Jump to ratings and reviews
Rate this book

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

Rate this book

A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.

The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.

In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion.

Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.

249 pages, Kindle Edition

Published August 2, 2018

52 people are currently reading
819 people want to read

About the author

Michael Chertoff

6 books3 followers
Michael Chertoff is an American attorney who was the second United States Secretary of Homeland Security, serving under President George W. Bush. He was the co-author of the USA PATRIOT Act.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
26 (17%)
4 stars
51 (34%)
3 stars
52 (35%)
2 stars
14 (9%)
1 star
3 (2%)
Displaying 1 - 18 of 18 reviews
Profile Image for Willy Marz Thiessam.
160 reviews1 follower
June 5, 2018
Chertoff is as close as you can get to the security and defense apparatus of the United States. As such its of little surprise he argues for more robust laws and funding to create a mega state of control over lawless evil doers and those countries the United States considers very naughty. And by that I mean hackers and Russians.

Don't get me wrong this book is wonderful and everyone who has ever used the internet or intends to should read it. In its scope and depth in description and in its readable and easy to understand style this book will take you from a to z about the beginning, development and the current state of affairs regarding what are the privacy and security concerns on the internet. That said its from a very American political elite point of view that considers proprietary and USA defense issues to be paramount.

Well, what's wrong with Chertoff having a point of view? Nothing at all. If you read "Exploding Data" bear this fact in mind and you will get a lot more out of the book. Once you see where he is coming from you understand what the USA security and defense interests want to do in shaping the future of our planet. So my advice is, read his bio at the back of the book first before you start reading from the front.
Profile Image for Jon.
390 reviews
November 1, 2018
Michael Chertoff is a former director of Homeland Security, former judge, and now the owner of a security consulting company. He should have the credentials for a good book. Yet when this book steps outside of a discussion of law, it's very weak. It's almost like your CEO got very interested in security and is calling you into his office to go over what he’s googled in the last week.

When it stuck to law, it made sense. But, it didn't. It spent most of its bulk rambling through anecdotes and pointless information. At one point they went through the 4 layer IETF model, describing each layer of internet communication. And then they threw in the physical layer from the competing 7 layer OSI model. They had a choice of describing either 4 layers or 7...so they chose 5. Why is this here? Is the OSI model applicable to anyone but CS folks? No. Does it relate to anything else in the book? No. Does the average reader need this information? Not even a little. Personally, I've only encountered these layers when there is a quiz on the line. So why is this even in here? Because Even if ya famous, ya can't sell a book that's less than 200 pages. But I should’ve seen it coming.

Chapter 1: "What is the internet and how is it changing data?"

What is the internet? I’ve heard of it. It’s a net or something? And the "inter" is from the Latin word for... Wait, what year is this? In 2018, this is the type of sh*t that will only fly in an early afternoon library talk for seniors...IF you have a time machine and can travel back 20 years to a time when those seniors weren't all already riding the internet like a bunch of drunk cowgirls on mechanical bull night.

Then by Chapter 2, it's back into the evolution of internet law. Solid. Interesting. Like I said, when it's about law, it makes sense. So then we get into what we should do to protect ourselves on the internet. It can get a little technical. We did just go through the OSI model a few pages back. According to Chertoff, what we should do to protect ourselves online is: 1. Be aware, 2. Avoid simple passwords, 3. Update your virus protection, (and my favorite) 4. Don't be fooled.

Don't be fooled. Wow. How to protect yourself on the streets: 1. Be aware, 2. Avoid fanning yourself with cash on hot days, 3. travel with an armed bodyguard, 4. Don't be fooled (there is no free cake just down that alley). I'll say it again: whenever this veers away from the discussion of law, it fails hard. It's becomes superfluous, anecdotal, and pointless. It becomes filler.

Then at some point the use of “so-called” started, and I found myself talking out loud to the book every time. I read "so-called crypro currency..." I think, “No. It's actually called crypto currency.” You don't need "so-called." It’s like talking to someone who constantly and incorrectly uses air quotes. Thankfully, "so-called" went away and another style took over for a while. I got to read about “virtual armies of ‘ghost vehicles.’” Ghost cars? Yea, let’s read about that! Oh. That was just something you wanted to mention before moving on? Okay. Yea. No, go ahead. I'm fine.

By the end of the book, all I could think was that Chertoff wrote a solid conclusion chapter, someone told him that it would make a great book, and some interns padded a couple of solid essays into an unfortunate book. Then, I read the acknowledgments, where Chertoff thanks 2 students for helping to "shape the book" by doing extensive research, drafting passages, and devoting enormous effort to the book. Oh.

