Part I: The Enemies of Open Society; Chapter 1 - Introduction - The Devil Has A Deal for You! Chapter 2 - Not in My Backyard: The Threat from Terrorism; The Face of the Threat; Terrorist Tactics; NBC Technologies of the Twentieth Century; GNR Technologies of the Twenty-First Century; The Power of One; Chapter 3 - Publius Who? Anonymity in an Open Society; Anonymity in America; The Courts and Anonymity; Anonymity, Accountability and the Internet; Untraceable Online Anonymity; Crime and Anonymity; Terrorism and Anonymity; The Need for Identification; Chapter 4 - Will the Real John Doe Please Stand up: A Warning about Identity Theft; Types of Identity Crimes; Spam - A Variation on an Identification Theme; Obtaining a Fake ID; Terrorists and Identity Fraud; Identity Theft as a Security Issue; Part II. Technologies of Openness; Chapter 5 - Your Papers Please: The Case for a Homeland ID; Biometrics; Blueprint for a Homeland ID; A Single Standard for Identification; A Lightweight, Tamperproof Smart Card; Limiting the Data; The Initial Implementation of a Homeland ID; Criticisms of a Homeland ID - Ineffective Against; Terrorism and Crime; Unfair Immigration Policy; Homeland IDs and Law Enforcement; Risk of Totalitarianism; Discrimination and Harassment; Slippery Slopes of Abuse; Chapter 6 - Smile, You're On Candid Camera: The Case for Surveillance; Everyday Surveillance to Promote Safety; Surveillance in the War against Terrorism; Facial Recognition; Surveillance of Communications; Legal Limits on Government Surveillance; Criticisms of Surveillance - Potential for Abuse; Making People Uncomfortable; Facial Recognition Doesn't Work; What's Your Frequency? A Network of a Million Eyes; Chapter 7 - There's Gold in Them Thar Data: The Case for Information Analysis; The Wall of Separation; Improving Information Sharing; Information Analysis; Subject-Based Analysis; Pattern-Based Analysis; Other Forms of Information Analysis; Legal Limits on Information Analysis; Safeguards; Criticisms of Information Analysis; Part III. Revisiting Privacy in an Age of Terror; Chapter 8 - Life, Liberty and the Pursuit of Privacy; A Brief History of Privacy; Court Cases; Congressional Action; Privacy in the Digital Age; Privacy Groups; Defining Privacy; Privacy as Liberty; Chapter 9 - Privacy Lost; Privacy in Early America; Privacy in the Industrial Age; Misconceptions about Technology; Privacy Protecting Technologies; Chapter 10 - Big Brother is Watching You; Orwell's Big Brother; The U.S. Government as Big Brother? The Patriot Act; Domestic Surveillance; Angry Librarians; Sneak and Peek; Checks and Balances; Government in an Open Society; Chapter 11 - Invasion of the Data Snatchers; Data Collection by Corporations; Tracking Online Behavior; Online Conveniences; The Free Flow of Information; To Opt or Not to Opt; Data Exchange as Gossip; Personal Data, Private Property and Copy Rights; Chapter 12 - Information Does Not Kill People, People Kill People; The Nosy Neighbor; Don't Bl