World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing / Edition 1

Hardcover (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Hardcover)
  • All (31) from $1.99   
  • New (8) from $11.95   
  • Used (23) from $1.99   



Unique, international personal identifiers . . . near-instantaneous data mining . . . biometric face printing . . .intelligent embedded devices everywhere that record, interpret, andtransmit virtually everything you say and do. It's not sciencefiction. Much of this technology is already in place and the restis on the way. By the end of the current decade we will inhabit aman-made environment of ubiquitous computing in which everything isrecorded and nothing is forgotten.

World Without Secrets explores the realities and implications of aworld in which anyone who wants badly enough to know anything aboutyou, your business, or anything else will be able to get thatinformation. It examines the information-gathering technologiesthat are and will be deployed-on our streets, in our offices andpublic buildings, even in our homes and cars-and explains theirbenefits as well as potential serious abuses.

This bone-chilling exposé investigates the likely impact ofubiquitous computing on every aspect of our business, personal,political, and cultural lives. Will we be safer and our propertymore secure? When everything is known, how will we decide what'smost important to know? Will there be any way to keep confidentialinformation confidential? How will business protect intellectualcapital?

World Without Secrets also takes you into the "shadow world" ofstate and private-sector criminals whose livelihood is based onillicit use of growing mountains of information. It offersstrategies for surviving and succeeding in a world that is rifewith opportunity but dangerous for the wary and unwary alike. Andit suggests policy options that can protect individuals andorganizations from exploitation and safeguard the implicit contractbetween employees, businesses, and society itself.

Peppered with uncommonly sharp insights into the way we understandinformation, conduct business, and try to control our surroundings,World Without Secrets breaks new ground in describing the impact ofnew technologies on the way we live and work. This comprehensiveguide to the immediate future is compelling and necessary readingfor anyone who wants to prepare personally and professionally forthe enormous changes soon to come.

For more information, please visit

Read More Show Less

Editorial Reviews

From the Publisher
"...the book is important — it contains fresh thinking, ararity these days.... [Richard Hunter] is always provocative. Hegathers impressions and conversations from a surprisingly broadarray of sources. He assembles this material into somethingapproaching a coherent whole.... [Richard Hunter's][i]nsights...are well worth the price of admission to WorldWithout Secrets." (New York Times, April 28, 2002)

World Without Secrets: Business, Crime and Privacy in the Ageof Ubiquitous Computing by Richard Hunter delivers a first-rateexplanation of the impact of technology on the public, government,business and communities. Hunter, who is vice president anddirector of security research for GartnerG2, a division of theworld's largest technology research firm, writes expertly andurgently about the panoply of internet-related problems each ofthese diverse groups will face in the years ahead. "There's way toomuch information-about everything-out there now, and it's going toget a lot worse," Hunter argues. Because technologies arrive atdifferent times, their impacts are cumulative. We don't see thetrue effects of a technology's use until long after that technologyhas invaded our everyday world. Looking forward, Hunter describes aworld in which loss of privacy, technological terrorism and theheist of artistic rights are a foregone conclusion. This is animportant book which sheds thought-provoking light on the slipperyslope we are descending when it comes to Internet technology.(BookPage, August 2002)

"...I would however definitely recommend this book as itcertainly is an interesting, if not a little chilling, read..."(M2 Best Books, 5 September 2002)

" excellent introduction to contemporary attitudes towardsand policies of surveillance..." (Free Pint, 31 October2002)

"...written with a mixture of eloquence and frivolity that makesthe book hard to put is carefully crafted from numerousinterviews with create a well-rounded and multi-facedstory..." (The Times Higher Educational Supplement, 15November 2002)

