Reviews

Future Crimes by Marc Goodman

sam_brown's review against another edition

Go to review page

5.0

Eye-opening, even for a techie.

Brilliant summary of the state of the cyber world today. I'd recommend this book to anyone who is sceptical of the seemingly impossible things we hear in the media about cyber criminals and warfare. Almost every poignant note made by the author is backed-up by credible and accessible sources - but a warning to the curious; this may mean it takes you several times longer to finish the book..!

happyglowlucky's review against another edition

Go to review page

5.0

I was so pleased to win a copy of this book through Goodreads, because security, online, and on my phone, is something I really wanted to know more about. One of the things I love about this book is that it takes what could be a rather dry topic, and actually makes it interesting to read. The topic might be a bit dry, but the book is not.

The only problem is that once you read this book, you can't un-know all the things you've learned! :-) Okay, kidding, but, seriously, it is scary to realize how vulnerable we all are. Here we are, thinking we're pretty safe, and this book illustrates that not only is that not true, but things are going to get worse. But, the thing is, you have to be educated about these things, and it's important to know about them - even if they do scare you a bit.

Technology has moved so fast, and so have criminals, but we haven't. That, to me, is one of the things I really took from this book.

Frankly, anyone with a computer or phone should read this book, and educate themselves.

khveronika's review against another edition

Go to review page

4.0



Did you know that the technology to simply control gadgets (like your Google Glass) with your thoughts already exists? Did you hear about the 2013 story of electronic teakettles and irons manufactured in China that spread a virus to all your electronic devices through WiFi? :D Or that we'll be able to literally "bring back to life" died-out species like the mammoth, the dodo or the Tasmanian tiger? Or how about that the swine flu suddenly reemerged in 1977 after being dead for 20 years, just because of a lab accident? These and so many more fascinating little facts was what I was able to pick up during the reading experience of "Future Crimes", so if that sounds compelling to you, read on to find out a bit more about this book ;)

I have started this brick of a 600+ page book in an ebook format but finally decided to also purchase it in its paperback version because it was simply so full of such important and relevant information, that I wanted to have it on my bookshelf, to be able to re-read certain parts from time to time (I think the amount of post-its you can see on the photo visualises it perfectly :D ). For me this book instantly got filed into the category of "all time favourites" and I'd see it as a must-read for everyone. Yes, everyone. Even those people who always used to say that they don't care about what happens to the data accumulated about them because they have "nothing to hide":
"But 'I have nothing to hide' is absolutely the wrong way to think about our new dataveillance society. [...] If proponents of the 'nothing to hide' argument meant what they said, then they would logically not object to our filming them having sex with their spouses, publishing their tax returns online, and projecting video of their toilet use on the Jumbotron of a crowded stadium, right? After all, they have nothing to hide. [...] Given that Google and Facebook alone have hundreds of petabytes of data on their users stored in perpetuity, perhaps it is more worthwhile to question not what any of us may have to hide today but what we might wish to keep private in the future [...]." (p. 110)

I have gotten through the book in just about 2 weeks, it having grabbed my interest firmly and I definitely learned a lot of new things. I really enjoyed its structure, the clear separation in three bigger parts and different chapters. Thanks to that and even though it's so expansive, you're able to keep an overview all throughout the reading experience. The style was factual and easily understandable, which was very pleasant for someone who isn't an expert on the topic. Some of my favourite quotes (among the hundreds of others :O ) were the ones where it was illustrated how IT specialists and us "regular" people simply seem to speak two different languages. Creating a common and an easily understandable one being an important step towards better cyber security.
"We quite literally speak two different languages. [...]
The products that are meant to secure and protect us give us helpful warnings such as: 'Alert: Host Process for Windows Service Using Protocol UDP Outbound, IPv6NAT Transversal-No, is attempting to access the Internet. Do you wish to proceed?' What the hell does that mean? Nobody knows, except for the original authors of this 'helpful' warning. [...]
Why would people write down their password on Post-it notes and stick them on their computers? Because making people change them every two weeks and requiring that they be at least twenty characters long, with an uppercase letter, a number, a symbol, a haiku, and in iambic parameter, is just too much for the average users to handle." (p. 532-534)

Its only fault was that it was quite repetitive, which in my case I didn't mind too horribly since it helped me remember the most important information better. I felt like it even gave an interesting twist presented with Yuval Noah Harari's "Homo Deus" - not only which direction we're heading towards with the future of technology but also all the dangers that come along with it.
"Terrorists seem to be getting the message and both the 2004 Madrid bombings at the Atocha train station, in which 190 people were killed and nearly 2, 000 wounded, and the 7/7 London bombings, in which 52 civilians were slain and over 700 injured, were funded in whole or in part through hacking and credit card fraud." (p. 51)

