Goodreads helps you keep track of books you want to read.
Start by marking “Listening In: Cybersecurity in an Insecure Age” as Want to Read:
Listening In: Cybersecurity in an Insecure Age
Enlarge cover
Rate this book
Clear rating
Open Preview

Listening In: Cybersecurity in an Insecure Age

3.96  ·  Rating details ·  55 ratings  ·  18 reviews
A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers

New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corpor
Hardcover, 240 pages
Published November 28th 2017 by Yale University Press
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Listening In, please sign up.

Be the first to ask a question about Listening In

Community Reviews

Showing 1-30
Average rating 3.96  · 
Rating details
 ·  55 ratings  ·  18 reviews

More filters
Sort order
Start your review of Listening In: Cybersecurity in an Insecure Age
Paul Falk
Aug 31, 2017 rated it really liked it
This ARC had been provided compliments of NetGalley. Gratitude sent to Yale University Press for allowing this pre-release made available.

The author had drawn a virtual line in the sand. We are buried in the midst of a digital revolution that's being tugged at from all sides. I'm a believer. For one, "we the people" need to feel secure with the digital information we share. It may be in the form of bank account numbers, email addresses, messages or pictures. Let's say, when online, c
Quintin Zimmermann
Sep 02, 2017 rated it it was amazing
A well balanced, illuminating and thought-provoking examination of cyber threats and security in the midst of the Digital Revolution, which is transforming our world from atoms to bits.

Susan Landau has pitched Listening In at the right level for the wider audience. She took my hand and sagely guided me through the otherwise complicated Delphic world of decryption keys, substitution ciphers and encryption algorithms and seamlessly applied it to topical real world situations.

Such as t
Apr 12, 2018 rated it it was amazing
Scary world we live in. We've allowed ourselves to lose our privacy. I really don't think there is a way to protect our devises from someone hacking into them. My tax guy askes every year if I've had my identity stolen, my answer is not that I know of, but I am sure lots of people HAVE my info, they just haven't used it yet. I hope I get to see where all the hacks lead! I am sure whatever anyone wants to know about a person has already been put out there BY THAT PERSON, Facebook, MySpace, Twitte ...more
Yzabel Ginsberg
[I received a copy of this book through NetGalley.]

An interesting foray into encryption and privacy, especially when considering the point of view of authorities who may need to access data on devices seized upon arrests.

The author makes a case for strengthened encryption, and I feel this makes more sense than the contrary. The book is positioned around the main controversy of including backdoors to allow police and intelligence services to access a device, so that when they need to do
Jan 28, 2018 rated it really liked it
Excellent book, one I'd highly recommend to anyone with even a passing interest in information security. Well written, with enough explanation for the neophyte, but on a level that even professionals can learn from.

I was iffy about commenting on the political side of things, since I think the author did a relatively good job staying out of much of the partisan fray. I'm personally iffy on if the meddling of the Russians actually affected the outcome of the 2016 election. What I was disappointed
Jun 09, 2019 rated it liked it
Shelves: law, science
This is a concise book (it is only 118 pages long, excluding the endnotes), intended to capture the expertise the author was sharing in talks and lectures before 2017 in a medium suited for wider publication. It is a useful primer on the 'encryption debate.' The author clearly has real expertise on this issue, and although she concludes that "our society is best served by securing communications and devices even if that choice makes government investigations more difficult," she also recognises ...more
Nov 06, 2018 rated it it was amazing
A wonderful book, excellent for those who are highly technical and those who want to learn more about why data privacy and security is so important. Ms Landau did an excellent job of breaking things down, so they could be understood by the general public, while still keeping the content deep.

I learned a great deal about how many telephony systems work, the importance of understanding system integration, and the laws of unintended consequences.

Ms Landau’s coverage of the 2
Lars-Helge Netland
Jan 25, 2018 rated it really liked it
Velskrevet bok om utviklingen innen datasikkerhet fra de tidligste angrepene i internetts spede begynnelse til angrepene relatert til presidentvalgkampene i USA og Frankrike. Utmerket bok for de som ikke har fulgt utviklingen på området på nært hold, og samtidig en god oppsummering for «menigheten».
Anthony W. Noblett
Aug 30, 2018 rated it really liked it
Good explanation on a difficult subject which is the technology space I work in. I will definitely use her descriptions, particularly with business people without a technology background. It's a bit dry at times which is why I rate it a 4,
Steve Shulman-Laniel
Nov 18, 2017 rated it really liked it
Really good combination of technical insight into, e.g., iPhone security, and into the investigative techniques available to the FBI and to intelligence agencies.
Aug 30, 2019 rated it really liked it
A good gathering of lots of different events turned into a well supported argument that we need more personal internet/cybersecurity these days.
Jul 14, 2018 rated it really liked it
α - Bruce Schneier recommended.

Ω(»,Î,Φ,β) - Short & direct. Densely packed with information.
Oct 18, 2017 rated it liked it
Another dark view on our future due to the web and cyber espionage etc.etc. I wonder when it will be possible to control a lot of the things we cannot control right now, even because our government doesn't want us to be able to control them. Scary.

Un altro libro che si dilunga in quanto sará brutto il nostro futuro a causa del cyber spionaggio che possa poi essere usato da hacker o dai poteri forti. Mi chiedo se e quanto sará possibile controllare quanto attualmente ci é impossibile
Kaushik Iyer
A good survey of current debates around the use of encryption. Recommended as an introduction, but not as interesting if you follow this area closely already.
Adam DeConinck
rated it really liked it
Mar 07, 2018
rated it really liked it
Feb 16, 2018
rated it really liked it
May 06, 2018
rated it really liked it
Mar 25, 2018
Feb 02, 2018 rated it it was amazing
This was a good critique of how government agencies are dealing with the issues related to data encryption and access. She is tough on the approach the FBI used, however complimentary of the tactics used by the NSA. She presents the information in a very understandable format for even there lay person.
rated it really liked it
Dec 10, 2018
John Hosmer
rated it really liked it
Dec 26, 2018
rated it it was amazing
Feb 25, 2018
rated it liked it
Nov 27, 2017
rated it really liked it
Jul 08, 2018
Nick Lucarelli
rated it really liked it
Dec 25, 2018
rated it really liked it
Jul 21, 2019
rated it really liked it
Jan 27, 2018
Andrew Leeth
rated it it was amazing
Jun 18, 2019
Eric Hubbard
rated it really liked it
Nov 27, 2018
« previous 1 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
  • The Art of Deception: Controlling the Human Element of Security
  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
  • Cybersecurity and Cyberwar: What Everyone Needs to Know(r)
  • America Before: The Key to Earth's Lost Civilization
  • How To: Absurd Scientific Advice for Common Real-World Problems
  • Bowlaway
  • Fated (Alex Verus, #1)
  • The Tiger's Daughter (Their Bright Ascendency, #1)
  • Cursed (Alex Verus, #2)
  • Nmap Cookbook: The Fat-free Guide to Network Scanning
  • Hidden (Alex Verus, #5)
  • Taken (Alex Verus, #3)
  • Chosen (Alex Verus, #4)
  • Think Like a Hacker: A Sysadmin's Guide to Cybersecurity
  • Veiled (Alex Verus, #6)
  • Prime Suspects: The Anatomy of Integers and Permutations
  • Where We Come from
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »