 call, 21–22 commodities, 22 definition of, 21 pricing of, 22 put, 22 options contracts, 30 options trading, 36 algorithms in, 22–23, 24, 114–15 Oregon, University of, 96–97 organ donor networks: algorithms in, 149–51, 152, 214 game theory in, 147–49 oscilloscopes, 32 Outkast, 102 outliers, 63 musical, 102 outputs, algorithmic, 54 Pacific Exchange, 40 Page, Larry, 213 PageRank, 213–14 pairs matching, 148–51 pairs trading, 31 Pakistan, 191 Pandora, 6–7, 83 Papanikolaou, Georgios, 153 Pap tests, 152, 153–54 Parham, Peter, 161 Paris, 56, 59, 121 Paris Stock Exchange, 122, 201 partial differential equations, 23 Pascal, Blaise, 59, 66–67 pathologists, 153 patient data, real-time, 158–59 patterns, in music, 89, 93, 96 Patterson, Nick, 160–61 PayPal, 188 PCs, Quotron data for, 33, 37, 39 pecking orders, social, 212–14 Pennsylvania, 115, 116 Pennsylvania, University of, 49 pension funds, 202 Pentagon, 168, 144 Perry, Katy, 89 Persia, 54 Peru, 91 Peterffy, Thomas: ambitions of, 27 on AMEX, 28–38 automated trading by, 41–42, 47–48, 113, 116 background and early career of, 18–20 Correlator algorithm of, 42–45 early handheld computers developed by, 36–39, 41, 44–45 earnings of, 17, 37, 46, 48, 51 fear that algorithms have gone too far by, 51 hackers hired by, 24–27 independence retained by, 46–47 on index funds, 41–46 at Interactive Brokers, 47–48 as market maker, 31, 35–36, 38, 51 at Mocatta, 20–28, 31 Nasdaq and, 11–18, 32, 42, 47–48, 185 new technology innovated by, 15–16 options trading algorithm of, 22–23, 24 as outsider, 31–32 profit guidelines of, 29 as programmer, 12, 15–16, 17, 20–21, 26–27, 38, 48, 62 Quotron hack of, 32–35 stock options algorithm as goal of, 27 Timber Hill trading operation of, see Timber Hill traders eliminated by, 12–18 trading floor methods of, 28–34 trading instincts of, 18, 26 World Trade Center offices of, 11, 39, 42, 43, 44 Petty, Tom, 84 pharmaceutical companies, 146, 155, 186 pharmacists, automation and, 154–56 Philips, 159 philosophy, Leibniz on, 57 phone lines: cross-country, 41 dedicated, 39, 42 phones, cell, 124–25 phosphate levels, 162 Physicians’ Desk Reference (PDR), 146 physicists, 62, 157 algorithms and, 6 on Wall Street, 14, 37, 119, 185, 190, 207 pianos, 108–9 Pincus, Mark, 206 Pisa, 56 pitch, 82, 93, 106 Pittsburgh International Airport, security algorithm at, 136 Pittsburgh Pirates, 141 Pius II, Pope, 69 Plimpton, George, 141–42 pneumonia, 158 poetry, composed by algorithm, 100–101 poker, 127–28 algorithms for, 129–35, 147, 150 Poland, 69, 91 Polyphonic HMI, 77–79, 82–83, 85 predictive algorithms, 54, 61, 62–65 prescriptions, mistakes with, 151, 155–56 present value, of future money streams, 57 pressure, thriving under, 169–70 prime numbers, general distribution pattern of, 65 probability theory, 66–68 in option prices, 27 problem solving, cooperative, 145 Procter & Gamble, 3 programmers: Cope as, 92–93 at eLoyalty, 182–83 Peterffy as, 12, 15–16, 17, 20–21, 26–27, 38, 48, 62 on Wall Street, 13, 14, 24, 46, 47, 53, 188, 191, 203, 207 programming, 188 education for, 218–20 learning, 9–10 simple algorithms in, 54 Progress Energy, 48 Project TACT (Technical Automated Compatibility Testing), 144 proprietary code, 190 proprietary trading, algorithmic, 184 Prussia, 69, 121 PSE, 40 pseudocholinesterase deficiency, 160 psychiatry, 163, 171 psychology, 178 Pu, Yihao, 190 Pulitzer Prize, 97 Purdue University, 170, 172 put options, 22, 43–45 Pythagorean algorithm, 64 quadratic equations, 63, 65 quants (quantitative analysts), 6, 46, 124, 133, 198, 200, 202–3, 204, 205 Leibniz as, 60 Wall Street’s monopoly on, 183, 190, 191, 192 Queen’s College, 72 quizzes, and OkCupid’s algorithms, 145 Quotron machine, 32–35, 37 Rachmaninoff, Sergei, 91, 96 Radiohead, 86 radiologists, 154 radio transmitters, in trading, 39, 41 railroad rights-of-way, 115–17 reactions-based people, 173–74, 195 ReadyForZero, 207 real estate, 192 on Redfin, 207 recruitment, of math and engineering students, 24 Redfin, 192, 206–7, 210 reflections-driven people, 173, 174, 182 refraction, indexes of, 15 regression analysis, 62 Relativity Technologies, 189 Renaissance Technologies, 160, 179–80, 207–8 Medallion Fund of, 207–8 retirement, 50, 214 Reuter, Paul Julius, 122 Rhode Island hold ‘em poker, 131 rhythms, 82, 86, 87, 89 Richmond, Va., 95 Richmond Times-Dispatch, 95 rickets, 162 ride sharing, algorithm for, 130 riffs, 86 Riker, William H., 136 Ritchie, Joe, 40, 46 Rochester, N.Y., 154 Rolling Stones, 86 Rondo, Rajon, 143 Ross, Robert, 143–44 Roth, Al, 147–49 Rothschild, Nathan, 121–22 Royal Society, London, 59 RSB40, 143 runners, 39, 122 Russia, 69, 193 intelligence of, 136 Russian debt default of 1998, 64 Rutgers University, 144 Ryan, Lee, 79 Saint Petersburg Academy of Sciences, 69 Sam Goody, 83 Sandberg, Martin (Max Martin), 88–89 Sandholm, Tuomas: organ donor matching algorithm of, 147–51 poker algorithm of, 128–33, 147, 150 S&P 100 index, 40–41 S&P 500 index, 40–41, 51, 114–15, 218 Santa Cruz, Calif., 90, 95, 99 satellites, 60 Savage Beast, 83 Saverin, Eduardo, 199 Scholes, Myron, 23, 62, 105–6 schools, matching algorithm for, 147–48 Schubert, Franz, 98 Schwartz, Pepper, 144 science, education in, 139–40, 218–20 scientists, on Wall Street, 46, 186 Scott, Riley, 9 scripts, algorithms for writing, 76 Seattle, Wash., 192, 207 securities, 113, 114–15 mortgage-backed, 203 options on, 21 Securities and Exchange Commission (SEC), 185 semiconductors, 60, 186 sentence structure, 62 Sequoia Capital, 158 Seven Bridges of Königsberg, 69, 111 Shannon, Claude, 73–74 Shuruppak, 55 Silicon Valley, 53, 81, 90, 116, 188, 189, 215 hackers in, 8 resurgence of, 198–211, 216 Y Combinator program in, 9, 207 silver, 27 Simons, James, 179–80, 208, 219 Simpson, O.


pages: 306 words: 85,836

When to Rob a Bank: ...And 131 More Warped Suggestions and Well-Intended Rants by Steven D. Levitt, Stephen J. Dubner


Affordable Care Act / Obamacare, airport security, augmented reality, barriers to entry, Bernie Madoff, Bernie Madoff, Black Swan, Broken windows theory, Captain Sullenberger Hudson, Daniel Kahneman / Amos Tversky, deliberate practice, feminist movement, food miles, George Akerlof, invisible hand, loss aversion, Netflix Prize, obamacare, oil shale / tar sands, peak oil, pre–internet, price anchoring, price discrimination, principal–agent problem, profit maximization, Richard Thaler, security theater, Ted Kaczynski, the built environment, The Chicago School, the High Line, Thorstein Veblen, transaction costs

Making Profits from Incivility on the Roads (SDL) I hardly ever drive anymore since I moved close to where I work. So whenever I do, the incivility on the roads leaps out at me. People do things in cars they would never do in other settings. Honking. Swearing. Cutting to the front of the line. And that is just my sister. The other drivers are far meaner. One obvious reason is that you don’t have to live with the consequences for any length of time. If you cut in line at airport security, you will be in close proximity for quite some time to the people you insulted. With a car, you make a quick getaway. Making that getaway also means you are unlikely to be physically beaten, whereas giving someone the finger as you walk down the sidewalk has no such safety. When I used to commute, there was one particular interchange where incivility ruled. (For those who know Chicago, it is where the Dan Ryan feeds into the Eisenhower.)

I Almost Got Sent to Guantanamo (SDL) I arrived at the West Palm Beach Airport yesterday, trying to make my way back to Chicago, only to see my flight time listed on the departure board as simply DELAYED. They weren’t even pretending it was leaving in the foreseeable future. With a little detective work, I found another flight that could get me home on a different airline. I bought a one-way ticket and headed for airport security. Of course, the last-minute purchase of a one-way ticket sets off the lights and buzzers for the TSA. So I’m pulled out of the line and searched. First the full-body search. Then the luggage. It didn’t occur to me that my latest research was going to get me into trouble. I’ve been thinking a lot about terrorism lately. Among the things I had in my carry-on was a detailed description of the 9/11 terrorists’ activities, replete with pictures of each of the terrorists and information about their background.

Index The pagination of this electronic edition does not match the edition from which it was created. To locate a specific entry, please use your e-book reader’s search tools. abortion, 65–66, 288 Absolute Poker website, 154–58 academia: bribing kids, 337–40 school open house, 219–20 teacher cheating, 103–4, 160–61 tenure, 16–19 Adams, Brandon, 193–94 addictions, rational, 92–94 advice, best, 347–50 African women, survey of, 237 airports, shutting down, 21–23 airport security, 5–6, 11, 108–9, 251–53 Akerlof, George, 162 Allie (high-end call girl), 261–67 altruism, 324–28 Altucher, James, 196–98 anchoring, 309 animated films, voices in, 305–7 animus, discrimination theory, 321–22 anti-fraud measures, 106 aptonyms, 43–47 Armstrong, Lance, 153 Arrow’s Impossibility Theorem, 29 Arum, Bob, 72–73 Asian tsunami, 325–26 assets, non-fungible, 68 athletes: gambling on, 73 income taxes of, 72–74 aviation congestion, 21–23 baby formula, 303–5 backgammon, 195–98 Badenhausen, Kurt, 74 Baltimore Sun, The, 233 bank robberies, 223–26 baseball, steroids, 152–53 baseballs, autographed, 80–81 Becker, Gary, 9–10, 92–94 behavioral economics, 120, 122, 308–9 Belichick, Bill, 149–50, 208–9 Berlin brothel, 173 Bertrand, Marianne, 347 Betjeman, John, 282 Bing, Stanley, 277 bin Laden, Osama, 57–59 bird-watching, 286–87 blackjack, 189–91 bling, 184 blogs, 1–4, 37 as kaleidoscopes, 271 “blood injuries,” 148–49 Bloomberg, Michael, 240 Blount, Roy Jr., 217 Bolt, Usain, 74 books, 14–16 about business, 283–87 bullshit in titles, 276–77, 285 diet, 117 fake memoirs, 146–48 God in titles, 285–87 on iPad, 124–25 bowling, 204–6 Boxer, Barbara, 51 boxing, 72–73 Boxwell Brothers, 46 Braga, Anthony, 246 Bratton, Bill, 163 Broderick, Matthew, 101–2 “broken windows” theory of crime, 163 Brooks, Arthur, 329–31 Brown, Philip H., 326 bullshit, in book titles, 276–77, 285 Bunning, Jim, 58 Burress, Plaxico, 216, 239, 240–41 bus, boarding, 143–46 Bush, George W., 51, 108, 136 Caesars Entertainment, 126–27 Caesar’s Palace, 189–91 “Captain Steve,” 82–86 Carnegie, Andrew, 16 carnivores, 179–84 cars: child safety seats, 103–6 conspicuous consumption, 184–85 incivility in driving, 161–64 prices of, 54–57 Carson, Rachel, 181 Case, Justin, 46 Castro, Jesus “Manny” Jr., 248–49 chain letters, 141–42 Champagne, Dom Perignon, 40 charitable giving: disasters, 324–28 street handouts, 328–37 cheating: to be hot, 135–37 and “blood injuries,” 148–49 fake memoirs, 146–48 how not to cheat, 153–55 as human nature, 135 Mumbai train system, 140–41 at poker, 153–58 in self-reporting, 137–40 in sports, 148–50 on taxes, 11–14, 72–74, 122, 158–60 by teachers, 103–4, 160–61 chess, 196–98 Chicago Tribune, poll, 279 chicken, rancid, 307–11 chicken wings, prices of, 75–77 child abduction, 133 children, bribing, 337–40 child safety seats, 103–6 China: crime in, 226–28 earthquake in, 324–28 infant formula in, 303–5 Clemens, Roger, 149, 150 climate change, 179–84 Clinton, Hillary, 51 Coca-Cola, formula of, 59–60 Cohn, Alain, 228–29 Coinstar, 64 Collins, Jim, 283–84 Congress, U.S.: and bin Laden bounty, 57–59 and IRS, 12–14 tax code written by, 158–60 conspicuous consumption, 184–85 contests, 91 addictions, 92–94 motto for U.S., 96–99 rigged, 136 Twitter, 94–96 Cook, Phil, 246 Cope, Myron, 215, 216 corporate sponsorships, 81 cover-ups, 121, 157 Cowen, Tyler, 329, 331–33 Cowher, Bill, 218 Craig, Larry, 45 crime: and abortion, 288 bank robberies, 223–26 “broken windows” theory of, 163 burglary, 242 child abduction, 133 in China, 226–28 gun deaths, 245–51 and gun laws, 243–45 intruders, 241–43 priming criminals, 228–29 prison sentences, 128, 224, 242, 245, 248, 260 street gangs, 229–36, 246–47, 248–49 and The Wire, 229–33 volatile rates of, 244 Cuban, Mark, 329, 333 cyclists, Tour de France, 151–53 Cyrus, Miley, 306 Daily Show, The, 273–74 Dal Bó, Ernesto, 33–34 Daly, John, 277 dangerous activities: horseback riding, 101–3 obesity as result of, 116–19 walking drunk, 101 Daschle, Tom, 158, 160 Dawkins, Richard, 286 decision making, 120–21, 208–9 democracy, alternative to, 29–31 Dennett, Daniel, 286 dental wisdom, 275–76 diapers, cloth vs. disposable, 167 diminishing marginal returns, 203 disasters, and charitable giving, 324–28 discrimination, statistical, 321–22 divorce, statistics on, 345 Dohmen, Thomas, 212 Doleac, Jennifer, 320–21 Donohue, John, 288 doomsday prophets, 109–10 doping, in Tour de France, 151–53 driving: and the environment, 166–67 incivility in, 161–64 drugs, prescription, prices of, 51–54 Duke, Annie, 188 Duncan, Arne, 103–4 Duskiewicz, Bernie, 348–49 ecological invalidity, 335 economics: behavioral, 120, 122, 206, 308–9 invisible hand in, 315 morality vs., 288 visible hand in, 319–22 writing about, 287–88 Edlin, Aaron, 88 Ehrenreich, Barbara, 329, 333–34 Ehrlich, Paul, 109, 114 Eikenberry (funeral director), 46 Endangered Species Act, 165–66 Engelberger, Perfect, 40 environment: cloth vs. disposable diapers, 167 and conspicuous consumption, 184–85 and driving, 166–67 eating meat, 179–84 Endangered Species Act, 165–66 global warming, 87–89, 179–84 greenhouse gas (GHG) emissions, 171–72, 177, 180 locavores, 168–72 and packaging, 175–78 paper vs. plastic bags, 167 petroleum extraction, 109–16 Prius “green halo,” 185 and profitability, 172–74 saving the rain forest, 174–75 veganism, 179–84 Ericsson, Anders, 199, 201 escort (high-end call girl), 261–67 evaluation function (EV), 197 experts, ten thousand hours of practice, 199, 201–2 Fanning, Dakota, 305 fear of strangers, 130–33 Feinstein, Dianne, 53 Feldman, Paul, 69 feminist movement, 346–47 Ferraz, Claudio, 33 films, animated, 305–7 Finan, Frederico, 33 first-grade data hound, 219–20 fishing, 348–49 flight attendants, 19–20 food: chicken wings, 75–77 decayed, 177 deliciousness of, 170 kiwifruits, 77–80 locavores, 168–72 nutritional value of, 170 and obesity, 116–18 packaging of, 175–78 poor service, 272–73 rancid chicken, 307–11 shrimp, 341–44 transportation inefficiencies of, 170–72 wasting, 177–78 football: Immaculate Reception, 216 loss aversion, 206–9 Pittsburgh Steelers, 212–19 rookie symposium, 239–41 Fox, Kevin, 253 Frakes, Michael, 117 Frankfurt, Harry, 276 Freakonomics (Levitt & Dubner), 1–2, 37, 40, 54, 69, 101, 105, 135, 160, 223, 253–4, 261, 274, 277, 280, 297–98, 305, 322, 351, 1–4, 8, 233 Freakonomics radio, 268–69 Frederick, Shane, 341–43 Freed, Pam, 342 Friedman, Milton, 23 Frost, Robert, 218 Fryar, Irving, 239–40 Fryer, Roland, 228, 288, 328–29, 337, 339 Fuller, Thomas, 194–95 Gacy, John Wayne Jr., 39 Gagné, Éric, 149 gambling: on athletes, 73 backgammon, 195–98 blackjack, 189–91 on horse racing, 191, 220–22 how not to cheat, 153–55 Internet poker, 127–30, 157 on newspaper circulation, 233 one card away from final table, 192–95 Rochambeau (Rock, Paper, Scissors), 188–89 on teams, 125–26 unbreakable record, 192 World Series of Poker, 187–88, 192–95 GAME (Gang Awareness Through Mentoring and Education), 248–49 gas, moratorium on, 311–14 gas prices, 86–90 Gates, Bill, 16 Geiger, Bernice, 224 Geithner, Tim, 158 gender identity, 228 Gladstone, Bernard, 258, 259 global warming, 88–89, 179–84 Gly-Oxide, 275–76 God, in book titles, 285–87 Goeree, Jacob, 31 Goldstein, Dan, 335 golf, 198–206 Goodall, Chris, 167 Good to Great (Collins), 283–84, 285 Goolsbee, Austan, 160 Gordon, Phil, 187–89, 192, 193 Goss, Pat, 200–201 government: and gambling income, 129 paying politicians, 32–36 voting mechanisms, 29–31 Greatest Good, 28, 300–301 Greene, Mean Joe, 216 greenhouse gas (GHG) emissions, 171–72, 177 Grossman, Michael, 116 Gruber, Jonathan, 117 Grzelak, Mandi, 268–69 guns: anonymous tips about, 247 athletes carrying concealed weapons, 240–41 concealed weapons laws, 242 D.C. ban on, 243–45 deaths from, 245–51 illegal use of, 245 ownership of, 245 shooting intruders with, 241–43 Hagen, Ryan, 314–19 happiness, 122–23, 344–47 Harold’s Chicken Shack, 75–77 Harris, Franco, 216 Hatcher, Teri, 305 hate mail, cost of, 49–51 health care: British National Health Service, 26–29 decisions in, 122 Hemenway, David, 249–50 Henderson, Kaya, 160 herd mentality, 143–46 Hitchens, Christopher, 286 hoaxes, 282–83 Holmes, Santonio, 214–16 home, building your own, 170 home field advantage, 209–12 homelessness, 330–31 horseback riding, 101–3 horse racing, 220–22 housing prices, 67–69 Hurricane Katrina, 42–43, 325–28 Hussein, Saddam, 58 identity, concept of, 162–63 Immaculate Reception, 216 impure altruism, 328 incentives, 17, 32–36, 65, 95–96, 110, 113, 122, 136, 166, 337–40 inefficiencies, transportation, 170–72 INS (Immigration and Naturalization Service), Form N-400, 237–38 In Search of Excellence (Peters and Waterman), 284 Internet poker, 127–30, 157 iPad, 124–25 Irfan, Atif, 130–32 irrational decisions, 120–21 IRS, 11–14, 159–60, 257 Jackson, Vincent, 215 Jacob, Brian, 160 Jagger, Mick, 74 Jarden Zinc, 63 J.F.K. airport, 21–22 Jines, Linda Levitt: brother’s eulogy for, 297–301 father’s interventions, 289–97 and Freakonomics, 277, 297–98 Jingjing Zhang, 31 Johnson, Larry, 207 Johnston, David Cay, 11–12 Kaczynski, Ted (Unabomber), 287 Kahneman, Daniel, 3, 119–24, 206 Katrina (popular name), 42–43 Kennedy, Bobby, 279 Kentucky Derby, 220–22 Keyes, Alan, 279 KFC, 272–73 Killefer, Nancy, 158 kiwifruits, 77–80 Kormendy, Amy, 169 Kranton, Rachel, 162 Kulkarni, Ganesh, 140–41 Laffer curve, 72 LaGuardia Airport, 21–23 LaHood, Ray, 21, 103–6 Lake George, boat accident on, 118–19 Lancaster, Barbara, 219 Landsburg, Steven, 259 Lane, Mary MacPherson, 173 Las Vegas: blackjack, 189–91 poker, 127–30, 153–58, 187–89, 192–95 risk aversion in, 126–27 Lee, Jennifer 8., 41 Lee Hsien Loong, 32 Leeson, Peter, 314–19 Levitt, Michael, “When a Daughter Dies,” 289–97 libraries, public, 14–16 lies of reputation, 137–40 Limberhand (masturbator), 45–46 List, John, 125, 165, 228, 327–28, 338 lobbyists, 62–63 locavores, 168–72 loss aversion, 206–9 Loveman, Gary, 127 ludicity (ludic fallacy), 335 Ludwig, Jens, 246–48 Maass, Peter, 109, 114 Madoff, Bernie, 133 Malthus, Rev.


pages: 190 words: 53,970

Eastern standard tribe by Cory Doctorow


airport security, call centre, forensic accounting, high net worth, offshore financial centre, pirate software, Silicon Valley, the payments system

I'll tell you the rest, maybe, someday. Not today, though. I gotta go to London. Art's vision throbbed with his pulse as he jammed his clothes back into his backpack with one hand while he booked a ticket to London on his comm with the other. Sweat beaded on his forehead as he ordered the taxi while scribbling a note to Gran on the smart-surface of her fridge. He was verging on berserk by the time he hit airport security. The guard played the ultrasound flashlight over him and looked him up and down with his goggles, then had him walk through the chromatograph twice. Art tried to breathe calmly, but it wasn't happening. He'd take two deep breaths, think about how he was yup, calming down, pretty good, especially since he was going to London to confront Fede about the fact that his friend had screwed him stabbed him in the back using his girlfriend to distract him and meanwhile she was in Los Angeles sleeping with her fucking ex who was going to steal his idea and sell it as his own that fucking prick boning his girl right then almost certainly laughing about poor old Art, dumbfuck stuck in Toronto with his thumb up his ass, oh Fede was going to pay, that's right, he was -- and then he'd be huffing down his nose, hyperventilating, really losing his shit right there.

Art took one step towards the baggage carousel when the words registered. Customs search! Godfuckingdammit! He jittered in the private interview room until another Customs officer showed up, overrode his comm and read in his ID and credentials, then stared at them for a long moment. "Are you quite all right, sir?" "Just a little wound up," Art said, trying desperately to sound normal. He thought about telling the dead friend story again, but unlike a lowly airport security drone, the Customs man had the ability and inclination to actually verify it. "Too much coffee on the plane. Need to have a slash like you wouldn't believe." The Customs man grimaced slightly, then chewed a corner of his little moustache. "Everything else is all right, though?" "Everything's fine. Back from a business trip to the States and Canada, all jetlagged. You know. Can you believe the bastards actually expect me at the office today?"


pages: 184 words: 53,625

Future Perfect: The Case for Progress in a Networked Age by Steven Johnson


airport security, algorithmic trading, banking crisis, barriers to entry, Bernie Sanders, call centre, Captain Sullenberger Hudson, Cass Sunstein, cognitive dissonance, credit crunch, crowdsourcing, dark matter, Dava Sobel, David Brooks, future of journalism, hive mind, Howard Rheingold, HyperCard, Jane Jacobs, John Gruber, John Harrison: Longitude, Kevin Kelly, Kickstarter, lone genius, Mark Zuckerberg, meta-analysis, Naomi Klein, Nate Silver, Occupy movement, packet switching, Peter Thiel, planetary scale, pre–internet, RAND corporation, risk tolerance, shareholder value, Silicon Valley, Silicon Valley startup, social graph, Steve Jobs, Steven Pinker, Stewart Brand, The Death and Life of Great American Cities, Tim Cook: Apple, urban planning, WikiLeaks, working poor, X Prize

Consider the most literal instance of non-acceleration: We are no longer moving faster. The centuries-long acceleration of travel speeds—from ever-faster sailing ships in the 16th through 18th centuries, to the advent of ever-faster railroads in the 19th century, and ever-faster cars and airplanes in the 20th century—reversed with the decommissioning of the Concorde in 2003, to say nothing of the nightmarish delays caused by strikingly low-tech post-9/11 airport-security systems. Today’s advocates of space jets, lunar vacations, and the manned exploration of the solar system appear to hail from another planet. A faded 1964 Popular Science cover story—“Who’ll Fly You at 2,000 m.p.h.?”—barely recalls the dreams of a bygone age. But raw airspeed is only one unit by which we can measure our transportation progress. It happens to be the sexiest metric, the one that gets the headlines when the first commercial jets hit the skies, or the Concorde breaks the sound barrier.

