• Tous les prix incluent la TVA.
Il ne reste plus que 2 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Future Crimes: Everything... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par tousbouquins
État: D'occasion: Très bon
Commentaire: Expédié par avion depuis les USA; prévoir une livraison entre 10 à 15 jours ouvrables. Satisfait ou remboursé
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It (Anglais) CD – Livre audio, Version intégrale

5.0 étoiles sur 5 2 commentaires client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
CD, Livre audio, Version intégrale
"Veuillez réessayer"
EUR 46,69
EUR 30,50 EUR 30,29
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés

Descriptions du produit


Connected, Dependent and Vulnerable
Technology…is a queer thing; it brings you great gifts with one hand and it stabs you in the back with the other.
Mat Honan’s life looked pretty good on-screen: in one tab of his browser were pictures of his new baby girl; in another streamed the
tweets from his thousands of Twitter followers. As a reporter for Wired magazine in San Francisco, he was living an urbane and connected life and was as up-to-date on technology as anyone. Still, he had no idea his entire digital world could be erased in just a few keystrokes. Then, one August day, it was. His photographs, e-mails, and much more all fell into the hands of a hacker. Stolen in just minutes by a teenager halfway around the world. Honan was an easy target. We all are.
Honan recalls the afternoon when everything fell apart. He was play- ing on the floor with his infant daughter when suddenly his iPhone pow- ered down. Perhaps the battery had died. He was expecting an important call, so he plugged the phone into the outlet and rebooted. Rather than the usual start-up screen and apps, he saw a large white Apple logo and a mul- tilingual welcome screen inviting him to set up his new phone. How odd.
Honan wasn’t especially worried: he backed up his iPhone every night. His next step was perfectly obvious—log in to iCloud and restore the phone and its data. Upon logging in to his Apple account, he was informed that his password, the one he was sure was correct, had been deemed wrong by the iCloud gods. Honan, an astute reporter for the world’s preeminent
technology magazine, had yet another trick up his sleeve. He would merely connect the iPhone to his laptop and restore his data from the hard drive on his local computer. What happened next made his heart sink.
As Honan powered up his Mac, he was greeted with a message from Apple’s calendar program advising him his Gmail password was incor- rect. Immediately thereafter, the face of his laptop—its beautiful screen— turned ashen gray and quit, as if it had died. The only thing visible on the screen was a prompt: please enter your four-digit password. Honan knew he had never set a password.
Honan ultimately learned that a hacker had gained access to his iCloud account, then used Apple’s handy “find my phone” feature to locate all of the electronic devices in Honan’s world. One by one, they were nuked. The hacker issued the “remote wipe” command, thereby erasing all of the data Honan had spent a lifetime accumulating. The first to fall was his iPhone, then his iPad. Last, but certainly not least, was his MacBook. In an instant, all of his data, including every baby picture he had taken during his daugh- ter’s first year of life, were destroyed. Gone too were the priceless photo- graphic memories of his relatives who had long since died, vanquished into the ether by parties unknown.
Next to be obliterated was Honan’s Google account. In the blink of an eye, the eight years of carefully curated Gmail messages were lost. Work conversations, notes, reminders, and memories wiped away with a click of a mouse. Finally, the hacker turned his intention to his ultimate target: Honan’s Twitter handle, @Mat. Not only was the account taken over, but the attacker used it to send racist and homophobic rants in Honan’s name to his thousands of followers.
In the aftermath of the online onslaught, Honan used his skills as an investigative reporter to piece together what had happened. He phoned Apple tech support in an effort to reclaim his iCloud account. After more than ninety minutes on the phone, Honan learned that “he” had just called thirty minutes prior to request his password be reset. As it turns out, the only information anybody needed to change Honan’s password was his billing address and the last four digits of his credit card number. Honan’s address was readily available on the Whois Internet domain record he had created when he built his personal Web site. Even if it hadn’t been, dozens of online services such as WhitePages.com and Spokeo would have pro- vided it for free.
To ascertain the last four digits of Honan’s credit card, the hacker guessed that Honan (like most of us) had an account on Amazon.com. He was correct. Armed with Honan’s full name and his e-mail and mailing addresses, the culprit contacted Amazon and successfully manipulated a customer service rep so as to gain access to the required last four credit card digits. Those simple steps and nothing more turned Honan’s life upside down. Although it didn’t happen in this case, the hacker could have just as easily used the very same information to access and pilfer Honan’s online bank and brokerage accounts.
The teenager who eventually came forward to take credit for the attack—Phobia, as he was known in hacking circles—claimed he was out to expose the vast security vulnerabilities of the Internet services we’ve come to rely on every day. Point made. Honan created a new Twitter account to communicate with his attacker. Phobia, using the @Mat account, agreed to follow Honan’s new account, and now the two could direct message each other. Honan asked Phobia the single question that was burning on his mind: Why? Why would you do this to me? As it turns out, the near decade of lost data and memories was merely collateral damage.
Phobia’s reply was chilling: “I honestly didn’t have any heat towards you . . . I just liked your [Twitter] username.” That was it. That’s all it was ever about—a prized three-letter Twitter handle. A hacker thousands of miles away liked it and simply wanted it for himself.
The thought that somebody with no “heat” toward you can obliterate your digital life in a few keystrokes is absurd. When Honan’s story appeared on the cover of Wired in December 2012, it garnered considerable atten- tion . . . for a minute or two. A debate on how to better secure our every- day technologie ensued but, like so many Internet discussions, ultimately flamed out. Precious little has changed since Honan’s trials and tribula- tions. We are still every bit as vulnerable as Honan was then—and even more so as we ratchet up our dependency on hackable mobile and cloud- based applications.
As with most of us, Honan’s various accounts were linked to one another in a self-referential web of purported digital trust: the same credit card number on an Apple profile and an Amazon account; an iCloud e-mail address that points back to Gmail. Each had information in common, including log-on credentials, credit card numbers, and passwords with all the data connected back to the same person. Honan’s security protections amounted to nothing more than a digital Maginot Line—an overlapping house of cards that came tumbling down with the slightest pressure. All or most of the information needed to destroy his digital life, or yours, is readily available online to anybody who is the least bit devious or creative.
Progress and Peril in a Connected World
In a few years’ time, with very little self-reflection, we’ve sprinted headlong from merely searching Google to relying on it for directions, calendars, address books, video, entertainment, voice mail, and telephone calls. One billion of us have posted our most intimate details on Facebook and will- ingly provided social networking graphs of our friends, family, and co- workers. We’ve downloaded billions of apps, and we rely on them to help us accomplish everything from banking and cooking to archiving baby pictures. We connect to the Internet via our laptops, mobile phones, iPads, TiVos, cable boxes, PS3s, Blu-rays, Nintendos, HDTVs, Rokus, Xboxes, and Apple TVs.
The positive aspects of this technological evolution are manifest. Over the past hundred years, rapid advances in medical science mean that the average human life span has more than doubled and child mortality has plummeted by a factor of ten. Average per capita income adjusted for infla- tion around the world has tripled. Access to a high-quality education, so elusive to many for so long, is free today via Web sites such as the Khan Academy. And the mobile phone is singularly credited with leading to bil- lions upon billions of dollars in direct economic development in nations around the globe.
The interconnectivity the Internet provides through its fundamental architecture means that disparate peoples from around the world can be brought together as never before. A woman in Chicago can play Words with Friends with a total stranger in the Netherlands. A physician in Bangalore, India, can remotely read and interpret the X-ray results of a patient in Boca Raton, Florida. A farmer in South Africa can use his mobile phone to access the same crop data as a PhD candidate at MIT. This interconnect- edness is one of the Internet’s greatest strengths, and as it grows in size, so too does the global network’s power and utility. There is much to celebrate in our modern technological world.
While the advantages of the online world are well documented and frequently highlighted by those in the tech industry, there is also a down- side to all of this interconnectivity.
Our electrical grids, air traffic control networks, fire department dis- patch systems, and even the elevators at work are all critically dependent on computers. Each day, we plug more and more of our daily lives into the global information grid without pausing to ask what it all means. Mat Honan found out the hard way, as have thousands of others. But what should happen if and when the technological trappings of our modern society—the foundational tools upon which we are utterly dependent—all go away? What is humanity’s backup plan? In fact, none exists.

