| Record ID | ia:weknowallaboutyo0000jeff |
| Source | Internet Archive |
| Download MARC XML | https://archive.org/download/weknowallaboutyo0000jeff/weknowallaboutyo0000jeff_marc.xml |
| Download MARC binary | https://www.archive.org/download/weknowallaboutyo0000jeff/weknowallaboutyo0000jeff_meta.mrc |
LEADER: 05924cam a2200757Ii 4500
001 ocn962330471
003 OCoLC
005 20170718124241.0
008 161107s2017 enkabc b 001 0 eng d
010 $a2016955206
019 $a983318319$a983486098
020 $a9780198749660
020 $a019874966X
035 $a(OCoLC)962330471$z(OCoLC)983318319$z(OCoLC)983486098
037 $bOxford Univ Pr, 2001 Evans rd, Cary, NC, USA, 27513$nSAN 202-5892
040 $aERASA$beng$erda$cERASA$dBDX$dYDX$dNLE$dOCLCO$dCDX$dOCLCO$dOCLCF$dNJR$dOCLCO$dSFR$dUtOrBLW
043 $ae-uk---$an-us---
049 $aSFRA
050 4 $aJC596.2.U5$bJ44 2017
082 04 $a303.48/3$223
092 $a303.483$bJ377w
100 1 $aJeffreys-Jones, Rhodri,$eauthor.
245 10 $aWe know all about you :$bthe story of surveillance in Britain and America /$cRhodri Jeffreys-Jones.
246 30 $aStory of surveillance in Britain and America
250 $aFirst edition.
264 1 $aOxford, United Kingdom :$bOxford University Press,$c2017.
300 $aix, 290 pages :$billustrations, map, portrait ;$c21 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references (pages 250-277) and index.
520 8 $aThis is the story of surveillance in Britain and the United States, from the detective agencies of the late nineteenth century to Wikileaks and CIA whistle-blower Edward Snowden in the twenty-first. Written by historian and intelligence expert Rhodri Jeffreys-Jones, it is the first full overview of its kind. Delving into the roles of credit agencies, private detectives, and phone-hacking journalists as well as agencies like the FBI and NSA in the USA and GCHQ and MI5 in the UK, Jeffreys-Jones highlights malpractices such as the blacklist and illegal electronic interceptions. He demonstrates that several presidents - Franklin D. Roosevelt, Lyndon B. Johnson, Richard M. Nixon - conducted various forms of political surveillance, and also how British agencies have been under a constant cloud of suspicion for similar reasons. Continuing with an account of the 1970s' leaks that revealed how the FBI and CIA kept tabs on anti-Vietnam War protestors, he assesses the reform impulse of this era - an impulse that began in America and only gradually spread to Britain. The end of the Cold War further at the end of the 1980s then undermined confidence in the need for state surveillance still further, but it was to return with a vengeance after 9/11. What emerges is a story in which governments habitually abuse their surveillance powers once granted, demonstrating the need for proper controls in this area. But, as Jeffreys-Jones makes clear, this is not simply a story of the Orwellian state. While private sector firms have sometimes acted as a brake on surveillance by the state (particularly in the electronic era), they have also often engaged in dubious surveillance practices of their own. Oversight and regulation, he argues, therefore need to be universal and not simply concentrate on the threat to the individual posed by the agencies of government.
505 00 $g1.$tA Survey of Surveillance --$g2.$tThe Private Eye Invades Our Privacy --$g3.$tThe Blacklist --$g4.$tFranklin D. Roosevelt's Incipient Surveillance State --$g5.$tMcCarthyism in America --$g6.$tMcCarthyism in Britain --$g7.$tCOINTELPRO and 1960s Surveillance --$g8.$tAn Age of Transparency --$g9.$tThe Intensification of Surveillance Post-9/11 --$g10.$tPrivate-Sector Surveillance in the Twenty-First Century --$g11.$tSnowden --$g12.$tPolicy and Reform in the Obama-Cameron Era
650 0 $aDomestic intelligence$zUnited States$xHistory.
650 0 $aDomestic intelligence$zGreat Britain$xHistory.
650 0 $aPrivacy, Right of$zUnited States$xHistory.
650 0 $aPrivacy, Right of$zGreta Britain$xHistory.
650 0 $aInternal security$zUnited States$xHistory.
650 0 $aInternal security$zGreat Britain$xHistory.
650 0 $aComputers$xAccess control$zUnited States.
650 0 $aComputers$xAccess control$zGreat Britain.
650 0 $aWikis (Computer science)$xAccess control$zUnited States.
650 0 $aWikis (Computer science)$xAccess control$zGreat Britain.
650 0 $aConfidential communications$zUnited States$xHistory.
650 0 $aConfidential communications$zGreat Britain$xHistory.
650 0 $aGovernment information$zUnited States$xHistory.
650 0 $aGovernment information$zGreat Britain$xHistory.
650 0 $aElectronic surveillance$zUnited States$xHistory.
650 0 $aElectronic surveillance$zGreat Britain$xHistory.
650 0 $aPolice patrol$zUnited States$xSurveillance operations$xHistory.
650 0 $aPolice patrol$zGreat Britain$xSurveillance operations$xHistory.
650 0 $aSurveillance detection$zUnited States$xHistory.
650 0 $aSurveillance detection$zGreat Britain$xHistory.
907 $a.b33956479$b03-26-18$c04-26-17
998 $a(3)xgc$a(3)xgi$b06-26-17$cm$da $e-$feng$genk$h0$i6
907 $a.b33956479$b06-26-17$c04-26-17
938 $aYBP Library Services$bYANK$n100621797
938 $aBrodart$bBROD$n119432528
938 $aErasmus Boekhandel$bERAA$nNTS0000234482
980 $a0617 sh dj
998 $axgi$b06-26-17$cm$da$e-$feng$genk$h0$i0
994 $aC0$bSFR
999 $yMARS
945 $a303.483$bJ377w$d - - $e04-01-2018 14:09$f0$g0$h04-21-18$i31223122252555$j171$0173$k - - $lxgcci$o-$p$29.95$q-$r-$s- $t0$u5$v1$w0$x5$y.i9150725x$z08-25-17
945 $a303.483$bJ377w$d - - $e - - $f0$g0$h - - $i31223122252571$j0$00$k - - $lxgcci$o-$p$29.95$q-$r-$s- $t0$u0$v0$w0$x0$y.i91507285$z08-25-17
945 $a303.483$bJ377w$d - - $e04-01-2018 16:40$f0$g0$h04-13-18$i31223122252563$j503$0508$k - - $lxgcst$o-$p$29.95$q-$r-$s- $t0$u3$v0$w0$x3$y.i91507236$z08-25-17