Our Retail Price:£19.99Add to Basket
A shocking look at the ways governments and organisations track and control us and the ways we can fight back.
Data is everywhere. We create it every time we go online, turn our phone on (or off) or pay with a credit card. This data is stored, studied, bought and sold by companies and governments for surveillance and for control. "Foremost security expert" (Wired) Bruce Schneier shows how this data has led to a double-edged Internet—a Web that gives power to the people but is abused by the institutions on which those people depend.
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship and propaganda in society today, examining the risks of cybercrime, cyberterrorism and cyberwar. He shares technological, legal and social solutions that can help shape a more equal, private and secure world.
“Bruce Schneier...grasps this revolution's true dimensions...Schneier paints a picture of the big-data revolution that is dark, but compelling; one in which the conveniences of our digitized world have devalued privacy.” — Nature
“In "Data and Goliath" Bruce Schneier, a computer-security expert, does a fine job of laying out the problems caused by this compulsive collection of personal data...Some recent books on digital privacy have been written by journalists, with an emphasis on sugary narrative instead of original analysis. This one comes from a practitioner, and offers a deep but accessible look at surveillance in the post-Snowden, big-data era.” — The Economist
“He [Schneier] is passionate about the subject—and he shows exactly why and how it matters. The combination of qualitative analysis and detailed examples is compelling and the conclusions are stark. Surveillance matters, and not just at a theoretical level. Schneier shows how it causes damage even when it's used "properly", and also offers examples of how it can be and is abused. And he is at his best when demolishing the case for mass surveillance from a security perspective: it's here that his expertise really kicks in. His understanding of encryption, cyberattacks and vulnerabilities, and his ability to explain them in a relatively accessible way, is impressive and admirable.” — Times Higher Education
“...excellent new book...” — The Observer
“...important book...” — New Internationalist