Database Nation: The Death of Privacy in the 21st Century

Overview

Fifty years ago, in "1984", George Orwell imagined a future in which privacy was decimated by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity -- especially in this day of technologies that encroach upon these rights -- still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (48) from $1.99   
  • New (7) from $9.86   
  • Used (41) from $1.99   
Close
Sort by
Page 1 of 1
Showing 1 – 6 of 7
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$9.86
Seller since Tue Aug 05 20:14:08 EDT 2014

Feedback rating:

(6)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New Gift Quality Book in Excellent Condition.

Ships from: Newton, MA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$14.00
Seller since Mon Jan 01 01:01:01 EST 2007

Feedback rating:

(322)

Condition: New
1st Edition, Fine/Fine Clean, tight & bright. No ink names, tears, chips, foxing etc.

Ships from: Troy, NY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$14.95
Seller since Tue Oct 07 09:42:12 EDT 2014

Feedback rating:

(88)

Condition: New
100% satisfaction guaranteed. No Remainder Mark, No Damage. Ship twice daily.

Ships from: Plano, TX

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$16.42
Seller since Mon Jan 01 01:01:01 EST 2007

Feedback rating:

(264)

Condition: New
Hardcover. Book Condition: New. Jacket Condition: New. Signed by Author on Half-Title page. Crisp Tight Clean copy ! 319 pages. Size: 9.25 x 6.25 x 1.

Ships from: Weymouth, MA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$50.00
Seller since Tue Oct 07 09:37:03 EDT 2014

Feedback rating:

(184)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$50.00
Seller since Tue Oct 07 09:37:03 EDT 2014

Feedback rating:

(184)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 6 of 7
Close
Sort by
Database Nation: The Death of Privacy in the 21st Century

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.49
BN.com price
(Save 25%)$13.99 List Price
This digital version does not exactly match the physical book displayed here.

Overview

Fifty years ago, in "1984", George Orwell imagined a future in which privacy was decimated by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity -- especially in this day of technologies that encroach upon these rights -- still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.

Today's threats to privacy are more widely distributed than they were in Orwell's state, and they represent both public and private interests. Over the next fifty years, we'll see new kinds of threats to privacy that don't find their roots in totalitarianism but in capitalism, the free market, advances in technology, and the unbridled exchange of electronic information.

Today's Threats to Privacy

* The End of Due Process. Governments and businesses went on a computer-buying spree in the second half of the 20th century, replacing billions of paper files with electronic data-processing systems. But the new computers lacked some very important qualities of the manual systems that they replaced: flexibility, compassion, and understanding. Today, humans often are completely absent from digital decision-making. As a result, we've created a world in which the smallest clerical errors can have devastating effects on a person's life. It's a world where comput- ers are assumed to be correct, and people wrong.

* The Fallibility of Biometrics. Fingerprints, iris scans, and genetic sequences are widely regarded as infallible techniques for identifying human beings. They are so good, in fact, that fifty years from now identification cards and passports will probably not exist. Instead, a global data network will allow anyone on the planet to be instantly identified from the unique markings of their own body. Will it be impossible for people to conceal their identity from the federal government, and if so, is that a good thing? What about concealing your identity from the local drug store? And who controls the databank, anyway? Would they ever need to create "false" identities?

* The Systematic Capture of Everyday Events. We are entering a new world in which every purchase we make, every place we travel, every word we say, and everything we read is routinely recorded and made available for later analysis. But while the technology exists to capture this data, we lack the wisdom to figure out how to treat it fairly and justly. Nevertheless, more and more raw data of every kind is being recorded every day, largely out of fear that if the information is thrown away, it might be needed at some point in the future. The result is an unprecedented amount of data surveillance, the effect of which we have just begun to grasp.

* The Bugging of the Outside World. Orwell thought that the ultimate threat to privacy would be the bugging of bedrooms and offices. Today, it's clear that an equally large threat to freedom is the systematic monitoring of public places. Right or wrong, we have come to expect privacy in public. Microphones, video cameras, and other remote sensing devices, combined with information processing technology, are taking that privacy away.

* The Misuse of Medical Records and the Perversion of Insurance. Traditionally, medical records have been society's most tightly-held personal records. The obligation to maintain patient confidentiality is widely regarded as one of the most basic responsibilities of medical professionals. But patient confidentiality is expensive and inefficient--two factors at odds with healthcare reform. Meanwhile, the core assumptions of healthcare insurance--pooled risk and shared costs--are under attack by companies who wish to insure only the healthy.