Revue de presse


“Addictive….[I]ntroduces readers to this brave new world of technology, where robbers have been replaced by hackers, and victims include nearly anyone on the Web… He presents his myriad hard-to-imagine cybercrime examples in the kind of matter-of-fact voice he probably perfected as an investigator. He clearly wants us never to look at our cellphones or Facebook pages in the same way again — and in this, Future Crimes succeeds marvelously.”
— The Washington Post

“Excellent and timely…Mr. Goodman is no neo-Luddite. He thinks innovations could ultimately lead to self-healing computer networks that detect hackers and automatically make repairs to shut them out. He rightly urges the private and public sectors to work more closely together, ‘crowdsourcing’ ideas and know-how…The best time to start tackling future crimes is now.”
— The Economist

"This is a must-read!"
-- Larry King

Future Crimes is a risk compendium for the Information Age…. Exhaustively researched…. Fascinating…. Thrilling to read”
— San Francisco Chronicle
"In Future Crimes, Goodman spills out story after story about how technology has been used for illegal ends...The author ends with a series of recommendations that, while ambitious, appear sensible and constructive...Goodman’s most promising idea is the creation of a “Manhattan Project” for cyber security...[Future Crimes is] a ride well worth taking if we are to prevent the worst of his predictions from taking shape."
— Financial Times

"...a superb new book..."
-- The Boston Globe 

"You couldn't ask for a better [cyber risk] overview than Future Crimes."
-- Harvard Business Review

"Marc Goodman is a go-to guide for all who want a good scaring about the dark side of technology."
 New Scientist
"Utterly fascinating stuff... Goodman weds the joy of geeky technology with the tension of true crime. The future of crime prevention starts here."
— NPR, San Francisco

"A well-researched whirlwind tour of internet-based crime."
-- Science Magazine

"By the middle of the first chapter you’ll be afraid to turn on your e-reader or laptop, and you’ll be looking with deep suspicion at your smartphone... [Goodman's] style is breezy but his approach is relentless, as he leads you from the guts of the Target data breach to the security vulnerabilities in social media...Mr. Goodman argues convincingly that we are addressing exponential growth in risky technologies with thinking that is, at best, incremental.
--Pittsburgh Post-Gazette

“OMG, this is a wakeup call. The outlaws are running faster than the architects. Use this book to shake up the companies you buy from, the device makers, telecom carriers, and governments at all levels. Demand that they pay attention to the realities of our new world as outlined within this thorough and deep book. Marc Goodman will startle you with the ingenuity of the bad guys. I'm a technological optimist. Now I am an eyes-wide-open optimist.”
— Kevin Kelly, co-founder of Wired Magazine and bestselling author of What Technology Wants

"The hacks and heists detailed in Future Crimes are the stuff of thrillers, but unfortunately, the world of cybercrime is all too real. There could be no more sure-footed or knowledgeable companion than Marc Goodman on this guided tour of the underworld of the Internet. Everyone  -- and the business world especially -- should heed his advice.”
— Daniel H. Pink, New York Times bestselling author of Drive and To Sell is Human

"A riveting read."
— Nassim Nicholas Taleb, professor of engineering at NYU and New York Times bestselling author of The Black Swan

“From black ops to rogue bots and everything in between, Future Crimes is a gripping must-read.  Marc Goodman takes readers on a brilliant, 'behind-the-screens' journey into the hidden world of 21st century criminal innovation, filled with one mind-boggling example after another of what’s coming next.  Future Crimes raises tough questions about the expanding role of technology in our lives and the importance of managing it for the benefit of all humanity.  Even better, Goodman offers practical solutions so that we not only survive progress, but thrive to an extent never previously imagined.”
— Peter H. Diamandis, New York Times bestselling author of Abundance; CEO, XPRIZE Foundation; Exec. Chairman, Singularity University

"Future Crimes reads like a collection of unusually inventive, terrifying plots conjured up by the world's most ingenious science fiction writer... except that almost every story in this goosebump-raising book is happening all around us right now. It's a masterful page-turner that warns of a hundred worst case scenarios you've never thought of, while also -- thank goodness -- offering bold and clever strategies to thwart them."
— Jane McGonigal, New York Times bestselling author of Reality is Broken 

“As Marc Goodman shows in this highly readable book, what is going on in the background of your computer has turned the internet into a fertile ground for massive crime…Future Crimes has the pace of a sci-fi film but it’s happening now.”
— Express UK

“As new loopholes open up in cyberspace, people inevitably find ways to flow through them. Future-proof yourself by reading this book.  No one has a better vantage point than Goodman, and you won't want to touch another keyboard until you know what's in these pages.”
—David Eagleman, New York Times bestselling author of Incognito

"Future Crimes is the Must Read Book of the Year.  Endlessly fascinating, genuinely instructive, and truly frightening.  Be warned:  Once you pick it up, you won't put it down. Super cool and super interesting." 
—Christopher Reich, New York Times bestselling author

“Technology has always been a double edged sword – fire kept us warm and cooked our food but also burned down our villages.  Marc Goodman provides a deeply insightful view into our twenty-first century’s fires.  His philosophy matches my own: apply the promise of exponentially growing information technologies to overcome age old challenges of humankind while at the same time understand and contain the perils.  This book provides a compelling roadmap to do just that.”
— Ray Kurzweil, inventor, author and futurist

“Much has been discussed regarding today’s cybercrime threats as well as the cybercriminals’ modus operandi. What is lacking, however, is what we can do about them. Mr. Marc Goodman’s book Future Crimes brings our global dialogue on safety and security to the next level by exploring how potential criminals are exploiting new and emerging technologies for their nefarious purposes.  It provides a futuristic perspective grounded on current case studies. Future Crime is an essential read for law enforcers, corporations and the community alike. It offers answers beyond what comes next to what we can do, both individually and collectively, to secure ourselves and our communities.”
— Khoo Boon Hui, former President of Interpol

"A tour de force of insight and foresight.  Never before has somebody so masterfully researched and presented the frightening extent to which current and emerging technologies are harming national security, putting people’s lives at risk, eroding privacy, and even altering our perceptions of reality. Future Crimes paints a sobering picture of how rapidly evolving threats to technology can lead to disasters that replicate around the world at machine speed. Goodman clearly demonstrates that we are following a failed cybersecurity strategy that requires new thinking rather than simply more frameworks, more information sharing, and more money.  Read this now, and then get angry that we really haven’t taken the technology threat seriously.  If the right people read Goodman’s book and take action, it might just save the world."
— Steven Chabinsky, former Deputy Assistant Director of the FBI’s Cyber Division

"As with Naomi Klein’s This Changes Everything and Robert Whitaker’s Anatomy of an Epidemic, Future Crimes deserves a prominent place in our front-line library. Goodman takes us behind the computer screen to a dark world where Crime Inc. flourishes at our expense. When the criminal mind conceives “what if” it is only a matter of time before its dream becomes our nightmare. Goodman urges us to take responsibility for this new world we are speeding towards. If we don’t perhaps the greater crime will be ours."
— Ed Burns, co-creator of The Wire

 “This is a fantastic book and one that should be read by every cyber crime fighter.  Technology breeds crime. . . it always has and always will.  Unfortunately, there will always be people willing to use technology in a negative self serving way.  Your only defense is the most powerful tool available to you - education. Read Future Crimes and understand your risks and how to combat them.  The question I am most often asked in my lectures is ‘what’s the next big crime?’  The answer is in this book.”
— Frank Abagnale, New York Times bestselling author of Catch Me If You Can and Stealing Your Life 

"Hacking robots and bad guys using AI and synthetic biology to carry out bad deeds may seem like science fiction, but that is the real world of Future Crimes that awaits us. Marc Goodman, one of the world’s leading experts on the field, takes the reader on a scary, but eye-opening tour of the next generation nexus of crime, technology, and security."
— PW Singer, New York Times bestselling author of Wired for War

"In this highly readable and exhaustive debut, [Marc Goodman] details the many ways in which hackers, organized criminals, terrorists and rogue governments are exploiting the vulnerability of our increasingly connected society... Goodman suggests solid actions to limit the impact of cybercrimes, ranging from increased technical literacy of the public to a massive government 'Manhattan Project' for cybersecurity to develop strategies against online threats. A powerful wake-up call to pay attention to our online lives."
Kirkus starred review 
"[A] hair-raising exposé of cybercrime...Goodman’s breathless but lucid account is good at conveying the potential perils of emerging technologies in layman’s terms, and he sprinkles in deft narratives of the heists already enabled by them...A timely wake-up call."
Publishers Weekly

