Privacy Handbook: Proven Countermeasures for Combating Threats to Privacy, Security, and Personal Freedom

Overview


"Those who would give up essential liberty to purchase safety," stated Benjamin Franklin in 1759, "deserve neither liberty nor safety." Unfortunately, in today's climate of fear, the government, the media and plenty of other American citizens see things differently. If you are not willing to accept "some restrictions in civil liberties to guarantee security," (as Tom Brokaw and others have phrased it), this book is essential reading. In it, Michael Chesbro shares hundreds of simple but effective measures you can...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (5) from $6.00   
  • New (1) from $17.91   
  • Used (4) from $6.00   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$17.91
Seller since 2008

Feedback rating:

(178)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New Book in Shrinkwrap.

Ships from: Fort Collins, CO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview


"Those who would give up essential liberty to purchase safety," stated Benjamin Franklin in 1759, "deserve neither liberty nor safety." Unfortunately, in today's climate of fear, the government, the media and plenty of other American citizens see things differently. If you are not willing to accept "some restrictions in civil liberties to guarantee security," (as Tom Brokaw and others have phrased it), this book is essential reading. In it, Michael Chesbro shares hundreds of simple but effective measures you can take - short of armed revolution - to preserve your privacy and sovereignty in the face of Big Brother run amok. By being aware of the various threats to financial privacy, computer and online security, private communications, home security and more, and by employing these techniques to combat them, you can protect yourself from rogue government agents and meddling bureaucracies as well as nosy neighbors, prying family members, identity thieves, stalkers, solicitors and other enemies of privacy and personal liberty.
Read More Show Less

Product Details

  • ISBN-13: 9781581603576
  • Publisher: Paladin Press
  • Publication date: 9/1/2002
  • Pages: 296
  • Product dimensions: 5.40 (w) x 8.40 (h) x 0.80 (d)

Meet the Author


Michael Chesbro is a senior counterintelligence agent with the U.S. Department of Defense. He holds degrees in security management, paralegal studies, and jurisprudence, and is a graduate of the Federal Law Enforcement Training Center. He is professionally certified as a protection officer and as a security supervisor by the International Foundation for Protection Officers. He is a board-certified forensic examiner and a fellow of the American College of Forensic Examiners, as well as a diplomate of the American Board of Forensic Examiners and the American Board of Law Enforcement Experts.
Read More Show Less

Table of Contents

Preface x
Introduction: Threat and Vulnerability Awareness--The Onionskin Concept 1
Part I Countering Threats to Financial Privacy
Chapter 1. Beware: Your Bank Is Spying on You! 5
Chapter 2. Establish a Foreign (Offshore) Bank Account 11
Chapter 3. Use PayPal for Private Financial Transactions 17
Chapter 4. Establish an E-Gold Account 21
Chapter 5. Stop Financial Institutions from Selling Your Private Information 23
Chapter 6. Opt Out of Preapproved Credit Offers 27
Chapter 7. Use Prepaid Credit Cards 29
Chapter 8. Refuse to Show ID for Credit Card Transactions 33
Chapter 9. Limit Your Use of Personal Checks and the Information on Them 35
Chapter 10. Attach a Telephone Password to Your Accounts 39
Part II Countering Threats to Computer and Online Privacy
Chapter 11. Safeguard Your Computer Files 45
Chapter 12. Use Passwords to Protect MS Word and Excel 97/2000 Documents 47
Chapter 13. Install a BIOS Password on All Your Computers 51
Chapter 14. Set a Desktop Icon to Activate Your Screen Saver 55
Chapter 15. Store Multiple Passwords Safely 57
Chapter 16. Defend against Keystroke Monitoring 59
Chapter 17. Password-Protect Your AOL Filing Cabinet 63
Chapter 18. Add a JavaScript Password to Your Web Page 65
Chapter 19. Get Password Gates for Your Web Page 71
Part III Countering Threats to Private Communications
Chapter 20. Encrypt Your E-Mail 75
Chapter 21. Beware the Magic Lantern 81
Chapter 22. Prevent Telephone Monitoring with Digital Spread Spectrum 87
Chapter 23. Install a Scrambler on Your Telephone Line 91
Chapter 24. Be Selective in Purchasing Telephone Voice-Changers 97
Chapter 25. Research Bug Detectors Carefully 99
Chapter 26. Use Prepaid Telephone Calling Cards 103
Chapter 27. Use Prepaid Cellular Telephone Service 105
Chapter 28. Purchase Caller ID, Line Blocking, and Other Telephone Services 109
Chapter 29. Use a "Call Filter" 113
Chapter 30. Fight Postal Service Abuses 115
Chapter 31. Have Your Name Removed from DMA Mailing and Telemarketing Lists 127
Chapter 32. Limit Junk Mail 131
Chapter 33. Use the U.S. Postal Service Prohibitory Order to Fight Junk Mail 135
Chapter 34. Double-Wrap Your Postal Mail 139
Part IV Countering Threats to Home Security and Privacy
Chapter 35. Secure Your Home to Ensure Personal Privacy 145
Chapter 36. Place a Barrier between the Public Street and Your Front Door 149
Chapter 37. Install a Home Alarm System 151
Chapter 38. Install High-Security Locks 157
Chapter 39. Use a Lockbox for Your Emergency Key 159
Part V Enhancing Privacy and Personal Security: Miscellaneous Tips
Chapter 40. Use a Paper Shredder 163
Chapter 41. Establish an Alternate Identity 167
Chapter 42. Employ Antisurveillance Techniques 179
Chapter 43. Cover Your Tracks: How to Disappear 189
Part VI Countering Threats to Personal Freedom and Achieving Sovereignty
Chapter 44. Use Norfed American Liberty Dollars 197
Chapter 45. Resist Government Trampling of Your Right to Travel Freely 201
Chapter 46. Question Authority 209
Chapter 47. Employ Countermeasures against Police Radar and Laser Detectors 215
Chapter 48. Oppose the Use of Traffic Cameras 223
Chapter 49. Monitor Radio Traffic with a Scanner 227
Chapter 50. Establish a Radio Network 229
Chapter 51. Prepare for Emergencies and Disasters 235
Chapter 52. Form a Mutual Support Group 239
Chapter 53. Don't Rely on 911 243
Chapter 54. Improve Your Personal Protection Skills 251
Chapter 55. Legally Resist Firearms Registration 253
Chapter 56. Get the Other Side of the Story 257
Conclusion: Aspire to Sovereignty 261
Appendix I Web Sites for Freeware Downloads 265
Appendix II Retailer and Resource Addresses 267
Appendix III Security Checklist 271
Bibliography and Selected Reading 273
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)