Today, you can easily find a flight for the same itinerary for $500, and watch live satellite television or check your e-mail as you fly. Yes, Thiel is right that the planes themselves can’t fly any faster than they did forty years ago, and so by that metric, progress has in fact stalled. (Or gone backward, if you count the Concorde.) But just about every other crucial metric (other than the joys of going through airport security) points in the other direction. That extraordinary record of progress did not come from a breakthrough device or a visionary inventor; it did not take the form of a great leap forward. Instead, the changes came from decades of small decisions, made by thousands of individuals and organizations, some of them public-sector and some of them private, each tinkering with the system in tactical ways: exploring new routes, experimenting with new pricing structures, throwing chicken carcasses into spinning jet engines.


pages: 158 words: 16,993

Citation Needed: The Best of Wikipedia's Worst Writing by Conor Lastowka, Josh Fruhlinger


airport security, citation needed,, jimmy wales, peak oil, Ronald Reagan, Stephen Hawking

Playing Monopoly with him? Successful. Baking him oatmeal cookies? Not so much. (Turns out Ayase doesn’t care for oatmeal.) What still nags at him, though, is the possibility that everything would have turned out fine if he’d raped Ayase after the garage sale, rather than after the auction. Autograph hobby timeline 2001: The September 11 terrorist attacks raise airport security levels, making it difficult for the public to approach celebrities for autographs at U.S. airports. Nobody suffered more on that horrible day than the people who had been planning to get an autograph from the guy who plays Jay from Jay and Silent Bob when he got off an airplane on September 12th. Lippy the Lion & Hardy Har Har The latter’s name is ironic, as it’s an onomatopoeia for laughter, and Hardy is an eternal pessimist, Hardy is the stereotype of someone with a very deep Major depressive disorder; indeed, one short implies that expression of joy or happiness actually puts Hardy in pain.


pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman


23andMe, 3D printing, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, artificial general intelligence, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Brian Krebs, business process, butterfly effect, call centre, Chelsea Manning, cloud computing, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, Dean Kamen, disintermediation, don't be evil, Downton Abbey, Edward Snowden, Elon Musk, Erik Brynjolfsson, Filter Bubble, Firefox, Flash crash, future of work, game design, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, knowledge worker, Kuwabatake Sanjuro: assassination market, Law of Accelerating Returns, Lean Startup, license plate recognition, litecoin, M-Pesa, Mark Zuckerberg, Marshall McLuhan, Menlo Park, mobile money, more computing power than Apollo, move fast and break things, Nate Silver, national security letter, natural language processing, obamacare, Occupy movement, Oculus Rift, offshore financial centre, optical character recognition, pattern recognition, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, RAND corporation, ransomware, Ray Kurzweil, RFID, ride hailing / ride sharing, Rodney Brooks, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, supply-chain management, technological singularity, telepresence, telepresence robot, Tesla Model S, The Wisdom of Crowds, Tim Cook: Apple, trade route, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, WikiLeaks, Y Combinator, zero day

Atherton, “Israeli Students Spoof Waze App with Fake Traffic Jam,” Popular Science, March 31, 2014. 30 In what investigators: Nathan Hodge and Adam Entous, “Oil Firms Hit by Hackers from China, Report Says,” Wall Street Journal, Feb. 10, 2011. 31 “they inadvertently downloaded code”: Nicole Perlroth, “Hackers Lurking in Vents and Soda Machines,” New York Times, April 7, 2014. 32 “allegations about Chinese hacking”: Hodge and Entous, “Oil Firms Hit by Hackers from China.” 33 In 2013, hackers: Lee Moran, “Montana Residents Flip Out When Emergency Alert System Tells Them the Zombie Apocalypse Is Happening—Like Right Friggin Now,” New York Daily News, Feb. 12, 2013. 34 “traffic jerked to a standstill”: “Russian Hackers Jam Automobile Traffic with Porn,” Fox News, Technology, January 15, 2010; “Russian Jailed for Six Years for Hacking into Advertising Server and Making Electronic Billboard Show Porn to Motorists,” Mail Online, March 24, 2011. 35 The sign stood: Sevil Omer, “Racial Slur on Mich. Road Sign Targets Trayvon Martin,” NBC News, April 9, 2012. 36 Even in 2014: Serge Malenkovich, “Hacking the Airport Security Scanner,” Kaspersky Lab. March 14, 2014, 37 Even if a hacker: “Hacked X-Rays Could Make TSA Scanners Useless,” video, Wall Street Journal, Feb. 12, 2014. 38 Shockingly, using a common hacker tactic: Kim Zetter, “Hacked X-Rays Could Slip Guns Past Airport Security,” Wired, Feb. 11, 2014. 39 “Hackers have hobbled”: U.S. Department of Transportation, “Review of Web Applications Security and Intrusion Detection in Air Traffic Control Systems,” Project ID: FI-2009-049, May 4, 2009. 40 The inspector general: Siobhan Gorman, “FAA’s Air-Traffic Networks Breached by Hackers,” Wall Street Journal, May 7, 2009. 41 Moreover, a security audit: Thomas Claburn, “Air Traffic Control System Repeatedly Hacked,” Dark Reading, May 7, 2009. 42 “will be highly automated”: Steve Henn, “Could the New Air Traffic Control System Be Hacked?

Even in 2014, many of these devices, such as the commonly used Rapiscan 522B, use Windows variants such as Windows 98 or even Windows XP, operating systems for which thousands of security vulnerabilities have been documented and Microsoft itself has stopped issuing updates. In addition, the banks of scanners at airports are often networked to one another via either Ethernet cables or Wi-Fi, two protocols that are also routinely hacked. Shockingly, operator passwords on many airport security detectors are “stored in plain text, and there are multiple ways to log in to the system without any prior knowledge of user actual names.” Even if a hacker were to enter a completely made-up account and password, after showing an error, the system on these machines would still log in an attacker, as the security researcher Billy Rios at Qualys discovered. Given the number of zero days and exploits for the underlying software running these systems, were an airport X-ray machine infected with malware and had a rootkit placed on it, hackers could completely control the images security officials viewed on their screens.

Given the number of zero days and exploits for the underlying software running these systems, were an airport X-ray machine infected with malware and had a rootkit placed on it, hackers could completely control the images security officials viewed on their screens. A Tumi bag containing a bomb or firearm can thus be made to appear on-screen as a Tumi bag with three suits and a pair of Bruno Maglis. Screens intermediate security officials from their task at hand and as such are subject to traditional man-in-the-middle attacks. In a typical airport security configuration, one official watches the bags as they go into the machine, where they are X-rayed by a second official, while yet a third individual supervises the removal of the bags as they came out of the device. With segmented responsibilities such as these, the first and third screeners could view the Tumi go in and out of the device, while the second screener was presented with a video image of a completely different bag.


pages: 328 words: 100,381

Top Secret America: The Rise of the New American Security State by Dana Priest, William M. Arkin


airport security, business intelligence, dark matter, friendly fire, Google Earth, hiring and firing, illegal immigration, immigration reform, index card, Julian Assange, profit motive, RAND corporation, Ronald Reagan, WikiLeaks

ARKIN Little, Brown and Company New York Boston London Begin Reading Table of Contents Photo Insert Copyright Page From Dana: To Bill, Nick, Haley, Shirley, and Ken for their love and humor, and to the late Banksy Priest for keeping me company for so many hours every day From Bill: To Rikki and Hannah, and Luciana, my love with no time line INTRODUCTION A Perpetual State of Yellow Though she could barely walk anymore at age seventy-six, Joy Whiteman remained calm as she fumbled to remove her new white tennis shoes, lift herself out of her wheelchair, and grab the side of the X-ray machine. She teetered slowly, in socks, through the security scanner at the Boise Airport in Idaho. Airport security guards folded her wheelchair and rolled it through the scanner, keeping an eye on the frail woman in a bright flowered jacket. “Can you make it without pain?” a guard asked her. “Oh, sure,” she replied. Whiteman followed instructions, lifted her hands above her head, emptied her pockets of crumpled pieces of paper, then apologized for having left her driver’s license in her purse rather than having it in hand for the guards to examine with her plane ticket.

A decade of terrorism warnings about possible attacks in the United States had convinced Whiteman that she had much to fear. Walking through a body scanner without her wheelchair was a small price to pay for safety. Never mind that no terrorist had ever fit her profile or been foiled walking through a security scanner. Never mind that the Department of Homeland Security, which was responsible for setting airport security policy, was ridiculed by people at every other intelligence agency because it hadn’t learned to hone its focus and still saw threats everywhere.1 The scene of Joy Whiteman holding herself up with the walls of the body scanner while a crew of security guards, paid by taxpayers, made sure she didn’t fall, seemed a perfect metaphor for what has transpired in the United States over the past ten years.


pages: 347 words: 88,114

The Zero-Waste Lifestyle: Live Well by Throwing Away Less by Amy Korst


airport security, carbon footprint, delayed gratification, if you build it, they will come, Mason jar

You will have to travel to your destination, of course, so the first section of this chapter addresses the different forms of transportation you take while on your vacation. You’ll also need accommodations—a place to relax and sleep after a fun-filled day. Your days will include eating out, sightseeing, shopping, and other forms of entertainment, all of which create some trash. From the simple-to-recycle (like paper ticket stubs) to bigger conundrums (supplying yourself with drinking water after passing through airport security), this chapter has you covered. Vacation Planning Planning for a vacation can be complicated, with arranging for pet sitting, the mail to be stopped, automatic bill pay, and so on. Planning a zero-waste vacation adds an extra layer of preparations to this already hectic process. Start planning your zero-waste vacation by thinking about your destination in terms of the waste you are likely to create.

I cover ways to help you avoid creating trash in the workplace, no matter what your profession. Meet Your Goal: Zero-Waste Travel Easy • Air-dry hands in public restrooms. • Frequent sit-down instead of fast-food restaurants. • Recycle brochures and receipts. • Request “no disposables” from restaurant servers. • Pack zero-waste snacks for the trip. • Refuse single-use amenities in hotels, airports, and the like. Moderate • Take an empty water bottle through airport security; fill up before boarding plane. • Hand-carry recyclable items from a restaurant; recycle when you get home. • Tip higher when restaurant servers accommodate your “no disposables” request. • Leave comments on comment cards regarding how much or little trash your visit generated. • Bring your own canvas bag when souvenir shopping. • Purchase handcrafted souvenirs from local artisans. Advanced • Carry a compost container for leftovers


pages: 303 words: 81,981

Busting Vegas: The MIT Whiz Kid Who Brought the Casinos to Their Knees by Ben Mezrich


airport security, Donald Trump, Firefox, index card, trickle-down economics

Two hundred thousand dollars. And that was only half of the stake he and Allie had brought with them to Vegas. Allie had two hundred thousand more, though Semyon wasn’t sure how she had hidden the money, considering she was wearing such a tight leather skirt. He hadn’t seen her without her jean jacket, but he was pretty sure she had some sort of tank top underneath. Then again, he was pretty sure airport security spent less time working over girls like Allie; she might very well have had the money banded around her waist. He zipped his jacket halfway up his chest, then prepared to head back out into the airport. He wondered if Allie was already on her way to the meeting place. On Victor’s suggestion, they had decided to split up the minute they left the plane. Victor had assured them that there was no reason for them to expect any sort of surveillance, but it was always good practice to remain cautious.

I’m going to be ready and rated to fly by next weekend.” Semyon stared at him. Then he turned back toward the little airplane. No fucking way, he thought to himself, am I getting into that death trap. “Have a nice trip,” he finally said. Victor laughed, slapping Semyon’s shoulder. “Come on, man. Don’t you see? This is going to save us tons of money. We can hit Atlantic City at will, carry our money without worrying about airport security. It’s perfectly safe.” Semyon rubbed his jaw, looking at the chipped yellow paint that was peeling, in jagged triangles, from the wings. “Why did you bring me here, instead of the whole team?” he asked. Victor sighed. “If you haven’t noticed, Semyon, I’ve singled you out from the rest. I think you’re the best of the group—as good as me, actually. I think of you as my partner.” Semyon nodded.


pages: 351 words: 100,791

The World Beyond Your Head: On Becoming an Individual in an Age of Distraction by Matthew B. Crawford


airport security, Cass Sunstein, choice architecture, collateralized debt obligation, David Brooks, delayed gratification, dematerialisation, digital Maoism, Google Glasses, hive mind, index card, informal economy, Jaron Lanier, large denomination, new economy, new new economy, online collectivism, plutocrats, Plutocrats, Richard Thaler, Rodney Brooks, self-driving car, Silicon Valley, Silicon Valley ideology, the built environment, the scientific method, The Wisdom of Crowds, Walter Mischel, winner-take-all economy

The ever more complete penetration of public spaces by attention-getting technologies exploits the orienting response in a way that preempts sociability, directing us away from one another and toward a manufactured reality, the content of which is determined from afar by private parties that have a material interest in doing so. There is no conspiracy here, it’s just the way things go. When we go through airport security, the public authority makes a claim on our attention for the common good. This moment is emblematic of the purpose for which political authority in a liberal regime is originally instituted—public safety—and rightly has a certain gravity to it. But in the last few years, I have found I have to be careful at the far end of the process, because the bottoms of the gray trays that you place your items in for X-ray screening are now papered with advertisements, and their visual clutter makes it very easy to miss a pinky-sized flash memory stick against a picture of fanned-out L’Oréal lipstick colors.

action perception and as prior to mental operation Adderall Addiction by Design: Machine Gambling in Las Vegas (Schüll) administrative jig adrenaline advanced cognition advertisements, ubiquity of aesthetics Arendt on communities and Kant’s views on organ making and ridicule risked in subjectivism and affect firefighters and perception-action-affect circuits and affective capitalism affect-neutral representation affordances negative perception organized by skill and agency and perception of reality toys and in virtual reality air airport security Albashian, Ryan alert watchfulness by conscious mind, without meddling algorithms Allen, Woody American Gaming Association Ancien Régime and the Revolution, The (Tocqueville) Annie Hall (film) Anthes, Emily anthropology appearances apprenticeship Archer, Frank Arendt, Hannah Aristotelianism Aristotle art, diffusion of artificial intelligence robotics and Artificial Intelligence Art of Organ-Building, The (Audsley) Asimo (robot) assembly lines attending in Enlightenment to and from attention ascetics of autonomy and case studies of crisis of as cultural problem design and ecologies of as erotic phenomenon ethics of, see ethics of attention executive, see executive attention in exercise of skill and experiences created by advanced economies freedom and goal-driven vs. stimulus-driven individuality and, see individuality joint managing of, in public-choice architectures memory vs.


pages: 264 words: 90,379

Blink: The Power of Thinking Without Thinking by Malcolm Gladwell


affirmative action, airport security, Albert Einstein, complexity theory, David Brooks, East Village, haute couture, Kevin Kelly, medical malpractice, medical residency, Menlo Park, new economy, pattern recognition, phenotype, Ronald Reagan, Silicon Valley, Stephen Hawking, young professional

The following articles were particularly helpful on changes in the world of classical music: Evelyn Chadwick, “Of Music and Men,” The Strad (December 1997): 1324–1329; Claudia Goldin and Cecilia Rouse, “Orchestrating Impartiality: The Impact of ‘Blind’ Auditions on Female Musicians,” American Economic Review 90, no. 4 (September 2000): 715–741; and Bernard Holland, “The Fair, New World of Orchestra Auditions,” New York Times, January 11, 1981. Acknowledgments A few years ago, before I began Blink, I grew my hair long. It used to be cut very short and conservatively. But I decided, on a whim, to let it grow wild, as it had been when I was a teenager. Immediately, in very small but significant ways, my life changed. I started getting speeding tickets—and I had never gotten any before. I started getting pulled out of airport security lines for special attention. And one day, as I was walking along Fourteenth Street in downtown Manhattan, a police van pulled up on the sidewalk, and three officers jumped out. They were looking, it turned out, for a rapist, and the rapist, they said, looked a lot like me. They pulled out the sketch and the description. I looked at it and pointed out to them as nicely as I could that, in fact, the rapist looked nothing at all like me.

Believe it or not, it’s because I decided, a few years ago, to grow my hair long. If you look at the author photo on my last book, The Tipping Point, you’ll see that it used to be cut very short and conservatively. But, on a whim, I let it grow wild, as it had been when I was a teenager. Immediately, in very small but significant ways, my life changed. I started getting speeding tickets all the time—and I had never gotten any before. I started getting pulled out of airport security lines for special attention. And one day, as I was walking along Fourteenth Street in downtown Manhattan, a police van pulled up on the sidewalk and three officers jumped out. They were looking, it turned out, for a rapist, and the rapist, they said, looked a lot like me. They pulled out the sketch and the description. I looked at it and pointed out to them as nicely as I could that in fact the rapist looked nothing at all like me.


pages: 339 words: 99,674

Pay Any Price: Greed, Power, and Endless War by James Risen


air freight, airport security, banking crisis, clean water, Edward Snowden, greed is good, illegal immigration, income inequality, large denomination, Occupy movement, pattern recognition, pre–internet, RAND corporation, Silicon Valley, too big to fail, WikiLeaks

—JAMES RISEN Index Abedin, Huma, [>] Abu Ghraib, [>]–[>], [>]–[>], [>], [>], [>]–[>], [>], [>]–[>] abuse of power/power, [>]–[>], [>], [>]–[>], [>]–[>], [>]–[>], [>] Addington, David, [>]–[>], [>] Afghanistan: Bagram Prison in, [>], [>]–[>], [>]; drones and, [>]–[>], [>], [>]–[>]; intelligence operations in, [>]–[>]; police training contracts in, [>]–[>]; Taliban and, [>], [>], [>], [>], [>], [>]–[>], [>] air force, [>], [>], [>], [>]–[>], [>], [>]–[>], [>], [>] airport security, [>], [>]–[>] Alarbus Transportation, [>]–[>], [>]–[>], [>]–[>], [>] Al Baraka Investment and Development Corporation, [>], [>] Al Jazeera, [>]–[>], [>], [>], [>]–[>] Allawi, Ayad, [>], [>]–[>] Al Qaeda: broadcasts of codes and, [>]–[>], [>], [>], [>]–[>]; end of threat from, [>], [>]–[>]; golden-chain document and, [>]; international drones market and, [>]; national security policies and, [>]–[>]; 9/11 lawsuits and, [>]; NSA data on operatives in, [>]–[>], [>]; registry of, [>] American Psychiatric Association (APA), [>] American Psychological Association (APA), [>]–[>], [>]–[>] Amnesty International, [>] anti-Muslim rhetoric, [>]–[>], [>], [>]–[>] architecture, and homeland security, [>]–[>] arms dealing, [>], [>]–[>], [>] army procurement, and auditors, [>]–[>] army procurement, and military contractor audits, [>]–[>] Arrigo, Jean Maria, [>]–[>] Ashcroft, John, [>]–[>] Asimos, Michael: government contracts and, [>]; illegal business deals and, [>]; intelligence operations and, [>]–[>], [>], [>]; investigative work and, [>]–[>] assassinations, of terrorist suspects, [>], [>] assets/informants, [>], [>], [>]–[>], [>]–[>], [>]–[>], [>]–[>] audits, of outside contractors for U.S. military, [>] Babar, Major, [>], [>]–[>] Bachmann, Michele, [>]–[>] Baginski, Maureen, [>], [>] Bagram Prison, [>], [>]–[>], [>] Barko, Harry, [>] Bayes, Malcolm, [>]–[>], [>] beaureacrats’ postretirement employment, [>] behavioral scientists, and enhanced interrogation methods, [>]–[>], [>]–[>], [>]–[>] Behnke, Stephen, [>] Benevolence International, [>] Bergstrom, Rod, [>]–[>] Bin Laden, Osama, [>], [>]–[>], [>]–[>], [>]–[>], [>], [>], [>] Binney, Bill, [>]–[>], [>], [>]–[>], [>]–[>] Black, Bill, [>] Blackwater, [>], [>]–[>], [>] Blanchard, Paul, [>] Blixseth, Edra, [>]–[>] Blixseth, Tim, [>]–[>] Bloomberg, Michael, [>] Blue, Linden, [>]–[>] Blue, Neal, [>]–[>] Blxware, [>]–[>] Boston marathon bombing, [>], [>]–[>] Bowen, Stuart, [>]–[>], [>]–[>] Brachman, Jarrett, [>] Bradbury, Steven, [>]–[>] Brandon, Susan, [>], [>]–[>] Bremer, Paul, [>], [>]–[>], [>]–[>], [>] Brennan, John, [>] bribery scandals, and military contractors, [>] Brin, Sergey, [>] Brisard, Jean-Charles, [>]–[>] Brito, Jerry, [>] Brooke, Francis, [>]–[>] Bucci, Steven, [>]–[>], [>], [>], [>]–[>] Bureau of Investigative Journalism, [>] Burnett, Deena, [>]–[>] Burnett, Tom, [>] Burnett et al. [>].

. [>] bin Laden et al. (2011), [>] Hayden, Michael, [>], [>]–[>], [>], [>]–[>], [>] health hazards, burn pits as, [>]–[>] Heilbrun, Mark, [>]–[>], [>]–[>] Hersh, Seymour, [>]–[>] Homeland Security Department: counterterrorism and, [>]; cybersecurity and, [>]–[>]; drones program and, [>]; Einstein [>] and, [>]; enhanced interrogation methods and, [>]; intelligence operations and, [>]–[>]; money and, [>]; Occupy movement and, [>]; Operation Stonegarden and, [>]–[>] homeland security-industrial complex: overview of, [>]–[>], [>]; airport security and, [>], [>]–[>]; anti-Muslim rhetoric and, [>]–[>], [>], [>]–[>]; architecture and, [>]–[>]; Boston marathon bombing in 2013 and, [>], [>]–[>]; Canadian border and, [>]–[>], [>]; Derby Line Battle and, [>]–[>], [>]; fear and, [>], [>], [>], [>]; government buildings and, [>]; greed and, [>]; independent terrorism analysts and, [>]–[>], [>]; individual extremists and, [>]–[>]; money and, [>], [>]–[>], [>], [>]–[>], [>], [>]–[>]; NIH and, [>]–[>]; 9/11 terrorist attacks and, [>]–[>], [>], [>]–[>], [>]; power/abuse of power and, [>]–[>]; press investigations and, [>]–[>]; security zones/procedures and, [>]–[>].


pages: 369 words: 90,630

Mindwise: Why We Misunderstand What Others Think, Believe, Feel, and Want by Nicholas Epley


affirmative action, airport security, Amazon Mechanical Turk, Cass Sunstein, crowdsourcing, cuban missile crisis, friendly fire, invisible hand, meta-analysis, Milgram experiment, payday loans, Peter Singer: altruism, pirate software, Richard Thaler, school choice, the scientific method

Brief emotion training improves recognition of facial emotions in chronic schizophrenia: A pilot study. Psychiatry Research 128: 147–54. 7. Blanch-Hartigan, D., S. A. Andrzejewski, and K. M. Hill (2012). The effectiveness of training to improve person perception: A meta-analysis. Basic and Applied Social Psychology 34: 483–98. 8. Frank, T. (September 25, 2007). Airport security arsenal adds behavior detection. USA Today. Retrieved from 9. Weinberger, S. (2010). Airport security: Intent to deceive? Nature 465: 412–15. 10. Gilovich, T., K. Savitsky, and V. H. Medvec (1998). The illusion of transparency: Biased assessments of others’ ability to read one’s emotional states. Journal of Personality and Social Psychology 75: 332–46. 11. Porter, S., and L. ten Brinke (2008). Reading between the lies: Identifying concealed and falsified emotions in universal facial expressions.


pages: 398 words: 120,801

Little Brother by Cory Doctorow


airport security, Berlin Wall, citizen journalism, Firefox, game design, Golden Gate Park, Haight Ashbury, Internet Archive, Jane Jacobs, Jeff Bezos, mail merge, RFID, Sand Hill Road, Silicon Valley, slashdot, Steve Jobs, Steve Wozniak, web of trust, zero day

I'd seen him get crazy angry now and again -- I'd even made him that angry now and again -- and he could seriously lose it when he was Hulking out. He once threw a swing-set from Ikea across my granddad's whole lawn when it fell apart for the fiftieth time while he was assembling it. "Barbarians," Mom said. She's been living in America since she was a teenager, but she still comes over all British when she encounters American cops, health-care, airport security or homelessness. Then the word is "barbarians," and her accent comes back strong. We'd been to London twice to see her family and I can't say as it felt any more civilized than San Francisco, just more cramped. "But they let us go, and ferried us over today." I was improvising now. "Are you hurt?" Mom said. "Hungry?" "Sleepy?" "Yeah, a little of all that. Also Dopey, Doc, Sneezy and Bashful."

If you're designing a camera system that detects individual gaits, you'd better plan for people putting rocks in their shoes. Because if you don't, you're not going to design anything good. So when you're wandering through your day, take a moment to look at the security systems around you. Look at the cameras in the stores you shop at. (Do they prevent crime, or just move it next door?) See how a restaurant operates. (If you pay after you eat, why don't more people just leave without paying?) Pay attention at airport security. (How could you get a weapon onto an airplane?) Watch what the teller does at a bank. (Bank security is designed to prevent tellers from stealing just as much as it is to prevent you from stealing.) Stare at an anthill. (Insects are all about security.) Read the Constitution, and notice all the ways it provides people with security against government. Look at traffic lights and door locks and all the security systems on television and in the movies.


pages: 481 words: 121,300

Why geography matters: three challenges facing America : climate change, the rise of China, and global terrorism by Harm J. De Blij


agricultural Revolution, airport security, Anton Chekhov, Ayatollah Khomeini, Berlin Wall, British Empire, colonial exploitation, complexity theory, computer age, demographic transition, Deng Xiaoping, Eratosthenes, European colonialism, failed state, Fall of the Berlin Wall, Francis Fukuyama: the end of history, global village, illegal immigration, Internet Archive, John Snow's cholera map, Khyber Pass, manufacturing employment, megacity, Mercator projection, RAND corporation, risk tolerance, Ronald Reagan, South China Sea, special economic zone, Thomas Malthus, trade route, transatlantic slave trade, UNCLOS, UNCLOS

The economic fallout from an attack involving weapons of mass destruction would dwarf these numbers (Annan, 2004). Part of this cost represents the impact on the airline industry, from the grounding of all American aircraft on the day of the attack and the shutdown of air transportation for several days afterward to the temporary but crucial fear-induced shrinkage in passenger volume. The chaotic and inconsistent installation of airport security systems further damaged the industry. Today the system works better. But a RAND Corporation study published in January 2005 raises the prospect of potential attacks on commercial aircraft in the United States by terrorist operatives using shoulder-fired missiles because hijacking an airliner by boarding it is now less feasible. A key segment of this report, however, raises a troubling cost assessment: about $1 billion for the aircraft and its passengers and crew, $3 billion if the aviation system were again shut down for up to a week, and another $12 billion resulting from lost business and reduced passenger loads following an attack.

