No Place to Hide: Behind the Scenes of Our Emerging Surveillance Society

Overview

In No Place to Hide, award-winning Washington Post reporter Robert O'Harrow, Jr., pulls back the curtain on an unsettling trend: the emergence of a data-driven surveillance society intent on giving us the conveniences and services we crave, like cell phones, discount cards, and electronic toll passes, while watching us more closely than ever before. He shows that since the September 11, 2001, terror attacks, the information industry giants have been enlisted as private intelligence services for homeland security....

See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (43) from $1.99   
  • New (1) from $58.77   
  • Used (42) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$58.77
Seller since 2008

Feedback rating:

(213)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
No Place to Hide

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$15.99
BN.com price
Sending request ...

Overview

In No Place to Hide, award-winning Washington Post reporter Robert O'Harrow, Jr., pulls back the curtain on an unsettling trend: the emergence of a data-driven surveillance society intent on giving us the conveniences and services we crave, like cell phones, discount cards, and electronic toll passes, while watching us more closely than ever before. He shows that since the September 11, 2001, terror attacks, the information industry giants have been enlisted as private intelligence services for homeland security. And at a time when companies routinely collect billions of details about nearly every American adult, No Place to Hide shines a bright light on the sorry state of information security, revealing how people can lose control of their privacy and identities at any moment.

Now with a new afterword that details the latest security breaches and the government's failing efforts to stop them, O'Harrow shows us that, in this new world of high-tech domestic intelligence, there is literally no place to hide.

As O'Harrow writes, "This book is all about you and your personal information — and the story isn't pretty."

Read More Show Less

Editorial Reviews

William Saffire
Robert O'Harrow Jr.'s No Place to Hide might just do for privacy protection what Rachel Carson's Silent Spring did for environmental protection nearly a half-century ago.— The New York Times Sunday Book Review
Michiko Kakutani
This surveillance state is not a futuristic place conjured in a Philip K. Dick novel or "Matrix"-esque sci-fi thriller. It is post-9/11 America, as described in Robert O'Harrow Jr.'s unnerving new book, No Place to Hide - an America where citizens' "right to be let alone," as Justice Louis Brandeis of the Supreme Court once put it, is increasingly imperiled, where more and more components of our daily lives are routinely monitored, recorded and analyzed … Mr. O'Harrow provides in these pages an authoritative and vivid account of the emergence of a "security-industrial complex" and the far-reaching consequences for ordinary Americans, who must cope not only with the uneasy sense of being watched (leading, defenders of civil liberties have argued, to a stifling of debate and dissent) but also with the very palpable dangers of having personal information (and in some cases, inaccurate information) passed from one outfit to another.
— The New York Times
Geoffrey R. Stone
Today, we are constantly tagged, monitored, studied, sorted and tracked by a vast array of institutions and organizations -- private and public. As Robert O'Harrow Jr. details in No Place to Hide, it is worse than we could ever have imagined. In this revealing book, O'Harrow makes clear that Americans need to think seriously about these issues now -- before it is too late for us to decide that we care.
— The Washington Post
Publishers Weekly
The amount of personal data collected on ordinary citizens has grown steadily over the decades, and after 9/11, corporations that had been amassing this information largely for marketing purposes saw an opportunity to strengthen their ties with the government. But what do we really know about these data collectors, and are they trustworthy? O'Harrow, a Pulitzer finalist who covers privacy and technology issues for the Washington Post, tracks the explosive growth of this surveillance industry, with keen attention to the problems that "inevitable mistakes" along the way have created in mainstream society, from victims of identity theft who have been placed in financial jeopardy to travelers detained at the airport because of the similarity of their names to those of criminal suspects. O'Harrow gives the government's push for increased surveillance heavy play, but he effectively presents the story's many sides, as when he juxtaposes the perspectives of a Justice Department attorney, a civil liberties activist and Senator Patrick Leahy in the first chapter. His evenhanded account underscores the caveats of surveillance, as well-intentioned people can deploy technologies for all the right reasons only to see their apparatuses misused later on. This is a thought-provoking, comprehensive account that strikes the right balance between dismissive and alarmist. Agent, Amy Rennert. (Jan. 12) Copyright 2004 Reed Business Information.
Library Journal
Once upon a time, people were worried about the futuristic world of 1984. According to O'Harrow's thought-provoking research, "Big Brother" is very evident in 2004. O'Harrow, a Pulitzer Prize finalist at the Washington Post, clearly articulates how American citizens are increasingly exposed to private and governmental forms of surveillance. Tracking the moves of private citizens is accomplished through a variety of seemingly routine data, such as detailed phone records, credit card purchases, cars with tracking systems, ATM purchases, automobiles with E-Z Pass, magnetic strip identification cards, and so on. Advanced technology surveillance has both positive and negative consequences. On the one hand, many suspected terrorists have been detained, and law enforcement agencies are sharing information with one another. But increased surveillance imposes conformity, threatens civil liberties and individual freedoms, and introduces the uneasy feeling of constantly being watched. This timely, informative, and wonderfully written book on the subject is highly recommended for all libraries.-Tim Delaney, SUNY at Oswego Copyright 2004 Reed Business Information.
Kirkus Reviews
Washington Post reporter O'Harrow investigates the possibilities of maintaining privacy protections in the wake of increased surveillance after 9/11. At this date, the picture is grim. "The attacks on the World Trade Center and the Pentagon reignited and reshaped a smoldering debate over the proper use of government power to peer into the lives of ordinary people," he writes. Databases and dossiers, surveillance cameras, biometrics, even "non-invasive neuro-electric sensors": the information highway meets national insecurity. From Starbucks to the subway to the sidewalk, you are being watched, every electronic transaction recorded. Your personal identification material, your eating and sexual preferences, your family history are all probably on a chip somewhere, easily accessible. Personal data is now a full-blown commodity, bought and sold like sow bellies. Although O'Harrow voices a clear concern over the ethics of such snooping, he concentrates on the nature and tools of data collection, persuasively delineating how that information is abused and how unavoidable mistakes have profound consequences. Exacerbating this problem is the rising incidence of identity theft, thanks to the ease with which databases can be accessed. With visions of COINTELPRO, J. Edgar Hoover, and Joseph McCarthy dancing in his head, O'Harrow is deeply wary of John Ashcroft's desire to gut the Privacy Act of 1974. He keeps a level tone, never getting frantic, but then he doesn't have to. The horror stories speak for themselves: people whose credit ratings have been destroyed because of foul-ups, people who have been arrested because they happened to have the same name as a criminal, people grilled by securitypersonnel because they fit a certain profile, political activists tagged as "criminal extremists." In each case, O'Harrow shows, it was a Sisyphean task to get the records set straight-and forget about an apology. Skillful chart of a surveillance society out of control. The question is: Who will snoop on the snoopers, and what laws will keep them in check? Agent: Amy Rennert/Amy Rennert Agency
Read More Show Less

