Dragnet Nation

A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Author: Julia Angwin

Publisher: Times Books

ISBN: 0805098089

Category: Business & Economics

Page: 304

View: 7031

DOWNLOAD NOW »

An inside look at who's watching you, what they know and why it matters. We are being watched. We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines. In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach. Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.

Dragnet Nation

A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Author: Julia Angwin

Publisher: Macmillan

ISBN: 0805098070

Category: Business & Economics

Page: 289

View: 1874

DOWNLOAD NOW »

An investigative journalist offers a revealing look at the surveillance economy in America that captures what citizens actions online and off, putting individual freedoms at risk and discusses results from a number of experiments she conducted to try and protect herself.

Dragnet Nation

A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Author: Julia Angwin

Publisher: St. Martin's Griffin

ISBN: 9781250060860

Category: Business & Economics

Page: 320

View: 525

DOWNLOAD NOW »

Stealing MySpace

The Battle to Control the Most Popular Website in America

Author: Julia Angwin

Publisher: Random House

ISBN: 9781588367693

Category: Business & Economics

Page: 384

View: 4468

DOWNLOAD NOW »

A few years ago, MySpace.com was just an idea kicking around a Southern California spam mill. Scroll down to the present day and MySpace is one of the most visited Internet destinations in America, displaying more than 40 billion webpage views per month and generating nearly $1 billion annually for Rupert Murdoch’s online empire. Even by the standards of the Internet age, the MySpace saga is an astounding growth story, which climaxed with the site’s acquisition by Murdoch’s News Corporation in 2005 for a sum approaching one billion dollars. But more than that, it may be the defining drama of the digital era. In Stealing MySpace, Pulitzer Prize-winning journalist Julia Angwin chronicles the rise of this Internet powerhouse. With an unerring eye, Angwin details how MySpace took the Internet by storm by grabbing the best ideas from around the Web, encouraging pinup stars such as Tila Tequila to make their home on its pages and giving everyone freedom to experiment with online identities–including using somebody else’s identity. Stealing MySpace introduces us to the site’s founders, Chris DeWolfe and Tom Anderson, who dabbled in computer hacking, online pornography, spam, and spyware before starting MySpace. Although their street savvy, doggedness, and clubbing skills far eclipsed their tech prowess, they stumbled their way to success and soon found themselves at ground zero of a high-stakes war that pitted Rupert Murdoch against his frequent nemesis, the combative Viacom CEO Sumner Redstone. Angwin sheds light on the dizzying backroom deals that allowed Murdoch to snatch MySpace from Viacom’s grasp even as the MySpace founders remained in the dark about their own fate. Then she takes us inside the Murdoch empire as DeWolfe and Anderson lobby furiously to regain control of their creation. Venturing beyond the business aspects of the story, Angwin also explores the Internet culture, a voyeuristic world in which MySpace must stay one step ahead of amateur pornographers, sexual predators, and “spoofers” who set up fake profiles (Rupert Murdoch himself tolerates dozens of phony “Ruperts” on the site) and cope with the general excesses and sometimes illegal acts of a community of account holders equal in number to the population of Japan. In Stealing MySpace, Julia Angwin dishes on the epic real-world battle for control of a virtual empire. In a savvy, smart, fast-paced narrative reminiscent of Bryan Burrough and John Helyar’s Barbarians at the Gate and Michael Lewis’s The New New Thing, Stealing MySpace tells is the whole gripping story behind a breakout cultural phenomenon. From the Hardcover edition.

Nothing to Hide

The False Tradeoff Between Privacy and Security

Author: Daniel J. Solove

Publisher: Yale University Press

ISBN: 0300177259

Category: Law

Page: 245

View: 6734

DOWNLOAD NOW »

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy"--Jacket.

