Nothing to Hide: The False Tradeoff between Privacy and Security

Hardcover (Print)
Rent
Rent from BN.com
$8.37
(Save 70%)
Est. Return Date: 10/28/2014
Used and New from Other Sellers
Used and New from Other Sellers
from $11.50
Usually ships in 1-2 business days
(Save 58%)
Other sellers (Hardcover)
  • All (7) from $11.50   
  • Used (7) from $11.50   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$11.50
Seller since 2014

Feedback rating:

(868)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Good
May have minimal notes/highlighting, minimal wear/tear. Please contact us if you have any Questions.

Ships from: Downingtown, PA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$12.50
Seller since 2005

Feedback rating:

(49300)

Condition: Very Good
SHIPS FAST! via UPS(AK/HI Priority Mail) within 24 hrs/ used sticker/some hilite

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$12.65
Seller since 2005

Feedback rating:

(7759)

Condition: Very Good
5-31-11 Hardcover VERY GOOD Crisp, clean, unread hardcover with light shelfwear to the dust jacket and a publisher's mark to one edge-Nice! 1.14.

Ships from: Harrisburg, PA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$15.00
Seller since 2005

Feedback rating:

(521)

Condition: Very Good
New Haven, CT 2011 First Printing 8vo. VG+/VG+. white matte DJ spine and panels, black uppercase author and bold red title, black publisher at tail end. front jacket has full ... author, enlarged red title under magnifying glass, black subtitle. red HB, stamped shallowly with black titling from head to tail, boards smooth and sharp-cornered. slipped in GW LAW SCHOOL STATIONARY, SIGNED BY PROFESSOR OF LAW DANIEL J. SOLOVE. ivory textblock interior, gently flipped through, a clear bright copy in great, like new shape. all outer edges a smooth clear ivory. 245 pp. ISBN# 9780300172317. Rockville. Read more Show Less

Ships from: Rockville, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$15.45
Seller since 2005

Feedback rating:

(7759)

Condition: Like New
5-31-11 Hardcover FINE Crisp, clean, unread hardcover with light shelfwear to the dust jacket and a publisher's mark to one edge-Nice! 1.14 lbs.

Ships from: Harrisburg, PA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$38.99
Seller since 2014

Feedback rating:

(37)

Condition: Good
Buy with Confidence. Excellent Customer Support. We ship from multiple US locations. No CD, DVD or Access Code Included.

Ships from: Fort Mill, SC

Usually ships in 1-2 business days

  • Standard, 48 States
$39.95
Seller since 2014

Feedback rating:

(8)

Condition: Good
New Haven, CT 2011 Hard cover Good. Glued binding. Paper over boards. With dust jacket. 245 p.

Ships from: Pueblo West, CO

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? 

In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.

Read More Show Less

Editorial Reviews

The Daily

“Nothing to Hide” is a potent and sobering tonic that provides an invaluable antidote to the sort of panicked rhetoric that makes privacy and civil liberties into antiquated relics at best, handmaidens of al Qaeda at worst.”—The Daily

The Daily

Nothing to Hide is a potent and sobering tonic that provides an invaluable antidote to the sort of panicked rhetoric that makes privacy and civil liberties into antiquated relics at best, handmaidens of al Qaeda at worst.”—The Daily
New York Review of Books

"Succinctly and persuasively debunks the arguments that have contributed to privacy's demise, including the canard that if you have nothing to hide, you have nothing to fear from surveillance."—David Cole, New York Review of Books

— David Cole

Choice

"[A] thought-provoking, accessible introduction to privacy and security law."—J.M. Keller, Choice

— J.M. Keller

The Law and Politics Book Review

"A very timely and thought provoking book."—Raymond G. Kessler, The Law and Politics Book Review

— Raymond G. Kessler

Security Management
"Incidents that raise questions about online security and privacy rights are a common occurrence. Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove."—Mayer Nudell, Security Management
— Mayer Nudell
Choice - J.M. Keller

