The Complete Privacy & Security Desk Reference
Volume 1 : Digital

Authors:

Language: English
Cover of the book The Complete Privacy & Security Desk Reference

Subject for The Complete Privacy & Security Desk Reference

Approximative price 76.87 €

In Print (Delivery period: 5 days).

Add to cartAdd to cart
Publication date:
477 p. · Paperback
This 500-page textbook will explain how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden. You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of 'the system'. You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security. When taken to the extreme, you will be impossible to compromise.
Michael Bazzell spent 18 years as a government computer crime investigator. During the majority of that time, he was assigned to the FBI's Cyber Crimes Task Force where he focused on open source intelligence and personal data removal methods. As an active investigator for multiple organizations, he has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high level computer intrusions. He has trained thousands of individuals in the use of his investigative techniques and privacy control strategies.

Justin Carroll is a veteran of 15 years in the service of the United States Government. He is a plank-owner in the elite Marine Special Operations Command (MARSOC), has worked on a contractual basis with another government agency, and has deployed to some of the world's most dangerous and inhospitable places. After completing his last overseas deployment, he spent five years teaching digital security and identity management to hundreds of soldiers, sailors, and Marines of the United States Special Operations Command (USSOCOM) and was instrumental in the development of a highly technical surveillance program currently in use abroad by US Special Operations Forces