Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It First Edition Edition

4.5 out of 5 stars 313 customer reviews
ISBN-13: 978-0385539005
ISBN-10: 0385539002
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$14.99 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$20.94 On clicking this link, a new layer will be open
More Buying Choices
52 New from $4.98 66 Used from $1.95 5 Collectible from $9.89
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Validea's Guru Stock Research
Invest like Wall Street legends: Real-time analysis of 6,000+ stocks using 12 value & growth models. Try it free
$20.94 Free Shipping for Prime Members | Fast, FREE Shipping with Amazon Prime In Stock. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
  • +
  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
  • +
  • Cybersecurity and Cyberwar: What Everyone Needs to Know®
Total price: $60.93
Buy the selected items together

Editorial Reviews

Amazon.com Review

Review

See all Editorial Reviews
NO_CONTENT_IN_FEATURE

Ignite your imagination
with these editor's picks from Kindle books. See more

Product Details

  • Hardcover: 464 pages
  • Publisher: Doubleday; First Edition edition (February 24, 2015)
  • Language: English
  • ISBN-10: 0385539002
  • ISBN-13: 978-0385539005
  • Product Dimensions: 6.3 x 1.1 x 9.5 inches
  • Shipping Weight: 1.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (313 customer reviews)
  • Amazon Best Sellers Rank: #107,885 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Paper or Kindle TOP 1000 REVIEWER on February 5, 2015
Format: Hardcover Vine Customer Review of Free Product ( What's this? )
I'm writing this review on the day in which the news reported a massive hack at Anthem, exposing the private information of 80 million Americans, including names, birth dates, social security numbers, email addresses...everything an identity thief could use to good advantage to ruin your life. So the title of the book is actually wrong. These crimes are not from the future, they are happening even as I write this. The subtitle, "Everything is connected, everyone is vulnerable and what we can do about it" is misleading. From all I can see, there's very little the average person can do.

Even if you dropped off the grid this second, closing your Google gmail account, your Facebook account, your online banking account, it wouldn't make a difference, since their information can be stored indefinitely. You will live in cyber space for generations to come. I recently had occasion to look for work, and many companies required me to check their website rather than approach them in person. When I found a position, the application was online. My new job requires an email address. If I go into a bricks and mortar store, my credit card history is stored in their computers. When I go to the doctor, the whole clinic has an electronic platform with my medical history. There is no escape.

Is it convenient for people to shop, access medical and financial records, search the Internet, play games, watch movies, and chat with friends online? Absolutely. Our lives are much easier because of technology. But the law of unintended consequences applies, and what is easier for us is easier for thieves. They can topple governments and corporations and the little guy alike.

This is an interesting book, but unfortunately it is also extremely depressing and frightening.
Read more ›
Comment 63 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Vine Customer Review of Free Product ( What's this? )
Marc Goodman knows digital security. He can also talk about it in detail without getting lost in technical language that may bore the reader. While there could have been repetitive stuff removed from this long tomb, he clearly understands the vulnerability of being connected, and how easily we all want the convenience of cloud storage, online banking,online shopping, or having our social media open to anyone to admire and praise.

Cybercrime pays and Goodman wrote 392 pages telling the story of how cyber criminals have been getting away with this. Innovative Marketing, Inc (a company also known by the FTC by other names such as Billingnow, BillPlanet PTE Ltd., Globedat, Innovative Marketing Ukraine, Revenue Response, Sunwell, Synergy Software BV, Winpayment Consultancy SPC, Winsecure Solutions, and Winsolutions FZ-LLC) and Partnerkas are two felonous companies he sets as an example, but there are others out there. The first trick is to embed the virus in a legitimate ad or program so that unsuspecting people can download these and reinfect their own systems.

Then there are the big crime gangs, the mafia, who control so much of the cyber crime internationally. They can control the world because they have some of the best hackers working for them, and making good money for it. Some of the stories Goodman recounts are quite hairy, such as doing quick google searches of business executives at airports via smart phones to determine which business executive is the most profitable (to kidnap). Then there's the tactic of crowd sourcing, where a business places a fake ad for employment, only to unwittingly recruit people to commit a crime. Some of these stories are so unbelievable, they are frightening.
Read more ›
2 Comments 47 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Vine Customer Review of Free Product ( What's this? )
It always bothers me when I concur with a book's core assertions, and must recommend audiences not read it anyway. With nonfiction, this usually happens when an author draws our attention to neglected topics, especially those which have often unexamined implications, but the author doesn't stage the argument well. Maybe it reflects my background in teaching composition, but nothing sours my appreciation like an undifferentiated firehose of information. Such is the case with Marc Goodman.

Ex-LAPD turned global digital security consultant, Marc Goodman has participated in increasing corporate and private security measures. This gives him boots-on-the-ground familiarity with how organized crime, espionage specialists, and crafty teenagers abuse today's networked world. When ordinary citizens send credit card information across WiFi or smartphones, when social networks market access to private eyeballs, and when market trackers create massive profiles of everybody online, we're unprecedentedly vulnerable. As Goodman puts it, "Mo' Screens, Mo' Problems."

My problem isn't anything Goodman says. Informed audiences should already understand his broad outline, though he helpfully provides clarifying details. Those Terms of Service agreements you accept without reading? The average American would need 76 eight-hour workdays annually to read them all. PayPal's Terms of Service runs nearly 40,000 words--longer than Dostoevsky's Notes From Underground, without characters or motivations. Even if you read them, most include stipulations that "they" can change terms without notice.

Meanwhile, criminals have developed elaborate processes to circumvent security. Goodman notes, security specialists must anticipate every possible attack; lawbreakers need only find one liability.
Read more ›
6 Comments 202 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It