Publishers Weekly
The warning bell about our rapidly disappearing privacy is sounded again albeit none too stridently in this study of new technologies and their impact. Hunter, a vice-president at Gartner's Research organization, a business technology consulting group, wants to sketch out how the omnipresence of computers affects every last centimeter of modern human existence. His first chapter, "Why Won't They Leave Me Alone?" is most to the point, asking, on the subject of Internet commerce, "Is the convenience of being known everywhere worth the risk of being known everywhere?" More worrisome than having a digital signature follow you everywhere online he uses the example of's ability to remember things you've bought or even just looked at is the ubiquity of surveillance in public and private spaces. One chapter addresses the tracking of cars, relating the story of a man who was fined $450 for driving his rental car over the speed limit. It wasn't the police that caught him it was a global positioning satellite system in the car. From there, Hunter assays such subjects as the Open Source debate (over making the source codes of commercial operating systems and applications available to the public) and Internet crime. While each of the chapters is useful by itself, Hunter's thesis gets progressively fainter as the book goes on. Very little is resolved by the end of this less-than-groundbreaking study, but it may still be interesting for those new to the subject. (May) Copyright 2002 Cahners Business Information.
Read More Show Less

Product Details

  • ISBN-13: 9780471218166
  • Publisher: Wiley
  • Publication date: 4/19/2002
  • Edition number: 1
  • Pages: 304
  • Product dimensions: 9.21 (w) x 6.14 (h) x 0.75 (d)

Meet the Author

RICHARD HUNTER is Vice President, Security Research, GartnerG2, the strategic business growth division of Gartner, Inc., the world's largest technology research firm. Hunter is internationally renowned for his expertise in technology and security, cybercrime, information management, and privacy. He was formerly Vice President and Director of Research for Applications Development at Gartner. Hunter earned a bachelor's degree from Harvard University with a concentration in music and is also a world-class harmonica virtuoso. He works in Gartner's headquarters in Stamford, Connecticut, and lives nearby.

Read More Show Less

Table of Contents

Preface xiii

Acknowledgments xvii

Everything You Need to Know before We Start xix

A Brief History of the Next 10 Years xxi

Chapter 1: 1

Why Won’t They Leave Me Alone?