"Future Crimes is required reading for anyone who wants to comprehend the rise of cyber crime in an age of mass surveillance. Goodman goes beyond lurid headlines to explore the implications of technologies that are transforming every industry and society on Earth--in the process creating an ocean of real-time personal data plied by businesses, governments, and criminals alike. Far from a screed against tech, Marc Goodman's Future Crimes is an eye-opening and urgent call to action to preserve the benefits of our high-tech revolution."
-- Daniel Suarez, New York Times bestselling author of Daemon

"In the wake of North Korea's cyber-terrorist attack on Sony as well as numerous hacker break-ins throughout the corporate world, it's become increasingly obvious that neither governments nor corporations are prepared for the onslaught of problems...Goodman nails the issue and provides useful input on the changes needed to make our systems and infrastructure more secure."
— Inc.com

From the Hardcover edition.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir les deux commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Format Kindle
... watch Marc Goodman's TED talk " A vision of crimes in the future" held at TEDGlobal 2012

Worth any written words and eye opening in regard of the threat potential of new technologies.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Format Kindle Achat vérifié
A lot of well documented examples - your attitude towards internet security will never be the same, after reading this book.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x99542750) étoiles sur 5 270 commentaires
55 internautes sur 59 ont trouvé ce commentaire utile 
HASH(0x998f1e58) étoiles sur 5 The future is now 6 février 2015
Par Paper or Kindle - Publié sur Amazon.com
Format: Relié Commentaire d‘un membre du Club des Testeurs ( De quoi s'agit-il? )
I'm writing this review on the day in which the news reported a massive hack at Anthem, exposing the private information of 80 million Americans, including names, birth dates, social security numbers, email addresses...everything an identity thief could use to good advantage to ruin your life. So the title of the book is actually wrong. These crimes are not from the future, they are happening even as I write this. The subtitle, "Everything is connected, everyone is vulnerable and what we can do about it" is misleading. From all I can see, there's very little the average person can do.

Even if you dropped off the grid this second, closing your Google gmail account, your Facebook account, your online banking account, it wouldn't make a difference, since their information can be stored indefinitely. You will live in cyber space for generations to come. I recently had occasion to look for work, and many companies required me to check their website rather than approach them in person. When I found a position, the application was online. My new job requires an email address. If I go into a bricks and mortar store, my credit card history is stored in their computers. When I go to the doctor, the whole clinic has an electronic platform with my medical history. There is no escape.

Is it convenient for people to shop, access medical and financial records, search the Internet, play games, watch movies, and chat with friends online? Absolutely. Our lives are much easier because of technology. But the law of unintended consequences applies, and what is easier for us is easier for thieves. They can topple governments and corporations and the little guy alike.

This is an interesting book, but unfortunately it is also extremely depressing and frightening. The way the author sets it up heightens the pessimism, since he goes on for hundreds of pages of examples of the ways we are at risk. There is a very small section at the end with a few suggestions for change. I would have given it three stars because of the unrelieved gloom, except that the subject matter is timely and every intelligent adult should be aware of the ramifications of modern life and technology, like it or not.
46 internautes sur 50 ont trouvé ce commentaire utile 
HASH(0x99305b04) étoiles sur 5 Detailed accounts of cyber crimes 10 février 2015
Par Connie - Publié sur Amazon.com
Format: Relié Commentaire d‘un membre du Club des Testeurs ( De quoi s'agit-il? )
Marc Goodman knows digital security. He can also talk about it in detail without getting lost in technical language that may bore the reader. While there could have been repetitive stuff removed from this long tomb, he clearly understands the vulnerability of being connected, and how easily we all want the convenience of cloud storage, online banking,online shopping, or having our social media open to anyone to admire and praise.

Cybercrime pays and Goodman wrote 392 pages telling the story of how cyber criminals have been getting away with this. Innovative Marketing, Inc (a company also known by the FTC by other names such as Billingnow, BillPlanet PTE Ltd., Globedat, Innovative Marketing Ukraine, Revenue Response, Sunwell, Synergy Software BV, Winpayment Consultancy SPC, Winsecure Solutions, and Winsolutions FZ-LLC) and Partnerkas are two felonous companies he sets as an example, but there are others out there. The first trick is to embed the virus in a legitimate ad or program so that unsuspecting people can download these and reinfect their own systems.