In the distance was a patch of bright light, so bright that when we reached it, it was as if the bus had been driven into a surgical theater. There we were ordered off the bus and all luggage and cargo was unloaded. Passengers were separated into three groups, Soviet, European (I was traveling on a Dutch passport), and others, including a group of Canadian and American academics. Every piece of luggage was examined in minute detail, and we were physically searched in ways that make the current airport-security procedure seem casual by comparison. Then we were instructed to sign documents stipulating that we were not carrying items ranging from books and "documents" to weapons and "propaganda." The entire operation took about three hours, and I wondered how long the wait would be when a line formed. "Never a queue," said the English-speaking guard handling the North Americans. "Only three buses a day and maybe five cars."


pages: 205 words: 18,208

The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? by David Brin


affirmative action, airport security, Ayatollah Khomeini, clean water, cognitive dissonance, corporate governance, data acquisition, Extropian, Howard Rheingold, illegal immigration, informal economy, Iridium satellite, Jaron Lanier, John von Neumann, Kevin Kelly, means of production, mutually assured destruction, offshore financial centre, open economy, packet switching, pattern recognition, pirate software, placebo effect, plutocrats, Plutocrats, prediction markets, Ralph Nader, RAND corporation, Saturday Night Live, Search for Extraterrestrial Intelligence, Steve Jobs, Steven Levy, Stewart Brand, telepresence, trade route, Vannevar Bush, Vernor Vinge, Whole Earth Catalog, Whole Earth Review, Zimmermann PGP

Yet requiring citizens to “assume the risk” of observation by whatever technology the government can command raises serious questions. For instance, Pacific Northwest National Laboratory reportedly developed a millimeter-wave imager that “sees” through textiles but is blocked by metal, plastic, and skin. From across a room it can produce a remarkably detailed nude picture of an oblivious, fully clothed person. Airport security might be a potential application if this device is introduced, especially as criminals and terrorists continue to develop plastic weapons that escape discovery by todayʼs metal detectors. And yet, questions abound. Will a bashful public demand separate aisles for men and women? Or that all operators be elderly ladies? If this technology leads to “Xray spectacles,” straight out of adolescent fantasy, will citizens develop an intense interest in metallized undergarments?

All these capabilities lie within technological reach (and some have already been used in Switzerland). The deputy director in charge of the FBIʼs New York City office said, “The privacy people say we shouldnʼt have this information, but the notion that we in law enforcement should not be able to take advantage of the technology is a crazy notion.” • Upon learning that a complete tutorial on bomb making is available online, including diagrams and tips for passing though airport security, Senator Dianne Feinstein declared, “When technology allows for bombmaking material over computers to millions of people in a matter of seconds, I believe that some restrictions on free speech are appropriate.” • Or take this comment made by former FBI deputy director for investigations, Oliver “Buck” Revel: “If we are unsuccessful in preventing significant acts of terrorism because of a failure to take prudent precautions, the ensuing public demand for action could result in Draconian measures.”


pages: 717 words: 150,288

Cities Under Siege: The New Military Urbanism by Stephen Graham


airport security, anti-communist, autonomous vehicles, Berlin Wall, call centre, carbon footprint, clean water, congestion charging, credit crunch, DARPA: Urban Challenge, defense in depth, deindustrialization, edge city, energy security, European colonialism, failed state, Food sovereignty, Gini coefficient, global supply chain, Google Earth, illegal immigration, income inequality, knowledge economy, late capitalism, loose coupling, market fundamentalism, McMansion, megacity, mutually assured destruction, Naomi Klein, New Urbanism, offshore financial centre, pattern recognition, peak oil, planetary scale, private military company, RAND corporation, RFID, Richard Florida, Scramble for Africa, Silicon Valley, smart transportation, surplus humans, urban decay, urban planning, urban renewal, urban sprawl, Washington Consensus, white flight

Index Page numbers in italics indicate images ABC, 72 Abu Ghraib, 57, 72, 109, 110 n.81, 112, 235, 352 Abu Manneh, Bashir, 230–31 Achcar, Gilbert, 39, 372 Ackerman, Robert, 164 Ackerman, Spencer, 129 n.143 Aegis air-defence, 181 Afflicted Powers: Capital and Spectacle in a New Age of War, 69 n.28, 162 n.27, 211 n.91, 302 n.4, 338 n.150, 349 n.3, 381 n.89, 385 n.98 Afghanistan, 54, 73, 129, 170, 178, 195, 239–40, 252, 270, 273, 359, 371, 379; simulated, 196, 216 Africa, 2, 7, 17, 53 n.74, 54, 119, 176, 297, 311, 334, 337 African Americans: and Hummer, 321; and Hurricane Katrina, 25, 48 n.57, 52, 86 n.107, 94–95, 113; media portrayal of, 44–45; military target & employee, 62, 321; and prison, 110; surplus humanity, 113 Agamben, Giorgio, xxii n.19, xxv, 73, 94 n.31, 96 n.38, 113 n.96, 175 n.76, 235, 296 n.130, 300, 307 Agier, Michel, 18 n.72 Agre, Phil, 24 n.102, 31 n.130, 117, 263 n.2, 293–96, 298–300 Ahtisaari, Martti, 281 Air Force Magazine, 172 airport security, 136–38 Air and Space Power Chronicles, 275 Aizenman, N. C., 110 n. 77&79 Aksu, Esref, 378 n.75 Alaska, 311, 335 al-Harithi, Ali Qaed Sinan, 249 Al Jazeera, 72, 224, 283 Allison, Aime, 371 n.59 al-Qaeda, 22, 39, 40–43, 178, 232–33, 249, 338 Alsayyad, Nezar, 144–45 Alvarez, Samantha, 4 n.8 al-Zawahri, Ayman, 178 America’s Army, xxv, 203, 204, 205–6, 208–9, 210, 372; and US army recruits, 206 Amidon, John M., 303 n.11, 311, 335 n.142 Amman, 261 Amoore, Louise, 99,100, 125 n.128, 126, 138 n.180, 139, 142 n.190, 360 n.33 Anastassia, Tsoukala, 90 n.6, 91 n.10 Andrejevic, Marc, 93 Andreu, Paul, 89 n.2 Andrews, Andy, 190 Ansary, Tamim, 273 n.32, 300 Ansems de Vries, Leonie, 267 n.14, 383 n.93 Anthropocene, 382 anthropologists, 33 anti-globalization, 22–23, 59, 122, 353 anti-urbanism, xxi, 27, 32, 40–52 passim, 314, 317, 320 APEC, 122 Appadurai, Arjun, 145; Fear of Small Numbers, 16 n.66, 17 n.70, 28, 56 n.83; Modernity at Large,18 appropriation, 363–68 Arab cities, 38, 41 n.25, 53 n.74, 56–57, 71, 185, 188, 191, 194, 196, 199, 203, 205–6, 209, 211, 218–19, 225, 227, 237 Arabs, pathos of, 235 The Arab Mind (Patai), 53 n.71, 57, 235 Arafat, Yasser, 233 Arizona Republic,187 Arkin, Ronald, 180 Armitage, John, 181 ARMY, 243 Army News Service, 209 Arnold, Kathleen, 93 n.25 Arquilla, John, 22 n.89, 155 n.7 art, 351–80 passim Arziof, David, 255 Assa, Haim, 286 assassination raids, 248–50 Astore, William J., 292 n.112 asymmetric war, xiv, xx, 19, 27, 40, 71, 156, 162–63, 175, 230, 235, 238, 260, 265, 267, 292, 316 Atkinson, Rowland, 95 n.34, 107 Atta, Mohammed, 41 Aum Shinrikyo group, 268, 295 Australia, 98, 137, 340 Axe, David, 208 n.81 Axyell, Bryan, 202 Aziz, Tariq, 153 n.1 Aznar, 82 Azri, Ben, 284 Babero, Mike, 190 Backhaus, Gary, 110 n.78 Baeten, Guy, 43 n.36, 95 Baghdad, 112, 114, 121, 129, 130, 158, 170, 203, 224–25, 241, 242, 248, 261, 270, 280, 283–84, 324, 361–62; simulated, 201–2 Bajkowski, Julian, 378 n.71 Baker, Peter, 364, 364 n.39 Baladia.

See urban warfare, training cities urban warfare, xvi, xxv-xxvi, 11–12, 18–19, 23, 58, 85–86, 125, 140, 153–54, 156, 239, 244, 246–47, 249; civil unrest as, 78, 218; conference on, 227; and domestic urban space, 23, 98; economy of, 252–54; great challenge of century, 19; Israel’s lessons on, 228–30, 233–34; training cities, 183–200 passim: Baladia, 191, 192, 193–95, 246, Baumholder, 186–87, early examples of, 185–86, mock cities needed, 184–85, new purpose of, 186, Playas, 196, 197, 198, RAND on, 187, 195–98, Urban Terrain Module, 199–200, Wired on, 190–91, Yodaville, 187, 188, 189, Zussman, 189–90; and urban culture, 33; video games for, 200–225 passim: Urban Resolve, 201–3. See also city, and war urbicide, 83–88 passim, 227, 267 US: airport security, 136, 137; anti-communist efforts, 13; army advert, 34; army bases as gated communities, 211–14; army recruits, 206, 207, 208; banned images of war dead, 72; and Canada border, 139–40, 250, 330; car culture, 302; CCTV in, 114 n.102; citizen soldiers of, xxv; city-destruction, 153; city as double target, 52; city-driven economy, 47, 49–50; cultural awareness, 34; data mining centres, 127; defense budget, 65, 75; defense industry flourishes, 196; defense overhauled by video game, 202; and de-modernization, xxiv; Department of Homeland Security, 80, 135, 196, 250, 258, 299; detainees worldwide, 112; energy policy, 311, 334; Enhanced Border Security and Visa Act, 136; ethnic cleansing of Iraq, 35; financial meltdown, 312; foreign-domestic convergence, 22, 24, 45, 52–53, 82; gated communities, xix, 106–7, 129, 144, 315; ‘giver’ vs ‘taker’ states, 49 n.60; grain production, 341; health care, 142; hegemony, 29, 59; undermined by urban warfare, 154, 157, 159, 163; waning of, 35; highway construction, 327 n.116; highway system, 14; Identity dominance, 126; info-psych-military concern, 71; infrastructural war champ, 271, 274, 276–78, 280, 286, 297; intolerance of, 178; vs Iraqi civilians, 30; Iraq war, 275–84, ‘bomb now die later’, 279–80; and Israel, 184, 193–95, 228–62 passim, 285: assassination raids, 248–50, catalyze Islamic extremism, 262, different threats to, 262, economic aid to, 230–31, helps invade Iraq, 229–30, 232, 238–41, 243, 248, new geometry of occupation, 251–52, non-lethal weapons, 244–46, urban warfare lessons, 228–30, 233–34, 246; Israel Homeland Security Foundation Act, 256; and Mexico border, xxiii, 22, 217 n.109, 250, 258, 372; military and Hollywood, 69; military police, 98–99; national identity threats, xx; NSA, 141–42; policing of protest, 123; Posse Comitas act, 21 n.88; prison population, 7, 109–10, 111; RESTORE Act, 141; rural soldiers of, 61; security precedent of, 134; social polarization, 7; suburban nation, 79–80; superpower no longer, 313; SUV and imperialism, 304, 306, 318; SUV popularity, 315; SWAT, 23; trade vs security, 134–35; urban archipelago, 50, 51, 52; urban military focus, 20–22; urban warfare training, xvi.


pages: 560 words: 158,238

Fifty Degrees Below by Kim Stanley Robinson


airport security, bioinformatics, Burning Man, clean water, Donner party, full employment, invisible hand, iterative process, means of production, minimum wage unemployment, North Sea oil, Ralph Waldo Emerson, statistical model, Stephen Hawking, the scientific method

They shifted into the lee of the tent, bumping against each other as the tree swayed. “It’s like being on a train.” “Or a ship.” “Yes, I suppose so.” They huddled together. Frank felt too strange to kiss; he was distracted, and it was hard to get used to the presence of someone else in his tree house. “Um—do you think you could show me what you mean about the chips?” She dug in her jacket pocket, took out a short metal wand, like the devices used by airport security. “Do you have some light?” “Sure,” he said, and clicked on the Coleman lamp. The lit circle on the plywood floor gleamed under them, ruining their night vision. The wind hooted and moaned. She had him bring his belongings to her one by one. Sometimes she would get a beep as she passed the wand over them, and these she put to one side. Clock, lightweight sleeping bag, some of the clothes, even the little stove.

“Because I think there’s someone watching us.” “Oh my God.” “Don’t try to look. Here, I’ve got the scanner you gave me.” He thought it over, images of one scenario then another. “Would he have other people helping him?” “Not for this,” she said. “I don’t think so anyway. Not unless he figured out that I copied the vote program.” “Shit. Let’s check you right here, okay?” “Sure.” He pulled the wand from his pocket, so much like an airport security device. Bar codes in the body. He ran it over her. When he had it against the top of her back it beeped. “Shit,” she said under her breath. She whipped off her jacket, laid it on the ground, ran the wand over it. It beeped again. “God damn it.” “At least it isn’t in your skin.” “Yeah well.” “You checked before you left your place?” “Yes I did, and there wasn’t anything. I wonder if there’s something about me leaving the house.


pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier


23andMe, Airbnb, airport security, AltaVista, Anne Wojcicki, augmented reality, Benjamin Mako Hill, Black Swan, Brewster Kahle, Brian Krebs, call centre, Cass Sunstein, Chelsea Manning, citizen journalism, cloud computing, congestion charging, disintermediation, Edward Snowden, experimental subject, failed state, Filter Bubble, Firefox, friendly fire, Google Chrome, Google Glasses, hindsight bias, informal economy, Internet Archive, Internet of things, Jacob Appelbaum, Jaron Lanier, Julian Assange, Kevin Kelly, license plate recognition, linked data, Lyft, Mark Zuckerberg, Nash equilibrium, Nate Silver, national security letter, Network effects, Occupy movement, payday loans, pre–internet, price discrimination, profit motive, race to the bottom, RAND corporation, recommendation engine, RFID, self-driving car, Silicon Valley, Skype, smart cities, smart grid, Snapchat, social graph, software as a service, South China Sea, stealth mode startup, Steven Levy, TaskRabbit, telemarketer, Tim Cook: Apple, transaction costs, Uber and Lyft, urban planning, WikiLeaks, zero day

George Washington University law professor Daniel Solove calls the situation Kafkaesque. So much of this data is collected and used in secret, and we have no right to refute or even see the evidence against us. This will intensify as systems start using surveillance data to make decisions automatically. Surveillance data has been used to justify numerous penalties, from subjecting people to more intensive airport security to deporting them. In 2012, before his Los Angeles vacation, 26-year-old Irishman Leigh Van Bryan tweeted, “Free this week, for quick gossip/prep before I go and destroy America.” The US government had been surveilling the entire Twitter feed. Agents picked up Bryan’s message, correlated it with airplane passenger lists, and were waiting for him at the border when he arrived from Ireland. His comment wasn’t serious, but he was questioned for five hours and then sent back home.

You are already familiar with this; just think of all the irrelevant advertisements you’ve been shown on the Internet, on the basis of some algorithm misinterpreting your interests. For some people, that’s okay; for others, there’s low-level psychological harm from being categorized, whether correctly or incorrectly. The opportunity for harm rises as the judging becomes more important: our credit ratings depend on algorithms; how we’re treated at airport security depends partly on corporate-collected data. There are chilling effects as well. For example, people are refraining from looking up information about diseases they might have because they’re afraid their insurance companies will drop them. It’s true that a lot of corporate profiling starts from good intentions. Some people might be denied a bank loan because of their deadbeat Facebook friends, but Lenddo’s system is designed to enable banks to give loans to people without credit ratings.


pages: 553 words: 151,139

The Teeth of the Tiger by Tom Clancy


airport security, book scanning, centralized clearinghouse, complexity theory, forensic accounting, illegal immigration, Occam's razor, sensible shoes

Nothing to hang a hat on. Three names, but no photos, and any bonehead can get ID in a new name." Even popular novels told people how to do it. You didn't even need all that much patience, because no state in the union cross-referenced birth and death certificates, which would have been an easy thing, even for government bureaucrats to accomplish. "So, what happens?" Davis shrugged. "The usual. Airport security people will get another notice to stay awake; and so, they'll hassle more innocent people to make sure nobody tries to hijack an airliner. Cops all over will look for suspicious cars, but that'll mostly mean that people driving erratically get pulled over. There's been too much wolf-crying. Even the police have trouble taking it seriously, Gerry, and who can blame them?" "So, all of our defenses are neutralized-by us?"

The former senator read the traffic for a minute or so and handed it all back. In a moment, he knew he'd seen most of it before. "So?" "So, this time they may be right, boss. I've been keeping an eye on the background stuff. The thing is, we have a combination of reduced message traffic from known players, and then this flies over the transom. I spent my life in DIA looking at coincidences. This here's one of them." "Okay, what are they doing about it?" "Airport security is going to be a little tighter starting today. The FBI is going to set people at some departure gates." "Nothing on TV about it?" "Well, the boys and girls at Homeland Security may have gotten a little smarter about advertising. It's counterproductive. You don't catch a rat by shouting at him. You do it by showing him what he wants to see, and then breaking his goddamned neck." Or maybe by having a cat spring on him unexpectedly, Hendley didn't say.


pages: 137 words: 43,960

Top 10 Maui, Molokai and Lanai by Bonnie Friedman


airport security, Maui Hawaii, polynesian navigation, Ronald Reagan

Otherwise, travel insurance is recommended. Major Airlines U.S. airlines are facing difficult times, and flight schedules and routes change frequently. United, Previous pages Plantation Inn (see p119) American, and Delta Airlines all fly directly to Maui from mainland U.S.; many major airlines fly into Honolulu from the mainland, Europe, and Asia. Enhanced Security Although Hawai‘i is a safe place, in the aftermath of 9/11, airport security has been enhanced, and items like pocketknives, scissors, nail files, and tweezers must be packed in checked luggage. When traveling interisland, you should get to the airport one hour before your scheduled flight. Cruise Lines Crystal Cruises, Princess Cruises, and Royal Caribbean have ships that stop in Hawai‘i as part of wider itineraries. Norwegian Cruise Lines operates vessels through the Hawaiian islands.


pages: 181 words: 62,775

Half Empty by David Rakoff


airport security, Buckminster Fuller, dark matter, Google Earth, phenotype, RFID, urban planning, urban renewal, wage slave, Y2K

An old quip springs to mind about people who used to marvel at the remarkable spryness of the aged Katharine Hepburn, saying, “I hope I look that good when I’m ninety.” To which one need only point out that, unless one was a marble-featured, lithe beauty who looked like her in The Philadelphia Story now, the odds were slim to none. I fly back to New York to see more doctors and get the apartment ready for one-armed living, although I haven’t a clue what that means. Airport security is a scary affair in what it bodes. The simple act of discarding the metal from my pockets has me panic that I am holding folks up. I cheat and use my left arm for the first time in days. Undoubtedly there will be special lines for people like me, but I can’t get rid of the dark visions of being victimized. Not by society or anything of that nature. (I promise not to feel alienated when fashion spreads in magazines refuse to run photos of amputees.


pages: 186 words: 49,251

The Automatic Customer: Creating a Subscription Business in Any Industry by John Warrillow


Airbnb, airport security, Amazon Web Services, asset allocation, barriers to entry, call centre, cloud computing, discounted cash flows, high net worth, Jeff Bezos, Network effects, passive income, rolodex, sharing economy, side project, Silicon Valley, Silicon Valley startup, software as a service, statistical model, Steve Jobs, Stewart Brand, subscription business, telemarketer, Zipcar

Once it completes the job, it sends an invoice and must typically wait 120 days to get paid. In the meantime, the company still has to make payroll and keep the lights on, etc., causing cash flow stress for the owner. The other part of the business comes from servicing the radioactive sources in small, everyday devices that are used by all kinds of organizations. You know that little wand the airport security guy assaults you with when you forget to take your watch off as you go through the X-ray machine? That has a small radioactive source inside, and to make sure it is not leaking radioactivity into unsuspecting travelers, it needs to be tested by a company like Stuart Hunt & Associates once every year. Stuart Hunt & Associates tests thousands of radioactive devices per year. Until recently, it would send a small invoice—usually around $100—for each job.


Life of the Party: Stories of a Perpetual Man-Child by Bert Kreischer


airport security, blood diamonds, pre–internet, Saturday Night Live

Someone referred to Cheese as “Cheese” one too many times. “It’s Chris, guys,” he said. “I’m forty years old and I don’t want to be called Cheese anymore.” It was a moment of honesty, a moment of assertion for a guy we had tormented for half our lives. We left that night and promised to hang out the next time I was in Denver. I went back to my hotel to pack for an early flight to L.A. The next morning, while waiting to go through airport security, I heard a familiar voice. “Yo Bert!” I turned and saw Siminson, dressed like a businessman and a father on his way to work, a grown-up in a collared shirt and khakis, rolling a carry-on bag. “I was wondering if I was going to see you at the airport today,” he said. We talked for a bit about how great it was to hang out and catch up, all these years later, then said good-bye again and made our way to our respective terminals.


pages: 161 words: 44,488

The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology by William Mougayar


Airbnb, airport security, Albert Einstein, altcoin, Amazon Web Services, bitcoin, Black Swan, blockchain, business process, centralized clearinghouse, Clayton Christensen, cloud computing, cryptocurrency, disintermediation, distributed ledger, Edward Snowden,, ethereum blockchain, fiat currency, global value chain, Innovator's Dilemma, Internet of things, Kevin Kelly, Kickstarter, market clearing, Network effects, new economy, peer-to-peer lending, prediction markets, pull request, ride hailing / ride sharing, Satoshi Nakamoto, sharing economy, smart contracts, social web, software as a service, too big to fail, Turing complete, web application

Online, we are already challenged by keeping track of multiple passwords in our heads, or in notes, and we’re always worried about getting hacked potentially, or forgetting them. I would expect that blockchain-assisted identity and access solutions can help us arrive at better solutions than the current ones. In an ideal world, why could not our online and offline identities blur? Why do we accept that our driver’s license is only valid in physical settings (mostly), and our online identities (Facebook or other) are useless at airport security or at the bank? Of course, newly issued passports are beginning to bridge that divide when we scan them at the airport kiosks, and we complete our identification via a retinal scan, or other pieces of information to triangulate on our identity. In the blockchain world, there are various approaches that are addressing identity and personal security, including granting us access to data and services.


pages: 291 words: 77,596

Total Recall: How the E-Memory Revolution Will Change Everything by C. Gordon Bell, Jim Gemmell


airport security, Albert Einstein, book scanning, cloud computing, conceptual framework, full text search, information retrieval, invention of writing, inventory management, Menlo Park, optical character recognition, pattern recognition, performance metric, RAND corporation, RFID, semantic web, Silicon Valley, Skype, social web, statistical model, Stephen Hawking, Steve Ballmer, Ted Nelson, telepresence, Turing test, Vannevar Bush, web application

I hate getting home from the grocery store, looking up at that burned-out lightbulb, and realizing that I forgot—again!—to buy a replacement. Once I left my notebook computer containing most of my e-memory on the security table at San Francisco International Airport. I dashed back, my heart racing dangerously, wondering if someone had walked off with a digital copy of my life. Thankfully, it was still there. Then I forgot the computer again at the Dulles Airport security, and didn’t realize my mistake until I had boarded the plane and it was too late to go back. I managed to have it over nighted to me for $150, and all I could think was that I would gladly have paid many times that amount to ensure no one else had my data. More than a half million of my fellow Americans also left their computers at checkpoints in 2008. A busy person may be plagued by absentmindedness, simply because he has a lot on his mind.


pages: 220 words: 75,651

The Lunatic Express by Carl Hoffman


airport security, Mercator projection

wrote an Indian, when I posted a query about safety and logistics on the guidebook’s Thorn Tree bulletin board. “You must not take the bus,” said a taxi driver. “The train.” I wasn’t too worried, though. As a native Washingtonian who felt quite safe when D.C. had the highest murder rate in the U.S., it never surprised me whenever the alleged horrors of a place failed to materialize. Still, I liked to be prepared. Airport security in Kolkata had taken away the knife I’d had since Colombia; I bought a razor-sharp, handmade one from a vendor on the street and had a tailor at an open-fronted shop the size of a telephone booth sew me a sheath that I could strap to my leg. And hailed a taxi for Babughat, one of Kolkata’s bus terminals. Which, of course, wasn’t a terminal at all, but a chaotic, trash-strewn strip of dirt along the Hooghly River lined with buses, each with a sandwich board advertising a destination.


pages: 369 words: 80,355

Too Big to Know: Rethinking Knowledge Now That the Facts Aren't the Facts, Experts Are Everywhere, and the Smartest Person in the Room Is the Room by David Weinberger


airport security, Alfred Russel Wallace, Amazon Mechanical Turk, Berlin Wall, Black Swan, book scanning, Cass Sunstein, corporate social responsibility, crowdsourcing, David Brooks, Debian, double entry bookkeeping,, Exxon Valdez, Fall of the Berlin Wall, future of journalism, Galaxy Zoo, Hacker Ethic, Haight Ashbury, hive mind, Howard Rheingold, invention of the telegraph, jimmy wales, John Harrison: Longitude, Kevin Kelly, linked data, Netflix Prize, New Journalism, Nicholas Carr, openstreetmap, P = NP, Pluto: dwarf planet, profit motive, Ralph Waldo Emerson, RAND corporation, Ray Kurzweil, Republic of Letters, RFID, Ronald Reagan, semantic web, slashdot, social graph, Steven Pinker, Stewart Brand, technological singularity, Ted Nelson, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas Malthus, Whole Earth Catalog, X Prize

