Marc Goodman

Global Security Advisor and Futurist

Focused on the disruptive impact of advancing technologies
on security, business and international affairs.
Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It

Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It

“A riveting read.”— Nassim Nicholas Taleb, NY Times Bestselling author of The Black Swan
Latest entries
Participating in the White House Roundtable Discussion on Cyber Security

Participating in the White House Roundtable Discussion on Cyber Security

I recently had the honor of being invited to the White House for a small expert discussion on driving innovation in our national approaches to cyber security.
VentureBeat Interview in the New York Times

VentureBeat Interview in the New York Times

Crimesourcing and Crime as a Service—“Organized crime is exactly that – organized,” said Marc Goodman at this week’s O’Reilly Strata conference, “especially in the field of cyber crime...Technology has allowed cybercriminals to become more like high-growth startups. Datacrime can be scripted and automated and it scales."
The Economist Online: The Hacker's Enterprise

The Economist Online: The Hacker’s Enterprise

Criminals deftly exploit the data deluge, by Marc Goodman. While businesses around the world struggle to understand the how to profit from the information revolution, one class of enterprise has successfully mastered the challenge—international organised crime.
Forbes Article on the Crowd Sourcing of Crime

Forbes Article on the Crowd Sourcing of Crime

From Crowdsourcing to Crime-sourcing: The Rise of Distributed Criminality. Crowdsourcing began as a legitimate tool to leverage the wisdom of the crowds to solve complex business and scientific challenges. Unfortunately, these very same techniques are increasingly being adopted by the criminal underground for nefarious purposes.
DNA: The next big hacking frontier

DNA: The next big hacking frontier

I was recently interviewed  by the Washington Post on the subject of Bio Hacking; the story available online here. By Vivek Wadhwa, Published: December 7 | Updated: Thursday, December 8, 6:00 AM Imagine computer-designed viruses that cure disease, new bacteria capable of synthesizing an unlimited fuel supply, new organisms that wipe out entire populations and bio-toxins that target world leaders. They sound...
United Nations: Countering the Use of the Internet for Terrorist Purposes

United Nations: Countering the Use of the Internet for Terrorist Purposes

Served as the UN's Principal Researcher for the Project and co-author of the report, addressing the technical aspects related to terrorist use of the Internet.
Homeland Security-Looking Ahead on Technology Threats

Homeland Security-Looking Ahead on Technology Threats

Matthew Harwood interviews
 Marc Goodman on the 
Future of Security on the 
10th Anniversary of 9-11.
IEEE Computer Magazine: The Coming Robotic Crime Wave

IEEE Computer Magazine: The Coming Robotic Crime Wave

Robots will increasingly be used in crime and terrorism, with criminals hacking or copying police and military machines. "The growing availability of robotics knowledge and components will promote a new breed of garden shed robot criminals and terrorists," said the University. "Building robots is 80% cheaper now than 20 years ago and experts are...
The IBM Institute for Advanced Security Expert Blog

The IBM Institute for Advanced Security Expert Blog

While businesses around the world struggle to understand the how to profit from the information revolution, one class of enterprise has successfully mastered the challenge—international organised crime. Though the recent theft and hacking of tens of millions of customer accounts at Sony has garnered much attention, the attack is but the most recent example of...
UN Interregional Crime and Justice Research Institute: Crime and Policing in Virtual Worlds

UN Interregional Crime and Justice Research Institute: Crime and Policing in Virtual Worlds

While it might be tempting to ignore MMORPG crimes as being purely virtual in nature, and thus not “real,” the vast majority of virtual crimes have real world victims. While one can certainly argue whether “virtual rape” indeed constitutes “real rape,” let there be no doubt about the economic or psychological effect of these crimes...
New Scientist Interview

New Scientist Interview

Welcome to the age of the Splinternet Openness is the internet's great strength – and weakness. With powerful forces carving it up, is its golden age coming to an end?
Secret money: ABC virtual currency racket probe

Secret money: ABC virtual currency racket probe

"Bitcoins and other virtual currencies have also been used by criminals to launder money, said Marc Goodman, a former cyber crime law enforcement officer with two decades of experience who now runs his own consultancy, the Future Crimes Institute. "The case of Bitcoin and the malware used to steal them is instructional: you never...
Building A Cutting-Edge Business? Don't Ignore Policy, Law, And Ethics

Building A Cutting-Edge Business? Don’t Ignore Policy, Law, And Ethics

By Ted Greenwald, Contributor Forbes Magazine This article is also available on the Forbes website here. Disruptive businesses transform the economy, as Joseph Schumpeter famously observed, but they also transform society at large. And since commerce requires a buying public, entrepreneurs and businesspeople have a huge stake in the policy questions that arise around emerging...
Book:  Cybercrimes: A Multidisciplinary Analysis

Book: Cybercrimes: A Multidisciplinary Analysis

I authored the chapter in this book on the International Dimensions of Cybercrime, published by Springer, 2010.