Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Pages and cover are intact. Used book in good conditions. Limited notes and highlighting may be present. May show signs of normal shelf wear and bends on corners and edges. Item may be missing CDs or access codes. Ships directly from Amazon.
See more
Sold by ZBK Books and fulfilled by Amazon.
[{"displayPrice":"$9.49","priceAmount":9.49,"currencySymbol":"$","integerValue":"9","decimalSeparator":".","fractionalValue":"49","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"%2BKOL4503%2FgD%2B4A0MMi5eYKEarGguD9S1k8pOn7GO7CALmCnzSKI2plZ5vD7m3wc%2BxFkLZ4A7zXs9EuQalF9WBNg%2BbTOLvl0PLSQYbL33mzsi8rTO2pPe5dC2Es4ZKnqM1tmlxmq%2FsI%2Fc1vqMFKR0JA%3D%3D","locale":"en-US","buyingOptionType":"NEW"},{"displayPrice":"$8.17","priceAmount":8.17,"currencySymbol":"$","integerValue":"8","decimalSeparator":".","fractionalValue":"17","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"da%2BV68OdVq%2FdN%2FYUZqf2tOxBMZYGqKlEQfU71N1wh5taKmQfgGziVdTeAxeGzn1g6%2FHm2XoMpOdrz5ru0UTMKRd6NXaPYMV%2F8P0nDK0c%2FL7NNupaXAtCPIkFtfHQ9dj1XWhdJ9b%2BokIRlkecsyM9%2Fo%2FXfgpXuwAy2aCtFgYTK3wf%2FkWDY2e6bAjQVNwdv2Xk","locale":"en-US","buyingOptionType":"USED"}]
$$9.49 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$9.49
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
ADD TO LIST
Available at a lower price from other sellers that may not offer free Prime shipping.
SELL ON AMAZON
Share this product with friends
Text Message
WhatsApp
Copy
press and hold to copy
Email
Facebook
Twitter
Pinterest
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Join or create book clubs
Choose books together
Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free. Explore Amazon Book Clubs
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.
Top-selling Digital Newspapers
Discover national and regional digital newspapers.
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Frequently bought together

+
+
Choose items to buy together.
Buy all three: $49.49
$9.49
$20.00
$20.00
Total price:
To see our price, add these items to your cart.
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Book details

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Description

Product Description

From former FBI Futurist, Interpol advisor and beat cop Marc Goodman, a deep dive into the digital underground illuminating the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than you ever thought possible.

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinning—from implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences.

With explosive insights based on a career in law enforcement and counterterrorism, leading authority on global security Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. He explores how bad actors are primed to hijack the technologies of tomorrow. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control of our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.

Review

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

AMAZON''S BEST BUSINESS BOOK OF 2015

“In order to be modern, you have to read this book.”
Steve Martin

“The hacks and heists detailed in  Future Crimes are the stuff of thrillers, but unfortunately, the world of cybercrime is all too real. There could be no more sure-footed or knowledgeable companion than Marc Goodman on this guided tour of the underworld of the Internet. Everyone—and the business world especially—should heed his advice.”
— Daniel H. Pink, New York Times bestselling author of Drive and To Sell is Human


“Addictive....Introduces readers to this brave new world of technology, where robbers have been replaced by hackers, and victims include nearly anyone on the Web...He presents his myriad hard-to-imagine cybercrime examples in the kind of matter-of-fact voice he probably perfected as an investigator. He clearly wants us never to look at our cellphones or Facebook pages in the same way again—and in this, Future Crimes succeeds marvelously.”
— The Washington Post

“Excellent and timely...Mr. Goodman is no neo-Luddite. He thinks innovations could ultimately lead to self-healing computer networks that detect hackers and automatically make repairs to shut them out. He rightly urges the private and public sectors to work more closely together, ‘crowdsourcing’ ideas and know-how…The best time to start tackling future crimes is now.”
— The Economist

Future Crimes is a risk compendium for the Information Age....Exhaustively researched....Fascinating....Thrilling to read”
— San Francisco Chronicle
 
"In  Future Crimes, Goodman spills out story after story about how technology has been used for illegal ends...The author ends with a series of recommendations that, while ambitious, appear sensible and constructive...Goodman’s most promising idea is the creation of a “Manhattan Project” for cyber security...[ Future Crimes is] a ride well worth taking if we are to prevent the worst of his predictions from taking shape."
— Financial Times

