
Manipulated
Inside the Cyberwar to Hijack Elections and Distort the Truth
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $20.00
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Christopher Lane
-
Theresa Payton
-
By:
-
Theresa Payton
About this listen
Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers listeners telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late.
Payton reveals:
- How digital voting machines, voting online, and automatic registration may boost turnout but make us more vulnerable to cyberattacks.
- How trolls from Russia and other nations actively stoke discord among Americans in falsely-generated controversies over race relations, vaccinations, fracking, and other social issues.
- Whether what we have uncovered from the Mueller investigation so far is only what they wanted us to know.
Listeners also enjoyed...
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The Wires of War
- Technology and the Global Struggle for Power
- By: Jacob Helberg
- Narrated by: Jesse Einstein
- Length: 11 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy.
-
-
Incredible book
- By John Alexander on 10-21-21
By: Jacob Helberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Wireless Wars
- China’s Dangerous Domination of 5G and How We’re Fighting Back
- By: Jonathan Pelson
- Narrated by: Chris Abell
- Length: 8 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Author Jon Pelson explains how America invented cellular technology, taught China how to make the gear, and then handed them the market. Pelson shares never-before-told stories from the executives and scientists who built the industry and describes how China undercut and destroyed competing equipment makers, freeing themselves to export their nation’s network gear - and their surveillance state. He also reveals China’s successful program to purchase the support of the world’s leading political, business, and military figures in their effort to control rival nations’ networks.
-
-
This man is spot on!
- By Robert Avel on 04-05-22
By: Jonathan Pelson
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The Wires of War
- Technology and the Global Struggle for Power
- By: Jacob Helberg
- Narrated by: Jesse Einstein
- Length: 11 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy.
-
-
Incredible book
- By John Alexander on 10-21-21
By: Jacob Helberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Wireless Wars
- China’s Dangerous Domination of 5G and How We’re Fighting Back
- By: Jonathan Pelson
- Narrated by: Chris Abell
- Length: 8 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Author Jon Pelson explains how America invented cellular technology, taught China how to make the gear, and then handed them the market. Pelson shares never-before-told stories from the executives and scientists who built the industry and describes how China undercut and destroyed competing equipment makers, freeing themselves to export their nation’s network gear - and their surveillance state. He also reveals China’s successful program to purchase the support of the world’s leading political, business, and military figures in their effort to control rival nations’ networks.
-
-
This man is spot on!
- By Robert Avel on 04-05-22
By: Jonathan Pelson
-
Weapons of Math Destruction
- How Big Data Increases Inequality and Threatens Democracy
- By: Cathy O'Neil
- Narrated by: Cathy O'Neil
- Length: 6 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
We live in the age of the algorithm. Increasingly, the decisions that affect our lives—where we go to school, whether we can get a job or a loan, how much we pay for health insurance—are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.
-
-
More are US social problems that WMD
- By Laurent Bourgault-Roy on 01-08-17
By: Cathy O'Neil
-
Chip War
- The Quest to Dominate the World's Most Critical Technology
- By: Chris Miller
- Narrated by: Stephen Graybill
- Length: 12 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
You may be surprised to learn that microchips are the new oil—the scarce resource on which the modern world depends. Today, military, economic, and geopolitical power are built on a foundation of computer chips. Virtually everything—from missiles to microwaves—runs on chips, including cars, smartphones, the stock market, even the electric grid. Until recently, America designed and built the fastest chips and maintained its lead as the #1 superpower, but America’s edge is in danger of slipping, undermined by players in Taiwan, Korea, and Europe taking over manufacturing.
-
-
Great history, but could poor narration
- By Lily Wong on 10-26-22
By: Chris Miller
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Plot to Destroy Democracy
- How Putin and His Spies Are Undermining America and Dismantling the West
- By: Malcolm Nance, Rob Reiner - foreword
- Narrated by: Peter Ganim
- Length: 12 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the greatest intelligence operation in the history of the world, Donald Trump was made president of the United States with the assistance of a foreign power. For the first time, The Plot to Destroy Democracy reveals the dramatic story of how blackmail, espionage, assassination, and psychological warfare were used by Vladimir Putin and his spy agencies to steal the 2016 US election. It will show how Russia and its fifth column allies tried to flip the cornerstones of democracy in order to reengineer the world political order that kept most of the world free since since 1945.
-
-
OH NOOOO
- By Red on 07-18-18
By: Malcolm Nance, and others
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- By: Clint Watts
- Narrated by: Joe Knezevich
- Length: 9 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Could Have Been Much Better - Disappointing!
- By @CyberSpaceSA on 06-11-18
By: Clint Watts
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Mindf*ck
- Cambridge Analytica and the Plot to Break America
- By: Christopher Wylie
- Narrated by: Graham Halstead
- Length: 11 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mindf*ck goes deep inside Cambridge Analytica’s "American operations", which were driven by Steve Bannon’s vision to remake America and fueled by mysterious billionaire Robert Mercer’s money, as it weaponized and wielded the massive store of data it had harvested on individuals - in excess of 87 million - to disunite the United States and set Americans against each other. Bannon had long sensed that deep within America’s soul lurked an explosive tension. Cambridge Analytica had the data to prove it.
-
-
Eye opening. Worth the time & money.
- By perfect on 10-23-19
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
Critic reviews
"With decades of experience in cyber conflict, Payton is the perfect guide to help us understand our new era of hacked elections and non-stop disinformation campaigns. Fortunately, Manipulated doesn't stop there: Payton gives us a call to action and clear recommendations for how individual citizens, big tech corporations, governments, and the international community of democratic nations can push back and win." (Emilian Papadopoulos, president, Good Harbor Cyber Security Risk Management)
"Manipulated covers riveting explorations of events over the past decade as well as current happenings not in the public eye. Theresa has a keen sense of extrapolating today's cybercrime methods into tomorrow's unknown threat vectors. She leaves everyone with hope by providing the reader with a how to guide to deflect manipulation campaigns." (Scott Schober, CEO of BVS, author, cyber expert)
"Theresa Payton's experience, intelligence, and passion reach off the pages of Manipulated to shake our shoulders and us up. This isn't fiction, and it isn't a movie script, it is a testimonial aimed to clear the fog in our information-overloaded world, and demand that we go back to our foundations - that truth is a requirement and needs tending, that foreign interference isn't acceptable in how we make free choices, and that we're not bystanders. Read this book, twice, and see her justification for the included blueprints to big tech, governments, and all of us to restore those essential foundations. Apathy, ignorance, and misperception are what others want, Payton wants quite the opposite." (John N. Stewart, SVP, chief security and trust officer CISCO)
What listeners say about Manipulated
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- norm deboer
- 05-25-20
Very Informative
This book is an excellent read created by a cyber security expert for the average person who is tired of being manipulated. Not only does it create awareness, it offers helpful tools to prevent manipulation. Thank you, Theresa!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- John Hill
- 06-05-20
awesome book
This book is a must listen for everyone concerned with all of the seeming misinformation we're seeing and hearing every da
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Ryan Ramsey
- 10-25-21
This is a must!
This is one of the best books I have heard on the subject. I enjoyed the historical references and the supporting information arrived the fact that elections are just part of the targets.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!