Buy Used
$0.50
+ $3.99 shipping
Used: Very Good | Details
Condition: Used: Very Good
Comment: Former Library book. Great condition for a used book! Minimal wear. 100% Money Back Guarantee. Shipped to over one million happy customers. Your purchase benefits world literacy!
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare Hardcover – September 29, 2011


See all 6 formats and editions Hide other formats and editions
Amazon Price New from Used from
Hardcover
"Please retry"
$2.17 $0.50

There is a newer edition of this item:

Best%20Books%20of%202014
NO_CONTENT_IN_FEATURE

Best Books of the Year
Best Books of 2014
Looking for something great to read? Browse our editors' picks for 2014's Best Books of the Year in fiction, nonfiction, mysteries, children's books, and much more.

Product Details

  • Hardcover: 320 pages
  • Publisher: Penguin Press HC, The (September 29, 2011)
  • Language: English
  • ISBN-10: 159420313X
  • ISBN-13: 978-1594203138
  • Product Dimensions: 6.4 x 1.1 x 9.5 inches
  • Shipping Weight: 1.4 pounds
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (29 customer reviews)
  • Amazon Best Sellers Rank: #609,994 in Books (See Top 100 in Books)

Editorial Reviews

Review

"Cybercrime, espionage, and warfare are among the great challenges of this century, but as Joel Brenner argues, we are woefully ill-prepared to meet them. Drawing on history, law, economics, common sense, and his rare experience in counterintelligence, Brenner deftly describes the problems and offers a series of very practical solutions. This book is both well written and convincing."
(-Joseph Nye, author of Soft Power and The Future of Power)

"If you have a responsibility for protecting intellectual property, trade secrets and other instruments of successful business; if you are responsible for protecting national information and technology interests then you have a responsibility to read this book. Bring a change of underwear."
(-Vint Cerf, chief Internet evangelist at Google)

"America the Vulnerable offers an expert's keen insight into the netherworld of cyberrisk. Rich in facts, stories, and analysis, the book is a clarion call for more effective cyberpolicies and practices in both the government and private sector. America should take heed."
(-Ambassador Henry A. Crumpton, author of The Art of Intelligence )

"Brenner takes us inside the daily battle in the world of cyber espionage, where China and others are stealing American corporations' 'secret sauce.' He shows us the on-going cyber war that the US is losing."
(-Richard Clarke, author of Cyber War and Against All Enemies)

"Joel Brenner is a quiet hero-a lawyer who, after 9/11, forsook a prosperous life to serve the United States on a different kind of front line: the world of intelligence. He has written a book about cyberspace that will inform his fellow citizens-and should trouble them deeply. Any reader, casually familiar with the hacking and computer mischief that one reads about daily, will nonetheless be appalled at what he learns here about the scope of cyberespionage, crime, and malicious action that has already been directed against private citizens, corporations, and the government. A lucid, scary, and very important book."
(-Eliot Cohen, author of Supreme Command and Conquered into Liberty)

"Joel Brenner's book should be front and center in the 2012 presidential race. Scarier than a Stephen King novel-only this is nonfiction!"
(-David Smick, author of the international bestseller The World Is Curved )

About the Author

Joel Brenner is a former senior counsel at the National Security Agency, where he advised on legal and policy issues relating to network security. Previously, he served as the national counterintelligence executive in the Office of the Director of National Intelligence and as NSA's inspector general. He is a graduate of the University of Wisconsin-Madison (B.A.), The London School of Economics (Ph.D.), and Harvard Law School (J.D.). Brenner currently practices law in Washington, D.C., specializing in cyber-security and related issues.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Remarkably well written despite the serousness of the subject.
marlie
U.S. Law firms have been penetrated here and abroad, especially if they have branches in China or Russia.
Alice Friedemann
This book is a must read for anyone who deals with Network Security.
Jerry Gamblin

Most Helpful Customer Reviews

25 of 27 people found the following review helpful By Loyd E. Eskildson HALL OF FAME on October 1, 2011
Format: Hardcover
Author Joel Brenner was Inspector General of the National Security Agency after 9/11, then head of counter-intelligence for the director of National Intelligence. His book introduction does an excellent job summarizing recent intelligence thefts - the Chinese downloading up to 20 terabytes of information from DOD (equal to about one-fifth of all the data in the Library of Congress), Wiki-Leaks acquiring classified diplomatic cables, specifications for the avionics and armor on the president's helicopter ending up in Iran, theft of corporate technology and millions of consumer credit card information, and the details for a new silent submarine drive system and a new advanced radar system - each costing billions and requiring years to develop. Then there's vulnerability issues over our electric, pipeline, financial, air traffic-control, and telecommunications systems. Clearly the work of spies and thieves has become much easier and more efficient.