This is not worth your time. There are parts that are interesting, but it's pointless as a whole. Read something else.
Profile Image for Cozy Reviews.
2,050 reviews5 followers
August 14, 2018
This is a critical body of work for all of us to understand the wide spread use of our personal data as it relates to the internet , business and government. Everyone should read this book . It is a piece that many common people are missing in regard to utilizing their online life. This book scared me but it also made me change how I think about using the internet . I guarantee after reading this book you will never do online banking or any online date bases with personal information to be given out freely without your knowledge. You will re think what you enter and what choices you make online.
The author is a former Secretary of Homeland Security. Michael Chertoff discusses how poorly understood, expansion of information is circulating in the modern world. The issues he raises are timely, very frightening and very true.
Chertoff details in this book how every second of every day produces immense amounts of personal data, most of which could never have been collected a few years ago. The author shows us how our private information is then captured, catalogued, and even ( most shocking) acted upon by commercial interests, governments, and enemies both foreign and domestic. You will read this and change your online habits !

Many might be frightened ( pay attention to this its critical to our safety ! ) to learn that all our browsing habits, utility use , travel plans, phone records, blog reading, every day routines, private health information, driving and vehicle information, our mortgage and even photos of our houses and private conversations are being analyzed, leveraged, and sold on legal markets .. They are not just sold it does not stop there. They are used and analyzed, your very privacy decimated without your knowledge.

The author presents facts of how we have no further expectation of privacy in the use of our private information. Chertoff has written a concise well researched and honest view of what is happening to our privacy and how we must protect ourselves going forward. I highly recommend this book for everyone that is concerned about safety of their information and privacy online. It is a critical body of work .
Thank you for the ARC that does not influence my review. A most excellent read. I am buying a hard copy to keep to make notes in and use .
Profile Image for David Wineberg.
Author 2 books863 followers
March 27, 2018
Michael Chertoff says Big Data is not so much a product of the internet as of globalization. It is commerce that caused the new tools of Big Data to come into being and play. They made the mountains of information saleable. But regardless of where cyber abuse began, the law has clearly not kept up, and that is leading to loss of autonomy – our ability to act as we wish. Exploding Data is a collection of anecdotes and case law exploring the explosion. There is nothing new here, but if you’ve never heard of cybercrime or device tracking, this is a good overview. As for Chertoff, he gives away nothing – no deep insight from all his years at Homeland Security and Justice.

He calls for a five point, wobbly approach to new legislation to protect what we have, and encourage the private sector to participate and police the internet. He actually calls for old-fashioned privateers, empowered to stop the criminals. This cyber vigilante-ism will not work of course. The pirates who obtained government letters of marque to plunder foreign vessels were in it for the gold. They were not playing offense or defense for the good guys. From Chertoff, someone in the eye of the storm, this is a facile disappointment.

Despite Chertoff, the basic rule of thumb still applies. If there is no charge for the product, you are the product. Protect your data and reveal it sparingly. And when push comes to shove, you can rest assured that you are on your own.

David Wineberg
Profile Image for tony godski.
15 reviews
March 31, 2025
BORING.

This book would be a good gift to the older person in your life with an unlimited attention span who does not know how to send an email. Beyond being academic, it is drab. Beyond impartial, it is wholly disconnected. The only qualification the author puts forward for his authority on this matter is his stint at Homeland Security during the era where TSA and NSA became the enemies of the people for their outright inefficiency and total disregard for Americans’ right to privacy.

I am glad I listened to this as an audiobook. Narrated by Jonathan Yen on Spotify, this textbook was almost comical. As an account of what the internet is and how it came to be, it does an alright job. But with the explosion of TikTok and AI in the years since this was published, it has already become irrelevant.

SPOILER ALERT: This book presents virtually no actionable ways to “reclaim our cybersecurity in the digital age” that cannot be gleaned from a five-minute podcast interview with the author or simply by reading the synopsis. There are no suggestions offered, no advice, nothing worth taking from this book aside from a boding sense of defenselessness against cybercriminals, unless you are a legislator—in which case your aides will probably run this through AI (which is hardly mentioned if at all in this book) to get the main ideas anyways.

This is not consumer nonfiction. Do not recommend.
Profile Image for Barbara Irene Carter.
82 reviews
September 13, 2018
Michael Chertoff was the second Secretary of Homeland Security from 2005-2009, he served as a United State Circuit Judge of the United States Court of Appeals for the Third Circuit, he was Assistant United States Attorney General and the United States Attorney for the District of New Jersey. I mention his credentials to give credibility to what he has written about the inherit problems we face in maintaining cyber security in a rapidly changing digital environment. Our current systems create huge volumes of data that can now be shared throughout the world. There are now algorithms for data analytics where data can be manipulated for all kinds of purposes. some useful and some not. All the current issues surrounding data usage, there use and misuse, are discussed together with a discussion of the different laws in each country that can effect how information is stored. Mr. Chertoff has the knowledge and expertise to carefully explain all the issues involved and the steps that need to be taken to keep our systems functioning and safe. He states,`` Internet service providers and platforms provide convenience, service, and benefit, but the best was to control our data is to be mindful of how and when we generate it. As the traditional internet saying goes, if the service is ``free,`` you are probably the product.
Profile Image for John Fredrickson.
735 reviews25 followers
January 16, 2023
Chertoff obviously has the credentials to understand the problems and potentials in the complex worlds of computing, personal data privacy, national security, and nation-state politics. The title seems to promise some solutions or strategies, but this book doesn't particularly deliver these.

