Klik på en miniature for at gå til Google Books
Indlæser... No Place to Hide: Behind the Scenes of Our Emerging Surveillance Societyaf Robert O'Harrow
Ingen Indlæser...
Bliv medlem af LibraryThing for at finde ud af, om du vil kunne lide denne bog. Der er ingen diskussionstråde på Snak om denne bog. ingen anmeldelser | tilføj en anmeldelse
Hæderspriser
In No Place to Hide, award-winning Washington Post reporter Robert O'Harrow, Jr., lays out in unnerving detail the post-9/11 marriage of private data and technology companies and government anti-terror initiatives to create something entirely new: a security-industrial complex. Drawing on his years of investigation, O'Harrow shows how the government now depends on burgeoning private reservoirs of information about almost every aspect of our lives to promote homeland security and fight the war on terror. Consider the following: When you use your cell phone, the phone company knows where you are and when. If you use a discount card, your grocery and prescription purchases are recorded, profiled, and analyzed. Many new cars have built-in devices that enable companies to track from afar details about your movements. Software and information companies can even generate graphical link-analysis charts illustrating exactly how each person in a room is related to every other -- through jobs, roommates, family, and the like. Almost anyone can buy a dossier on you, including almost everything it takes to commit identity theft, for less than fifty dollars. It may sound like science fiction, but it's the routine activity of the nation's fast-growing information industry and, more and more, its new partner the U.S. government. With unrivaled access, O'Harrow tells the inside stories of key players in this new world, from software inventors to counterintelligence officials. He reveals how the government is creating a national intelligence infrastructure with the help of private companies. And he examines the impact of this new security system on our traditional notions of civil liberties, autonomy, and privacy, and the ways it threatens to undermine some of our society's most cherished values, even while offering us a sense of security. This eye-opening examination takes readers behind the walls of secrecy and shows how we are rushing toward a surveillance society with few rules to guide and protect us. In this new world of high-tech domestic intelligence, there is literally no place to hide. A behind-the-scenes look at some of the less favorable aspects of today's surveillance-based society discusses how the government and private marketing companies are using modern technology to protect homeland security and fight the war on terror at the expense of personal privacy and civil liberties. No library descriptions found. |
Current DiscussionsIngenPopulære omslag
Google Books — Indlæser... GenrerMelvil Decimal System (DDC)303.48Social sciences Social Sciences; Sociology and anthropology Social Processes Social change Causes of changeLC-klassificeringVurderingGennemsnit:
Er det dig?Bliv LibraryThing-forfatter. |
Pg 3. "...resolve crimes faster through predictive analysis help to thwart crimes before they occur." Remember the movie ,Minority Report'.
P 33. Quoting Senator Leahy, and his concern about private data brokers: "..Not determined through prosecution (and) tria, but bbased on what came up on someone's computer screen."
P 37. Describing application of private databases: "It outlines and predicts behavior."
P 50. "...no laws prohibit the collection of unlisted (phone numbers)..." Calling a telemarketer is considered implied consent to give out one's unlisted number.
P 54. Surveys usually seem anonymous. "People tell us all kinds of things they wouldn't tell their neighbors."
P 107. "We have created a unique identifier on everyone in the United States..."
P 145. Brokers use 'pretexting' or 'social engineering' to con victims into releasing information.
P 152. In 2001, "ChoicePoint said it would give the INS unlimited access to all the information for $1 million a year." Included "a nationwide listing of Mexican voters, ... a national registry of Columbians, ,,, pasport and national ID of Costa Rica citizens, ... national ID number of Argentinians and phone numbers".
P 153. Quoting Bendana, "The U.S. is going to know more about the Nicaraguan people than the Nicaraguan government."
P162. Fingerprinting goes back to the time of Babylon.
P164. People can be identified at distance by their gait.
P 171. Fingerprints can be imitated using a Gummi Bear like mixture.
P. 208. CAPPS II passenger screening.
P227, Sobel 1997 letter, "The FBI, for example, recognizes that data in its computer system of criminal records has an inaccuracy rate of 33 percent."
P 246. Quoting Ben Bell, "We have a right of passage and travel."
P 257. "In 2000, the FBI acknowledged it was using (an internet) data collection device, with the suggestive name Carnivore."
P280. Despite constitutional guarantees, "...there are no restrictions in the private sector to individuals collecting information across this country, which potentially could be a problem for the citizens of this country. (D'Amuro)
P 288. RFID in credit cards.
P 290. Metal fiber technology.
P 299. Dust technology and 'smart dust'.
Related books:
"The Naked Society", Vance Packard
"The Assault of Privacy", Arthur Miller
"Body of Secrets", Bamford
"Database Nation"
"The Naked Crowd"
"The Broken Window", a novel by Jeffery Deaver ( )