MARC GOODMAN ~ FUTURE CRIMES ~ 2015

~ C-D-A-V ~ Connected – Dependent – And – Vulnerable

~ P&P-IACW ~ Progress And Peril – In A Connected World

~ TWIF(AWO) ~ The World Is Flat (And Wide Open)

~ TGODOCC ~ The Good Old Days Of Cyber Crime

~ TME ~ The Malware Explosion

~ TSI ~ The Security Illusion

~ SC ~ System Crash

~ AVGIG ~ A Vulnerable Global Information Grid

~ MO ~ Moore’s Outlaws

~ TWOE ~ The World Of Exponentials

~ TCS ~ The Crime Singularity

~ CTC-CTW ~ Control The Code – Control The World

~ YNTC-YTP ~ You’re Not The Customer – You’re The Product

~ OGDW-WTNTY ~ Our Growing Digital World – What They Never Told You

~ TSNAII-Y ~ The Social Network And Its Inventory – You

~ YL-HTDI ~ You’re Leaking – How They Do It

~ TMETIlF ~ The Most Expensive Things In Life Are Free

~ TACA(AY)~ Terms And Conditions Apply (Against You)

~ MM ~ Mobile Me

~ PYD?-TAAFT ~ Pilfering Your Data? – There’s An App For That

~ L/L/L ~ Location / Location / Location

~ TSE ~ The Surveillance Economy

~ YTHWB?-MTDB ~ You Thought Hackers Were Bad? – Meet The Data Brokers

~ AY ~ Analyzing You

~ BIGNTH ~ But I’ve Got Nothing To Hide

~ PRAOUS ~ Privacy Risks And Other Unpleasant Surprises

~ OPVB ~ Opening Pandora’s Virtual Box

~ KIP-CIK-A-OWR ~ Knowledge Is Power – Code Is King – And – Orwell Was Right

~ BD-BR ~ Big Data – Big Risk

~ DITNO ~ Data Is The New Oil

~ BS-GV-OB? ~ Bad Stewards – Good Victims – Or Both?

~ DBAPSOYDT ~ Data Brokers Are Poor Stewards Of Your Data Too

~ SNI ~ Social Networking Ills

~ ID-TLOIT ~ Illicit Data – The Lifeblood Of Identity Theft

~ S-B-A-E-OM! ~ Stalkers – Bullies – And – Exes – Oh My!

~ OTTM ~ Online Threats To Minors

~ HGH ~ Haters Gonna Hate

~ B2.0 ~ Burglary 2.0

~ TS&TK ~ Targeted Scams And Targeted Killings

~ CIOLGD ~ Counterintelligence Implications Of Leaked Government Data

~ TSWLM ~ The Spy Who Liked Me

~ ITPH ~ I.T. Phones Home

~ MPOSI ~ Mobile Phone Operating System Insecurity

~ MTA ~ Mind The App

~ WDMFANATMC? ~ Why Does My Flashlight App Need Access To My Contacts?

~ MDANT ~ Mobile Device And Network Threats

~ HMP ~ Hacking Mobile Payments

~ YLBTSOTC ~ Your Location Becomes The Scene Of The Crime

~ CWA ~ Cloudy Weather Ahead

~ TDSOBD ~ The Darker Side Of Big Data

~ ISWT ~ In Screen We Trust

~ LIAMW ~ Life In A Mediated World

~ DNC ~ Does Not Compute

~ ITYWMF ~ I Thought You Were My Friend

~ FSE ~ Fatal System Error

~ WSAB ~ When Seeing Ain’t Believing

~ SOTC ~ Screen Of The Crime

~ SS ~ Stock Screeners

~ MS-MP ~ Mo’ Screens – Mo’ Problems

~ LIS-GPSH ~ Lost In Space – GPS Hacks

~ SP-HCI-F-FAM ~ Screen Play – Hacking Critical Infrastructure – For – Fun And Mayhem

~ CAD ~ Control – Alt – Deceit

~ TFOC ~ The Future Of Crime

~ TL(C)SU ~ The Lean (Criminal) Start-Up

~ ASMOC ~ A Sophisticated Matrix Of Crime

~ CU ~ Crime U

~ IFTU ~ Innovation From The Underworld

~ FCSTCS ~ From Crowdsourcing To Crime Sourcing

~ ITDU ~ Inside The Digital Underground

~ PTTDW ~ Passport To The Dark Web

~ AJITA ~ A Journey Into The Abyss

~ DC ~ Dark Coins

~ CAAS ~ Crime As A Service

~ C.C ~ Crimeazon.Com

~ TM-IC ~ The Malware-Industrial Complex

~ NOTLD-WBZA ~ Net Of The Living Dead – When Botnet Zombies Attack

~ CCA ~ Committing Crime Automagically

~ WATAH ~ When All Things Are Hackable

~ WTWTA ~ Where The Wireless Things Are

~ ITIOT ~ Imagining The Internet Of Things

~ CE-I ~ Connecting Everything – Insecurely

~ OP ~ Obliterating Privacy

~ HH ~ Hacking Hardware

~ MC-MV ~ More Connections – More Vulnerabilities

~ HHH ~ Home Hacked Home

~ FCTCH ~ From Carjacking To Car Hacking

~ WTOK ~ What The Outlet Knows

~ BA&BH ~ Business Attacks And Building Hacks

~ TSCOS ~ The Smart City Operating System

~ HY ~ Hacking You

~ MTMTE-TWOWC ~ More Than Meets The Eye – The World Of Wearable Computing

~ YBMH-TDOIC ~ You’re Breaking My Heart – The Dangers Of Implantable Computers

~ IC-HB ~ Identity Crisis – Hacking Biometrics

~ FC(AH) ~ Fingers Crossed (And Hacked)

~ YP?-IIWAOYF ~ Your Password? – It Is Written All Over Your Face

~ AR ~ Augmenting Reality

~ TROHV ~ The Rise Of Homo Virtualis

~ ROTM-WCCG3D ~ Rise Of The Machines – When Cyber Crime Goes 3-D

~ W-R ~ We – Robot

~ TMI(R) C ~ The Military-Industrial (Robotic) Complex

~ ARIEHAO ~ A Robot In Every Home And Office

~ HNNA ~ Humans Need Not Apply

~ R:R-L-E-A-P ~ Robot: Rights – Law – Ethics – And – Privacy

~ HR ~ Hacking Robots

~ GOD ~ Game Of Drones

~ RBB ~ Robots Behaving Badly

~ AOTD ~ Attack Of The Drones

~ TFORAAM ~ The Future Of Robotics And Autonomous Machines

~ PC ~ Printing Crime

~ NGST-WCWOTB ~ Next Generation Security Threats – Why Cyber Was Only The Beginning

~ NI ~ Nearly Intelligent

~ TTMA ~ Talk To My Agent

~ BBAATFOMN ~ Black-Box Algorithms And The Fallacy Of Math Neutrality

~ WWTTALOC ~ When Watson Turns To A Life Of Crime

~ AGI ~ Artificial General Intelligence

~ TIG-BCI ~ Tapping Into Genius – Brain-Computer Interface

~ MR-BW-A-NH ~ Mind Reading – Brain Warrants – And – Neuro-Hackers

~ BIIT ~ Biology Is Information Technology

~ BC&DNAHD ~ Bio-Computers And DNA Hard Drives

~ JPFR ~ Jurassic Park For Reals

~ IOTBS-GP-BE-&-DNAS ~ Invasion Of The Bio-Snatchers – Genetic Privacy – Bio-Ethics – And – DNA Stalkers

~ BC&NOFTM ~ Bio-Cartels And New Opiates For The Masses

~ HTSOL-BC&BT ~ Hacking The Software Of Life – Bio-Crime And Bio-Terrorism

~ TFF-S-NAQ ~ The Final Frontier – Space – Nano And Quantum

~ SP ~ Surviving Progress

~ KA-BS-A-IC ~ Killer Apps – Bad Software – And – Its Consequences

~ SD ~ Software Damages

~ RDP-A-RP ~ Reducing Data Pollution – And – Reclaiming Privacy

~ KTP ~ Kill The Password

~ EBD ~ Encryption By Default

~ TABOOCC-EIE ~ Taking A Byte Out Of Cyber Crime – Education Is Essential

~ THF-TFWL ~ The Human Factor – The Forgotten Weak Link

~ BHCDTS ~ Bringing Human-Centered Design To Security

~ M(N)KB-BAISFTI ~ Mother (Nature) Knows Best – Building An Immune System For The Internet

~ PTTFC ~ Policing The Twenty-First Century

~ PST-TNFGCH ~ Practicing Safe Techs – The Need For Good Cyber Hygiene

~ WTP ~ We The People

~ GTS ~ Gaming The System

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s