Kindle Price: $2.99

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

You've subscribed to ! We will preorder your items within 24 hours of when they become available. When new books are released, we'll charge your default payment method for the lowest price available during the pre-order period.
Update your device or payment method, cancel individual pre-orders or your subscription at
Your Memberships & Subscriptions

Buy for others

Give as a gift or purchase for a team or group.
Learn more

Buying and sending eBooks to others

  1. Select quantity
  2. Buy and send eBooks
  3. Recipients can read on any device

These ebooks can only be redeemed by recipients in the US. Redemption links and eBooks cannot be resold.

Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Privacy for Me and Not for Thee: The Movement for Invincible Personal Encryption, Radical State Transparency, and the Snowden Hack Kindle Edition

3.0 3.0 out of 5 stars 11 ratings

Edward Snowden, a 29-year-old computer systems administrator who worked as a contractor for the CIA and NSA, perpetrated the greatest assault on American intelligence in US history. Yet the select brotherhood of adversarial journalists, radical activists and anarchist hackers who have been admitted into his close confidence have succeeded in keeping the attention away not only from their own long-time crusade against the US government, but Snowden’s own increasing damage to national security, particularly to relations with allies. Far from merely promoting privacy rights and government accountability and the rights of “whistleblowers,” Team Snowden's major actors are really part of a long-standing cyberwar demanding invincible encryption for activists even as they insist on radical state transparency as part of an extremist political agenda to take power. This work pulls back the curtain on the long-time connections of some of the people producing and promoting Snowden’s leaks and scrutinizes their involvement in WikiLeaks, the anarchist collective that has collaborated with the Kremlin, and Tor Project, a community of open-source encryption software developers whose circumvention tools may be useful to Iranian and Chinese dissidents, but more often than not are used by illegal drug dealers and child abusers -- leading to massive crackdowns by the FBI. Then there are the greatest Tor use cases of all: Julian Assange's WikiLeaks, Chelsea Manning's Cablegate and now Snowden devastating NSA hack.

This book probes deeply into the coopted individuals and organizations in Russia’s “managed democracy” that have received and helped Snowden, bringing to light material not previously translated in the Western press. Russian President Vladimir Putin knows he has a windfall in Snowden, and has cunningly exploited the fugitive for his own agenda of creating a state-controlled “sovereign Internet”. The story also tracks the secretive hacker movements that were actively recruiting someone like Snowden and once he came to them, laid the groundwork for helping move, store and ultimately leak his classified files. The little-known controversies over the Tor software used by WikiLeaks, Chelsea Manning, and now Snowden and his helpers are outlined to make the argument of how government programs to assist espionage ultimately backfired on them and must get more critical public examination.

The disturbing links are exposed between the US military and the very forces that have undermined national security so dramatically. The Snowden story crosses through a number of cities around the globe, where again and again we find the troubling convergences and coincidences that let us know there is far more to the Snowden enigma than we have been told, and much more to be investigated.

From the virtual world of Second Life, whose founding CTO was a former Naval and NSA officer, to the crypto party at New York’s fashionable Whitney Museum where Snowden’s helpers performed, to the high-rises of Hong Kong and the Moscow airport and suburban safe houses, Privacy for Me and Thee chronicles the “infowars” that are now our reality in the great cyberspace conflict that is only just beginning.
Read more Read less

Add a debit or credit card to save time when you check out
Convenient and secure with 2 clicks. Add your card

Product details

  • ASIN ‏ : ‎ B00I2CJKI6
  • Publisher ‏ : ‎ Catherine A. Fitzpatrick (January 25, 2014)
  • Publication date ‏ : ‎ January 25, 2014
  • Language ‏ : ‎ English
  • File size ‏ : ‎ 1703 KB
  • Text-to-Speech ‏ : ‎ Enabled
  • Screen Reader ‏ : ‎ Supported
  • Enhanced typesetting ‏ : ‎ Enabled
  • X-Ray ‏ : ‎ Not Enabled
  • Word Wise ‏ : ‎ Enabled
  • Sticky notes ‏ : ‎ On Kindle Scribe
  • Print length ‏ : ‎ 299 pages
  • Customer Reviews:
    3.0 3.0 out of 5 stars 11 ratings

Customer reviews

3 out of 5 stars
3 out of 5
11 global ratings

Top reviews from the United States

Reviewed in the United States on February 16, 2014
This is a sagacious and amply researched dissent from the Edward Snowden support campaign. Its thoroughness exceeds other books, essays, op-eds, news reports and multi-media performances on the topic whether favorable or unfavorable to Snowden, all too many of which merely recycle opinions and far too few give close attention to Snowden's releases.

Unfortunately Fitzpatrick also neglects the Snowden documents to focus on coverage of secondary stories which requires little effort, a technique of derivative journalism to treat itself and its disputes as the greatest story of the era. Desperate survival of journalism is thought be a national security matter. So let's have a national debate about us, to hell with Snowden's revelations.

