Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
One Nation, Under Surveillance -- Privacy From the Watchful Eye Paperback – July 4, 2009
|New from||Used from|
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
About the Author
Kenneth W. Royce (founder of Free State Wyoming), is a shooting instructor, speaker, and the author of 12 Boston T. Party books on guns, history, law, politics, privacy, and government. His Boston's Gun Bible is a classic within the shooting community, and his novel Molon Labe! has inspired a recent relocation wave to Wyoming.
One Nation, Under Surveillance is the final title from Boston T. Party, as he begins work on other books (under Kenneth W. Royce), projects, and travel.
Look for the next book by Royce, who breaks out in a new direction with this self-help book for the remedial man:
Modules For Manhood: What Every Male Under 40 Must Know
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
The book covers all kinds of privacy. Creating "mail drops," how to use telecommunications without giving away personal information, computer privacy, and lots more. Computer privacy seems to get a lot of attention. The book is very thorough, slightly paranoid, and well-researched.
My only gripe is that the book does not seem to be well-edited. Some chapters really drone on about information that does not seem to merit the amount of coverage that they got. The book would get 5 stars if it shaved 50-75 pages off, but overall a very good book.
The book is worth double its price just for the expanded and updated sections entitled 'Telecommunications/Passphrases/Computer Data and Internet Privacy. (That's really all your getting - much of Bulletproof Privacy is repeated in this book ) There is also a chapter on the Linux system. I have gotten too old and too busy to sit down and learn about new technology from conventional sources and I really have come to despise new technologies but I must still be somewhat familiar with them.
This is where Boston really really shines for someone like me. He distills internet protocol, encryption, and the current state and availability of governmnet and civilian technology into several chapters so that you will have good familiarity with the spectrum of information and equipment in little time.
You will learn "how secure is 'secure' - when implemented security is 'enough' - How many characters should your passphrase be? - Are there surveillance backdoors into the Windows operation system? - Can data be mined off computer hard disks that have been 'wiped'? What do government agencies do with old computer hard-drives - (they don't wipe 'em) - How is data recorded on hard drives? - What about the new electronic surveillance warrants and keystroke monitoring software? You mean they can put that into your mainframe box itself AS hardware?? What other data is transferred by your computer over the internet without your knowledge - how do companies track and mine your data - What are some examples of FBI efforts to track down hackers that show just how vulnerable your computer really is? Operating systems/proxy services/what can happen when crossing the U.S. border with your laptop computer/wireless router encryption/offshore internet and mail servers. <- These are just a sample of the topics touched upon by Boston in good, distilled, form.
Also valuable - the book discusses the current state (and fate in one example) of the electronic/digital gold and currency companies - I learned of new companies now offering this service and found out what happened to the first company that tried it 'e-gold.'
Boston touches on the 'Real Id' farce that has come along - biometric identification - and the new TSA 'no-fly' list and other airport travel hyjinx.
What is most curious is an extensive new subchapter on sociopaths. Boston defines them and uses some analysis from pschologists about them - how they lie - how their mind works - how they operate - and protecting yourself from them. It looks like Boston was the victim of one. The concept will be a new one for a lot of people and this chapter is interesting although I do not think you can 'teach' people to spot them.
One of Boston's tips for discerning a sociopath is that one has the "uncanny ability to spot decent and trusting people, the fertile soil of a sociopathic weed." My God is that 100% true. Midwestern 'Mom and Apple pie' types are taken by sociopaths routinely - they just don't have the mental experience to deal with it. Think of a sleazy appliance salesman - Boston tries to explain to the reader how the sociopath is attacking your mind.
In my opinion 'Training' in dealing with sociopaths is simply to have the student move and live and work in a metro East Coast City for a year - that will train him. For most people though - if you are a high school graduate (or less) and pride yourself for never having taken a dime from anyone - buy this book and then do some SERIOUS reflection on what Boston has to say in that chapter. The old adage - "if you look like food you are going to be eaten" - well one of the people out eating you and your mother and father and robbing them is the sociopath. (Boston could probably do a video series on this - that might be a great idea)
I'll miss BTP if he does not write again - but I've enjoyed his material immensely and put more than a few of his ideas into practice. Until we meet again . . .