Idea 1
The Exponential Upside and Downside of Technology
You live in an exponential age—where computing power, data volumes, and network connections double on timescales that make yesterday’s tools ancient tomorrow. In Future Crimes, Marc Goodman explores how the same forces driving innovation also amplify vulnerability. The exponential curve is not just a mathematical curiosity—it is the engine behind both technological miracles and criminal catastrophes. Understanding that dynamic is the first step toward surviving it.
Exponential growth and the crime singularity
Goodman begins with the lily-on-a-pond thought experiment and Moore’s Law: slow growth suddenly becomes explosive. Computing power doubles every few years, and so do data, devices, and users. Historically, crime was limited by physical reach—a train robber could take only one train. Now a single hacker can hit millions of systems simultaneously. The Target breach (110 million accounts) and Sony hack (77 million) show how crime scales exponentially once systems are digitized. This is Goodman’s “crime singularity”: limits vanish as digital tools multiply targets.
Control the code, control the world
When machines and infrastructure obey software, whoever controls the code controls the outcome. Stuxnet demonstrated that principle by sabotaging Iranian centrifuges through manipulated sensor data. Your car, pacemaker, or thermostat now have the same vulnerability: if someone rewrites their firmware, they rewrite the physical world. Moore’s law doesn’t just accelerate progress—it accelerates weaponization.
Data as the new commodity
Digital convenience made information the world’s most valuable asset. Free products like search engines or social networks monetize you through surveillance. Firms such as Acxiom, Experian, and BlueKai aggregate trillions of data points, while innocuous apps leak your habits, location, and health metrics. The economics are simple: if you don’t pay, you are the product. The consequence: privacy collapses and predictive analytics can infer deeply personal facts, as Target’s pregnancy-prediction algorithm famously did.
The new law of asymmetry
Defenders must secure millions of endpoints perfectly; attackers need only one flaw. Digital amplification grants criminals superhuman reach. Malware spreads automatically, exploits are sold as turnkey kits, and underground economies operate with professional efficiency. The same network effects that made Amazon dominant now make ransomware omnipresent.
Essential understanding
Exponential technology isn’t inherently evil—but it rewards speed and scale. Without corresponding evolution in ethics, governance, and security, every leap forward multiplies exposure faster than protection.
Goodman’s overarching argument is not anti‑tech; it’s pro‑resilience. He urges you to stop viewing cyber threats as fringe issues—they are structural byproducts of our exponential civilization. The same mathematics that made smartphones affordable makes global malware inevitable, and the only way out is to design systems that evolve as fast as attackers do.