Product Details

  • ISBN-13: 9780743254809
  • Publisher: Free Press
  • Publication date: 1/4/2005
  • Pages: 368
  • Product dimensions: 6.30 (w) x 9.48 (h) x 1.20 (d)

Meet the Author


Robert O'Harrow, Jr., is a reporter at The Washington Post and an associate of the Center for Investigative Reporting. He was a Pulitzer Prize finalist for articles on privacy and technology and a recipient of the 2003 Carnegie Mellon Cyber Security Reporting Award. He lives in Arlington, Virginia.
Read More Show Less

Read an Excerpt

No Place to Hide


By Robert O'Harrow, Jr.

Free Press

Copyright © 2005 Robert O'Harrow, Jr.
All right reserved.

ISBN: 0-7432-8705-3


Chapter One

Six Weeks in Autumn

Assistant Attorney General Viet Dinh took his seat in La Colline restaurant on Capitol Hill and signaled for a cup of coffee. It was one of those standard Washington breakfasts, where politicos mix schmoozing and big ideas to start their days.

An intense foot soldier for Attorney General Ashcroft, Dinh had been in his job for only a few months. He wanted to make a good impression on others at the session and craved the caffeine to keep his edge. As he sipped his fourth cup and listened to the patter of White House and Hill staffers, a young man darted up to the table. "A plane has crashed," he said. "It hit the World Trade Center."

Dinh and the rest of the voluble group went silent. Then their beepers began chirping in unison. At another time, it might have seemed funny, a Type-A Washington moment. Now they looked at one another and rushed out of the restaurant. It was about 9:30 A.M. on September 11, 2001.

Dinh hurried back to the Justice Department, where the building was being evacuated. Like countless other Americans, he was already consumed with a desire to strike back. Unlike most, however, he had an inkling of how: by doing whatever was necessary to strengthen the government's legal hand against terrorists.

