The School of Greatness - 142 The Fascinating Future of Crime, Hackers, and How to Protect Your Information with Marc Goodman
Episode Date: February 23, 2015"The more things we connect to the internet, the more things there are to hack." - Marc Goodman If you enjoyed this episode, check out links, show notes and more at www.lewishowes.com/142. ...
Transcript
Discussion (0)
This is episode number 142 with Mark Goodman.
Welcome to the School of Greatness.
My name is Lewis Howes, former pro athlete turned lifestyle entrepreneur.
And each week we bring you an inspiring person or message
to help you discover how to unlock your inner greatness.
Thanks for spending some time with me today.
Now let the class begin.
Welcome everyone to the School of Greatness podcast.
My name is Lewis Howes.
I'm your host.
And we've got a special guest on today.
His name is Mark Goodman.
And he's got a book that just came out called Future Crimes.
Everything is connected. Everyone is vulnerable and what we can do about it. And there are a lot
of entrepreneurs who listen to this show, a lot of people who use their smartphones,
who are using computers, and who are using electronics in general, smart TVs, all these
things. And I had a very fascinating conversation with Mark here in my Los Angeles
studio, where he really enlightened me on what technology is capable of happening. And I was
just actually my email was like hacked a couple weeks ago, for the first time ever, you know,
you get those annoying, like emails from your friends have these like phishing click, click here
emails, and you never click on
them because you know they got hacked.
That happened to me, and I never thought that would actually happen to me.
So it was perfect timing for Mark to come on, and Mark is one of the world's leading
authorities on global security.
And in the book, he takes readers deep into the digital underground to expose the alarming
ways criminals, corporations, and
even countries are using new and emerging technologies against you and how this makes
everyone more vulnerable than ever imagined.
We cover everything from how to protect your online information to your business information
to making sure people don't get your access to your passwords and all the other things
that have been happening in the news lately with the digital crimes.
And we also talk about what is going to happen in the future, what hackers are doing, and how to protect yourself for future crimes.
And again, Mark Goodman has spent a career in law enforcement, including work as a futurist with the FBI, senior advisor to Interpol and street police officer.
So he's got a lot of experience here. And I think you're going to love all the things that senior advisor to Interpol and street police officer. So he's got a lot of
experience here. And I think you're going to love all the things that he has to say. He also is
going to give us some tips to protecting yourself with your computer and everything else you've got
going on in the digital world. So without further ado, let's bring on the one and only Mr. Mark
Goodman.
Mark Goodman. Welcome back everyone to the School of Greatness podcast. We've got Mark Goodman on.
How's it going, Mark? I'm doing great. How are you? I'm doing great. I'm back in New York,
LA. I was in New York for a month. It's good to be back. It's so sunny out today.
Big difference from New York City. It's incredible. And we live like half a mile away from each other. So I'm glad you're able to come into the studio. Very excited. And I'm excited
to dive into your book and everything that you know. It's called Future Crimes. Everything is
connected. Everyone is vulnerable and what you can do about it. That's it. Powerful stuff. That's
the book. So here's a story. Last week, I got an email from someone or a message on Facebook that
says, I got a weird email from you. I think you're hacked. And I go, what? And then I got about
50 emails from people saying, what is this? What happened? Is this you? Should I click on this?
It's like phishing thing or whatever. And I was like, it was the first time it's ever happened
to me. And I always get annoyed when I get those from other people. And I'm like, you know,
have your stuff together. Come on. And then it happened to me. So, and I finally figured out like what it was.
And I had to like, someone was logged into my account from like another location.
And so someone said, go down on the bottom of your screen and look to see like whatever
it was.
I had to click on something at the bottom right hand corner of Gmail to like turn off
the other location or something, right?
Or log them out.
Right.
And I was like, how'd they get this in the first place?
Yeah.
It was scary.
It's actually perfect timing that you're here.
That's why I'm here.
So can you tell me?
You called, here I am.
Happy to help.
So how did this happen?
First off, what are the possibilities?
Right.
And what could I do to protect myself with that specific thing in the future?
Well, the first trick is never use the internet.
It's very dangerous.
Stay offline.
Yeah. Okay. Well, the first trick, but every single day.
And those statistics come directly from the chief security officer of Facebook, right?
So if you're sharing anything online, it's just a matter of time before, you know, it's
your turn.
How do people, I mean, how do they find, how do they figure it out?
Are they using systems or software?
Are they actually finding your passwords that you're putting out online somewhere?
Right.
It's a combination of both, actually.
So the old methodology for the hackers were, you know, you think of sort of the super hacker,
evil villain in the movies, or that really smart 17-year-old kid living in his mom's
basement.
What has happened is those guys have taken all of their knowledge and turned it into
software.
So there's actually software that goes out and hacks people.
It's called crimeware. And the same way, you know, there's software as a goes out and hacks people. It's called crimeware.
And the same way, you know, there's software as a service where you can go online and get,
you know, PeopleSoft or Salesforce. There's actually crime that you can subscribe to.
So if you're a low-level thug without technical skills, you can pay a monthly fee or buy a piece
of software that will go out there and commit identity theft, denial of service, all that type
of stuff. And what they're doing is they're constantly spamming, whether it be your Gmail account or your Facebook
account, trying different passwords and try to get it until it works. So right now there's
potentially hundreds, if not more people trying to hack into my accounts somewhere and your accounts
or other people's accounts because they're just throwing software and scripts at it right now. Exactly right. Wow. And sooner or later,
it's about to be cracked. Exactly. And that's why if you look at what's gone in the news recently,
whether it be the Sony hack, the target hack, the Anthem Blue Cross hack, all of these things
of recent days, the reason why they're able to scale is because you don't need human beings
anymore. If a single person, you know, was a bad guy and wants to hang out on the street and rob you, he could hide in a dark alley with a gun and maybe he could
rob five or six people a day. It's a great business model, but you're a businessman. What's
the problem with it? Can't scale. Doesn't scale. Exactly right. So you're thinking like a good
criminal businessman. I appreciate that. So they couldn't scale. So they solved that problem
through technology. If you think back a hundred years ago, how did they solve it?
Trains.
That was the locomotives was the technology of the day.
Bad guys figured out that they could jump on a train and rob 200 people at a time.
Now with exponential technologies, one single individual can rob 100 million people.
And that's what happened with the Target hack.
For example, one 17-year-old kid in Moscow using software, not that he invented, but that he bought, was able to go ahead and create that hack in which one third of America was victimized.
So one person can rob 100 million people.
That's never been possible before in the history of humanity.
Now, what exactly happened during that case?
Because I remember hearing about it, and I think some of my friends had been affected, but I actually didn't follow it that much. I just remember people saying about Target and
they got hacked. Yeah, Target got hacked. This was right before Christmas, I think of 2014
was when it went down and a bunch of people had their accounts compromised. So Target-
Their credit cards. Their credit cards. Through this one kid.
