Data and Goliath : The Hidden Battles to come your data and Control your world.
United States : Norton Paperback : 2016Description: 20cm : 425 PagesContent type: text Media type: unmediated Carrier type: volume001: 42404ISBN: 9780393352177Subject(s): Data | Web Development | E-commerce | SecurityDDC classification: 004.6 SCHItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Book | MAIN LIBRARY Book | 004.6 SCH (Browse shelf(Opens below)) | 1 | Available | 112656 |
Enhanced descriptions from Syndetics:
You are under surveillance right now.
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we're offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we've gained? In Data and Goliath , security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
Table of contents provided by Syndetics
- Introduction (p. 1)
- Part 1 The World We're Creating
- 1 Data as a By-product of Computing (p. 15)
- 2 Data as Surveillance (p. 23)
- 3 Analyzing Our Data (p. 39)
- 4 The Business of Surveillance (p. 54)
- 5 Government Surveillance and Control (p. 73)
- 6 Consolidation of Institutional Control (p. 92)
- Part 2 What's at Stake
- 7 Political Liberty and Justice (p. 107)
- 8 Commercial Fairness and Equality (p. 127)
- 9 Business Competitiveness (p. 140)
- 10 Privacy (p. 147)
- 11 Security (p. 158)
- Part 3 What to Do About It
- 12 Principles (p. 181)
- 13 Solutions for Government (p. 195)
- 14 Solutions for Corporations (p. 223)
- 15 Solutions for the Rest of Us (p. 250)
- 16 Social Norms and the Big Data Trade-off (p. 265)
- Acknowledgments (p. 281)
- Notes (p. 285)
- Index (p. 407)
Reviews provided by Syndetics
Library Journal Review
Schneier, a fellow at Harvard's Berkman Center for Internet and Society, has written an exceptionally readable yet thoroughly chilling book about the dangers of the ubiquitous mass surveillance we face thanks to modern life. While the author focuses on the United States, the rest of the world is largely capable of nearly the same levels of surveillance thanks to the openness of the Internet and the availability of cell phones. Schneier describes the types of data being collected about us, stemming from our interactions, activities, purchases, and where we go. As he competently explains, this "metadata" provides those collecting it with the entire framework of our existence: who we converse with and the duration of the conversation, the things we read (especially electronically), and what we buy. Corporations use this data to deliver targeted advertising and sell our information to other corporations at a large profit. Governments employ the data to map our interactions and otherwise infiltrate our privacy. As Schneier helps us understand the issues, he makes the case that "Ubiquitous mass surveillance is the enemy of democracy, liberty, freedom, and progress." Though there are few signs of change in corporate and government surveillance practices, Schneier devotes a chapter to practical solutions we can use to limit how we are tracked, information about how other countries approach privacy, and a set of potential principles we could adopt. -VERDICT This timely, significant, and engaging book will appeal to citizens and noncitizens alike, to those who have ever used credit or debit cards to make purchases, who have browsed the Internet, who use email, who make purchases online.the list goes on. An essential book for almost everyone.-Candice Kail, Columbia Univ. Libs., New York © Copyright 2015. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.Publishers Weekly Review
Security technologist Schneier (Schneier on Security) eloquently limns the challenges of maintaining privacy in the Internet age, and offers some thoughtful proposals to preserve individual freedom without compromising national security. Even readers well versed in the issues are likely to be shocked by some instances of technological intrusions, such as when a school district near Philadelphia lent high school students laptops installed with highly invasive spyware. Schneier plausibly makes the case that the powerful algorithms of companies such as Facebook could be used to actually manipulate American elections. The book also notes the psychological aspects of the loss of control of one's data. For example, for most of human history "interactions and conversations have been ephemeral," and the indefinite preservation of online interactions has social and emotional repercussions for which society is unprepared. Schneier may be accused by some of minimizing the threat from terrorism, however, as when he dismisses terrorists as no more of a danger than organized crime, an analogy that weakens the overall strength of his case. (Mar.) © Copyright PWxyz, LLC. All rights reserved.Booklist Review
*Starred Review* Security technologist, commentator, and popular author Schneier was one of the first to analyze the documentation of NSA surveillance practices leaked by Edward Snowden. What he discovered fueled his mission to zap our complacency regarding ubiquitous mass surveillance. In this mind-blowing exposé, backed by 130 pages of revelatory notes, Schneier reveals exactly how all the information generated by our smartphones and computers regarding our exact location, communications, financial and medical transactions, everything we read in digital form, and every Google search is captured, stored, and traded. He elucidates the difference between data and metadata (an email's content is data; all records pertaining to the sender, recipient, and routing are metadata), and explains how metadata is used to track our activities, interests, and concerns. With meticulously researched details and high-velocity prose, he outs the federal government's intrusive data mining, the immensely profitable big-data industry, and the hidden collusion between them. Schneier convincingly argues that our privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect and states that constant surveillance is too high a price to pay for electronic convenience. By matching jolting disclosures of alarming realities with lucid guiding principles and policy recommendations for forging new surveillance laws and regulations, Schneier has created an invaluable and empowering call to awareness and action.--Seaman, Donna Copyright 2015 BooklistKirkus Book Review
A jeremiad suggesting our addiction to data may have made privacy obsolete.Prolific technological writer Schneier (Fellow/Berkman Center for Internet and Society, Harvard Law School; Carry On: Sound Advice from Schneier on Security, 2013, etc.) clearly examines how technology has transformed every interaction, noting how our intimate communications are now "saved in ways we have no control over." He suggests that most Americans remain unconcerned about the relationship between data and surveillance, due to the attraction of "free" products like Gmail. He focuses on the social costs of surveillance, which "puts us at risk of abuses by those in powerexacerbated by the fact that we are generating so much data and storing it indefinitely." He also argues that this "pervasive mass surveillance" will inevitably chill progressive movementse.g., gay rights and cannabis decriminalization. The problem is more sprawling than most realize: Edward Snowden's revelations clarified "how much the NSA relies on US corporations to eavesdrop on the Internet," and corporations are using such technologies for their own ends. Yet both the NSA and corporations are blithe about how they treat the fruits of this nonstop spying. "From the military's perspective," writes the author, "it's not surveillance until a human being looks at the data." Such strange pronouncements about the common good are hard to counter, since whistleblowers such as Snowden are prohibited from explaining their actions in court. Schneier argues that all this invasion of privacy is unlikely to succeed in its alleged goal: "Even highly accurate terrorism prediction systems will be so flooded with false alarms that they will be useless." He concludes this grim catalog of privacy erosion with a set of prescriptions for governments, corporations and "the rest of us," advocating a mix of legal framework, incentives for fairer business models and a more realistic understanding of the current moment's potential for harm. An accessible, detailed look at a disturbing aspect of contemporary life. Copyright Kirkus Reviews, used with permission.There are no comments on this title.