Close cookie details

This site uses cookies. Learn more about cookies.

OverDrive would like to use cookies to store information on your computer to improve your user experience at our Website. One of the cookies we use is critical for certain aspects of the site to operate and has already been set. You may delete and block all cookies from this site, but this could affect certain features or services of the site. To find out more about the cookies we use and how to delete them, click here to see our Privacy Policy.

If you do not wish to continue, please click here to exit this site.

Hide notification

  Main Nav
America the Vulnerable
Cover of America the Vulnerable
America the Vulnerable
New Technology and the Next Threat to National Security
Borrow Borrow
Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World.
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.

Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.

The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.

In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World.
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.

Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.

The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.

In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

Available formats-
  • OverDrive Listen
  • OverDrive MP3 Audiobook
Subjects-
Languages:-
Copies-
  • Available:
    1
  • Library copies:
    1
Levels-
  • ATOS:
  • Lexile:
  • Interest Level:
  • Text Difficulty:

Recommended for you

About the Author-
  • Joel Brenner is the former senior counsel at the National Security Agency, where he advised on legal and policy issues relating to network security. He lives and practices law in Washington, DC.
    Since beginning his narrating career in 1996, Lloyd James (also known as Sean Pratt) has been credited with more than 600 audiobooks. He has earned several awards, including six Audiofile Earphones Awards and two nominations for the Audie Award. His performances include Once There Was a War by John Steinbeck, Encounters with Jesus and Every Good Endeavor by Timothy Keller, and Elvis in the Morning by William F. Buckley Jr. He lives in Maryland with his wife and their children.
Reviews-
  • AudioFile Magazine Written by a former National Security Agency senior counsel, this book details the imminent and severe threats to the U.S. that are inherent in the new digital world. We are literally under attack every minute of the day by hackers, spies, con artists, and agents of foreign governments, who are all compromising our privacy and security. It's a sobering work and one that should give us pause. Narrator Lloyd James has a controlled, authoritative voice that meshes well with the book's tone. His narration is focused on delivering the information in a straightforward manner. Yet he raises our level of concern, and even creates some fear, by using subtle changes in his emphasis and pacing. R.I.G. (c) AudioFile 2011, Portland, Maine
Title Information+
  • Publisher
    Penguin Random House Audio Publishing Group
  • OverDrive Listen
    Release date:
  • OverDrive MP3 Audiobook
    Release date:
Digital Rights Information+
  • OverDrive MP3 Audiobook
    Burn to CD: 
    Permitted
    Transfer to device: 
    Permitted
    Transfer to Apple® device: 
    Permitted
    Public performance: 
    Not permitted
    File-sharing: 
    Not permitted
    Peer-to-peer usage: 
    Not permitted
    All copies of this title, including those transferred to portable devices and other media, must be deleted/destroyed at the end of the lending period.

Status bar:

You've reached your checkout limit.

Visit your Checkouts page to manage your titles.

Close

You already have this title checked out.

Want to go to your Checkouts?

Close

Recommendation Limit Reached.

You've reached the maximum number of titles you can recommend at this time. You can recommend up to 99 titles every 1 day(s).

Close

Sign in to recommend this title.

Recommend your library consider adding this title to the Digital Collection.

Close

Enhanced Details

Close
Close

Limited availability

Availability can change throughout the month based on the library's budget.

is available for days.

Once playback starts, you have hours to view the title.

Close

Permissions

Close

The OverDrive Read format of this eBook has professional narration that plays while you read in your browser. Learn more here.

Close

Holds

Total holds:


Close

Restricted

Some format options have been disabled. You may see additional download options outside of this network.

Close

You've reached your library's checkout limit for digital titles.

To make room for more checkouts, you may be able to return titles from your Checkouts page.

Close

Excessive Checkout Limit Reached.

There have been too many titles checked out and returned by your account within a short period of time.

Try again in several days. If you are still not able to check out titles after 7 days, please contact Support.

Close

You have already checked out this title. To access it, return to your Checkouts page.

Close

This title is not available for your card type. If you think this is an error contact support.

Close

An unexpected error has occurred.

If this problem persists, please contact support.

Close

Close

NOTE: Barnes and Noble® may change this list of devices at any time.

Close
Buy it now
and help our library WIN!
America the Vulnerable
America the Vulnerable
New Technology and the Next Threat to National Security
Joel Brenner
Choose a retail partner below to buy this title for yourself.
A portion of this purchase goes to support your library.
Close
Close

There are no copies of this issue left to borrow. Please try to borrow this title again when a new issue is released.

Close
Barnes & Noble Sign In |   Sign In

You will be prompted to sign into your library account on the next page.

If this is your first time selecting “Send to NOOK,” you will then be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."

The first time you select “Send to NOOK,” you will be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."

You can read periodicals on any NOOK tablet or in the free NOOK reading app for iOS, Android or Windows 8.

Accept to ContinueCancel