* Runaway Marketing. Junk mail, junk faxes, junk e-mail, and telemarketing calls during dinner are just the beginning of the 21st century's runaway marketing campaigns. Marketers increasingly will use personal information to create solicitations that are continual and virtually indistinguishable from news articles, personal letters, and other kinds of non-commercial communications. Where will we as a society draw the line between the right to free speech and the right to be free from intrusion? Will we ever be able to regulate marketers' attempts to convince people to do things that they wouldn't otherwise wish to do? Should we?

* The Commodification of Personal Information. Personally-identified information--your name, your profession, your hobbies, and the other bits that make up your self--is being turned into a valuable property right. But instead of being given to individuals to help them exert control over their lives, the property right is being seized by big business to ensure continued profits and market share.

* Genetic Autonomy. Breakthrough advances in genetics make it possible to predict disease, behavior, intelligence, and many other human traits--but all with differing levels of accuracy. Whether or not this information is correct, it will change how people are perceived and treated. Will it be possible to treat people fairly and equally if there is irrefutable scientific evidence that people are different, with different strengths, different weaknesses, and different susceptibilities to disease? How can genetic information remain confidential when it is shared within families and ethnic groups? How can our own genetic makeup be kept secret when we are constantly shedding DNA from our bodies into the environment?

* Micromanagement of Intellectual Property. To boost their profits ever higher, businesses are becoming increasingly vigilant in detecting misuse of their own intellectual property. But piracy is hard to prevent when modern technology can turn every consumer into an electronic publisher. To prevent info-theft, publishers are turning to increasingly intrusive techniques for spying on their customers. What can we do, as both producers and consumers of intellectual property, to make sure that everyone gets their fair share and a fair shake?

* The Individual as Terrorist. Astonishingly lethal technologies are now widely available throughout society, and people who resort to violence are more likely than ever before to use these technologies. How can society reasonably protect itself from random acts of terrorism without putting every single person under surveillance? How can society protect itself from systematic abuses by law enforcement officials, even when those abuses seem to be in the public interest?

* Intelligent Computing. The utmost threat to privacy will be intelligent computers--machines that can use human-like reasoning powers, combined with blinding calculating speed, to assemble coherent data portraits, to interpret and anticipate our mental states, and to betray us with false relationships. These awesome machines of the not-too-distant future will ultimately change of the rules on which our society is built.

Why This Book?

This book is more than simply a journalistic summary of the current state of privacy rights and violations. It is a call to arms. Forty years ago, unbridled technology attacked our environment -- and few people seemed to know or care. With the publication of "Silent Spring" in 1962, Rachel Carson opened our eyes. Her graphic depiction of the ecological and health ravages brought by technology made many people realize the risks as never before. Today, our environment still imperils us, but things are better than they might have been, and we have a population that's informed and, in many cases, activist.

This book pleads the case for privacy in the same way. There is much that can be done with, not in spite of, technology. An aware public is the first step. It is our hope that this book will open the public's eyes to the many intrusions on our privacy before it is too late.

"Database Nation" is a compelling account of how invasive technologies will affect peoples lives in the coming years. It's a timely and thought-provoking look at the serious threats to personal privacy. The book poses a disturbing question: how can citizens protect their basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?

Read More Show Less

Editorial Reviews

Library Journal
If you have a computer with Intel's "processor serial number," own a pet with an embedded "radio frequency identification device," use ATMs and credit cards, and shop on the Internet, privacy is almost a nonexistent concept, because your every move is being tracked and stored somewhere for future use. Garfinkel, who has reported on computer privacy issues for Wired and other publications, is an exceptional writer who clearly understands his topic; here he explores today's threats to privacy and how they might be stopped. This is for all libraries. Copyright 2000 Cahners Business Information.\
From The Critics
In a blink of an eye since the PC became a mainstream tool in the United States, an expanding universe of technology has sucked us in, each innovation begetting another.

Rather than see these beguiling innovations as a positive development, veteran tech writer Simson Garfinkel sees them as enablers of a technological future in which our personal preferences and private lives are thrown open for all to see and cash in on. In his new book, Database Nation, he launches into a meticulous examination of the seemingly endless ways in which our privacy is under attack.

This isn't simply another cautionary tale about the Internet. Garfinkel has the historical vision and storytelling chops, both sorely lacking among today's tech and business press, to stitch together an exhaustive range of topics - medical records, biological warfare, United Parcel Service's package tracking system, even satellite pictures of Earth - into a panoply of privacy concerns. The Internet is just the tip of a very frightening iceberg.