Over the course of Western philosophy, we kept ratcheting up the standards of certainty, until we set Descartes to sitting alone in a room (wanting to avoid the distractions of everyday life is not new to the Internet era), making us wonder if even the knowledge that we exist might be the result of a malevolent god tricking us. If we can’t be certain of something beyond the whiff of a glimpse of a tremor of a shadow of doubt, then we do not know it. Or so says Descartes and the tradition he influenced. The continuous ratcheting up of the standards of certainty seemed as inevitable as the increase in intrusiveness of airport security devices. But then nineteenth-century philosophers suggested that perhaps some knowledge was so ungrounded in reason that it could be held certain only with much fear and trembling (Kierkegaard). Perhaps knowledge’s certainty panders to the weak-souled, and hides greater, more terrifying and joyful truths (Nietzsche). Perhaps the carefully constructed rational knowledge we’ve taken as the way to truth is based on a lived experience of a particular time and place of a creature that knows first of all that it will die (Heidegger).


pages: 235 words: 64,858

Sexual Intelligence: What We Really Want From Sex and How to Get It by Marty Klein


airport security, Albert Einstein, invention of the wheel, Silicon Valley

That was way more important than teaching him a new position or getting her to wear lingerie. Trust I see a lot of men and women who tell me they have “trust issues.” I tell them, “Ah, so you’re uncomfortable trusting.” I like that formulation better—it’s easier to change a “discomfort” than an “issue.” “Trust issues” sounds soooooo serious—who could be optimistic about changing that? Besides, “trust issues” sounds like the problem is external, like being hit by a bus, or having airport security mistake you for a terrorist. “I feel uncomfortable trusting” pulls the problem down to a human scale that can actually be changed. There are many things you need to trust during sex: that pleasure is safe and appropriate; that eroticism won’t get out of control in a destructive way; that you can connect with someone without being exploited; that your partner is telling the truth when he or she expresses desire, arousal, or satisfaction with you.


pages: 252 words: 80,636

Bureaucracy by David Graeber


3D printing, Affordable Care Act / Obamacare, airport security, Albert Einstein, banking crisis, barriers to entry, borderless world, Bretton Woods, British Empire, collateralized debt obligation, conceptual framework, David Graeber, George Gilder, High speed trading, hiring and firing, late capitalism, means of production, music of the spheres, new economy, obamacare, Occupy movement, Peter Thiel, planetary scale, price mechanism, Ronald Reagan, self-driving car, Silicon Valley, South Sea Bubble, transcontinental railway, union organizing, urban planning

In practice, though, it’s increasingly unclear what popular sovereignty in that sense is even supposed to mean. Max Weber famously pointed out that a sovereign state’s institutional representatives maintain a monopoly on the right of violence within the state’s territory.163 Normally, this violence can only be exercised by certain duly authorized officials (soldiers, police, jailers), or those authorized by such officials (airport security, private guards …), and only in a manner explicitly designated by law. But ultimately, sovereign power really is, still, the right to brush such legalities aside, or to make them up as one goes along.164 The United States might call itself “a country of laws, not men,” but as we have learned in recent years, American presidents can order torture, assassinations, domestic surveillance programs, even set up extra-legal zones like Guantanamo where they can treat prisoners pretty much any way they choose to.


pages: 234 words: 63,149

Every Nation for Itself: Winners and Losers in a G-Zero World by Ian Bremmer


airport security, banking crisis, barriers to entry, Berlin Wall, blood diamonds, Bretton Woods, BRICs, capital controls, clean water, Deng Xiaoping, Doha Development Round, energy security, European colonialism, failed state, global rebalancing, global supply chain, income inequality, informal economy, Julian Assange, labour mobility, Martin Wolf, mutually assured destruction, Nixon shock, nuclear winter, purchasing power parity, reserve currency, Ronald Reagan, smart grid, South China Sea, special economic zone, trade route, Washington Consensus, WikiLeaks, Yom Kippur War

In years to come, we can expect a spike in both political pressure on China from the governments of other developing states and angry demonstrations targeted at Chinese workers living in other countries. STANDARDS Why do we care about international standards? Because when the rules of the game are simple, uniform, and universally accepted, trade in ideas, information, goods, and services costs less and produces less conflict. But in a G-Zero world, who decides how to make ports and airports secure? Who sets international technical standards, and why do they matter? Who decides how a cell phone works, how the World Wide Web will develop, and how all those communications-enabled consumer products flying from factories in one country to families in another are made safe? Ironically, the international standard that emerging-market governments complain about most is the one most likely to survive the G-Zero.


pages: 233 words: 64,479

The Big Shift: Navigating the New Stage Beyond Midlife by Marc Freedman


airport security, Berlin Wall, David Brooks, follow your passion, illegal immigration, McMansion, RAND corporation, Silicon Valley, Steve Jobs, transcontinental railway, working poor, working-age population

Soon, however, to my surprise, liberation was replacing disappointment. The lightness reminded me of research findings suggesting one of life’s great joys was not taking a big vacation after the pleasures of anticipating one. Planning a trip, basking in the possibilities, experiencing the entire journey in one’s mind—those were the fun parts. Lugging bags, dealing with surly employees, battling airport security, spending more money than budgeted, and eventually returning home exhausted and confronting a pile of mail and accumulated obligations—in other words, taking the actual vacation—were much less enjoyable. The perfect combination, at least according to this research, turns out to be planning fantastic adventures and then bailing out at the last minute. Yet, research notwithstanding, I still wanted to get away and clear my head.


pages: 243 words: 77,516

Straight to Hell: True Tales of Deviance, Debauchery, and Billion-Dollar Deals by John Lefevre


airport security, blood diamonds, colonial rule, credit crunch, Goldman Sachs: Vampire Squid, high net worth, income inequality, jitney, market clearing, Occupy movement, the market place

Everyone just stares at their screens in silence, trying not to crack up. “Do you fucktards understand what happened to me? My friend from grade school is getting married. A lot of these guys I haven’t seen in years. They aren’t bankers or Wall Street guys. They’re firefighters, cops, and blue-collar guys. You think they understand this shit?” The gag could not have worked more perfectly. Going through airport security, the gun-shaped spatula set off all kinds of alarms. The TSA agent immediately pulled him aside and asked to inspect the contents of his bag, which of course got no objection on Funaro’s part. The latex-glove-clad agent then started slowly dissecting the sandwich of clothing and hard-core porn, holding each magazine up in the air as if it were radioactive. Meanwhile, the entire bachelor party, having already cleared security, stood there watching this spectacle unfold, asking each other the same questions.


pages: 266 words: 80,018

The Snowden Files: The Inside Story of the World's Most Wanted Man by Luke Harding


affirmative action, airport security, Anton Chekhov, Apple's 1984 Super Bowl advert, Berlin Wall, Chelsea Manning, don't be evil, Edward Snowden, Etonian, Firefox, Google Earth, Jacob Appelbaum, job-hopping, Julian Assange, Khan Academy, kremlinology, Mark Zuckerberg, Maui Hawaii, national security letter, pre–internet, Ralph Waldo Emerson, rolodex, Silicon Valley, Skype, social graph, Steve Jobs, web application, WikiLeaks

There, ‘someone from the airport staff will be waiting to receive you with a sign labelled G9’. Surely this was some kind of practical joke? ‘The invitation, supposedly from one of the world’s most sought-after people, had a whiff of Cold-War-era spy thriller to it,’ she blogged. She fed her baby with mashed carrots, while juggling calls from the world’s media. It became clear that the invite was genuine. Airport security phoned up and asked for her passport number. Lokshina got on the airport express train; en route, the US embassy rang her up. An American diplomat wanted her to give a message to Snowden. It said that in the opinion of the US government he wasn’t a human rights defender but a law-breaker who had to be held accountable for his crimes. She agreed to pass this message on. At Sheremetyevo, Lokshina spotted the man with the ‘G9’ sign.


pages: 304 words: 82,395

Big Data: A Revolution That Will Transform How We Live, Work, and Think by Viktor Mayer-Schonberger, Kenneth Cukier


23andMe, Affordable Care Act / Obamacare, airport security, AltaVista, barriers to entry, Berlin Wall, big data - Walmart - Pop Tarts, Black Swan, book scanning, business intelligence, business process, call centre, cloud computing, computer age, correlation does not imply causation, dark matter, double entry bookkeeping, Eratosthenes, Erik Brynjolfsson, game design, IBM and the Holocaust, index card, informal economy, Internet of things, invention of the printing press, Jeff Bezos, Louis Pasteur, Mark Zuckerberg, Menlo Park, Moneyball by Michael Lewis explains big data, Nate Silver, natural language processing, Netflix Prize, Network effects, obamacare, optical character recognition, PageRank, performance metric, Peter Thiel, Post-materialism, post-materialism, random walk, recommendation engine, self-driving car, sentiment analysis, Silicon Valley, Silicon Valley startup, smart grid, smart meter, social graph, speech recognition, Steve Jobs, Steven Levy, the scientific method, The Signal and the Noise by Nate Silver, The Wealth of Nations by Adam Smith, Turing test, Watson beat the top human players on Jeopardy!

Actuarial tables note that men over 50 are prone to prostate cancer, so members of that group may pay more for health insurance even if they never get prostate cancer. High-school students with good grades, as a group, are less likely to get into car accidents—so some of their less-learned peers have to pay higher insurance premiums. Individuals with certain characteristics are subjected to extra screening when they pass through airport security. That’s the idea behind “profiling” in today’s small-data world. Find a common association in the data, define a group of people to whom it applies, and then place those people under additional scrutiny. It is a generalizable rule that applies to everyone in the group. “Profiling,” of course, is a loaded word, and the method has serious downsides. If misused, it can lead not only to discrimination against certain groups but also to “guilt by association.”


Dark Summit: The True Story of Everest's Most Controversial Season by Nick Heil


airport security, British Empire, invisible hand, trade route

Can’t you see I’ve got my own problems here? For the next year, Medvetz grimaced his way through the long recovery. He would go through half a dozen operations; by the time the doctors were done with him, he had a metal plate installed in his head, a titanium cage wrapped around his lower spine, half a dozen screws in his knee, and bolts holding his ankle together, fusing his foot into a nearly immobile ninety-degree angle. “Airport security was going to be an issue for the rest of my life,” he said later. But, then, so would the pain. That first year, Medvetz endured bouts of despair, craving normalcy, dosing himself with Vicodin, sometimes twenty pills a day, chasing it down with Jack Daniel’s. Then one afternoon, sitting glumly in his apartment, pondering what his future held, he spied the copy of Into Thin Air on his bookshelf, given to him by an ex-girlfriend.


pages: 252 words: 73,131

The Inner Lives of Markets: How People Shape Them—And They Shape Us by Tim Sullivan


Airbnb, airport security, Al Roth, Andrei Shleifer, attribution theory, autonomous vehicles, barriers to entry, Brownian motion, centralized clearinghouse, clean water, conceptual framework, constrained optimization, continuous double auction, deferred acceptance, Donald Trump, Edward Glaeser, experimental subject, first-price auction, framing effect, frictionless, fundamental attribution error, George Akerlof, Goldman Sachs: Vampire Squid, helicopter parent, Internet of things, invisible hand, iterative process, Jean Tirole, Jeff Bezos, Johann Wolfgang von Goethe, John Nash: game theory, John von Neumann, Joseph Schumpeter, late fees, linear programming, Lyft, market clearing, market design, market friction, medical residency, multi-sided market, mutually assured destruction, Nash equilibrium, Occupy movement, Peter Thiel,, pez dispenser, pre–internet, price mechanism, price stability, prisoner's dilemma, profit motive, proxy bid, RAND corporation, ride hailing / ride sharing, Robert Shiller, Robert Shiller, school choice, school vouchers, sealed-bid auction, second-price auction, second-price sealed-bid, sharing economy, Silicon Valley, spectrum auction, Steve Jobs, Tacoma Narrows Bridge, technoutopianism, telemarketer, The Market for Lemons, The Wisdom of Crowds, Thomas Malthus, Thorstein Veblen, trade route, transaction costs, two-sided market, Vickrey auction, winner-take-all economy

But we need to make these decisions for ourselves: instead of being subject to the whims of economists and businesses (where we currently find ourselves), if we have a better sense of where markets work, and why, and how, and in what form, then we can decide when we want to use them rather than be used by them. Mr. Socialist, Meet the Market Canice Prendergast is an economics professor at the University of Chicago’s Booth School of Business. He works in the language of dense mathematical models that aim to clarify why, for example, service at airport security is so dismal and why—you may not be pleased to hear—that might actually be a good thing. (Because a few of the Department of Homeland Security’s “customers” may be bomb-carrying terrorists, so it’s not exactly a customer-is-always-right setting.) He’s a serious enough art collector that when Booth built itself a $125 million campus across the way from Frank Lloyd Wright’s landmark Robie House, Prendergast was put in charge of a million-dollar budget for decorating its courtyards and hallways.


The Techno-Human Condition by Braden R. Allenby, Daniel R. Sarewitz


airport security, augmented reality, carbon footprint, clean water, cognitive dissonance, conceptual framework, Credit Default Swap, decarbonisation, facts on the ground, friendly fire, invisible hand, Jane Jacobs, land tenure, life extension, Long Term Capital Management, market fundamentalism, mutually assured destruction, nuclear winter, Peter Singer: altruism, planetary scale, prediction markets, Ralph Waldo Emerson, Ray Kurzweil, Silicon Valley, smart grid, stem cell, Stewart Brand, technoutopianism, the built environment, The Wealth of Nations by Adam Smith, transcontinental railway, Whole Earth Catalog

Level I: Military effectiveness Implications for action Goals and technology align; therefore adopt technology Implement techno 1ogy, but technology alone may not lead to achievement of stated goal Level I and Level III implications potentially in fundamental conflict as effective Level I military technology dramatically alters all elements of society in unpredictable ways (e.g., language undermined; privacy of thought eliminated) 148 Chapter 7 But if I can build a helmet that knows what you are thinking, I can eventually build devices that can read your thoughts from a distance; and if I can do that, I can know your thoughts without your knowing that they are being read. From a Level II perspective, this capacity could offer important benefits, for example, airport security. Yet knowing what people are thinking is hardly tantamount to knowing what they are intending to do. If telepathic technologies were to replace, for example, the judgment of well-trained security personnel, would the result be better security? As for Level III effects, consider what a telepathic helmet will communicate: not just nouns and verbs, but also images, and moving pictures, and fragments of sound, and perhaps olfactory and tactile memories and even emotional overtones and feelings.


pages: 274 words: 73,344

Found in Translation: How Language Shapes Our Lives and Transforms the World by Nataly Kelly, Jost Zetzsche


airport security, Berlin Wall, Celtic Tiger, crowdsourcing, Donald Trump, glass ceiling, Machine translation of "The spirit is willing, but the flesh is weak." to Russian and back, randomized controlled trial, Ray Kurzweil, Skype, speech recognition, Steve Jobs, the market place

Fly in the Ultimate Comfort In 1977, Braniff International Airways put out an advertisement to promote the leather seats they’d installed in their new first-class cabins. However, the campaign’s slogan, “Fly in leather,” was translated for Spanish-speaking markets as Vuela en cuero. In Spanish, this was equivalent to saying, “Fly naked,” implying a more comfortable flight for some travelers, not to mention a much easier job for airport security screeners. Ice(landic), Ice(landic), Baby When you think of Iceland, what comes to mind? Perhaps you think of Björk or Sigur Rós, some of the country’s musicians who have risen to international fame. Or maybe you call up a mental image of some of its famous glaciers, geysers, and volcanoes, such as Eyjafjallajökull, whose pronunciation stumped news commentators around the world after its infamous eruption in April 2010, which caused nearly a week of delays in air travel across western and northern Europe.


pages: 1,318 words: 403,894

Reamde: A Novel by Neal Stephenson


air freight, airport security, crowdsourcing, Google Earth, industrial robot, informal economy, large denomination, megacity, new economy, pattern recognition, Ponzi scheme, pre–internet, ransomware, side project, Skype, slashdot, South China Sea, the built environment, the scientific method, young professional

They were representations of actual human forms that had been picked up by airport security cameras as they walked the wrong way into airport concourses. In reality, of course, this happened so rarely that testing the system was well-nigh impossible, and so they ran drills, several times a day, in which uniformed, badged TSA employees would present themselves at the exit and show credentials to the bored guard and then walk upstream into the concourse. In exactly 100 percent of all such cases, some T’Rain player, somewhere in the world (almost always a gold farmer in China) would instantly raise the Horn of Vigilance to his virtual lips and blow a mighty blast and rush out to confront the corresponding one-way goblin: an event that, through some artful cross-wiring between Corporation 9592’s servers and the airport security systems, would cause red lights to flash and horns to sound and doors to automatically lock at the airport in question.

In an evening of random questing around the imaginary world that D-squared and Skeletor had created, Richard could fire more neurons than Einstein had used while coming up with the idea of general relativity. Certainly way more neurons than the average supermarket checkout clerk or private security guard fired during an eight-hour shift. And the power of the Internet ought to make all that neural activity reswitchable; you should be able to patch it all together so that it would work. Around this time there was an airport security scare in which some fuckwit entered a concourse by walking upstream through an exit portal, bypassing the security checkpoint. As always happened in such cases, the entire airport had to be shut down. Planes waiting for takeoff had to taxi back to gates and unload all passengers and baggage. All the passengers had to be ejected from the sterile side of the airport and then turn around and pass through security again.

There was no need at all to have human players in the loop. They should just spin out the pattern-recognition part of it as a separate business. Richard understood and acknowledged all of this—and did not care. “Did you, or did you not, tell me that this was all marketing? What part of your own statement did you not understand?” The purpose of the exercise was not really to build a rational, efficient airport security system. It was, rather (to use yet another of those portentous phrases cribbed from the math world), an existence proof. Once it was up and running, they could point to it and to its 100 percent success rate as vindicating the premise of APPIS, which was that real-world problems—especially problems that were difficult to solve because of hard-wired deficiencies of the human neurological system, such as the tendency to become bored when given a terrible job—could be tackled by metaphrasing them into Medieval Armed Combat scenarios, and then (here brandishing two searingly hip terms from high tech) putting them out on the cloud so that they could be crowdsourced.


pages: 1,104 words: 302,176

The Rise and Fall of American Growth: The U.S. Standard of Living Since the Civil War (The Princeton Economic History of the Western World) by Robert J. Gordon


3D printing, Affordable Care Act / Obamacare, airline deregulation, airport security, Apple II, barriers to entry, big-box store, blue-collar work, Capital in the Twenty-First Century by Thomas Piketty, clean water, collective bargaining, computer age, deindustrialization, Detroit bankruptcy, Donner party, Downton Abbey, Edward Glaeser,, Erik Brynjolfsson, everywhere but in the productivity statistics, feminist movement, financial innovation, full employment, George Akerlof, glass ceiling, high net worth, housing crisis, immigration reform, impulse control, income inequality, income per capita, industrial robot, inflight wifi, interchangeable parts, invention of agriculture, invention of air conditioning, invention of the telegraph, invention of the telephone, inventory management, James Watt: steam engine, Jeff Bezos, jitney, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, Loma Prieta earthquake, Louis Daguerre, Louis Pasteur, low skilled workers, manufacturing employment, Mark Zuckerberg, Mason jar, McMansion, Menlo Park, minimum wage unemployment, mortgage debt, mortgage tax deduction, new economy, obamacare, occupational segregation, oil shale / tar sands, oil shock, payday loans, Peter Thiel, pink-collar, Productivity paradox, Ralph Nader, Ralph Waldo Emerson, Robert X Cringely, school choice, Second Machine Age, secular stagnation, Skype, stem cell, Steve Jobs, Steve Wozniak, Steven Pinker, The Market for Lemons, Thomas Malthus, total factor productivity, transaction costs, transcontinental railway, traveling salesman, Triangle Shirtwaist Factory, Unsafe at Any Speed, Upton Sinclair, upwardly mobile, urban decay, urban planning, urban sprawl, washing machines reduced drudgery, Washington Consensus, Watson beat the top human players on Jeopardy!, We wanted flying cars, instead we got 140 characters, working poor, working-age population, Works Progress Administration, yield management

Compared to the basic ticket price of $400, the $496 represents an unmeasured price increase of 24 percent just between 2008 and 2014. As the final dimension of decline in the quality of airline travel, consider the 200 million hours per year of valuable consumer time wasted in airline security (roughly 600 million U.S. passengers multiplied by twenty minutes per passenger). This represents an annual wasting of time worth about $8 billion. The current system of airport security all over the world represents an overreaction to the September 11, 2001, hijackings. There was only one weakness in the U.S. airline security system on September 11, and this was that the cockpit doors were flimsy. Within days, they were replaced by completely secure doors that nobody could break through. Although the security issue was completely solved within a week, fourteen years later billions of dollars per year of passenger time continues to be wasted in unnecessary additional security precautions.

Though after 1970 automobiles did not change in their ability to move passengers and their cargo from points A to point B at a given speed, there was a steady increase in the quality of the automobiles making those journeys, thanks not only to safety devices but also to convenience and comfort items such as automatic transmission and air conditioning, as well as improved fuel economy. Our treatment of airline travel finds little improvement after 1970, a year when the conversion from piston to jet planes was complete. Along most dimensions, particularly seating comfort, meal service, and airport security, the quality of the air travel experience declined after 1970. Despite the promise of deregulation in 1978, the reduction in the relative price of air travel per mile flown was substantially slower during 1980–2000 than in 1950–80 and has been even slower than that since 2000. Just as automobile fatality rates have experienced a steady decline with no hiatus after 1970, so too have airline fatality rates, which since 2006 have fallen close to zero thanks to better aircraft and engine design, improved air traffic control, and shifts in maintenance procedures.

See blacks age: discrimination by, 519; labor force participation by, 32–34; population by (1870), 32 Agricultural Extension Service, 312 agriculture: in 1870, 40, 60, 248; after 1940, 500–501; decline of, 553–54; governmental intervention in, 312; Harrison Act financing of land for, 300; occupational transformations in, 249; workforce in, 52–56; work of American farmer, 261–66, 286 AIDS, 471–72 air conditioning: in automobiles, 382; in houses, 361–62, 372, 525, 583; life expectancy and, 485; migration to sun belt and, 502; predicting, 592 air pollution, 219; automotive regulation on, 382–83, 392; health and, 473–74 airport security, 406 air travel, 171, 375, 393–400, 408, 581; airline revenues, 377–78; big data used in, 597–98; computers used for, 449; cost of, 401–5; decline in quality of, 405–7, 525 alcoholic drinks, 71; adulteration of, 220; Prohibition ban on, 313–14 Alexopoulos, Michell, 556–57, 564–65 Allen, Paul, 452, 572 Allstate, 309 Altair computers, 452 Alzheimer’s disease, 465, 483–84 Amazon (firm), 443, 457–58, 579; robots used by, 596 American Airlines, 396, 404, 449 The American Commonwealth (Bryce), 28–29, 104 American exceptionalism, 245–46 American manufacturing system, 561–62 Amos ‘n’ Andy (radio program), 195 Anderson, Walter, 167 anesthesia, 232 antibiotics, 324, 465–67 antiseptics, 228 Appert, Nicholas, 72 Apple Computer, 452; iPhone by, 577 appliances, 356–63, 372; credit used for purchases of, 298–300; effect on labor force of, 499; electrification for, 115–22; housework unchanged by, 278 Armant, Thomas, 198 Armstrong, George, 47–48 ARPANET (Advanced Research Projects Agency network), 453 ART (antiretroviral therapy), 471 artificial intelligence, 594, 597–99 assembly line, 11, 557, 576 Associated Press, 179 AT&T (Bell System): Bell Labs of, 572; breakup of, 577; coaxial cable system built by, 416; Direct Distance Dialing introduced by, 429–30; telephone service by, 183–84, 204; Traffic Service Position System of, 430 Australia, 648 automated teller machines (ATMs), 450, 459, 578, 596; impact of, 583 automatic transmissions, 381–82 automation, impact on employment of, 615 automobile industry: assembly line introduced for production in, 557; post-World War II production of, 379; robots used in, 594–95; wages in, 617–18 automobiles, 169–71, 374–76; after 1970, 525; accidental deaths caused by, 474–75; arrival of, 11, 149–52; Benz’s invention of engine for, 129; decline of public transit and, 149; diffusion of, 114–15, 130, 367, 376–77; doctors’ use of, 225, 234; drive-in movie theaters and, 420; driverless cars, 599–601; early acceptance of (1906–1940), 152–57; effects of transition to, 165–68; on farms and in small towns, 163–65; fast food restaurants and, 344; fatal accidents involving, 239–40; financing of, 297–98, 303; food consumption tied to, 76; fuel economy, safety, and reliability of, 383–89; horsepower of, 558–59; horses and public transit replaced by, 159–63; improvements in, 379–83, 407; insurance for, 308–9, 317; Interstate Highway System for, 389–93; paved roads for, 157–59; radio in, 421; regulation of, 314; suburbs dependent upon, 364–66, 370 Autor, David, 595, 600, 614 Aveling, Eleanor Marx and Edward, 268 baby boom generation, 15, 499; education of, 513; housing demands of, 371–72; retirement among, 23, 515, 517, 518, 576, 607, 628, 629; women among, 507–8 Baily, Martin, 586 Bakker, Gerben, 172 Ball, Lucille, 410, 417 Bank Americard (Visa), 450 banking: cash and checks in, 295; computers used for, 449–50; consumer credit and, 296–300; Federal Deposit Insurance Corporation for, 315; impact of technology on, 582–83; mortgage financing and, 300–303 barcodes, 451 Bardeen, John, 430 bathrooms, 125, 127 batteries, 182; radios powered by, 194 Baumol, William, 570 Baumol’s disease, 13, 173–74, 186 Baxter (robot), 595 Beaudry, Paul, 623, 626 Bebchuk, Lucian, 619 Becker, Gary, 9, 207, 242, 247 Beebe, Lucius, 141 beer, 220 Bell, Alexander Graham, 21, 173, 181–82, 187, 204, 574 Bellevue Hospital (New York), 228 Bell Labs, 430, 571, 572 Bell System (AT&T).


pages: 829 words: 186,976

The Signal and the Noise: Why So Many Predictions Fail-But Some Don't by Nate Silver


airport security, availability heuristic, Benoit Mandelbrot, Berlin Wall, Bernie Madoff, Bernie Madoff, big-box store, Black Swan, Broken windows theory, Carmen Reinhart, Claude Shannon: information theory, Climategate, Climatic Research Unit, cognitive dissonance, collateralized debt obligation, complexity theory, computer age, correlation does not imply causation, Credit Default Swap, credit default swaps / collateralized debt obligations, cuban missile crisis, Daniel Kahneman / Amos Tversky, diversification, Donald Trump, Edmond Halley, Edward Lorenz: Chaos theory,, equity premium, Eugene Fama: efficient market hypothesis, everywhere but in the productivity statistics, fear of failure, Fellow of the Royal Society, Freestyle chess, fudge factor, George Akerlof, haute cuisine, Henri Poincaré, high batting average, housing crisis, income per capita, index fund, Internet Archive, invention of the printing press, invisible hand, James Watt: steam engine, John Nash: game theory, John von Neumann, Kenneth Rogoff, knowledge economy, locking in a profit, Loma Prieta earthquake, market bubble, Moneyball by Michael Lewis explains big data, Monroe Doctrine, mortgage debt, Nate Silver, new economy, PageRank, pattern recognition,, prediction markets, Productivity paradox, random walk, Richard Thaler, Robert Shiller, Robert Shiller, Rodney Brooks, Ronald Reagan, Saturday Night Live, savings glut, security theater, short selling, Skype, statistical model, Steven Pinker, The Great Moderation, The Market for Lemons, the scientific method, The Signal and the Noise by Nate Silver, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, too big to fail, transaction costs, transfer pricing, University of East Anglia, Watson beat the top human players on Jeopardy!, wikimedia commons

Everybody likes to live in a cleaner, safer neighborhood. But it’s unclear whether the broken-windows theory is more than window dressing. Likewise, the ever more cumbersome requirements for commercial flights fall into the category of what the security expert Bruce Schneier calls “security theater”75—they are more for show than to actually deter terrorists. It’s by no means completely irrational to be worried about airport security; airplanes have been the subject of a large number of terror attacks in the past, and terrorism can have a copycat element.76 Yet even accounting for crashes that had nothing to do with terrorism, only about one passenger for every twenty-five million was killed on an American commercial airliner during the decade of the 2000s.77 Even if you fly twenty times per year, you are about twice as likely to be struck by lightning.