The book opens with a discussion of data packets, as well as differences in OSI and IETF networking stacks. Why this is remotely interesting to the thrust of the book is beyond me.

From there, Chertoff proceeds to discuss the evolution of law with respect to individual privacy in ways that are nuanced and very informative. The latter part of the book delves into technical and legal issues that crop up with trans-national privacy, as well as trans-national hacking (which brings in the problems of attribution).

The major issue I have with this book is that it easy to see that the problems of privacy and security are incredibly thorny, but I expected and hoped that this book would point to possible strategies to address some of these issues, and I'm not sure the book offers much other than documenting the problem, which is already pretty evident to anyone who is paying attention.
Profile Image for Gregory Howe.
69 reviews
February 6, 2019
I found this to be a tough read for some reason, it's not that it wasn't interesting, it's not that it was too technical, it's not that it wasn't well organized, it was just a tough slog for me.

Perhaps it was frightening on a subliminal level.

I loved the concept of information friction he writes about, it's so very true. Technology, the law, people's habits and the interplay among them and their evolutions are all covered in this work. It was quite an eye opener on many levels and thought provoking in the extreme.

Can a cyber attack be thought of as an act of war? How should individuals or their governments respond?

Many examples of case law are presented throughout to illustrate how the concept of data was defined through the years. This is a book I'll probably need to read a second time to absorb all the valuable content.
Profile Image for Mike He.
148 reviews3 followers
July 6, 2018
Exploding Data is published in time to serve as a wake-up to today's hundreds of millions of internet users who might have sacrificed their privacy, safety or "individual autonomy" as Michael Chertoff calls it by unwittingly releasing personal data for services and/or convenience in the modern era of Data 3.0. As the second Secretary of Homeland Security in President George W. Bush's administration, Chertoff is seen as a leader and expert in cybersecurity and the protection of it for the American people. The book is worthy reading for anyone who needs to be further aware of the issues, government policies and regulations, and possible solutions for ordinary consumers both on domestic and global scales in the digital age.
1,004 reviews1 follower
August 16, 2018
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age by Michael Chertoff is a must read for any one using the internet .Michael Chertoff simplifies the information for the reader so you understand what is going on and how to use the internet more wisely. It would be good to read the back that has Michael Chertoff's biography so you realize that he comes from a point of view favoring more government control.


I received a copy thru a Goodreads Giveaway.
Profile Image for Jon Martin.
26 reviews
October 25, 2018
The topic is important and relevant. I think I came into the book with higher expectations, given the author’s background and experience. There were a lot of slow, basic parts, so perhaps I was not the intended audience. It’s a great book for introducing the discussion and understanding the nuances of big data, privacy and security. Occasionally it ventures into deeper parts of cyber and data, but is likely a good primer for someone looking to better understand the digital age.
Profile Image for patrick Lorelli.
3,744 reviews39 followers
March 22, 2023
This is a very good book for any time to read and just think about your security and how many times you have heard about any institution or business, or government agency being hacked since this book came out in 2018. the information is just as important now as it was then and if you have not taken care of your personal information you must do it now. A very good book.
1,448 reviews12 followers
July 19, 2018
Chertoff, the second director of the Department of Homeland Security, writes about the changes in data that are creating the Data 3.0 and anticipate the Data 4.0 environments in which we live and will live. Chertoff does a great job of explaining things in a simplified manner.
Profile Image for Cathy.
808 reviews
February 2, 2019
While I don't agree with all of his suggestions- I think this book is a well written interesting look at the problem with data and privacy at the moment. Everyone should read it.
Profile Image for Doug McGuire.
60 reviews
February 12, 2019
A very good overview of privacy issues in the era of big data. He even provides ideas on how governments can balance the need to protect with individual privacy.
8 reviews
July 5, 2019
This was an insightful book that everyone with an email address and/or a smart phone should read.
Author 1 book1 follower
September 9, 2019
Read this book and you will better appreciate the irony of me leaving this review.
Profile Image for Himanish Prabhakar.
467 reviews8 followers
July 20, 2018
I'm a science-techie person and now a Senior IT Engineer for a reputed bank. And working in a bank really tells us what is the actual meaning of data. Data is a very crucial and important entity of nowadays. What is Personal Data? And how much secure your personal data is in this digital age, where we have recently heard about the Facebook sold its user's personal data without the consent. These firms are also collecting the data from there users without there consent and at last, making deals with big corporate houses on the base of that data. This is a very disturbing fact and everyone needs to understand what is the effect of the data in this Cyberage where now everything is available on one click.

This book is really good when it comes to throwing the light on the matter that is going on nowadays affecting every single person on the planet who is associated with the technology in a way. This book is an in-depth vision regarding the data collection by Government and the security agencies. The way we are affected by this and also information how we can prevent it.

I love the section where the author explained how we can control the outflow of our data.

This book is really good, and I liked it. Will recommend to everybody to have a read.
Displaying 1 - 18 of 18 reviews

Can't find what you're looking for?

Get help and learn more about the design.