Exploding Data: Reclaiming Our Cyber Security in the Digital Age
In this bracing book, the second Secretary of Homeland Security makes clear that personal data has become one of the most valuable assets of the modern age—and yet our laws and policies surrounding the protection of personal information are completely out of date and need to be overhauled in the digital era. While the collection of data—more widespread even by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society, Michael Chertoff argues that the standards under which information can be inspected, analyzed, or used must be significantly tightened. In his compelling call for action, he makes clear that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories from his decades of experience, Chertoff charts a forceful new strategy that balances the needs of individuals, government, and business alike.
1127407087
Exploding Data: Reclaiming Our Cyber Security in the Digital Age
In this bracing book, the second Secretary of Homeland Security makes clear that personal data has become one of the most valuable assets of the modern age—and yet our laws and policies surrounding the protection of personal information are completely out of date and need to be overhauled in the digital era. While the collection of data—more widespread even by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society, Michael Chertoff argues that the standards under which information can be inspected, analyzed, or used must be significantly tightened. In his compelling call for action, he makes clear that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories from his decades of experience, Chertoff charts a forceful new strategy that balances the needs of individuals, government, and business alike.
16.0 In Stock
Exploding Data: Reclaiming Our Cyber Security in the Digital Age

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

by Michael Chertoff
Exploding Data: Reclaiming Our Cyber Security in the Digital Age

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

by Michael Chertoff

Paperback

$16.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

In this bracing book, the second Secretary of Homeland Security makes clear that personal data has become one of the most valuable assets of the modern age—and yet our laws and policies surrounding the protection of personal information are completely out of date and need to be overhauled in the digital era. While the collection of data—more widespread even by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society, Michael Chertoff argues that the standards under which information can be inspected, analyzed, or used must be significantly tightened. In his compelling call for action, he makes clear that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories from his decades of experience, Chertoff charts a forceful new strategy that balances the needs of individuals, government, and business alike.

Product Details

ISBN-13: 9780802147196
Publisher: Grove/Atlantic, Inc.
Publication date: 05/21/2019
Pages: 272
Sales rank: 626,613
Product dimensions: 5.50(w) x 8.20(h) x 0.80(d)

About the Author

Michael Chertoff was the second Secretary of Homeland Security from 2005–2009. He previously served at a United States Circuit Judge of the United States Court of Appeals for the Third Circuit, as a federal prosecutor, as Assistant U.S. Attorney General, and as United States Attorney for the District of New Jersey—one of only two U.S. Attorneys who was not replaced when the Clinton administration took office in 1993. Chertoff is the author of Homeland Security: Assessing the First Five Years. He is today Executive Chairman and Co-founder of The Chertoff Group, a security consulting company, and senior of counsel to the firm of Covington and Burling.

Read an Excerpt

In our world of big data, we want to give the government the appropriate legal authority to provide security while maintaining a sufficient scope of privacy and autonomy necessary for our human dignity. Citizens seek to enjoy the convenience and efficiency of modern commercial data-driven technology without putting their security and freedom at risk.

With its ability to generate and review massive amounts of data, today’s technology numbs society, creating social acceptance for our loss of privacy. Given the ease with which emails, telephone metadata, and other previously private information are captured by others, Americans have been surrendering control over electronic privacy. Today’s legal framework attempts to protect the right to privacy under a technology assumption that is decades old. We have come to accept the fact that our emails may be read and have become accustomed to our data being collected and used by others.

If privacy means the ability to hide or shield our actions and thoughts from prying eyes, that privacy ship has sailed. The volume of data we generate, and the analytic power that can be applied against that data, mean that few of us can remain opaque. I argue that the focus of our concern should shift to protecting our autonomy. We should maintain some degree of ownership and control over the data that we generate or that relates to us.

What is at stake is individual autonomy—the right to make the personal choices that effect our values and our destiny. A person can be manipulated and coerced many ways, but the most ominous involve the pressure that comes with constant, ongoing surveillance of our actions.

Table of Contents

Introduction: Big Data Is Watching You 1

1 What Is the Internet and How Did It Change Data? 25

2 How Did Law and Policy Evolve to Address Data 1.0 and 2.0? 56

3 Data 3.0 and the Challenges of Privacy and Security 76

4 Reconfiguring Privacy and Security in the Data 3.0 Universe 101

5 Data 3.0 and Controls on Private Sector Use of Data 138

6 Data 3.0 and Sovereignty: A Question of Conflict of Laws 161

7 Cyber Warfare: Deterrence and Response 172

Conclusion: Meeting the Challenge of Data 3.0: Recommendations for Law and Policy 199

Acknowledgments 209

Notes 213

Further Reading 241

Index 243

From the B&N Reads Blog

Customer Reviews