Ransomware and Federal Law
Cybercrime and Cybersecurity
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Tom Brooks
About this listen
Ransomware attacks — the use of malicious software to deny users access to data and information systems to extort ransom payments from victims — are prevalent. A recent notable example is the May 2021 ransomware attack that temporarily shut down the Colonial Pipeline Company’s network, affecting gasoline availability and prices. This attack is but one of many; in 2020 alone, the Federal Bureau of Investigation (FBI) received nearly 2,500 ransomware complaints with losses exceeding $29 million.
Federal law provides several potential approaches to combat ransomware attacks. First, federal criminal laws, such as the Computer Fraud and Abuse Act (CFAA), can be used to prosecute those who perpetrate ransomware attacks. These laws and others, such as the statutes criminalizing conspiracy and aiding and abetting, might also be used to prosecute individuals who help to develop ransomware that is ultimately used by others. Victims who pay ransoms might also be subject to criminal or civil penalties in some cases — for example, where a ransom payment is made knowingly to an entity either designated as a foreign terrorist organization or subject to sanctions by the Department of the Treasury. Nevertheless, policy considerations, mitigating factors, and prosecutorial discretion may weigh against enforcement in such instances.
©2021 Tom Brooks (P)2021 Tom BrooksListeners also enjoyed...
-
Blockchain Blueprint & Technology Ultimate Guide
- Learn Everything You Need To
- By: Raymond Kazuya
- Narrated by: Lukas Arnold
- Length: 1 hr and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain Technology innovation is the next technological advancement and revolution that has some serious far reaching implications worldwide. World business/commerce as we know today will become more secure, efficient, fluid and reliable due to Blockchain Technology. Don't get left behind on this next big trend and ride the wave of technological advancement! Learn everything you need to know about Blockchain Technology and join the revolution! You do not want to miss out!
-
-
Basics of Blockchain
- By Keith on 02-02-18
By: Raymond Kazuya
-
Blockchain Revolution
- How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World
- By: Don Tapscott, Alex Tapscott
- Narrated by: Jeff Cummings
- Length: 16 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The technology likely to have the greatest impact on the future of the world economy has arrived, and it's not self-driving cars, solar energy, or artificial intelligence. It's called the blockchain. The first generation of the digital revolution brought us the Internet of information. The second generation - powered by blockchain technology - is bringing us the Internet of value: a new, distributed platform that can help us reshape the world of business and transform the old order of human affairs for the better.
-
-
Should Have Been Called "101 Uses for Blockchain"
- By Adrian W. Rich on 05-24-16
By: Don Tapscott, and others
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
excellent content and entertaining as a bonus!
- By kristen meazell on 03-20-19
By: Phil Martin
-
Spygate: The Attempted Sabotage of Donald J. Trump
- By: Dan Bongino, D.C. McAllister, Matt Palumbo
- Narrated by: Dan Bongino
- Length: 7 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
The comprehensive story of how the Obama administration, Hillary Clinton campaign, and foreign entities tried to sabotage the Trump campaign in the 2016 presidential election.
-
-
Skeptical at Second #1 but a Believer at Second #2
- By Darryl on 10-09-18
By: Dan Bongino, and others
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Blockchain Blueprint & Technology Ultimate Guide
- Learn Everything You Need To
- By: Raymond Kazuya
- Narrated by: Lukas Arnold
- Length: 1 hr and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain Technology innovation is the next technological advancement and revolution that has some serious far reaching implications worldwide. World business/commerce as we know today will become more secure, efficient, fluid and reliable due to Blockchain Technology. Don't get left behind on this next big trend and ride the wave of technological advancement! Learn everything you need to know about Blockchain Technology and join the revolution! You do not want to miss out!
-
-
Basics of Blockchain
- By Keith on 02-02-18
By: Raymond Kazuya
-
Blockchain Revolution
- How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World
- By: Don Tapscott, Alex Tapscott
- Narrated by: Jeff Cummings
- Length: 16 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The technology likely to have the greatest impact on the future of the world economy has arrived, and it's not self-driving cars, solar energy, or artificial intelligence. It's called the blockchain. The first generation of the digital revolution brought us the Internet of information. The second generation - powered by blockchain technology - is bringing us the Internet of value: a new, distributed platform that can help us reshape the world of business and transform the old order of human affairs for the better.
