THE GOVERNMENT HAS BEEN WATCHING YOUR WORKSTATION LONGER THAN YOU THINK. Small business owner Michael J. Daugherty is fighting back against US Government's sinister surveillance tactics in his book, The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach into Cybersecurity, Medicine, and Small Business. During the past decade the US Government has teamed with private enterprise and academia to attack American small business by surveilling networks and picking up Americans' files they considered to be shared and vulnerable. They used that information to expand and grow more than one government agency. Michael J. Daugherty, the small business owner who created LabMD, a cancer detection center in Atlanta, Georgia, became a victim of these governmental practices. What began with the unauthorized but government-funded procurement of medical data for 9000+ patients from his medical laboratory turned into a government supported, financially draining, extortion attempt. Taking you inside his five-year journey of government power grabs and intimidation tactics, Daugherty backs his riveting true story with engaging detail, including Congressional testimony, press releases, e-mails, letters and FOIA documents. But for the fact that everything in the book really happened, it reads like a brilliant political thriller. The cronies, lawyers, politicians and bullies…they are all right here in this stinging indictment.
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies.
The contributors to this anthology don’t simply describe these problems or warn about the loss of privacythey propose solutions. They look closely at business practices, public policy, and technology design, and ask, Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: What one creates with his hand, he should control with his head.” It’s a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there’s a problem—let’s find a solution.