Threat Modeling

Designing for Security

Author: Adam Shostack

Publisher: John Wiley & Sons

ISBN: 1118810058

Category: Computers

Page: 624

View: 8036

DOWNLOAD NOW »

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

Virtual Freedom

Net Neutrality and Free Speech in the Internet Age

Author: Dawn C. Nunziato

Publisher: Stanford University Press

ISBN: 0804772452

Category: Law

Page: 216

View: 8206

DOWNLOAD NOW »

Communications giants like Google, Comcast, and AT&T enjoy increasingly unchecked control over speech. As providers of broadband access and Internet search engines, they can control online expression. Their online content restrictions—from obstructing e-mail to censoring cablecasts—are considered legal because of recent changes in free speech law. In this book, Dawn Nunziato criticizes recent changes in free speech law in which only the government need refrain from censoring speech, while companies are permitted to self-regulate. By enabling Internet providers to exercise control over content, the Supreme Court and the FCC have failed to protect the public's right to access a broad diversity of content. Nunziato argues that regulation is necessary to ensure the free flow of information and to render the First Amendment meaningful in the twenty-first century. This book offers an urgent call to action, recommending immediate steps to preserve our free speech rights online.

Spying on Democracy

Government Surveillance, Corporate Power and Public Resistance

Author: Heidi Boghosian,Lewis Lapham

Publisher: City Lights Books

ISBN: 0872866033

Category: Law

Page: 352

View: 1173

DOWNLOAD NOW »

Spying on US citizens is rising as corporations make big bucks selling info about our private lives to the government.

SuperVision

An Introduction to the Surveillance Society

Author: John Gilliom,Torin Monahan

Publisher: University of Chicago Press

ISBN: 0226924459

Category: Social Science

Page: 192

View: 3641

DOWNLOAD NOW »

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and assessed—and often in ways that are imperceptible to us. The first general introduction to the growing field of surveillance studies, SuperVision uses examples drawn from everyday technologies to show how surveillance is used, who is using it, and how it affects our world. Beginning with a look at the activities and technologies that connect most people to the surveillance matrix, from identification cards to GPS devices in our cars to Facebook, John Gilliom and Torin Monahan invite readers to critically explore surveillance as it relates to issues of law, power, freedom, and inequality. Even if you avoid using credit cards and stay off Facebook, they show, going to work or school inevitably embeds you in surveillance relationships. Finally, they discuss the more obvious forms of surveillance, including the security systems used at airports and on city streets, which both epitomize contemporary surveillance and make impossibly grand promises of safety and security. Gilliom and Monahan are among the foremost experts on surveillance and society, and, with SuperVision, they offer an immensely accessible and engaging guide, giving readers the tools to understand and to question how deeply surveillance has been woven into the fabric of our everyday lives.

Privacy in the Modern Age

The Search for Solutions

Author: Marc Rotenberg,Jeramie Scott,Julia Horwitz

Publisher: New Press, The

ISBN: 1620971089

Category: Law

Page: 240

View: 5640

DOWNLOAD NOW »

The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don’t simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It’s a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there’s a problem—let’s find a solution.

The Boy Who Could Change the World

The Writings of Aaron Swartz

Author: Aaron Swartz

Publisher: The New Press

ISBN: 1620970767

Category: Literary Collections

Page: 256

View: 1765

DOWNLOAD NOW »

In his too-short life, Aaron Swartz reshaped the Internet, questioned our assumptions about intellectual property, and touched all of us in ways that we may not even realize. His tragic suicide in 2013 at the age of twenty-six after being aggressively prosecuted for copyright infringement shocked the nation and the world. Here for the first time in print is revealed the quintessential Aaron Swartz: besides being a technical genius and a passionate activist, he was also an insightful, compelling, and cutting essayist. With a technical understanding of the Internet and of intellectual property law surpassing that of many seasoned professionals, he wrote thoughtfully and humorously about intellectual property, copyright, and the architecture of the Internet. He wrote as well about unexpected topics such as pop culture, politics both electoral and idealistic, dieting, and lifehacking. Including three in-depth and previously unpublished essays about education, governance, and cities,The Boy Who Could Change the World contains the life’s work of one of the most original minds of our time.

