MARC GOODMAN ~ FUTURE CRIMES

~ CD&V ~ Connected, Dependent, And Vulnerable

~ P&P-IACW ~ Progress And Peril – In A Connected World

~ TWIF(AWO) ~ The World Is Flat (And Wide Open)

~ TGODOCC ~ The Good Old Days Of Cyber Crime

~ TME ~ The Malware Explosion

~ TSI ~ The Security Illusion

~ SC ~ System Crash

~ AVGIG ~ A Vulnerable Global Information Grid

~ MO ~ Moore’s Outlaws

~ TWOE ~ The World Of Exponentials

~ TCS ~ The Crime Singularity

~ CTC-CTW ~ Control The Code – Control The World

~ YNTC-YTP ~ You’re Not The Customer – You’re The Product

~ OGDW-WTNTY ~ Our Growing Digital World – What They Never Told You

~ TSNAII-Y ~ The Social Network And Its Inventory – You

~ YL-HTDI ~ You’re Leaking – How They Do It

~ TMETIlF ~ The Most Expensive Things In Life Are Free

~ TACA(AY)~ Terms And Conditions Apply (Against You)

~ MM ~ Mobile Me

~ PYD? – TAAFT ~ Pilfering Your Data? – There’s An App For That

~ LLL ~ Location, Location, Location

~ TSE ~ The Surveillance Economy

~ YTHWB?-MTDB ~ You Thought Hackers Were Bad? – Meet The Data Brokers

~ AY ~ Analyzing You

~ BIGNTH ~ But I’ve Got Nothing To Hide

~ PRAOUS ~ Privacy Risks And Other Unpleasant Surprises

~ OPVB ~ Opening Pandora’s Virtual Box

~ KIP-CIK-A-OWR ~ Knowledge Is Power – Code Is King – And – Orwell Was Right

~ BD-BR ~ Big Data – Big Risk

~ DITNO ~ Data Is The New Oil

~ BS-GV-OB? ~ Bad Stewards – Good Victims – Or Both?

~ DBAPSOYDT ~ Data Brokers Are Poor Stewards Of Your Data Too

~ SNI ~ Social Networking Ills

~ ID-TLOIT ~ Illicit Data – The Lifeblood Of Identity Theft

~ SB&E-OM! ~ Stalkers, Bullies, And Exes – Oh My!

~ OTTM ~ Online Threats To Minors

~ HGH ~ Haters Gonna Hate

~ B2.0 ~ Burglary 2.0

~ TS&TK ~ Targeted Scams And Targeted Killings

~ CIOLGD ~ Counterintelligence Implications Of Leaked Government Data

~ TSWLM ~ The Spy Who Liked Me

~ ITPH ~ I.T. Phones Home

~ MPOSI ~ Mobile Phone Operating System Insecurity

~ MTA ~ Mind The App

~ WDMFANATMC? ~ Why Does My Flashlight App Need Access To My Contacts?

~ MDANT ~ Mobile Device And Network Threats

~ HMP ~ Hacking Mobile Payments

~ YLBTSOTC ~ Your Location Becomes The Scene Of The Crime

~ CWA ~ Cloudy Weather Ahead

~ TDSOBD ~ The Darker Side Of Big Data

~ ISWT ~ In Screen We Trust

~ LIAMW ~ Life In A Mediated World

~ DNC ~ Does Not Compute

~ ITYWMF ~ I Thought You Were My Friend

~ FSE ~ Fatal System Error

~ WSAB ~ When Seeing Ain’t Believing

~ SOTC ~ Screen Of The Crime

~ SS ~ Stock Screeners

~ MS-MP ~ Mo’ Screens – Mo’ Problems

~ LIS ~ Lost In Space – GPS Hacks

~ WGTA ~ When General Tso Attacks

~ SP-HCIFFAM ~ Screen Play – Hacking Critical Infrastructure For Fun And Mayhem

~ CAD ~ Control – Alt – Deceit

~ TFOC ~ The Future Of Crime

~ TL(C)SU~ The Lean (Criminal) Start-Up

~ ASMOC ~ A Sophisticated Matrix Of Crime

~ CU ~ Crime U

~ IFTU ~ Innovation From The Underworld

~ FCSTCS ~ From Crowdsourcing To Crime Sourcing

~ ITDU ~ Inside The Digital Underground

~ PTTDW ~ Passport To The Dark Web

~ AJITA ~ A Journey Into The Abyss

~ DC ~ Dark Coins

~ CAAS ~ Crime As A Service

~ C.C ~ Crimeazon.Com

~ TM-IC~ The Malware-Industrial Complex

~ NOTLD-WBZA ~ Net Of The Living Dead – When Botnet Zombies Attack

~ CCA ~ Committing Crime Automagically

~ WATAH ~ When All Things Are Hackable

~ WTWTA ~ Where The Wireless Things Are

~ ITIOT ~ Imagining The Internet Of Things

~ CE-I ~ Connecting Everything – Insecurely

~ OP ~ Obliterating Privacy

~ HH ~ Hacking Hardware

~ MC-MV ~ More Connections – More Vulnerabilities

~ HHH ~ Home Hacked Home

~ FCTCH ~ From Carjacking To Car Hacking

~ WTOK ~ What The Outlet Knows

~ BA&BH ~ Business Attacks And Building Hacks

~ TSCOS ~ The Smart City Operating System

~ HY ~ Hacking You

~ ‘WACN’ ~ “We Are All Cyborgs Now”

~ MTMTE-TWOWC ~ More Than Meets The Eye – The World Of Wearable Computing

~ YBMH-TDOIC ~ You’re Breaking My Heart – The Dangers Of Implantable Computers

~ IC-HB ~ Identity Crisis – Hacking Biometrics

~ FC(AH) ~ Fingers Crossed (And Hacked)

~ YP?-IIWAOYF ~ Your Password? – It Is Written All Over Your Face

~ ARV~ Augmenting Reality

~ TROHV ~ The Rise Of Homo Virtualis

~ ROTM-WCCG3D ~ Rise Of The Machines – When Cyber Crime Goes 3-D

~ W,R ~ We, Robot

~ TMI(R) C ~ The Military-Industrial (Robotic) Complex

~ ARIEHAO ~ A Robot In Every Home And Office

~ HNNA ~ Humans Need Not Apply

~ R:RLE&P ~ Robot: Rights, Law, Ethics, And Privacy

~ D,WR ~ Danger, Will Robinson

~ HR ~ Hacking Robots

~ GOD ~ Game Of Drones

~ RBB ~ Robots Behaving Badly

~ AOTD ~ Attack Of The Drones

~ TFORAAM ~ The Future Of Robotics And Autonomous Machines

~ PC ~ Printing Crime

~ NGST-WCWOTB ~ Next Generation Security Threats – Why Cyber Was Only The Beginning

~ NI ~ Nearly Intelligent

~ TTMA ~ Talk To My Agent

~ BBAATFOMN ~ Black-Box Algorithms And The Fallacy Of Math Neutrality

~ WWTTALOC ~ When Watson Turns To A Life Of Crime

~ AGI ~ Artificial General Intelligence

~ TIG-BCI ~ Tapping Into Genius – Brain-Computer Interface

~ MRBW&NH ~ Mind Reading, Brain Warrants And Neuro-Hackers

~ BIIT ~ Biology Is Information Technology

~ BC&DNAHD ~ Bio-Computers And DNA Hard Drives

~ JPFR ~ Jurassic Park For Reals

~ IOTBS-GP-BE-&-DNAS ~ Invasion Of The Bio-Snatchers – Genetic Privacy – Bio-Ethics – And – DNA Stalkers

~ BC&NOFTM ~ Bio-Cartels And New Opiates For The Masses

~ HTSOL-BC&BT ~ Hacking The Software Of Life – Bio-Crime And Bio-Terrorism

~ TFF-SN&Q~ The Final Frontier – Space, Nano And Quantum

~ SP ~ Surviving Progress

~ KA-BS&IC ~ Killer Apps – Bad Software And Its Consequences

~ SD ~ Software Damages

~ RDP&RP ~ Reducing Data Pollution And Reclaiming Privacy

~ KTP ~ Kill The Password

~ EBD ~ Encryption By Default

~ TABOOCC-EIE ~ Taking A Byte Out Of Cyber Crime – Education Is Essential

~ THF-TFWL ~ The Human Factor – The Forgotten Weak Link

~ BHCDTS ~ Bringing Human-Centered Design To Security

~ M(N)KB-BAISFTI ~ Mother (Nature) Knows Best – Building An Immune System For The Internet

~ PTTFC ~ Policing The Twenty-First Century

~ PST-TNFGCH ~ Practicing Safe Techs – The Need For Good Cyber Hygiene

~ MPPP ~ Meaning Public-Private Partnership

~ WTP ~ We The People

~ GTS ~ Gaming The System

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s