Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
$14.60$14.60
FREE delivery: Monday, April 15 on orders over $35.00 shipped by Amazon.
Ships from: Amazon.com Sold by: Amazon.com
$7.55
Other Sellers on Amazon
FREE Shipping
100% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Audible sample Sample
Future Crimes: Inside the Digital Underground and the Battle for Our Connected World Paperback – January 12, 2016
Purchase options and add-ons
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinning—from implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences.
With explosive insights based on a career in law enforcement and counterterrorism, leading authority on global security Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. He explores how bad actors are primed to hijack the technologies of tomorrow. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control of our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.
- Print length608 pages
- LanguageEnglish
- PublisherAnchor
- Publication dateJanuary 12, 2016
- Dimensions5.2 x 1.02 x 7.97 inches
- ISBN-100804171459
- ISBN-13978-0804171458
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.
Frequently bought together
Similar items that may ship from close to you
Editorial Reviews
Review
AMAZON'S BEST BUSINESS BOOK OF 2015
“In order to be modern, you have to read this book.”
—Steve Martin
“The hacks and heists detailed in Future Crimes are the stuff of thrillers, but unfortunately, the world of cybercrime is all too real. There could be no more sure-footed or knowledgeable companion than Marc Goodman on this guided tour of the underworld of the Internet. Everyone—and the business world especially—should heed his advice.”
—Daniel H. Pink, New York Times bestselling author of Drive and To Sell is Human
“Addictive....Introduces readers to this brave new world of technology, where robbers have been replaced by hackers, and victims include nearly anyone on the Web...He presents his myriad hard-to-imagine cybercrime examples in the kind of matter-of-fact voice he probably perfected as an investigator. He clearly wants us never to look at our cellphones or Facebook pages in the same way again—and in this, Future Crimes succeeds marvelously.”
—The Washington Post
“Excellent and timely...Mr. Goodman is no neo-Luddite. He thinks innovations could ultimately lead to self-healing computer networks that detect hackers and automatically make repairs to shut them out. He rightly urges the private and public sectors to work more closely together, ‘crowdsourcing’ ideas and know-how…The best time to start tackling future crimes is now.”
—The Economist
“Future Crimes is a risk compendium for the Information Age....Exhaustively researched....Fascinating....Thrilling to read”
—San Francisco Chronicle
"In Future Crimes, Goodman spills out story after story about how technology has been used for illegal ends...The author ends with a series of recommendations that, while ambitious, appear sensible and constructive...Goodman’s most promising idea is the creation of a “Manhattan Project” for cyber security...[Future Crimes is] a ride well worth taking if we are to prevent the worst of his predictions from taking shape."
—Financial Times
"A superb new book."
—The Boston Globe
"You couldn't ask for a better [cyber risk] overview than Future Crimes."
—Harvard Business Review
"Marc Goodman is a go-to guide for all who want a good scaring about the dark side of technology."
—New Scientist
"Utterly fascinating stuff...Goodman weds the joy of geeky technology with the tension of true crime. The future of crime prevention starts here."
—NPR, San Francisco
"A well-researched whirlwind tour of internet-based crime."
—Science Magazine
"By the middle of the first chapter you’ll be afraid to turn on your e-reader or laptop, and you’ll be looking with deep suspicion at your smartphone...[Goodman's] style is breezy but his approach is relentless, as he leads you from the guts of the Target data breach to the security vulnerabilities in social media...Mr. Goodman argues convincingly that we are addressing exponential growth in risky technologies with thinking that is, at best, incremental.
—Pittsburgh Post-Gazette
“OMG, this is a wakeup call. The outlaws are running faster than the architects. Use this book to shake up the companies you buy from, the device makers, telecom carriers, and governments at all levels. Demand that they pay attention to the realities of our new world as outlined within this thorough and deep book. Marc Goodman will startle you with the ingenuity of the bad guys. I'm a technological optimist. Now I am an eyes-wide-open optimist.”
—Kevin Kelly, co-founder of Wired Magazine and bestselling author of What Technology Wants
"A riveting read."
—Nassim Nicholas Taleb, professor of engineering at NYU and New York Times bestselling author of The Black Swan
“From black ops to rogue bots and everything in between, Future Crimes is a gripping must-read. Marc Goodman takes readers on a brilliant, 'behind-the-screens' journey into the hidden world of 21st century criminal innovation, filled with one mind-boggling example after another of what’s coming next. Future Crimes raises tough questions about the expanding role of technology in our lives and the importance of managing it for the benefit of all humanity. Even better, Goodman offers practical solutions so that we not only survive progress, but thrive to an extent never previously imagined.”
