ABOUT THE SPEAKER
Misha Glenny - Underworld investigator
Journalist Misha Glenny leaves no stone unturned (and no failed state unexamined) in his excavation of criminal globalization.

Why you should listen

In minute detail, Misha Glenny's 2008 book McMafia illuminates the byzantine outlines of global organized crime. Whether it's pot smugglers in British Columbia, oil/weapons/people traffickers in Eastern Europe, Japanese yakuza or Nigerian scammers, to research this magisterial work Glenny penetrated the convoluted, globalized and franchised modern underworld -- often at considerable personal risk.

The book that resulted is an exhaustive look at an unseen industry that Glenny believes may account for 15% of the world's GDP.

Legal society ignores this world at its peril, but Glenny suggests that conventional law enforcement might not be able to combat a problem whose roots lie in global instability.

While covering the Central Europe beat for the Guardian and the BBC, Glenny wrote several acclaimed books on the fall of Yugoslavia and the rise of the Balkan nations. He's researching a new book on cybercrime, of which he says: "The key to cybercrime is what we call social engineering. Or to use the technical term for it, there's one born every minute."

Watch TED's exclusive video Q&A with Glenny: "Behind the Scenes of McMafia" >>

More profile about the speaker
Misha Glenny | Speaker | TED.com
TEDGlobal 2011

Misha Glenny: Hire the hackers!

Filmed:
1,438,902 views

Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around the world and reaches a startling conclusion.
- Underworld investigator
Journalist Misha Glenny leaves no stone unturned (and no failed state unexamined) in his excavation of criminal globalization. Full bio

Double-click the English transcript below to play the video.

