The Audacity to Spy cover art

The Audacity to Spy

How Government, Business, and Hackers Rob Us of Privacy

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

The Audacity to Spy

By: Catherine Nolan, Ashley M. Wilson JD
Narrated by: Randal Schaffer
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalize their own services and to sell to other advertisers for behavioral marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasn't enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users' valuable personal and financial information.

More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

©2014 Catherine Nolan and Ashley M. Wilson, JD (P)2016 Technics Publications, LLC
Security & Encryption
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Cyber Smart cover art
Swiped cover art
Blockchain Technology Revolution in Business Explained cover art
Technocreep cover art
Credit Repair cover art
CRIME On eBay cover art
Tor and the Dark Net cover art
Listening In cover art
Fire Doesn't Innovate cover art
Ransomware Protection Playbook cover art
Hacked Again cover art
Tor: Access the Dark Net, Stay Anonymous Online and Escape NSA Spying cover art
Business Technology Development Strategy Bundle cover art
You'll See This Message When It Is Too Late cover art
Cybersecurity cover art
Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. cover art

What listeners say about The Audacity to Spy

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.