JimDempsey was sifting through emails at his office at the Center for Democracy and Technology on Farragut Square when his boss, Jerry Berman, rushed in. "Turn on the TV," Berman said. Dempsey reached for the remote, and images came rushing at him. Crisp sunshine. Lower Manhattan glinting in the brilliance. A jetliner cutting through the scene.

Dempsey was a lanky and slow-speaking former Hill staffer who combined a meticulous attention to detail with an aw-shucks demeanor. Since the early 1990s, he has been one of the leading watchdogs of FBI surveillance initiatives, a reasoned and respected civil liberties advocate routinely summoned to the Hill by both political parties to advise lawmakers about technology and privacy issues.

As he watched the smoke and flames engulf the World Trade Center, he knew it was the work of terrorists, and the FBI was foremost in his mind. "They have screwed up so bad," he said to himself. "With all the powers and resources that they have, they should have caught these guys."

At the same moment, it dawned on him that his work - and the work of many civil liberties activists over the years to check the increasingly aggressive use of technology by law enforcement officials - was about to be undone.

The car arrived at Senator Patrick Leahy's house in northern Virginia shortly after 9 am. The Vermont Democrat took his place in the front seat and, as the car coursed toward the Potomac, he read through some notes about the pending nomination of a new drug czar and thought about a meeting that morning at the Supreme Court.

Half-listening to the radio, Leahy heard something about an explosion and the World Trade Center. He asked the driver to turn it up, then called some friends in New York. They told him what they were seeing on television. It sounded ominous. The car continued toward the Supreme Court and the conference he was to attend with Chief Justice William Rehnquist and circuit court judges from around the country. Leahy headed to the Court's conference room, with its thickly carpeted floors and oak-paneled walls lined with portraits of the first eight chief justices. When Rehnquist arrived, Leahy leaned toward him and whispered, "Bill, before we start, I believe we have a terrorist attack."

As if on cue, a muffled boom echoed through the room. Smoke began rising across the Potomac from the Pentagon.

Leahy chaired the Senate Judiciary Committee, putting him at the center of an inevitable debate about how to fight back. Leahy was one of Congress's most liberal members, a longtime proponent of civil liberties who had always worked to keep the government from trampling individual rights. But Leahy was also a former prosecutor, a pragmatist who understood what investigators were up against in trying to identify and bring down terrorists.

He knew that conservatives were going to press him for more police powers while civil libertarians would look to him as their standard-bearer. Leahy wanted to strike the right balance. But after watching an F-16 roar over the Mall that afternoon, he resolved to do whatever he could, as a patriot and a Democrat, to give law enforcement officials more tools to stop future attacks.

The attacks on the World Trade Center and the Pentagon didn't just set off a national wave of mourning and ire. They reignited and reshaped a smoldering debate over the proper use of government power to peer into the lives of ordinary people.

The argument boiled down to this: In an age of high-tech terror, what is the proper balance between national security and the privacy of millions of Americans, whose personal information is already more widely available than ever before? Telephone records, emails, oceans of detail about individuals' lives - the government wanted access to all of it to hunt down terrorists before they struck.

For six weeks that fall, behind a veneer of national solidarity and bipartisanship, Washington leaders engaged in pitched, closed-door arguments over how much new power the government should have in the name of national security. They were grappling not only with the specter of more terrorist attacks but also with the chilling memories of Cold War Red-baiting, J. Edgar Hoover's smear campaigns, and Watergate-era wiretaps.

At the core of the dispute was a body of little known laws and rules that, over the last half century, defined and limited the government's ability to snoop: Title III of the Omnibus Crime Control and Safe Streets Act governed electronic eavesdropping. The "pen register, trap and trace" rules covered the use of devices to track the origin and destination of telephone calls. The Foreign Intelligence Surveillance Act, or FISA, regulated the power to spy domestically when seeking foreign intelligence information.

The White House, the Justice Department, and their allies in Congress now wanted to ease those restraints, and they wanted to do it as quickly as possible. Though put into place to protect individuals and political groups from past abuses by the FBI, CIA, and others, the restrictions were partly to blame for the intelligence gaps on September 11, the government said. Implicit in that wish list was the desire to tap into the data revolution. In the previous decade, the world had watched the power of computers increase at an extraordinary pace. At the same time, the price of data storage plummeted, while new software tools enabled analysts to tap into giant reservoirs of names, addresses, purchases, and other details, and make sense of it all. It was a kind of surveillance that didn't rely only on cameras and eavesdropping. This was the age of behavioral profiling and at the front were the marketers who wanted you to open your wallet. Now the government wanted their help.

