Includes bibliographical references (pages 225-274) and index.
Contents:
Hacked -- A short history of tracking -- State of surveillance -- Freedom of association -- Threat models -- The audit -- The first line of defense -- Leaving Google -- Introducing Ida -- Pocket litter -- Opting out -- The hall of mirrors -- Lonely codes -- Fighting fear -- The unfairness doctrine.
Summary:
Online ads from websites you've visited... smartphones and cars transmitting your location... data-gathering surveillance operations across the Internet and on your phone lines. You are being watched.... Angwin offers a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.