On The Condition of Anonymity


Book Description

Matt Carlson confronts the promise and perils of unnamed sources in this exhaustive analysis of controversial episodes in American journalism during the George W. Bush administration, from prewar reporting mistakes at the New York Times and Washington Post to the Valerie Plame leak case and Dan Rather's lawsuit against CBS News. Weaving a narrative thread that stretches from the uncritical post-9/11 era to the spectacle of the Scooter Libby trial, Carlson examines a tense period in American history through the lens of journalism. Revealing new insights about high-profile cases involving confidential sources, he highlights contextual and structural features of the era, including pressure from the right, scrutiny from new media and citizen journalists, and the struggles of traditional media to survive amid increased competition and decreased resources.




Book of Anonymity


Book Description







Hacking the Future


Book Description

Is anonymity a crucial safeguard—or a threat to society? “One of the most well-informed examinations of the Internet available today” (Kirkus Reviews). “The author explores the rich history of anonymity in politics, literature and culture, while also debunking the notion that only troublemakers fear revealing their identities to the world. In relatively few pages, the author is able to get at the heart of identity itself . . . Stryker also introduces the uninitiated into the ‘Deep Web,’ alternative currencies and even the nascent stages of a kind of parallel Web that exists beyond the power of governments to switch it off. Beyond even that is the fundamental question of whether or not absolute anonymity is even possible.” —Kirkus Reviews “Stryker explains how significant web anonymity is to those key companies who mine user data personal information of, for example, the millions of members on social networks. . . . An impassioned, rational defense of web anonymity and digital free expression.” —Publishers Weekly




The United States of Anonymous


Book Description

In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications. Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment's protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying information is associated with their communications. From blocking laws that prevent Ku Klux Klan members from wearing masks to restraining Alabama officials from forcing the NAACP to disclose its membership lists, and to refusing companies' requests to unmask online critics, courts have recognized that anonymity is a vital part of our free speech protections. The United States of Anonymous weighs the tradeoffs between the right to hide identity and the harms of anonymity, concluding that we must maintain a strong, if not absolute, right to anonymous speech.







Condition of Anonymity


Book Description

A would-be Edward Snowden is preparing his own whistleblowing bombshell. To what extremes will the government, and a man, go to and stop this from happening?The action in this prequel leads directly to the events in Slaughter & Maneuver.




Anonymity


Book Description

Some of the greatest works in English literature were first published without their authors' names. Why did so many authors want to be anonymous--and what was it like to read their books without knowing for certain who had written them? In Anonymity, John Mullan gives a fascinating and original history of hidden identity in English literature. From the sixteenth century to today, he explores how the disguises of writers were first used and eventually penetrated, how anonymity teased readers and bamboozled critics--and how, when book reviews were also anonymous, reviewers played tricks of their own in return. Today we have forgotten that the first readers of Gulliver's Travels and Sense and Sensibility had to guess who their authors might be, and that writers like Sir Walter Scott and Charlotte Brontë went to elaborate lengths to keep secret their authorship of the best-selling books of their times. But, in fact, anonymity is everywhere in English literature. Spenser, Donne, Marvell, Defoe, Swift, Fanny Burney, Austen, Byron, Thackeray, Lewis Carroll, Tennyson, George Eliot, Sylvia Plath, and Doris Lessing--all hid their names. With great lucidity and wit, Anonymity tells the stories of these and many other writers, providing a fast-paced, entertaining, and informative tour through the history of English literature.




Lessons from the Identity Trail


Book Description

During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in an environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recent research outcomes.




Practical Anonymity


Book Description

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing