ABOUT THE SPEAKER
Caleb Barlow - Cybercrime fighter
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys.

Why you should listen

As a vice president at IBM Security, Caleb Barlow has insight into to one of the largest security intelligence operations in the world. His team stands watch protecting the information security of thousands of customers in more than a hundred countries. On a busy day they can process upwards of 35 billion potential security events across their global operations centers.

Barlow has been advising chief information security officers, boards of directors and government officials on security practices, frameworks and strategies for risk mitigation on a global basis. He is a sought-after speaker on the subject of security and regularly appears in both print and broadcast media, including NBC News, CNBC, BBC World Service, NPR, the Wall Street Journal and the Washington Post. His opinions have been solicited by members of Congress, the NSA, and NATO, and he was invited by the President of the UN General Assembly to discuss his views at the United Nations.

Most recently, Barlow is focusing on building a large-scale simulation environment to educate C-level executives on how to better prevent and respond to a cyber attack so they can maintain business resiliency in the face of crisis.

More profile about the speaker
Caleb Barlow | Speaker | TED.com
TED@IBM

Caleb Barlow: Where is cybercrime really coming from?

迦勒.巴羅: 網路犯罪究竟從何而來?

Filmed:
1,639,157 views

去年,網路犯罪狂撈了 4,500 億美金的暴利,於此同時,全球超過 20 億筆紀錄遺失或遭竊。安全專家迦勒.巴羅指出了當今資訊保護策略的不足之處。他的解決方案是──面對網路犯罪,我們必須像處理公共衛生危機一樣,集眾人之力,並將疫情與疾病如何散播的即時資訊公開分享。他表示,若是拒絕共享,我們無疑成為網路犯罪的共犯。
- Cybercrime fighter
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys. Full bio

Double-click the English transcript below to play the video.

網路犯罪已經失控了。
00:13
Cybercrime犯罪 is out of control控制.
0
1012
4217
00:18
It's everywhere到處.
1
6186
1365
它無所不在。
我們每天都會耳聞這樣的事件。
00:19
We hear about it every一切 single day.
2
7575
4288
00:24
This year,
3
12771
1214
在今年,超過 20 億筆紀錄
遺失或遭竊。
00:26
over two billion十億 records記錄 lost丟失 or stolen被盜.
4
14009
5134
而在去年,有一億人,
其中大部分是美國人,
00:32
And last year, 100 million百萬 of us,
mostly大多 Americans美國人,
5
20050
5635
00:37
lost丟失 our health健康 insurance保險 data數據
to thieves盜賊 -- myself included包括.
6
25709
5134
健保資料落入竊賊手中,
我也身受其害。
更令人擔憂的是:
00:44
What's particularly尤其 concerning關於 about this
is that in most cases,
7
32303
5448
在大多數事件中,
就算有人回報資料被偷,
往往也是幾個月之後的事了。
00:49
it was months個月 before anyone任何人 even
reported報導 that these records記錄 were stolen被盜.
8
37775
5911
所以你看到晚間新聞報導時,
00:57
So if you watch the evening晚間 news新聞,
9
45164
3043
你可能會認為這些大部分是
諜報或國家層級的行動。
01:00
you would think that most of this
is espionage間諜 or nation-state民族國家 activity活動.
10
48231
5206
嗯,有些的確是。
01:05
And, well, some of it is.
11
53993
2093
如你所見,諜報活動
已經是一種「國際慣例」,
01:08
Espionage間諜, you see, is an accepted公認
international國際 practice實踐.
12
56694
4438
但在這個案例當中,
01:13
But in this case案件,
13
61793
1483
它只是我們所面對難題
其中的一小部分。
01:15
it is only a small portion一部分
of the problem問題 that we're dealing交易 with.
14
63300
5453
我們是否經常聽到這些入侵事件,
01:21
How often經常 do we hear about a breach突破口
15
69639
3335
被描述成:
「這是件精心策劃的國家攻擊行動」
01:24
followed其次 by, "... it was the result結果
of a sophisticated複雜的 nation-state民族國家 attack攻擊?"
16
72998
4851
通常,這是公司不願意承認
01:30
Well, often經常 that is companies公司
not being存在 willing願意 to own擁有 up
17
78661
4861
自身安全措施失靈的推托之詞。
01:35
to their own擁有 lackluster乏善可陳
security安全 practices做法.
18
83546
2980
而且這些公司普遍相信,
01:39
There is also a widely廣泛 held保持 belief信仰
19
87065
2500
只要將攻擊歸咎於某個國家,
01:42
that by blaming歸咎 an attack攻擊
on a nation-state民族國家,
20
90355
3851
01:46
you are putting regulators監管機構 at bay --
21
94230
2681
就可以逃避主管機關的監督──
或是至少拖延一段時間。
01:48
at least最小 for a period of time.
22
96935
2034
那麼實際上網路犯罪從何而來?
01:51
So where is all of this coming未來 from?
23
99837
4483
聯合國估計 80% 的網路犯罪,
01:56
The United聯合的 Nations國家 estimates估計
that 80 percent百分 of it
24
104997
5493
來自具有高度組織
且分工精細的犯罪集團。
02:02
is from highly高度 organized有組織的
and ultrasophisticatedultrasophisticated criminal刑事 gangs幫派.
25
110514
5770
時至今日,
02:09
To date日期,
26
117254
1719
02:10
this represents代表 one of the largest最大
illegal非法 economies經濟 in the world世界,
27
118997
6600
網路犯罪已是世界上
最大的非法經濟體之一。
而在這之上
──大家聽好了──
02:17
topping配料 out at, now get this,
28
125621
3120
是 4,450 億美金的獲利。
02:20
445 billion十億 dollars美元.
29
128765
4316
02:25
Let me put that in perspective透視
for all of you:
30
133539
2912
我來給大家更具體的概念:
02:28
445 billion十億 dollars美元 is larger than the GDPGDP
31
136475
6104
4,450 億美金已經超過了
160 個國家的國內生產總值,
02:34
of 160 nations國家,
32
142603
2666
其中包括愛爾蘭、芬蘭、
丹麥和葡萄牙......
02:37
including包含 Ireland愛爾蘭, Finland芬蘭,
Denmark丹麥 and Portugal葡萄牙,
33
145293
4545
等等國家。
02:41
to name名稱 a few少數.
34
149862
1230
這個體系是如何運作的?
02:44
So how does this work?
35
152293
2004
這些罪犯又如何進行作業?
02:46
How do these criminals罪犯 operate操作?
36
154321
1906
讓我說個小故事給你們聽。
02:48
Well, let me tell you a little story故事.
37
156701
2856
大約一年前,
02:52
About a year ago,
38
160531
1194
我們的資安研究員正在追蹤一個
02:53
our security安全 researchers研究人員 were tracking追踪
39
161749
3310
看似尋常卻很精密的
銀行木馬程式── Dyre Wolf。
02:57
a somewhat有些 ordinary普通 but sophisticated複雜的
banking銀行業 Trojan木馬 called the DyreDyre Wolf.
40
165083
6046
這隻程式會進入你的電腦,
03:03
The DyreDyre Wolf would get on your computer電腦
41
171925
2221
03:06
via通過 you clicking點擊 on a link鏈接
in a phishing網絡釣魚 email電子郵件
42
174170
3000
是因為你點擊了
釣魚信件中的網址──
03:09
that you probably大概 shouldn't不能 have.
43
177194
1952
你不應該點擊的。
接著它會守株待兔,
03:11
It would then sit and wait.
44
179170
1997
03:13
It would wait until直到 you logged記錄
into your bank銀行 account帳戶.
45
181755
3011
等待你登入銀行帳戶。
到時候,歹徒就大手一伸,
03:17
And when you did,
the bad guys would reach達到 in,
46
185299
3343
盜用你的身份,
03:20
steal your credentials證書,
47
188666
1653
03:22
and then use that to steal your money.
48
190343
1901
然後偷走你的錢。
03:25
This sounds聲音 terrible可怕,
49
193023
1920
這聽起來很嚇人,
03:26
but the reality現實 is,
in the security安全 industry行業,
50
194967
2793
但事實上,在資訊安全領域,
這種形式的攻擊還算常見。
03:29
this form形成 of attack攻擊
is somewhat有些 commonplace平凡.
51
197784
3682
03:36
However然而, the DyreDyre Wolf had
two distinctly歷歷 different不同 personalities個性 --
52
204002
6164
然而,Dyre Wolf 程式
具有雙重人格──
其中一個是針對剛提到的小額交易,
03:42
one for these small transactions交易,
53
210659
2341
03:45
but it took on an entirely完全
different不同 persona人物
54
213024
3040
但如果你的工作
會接觸到大筆金錢往來,
03:48
if you were in the business商業 of moving移動
large-scale大規模 wire transfers轉讓.
55
216088
3815
它就會展現出截然不同的另一面。
03:51
Here's這裡的 what would happen發生.
56
219927
1699
過程會是這樣的。
03:53
You start開始 the process處理
of issuing發行 a wire transfer轉讓,
57
221650
2800
當你啟動匯款流程,
03:56
and up in your browser瀏覽器 would pop流行的
a screen屏幕 from your bank銀行,
58
224474
3008
在瀏覽器上,
你的網路銀行會跳出一個畫面,
顯示你的帳戶出現問題,
03:59
indicating說明 that there's a problem問題
with your account帳戶,
59
227506
2597
你必須馬上打電話給銀行,
04:02
and that you need to call
the bank銀行 immediately立即,
60
230127
3191
並附上銀行防詐騙部門的專線號碼。
04:05
along沿 with the number
to the bank's銀行 fraud舞弊 department.
61
233342
2742
於是你拿起電話撥過去。
04:08
So you pick up the phone電話 and you call.
62
236835
2170
經過一連串看似正常的語音指示後,
04:11
And after going through通過
the normal正常 voice語音 prompts提示,
63
239029
3011
你被轉接給一位英語客服。
04:14
you're met會見 with
an English-speaking英語會話 operator操作者.
64
242064
2117
「哈囉!奧多羅互助銀行。
很高興為您服務。」
04:16
"Hello你好, AltoroAltoro Mutual相互 Bank銀行.
How can I help you?"
65
244205
2868
04:20
And you go through通過 the process處理
like you do every一切 time you call your bank銀行,
66
248033
3653
接著你一如往常進行整個流程:
04:23
of giving them your name名稱
and your account帳戶 number,
67
251710
2791
給出你的名字、帳戶、
回答安全問題以確認你的身份。
04:26
going through通過 the security安全 checks檢查
to verify校驗 you are who you said you are.
68
254525
3923
大部分的人可能不知道,
04:31
Most of us may可能 not know this,
69
259809
1488
04:33
but in many許多 large-scale大規模 wire transfers轉讓,
70
261321
2229
在許多的鉅額轉帳中,
規定要經過兩個人的確認,
04:35
it requires要求 two people to sign標誌 off
on the wire transfer轉讓,
71
263574
3111
04:38
so the operator操作者 then asks you
to get the second第二 person on the line,
72
266709
3199
接著客服請第二個人聽電話,
04:41
and goes through通過 the same相同 set
of verifications驗證 and checks檢查.
73
269932
2801
然後進行同樣的確認流程。
聽起來很正常吧?
04:45
Sounds聲音 normal正常, right?
74
273960
1346
04:47
Only one problem問題:
75
275909
1442
只有一個問題:
在電話另一端的不是銀行。
04:49
you're not talking to the bank銀行.
76
277375
1825
04:51
You're talking to the criminals罪犯.
77
279224
1586
和你通電話的是歹徒。
他們還設置了英語客服中心,
04:52
They had built內置
an English-speaking英語會話 help desk,
78
280834
2198
04:55
fake overlays覆蓋 to the banking銀行業 website網站.
79
283056
2065
並製作了假的銀行網站。
04:57
And this was so flawlessly完美 executed執行
80
285145
3100
在這天衣無縫的過程中,
每一次作案,就會有 50 萬
至 150 萬美金的不法所得
05:00
that they were moving移動
between之間 a half a million百萬
81
288269
2143
05:02
and a million百萬 and a half
dollars美元 per attempt嘗試
82
290436
3087
落入歹徒的口袋。
05:05
into their criminal刑事 coffers庫房.
83
293547
1558
這些犯罪組織的運作
05:08
These criminal刑事 organizations組織 operate操作
84
296140
2615
就像紀律嚴明的合法企業。
05:10
like highly高度 regimented刻板,
legitimate合法 businesses企業.
85
298779
3025
他們的員工從週一工作到週五,
05:14
Their employees僱員 work
Monday星期一 through通過 Friday星期五.
86
302345
2483
週末則是放假休息。
05:17
They take the weekends週末 off.
87
305309
1536
我們為什麼知道?
05:18
How do we know this?
88
306869
1383
這是因為我們的資安研究人員發現
05:20
We know this because
our security安全 researchers研究人員 see
89
308276
3133
每當週五下午,
惡意程式都會大量出現。
05:23
repeated重複 spikes釘鞋 of malware惡意軟件
on a Friday星期五 afternoon下午.
90
311433
3066
05:27
The bad guys, after a long weekend週末
with the wife妻子 and kids孩子,
91
315254
3215
這些壞蛋們陪老婆小孩度過週末,
05:30
come back in to see how well things went.
92
318493
2240
之後就可以回來驗收成果。
05:35
The Dark黑暗 Web捲筒紙 is where
they spend their time.
93
323701
2674
「暗網」是他們棲息的地方。
05:39
That is a term術語 used to describe描述
the anonymous匿名 underbelly軟肋 of the internet互聯網,
94
327295
5789
這個詞是用來描述
隱藏在網際網路中的匿名空間。
05:45
where thieves盜賊 can operate操作 with anonymity匿名
95
333108
2925
竊賊們在此得以匿名行事,
05:48
and without detection發現.
96
336057
1445
而不會被人發現。
05:50
Here they peddle兜售 their attack攻擊 software軟件
97
338209
3027
他們在此兜售攻擊軟體,
並且分享各種新的攻擊技術。
05:53
and share分享 information信息
on new attack攻擊 techniques技術.
98
341260
3456
在那裡,你能買到任何東西,
05:57
You can buy購買 everything there,
99
345571
1850
05:59
from a base-level基準面 attack攻擊
to a much more advanced高級 version.
100
347445
3656
從基本等級的攻擊服務
到更進階的版本都有。
在很多地方,你甚至會看到
06:03
In fact事實, in many許多 cases, you even see
101
351842
2292
06:06
gold, silver and bronze青銅 levels水平 of service服務.
102
354158
3172
被區分為金、銀、銅等級
的各種攻擊服務。
你可以查詢他人的推薦心得。
06:09
You can check references引用.
103
357903
1671
06:11
You can even buy購買 attacks攻擊
104
359977
2560
你所購買的攻擊服務
甚至還能有退款保證──
06:14
that come with a money-back退款 guarantee保證 --
105
362561
3328
06:17
(Laughter笑聲)
106
365913
1045
(笑聲)
如果你的攻擊沒有成功。
06:18
if you're not successful成功.
107
366982
1655
這樣的環境、這樣的交易市集,
06:21
Now, these environments環境,
these marketplaces交易市場 --
108
369931
3091
06:25
they look like an Amazon亞馬遜 or an eBay易趣.
109
373046
3347
看起來跟亞馬遜或 eBay 一模一樣。
06:28
You see products製品, prices價格,
ratings評級 and reviews評論.
110
376417
3956
你看得到產品、價格、評分跟評論。
如果你要買攻擊服務,
06:32
Of course課程, if you're going
to buy購買 an attack攻擊,
111
380397
2254
你當然會向評分高、
名聲好的罪犯購買,對吧?
06:34
you're going to buy購買 from a reputable信譽
criminal刑事 with good ratings評級, right?
112
382675
3449
(笑聲)
06:38
(Laughter笑聲)
113
386148
1004
這就像你要到一間新的餐廳之前,
06:39
This isn't any different不同
114
387176
1201
06:40
than checking檢查 on Yelp喊叫 or TripAdvisor到到網
before going to a new restaurant餐廳.
115
388401
5190
會先到 Yelp 或 TripAdvisor 網站
查詢評價一樣。
我舉個例子。
06:46
So, here is an example.
116
394503
2093
06:48
This is an actual實際 screenshot截圖
of a vendor供應商 selling銷售 malware惡意軟件.
117
396620
5421
這是從惡意軟體販賣者的網頁
所擷取的真實畫面。
他是屬於第四級的販賣商,
06:54
Notice注意 they're a vendor供應商 level水平 four,
118
402065
1815
他的信賴度則是第六級。
06:55
they have a trust相信 level水平 of six.
119
403904
1841
他在去年得到 400 個正面評價,
06:57
They've他們已經 had 400 positive reviews評論
in the last year,
120
405769
2335
07:00
and only two negative reviews評論
in the last month.
121
408128
2380
而在上個月的負面評價只有兩個。
我們甚至在上面看到授權條款。
07:03
We even see things like licensing許可 terms條款.
122
411072
3357
07:06
Here's這裡的 an example of a site現場 you can go to
123
414762
2004
另外這個網站,
如果你想要改變個人身分,
可以上去看看。
07:08
if you want to change更改 your identity身分.
124
416790
1757
他們販賣假身分證、
07:10
They will sell you a fake IDID,
125
418571
1857
假護照。
07:12
fake passports護照.
126
420452
1594
07:14
But note注意 the legally法律上 binding捆綁 terms條款
for purchasing購買 your fake IDID.
127
422603
5049
特別注意有關購買假證件的法律條款。
07:20
Give me a break打破.
128
428518
1521
饒了我吧!
07:22
What are they going to do --
sue起訴 you if you violate違反 them?
129
430063
2858
就算你違反了這些條款,
他們能怎樣?控告你嗎?
(笑聲)
07:24
(Laughter笑聲)
130
432945
1150
07:27
This occurred發生 a couple一對 of months個月 ago.
131
435458
2423
就在幾個月前,
07:29
One of our security安全
researchers研究人員 was looking
132
437905
3615
我們的一位資安研究員
正在分析新發現的一個
Android 惡意程式。
07:33
at a new AndroidAndroid的 malware惡意軟件 application應用
that we had discovered發現.
133
441544
4998
這個程式叫 Bilal Bot。
07:38
It was called Bilal比拉爾 Botbot.
134
446566
1920
在一篇部落格文章中,
07:41
In a blog博客 post崗位,
135
449514
1926
07:43
she positioned定位的 Bilal比拉爾 Botbot
as a new, inexpensive便宜 and beta公測 alternative替代
136
451464
6805
她(部落格作者) 將 Bilal Bot 定位為
新穎、便宜、待測試修正的、
另一個 GM Bot 程式的替代品,
07:50
to the much more advanced高級 GMGM Botbot
137
458870
3338
而 GM Bot 更為先進,
在地下黑市非常普及。
07:54
that was commonplace平凡
in the criminal刑事 underground地下.
138
462232
2815
Bilal Bot 作者對此評論感到不滿。
07:58
This review評論 did not sit well
with the authors作者 of Bilal比拉爾 Botbot.
139
466658
4010
08:03
So they wrote her this very email電子郵件,
140
471237
2580
所以他們寫了這封信給她,
除了為產品辯護,
08:07
pleading懇求 their case案件
and making製造 the argument論據
141
475028
2757
並認為她所評測的是舊版程式。
08:09
that they felt she had evaluated評價
an older舊的 version.
142
477809
5429
08:16
They asked her to please update更新
her blog博客 with more accurate準確 information信息
143
484198
4709
他們要求她更新部落格
以提供更正確的資訊,
甚至要求當面對談,
08:20
and even offered提供 to do an interview訪問
144
488931
3412
好向她詳細解釋
08:24
to describe描述 to her in detail詳情
145
492367
2221
08:26
how their attack攻擊 software軟件 was now
far better than the competition競爭.
146
494612
4599
他們的攻擊程式如何比競爭對手更好。
所以你瞧,
08:32
So look,
147
500365
1325
08:33
you don't have to like what they do,
148
501714
3864
你不需認同他們的行為,
但你得敬佩他們
08:37
but you do have to respect尊重
the entrepreneurial創業 nature性質
149
505602
4919
在努力的過程中
所流露出的創業家特質。
08:42
of their endeavors努力.
150
510545
1207
(笑聲)
08:43
(Laughter笑聲)
151
511776
1150
08:46
So how are we going to stop this?
152
514476
3855
所以,我們要如何阻止這一切?
08:51
It's not like we're going to be able能夠
to identify鑑定 who's誰是 responsible主管 --
153
519714
5564
並不是說我們要找出某個人
來追究責任──
記住,他們都匿名行事,
08:57
remember記得, they operate操作 with anonymity匿名
154
525302
2962
置身法律之外。
09:00
and outside the reach達到 of the law.
155
528288
1985
09:03
We're certainly當然 not going to be able能夠
to prosecute起訴 the offenders罪犯.
156
531217
3284
我們確實無法起訴這些犯罪份子。
我提議,採用完全不同的作法。
09:07
I would propose提出 that we need
a completely全然 new approach途徑.
157
535156
5545
09:13
And that approach途徑 needs需求
to be centered中心 on the idea理念
158
541763
3906
這個作法的核心觀念是:
我們要顛覆那些壞蛋的經濟體系。
09:17
that we need to change更改
the economics經濟學 for the bad guys.
159
545693
3895
09:22
And to give you a perspective透視
on how this can work,
160
550245
3101
為了讓你們了解這個方法為何有效,
09:25
let's think of the response響應 we see
to a healthcare衛生保健 pandemic流感大流行:
161
553370
4988
先回想我們如何面對以下這些傳染病:
SARS、伊波拉、禽流感、茲卡病毒。
09:30
SARSSARS, Ebola埃博拉病毒, bird flu流感, Zika茲卡.
162
558382
3003
09:34
What is the top最佳 priority優先?
163
562036
1921
第一要務是什麼?
09:35
It's knowing會心 who is infected感染
and how the disease疾病 is spreading傳播.
164
563981
5293
是知道誰受到感染
以及疾病如何傳播。
現在,包括政府、私人機構、
醫院、醫師──
09:44
Now, governments政府, private私人的 institutions機構,
hospitals醫院, physicians醫師 --
165
572015
6147
09:51
everyone大家 responds響應 openly公然 and quickly很快.
166
579061
3720
所有人都能開放、迅速地
做好應對工作。
這樣的集體利他行為,
09:55
This is a collective集體 and altruistic利他 effort功夫
167
583334
3971
遏止了疾病的傳播,
09:59
to stop the spread傳播 in its tracks軌道
168
587329
3900
10:03
and to inform通知 anyone任何人 not infected感染
169
591253
2877
並告知尚未被感染者
10:06
how to protect保護 or inoculate接種 themselves他們自己.
170
594154
2380
如何自保或接種疫苗。
不幸地,在面對網路攻擊時,
我們看到的完全不是這樣。
10:10
Unfortunately不幸, this is not at all
what we see in response響應 to a cyber網絡 attack攻擊.
171
598900
5694
組織更傾向於
將受到攻擊的相關資訊
10:17
Organizations組織 are far more likely容易
to keep information信息 on that attack攻擊
172
605850
4451
採取保密。
10:22
to themselves他們自己.
173
610325
1625
為什麼?
10:25
Why?
174
613082
1156
因為他們擔心失去競爭優勢、
10:26
Because they're worried擔心
about competitive競爭的 advantage優點,
175
614262
2970
面對法律訴訟、
10:30
litigation訴訟
176
618043
1571
或是接受監督管理。
10:31
or regulation.
177
619638
1306
我們必須有效率地
將網路威脅情資公開。
10:33
We need to effectively有效 democratize民主化
threat威脅 intelligence情報 data數據.
178
621827
5770
10:39
We need to get all of these organizations組織
to open打開 up and share分享
179
627975
5476
我們必須讓這些組織
開放並分享他們的情報資料庫。
10:45
what is in their private私人的 arsenal兵工廠
of information信息.
180
633475
3622
10:51
The bad guys are moving移動 fast快速;
181
639010
2794
犯罪份子的手法一日千里,
我們必須走在他們之前。
10:53
we've我們已經 got to move移動 faster更快.
182
641828
2117
10:56
And the best最好 way to do that is to open打開 up
183
644750
3722
最好的方式便是開放
11:00
and share分享 data數據 on what's happening事件.
184
648496
2347
並且共享即時資訊。
讓我們從資訊安全人員的角度
來反思一下。
11:03
Let's think about this in the construct構造
of security安全 professionals專業人士.
185
651304
4326
11:08
Remember記得, they're programmed程序 right
into their DNA脫氧核糖核酸 to keep secrets秘密.
186
656164
4976
要知道,這群人
保密的天性深入骨子裡。
11:13
We've我們已經 got to turn
that thinking思維 on its head.
187
661164
3024
我們得扭轉這樣的習性。
11:16
We've我們已經 got to get governments政府,
private私人的 institutions機構
188
664212
3281
我們得想辦法讓政府、私人機構,
還有資安服務業者,
11:19
and security安全 companies公司
189
667517
1443
11:20
willing願意 to share分享 information信息 at speed速度.
190
668984
2731
願意迅速地分享資訊。
11:23
And here's這裡的 why:
191
671739
1676
原因如下:
11:25
because if you share分享 the information信息,
192
673439
1877
若是共享訊息,
11:27
it's equivalent當量 to inoculation接種.
193
675340
2017
就像是接種了疫苗。
若是拒絕共享,
11:30
And if you're not sharing分享,
194
678663
1547
11:32
you're actually其實 part部分 of the problem問題,
195
680234
2101
我們就等於是共犯,
11:34
because you're increasing增加 the odds可能性
that other people could be impacted影響
196
682359
5768
因為你可能助長了他人
被相同手法攻擊的機會。
11:40
by the same相同 attack攻擊 techniques技術.
197
688151
2630
11:43
But there's an even bigger benefit效益.
198
691986
2049
這麼做還有更大的好處。
11:47
By destroying銷毀 criminals'罪犯“ devices設備
closer接近 to real真實 time,
199
695198
4746
用近乎即時的速度消滅犯罪工具,
我們也破壞了歹徒的計畫。
11:51
we break打破 their plans計劃.
200
699968
1753
11:55
We inform通知 the people they aim目標 to hurt傷害
201
703462
3240
我們能用罪犯措手不及的速度,
預先告知民眾,
他們已經成為攻擊目標。
11:58
far sooner than they had ever anticipated預期.
202
706726
2645
我們能破壞他們的聲譽,
12:02
We ruin廢墟 their reputations名譽,
203
710520
2201
12:04
we crush粉碎 their ratings評級 and reviews評論.
204
712745
3092
毀掉他們的評分及評論。
我們讓網路犯罪無利可圖。
12:08
We make cybercrime網絡犯罪 not pay工資.
205
716305
3832
12:12
We change更改 the economics經濟學 for the bad guys.
206
720931
3768
我們顛覆犯罪份子的經濟體系。
但要達成這個目標的第一步,
12:18
But to do this,
a first mover was required需要 --
207
726315
3972
是要有人來改變
整個資安產業的思維。
12:22
someone有人 to change更改 the thinking思維
in the security安全 industry行業 overall總體.
208
730311
4601
大約一年前,
12:28
About a year ago,
209
736067
1270
我同事和我有個大膽的想法。
12:29
my colleagues同事 and I had a radical激進 idea理念.
210
737361
2506
如果把全球最大的
網路威脅情報資料庫──
12:32
What if IBMIBM were to take our data數據 --
211
740624
4584
12:37
we had one of the largest最大 threat威脅
intelligence情報 databases數據庫 in the world世界 --
212
745987
3988
也就是 IBM 擁有的資料庫──
12:41
and open打開 it up?
213
749999
1359
把它開放出來如何?
12:43
It had information信息 not just
on what had happened發生 in the past過去,
214
751757
3461
這裡面不只有過去事件的歷史紀錄,
12:47
but what was happening事件 in near-real近實時 time.
215
755242
2475
還有近乎即時的資安動態資訊。
12:49
What if we were to publish發布 it all
openly公然 on the internet互聯網?
216
757741
3897
把這些資料都公開會變成怎樣呢?
12:54
As you can imagine想像,
this got quite相當 a reaction反應.
217
762463
2494
可想而知,這構想招來激烈反應。
首先是律師問:
12:56
First came來了 the lawyers律師:
218
764981
1364
「在法律上會有什麼瓜葛?」
12:58
What are the legal法律
implications啟示 of doing that?
219
766369
2315
13:01
Then came來了 the business商業:
220
769385
1335
接著是商業人士:
「在商業上會有什麼含義?」
13:02
What are the business商業
implications啟示 of doing that?
221
770744
2400
13:05
And this was also met會見 with a good dose劑量
222
773622
2173
我們還遇到許多聲音
質疑我們是不是徹底瘋了?
13:07
of a lot of people just asking
if we were completely全然 crazy.
223
775819
3108
13:11
But there was one conversation會話
that kept不停 floating漂浮的 to the surface表面
224
779928
3786
但是在我們參與的每場對話當中,
有一個論點持續、逐漸地浮出檯面,
13:15
in every一切 dialogue對話 that we would have:
225
783738
2051
就是我們瞭解到:
13:18
the realization實現 that if we didn't do this,
226
786400
3547
如果不開放資訊,
13:21
then we were part部分 of the problem問題.
227
789971
2631
我們就成為網路犯罪的共犯。
13:25
So we did something unheard聞所未聞 of
in the security安全 industry行業.
228
793514
2860
所以我們做了
在資安產業中前所未有的事。
13:29
We started開始 publishing出版.
229
797045
1673
我們開始將資料公開。
13:30
Over 700 terabytes兆兆字節 of actionable
threat威脅 intelligence情報 data數據,
230
798742
4410
超過 700 兆位元組的資安威脅情報,
其中包含即時的攻擊資訊,
13:35
including包含 information信息 on real-time即時的 attacks攻擊
231
803176
3005
13:38
that can be used to stop
cybercrime網絡犯罪 in its tracks軌道.
232
806205
2863
可以協助我們阻斷網路犯罪。
時至今日,
13:41
And to date日期,
233
809813
1370
13:43
over 4,000 organizations組織
are leveraging借力 this data數據,
234
811207
4044
超過四千個組織正在利用這些資料,
包含全球百大企業的一半以上。
13:47
including包含 half of the Fortune幸運 100.
235
815275
1879
下一步,我們希望所有的組織
13:50
And our hope希望 as a next下一個 step
is to get all of those organizations組織
236
818599
4017
13:54
to join加入 us in the fight鬥爭,
237
822640
1961
都能夠加入這場戰役,
13:56
and do the same相同 thing
238
824625
1551
跟我們一樣,
13:58
and share分享 their information信息
239
826200
2088
公開分享他們的資訊──
14:00
on when and how
they're being存在 attacked襲擊 as well.
240
828312
2534
關於他們何時、如何遭受攻擊。
我們都有機會阻止這一切,
14:03
We all have the opportunity機會 to stop it,
241
831552
3018
也已經知道該怎麼做了。
14:06
and we already已經 all know how.
242
834594
2161
14:09
All we have to do is look
to the response響應 that we see
243
837372
4370
我們要做的只不過是:
借鑑全球公共衛生體系
作為他山之石,
14:13
in the world世界 of health健康 care關心,
244
841766
1506
以及應對傳染病的做法。
14:15
and how they respond響應 to a pandemic流感大流行.
245
843296
1903
14:17
Simply只是 put,
246
845623
1379
簡而言之,
14:19
we need to be open打開 and collaborative共同.
247
847026
2276
我們必須開放,並且彼此合作。
謝謝。
14:21
Thank you.
248
849876
1151
(掌聲)
14:23
(Applause掌聲)
249
851051
3792
Translated by Kuan-Yi Li
Reviewed by Ting-Chih Liang