"[A] thought-provoking, accessible introduction to privacy and security law."—J.M. Keller, Choice
The Law and Politics Book Review - Raymond G. Kessler

"A very timely and thought provoking book."—Raymond G. Kessler, The Law and Politics Book Review
New York Review of Books - David Cole

“Daniel Solove takes on the two biggest challenges to privacy in the twenty-first century: the rapid development of technology that gives the government the ability to track our decisions, choices, discussions, and movements in real time; and the threat of catastrophic terrorist attacks, which demand increased security measures. In clear, measured prose, Solove shows how the law of privacy has failed us in addressing these twin challenges, and proposes an innovative way forward.”—David Cole, Georgetown University Law School
Bruce Schneier

“The Information Age has turned our notions of privacy upside down. Solove is our smartest thinker on what privacy means today, and "Nothing to Hide" definitely refutes old ideas about privacy and replaces them with ones that work in the world of data brokers, Facebook, and Wikileaks. The debate will never be the same after this book.”—Bruce Schneier, author of Applied Cryptography
Jack Balkin
“Daniel Solove is one of America's leading experts on privacy law. In this engaging book, he explains why privacy is everyone's concern; it is a crucial social value that must be integrated into our national security policy rather than simply balanced against it.”—Jack M. Balkin, Yale Law School
Ann Cavoukian
"Bravo Daniel Solove! In Nothing to Hide he skillfully dispels many of the myths associated with the faulty zero-sum tradeoff between privacy vs. security. In exposing the flawed logic of having to forego one interest in order to secure another, Daniel Solove has done us all a great service."— Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada
Security Management - Mayer Nudell
"Incidents that raise questions about online security and privacy rights are a common occurrence. Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove."—Mayer Nudell, Security Management
Read More Show Less

Product Details

  • ISBN-13: 9780300172317
  • Publisher: Yale University Press
  • Publication date: 5/31/2011
  • Edition description: New Edition
  • Pages: 256
  • Product dimensions: 6.40 (w) x 9.30 (h) x 1.00 (d)

Meet the Author

Daniel J. Solove is John Marshall Harlan Research Professor of Law, George Washington University Law School. He is the author of several books about information privacy. He blogs at Concurring Opinions on issues of law, culture, and current events, and he lives in Washington, D.C.

Read More Show Less

Read an Excerpt

Nothing to Hide

The False Tradeoff between Privacy and Security
By Daniel J. Solove

Yale UNIVERSITY PRESS

Copyright © 2011 Daniel J. Solove
All right reserved.

ISBN: 978-0-300-17725-1


Chapter One

Introduction

"We must be willing to give up some privacy if it makes us more secure."

"If you've got nothing to hide, you shouldn't worry about government surveillance."

"We shouldn't second-guess security officials."

"In national emergencies, rights must be cut back, but they'll be restored later on."

We hear these arguments all the time. We hear them in the conversations we have each day with our family, friends, and colleagues. We hear them in the media, which is buzzing with stories about government information gathering, such as the Total Information Awareness program, the airline passenger screening program, and the surveillance of people's phone calls conducted by the secretive National Security Agency. We hear them made by politicians and security officials. And we hear them made by judges deciding how to balance security measures with people's constitutional rights.

These arguments are part of the debate between privacy and security. The consequences of the debate are enormous, for both privacy and security are essential interests, and the balance we strike between them affects the very foundations of our freedom and democracy. In contemporary times—especially after the terrorist attacks on September 11, 2001—the balance has shifted toward the security side of the scale. The government has been gathering more information about people and engaging in more surveillance. Technology is giving the government unprecedented tools for watching people and amassing information about them—video surveillance, location tracking, data mining, wiretapping, bugging, thermal sensors, spy satellites, X-ray devices, and more. It's nearly impossible to live today without generating thousands of records about what we watch, read, buy, and do—and the government has easy access to them.

The privacy-security debate profoundly influences how these government activities are regulated. But there's a major problem with the debate: Privacy often loses out to security when it shouldn't. Security interests are readily understood, for life and limb are at stake, while privacy rights remain more abstract and vague. Many people believe they must trade privacy in order to be more secure. And those on the security side of the debate are making powerful arguments to encourage people to accept this tradeoff.

These arguments, however, are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly, with the tradeoff between these values understood as an allor-nothing proposition. But protecting privacy need not be fatal to security measures; it merely demands oversight and regulation. We can't progress in the debate between privacy and security because the debate itself is flawed.

The law suffers from related problems. It seeks to balance privacy and security, but systematic problems plague the way the balancing takes place. When evaluating security measures, judges are often too deferential to security officials. And the law gets caught up in cumbersome tests to determine whether government information gathering should be subjected to oversight and regulation, resulting in uneven and incoherent protection. The law sometimes stringently protects against minor privacy invasions yet utterly fails to protect against major ones. For example, the Fourth Amendment will protect you when a police officer squeezes the outside of your duffel bag—yet it won't stop the government from obtaining all your Google search queries or your credit card records.

The privacy-security debate and the law have a two-way relationship. Many arguments in the debate are based on false assumptions about how the law protects privacy. And the law has been shaped by many flawed arguments in the debate, which have influenced legislation and judicial opinions.

I propose to demonstrate how privacy interests can be better understood and how security interests can be more meaningfully evaluated. I aim to refute the recurrent arguments that skew the privacy-security debate toward the security side. I endeavor to show how the law frequently fixes on the wrong questions, such as whether privacy should be protected rather than how it should be protected. Privacy often can be protected without undue cost to security. In instances when adequate compromises can't be achieved, the tradeoff can be made in a manner that is fair to both sides. We can reach a better balance between privacy and security. We must. There is too much at stake to fail.

A Short History of Privacy and Security

The law and policy addressing privacy and security is quite extensive, involving the U.S. Constitution, federal statutes, state constitutions, and state statutes. Quite a number of federal agencies are involved, such as the Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), National Security Agency (NSA), Department of Homeland Security (DHS), Transportation Security Administration (TSA), and others. There are countless state and local police departments. In order to understand how privacy and security are balanced, I will first explain briefly how we got to where we are today.

The Right to Privacy

People have cared about privacy since antiquity. The Code of Hammurabi protected the home against intrusion, as did ancient Roman law. The early Hebrews had laws safeguarding against surveillance. And in England, the oft-declared principle that the home is one's "castle" dates to the late fifteenth century. Eavesdropping was long protected against in the English common law, and in 1769, the legal scholar William Blackstone defined it as listening "under walls or windows, or the eaves of a house, to hearken after discourse, and thereupon to frame slanderous and mischievous tales."

The right to privacy emerged in countries all around the world in many different dimensions. Protections arose against invasions of privacy by nosy neighbors and gossipy newspapers, as well as against government searches and seizures. In England, for example, the idea that citizens should be free from certain kinds of intrusive government searches developed during the early 1500s.

In America, at the time of the Revolutionary War, a central privacy issue was freedom from government intrusion. The Founders detested the use of general warrants to conduct sweeping searches of people's homes and to seize their papers and writings. As Patrick Henry declared: "They may, unless the general government be restrained by a bill of rights, or some similar restrictions, go into your cellars and rooms, and search, ransack, and measure, everything you eat, drink, and wear. They ought to be restrained within proper bounds."

These sentiments were enshrined into the Bill of Rights. The Fourth Amendment to the U.S. Constitution prevents the government from conducting "unreasonable searches and seizures." Government officials must obtain judicial approval before conducting a search through a warrant that is supported by probable cause. The Fifth Amendment affords individuals a privilege against being compelled to incriminate themselves.

The Rise of Police Systems and the FBI

Security is also a universal value, tracing back to antiquity. People have long looked to their governments to keep them secure from bandits, looters, and foreign invaders. They have also wanted to ensure social order by protecting against robberies, rapes, murders, and other crimes. But for a long time, many countries lacked police forces. In medieval England, for example, posses hunted down criminals and summarily executed them. Later on, patrolling amateurs protected communities, but they rarely investigated crimes.

By the twentieth century, police forces had transformed into organized units of professionals. In the United States, policing developed locally at the city and state levels, not nationwide. The rise of the mafia and organized crime required law enforcement to find means to learn about what crimes these groups were planning. The government began to increase prosecution of certain consensual crimes, such as gambling, the use of alcohol during Prohibition, and the trafficking of drugs. Unlike robberies or assaults, which are often reported to the police, these crimes occurred through transactions in an underground market. Undercover agents and surveillance became key tools for detecting these crimes.

The FBI emerged in the early years of the twentieth century, the brainchild of Attorney General Charles Bonaparte. He twice asked Congress to authorize the creation of a detective force in the Department of Justice (DOJ), but he was rebuffed both times. Congress worried about secret police prying into the privacy of citizens. As one congressman declared, "In my reading of history I recall no instance where a government perished because of the absence of a secret-service force, but many there are that perished as a result of the spy system."

But Bonaparte was not deterred. He formed a new subdivision of the DOJ called the Bureau of Investigation, and brought in people from other agencies to staff it. In 1908 President Theodore Roosevelt issued an executive order authorizing the subdivision. J. Edgar Hoover soon took the helm of the Bureau, which was renamed the FBI in 1935.

Throughout the rest of the century, the FBI grew dramatically (see Table 1). During President Franklin Roosevelt's tenure, the size of the FBI increased more than 1000 percent. It has continued to grow, tripling in size over the past sixty years. Despite its vast size, extensive and expanding responsibilities, and profound technological capabilities, the FBI still lacks the congressional authorizing statute that most other federal agencies have.

The Growth of Electronic Surveillance

The FBI came into being as the debate over surveillance of communications entered a new era. Telephone wiretapping technology appeared soon after the invention of the telephone in 1876, making the privacy of phone communications a public concern. State legislatures responded by passing laws criminalizing wiretapping.

In 1928, in Olmstead v. United States, the U.S. Supreme Court held that the Fourth Amendment did not apply to wiretapping. "There was no searching," the Supreme Court reasoned. "There was no seizure. The evidence was secured by the use of the sense of hearing and that only. There was no entry of the houses or offices of the defendants." Justice Louis Brandeis penned a powerful dissent, arguing that new technologies required rethinking old-fashioned notions of the Fourth Amendment: "Subtler and more far-reaching means of invading privacy have become available to the government. Discovery and invention have made it possible for the government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet." He also mentioned that the Founders of the Constitution "conferred, as against the government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment."

In 1934, six years after Olmstead, Congress passed a law to prohibit wiretapping. But the law was largely ineffective, since it was interpreted only to preclude the introduction of wiretapping evidence in court. The government could wiretap freely so long as it did not seek to use the product as evidence at trial.

During World War II and the ensuing Cold War, presidents gave the FBI new authorization to engage in wiretapping. J. Edgar Hoover, still at the helm of the FBI, ordered wiretapping of hundreds of people, including dissidents, Supreme Court justices, professors, celebrities, writers, and others. Among Hoover's files were dossiers on John Steinbeck, Ernest Hemingway, Charlie Chaplin, Marlon Brando, Muhammad Ali, Albert Einstein, and numerous presidents and members of Congress. When Justice William Douglas complained for years that the Supreme Court was being bugged and tapped, he seemed paranoid—but he was right.

Protecting National Security: New Agencies and More Surveillance

During the 1940s and 1950s, enormous threats to national security loomed on the horizon. Concerns about the spread of communism and the Cold War with the Soviet Union led to an increased need for the government to engage in spying and foreign intelligence gathering. In 1942 President Roosevelt created the Office of Strategic Services (OSS) to engage in these activities, but it was eliminated after World War II. Just a few years later, however, President Truman revived the OSS's activities by creating the modern CIA with the National Security Act of 1947.

In 1952 Truman created the National Security Agency (NSA) to handle cryptology—the breaking of encryption codes so that any foreign communications collected could be analyzed. For a long time, the NSA operated with a low profile, and the few in the know quipped that its acronym stood for "No Such Agency."

Domestically, fears grew that communism was a threat not just from abroad but also from within. In the 1950s the FBI began the Counter Intelligence Program (COINTELPRO) to gather information about political groups viewed as national security threats. The FBI's tactics included secretly attempting to persuade employers to fire targeted individuals, anonymously informing spouses of affairs to break up marriages, and using the threat of Internal Revenue Service investigations to deter individuals from attending meetings and events. The primary target was the American Communist Party, but by the late 1950s and early 1960s, COINTELPRO had expanded its interests to include members of the civil rights movement and opponents of the Vietnam War. Included among these individuals was Martin Luther King, Jr., whom Hoover had under extensive surveillance. FBI recordings revealed that King was having extramarital affairs, and the FBI sent copies of the recordings to King and his wife, threatening that if King failed to commit suicide by a certain date, the recordings would be released publicly.

The Criminal Procedure Revolution

In the 1960s the U.S. Supreme Court, led by Chief Justice Earl Warren, radically transformed criminal procedure. Police systems around the country had grown substantially, and the FBI and other federal law-enforcement agencies were increasingly active. There wasn't much law regulating how the government could go about collecting information about people.

To fill this void, the Supreme Court began boldly interpreting the Fourth and Fifth Amendments to regulate what law-enforcement officials could search and seize as well as how they could question suspects. In 1961, in Mapp v. Ohio, the Supreme Court held that evidence obtained in violation of the Fourth Amendment must be excluded from evidence in criminal trials. In 1967 the Supreme Court overruled Olmstead in United States v. Katz, declaring that wiretapping was covered by the Fourth Amendment. The Court articulated a broad test for the scope of Fourth Amendment protection—it would apply whenever the government violated a person's "reasonable expectation of privacy." In 1968, just a year after Katz, Congress enacted a law to better regulate electronic surveillance. The law provided strict controls on government wiretapping and bugging.

(Continues...)



Excerpted from Nothing to Hide by Daniel J. Solove Copyright © 2011 by Daniel J. Solove. Excerpted by permission of Yale UNIVERSITY PRESS. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Preface 7

1 Introduction 1

Part I Values: How We Should Assess and Balance the Values of Privacy and Security

2 The Nothing-to-Hide Argument 21

3 The All-or-Nothing Fallacy 33

4 The Danger of Deference 38

5 Why Privacy Isn't Merely an Individual Right 47

Part II Times of Crisis: How the Law Should Address Matters of National Security

6 The Pendulum Argument 55

7 The National-Security Argument 62

8 The Problem with Dissolving the Crime-Espionage Distinction 71

9 The War-Powers Argument and the Rule of Law 81

Part III Constitutional Rights: How the Constitution Should Protect Privacy

10 The Fourth Amendment and the Secrecy Paradigm 93

11 The Third Party Doctrine and Digital Dossiers 102

12 The Failure of Looking for a Reasonable Expectation of Privacy 111

13 The Suspicionless-Searches Argument 123

14 Should We Keep the Exclusionary Rule? 134

15 The First Amendment as Criminal Procedure 146

Part IV New Technologies: How the Law Should Cope with Changing Technology

16 Will Repealing the Patriot Act Restore Our Privacy? 155

17 The Law-and-Technology Problem and the Leave-It-to-the-Legislature Argument 164

18 Video Surveillance and the No-Privacy-in-Public Argument 174

19 Should the Government Engage in Data Mining? 182

20 The Luddite Argument, the Titanic Phenomenon, and the Fix-a-Problem Strategy 199

21 Conclusion 207

Notes 211

Index 236

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted December 30, 2012

    Fantastic and full of info

    I compete in speech and debate and this year our resolution is Privacy is Undervaled. This book has helped me so much in regards to understanding privacy. It is obvious that Mr. Solvoe did his reaserch and has extensive knowledge on the subject of privacy. I would recomend this to anyone who wants to know more about privacy or is interested in politics.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)