Books & Videos

Table of Contents

  1. Chapter 1 Privacy Under Attack

    1. What Do We Mean By Privacy?

    2. The Role of Technology

    3. The Role of Government

    4. Fighting Back

    5. Why This Book?

  2. Chapter 2 Database Nation

    1. Thirty-four Years Later

    2. How We Got Here

    3. It Could Happen To You

    4. Identity theft: a Stolen self

    5. Looking Forward By Looking back

    6. Our Databanked Future

  3. Chapter 3 Absolute Identification

    1. On the Identification of infants

    2. Anthropometrical Signalment

    3. The Science of Fingerprints

    4. Dna Identification

    5. Computerized Biometrics

    6. Identifying Bodies, Not People

  4. Chapter 4 What Did You Do Today?

    1. The Information Crisis

    2. False Data Syndrome

    3. The Tracking Process: How Our Information is turned Against Us

    4. The Biggest Database In the World

    5. The Age of Public Statements

    6. Smart Machines Create Active Databanks

    7. Turning Back the Information tide

  5. Chapter 5 The View From Above

    1. Hey, i Live Here!

    2. The Eye In the Sky

    3. The Eye On the Ground

    4. Video Surveillance For the Rest of Us

    5. Webcam

    6. From Webcam To wearcam

    7. Fumbling For the "off" Switch

    8. What Was That?

    9. The Systematic surveillance of science

    10. One World, Like It Or Not

  6. Chapter 6 To Know Your Future

    1. No Bigger Gap

    2. The Medical Records Fairy Tale

    3. Privacy Is Your Doctor's Responsibility

    4. Privacy Is Not Your insurance Company's Responsibility

    5. Nobody Knows the Mib

    6. Forcing Physicians To Lie

    7. A Right To Your Self

    8. A Right To Your Past

    9. Computerized Patient Records: the promise

    10. Computerized Patient Records: the threat

    11. Other Threats

    12. Rethinking Medical Care And medical Insurance

  7. Chapter 7 Buy Now!

    1. Marketing And the Knowledge Crisis

    2. They've Got You Targeted: the Process of Direct Marketing

    3. Taking Direct Action against direct Marketing

  8. Chapter 8 Who Owns Your Information?

    1. Do You Own your Name?

    2. Do You Own your Feet?

    3. Do You Own your Books?

    4. Do You Own What you Do?

    5. Do You Want To Use Ownership to Protect your privacy?

  9. Chapter 9 Kooks and Terrorists

    1. The Democratization of destructive Technology

    2. The Dish of death

    3. The Changing Face of Terrorism

    4. Home-grown Terrorism

  10. Chapter 10 Excuse Me, But Are You Human?

    1. Simulated Humans Can't Be Trusted

    2. Eliza And Her Children

    3. The Computer As Your agent

    4. Avatar Rights Now!

  11. Chapter 11 Privacy Now!

    1. Technology Is Not neutral

    2. A Government Privacy Agenda For the twenty-first Century

    3. Buy Your Own Privacy

    4. Privacy's Radical Fringe

    5. Conclusion

  12. Chapter 12 Epilogue: One Year Later

    1. Attacks On Privacy Continue

    2. What's the Answer?

    3. The Metrocard Story

    4. Looking Across the Border

    5. It's In Our Hands

    6. Where To Go For Help

  1. Appendix A Annotated Bibliography

    1. Web Sites

  2. Appendix Acknowledgments