Then there are the big crime gangs, the mafia, who control so much of the cyber crime internationally. They can control the world because they have some of the best hackers working for them, and making good money for it. Some of the stories Goodman recounts are quite hairy, such as doing quick google searches of business executives at airports via smart phones to determine which business executive is the most profitable (to kidnap). Then there's the tactic of crowd sourcing, where a business places a fake ad for employment, only to unwittingly recruit people to commit a crime. Some of these stories are so unbelievable, they are frightening.

This book is a little more detailed in the types of cyber crimes out there. Besides the usual far-away hacker in Russia, China, Pakistan, we now have crimeware software whose sole mission is to upload virus-looking pop-ups on customers' computers, thinking they had gotten a malware virus. Then the (fake)company would demand the customer wire $49 to undo the damage. This was from a legitimate business selling infected ads to its clientele.

Goodman's years fighting cybercrime have paid off. He knows the underground web, the black web, and knows which websites do the more horrific deeds. This book is quite a thrill to read, but also a bit shocking as there's nothing now anywhere online that can help us restore lost or damaged identity. Well worth the read.
184 internautes sur 213 ont trouvé ce commentaire utile 
HASH(0x99305cfc) étoiles sur 5 Abandon Hope, All Ye Who Enter Here 28 janvier 2015
Par Kevin L. Nenstiel - Publié sur Amazon.com
Format: Relié Commentaire d‘un membre du Club des Testeurs ( De quoi s'agit-il? )
It always bothers me when I concur with a book's core assertions, and must recommend audiences not read it anyway. With nonfiction, this usually happens when an author draws our attention to neglected topics, especially those which have often unexamined implications, but the author doesn't stage the argument well. Maybe it reflects my background in teaching composition, but nothing sours my appreciation like an undifferentiated firehose of information. Such is the case with Marc Goodman.

Ex-LAPD turned global digital security consultant, Marc Goodman has participated in increasing corporate and private security measures. This gives him boots-on-the-ground familiarity with how organized crime, espionage specialists, and crafty teenagers abuse today's networked world. When ordinary citizens send credit card information across WiFi or smartphones, when social networks market access to private eyeballs, and when market trackers create massive profiles of everybody online, we're unprecedentedly vulnerable. As Goodman puts it, "Mo' Screens, Mo' Problems."

My problem isn't anything Goodman says. Informed audiences should already understand his broad outline, though he helpfully provides clarifying details. Those Terms of Service agreements you accept without reading? The average American would need 76 eight-hour workdays annually to read them all. PayPal's Terms of Service runs nearly 40,000 words--longer than Dostoevsky's Notes From Underground, without characters or motivations. Even if you read them, most include stipulations that "they" can change terms without notice.

Meanwhile, criminals have developed elaborate processes to circumvent security. Goodman notes, security specialists must anticipate every possible attack; lawbreakers need only find one liability. Meanwhile, thought leaders like Ben Horowitz recommend deliberately selling bug-ridden early drafts of software, using paying customers as uncompensated beta testers. This leaves consumers vulnerable to spiteful pranksters, the Mafia, and even China's People's Liberation Army, known to have deliberately hacked corporations and citizens to expropriate American and international trade secrets.

No, my problem isn't what Goodman says, it's how he says it. Goodman divides his text into three parts, and Part One, which consumes nearly half the book's mass, unrelentingly dumps chilling crime data in readers' laps. Between tales of deliberate crime, squicky corporate data hoarding, and actual malicious destruction, it mounts up. Goodman doesn't break this litany of misery, except for the occasional half-page snippet of exposition, for over 150 pages, leaving readers tired.

This results in a phenomenon familiar to many professions, from government reformers to Christian missionaries: compassion fatigue. People reading narratives of poverty, oppression, or in this case crime, quickly become discouraged when statistics accumulate. With individual narratives, people feel moved to act; when patterns develop, people become discouraged and fatalistic. According to philanthropist Richard Stearns, that happens appallingly early: when naming actual victims of inequality or crime, people become discouraged when the pattern hits... two.

Thus Goodman says many right things in exactly the wrong way. I'd use exactly this strategy to discourage audiences about their ability to address current problems. Rather than keeping focus on one problem, or one constellation of problems, and appropriate correlating solutions, he completely segregates crisis from resolution. We get crushed by the weight of problems long before reaching the solutions, assuming we do reach the solutions: I frankly got tired and made tortoise-like progress..