—Peter H. Diamandis, New York Times bestselling author of Abundance; CEO, XPRIZE Foundation; Exec. Chairman, Singularity University
"Future Crimes is the Must Read Book of the Year. Endlessly fascinating, genuinely instructive, and truly frightening. Be warned: Once you pick it up, you won't put it down. Super cool and super interesting."
—Christopher Reich, New York Times bestselling author
“Technology has always been a double edged sword—fire kept us warm and cooked our food but also burned down our villages. Marc Goodman provides a deeply insightful view into our twenty-first century’s fires. His philosophy matches my own: apply the promise of exponentially growing information technologies to overcome age old challenges of humankind while at the same time understand and contain the perils. This book provides a compelling roadmap to do just that.”
—Ray Kurzweil, inventor, author and futurist
“Much has been discussed regarding today’s cybercrime threats as well as the cybercriminals’ modus operandi. What is lacking, however, is what we can do about them. Mr. Marc Goodman’s book Future Crimes brings our global dialogue on safety and security to the next level by exploring how potential criminals are exploiting new and emerging technologies for their nefarious purposes. It provides a futuristic perspective grounded on current case studies. Future Crime is an essential read for law enforcers, corporations and the community alike. It offers answers beyond what comes next to what we can do, both individually and collectively, to secure ourselves and our communities.”
—Khoo Boon Hui, former President of Interpol
"A tour de force of insight and foresight. Never before has somebody so masterfully researched and presented the frightening extent to which current and emerging technologies are harming national security, putting people’s lives at risk, eroding privacy, and even altering our perceptions of reality. Future Crimes paints a sobering picture of how rapidly evolving threats to technology can lead to disasters that replicate around the world at machine speed. Goodman clearly demonstrates that we are following a failed cybersecurity strategy that requires new thinking rather than simply more frameworks, more information sharing, and more money. Read this now, and then get angry that we really haven’t taken the technology threat seriously. If the right people read Goodman’s book and take action, it might just save the world."
—Steven Chabinsky, former Deputy Assistant Director of the FBI’s Cyber Division
"As with Naomi Klein’s This Changes Everything and Robert Whitaker’s Anatomy of an Epidemic, Future Crimes deserves a prominent place in our front-line library. Goodman takes us behind the computer screen to a dark world where Crime Inc. flourishes at our expense. When the criminal mind conceives “what if” it is only a matter of time before its dream becomes our nightmare. Goodman urges us to take responsibility for this new world we are speeding towards. If we don’t perhaps the greater crime will be ours."
—Ed Burns, co-creator of The Wire
“This is a fantastic book and one that should be read by every cyber crime fighter. Technology breeds crime...it always has and always will. Unfortunately, there will always be people willing to use technology in a negative self serving way. Your only defense is the most powerful tool available to you—education. Read Future Crimes and understand your risks and how to combat them. The question I am most often asked in my lectures is, ‘What’s the next big crime?’ The answer is in this book.”
—Frank Abagnale, New York Times bestselling author of Catch Me If You Can and Stealing Your Life
About the Author
MARC GOODMAN has spent a career in law enforcement and technology. He was appointed futurist-in-residence with the FBI, worked as a senior adviser to Interpol, and served as a street police officer. As the founder of the Future Crimes Institute and the Chair for Policy, Law, and Ethics at Silicon Valley’s Singularity University, he continues to investigate the intriguing and often terrifying intersection of science and security, uncovering nascent threats and combating the darker sides of technology.
Excerpt. © Reprinted by permission. All rights reserved.
Connected, Dependent and Vulnerable
Technology…is a queer thing; it brings you great gifts with one hand and it stabs you in the back with the other.
-- CHARLES PERCY SNOW
Mat Honan’s life looked pretty good on-screen: in one tab of his browser were pictures of his new baby girl; in another streamed the
tweets from his thousands of Twitter followers. As a reporter for Wired magazine in San Francisco, he was living an urbane and connected life and was as up-to-date on technology as anyone. Still, he had no idea his entire digital world could be erased in just a few keystrokes. Then, one August day, it was. His photographs, e-mails, and much more all fell into the hands of a hacker. Stolen in just minutes by a teenager halfway around the world. Honan was an easy target. We all are.