Right. He got their money or he got their credit card information?
He got their credit card information and he got their account information and so we can start billing exactly so the whole idea was
for him to do both identity theft and to charge other people's credit cards but what was fascinating
about that is how he got in and that's kind of the world that we live in today the world that's
changing he did not hack the cash registers or the point of sale terminal initially guess how he got into the target network
hacking facebook or something close but not really he hacked the air conditioning no way yeah this is the thing that people don't understand you've probably heard of the internet of things so
everybody talks about this idea of like we're connecting more and more things to the internet
so it started with our computers then it's phones then it's's Xboxes and cars and pacemakers, cameras,
televisions, garages, smart homes, smart cities, all of that. Exactly. So what this kid did was
he went ahead and found out that Target used an outside contractor to manage their air conditioning
systems across all of their Target stores in America. He sent a phishing email to a particular
guy at that company. He clicked on the link and
infected his computer at the air conditioning company. From the air conditioning company,
they were able, this one kid, 17 years old, was able to hack into the main network of Target,
then into their financial networks, then into their purchase network, and then down to the
very point of sale terminals at hundreds of Target stores across the country. Oh my goodness.
So the challenge with this is, you know, people talk about the internet of things and it sounds
great and we're going to have all this cool stuff. You know, you can open up your garage
door with your iPhone, turn off the lights in your house, get a nest to control your temperature when
you're out of the house. But the flip side of that is the more things we connect to the internet,
the more things there are to hack.
The easier it is to hack too, right?
Exactly. Exactly. My joke about this is the internet of things is just the internet of
things to be hacked, right? We can't even protect the stuff that we have today,
let alone the billions of devices we're going to be connecting in the future.
So if a big company like Target or Anthem Blue Cross or any other big companies
are getting hacked left and right, when you think that they
would have so much security or steps to get through to get hacked, it lets you know that way
it's even easier for any one individual to get hacked. It's probably a thousand times easier for
me and you to get hacked. Maybe not you, but me. I'm here to protect you. It'll be fine. No, I mean,
the fact of the matter is, is that in many of these cases, there's an error, right? So as much as companies want to focus on information security, they're spending a lot of money. The question is, are they spending it wisely? And it's really hard to protect everything because it's what they call an asymmetric threat. The good guys have to lock every door, every window, every way to get into the house. And the bad guys only need to find one way to get in.
So think about it.
If you're a company like General Electric with 100,000 employees and 200 companies with thousands of servers and laptops and iPhones and Android devices, all the bad guys need is just one of them.
They just need one employee in Kazakhstan or Seattle to click on the wrong thing.
Or give it to them the information.
Exactly.
Or just infiltrate and become friends with them and say, hey, can you give me this information?
100%.
And there have been lots of examples of just that too.
Give me some money or I'll give you a cut or something, right?
Yeah, there's a great example of that.
There was a company in America called AMSC which sold wind turbines.
And they were, this is something for your entrepreneurs out there listening to.
So they sold wind turbines. They were doing a huge multi-billion dollar deal in China. And they were having problems negotiating with the Chinese. And then all of a sudden,
the Chinese got access to their source code for their wind turbines, the special software that
ran the turbines, which was worth billions of dollars intellectual property. How did they do it?
was worth billions of dollars intellectual property how did they do it turns out they found a guy on facebook who was who they identified as an engineer so on linkedin he said that he was an
engineer he worked at amsc and you know he the chinese were able to figure out okay this guy's
got access to the software they want but then he wrote on facebook and linkedin my bosses are a
bunch of idiots i can't believe that i'm working for such dummies. Oh my goodness. Okay. Now what do we know? This guy's disgruntled. All right. That's
a good step. Then he posted on Facebook, an update that said to all my friends, I'm really sorry,
but my wife and I are getting a divorce. It's been a long time coming. Life sucks, et cetera,
et cetera. And so now the Chinese knew that he hated his job. He was losing his wife. And then
he started talking about how he needed money. So they had some people approach him through Facebook, reached out to him,
tried to hire him as a consultant, brought him into China, gave him all the prostitutes that
he wanted and paid him $1.7 million. With that $1.7 million investment, they got a multi-billion
dollar piece of software. Oh my goodness.
So all that stuff that you're posting out there and you think is going into nowhere,
people are paying attention. It's not just in the ether. There are people that are watching what you're doing online.
Wow. That's insane. Now, how did you get into all this? I heard it was from a spell check
mistake originally early on. Is that right?
Yeah, sort of. So my background's in law enforcement. I started out as a street cop and then worked as an investigator.
In LA, PD, right?
Exactly.
And then worked as an investigator and all that in the mid to late 1990s.
I was working as a regular investigator.
And all of a sudden, I was in the detective squad room.
And my lieutenant screamed my name.
Good man, get your ass over here.
And I'm like, OK, I'm in trouble.
And my lieutenant asked me a question.
He said, hey, I got a question for you.
Do you know how to spell check in WordPerfect?
And I said, yeah, it's a shift F2.
And my lieutenant got this big smile on his face.
He's like, I knew you were a tech geek.
I got a case for you.
So the fact that I could spell check back in 1995 in the police department made me like the technical genius of the police department as part of the Geek Squad.
Because I knew spell check.
Very advanced technique.
And then that just led to my first case and another case.
And from there, I went to go work with Interpol and the United Nations all over the world kind of on all these cybercrime issues.
That's cool.
Did you want to do this early on?
Was this like, I want to be...
I wanted to be a cop when I was a kid.
So like a lot of kids, you know...
An investigator.
Yeah, I thought it'd be fun.
Actually, I want to be a street cop,
which is exactly what I wanted to do.
I grew up in New York.
I watched all the New York City police officers.
You know, and there was a lot of crime at the time
when I was growing up.
And it seemed like, okay,
I want to make a difference in my community.
And there was such tremendous levels of crime like that.
So you can make a difference for the later generation.
You know, it was the 9-11 was kind of their call to action.
But for my generation, just, you know, 10, 15 years earlier, it was the rampant levels of crime in the city.
So if you wanted to help people, help your community, becoming a cop was a great way to do that.
Right.
And when did you move out to LA?
I came out here, it would have been in the, around 1990.
1990.
So yeah, originally from New York, but then came out to California.
And did you have a love for technologies and computers growing up and robots or?
No, not at all.
There was none of that.
So that was the point I wanted to make, you know, why become a cop?
A lot of, you know, young boys, if you're a boy, you want to be a football player, you want to be an astronaut, a firefighter, a policeman.
And most people, you know, grow out of that and become hedge fund managers. But nobody as a kid
wants to be a hedge fund manager. They want to do the fun jobs. And I was lucky that I got to do
one of my dream jobs. That's cool. So in the book, do you open up about confidential things
that you're not allowed to talk about?
I love the way you phrased that question.
