Your audiobook is waiting…

America the Vulnerable

Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Narrated by: Lloyd James
Length: 9 hrs and 55 mins
Categories: History, 21st Century
4.5 out of 5 stars (260 ratings)

$14.95/month after 30 days. Cancel anytime.

OR
In Cart

Publisher's Summary

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals. Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace.

We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.

Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.

©2011 Joel Brenner (P)2011 Penguin Audio

What members say

Average Customer Ratings

Overall

  • 4.5 out of 5 stars
  • 5 Stars
    149
  • 4 Stars
    83
  • 3 Stars
    25
  • 2 Stars
    1
  • 1 Stars
    2

Performance

  • 4.5 out of 5 stars
  • 5 Stars
    133
  • 4 Stars
    77
  • 3 Stars
    16
  • 2 Stars
    2
  • 1 Stars
    1

Story

  • 4.5 out of 5 stars
  • 5 Stars
    139
  • 4 Stars
    66
  • 3 Stars
    20
  • 2 Stars
    2
  • 1 Stars
    2

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

A Must Listen for Anyone in CyberSecurity

What did you love best about America the Vulnerable?

The author comes from a place of real world authority of this subject and his comments are highly creditable. The content is provided in a manner that is interesting, thought provoking, and free of dry jargon. He takes a very methodical approach to introducing the issues, the ‘so what’ part of the equation, and provides recommendations or commentary. The topics are current, relevant, and timely. If you are someone who is in the C-Level management, IT professional, or an actual Cyber Security professional, this is a mandatory listen.

What about Lloyd James’s performance did you like?

I felt the performance was excellent. Mr. James reading made you feel like the two of you were having a conversation about the subject over a coffee. I would certainly seek other materials by the performer.

2 of 2 people found this review helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great book

This book will open your eyes to the modern threat to critical infrastructure. You will see how unprotected our society is. The author was inspector general of the NSA.

  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    3 out of 5 stars

same issues

Most of the topics covered are the same you will find in other cyber crime cyber security publishing's. good listening.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Fascinating for us lay people!

Enter the new world of cyber crime and warfare. I'm not an IT guy by any stretch, but this book and performance had my attention all the way through!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great information

I work in IT and deal with networking security issues every day, this book gives the average computer user an inside to what the security world is all about. I really enjoyed the last chapter and the ideas for a better way of communication from one country to another who share the same ideology of a democratic society

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great book!

I enjoyed listening to it. The reader's voice was not one to put me to sleep. The book was very interesting and cited many facts and made many statements that were just eye openers. I feel that the author really does have a good vision of our future.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Must Read for ALL Executives & Board Members!

Excellent overview of the threats to individuals, organizations, and nation states. The author threads the needle between the different constituents and illustrates the attack surfaces and nature of threats to each using a wealth of real life examples making an extremely complex area easy to consume by the non technical reader/listener.

Additionally, the author highlights the similarities between them, contrasting the changes in technology and information collection and dissemination with the changes in warfare.

Bottom line, if you think you're security software or IT Department are protecting you, I've got a bridge for sale. If you're planning to, or are already doing business in China, you're trading short term gains for you're organizations IP, trade secrets, and business processes.

There are solutions, but until you acknowledge the problems identified in this book, you're not serious about solving them.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Well written and well read

The knowledge of the author and the pleasing voice of the reader make this Audible book a terrific way to make long daily commutes suck less. Know that you will immediately want to throw out all of your USB drives and air gap your computers after listening to this book. You have been warned.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Every American Should Read This Book

This should be on the top of the list if you are interested in national security, foreign policy or the future of democratic society. This is a very well written and presented book and is simply a must read.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
  • DS
  • 02-15-13

wars in the future?

if this is correct, and if we aren't proactive, this is the future. Government sponsored hackers could take down our whole country and disrupt our way of life. Let's hope we're smart and proactive.

1 of 2 people found this review helpful