Honan recalls the afternoon when everything fell apart. He was play- ing on the floor with his infant daughter when suddenly his iPhone pow- ered down. Perhaps the battery had died. He was expecting an important call, so he plugged the phone into the outlet and rebooted. Rather than the usual start-up screen and apps, he saw a large white Apple logo and a mul- tilingual welcome screen inviting him to set up his new phone. How odd.
Honan wasn’t especially worried: he backed up his iPhone every night. His next step was perfectly obvious—log in to iCloud and restore the phone and its data. Upon logging in to his Apple account, he was informed that his password, the one he was sure was correct, had been deemed wrong by the iCloud gods. Honan, an astute reporter for the world’s preeminent
technology magazine, had yet another trick up his sleeve. He would merely connect the iPhone to his laptop and restore his data from the hard drive on his local computer. What happened next made his heart sink.
As Honan powered up his Mac, he was greeted with a message from Apple’s calendar program advising him his Gmail password was incor- rect. Immediately thereafter, the face of his laptop—its beautiful screen— turned ashen gray and quit, as if it had died. The only thing visible on the screen was a prompt: please enter your four-digit password. Honan knew he had never set a password.
Honan ultimately learned that a hacker had gained access to his iCloud account, then used Apple’s handy “find my phone” feature to locate all of the electronic devices in Honan’s world. One by one, they were nuked. The hacker issued the “remote wipe” command, thereby erasing all of the data Honan had spent a lifetime accumulating. The first to fall was his iPhone, then his iPad. Last, but certainly not least, was his MacBook. In an instant, all of his data, including every baby picture he had taken during his daugh- ter’s first year of life, were destroyed. Gone too were the priceless photo- graphic memories of his relatives who had long since died, vanquished into the ether by parties unknown.
Next to be obliterated was Honan’s Google account. In the blink of an eye, the eight years of carefully curated Gmail messages were lost. Work conversations, notes, reminders, and memories wiped away with a click of a mouse. Finally, the hacker turned his intention to his ultimate target: Honan’s Twitter handle, @Mat. Not only was the account taken over, but the attacker used it to send racist and homophobic rants in Honan’s name to his thousands of followers.
In the aftermath of the online onslaught, Honan used his skills as an investigative reporter to piece together what had happened. He phoned Apple tech support in an effort to reclaim his iCloud account. After more than ninety minutes on the phone, Honan learned that “he” had just called thirty minutes prior to request his password be reset. As it turns out, the only information anybody needed to change Honan’s password was his billing address and the last four digits of his credit card number. Honan’s address was readily available on the Whois Internet domain record he had created when he built his personal Web site. Even if it hadn’t been, dozens of online services such as WhitePages.com and Spokeo would have pro- vided it for free.
To ascertain the last four digits of Honan’s credit card, the hacker guessed that Honan (like most of us) had an account on Amazon.com. He was correct. Armed with Honan’s full name and his e-mail and mailing addresses, the culprit contacted Amazon and successfully manipulated a customer service rep so as to gain access to the required last four credit card digits. Those simple steps and nothing more turned Honan’s life upside down. Although it didn’t happen in this case, the hacker could have just as easily used the very same information to access and pilfer Honan’s online bank and brokerage accounts.
The teenager who eventually came forward to take credit for the attack—Phobia, as he was known in hacking circles—claimed he was out to expose the vast security vulnerabilities of the Internet services we’ve come to rely on every day. Point made. Honan created a new Twitter account to communicate with his attacker. Phobia, using the @Mat account, agreed to follow Honan’s new account, and now the two could direct message each other. Honan asked Phobia the single question that was burning on his mind: Why? Why would you do this to me? As it turns out, the near decade of lost data and memories was merely collateral damage.
Phobia’s reply was chilling: “I honestly didn’t have any heat towards you . . . I just liked your [Twitter] username.” That was it. That’s all it was ever about—a prized three-letter Twitter handle. A hacker thousands of miles away liked it and simply wanted it for himself.
The thought that somebody with no “heat” toward you can obliterate your digital life in a few keystrokes is absurd. When Honan’s story appeared on the cover of Wired in December 2012, it garnered considerable atten- tion . . . for a minute or two. A debate on how to better secure our every- day technologie ensued but, like so many Internet discussions, ultimately flamed out. Precious little has changed since Honan’s trials and tribula- tions. We are still every bit as vulnerable as Honan was then—and even more so as we ratchet up our dependency on hackable mobile and cloud- based applications.
As with most of us, Honan’s various accounts were linked to one another in a self-referential web of purported digital trust: the same credit card number on an Apple profile and an Amazon account; an iCloud e-mail address that points back to Gmail. Each had information in common, including log-on credentials, credit card numbers, and passwords with all the data connected back to the same person. Honan’s security protections amounted to nothing more than a digital Maginot Line—an overlapping house of cards that came tumbling down with the slightest pressure. All or most of the information needed to destroy his digital life, or yours, is readily available online to anybody who is the least bit devious or creative.
Progress and Peril in a Connected World
In a few years’ time, with very little self-reflection, we’ve sprinted headlong from merely searching Google to relying on it for directions, calendars, address books, video, entertainment, voice mail, and telephone calls. One billion of us have posted our most intimate details on Facebook and will- ingly provided social networking graphs of our friends, family, and co- workers. We’ve downloaded billions of apps, and we rely on them to help us accomplish everything from banking and cooking to archiving baby pictures. We connect to the Internet via our laptops, mobile phones, iPads, TiVos, cable boxes, PS3s, Blu-rays, Nintendos, HDTVs, Rokus, Xboxes, and Apple TVs.
The positive aspects of this technological evolution are manifest. Over the past hundred years, rapid advances in medical science mean that the average human life span has more than doubled and child mortality has plummeted by a factor of ten. Average per capita income adjusted for infla- tion around the world has tripled. Access to a high-quality education, so elusive to many for so long, is free today via Web sites such as the Khan Academy. And the mobile phone is singularly credited with leading to bil- lions upon billions of dollars in direct economic development in nations around the globe.
The interconnectivity the Internet provides through its fundamental architecture means that disparate peoples from around the world can be brought together as never before. A woman in Chicago can play Words with Friends with a total stranger in the Netherlands. A physician in Bangalore, India, can remotely read and interpret the X-ray results of a patient in Boca Raton, Florida. A farmer in South Africa can use his mobile phone to access the same crop data as a PhD candidate at MIT. This interconnect- edness is one of the Internet’s greatest strengths, and as it grows in size, so too does the global network’s power and utility. There is much to celebrate in our modern technological world.
While the advantages of the online world are well documented and frequently highlighted by those in the tech industry, there is also a down- side to all of this interconnectivity.
Our electrical grids, air traffic control networks, fire department dis- patch systems, and even the elevators at work are all critically dependent on computers. Each day, we plug more and more of our daily lives into the global information grid without pausing to ask what it all means. Mat Honan found out the hard way, as have thousands of others. But what should happen if and when the technological trappings of our modern society—the foundational tools upon which we are utterly dependent—all go away? What is humanity’s backup plan? In fact, none exists.
Product details
- Publisher : Anchor; Reprint edition (January 12, 2016)
- Language : English
- Paperback : 608 pages
- ISBN-10 : 0804171459
- ISBN-13 : 978-0804171458
- Item Weight : 14.8 ounces
- Dimensions : 5.2 x 1.02 x 7.97 inches
- Best Sellers Rank: #201,684 in Books (See Top 100 in Books)
- #115 in Computer Hacking
- #145 in Computer Network Security
- #162 in Social Aspects of Technology
- Customer Reviews:
About the author
Marc Goodman has spent a career in law enforcement and technology. He was appointed futurist-in-residence with the FBI, worked as a senior adviser to Interpol, and served as a street police officer. As the founder of the Future Crimes Institute and the Chair for Policy, Law, and Ethics at Silicon Valley’s Singularity University, he continues to investigate the intriguing and often terrifying intersection of science and security, uncovering nascent threats and combating the darker sides of technology.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The Internet is a wonderful thing. It has dramatically changed our lives, and created a number of opportunities for honest people to connect with each other in meaningful (and, admittedly, in less so meaningful) ways.
But it has a dark side. And it turns out we are much more vulnerable to it than we realize.
Marc Goodman, the FBI’s resident futurist, details the myriad ways in which we don’t understand the internet. More importantly - and horrifyingly - he explains how our ignorance is hurting us. From the data collection capabilities and distribution practices of our most trusted websites (think Google and Facebook), to data brokers who buy and sell that information indiscriminately, to the seedy underworld of crime that flourishes in router-enabled anonymity, I had no idea what I was opening myself up to every time I opened my web browser.
The Internet isn’t going away. In fact, it’s only going to become more ubiquitous. In the next decade billions of new devices will go online. Data will be streamed from your lightbulbs, your refrigerator, you front door, your wristwatch, and even the inside of your body.
As of right now, that data is visible to anyone who is willing to download the right illicit ap.
It’s also manipulatable.
Can you trust the data you see on your screens? Can you be sure that someone isn’t live streaming you from your own camera? Has your computer been infected with malware that is logging your every keystroke and shipping it directly to identity thieves in Kiev?
These are questions that it feels crazy to ask. I didn’t even think about them before reading this book. But after reading, I have no other choice but to reevaluate my relationship to the Internet. Because it turns out (again) that I don’t have any idea what’s going on.
This book will give you a look into worlds that you didn’t know existed. You won’t like what you see. You may never feel the same way about Wi-Fi again. Internet security (or the present lack of it) is intimately connected with our lives. This book didn’t make me happy. But I am very glad I read it, because sometimes what you don’t know can hurt you.
Technological progress is here, and accelerating faster than anyone can imagine. This book might help you survive it.
Future Crimes by Marc Goodman is a very scary book. We have covered some books that touch on the topic before such as “Filter Bubble”, “Overconnected” and “Brandwashed”, but “Future Crimes, a journey to the dark side of technology and how to survive it” is an eye opener.
The scary statistics
Lets start with some scary statistics:
200,000 new pieces of malware are identified every day
One third of all households in the USA are infected by malicious software
95% of all malware is not detected by most virus checkers (those include McAfee and Symantec)
A hacking intrusion takes 210 days to detect
75% of the time your defences can be penetrated in minutes
Only 15% require more then a few hours (but are still hacked)
The average cost per record stolen is $ 188
In 2017 a 100 billion will be spend on software and hardware security
110 million accounts were stolen from Target stores alone
The value of location data will be over a 100 billion in the next ten years
Android was created to give Google access to all your mobile data
Data brokers earn 156 billion every year
Acxiom has over 700 million consumer profiles worldwide
Experian sold the data on 2/3 of the USA population to a organised crime group in Vietnam
13.1 million Americans are victim of identity theft annually. 500,000 of them are children, costing $ 21 billion in 2012
600,000 accounts on Facebook are compromised every day
25% of all reviews on Yelp are bogus
11.2% of Facebook accounts are fake
25% of all credit reports contain errors
100 million phishing messages are send every day
Organised crime is 15-20% of global GDP
80% of all hackers are now working or organised crime
Kickstarter was hacked
Everything is data
You can see where this is going. This is all about data. Google and Facebook are free because they are data collectors and aggregators. Google is worth 400 billion and the value of every long term profile on Facebook is worth 81 dollars. Both have hundreds of petabytes on their users (both don’t use the word customers…. this should make you thinks). They know everything you have done online and increasingly everything else. Imagine if Facebook was there since 1950. Anything in your past you don’t want anyone to know?
No privacy
In the USA online data that is collected by third parties are not considered private. Which means it can be used by Revenue, the police or the divorce lawyer of your ex. The Stasi could only tap 40 phones nationwide at their peak. Now Orwell’s 1984 is here and it is called Google, Facebook or Watson. You probably have something to hide, you just don’t know it yet.
All that date is stored and hacker can get access to that data. Any data that is collected will invariably leak.
Do no evil?
Yes, the crooks are not only the criminals:
41% of all cyber attacks are from China
The NSA is listening
Google used the street view cars for more then taking pictures
Google was fined $22.5 million for illegally circumventing privacy settings
When you fill in your online profile for OKcupid, that data is immediately shared with over 5o0 data brokers. Check your match.com terms and conditions
Facebook has conducted social experiments without permission and keep your data even after you have de-activated the account.
Every time you update, the privacy settings go back to standards setting, which basically gives full access
The average person will encounter 1,462 privacy policies every year, with an average length of 2,518 words
PayPal’s privacy policy is longer then Shakespeare’s Hamlet
Google Drive’s privacy settings will give Google the rights to all your content and IP (If JK Rowling had written Harry Potter on Google Docs, she would have granted Google the worldwide rights)
Think of what can be done. Google has access to your calendar, your maps, your contacts, your documents, your pictures, voice, phone, the apps you use on your android, your translations, the videos you watch on Youtube, the conversations you have on Skype, your Nest, your camera, your eyes (Google glasses), your wallet. Look at the companies they are buying (robots, cameras, sensors, drones, AI). Here is the list.
You are their inventory. They better mean their slogan…… because if not….....
Your eyeballs can be hacked too
That is just on the data side. They can also hack your screen. Which means that you should not always belief what you see. Your phone screen might be controlled by somebody else. The CT scanner in the hospital can be manipulated. Your computer screen can be manipulated. Your GPRS screen can be manipulated. Virtual reality can be manipulated. Facebook has already manipulated you and Google can change your filter bubble with the flick of a switch (or algorithm).
Everything can be hacked
Everything that is connected can be hacked. And now we are at the beginning of the internet of things. Connecting everything. Which means that nothing can be hidden and everything can be hacked. Software and hardware. There are hardware viruses in chargers that allow to hack your phone. They found hidden wifi cards in kitchen equipment that could hack your wifi (and then the rest). You car can be hacked. Your pacemaker. Your hearing aid. Your headset. Your toys. Your lamp or your lightbulb (it is called Conversnitch). Your TV or Skype camera (they are watching you). Your coffee pot. Your burglar alarm. Your electronic locks. Your fridge. Your wearables. Google’s NEST has been hacked.
70% of all IoT devices have 25 unique security flaws.
If you are in business
Photocopiers can be hacked and I bet you didn’t know that photocopiers also have an internal hard disk where all copies are stored. Amazing what you can find on copiers that have been thrown away. Your printer can be hacked. The video conference system in your board room can be hacked.
If you are in government
Your infrastructure (energy, roads, water, broadband) can be hacked. Your databases (passports, police, medical, revenue) can be hacked. Your satellites can be hacked. In fact criminals are already launching their own mini satellites themselves.
The future of hacking
Robots can be hacked. Your servant robot will be sharpening the knife, while you are asleep, watching you. Your augmented body parts can be hacked. Your biometrics can be hacked. Facial recognition algorithms can be hacked. Facebook has the largest depository of biometric data on earth. They can be hacked. Keystroke recognition software can be hacked (Coursera uses keystroke recognition as a tool to identify users). Augmented reality can be hacked. Drones can be hacked. Your 3D and 4D printer can be hacked. Algorithms can be hacked. Now combine that with AI and the exponential curve. Watson as the new Al Capone or Don Watson.
Brain, DNA, Quantum, IoB, nano
Consider.......
Consider the development in brain computing interface (look up Emotiv and NeuroSky). IBM thinks that mind reading is no longer science fiction. Criminals soon can hack your brain.
Consider the development in DNA sequencing and synthetic biology. Your cells can be hacked. The DNA database probably already has been hacked. Combine that with bio printers and you have.
Consider the development of quantum computers, which will making hacking easier.
Consider the development of not only the Internet of Things but the network of microbes or the internet of biological things.
Consider the developments in nano technology. Nano bots can be hacked too.
Combine these development together and through exponentially on top of it and you have a potent mix for criminal armageddon or an exponential version of 1984.
Tips
At the end of the book he does give a number of tips on how to help you to protects yourself and they are very obvious:
Update regularly
Use sophisticated and different passwords
Know where you are downloading from
Watch your administrator settings
Turn off your computer when you are not using it
Encrypt
Think before you share
The above avoids 85% of all threats.
New words
The indication of a good books is the number of new words I learned:
Hacktivist (activist using hacking as a tool)
Crime singularity
Dataveilance (surveillance using data)
Sock puppetry (creating fake profiles)
Swatting (GPRS manipulation)
Flash rob (coordinated robbery by hackers)
CaaS (Crime as a Service)
Bluesnarfing (hacking your bluetooth to get access to your data)
Drone-versiting (drones as an advertising medium)
Narco drones (drones smuggling and transporting drugs)
Chemputer (printing medicine (or drugs))
Algorithmic criminal justice (using algorithms to determine infractions of the law)
DNA stalkers (hackers stalking your DNA)
DNA hard drive (four grams of DNA can store one year of digital data created by humankind)
Shodan (the criminal version of Google)
Business opportunity
If you want a book that makes you think about the unintended consequences of technology, this is one to pick. It also screams business opportunity. Cyber security is a hotspot.
Top reviews from other countries
Anyone with a pulse & ability to read SHOULD READ THIS BOOK! It's very timely & eye opening.
If you aren't afraid of the truth than this book is for you!
If you wish to know what to prepare/expect for than this book is for you!
If you think you have all your bases covered than this still is the book for you!
You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to believe. You take the red pill, you stay in Wonderland, and Marc Goodman will show you how deep the rabbit hole goes. Thank you, Marc Goodman, for the "red" pill: Future Crimes.
Nuf Said! Read the book already!