INDEX
Active surveillance, 191–207. See also Surveillance
Advertising industry, 2–10, 18–23. See also Marketers
Agha-Soltan, Neda, 26
Air travel programs, 34, 36
Allende, Salvador, 96
Antivirus programs, 66, 148–49, 232–33
ARPANET, 228
Asimov, Isaac, 133
ATM machines, 169, 170
Atomic Energy Commission, 86, 88
Batman, John, 87
Beacon program, 26
Behavioral data, 2, 19
Bell, Alexander Graham, 144, 197–98
Berliner, Emile, 197–98
Bin Laden, Osama, 115
Biometric identification system, 105, 109–10, 115–19, 148
Black hats, 58–59, 62, 181. See also Hackers
Bonaparte, Napoleon, 87
Bose, J. C., 44
Botnets, 226, 229–32
Brainwashing, 89–90, 99
Brin, Sergey, 8
Bruch, Walter, 213
Bug detectors, 204–5
Buran Bugging System, 198
Burglars, 23, 93. See also Criminals
Bush, George W., 145, 175
Cameras, hidden, 191–207
Cameras, security, 209–19
Capone, Al, 87
Cardullo, Mario, 45
Castro, Fidel, 95, 96
Cell phones, 41, 47, 61–63, 76, 218
Cell phone tapping, 137–50
Cellular networks, 60, 64, 75–76, 81
Chemical agents, 88, 92, 97, 100, 102
China syndrome, 11
CIA, 74, 85–102, 126–27, 153–55, 157
Civil rights violation, 80. See also Privacy rights
Clancy, Tom, 184
Clementi, Tyler, 216–17
Clinton, Bill, 145
Cloning device, 48, 51. See also Interrogator devices
Closed-circuit television (CCTV) cameras, 210–19
Combat robots, 121–35
Communism, 89–90, 99
Con men, 23, 179–81, 227–28. See also Internet con games
Connect program, 19–20
Consumers Against Supermarket Privacy Invasion and Numbering (C.A.S.P.I.A.N.), 38
Conversations, recording, 75, 137–50
Convict experiments, 86, 93–94. See also Experiments
Cookies, 6, 12
Corporations, ix–x, 1–2, 46–47, 180, 236
Corporation testing, 92, 97, 99–100
Counterintelligence, 91, 96, 99
Craigslist, 142, 150
Credit cards, x, 39–56, 41, 228
Creeper, 228
Criminal organizations, 181, 221–33
Criminals, x, 23, 48, 51, 179–81, 236
Currency, tracking, 52
DEA, 127, 199
Dean, Howard, 176
Defense Advanced Research Projects Agency (DARPA), 123–24
Demographic data, 2, 19
Deniability, 78
Dictatorships, 68–69
Direct-mail marketing, 33
Discount cards, 31–38
DNA evidence, 103–19
Dossier, building, 2, 7–10, 78
DoubleClick program, 6–9
Downloads, illegal, 63, 139
Driver’s license, ix, 49, 53
Drones, 121–35
Drug experiments, 89–90
Dulles, Allen, 95
ECHELON, 71–83, 155
Edison, Thomas, 144, 198
Electromagnetic signals, 44–45, 184, 186, 189
Electronic Article Surveillance (EAS) tags, 45–46
Electronic voting, 167–78
Employers, 9, 21, 34, 55, 113, 116, 215
Encoder, 45–46
EPA, 97
Espionage, 74, 79, 157, 187, 198, 200. See also Spies
Euros, tracking, 52
Evil, avoiding, 10–11
Experiments, 85–102
Facebook, 15–29
Facial recognition technology, 109–10, 126, 217
Faraday cage, 54, 189–90
FBI, 23, 113, 116, 138, 142, 229, 233
FDA, 97
Fifth Amendment, 80
Fingerprints, 24, 49, 104–18
Footprints, 104–5, 109, 114–15
Forensics, 103–19
Fourth Amendment, 80
Freedom, sacrificing, ix. See also Privacy, sacrificing
Frequent flier programs, 34, 36
Funt, Allen, 198
Gadgets, 41, 47, 57–66, 76, 92, 142, 218. See also specific gadgets
Galifianakis, Zach, 216
Genetics, 103–19
Global surveillance program, 71–83. See also Surveillance
