Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Bruce Schneier

Language: English

Pages: 448

ISBN: 039335217X

Format: PDF / Kindle (mobi) / ePub


“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”―Clay Shirky

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Hacking Exposed: Cisco Networks

Absolute OpenBSD: UNIX for the Practical Paranoid (2nd Edition)

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Linux Command Line and Shell Scripting Bible

PC Advisor (July 2012)

Learning Java (4th Edition)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Apps like this to spy on their employees. The US National Security Agency (NSA) and its UK counterpart, Government Communications Headquarters (GCHQ), use location data to track people. The NSA collects cell phone location data from a variety of sources: the cell towers that phones connect to, the location of Wi-Fi networks that phones log on to, and GPS location data from Internet apps. Two of the NSA’s internal databases, code-named HAPPYFOOT and FASCIA, contain comprehensive location.

Network World, http://www.networkworld.com/article/2221080/microsoft-subnet/secret-snoop-conference-for-gov-t-spying---go-stealth--hit-a-hundred-thousand-targe.html. Jennifer Valentino-DeVries, Julia Angwin, and Steve Stecklow (19 Nov 2011), “Document trove exposes surveillance methods,” Wall Street Journal, http://online.wsj.com/news/articles/SB10001424052970203611404577044192607407780. Vernon Silver (21 Dec 2011), “Spies fail to escape spyware in $5 billion bazaar for cyber arms,” Bloomberg.

Neighborhoods, and black residents to black neighborhoods. This practice is called weblining, and it has the potential to be much more pervasive and much more discriminatory than traditional redlining. Because corporations collect so much data about us and can compile such detailed profiles, they can influence us in many different ways. A 2014 White House report on big data concluded, “. . . big data analytics have the potential to eclipse longstanding civil rights protections in how personal.

Hacking isn’t going away. For the foreseeable future, it will always be possible for a sufficiently skilled attacker to find a vulnerability in a defender’s system. This will be true for militaries building cyberweapons, intelligence agencies trying to break into systems in order to eavesdrop, and criminals of all kinds. MAINTAINING AN INSECURE INTERNET In Chapter 6, I discussed how the NSA uses both existing and specially created vulnerabilities to hack into systems. Its actions put.

Out what to do with it later—and will not switch gears easily. Journalist James Kunstler calls this the “psychology of previous investment,” and it’s why we so often throw bad money after good. Admitting you’re wrong is hard, especially because the cost of data collection and storage is so low. In a market economy, if a company can’t figure out a profitable business model, others that do will emerge. If we succeed in raising the cost of surveillance and data collection, new businesses that don’t.

Download sample

Download