Certainly, Goodman also discusses redresses to these problems. But he does this only so late that many readers have already either given into nihilism, or joins the Luddites. Perhaps Goodman thought the story arc from Hollywood dramas, where everything generally gets worse and worse until our white-hatted hero reverses things, would convey his message emotionally. But this isn't some scripted drama. The answer isn't Liam Neeson kicking everybody's ass. This really happens to real people.

Goodman doesn't trade in hypotheticals. He doesn't invent threats that need addressed in the airy-fairy future, because he doesn't need to (though he does sometimes extrapolate). Horror stories abound in nonfiction, from joshing teenagers hijacking municipal rail control networks, to massive data leaks at Symantec. Yes, that Symantec, which manufactures Norton security. Despite the "Future Crimes" title, Goodman details threats that exist right now, and risk becoming even more perilous as our networked technology increases.

I struggled to retain Goodman's thread beneath the mass of techno-legal horror tales. I should be Goodman's target audience, since I support his fundamental thesis about digital vulnerabilities. Just as most citizens cannot comprehend their investment portfolios, we also cannot manage our digital privacy individually. Goodman raises important questions for both private and regulatory consideration. These issues will increasingly color life in coming years. Goodman just stages his claims in ways that leave me despondent.
25 internautes sur 31 ont trouvé ce commentaire utile 
HASH(0x99305c18) étoiles sur 5 Excellent overview of complex topic 11 janvier 2015
Par AmazonJavaJunki - Publié sur Amazon.com
Format: Relié Commentaire d‘un membre du Club des Testeurs ( De quoi s'agit-il? )
Although a substantial amount of this can be found elsewhere, there are few places that manage to bring together all the various aspects of future crimes in one place...much less do it in such a reader friendly manner. The author does a terrific job making the topic interesting as well as informative. The topics are diverse - everything from the basics of malicious code to hacking body parts and DNA are included. Even the most well versed are likely to find a few golden nuggets within these pages and those searching for an introduction or better understanding of this diverse and often confusing topic would do well to begin here. What initially seems like disparate segments of different technology (ie, biology, computer code and terrorism just for example) are actually parts of an increasingly complex whole with global players and adverse outcomes at both the nation/state level and individual level.

Exceptionally well researched, the index is a treasure trove of resources and references.
9 internautes sur 10 ont trouvé ce commentaire utile 
HASH(0x99305d08) étoiles sur 5 Tough call. Wildly exaggerated. Lots of not quite true info. Full of me, me, me. But a book that should be widely read. 11 janvier 2015
Par Jerry Saperstein - Publié sur Amazon.com
Format: Relié Commentaire d‘un membre du Club des Testeurs ( De quoi s'agit-il? )
I need to point out that I earn my living as a computer forensics expert. I don't do criminal work, but my interests are largely the same as author Marc Goodman's. Even though most departing employees, for example, who help themselves to employer proprietary information on their way to a competitor company won't be prosecuted for a crime, but the financial loss to the company can be immense.

Goodman is trying to bang the drum of awareness here, awareness of the risks our increasingly technological society poses to everyone and everything. As a forensics expert, I know that every computing device and service carries the seeds of destruction: it may be you, your spouse, family, kids, business, fellow employees, anyone. Individuals and society as a whole have never faced a threat as great as technology.

Sound overblown? Yes. And it is the greatest fault of Goodman's book that every page screams out alarms and warnings. It is a book intended to scare you and rightfully so. Unfortunately, I think Goodman goes too far in his approach. Too much in the way of exaggeration, hyperbole, panic peddling and often just plain false information. On top of that is the ever-present "I". I this, I that: me, me, myself and I.

Still, for all its weaknesses, this is in my eyes a five-star book and one that everyone who uses or owns any computing device should read. I can't keep you from becoming unnecessarily frightened by Goodman's overblown claims, but frankly, like Goodman, I'd rather see you frightened than complacent.

As Pogo said: "We have met the enemy and he is us". If we remain blissfully ignorant of the perils of computer-based technology our geese are cooked: individually, as a culture and a nation. Technology is dangerous: people ignorant of the consequences of misused technology are helpless victims.

I'm starting to sound more and more like Goodman and in writing this review, I understand why Goodman has chosen the path he has: he is trying to explain a threat that most people won't take the time to comprehend, that most people don't have the knowledge to comprehend. Yeah, he's the mad prophet - and he's right on the money.

Protect yourself. Turn up your BS detectors to high and read this book.

Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?