
America the Vulnerable
Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
3 months free
Buy for $18.00
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Lloyd James
-
By:
-
Joel Brenner
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals. Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace.
We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.
Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.
©2011 Joel Brenner (P)2011 Penguin AudioListeners also enjoyed...




















Different perspective
Something went wrong. Please try again in a few minutes.
Great information
Something went wrong. Please try again in a few minutes.
Interesting take on the Porn industry
Something went wrong. Please try again in a few minutes.
What did you love best about America the Vulnerable?
The author comes from a place of real world authority of this subject and his comments are highly creditable. The content is provided in a manner that is interesting, thought provoking, and free of dry jargon. He takes a very methodical approach to introducing the issues, the ‘so what’ part of the equation, and provides recommendations or commentary. The topics are current, relevant, and timely. If you are someone who is in the C-Level management, IT professional, or an actual Cyber Security professional, this is a mandatory listen.What about Lloyd James’s performance did you like?
I felt the performance was excellent. Mr. James reading made you feel like the two of you were having a conversation about the subject over a coffee. I would certainly seek other materials by the performer.A Must Listen for Anyone in CyberSecurity
Something went wrong. Please try again in a few minutes.
wars in the future?
Something went wrong. Please try again in a few minutes.
same issues
Something went wrong. Please try again in a few minutes.
Great book!
Something went wrong. Please try again in a few minutes.
Fascinating for us lay people!
Something went wrong. Please try again in a few minutes.
Amazing
Something went wrong. Please try again in a few minutes.
All in all, this book is a must read for those wanting to get an insight into the world of cyber security and America's cyber policy.
Too little too late?
Something went wrong. Please try again in a few minutes.