So do you reveal classified information in violation of federal law?
Exactly.
No.
Let me be very, very clear about that.
All of this information is unclassified.
It's not commonly available.
A lot of it comes from the digital underground, the hacker underworld.
But none of this is classified.
But what I do share are things that I'm allowed to talk about. Commonly available. A lot of it comes from the digital underground, the hacker underworld. But none of this is classified.
But what I do share are things that I'm allowed to talk about.
And there's a database that I had of several thousand sort of crazy cybercrime hacking incidents that I was able to talk about.
And I bring those stories into the book. And that's kind of one of the key things I tried to do is there have been quite a few books on cyber evil written.
I tried to make this fun and interesting. So as I was mentioning to you earlier, you know, I'm quoting everybody from
Homer Simpson. We're talking about Lady Gaga, Justin Bieber, and you know, Voltaire and Vladimir
Putin. So it's kind of all over the map. That's cool. I like that. And did you see black hat?
I haven't yet. No, it's on my to do. I saw my girlfriend actually fell asleep in the middle
of it, but I liked it. It was just kind of of long right uh but it's funny because they did a similar hack where they hack like a what was it
like a uh a water turbine or something yes and they hacked into that and they would blow it up
and then that's what caused like the hacking or something right um that's interesting that
actually pretty much happened in real life yeah i guess the big thing you know people focus on
their mobile phones and they focus on the laptops but if if you take it up to the 35,000 foot level for a
second, our entire society is built on computers, right? If you think about it, today's automobiles,
it's not like, you know, the model Ts that were mechanical devices or even a 65 Chevy.
These are all computers. A car today has got on average 250 microchips in it it controls everything from
the windshield wipers to the airbags to the brakes the locks everything everything the radio and
they're all hackable like literally from across the country the right person could go ahead and
hack your brakes so when you're driving on the highway really 60 miles an hour yeah they can get
in there that's been demonstrated before. So these cars are becoming
hackable. So cars today are computers that we ride in, right? Elevators are boxes that are
computers that we ride in. And planes are nothing more than computers that we fly in. And if you
look at the converse, right? If you think about all those wearables, you know, Fitbits, things
like that, those are computers that we wear. And pacemakers, diabetic pumps, those are computers we're putting inside of ourselves. So man and machine are melding
together as one. And all of these critical infrastructures can be hacked. So I like to
say there's never been built a computer system that couldn't be hacked. And that has real
implications for the world that we're building for the following reason. Our financial systems,
our electrical grids, bridges,
tunnels, air traffic control, ATM, all entirely hackable. And so I guess that's probably one of
the big points I bring out in Future Crimes, the book, is the fact that we're rushing, you know,
can I say balls to the wall? Full speed ahead, I'll say. We're running full speed ahead to turn
everything into computer. And there's tremendous like upsides of all this. I want to be really, really clear.
I'm totally pro-technology.
I work up in Silicon Valley.
I teach at Singularity University.
I am a techno-utopian.
So I'm not saying we shouldn't adopt this technology.
Technology will bring literally billions of people out of poverty.
It will feed people, give us clean water, educate a Maasai warrior on the plains of
the Serengeti with a smartphone, can now take
classes at MIT for free. So there's tremendous upside to the tech. All I'm saying is, stand by,
let's take a second, let's take a breath and think about, does my pacemaker really need to be
online, right? Think about that type of stuff. So would you say in general that society is
pretty clueless or naive to what's actually
happening?
I think the news would suggest that they are, right?
I mean, I think most people, it kind of comes down to two things.
Most people don't realize all the things around them that are computers, whether it be their
watches, their microwaves, their refrigerators.
Here's a great example that just broke a few days ago with Samsung televisions.
Samsung in the UK has this new television where you can
talk. So rather than talk to it, so rather than clicking on your remote control, you can say play
on, off, pause, you know, channel 27, whatever. But they're using the conversations for third
parties or something, right? Exactly. Right. That's exactly right. So what they're doing is
they're taking those conversations, sending them out to third parties to do the voice recognition, and then they're translating it. But the bigger problem is that voice recognition is always on.
So Samsung's huge mistake was they put out a bulletin to their customers that said,
note, please be careful about what you say in front of your television because we're always
listening. So imagine you and your wife or girlfriend or boyfriend are sitting in the
bedroom, right? Just talking about whatever you're talking about. Your television is listening to all
of that and pumping it through Samsung's computers for voice recognition. Why would you buy those
TVs? Convenience, right? Convenience. What people will do for convenience. There was a time when
you actually had to get off your ass and change the channel manually. And then we came up with clickers.
I remember that time.
I was very young.
Exactly.
Then we came up with clickers.
And apparently that's too hard to push a button.
You could get way too much exercise by accident that way.
So now we allow you to talk to your television.
That's crazy.
Is that legal?
Well, it's a really good question.
What is very different is if you bought a television in 1980, it did not come with terms of agreement or terms of service.
When you buy that Samsung TV and set it up, you're clicking on something that says, I hereby grant, you know, Samsung the right.
My wife.
Exactly, to go ahead and record me in the bedroom.
Oh, my gosh.
For businesses, we were talking about that before we went on air.
You and I were talking about how businesses can protect themselves. If you have that same Samsung television in your conference room, at your office place, or at your startup,
the same thing can happen. So if you're talking about your business plans, your intellectual
property, where you plan on taking things, now your television can listen to.
Your competitor, if they found out the right way to hack it, could hack your computer
to listen to all your conversations. Not just your computer, but your television too.
On your TV, yeah.
In my book, I actually talk about this.
So there was a study done where tens of thousands of Polycom boxes, Cisco computer equipment,
you know, their teleconferencing equipment, whether they be video cameras or the Polycom
boxes that we see have been hacked.
The New York Times wrote a story about that.
So the old kind of model of
industrial espionage was, I would sneak into your building and hide a bug underneath the table.
You don't need to do that anymore.
Don't need to do that anymore. I just hack your Polycom box or exactly your video conference
system.
Wow. Have you ever tested any of this yourself for experiments or like?
I can neither confirm nor deny at this time.
Wow. Okay. Can you talk about if you've tried it on yourself to hack into your own stuff?
Yes.
You have?
Yeah.
Have you been able to succeed?
Can you give examples or no?
I mean, I would just say, as I mentioned earlier on, crime has become software.
So you don't need to become a master hacker now.
You just need to buy the piece of software.
So if you think of there was a famous case involving a young woman called Cassidy Wolf, 16, 17 year old girl. She was Miss Teen America, right? She ended up getting blackmailed by somebody. We didn't know who. One day she just is sitting at her computer and she gets an email that says, hey, I've seen you naked and attached all of these pictures of her naked in her own bedroom and said, if you don't have sex with me online over a video camera,
then I'm going to release this to all of your friends and post these pictures on Facebook.
She freaked out, didn't know what had happened.