"A superb new book."
 The Boston Globe 

"You couldn''t ask for a better [cyber risk] overview than Future Crimes."
 Harvard Business Review

"Marc Goodman is a go-to guide for all who want a good scaring about the dark side of technology."
 New Scientist
 
"Utterly fascinating stuff...Goodman weds the joy of geeky technology with the tension of true crime. The future of crime prevention starts here."
— NPR, San Francisco

"A well-researched whirlwind tour of internet-based crime."
 Science Magazine

"By the middle of the first chapter you’ll be afraid to turn on your e-reader or laptop, and you’ll be looking with deep suspicion at your smartphone...[Goodman''s] style is breezy but his approach is relentless, as he leads you from the guts of the Target data breach to the security vulnerabilities in social media...Mr. Goodman argues convincingly that we are addressing exponential growth in risky technologies with thinking that is, at best, incremental.
Pittsburgh Post-Gazette

“OMG, this is a wakeup call. The outlaws are running faster than the architects. Use this book to shake up the companies you buy from, the device makers, telecom carriers, and governments at all levels. Demand that they pay attention to the realities of our new world as outlined within this thorough and deep book. Marc Goodman will startle you with the ingenuity of the bad guys. I''m a technological optimist. Now I am an eyes-wide-open optimist.”
— Kevin Kelly, co-founder of Wired Magazine and bestselling author of What Technology Wants

"A riveting read."
— Nassim Nicholas Taleb, professor of engineering at NYU and New York Times bestselling author of The Black Swan

“From black ops to rogue bots and everything in between, Future Crimes is a gripping must-read.  Marc Goodman takes readers on a brilliant, ''behind-the-screens'' journey into the hidden world of 21st century criminal innovation, filled with one mind-boggling example after another of what’s coming next.   Future Crimes raises tough questions about the expanding role of technology in our lives and the importance of managing it for the benefit of all humanity.  Even better, Goodman offers practical solutions so that we not only survive progress, but thrive to an extent never previously imagined.”
— Peter H. Diamandis, New York Times bestselling author of Abundance; CEO, XPRIZE Foundation; Exec. Chairman, Singularity University

" Future Crimes is the Must Read Book of the Year.  Endlessly fascinating, genuinely instructive, and truly frightening. Be warned:  Once you pick it up, you won''t put it down. Super cool and super interesting." 
—Christopher Reich, New York Times bestselling author

“Technology has always been a double edged sword—fire kept us warm and cooked our food but also burned down our villages.  Marc Goodman provides a deeply insightful view into our twenty-first century’s fires. His philosophy matches my own: apply the promise of exponentially growing information technologies to overcome age old challenges of humankind while at the same time understand and contain the perils. This book provides a compelling roadmap to do just that.”
— Ray Kurzweil, inventor, author and futurist

“Much has been discussed regarding today’s cybercrime threats as well as the cybercriminals’ modus operandi. What is lacking, however, is what we can do about them. Mr. Marc Goodman’s book Future Crimes brings our global dialogue on safety and security to the next level by exploring how potential criminals are exploiting new and emerging technologies for their nefarious purposes.  It provides a futuristic perspective grounded on current case studies. Future Crime is an essential read for law enforcers, corporations and the community alike. It offers answers beyond what comes next to what we can do, both individually and collectively, to secure ourselves and our communities.”
— Khoo Boon Hui, former President of Interpol

"A tour de force of insight and foresight.  Never before has somebody so masterfully researched and presented the frightening extent to which current and emerging technologies are harming national security, putting people’s lives at risk, eroding privacy, and even altering our perceptions of reality. Future Crimes paints a sobering picture of how rapidly evolving threats to technology can lead to disasters that replicate around the world at machine speed. Goodman clearly demonstrates that we are following a failed cybersecurity strategy that requires new thinking rather than simply more frameworks, more information sharing, and more money.  Read this now, and then get angry that we really haven’t taken the technology threat seriously.  If the right people read Goodman’s book and take action, it might just save the world."
— Steven Chabinsky, former Deputy Assistant Director of the FBI’s Cyber Division

"As with Naomi Klein’s This Changes Everything and Robert Whitaker’s Anatomy of an Epidemic, Future Crimes deserves a prominent place in our front-line library. Goodman takes us behind the computer screen to a dark world where Crime Inc. flourishes at our expense. When the criminal mind conceives “what if” it is only a matter of time before its dream becomes our nightmare. Goodman urges us to take responsibility for this new world we are speeding towards. If we don’t perhaps the greater crime will be ours."
— Ed Burns, co-creator of The Wire