00:15
Now this is a very un-TED-like thing to do,
0
0
3000
00:18
but let's kick off the afternoon
1
3000
3000
00:21
with a message
2
6000
2000
00:23
from a mystery sponsor.
3
8000
3000
00:26
Anonymous: Dear Fox News,
4
11000
2000
00:28
it has come to our unfortunate attention
5
13000
3000
00:31
that both the name and nature of Anonymous
6
16000
2000
00:33
has been ravaged.
7
18000
2000
00:35
We are everyone. We are no one.
8
20000
3000
00:38
We are anonymous. We are legion.
9
23000
3000
00:41
We do not forgive. We do not forget.
10
26000
3000
00:44
We are but the base of chaos.
11
29000
3000
00:49
Misha Glenny: Anonymous, ladies and gentlemen --
12
34000
3000
00:52
a sophisticated group
13
37000
2000
00:54
of politically motivated hackers
14
39000
2000
00:56
who have emerged in 2011.
15
41000
3000
00:59
And they're pretty scary.
16
44000
2000
01:01
You never know when they're going to attack next,
17
46000
3000
01:04
who or what the consequences will be.
18
49000
3000
01:07
But interestingly,
19
52000
2000
01:09
they have a sense of humor.
20
54000
3000
01:12
These guys hacked into Fox News' Twitter account
21
57000
4000
01:16
to announce President Obama's assassination.
22
61000
4000
01:20
Now you can imagine the panic that would have generated
23
65000
3000
01:23
in the newsroom at Fox.
24
68000
2000
01:25
"What do we do now?
25
70000
2000
01:27
Put on a black armband, or crack open the champagne?"
26
72000
3000
01:30
(Laughter)
27
75000
2000
01:32
And of course, who could escape the irony
28
77000
4000
01:36
of a member of Rupert Murdoch's News Corp.
29
81000
3000
01:39
being a victim of hacking for a change.
30
84000
3000
01:42
(Laughter)
31
87000
2000
01:44
(Applause)
32
89000
4000
01:48
Sometimes you turn on the news
33
93000
3000
01:51
and you say, "Is there anyone left to hack?"
34
96000
2000
01:53
Sony Playstation Network -- done,
35
98000
3000
01:56
the government of Turkey -- tick,
36
101000
2000
01:58
Britain's Serious Organized Crime Agency -- a breeze,
37
103000
3000
02:01
the CIA -- falling off a log.
38
106000
2000
02:03
In fact, a friend of mine from the security industry
39
108000
2000
02:05
told me the other day
40
110000
2000
02:07
that there are two types of companies in the world:
41
112000
3000
02:10
those that know they've been hacked, and those that don't.
42
115000
3000
02:13
I mean three companies
43
118000
3000
02:16
providing cybersecurity services to the FBI
44
121000
4000
02:20
have been hacked.
45
125000
2000
02:22
Is nothing sacred anymore, for heaven's sake?
46
127000
3000
02:25
Anyway, this mysterious group Anonymous --
47
130000
2000
02:27
and they would say this themselves --
48
132000
2000
02:29
they are providing a service
49
134000
2000
02:31
by demonstrating how useless companies are
50
136000
4000
02:35
at protecting our data.
51
140000
3000
02:38
But there is also a very serious aspect to Anonymous --
52
143000
3000
02:41
they are ideologically driven.
53
146000
3000
02:44
They claim that they are battling
54
149000
2000
02:46
a dastardly conspiracy.
55
151000
3000
02:49
They say that governments are trying
56
154000
2000
02:51
to take over the Internet and control it,
57
156000
3000
02:54
and that they, Anonymous,
58
159000
2000
02:56
are the authentic voice of resistance --
59
161000
3000
02:59
be it against Middle Eastern dictatorships,
60
164000
2000
03:01
against global media corporations,
61
166000
3000
03:04
or against intelligence agencies,
62
169000
2000
03:06
or whoever it is.
63
171000
2000
03:08
And their politics are not entirely unattractive.
64
173000
4000
03:12
Okay, they're a little inchoate.
65
177000
3000
03:15
There's a strong whiff
66
180000
2000
03:17
of half-baked anarchism about them.
67
182000
3000
03:20
But one thing is true:
68
185000
2000
03:22
we are at the beginning
69
187000
2000
03:24
of a mighty struggle
70
189000
2000
03:26
for control of the Internet.
71
191000
3000
03:29
The Web links everything,
72
194000
2000
03:31
and very soon
73
196000
2000
03:33
it will mediate most human activity.
74
198000
2000
03:35