Yet, with all the thousands of reported Internet crimes in the U.S. reported every year, only 15 resulted in arrests or prosecutions in 2008, 19 in 2007. Botnets (linked computers taking directions from a hostile 'master') can shut down targeted systems (distributed-denial-of-service, aka 'DDOS'), and make identifying and blocking the perpetrators quite difficult when overseas computers are involved (as they usually are) - sometimes these overseas perpetrators are located in nations with no laws against cyber crimes, such as Africa or Latin America.

The FBI has estimated that China's PLA has 30,000 cyberspies, augmented by another 150,000 in the private sector. Russia has a similar situation.

Amazingly, the U.S.
Read more ›
2 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
20 of 23 people found the following review helpful By Richard Bejtlich on October 23, 2011
Format: Hardcover
America the Vulnerable (ATV) is one of the best "big picture" books I've read in a long while. The author is a former NSA senior counsel and inspector general, and was the National Counterintelligence Executive (NCIX). In these roles he could "watch the fireworks" (not his phrase, but one popular in the intel community) while the nation suffered massive data exfiltration to overseas adversaries. ATV explains the problem in terms suitable for those familiar with security issues and those learning about these challenges. By writing ATV, Joel Brenner accurately and succinctly frames the problems facing the US and the West in cyberspace.

In this review I'd like to highlight some of Mr Brenner's insights and commentary.

On pp 65-7 he discusses "China's Long View... China had the world's largest economy for eighteen of the past twenty centuries. The two exceptions were those of America's youth and rise to power.... Like India, China does not regard Western domination as normal, and it does not suffer from an inferiority complex. China's chief national strategic objectives are to lift its population out of poverty and reestablish its place in the international order."

On pp 68-71 he explains the problem with the binary thinking of Westerners regarding war. China does not see war as a binary issue, where one is either at peace OR at war. "This kind of ambiguity is difficult for Americans to digest. We are direct and aboveboard, and we like to think others are like us -- or would be if given half a chance... [W]e suffer from a Western misconception in our law, religion, and policy that 'peace' and 'war' are opposites that cannot occur at the same time...
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Jeffrey Herf on October 6, 2011
Format: Hardcover
America the Vulnerable is that welcome and infrequent book by a very fine writer who also has the skills to operate successfully at the top levels of the United States government. Joel Brenner offers us an insider's grasp of the vulnerabilities that a system built for transparency has created when it has become indispensable for the functioning of the nation's security and economy. He is one former government official who makes his argument with literary grace, a lawyer's attention to detail and the big picture, sophistication about politics and economics as well as a bit of humor even when dealing with very serious matters. Mixing analysis of the way internet is built with fascinating anecdotes and examples, Brenner makes a compelling case about the vulnerabilities that the internet in its current form creates for American national security, our economy, physical and energy infrastructure, financial system and our own privacy. This is a book for anyone who uses the internet, not only for officials in government, business leaders and computer experts. It is a timely intervention that anticipates problems we are and will be facing. It should stimulate informed and much needed public discussion now and in years to come.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Teresa Merklin on February 18, 2012
Format: Hardcover
America the Vulnerable came to my attention through the recommendation of an industry expert, who indicated that it is an excellent broad overview of the current digital security threat environment. It was cited as a good book to provide to people who might not be exposed to or who do not understand the implications of ongoing current events in this arena. I completely agree with that assessment and also regard it as a good resource for anyone who is skeptical of how serious cyberespionage is to the economic and military security of nation states.

I also highly recommend this book to experienced computer security personnel who already "buy in" to the depth of the cybersecurity issues facing their respective organizations. Joel Brenner has combined his unique insider experience with an amazing ability to connect the dots across this complex and challenging landscape, which results in an engaging narrative that provides a fresh perspective for thinking about cybersecurity. America the Vulnerable also provides a superb description, with real world success and failure case examples, of how organizational structure impacts cooperation and coordination while demonstrating how critical those collaborative behaviors are for success.

The fact that organizational secrecy and personal privacy are under assault is described, as is the perverse relationship between personal privacy and collective security. The book describes the paradox of how service providers could detect when a computer in their system has been compromised by malware while privacy concerns and regulations legally prevent such actions.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?