INDEX

 

Active surveillance, 191–207. See also Surveillance

Advertising industry, 2–10, 18–23. See also Marketers

Agha-Soltan, Neda, 26

Air travel programs, 34, 36

Allende, Salvador, 96

Antivirus programs, 66, 148–49, 232–33

ARPANET, 228

Asimov, Isaac, 133

ATM machines, 169, 170

Atomic Energy Commission, 86, 88


Batman, John, 87

Beacon program, 26

Behavioral data, 2, 19

Bell, Alexander Graham, 144, 197–98

Berliner, Emile, 197–98

Bin Laden, Osama, 115

Biometric identification system, 105, 109–10, 115–19, 148

Black hats, 58–59, 62, 181. See also Hackers

Bonaparte, Napoleon, 87

Bose, J. C., 44

Botnets, 226, 229–32

Brainwashing, 89–90, 99

Brin, Sergey, 8

Bruch, Walter, 213

Bug detectors, 204–5

Buran Bugging System, 198

Burglars, 23, 93. See also Criminals

Bush, George W., 145, 175


Cameras, hidden, 191–207

Cameras, security, 209–19

Capone, Al, 87

Cardullo, Mario, 45

Castro, Fidel, 95, 96

Cell phones, 41, 47, 61–63, 76, 218

Cell phone tapping, 137–50

Cellular networks, 60, 64, 75–76, 81

Chemical agents, 88, 92, 97, 100, 102

China syndrome, 11

CIA, 74, 85–102, 126–27, 153–55, 157

Civil rights violation, 80. See also Privacy rights

Clancy, Tom, 184

Clementi, Tyler, 216–17

Clinton, Bill, 145

Cloning device, 48, 51. See also Interrogator devices

Closed-circuit television (CCTV) cameras, 210–19

Combat robots, 121–35

Communism, 89–90, 99

Con men, 23, 179–81, 227–28. See also Internet con games

Connect program, 19–20

Consumers Against Supermarket Privacy Invasion and Numbering (C.A.S.P.I.A.N.), 38

