Introduction
In "Future Crimes," author Marc Goodman takes us on a thrilling and eye-opening journey into the world of cybercrime and the dark side of modern technology. As our lives become increasingly intertwined with digital devices and the internet, we face new and unprecedented threats to our privacy, security, and well-being. This book serves as a wake-up call, revealing the hidden dangers lurking in our smartphones, social media accounts, and even seemingly innocuous apps like Angry Birds.
Goodman, a former law enforcement officer and cybersecurity expert, explores how criminals, hackers, and even governments are exploiting technology to commit crimes on a scale never before possible. From identity theft to corporate espionage, from cyber warfare to the manipulation of critical infrastructure, the author paints a sobering picture of the risks we face in our hyper-connected world.
But "Future Crimes" is not just a doom-and-gloom narrative. It also offers practical advice and strategies for protecting ourselves in the digital age. By understanding the threats and taking proactive measures, we can navigate the treacherous waters of cyberspace and harness the benefits of technology without falling victim to its darker aspects.
The Merging of Online and Offline Worlds
One of the key themes in "Future Crimes" is how the line between our online and offline lives has become increasingly blurred. We've come a long way since the early days of computing when a single computer could barely fit inside a small building. Today, the smartphone in your pocket has more computing power than all of NASA during the Apollo 11 moon landing.
This technological revolution has fundamentally changed how we live our lives. Over 80 percent of us check our phones within the first few minutes of waking up, and we keep them within three feet of us at all times. Our attachment to our devices is not just practical but emotional – a US study found that more than 90 percent of Americans feel high levels of anxiety if they forget their phone at home.
We spend an average of five hours online every day, conducting all manner of personal and professional business. We book doctor's appointments, check bank statements, browse social media, and shop online without giving much thought to the digital footprint we're leaving behind.
This constant connectivity has made our lives more convenient, but it has also opened up new avenues for criminals to exploit. Hackers can infiltrate our devices with alarming ease – one study showed that they successfully breached targeted devices about 75 percent of the time within mere minutes.
Part of the problem is our own negligence when it comes to security. In 2015, the most popular passwords were still "123456" and "password." While many companies have implemented multifactor authentication to improve security, it's crucial that we take personal responsibility for protecting our digital lives. This includes using strong, unique passwords for each account, regularly changing them, and being mindful of the information we share online.
The Smartphone: Your Personal Spy
Our smartphones have become an extension of ourselves, accompanying us everywhere and storing vast amounts of personal data. But as Goodman reveals, these devices can also act as personal spies, collecting and sharing information about our lives in ways we might not expect or approve of.
For example, Google has developed technology that can access calls made on Android devices and use the conversation and ambient sounds to create targeted ads. Imagine discussing a concert with a friend, only to see ads for tickets the next time you use Google.
Many popular apps collect data without our knowledge or explicit consent. A study by Carnegie Mellon's Human-Computer Interaction Institute found that only five percent of Angry Birds users knew the app was collecting their location data and selling it to advertisers. In fact, according to a McAfee report, 82 percent of Android apps check users' online activities, and 80 percent collect location data without permission.
This data collection can have serious privacy implications. Goodman cites the example of a Russian app called Girls Around Me, which used publicly available data from Facebook and Foursquare to create an interactive map showing the locations and profiles of nearby women. While the app was eventually removed from app stores, it highlights the potential for abuse when our personal information is so readily available.
The High Price of "Free" Services
Goodman challenges the notion that popular online services like Google, Facebook, Twitter, YouTube, and LinkedIn are truly free. While we don't pay money to use these platforms, we pay with something potentially more valuable: our personal data.
These companies collect vast amounts of information about our lives, interests, and behaviors. Every search query, every like, every shared photo becomes part of a detailed profile that can be used for targeted advertising or sold to third parties. As Goodman puts it, we're not the customers of these companies – we're their product.