Garfinkel is both a skeptic and an enthusiast of new technology: For five years, he relied on a voice-recognition system to guard his house rather than a lock and key. And with the exception of a gloomy prediction for a future filled with nuclear or biochemical terrorism, Database Nation is mostly an earnest call to arms (he even ends with a "Privacy Now" manifesto).

Indeed, the book devotes much of the last 100 pages to the growing threat of terrorism and the "democratization" of deadly weapons. It's the "irrational terrorist," the loner who cares little about the repercussions of his actions, who scares Garfinkel and forces him to side, to some extent, with government. In the process, though, he relegates skeptics of the government's good intentions to a few meager quotes.

Unlike many in the tech industry, Garfinkel welcomes legislation to rein in private industry. He draws on the early history of the information-collection business to make his point: "Left to its own devices, private industry created a system in the 1960s that was tremendously unfair to private citizens. Yes, there was a free information market, but it was a market in which only businesses could participate."

He's no Pollyanna about government abuse either, citing a litany of cases including the World War II internment of Japanese Americans and the excesses of J. Edgar Hoover's FBI. Nevertheless, it isn't a centralized government database Garfinkel fears - it's the unchecked, unregulated power of marketers.

For those who claim that improved technology will allow advertisers to target consumers with personal, customized offers, Garfinkel foresees a future snag: A man decides to take his mistress to New York for Valentine's Day. His airline and hotel reservations trigger a flood of "personalized" ads once he's back home that hawk special offers from every romantic eatery and jewelry store in Manhattan.

It's not only spam that worries Garfinkel. It's the power that businesses wield with personal information. Take the case of a Los Angeles man who injured his leg in a supermarket; when he sued, the market used records of his alcohol purchases to malign his character. Our "data shadows" - a term coined by Columbia professor Alan Westin - "force us to live up to a new standard of accountability," Garfinkel writes. "And because the information that makes up these shadows is occasionally incorrect, they leave us all vulnerable to punishment or retaliation for action that we did not even commit."

Sure, such inaccuracies are not the norm. But even in the best-case scenarios offered by information gatherers, any margin of error can ruin hundreds of lives. The Medical Information Bureau, the insurance industry's private clearinghouse of medical data, boasts a 97 percent accuracy rate. Unfortunately, that leaves hundreds of people with inaccuracies that could determine the price of their insurance - or whether they get insurance at all.

For all but the most studied privacy expert, Database Nation will provide not only valuable history and insight, but a rousing call to arms. For marketers on the Net, Garfinkel's book shows what they're likely to be up against from newly awakened customers.

The New Yorker
If you want a good scare, you could go on-line and download the latest Stephen King, or you could read this book, which explains how corporations keep track of things like—well, what you've just downloaded...Other writers have raised alarms, but no on has revealed the encroachments of technology on privacy in such exacting detail. Living in a global village, it seems, is like living in a real one: you have to deal with a lot of busibodies.
Read More Show Less

Product Details

  • ISBN-13: 9781565926530
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 1/8/2000
  • Pages: 319
  • Product dimensions: 6.31 (w) x 9.28 (h) x 0.93 (d)

Meet the Author

Simson Garfinkel, CISSP, is a journalist, entrepreneur, and international authority on computer security. Garfinkel is chief technology officer at Sandstorm Enterprises, a Boston-based firm that develops state-of-the-art computer security tools. Garfinkel is also a columnist for Technology Review Magazine and has written for more than 50 publications, including Computerworld, Forbes, and The New York Times. He is also the author of Database Nation; Web Security, Privacy, and Commerce; PGP: Pretty Good Privacy; and seven other books. Garfinkel earned a master's degree in journalism at Columbia University in 1988 and holds three undergraduate degrees from MIT. He is currently working on his doctorate at MIT's Laboratory for Computer Science.

Read More Show Less

Read an Excerpt

Identity Theft: The Case of Steven Shaw


In recent years, there has been a sudden and dramatic growth of a new kind of crime, made possible by the ready availability of both credit and once-private information on Americans. In these cases one person finds another's name and Social Security number, applies for a dozen credit cards, and proceeds to run up huge bills. (Many banks make this kind of theft far easier than it should be, by printing their customers' Social Security number on their bank statements.) Sometimes the thieves enjoy the merchandise for themselves, go on lavish trips, and eat in fine restaurants. Other times the thieves fence the ill-gotten merchandise, turning it into cash. This crime has become so common that it has earned its own special name: identity theft.