., 137–38 AccuWeather, 128, 131, 132, 133 Achuthan, Lakshman, 196 acid rain, 400 Adams, Douglas, 26 adaptiveness, 98 Afghanistan, Soviet war with, 52 Africa, 379 African Plate, 143–44 aftershocks, 154, 161, 174, 476–77 agent-based models, 226, 227–29, 230 aggregate predictions, see consensus aging curve, 79, 81–83, 81, 83, 99, 164 aging population, 189 Agriculture Department, U.S., 123 AIDS, 213, 214, 215, 486 AIG, 37 Air Force, U.S., 108 Air India, 425, 429 air pollution, 400 airport security, 439 Ajedrecista, El, 265 Akerlof, George, 32–33, 35, 466 Alabama, University of, 394 Alaska, 149, 438 Alfred P. Murrah Federal Building, 425 algorithms, 265, 426 all-in bet, 306 Allison, Graham, 433–35 Al Qaeda, 422, 424, 425, 426, 433, 435–36, 440, 444 Alzheimer’s, 420, 352–53, 500 American exceptionalism, 10 American Football League (AFL), 185–86, 480 American League, 79 American Stock Exchange, 334 Amsterdam, 228 Anchorage, Alaska, 149 Anderson, Chris, 9 Angelo, Tommy, 324–26, 328 animals, earthquake prediction and, 147–48 Annals of Applied Statistics, 511–12 ANSS catalog, 478 Antarctic, 401 anthropology, 228 antiretroviral therapy, 221 Apple, 264 Archilochus, 53 Arctic, 397, 398 Arianism, 490 Aristotle, 2, 112 Armstrong, Scott, 380–82, 381, 388, 402–3, 405, 505, 508 Arrhenius, Svante, 376 artificial intelligence, 263, 293 Asia, 210 asset-price bubble, 190 asymmetrical information, 35 Augustine, Saint, 112 Australia, 379 autism, 218, 218, 487 availability heuristic, 424 avian flu, see bird flu A/Victoria flu strain, 205–6, 208, 483 Babbage, Charles, 263, 283 Babyak, Michael, 167–68 baby boom, 31 Babylonians, 112 Bachmann, Michele, 217 bailout bills, 19, 461 Bak, Per, 172 Baker, Dean, 22 Bane, Eddie, 87 Bank of England, 35 Barbour, Haley, 140 baseball, 9, 10, 16, 74–106, 128, 426, 446, 447, 451n aging curve in, 79, 81–83, 81, 83, 99, 164 betting on, 286 luck vs. skill in, 322 minor league system in, 92–93 results in, 327 rich data in, 79–80, 84 Baseball America, 75, 87, 89, 90, 90, 91 Baseball Encyclopedia, 94 Baseball Prospectus, 75, 78, 88, 297 basic reproduction number (R0), 214–15, 215, 224, 225, 486 basketball, 80n, 92–93, 233–37, 243, 246, 256, 258, 489 batting average, 86, 91, 95, 100, 314, 321, 321, 339 Bayer Laboratories, 11–12, 249 Bayes, Thomas, 240–43, 251, 253, 254, 255, 490 Bayesian reasoning, 240, 241–42, 259, 349, 444 biases and beliefs in, 258–59 chess computers’ use of, 291 Christianity and, 490 in climatology, 371, 377–78, 403, 406–7, 407, 410–11 consensus opinion and, 367 Fisher’s opposition to, 252 gambling esteemed in, 255–56, 362 priors in, 244, 245, 246, 252, 255, 258–59, 260, 403, 406–7, 433n, 444, 451, 490, 497 stock market and, 259–60 Bayes’s theorem, 15, 16, 242, 243–49, 246, 247, 248, 249, 250, 258, 266, 331, 331, 448–49, 450–51 in poker, 299, 301, 304, 306, 307, 322–23 Beane, Billy, 77, 92, 93–94, 99–100, 103, 105–7, 314 Bear Stearns, 37 beauty, complexity and, 173 beer, 387, 459 behavioral economics, 227–28 Belgium, 459 Bellagio, 298–99, 300, 318, 495 bell-curve distribution, 368n, 496 Bengkulu, Indonesia, 161 Benjamin, Joel, 281 Berlin, Isaiah, 53 Berners-Lee, Tim, 448, 514 BetOnSports PLC, 319 bets, see gambling Betsy, Hurricane, 140 betting markets, 201–3, 332–33 see also Intrade biases, 12–13, 16, 293 Bayesian theory’s acknowledgment of, 258–59 in chess, 273 and errors in published research, 250 favorite-longshot, 497 of Fisher, 255 objectivity and, 72–73 toward overconfidence, 179–83, 191, 203, 454 in polls, 252–53 as rational, 197–99, 200 of scouts, 91–93, 102 of statheads, 91–93 of weather forecasts, 134–38 Bible, 2 Wicked, 3, 13 Biden, Joseph, 48 Big Data, 9–12, 197, 249–50, 253, 264, 289, 447, 452 Big Short, The (Lewis), 355 Billings, Darse, 324 Bill James Baseball Abstract, The, 77, 78, 84 bin Laden, Osama, 432, 433, 434, 440, 509 binomial distribution, 479 biological weapons, 437, 438, 443 biomedical research, 11–12, 183 bird flu, 209, 216, 229 Black, Fisher, 362, 367, 369 “Black Friday,” 320 Black Swan, The (Taleb), 368n Black Tuesday, 349 Blanco, Kathleen, 140 Blankley, Tony, 50 Blodget, Henry, 352–54, 356, 364–65, 500 Blue Chip Economic Indicators survey, 199, 335–36 Bluefire, 110–11, 116, 118, 127, 131 bluffing, 301, 303, 306, 310, 311, 328 Bonus Baby rule, 94 books, 2–4 cost of producing, 2 forecasting and, 5 number of, 2–3, 3, 459 boom, dot-com, 346–48, 361 Boston, 77 Boston Red Sox, 63, 74–77, 87, 102, 103–5 Bowman, David, 161–62, 167 Box, George E.


pages: 685 words: 203,949

The Organized Mind: Thinking Straight in the Age of Information Overload by Daniel J. Levitin


airport security, Albert Einstein, Amazon Mechanical Turk, Anton Chekhov, big-box store, business process, call centre, Claude Shannon: information theory, cloud computing, cognitive bias, complexity theory, computer vision, conceptual framework, correlation does not imply causation, crowdsourcing, cuban missile crisis, Daniel Kahneman / Amos Tversky, delayed gratification, Donald Trump,, epigenetics, Eratosthenes, Exxon Valdez, framing effect, friendly fire, fundamental attribution error, Golden Gate Park, Google Glasses, haute cuisine, impulse control, index card, information retrieval, invention of writing, iterative process, jimmy wales, job satisfaction, Kickstarter, life extension, meta-analysis, more computing power than Apollo, Network effects, new economy, Nicholas Carr, optical character recognition, pattern recognition, phenotype, placebo effect, pre–internet, profit motive, randomized controlled trial, Skype, Snapchat, statistical model, Steve Jobs, supply-chain management, the scientific method, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Turing test, ultimatum game

When deciding, for example, whether to steam clean your carpets or hire someone to do it, you might take into account what else you could be doing with your time. If a free weekend day is rare, and you are really looking forward to spending it bicycling with friends, or going to a party, you may well decide that it’s worth it to pay someone else to do it. Or if you’re a consultant or attorney earning upward of $300 an hour, spending $100 to join one of those priority services that bypasses the long line at airport security seems well worth it. If you calculate what your time is worth to you, it simplifies a great deal of decision-making because you don’t have to reassess each individual situation. You just follow your rule: “If I can spend $XX and save an hour of my time, it is worth it.” Of course this assumes that the activity is something you don’t find pleasurable. If you like steam-cleaning carpets and standing in airport lines, then the calculation doesn’t work.

., & Backwell, A. (2011). Driving deaths and injuries post-9/11. International Journal of General Medicine, 4, 803–807. and, Gigerenzer, G. (2006). Out of the frying pan into the fire: Behavioral reactions to terrorist attacks. Risk Analysis, 26(2), 347–351. and, Hampson, R. (2011, September 5). After 9/11: 50 dates that quietly changed America. USA Today. and, Kenny, C. (2011, November 18). Airport security is killing us. Business Week. and, Sivak M., & Flannagan, M. (2003). Flying and driving after the September 11 attacks. American Scientist, 91(1), 6–8. ten million safe commercial flights Snyder, B. (2012, January 9) An incredibly safe year for air travel. CNN. Retrieved from “Terrorists can strike twice . . .” Gaissmaier, W., & Gigerenzer, G. (2012). 9/11, Act II: A fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.


pages: 897 words: 210,566

Shake Hands With the Devil: The Failure of Humanity in Rwanda by Romeo Dallaire, Brent Beardsley


airport security, colonial rule, failed state, global village, invisible hand, Khartoum Gordon, land reform, risk/return, Ronald Reagan

I scrounged a bottle of whisky as a thank-you present to those men for their prescient advice. On April 18, I awoke to machine-gun fire and the sound of exploding grenades. The Force HQ was under bombardment. Today was the day that Luc was leaving with the Belgian contingent. He had been one of the first To Go or To Stay? 309 the ground, and his steady nerves and professionalism, his rock-solid sense, had provided me with a certain feeling of confidence, even He was handing over airport security to Colonel Yaache, the in the demilitarized zone, and Yaache and I met Luc at 0800 to discuss the last details. Luc did not look well. The the stress, the physical and mental pain and the crushing weight Kigali Sector command had finally worn him down, and he stood me slightly hunched and short of breath. I could see the shame, and uncertainty of his position reflected in his eyes. But he soon tened his back and got on with the job at hand, conveying the necinformation.

., 211 the Napoleon of Africa, 67 new vice-president, 475-7 opinion of BoohBooh, 355-6 pace of peace, 153, 200-1 preconditions for ceasefire, 250 refugees in Rwanda, 154-6 RPF site in Kigali, 127 transfer disruptions, 406-7 twenty-four-hour warning, 201, 291 the victor's map, 462 warning from, 247 Kagera, Tanzania, 199, 288, 292 Kagera National Park, 453 Kajuga, Robert, 346-7, 370 Kambanda, Jean, 285, 288-9, 316, 329-30 Kamenzi, Major Frank, 166, 300, 362, 423, 425, 440 attack on, 173 search of FrancoAfricans, 435 Kane, Mamadou, 172, 175, 300, 381 Kangura, 133, 183 Kanombe barracks, 187, 191 Kanyarengwe, Colonel Alexis, 65, 130, 475 Karamira, Froduald, 344, 347 Katimavik (training program, Canada), 30 Kavaruganda, Joseph, 161, 179-80, 212, 242-3 Kayibanda, Gregoire, 47 Keating, Colin, 298, 301, 319-20, 364, 374 Kesteloot, Major Henry, 142, 193, 318 Khan, Shaharvar, 437 556 Index description of, 459-60, 463 Operation Turquoise departure, 507 The Shallow Graves of Rwanda, 461Khartoum (movie), 274 KIBAT, 113 Kibungo, Rwanda, 291 Kibuye, Rwanda, 292 Kigali hospital, 360-2, 468-9, 491 Kigali International Airport Security Agree 285 Kigali Weapons Secure Area (KwsA) as an excuse, 189 description of, 87 signing of, 124-7 troops to support, 202-3 violations of, 144, 148-9, 159-60, 193, 226 "Kigame Nine" declaration, 464, 469 killings. See shootings and killings Kilometre 64, 125, 170 King Faisal Hospital, 158, 270, 291, 302413, 419-20 invasions of, 440-1 locked ward, 461-2 operational, 440n Kinihira, Rwanda, 102-3, 243, 365-6, 4( Kinyarwanda, 44, 110, 158.


pages: 624 words: 189,582

The Black Banners: The Inside Story of 9/11 and the War Against Al-Qaeda by Ali H. Soufan, Daniel Freedman


airport security, Ayatollah Khomeini, call centre, glass ceiling, illegal immigration, Ronald Reagan

We had equipment, supplies, and vehicles that we wanted to unload from the plane; the Yemenis, at the same time, wanted to inspect and approve everything that came off. They wrote down every detail, right down to the serial numbers of our weapons. We were stiff and exhausted from the long and uncomfortable flight and had little patience for all this red tape. The airport was also swarming with Yemeni officials: all of the different national and local law enforcement, intelligence, and military agencies were represented. There were airport security personnel; the military; the ministry of the interior’s internal security force; the intelligence service, called the Political Security Organization (PSO); the regular police; and Aden security services. It appeared that none had ultimate jurisdiction and that all intended to monitor us. Overlapping jurisdictions and blurred boundaries between security agencies are deliberate in some countries.

He had such a reassuring presence, and those who worked for him knew he would do anything he could to support his agents. Still, I was skeptical despite John’s reassurance; knowing as I did both Ambassador Bodine’s personality and John’s, I guessed that the two would clash. Because of the rapport I had developed with the Yemenis at the airport, and because of John’s status as a “general,” we passed easily through airport security to the waiting escort. I pointed out to John the Binladin construction site with the big billboard as we passed it. The first thing John did at the Mövenpick was speak to our team. He told them what he told me: that he’d deal with the problems we were having. John’s presence lifted their spirits. Next I took him to see the Cole. The sight of the giant hole on the side, the blood on the floor, the sullen look on sailors’ faces—it was all just as chilling every time I went to the destroyer.


pages: 337 words: 103,273

The Great Disruption: Why the Climate Crisis Will Bring on the End of Shopping and the Birth of a New World by Paul Gilding


airport security, Albert Einstein, BRICs, carbon footprint, clean water, cleantech, Climategate, corporate social responsibility, decarbonisation, energy security, Exxon Valdez, failed state, fear of failure, income inequality, Joseph Schumpeter, market fundamentalism, Naomi Klein, new economy, nuclear winter, oil shock, peak oil, Ponzi scheme, purchasing power parity, Ronald Reagan, shareholder value, The Spirit Level, The Wealth of Nations by Adam Smith, union organizing, University of East Anglia

For all the reasons we discussed earlier, this will translate not just into local economic impacts, but into global ones as well, including the end of economic growth as we know it. People will then “feel” the issue in a new and directly personal way. Even those not personally affected will be able to relate to it. Terrorism was a powerful example of this. Even though few were directly affected by the 9/11 attacks, people around the world felt an emotional engagement with those who did. As a result, enormous political and economic changes were accepted from new airport security measures to changes to legal rights to two wars—because people could relate to the issues in a new way. So the train hurtling toward us will become clear as the fog lifts, forcing us to jump rather than be hit. We will explore how this will unfold in the next few chapters. Second, we need to remember that this type of response is normal for our species. We wait until the last minute and then we jump.


pages: 287 words: 86,919

Protocol: how control exists after decentralization by Alexander R. Galloway


Ada Lovelace, airport security, Berlin Wall, bioinformatics, Bretton Woods, computer age, Craig Reynolds: boids flock, discovery of DNA, Douglas Engelbart, Fall of the Berlin Wall, Hacker Ethic, informal economy, John Conway, Kevin Kelly, late capitalism, linear programming, Marshall McLuhan, means of production, Menlo Park, mutually assured destruction, packet switching, phenotype, post-industrial society, profit motive, QWERTY keyboard, RAND corporation, Ray Kurzweil, RFC: Request For Comment, Richard Stallman, semantic web, SETI@home, stem cell, Steve Crocker, Steven Levy, Stewart Brand, Ted Nelson, telerobotics, the market place, urban planning, Vannevar Bush, Whole Earth Review, working poor

(The fact that Microsoft has not yet replaced TCP/IP with a commercial product of its own is one of the miracles of computer history. Chances are this will happen very soon.) As one learns more and more about the networks of protocological control, it becomes almost second nature to project protocol into every physical system: Traffic lights become the protocol for successful management of moving vehicles; a grocery store queue is the protocol for a successful checkout; airport security points are the protocol for prohibiting weapons; and so on. Protocol pops up everywhere. But protocol is more than simply a synonym for “the rules.” Instead, protocol is like the trace of footprints left in snow, or a mountain trail whose route becomes fixed only after years of constant wear. One is always free to pick a different route. But protocol makes one instantly aware of the best route—and why wouldn’t one want to follow it?


pages: 342 words: 95,013

The Zenith Angle by Bruce Sterling


airport security, Burning Man, cuban missile crisis, glass ceiling, half of the world's population has never made a phone call, Iridium satellite, market bubble, new economy, packet switching, pirate software, profit motive, RFID, Richard Feynman: Challenger O-ring, Ronald Reagan, Silicon Valley, Steve Jobs, thinkpad, V2 rocket, Y2K

To make up for it, he’d have to work twice as hard on the Virginia summit, really dig deep into the rabbit hat . . . Van looked at himself in the mirror, leaning close to take it in without his glasses. He had been a damned fool. He tiptoed away as Ted cooed and burbled. He silently fetched his backpack from the foot of Dottie’s bed. He returned to the bathroom with the jet-black SWAT knife. He couldn’t fly back to Washington with this throat-cutting pigsticker. Airport security would go nuts over it. But he’d bought it. It was his. It was stupid to not find some kind of use for it. Van grabbed a thick mess of beard and had at it. The knife went through his bristles like they were cotton candy. Six minutes later Van was looking at his bare face while Ted happily sucked on and spat a loose fistful of his beard. The SWAT knife was beyond razor-sharp. It had taken his beard off like a laser.


pages: 349 words: 114,038

Culture & Empire: Digital Revolution by Pieter Hintjens


4chan, airport security, anti-communist, anti-pattern, barriers to entry, Bill Duvall, bitcoin, blockchain, business intelligence, business process, Chelsea Manning, clean water, congestion charging, correlation does not imply causation, cryptocurrency, Debian, Edward Snowden, failed state, financial independence, Firefox, full text search, German hyperinflation, global village, GnuPG, Google Chrome, greed is good, Hernando de Soto, hiring and firing, informal economy, invisible hand, James Watt: steam engine, Jeff Rulifson, Julian Assange, Kickstarter, M-Pesa, mutually assured destruction, Naomi Klein, national security letter, new economy, New Urbanism, Occupy movement, offshore financial centre, packet switching, patent troll, peak oil, pre–internet, private military company, race to the bottom, reserve currency, RFC: Request For Comment, Richard Stallman, Satoshi Nakamoto, security theater, Skype, slashdot, software patent, spectrum auction, Steve Crocker, Steve Jobs, Steven Pinker, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, trade route, transaction costs, union organizing, web application, WikiLeaks, Y2K, zero day, Zipf's Law

This still works with many people, though fewer than before. You can only cry wolf a few times before people switch off. We simply don't think about it. As with any bad news that affects us all, be it climate change, nuclear meltdown in Japan, rising fuel prices, deforestation, pollution, and so on, we deal with it by making it someone else's problem. Sure, it's bad, yet it affects so many people. So someone else will fix it. It's much like airport security, which everyone knows is pointless and annoying theater. We tolerate it unless it makes us miss our connections, because it's more fun than being ignored. Airports are frankly boring places. If every street-smart flier complains about the TSA, isn't that just because some people enjoy complaining? The ritual of checking papers is a comedy that makes many people feel a little better. I think when we lived small lives, our secrets were more precious.


pages: 540 words: 103,101

Building Microservices by Sam Newman


airport security, Amazon Web Services, anti-pattern, business process, call centre, continuous integration, create, read, update, delete, defense in depth, Edward Snowden, index card, information retrieval, Infrastructure as a Service, inventory management, job automation, load shedding, loose coupling, platform as a service, premature optimization, pull request, recommendation engine, social graph, software as a service, the built environment, web application, WebSocket, x509 certificate

Even if your functionality is broken, it could take you many hours to find out — at which point many of us would already have moved on to other activities, and the context switch in shifting our brains back to fix the issue is painful. We can ameliorate some of this by running tests in parallel — for example, making use of tools like Selenium Grid. However, this approach is not a substitute for actually understanding what needs to be tested and actively removing tests that are no longer needed. Removing tests is sometimes a fraught exercise, and I suspect shares much in common with people who want to remove certain airport security measures. No matter how ineffective the security measures might be, any conversation about removing them is often countered with knee-jerk reactions about not caring about people’s safety or wanting terrorists to win. It is hard to have a balanced conversation about the value something adds versus the burden it entails. It can also be a difficult risk/reward trade-off. Do you get thanked if you remove a test?


pages: 339 words: 105,938

The Skeptical Economist: Revealing the Ethics Inside Economics by Jonathan Aldred


airport security, Berlin Wall, carbon footprint, citizen journalism, clean water, cognitive dissonance, congestion charging, correlation does not imply causation, Diane Coyle, experimental subject, Fall of the Berlin Wall, first-past-the-post, framing effect, greed is good, happiness index / gross national happiness, invisible hand, job satisfaction, John Maynard Keynes: Economic Possibilities for our Grandchildren, labour market flexibility, laissez-faire capitalism, libertarian paternalism, new economy, pension reform, positional goods, Ralph Waldo Emerson, RAND corporation, risk tolerance, school choice, spectrum auction, trade liberalization, ultimatum game

The number may be inaccurate, but it differs from the truth in predictable and systematic ways. But in the messy world of decision making, perfect quantification is usually a myth. Many attempts to quantify involve arbitrary assumptions. In 1226, TWA Flight 800 crashed near Long Island, New York. Shortly afterwards, Robert Hahn, an influential US economist and policy adviser, tried to estimate the costs and benefits of improved airport security. The benefit estimate was based simply on the number of deaths caused by terrorism up to that time, and the research concluded that the costs of improved security outweighed the benefits.34 Then there was 11 September 2001: that awful day could hardly have been anticipated five years earlier — but nevertheless, it was supremely foolish to use the past as a reliable guide to predicting future levels of terrorism.


pages: 335 words: 107,779

Some Remarks by Neal Stephenson


airport security, augmented reality, barriers to entry, British Empire, cable laying ship, call centre, cellular automata, edge city, Eratosthenes, Fellow of the Royal Society, Hacker Ethic, impulse control, Iridium satellite, Jaron Lanier, John von Neumann, Just-in-time delivery, Kevin Kelly, music of the spheres, offshore financial centre, oil shock, packet switching, pirate software, Saturday Night Live, shareholder value, Silicon Valley, Skype, slashdot, social web, Socratic dialogue, South China Sea, special economic zone, Stephen Hawking, the scientific method, trade route, Turing machine, Vernor Vinge, X Prize

Their weight per square foot is no more than that of a normal human in an office chair (treadmill plus human has more weight than the human alone, of course, but it is spread out over a larger area). Walking at one to one and a half miles per hour is a completely different proposition from speed-walking in a health club; you amble along at about the rate of a coach-class traveler moving through an airport security queue, and breaking a sweat is unlikely. While on the topic of sweat, it might be helpful here to distinguish among three different general levels of physical exertion, from most to least intense. Aerobic exercise is something that everyone is supposed to perform for at least thirty minutes a day, five days a week. The heart is beating at 60 to 80 percent of its maximum rate (where maximum rate is a figure calculated mostly on the basis of age; a fifty-year-old man’s maximum is something like 170, so, doing the math, aerobic exercise should put his pulse rate in the band of about 100 to 136 beats per minute).