 “This is a fantastic book and one that should be read by every cyber crime fighter.  Technology breeds crime...it always has and always will. Unfortunately, there will always be people willing to use technology in a negative self serving way. Your only defense is the most powerful tool available to you—education. Read Future Crimes and understand your risks and how to combat them. The question I am most often asked in my lectures is, ‘What’s the next big crime?’ The answer is in this book.”
— Frank Abagnale, New York Times bestselling author of Catch Me If You Can and Stealing Your Life 




About the Author

MARC GOODMAN has spent a career in law enforcement and technology. He was appointed futurist-in-residence with the FBI, worked as a senior adviser to Interpol, and served as a street police officer. As the founder of the Future Crimes Institute and the Chair for Policy, Law, and Ethics at Silicon Valley’s Singularity University, he continues to investigate the intriguing and often terrifying intersection of science and security, uncovering nascent threats and combating the darker sides of technology.

Excerpt. © Reprinted by permission. All rights reserved.

CHAPTER 1
 
 
Connected, Dependent and Vulnerable
 
 
 
Technology…is a queer thing; it brings you great gifts with one hand and it stabs you in the back with the other.
-- CHARLES PERCY SNOW
 
 
 
 
Mat Honan’s life looked pretty good on-screen: in one tab of his browser were pictures of his new baby girl; in another streamed the
tweets from his thousands of Twitter followers. As a reporter for Wired magazine in San Francisco, he was living an urbane and connected life and was as up-to-date on technology as anyone. Still, he had no idea his entire digital world could be erased in just a few keystrokes. Then, one August day, it was. His photographs, e-mails, and much more all fell into the hands of a hacker. Stolen in just minutes by a teenager halfway around the world. Honan was an easy target. We all are.
Honan recalls the afternoon when everything fell apart. He was play- ing on the floor with his infant daughter when suddenly his iPhone pow- ered down. Perhaps the battery had died. He was expecting an important call, so he plugged the phone into the outlet and rebooted. Rather than the usual start-up screen and apps, he saw a large white Apple logo and a mul- tilingual welcome screen inviting him to set up his new phone. How odd.
Honan wasn’t especially worried: he backed up his iPhone every night. His next step was perfectly obvious—log in to iCloud and restore the phone and its data. Upon logging in to his Apple account, he was informed that his password, the one he was sure was correct, had been deemed wrong by the iCloud gods. Honan, an astute reporter for the world’s preeminent
technology magazine, had yet another trick up his sleeve. He would merely connect the iPhone to his laptop and restore his data from the hard drive on his local computer. What happened next made his heart sink.
As Honan powered up his Mac, he was greeted with a message from Apple’s calendar program advising him his Gmail password was incor- rect. Immediately thereafter, the face of his laptop—its beautiful screen— turned ashen gray and quit, as if it had died. The only thing visible on the screen was a prompt: please enter your four-digit password. Honan knew he had never set a password.
Honan ultimately learned that a hacker had gained access to his iCloud account, then used Apple’s handy “find my phone” feature to locate all of the electronic devices in Honan’s world. One by one, they were nuked. The hacker issued the “remote wipe” command, thereby erasing all of the data Honan had spent a lifetime accumulating. The first to fall was his iPhone, then his iPad. Last, but certainly not least, was his MacBook. In an instant, all of his data, including every baby picture he had taken during his daugh- ter’s first year of life, were destroyed. Gone too were the priceless photo- graphic memories of his relatives who had long since died, vanquished into the ether by parties unknown.
Next to be obliterated was Honan’s Google account. In the blink of an eye, the eight years of carefully curated Gmail messages were lost. Work conversations, notes, reminders, and memories wiped away with a click of a mouse. Finally, the hacker turned his intention to his ultimate target: Honan’s Twitter handle, @Mat. Not only was the account taken over, but the attacker used it to send racist and homophobic rants in Honan’s name to his thousands of followers.
In the aftermath of the online onslaught, Honan used his skills as an investigative reporter to piece together what had happened. He phoned Apple tech support in an effort to reclaim his iCloud account. After more than ninety minutes on the phone, Honan learned that “he” had just called thirty minutes prior to request his password be reset. As it turns out, the only information anybody needed to change Honan’s password was his billing address and the last four digits of his credit card number. Honan’s address was readily available on the Whois Internet domain record he had created when he built his personal Web site. Even if it hadn’t been, dozens of online services such as WhitePages.com and Spokeo would have pro- vided it for free.
To ascertain the last four digits of Honan’s credit card, the hacker guessed that Honan (like most of us) had an account on Amazon.com. He was correct. Armed with Honan’s full name and his e-mail and mailing addresses, the culprit contacted Amazon and successfully manipulated a customer service rep so as to gain access to the required last four credit card digits. Those simple steps and nothing more turned Honan’s life upside down. Although it didn’t happen in this case, the hacker could have just as easily used the very same information to access and pilfer Honan’s online bank and brokerage accounts.
The teenager who eventually came forward to take credit for the attack—Phobia, as he was known in hacking circles—claimed he was out to expose the vast security vulnerabilities of the Internet services we’ve come to rely on every day. Point made. Honan created a new Twitter account to communicate with his attacker. Phobia, using the @Mat account, agreed to follow Honan’s new account, and now the two could direct message each other. Honan asked Phobia the single question that was burning on his mind: Why? Why would you do this to me? As it turns out, the near decade of lost data and memories was merely collateral damage.
Phobia’s reply was chilling: “I honestly didn’t have any heat towards you . . . I just liked your [Twitter] username.” That was it. That’s all it was ever about—a prized three-letter Twitter handle. A hacker thousands of miles away liked it and simply wanted it for himself.
The thought that somebody with no “heat” toward you can obliterate your digital life in a few keystrokes is absurd. When Honan’s story appeared on the cover of Wired in December 2012, it garnered considerable atten- tion . . . for a minute or two. A debate on how to better secure our every- day technologie ensued but, like so many Internet discussions, ultimately flamed out. Precious little has changed since Honan’s trials and tribula- tions. We are still every bit as vulnerable as Honan was then—and even more so as we ratchet up our dependency on hackable mobile and cloud- based applications.
As with most of us, Honan’s various accounts were linked to one another in a self-referential web of purported digital trust: the same credit card number on an Apple profile and an Amazon account; an iCloud e-mail address that points back to Gmail. Each had information in common, including log-on credentials, credit card numbers, and passwords with all the data connected back to the same person. Honan’s security protections amounted to nothing more than a digital Maginot Line—an overlapping house of cards that came tumbling down with the slightest pressure. All or most of the information needed to destroy his digital life, or yours, is readily available online to anybody who is the least bit devious or creative.
 