Conversations, recording, 75, 137–50

Convict experiments, 86, 93–94. See also Experiments

Cookies, 6, 12

Corporations, ix–x, 1–2, 46–47, 180, 236

Corporation testing, 92, 97, 99–100

Counterintelligence, 91, 96, 99

Craigslist, 142, 150

Credit cards, x, 39–56, 41, 228

Creeper, 228

Criminal organizations, 181, 221–33

Criminals, x, 23, 48, 51, 179–81, 236

Currency, tracking, 52


DEA, 127, 199

Dean, Howard, 176

Defense Advanced Research Projects Agency (DARPA), 123–24

Demographic data, 2, 19

Deniability, 78

Dictatorships, 68–69

Direct-mail marketing, 33

Discount cards, 31–38

DNA evidence, 103–19

Dossier, building, 2, 7–10, 78

DoubleClick program, 6–9

Downloads, illegal, 63, 139

Driver’s license, ix, 49, 53

Drones, 121–35

Drug experiments, 89–90

Dulles, Allen, 95


ECHELON, 71–83, 155

Edison, Thomas, 144, 198

Electromagnetic signals, 44–45, 184, 186, 189

Electronic Article Surveillance (EAS) tags, 45–46

Electronic voting, 167–78

Employers, 9, 21, 34, 55, 113, 116, 215

Encoder, 45–46

EPA, 97

Espionage, 74, 79, 157, 187, 198, 200. See also Spies

Euros, tracking, 52

Evil, avoiding, 10–11

Experiments, 85–102


Facebook, 15–29

Facial recognition technology, 109–10, 126, 217

Faraday cage, 54, 189–90

FBI, 23, 113, 116, 138, 142, 229, 233

FDA, 97

Fifth Amendment, 80

Fingerprints, 24, 49, 104–18

Footprints, 104–5, 109, 114–15

Forensics, 103–19

Fourth Amendment, 80

Freedom, sacrificing, ix. See also Privacy, sacrificing

Frequent flier programs, 34, 36

Funt, Allen, 198


Gadgets, 41, 47, 57–66, 76, 92, 142, 218. See also specific gadgets

Galifianakis, Zach, 216

Genetics, 103–19

Global surveillance program, 71–83. See also Surveillance

Gmail accounts, 6–7, 12

Google, 3–14

Google ads, 4–6, 18, 20, 23

Google attack, 230

Google satellites, 160, 162–63

Gottleib, Sidney, 95

Governments, ix–x, 25, 46, 62–69, 112–13, 180, 236

GPS signal, 42, 59–60, 63–65, 192

Gray, Elisha, 144

Green Revolution, 25–26

Grocery store cards, 31–38


Habits, tracking, 2, 19

Hackers, 58–59, 61–65, 181, 221–33

Hagel, Chuck, 175

Harris, Bev, 176

Health and Human Services, 87

Helms, Richard, 91, 95–96

Hertz, Heinrich, 44

Hidden cameras, 191–207

Hidden microphones, 191–207

High-tech surveillance, 180–81. See also Surveillance

Hitler, Adolf, 87

Homeland Security, 23, 91, 102

Hospitals, 40, 48

Hughes, David E., 44

Human experiments, 85–102

Human genome, 103–19

Human Genome Project, 108, 111

Human intelligence, 68, 72–73, 152–54

Human rights activists, 25–26

Hurst, Sam, 171

Hussein, Saddam, 159


ID cards, ix, 40–41, 46, 49–55, 62, 154, 170

“Identifying information,” 22, 41

Identity theft, 51, 56, 62–63, 221–33

Illegal downloads, 63, 65, 139

Immigration and Naturalization Service (INS), 23

Immigration control, 40–41

Industrial espionage, 74, 79, 187, 200. See also Spies

Infectious diseases, 87–88. See also Experiments

Information gathering, ix–x, 2, 9–10, 22, 41, 71–83. See also Intelligence

Infrared sensors, 123, 128–29, 134, 154, 164

Insurance, 113, 116

Intelligence, 68, 71–83, 152–54, 184. See also Information gathering

Intercepting signals, 183–90

Internet con games, 180–81, 221–33

Internet hackers, 58–59, 61–65, 181, 221–33

Internet tapping, 143

Interrogator devices, 39–56

Inventory tracking, 31–38, 40–46

IP address, tracking, 6, 9–13, 18, 22, 142

Ivan the Terrible, 87


Kennedy, Robert, 144

Key fobs, 49

Keyword analysis, 7, 18, 22

Keyword searches, 3–14

Killing machines, 121–35

King, Martin Luther, 144

Kissinger, Henry, 138


Laser microphones, 198, 205

Laws of Robotics, 133

Lawsuits, 26–27

Legal action, 14, 26–27

Library cards, 40–41, 43, 52

Liddy, G. Gordon, 138

Lincoln administration, 144

Local buying, 37

Login information, 12, 62–63, 115, 188, 224, 227–28

Low, Archibald, 126

LSD experiments, 89–90


Madden, John, 196

Malicious software, 59, 61–65, 143–49, 188, 214, 221–33

Mao, Chairman, 158, 159

Marconi, Guglielmo, 44

Marketers, x, 2–5, 18–19, 33–36, 49–51, 180. See also Advertising industry

McMahon, Ed, 225

Measurement and Signature Intelligence satellites, 156. See also Satellites

