One of the world's leading authorities on global security, Marc Goodman takes listeners deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you - and how this makes everyone more vulnerable than ever imagined.
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: Our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims' every move. We all know today's criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that's just the beginning. To date, no computer has been created that could not be hacked - a sobering fact given our radical dependence on these machines for everything from our nation's power grid to air traffic control to financial services.
Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today's Internet is the size of a golf ball, tomorrow's will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car's brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.
With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes listeners on a vivid journey through the darkest recesses of the Internet.
©2015 Marc Goodman (P)2015 Randon House Audio
"OMG, this is a wakeup call. The outlaws are running faster than the architects. Use this book to shake up the companies you buy from, the device makers, telecom carriers, and governments at all levels. Demand that they pay attention to the realities of our new world as outlined within this thorough and deep book. Marc Goodman will startle you with the ingenuity of the bad guys. I'm a technological optimist. Now I am an eyes-wide-open optimist." (Kevin Kelly, co-founder of Wired Magazine and best-selling author of What Technology Wants)
"The hacks and heists detailed in Future Crimes are the stuff of thrillers, but unfortunately, the world of cybercrime is all too real. There could be no more sure-footed or knowledgeable companion than Marc Goodman on this guided tour of the underworld of the Internet. Everyone - and the business world especially - should heed his advice." (Daniel H. Pink, New York Times best-selling author of Drive and To Sell is Human)
I really enjoyed the book. Some of my peers thought the content was dry - others are really enjoying it. I read along while listening to book on Audible fond that to be very helpful.
Some startling stories. Some must know info for parents and any social media or mobile users.
I was aware of a lot of the content, perhaps not to the depth in some cases. I am a little shocked at how little awareness on most of the topics that some family and friends have. This book gave me some good conversation starters and has influenced my e-Behavior in a positive way.
I would recommend this book.
A true and thrilling story of bad guys taking-over humanity through our own inventions
We are not customers but, we are a product
The author begins Future Crimes talking about some of the most famous data thefts where big corporations have been targeted. He demonstrates, not only private and public entities are their targets but also, individual are not safe. Author gives a detailed account of how a Wired journalist was targeted and lost control of his iPhone, iPad, and almost everything that was connected to these devices. He points out that with changing social dynamics, people are increasingly becoming comfortable to share critical information about themselves on the social networks. This information is very instrumental to target them and their loved once for all kinds of minor and major crimes. Moreover, it is not just the attackers that we need to be wary of. It is also the social media corporations and (so called) legitimate agencies who uses our information shared in good faith for profits and often against us.
Particularly, in You’re Not the Customer, You’re the Product, his example of the PatientsLikeMe website will rob you of all the belief that you have placed on forums and networks as related to the privacy of the information you share on sites like these. The author narrates an example where all the patients’ information about their experiences and illnesses were mined by an unauthorized Nielsen company bot, which could be later sold to insurance companies that will decide your premiums based on the ‘confidential’ information and make numerous other decisions about the service and offers you receive.
Big data can bring you the best of products and help companies come up with just the solution you need. But this same data can kill you, literally. The 2008 Mumbai terrorist attack was unique because the attackers used real-time data compiled from multiple sources. Updates that people like you and me shared, helped orchestrate one of the most violent and prolonged terrorist attacks in the world.
Technology brings new and exciting ways to make our lives more efficient and easy. But it also provides as many ways to make it miserable. From vulnerable online banking to smart homes that could be hacked and controlled at whims of a teenager sitting thousands of miles away, everything connected to the grid is exposed to an attack. Electric grids, water treatment plants, Dam gates can be accessed and attacked with devastating results – remember the Fire Sale concept in Die Hard 4? It is not just fiction, there is a possibility of that happening.
All the information in the book is true. But the author tells these horrifying stories in a style befitting a thriller. You will read about the crimes that you have read in newspapers and about those that never surfaced in the public glare. You will read about crimes that are waiting to happen. Are you thrilled about the new app that controls your house temperature and warm it before you reach home on a cold afternoon? Well, be also aware that this same technology can be used to start a fire and prevent to fight it in time.
He makes his points well, how Internet of things, (nano) robotics, steatites, cognitive computing, advanced medicines, 3D printing and many more of new age technologies are not only enabling normal individuals for more convenient lives but also making is a matter of convenience of freaks to launch an advanced attack against the entire humanity and our planet. Nuclear bombs may the most devastating discoveries in past which can be used to wipe-out the entire human race however, nations need to accept the hard reality, any of the above new technologies can be used to result similarly or may be worse devastating effects on our planet. It is time to make a yet another non-proliferation treaty to restrict the misuse of these technologies.
Throughout and in the concluding chapters, the author has proved promising ways and options for all of us to be able to avoid the discussed technology abuse and disasters. At one point, the future may look very grime due to these technologies, the author explains, the choice is in all of our hands to overcome yet another watershed moment for humanity by acting responsibly rather than short-term greed.
This book looks at EVERY aspect of every possible computer use, from the devices we use everyday, to the deep web, to interfaces with medicine and biology. The author provides many examples of how technology looks when done right and goes wrong. Eye-opening and detailed. Told in a gently authoritative and calm voice, which is credit to both author and narrator. Very highly recommended!
A great listen with the perfect narrator that brings out the serious and worrying tone from the pages to your mind. Only downer for me was that I wished some topics were talked about in even more depth, but that would nearly double this already lengthy book.
After reading this book it's going to be hard to sleep at night! Excellent book I would highly recommend this to anyone that has a phone computer or tablet and wants to know what's coming next in the Internet of things.
So many references to current issues that have occurred.
accuracy and sequential explanation of where we are and where we are going with internet.
I have recommended this to my friends that especially are techy.
I would be nice if the tips and tricks for protecting yourself could be spread through the whole book. Now it's just at the end, which is good also I guess.
This book was informative. Being a security professional myself it's a great refresher and informational. There were things that I was not aware of. I would recomend this book to any reader that is interested in protecting their privacy.
Marc Goodman lays out a wide range of opportunities for bad actors to do very bad things in the "internet of things." Trouble is, we'll never catch up. We're looking at a perpetual cat and mouse game.
Report Inappropriate Content