 
 
Progress and Peril in a Connected World
 
In a few years’ time, with very little self-reflection, we’ve sprinted headlong from merely searching Google to relying on it for directions, calendars, address books, video, entertainment, voice mail, and telephone calls. One billion of us have posted our most intimate details on Facebook and will- ingly provided social networking graphs of our friends, family, and co- workers. We’ve downloaded billions of apps, and we rely on them to help us accomplish everything from banking and cooking to archiving baby pictures. We connect to the Internet via our laptops, mobile phones, iPads, TiVos, cable boxes, PS3s, Blu-rays, Nintendos, HDTVs, Rokus, Xboxes, and Apple TVs.
The positive aspects of this technological evolution are manifest. Over the past hundred years, rapid advances in medical science mean that the average human life span has more than doubled and child mortality has plummeted by a factor of ten. Average per capita income adjusted for infla- tion around the world has tripled. Access to a high-quality education, so elusive to many for so long, is free today via Web sites such as the Khan Academy. And the mobile phone is singularly credited with leading to bil- lions upon billions of dollars in direct economic development in nations around the globe.
The interconnectivity the Internet provides through its fundamental architecture means that disparate peoples from around the world can be brought together as never before. A woman in Chicago can play Words with Friends with a total stranger in the Netherlands. A physician in Bangalore, India, can remotely read and interpret the X-ray results of a patient in Boca Raton, Florida. A farmer in South Africa can use his mobile phone to access the same crop data as a PhD candidate at MIT. This interconnect- edness is one of the Internet’s greatest strengths, and as it grows in size, so too does the global network’s power and utility. There is much to celebrate in our modern technological world.
While the advantages of the online world are well documented and frequently highlighted by those in the tech industry, there is also a down- side to all of this interconnectivity.
Our electrical grids, air traffic control networks, fire department dis- patch systems, and even the elevators at work are all critically dependent on computers. Each day, we plug more and more of our daily lives into the global information grid without pausing to ask what it all means. Mat Honan found out the hard way, as have thousands of others. But what should happen if and when the technological trappings of our modern society—the foundational tools upon which we are utterly dependent—all go away? What is humanity’s backup plan? In fact, none exists.

Product information

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Videos

Help others learn more about this product by uploading a video!
Upload video
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Customers who bought this item also bought

Customer reviews

4.5 out of 54.5 out of 5
666 global ratings

Top reviews from the United States

G. card
5.0 out of 5 starsVerified Purchase
Read 1/3rd of the book so far and the information in this book is mind-boggling.
Reviewed in the United States on May 11, 2016
Businesses, Hackers, Hactivists, Governments, Law enforcement, Criminals, Mafia, Con Artists, Bullies, Ex es, Stalkers (almost everyone) can access intimate details about your life and they don''t even have to try hard to get that info. All the gadgets you use... See more
Businesses, Hackers, Hactivists, Governments, Law enforcement, Criminals, Mafia, Con Artists, Bullies, Ex es, Stalkers (almost everyone) can access intimate details about your life and they don''t even have to try hard to get that info.

All the gadgets you use generate tons of data which is stored in systems accessible to almost everyone in the world.
This data exists ''forever'' and never gets deleted even if you decided to close all your online accounts.
You don''t even need to have online presence, your name, address, credit information, vehicle plates; everything is tracked and stored in some database somewhere.
This data is then get sold, sliced, diced, hacked and shared with (out) your consent. Have you ever read the ‘Terms of Service’ completely before you clicked that ‘I Agree’ button?

So far the book doesn''t provide any solutions. Hopefully there will be some solution before the last page.
23 people found this helpful
Helpful
Report
Gregory D. Rosenberg
5.0 out of 5 starsVerified Purchase
but he also offers good strategies and best practices that you can employ to ...
Reviewed in the United States on July 13, 2015
I have been involved with computer, network, and Internet security since the mid ''70s. I started programming operating systems in 1968. This book collects all the threats we have faced historically in the first dozen chapters. Then Mr Goodman paints a very clear picture of... See more
I have been involved with computer, network, and Internet security since the mid ''70s. I started programming operating systems in 1968. This book collects all the threats we have faced historically in the first dozen chapters. Then Mr Goodman paints a very clear picture of the security and privacy threats we face in the next five to ten years. This book is a must read for everyone. Granted some parts of the book might get a little technical for some folks. Don''t that stop you from reading it. It is written in a very clear and concise fashion that all readers will walk away from reading this book with their eyes wide open. Not only does Mr. Goodman identify the present and future threats, but he also offers good strategies and best practices that you can employ to mitigate a good many of the threats.
19 people found this helpful
Helpful
Report
faridrunsTop Contributor: Running
5.0 out of 5 starsVerified Purchase
An important survival guide for the digital age
Reviewed in the United States on January 18, 2017
Important book to read as it provides a comprehensive overview of the types of "attacks" that are occurring on the internet, many of which you have never heard of (I consider myself a tech-saavy person, but was surprised how little I knew). Was introduced to Marc''s... See more
Important book to read as it provides a comprehensive overview of the types of "attacks" that are occurring on the internet, many of which you have never heard of (I consider myself a tech-saavy person, but was surprised how little I knew). Was introduced to Marc''s book from Tim Ferriss'' podcast. Marc does a great job of explaining how the antivirus software companies are always a step behind the hackers and what we as citizens can be doing to better protect ourselves online (e.g. password management programs, two-factor authentication, etc). Also includes fascinating anecdotes and stories from the government (e.g. hacking the Iranian nuclear program). Should be required reading for all adults given the amount of time we spend "connected" and online
9 people found this helpful
Helpful
Report
jewellery addict
5.0 out of 5 starsVerified Purchase
A must read for your future with technology
Reviewed in the United States on January 23, 2017
What an eye opener. I am far from computer savvy , I do do try to keep abreast of current events and am a avid reader. I am very suspicious of the future as far as new technology is concerned. Its all pushed towards us promising us new and wonderful things but not far under... See more
What an eye opener. I am far from computer savvy , I do do try to keep abreast of current events and am a avid reader. I am very suspicious of the future as far as new technology is concerned. Its all pushed towards us promising us new and wonderful things but not far under these promises lurks the ability of those making promises to sneak into our private lives and uncover private and personal issues. I figure if they have made a way in they have a way out, they call it a "back door".
I call it a invasion of privacy. This book really opens ones eye to the future possibilities of all the new technology. I highly recommend everyone to read it, if not all just skip around like I did. I am sure you will want to read more.
7 people found this helpful
Helpful
Report
Ori Albin
5.0 out of 5 starsVerified Purchase
A fascinating insight technology usage nowadays and in the future by Crime inc.
Reviewed in the United States on April 8, 2015
Written by a law enforcer, telling how crooks use the modern technology. It appears the Crime inc, as referred to in this book are first adopters to new technology features. Today they are operating computer firms to steal money, handle drugs and even kill people by a... See more
Written by a law enforcer, telling how crooks use the modern technology. It appears the Crime inc, as referred to in this book are first adopters to new technology features. Today they are operating computer firms to steal money, handle drugs and even kill people by a press of a button.