Because the Internet has fashioned
75
200000
2000
03:37
a new and complicated environment
76
202000
2000
03:39
for an old-age dilemma
77
204000
3000
03:42
that pits the demands of security
78
207000
3000
03:45
with the desire for freedom.
79
210000
3000
03:48
Now this is a very complicated struggle.
80
213000
4000
03:52
And unfortunately, for mortals like you and me,
81
217000
3000
03:55
we probably can't understand it very well.
82
220000
3000
03:58
Nonetheless,
83
223000
2000
04:00
in an unexpected attack of hubris
84
225000
2000
04:02
a couple of years ago,
85
227000
2000
04:04
I decided I would try and do that.
86
229000
3000
04:07
And I sort of get it.
87
232000
4000
04:11
These were the various things that I was looking at
88
236000
2000
04:13
as I was trying to understand it.
89
238000
2000
04:15
But in order to try and explain the whole thing,
90
240000
3000
04:18
I would need another 18 minutes or so to do it,
91
243000
3000
04:21
so you're just going to have to take it on trust from me on this occasion,
92
246000
5000
04:26
and let me assure you that all of these issues
93
251000
2000
04:28
are involved in cybersecurity and control of the Internet
94
253000
3000
04:31
one way or the other,
95
256000
2000
04:33
but in a configuration
96
258000
2000
04:35
that even Stephen Hawking would probably have difficulty
97
260000
3000
04:38
trying to get his head around.
98
263000
3000
04:41
So there you are.
99
266000
2000
04:43
And as you see, in the middle,
100
268000
2000
04:45
there is our old friend, the hacker.
101
270000
2000
04:47
The hacker is absolutely central
102
272000
3000
04:50
to many of the political, social
103
275000
2000
04:52
and economic issues affecting the Net.
104
277000
3000
04:55
And so I thought to myself,
105
280000
3000
04:58
"Well, these are the guys who I want to talk to."
106
283000
3000
05:01
And what do you know,
107
286000
3000
05:04
nobody else does talk to the hackers.
108
289000
2000
05:06
They're completely anonymous, as it were.
109
291000
3000
05:09
So despite the fact
110
294000
2000
05:11
that we are beginning to pour billions,
111
296000
3000
05:14
hundreds of billions of dollars,
112
299000
2000
05:16
into cybersecurity --
113
301000
3000
05:19
for the most extraordinary technical solutions --
114
304000
4000
05:23
no one wants to talk
115
308000
2000
05:25
to these guys, the hackers,
116
310000
2000
05:27
who are doing everything.
117
312000
3000
05:30
Instead, we prefer these really dazzling technological solutions,
118
315000
5000
05:35
which cost a huge amount of money.
119
320000
3000
05:38
And so nothing is going into the hackers.
120
323000
3000
05:41
Well, I say nothing,
121
326000
2000
05:43
but actually there is one teeny weeny little research unit
122
328000
4000
05:47
in Turin, Italy
123
332000
2000
05:49
called the Hackers Profiling Project.
124
334000
3000
05:52
And they are doing some fantastic research
125
337000
3000
05:55
into the characteristics,
126
340000
2000
05:57
into the abilities
127
342000
2000
05:59
and the socialization of hackers.
128
344000
2000
06:01
But because they're a U.N. operation,
129
346000
2000
06:03
maybe that's why governments and corporations
130
348000
2000
06:05
are not that interested in them.
131
350000
2000
06:07
Because it's a U.N. operation,
132
352000
2000
06:09
of course, it lacks funding.
133
354000
3000
06:12
But I think they're doing very important work.
134
357000
3000
06:15
Because where we have a surplus of technology
135
360000
4000
06:19
in the cybersecurity industry,
136
364000
3000
06:22
we have a definite lack of --
137
367000
3000
06:25
call me old-fashioned --
138
370000
2000
06:27
human intelligence.
139
372000
2000
06:29
Now, so far I've mentioned
140
374000
2000
06:31
the hackers Anonymous
141
376000
2000
06:33
who are a politically motivated hacking group.
142
378000
3000
06:36
Of course, the criminal justice system
143
381000
2000
06:38
treats them as common old garden criminals.
144
383000
2000
06:40
But interestingly,
145
385000
2000
06:42
Anonymous does not make use of its hacked information
146
387000
2000
06:44
for financial gain.
147
389000
2000
06:46
But what about the real cybercriminals?
148
391000
4000
06:50
Well real organized crime on the Internet
149
395000
3000
06:53
goes back about 10 years
150
398000
2000
06:55
when a group of gifted Ukrainian hackers
151
400000
5000
07:00
developed a website,
152
405000
2000
07:02
which led to the industrialization
153
407000
2000
07:04
of cybercrime.
154
409000
3000
07:07
Welcome to the now forgotten realm of CarderPlanet.
155
412000
3000
07:13
This is how they were advertising themselves
156
418000
2000
07:15
a decade ago on the Net.
157
420000
3000
07:18
Now CarderPlanet was very interesting.
158
423000
2000
07:20
Cybercriminals would go there
159
425000
2000
07:22
to buy and sell stolen credit card details,
160
427000
3000
07:25
to exchange information
161
430000
2000
07:27
about new malware that was out there.
162
432000
3000
07:30
And remember, this is a time
163
435000
2000
07:32
when we're seeing for the first time
164
437000
2000
07:34
so-called off-the-shelf malware.
165
439000
2000
07:36
This is ready for use, out-of-the-box stuff,
166
441000
3000
07:39
which you can deploy
167
444000
2000
07:41
even if you're not a terribly sophisticated hacker.
168
446000
4000
07:45
And so CarderPlanet became a sort of supermarket
169
450000
3000
07:48
for cybercriminals.
170
453000
2000
07:50
And its creators
171
455000
2000
07:52
were incredibly smart and entrepreneurial,
172
457000
2000
07:54
because they were faced
173
459000
2000
07:56
with one enormous challenge as cybercriminals.
174
461000
3000
07:59
And that challenge is:
175
464000
2000
08:01
How do you do business,
176
466000
2000
08:03
how do you trust
177
468000
2000
08:05
somebody on the Web who you want to do business with
178
470000
2000
08:07
when you know that they're a criminal?
179
472000
3000
08:10
(Laughter)
180
475000
2000
08:12
It's axiomatic that they're dodgy,
181
477000
2000
08:14
and they're going to want to try and rip you off.
182
479000
3000
08:17
So the family, as the inner core of CarderPlanet was known,
183
482000
3000
08:20
came up with this brilliant idea
184
485000
2000
08:22
called the escrow system.
185
487000
2000
08:24
They appointed an officer
186
489000
3000
08:27
who would mediate between the vendor and the purchaser.
187
492000
3000
08:30
The vendor, say, had stolen credit card details;
188
495000
3000
08:33
the purchaser wanted to get a hold of them.
189
498000
3000
08:36
The purchaser would send the administrative officer
190
501000
3000
08:39
some dollars digitally,
191
504000
2000
08:41
and the vendor would sell the stolen credit card details.
192
506000
3000
08:44
And the officer would then verify
193
509000
3000
08:47
if the stolen credit card worked.
194
512000
3000
08:50
And if they did,
195
515000
2000
08:52
he then passed on the money to the vendor
196
517000
2000
08:54
and the stolen credit card details to the purchaser.
197
519000
3000
08:57
And it was this
198
522000
2000
08:59
which completely revolutionized cybercrime on the Web.
199
524000
5000
09:04
And after that, it just went wild.
200
529000
2000
09:06
We had a champagne decade
201
531000
2000
09:08
for people who we know as Carders.
202
533000
3000
09:11
Now I spoke to one of these Carders
203
536000
2000
09:13
who we'll call RedBrigade --
204
538000
2000
09:15
although that wasn't even his proper nickname --
205
540000
2000
09:17
but I promised I wouldn't reveal who he was.
206
542000
2000
09:19
And he explained to me how in 2003 and 2004
207
544000
3000
09:22
he would go on sprees in New York,
208
547000
3000
09:25
taking out $10,000 from an ATM here,
209
550000
3000
09:28
$30,000 from an ATM there,
210
553000
3000
09:31
using cloned credit cards.
211
556000
3000
09:34
He was making, on average a week,
212
559000
3000
09:37
$150,000 --
213
562000
3000
09:40
tax free of course.
214
565000
2000
09:42
And he said
215
567000
3000
09:45
that he had so much money
216
570000
2000
09:47
stashed in his upper-East side apartment at one point
217
572000
2000
09:49