Gmail accounts, 6–7, 12
Google, 3–14
Google ads, 4–6, 18, 20, 23
Google attack, 230
Google satellites, 160, 162–63
Gottleib, Sidney, 95
Governments, ix–x, 25, 46, 62–69, 112–13, 180, 236
GPS signal, 42, 59–60, 63–65, 192
Gray, Elisha, 144
Green Revolution, 25–26
Grocery store cards, 31–38
Habits, tracking, 2, 19
Hackers, 58–59, 61–65, 181, 221–33
Hagel, Chuck, 175
Harris, Bev, 176
Health and Human Services, 87
Helms, Richard, 91, 95–96
Hertz, Heinrich, 44
Hidden cameras, 191–207
Hidden microphones, 191–207
High-tech surveillance, 180–81. See also Surveillance
Hitler, Adolf, 87
Homeland Security, 23, 91, 102
Hospitals, 40, 48
Hughes, David E., 44
Human experiments, 85–102
Human genome, 103–19
Human Genome Project, 108, 111
Human intelligence, 68, 72–73, 152–54
Human rights activists, 25–26
Hurst, Sam, 171
Hussein, Saddam, 159
ID cards, ix, 40–41, 46, 49–55, 62, 154, 170
“Identifying information,” 22, 41
Identity theft, 51, 56, 62–63, 221–33
Illegal downloads, 63, 65, 139
Immigration and Naturalization Service (INS), 23
Immigration control, 40–41
Industrial espionage, 74, 79, 187, 200. See also Spies
Infectious diseases, 87–88. See also Experiments
Information gathering, ix–x, 2, 9–10, 22, 41, 71–83. See also Intelligence
Infrared sensors, 123, 128–29, 134, 154, 164
Insurance, 113, 116
Intelligence, 68, 71–83, 152–54, 184. See also Information gathering
Intercepting signals, 183–90
Internet con games, 180–81, 221–33
Internet hackers, 58–59, 61–65, 181, 221–33
Internet tapping, 143
Interrogator devices, 39–56
Inventory tracking, 31–38, 40–46
IP address, tracking, 6, 9–13, 18, 22, 142
Ivan the Terrible, 87
Kennedy, Robert, 144
Key fobs, 49
Keyword analysis, 7, 18, 22
Keyword searches, 3–14
Killing machines, 121–35
King, Martin Luther, 144
Kissinger, Henry, 138
Laser microphones, 198, 205
Laws of Robotics, 133
Lawsuits, 26–27
Legal action, 14, 26–27
Library cards, 40–41, 43, 52
Liddy, G. Gordon, 138
Lincoln administration, 144
Local buying, 37
Login information, 12, 62–63, 115, 188, 224, 227–28
Low, Archibald, 126
LSD experiments, 89–90
Madden, John, 196
Malicious software, 59, 61–65, 143–49, 188, 214, 221–33
Mao, Chairman, 158, 159
Marconi, Guglielmo, 44
Marketers, x, 2–5, 18–19, 33–36, 49–51, 180. See also Advertising industry
McMahon, Ed, 225
Measurement and Signature Intelligence satellites, 156. See also Satellites
Medical trials, 98. See also Experiments
Mental patient experiments, 88–94
Microphones, 191–207
Military robots, 121–35
Mind control experiments, 89–91
MKULTRA, 89–93, 95–96, 99, 101
Mobsters, 181, 221–33
Motion picture camera, 198
Myspace, 16, 20, 23
Nanny cam, 198
National Security Agency (NSA), 56, 74, 137–50, 155, 180, 186
Nazis, 4, 45, 73, 89, 94, 99, 213
Nerve gas, 92, 97, 100
New York Times, 6, 77
Nigerian narcoterrorists, 223, 229–30
Nigerian 419 scam, 225–26, 230
Night-vision cameras, 128, 154. See also Infrared sensors
Nixon, Richard, 96, 138–39
Norris, Chuck, 130
Obama, Barack, 145
O’Dell, Warren, 175
Optical scan machines, 170, 171
Opt-out plug-ins, 13
Page, Larry, 8
PageRank, 5–6, 8
Parabolic microphones, 195, 205
Passports, 40–41, 46, 49, 51–54
Passwords, 12, 62–63, 115, 188, 224, 227–28