pages: 380 words: 104,841

The Human Age: The World Shaped by Us by Diane Ackerman


23andMe, 3D printing, additive manufacturing, airport security, Albert Einstein, augmented reality, back-to-the-land, carbon footprint, clean water, dark matter, dematerialisation, Drosophila, epigenetics, Google Earth, Google Glasses, haute cuisine, Internet of things, Loebner Prize, Louis Pasteur, Masdar, megacity, nuclear winter, phenotype, Ray Kurzweil, Search for Extraterrestrial Intelligence, SETI@home, skunkworks, Skype, stem cell, Stewart Brand, the High Line, urban planning, urban renewal, Whole Earth Catalog

Wake Forest engineers recently invented Power Felt, a nanotube fabric that generates electricity from the difference in temperature between room heat and body heat. You could start your laptop by plugging it into your jeans, recharge your cell phone by tucking it into a pocket. Then, not only would your cells sizzle with electricity, even your couture clothing could chime in. Would a fully electric suit upset flight electronics, pacemakers, airport security monitors, or the brain’s cellular dispatches? If you wore an electric coat in a lightning storm, would the hairs on the back of your neck stand up? Would you be more prey to a lightning strike? How long will it be before late-night hosts riff about electric undies? Will people tethered to recharging poles haunt airport waiting rooms? Will it become hip to wear flashing neon ads, quotes, and designs—maybe a lover’s name in a luminous tattoo?


pages: 381 words: 102,966

Fatherland by Robert Harris


airport security, index card

When March's turn came, he saw how his passport baffled the customs man. An SS-Sturmbannführer with only a twenty-four-hour visa? The normal signals of rank and privilege, usually so clear, were too confused to read. Curiosity and servility warred in the customs man's face. Servility, as usual, won. "Enjoy your journey, Herr Sturmbannführer." On the other side of the barrier, March resumed his study of airport security. All luggage was scanned by X ray. He was frisked, then asked to open his case. Each item was inspected—the sponge bag unzipped, the shaving foam uncapped and sniffed. The guards worked with the care of men who knew that if an aircraft were lost to hijackers or a terrorist bomb during their watch, they would spend the next five years in a KZ. Finally he was clear of the checks. He patted his inside pocket to make sure Stuckart's letter was still there, turned the little brass key over in his other hand.


pages: 309 words: 92,177

The Ghost by Robert Harris


airport security, carbon footprint,, stakhanovite

We badly need another pair of hands, if only to handle the media, but Adam can’t bring himself to replace Mike. They were together so long.” “And how long have you been with him?” “Eight years. I worked in Downing Street. I’m on attachment from the Cabinet Office.” “Poor Cabinet Office.” She flashed her nail-polish smile. “It’s my husband I miss the most.” “You’re married? I notice you’re not wearing a ring.” “I can’t, sadly. It’s far too large. It bleeps when I go through airport security.” “Ah.” We understood one another perfectly. “The Rhineharts also have a live-in Vietnamese couple, but they’re so discreet you’ll hardly notice them. She looks after the house and he does the garden. Dep and Duc.” “Which is which?” “Duc is the man. Obviously.” She produced a key from the pocket of her well-cut jacket and unlocked a big gunmetal filing cabinet, from which she withdrew a box file.


pages: 404 words: 113,514

Atrocity Archives by Stross, Charles


airport security, anthropic principle, Berlin Wall, brain emulation, British Empire, Buckminster Fuller, defense in depth, disintermediation, experimental subject, glass ceiling, haute cuisine, hypertext link, Khyber Pass, mandelbrot fractal, Menlo Park, NP-complete, the medium is the message, Y2K, yield curve

A secretary who looks like she's made of fine bone china waves me through the biometric scanner, somehow manages to refrain from inhaling in my presence (you'd think I hailed from the Pestilence Division at Porton Down), and finally ushers me into a small cubicle furnished with a hard wooden bench (presumably to make me feel at home). The inner door opens and a big, shorthaired guy in a white shirt and black tie clears his throat and says, "Robert Howard, this way please." I follow him and he drops one of those silly badge-chains over my head then pushes me through a metal detector and gives me a cursory going over with a wand, airport security style. I grit my teeth. They know exactly who I am and who I work for: they're just doing this to make a point. He relieves me of my Leatherman multitool, my palmtop computer, my Maglite torch and pocket screwdriver set, the nifty folding keyboard, the MP3 walkman, the mobile phone, and a digital multimeter and patch cable set I'd forgotten about. "What's all this, then?" he asks. "Do you guys ever go anywhere without your warrant card and handcuffs?


pages: 389 words: 108,344

Kill Chain: The Rise of the High-Tech Assassins by Andrew Cockburn


airport security, anti-communist, Edward Snowden, friendly fire, Google Earth, license plate recognition, RAND corporation, risk/return, Ronald Reagan, Silicon Valley, South China Sea, too big to fail

Though there were fewer histrionics, there was little increase in useful intelligence about al-Qaeda operations, though this was not for want of opportunity. In December 1999, the National Security Agency intercepted a phone call to a known al-Qaeda safe house in Yemen mentioning that two members were headed to a meeting in Kuala Lumpur, Malaysia. En route, the passport of one, Khalid al-Midhar, who would later help fly American Airlines Flight 77 into the south face of the Pentagon, was copied by Dubai airport security and passed to Alec Station in Washington. Although it bore a multiple-entry visa for the United States that had been issued in Saudi Arabia, the CIA office did not inform the FBI that someone connected to al-Qaeda intended to travel to the United States. Amazingly, a pair of FBI agents assigned as liaisons to the bin Laden unit knew that two known terrorists were headed to the U.S. but were forbidden to relay this vital intelligence to their home agency, which was responsible for domestic terrorist threats.


pages: 267 words: 91,984

Strength in What Remains by Tracy Kidder


airport security, clean water, colonial rule

But they didn’t ask about coffee. How much money did he have? Two hundred dollars, Deo said with pride. The cash had been a gift from Jean. Exchanged for Burundian francs, it could have bought a lot of cows. But neither Muhammad nor the agents looked impressed. Where was he staying? Jean had told him he’d be asked this. A hotel, he said. The agents laughed. A week in a hotel on two hundred dollars? In 1994, airport security wasn’t what it soon would be. Muhammad said something in English to the agents. His words must have been the right ones, because after a few more questions, the agents shrugged at each other and let him through, into America. He had no idea what he’d do next. After six months on the run, he was in the habit of not looking ahead. God had taken care of him so far. And still was taking care of him, it seemed.


pages: 341 words: 111,525

Blood River: A Journey to Africa's Broken Heart by Tim Butcher


airport security, blood diamonds, clean water, colonial exploitation, colonial rule, discovery of the americas, European colonialism, failed state, Livingstone, I presume, Scramble for Africa, transatlantic slave trade, transatlantic slave trade

The city below us is home to nine million people, but from the air it seemed as small as a riverside village next to the vast expanse of water. I tried to imagine how Stanley felt when, at the end of his threeyear-long journey, he reached this sea-like stretch. My own feelings were perfectly clear as I reached the scruffy arrivals hall at the airport. I was terrified. I can still picture the pudgy face of the airport security official as he spotted a Ugandan visa in my passport. Like the reels of a slot-machine shuddering to a jackpot, his pupils flickered both with suspicion and greed. Uganda was still at war with the Kabila regime and, seeing that I had been there only a few months earlier, the official started whispering to his boss. The only word I could make out was espion, spy, but it was enough to make my heart stand still.


pages: 309 words: 95,495

Foolproof: Why Safety Can Be Dangerous and How Danger Makes Us Safe by Greg Ip


Affordable Care Act / Obamacare, Air France Flight 447, air freight, airport security, Asian financial crisis, bank run, banking crisis, Bretton Woods, capital controls, central bank independence, cloud computing, collateralized debt obligation, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, currency peg, Daniel Kahneman / Amos Tversky, diversified portfolio, endowment effect, Exxon Valdez, financial deregulation, financial innovation, Financial Instability Hypothesis, floating exchange rates, full employment, global supply chain, hindsight bias, Hyman Minsky, Joseph Schumpeter, Kenneth Rogoff, London Whale, Long Term Capital Management, market bubble, moral hazard, Network effects, new economy, offshore financial centre, paradox of thrift,, Ponzi scheme, quantitative easing, Ralph Nader, Richard Thaler, risk tolerance, Ronald Reagan, savings glut, technology bubble, The Great Moderation, too big to fail, transaction costs, union organizing, Unsafe at Any Speed, value at risk

To date, the FAA has remained steadfast in its refusal to require child seats, even while recommending that parents use them. How long it will hold out is anyone’s guess; advocates, including the NTSB and Lohr, continue to press for the change. While cost-benefit analysis won in that instance, it has not in another. After 9/11, a new federal agency, the Transportation Security Administration, was created to take over airport security screening from private companies. Passengers must submit to full body scans, surrender their pocket knives, remove their shoes, surrender liquids, and sometimes miss their flight if they’re unfortunate enough to share the name of someone on the terrorist watch list. The cost is staggering. Beyond the $5.60 per trip direct fee, one study put the value of added travel time due to security at $25 billion in 2005.


pages: 349 words: 95,972

Messy: The Power of Disorder to Transform Our Lives by Tim Harford


affirmative action, Air France Flight 447, Airbnb, airport security, Albert Einstein, Amazon Mechanical Turk, Amazon Web Services, Atul Gawande, autonomous vehicles, banking crisis, Barry Marshall: ulcers, Basel III, Berlin Wall, British Empire, Broken windows theory, call centre, Cass Sunstein, Chris Urmson, cloud computing, collateralized debt obligation, crowdsourcing, deindustrialization, Donald Trump, Erdős number, experimental subject, Filter Bubble, Frank Gehry, game design, global supply chain, Googley, Guggenheim Bilbao, high net worth, income inequality, Internet of things, Jane Jacobs, Jeff Bezos, Loebner Prize, Louis Pasteur, Mark Zuckerberg, Menlo Park, Paul Erdős, Richard Thaler, Rosa Parks, self-driving car, side project, Silicon Valley, Silicon Valley startup, Skype, Steve Jobs, Steven Levy, Stewart Brand, telemarketer, the built environment, The Death and Life of Great American Cities, Turing test, urban decay

Brown his tidy desk, which back in June could barely be seen for all the clutter, he admits. When asked for a peek inside his drawers, Mr. Scovie tried to steer the conversation to the placement of a desk blocking his access to some filing cabinets. Pressed, Mr. Scovie reluctantly agreed to open his drawers, one of which he warned was “really nasty.”9 The humiliation is palpable. The description evokes a parent nagging a child to tidy her room, or airport security patting down a suspected hijacker. One perfectly competent employee is being harassed by another perfectly competent employee to satisfy the pointless demands of a company rule book. Haslam and Knight carried out the most explicit test of the importance of giving workers freedom to control their workspace, but other researchers have also pointed in that direction. In one study, NASA sent marine biologists to work for weeks on end in a tiny undersea lab—a truly tough environment, but the biologists loved it.


pages: 459 words: 109,490

Merchant of Death: Money, Guns, Planes, and the Man Who Makes War Possible by Stephen Braun, Douglas Farah


air freight, airport security, anti-communist, Berlin Wall, blood diamonds, Donald Trump,, failed state, offshore financial centre, plutocrats, Plutocrats, private military company

Russian and Arab ground crews hefted off heavy pallets stacked high with appliances, construction materials, and military equipment. “The only reason to be in Sharjah was smuggling,” the senior Ariana executive said. “In Sharjah, it was anything goes.”13 Inspection was lax and regulations easily skirted. Planes regularly landed and took off at late hours. Ground crews were adept at whisking cargos on and off in the enveloping early-morning darkness without interference from airport security men. Abdul Shakur Arefee, an Ariana flight engineer who flew frequently through Sharjah in the late 1990s, watched puzzled as arriving planes taxied off to dimly lit nooks, where ground crews hustled shipments on and off without interference from airport inspectors. “In Dubai, all the cargo would have to be taken off near the gates. No exceptions,” Arefee recalled. “But in Sharjah, there was not too much tight security.


pages: 344 words: 93,858

The Post-American World: Release 2.0 by Fareed Zakaria


affirmative action, agricultural Revolution, airport security, anti-communist, Asian financial crisis, battle of ideas, Berlin Wall, Bretton Woods, BRICs, British Empire, call centre, capital controls, central bank independence, conceptual framework, Credit Default Swap, currency manipulation / currency intervention, delayed gratification, Deng Xiaoping, double entry bookkeeping, failed state, Fall of the Berlin Wall, financial innovation, global reserve currency, global supply chain, illegal immigration, interest rate derivative, knowledge economy, Mahatma Gandhi, Martin Wolf, mutually assured destruction, new economy, oil shock, open economy, postindustrial economy, purchasing power parity, race to the bottom, reserve currency, Ronald Reagan, Silicon Valley, Silicon Valley startup, South China Sea, Steven Pinker, The Great Moderation, Thomas L Friedman, Thomas Malthus, trade route, Washington Consensus, working-age population, young professional

Index Abrahamic religions, 122, 171, 172 Abu Sayyaf, 11 Abyssinia, 195 Academy of Science, 211 Acheson, Dean, 255, 256 Acquaviva, Claudio, 124 Adams, James Truslow, 237 affirmative action, 109 Afghanistan, 13, 15, 54, 101, 172, 185, 199, 235–36, 241, 247, 260, 277, 284 Afghan War, 13, 241, 247, 260 Africa: agriculture in, 70 Chinese influence in, 129–32, 270 Christian population of, 98 colonization of, 65, 79, 80, 129, 156 corruption in, 130–32 economies of, 21n, 40, 68, 129, 130, 242–43 geography of, 77 instability of, 12–13, 20, 29, 40, 65, 68 national debts of, 130 natural resources of, 129 North, 12–13, 20, 80 slaves from, 79 sub-Saharan, 80 U.S. influence in, 270–71, 273 see also specific countries AFRICOM, 270–71 Aggarwal, Anil, 155 aging populations, 214–15 agriculture, 21, 30, 31, 32–33, 65–67, 70, 71–72, 100, 106, 112, 136, 151, 160 Agtmael, Antoine van, 2 Ahmadinejad, Mahmoud, 16, 55 AIDS, 149, 161 AIG, 43–44 air conditioners, 102 air pollution, 111 airport security, 280 Akbar, 75 Al-Azhar University, 15 Albright, Madeleine, 246 Alembert, Jean Le Rond d’, 123 alerts, terrorist, 277 algebra, 67 Algeria, 13 algorithm, 67 Al-Jabr wa-al-Muqabilah, 67 Al Jazeera, 96 al-Khwarizmi, 67 Al Qaeda, 5, 10–18, 172, 248n, 270, 277 Ambrose, Stephen, 37 American dream, 237 American Enterprise Institute, 213 Amery, Leo, 193 Amsterdam, 67 Anglo-Chinese Wars, 81 Angola, 284 Annan, Kofi, 272 anti-Americanism, 13, 35, 39, 42, 60, 166, 241, 245, 251–55, 274, 283 Apple, Inc., 203 Arab culture, 67, 75, 76, 77, 80, 98 Arab-Israeli conflict, 6, 96, 246 arbitrage, 27 architecture, 95, 98, 103, 105, 152 Argentina, 3, 26, 55, 115 Armenia, 209 Arnold, Thomas, 187 Arroyo, Gloria, 133 art, modern, 95 ash-Sheikh, Abdulaziz al, 15 Asia: agriculture in, 70 Chinese influence in, 132–36, 143, 173, 176–77, 259, 267, 281 colonization of, 79, 80–82, 156 demographics of, 214–15 East, 20, 23, 29, 32, 36, 52, 64n, 65, 122, 133, 214, 241–42, 245 economies of, 52, 75, 138, 151–52, 221 education in, 208–12 financial markets of, 221–22 geography of, 76 global influence of, 245, 257, 259 India’s influence in, 151–52, 173, 181 manufacturing sector of, 202–3 South, 21n, 52, 60 technology sector of, 200–208 U.S. influence in, 90, 241–42, 245, 259–60, 266, 267, 273–74, 280–81 Western influence in, 90, 93, 99 see also specific countries “Asian Tigers,” 26 assets, 219 Association of Southeast Asian Nations (ASEAN), 132, 133 Atatürk, Kemal, 84 Australia, 78, 132, 143, 196, 252, 266 Austria, 223 automobile industry, 33, 110, 149, 192, 205, 225, 229–30, 244 Autor, David, 231 Bacon, Francis, 86 bailouts, 43, 44 Baker, James A., III, 39, 244 Bakiyev, Kurmanbek, 54 balance of power, 79 Bali bombings (2002), 11, 17 Balkans, 20, 29, 117–18, 245, 246, 247 Bangalore, 50 Bangladesh, 60, 159, 281 Ban Ki-moon, 30 banking industry, 36, 43–45, 81, 106, 107, 109, 110, 127, 139, 153, 157 Barma, Naazneen, 38 Barnett, Correlli, 262 “Base Structure Report” (2006), 262 Bay of Pigs invasion (1961), 20 BBC, 96, 120 Bear Stearns, xi Beijing, 71, 103, 105, 111, 137, 150, 211 “Beijing Consensus, The” (Ramo), 142–43 Beijing Olympic Games (2008), 5, 103, 105, 137 Belgium, 41 Berlin, 103 Berlin Wall, 24 Beveridge Plan, 197 Bharatiya Janata Party (BJP), 158–59, 160, 178, 179–80 Bhutan, 166 Bialik, Carl, 205 Bible, 172 bicycles, 192 bin Laden, Osama, 12, 13, 14–15, 85, 269–70 biological weapons, 18 biotechnology, 201–2, 215 bipolar order, 4 Bismarck, Otto von, 198, 257, 266–67 Blackwill, Robert, 177 Blair, Tony, 274 Blinder, Alan, 230–31 Bloomberg, Michael, 220–21 “blue card,” 224 blue jeans, 88, 89, 91 Boer War, 188–90, 261 Bollywood, 90, 94, 147, 153–55 Bono, 272 Boorstin, Daniel, 69 Bosnia, 272 Brahmans, 74 “brain drain,” 167 brand names, 203 Brazil, xii, 2, 3–4, 19, 23, 26, 28–29, 39, 48, 49, 53, 55, 60, 79, 95, 98, 257, 258, 259, 263 Bretton Woods Conference (1944), 253 British East India Company, 60, 80, 82–83 British Empire, 36, 37, 57, 60, 65, 79, 80–83, 84, 89, 94, 97–98, 151, 154, 156, 158–59, 161, 162–63, 164, 170, 173, 179, 184–99, 237, 261–63, 266, 268 British Guiana, 194n broadband service, 28, 224–25 Brookings, Robert, 235 Brookings Institution, 235 Brzezinski, Zbigniew, 36 Buck, Pearl, 100 Buddhism, 124, 171, 172 budget deficits, 219, 241–42, 244 Buffett, Warren, 45–46 Bulgaria, 182 Burma, 79, 121, 264, 273 Burns, Ken, 37 Buruma, Ian, 187 Bush, George H.


pages: 307 words: 102,734

The Black Nile: One Man's Amazing Journey Through Peace and War on the World's Longest River by Dan Morrison


airport security, colonial rule, Khartoum Gordon, land reform, Mahatma Gandhi, Potemkin village, Silicon Valley

I sat at the back, stretched out my legs, then stood up and grabbed a set of acoustic earmuffs from a thin cord stretched across the cabin. The engine kicked on and thrummed for a moment, sending up nimbuses of dust before the chopper beetled on fat tires down the run-way and hauled us off the ground. The soldiers were tall and wiry, the fruit of India’s northern Hindu belt, most of them mustached, wearing pressed green camouflage uniforms. When I worked as a reporter in South Asia, I was often asked by Indian airport security officers: Where are you from? From America. But where were you from before that? The beard and black Easy Rider hair convinced the airport bulls I was some kind of Afghan or Arab. Now my interrogators’ army cousins were trapped in a metal can several hundred feet above the Nile, waiting, I imagined, for the unkempt stranger to scream “Allahu Akbar!” and light them up with an explosive satchel.


The Sum of All Fears by Tom Clancy


accounting loophole / creative accounting, airport security, Benoit Mandelbrot, British Empire, colonial exploitation, complexity theory, cuban missile crisis, demand response, financial independence, index card, mandelbrot fractal, trade route

Please." "Very well." Ryan let out a breath. "Okay. Tell him also that one of our people, a Mr Clark, will be at the airport security office in a few minutes. Mr Ambassador, I cannot emphasize enough how important this is. Please do it now." "I'll do it. You'd better calm down up there," the career foreign-service officer advised. "We're trying very hard, sir. Please have your secretary transfer me back to the Station Chief. Thank you." Ryan looked over to Goodley. "Just hit me over the fucking head if you feel the need, Ben." "Clark." "We're faxing some photos down, along with their names and seat assignments. Okay, you are to check in with the airport security boss before you grab 'em. You still have the airplane down there?" "Right." "When you have 'em, get 'em aboard, and get 'em the hell up here."


pages: 541 words: 146,445

Spin by Robert Charles Wilson


airport security, Colonization of Mars, invention of writing, invisible hand, John von Neumann, Mahatma Gandhi, megacity, oil shale / tar sands, rolodex, Stephen Hawking

* * * * * I drove Diane to Orlando the next day for her flight back to Phoenix. It had become obvious over the last few days that we would not discuss, mention, or allude in any way to the physical intimacy we had shared that night in the Berkshires before her marriage to Simon. If we acknowledged it at all it was only in the cumbersome detours we took to avoid it. When we hugged (chastely) in the space in front of the airport security gate she said, "I'll call you," and I knew she would—Diane made few promises but was scrupulous about keeping them—but I was equally conscious of the time that had passed since I had last seen her and the time that would inevitably pass before I saw her again: not Spin time, but something just as erosive and just as hungry. There were creases at the corners of her eyes and mouth, not unlike the ones I saw in the mirror every morning.


pages: 666 words: 131,148

Frommer's Seattle 2010 by Karl Samson


airport security, British Empire, Frank Gehry, glass ceiling, global village, haute cuisine, sustainable-tourism, transcontinental railway, urban sprawl

Also, note that many banks now assess a 1% to 3% “transaction fee” on all charges you incur abroad (whether you’re using the local currency or your native currency). 5 Health & Safety Staying Healthy What to Do if You Get Sick Away from Home If you suffer from a chronic illness, consult your doctor before your departure. Pack prescription medications in your carry-on luggage, and carry them in their original containers, with pharmacy labels—otherwise they won’t make it through airport security. Visitors from outside the U.S. should carry generic names of prescription drugs. For U.S. travelers, most reliable health-care plans provide coverage if you get sick away from home. Foreign visitors may have to pay all medical costs up front and be reimbursed later; see “Insurance” in the appendix . Additional emergency numbers are listed in the appendix . STAYING SAFE Although Seattle is a relatively safe city, it has its share of crime.


pages: 422 words: 119,439

Lunar Park by Bret Easton Ellis


airport security, McMansion, Ronald Reagan

Carrying out this plan was my only focus (I was not going to be waylaid by anything) and so by two o’clock on that Thursday afternoon I had already booked a flight and—after meeting with Marta at the hotel to explain that the house on Elsinore Lane was being fumigated and she would be staying with the children at the Four Seasons until I returned on Sunday—I was driving to the Midland Airport. While steering the Range Rover down the empty interstate, I called ICM and asked them to set up the meeting with Ford’s people for the following day since I was flying in that night and was leaving Sunday morning. Everything went so efficiently that it was almost as if I had willed it. There was no traffic, I was whisked through airport security, the plane left on schedule, it was a smooth flight and we landed before the estimated arrival time at Long Beach (since so much of LAX was under reconstruction). When I spoke to Jayne while driving down the 405 toward Sunset she was “glad” (which I interpreted as “relieved”) that I was doing this for myself. I had opted out on the Chateau Marmont since it was a haunt from the drug days and stayed at the Bel Air Hotel instead; it was close to the dinner party that the producer of the Harrison Ford project had invited me to when he heard I was coming to town, and also to my mother’s house in the Valley.


pages: 465 words: 124,074

Atomic Obsession: Nuclear Alarmism From Hiroshima to Al-Qaeda by John Mueller


airport security, Albert Einstein, Black Swan, Cass Sunstein, conceptual framework, cuban missile crisis, Doomsday Clock, energy security, failed state, mutually assured destruction, nuclear winter, oil shock, RAND corporation, Ronald Reagan, side project, Yom Kippur War

Deterrence, Arms Control, and Disarmament. Columbus, Ohio: Ohio State University Press. Slovic, Paul. 2000. “Perception of Risk from Radiation.” In The Perception of Risk, ed. Paul Slovic. London: Earthscan, 264–74. Smith, Derek D. 2006. Deterring America: Rogue States and the Proliferation of Weapons of Mass Destruction. Cambridge, UK: Cambridge University Press. Smith, Patrick. 2007. “The Airport Security Follies.” 28 December. Smith, R. Jeffrey, and David Hoffman. 1997. “No Support Found for Report of Lost Russian Suitcase-Sized Nuclear Weapons.” Washington Post 5 September: A19. Smoke, Richard. 1993. National Security and the Nuclear Dilemma: An Introduction to the American Experience in the Cold War. 3rd ed. New York: McGraw-Hill.


pages: 509 words: 147,998

The Geeks Shall Inherit the Earth: Popularity, Quirk Theory, and Why Outsiders Thrive After High School by Alexandra Robbins


airport security, Albert Einstein, game design, hive mind, Skype, Slavoj Žižek, Steve Jobs, Steve Wozniak, The Wisdom of Crowds, trickle-down economics

“Should I be concerned?” I asked. “I’m confident in myself that I have enough self-control, really,” Blue concluded. “Those [thoughts] are just really annoying.” The error in the evil-outcast theory is that it assumes that only social outcasts can develop into Columbine-like killers. Identifying the outcasts and tossing them out of schools is akin to singling out a Middle Eastern passenger for extra airport security screening, or stopping a driver because he’s Latino. Just because a kid listens to screamo doesn’t mean he’s angry. Just because she plays Warhammer doesn’t mean she’s violent. Just because her face is pierced doesn’t mean she’s disrespectful. Just because he wears all black doesn’t mean he’s sad. This practice is what I call outcast profiling. It is counterproductive, it is bad policy, and it is discriminatory.


pages: 260 words: 130,109

Frommer's Kauai by Jeanette Foster


airport security, Maui Hawaii, Skype, sustainable-tourism

But doublecheck; you may want to buy travel medical insurance instead. Bring your insurance ID card with you when you travel. We list hospitals and emergency numbers under “Fast Facts: Kauai,” in chapter 11. If you suffer from a chronic illness, consult your doctor before your departure. Pack prescription medications in your carry-on luggage, and carry them in their original containers, with pharmacy labels—otherwise they won’t make it through airport security. Visitors from outside the U.S. should carry generic names of prescription drugs. For U.S. travelers, most reliable healthcare plans provide coverage if you get sick away from home. Foreign visitors may have to pay all medical costs upfront and be reimbursed later. For information on medical insurance while traveling please visit www. We list additional emergency numbers in the “Fast Facts” p. 231. 6 SAFETY IT’S THE LAW Going bare in Hawaii is illegal and you can be arrested.


pages: 561 words: 114,843

Startup CEO: A Field Guide to Scaling Up Your Business, + Website by Matt Blumberg


airport security, Albert Einstein, bank run, Broken windows theory, crowdsourcing, fear of failure, high batting average, high net worth, hiring and firing, James Hargreaves, Jeff Bezos, job satisfaction, Kickstarter, knowledge economy, knowledge worker, Lean Startup, Mark Zuckerberg, minimum viable product, pattern recognition, performance metric,, rolodex, shareholder value, Silicon Valley, Skype

Some of the time that isn’t in a structured meeting invariably turns to brainstorming or more idle work chatter. Some great ideas have come out of flights I’ve taken in the past 13 years! Finally, my colleague and I get more social time than usual on a plane. Social time is an incredibly important part of managing and developing personal connections with employees. Time spent next to each other in the air, in an airport security line or lounge or in a rental car always lends itself to learning more about what’s going on in someone’s life. Don’t get me wrong: even when I travel with someone from Return Path, we each have some quiet time to read, work, sleep and contemplate life. The work and work-related aspects of the experience are not to be ignored. 3. Time for myself. You can see that I value staying fresh, which I do by a combination of taking time for myself and pursuing hobbies outside of work.


pages: 380 words: 118,675

The Everything Store: Jeff Bezos and the Age of Amazon by Brad Stone


3D printing, airport security, AltaVista, Amazon Mechanical Turk, Amazon Web Services, bank run, Bernie Madoff, big-box store, Black Swan, book scanning, Brewster Kahle, call centre, Clayton Christensen, cloud computing, crowdsourcing, cuban missile crisis, Douglas Hofstadter, Elon Musk, facts on the ground, game design, housing crisis, invention of movable type, inventory management, James Dyson, Jeff Bezos, Kevin Kelly, Kodak vs Instagram, late fees, loose coupling, low skilled workers, Maui Hawaii, Menlo Park, Network effects, new economy, optical character recognition,, Ponzi scheme, quantitative hedge fund, recommendation engine, Renaissance Technologies, RFID, Rodney Brooks, shareholder value, Silicon Valley, Silicon Valley startup, six sigma, skunkworks, Skype, statistical arbitrage, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, Thomas L Friedman, Tony Hsieh, Whole Earth Catalog, why are manhole covers round?