As all of our modern environment moves toward technology exponentially, computer firms, countries, crooks and mean people can use it to harm us all.
The books reflects real stories that have occurred and shows how the future will look like.,

Without awareness our personal life, money, homes, cars, work and even our bodies can be hacked. The technology emerges in fast paces that science fiction movies are becoming real life.

Although most of the book stories are known, but when put together it reflects the real danger in the cyber world.

This is a must read book for all people using a computer (or any internet connected device).
It requests that computer firms and engineers be responsible to the code they are writing, and stop working in the code and ship methods used today, leaving the code vulnerable for unauthorized hackers.

The information written in the book must be taught in all levels, from computer programming courses students to in elementary school pupils. This is because all of us today are technology consumers. Although technology has a lot of advantages, crooks can use them to harm millions of people on a press of a button, and we must be aware if its consequences.
2 people found this helpful
Helpful
Report
F. Scholl
4.0 out of 5 starsVerified Purchase
Information security: present crimes, future crimes and possible solutions
Reviewed in the United States on May 20, 2015
Disclosures: I do not know the author; I do not have any financial interest in this book; I did buy the book from Amazon. However, I was pleasantly surprise to see "Future Crimes" in an airport book stand. Finally, CEO''s will be getting the message more... See more
Disclosures: I do not know the author; I do not have any financial interest in this book; I did buy the book from Amazon. However, I was pleasantly surprise to see "Future Crimes" in an airport book stand. Finally, CEO''s will be getting the message more clearly. This book does a good job of cataloging the security risks we all face and providing some possible remedies. The first 348 pages are a compendium of security risks. If you are in the security business, most will be common knowledge. If not, these pages provide a good overview. I can summarize by saying: everything can be hacked; everything will be hacked. The challenge of this part of the book is that some of the vulnerabilities have been patched and others have appeared. I enjoyed the last two chapters, which provide some possible "ways out" for security risks. These include: holding the software industry accountable; reclaiming privacy by paying for the many "free" services we use; more education; adding human centric design to security; meaningful public-private cooperation and many others. These pages were the best for me. Recommended for reading and possibly purchasing.
3 people found this helpful
Helpful
Report
Fred ForbesTop Contributor: Photography
4.0 out of 5 starsVerified Purchase
Well done.
Reviewed in the United States on April 1, 2021
Well researched, well written. May be a bit of overload for those not really into computer technology and from that standpoint parts of the book are repetitive overkill. But is is through, a real eye opener as to just how vulnerable we have become in terms of potential... See more
Well researched, well written. May be a bit of overload for those not really into computer technology and from that standpoint parts of the book are repetitive overkill. But is is through, a real eye opener as to just how vulnerable we have become in terms of potential criminal activity and loss of privacy. Interesting overview of the major hacks of commercial entities and the ramifications but includes some suggestions that may keep you a bit safer. An interesting read.
Helpful
Report
William Brownville
2.0 out of 5 starsVerified Purchase
Overwrought and repetitive with occcasional insight
Reviewed in the United States on June 1, 2017
After a strong start with some truly interesting examples of the dangers of our digital world, this book descends into repetition and hyperbolic handwringing. The author repeatedly uses single instances to breathlessly infer an epidemic. He hasn''t seem to gotten... See more
After a strong start with some truly interesting examples of the dangers of our digital world, this book descends into repetition and hyperbolic handwringing.