Medical trials, 98. See also Experiments

Mental patient experiments, 88–94

Microphones, 191–207

Military robots, 121–35

Mind control experiments, 89–91

MKULTRA, 89–93, 95–96, 99, 101

Mobsters, 181, 221–33

Motion picture camera, 198

Myspace, 16, 20, 23


Nanny cam, 198

National Security Agency (NSA), 56, 74, 137–50, 155, 180, 186

Nazis, 4, 45, 73, 89, 94, 99, 213

Nerve gas, 92, 97, 100

New York Times, 6, 77

Nigerian narcoterrorists, 223, 229–30

Nigerian 419 scam, 225–26, 230

Night-vision cameras, 128, 154. See also Infrared sensors

Nixon, Richard, 96, 138–39

Norris, Chuck, 130


Obama, Barack, 145

O’Dell, Warren, 175

Optical scan machines, 170, 171

Opt-out plug-ins, 13


Page, Larry, 8

PageRank, 5–6, 8

Parabolic microphones, 195, 205

Passports, 40–41, 46, 49, 51–54

Passwords, 12, 62–63, 115, 188, 224, 227–28

Perot, Ross, 172

“Personally identifying information,” 22, 41

Pharmaceutical companies, 100

Phishing scams, 221–33

Phone tapping, 75, 137–50

Phreaking, 183–90

Prisoner experiments, 86, 93–94. See also Experiments

Privacy invasion, 38, 216–17, 236

Privacy rights, 80, 82, 217

Privacy, sacrificing, ix, 12, 16–20, 41–43, 68, 82

Profiling, 50, 59, 105–16

Project Paperclip, 90

Psychographic data, 2, 19, 24

Public Health Service, 87


Qzone, 16, 20


Radar dishes, 76, 155, 195

Radiation, 97, 184–86, 190

Radioactive experiments, 88

Radio Frequency Identification (RFID) tags, 39–56

Radio frequency scanners, 204–5

Radio inventions, 44–45

Radio signals, 41–48, 72–75, 125, 155, 185

Ravi, Dharun, 216–17

Retail discount cards, 31–38

Retailers, 31–38, 47–48

Rewards programs, 34, 36

Right to privacy, 80, 82, 217

Robotic laws, 133

Robots, 121–35

Rocket fuel, 92

Russian mob fronts, 223, 229, 232–33


Saliva, 104, 107. See also DNA evidence

Satellites, 75, 151–65

Scanners, 204–5

Search engines, 3–14

Security cameras, 209–19

Shopper profile, 31–38

Shopping surveillance, 45–51

Shotgun microphones, 195–96, 205–6

Signals, electromagnetic, 44–45, 184, 186, 189

Signals, intercepting, 183–90

Signals intelligence, 72–74, 77, 184

Skype, 214

Smartphones, 41, 47, 58–65, 76, 92, 142, 218

Social networking, 15–29

Social security numbers, x, 48, 224, 233

Software, malicious, 59, 61–65, 143–49, 188, 214, 221–33

Spanish Prisoner, 227–28

Spies, x, 68, 72–79, 151–65, 179–90, 198–200, 236

Spy satellites, 151–65

Spyware, 143, 148–49, 221–33. See also Malicious software

Stalin, Joseph, 77, 158–59, 198

Stalkers, ix, 8, 146–48, 181, 188, 199–201

Subproject 68, 91

Subway cards, 41

Supermarket discount cards, 31–38

Super villains, 199–202

Surveillance, 45–51, 71–83, 180–81, 191–219

Surveillance teams, 196–97

Synthetic Aperture Radar (SAR), 155, 160

Syphilis experiments, 87–88


“Tails,” 196–97, 202–3

Target shoppers, 31–38, 45–51

Tauschek, Gustav, 171

Technology, 1–2, 39–66. See also specific devices

Telephone tapping, 75, 137–50

TEMPEST, 186–87

Terminators, 121–35

Terrorist threats, 79, 91, 101

Terrorists, spying on, x, 79–83

Tesla, Nikola, 44

Theremin, Leon, 198

Thomas, Bob, 228

Thompson, Hunter S., 89

Three Laws of Robotics, 133

Toll road cards, 41

Tolstoy, Leo, 87

Torrent sites, 63, 65

Totalitarianism, 80, 89

Touch-screen technology, 171

Toxic chemicals, 88, 92, 97, 100, 102

Transponders, 41, 45

Trojan programs, 143, 226. See also Malicious software

Turing, Alan, 73

Twitter, 16, 20, 25


Unmanned vehicles, 124–32. See also Robots

Usenet, 8–9


Van Eck, Wim, 186

Van Eck phreaking, 183–90

Van Gogh, Vincent, 87

Video surveillance, 209–19

Viruses, 63, 221–33. See also Malicious software

Virus protection programs, 66, 148–49, 232–33

Von Neumann, John, 228

Voting machines, 167–78


Watergate, 96, 138–39, 145

Webcams, 131, 212, 214, 216

Web History, 6–7

Wei, Molly, 216–17

Wi-Fi connections, 48, 64

Wilde, Oscar, 87

Wireless devices, 41, 47, 57–66, 76, 92, 142, 218

Wireless telegraphy, 44–45

Wiretapping, 75, 137–50

World Wide Web, 8–9

Worms, 221–33. See also Malicious software


YouTube, 12, 25, 211, 215–16


Zedong, Mao, 158, 159

Zuckerberg, Mark, 20–21