-
-
Should Have Been Called "101 Uses for Blockchain"
- By Adrian W. Rich on 05-24-16
By: Don Tapscott, and others
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
excellent content and entertaining as a bonus!
- By kristen meazell on 03-20-19
By: Phil Martin
-
Spygate: The Attempted Sabotage of Donald J. Trump
- By: Dan Bongino, D.C. McAllister, Matt Palumbo
- Narrated by: Dan Bongino
- Length: 7 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
The comprehensive story of how the Obama administration, Hillary Clinton campaign, and foreign entities tried to sabotage the Trump campaign in the 2016 presidential election.
-
-
Skeptical at Second #1 but a Believer at Second #2
- By Darryl on 10-09-18
By: Dan Bongino, and others
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Simple CISSP
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 16 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals. This exam resource is up to date for the 2015 CISSP Common Body of Knowledge created by ISC2. Simple CISSP has been intentionally kept as brief as possible without the "fluff" many other tomes include. The book is narrated by the author to ensure all information is conveyed by someone who understands the industry. As a result, all acronyms and security terminology is correctly pronounced and described.
-
-
OK, as a compendium with other sources
- By Greg Turner on 08-12-17
By: Phil Martin
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Introduction to Conducting Private Investigations
- Private Investigator Entry Level (02E)
- By: Philip A. Becnel IV
- Narrated by: Bill Burrows
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introduction to Conducting Private Investigations provides the essential tools you need to become a successful private investigator. From conducting straightforward background investigations to more complicated cases involving accidents and fraud, you will learn the critical skills needed to conduct all types of investigations and build a thriving business. Specifically tailored to meet the requirements established by the Department of Criminal Justice Services, this easy-to-use resource offers an excellent balance between theory and practice.
-
-
Good Stuff!
- By P DET. Billock on 11-16-18
-
Habeas Data
- Privacy vs. the Rise of Surveillance Tech
- By: Cyrus Farivar
- Narrated by: Steven Jay Cohen
- Length: 11 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
From acclaimed Ars Technica senior business editor Cyrus Farivar, Habeas Data examines how 50 years of American privacy law is inadequate for today's surveillance technology. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.
-
-
Who monitors the monitors?
- By Philo on 07-13-18
By: Cyrus Farivar
-
Blockchain Basics
- A Simple Non-Technical Blockchain Book
- By: Lee Sebastian
- Narrated by: John Fleming
- Length: 1 hr and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain is a distributed ledger technology that has many applications, such as finance, security, banking, insurance, transportation companies, and much more. Blockchain can become a core fundamental component to all industries in the near future, similar to how the Internet evolved. This book is about the basics of blockchain technology and its applications, especially in cryptocurrency, and how it will eventually make a difference in your everyday life.
-
-
Not technical. Not simple. Yet still two basic
- By Heath McCarthy on 10-19-18
By: Lee Sebastian
-
The Corruption Chronicles
- Obama's Big Secrecy, Big Corruption, and Big Government
- By: Tom Fitton
- Narrated by: Jim Meskimen
- Length: 13 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Judicial Watch, America's largest nonpartisan government watchdog, has investigated the Clinton, Bush, and Obama administrations. Judicial Watch is the group that helped impeach Bill Clinton and took the Bush White House secrecy all the way up to the Supreme Court. Since the beginning of the Obama administration, this grassroots group has filed over 700 open records demands and dozens of lawsuits, including a successful fight over the secret Obama White House visitor logs.
-
-
Unbelievable
- By Bill Redfield on 01-30-17
By: Tom Fitton
-
iWar
- War and Peace in the Information Age
- By: Bill Gertz
- Narrated by: Danny Campbell
- Length: 11 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states - such as Russia, China, Iran, and North Korea - and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives.
-
-
Unrivaled in it's US cyber warfare assessment
- By Amazon Customer on 01-06-17
By: Bill Gertz
-
CRACK99
- The Takedown of a $100 Million Chinese Software Pirate
- By: David Locke Hall
- Narrated by: Mark Peckham
- Length: 10 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
A former US Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem.
-
-
Snoozefest...
