Try Premium for 30 days

Live games for all NFL, MLB, NBA, & NHL teams
Commercial-Free Music
No Display Ads
America the Vulnerable - Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare-logo

America the Vulnerable - Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

Joel Brenner

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems. Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more. Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that. The structure and culture of the Internet favor spies over governments and corporations, and hackers ov

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems. Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more. Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that. The structure and culture of the Internet favor spies over governments and corporations, and hackers ov
More Information

Description:

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems. Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more. Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that. The structure and culture of the Internet favor spies over governments and corporations, and hackers ov

Language:

English

Narrators:

Lloyd James

Length:

9h 56m


Chapters

Chapter 1
Chapter 1

07:50


Chapter 2
Chapter 2

07:30


Chapter 3
Chapter 3

07:28


Chapter 4
Chapter 4

07:39


Chapter 5
Chapter 5

06:44


Chapter 6
Chapter 6

07:11


Chapter 7
Chapter 7

07:50


Chapter 8
Chapter 8

08:20


Chapter 9
Chapter 9

08:28


Chapter 10
Chapter 10

08:54


Chapter 11
Chapter 11

08:33


Chapter 12
Chapter 12

07:05


Chapter 13
Chapter 13

09:31


Chapter 14
Chapter 14

04:29


Chapter 15
Chapter 15

08:19


Chapter 16
Chapter 16

07:20


Chapter 17
Chapter 17

07:51


Chapter 18
Chapter 18

07:39


Chapter 19
Chapter 19

05:44


Chapter 20
Chapter 20

05:45


Chapter 21
Chapter 21

07:18


Chapter 22
Chapter 22

07:50


Chapter 23
Chapter 23

09:42


Chapter 24
Chapter 24

08:23


Chapter 25
Chapter 25

06:54


Chapter 26
Chapter 26

07:41


Chapter 27
Chapter 27

07:00


Chapter 28
Chapter 28

05:11


Chapter 29
Chapter 29

05:19


Chapter 30
Chapter 30

08:29


Chapter 31
Chapter 31

07:18


Chapter 32
Chapter 32

04:57


Chapter 33
Chapter 33

07:13


Chapter 34
Chapter 34

06:12


Chapter 35
Chapter 35

05:52


Chapter 36
Chapter 36

06:59


Chapter 37
Chapter 37

05:04


Chapter 38
Chapter 38

08:26


Chapter 39
Chapter 39

10:01


Chapter 40
Chapter 40

08:34


Chapter 41
Chapter 41

07:01


Chapter 42
Chapter 42

06:58


Chapter 43
Chapter 43

08:35


Chapter 44
Chapter 44

06:45


Chapter 45
Chapter 45

06:56


Chapter 46
Chapter 46

08:01


Chapter 47
Chapter 47

07:54


Chapter 48
Chapter 48

07:50


Chapter 49
Chapter 49

08:03


Chapter 50
Chapter 50

07:43


Chapter 51
Chapter 51

08:20


Chapter 52
Chapter 52

06:55


Chapter 53
Chapter 53

06:45


Chapter 54
Chapter 54

07:37


Chapter 55
Chapter 55

05:14


Chapter 56
Chapter 56

06:21


Chapter 57
Chapter 57

07:35


Chapter 58
Chapter 58

07:42


Chapter 59
Chapter 59

07:39


Chapter 60
Chapter 60

07:22


Chapter 61
Chapter 61

05:35


Chapter 62
Chapter 62

06:36


Chapter 63
Chapter 63

07:04


Chapter 64
Chapter 64

07:23


Chapter 65
Chapter 65

07:19


Chapter 66
Chapter 66

08:00


Chapter 67
Chapter 67

07:17


Chapter 68
Chapter 68

07:32


Chapter 69
Chapter 69

07:20


Chapter 70
Chapter 70

05:14


Chapter 71
Chapter 71

05:21


Chapter 72
Chapter 72

06:49


Chapter 73
Chapter 73

07:46


Chapter 74
Chapter 74

06:41


Chapter 75
Chapter 75

07:17


Chapter 76
Chapter 76

07:33


Chapter 77
Chapter 77

07:14


Chapter 78
Chapter 78

07:21


Chapter 79
Chapter 79

07:40


Chapter 80
Chapter 80

06:48


Chapter 81
Chapter 81

06:47


Chapter 82
Chapter 82

08:06