TITLE

Privacy in peril

AUTHOR(S)
Piller, Charles
PUB. DATE
July 1993
SOURCE
Macworld;Jul1993, Vol. 10 Issue 7, p124
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Discusses how computers are making access to personal information easier. Obsolete and incorrect information; Conflicting values; Personal data as commodity; Data-reselling trade; Question of priorities; Credit records; Conflict between access and privacy; Management of electronic privacy; Role of technology. INSETS: A model consumer-privacy code.;Shattering the illusion of privacy.;11 easy ways to safeguard your electronic privacy..
ACCESSION #
9307075568

 

Related Articles

  • Eye can see you. Jenkins, J. // New Statesman & Society;2/21/92, Vol. 5 Issue 190, p14 

    Explores the exponential growth in the past decade of low-level, high-tech surveillance. Examples of indirect automatic surveillance, such as computerized bus ticket sales and automatic cash-point machines; Rise of systems designed specifically to track people's movements; Implications for...

  • Bugging. Freeman, J.; Freundlich, N. // Popular Science;Aug87, Vol. 231 Issue 2, p44 

    An amazing arsenal of devices is used in the sinister business of electronic eavesdropping. A look at these diminutive bugs and the prodigious technology on which they are based, and how they're used in the espionage war between the US and the Soviet Union.

  • Surreptitious recording of suspects' conversations. Crawford, Kimberly A. // FBI Law Enforcement Bulletin;Sep93, Vol. 62 Issue 9, p26 

    Discusses the legality of the surreptitious recording of suspects' conversations through listening devices or undercover work. Compliance with the fourth amendment of the United States Constitution; Fifth amendment; Sixth amendment; Compliance with Title III of the Omnibus Crime Control and...

  • Wiretaps.  // Newsweek;11/4/1985, Vol. 106 Issue 19, p66 

    In 1968, Congress set out rules for electronic surveillance in a complex statute that balanced the needs of law enforcement with the Fourth Amendment protection against unreasonable searches. But the lawmakers didn't foresee how quickly Americans would embrace such devices as electronic mail and...

  • What eavesdroppers know (and you should learn). Kaufman, Margo // Redbook;May95, Vol. 185 Issue 1, p62 

    Presents a guide to eavesdropping. Benefits; Drawbacks; Distinction from spying; How eavesdropping enhances or harms; Electronic eavesdropping; Doing it at home. INSET: How to eavesdrop like a pro, by Betty Wong..

  • Lending an Ear.  // Time;6/29/1981, Vol. 117 Issue 26, p18 

    The article offers information on an electronic listening post in the Tian Shan mountains of western China's Xinjiang province run by the U.S. and China.

  • SANTA FE EAVESDROPPER.  // Santa Fe Reporter;4/3/2013, Vol. 40 Issue 14, p5 

    The article presents overheard remarks at various public places in Santa Fe, New Mexico which include Second Street Brewery, Plaza, and Rio Chama Steakhouse.

  • Cheaper electronics makes spying easy. Budiansky, S. // U.S. News & World Report;5/18/87, Vol. 102 Issue 18, p54 

    How sophisticated electronic surveillance equipment is being used in private sectors to spy on phone calls and bank teller machines. How cellular phones can be tapped using radio scanners; Using microwave antennas to pick up long-distance calls; How to defend against spying; Use of scramblers.

  • What was that strange clicking sound, anyway? Mahtesian, Charles // Governing;Jan97, Vol. 10 Issue 4, p40 

    Focuses on the paranoia about eavesdropping that is permeating the whole of state government. Different forms of eavesdropping from illegal wiretapping to concealed video devices; Usual results of eavesdropping investigations; Cellular phone interception as another form of electronic espionage.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics