- By: Marc Goodman
- ISBN: 978-0804171458
- Read: 3/30/2017
- Topic: Cybersecurity/Tech
- Pages: 499
- Rating: 9/10
Future Crimes: Inside the Digital Underground and the Battle for Our Connected World by Marc Goodman was definitely the first non-fiction book that I’ve read in awhile that was page-turning/captivating/thought-provoking and more.
It was compelling and made me recognize that when it comes to hacking and the implications of future crimes, everything/anything is absolutely up for grabs and that it should be wildly concerning. Most of the time, it felt like I was reading a dystopian thriller but it really just offered an in-depth analysis of what has been occurring (which makes it even more disconcerting). After 400pages of very in depth analysis on what is going down Goodman begins to offer some plausible solutions.
Overall, this book made me even more excited (if that is even possible) to get into cybersecurity.
(idk where to begin with this one, I really highlighted the entire book…)
- “The next Industrial Revolution, the information revolution is well under way, with massive yet unrealized implications for our personal and global security” (23).
- “McKinsey has estimated the market value of your personal location data to be more than $100 billion to the retail, media and telecommunications industries over the next ten years” (78).
- “It is unsettling but true that to date no computer system has been created that cannot be hacked–a sobering fact given our categorical reliance on these machines for everything from communication to transportation to health care” (52).
- “…everything is connected and everyone is vulnerable. But all is not lost….It is about safeguarding out technological future and understanding what’s coming next” (496).
- “The hacks of tomorrow will affect our cars, GPS systems, implantable medical devices, televisions, elevators, smart meters, baby monitors, assembly lines, and personal-care bots. With seventy-nine octillion new possible connections enabled through IPv6 and the Internet of Things, all physical objects will become hackable, including all the screens in our lives. Yet as of today, we lack any viable models for truly trustworthy and secure computing–an obvious failure for a society built on and run by computers. We have no proven way to trust the code that runs our lives and runs our world it is for that reason that those who control the code can control our world, for good or for ill. Beyond this, we will have to deal with new bioweapons, hacked DNA, and genetic and biometric identity theft, to say nothing of easily manipulated back-box algorithms and AI systems. We are living in exponential times” (497).
Motivations to Read
- To learn a great deal more about cybersecurity.
- To understand the full extent and implications of cyber.
3 Reasons to Read
- To have a basic/intermediate understanding of cybersecurity.
- To be able to connect cyber to the news events everyday.
- To be more thoughtful/careful about how you handle your online security/privacy.