As it already says in the title, this book focuses on the topic of how criminality will develop in the future, while strongly relying on the advances of technology. It speaks about such a wide variety of topics, ranging from real life examples of impressive "criminal hacks", the lack of education on cyber security, explaining the "Dark Web" or how making individuals spend time in jail enables them to earn more through criminal acts in the future, why so many services like Facebook, Instagram and Facebook are "free", the good and the bad sides of technology, to - most importantly - also proposing possible solutions to solve these problems. To me it had a lot of relatable moments, for example when the problematic of code in software nowadays were being explained, having worked within a company managing its own website and Android/iOS apps.
"Either openly or behind closed doors, the majority of the software industry operates under a variation of the motto 'Just ship it' or 'Done is better than perfect.' Many coders knowingly ship software that they admit 'sucks' but let it go, hoping, perhaps, to do better next time. [...]
This complexity, coupled with a profound laissez-faire attitude toward software bugs, has led Dan Kaminsky, a respected computer security researcher, to observe that today 'we are truly living through Code in the Age of Cholera.' " (p. 517 - 518)

To just leave you with one last quote, if you still need to be convinced, whether this book is relevant for you to read ;)
"Today you don't even need to be a synthetic biologist to get access to the tools of genetic sequencing. [...] They're called 'discreet DNA samples', and they can be processed for around 100$ each. Not sure if you want to hire that new guy who came into your office for the interview? Just send off the coffee cup he left behind to the lab to see if he might be a risk for a bunch of expensive disease that could cost your company a bundle. [...] Believe it or not, taking a stranger's DNA and sending it off to the lab is completely legal [...]." (p. 495)

nakenyon's review against another edition

Go to review page

dark informative tense slow-paced

3.25

khveronika's review

Go to review page

4.0



Did you know that the technology to simply control gadgets (like your Google Glass) with your thoughts already exists? Did you hear about the 2013 story of electronic teakettles and irons manufactured in China that spread a virus to all your electronic devices through WiFi? :D Or that we'll be able to literally "bring back to life" died-out species like the mammoth, the dodo or the Tasmanian tiger? Or how about that the swine flu suddenly reemerged in 1977 after being dead for 20 years, just because of a lab accident? These and so many more fascinating little facts was what I was able to pick up during the reading experience of "Future Crimes", so if that sounds compelling to you, read on to find out a bit more about this book ;)

I have started this brick of a 600+ page book in an ebook format but finally decided to also purchase it in its paperback version because it was simply so full of such important and relevant information, that I wanted to have it on my bookshelf, to be able to re-read certain parts from time to time (I think the amount of post-its you can see on the photo visualises it perfectly :D ). For me this book instantly got filed into the category of "all time favourites" and I'd see it as a must-read for everyone. Yes, everyone. Even those people who always used to say that they don't care about what happens to the data accumulated about them because they have "nothing to hide":
"But 'I have nothing to hide' is absolutely the wrong way to think about our new dataveillance society. [...] If proponents of the 'nothing to hide' argument meant what they said, then they would logically not object to our filming them having sex with their spouses, publishing their tax returns online, and projecting video of their toilet use on the Jumbotron of a crowded stadium, right? After all, they have nothing to hide. [...] Given that Google and Facebook alone have hundreds of petabytes of data on their users stored in perpetuity, perhaps it is more worthwhile to question not what any of us may have to hide today but what we might wish to keep private in the future [...]." (p. 110)

I have gotten through the book in just about 2 weeks, it having grabbed my interest firmly and I definitely learned a lot of new things. I really enjoyed its structure, the clear separation in three bigger parts and different chapters. Thanks to that and even though it's so expansive, you're able to keep an overview all throughout the reading experience. The style was factual and easily understandable, which was very pleasant for someone who isn't an expert on the topic. Some of my favourite quotes (among the hundreds of others :O ) were the ones where it was illustrated how IT specialists and us "regular" people simply seem to speak two different languages. Creating a common and an easily understandable one being an important step towards better cyber security.
"We quite literally speak two different languages. [...]
The products that are meant to secure and protect us give us helpful warnings such as: 'Alert: Host Process for Windows Service Using Protocol UDP Outbound, IPv6NAT Transversal-No, is attempting to access the Internet. Do you wish to proceed?' What the hell does that mean? Nobody knows, except for the original authors of this 'helpful' warning. [...]
Why would people write down their password on Post-it notes and stick them on their computers? Because making people change them every two weeks and requiring that they be at least twenty characters long, with an uppercase letter, a number, a symbol, a haiku, and in iambic parameter, is just too much for the average users to handle." (p. 532-534)