▲Back to top

ABOUT THE SPEAKER
Caleb Barlow - Cybercrime fighter
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys.

Why you should listen

As a vice president at IBM Security, Caleb Barlow has insight into to one of the largest security intelligence operations in the world. His team stands watch protecting the information security of thousands of customers in more than a hundred countries. On a busy day they can process upwards of 35 billion potential security events across their global operations centers.

Barlow has been advising chief information security officers, boards of directors and government officials on security practices, frameworks and strategies for risk mitigation on a global basis. He is a sought-after speaker on the subject of security and regularly appears in both print and broadcast media, including NBC News, CNBC, BBC World Service, NPR, the Wall Street Journal and the Washington Post. His opinions have been solicited by members of Congress, the NSA, and NATO, and he was invited by the President of the UN General Assembly to discuss his views at the United Nations.

Most recently, Barlow is focusing on building a large-scale simulation environment to educate C-level executives on how to better prevent and respond to a cyber attack so they can maintain business resiliency in the face of crisis.

More profile about the speaker
Caleb Barlow | Speaker | TED.com

Data provided by TED.

This site was created in May 2015 and the last update was on January 12, 2020. It will no longer be updated.

We are currently creating a new site called "eng.lish.video" and would be grateful if you could access it.

If you have any questions or suggestions, please feel free to write comments in your language on the contact form.

Privacy Policy

Developer's Blog

Buy Me A Coffee