
America the Vulnerable
Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $18.00
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Lloyd James
-
De:
-
Joel Brenner
Acerca de esta escucha
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals. Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace.
We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.
Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.
©2011 Joel Brenner (P)2011 Penguin AudioLos oyentes también disfrutaron...
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Chip War
- The Quest to Dominate the World's Most Critical Technology
- De: Chris Miller
- Narrado por: Stephen Graybill
- Duración: 12 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
You may be surprised to learn that microchips are the new oil—the scarce resource on which the modern world depends. Today, military, economic, and geopolitical power are built on a foundation of computer chips. Virtually everything—from missiles to microwaves—runs on chips, including cars, smartphones, the stock market, even the electric grid. Until recently, America designed and built the fastest chips and maintained its lead as the #1 superpower, but America’s edge is in danger of slipping, undermined by players in Taiwan, Korea, and Europe taking over manufacturing.
-
-
Great history, but could poor narration
- De Lily Wong en 10-26-22
De: Chris Miller
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
Worm
- The First Digital World War
- De: Mark Bowden
- Narrado por: Christopher Lane
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
-
Important Insight into the Next 10 Years
- De Kenneth en 11-13-11
De: Mark Bowden
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- De: David E. Sanger
- Narrado por: Robertson Dean
- Duración: 12 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- De Inthego en 06-14-19
De: David E. Sanger
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- De: Christian Brose
- Narrado por: Christian Brose
- Duración: 9 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- De Tomas Singliar en 06-06-20
De: Christian Brose
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Chip War
- The Quest to Dominate the World's Most Critical Technology
- De: Chris Miller
- Narrado por: Stephen Graybill
- Duración: 12 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
You may be surprised to learn that microchips are the new oil—the scarce resource on which the modern world depends. Today, military, economic, and geopolitical power are built on a foundation of computer chips. Virtually everything—from missiles to microwaves—runs on chips, including cars, smartphones, the stock market, even the electric grid. Until recently, America designed and built the fastest chips and maintained its lead as the #1 superpower, but America’s edge is in danger of slipping, undermined by players in Taiwan, Korea, and Europe taking over manufacturing.
-
-
Great history, but could poor narration
- De Lily Wong en 10-26-22
De: Chris Miller
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
Worm
- The First Digital World War
- De: Mark Bowden
- Narrado por: Christopher Lane
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
-
Important Insight into the Next 10 Years
- De Kenneth en 11-13-11
De: Mark Bowden
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- De: David E. Sanger
- Narrado por: Robertson Dean
- Duración: 12 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- De Inthego en 06-14-19
De: David E. Sanger
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- De: Christian Brose
- Narrado por: Christian Brose
- Duración: 9 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- De Tomas Singliar en 06-06-20
De: Christian Brose
-
Permanent Record
- De: Edward Snowden
- Narrado por: Holter Graham
- Duración: 11 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- De Ryan L en 09-22-19
De: Edward Snowden
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Playing to the Edge
- American Intelligence in the Age of Terror
- De: Michael V. Hayden
- Narrado por: Michael V. Hayden
- Duración: 16 h y 48 m
- Versión completa
-
General
-
Narración:
-
Historia
An unprecedented high-level master narrative of America's intelligence wars from the only person ever to helm both the CIA and NSA, at a time of heinous new threats and wrenching change. For General Michael Hayden, playing to the edge means playing so close to the line that you get chalk dust on your cleats. Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America.
-
-
Fascinating - but distractingly disorganized.
- De Cynthia en 03-21-16
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- De: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrado por: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Duración: 12 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- De Silvershopper en 01-18-23
De: Laurent Richard, y otros
-
Call Sign Chaos
- Learning to Lead
- De: Jim Mattis, Bing West
- Narrado por: Danny Campbell
- Duración: 12 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Call Sign Chaos is the account of Jim Mattis’ storied career, from wide-ranging leadership roles in three wars to ultimately commanding a quarter of a million troops across the Middle East. Along the way, Mattis recounts his foundational experiences as a leader, extracting the lessons he has learned about the nature of warfighting and peacemaking, the importance of allies, and the strategic dilemmas - and short-sighted thinking - now facing our nation.
-
-
A pleasant surprise
- De Fountain of Chris en 09-06-19
De: Jim Mattis, y otros
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
The Hundred-Year Marathon
- China's Secret Strategy to Replace America as the Global Superpower
- De: Michael Pillsbury
- Narrado por: Malcolm Hillgartner
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
One of the US government's leading China experts reveals the hidden strategy fueling that country's rise - and how Americans have been seduced into helping China overtake us as the world's leading superpower.
-
-
Fascinating perspective.
- De Rocky Mackintosh en 01-05-17
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
Lo que los oyentes dicen sobre America the Vulnerable
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Nathan
- 12-20-23
Different perspective
Overall I enjoyed it. The book did a great job of covering a lot of historically relevant topics and did a little forecasting too, which was refreshing.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Juan Pedroza
- 05-30-17
Great information
I work in IT and deal with networking security issues every day, this book gives the average computer user an inside to what the security world is all about. I really enjoyed the last chapter and the ideas for a better way of communication from one country to another who share the same ideology of a democratic society
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Mr. Majestic
- 11-27-17
Interesting take on the Porn industry
The author is right about the way you want to portray the Porn industry. This is an interesting take on how free porn came to be. The first hand stories are interesting and the book has led me to understand how free porn works, the implications it had on the industry, and the effects it has had in our society.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- K. Foster
- 06-30-13
A Must Listen for Anyone in CyberSecurity
What did you love best about America the Vulnerable?
The author comes from a place of real world authority of this subject and his comments are highly creditable. The content is provided in a manner that is interesting, thought provoking, and free of dry jargon. He takes a very methodical approach to introducing the issues, the ‘so what’ part of the equation, and provides recommendations or commentary. The topics are current, relevant, and timely. If you are someone who is in the C-Level management, IT professional, or an actual Cyber Security professional, this is a mandatory listen.
What about Lloyd James’s performance did you like?
I felt the performance was excellent. Mr. James reading made you feel like the two of you were having a conversation about the subject over a coffee. I would certainly seek other materials by the performer.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- DS
- 02-15-13
wars in the future?
if this is correct, and if we aren't proactive, this is the future. Government sponsored hackers could take down our whole country and disrupt our way of life. Let's hope we're smart and proactive.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Dr. AJ Sivalingam
- 03-05-18
same issues
Most of the topics covered are the same you will find in other cyber crime cyber security publishing's. good listening.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Eduardo Santillan
- 10-07-16
Great book!
I enjoyed listening to it. The reader's voice was not one to put me to sleep. The book was very interesting and cited many facts and made many statements that were just eye openers. I feel that the author really does have a good vision of our future.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Jeeper
- 01-05-18
Fascinating for us lay people!
Enter the new world of cyber crime and warfare. I'm not an IT guy by any stretch, but this book and performance had my attention all the way through!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Nick B
- 07-05-19
Amazing
This book is absolutely genius. I highly recommend if your into cyber, crypto & soy non fiction.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 05-01-22
Too little too late?
This book is written by one of the most qualified people to speak on the subject of the many vulnerabilities of internetworked devices. Joel Brenner holds many titles, one of which is former inspector general of the NSA. He introduces the current and future threats to America from cyberspace, outlines fictional scenarios of these threats and presents well thought-out solutions to these overarching problems. One of my highlights of this book is discussion on the topic of the many issues with modern day intelligence. Intel services over classify their products and severely limit their own abilities to collaborate as a result. An example presented in the book is the compilation of purely open source information to create a classified conclusion of those events.
All in all, this book is a must read for those wanting to get an insight into the world of cyber security and America's cyber policy.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña