Ghost in the Wires
My Adventures as the World’s Most Wanted Hacker
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $18.64
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Ray Porter
About this listen
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn’t just about technological feats—it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.
Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI’s net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat-and-mouse game that led through false identities, a host of cities, plenty of close shaves, and to an ultimate showdown with the feds, who would stop at nothing to bring him down.
Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.
©2011 Kevin Mitnick. Foreword 2011 by Steve Wozniak (P)2011 Blackstone Audio, Inc.Listeners also enjoyed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In late 2010, thousands of hacktivists joined a mass digital assault by Anonymous on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Splinter groups then infiltrated the networks of totalitarian governments in Libya and Tunisia, and an elite team of six people calling themselves LulzSec attacked the FBI, CIA, and Sony. They were flippant and taunting, grabbed headlines, and amassed more than a quarter of a million Twitter followers.
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
American Kingpin
- The Epic Hunt for the Criminal Mastermind Behind the Silk Road
- By: Nick Bilton
- Narrated by: Will Damron
- Length: 12 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2011, a 26-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine website hosted on the Dark Web where anyone could trade anything - drugs, hacking software, forged passports, counterfeit cash, poisons - free of the government's watchful eye. It wasn't long before the media got wind of the new website where anyone - not just teenagers and weed dealers but terrorists and black hat hackers - could buy and sell contraband detection-free.
-
-
An honest portrait of DPR
- By Victor on 05-18-17
By: Nick Bilton
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Daemon
- By: Daniel Suarez
- Narrated by: Jeff Gurner
- Length: 15 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
When the obituary of legendary computer game architect Matthew Sobol appears online, a previously dormant daemon activates, initiating a chain of events that begins to unravel our interconnected world. This daemon reads news headlines, recruits human followers, and orders assassinations. With Sobol’s secrets buried with him, and as new layers of his daemon are unleashed, it’s up to Detective Peter Sebeck to stop a self-replicating virtual killer before it achieves its ultimate purpose - one that goes far beyond anything Sebeck could have imagined.
-
-
Possibly The Best Techno-thriller Ever
- By Erica on 01-22-09
By: Daniel Suarez
Critic reviews
Related to this topic
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Exploding the Phone
- The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
- By: Phil Lapsley
- Narrated by: Johann North
- Length: 12 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary "harmonic telegraph", by the middle of the 20th century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.
-
-
Great Story along with Great Technical Research
- By Elsa Braun on 04-25-16
By: Phil Lapsley
-
American Injustice
- My Battle to Expose the Truth
- By: John Paul Mac Isaac
- Narrated by: Tom Parks
- Length: 4 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is the story of how I tried to get the Hunter Biden laptop evidence to the authorities.
-
-
Need a tissue?
- By Michael L. Galligan on 12-01-22
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Dead Connection
- Ellie Hatcher, Book 1
- By: Alafair Burke
- Narrated by: Christopher Lane
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Homicide detective Flann McIlroy is convinced that someone is using the lure of the internet and the promise of love to launch a killing spree against the women of New York City. To catch the killer, he calls up Detective Ellie Hatcher. She must enter a high-tech world where no one is who they appear to be. When the FirstDate killer begins to mimic the monster who destroyed her father, Ellie knows the game has become personal for him.
-
-
Good introduction to author and character
- By bonnie on 09-01-09
By: Alafair Burke
-
Class 11
- Inside the CIA's First Post-9/11 Spy Class
- By: T.J. Waters
- Narrated by: Patrick Lawlor
- Length: 10 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written by one of its own graduates, Class 11: Inside the CIA's First Post-9/11 Spy Class is an insider's view of the first CIA training class after September 11, 2001 - a look at the most elite and secretive espionage training program in the country.
-
-
Save Your Money
- By Daniel on 11-27-06
By: T.J. Waters
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Exploding the Phone
- The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
- By: Phil Lapsley
- Narrated by: Johann North
- Length: 12 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary "harmonic telegraph", by the middle of the 20th century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.
-
-
Great Story along with Great Technical Research
- By Elsa Braun on 04-25-16
By: Phil Lapsley
-
American Injustice
- My Battle to Expose the Truth
- By: John Paul Mac Isaac
- Narrated by: Tom Parks
- Length: 4 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is the story of how I tried to get the Hunter Biden laptop evidence to the authorities.
-
-
Need a tissue?
- By Michael L. Galligan on 12-01-22
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Dead Connection
- Ellie Hatcher, Book 1
- By: Alafair Burke
- Narrated by: Christopher Lane
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Homicide detective Flann McIlroy is convinced that someone is using the lure of the internet and the promise of love to launch a killing spree against the women of New York City. To catch the killer, he calls up Detective Ellie Hatcher. She must enter a high-tech world where no one is who they appear to be. When the FirstDate killer begins to mimic the monster who destroyed her father, Ellie knows the game has become personal for him.
-
-
Good introduction to author and character
- By bonnie on 09-01-09
By: Alafair Burke
-
Class 11
- Inside the CIA's First Post-9/11 Spy Class
- By: T.J. Waters
- Narrated by: Patrick Lawlor
- Length: 10 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written by one of its own graduates, Class 11: Inside the CIA's First Post-9/11 Spy Class is an insider's view of the first CIA training class after September 11, 2001 - a look at the most elite and secretive espionage training program in the country.
-
-
Save Your Money
- By Daniel on 11-27-06
By: T.J. Waters
-
Heart of a Killer
- By: David Rosenfelt
- Narrated by: Tadd Morgan
- Length: 7 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Jamie Wagner is a young lawyer who is happy to be flying under the radar at a large firm doing background research for the partners. It's not that he isn't smart. He is. It's just that hard work, the whole legal world, isn't really his thing. Underachiever? Yes. Content? At least until the firm puts him on a case that turns his whole world upside down.
-
-
Hard to believe its from Rosenfelt
- By Tim on 11-25-15
By: David Rosenfelt
-
Freezing Order
- A True Story of Russian Money Laundering, State-Sponsored Murder, and Surviving Vladimir Putin's Wrath
- By: Bill Browder
- Narrated by: Adam Grupper
- Length: 10 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
When Browder’s young Russian lawyer, Sergei Magnitsky, was beaten to death in a Moscow jail in 2009, Browder cast aside his business career and made it his life’s mission to pursue justice for Sergei. One of the first steps of that mission was to uncover who had killed Sergei and profited from the $230 million corruption scheme that he had exposed. As Browder and his team tracked the money that flowed out of Russia—through the Baltics and Cyprus and on to Western Europe and the Americas—they discovered that Vladimir Putin himself was one of the beneficiaries of the crime.
-
-
Red Notice Part II —- The Empire Struck Out
- By R. Alembik on 04-16-22
By: Bill Browder
-
The Secrets of the FBI
- By: Ronald Kessler
- Narrated by: Michael Bybee
- Length: 8 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Secrets of the FBI by New York Times best-selling author Ronald Kessler reveals the FBIs most closely guarded secrets and the secrets of celebrities, politicians, and movie stars uncovered by agents during their investigations.
-
-
Even-handed; an interesting history of the FBI
- By G-Man on 08-08-11
By: Ronald Kessler
-
Guns Across the Border
- How and Why the U.S. Government Smuggled Guns into Mexico: The Inside Story
- By: Mike Detty
- Narrated by: Thomas Stephen Jr.
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
Conducted under the umbrella of Project Gunrunner, intended to stem the flow of firearms to Mexico, the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) ran a series of “gun walking” sting operations, including Operations Wide Receiver and Operation Fast & Furious. The government allowed licensed gun dealers to sell weapons to illegal straw buyers so that they could continue to track the firearms as they were transferred to higher-level traffickers and key figures in Mexican cartels.
-
-
An ABSOLUTE MUST READ!
- By Coolcarl on 10-15-17
By: Mike Detty
-
The Pawn
- By: Steven James
- Narrated by: Richard Ferrone
- Length: 13 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven James' Christy Award-nominated crime thriller pits FBI Special Agent Bowers against a serial killer who enjoys torturing women. After visiting the mountain vistas where the murderer posed his dead victims, Bowers receives a taunting call from the "Illusionist." Although Bowers gets close, his insidious foe continues to elude him.
-
-
Entertaining Enough, But Don't Listen Too Closely
- By Bill on 08-29-12
By: Steven James
-
The Bricklayer
- A Novel
- By: Noah Boyd
- Narrated by: Michael McConnohie
- Length: 9 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone gives you a dangerous puzzle to solve, one that may kill you or someone else, and you're about to fail...and there is no other option. No one who can help. No one but the Bricklayer. The Bricklayer is the pulse-pounding novel introducing Steve Vail, one of the most charismatic new heroes to come along in thriller fiction in many years. He's an ex-FBI agent who's been fired for insubordination but is lured back to the Bureau to work a case that has become more unsolvable - and more deadly - by the hour.
-
-
Just silly
- By Jen on 04-22-12
By: Noah Boyd
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Don't Tell a Soul
- By: David Rosenfelt
- Narrated by: Erik Singer
- Length: 7 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Tim Wallace's wife died in a New Jersey boating accident several months ago and the cops suspect Tim murdered her, though they have no real case against him. Now it's New Year's Eve, and Tim's life is about to go from bad to worse.
-
-
The weakest of David Rosenfelt's works
- By Deborah on 08-14-08
By: David Rosenfelt
-
Bad City
- Peril and Power in the City of Angels
- By: Paul Pringle
- Narrated by: Robert Petkoff
- Length: 9 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
On a cool, overcast afternoon in April 2016, a salacious tip arrived at the L.A. Times that reporter Paul Pringle thought should have taken, at most, a few weeks to check out: a drug overdose at a fancy hotel involving one of the University of Southern California’s shiniest stars—Dr. Carmen Puliafito, the head of the prestigious medical school. Pringle, who’d long done battle with USC and its almost impenetrable culture of silence, knew reporting the story wouldn’t be a walk in the park. USC is the largest private employer in the city of L.A., and it casts a long shadow.
-
-
Wow.
- By Anna on 07-22-22
By: Paul Pringle
-
Making Jack Falcone
- An Undercover FBI Agent Takes Down a Mafia Family
- By: Joaquin "Jack" Garcia, Michael Levin
- Narrated by: Dick Hill
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
At six-foot-four-inches and 375 pounds, Jack Garcia looked the part of a mobster, and he played his part so perfectly that his Mafia bosses never suspected he was an undercover agent for the FBI. "Big Jack Falcone," as he was known inside La Cosa Nostra, learned all the inside dirt about the Gambino organized crime syndicate and its illegal activities---from extortion and loan-sharking to assault and murder.
-
-
interesting story--offensive narration
- By Mark on 03-17-12
By: Joaquin "Jack" Garcia, and others
-
Red Notice
- A True Story of High Finance, Murder and One Man's Fight for Justice
- By: Bill Browder
- Narrated by: Adam Grupper
- Length: 14 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red Notice is a searing expose of the wholesale whitewash by Russian authorities of Magnitsky's imprisonment and murder, slicing deep into the shadowy heart of the Kremlin to uncover its sordid truths.
-
-
This is an absolute "YES" as your next read/listen
- By William on 02-07-15
By: Bill Browder
-
Survive Like a Spy
- Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too
- By: Jason Hanson
- Narrated by: Jason Hanson
- Length: 6 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often without anyone even noticing. In Survive Like a Spy, best-selling author and former CIA officer Jason Hanson takes the listener deep inside the world of espionage, revealing true stories and expert tactics from real agents engaged in life-threatening missions around the world.
-
-
Fantastic book, practical tips, too much marketing
- By Jennifer Sights on 04-05-18
By: Jason Hanson
People who viewed this also viewed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Zero Day
- A Jeff Aiken Novel
- By: Mark Russinovich
- Narrated by: Johnny Heller
- Length: 9 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
An airliner’s controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events.
-
-
Uninspired...
- By E.G.Eidal on 11-02-12
By: Mark Russinovich
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- By: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrated by: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Length: 12 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- By Silvershopper on 01-18-23
By: Laurent Richard, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
Crime Dot Com
- From Viruses to Vote Rigging, How Hacking Went Global
- By: Geoff White
- Narrated by: Geoff White
- Length: 10 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Geoff White charts the astonishing development of hacking, from its birth among the ruins of the Eastern Bloc to its coming of age as the most pervasive threat to our connected world. He takes us inside the workings of real-life cybercrimes, revealing how the tactics of high-tech crooks are now being harnessed by nation states. From Ashley Madison to election rigging, Crime Dot Com is a thrilling account of hacking, past and present, and of what the future might hold.
-
-
amazing book !
- By thorhcm on 08-21-22
By: Geoff White
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
What listeners say about Ghost in the Wires
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- JOHN
- 12-28-12
A Lesson in Security
Having an awareness in Information Security, I found this book to be entertaining. Certainly Kevin Mitnick, the author/protagonist is not by any means a heroic character. While he asserts he never hacked for financial gain in spite of the fact that he possessed huge amounts of credit card and other "personally identifiable information" the fact remains that he stole intellectual property, personal identities, telephone connectivity, etc. He needed to be caught and incarcerated, which in fact did occur. To him hacking was an addiction, an irresistible urge to beat the system, break through locked doors and unlock security measures designed to defeat him and people like him. Whether or not the listeners of this book believe he is rehabilitated or remorseful, the fact remains that he served time in prison and paid his debt to society.
For me, the value of this book is that it illustrates just how dependent we all are on information systems, and how vulnerable we are to the lax security at the gatekeepers of our most personal information. We need to do a lot better, and hopefully Mr. Mitnick is now helping us as opposed to hacking us.
I found the book engaging from a technical standpoint while it demonstrates just how easy it is for some to steal information, sometimes merely for the asking. As Mitnick stated, "like taking candy from a baby."
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
4 people found this helpful
-
Overall
-
Performance
-
Story
- Michael
- 01-22-20
Enjoyable for Hacker Geeks
I am not sure how a general audience will respond to this book, but I am a bit of a hacker geek (although I refrained from Mitnick’s more provocative activity) and I greatly enjoyed this book. I enjoyed programming and hacking on RSTS/E and VMS and appreciated the details of social and software techniques. These details (including many details that don’t transfer well to audible) will be tedious at best to readers not intimate with Unix and VMS. Trust me, they are actually quite funny.
Although parts of this book may be tedious to many, there is a lot to be learned by anyone. Everyone should see and understand the social engineering techniques he describes. Everyone needs to understand these techniques and learn to defend against them.
Mitnick does not claim to have been a software hacker. He did VERY LIGHT software hacking and cracking. He mostly was a detail oriented social hacker. He got people to let him copy and inspect their software. In some cases what he did violated the law (and Mitnick was convicted and served five years in prison). Yet, he claims he did not profit from any of his hacks, and was not selling or blackmailing or destroying anything. He mainly just was testing if he could do it, and getting new software source code so he could find more exploits to get into more systems.
As one can tell from the reviews, many people intensely dislike Mitnick and many consider him a common criminal. It is highly likely Mitnick does not tell the whole truth in any of his books and occasionally lies. I would argue that he winks and nods enough that clever readers will have a very good idea about what he did do (although he says he didn’t for legal reasons).
The narration is excellent with very difficult material. The upbeat narration makes the book more fun.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Connor
- 01-25-12
Learn From Successful People
Some Audible reviewers dislike that Kevin Mitnick in his book “Ghost in the Wires” is repetitive “every hack seems to be the same” and that the book celebrates immoral behavior “breaking the law”.
When I talk, read or listen to successful people, a common characteristic is that they have discovered an approach that generally works and repeat it over and over. Sounds boring, but it leads to becoming an expert, great satisfaction with your life and at times wealth.
As far as breaking the law, well I leave it to readers and listeners to decide for themselves.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Kora E. Stone
- 10-30-15
Such an interesting story
I still have a hard time believing this is not a spy novel, but a biography of a real person who really went through these events. Highly recommend this to anyone in IT or computer science/engineering.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- barc2003
- 11-16-13
Fascinating
I found this book totally fascinating. If you are under the age of 40 a lot of the things mentioned in this book, like rotary phones, brief case cell phones & pagers, maybe foreign to you. However it is an amazing story of one of the first hackers, Kevin Mitnick.
Kevin starts as a teenager, messing with the speaker at a local drive through by saying wild things to the customers. From there he progresses to what was then called Phone Freaking, using social engineering to get the information he wanted to get the information. It's all a huge game to him, just how far can he get before someone says "hey, wait minute...".
Mitnick spend over 30 years social engineering his way to hack into some of the largest companies in the US. Never doing anything malicious, just having fun to see if he can. He also spends 30 years running from the FBI until he is finally caught.
If you are even a little bit of a geek, you'll enjoy this book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- TaxSage
- 09-21-11
OK, I was stumped
Great listen, but my audio has a line of gibberish at the beginning of each chapter. I thought it was reverse audio -- but reversing the clip with the tools in Audacity software did not help. Looking at the book visually on Amazon reveals a text message in code. Chapter 1 leads with: Yjcv ku vjg pcog qh vjg uauvgo wugf da jco qrgtctcvqtu vq ocmg htgg rjqpg ecnnu? Googling "Yjcv ku vjg pcog" points to others who have cracked a quite simple code. In audible, however, rest assured you are not hearing words spoken in any intelligible language -- in forward or in reverse; nor is any person or demon speaking in tongues. I'd love to know what Ray Porter said when he was told to narrate that stuff.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Russell
- 05-25-12
Great Listen
Would you consider the audio edition of Ghost in the Wires to be better than the print version?
This is the kind of story you find yourself going out of your way to listen to. Great read and a great story!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- DA
- 02-05-18
Coolest tech story ever
If you could sum up Ghost in the Wires in three words, what would they be?
Really cool story.
What did you like best about this story?
The story combines elements of science (psychology), suspense, action humor and drama. I picked up the book because it's tech related and because I had heard of this man back in the '90s but never payed attention. I thought it would be a nice and slow book about someone's criminal life...NOPE.
This book is just non-stop excitement. The character is multi-dimensional and his accomplishments impressive.
What does Ray Porter bring to the story that you wouldn’t experience if you just read the book?
Ray Porter has top notch voice quality. He conveys the author's emotions in such way I thought for a moment it was the author himself narrating his own story.
I certainly hope to hear his voice again in future books!
If you could give Ghost in the Wires a new subtitle, what would it be?
How to really use a computer.
Any additional comments?
This book is excellent even for non-tech people who are looking for a good cat-and-mouse police story.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Laura Grey
- 07-18-12
Fascinating
This is a fascinating look into the mind of a famous hacker. I enjoyed hearing Kevin Mitnick's side of the story. He is clearly a brilliant guy whose addiction/ insatiable curiosity got him into a lot of trouble. I love the dramatic story of how he got into that trouble, and how he evaded capture. He sometimes lost my sympathy when he was less than generous in describing how other people had betrayed him, or didn't live up to his standards, or were easily deceived. After listening to the audio for a while I watched a few interviews with him and found him to be a little less arrogant than the performer's interpretation led me to believe. I wish he had done the performance himself. Other than that, the story was fantastic and I will probably listen to it again.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Paal Skjetne
- 10-03-12
Reads like a detective story - wait it is one!
Any additional comments?
I don't know why I liked this book exactly, maybe it was the suspence, the thrill of "will he make it", "can he get away with it", or maybe it was to hear how a perfectly "normal" kids facination can grow into a major problem for himself and society. But it also shows how society's fears can infringe on the individuals rights. I guess this story is slightly one-sided but what the hack - ehh - heck its a very good story. Having knowledge of some of the systems mentioned in the book I feel it gets an important message accross; technology is only as "fail proof" as the humans put in charge of it.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!