This canonical rehash of her faith in journalism's importance has its virtues nonetheless. It is a near perfect earnest amateur espionage supported intelligence doctrinal assay on threats to the faith of national security, verbose at length, teacherly referenced, prototypical individual and group suspects named, biographed and slandered, imaginary covert plots uncovered, to mimic a Presidential Daily Brief summa cum laude peroration:

"Encryption corrupts

Absolute encryption corrupts absolutely"

This is Twitter-grade spit. More: @catfitz

-----

A flurry of tweets by the author followed this review.

The gender of CatFitz is unknown. Gender imposters are commonplace online and off; Facebook lists some 53 varieties. On Twitter identity varieties are far greater, individuals using dozens to argue with, attack, smear and compliment themselves.

CatFitz tweeted that hir intent was not to cover the Snowden documents, that will be done later.

CatFitz vociferously objectioned to online posting of portions of the book - as more than quaint "fair use."

CatFitz denied that 99% of the book was plagiarized recyling of Cold War rhetoric.

CatFitz did not answer that the text appeared ghost-written by aging [spy] agencies stuck in the past.

CatFitz did not answer that 3-stars was quite generous in the face of hir wholesale plagiary and excessive reliance upon links to other sources to bulk up slightest credibility.

CatFitz did not deny that this common industry standard of journalism to fabricate quilts of snippets harvested online, then brand the quilts as copyrighted.

"CatFitz moaned and spouted vulgarities as if plagiarizing a "violated" virginal starlet seeking publicity for type-cast roles." This comedic phrasing exemplifies CatFitz's advanced persistent lusting for "commie" targets.

CatFitz in hir book and in hir tweets demonstrates the parlous state of mendacious and avaricious opinionating upon the opinionating of others in Amazon's corral of desperate writers rapidly producing Tweet-grade spittle as worthy of intellectual property theft ridicule, not 99-299 cents.

CatFitz stalks targets online and off using a slew of disguises and personas, avatars and Second Life's, in accord with practices of spies and journalists, priests and nuns, predators and "victims." Hir book is packed with venal and venial deceptions, entrapments, houndings and crowings of gotchas. These unclassified "means and methods" derive from hir blog and social media accounts which hector and accuse targets mercilessly as if on a holy mission of retribution and damnation guided by God hirself, Whom, CatFitz is confident to assert, is implacably "anti-commie" in the 1950s mindset still prevailing in secret organizations of theocracies. In the US theocracy of endless paranoix and war this claim derives from the infallible writ of the National Security Act 1947 which empowered a secret regime of spies, supporters, industry and politicians unmatched in history but amply precedented in the United Kingdom's withering royal empire.

For more eloquent, less hysterical, writing see on Amazon hir manifold companion tracts of retro-Cold War paranoia by mentor Economist senior editor Edward Lucas; on Twitter @edwardlucas.
18 people found this helpful
Report
Reviewed in the United States on March 12, 2014
Catherine is the only author, as far as I know, who has offered a credible hypothesis of what could be the driving force behind US national security leaks. In a nutshell, it's about the power struggle amongst various players who want to control the Internet and use it to their own advantage without impunity. She zeroes in on the anarcho-nihilist hacker crowd and their strange bedfellows. A good analysis of the hacker movement's history and mindset from someone who has observed them closely for a number of years.
6 people found this helpful
Report
Reviewed in the United States on February 19, 2014
You always know that things are going to go really well when the author starts by stating that, "Because I am not an expert, no doubt I've made mistakes in describing the way certain technical matters work in this book."

I'm also not an expert on the technical aspects of this story, so I can't speak to Ms. Fitzpatrick's treatment of this aspect. I did, however, find multiple basic errors of fact in her presentation. For example, Thomas Drake is described as a "former NSA official who left in 2010... [and] then successfully fought off a lawsuit against him launched by his former employers." Ummm, no. Drake wasn't sued. He was criminally charged, and those charges could have resulted in a sentence of thirty-five years. He went bankrupt successfully defending himself and now works in an Apple store. Ms. Fitzpatrick could have learned this from visiting his wikipedia page.

Anyone who is looking for an informed and informative take on Edward Snowden or the NSA will not find it here. This is less of a book about Snowden than it is about Ms. Fitzpatrick's strange obsessions. We get detailed descriptions of people who were mean to her on twitter. There are long and pointless digressions about her activities on Second Life, which Fitzpatrick seems to think is very, very important. We also are given lots of descriptions of Ms. Fitzpatrick's conversations with various Russians in which she recalls making very clever points between sharing "strong drink." The sense of inflated self-importance is truly hilarious, especially when set against the backdrop of her constant accusations that Mr. Snowden is a megalomaniac and narcissist.

In the end, her ludicrously hyperbolic central thesis-- that hackers constitute "the greatest, most pervasive tyranny in our time"-- remains unproven.
46 people found this helpful
Report
Reviewed in the United States on February 8, 2014
Catherine deftly explores many of the unexamined issues about the Snowden saga with unique insights into the cyber realm.

Her book raises many of the most important questions regarding Snowden's contact with journalists, relationship with WikiLeaks, and the contradictions surrounding his theft and flight.

As a journalist covering the same issues, this book is now an invaluable part of that investigation.
4 people found this helpful
Report
Report an issue

Does this item contain inappropriate content?
Do you believe that this item violates a copyright?
Does this item contain quality or formatting issues?