Now I Know Who My Comrades Are

Voices from the Internet Underground

Author: Emily Parker

Publisher: Sarah Crichton Books

ISBN: 0374709343

Category: Political Science

Page: 320

View: 2823

DOWNLOAD NOW »

In China, university students use the Internet to save the life of an attempted murder victim. In Cuba, authorities unsuccessfully try to silence an online critic by sowing seeds of distrust in her marriage. And in Russia, a lone blogger rises to become one of the most prominent opposition figures since the fall of the Soviet Union. Authoritarian governments try to isolate individuals from one another, but in the age of social media freedom of speech is impossible to contain. Online, people discover that they are not alone. As one blogger put it, "Now I know who my comrades are." In her groundbreaking book, Now I Know Who My Comrades Are: Voices from the Internet Underground, Emily Parker, formerly a State Department policy advisor, writer at The Wall Street Journal and editor at The New York Times, provides on-the-ground accounts of how the Internet is transforming lives in China, Cuba, and Russia. It's a new phenomenon, but one that's already brought about significant political change. In 2011 ordinary Egyptians, many armed with little more than mobile phones, helped topple a thirty-year-old dictatorship. It was an extraordinary moment in modern history—and Now I Know Who My Comrades Are takes us beyond the Middle East to the next major civil rights battles between the Internet and state control.Star dissidents such as Cuba's Yoani Sánchez and China's Ai Weiwei are profiled. Here you'll also find lesser-known bloggers, as well as the back-stories of Internet activism celebrities. Parker charts the rise of Russia's Alexey Navalny from ordinary blogger to one of the greatest threats to Vladimir Putin's regime. This book introduces us to an army of bloggers and tweeters—generals and foot soldiers alike. These activists write in code to outsmart censors and launch online campaigns to get their friends out of jail. They refuse to be intimidated by surveillance cameras or citizen informers. Even as they navigate the risks of authoritarian life, they feel free. Now I Know Who My Comrades Are is their story.

How to Be Invisible

Protect Your Home, Your Children, Your Assets, and Your Life

Author: J. J. Luna

Publisher: Macmillan

ISBN: 1250015154

Category: Computers

Page: 320

View: 9066

DOWNLOAD NOW »

"Fascinating... a regular field manual... meticulously researched and very entertaining." --G. Gordon Liddy A thoroughly revised and updated edition of the essential guide to preserving your personal security From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly updated third edition of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect your home address, hide your ownership of vehicles and real estate, use pagers with dumbphones, switch to low-profile banking and invisible money transfers, use alternate signatures, and how to secretly run a home-based business. J.J. Luna is an expert and highly trained security consultant with years of experience protecting himself, his family, and his clients. Using real life stories and his own consulting experience, J.J. Luna divulges legal methods to attain the privacy you crave and deserve, whether you want to shield yourself from casual scrutiny or take your life savings with you and disappear without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself. There is a prevailing sense in our society that true privacy is a thing of the past. In a world where privacy concerns that only continue to grow in magnitude, How to Be Invisible, Third Edition is a critical antidote to the spread of new and more efficient ways of undermining our personal security. Privacy is a commonly-lamented casualty of the Information Age and of the world's changing climate--but that doesn't mean you have to stand for it. This new edition of J. J. Luna's classic manual contains step-by-step advice on building and maintaining your personal security, including brand new chapters on: - The dangers from Facebook, smartphones, and facial recognition - How to locate a nominee (or proxy) you can trust - The art of pretexting, aka social engineering - Moving to Baja California Sur; San Miguel de Allende, Guanajuato; Cuenca, Ecuador; or Spain's Canary Islands - The secrets of international privacy, and much more!

Figures of Speech

First Amendment Heroes and Villains

Author: William Turner

Publisher: Berrett-Koehler Publishers

ISBN: 1609944658

Category: Political Science

Page: 232

View: 7612

DOWNLOAD NOW »

Recounting controversial First Amendment cases from the Red Scare era to Citizens United, William Bennett Turner—a Berkeley law professor who has argued three cases before the Supreme Court—shows how we’ve arrived at our contemporary understanding of free speech. His strange cast of heroes and villains, some drawn from cases he has litigated, includes Communists, Jehovah’s Witnesses, Ku Klux Klansmen, the world’s leading pornographer, prison wardens, dogged reporters, federal judges, a computer whiz, and a countercultural comedian. This is a fascinating look at how the scope of our First Amendment freedoms has evolved and the colorful characters behind some of the most important legal decisions of modern times. “Turner tells fascinating stories of unlikely heroes and explains difficult legal issues clearly and concisely, educating and entertaining at the same time.”—Elizabeth Farnsworth, The PBS News Hour

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Author: Bruce Schneier

Publisher: W. W. Norton & Company

ISBN: 0393244822

Category: Computers

Page: 320

View: 5295

DOWNLOAD NOW »