- By veryspecialscorp on 07-18-16
By: David Locke Hall
-
The Case for Impeaching Trump
- By: Elizabeth Holtzman
- Narrated by: Coleen Marlo
- Length: 6 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Elizabeth Holtzman has been a principled leader and a persistent voice for equality and accountability since she became the youngest woman ever elected to Congress in 1973, which she remained for 42 years. The Case for Impeaching Trump establishes the requirements for impeachment as set out by the Constitution and proves that President Trump’s actions have already met those requirements. Holtzman makes the definitive, constitutional case that Trump can be impeached - and the process should start now.
-
-
Title says it all
- By William R. Todd-Mancillas (Name includes hyphen and capitalized M). on 02-12-19
-
The Plot to Hack America
- How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election
- By: Malcolm Nance
- Narrated by: Gregory Itzin
- Length: 6 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization's computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation's top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
-
-
Short and Terrifying
- By Teadrinker on 03-19-17
By: Malcolm Nance
-
Blockchain
- The Essential Guide to Understanding the Blockchain Revolution
- By: Jeff Reed
- Narrated by: Jim Donaldson
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain technology is the buzzword in the world of computer science, but it won't stay limited there for long. It is the concept that has the financial world scrambling to catch up. Whether you are an investor or a private citizen, blockchain is going to mean a lot to you in the future, hailed by some as the second coming of the Internet. So what is it? And what can you do to get involved?
-
-
The Tip Of The Iceberg
- By RQuinn on 03-03-18
By: Jeff Reed
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
Related to this topic
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- By: Adam Segal
- Narrated by: Don Hagen
- Length: 10 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- By Locnar on 02-21-17
By: Adam Segal
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Whistleblowers
- Honesty in America from Washington to Trump
- By: Allison Stanger
- Narrated by: Kate Mulligan
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Misconduct by those in high places is always dangerous to reveal. Whistleblowers thus face conflicting impulses: by challenging and exposing transgressions by the powerful, they perform a vital public service - yet they always suffer for it. This episodic history brings to light how whistleblowing, an important but unrecognized cousin of civil disobedience, has held powerful elites accountable in America.
-
-
Wow!
- By Private on 11-15-20
By: Allison Stanger
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- By: Adam Segal
- Narrated by: Don Hagen
- Length: 10 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- By Locnar on 02-21-17
By: Adam Segal
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Whistleblowers
- Honesty in America from Washington to Trump
- By: Allison Stanger
- Narrated by: Kate Mulligan
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Misconduct by those in high places is always dangerous to reveal. Whistleblowers thus face conflicting impulses: by challenging and exposing transgressions by the powerful, they perform a vital public service - yet they always suffer for it. This episodic history brings to light how whistleblowing, an important but unrecognized cousin of civil disobedience, has held powerful elites accountable in America.
-
-
Wow!
- By Private on 11-15-20
By: Allison Stanger
-
Who Controls the Internet
- Illusions of a Borderless World
- By: Jack Goldsmith, Tim Wu
- Narrated by: Bob Loza
- Length: 6 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is the Internet erasing national borders? Who's really in control of what's happening on the Net--Internet engineers, rogue programmers, the United Nations, or powerful countries?In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world.
-
-
Mostly delves into questions of law
- By Amazon Customer on 05-07-11
By: Jack Goldsmith, and others
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- By Britt Adams on 09-13-22
By: Robert K. Knake, and others
-
The Plot to Hack America
- How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election
- By: Malcolm Nance
- Narrated by: Gregory Itzin
- Length: 6 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization's computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation's top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
-
-
Short and Terrifying
- By Teadrinker on 03-19-17
By: Malcolm Nance
-
The Assassination Complex
- Inside the Government's Secret Drone Warfare Program
- By: Jeremy Scahill, The Staff of The Intercept, Edward Snowden - foreword, and others
- Narrated by: George Newbern, Jeremy Scahill - introduction, Glenn Greenwald - afterword
- Length: 5 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Major revelations about the US government's drone program - best-selling author Jeremy Scahill and his colleagues at the investigative website The Intercept expose stunning new details about America's secret assassination policy.