that he just didn't know what to do with it
218
574000
2000
09:51
and actually fell into a depression.
219
576000
2000
09:53
But that's a slightly different story,
220
578000
2000
09:55
which I won't go into now.
221
580000
2000
09:57
Now the interesting thing about RedBrigade
222
582000
3000
10:00
is that he wasn't an advanced hacker.
223
585000
2000
10:02
He sort of understood the technology,
224
587000
2000
10:04
and he realized that security was very important
225
589000
3000
10:07
if you were going to be a Carder,
226
592000
3000
10:10
but he didn't spend his days and nights
227
595000
2000
10:12
bent over a computer, eating pizza,
228
597000
2000
10:14
drinking coke and that sort of thing.
229
599000
2000
10:16
He was out there on the town
230
601000
2000
10:18
having a fab time enjoying the high life.
231
603000
2000
10:20
And this is because
232
605000
2000
10:22
hackers are only one element
233
607000
3000
10:25
in a cybercriminal enterprise.
234
610000
3000
10:28
And often they're the most vulnerable element of all.
235
613000
5000
10:34
And I want to explain this to you
236
619000
2000
10:36
by introducing you to six characters
237
621000
2000
10:38
who I met
238
623000
2000
10:40
while I was doing this research.
239
625000
3000
10:43
Dimitry Golubov, aka SCRIPT --
240
628000
3000
10:46
born in Odessa, Ukraine in 1982.
241
631000
3000
10:49
Now he developed his social and moral compass
242
634000
3000
10:52
on the Black Sea port during the 1990s.
243
637000
3000
10:55
This was a sink-or-swim environment
244
640000
3000
10:58
where involvement in criminal or corrupt activities
245
643000
4000
11:02
was entirely necessary
246
647000
2000
11:04
if you wanted to survive.
247
649000
2000
11:06
As an accomplished computer user,
248
651000
2000
11:08
what Dimitry did
249
653000
2000
11:10
was to transfer the gangster capitalism of his hometown
250
655000
4000
11:14
onto the Worldwide Web.
251
659000
2000
11:16
And he did a great job in it.
252
661000
2000
11:18
You have to understand though
253
663000
2000
11:20
that from his ninth birthday,
254
665000
2000
11:22
the only environment he knew
255
667000
2000
11:24
was gangsterism.
256
669000
2000
11:26
He knew no other way of making a living
257
671000
2000
11:28
and making money.
258
673000
2000
11:30
Then we have Renukanth Subramaniam,
259
675000
2000
11:32
aka JiLsi --
260
677000
2000
11:34
founder of DarkMarket,
261
679000
2000
11:36
born in Colombo, Sri Lanka.
262
681000
2000
11:38
As an eight year-old,
263
683000
2000
11:40
he and his parents fled the Sri Lankan capital
264
685000
2000
11:42
because Singhalese mobs were roaming the city,
265
687000
3000
11:45
looking for Tamils like Renu to murder.
266
690000
3000
11:48
At 11, he was interrogated by the Sri Lankan military,
267
693000
2000
11:50
accused of being a terrorist,
268
695000
2000
11:52
and his parents sent him on his own to Britain
269
697000
4000
11:56
as a refugee seeking political asylum.
270
701000
3000
11:59
At 13,
271
704000
2000
12:01
with only little English and being bullied at school,
272
706000
3000
12:04
he escaped into a world of computers
273
709000
3000
12:07
where he showed great technical ability,
274
712000
2000
12:09
but he was soon being seduced
275
714000
3000
12:12
by people on the Internet.
276
717000
2000
12:14
He was convicted of mortgage and credit card fraud,
277
719000
3000
12:17
and he will be released from Wormwood Scrubs jail in London
278
722000
3000
12:20
in 2012.
279
725000
2000
12:22
Matrix001,
280
727000
4000
12:26
who was an administrator at DarkMarket.
281
731000
3000
12:29
Born in Southern Germany
282
734000
2000
12:31
to a stable and well-respected middle class family,
283
736000
2000
12:33
his obsession with gaming as a teenager
284
738000
3000
12:36
led him to hacking.
285
741000
2000
12:38
And he was soon controlling huge servers around the world
286
743000
4000
12:42
where he stored his games
287
747000
2000
12:44
that he had cracked and pirated.
288
749000
2000
12:46
His slide into criminality
289
751000
2000
12:48
was incremental.
290
753000