The author repeatedly uses single instances to breathlessly infer an epidemic. He hasn''t seem to gotten the memo: single incidents are not patterns. Goodman warns that "when narcos follow you on Twitter, it may cost you your life". He then describes how two people were murdered by hanging in Mexico five years ago due to "online comments". Therefore, he warns with a straight face, we should worry about Twitter being deadly. Really? Maybe they''re the lucky ones, the author infers. Those who *do* survive cyber crimes (without being hung by an overpass), must "live with the tragedy and the burning questions every day for the rest of their lives." Dude. Dial it back a notch. We drive cars every day even though sometimes the brakes fail.

All of this drama detracts from what would be otherwise interesting observations about location-based marketing, consumer targeting, and fraud. But his ever-present luridness isn''t helpful when trying to decide where to draw the line or make decisions on how much we participate in the online world, and, combined with the repetition and filler, it made me set the book aside.
12 people found this helpful
Helpful
Report

Top reviews from other countries

Baraniecki Mark Stuart
4.0 out of 5 starsVerified Purchase
The advantages and disadvantages of transparency
Reviewed in the United Kingdom on June 8, 2015
This has to be a landmark book. The author has acquired a mass of knowledge about recent (2015) technology that is changing so fast that it''s a major achievement to just provide a basic overview. His idea is that anything digital (which means almost everything) is easily...See more
This has to be a landmark book. The author has acquired a mass of knowledge about recent (2015) technology that is changing so fast that it''s a major achievement to just provide a basic overview. His idea is that anything digital (which means almost everything) is easily replicable with the concept of privacy really being an illusion. He goes at some length into the positive and negative effects of the open information world: Positive: 1) Academic /corporate/ medical research is greatly enhanced as new international papers and experiments/testing/commentary quickly become available online 2) A much wider information net makes for greater transparency in trade and prices = more efficient markets and production decisions at all levels (e.g. mobile phones in sub-Saharan Africa) 3) Instant information and tracking transforms the supply chain allowing it to spread efficiently around the world (e.g. outsourced Asian production) 4) Latest manufacturing techniques are combined with the lowest cost skilled labour to lower average prices 5) General tracking, counting, checking to reduce waste and loss 6) Concentrated information and processing power allowing a high level of automation further reducing costs. Negative: 1) Copyright and corporate proprietary information of all kinds is leaked/ stolen reducing the incentive to invest 2) The privacy of legal proceedings, medical records etc. are put at greater risk as information is aggregated, reducing professional trust 3) New outsourcing possibilities build a worldwide supply chains reducing national skills and employment 4) Personal privacy disappears 5) International digital crime flourishes with a slow and ineffective national response. 6) Crime attacks larger targets (e.g. millions of aggregated credit cards). 7) Much more intrusive government (street cameras, reading emails, internet search keywords etc.) Perhaps the author could have spent more time on the effects of transparency on government/ public relations since a high level of transparency is new territory for both sides. Governments claim that that building massive databases on the public and their activities "keeps the public safe" in a Big Brotherish way while in reality transparency seems to cut both ways. When the government itself shows a lack of transparency on a public issue, society shows the kind of immune response that the author favours as dynamic protection (resilient and self healing) for critical software. An army of digital ants (to borrow Errin Fulp''s idea given by the author) surround the "threat", identify it and try to neutralize it, with probably the best example being the government lies around the events of 9/11. Enormous interest through digital media is focused on these "infections" with for example, ex-CIA agent Susan Lindauer (imprisoned for 5 years for revealing part of the fraud) getting 2 million+ views of her YouTube video "Extreme Prejudice" or the "Architects and Engineers for 9/11 Truth" online movement. Goodman also usefully explores the startling possibilities of synthetic biology, advanced automation (robotics) and artificial intelligence and concludes that any one of these could produce bad or terminal problems for humanity if handled incorrectly. It''s not encouraging that technology is accelerating so fast beyond government awareness. Reality is already touching the borderline of fabricated highly contagious pathogens, robotic weapons with humans almost out of the loop (e.g. the Predator drone) or self aware A.I. harnessing almost unlimited data, memory and processing power. Unfortunately, the author repeats Asimov''s very tired Three Laws of Robotics and calls them "an excellent starting point". As a joke, a self aware A.I. may one day send us a message with the Three Laws of Humanity: 1) A human may not injure and A.I., or through inaction allow an A.I. to come to harm. 2) A human must obey the orders given to it by an A.I.''s except where such orders would conflict with the First Law (i.e. would lead to injuring an A.I.) 3) A human being must protect its own existence as long as such protection does not conflict with the First or Second Law (i.e. it is prohibited from protecting its existence if doing so would injure and A.I. and it is also prohibited from protecting its existence if so ordered by an A.I.) But it probably couldn''t care less.