The Power of Names and Numbers 2

What Does It Take to Create a Universe? 3

Crossing Over 5

More Data, More Power, Few Controls 6

Unstoppable Momentum 8

By the Numbers 9

Where Did the Secrets Go? 10

Chapter 2:13

Streets Without Secrets

How the Future Worked in the Past 15

Authentication and the Exception Economy 17

How It Works in Tampa 19

What the Software Knows 21

Yes, Probably 22

Does It Work? 23

More Faces in View 25

Walk with Me 25

Keep Walking 27

Do the Math 28

Draw the Lines 31

So? 33

Eternally Vigilant? 34

Chapter 3: 37

Homes Without Secrets

I Want This Why? 39


About Those Cameras 42

Data at Rest 44

The Rules 45

We Are the Boundary 47

Chapter 4: 49

Cars Without Secrets The Technical Stuff: Telematics 50

Who Hears What 51

The More You Give, the More You Get 51

Who’s Driving? 53

What the Owner Wants 54

Cars Without Secrets, Now 55

What the Car Knows 56

Suppose 58

Private by Intention 59

What Can Policy Do? 60

Call Me Any Time 62

Speaking of Enhancing Performance 63

Making the Drivers Smart 64

Smart Cars, Yes 65

It’s Simple, Not 67

Hunter’s First Law 68

Chapter 5: 69

The N Party System: The Era of the Network Army

How Scenarios Work 70

The Scenarios for Social Structures 70

The Quadrants 72

The Engineered Society 73

The Lost and Lonely 75

The Conscientious Objectors 80

The Network Army 81

I Repeat: The Network Is an Amplifier 84

Chapter 6: 85

Software Without Secrets

Disruptive, Quite 86

Business Without Secrets 87

Interviewing Raymond 87

Hackers and Crackers 89

From Communities to Network Army 90

Open Source Is More Than Open Source 96

Yeah, It’s a High-Performance Team 97

Is This Message Clear? 99

The Medium and the Message 100

Why They Listen 101

Power Grabs, Not 101

Ideological Conflict and Corruption 102

Nemesis and the Network Army 104

Can I Be Your Enemy? 104

Generals Are Always Fighting the Last War 105

The Message and the Medium, and the Audience for Linux 106

If You’re Losing the Battles, Change the Battlefield 107

Free Stuff Kills Competitors, Not Markets 108

Why Not Just Let the Market Do Its Work? 109

Maybe Someone Can Be Convinced 110

How Did Things Get So Bad? 112

A Few Pointers for Engineered Society Generals 112

Hunter’s Second Law 114

Chapter 7: 115

The Rise of the Mentat

Mentat Defined 115

Why Mentats? 122

Mentats Have (Hidden) Power 123

Mentats Provide Less Information 124

The Network Mentat 124

The Mentat Reviewer 126

Choose Your Mentat 126

Trust Matters 128

Mentats and the Law of Inertia 129

Mentats and I-Filters 130

Hunter’s Second Law—Personal and Institutional Conflict 130

Breaking the Bubble 131

Would Breaking the Bubble Have Saved Cisco? 132

Reality Always Wins (in the World Without Secrets and Everywhere Else) 133

On the Interactions of Laws 133

Chapter 8:135

Distracted Consumers, Mentats, and Timothy McVeigh

The Path of Least Resistance 136

It’s Easier If You Don’t Ask 137

So Why Look? 139

Did McVeigh Do It? 140

The Necessary Knowledge Is That of What to Observe 142

What Do You See? 142

Chapter 9: 145

In the Exception Economy, Be Exceptional

What Drives the Exception Economy? 147

A Portrait of the Artist as a Very Big (or Little) Number 156

Business Without Secrets 157

The Business Is a Network 158

Art Is Exceptional, Objects Are Not 165

Chapter 10: 167

Art Without Secrets

Who Wins and Who Loses? 167

Relationships Matter: The Fate of the Music Industry 170

The Economics of Long-Playing Plastic 170

Yes, It Really Works Just Like That 174

Independents: They’re Everywhere. Are They Dangerous? 177

What about the Relationship? 179

Strategies for Record Industry Viability 180

Strategy 1: Kill Digital Distribution 181

Strategy 2: Monopolize Bandwidth 186

Strategy 3: Prohibit Alternative Business Models 188

Summary: The Fate of Digital Objects 192

Power and Knowledge 192

Chapter 11: 193

Crime Without Secrets

Buying In 194

Yeah, It’s about Technology 195

The Lessons 196

Plan B 197

What We Fear 198

It’s Not the Transaction, It’s the Database 199

Mass Victimization 200

Why Worry? 202

Chapter 12: 203

War Without Secrets

Engineered Society Warfare and the Terrorist 205

Crime Is War, War Is Crime 208

Network-Centric Warfare 209

Crackers at War: Threat or Menace? 218

What’s Potential and What’s Real? 225

What to Do, Right Now 234

Chapter 13: 245

Digital Pearl Harbor

On the Morning . 247

What Happened after Pearl Harbor 250

A Pearl Harbor for the New Century 251

A Dream of Electronic Handcuffs 252

Under Observation 255

Watching Everything Is Not Knowing Everything 256

If Automated Surveillance Works, Whom Does It Work On? 257

The Issue Is Control 259

The Return of the Engineered Society 260

Who’s Not on the Team? 261

Pearl Harbor in the Borderless World 262

Chapter 14: 265

The Last Secrets

Notes 267

Index 275

Read More Show Less

Customer Reviews

Average Rating 5
( 3 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Posted June 1, 2013

    WOW... I love MyDeals247 model - they create competition among t

    WOW... I love MyDeals247 model - they create competition among the sellers real-time.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 28, 2004

    Finally, a topic worth fearing!

    Yes, you read it right, it's worth fearing! If you depend on your job then you'll fear what this book has to show you. It's a good lesson in the risks of workplace privacy! Sure, it covers a lot more but I bought it to tell me what I already experienced. I was fired from my job for an email and I can say that this book is real. Just read it and know what they're least you'll be able to tell if they're firing you for something you actually did.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 11, 2002

    Scary Good

    Wow! What a scary, creepy and thought-provoking book Mr. Hunter has written. Ever wonder what technology is capable of? - after reading this you probably wish you hadn't. Chapters are a great read on their own, I especially found chapter7 , 'the rise of the mentant.'

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)