Turns out somebody sent her an email.
She clicked on an innocent picture or video and installed a malware on her computer,
and they were able to remotely turn on her camera without her noticing
it because the way the malware was written it doesn't turn on the little green light or the
little red light so the camera's on always exactly so when she was coming out of the shower from her
own bathroom into her bedroom and getting changed somebody was filming her and she didn't know about
it exactly so she didn't it turns out the FBI, she did the right thing.
She went to the FBI, they investigated it and it was one of her classmates.
Shut up.
Yeah.
So it was another 17 year old kid that one of these kids that, you know, nobody would
really talk to.
And he did that to her and he bought the software online to be able to do that.
No way.
Yeah.
So this is why I tell people in the book and I gave you a little gift before we went on
there, which is a camera cover, right?
It can be as simple as a Post-it note or a Band-Aid.
But if you've got a camera that you don't want people to be seeing you to, you know, put something in front of it.
Because just because you don't see the light doesn't mean the camera is not on.
So this could be, somebody could have been recording this whole time ever since I've had the computer.
Possible.
Wow.
And all it takes is a piece of software they can buy
online for probably 100 sometimes less sometimes way less probably maybe get it for free if you
like hack the hack or something right right yeah you can get it you know they say some of these
software you know the way they frame it they don't say commit illegal acts by buying our software
they say parents don't you want to know how to protect your children? Husbands, don't you want to know what your wife is up to? By the way, doing this is a violation
of federal law. Is it? Yes. It's a felony, section 1030. You cannot do this. You cannot do this
legally at all. If they catch you, you go to jail. Wow. Which is exactly what happened to the kid
that had Cassidy Wolfe. He went to jail. He did. Yeah. Multi-year sentence. No way. Yeah.
In federal prison. No way. Wow. That's so scary. It's crazy. Now, how do you protect yourself if, let's say,
someone steals your computer?
Right.
And then I would want to have the software on my own computer so that I could check on my phone
to see who's doing it and take screenshots, right?
It's funny you say that. They actually do make software that you yourself can install that will
do that. And there are lots of cases where people have gone with those screenshots
of somebody, you know, not friendly looking, you know, a bunch of gang members who've got their
computer smoking, getting high, whatever. They take the screenshots to the police and they say,
hey, here's my computer, go get it. And in some cases, depending on the sophistication of the
police department, they will help. In other cases, not. But if your laptop is stolen, the good news is the tools and
techniques to getting it back are getting better. So particularly with Apple, they have-
It's tracking and all that stuff.
Exactly. Apple has a find my laptop or find my iPhone feature. I definitely recommend that you
use that.
What's the single best piece of advice you can give to people to prevent and protect
themselves from cyber crimes or future cyber crimes? The single, if you're asking for just
one, the single best piece of advice would be- Besides not have a computer.
No, I was joking when I said that. The single best piece of advice is stop, think, then connect.
We have this almost compulsion to click on every link we see, to click on every download or attachment that we see.
Don't do that, right?
And think about it, right?
Why would somebody be giving you something for free?
I'll give you another extra bonus tip.
There is no prince in Nigeria that is reaching out to you personally to help him bring billions of dollars out of his country.
And yet every year, tens of thousands of people fall for that scam. So the best piece of advice is to go out there and to use common sense and to pause a
moment before you do all this. And then in the book, I've got something called the update protocol
that I take people through, which explains sort of a six-step process that will reduce their overall
threat level online by 85%. Wow. Can you talk about that right now? Sure.
Of course.
So it's something I kind of created, but it's loosely based upon some research done by the
Australian Ministry of Defense.
Okay.
And what they did is they looked at all the different hacks, you know, hundreds of thousands
of hacks out there.
They went through them and they identified what the common mistakes were that people
were using or how the hackers were getting in.
So I modified that, built upon it, and used some additional research and created the update protocol, U-P-D-A-T-E,
where each letter stands for something. So the first letter is U, update. That means keep your
software updated. I'm sure, Lewis, you've gotten the little notification on your laptop or on your
cell phone, time to update your software. That's a very funny way of saying your software is full of
holes and bugs and security risks right they don't tell you uh they just say update but they don't
tell you why the reason why you're updating is because you previously had all these holes and
malware and risks in your software that they've just figured out and are now fixing they should
tell you you know update or you're more susceptible to hackers. What they do is they bury that language very deep in a whole bunch of other paragraphs. And they say
contain security update or general update or stability issue. They want to minimize what
those risks are because they don't want people to, you know, have doubts about their software.
Or freak out about their product.
Or freak out. Exactly.
Wow, that's interesting.
So update, number one. And you can set that on almost all of your devices to happen automatically. So whether it be your laptop or your cell phone or your browser, things like Flash, PDFs, those are things in particular that bad guys go after, which is something that everybody uses.
So set everything for auto update and that'll be a huge help.
Cool.
D is download.
Be really careful of what you download and from where.
So if you spend a lot of time on Torrents trying to get pirated movies, pirated music, any of that stuff.
There's a likely chance you might click on something bad.
Yes, there's a reason why you're getting a copy of the latest movie, James Bond movie for free, right?
Or whatever, Fast and Furious 27, whatever the movie is.
There's a reason why they're giving it to you.
So that's all with bugs.
And so I tell people,
only download your software from authorized stores, particularly like the Apple type store.
There are a lot of third party purveyors out there. Don't download from there. A is for admin.
Most people don't realize this, but when they create, this is particularly true for desktops and laptops, when they open up that computer for the first time, it allows you to create user
accounts, right? And so you may have one, your wife may have one, your kids may have
one, but each one of those accounts has certain permissions, things that it can and can't do.
And by default, the one account that every computer needs is an administrator account.
So the A in the update protocol is admin account. You don't want to use your computer when you're
logged in as admin on a routine basis.
Do not use it as admin.
Do not use it as admin unless you need to.
And here's the reason why.
If you're logged in as admin and accidentally do click on one of those bad links or one of those embedded files.
The whole computer is hacked basically.
Right.
Because you have permission.
So when you're logged in as admin, you have permission.
You're the administrator.
You have what's called root access.
You can do anything you want to that machine.
So if you click on something, the malware now has permission to run.
If, however, your everyday account is your Lewis account and you're out there surfing and chatting online, you know, sending email on a non-administrator standard user account, if you accidentally click on that malware, it won't execute without asking you for your admin password. That'll be a big clue that there's a
problem. So huge, huge tip. Don't operate your computer every day as admin. Okay. All right.
U-P-D-A-T. Turn your computer off. Really? Oh man, I'm the worst. I know it's probably been
on for like three months. Of course. I need to turn it off. Exactly. Well, here's the reason why I just think about it. When your
computer is on and connected to the net, it's connected to somebody in Russia. It's connected
to somebody, you know, in Iran, you know, wherever it may be, El Salvador, New York, doesn't matter.