A typical case is what happened to Stephen Shaw, a Washington-based journalist. Sometime during the summer of 1991 a car salesman from Orlando, FL, with a similar name-Steven Shaw-obtained Stephen Shaw's credit report. This is actually easier than it sounds. For years, Equifax had aggressively marketed its credit reporting service to car dealers. The service lets salespeople weed out the Sunday window-shoppers from the serious prospects by asking a customer's name and then surreptitiously disappearing to the back room and running a quick credit check. In all likelihood, says the Washington-based Shaw, the Shaw in Florida had simply gone fishing for someone with a similar-sounding name and a good credit history.

Once Steven Shaw in Florida had Stephen Shaw's Social Security number and credit report, he had all that he needed to steal the journalist's identity. Besides stating that Stephen Shaw had excellent credit, the report listed his current and previous addresses, his mother's maiden name, and the account numbers of all of his major credit cards. Jackpot!

"He used my information to open 35 accounts and racked up $100,000 worth of charges," says Stephen Shaw. "He tagged me for everything under the sun-car loans, personal loans, bank accounts, stereos, furniture, appliances, clothes, airline tickets."

Because all the accounts were opened with Stephen Shaw's name and Social Security number, all of the businesses held the Washington-based Stephen Shaw liable for the money that the other Shaw spent. And when the bills weren't paid, the companies told Equifax and the other credit bureaus that Stephen Shaw, the man who once had stellar credit, was now a deadbeat.

Shaw says that it took him more than four years to resolve his problems-a period that appears to be typical for most identity theft victims. That's four years of harassing calls from bill collectors, of getting more and more angry letters in the mail, or not knowing what else is being done in your name. Four years of having your creditors think of you as a deadbeat. During this period, it's virtually impossible for the victim to obtain a new credit card or a mortgage. One of the cruelest results of identity theft is that many victims find themselves unemployable; in addition to references, many businesses routinely check credit reports of their job applicants.

Identity theft is made possible because credit-card companies, always on the lookout for new customers, don't have a good way to verify the identity of a person who mails in an application or orders a credit card over the telephone. So the credit card companies make a dangerous assumption: they take it for granted that if you know a person's name, address, telephone number, Social Security number, and mother's maiden name, then you must be that person. And when the merchandise is bought and the bills aren't paid, that person is the one held responsible.

Nobody is really sure how prevalent identity theft is today, but it is definitely on the rise. Ideally the perpetrators should be jailed, fined, and otherwise punished. But law enforcement agencies are overwhelmed, and the courts have not allowed the true victims-the people who have had their identity stolen-to press charges against the perpetrators. That's because the law sees the company that issued the credit as the aggrieved party, not the person who had their identity stolen. That's great for the identity thieves: for most large banks, it's rarely worth the expense to prosecute a case.

But ultimately, identity theft is flourishing because credit-issuing companies are not being forced to cover the costs of their lax security procedures. The eagerness with which credit companies send out pre-approved credit-card applications creates the risk of fraud; when the fraud takes place, the credit issuer simply notes that information in the consumer's credit file and moves on; the consumer is left to pick up the pieces and otherwise deal with the cost of a stolen identity. It stands to reason, then, that the easiest way to reduce fraud would be to force the companies that are creating the risk to suffer the consequences. One way to do that would by penalizing companies that add provably false information to a consumer credit report the same way we penalize individuals who file false police reports. Such penalties would force credit grantors to do a better job identifying the individuals to whom they grant credit, which would, in turn, do a good job of limiting the crime of identity theft.
Read More Show Less

Table of Contents

1. Privacy Under Attack 1
2. Database Nation 13
3. Absolute Identification 37
4. What Did You Do Today? 69
5. The View from Above 93
6. To Know Your Future 125
7. Buy Now! 155
8. Who Owns Your Information? 177
9. Kooks and Terrorists 209
10. Excuse Me, But Are You Human? 241
11. Privacy Now! 257
Annotated Bibliography and Notes 273
Acknowledgments 293
Index 299
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)
Sort by: Showing all of 7 Customer Reviews
  • Anonymous

    Posted Tue Nov 16 00:00:00 EST 2004

    Database Nation: The Death of Privacy in the 21st Century

    You will with this title. It covers a great deal on computer ID and other such material. However, I found it a bit weak on privacy countermeasures. There are other books that will supplement this greatly, like 'The Digital Umbrella' by John Bennett Jr.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Sun Nov 28 00:00:00 EST 2004

    Database Nation: The Death of Privacy in the 21st Century

    Many people know the term and some may even be familiar with what they do and how they work but how many actually know the extent of their usage? This book will shed some light on that through a detailed and well-thought approach to the topic. I'm a member of the 'paranoid' club but for good reason! Just check your credit report for errors and you'll see what a database can do.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Tue Oct 22 00:00:00 EDT 2002

    Who's Watching Me Now?