In other words, a customer was given five dollars just to buy something on the site. It was a clever but transparent ploy, an effort to inflict further pain on Zappos. Employees who worked on Endless say that, naturally, this was Jeff Bezos’s idea. Yet Zappos still continued to grow. Its 2007 gross sales hit $840 million and in 2008 it topped $1 billion. That year, Bezos learned that Zappos was advertising on the bottoms of the plastic bins at airport-security checkpoints. “They are outthinking us!” he snapped at a meeting. But inside Zappos, a big problem had emerged. It had been acquiring inventory with a revolving $100 million line of credit, and the financial crisis, which intensified with the collapse of Lehman Brothers in the fall of 2008, froze the capital markets. With consumer spending declining, Zappos’ inventory constrained by new borrowing limits, and the competition with Amazon cutting into the company’s profit margins, Zappos’ previously spectacular annual growth rate collapsed to a modest 10 percent.


pages: 478 words: 146,480

Pirate Cinema by Cory Doctorow


airport security, citation needed, Internet Archive, smart cities

Like any red-blooded English lad, I have seen approximately one million commando raids conducted with stopwatch precision, thanks to the all-popular military/terrorism thriller genre. I knew how to assemble the pieces: we needed cover, we needed countermeasures, we needed escape routes. Cover: The enemy had given this one to us. Ever since the cinemas had introduced mandatory metal-detectors and coat-checks for phones and computers, every film opening looks more like an airport security queue, with a long snake of bored, angry people shuffling slowly toward a couple of shaved-head thugs who'll grope them, run them through a metal detector, and take their phone and laptop and that off them, just in case they're one of the mythological screen-cappers. This is London. Where you have a queue of people with money, you have a small ecosystem of tramps, hawkers, and human spam delivery systems passing out brochures, cards, and loot-bags advertising cheap curry, dodgy minicabs, Chinese Tun-La massage (whatever that is), American pizza, Minneapolis Fried Chicken, strip clubs, and discount fashion outlets.


pages: 525 words: 116,295

The New Digital Age: Transforming Nations, Businesses, and Our Lives by Eric Schmidt, Jared Cohen


3D printing, access to a mobile phone, additive manufacturing, airport security, Amazon Mechanical Turk, Amazon Web Services, anti-communist, augmented reality, Ayatollah Khomeini, barriers to entry, bitcoin, borderless world, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, crowdsourcing, data acquisition, Dean Kamen, Elon Musk, failed state, fear of failure, Filter Bubble, Google Earth, Google Glasses, hive mind, income inequality, information trail, invention of the printing press, job automation, Julian Assange, Khan Academy, Kickstarter, knowledge economy, Law of Accelerating Returns, market fundamentalism, means of production, mobile money, mutually assured destruction, Naomi Klein, offshore financial centre, peer-to-peer lending, Peter Singer: altruism, Ray Kurzweil, RFID, self-driving car, sentiment analysis, Silicon Valley, Skype, Snapchat, social graph, speech recognition, Steve Jobs, Steven Pinker, Stewart Brand, The Wisdom of Crowds, upwardly mobile, Whole Earth Catalog, WikiLeaks, young professional, zero day

The most important form of data to collect for an autocrat isn’t Facebook posts or Twitter comments—it’s biometric information. “Biometric” refers to information that can be used to uniquely identify individuals through their physical and biological attributes. Fingerprinting, photographs and DNA testing are all familiar biometric data types today. Indeed, the next time you visit Singapore, you might be surprised to find that airport security requires both a filled-out customs form and a scan of your voice. In the future, voice-recognition and facial-recognition software will largely surpass all of these earlier forms in accuracy and use. The facial-recognition systems of today use a camera to zoom in on an individual’s eyes, mouth and nose, and extract a “feature vector,” which is a set of numbers that describes key aspects of the image, such as the precise distance between the eyes.


A Voyage Long and Strange: On the Trail of Vikings, Conquistadors, Lost Colonists, and Other Adventurers in Early America by Tony Horwitz


airport security, Atahualpa, back-to-the-land, Bartolomé de las Casas, Colonization of Mars, Columbian Exchange, dematerialisation, diversified portfolio, Francisco Pizarro, Hernando de Soto, illegal immigration, joint-stock company, Ralph Waldo Emerson, trade route, urban renewal

Arriving at twilight, I followed a trail into the palm grove shading the reenactors’ camp. The fest was a “Timeline” event, meaning that every era was represented, other than the present. I passed the tent of a Confederate doctor studying a jar of leeches, and another occupied by Revolutionary Minutemen. A World War II G.I. strode past, griping to a pirate about the difficulty of getting decommissioned grenades through airport security. Then I spotted a brawny, bearded man in a rough jersey, hacking at something by a low fire. “Are you by any chance a conquistador?” I asked. “No, sorry.” He held up a piece of flint he was honing. “I’m a paleo. The Spaniards are over near the Seminoles, I think.” I finally found Calderon’s Company sipping wine from period goblets, though not yet in conquistador attire. Tim Burke turned out to be an amiable middle-aged man with gentle eyes and a quick smile.


pages: 413 words: 119,587

Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots by John Markoff


A Declaration of the Independence of Cyberspace, AI winter, airport security, Apple II, artificial general intelligence, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Duvall, bioinformatics, Brewster Kahle, Burning Man, call centre, cellular automata, Chris Urmson, Claude Shannon: information theory, Clayton Christensen, clean water, cloud computing, collective bargaining, computer age, computer vision, crowdsourcing, DARPA: Urban Challenge, data acquisition, Dean Kamen, don't be evil, Douglas Engelbart, Douglas Hofstadter, Dynabook, Edward Snowden, Elon Musk, Erik Brynjolfsson, factory automation, future of work, Galaxy Zoo, Google Glasses, Google X / Alphabet X, Gödel, Escher, Bach, Hacker Ethic, haute couture, hive mind, hypertext link, industrial robot, information retrieval, Internet Archive, Internet of things, invention of the wheel, Jacques de Vaucanson, Jaron Lanier, Jeff Bezos, job automation, John Conway, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John von Neumann, Kevin Kelly, knowledge worker, Kodak vs Instagram, loose coupling, Mark Zuckerberg, Marshall McLuhan, medical residency, Menlo Park, Mother of all demos, natural language processing, new economy, PageRank, pattern recognition, pre–internet, RAND corporation, Ray Kurzweil, Richard Stallman, Robert Gordon, Rodney Brooks, Sand Hill Road, Second Machine Age, self-driving car, semantic web, shareholder value, side project, Silicon Valley, Silicon Valley startup, Singularitarianism, skunkworks, Skype, social software, speech recognition, stealth mode startup, Stephen Hawking, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, strong AI, superintelligent machines, technological singularity, Ted Nelson, telemarketer, telepresence, telepresence robot, Tenerife airport disaster, The Coming Technological Singularity, the medium is the message, Thorstein Veblen, Turing test, Vannevar Bush, Vernor Vinge, Watson beat the top human players on Jeopardy!, Whole Earth Catalog, William Shockley: the traitorous eight

In 1962 he had taken a job at Varian Associates, an early Silicon Valley firm making a range of magnetometers. His assignment was to find new applications for these instruments that could detect minute variations in the Earth’s magnetic field. Varian was the perfect match for Breiner’s 360-degree intelligence. For the first time highly sensitive magnetometers were becoming portable, and there was a willing market for clever new applications that would range from finding oil to airport security. Years later Breiner would become something of a high-tech Indiana Jones, using the technology to explore archaeological settings. In Breiner’s expert hands, Varian magnetometers would find avalanche victims, buried treasure, missing nuclear submarines, and even buried cities. Early on he conducted a field experiment from a site behind Stanford, where he measured the electromagnetic pulse (EMP) generated by a 1.4-megaton nuclear detonation 250 miles above the Earth.


pages: 366 words: 123,151

The Routes of Man: How Roads Are Changing the World and the Way We Live Today by Ted Conover


airport security, Atahualpa, carbon footprint, Deng Xiaoping, East Village, financial independence, Google Earth, megacity, mutually assured destruction, New Urbanism, nuclear winter, Ronald Reagan, transatlantic slave trade, transatlantic slave trade, urban planning, urban renewal

I was delighted and relieved, because the Lagos airport is an almost mythically awful place, notorious among travelers for shakedowns by officials, and also the only airport on earth about which the U.S. government had seen fit, at various times, to post signs in American airports alerting travelers that “the U.S. Secretary of Transportation has determined that Murtala Muhammed Airport, Lagos, Nigeria, does not maintain and carry out effective airport security measures.” I read the phrase again on a special page of my plane ticket, and was reminded to pass my arrival information on to Agbonifo so that he could tell Bill. No sooner had I said “airport” on the phone than Agbonifo told me to make sure I arrived in the morning, so that I wouldn’t have to drive into the city when it was dark: bandits prey on cars leaving the airport at night, he warned.


pages: 570 words: 158,139

Overbooked: The Exploding Business of Travel and Tourism by Elizabeth Becker


airport security, Asian financial crisis, barriers to entry, Berlin Wall, BRICs, car-free, carbon footprint, clean water, collective bargaining, colonial rule, computer age, corporate governance, Costa Concordia, Deng Xiaoping, European colonialism, Exxon Valdez, Fall of the Berlin Wall, Frank Gehry, global village, happiness index / gross national happiness, haute cuisine, Masdar, Murano, Venice glass, open borders, race to the bottom, Ralph Nader, Scramble for Africa, Silicon Valley, statistical model, sustainable-tourism, the market place, union organizing, urban renewal, wage slave, young professional, éminence grise

Mitt Romney is named after the elder Marriott, and he sat on the Marriott board of directors for ten years. With an industry that has elicited such extreme ideological views from the political parties—Republicans zeroing out a government role and erecting a border security system that has intimidated visitors, Democrats offering federal help and dialing down border hostility—the industry is taking no chances. After watching the cloud of fear lift around airport security and seeing their industry treated as an economic engine, Freeman, of the travel association, said his group wants this helpful attitude to continue. Already his staff has traveled to Boston to huddle with Romney’s campaign staff. “We have to be prepared if the Republicans win.” Obama won. • • • Las Vegas is a good vantage point for surveying the state of play of tourism in the United States after the rest of the world pulled ahead during that “lost decade” and with hopes pinned on a stronger role for the federal government.


pages: 547 words: 160,071

Underground by Suelette Dreyfus


airport security, invisible hand, Julian Assange, Loma Prieta earthquake, packet switching, pirate software, profit motive, RFC: Request For Comment, Ronald Reagan, Stephen Hawking, Steven Levy, urban decay, WikiLeaks, zero day

With the decade of war that followed, digital security dominated all else on the net. This decade of digital security dominance is now defining the nature of our freedoms. We can no longer walk down a street without being watched and there is snooping on virtually every transaction we engage in. There is an Orwellian eeriness to the now famous YouTube video of the plane passenger being groped by US airport security and saying ‘don’t touch my junk’ (private parts), while the airport loudspeaker’s recorded messaging plays in the background, ‘Security is everybody’s responsibility’. Yet few people have commented on how creepy this recording is juxtaposed with the innocent citizen being manhandled in the name of security.21 What if all our freedoms were slowly stolen away from us and we didn’t even notice it?


pages: 559 words: 155,372

Chaos Monkeys: Obscene Fortune and Random Failure in Silicon Valley by Antonio Garcia Martinez


Airbnb, airport security, Amazon Web Services, Burning Man, Celtic Tiger, centralized clearinghouse, cognitive dissonance, collective bargaining, corporate governance, Credit Default Swap, crowdsourcing, El Camino Real, Elon Musk, Emanuel Derman, financial independence, global supply chain, Goldman Sachs: Vampire Squid, hive mind, income inequality, interest rate swap, intermodal, Jeff Bezos, Malcom McLean invented shipping containers, Mark Zuckerberg, Maui Hawaii, means of production, Menlo Park, minimum viable product, move fast and break things, Network effects, Paul Graham, performance metric, Peter Thiel, Ponzi scheme, pre–internet, Ralph Waldo Emerson, random walk, Sand Hill Road, second-price auction, self-driving car, Silicon Valley, Silicon Valley startup, Skype, Snapchat, social graph, social web, Socratic dialogue, Steve Jobs, telemarketer, urban renewal, Y Combinator, éminence grise

The user interfaces were constantly improved to make the human reviewers’ tasks easier and more efficient, so that we wouldn’t need to hire more expensive humans. It was a terrible assignment for anybody who wanted to make his or her mark at Facebook, and it would take me months to scheme myself out of it. But before that, I had to appear as the face of this ads police department, one of the airport security lines at Facebook. Ads Review and Quality was officially part of Product and Engineering, but it worked for Sales and Operations, which was Sheryl’s grand fiefdom. Sheryl, of course, was much more than merely Zuck’s consigliera and the Ads team’s intercessor within the senior management stratum of the company. She was the able leader of this vast, multitiered organization, with an ever-shifting cast of names and titles spanning the geographically fragmented organization.


pages: 548 words: 147,919

How Everything Became War and the Military Became Everything: Tales From the Pentagon by Rosa Brooks


airport security, Albert Einstein, Berlin Wall, big-box store, clean water, cognitive dissonance, Edward Snowden, facts on the ground, failed state, illegal immigration, Internet Archive, Mark Zuckerberg, pattern recognition, Peace of Westphalia, RAND corporation, Silicon Valley, South China Sea, Turing test, War on Poverty, WikiLeaks

Would any of these means of exercising coercion fit into the traditional Clausewitzian understanding of “war” and “acts of violence”? Some of these technologies don’t yet exist, but the September 11 attacks made it clear that the fundamental changes described and predicted by Qiao Liang and Wang Xiangsui don’t lie off in some distant science-fiction future. As the nineteen al Qaeda plotters made their unimpeded way through American airport security, the era of unrestricted warfare was already well under way. We just didn’t know it yet. The U.S. response to the 9/11 attacks moved us still further into the era of unrestricted warfare. On September 10, 2001, President George W. Bush announced during a visit to a Florida elementary school that it was “time to wage war on illiteracy,”8 but no one expected that “war” to involve bullets or bloodshed.


pages: 527 words: 147,690

Terms of Service: Social Media and the Price of Constant Connection by Jacob Silverman


23andMe, 4chan, A Declaration of the Independence of Cyberspace, Airbnb, airport security, Amazon Mechanical Turk, augmented reality, Brian Krebs, California gold rush, call centre, cloud computing, cognitive dissonance, correlation does not imply causation, Credit Default Swap, crowdsourcing, don't be evil, Edward Snowden, feminist movement, Filter Bubble, Firefox, Flash crash, game design, global village, Google Chrome, Google Glasses, hive mind, income inequality, informal economy, information retrieval, Internet of things, Jaron Lanier, jimmy wales, Kevin Kelly, Kickstarter, knowledge economy, knowledge worker, late capitalism, license plate recognition, life extension, Lyft, Mark Zuckerberg, Marshall McLuhan, meta-analysis, Minecraft, move fast and break things, national security letter, Network effects, new economy, Nicholas Carr, Occupy movement, optical character recognition, payday loans, Peter Thiel, postindustrial economy, prediction markets, pre–internet, price discrimination, price stability, profit motive, quantitative hedge fund, race to the bottom, Ray Kurzweil, recommendation engine, RFID, ride hailing / ride sharing, self-driving car, sentiment analysis, shareholder value, sharing economy, Silicon Valley, Silicon Valley ideology, Snapchat, social graph, social web, sorting algorithm, Steve Ballmer, Steve Jobs, Steven Levy, TaskRabbit, technoutopianism, telemarketer, transportation-network company, Turing test, Uber and Lyft, Uber for X, universal basic income, unpaid internship, women in the workforce, Y Combinator, Zipcar

No matter the case, Rudder was unruffled about the ethical consequences of manipulating people into believing they should date each other. As he blithely explained, “Guess what, everybody: if you use the Internet, you’re the subject of hundreds of experiments at any given time, on every site. That’s how Web sites work.” Rudder is correct on the facts if not the ethics. This kind of algorithmic experimentation is indeed widespread. And it’s not only culture and social life that are being subjected to this process. Whether in airport security lines or on e-commerce sites, our data is being run through the decision-making mill. We are judged on the basis of our personal data and our social-media presence, with little opportunity to dispute its accuracy or confront a real human being. Like demographic, medical, or credit data, information gleaned from social media is increasingly being taken up with the promise that it can tell companies and governments about who people are and predict their actions.


pages: 494 words: 132,975

Keynes Hayek: The Clash That Defined Modern Economics by Nicholas Wapshott


airport security, banking crisis, Bretton Woods, British Empire, collective bargaining, complexity theory, cuban missile crisis, Francis Fukuyama: the end of history, full employment, Gordon Gekko, greed is good, if you build it, they will come, Joseph Schumpeter, liquidationism / Banker’s doctrine / the Treasury view, means of production, mortgage debt, New Journalism, Northern Rock, price mechanism, pushing on a string, road to serfdom, Ronald Reagan, The Chicago School, The Great Moderation, The Wealth of Nations by Adam Smith, Thomas Malthus, trickle-down economics, War on Poverty, Yom Kippur War

Al Qaeda leader Osama bin Laden’s stated aim was to bankrupt America through terror, just as, he claimed, he had bankrupted the Soviet Union for occupying Afghanistan. Bush met this threat with a large Keynesian stimulus. After a meeting between Greenspan, former Clinton Treasury secretary Rubin, Bush adviser Larry Lindsey, and congressional leaders, massive new federal spending was swiftly approved. Expenditures to strengthen America’s borders, such as tightening airport security, were accompanied by pork barrel projects, such as the building of fire stations in Maine, that had nothing to do with keeping America safe. Greenspan reduced interest rates to 1 percent to pump money into the economy fast, the prospect of the resulting inflation considered far preferable to a terrorist-inspired slump. Yet these Keynesian measures to bolster the economy did not appear to work.


pages: 436 words: 125,809

The Way of the Gun: A Bloody Journey Into the World of Firearms by Iain Overton


air freight, airport security, back-to-the-land, British Empire, Chelsea Manning, clean water, David Attenborough, Etonian, gender pay gap, gun show loophole, illegal immigration, interchangeable parts, Julian Assange, knowledge economy, Louis Pasteur, Mahatma Gandhi, More Guns, Less Crime, offshore financial centre, Ronald Reagan, Y2K, Yom Kippur War

On one patch some central European teenagers were sunbathing. A man sat on another, slowly unwrapping a silver-foiled sandwich. Here was peace. A thought struck me: despite the inalienable right to own a gun in the US, you cannot go to this emblem of America armed. Liberty Island is a federal property, and National Park rulings ban all weapons. Tourists join long, slow queues on the New York shore and are herded through airport security scanners to make sure no guns are brought here. This has created an island that has virtually no crime. The United States Park Police were unequivocal: ‘We located no statistics of any firearms incident on the Statue of Liberty National Monument from 2000 to the present.’ This, despite about 20 million visitors travelling there over that time. It was possibly the safest public space in the world.


The White Man's Burden: Why the West's Efforts to Aid the Rest Have Done So Much Ill and So Little Good by William Easterly


airport security, anti-communist, Asian financial crisis, bank run, banking crisis, Bretton Woods, British Empire, call centre, clean water, colonial exploitation, colonial rule, Edward Glaeser, European colonialism, failed state, farmers can use mobile phones to check market prices, George Akerlof, Hernando de Soto, income inequality, income per capita, Indoor air pollution, invisible hand, Kenneth Rogoff, laissez-faire capitalism, land reform, land tenure, microcredit, moral hazard, Naomi Klein, purchasing power parity, randomized controlled trial, Ronald Reagan, Scramble for Africa, the scientific method, The Wealth of Nations by Adam Smith, transaction costs, War on Poverty, Xiaogang Anhui farmers

If you do buy a gun, I can at least defend my property against you. So buying a gun is always my best move; the same holds for you, and so we both wind up with less money than if we had both been peaceful. In terms of game theory, this game is the classic prisoner’s dilemma. This assumes that buying guns is legal. In the United States, where you can buy assault weapons on the airport highway but where airport security scrutinizes your nail clippers, this may be a good assumption. One way to avoid the predators’ equilibrium is to allow only honest policemen to have guns. But predation doesn’t happen as often as this theory predicts, even without a policeman looking over your shoulder. Many opportunities for pilfering go unrealized. The social norm that stealing is disgraceful is a sanction against predation.


pages: 795 words: 212,447

Dead or Alive by Tom Clancy, Grant (CON) Blackwood


affirmative action, air freight, airport security, Bay Area Rapid Transit, Benoit Mandelbrot, defense in depth, failed state, friendly fire, Google Earth, Panamax, post-Panamax, Skype, urban sprawl

In a world where two or more heads were in fact better than one at problem solving, The Campus was alone. “I’m afraid not, Jack,” Bell replied. “Well, unless this Hadi’s on someone’s list by accident or the e-mail itself is innocuous, I’d say we’re looking at a courier.” While not the fastest means of communication, couriers were the most secure. Encrypted data and messages, easily hidden in a document or on a CD-ROM, aren’t something airport security folks were trained to ferret out. Unless you had a courier’s identity—which they might now have—the bad guys could be planning the end of the world and the good guys would never know it. “Agreed,” Jack said. “Unless he’s working for National Geographic, there’s something there. He’s operational or he’s playing support.” The kid thought operationally, and that, too, was not a bad characteristic, Rick Bell thought to himself.


pages: 389 words: 210,632

Frommer's Oregon by Karl Samson


airport security, Burning Man, carbon footprint, Frank Gehry, glass ceiling, haute cuisine, sustainable-tourism, transcontinental railway, upwardly mobile, urban renewal, urban sprawl, Works Progress Administration

I list hospitals and emergency numbers in chapter 5 under “Fast Facts.” Additional 06_537718-ch03.indd 34 emergency numbers are listed in chapter 13. If you suffer from a chronic illness, consult your doctor before your departure. 3/17/10 2:04 PM Pack prescription medications in your carry-on luggage, and carry them in their original containers, with pharmacy labels—otherwise they may not make it through airport security. Visitors from outside the U.S. should carry generic names of prescription drugs. For U.S. travelers, most reliable healthcare plans provide coverage if you get sick away from home. Foreign visitors may have to pay all medical costs up front and be reimbursed later; see “Fast Facts: Oregon” (p. 361). We also list additional emergency numbers in chapter 13, “Fast Facts.” 35 6 SAFETY public parks at night.


pages: 645 words: 184,311

American Gods by Neil Gaiman


airport security, book scanning, Brownian motion, Golden Gate Park

He told her it might not be valid as a driver's license, but it sure as hell was fine identification, and damn it, who else did she think he was, if he wasn't him? She said she'd thank him to keep his voice down. He told her to give him a fucking boarding pass, or she was going to regret it, and that he wasn't going to be disrespected. You don't let people disrespect you in prison. Then she pressed a button, and a few moments later the airport security showed up, and they tried to persuade Johnnie Larch to leave the airport quietly, and he did not wish to leave, and there was something of an altercation. The upshot of it all was that Johnnie Larch never actually made it to Seattle, and he spent the next couple of days in town in bars, and when his one hundred dollars was gone he held up a gas station with a toy gun for money to keep drinking, and the police finally picked him up for pissing in the street.


