America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Written by Joel Brenner
Narrated by Lloyd James
4.5/5
()
Currently unavailable
Currently unavailable
About this audiobook
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.
Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.
The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.
In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.
Joel Brenner
Joel Brenner is the former senior counsel at the National Security Agency, where he advised on legal and policy issues relating to network security. He lives and practices law in Washington, D.C.
Related to America the Vulnerable
Related audiobooks
Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Summary of Nicole Perlroth's This Is How They Tell Me the World Ends Rating: 0 out of 5 stars0 ratingsThe Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election Rating: 4 out of 5 stars4/5Spies for Hire: The Secret World of Intelligence Outsourcing Rating: 4 out of 5 stars4/5Spycraft: The Secret History of the CIA's Spytechs from Communism to Al-Qaeda Rating: 4 out of 5 stars4/5Summary of Henry Farrell and Abraham Newman's Underground Empire Rating: 0 out of 5 stars0 ratingsSummary of Kim Zetter's Countdown to Zero Day Rating: 0 out of 5 stars0 ratingsDivision Rating: 0 out of 5 stars0 ratingsThe Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5Dumb Money: How Our Greatest Financial Minds Bankrupted the Nation Rating: 4 out of 5 stars4/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/5Dice Have No Memory: Big Bets and Bad Economics from Paris to the Pampas Rating: 0 out of 5 stars0 ratingsWorm: The First Digital World War Rating: 4 out of 5 stars4/5The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age Rating: 4 out of 5 stars4/5Summary of Scott J. Shapiro's Fancy Bear Goes Phishing Rating: 0 out of 5 stars0 ratingsRussian Cyber Warfare: The History of Russia’s State-Sponsored Attacks across the World Rating: 4 out of 5 stars4/5Biggest Cyber Crimes in the History Rating: 5 out of 5 stars5/5Hack: Nik Byron Investigtion, Book 1 Rating: 4 out of 5 stars4/5Rise of the Machines: A Cybernetic History Rating: 4 out of 5 stars4/5The World's Most Dangerous Geek: And More True Hacking Stories Rating: 4 out of 5 stars4/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5We Kill Because We Can: From Soldiering to Assassination in the Drone Age Rating: 5 out of 5 stars5/5Dragonfire: Four Days That (Almost) Changed America Rating: 4 out of 5 stars4/5Threats on Internet Rating: 0 out of 5 stars0 ratingsSummary of Byron Tau's Means of Control Rating: 5 out of 5 stars5/5Twilight Warriors: The Soldiers, Spies, and Special Agents Who Are Revolutionizing the American Way of War Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5
Reviews for America the Vulnerable
8 ratings1 review
- Rating: 4 out of 5 stars4/5Joel Brenner is a former senior counsel at the National Security Agency, where he saw first-hand the wide taxonomy of computer issues related to crime, warfare and espionage. It's easy to get caught up in the romance of the social misfit hacker but the reality has moved beyond. Today it is nation states like China employing 30,000+ professionally trained computer scientists to steal state and corporate secrets from the United States to gain a competitive edge. The real danger is not an evil genius who holds the Internet hostage to a worm (though that may happen), but a steady transfer of wealth silently taking place each and every day on a massive scale and hardly anyone seems to notice or care. Brenner has thought deeply on these issues and gives many examples, it's fascinating but quickly becomes so difficult and scary as to be insolvable. He ends with policy recommendations. Hopefully people in positions of responsibility find this book and realize how serious and big the problem is, and how quickly it is exploding.
1 person found this helpful