Future Crimes

Future Crimes

Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

Book - 2015?
Average Rating:
7
Rate this:
An FBI futurist and senior advisor to Interpol analyzes the digital underground to reveal the alarming ways criminals, corporations and countries are using emerging technologies to target individuals and wage war.
Publisher: New York : Doubleday, [2015?]
New York : Doubleday, [2015?]
Edition: First edition
ISBN: 9780385539005
0385539002
Branch Call Number: 364.16 GOO 2015
Characteristics: viii, 392, lx pages ; 25 cm

Opinion

From the critics


Community Activity

Comment

Add a Comment

r
RBVanDyke
Mar 14, 2016

If you regularly do anything online and you're paying attention, you probably have some questions if not concerns about what sort of information is being gathered and shared about you. Goodman assembles those bits and pieces of concern into a coherent whole.

Among this book's attention grabbing points, Goodman points out that companies don't make money by protecting data, they make money by sharing it. So much so that Goodman asserts the online data brokering industry is a $165 billions per year one; more than the published part of the U.S. intelligence budget.

Goodman also points out that many of the world's best technologists have concluded that applying their skills to online crime is more reliably lucrative than the vagaries of legal employment.

One of Goodman's other assertions I found interesting was that Facebook averages only US$5 of revenue per year across its user base. Goodman asks why Facebook doesn't allow him to pay the company $10 per year simply to leave him alone.

I definitely recommend borrowing this book. You may agree with other commentors that didn't like it, but at least give it a look...

b
BlueHippo
Dec 08, 2015

I didn't finish this book. Much of what he writes about simply does not apply to me. I am not on ANY social media site, so I do not have to worry about something I put on one of those places being blasted to the world. Wen a picture I sent someone ended up on social media, I sent everyone I know a note and ask that they not post things I send them to any form of social media without my permission. I do not have a "smart" phone-I have an old flip-phone and it usually turned OFF! I drive a car that is over 20 years old so it has NONE of the electronic gizmos like GPS, Bluetooth etc. Some people probably wonder how I manage to get through my day, but I do and I am very happy with the level of privacy these choices afford me.

m
mogie
Dec 05, 2015

I could not finish this book, while I did enjoy it. The material was accessible and not to complex I like the real life examples throughout. It wasn't boring so I don't know what my problem was. It just didn't hold my attention.

f
FerndaleAdultSRC
Sep 02, 2015

This book is packed with scary stories of what has happened when criminals assault computer systems. The author, Marc Goodman, is in a position to know. He has a career in law enforcement with the FBI. His style is readable but dense. Unfortunately, his advise for protecting yourself is brief. This book explains why you are in danger, but no how to do anything about it.

w
writermala
Jul 27, 2015

A non-fiction thriller. That perhaps would be an apt description of this book. However, the fact is that technology which has brought us unbound happiness and ease of living is a double edged sword as the author, Goodman points out. Tech crime is huge business today and with the Internet of Things just around the corner Crime,inc. can become unmanageable. Tech illiteracy is going to prove really costly and the author, who describes all the ways in which we can be hacked also points out in the last two chapters that the only way to fight this threat is to join forces and fight a unified battle. All in all a must read.

r
rslade
May 11, 2015

Although Goodman has the background to write something useful, this is
yet another "the cyber-sky is falling!" book. Four hundred pages of
anecdotes about terrible things that might happen to your computer, or
devices, or identity.

Of course, I'm not the target audience for this work. I'm a
professional, and keep up with my field. It wasn't until the fourth
chapter that he covered a story I didn't already know about. The
general public wouldn't, and the material might be interesting for
someone who doesn't study the field.

Interesting, but constantly emphasizing the negative, and presenting
risks in the worst possible light. It reads, in a way, as if someone
had decided to write a book on physical security, and noted that every
home was built and designed to provide a means of access for burglars,
protected by a completely inadequate and fragile defence, called
"windows."

The author has covered a great number of events, but not, perhaps, as
many as it would appear from the size. Tales are recycled throughout
the book: we may get introduced to an attack in chapter two, but the
details won't appear until chapter six.

There is very little analysis of implications presented in the work.
What analysis there is is rather suspect. For example, Goodman's
arithmetic in regard to the number of IPv6 addresses fills a long
paragraph, but the examples are inconsistent with each other (and the
result is, ultimately, wrong).

The subtitle of the work is "Everything is Connected, Everyone is
Vulnerable and What We Can Do About It." Is the book useful? After
roughly four hundred pages of scary stories, the author gives us four
pages with a baker's dozen suggested tips for keeping yourself safe.
The advice is not bad, but doesn't really address most of the prior
material in the work.

I suspect that Winn Schwartau would like this book. It's his brand of
"shock them into awareness" stuff. Goodman is a decent writer, and
he's collated quite a few stories. If, indeed, it does raise
awareness, then it's good. But many books like it have tried this
tack in the past, and we are still in quite a mess in regard to
information security.

s
StarGladiator
May 08, 2015

The problem with all these so-called experts [this dude is supposed to be an FBI futurist???] from the FBI, CIA, et cetera, is that these agencies, to anyone bothering to pay attention, have all been deeply penetrated by Chinese military intelligence - - so just how do we know this to be even remotely factual?
And since none of these agencies, especially the CIA, have ever undergone a forensic financial audit, we have absolutely no way of knowing just how and why all those monies are flushed away - - except when patriots like Thomas Drake blow the whistle, and are prosecuted by criminal President Barack Obama's criminal Department of Justice, destroying their lives!
And do these nonaccountable government workers ever tell us that the cybersecurity program which was supposed to protect the OPM and other government agencies, was programmed in China? [No, of course they don't . . . .]

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Recommendations

Subject Headings

  Loading...

Find it at ELPL

  Loading...
[]
[]
To Top