The author provides a sobering example of how this data collection can have real-world consequences. A British man named Van Bryan tweeted to a friend about going to "destroy America" (meaning to party hard) before a trip to the US. The US Department of Homeland Security flagged this tweet, resulting in Bryan and his partner being barred from entering the country.
Goodman also highlights the importance of reading the terms and conditions we so often ignore. Many social media platforms and cloud services claim ownership or extensive rights over the content we upload. For instance, if J.K. Rowling had written Harry Potter using Google Docs, she might have inadvertently given Google rights to the book, potentially losing out on her $15 billion fortune.
The Growing Scale of Cybercrime
As the internet has grown exponentially, so too has the scale and sophistication of cybercrime. Hacking has evolved from the early days of phone network exploits to large-scale data breaches affecting millions of people.
Goodman discusses how state actors, not just individual criminals, are involved in cyber espionage and attacks. He cites the example of Chinese hackers targeting Google's global password management system, potentially gaining access to millions of users' accounts and web searches.
The author also highlights the vulnerability of large corporations to cyber attacks. In 2013, a 17-year-old Russian hacker stole personal information from 110 million accounts in retail company Target's database. This incident underscores the need for robust cybersecurity measures, not just for individuals but for businesses and organizations handling sensitive data.
The shift towards cloud computing presents new challenges for data security and privacy. While the cloud offers benefits in terms of innovation, productivity, and entrepreneurship, it also raises complex legal and jurisdictional issues. For instance, when a cybercrime occurs in the cloud, it can be difficult to determine where the crime was committed and which laws apply.
Goodman emphasizes the importance of individual responsibility in cybersecurity. He recommends encrypting data on computers and phones, keeping operating systems up to date, and using encryption programs like BitLocker and FileVault to protect sensitive information.
The Dangers of Oversharing on Social Media
"Future Crimes" dispels the stereotype of hackers as lone teenagers in dark rooms. According to a study by the Rand Corporation, 80 percent of hackers actually work for companies or governments and are closer to 30 years old. This organized nature of cybercrime means we need to be extremely cautious about the information we share online.
Goodman warns about the dangers of posting details about upcoming vacations or weekend getaways on social media. This information can be used by burglars to target empty homes. He cites a 2011 study of convicted burglars in the UK, where 78 percent admitted to monitoring Facebook, Twitter, and Foursquare to choose their targets.
The author also highlights the risk of metadata in photos shared online. Many people don't realize that their photos contain hidden data, such as GPS coordinates, which can be exploited by criminals. This information can be used to track your movements or identify valuable possessions in your home.
While some might think the solution is to delete all online profiles, Goodman argues that this isn't necessarily the best approach. Having no online presence makes it easier for someone to impersonate you. Instead, he advises carefully controlling what information you share and being aware that your posts may be seen by more than just your intended audience.
The Internet of Things: Convenience at a Cost
Looking to the future, Goodman explores the potential benefits and risks of the Internet of Things (IoT). He paints a picture of a world where everyday objects are connected to the internet, from alarm clocks that adjust based on traffic conditions to toothbrushes that send brushing data to your phone.
While this level of connectivity could make our lives more convenient, it also introduces new vulnerabilities. Cisco predicts that by 2020, there will be 50 billion devices connected to the internet, up from 13 billion in 2013. Each of these devices represents a potential entry point for hackers.
Goodman gives examples of how IoT technology is already being used, such as RFID tags in work ID badges, contactless payment cards, and even tracking sharks off the coast of Australia. However, he warns that as we surround ourselves with more internet-connected devices, we increase our exposure to cyber attacks.
The author points out that many of these devices have poor security measures. For instance, the cameras on our phones, computers, baby monitors, and security systems could potentially be accessed by hackers, allowing them to spy on us without our knowledge. Goodman offers a simple solution for laptop cameras: covering the lens with a small Post-It note when not in use.
The Vulnerability of Critical Infrastructure
One of the most alarming aspects of our increasing reliance on internet-connected technology is the vulnerability of critical infrastructure. Goodman explains how everything from railways and gas pipelines to 911 dispatch systems, air traffic control, stock markets, water treatment plants, and electrical grids now depend on the internet to function properly.