“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky “Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Automating Inequality

How High-Tech Tools Profile, Police, and Punish the Poor

Author: Virginia Eubanks

Publisher: St. Martin's Press

ISBN: 1466885963

Category: Social Science

Page: 288

View: 9910

DOWNLOAD NOW »

The New York Times Book Review: "Riveting." Naomi Klein: "This book is downright scary." Ethan Zuckerman, MIT: "Should be required reading." Dorothy Roberts, author of Killing the Black Body: "A must-read." Astra Taylor, author of The People's Platform: "The single most important book about technology you will read this year." Cory Doctorow: "Indispensable." A powerful investigative look at data-based discrimination—and how technology affects civil and human rights and economic equity The State of Indiana denies one million applications for healthcare, foodstamps and cash benefits in three years—because a new computer system interprets any mistake as “failure to cooperate.” In Los Angeles, an algorithm calculates the comparative vulnerability of tens of thousands of homeless people in order to prioritize them for an inadequate pool of housing resources. In Pittsburgh, a child welfare agency uses a statistical model to try to predict which children might be future victims of abuse or neglect. Since the dawn of the digital age, decision-making in finance, employment, politics, health and human services has undergone revolutionary change. Today, automated systems—rather than humans—control which neighborhoods get policed, which families attain needed resources, and who is investigated for fraud. While we all live under this new regime of data, the most invasive and punitive systems are aimed at the poor. In Automating Inequality, Virginia Eubanks systematically investigates the impacts of data mining, policy algorithms, and predictive risk models on poor and working-class people in America. The book is full of heart-wrenching and eye-opening stories, from a woman in Indiana whose benefits are literally cut off as she lays dying to a family in Pennsylvania in daily fear of losing their daughter because they fit a certain statistical profile. The U.S. has always used its most cutting-edge science and technology to contain, investigate, discipline and punish the destitute. Like the county poorhouse and scientific charity before them, digital tracking and automated decision-making hide poverty from the middle-class public and give the nation the ethical distance it needs to make inhumane choices: which families get food and which starve, who has housing and who remains homeless, and which families are broken up by the state. In the process, they weaken democracy and betray our most cherished national values. This deeply researched and passionate book could not be more timely.

Surveillance After Snowden

Author: David Lyon

Publisher: John Wiley & Sons

ISBN: 0745690882

Category: Social Science

Page: 120

View: 3547

DOWNLOAD NOW »

In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of ’security’. In this compelling account, surveillance expert David Lyon guides the reader through Snowden’s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world. Surveillance after Snowden is crucial reading for anyone interested in politics, technology and society.

What Stays in Vegas

The World of Personal Data—Lifeblood of Big Business—and the End of Privacy as We Know It

Author: Adam Tanner

Publisher: PublicAffairs

ISBN: 1610394194

Category: Business & Economics

Page: 336

View: 4460

DOWNLOAD NOW »

The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open doors of their casinos. The secret to the company's success lies in their one unrivaled asset: they know their clients intimately by tracking the activities of the overwhelming majority of gamblers. They know exactly what games they like to play, what foods they enjoy for breakfast, when they prefer to visit, who their favorite hostess might be, and exactly how to keep them coming back for more. Caesars' dogged data-gathering methods have been so successful that they have grown to become the world's largest casino operator, and have inspired companies of all kinds to ramp up their own data mining in the hopes of boosting their targeted marketing efforts. Some do this themselves. Some rely on data brokers. Others clearly enter a moral gray zone that should make American consumers deeply uncomfortable. We live in an age when our personal information is harvested and aggregated whether we like it or not. And it is growing ever more difficult for those businesses that choose not to engage in more intrusive data gathering to compete with those that do. Tanner's timely warning resounds: Yes, there are many benefits to the free flow of all this data, but there is a dark, unregulated, and destructive netherworld as well.

The Sea and Poison

Author: Shūsaku Endō

Publisher: New Directions Publishing

ISBN: 9780811211987

Category: Fiction

Page: 167

View: 6007

DOWNLOAD NOW »

Young interns Suguro, compelled by circumstance, Toda, a cynic, and Nurse Ueda, numbed by tragedy, take part in experiments the Japanese doctors are performing on their American prisoners