The fact of the matter is that hackers can reach out and touch you when your computer is on.
If people just went ahead at night and turned off their computer, or if they
don't feel like rebooting, if they just turned off the wifi, that's eight hours a day that hackers
can't reach out and ping your machine. That means you've reduced your threat level by 33% just by
turning it off. Super simple. Super simple. All right. So that's-
Well, you can turn the wifi off at least.
Turn the wifi off at least. Exactly.
Wow. Okay.
And then E, whoops, I forgot the P. U-P-D-U-P. I forgot the P whenFi off at least. Exactly. Wow. Okay. And then E, uh, oops, I forgot the P
U P D U P. I forgot the P when we went through that. Sorry. Let's go back for a second. I'm
not good at spelling. Sorry. P is password. Uh, before we forget about it, let's talk about
passwords for a second. So everybody hates passwords, right? They tell you it's got to be
uppercase, lowercase, your mother's maiden name, a haiku, whatever it is. It's all really hard to
memorize. Uh, don't count on your own is. It's all really hard to memorize.
Don't count on your own passwords.
I would say 80% to 90% of the people use their passwords on multiple sites.
Don't do that. Or if you use a Facebook login to log into 27 different sites, when you're one of those 600,000 people a day that has their Facebook account compromised, then people are going to take those credentials.
And they're not just going to try them on Facebook.
They're going to try them on Amazon. They're going try them at Citibank you know they're going to
try them at Chase Manhattan oh my god PayPal everything so don't use a single logon for all
of your accounts now you have 50 passwords that you need to memorize how do you do that you don't
memorize them last pass or something exactly exactly right so these great software password
managers out there also called password wallets there are three or four of them that I recommend. And by the way, I would only recommend
these because guess what? Criminals have created their own password managers and uploaded them in
the Android store and places like that. So they want you to give them all of your passwords. So
you mentioned LastPass is a great one. There's also 1Password, the number one password,
So you mentioned LastPass is a great one.
There's also 1Password, the number one password.
And then Dashlane.
And there's another one called KeyPass.
So any one of those four would be great.
So that can store all of your passwords, makes password management super easy.
So we should be using those.
Yes.
And you only have one master password that you need to remember.
For that.
For that, exactly.
What if someone got the master password?
You have to be careful, right?
So you've got to be really good with your password.
I would say make sure you write it down and keep it in your house somewhere too.
So, you know, on a piece of paper.
Okay.
The other thing that you can do with passwords, which is a recent invention, is something called two-factor authentication.
Yeah, I've been doing that.
Great. After I got hacked, I was like, I've got to do this now.
Yeah, time to use that.
Exactly.
So, it's this game of cat and mouse between the good guys and the bad guys.
But it's a Gmail account, Facebook account, Dropbox, PayPal.
There's a little app that you can use on your phone where they'll send you an SMS,
a text message of a one-time password.
This way, even if the guy in Ukraine has compromised your account,
unless they have physical access to your device in your hand, you'll be protected.
So that's the P, and I can't spell.
Now we'll go back to the E, which comes at the end of update. And the E stands for encryption. Basically what encryption does is it scrambles
the data on your computer so that other people can't read it. So to use a very basic example,
if you type the letter A and a hacker gets your computer, they can read the letter A.
But using encryption, it will scramble that letter A and turn it into a super long mathematical phrase, prime number that nobody can understand unless they've got your secret key.
So there's two ways that you can use encryption.
If you're on a Mac, you can use something called FileVault, right?
And that's built into your computer.
What that means is that even if your computer is stolen, if somebody takes it, they cannot read the data on it unless they've got your encryption
password, which you need to log on to your machine. Does this cost something to buy this?
Completely free. Completely free. It's included both in Mac, File, Vault, and then on the Windows
side, I think it's called Bitdefender. So you can use those for free. It'll encrypt. It's called
full disk encryption. And I recommend that to protect your data at rest. The other thing that
you should be doing is protecting your data as it moves around the world, which means a virtual private network.
Basically what it is, it's a pipe that secretly pumps all your information from your computer to the Internet.
Right. So many of us have used Wi-Fi at an airport, in an airport lounge, at Starbucks, libraries, conferences, all of those places. When I'm on a network with 500 other people at a conference or at an airport, any hacker
can go ahead and see the information leaving your machine.
That means I can see your iTunes, what songs you're playing.
I can see your playlist.
I can see your photos, even the ones you don't want me to see.
What you're browsing to.
What you're browsing to, all that stuff.
You can steal the session cookies and log into other websites so if you're in one of those places go ahead and get a virtual private
network vpn there's some trusted companies out there that you can check into it's probably like
10 bucks a month norton semantec those types of companies offer them but don't surf public wi-fi
particularly if you're doing something sensitive like filing your taxes. Wow.
Not to be done at Starbucks.
Oh, my gosh.
This is crazy.
What was the T again?
Turn off.
Turn off.
So U is for update.
P is for password.
D is for download.
A is for administrator account.
T is for turn off.
And E is for encryption.
See, I spelled it right that time.
There you go.
Okay, we've got some fact or fiction.
So kind of like fast answer or...
Fiction.
Fact.
Fact.
Fiction.
So Macs are immune to viruses.
Fiction.
Fiction.
Why is that?
Because they're not...
Because it's a computer.
Because this is a computer.
Traditionally, there's actually an explanation for that.
Traditionally, people thought Macs were safer and they might have been, but it was only because hackers were ignoring them.
Why were they ignoring them?
Think about it from a businessman's perspective.
What's got 98% of the global market in computers?
Windows.
So if I'm going to put the time, energy, and effort into creating a virus, I want to be able to connect and attack those 98% as opposed to going after the small minority.
Not creative artists.
Exactly.
Not designers, right?
Exactly.
So now that Macs are growing, particularly in the iOS, the amount of malware being created
for those is increasing.
Okay.
Well, you already answered this one.
Webcams are being hacked, but yes.
True.
Yeah.
People who create antivirus software are actually the ones creating the viruses, like firemen who start fires.
I haven't heard of that, so I don't think that that's true.
But just on the topic of antivirus, and I talk about this in the book, guess what the detection rate for viruses are on antivirus?
Like how many of the viruses on your computer are they catching?
No idea.
Yeah.
Take a guess.
How many viruses?
Yeah.
Let's say you have 100 viruses.
How many would your antivirus system pick up?
50.
You'd like to think so.
One of the studies I talk about in the book.
Yeah.
Turns out that antivirus, they did a meta study of like 40 of the major antivirus programs.
And when it comes to new and emerging threats, meaning just a couple of months old, the detection rate is only 5%. Oh my goodness. 5%. So that means 95. It's pretty
worthless. I wouldn't say it's worthless, but it's not particularly useful towards new and
emerging threats out there. Could you tell, I mean, how many viruses are on my computer right
now? 164. I don't know. There could be none. There could be a couple. It could be, who knows,
right? Yeah. I mean, there have been other studies that show that from the time you get your computer,
whether you buy it at Best Buy or Apple and go ahead and put it on the internet, it can
be anywhere from 20 minutes to 24 hours before it's infected with something one way or the
other.
Yeah.
It's because all of these are automated.
But the good news is if you're using that update protocol, it'll help you reduce and
prevent those infections.
Okay. Factor fiction. Google tracks everything you do.
True. Yeah. I talk about that in the book as well. People don't realize that. Now you can opt out in
some levels. And if you have listeners in the European Union, there's different laws that affect
people over there than in the United States. They have something called the European Directive on
Data Privacy, which limits how long Google can keep your information,
like up to a year or two,
they have to dump it.
In the United States, there are no limits.
So from the very first time you went into Gmail,
every email that you've written,
every Google Doc you've written,
every search that you've written.
They have access to.
They have it all.
That's scary.
Now, does the federal government,
are they able to have access to that as well?
So one of the things that Mr. Snowden alleged in his leaks is exactly that, that they either pay
companies to get access to this data or that they've even hacked American companies to get
access to this data. There are some examples in the book where your mobile phone provider,
where the U.S. government national security agencies have contracts with companies like AT&T to get access to their data and what goes across their network.
So what are the next way?
Are there a lot of crimes coming, like a big wave of crimes coming?
Or are they already here?
We just don't know about it yet.
It's a great question.
So what you just said reminds me of a quote.
And it's a guy called William Gibson.
And this is how I open up the book.
He wrote a science fiction novel called Neuromancer. And in the book, he has this quote,
the future has already arrived. It's just unevenly distributed. Right. So all of the stuff that we're
talking about is already here. Whether or not people know about it yet is another question.
So in the book, the reason why I called it future crimes is because it's very much focused on where
we're going. If you look at all the hacks as they reported in the media, the reason why I called it Future Crimes is because it's very much focused on where we're going.
If you look at all the hacks as they're reported in the media, Targets hacked, Home Depot's hacked, JPMorgan's hacked.
That's kind of where the analysis ends.
It's kind of like a play-by-play on a football field, right?
But nobody's putting it all in perspective.
And that's what I hope to do with Future Crime is to take all of these hacks and put it in perspective. And the conclusion that I come to is we are just at the first minutes of the first hours of the first days of the internet. We think
we have technology all around us now. We ain't seen nothing yet. I talked about the internet of
things. The internet of things will become possible because of something called the internet
protocol version six. So that's kind of the address book for the internet. How, you know,
if you make a phone call, you punch in your phone number and it knows where to route your call.
The internet has something like that too, called internet protocols to route where your traffic.
So you put in CNN or ESPN, it knows how to get you there. We've run out of space. So in the same way
in New York, they ran out of two one, two area codes. They had a great nine one seven. They did
the same thing with the internet. To tell you how big a
difference there is in those two net protocols, version 4 versus version 6, today's internet
using IPv4 internet protocol version 4 can support about 4.5 billion simultaneous connections to the
net. Tomorrow's internet using internet protocol version 6 can support 78 octillion what the hell is an octillion
yeah it's 78 billion billion billion oh my goodness to put it in like simple terms today's
internet is the size of a golf ball in the next three years we're going to be transitioning to
an internet the size of the sun wow so we're going from golf in the next few years in the next few
years internet protocol version six will be up. What does that mean?
Is it going to be faster?
Is it going to be more information?
What does it actually mean?
It means that we have more addressable space.
So that means right now we talked about your laptop, your smartphone, your Xbox, having access to the Internet.
But in the future, as I mentioned, it's going to be your car will be online.
Your pets will be online.
Your kids will be online.
Plates, drinking glasses, using
technologies like RFID, Bluetooth, that type of stuff. Every physical object, we've seen it with
cars, we've seen it with elevators and airplanes. Every physical object in our place, smart homes,
it's going to be desks, it's going to be beds. Why would we make everything online?
Right. Well, that's interesting. People talk about convenience. Why do you need to be able
to talk to your television? Why should you be able to download Netflix directly onto your TV? Because people want that level of convenience. And there are benefits of it, right?
Sure.
Let's say that lots of parents are concerned about their kids. When they go about school, now you can track where they are. See if they're in schools.
Yeah, if they get kidnapped or something.
Exactly. So you have that type of positive benefit, but IPv6 is going to blow people's
minds in terms of its capabilities. Are we going to notice it actually,
like a difference? When I log on the computer to Wi-Fi in five years, am I going to tell a
difference of what's happening? Well, one of the things that's already
happened and most people haven't noticed is about five years ago, we switched over to where
previously most of the internet traffic was carried out by human beings. So it's people sitting at their keyboards typing away.
Now the majority of the traffic on the internet is what they call M2M or machine to machine.
No way.
So that's bridges, tunnels, easy passes, all these different things,
sharing data back and forth and logging it all.
So there's going to be a ton of machine to machine interaction.
And just to give you a simple example of what
becomes possible in this world is, you know, using an RFID credit card or Apple Pay or any of those
devices would fall into that space. And even things that people haven't even considered, like
maybe you've gone to a fast food restaurant and they give you a paper cup and, you know, you go
up to the soda machine and you fill up your paper cup and it says no refills well that was a hard thing to enforce in the past now there can be an rfid chip built into
your soda cup so that when you go to refill i'll say nope you've already been here once already
or or tap the button to recharge to get a refill exactly exactly by the way korg the coffee makers
if you've heard of them they've just now introduced DRM digital rights management into their little coffee pods. So they've now broken your coffee maker such that if you don't use their little coffee pods, it won't work. Even though it physically fits in there, there's a little electronic chip to make sure that you can only use their approved coffee pods. So this is the way it's going to affect us. That's insane.
Let's talk about DNA hacking.
So I know you mentioned that in here.
What can someone do with someone else's DNA?
Well, Future Crimes talks about not just the crimes of today, but all these new and emerging technologies.
So it's 3D printing, artificial intelligence, 3D printing of guns, 3D printing of explosives, 3D printing of bullets. All of that becomes possible. Can they make a gun right now, 3D printing that they can shoot and kill someone?
Absolutely. Like full-on machine gun type of thing? No way. With bullets? Absolutely. That's
got to be like a billion dollar printer though. Actually not. You can do it on a $2,000 printer
and the price is coming down on that where you can probably do it on a $300 to $500 printer. And print your own gun?
Yep, absolutely.
Handgun?
I spoke at TED, and one of the things I did as part of my TED spiel is I gave this whole TED Talk.
I was in the UK because that's where TED Global was, and I talked about 3D printed weapons.
And, of course, you know in England they are very strict on guns.
You can't have guns.
Even the cops don't have guns over there.
Really?
And so I didn't bring a gun into the UK.
I brought a 3D printer and printed a gun while I was there and printed a silencer and then
demoed that on stage.
You printed it there?
Yeah.
You printed your own gun?
Correct.
And it worked?
Well, I didn't use it there in the audience.
But you showed it?
I showed it to the audience.
You didn't load it?
I did not load it.
You said, I made this here.
It took like two days.
How long does it take?
About a day to go ahead and knock that out.
And silencers and all that stuff.
And by the way, for intellectual property, again, focusing on the businesses that you're out there, think about something like Lego, right?
You go out and buy a box of Lego.
It's like $25, $100 for a big kit.
What is that?
It's just little pieces of plastic.
3D printers can make those little pieces of plastic, right?
You can scan something with your phone or with a Microsoft Kinect.
Boom, you've got a perfect replica.
So all the intellectual property theft that we had around digital goods like music, TV, video games, all that, that's now going to come into physical spaces where you'll be able to create replica of Nike sneakers, right?
Nike actually sells 3D printed sneakers now
that you can design yourself online.
So of course people will be hacking those
and ripping off intellectual property as well.
So I could print off a Mac computer if I wanted to.
That would probably take a while
because you'd need some integrated circuits,
but you could certainly print a Mac case, right?
You know, that $40 that they charge
for a stupid iPhone case?
Right.
You can go ahead and print that for a buck now.
Wow. It's the Star Trek replicator coming to life. And they're like printing organs and all
these other things too, right? Yeah, exactly. They've 3D printed ears. They're working on
hearts, kidneys, all of that stuff. So that's called bioprinting. And that's a whole other
field of technology that's out there. This is insane. It's so crazy.
We also talk about one of the other technologies, which we haven't mentioned yet are robots, right? Yeah. We're
seeing robots all over right now. You know, millions of people have Roomba vacuums in their
house. You've probably seen the Google self-driving car. Uh, we're going to have robots all over us.
Kids toys are being roboticized and lots of cool. There's like a companion thing. I saw like a
Kickstarter campaign with this, uh, little robot thing that you can, it pretty
much does everything.
It sits in the kitchen.
I think that Cynthia Brazil is the woman who's making it.
She's a professor of robotics at MIT.
But it looks amazing.
You're like, it looks like you put it at like the kitchen table with you or eat if you're
going to have FaceTime.
Yeah, I don't remember the name off the top of my head, but you're seeing more of those.
Amazon just created one too.
It's a device that you leave in your kitchen and it kind of looks like, how would I describe
it?
Kind of like a flower pot and kind of a tall flower pot or a big coffee can or something.
And you can just talk to it and you can say, you know, read me my messages.
So it'll bleep when you've got, you know, beep to you when you've got a text message
come in, read message, it'll read it to you.
You can buy movie tickets and all that stuff online.
To take out or whatever you want.
Exactly. And all of that's coming, right? They show kids getting help with their homework. So
you'll see a lot of that.
You don't even have to show up on your kids. You just put them in the thing and they do the
homework with them.
Right. Exactly. Well, look at what most parents now do with an iPad, right? When your kids are
going crazy in the back of the car, just toss them an iPad or an iPhone.
This is nuts.
What are you going to do to stop all this, lewis exactly what are you going to teach me um so in the future literally
you could turn everyone's computer into a bomb essentially at some time right yeah i mean i
wouldn't say i mean i don't want to scare people not a physical explosive in that regard yeah so
we're not gonna blow it up or anything i mean not physically no you couldn't create something like
a circuit charge where it like created a fire inside the computer
i don't know actually you just brought up an example that i wrote about in the book with hp
printers so um you know explosives are different but there was a hack that came out and i talk
about in the book again internet of things one of the things that are now connected to the internet
of course are your printers and photocopiers and things like that. And in the book, I talk about a hack against HP printers. All laser printers have this thing in them called a fuser,
which basically gets very overheated the more copies you make. And so there's a built-in system
to turn off the printer. So if it overheats, they won't, right, exactly. So it'll stop your print
jobs. There's a hack out there, a hardware hack that attacks the fuser and turns off that safety feature. So if you've got 500 sheets of paper in your printer, you can run through a lot of print jobs and they were actually able to remotely start a fire in somebody's house. So you send through all these print jobs, you turn off the overheating element, and now you can start a fire in somebody's home.
Wow. You can start a fire in someone's home. Wow. You can start a fire in someone's home.
Yeah, through their printer.
So besides the update process, what can we do?
Actually, first off, what do you like working with the most?
Do you like working with smartphones or computers
in terms of protecting just personally?
Yeah.
What do you like?
I mean, I talk about it at all levels
right so all these new emerging technologies not just the technologies today but we talked about
the internet of things you know a lot of the technology that we have today your laptop that's
been on the internet for three years probably almost certainly is infected the thing that
concerns me is that we're about to launch this internet of things according to cisco that means
we're going to be adding 50 billion new devices to the internet by 2020. By the way, Intel says it's going to be 200
billion new devices. Before we put every refrigerator, television, car, toy, lamp,
street light online, we should figure out how to secure them. And I guess that's my concern,
right? So we've wired the world, but we failed to secure it. So I gave you some very practical tips in the update protocol,
but in the book, I also kind of jokingly, not so jokingly call this section saving the world,
where I have all these prescriptions for what we can do. And just off the top of my head,
a few of them are, is we need to make much better software right now with software. The trick is
to code it, get it out there, ship it,
ship it, ship it, launch it, and we'll fix it later. And that's why we have all of these software
bugs, which bad guys can exploit to get access to your finances. So I think that's something we need
to fix is that mentality. The other thing that we need to do is have encryption everywhere,
not just on these devices. The Anthem hack that we had a couple of days ago,
80 million patient records
were stolen, 80 million. So we know that John Smith has got cancer and Sally saw treatment for
depression, right? Because of that. And Anthem did not encrypt that data. So the same way I told you
there are free tools on your computer to protect your data, had they encrypted that data, it all
would have been useless. Why didn't they do it? It cost more. And they said,
we're not mandated by the government to do it. So they did it. So I would call for encryption
everywhere. It's time to encrypt the internet. Everyone and everything, right? That will protect
us. Because if someone hacks it, then they can't see whatever the information is.
There's no way for them to read it without the secret key. And it's nearly impossible,
like 80 million years to reverse engineer through what's called brute force attack.
So that'll protect you.
The other thing that I would say that people need to keep in mind is we're going to need more help, more hands on deck when it comes to fighting all these cyber threats.
Currently, there's estimated that by 2017, I think we're going to have a shortage of 2 million cybersecurity workers in the country.
So for anybody who's looking for a job,
great field to get into, right? Lots of opportunities there.
Because you have so many referrals.
Yeah, exactly. There's so much going on and there's like a talent war for those folks.