Frommer's San Diego 2011 by Mark Hiss


airport security, California gold rush, car-free, desegregation, Donald Trump, East Village, El Camino Real, glass ceiling, New Journalism, Skype, South of Market, San Francisco, sustainable-tourism, transcontinental railway, urban renewal, Works Progress Administration

. (&  858/657-7000), has a good emergency room, and you’ll find another in Coronado, at Sharp Coronado Hospital, 250 Prospect Place (& 619/522-3600), opposite the Marriott Resort. If you suffer from a chronic illness, consult your doctor before your departure. Pack prescription medications in your carry-on luggage, and carry them in their original containers, with pharmacy labels—otherwise they won’t make it through airport security. Visitors from outside the U.S. should carry generic names of prescription drugs. Medications are readily available throughout San Diego at various chain drugstores such as Walgreens, Rite-Aid, and CVS, which sell pharmaceuticals and nonprescription products. Some branches are open 24 hours (p.  290). Local hospitals also sell prescription drugs. For U.S. travelers, most reliable healthcare plans provide coverage if you get sick away from home.


pages: 603 words: 182,781

Aerotropolis by John D. Kasarda, Greg Lindsay


3D printing, air freight, airline deregulation, airport security, Akira Okazaki, Asian financial crisis, back-to-the-land, barriers to entry, Berlin Wall, big-box store, blood diamonds, borderless world, British Empire, call centre, carbon footprint, Clayton Christensen, cleantech, cognitive dissonance, conceptual framework, credit crunch, David Brooks, David Ricardo: comparative advantage, Deng Xiaoping, edge city, Edward Glaeser, failed state, food miles, Frank Gehry, fudge factor, full employment, future of work, Geoffrey West, Santa Fe Institute, George Gilder, global supply chain, global village, Haber-Bosch Process, Hernando de Soto, hive mind, if you build it, they will come, illegal immigration, inflight wifi, interchangeable parts, intermodal, invention of the telephone, inventory management, invisible hand, Jane Jacobs, Jeff Bezos, Kangaroo Route, knowledge worker, kremlinology, labour mobility, Marshall McLuhan, Masdar, McMansion, megacity, Menlo Park, microcredit, Network effects, new economy, New Urbanism, oil shale / tar sands, oil shock, peak oil, Peter Thiel,, pink-collar, pre–internet, RFID, Richard Florida, Ronald Reagan, savings glut, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart grid, South China Sea, South Sea Bubble, special economic zone, spice trade, spinning jenny, stem cell, Steve Jobs, supply-chain management, sustainable-tourism, telepresence, the built environment, The Chicago School, The Death and Life of Great American Cities, The Nature of the Firm, thinkpad, Thomas L Friedman, Thomas Malthus, Tony Hsieh, trade route, transcontinental railway, transit-oriented development, traveling salesman, trickle-down economics, upwardly mobile, urban planning, urban renewal, urban sprawl, walkable city, white flight

Down the aisle, an older man offered a second opinion. A professor on his way to see colleagues in Changsha, he’s been making this monthly trip for twenty years. What was it like when he started? “It was very un-derserved,” he replied. “Less passengers, less flights, and the planes were terrible. It’s better now, but with so many people flying, it takes more time to get on, and it’s more troublesome to get through the airport— security is that much stricter. But this is still better than anything in the States, where you have to pay for everything you eat.” He assumed the Chinese would ruin flying just as the Americans had. “More and more will fly, and we’ll have to bear it. There will only be more competition, and things will get worse.” As China will discover, both men are right. Window on the World Final approach to Changsha skims miles of rice paddies and ramshackle farmhouses, giving way to warehouses and hangars only at the last seconds.


pages: 552 words: 168,518

MacroWikinomics: Rebooting Business and the World by Don Tapscott, Anthony D. Williams


accounting loophole / creative accounting, airport security, Andrew Keen, augmented reality, Ayatollah Khomeini, barriers to entry, bioinformatics, Bretton Woods, business process, car-free, carbon footprint, citizen journalism, Clayton Christensen, clean water, Climategate, Climatic Research Unit, cloud computing, collaborative editing, collateralized debt obligation, colonial rule, corporate governance, corporate social responsibility, crowdsourcing, demographic transition, distributed generation, don't be evil,, energy security, energy transition, Exxon Valdez, failed state, financial innovation, Galaxy Zoo, game design, global village, Google Earth, Hans Rosling, hive mind, Home mortgage interest deduction, interchangeable parts, Internet of things, invention of movable type, James Watt: steam engine, Jaron Lanier, jimmy wales, Joseph Schumpeter, Julian Assange, Kevin Kelly, knowledge economy, knowledge worker, Marshall McLuhan, medical bankruptcy, megacity, mortgage tax deduction, Netflix Prize, new economy, Nicholas Carr, oil shock, online collectivism, open borders, open economy, pattern recognition, peer-to-peer lending, Ray Kurzweil, RFID, ride hailing / ride sharing, Ronald Reagan, scientific mainstream, shareholder value, Silicon Valley, Skype, smart grid, smart meter, social graph, social web, software patent, Steve Jobs, text mining, the scientific method, The Wisdom of Crowds, transaction costs, transfer pricing, University of East Anglia, urban sprawl, value at risk, WikiLeaks, X Prize, young professional, Zipcar

Jacob Colker and his business partner Ben Rigby found, for example, that it’s not that people don’t have any time, it’s that they don’t have large chunks available to commit to larger tasks. “It’s important to remember that as much as we don’t think we have the time to volunteer,” says Colker, “we spend 9 billion hours a year playing solitaire.” Apparently, Americans spend 4.6 hours a week playing video games, 51 minutes riding public transportation to and from work every day, 18 minutes in an airport security lane, and half an hour on average standing in line at the post office.17 Colker and Rigby reckoned that all of this spare time could be harnessed and given a social purpose. So they designed The Extraordinaries, a micro-volunteering platform that allows supporters to use their mobile phone to transform their spare time into social action. For example, someone with foreign language skills can help translate a nonprofit’s Web site into another language, or someone with a passion for birds can help the Cornell Lab of Ornithology identify species in archived photographs.


pages: 836 words: 158,284

The 4-Hour Body: An Uncommon Guide to Rapid Fat-Loss, Incredible Sex, and Becoming Superhuman by Timothy Ferriss


23andMe, airport security, Albert Einstein, Black Swan, Buckminster Fuller, carbon footprint, cognitive dissonance, correlation does not imply causation, Dean Kamen, game design, index card, Kevin Kelly, knowledge economy, life extension, Mahatma Gandhi, p-value, Paul Buchheit, placebo effect, Productivity paradox, Ralph Waldo Emerson, Ray Kurzweil, Silicon Valley, Silicon Valley startup, Skype, stem cell, Steve Jobs, Thorstein Veblen, wage slave, William of Occam

Glucose Buddy ( Glucose Buddy is a free iPhone app for diabetics that allows you to manually enter and track glucose numbers, carbohydrate consumption, insulin dosages, and activities. Juliet Mae Fine Spices & Herbs ( This is where you can buy Juliet Mae’s delicious cinnamon. I used her sampler for all testing, which includes Cassia, Ceylon, and Saigon cinnamon. MiR 50-Lb. Short Adjustable Weighted Vest ( The best weighted vests in the business. This is what I almost wore through airport security. If you want a rifle butt in the head at customs, it’s the perfect choice. End of Chapter Notes 22. Technically, interstitial fluid levels, from which the blood glucose is extrapolated. 23. GL = (GI x amount of carbohydrate in grams)/100. 24. I was looking at artificially creating food allergies and then removing them, an experiment that didn’t make it into this book. 25. If you’re ever in Mill Valley, California, go to Small Shed Flatbreads and get this dish. 26.


Frommer's Egypt by Matthew Carrington


airport security, colonial rule, Internet Archive, land tenure, Maui Hawaii, open economy, rolodex, sustainable-tourism, trade route, urban planning, urban sprawl, walkable city, Yom Kippur War

The European Health Insurance Card replaces the E111 form, which is no longer valid. For advice, ask at your local post office or see If you suffer from a chronic illness, consult your doctor before your departure. Pack prescription medications in your carry-on luggage, and carry them in their original containers with pharmacy labels—otherwise they won’t make it through airport security. Carry the generic name of prescription medicines in case a local pharmacist is unfamiliar with the brand name. Try to avoid buying prescription drugs in Egypt (even if they are dramatically cheaper than back home), as the quality control of drug production is not guaranteed. SAFETY S TAY I N G S A F E One of the enormous advantages that Egypt offers visitors is that it is generally very safe when it comes to petty crime.


pages: 604 words: 177,329

The Looming Tower: Al-Qaeda and the Road to 9/11 by Lawrence Wright


airport security, anti-communist, Ayatollah Khomeini, Berlin Wall, British Empire, Fall of the Berlin Wall, invisible hand, Khyber Pass, lone genius, Mahatma Gandhi, rolodex, Silicon Valley, urban planning, Y2K, Yom Kippur War

Inspired by Ramzi Yousef’s attack on the World Trade Center, Mohammed joined his nephew for a month in the Philippines in 1994. They came up with an extraordinary plan to bomb twelve American jumbo jets over the Pacific. They called it Operation “Bojinka”—a nonsense word that Mohammed had picked up when fighting in Afghanistan. Ramzi Yousef, the master bomb-maker, had perfected a small nitroglycerine device that was undetectable by airport security. He tested it out on a flight from Manila to Tokyo. Yousef got off the flight in Cebu, a city on one of the central islands of the Philippine archipelago. The passenger who took his seat was Haruki Ikegami, a twenty-four-year-old Japanese engineer. Two hours later, the bomb under Ikegami’s seat detonated, tearing him apart and nearly bringing the aircraft down. The assault that Yousef and Mohammed were planning would bring international air travel to a complete standstill.


pages: 812 words: 180,057

The Generals: American Military Command From World War II to Today by Thomas E. Ricks


affirmative action, airport security, amateurs talk tactics, professionals talk logistics, cuban missile crisis, hiring and firing, RAND corporation, Ronald Reagan, South China Sea, Yom Kippur War

The post-Vietnam Army was created in large part by Creighton Abrams, William DePuy, Donn Starry, Maxwell Thurman, and Paul Gorman, but even their far-reaching influence is fading. It did not become the Army of David Petraeus—but nor is it, thankfully, the Army of Tommy R. Franks. Today’s Army is deeply strained, having fought for more than ten years since 9/11, with soldiers serving multiple combat tours while 99 percent of the American population has been asked to sacrifice nothing except its time and privacy when going through airport security checkpoints. Now the Army and the other services are facing a decade or more of budget cuts. The Army will be shaped by young officers, likely veterans of Iraq and Afghanistan, who in the coming years will rise to command the force. What would George Marshall do if he could come back and fix things? First, I think that he would instruct his senior generals in how to interact with civilian leadership.


The Cardinal of the Kremlin by Tom Clancy


airport security, cuban missile crisis, invisible hand, mutually assured destruction, Stephen Hawking

We're working to fix the problem. Please stand by. Will advise. Out." Colonel von Eich checked the clock in his instrument panel. Thirty more minutes to the coast, "What?" Major Zarudin asked. "Who got on the airplane?" "Chairman Gerasimov and an arrested enemy spy," Vatutin said. "On an American airplane? You tell me that the Chairman is defecting on an American airplane!" The officer commanding the airport security detail had taken charge of the situation, as his orders allowed him to do. He found that he had two colonels, a lieutenant colonel, a driver, and an American in the office he used here-along with the craziest damned story he'd ever heard. "I must call for instructions." "I am senior to you!" Golovko said. "You are not senior to my commander!" Zarudin pointed out as he reached for the phone.


pages: 598 words: 169,194

Bernie Madoff, the Wizard of Lies: Inside the Infamous $65 Billion Swindle by Diana B. Henriques


accounting loophole / creative accounting, airport security, Albert Einstein, banking crisis, Bernie Madoff, Bernie Madoff, British Empire, centralized clearinghouse, diversified portfolio, Donald Trump, dumpster diving, financial deregulation, forensic accounting, Gordon Gekko, index fund, locking in a profit, mail merge, merger arbitrage, plutocrats, Plutocrats, Ponzi scheme, Potemkin village, random walk, Renaissance Technologies, riskless arbitrage, Ronald Reagan, short selling, Small Order Execution System, too big to fail, transaction costs, traveling salesman

He could never have stood it—keeping a secret like that would have torn him apart.” Neither he nor his brother, Andrew, had spoken to their parents since the day of their father’s arrest. Still, Mark’s estrangement from his gilded past seemed to cut deeper than his brother’s. Within a short time, Andrew was unfazed by the inevitable raised eyebrows of waiters looking at his credit card and airport security guards examining his driving licence; yes, he would shrug, he was that Andrew Madoff. He told friends he had never met anything but courteous sympathy. But Mark did not seem willing to risk the ill will of strangers; he had agreed with his wife’s decision to change her own and their children’s last name from Madoff to Morgan. “He had always been so proud of his name and being the guy who was Bernie Madoff’s son,” another friend recalled.


pages: 903 words: 235,753

The Stack: On Software and Sovereignty by Benjamin H. Bratton


1960s counterculture, 3D printing, 4chan, Ada Lovelace, additive manufacturing, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic trading, Amazon Mechanical Turk, Amazon Web Services, augmented reality, autonomous vehicles, Berlin Wall, bioinformatics, bitcoin, blockchain, Buckminster Fuller, Burning Man, call centre, carbon footprint, carbon-based life, Cass Sunstein, clean water, cloud computing, connected car, corporate governance, crowdsourcing, cryptocurrency, dark matter, David Graeber, deglobalization, dematerialisation, disintermediation, distributed generation, don't be evil, Douglas Engelbart, Edward Snowden, Elon Musk,, Eratosthenes, ethereum blockchain, facts on the ground, Flash crash, Frank Gehry, future of work, Georg Cantor, gig economy, global supply chain, Google Earth, Google Glasses, Guggenheim Bilbao, High speed trading, Hyperloop, illegal immigration, industrial robot, information retrieval, intermodal, Internet of things, invisible hand, Jacob Appelbaum, Jaron Lanier, Jony Ive, Julian Assange, Khan Academy, linked data, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, McMansion, means of production, megacity, megastructure, Menlo Park, Minecraft, Monroe Doctrine, Network effects, new economy, offshore financial centre, oil shale / tar sands, packet switching, PageRank, pattern recognition, peak oil, performance metric, Peter Thiel, phenotype, planetary scale, RAND corporation, recommendation engine, reserve currency, RFID, Sand Hill Road, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley ideology, Slavoj Žižek, smart cities, smart grid, smart meter, social graph, software studies, South China Sea, special economic zone, spectrum auction, Startup school, statistical arbitrage, Steve Jobs, Steven Levy, Stewart Brand, supply-chain management, supply-chain management software, TaskRabbit, the built environment, The Chicago School, the scientific method, Torches of Freedom, transaction costs, Turing complete, Turing machine, Turing test, universal basic income, urban planning, Vernor Vinge, Washington Consensus, web application, WikiLeaks, working poor, Y Combinator

The combination of apparent opposites into adjacent fabrics and into a single form is one version of what reversible political boundaries and interiors collapsing on themselves—the normalized exception of the reversible interface—look like as a design language. Its utopian enclave is less Elysium than executive lounge membership check-in protocol, and its dystopia is less the vast pens of Agamben's canonical camp, and more the furtive moments of political exception, sandwiched between moments of generalized mobility, like the ten minutes spent in airport security lines. While we can interpret the political complications that give rise to these forms, we are less certain of their ultimate effects, even as we get used to them. The securitarian utopia of total interfacial visualization works at the scale of the individual building or city because it also works at the scale of subdivided states and jurisdictions, especially when its ability to separate one from the other is mostly legal and symbolic.


pages: 695 words: 219,110

The Fabric of the Cosmos by Brian Greene


airport security, Albert Einstein, Albert Michelson, Arthur Eddington, Brownian motion, clockwork universe, conceptual framework, cosmic microwave background, cosmological constant, dark matter, dematerialisation, Hans Lippershey, Henri Poincaré, invisible hand, Stephen Hawking, urban renewal

In the mid-1800s, Maxwell discovered four powerful equations that, for the first time, set out a rigorous theoretical framework for understanding electricity, magnetism, and their intimate relationship.1 Maxwell developed these equations by carefully studying the work of the English physicist Michael Faraday, who in the early 1800s had carried out tens of thousands of experiments that exposed hitherto unknown features of electricity and magnetism. Faraday’s key breakthrough was the concept of the field. Later expanded on by Maxwell and many others, this concept has had an enormous influence on the development of physics during the last two centuries, and underlies many of the little mysteries we encounter in everyday life. When you go through airport security, how is it that a machine that doesn’t touch you can determine whether you’re carrying metallic objects? When you have an MRI, how is it that a device that remains outside your body can take a detailed picture of your insides? When you look at a compass, how is it that the needle swings around and points north even though nothing seems to nudge it? The familiar answer to the last question invokes the earth’s magnetic field, and the concept of magnetic fields helps to explain the previous two examples as well.


pages: 956 words: 288,981

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2011 by Steve Coll


airport security, Ayatollah Khomeini, Berlin Wall, colonial rule, computer age, energy security, failed state, Fall of the Berlin Wall, illegal immigration, index card, Islamic Golden Age, Khyber Pass, Network effects, RAND corporation, Ronald Reagan, trade route, upwardly mobile, urban planning, women in the workforce

Murad confessed that he had been working with Yousef on multiple terrorist plots: to bomb up to a dozen American commercial airliners flying over the Pacific, to assassinate President Clinton during a visit to the Philippines, to assassinate the Pope when he visited Manila, and to hijack a commercial airliner and crash it into the headquarters of the CIA. The plot to bomb American passenger planes over the Pacific was far along. Yousef had concocted a timing device fashioned from a Casio watch and a mix of explosives that could not be detected by airport security screeners. He planned to board an interlocking sequence of civilian flights. He would place the explosives on board, set the timers, and exit at layover stops before the bombs went off. He had already killed a Japanese businessman when he detonated a small bomb during a practice run, planting the device in an airplane seat and exiting the flight at a stopover before it exploded. If his larger plan had not been disrupted, as many as a thousand Americans might have died in the attacks during the first months of 1995.


Rainbow Six by Tom Clancy


air freight, airport security, clean water, computer age, Exxon Valdez, plutocrats, Plutocrats, RAND corporation, rolodex, urban sprawl

"I'll have some guys from New York meet you at the terminal, John." "Thanks, Chuck. Sorry to shake you loose at this hour." "Yeah, John. Bye." The rest was easy. Malloy came into his office after his own morning workout, and called to get his helicopter readied for a hop. It didn't take long. The only headache was having to filter through the in- and outbound airliner traffic, but the chopper landed at the general-aviation terminal, and an airport security car took John to the proper terminal, where Clark was able to walk into the Speedway Lounge twenty minutes before the flight to collect his ticket. This way, he also bypassed security, and was thus spared the embarrassment of having to explain that he carried a pistol, which in the United Kingdom was the equivalent of announcing that he had a case of highly infectious leprosy. The service was British-lavish, and he had to decline the offer of champagne before boarding the aircraft.


pages: 1,118 words: 309,029

The Wars of Afghanistan by Peter Tomsen


airport security, Ayatollah Khomeini, Berlin Wall, British Empire, facts on the ground, failed state, friendly fire, glass ceiling, hiring and firing, Internet Archive, Khyber Pass, land reform, plutocrats, Plutocrats, RAND corporation, Ronald Reagan, trade route, union organizing, women in the workforce

“Nothing can save Najib now,” Wali predicted. Wali was right. Najib’s control over events was rapidly deteriorating. He could only count on the loyalty of a few close advisers who were relatives, his palace guard force, and KHAD chief Yaqubi. But his enemies had also infiltrated KHAD. The Kabul Airport was Najib’s only route of escape from Afghanistan, now that Bagram was in Masood’s hands. But the regime general in charge of airport security had also gone over to Masood.6 For two years, United Nations Special Envoy Benon Sevan had promised Najib safe haven in India if he would step down as Afghanistan’s president to facilitate a peace agreement. Sevan, at that moment, was in Pakistan attempting to persuade skeptical Mujahidin party leaders about the merits of his UN peace plan. In the early morning hours of April 15, 1992, Najib phoned a UN official in Kabul.


Frommer's Israel by Robert Ullian


airport security, British Empire, car-free, East Village, haute cuisine, Khartoum Gordon, Maui Hawaii, Silicon Valley, Skype, sustainable-tourism, trade route, urban planning, urban sprawl, Yom Kippur War

If you get sick, your hotel desk can direct you to the nearest Magen David Adom clinic or can recommend a local doctor. We list hospitals and emergency numbers under “Fast Facts,” in the individual destination chapters. If you suffer from a chronic illness, consult your doctor before your departure. Pack prescription medications in your carry-on luggage, and carry prescription medications in their original containers, with pharmacy labels—otherwise they won’t make it through airport security. Also carry copies of your prescriptions in case you lose your pills or run out. Don’t forget an extra pair of contact lenses or prescription glasses. Carry the generic name of prescription medicines, in case a local pharmacist is unfamiliar with the brand name. We list additional emergency numbers in appendix A, p. 503. 7 Safety STAYING SAFE SECURITY W H AT T O D O I F YO U G E T S I C K A W AY F R O M H O M E Israel is a low-crime country.


pages: 1,208 words: 364,966

Pity the Nation: Lebanon at War by Robert Fisk


airport security, Ayatollah Khomeini, Berlin Wall, British Empire, colonial rule, friendly fire, haute couture, open economy, Ronald Reagan, Yom Kippur War

An Amal official led us onto the tarmac to watch it burn, gloating because he thought that the Jordanian security police on board had been left to die in the flames. A Lebanese then hijacked a Lebanese MEA Boeing the same day to protest at the hijacking of the Jordanian plane. One of the American passengers on the Alia flight had been transferred to the MEA jet, hijacked twice in a day by two different people. There was no accounting for this. A Lebanese airport security guard hijacked an MEA flight to Larnaca to protest at his low pay. The plane was forced to take off with its doors open, its escape chutes hanging from the fuselage. A passenger was sucked out of the Boeing and hurled onto the runway by the backthrust of the jets which killed him instantly. An old Lebanese man on a Larnaca–Beirut flight hijacked the plane by waving a Pepsi-Cola bottle which he said was filled with gasoline.


Debt of Honor by Tom Clancy


airport security, banking crisis, Berlin Wall, buttonwood tree, complexity theory, cuban missile crisis, defense in depth, job satisfaction, margin call, New Journalism, oil shock, Silicon Valley, tulip mania

The tower chief turned when the door opened—a guard had handed over the pass card and punched in the entry code on the keypad without the need for much encouragement—to see three men with automatic rifles. "What the hell—" "You will continue your duties as before," a captain, or ichii, told him. "My English is quite good. Please do not do anything foolish." Then he lifted his radio microphone and spoke in Japanese. The first phase of Operation KABUL was completed thirty seconds early, and entirely without violence. The second load of soldiers took over airport security. These men were in uniform to make sure that everyone knew what was going on, and they took their places at all entrances and control points, commandeering official vehicles to set additional security points on the access roads into the airport. This wasn't overly hard, as the airport was on the extreme southern part of the island, and all approaches were from the north. The commander of the second detachment relieved Colonel Sasaki.


pages: 1,797 words: 390,698

Power at Ground Zero: Politics, Money, and the Remaking of Lower Manhattan by Lynne B. Sagalyn


affirmative action, airport security, clean water, conceptual framework, corporate governance, deindustrialization, Donald Trump, Edward Glaeser, estate planning, Frank Gehry, Guggenheim Bilbao, high net worth, informal economy, intermodal, iterative process, Jane Jacobs, mortgage debt, New Urbanism, Rosa Parks, Silicon Valley, the built environment, the High Line, too big to fail, Torches of Freedom, urban decay, urban planning, urban renewal, white flight, young professional

“Now, you’re forcing us to look again.”19 Arad’s conceptual design also was turning out to be far more complicated than it first appeared. As the names controversy filled headlines, the protest intersected with objections to where Arad had located the names’ parapets: below the level of the Memorial Plaza in the underground galleries. Enormous halls far below street level, the underground galleries presented genuine security as well as safety concerns; visitors might have to go through an airport-security experience to reach bedrock. The noise of the waterfalls was likely to be deafening as well, a physical force that threatened to cancel out the design intent of creating a place for a contemplative memorial reflection. Technical advisors to the Skyscraper Safety Campaign, an organization founded by Sally Regenhard, whose probationary firefighter son perished on 9/11, raised concerns about the safety of the exit pathways in the underground galleries.


Southeast Asia on a Shoestring Travel Guide by Lonely Planet


airport security, Alfred Russel Wallace, anti-communist, British Empire, call centre, car-free, carbon footprint, clean water, colonial rule, Google Earth, haute cuisine, large denomination, low cost carrier, Mason jar, megacity, Skype, South China Sea, spice trade, superstar cities, sustainable-tourism, trade route, urban sprawl, women in the workforce

Safe Travel Drugs The risks associated with recreational drug use and distribution are serious even in places with illicit reputations; just down the road from Kuta Beach in Bali is a jail where travellers are enjoying the tropical climate for much longer than they had intended. In Indonesia you can be jailed because your travel companions had dope and you didn’t report them. A spell in a Thai prison can be very grim; in Malaysia and Singapore, possession of certain quantities of dope can lead to hanging. With heightened airport security, customs officials are zealous in their screening of both luggage and passengers. The death penalty, prison sentences and huge fines are given as liberally to foreigners as to locals; no one has evaded punishment because of ignorance of local laws. In Indonesia in 2005, nine Australians (dubbed the ‘Bali Nine’) were arrested on charges of heroin possession: seven received life sentences and two were sentenced to death by firing squad.