Perot, Ross, 172
“Personally identifying information,” 22, 41
Pharmaceutical companies, 100
Phishing scams, 221–33
Phone tapping, 75, 137–50
Phreaking, 183–90
Prisoner experiments, 86, 93–94. See also Experiments
Privacy invasion, 38, 216–17, 236
Privacy rights, 80, 82, 217
Privacy, sacrificing, ix, 12, 16–20, 41–43, 68, 82
Profiling, 50, 59, 105–16
Project Paperclip, 90
Psychographic data, 2, 19, 24
Public Health Service, 87
Qzone, 16, 20
Radar dishes, 76, 155, 195
Radiation, 97, 184–86, 190
Radioactive experiments, 88
Radio Frequency Identification (RFID) tags, 39–56
Radio frequency scanners, 204–5
Radio inventions, 44–45
Radio signals, 41–48, 72–75, 125, 155, 185
Ravi, Dharun, 216–17
Retail discount cards, 31–38
Retailers, 31–38, 47–48
Rewards programs, 34, 36
Right to privacy, 80, 82, 217
Robotic laws, 133
Robots, 121–35
Rocket fuel, 92
Russian mob fronts, 223, 229, 232–33
Saliva, 104, 107. See also DNA evidence
Satellites, 75, 151–65
Scanners, 204–5
Search engines, 3–14
Security cameras, 209–19
Shopper profile, 31–38
Shopping surveillance, 45–51
Shotgun microphones, 195–96, 205–6
Signals, electromagnetic, 44–45, 184, 186, 189
Signals, intercepting, 183–90
Signals intelligence, 72–74, 77, 184
Skype, 214
Smartphones, 41, 47, 58–65, 76, 92, 142, 218
Social networking, 15–29
Social security numbers, x, 48, 224, 233
Software, malicious, 59, 61–65, 143–49, 188, 214, 221–33
Spanish Prisoner, 227–28
Spies, x, 68, 72–79, 151–65, 179–90, 198–200, 236
Spy satellites, 151–65
Spyware, 143, 148–49, 221–33. See also Malicious software
Stalin, Joseph, 77, 158–59, 198
Stalkers, ix, 8, 146–48, 181, 188, 199–201
Subproject 68, 91
Subway cards, 41
Supermarket discount cards, 31–38
Super villains, 199–202
Surveillance, 45–51, 71–83, 180–81, 191–219
Surveillance teams, 196–97
Synthetic Aperture Radar (SAR), 155, 160
Syphilis experiments, 87–88
“Tails,” 196–97, 202–3
Target shoppers, 31–38, 45–51
Tauschek, Gustav, 171
Technology, 1–2, 39–66. See also specific devices
Telephone tapping, 75, 137–50
TEMPEST, 186–87
Terminators, 121–35
Terrorist threats, 79, 91, 101
Terrorists, spying on, x, 79–83
Tesla, Nikola, 44
Theremin, Leon, 198
Thomas, Bob, 228
Thompson, Hunter S., 89
Three Laws of Robotics, 133
Toll road cards, 41
Tolstoy, Leo, 87
Torrent sites, 63, 65
Totalitarianism, 80, 89
Touch-screen technology, 171
Toxic chemicals, 88, 92, 97, 100, 102
Transponders, 41, 45
Trojan programs, 143, 226. See also Malicious software
Turing, Alan, 73
Twitter, 16, 20, 25
Unmanned vehicles, 124–32. See also Robots
Usenet, 8–9
Van Eck, Wim, 186
Van Eck phreaking, 183–90
Van Gogh, Vincent, 87
Video surveillance, 209–19
Viruses, 63, 221–33. See also Malicious software
Virus protection programs, 66, 148–49, 232–33
Von Neumann, John, 228
Voting machines, 167–78
Watergate, 96, 138–39, 145
Webcams, 131, 212, 214, 216
Web History, 6–7
Wei, Molly, 216–17
Wi-Fi connections, 48, 64
Wilde, Oscar, 87
Wireless devices, 41, 47, 57–66, 76, 92, 142, 218
Wireless telegraphy, 44–45
Wiretapping, 75, 137–50
World Wide Web, 8–9
Worms, 221–33. See also Malicious software
YouTube, 12, 25, 211, 215–16
Zedong, Mao, 158, 159
Zuckerberg, Mark, 20–21