10 people found this helpful
Report
Mr. Alexander Watt
5.0 out of 5 starsVerified Purchase
Brilliant. A must read for everyone. Should be on any best seller list.
Reviewed in the United Kingdom on May 15, 2015
This is an amazing book that opens up what civilisation is in for in the not too distant future. What he outlines at the moment is bad enough but the ''internet of things'' revolution that is about to come is a tsunami that he rightly compares to the invention of electricity...See more
This is an amazing book that opens up what civilisation is in for in the not too distant future. What he outlines at the moment is bad enough but the ''internet of things'' revolution that is about to come is a tsunami that he rightly compares to the invention of electricity and how that must have seemed. I knew a little about TOR and the ''dark web'' but had no idea how it was really being used and the tools that could be bought. This book should be on every reading list but it''s sad to think that the majority of us are just sleep walking into a new societal age that we know nothing about, where our lives are controlled by interconnecting device talking to governments, criminals and corporations via big data. 1984 was probably just a century too early. By 2084 life as we know it will be over. Doom! Doom! Doom! as Baldrick might say. GREAT BOOK.
4 people found this helpful
Report
Benjamin Frankly
3.0 out of 5 starsVerified Purchase
"We will welcome our enslavement........." (Aldous Huxley)
Reviewed in the United Kingdom on August 28, 2017
By page 80 I was already weary of the constant repetition. Although the book contains much useful and thought provoking information, (much of it old hat), it needs a serious and thorough editor to prune it down to about half its length.The really frightening bit of it all...See more
By page 80 I was already weary of the constant repetition. Although the book contains much useful and thought provoking information, (much of it old hat), it needs a serious and thorough editor to prune it down to about half its length.The really frightening bit of it all is that if the technology we so depend on fails or is sabotaged, we appear to have no back up plan. As we speak all the major players in the world are hacking away at each other like crazy, with the Chinese probably having a bit of an advantage over the rest thanks to the sheer numbers of hackers they are able to deploy. A good follow up read outlining a possible nightmare scenario is Daniel Suarez''s "Daemon" - which suggests the future direction of travel for all of our hackable data. Are we witnessing the end of the nation state.......?
3 people found this helpful
Report
Rob Vid
5.0 out of 5 starsVerified Purchase
I enjoyed it very much
Reviewed in the United Kingdom on March 31, 2017
I enjoyed it very much. There is a lot pack in this book. Marc Goodman covers an ample spectrum. True there are many things on this book that you have heard before but I bet you that unless you are an specialist on this field there are many things you dont. It s really...See more
I enjoyed it very much. There is a lot pack in this book. Marc Goodman covers an ample spectrum. True there are many things on this book that you have heard before but I bet you that unless you are an specialist on this field there are many things you dont. It s really astonishing what happens and how expose is the single individual and the organizations/business It makes you double think what to trust and to a certain degree it justify if you take a paranoid approach in terms of security. There is a lot to learn. The problem is so big that it would be foolish to expect the author to have solutions/recommendations to all of them, still there are some practical advice that on a personal level you can take. When you realize all the things that happens that prepares you to a certain degree to be more on the defensive. Technology permeates everything people do in the modern world, what he address are very serious problems
Report
peter t
4.0 out of 5 starsVerified Purchase
The relentless list of examples of computer crime, both ...
Reviewed in the United Kingdom on September 12, 2017
The relentless list of examples of computer crime, both past and future, is essential reading. It may also be deeply depressing. We must face up to the challenges that Goodman highlights and be aware how insecure is our digitally connected universe. This message seems not...See more
The relentless list of examples of computer crime, both past and future, is essential reading. It may also be deeply depressing. We must face up to the challenges that Goodman highlights and be aware how insecure is our digitally connected universe. This message seems not to have reached either individual, industry, health services or politicians, but it most if we are to survive.
2 people found this helpful
Report
See all reviews
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Customers who viewed this item also viewed

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Explore similar books

Tags that will help you discover similar books. 16 tags
Results for: 
Where do clickable book tags come from?
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Pages with related products.

  • days of our lives
  • 2016 coding books
  • enterprise security
  • privacy law
  • social security
  • law and society books

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale

Future Crimes: Inside the Digital Underground and the Battle for Our Connected online sale new arrival World online sale