Caleb Barlow: Where is cybercrime really coming from?
كيلب بارلو: من أين تأتي حقاً جرائم الإنترنت؟
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys. Full bio
Double-click the English transcript below to play the video.
mostly Americans,
أميركيون في الغالب،
to thieves -- myself included.
للصوص -- وأنا ضمنهم.
is that in most cases,
هو أنه في معظم الحالات،
reported that these records were stolen.
بالتبليغ عن سرقة هذه السجلات.
is espionage or nation-state activity.
أو نشاط للدولة القومية.
international practice.
هو من الممارسات الدولية المقبولة.
of the problem that we're dealing with.
التي نتعامل معها.
of a sophisticated nation-state attack?"
للدولة القومية؟"
not being willing to own up
غير مستعدة لتحمل مسؤولية
security practices.
on a nation-state,
على الدولة القومية،
that 80 percent of it
and ultrasophisticated criminal gangs.
جد منظمة وفائقة التطور.
illegal economies in the world,
غير المشروعة في العالم،
for all of you:
من الناتج المحلي الإجمالي
Denmark and Portugal,
والدنمارك والبرتغال،
banking Trojan called the Dyre Wolf.
تستهدف الخدمات المصرفية يسمى (داير وولف).
in a phishing email
into your bank account.
إلى حسابك المصرفي.
the bad guys would reach in,
in the security industry,
is somewhat commonplace.
two distinctly different personalities --
يملك شخصيتين مختلفين تماما --
different persona
large-scale wire transfers.
of issuing a wire transfer,
a screen from your bank,
الذي تتعامل معه،
with your account,
the bank immediately,
to the bank's fraud department.
الخاص بالبنك.
the normal voice prompts,
an English-speaking operator.
ناطق باللغة الإنجليزية.
How can I help you?"
كيف يمكنني مساعدتك؟"
like you do every time you call your bank,
تتصل بالبنك الذي تتعامل معه،
and your account number,
to verify you are who you said you are.
للتحقق من هويتك.
الحوالات المصرفية الضخمة،
on the wire transfer,
على النقل المصرفي،
to get the second person on the line,
أن تربط شخصًا ثان بالمكالمة،
of verifications and checks.
an English-speaking help desk,
ناطق بالإنجليزية،
between a half a million
dollars per attempt
legitimate businesses.
Monday through Friday.
our security researchers see
on a Friday afternoon.
بعد ظهر يوم الجمعة.
with the wife and kids,
مع الزوجة والأولاد،
they spend their time.
the anonymous underbelly of the internet,
من شبكة الإنترنت،
دون الكشف عن هويتهم
on new attack techniques.
الهجوم الجديدة.
to a much more advanced version.
من الذهب والفضة والبرونز .
these marketplaces --
ratings and reviews.
والتقييمات والتوصيات.
to buy an attack,
criminal with good ratings, right?
وتصنيفات جيدة، أليس كذلك؟
before going to a new restaurant.
أو (تريب أدفايزور) قبل زيارة مطعم جديد.
of a vendor selling malware.
لبائع برمجيات خبيثة.
in the last year,
في العام الماضي،
in the last month.
for purchasing your fake ID.
لشراء هويتك المزورة.
sue you if you violate them?
يُقاضونك إذا انتهكت ذلك القانون؟
researchers was looking
that we had discovered.
والذي كنا قد اكتشفناه.
as a new, inexpensive and beta alternative
وغير مكلف
in the criminal underground.
في عالم الجريمة الخفي.
with the authors of Bilal Bot.
لمطوٍّري Bilal Bot.
and making the argument
an older version.
لنسخة قديمة.
her blog with more accurate information
بمعلومات أكثر دقة
far better than the competition.
أفضل بكثير من منافسه.
the entrepreneurial nature
الطبيعة المقاولاتية
to identify who's responsible --
من المسؤول --
to prosecute the offenders.
a completely new approach.
إلى نهج جديد تماماً.
to be centered on the idea
the economics for the bad guys.
on how this can work,
أن يعمل،
to a healthcare pandemic:
التي نراها لوباء صحي ما:
و(انفلونزا الطيور) و(زيكا).
and how the disease is spreading.
hospitals, physicians --
والمستشفيات والأطباء --
what we see in response to a cyber attack.
على هجوم إلكتروني.
to keep information on that attack
على المعلومات المرتبطة بذلك الهجوم
about competitive advantage,
threat intelligence data.
لبيانات تهديد الاستخبارات.
to open up and share
تنفتح وتُشارك
of information.
of security professionals.
المتخصصين في مجال الأمن.
into their DNA to keep secrets.
يسري في حمضهم النووي.
that thinking on its head.
private institutions
that other people could be impacted
closer to real time,
يستهدفون إيذائهم
a first mover was required --
in the security industry overall.
في ميدان الأمن بشكل عام.
intelligence databases in the world --
بيانات تهديد الاستخبارات في العالم --
on what had happened in the past,
عن ما حدث في الماضي،
openly on the internet?
على شبكة الإنترنت؟
this got quite a reaction.
implications of doing that?
على القيام بذلك؟
implications of doing that?
على القيام بذلك؟
if we were completely crazy.
that kept floating to the surface
والتي كانت تظهر
in the security industry.
threat intelligence data,
تهديد الاستخبارات،
في الوقت الحاضر
cybercrime in its tracks.
من الأساس.
are leveraging this data,
من هذه البيانات،
is to get all of those organizations
هو دفع كل تلك المنظمات
they're being attacked as well.
to the response that we see
التي نراها،
ABOUT THE SPEAKER
Caleb Barlow - Cybercrime fighterIBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys.
Why you should listen
As a vice president at IBM Security, Caleb Barlow has insight into to one of the largest security intelligence operations in the world. His team stands watch protecting the information security of thousands of customers in more than a hundred countries. On a busy day they can process upwards of 35 billion potential security events across their global operations centers.
Barlow has been advising chief information security officers, boards of directors and government officials on security practices, frameworks and strategies for risk mitigation on a global basis. He is a sought-after speaker on the subject of security and regularly appears in both print and broadcast media, including NBC News, CNBC, BBC World Service, NPR, the Wall Street Journal and the Washington Post. His opinions have been solicited by members of Congress, the NSA, and NATO, and he was invited by the President of the UN General Assembly to discuss his views at the United Nations.
Most recently, Barlow is focusing on building a large-scale simulation environment to educate C-level executives on how to better prevent and respond to a cyber attack so they can maintain business resiliency in the face of crisis.
Caleb Barlow | Speaker | TED.com