Invasion of Privacy! Big Brother and the Company Hackers
Chapter 1: The Death of Moore's Law
- Figure 1.1: Dot-com Doom
- Figure 1.2: In memoriam
- Figure 1.3: USSEARCH.com site
Chapter 2: The Target is You!
- Figure 2.1: The Target illustration
- Figure 2.2: Privacy zones
- Figure 2.3: VeriSign trust logos x 3
- Figure 2.4: VeriSign Web site
- Figure 2.5: VeriSign trust-for-sale page.
Chapter 3: Opting Out
- Figure 3.1: Yahoo! People search page
- Figure 3.2: USSEARCH.com public records search
- Figure 3.3: Sprint opt-out agreement cover
- Figure 3.4: Sprint opt-out agreement inside
- Figure 3.5: Amazon.com Updated Privacy Notice link
- Figure 3.6: Amazon.com privacy agreement
- Figure 3.7: Amazon.com Customer Communication Preferences link
- Figure 3.8: Amazon.com customer logon page
- Figure 3.9: Amazon.com Customer Communication Preferences page
- Figure 3.10: OpenSecrets.org
Chapter 4: Convergence
- Figure 4.1: Pizza coupons
- Figure 4.2: Adelphia homepage
- Figure 4.3: Telephone Consumer Protection Act Section 227
- Figure 4.4: Xbox Live Web site
Chapter 5: Tactical and Practical Digital Defense (Part 1)
- Figure 5.1: Steve Kirsch Web site
- Figure 5.2: http//www.junkfax.org/fax/stories/kirsch.html
- Figure 5.3: Google Fax. com post
- Figure 5.4: Junkfax.orgfax company profiles
- Figure 5.5: Fax.com's missing-child home page
- Figure 5.6: Fax.com's second missing-children page
- Figure 5.7: Fax. com's Targeted Marketing Solutions page
- Figure 5.8: Fax.com's response to the lawsuit
- Figure 5.9: Steve Kirsch's investigative tools
- Figure 5.10: National "do not call" list site
Chapter 6: Surveillance
- Figure 6.1: Ghostfiles window
- Figure 6.2: Spychecker.com Web site
- Figure 6.3: Gateway Processing On Demand site
- Figure 6.4: Aureate/Radiate Google search results
- Figure 6.5: Go!Zilla disclaimer
- Figure 6.6: Ad-aware screen
- Figure 6.7: iSpyNOW Web site
- Figure 6.9A: MSN Instant Messenger
- Figure 6.9B: Trillian Instant Messenger
- Figure 6.10: Photo enforcement
- Figure 6.11: Wescam aerial pod
Chapter 7: The Cheap Toothpick Syndrome
- Figure 7.1: Toothpick comparison photo
- Figure 7.2: Danville Supply online toothpick catalog
- Figure 7.3: Blue Cross card (with cheap toothpick)
Chapter 8: The Metaphysics of Hacking
- Figure 8.1: The pyramids
- Figure 8.2: DEFCON Web site
- Figure 8.3: Jeff Moss
- Figure 8.4: BlackHat Web site
- Figure 8.5: The hacker pyramid
- Figure 8.6: Hacking Tools Web site
- Figure 8.7: Kevin Mitnick arrest photo
- Figure 8.8: Free Kevin Mitnick Web site
- Figure 8.8: The reformed Kevin Mitnick (left) and Sean "Jinx" Gailey (right) at DEFCON XI ( courtesy Jinx Hackwear)
- DEFCON XI Photo Gallery
- Hacker Rap
- Hacker Art
- Figure 8.10: Front of a Camel cigarette pack
- Figure 8.11: Rear of a Camel cigarette pack
- Figure 8.12: The security pyramid
- Figure 8.13: Mirko Zorz and Berislav Kucan of Help Net Security
- Figure 8.14: CERT Web site
- Figure 8.15: Foundstone Professional Services page illustration
- Figure 8.16: Uncle Sam wants you! poster
- Figure 8.17: The IT pyramid
Chapter 9: Media Meltdown
- Figure 9.1: The Napster logo
- Figure 9.2: A warez site
- Figure 9.3: The iTunes Web site
- Figure 9.4: The New Media king? Photo by Moshe Brakha
- Figure 9.5: The Apple iPod
- Figure 9.6: Logitech Cordless Elite Duo MX
- Figure 9.7: The WildTangent Web site
- Figure 9.8: The WildTangent Web Driver system requirements screen
- Figure 9.9: What The Hell Dammit! Web site
- Figure 9.10: The WildTangent EULA
- Figure 9.11: Gibson Research Corporation Web site
- Figure 9.12: http://www.3GUpload.com
- Figure 9.13: TiVo
Chapter 10: Badvertising
- Figure 10.1: American Memory Coca-Cola advertisement Web site
- Figure 10.2: The Hill \ Holliday Web site
- Figure 10.3: Stuart from the Ameritrade commercial
- Figure 10.4: The DoubleClick Web site
- Figure 10.5: Pop-Up Stopper Web site
Chapter 11: Practical and Tactical Digital Defence (Part 2)
- Figure 11.1: Remodern BBS
- Figure 11.2: Photo of baseball bat
- Figure 11.3: Smith news article with picture
Part II: Zone Defense
- Figure II.1: Privacy zones illustration
- Figure II.2: Target illustration
Chapter 12: The Computer Zone
- Figure 12.1: Microsoft Knowledge Base Article 293834User Accounts That You Create During Setup Are Administrator Account Types
- Figure 12.2: UserAccount Controls
- Figure 12.3: Folder Properties privacy feature
- Figure 12.4: System Restore utility size settings
- Figure 12.5: Create a Restore Point screen
- Figure 12.6: Microsoft Error Reporting dialog box
- Figure 12.7: Error Reporting button in System Properties
- Figure 12.8: Check Disable Error Reporting in the Error Reporting dialog box
- Figure 12.9: File Sharing tab under Disk Properties
- Figure 12.10: Uncheck Disable Internet File and Printer Sharing for Microsoft Networks in the Connection Properties box
- Figure 12.11: Help and support about Remote Assistance
- Figure 12.12: System Properties Remote tab
- Figure 12.13: The Taskbar and Start Menu Properties dialog box
- Figure 12.14: The Customize Start Menu tabs
- Figure 12.15: Tweak UI Explorer settings
- Figure 12.16: The Recycle Bin pop-up menu
- Figure 12.17: The Recycle Bin Properties drive tab
- Figure 12.18: The Disk Cleanup button
- Figure 12.19: The Defragment Now button on the Disk Properties Tools tab
- Figure 12.20: Select Encrypt Contents to Secure Data in the Advanced Attributes dialog box
- Figure 12.21: The Office XP Tools Security tab
- Figure 12.22: The System Properties Automatic Updates tab
- Figure 12.23: Windows Update on the Start menu
- Figure 12.24: The Windows Update site
- Figure 12.25: Ad-aware 6 spyware scan
- Figure 12.26: ZoneAlarm ProAlerts & Logs page
- Figure 12.27: Norton AntiVirus LiveUpdate
- Figure 12.28: Windows Explorer Scan with Norton AntiVirus option
- Figure 12.29: The Internet Connection Firewall dialog box
- Figure 12.30: The Windows Media Player 9 Privacy tab
- Figure 12.31: The MusicMatch Settings with the Permission to Communicate with MusicMatch Server check boxes
- Figure 12.32: The Google toolbar Privacy Information option
- Figure 12.33: The System Configuration Utility Startup tab
Chapter 13: The Internet Zone
- Figure 13.1: The DigiCrime.com Web site
- Figure 13.2: The CDT Opt-Out site
- Figure 13.3: The FTC "do not call" registry
- Figure 13.4: eBay opt-out options
- Figure 13.5: Internet OptionsAdvanced Privacy Settings
- Figure 13.6: An https // URL
- Figure 13.7: Outlook's Junk Senders list
- Figure 13.8: The Outlook Rules Wizard
- Figure 13.9: The Spywareinfo Web site
- Figure 13.10: The PayPal Security Center
- Figure 13.11: eBay non-secure seller sign-in
Chapter 14: The Public Zone
- Figure 14.1: Homeland Security Advisory System Web site
- Figure 14.2: Gene Turner's photo on pickpocket.com
- Figure 14.3: A credit card skimmer
- Figure 14.4: West Hollywood Sheriff's Station photo enforcement site photos