And you can always just like, I mean, you can make so much money if you're an expert in this,
because you could just be protecting people before something happens and saying, here, I'll come set you up for a thousand bucks with everything you need.
Yeah. I mean, some of the top, top guys in this field make over a million dollars a year. So yeah, you can make a fair amount of money on that. The other thing I
would call for is gamers, like people that like to game, just take, um, angry birds or words with
France as an example, or, you know, could be call of duty. It doesn't matter. All of those games,
all of that data, all of those hours, what are we creating at the end of the day?
Well, fun experience, but what if we could come up with a game that was addicting as Angry Birds?
And every time you shot a pig at a bunch of whatever it was, you could actually be doing something good like identifying spam or identifying a phishing email or blocking some sort of attack, right?
So I think there's a way to get the whole gaming community involved in this so that they can be part of the solution. They certainly have
the technical skills. So I think gaming for good, we can definitely tie that into some of our cyber
threats. The two last things that I call for in the book amongst several other ideas is you may
be familiar with the XPRIZE Foundation. So it's the idea of creating an incentive prize to drive good.
They had the Ansari X Prize, which created civilian space flight and brought us into space
on the civilian side. And there've been lots of examples of that. Lindbergh, most people don't
know that when Lindbergh flew across the Atlantic, he did that because some guy put up a contest,
offered up $25,000 for the first guy to get across the Atlantic. And you had hundreds of people competing to win that prize.
So I'm working with the XPRIZE Foundation,
and they're looking at launching up to a $20 million XPRIZE
where we would go ahead and incentivize the general public for hacking for good,
trying to create a secure operating system and that type of thing.
So that's also cool.
And the last thing that I think we should keep in mind is that
we need sort of a Manhattan Project for cybersecurity. If you think back to where we
were during World War II, there was this race on between the Germans and us as to who would get the
atomic bomb first. That was an existential threat to the United States, right? We really could have
been annihilated by them if we didn't get there first. And so we had over 100,000 people in this country working on the Manhattan Project trying to protect us from that threat.
They were serious about the threat before them back in the day.
We are not.
Every day, cyber hack, cyber hack, cyber hack.
I wrote a piece talking about President Obama's State of the Union address where he said, we're finally going to get serious on cyber threats.
to the union address where he said, we're finally going to get serious on cyber threats. His talk,
his speech was 6,600 words and only 108 of them were on cybersecurity. So what I said was his grand thinking created the internet. Small thinking won't save it. We need to think much
bigger. And I would say finally, just to kind of a parting thought for your listeners is this,
we've talked about some scary things, right?
Oh my God, I can't believe that's there.
I tell a lot of stories in the book because I want you to come into this world and get it.
But at the end of the day, we can solve this problem, right?
Let's be positive.
We were the same people, human beings.
We put a man on the moon, right?
President Kennedy said by the end of this decade, we're going to have a man on the moon.
And we did.
Like we put a man on the moon for the first time ever in the history of humanity, right? We left
this planet. If we can solve that problem, of course we can solve this problem. The trick is,
it's going to take time and intention and focus. And that's really what future crimes is about.
Yeah. So there is a way to stop future crimes, you think?
I think we can make a huge difference. And I know ignoring it won't help the problem. We have to be intentional. Exactly.
We can't just say we're going to make a difference, like you said, Obama said,
but not actually really dive into it, like making it serious. Big thinking.
Okay. This is awesome. Everything is connected. Everyone is vulnerable in what we can do about
future crimes. I've got a couple of questions left for you. I want to make sure everyone picks up a copy of this book by Mark Goodman. Really fascinating
stuff. I feel like I could listen to you for forever on this stuff. And I want you to dive
into my, you know, to more, uh, after this interview, but, um, a couple of last questions.
One, what are you most grateful for recently, Mark? What's, what's going on in your life?
You're most grateful for, Oh God. Um, there's so much I'm grateful for, right? I have so many awesome people in my life. I'm part of an amazing community up at Singularity
University where I teach. I am grateful for all the help and support I got in writing the book.
Grateful for the fact that the book is finally coming out after all this time. I'm just really
surrounded by awesome people, makers, thinkers, doers out there that are just kind of inventing
the future. And I'm thrilled and honored and proud to be part of that community.
Very cool. One more question, but before I just want to acknowledge you for putting this
information out there and updating us on all the information we need to know to protect ourselves,
because I didn't know any of this stuff before. I always thought, is someone looking through this
camera right now?
Maybe they are.
But now you've protected me, so I appreciate that.
But seriously, though, I acknowledge you for spending how many decades, two decades almost
now on this information, doing the research, practicing it, studying it, and serving so
many people in this way.
And for writing this book, I really acknowledge you for educating us.
Because I think the biggest thing is being educated. I was so ignorant to all of this.
I mean, I had a sense, but I was like, I'm not really educated. So for educating us and getting
this information out there and working your butt off to make sure that we understand it,
I'm very grateful for you and I acknowledge you for that work.
Well, thank you very much. That really means a lot to me. Thank you.
Final question. What's your definition of greatness? That is an excellent question.
My definition of greatness, I would say is excelling at something you love.
It's doing the thing that you love. And we've had so many great people on this planet. You
probably remember that Apple commercial from the 1980s, right? You know, think different.
I mean, just being passionate about the things that you care about, being present in your
own life, helping other people is key.
I think that's incredibly rewarding, whether it's a little kid across the street or an
old person that may need an extra hand.
Whatever it is, whatever brings meaning into your life, being present for it and believing
in yourself, believing in your ideas and seeing them through.
Mark Goodman, thanks so much for coming on, man.
Thank you, Lewis.
It was a pleasure.
Yeah.
There you have it, guys.
I hope you feel more protected now with everything that's happening because it's going to be
happening in the future in a much bigger way.
So make sure to go back to the show notes at lewishouse.com slash 142. We'll have that list of how all those things
you can protect yourself that Mark listed out here at the end, all the other show notes, the
links of where you can get the book, how you can connect with Mark and maybe asking some questions
over online. If you have any more questions about future crimes and about how
to protect yourself. Hope you guys
thought this was enjoyable. If you have any
friends who either have
challenges with their digital work
or their digital footprint, feel free
to send them this episode. Again, it's lewishouse.com
slash 142 or
maybe any friends that are afraid
of the future crimes. Feel free
to send them this as well because you want to make sure they get set up and get protected so that they
can shut off any potential attacks that may come their way.
So again,
thank you guys so much for joining me today.
We've got a big guest coming up in the near future.
We got Jack Canfield coming up.
We got Julianne Hough coming up.
We've got some other incredible guests,
David Allen coming on some great leaders in the world
who are coming on to share their insights on greatness.
And I'm so grateful for you guys for being on here
and for spreading the word.
So again, thank you so much.
Make sure to share this one back at lewishouse.com slash 142.
You guys know what time it is.
It's time to go out there and do something great. សូវាប់បានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបានបា Bye.
