Summary

Anyone who logs on to the Internet can become a victim of virtual terrorism, whether via e-mail, social media, a Google search, or simply by logging on to a computer. Anyone seeking to do harm to others online can be a virtual terrorist, and it is incredibly easy to become one. That is the era we live in now -- someone sitting behind a laptop half a world away can interfere with, invade, or take over your life, business, or government. You may not even realize it, but you may already have become a victim; if you have not, you will become one eventually.
In this extremely timely, important, and compelling book, Daniel Wagner redefines what terrorism has become in the 21st century. Unlike more conventional types of terrorism, in which the perpetrator seeks recognition and reveals his or her identity, with virtual terrorism the identity of the person, group, or government responsible for acts of terror is deliberately hidden in an anonymous, borderless, and lawless world.
Their motives and objectives may be unclear, and the length of an attack, or whether it will be repeated, are generally unknown. What virtual terrorists have in common with more traditional terrorists is the use of coercion or intimidation to achieve their objectives - if they choose to reveal what those objectives are - but that is where the commonality ends. They can strike at any time, invisibly and silently. You may never know they are even there, and they may plant malware on your computer that steals your information for years without being discovered.
Wagner takes us on a comprehensive tour of the virtual terrorism landscape - from cybercrime and bioterrorism to drones and artificial intelligence - to reveal the chilling reality that confronts us all. After reading this book, you may not ever want to log on to your smartphone or the Internet again.
©2017 Daniel Wagner (P)2017 Daniel Wagner
Show More Show Less

Regular price: £22.89

Membership details Membership details
  • A 30-day trial plus your first audiobook, free
  • 1 credit/month after trial – choose any book, any price
  • Easy exchanges – swap any book you don’t love
  • Keep your audiobooks, even if you cancel
  • Free, unlimited access to Audio Shows
  • After your trial, Audible is just £7.99/month
Select or Add a new payment method

Buy Now with 1 Credit

By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Buy Now for £22.89

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
No Reviews are Available

Customer Reviews

Most Helpful
5 out of 5 stars
By Susan Patterson on 16-08-18

Thought-provoking!

Virtual terrorism is in a constant state of evolution. As soon as a new technology is developed to counteract hacking and malware, new adaptations are developed by the bad guys to defile them! Our company suffered from a ransomware attack. We didn't pay and lost a lot of programs!!!
Google, amazon and Facebook have a God's eye view of our activities!

John N. Gully did an excellent job of narrating! His cadence and inflection was very easy to listen to.

I was given a free review copy of this audiobook at my request and have voluntarily left this review.

Read more Hide me
5 out of 5 stars
By Philo on 24-07-18

AMAZING tour of the whole illicit cyber world

This is one of the best audiobooks I've heard. The word "terrorism" doesn't begin to cover the scope of this book -- it covers all sorts of crime as well as things as commonplace as use of social media by and against parties in divorce cases. The book is encyclopedic on all sorts of actors and activities worldwide. It shows sophistication (yet gives listenable explanations) in technical, legal, governmental, and cultural matters, as well as clear expositions of methods used by all players -- criminals, vigilantes, government agencies, etc. It is very current. It also shows a thoughtfulness on all sorts of themes above and beyond what I expected. If a chain is as strong as its weakest link, imagine living in a world littered everywhere with weak links, or as the wince-inducing phrase has it, "attack surfaces." Many statistics are eye-rolling: 600,000 facebook accounts per day compromised? Yikes. One thing is apparent: there is lots of work to be done, I suppose that also means, money to be made (legitimately of course).

Read more Hide me
See all reviews