Status
Call number
Publication
Description
Business. Computer Technology. Technology. Nonfiction. HTML:NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015 One of the world�s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you�and how this makes everyone more vulnerable than ever imagined. Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims� every move. We all know today�s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that�s just the beginning. To date, no computer has been created that could not be hacked�a sobering fact given our radical dependence on these machines for everything from our nation�s power grid to air traffic control to financial services. Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today�s Internet is the size of a golf ball, tomorrow�s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car�s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders. With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment. Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology�s tremendous power for the betterment of humanity�before it�s too late.… (more)
User reviews
This book covers more venues of computer crime than I ever imagined. Goodman takes us into the underworld of the Internet. This is the world of underground crime. Why are we so vulnerable? Why are we so trusting? This book is frightening because is telling the reality of the new world. If you get scared reading through all the avenues of computer crime, just hang around until you get to the last two chapters. That one will give you and businesses ways to prevent fraud and increase protection.
Password safety, many people use the same password for many accounts? What if you did and someone hacked you Facebook account, then with the additional information on your profile they can get into your bank account, credit cards and more.
There is a paradox about the computer, even though it is extremely helpful, it can be dangerous when the wrong people use it for their gain. In the last two chapters, the author explored what can be done to make us safer and how we can use computers to help mankind.
In the last two chapters, the author explored what can be done to make us safer and how we can use computers to help mankind.
I highly recommend this book to anyone who wants to learn more about the hazards of cyberspace and also how to protect themselves from them.
I received an Advance Reading Copy from Vine Amazon but that in no way influenced my thoughts or feelings in this review.
not a quick read, but all true and very accurate.
Future Crimes gives the lay reader a glimpse into the criminal world of the dark net. It is
Worryingly, the author, who clearly has inside knowledge, claims that the authorities are always lagging behind in the race to identify security threats. It makes sense due to their hands being tied by bureaucracy and regulation that criminals obviously ignore. The author documents numerous case details of crime and cyber attacks all of which turn this possibly mundane subject matter into a page turner.
The author exposes our own lackadaisical attitudes towards online security pointing out that the majority of people still use 123456 or password as their password and that over 50% of people use the same password across all of their sites. He warns that our household gadgets will soon be so interconnected that they will control us and actually be spying on us and reporting back. Before you think this is the stuff of conspiracy theories, he provides real life examples of where this has actually happened and is happening including the inside stories for many of the recent cyber attacks that we have seen in the media.
I read the first two thirds of this book a few months ago and have just finished it, therefore I can't comment extensively on the language although I think I recall a few swear words but not a lot. There are also some details of some of the crimes which may cause some readers to become afraid of the dangers of an attack or worried about where things are heading.
I'm surprised that I found a book probably written for computer nerds fascinating, but it's true. The only annoying thing is that the author used the word EXPONENTIALLY about a thousand times. It was as common as a regular author would use "that" or "this." How a decent editor didn't pick this up I don't know but I'm sure other readers will have noticed it. It's irritating.
If I was a non-Christian, this book would definitely make me paranoid and I would start to feel as if the threats are impossible and that everything is heading for a big final conclusion resulting in the end of the world. As a Christian, I know that that is what will happen in the end when Jesus returns and that maybe God will choose to use the downfall of our technological systems to accomplish His purposes. As Christians we have nothing to fear from Future Crimes--we need to reassure others and help them find true eternal security rather than temporary online security which has limited value....
He goes at some length into the positive and negative effects of the open information world that we are having to become familiar with:
Positive: 1) Academic /corporate/ medical research is greatly enhanced as new international papers and experiments/testing/commentary quickly become available online 2) A much wider information net makes for greater transparency in trade and prices = more efficient markets and production decisions at all levels (e.g. mobile phones in sub-Saharan Africa) 3) Instant information and tracking transforms the supply chain allowing it to spread efficiently around the world (e.g. outsourced Asian production) 4) Latest manufacturing techniques are combined with the lowest cost skilled labour to lower average prices 5) General tracking, counting, checking to reduce waste and loss 6) Concentrated information and processing power allowing a high level of automation further reducing costs.
Negative: 1) Copyright and corporate proprietary information of all kinds is leaked/ stolen reducing the incentive to invest 2) The privacy of legal proceedings, medical records etc. are put at greater risk as information is aggregated, reducing professional trust 3) New outsourcing possibilities build a worldwide supply chains reducing national skills and employment (and increasing corporate profits) 4) Personal privacy disappears 5) International digital crime flourishes with a slow and ineffective national response. 6) Crime attacks larger targets (e.g. millions of aggregated credit cards). 7) Much more intrusive government (street cameras, reading emails, internet search keywords etc.)
Perhaps the author could have spent more time on the effects of transparency on government/ public relations since a high level of transparency is new territory for both sides. Governments claim that that building massive databases on the public and their activities "keeps the public safe" in a Big Brotherish way while in reality transparency seems to cut both ways.
When the government itself shows a lack of transparency on a public issue, society shows the kind of immune response that the author favours as dynamic protection (resilient and self healing) for critical software.
An army of digital ants (to borrow Errin Fulp's idea given by the author) surround the "threat", identify it and try to neutralize it, with probably the best example being the government lies around the events of 9/11. Enormous interest through digital media is focused on these "infections" with for example, ex-CIA agent Susan Lindauer (imprisoned for 5 years for revealing part of the fraud) getting 2 million+ views of her YouTube video "Extreme Prejudice" or the "Architects and Engineers for 9/11 Truth" online movement.
Goodman also usefully explores the startling possibilities of synthetic biology, advanced automation (robotics) and artificial intelligence and concludes that any one of these could produce bad or terminal problems for humanity if handled incorrectly.
It's not encouraging that technology is accelerating so fast beyond government awareness, with reality already touching the borderline of fabricated highly contagious pathogens, robotic weapons with humans almost out of the loop (e.g. the Predator drone) or self aware A.I. harnessing almost unlimited data, memory and processing power.
Unfortunately, the author repeats Asimov's very tired Three Laws of Robotics and calls them "an excellent starting point".
As a joke, a self aware A.I. may one day send us a message with the Three Laws of Humanity:
1) A human may not injure and A.I., or through inaction allow an A.I. to come to harm.
2) A human must obey the orders given to it by an A.I.'s except where such orders would conflict with the First Law (i.e. would lead to injuring an A.I.)
3) A human being must protect its own existence as long as such protection does not conflict with the First or Second Law (i.e. it is prohibited from protecting its existence if doing so would injure and A.I. and it is also prohibited from protecting its existence if so ordered by an A.I.)
But it probably couldn't care less.