The administration also wanted new authority to secretly detain individuals suspected of terrorism and to enlist banks and other financial services companies in the search for terrorist financing. Law enforcement sought broad access to business databases filled with information about the lives of ordinary citizens. All this detail could help investigators search for links among plotters.

Jim Dempsey and other civil libertarians agreed that the existing laws were outdated, but for precisely the opposite reason - because they already gave the government access to immense amounts of information unavailable a decade ago. Handing investigators even more power, they warned, would lead to privacy invasions and abuses.

They stared at a television in the bright sunroom of Dinh's Chevy Chase home, a handful of policy specialists from the Justice Department who wondered what to do next. Only hours before, they had fled their offices, cringing as fighter jets patrolled Washington's skies. Now, as news programs replayed the destruction, they talked about their friend Barbara Olson, conservative commentator and wife of Solicitor General Ted Olson. She was aboard American Airlines Flight 77 when it crashed into the Pentagon.

Dinh couldn't believe Barbara was gone. He'd just had dinner at the Olsons' house two nights before, and she had been in rare form. Her humor was irrepressible. Dinh passed around a book of photography she had signed and given to him and the other dinner guests, Washington, D.C.: Then and Now.

It was hard to process so much death amid so much sunshine. Dinh and his colleagues tried to focus on the work ahead. They agreed they faced a monumental, even historic task: a long-overdue reworking of anti-terrorism laws to prevent something like this from happening again on American soil. Their marching orders came the next morning, as they reconvened in a conference room in Dinh's suite of offices on the fourth floor of Justice. Ashcroft wasn't there - he was in hiding along with other senior government officials. Just before the meeting, Dinh had spoken to Adam Ciongoli, Ashcroft's counselor, who conveyed the attorney general's desires.

"Beginning immediately," Dinh told the half dozen policy advisers and lawyers, "we will work on a package of authorities" - sweeping, dramatic, and based on practical recommendations from FBI agents and Justice Department lawyers in the field. "The charge [from Ashcroft] was very, very clear: 'all that is necessary for law enforcement, within the bounds of the Constitution, to discharge the obligation to fight this war against terror,'" he said.

Dinh's enthusiasm for the task was evident. At thirty-four, he seemed perpetually jazzed up, smiled often and spoke quickly, as though his words, inflected with the accent of his native Vietnam, couldn't keep up with his ideas. A graduate of Harvard Law School, he had learned his way around Washington as an associate special counsel to the Senate Whitewater committee, and as a special counsel to Senator Pete Domenici (R-N.M.) during the Clinton impeachment trial. "What are the problems?" Dinh asked the group around the table.

For the next several hours - indeed, over the next several days - Dinh's colleagues catalogued gripes about the legal restraints on detective and intelligence work. Some of the complaints had been bouncing around the FBI and Justice Department for years. Because of the law's peculiarities, it was unclear if investigators were allowed to track the destination and origin of email the same way they could phone calls. They could obtain search warrants more easily for a telephone tape machine than for commercial voice-mail services. And the amount of information that intelligence agents and criminal investigators were permitted to share was limited, making it much harder to target and jail terrorists.

All of this, the lawyers agreed, had to change. Now.

Jim Dempsey was swamped. Reporters, other activists, congressional staffers - everyone wanted his take on how far the Justice Department and Congress would go in reaction to the attacks. "We were getting fifty calls a day," he recalled. Dempsey knew Congress would not have the will to resist granting dramatic new powers to law enforcement. It was a classic dynamic: Something terrible happens. Legislators rush to respond. They don't have time to investigate the policy implications thoroughly, so they reach for what's available and push it through.

That was a nightmare for Dempsey. Looking for signs of hope that the legislative process could be slowed, even if it could not be stopped, he made his own calls around town. "A crisis mentality emerges, and there was clearly a crisis.... The push for action, the appearance of action, becomes so great."

Within days of the attack, a handful of lawmakers took to the Senate floor with legislation that had been proposed and shot down in recent years because of civil liberties concerns. Many of the proposals had originally had nothing to do with terrorism. One bill, called the Combating Terrorism Act, proposed expanding the government's authority to trace telephone calls to include email. It was a legacy of FBI efforts to expand surveillance powers during the Clinton administration, which had supported a variety of technology-oriented proposals opposed by civil libertarians. Now it was hauled out and approved in minutes.

One of the few voices advocating calm deliberation was Patrick Leahy. It was not clear what he would be able to do in such a highly charged atmosphere.