This connectivity creates a significant risk. If hackers were to target a city's electrical grid, for example, the consequences could be catastrophic. The author paints a vivid picture of a city plunged into chaos: no lights, no elevators, no ATMs, no functioning traffic lights, no air traffic control, no cellphones, and no internet.
Goodman cites a real-world example from South Houston, where the Water and Sewer Department was hacked by an attacker traced to Russia. While in this case, the hacker only caused water pumps to fail, the potential for more severe damage was clear. If the wrong amount of chemicals had been mixed to treat the water, thousands of people could have been poisoned.
The author also highlights the risks of relying too heavily on computer systems in other critical areas, such as the criminal justice system. He mentions an incident in California where a computer glitch led to the release of 450 dangerous criminals on unsupervised parole. In another case, the UK's Criminal Records Bureau admitted that more than 20,000 people had been wrongly criminalized due to errors in computer systems.
These examples underscore Goodman's argument that we should carefully consider the risks of connecting critical infrastructure to the internet and ensure that we have robust backup systems in place.
The Future of Technology and Its Implications
As "Future Crimes" draws to a close, Goodman turns his attention to emerging technologies and their potential impact on society. He discusses advancements in robotics, artificial intelligence, genetics, synthetic biology, nanotechnology, and 3D printing, emphasizing that these technologies will have an unimaginable impact on our lives.
The author argues that whether these technologies have a positive or negative effect on society depends largely on who controls them. He cites concerns raised by prominent figures like physicist Stephen Hawking and entrepreneur Elon Musk about the rapid development of artificial intelligence and its potential to fundamentally alter humanity's path.
Goodman encourages readers to think critically about how much of this technology we want in our lives. He uses the example of driverless cars to illustrate this point: while the technology is fascinating, would you trust the lives of your family to a car driven by a system that could potentially be hacked?
Practical Advice for Protecting Yourself
Throughout the book, Goodman offers practical advice for protecting ourselves in the digital age. Here are some key recommendations:
Be mindful of the pictures you take and share. Always encrypt sensitive images before sending them.
Encrypt all your data. Use encryption programs like BitLocker and FileVault to protect the information on your devices.
Create a "guest" account on your computer for day-to-day use, and only use the "admin" account when updating programs from trusted sources.
Turn off your computer when not in use. Do the same with Bluetooth, Wi-Fi, and hotspots when you don't need them.
Only access sensitive information (like online banking) from your own devices. Avoid using public computers or networks for these tasks.
Use strong, unique passwords for each account and change them regularly.
Be cautious about what you share on social media, especially information about your location or upcoming absences from home.
Research new apps before installing them to understand their privacy policies and data collection practices.
Conclusion
"Future Crimes" is a wake-up call for anyone living in the digital age. Marc Goodman's thorough exploration of the dark side of technology serves as both a warning and a guide for navigating the increasingly complex digital landscape.
The book's central message is clear: while technology has brought immense benefits to our lives, it has also created new vulnerabilities that we must be aware of and actively protect against. From the data we unknowingly share through our smartphones and social media accounts to the potential for large-scale attacks on critical infrastructure, the threats are real and growing.
However, Goodman's work is not merely a pessimistic view of technology. Instead, it's a call to action, urging readers to take control of their digital lives and make informed decisions about the technologies they use. By understanding the risks and implementing basic security measures, we can enjoy the benefits of our interconnected world while minimizing our exposure to its dangers.
As we look to the future, with its promise of even more advanced technologies, the lessons from "Future Crimes" become increasingly relevant. We must remain vigilant, continuously educating ourselves about emerging threats and adapting our security practices accordingly.
Ultimately, Goodman's book reminds us that in the digital age, knowledge truly is power. By arming ourselves with information and taking proactive steps to protect our digital lives, we can help shape a future where technology serves humanity, rather than the other way around.