How This Book Is Organized
There are a lot of ways to tackle the topic of privacy. For simplicity's sake, I organized this book based on where an intrusion is likely to occur, whether in your home, online, at work, or in public. To wit:
Privacy at Risk
. What's the big deal about privacy? Well, for starters, your computer is leaking your personal information all over the Internet, data
are selling your
who asks, and the Feds want to know what toothpaste you buy. In this chapter I lay out the growing risks to personal privacy, why the privacy
we have are ineffectual, and what the future may hold.
Privacy at Home
. Your phone rings at dinner time—it's yet another telemarketer. Your fax machine is spewing out ads for cheap
and discount health insurance. Unwanted catalogs and credit card offers are spilling out of your mailbox. Your home computer is a data
's playground—everything from your personal finances and correspondence to the web sites you visit is available to anyone with an interest and a few minutes alone with your stuff. This chapter shows you how to fight back against
marketers and identity
, along with step-by-step instructions on how to secure your PC or a Mac, make your wireless home network hack-proof, and more.
Privacy on the Net
. Spammers, scammers, and hackers, oh my! In the age of the Internet, data thieves don't need to enter your living room to unlock your secrets. In this chapter I discuss the essential software that every Netizen needs, and offer advice on reducing junk email, removing spyware, recognizing "phisher" emails that try to steal your personal information, and keeping digital delinquents from taking over your machine. You'll also find out how to fend off cyber-stalkers, stop viruses from spreading, and shop safely online.
Privacy at Work
. Your boss would never spy on you, right? Don't be so sure. During the last
employee surveillance has steadily risen,
when it comes to electronic communications. More than two-
of all firms watch where their
go on the Web, and around half scan employee email. In some cases
are legally required to record all of your communications, though some go well beyond the letter of the law. This chapter will help you find out what your boss is doing, and then work out rules and guidelines you both can live with.
Privacy in Public
. What does your
know about you? Who gets to look at your library or school records? What happens to your personal information when you visit the doctor or go to the bank? Is your soft drink
on you? In this chapter I tackle what happens to your personal information when you enter the world at large. You'll learn how to keep your shopping history from being shared, to identify and remove radio frequency identification (RFID) tags hidden inside packaging, and what an airport security screener can and can't do when you pass through a checkpoint. I talk about the uses and
of private commercial databases, electronic toll payment systems, public video
, and more.
Privacy and Your Uncle
you like your Uncle Sam, or collects more data. This chapter reveals what kind of dirt local, state, and federal entities gather about you and whom they're sharing it with. Along the way I discuss the differences between public and private information, how you can seal your
records, gain access to your FBI files, and avoid (or at least survive) a tax audit. You'll also read about the growth in DNA databases, the growing momentum toward a national ID card requirement, and the impact of laws like the Patriot Act on our civil liberties.
Privacy in the Future
. Don't fret. While you sit there worrying about who may be stealing your data, smart people are working on solutions to problems like spam, phishing, spyware, identity theft, and the abuse of commercial and public data. Here I'll explore the possible cures for our worst privacy ills.