    Simson Garfinkel¿s Database Nation is a frightening account of how our privacy is being infringed upon by government, industry and certain individuals. It illustrates how ordinary citizens¿ private information is obtained by individuals and organizations that want to exploit the data to their advantage. The information can be obtained from driver¿s licenses, credit card purchases, and medical records, just to name a few. The book is insightful and fast-reading. It will prompt you to take control of your life and wonder, "Who is watching me now?" Garfinkel¿s intent is not to scare his readers, but to inform unsuspecting citizens that an increasing percentage of our daily activities are being captured by databases across the world. Our personal privacy is threatened with the use of fingerprinting and human marking to document and identify individuals. Whereas this means of identification was created to prevent identity theft, solve crimes, and eliminate computer error, some states are now able to sell this information to private businesses because they are part of the public record. Garfinkel¿s research on these topics is extensive. Not unlike George Orwell¿s book 1984, we are also under constant surveillance. The stores we shop at, offices we work in, roads we drive on, and establishments we frequent are capturing our video images and placing them in databanks across the nation. Even surveillance satellites are able to capture minute details of a person. Our personal information is a commodity--it¿s what marketers use to solicit people. Chapter 11: Privacy Now! provides us with examples and ways in which we can fight back as a nation to protect our right to privacy. However, it does not provide individuals with strategies for protection. Humans have come to rely on computers and data processing at the expense of the individual. The problem is that the smallest clerical error can destroy a person¿s life. Garfinkel compares his book to Silent Spring, by Rachel Carson, which planted the seeds for the environmental movement. Likewise, Database Nation sets the stage for the legislation and regulation of privacy in the twenty-first century.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Wed Aug 07 00:00:00 EDT 2002

    Something we all should know more about!

    Mr. Garfinkel brings into light what many of us have been discussing a lot lately, PRIVACY on the net. It is amazing how companies can track a customer¿s every move over the Internet. And the possibility of linking various databases together so that companies can pay to have our ¿private¿ information including medical records, spending habits, etc. is absolutely an invasion of privacy. This book helps a novice such as me to understand how the system works and how damaging that could be. This is a must read for every citizen to look at because we are all prey to this technology.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Sun Feb 11 00:00:00 EST 2001

    Orwell is alive and well

    After reading this book, one might conclude that Orwell's vision of society he portrayed in his book, '1984' isn't too far off from reality. While Garfinkel at times writes of potentially far-fetched scenarios in some chapters, the truth is they really aren't unrealistic. Stories of database information theft, human error and fraud, marketers having access to virtually all information about you, among others, abound in this book. While the information presented is potentially scary, it's better to take a deep breath and determine ways to fight this invasion of your privacy, which the author provides in the book's last chapter. And it's also his hope the book will be to the privacy fight what Rachel Carson's book Silent Spring was to the environmental movement. Indeed, it is an at times chilling indictment of how technology and the Government can appear to know everything about us, down to what size of shoes we wear. If you care about maintaining or at least attempting to maintain some control over your privacy, this book is an excellent one to have.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Sun Feb 25 00:00:00 EST 2001

    Actually, it's paranoia that's alive and well

    On the one hand, I'm largely sympathetic to Garfinkel's concerns about privacy, but his over-dramatization of the issues (which may simply have been done to help sell his book) causes him to lose a lot of credibility. It also doesn't help that his understanding of technology is (to put it tactfully) flawed. If you subscribe to the theory that corporations are run by an evil cadre who spend their time figuring out how to take over the world, by all means read this book. However, if you want a more thoughtful, less paranoid perspective on things, look elsewhere.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Wed Aug 02 00:00:00 EDT 2000

    Interesting but perhaps pandering to fear.

    The author has written a very researched and well documented book regarding a very broad and sensational subject. Perhaps the book is too short to cover the many issues. Certainly the book will be of interest to many people but I believe it does not provide a balanced view of the value information has provided. As a Private Investigator, I utilize many of the sources and databases discussed for legitimate and legal purposes. Perhaps the desire to further raise the fear of the general public has resulted in many of these purposes being ignored in this book. The reader will find the book of value only depending on exactly what the reader expects to get from it.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 7 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)