Across the city and across the country, other civil libertarians braced themselves for the fallout from the attacks. Among them was Morton Halperin, former head of the Washington office of the American Civil Liberties Union and a former national security official in three administrations. Halperin, a senior fellow at the Council on Foreign Relations, was personally familiar with government surveillance.

While working as a National Security Council staffer in the Nixon administration, Halperin was suspected of leaking information about the secret U.S. bombing of Cambodia. His house was wiretapped by the FBI, and the taps continued for months after he left the government.

Now, twenty-four hours after the attacks, he read an email from a member of an online group that had been formed to fight a Clinton administration plan to make publishing classified materials a crime. The writer warned the plan would be reprised. Halperin had been anticipating this moment for years. More than a decade ago, he wrote an essay predicting that terrorism would replace communism as the main justification for domestic surveillance. "I sat and stared at that email for a few minutes and decided that I could not do my regular job, that I had to deal with this," he would say later.

Halperin banged out a call to arms on his computer. "There can be no doubt that we will hear calls in the next few days for congress to enact sweeping legislation to deal with terrorism," he wrote in the email to more than two dozen civil libertarians on September 12. "This will include not only the secrecy provision, but also broad authority to conduct electronic and other surveillance and to investigate political groups.... We should not wait."

Within hours, Jim Dempsey, Marc Rotenberg from the Electronic Privacy Information Center, and others had offered their support. Their plan: To build on Halperin's call for legislative restraint while striking a sympathetic note about the victims of the attacks. They started putting together a meeting to sign off on a civil liberties manifesto: "In Defense of Freedom at a Time of Crisis."

Underlying the discussion about how to respond to the terror attacks was the mid-1970s investigation, led by Senator Frank Church (D-Idaho), into the government's sordid history of domestic spying. Through hundreds of interviews and the examination of tens of thousands of documents, the Church Committee found that the FBI, the CIA, and other government agencies had engaged in pervasive surveillance of politicians, religious organizations, women's rights advocates, anti-war groups, and civil liberties activists.

At FBI headquarters in Washington, agents had developed more than half a million domestic intelligence files during the Cold War. The CIA had secretly opened and often photographed almost a quarter-million letters in the United States from 1953 to 1973. One of the most egregious intelligence abuses was an FBI counterintelligence program known as COINTELPRO. It was, the Church Report said, "designed to 'disrupt' groups and 'neutralize' individuals deemed to be threats to domestic security." Among other things, COINTELPRO operations included undermining the jobs of political activists, sending anonymous letters to "spouses of intelligence targets for the purposes of destroying their marriages," and a systematic campaign to undermine the Reverend Martin Luther King, Jr.'s, civil rights efforts through leaked information about his personal life. "Too many people have been spied upon by too many government agencies and too much information has been collected" through secret informants, wiretaps, bugs, surreptitious mail opening, and break-ins, the Church Report had warned.

Christopher Pyle, a professor at Mount Holyoke College, remembers those days well. In 1967 and 1968, while serving in the Army, he taught law at the Army's intelligence school at Fort Holabird, Maryland. One of his classes focused on CONUS intelligence and spot reports, the Army's shorthand for intelligence in the continental United States. No one told him exactly what to teach, so he concentrated on what he thought the Army might need to quell riots, the use of maps, layouts of city parks for bivouacs, the configuration of bridges, so that Army trucks would not get stuck under them or fall through them on the way to a crisis. One day an officer directly involved in actual CONUS intelligence operations approached him.

(Continues...)



Excerpted from No Place to Hide by Robert O'Harrow, Jr. Copyright © 2005 by Robert O'Harrow, Jr.. Excerpted by permission.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Contents

Introduction: No Place to Hide

1 Six Weeks in Autumn

2 Data Revolution

3 Who Am I?

4 The Matrix

5 Look Me Up Sometime

6 The Immutable Me

7 Total Information Awareness

8 The Government's Eyes and Ears

9 Good Guys, Bad Guys

10 No Place to Hide

Notes

Acknowledgments

Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted April 28, 2005

    Enjoy your privacy? Ha! You live in a fantasy.

    This book likely only scratches the surface of the relentless and constantly growing intrusion into our private lives by a secretive consortium of commercial data collectors and the security apparatchiki of the federal government. I urge you to buy and read this book and then, when you are sufficiently convinced that the federal security powers are way out of control, buy another 3 copies and send 1 each to your two senators and congressional representative - with a cover letter asking them what they plan to do to protect your privacy.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)