-
-
well put together
- By TibHip on 05-11-16
By: Jeremy Scahill, and others
-
The Corruption Chronicles
- Obama's Big Secrecy, Big Corruption, and Big Government
- By: Tom Fitton
- Narrated by: Jim Meskimen
- Length: 13 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Judicial Watch, America's largest nonpartisan government watchdog, has investigated the Clinton, Bush, and Obama administrations. Judicial Watch is the group that helped impeach Bill Clinton and took the Bush White House secrecy all the way up to the Supreme Court. Since the beginning of the Obama administration, this grassroots group has filed over 700 open records demands and dozens of lawsuits, including a successful fight over the secret Obama White House visitor logs.
-
-
Unbelievable
- By Bill Redfield on 01-30-17
By: Tom Fitton
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Killing the Deep State
- The Fight to Save President Trump
- By: Jerome R. Corsi PhD
- Narrated by: Dan Crue
- Length: 5 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Well-funded hard-left extremists, the mainstream media, Obama/Clinton holdovers in the government bureaucracy, and clandestine forces within the US intelligence apparatus have a strategy to ensure that Trump will not serve out his term as the 45th President of the United States. Investigative journalist and conspiracy expert Jerome Corsi goes into shocking detail about how this Deep State, or Shadow Government, secretly wields power in Washington and why it is dangerous.
-
-
Banning the Bestseller: Amazon's Childish Decision
- By JONATHAN KIMBRIEL on 04-05-18
-
System Error
- Where Big Tech Went Wrong and How We Can Reboot
- By: Rob Reich, Mehran Sahami, Jeremy M. Weinstein
- Narrated by: Kaleo Griffith
- Length: 11 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In no more than the blink of an eye, a naïve optimism about technology’s liberating potential has given way to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots. System Error exposes the root of our current predicament - how big tech’s relentless focus on optimization is driving a future that reinforces discrimination, erodes privacy, displaces workers, and pollutes the information we get- and outlines steps we can take to change course, renew our democracy, and save ourselves.
-
-
Excellent on tech. Weak on political speech.
- By Kindle Customer on 11-05-21
By: Rob Reich, and others
-
Unwarranted
- Policing Without Permission
- By: Barry Friedman
- Narrated by: Sean Pratt
- Length: 13 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
In June 2013, documents leaked by Edward Snowden sparked widespread debate about secret government surveillance of Americans. Just over a year later, the shooting of Michael Brown, a black teenager in Ferguson, Missouri, set off protests and triggered concern about militarization and discriminatory policing. In Unwarranted, Barry Friedman argues that these two seemingly disparate events are connected - and that the problem is not so much the policing agencies as it is the rest of us.
-
-
Insightful book
- By laserpro on 03-02-17
By: Barry Friedman
-
The Law of Superheroes
- By: James Daily J.D., Ryan Davidson J.D.
- Narrated by: Eric G. Dove
- Length: 7 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Could Superman sue if someone exposed his identity as Clark Kent? Is a life sentence for an immortal like Apocalypse "cruel and unusual punishment"? Is X-ray vision a violation of search and seizure laws? Is the Joker legally insane? And who foots the bill when a hero destroys a skyscraper or two while defending Metropolis? Fear not, gentle listener! The answers to these questions and a multitude more are contained inside this audiobook.
-
-
Legal Pedantry Has Never Been This Much Fun
- By Troy on 07-31-14
By: James Daily J.D., and others
-
The Mueller Report
- By: The Washington Post
- Narrated by: Matt Zapotosky, Rosalind S. Helderman, Marc Fisher, and others
- Length: 19 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Listen to the findings of the Special Counsel’s investigation into Russian interference in the 2016 election, complete with accompanying analysis by the Post reporters who’ve covered the story from the beginning. One of the most urgent and important investigations ever conducted, the Mueller inquiry focuses on Donald Trump, his presidential campaign, and Russian interference in the 2016 election, and draws on the testimony of dozens of witnesses and the work of some of the country’s most seasoned prosecutors.
-
-
Report Starts with Chapter 4
- By Ray on 04-21-19
-
Red Team
- How to Succeed by Thinking Like the Enemy
- By: Micah Zenko
- Narrated by: Christopher Lane
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- By Pax S Whitmore on 07-12-16
By: Micah Zenko