Its only fault was that it was quite repetitive, which in my case I didn't mind too horribly since it helped me remember the most important information better. I felt like it even gave an interesting twist presented with Yuval Noah Harari's "Homo Deus" - not only which direction we're heading towards with the future of technology but also all the dangers that come along with it.
"Terrorists seem to be getting the message and both the 2004 Madrid bombings at the Atocha train station, in which 190 people were killed and nearly 2, 000 wounded, and the 7/7 London bombings, in which 52 civilians were slain and over 700 injured, were funded in whole or in part through hacking and credit card fraud." (p. 51)

As it already says in the title, this book focuses on the topic of how criminality will develop in the future, while strongly relying on the advances of technology. It speaks about such a wide variety of topics, ranging from real life examples of impressive "criminal hacks", the lack of education on cyber security, explaining the "Dark Web" or how making individuals spend time in jail enables them to earn more through criminal acts in the future, why so many services like Facebook, Instagram and Facebook are "free", the good and the bad sides of technology, to - most importantly - also proposing possible solutions to solve these problems. To me it had a lot of relatable moments, for example when the problematic of code in software nowadays were being explained, having worked within a company managing its own website and Android/iOS apps.
"Either openly or behind closed doors, the majority of the software industry operates under a variation of the motto 'Just ship it' or 'Done is better than perfect.' Many coders knowingly ship software that they admit 'sucks' but let it go, hoping, perhaps, to do better next time. [...]
This complexity, coupled with a profound laissez-faire attitude toward software bugs, has led Dan Kaminsky, a respected computer security researcher, to observe that today 'we are truly living through Code in the Age of Cholera.' " (p. 517 - 518)

To just leave you with one last quote, if you still need to be convinced, whether this book is relevant for you to read ;)
"Today you don't even need to be a synthetic biologist to get access to the tools of genetic sequencing. [...] They're called 'discreet DNA samples', and they can be processed for around 100$ each. Not sure if you want to hire that new guy who came into your office for the interview? Just send off the coffee cup he left behind to the lab to see if he might be a risk for a bunch of expensive disease that could cost your company a bundle. [...] Believe it or not, taking a stranger's DNA and sending it off to the lab is completely legal [...]." (p. 495)

kdaddy's review

Go to review page

3.0

This book is very interesting. Some of it is very compelling, other parts seem to just linger along.

lvfl's review

Go to review page

informative slow-paced

4.0

isitcake's review

Go to review page

2.0

I think all of the topics in this book were covered in a 1 hour IT Security presentation at work, including what you can do to be safe which was the appendix of this book.

roskelld's review

Go to review page

5.0

Very well researched and thought out book. Although it sets up a very 'end is nigh' scenario, with us racing face first into a mess of interconnected gadgetry uncontrollably sharing all of our most private details, I didn't find it totally negative against tech. It ends with some positive thoughts about how we should question more of what we do, and for us not to simply throw trust on these technological wonderments. We should all aim to protect ourselves more, which is no bad thing.

midwinter's review

Go to review page

4.0

A rather interesting and disturbing review and depiction of the future of crimes that are taking place in the virtual environment and their consequences, which are not always loss of money. The first part of the book takes us on a journey through cyberspace, clearly explaining what criminals are using the world wide web for and how they do it. Welcome to the dark web, the area that not even Google indexes. In this part of the book you can find more information in relation to the Stuxnet virus, key loggers, why Google, Facebook and LinkedIn are free and we are not their customers, the Silk Road, The Onion Router etc.

In the second part of the book the author tries to forecast where cyber crimes may go next and how the Internet of Things may allow criminals unlimited access to our entire lives. Synthetic biology, quantum computing, medical or military nanobots, drones, medical devices (like prosthetic limbs, pace-makers) which are connected to the Internet and so on.

Lastly, in the third and final part Marc Goodman highlights what some of the steps to secure our safe use of the world wide web may be. The solutions he proposes are primarily aimed at governments or government-backed organizations, but also at individual users.

All in all the book fulfilled my expectations and I gladly recommend it to anyone who is interested in finding out more about the grey or dark areas of our connected (on-line) lives.