2000
12:50
And when he finally woke up to his situation
291
755000
3000
12:53
and understood the implications,
292
758000
2000
12:55
he was already in too deep.
293
760000
3000
12:58
Max Vision, aka ICEMAN --
294
763000
2000
13:00
mastermind of cardersMarket.
295
765000
2000
13:02
Born in Meridian, Idaho.
296
767000
2000
13:04
Max Vision was one of the best penetration testers
297
769000
4000
13:08
working out of Santa Clara, California
298
773000
3000
13:11
in the late 90s for private companies
299
776000
2000
13:13
and voluntarily for the FBI.
300
778000
3000
13:16
Now in the late 1990s,
301
781000
2000
13:18
he discovered a vulnerability
302
783000
2000
13:20
on all U.S. government networks,
303
785000
3000
13:23
and he went in and patched it up --
304
788000
2000
13:25
because this included nuclear research facilities --
305
790000
4000
13:29
sparing the American government
306
794000
2000
13:31
a huge security embarrassment.
307
796000
2000
13:33
But also, because he was an inveterate hacker,
308
798000
3000
13:36
he left a tiny digital wormhole
309
801000
2000
13:38
through which he alone could crawl.
310
803000
2000
13:40
But this was spotted by an eagle-eye investigator,
311
805000
3000
13:43
and he was convicted.
312
808000
2000
13:45
At his open prison,
313
810000
2000
13:47
he came under the influence of financial fraudsters,
314
812000
2000
13:49
and those financial fraudsters
315
814000
2000
13:51
persuaded him to work for them
316
816000
2000
13:53
on his release.
317
818000
2000
13:55
And this man with a planetary-sized brain
318
820000
3000
13:58
is now serving a 13-year sentence
319
823000
2000
14:00
in California.
320
825000
2000
14:02
Adewale Taiwo, aka FeddyBB --
321
827000
3000
14:05
master bank account cracker
322
830000
2000
14:07
from Abuja in Nigeria.
323
832000
3000
14:10
He set up his prosaically entitled newsgroup,
324
835000
3000
14:13
bankfrauds@yahoo.co.uk
325
838000
5000
14:18
before arriving in Britain
326
843000
2000
14:20
in 2005
327
845000
2000
14:22
to take a Masters in chemical engineering
328
847000
2000
14:24
at Manchester University.
329
849000
2000
14:26
He impressed in the private sector,
330
851000
3000
14:29
developing chemical applications for the oil industry
331
854000
3000
14:32
while simultaneously running
332
857000
2000
14:34
a worldwide bank and credit card fraud operation that was worth millions
333
859000
3000
14:37
until his arrest in 2008.
334
862000
4000
14:41
And then finally, Cagatay Evyapan,
335
866000
2000
14:43
aka Cha0 --
336
868000
2000
14:45
one of the most remarkable hackers ever,
337
870000
2000
14:47
from Ankara in Turkey.
338
872000
2000
14:49
He combined the tremendous skills of a geek
339
874000
3000
14:52
with the suave social engineering skills
340
877000
4000
14:56
of the master criminal.
341
881000
3000
14:59
One of the smartest people I've ever met.
342
884000
3000
15:02
He also had the most effective
343
887000
2000
15:04
virtual private network security arrangement
344
889000
2000
15:06
the police have ever encountered
345
891000
2000
15:08
amongst global cybercriminals.
346
893000
2000
15:10
Now the important thing
347
895000
2000
15:12
about all of these people
348
897000
2000
15:14
is they share certain characteristics
349
899000
2000
15:16
despite the fact that they come from very different environments.
350
901000
4000
15:20
They are all people who learned their hacking skills
351
905000
3000
15:23
in their early to mid-teens.
352
908000
3000
15:26
They are all people
353
911000
2000
15:28
who demonstrate advanced ability
354
913000
2000
15:30
in maths and the sciences.
355
915000
3000
15:33
Remember that, when they developed those hacking skills,
356
918000
2000
15:35
their moral compass had not yet developed.
357
920000
4000
15:39
And most of them, with the exception of SCRIPT and Cha0,
358
924000
3000
15:42
they did not demonstrate
359
927000
4000
15:46
any real social skills in the outside world --
360
931000
3000
15:49
only on the Web.
361
934000
2000
15:51
And the other thing is
362
936000
2000
15:53
the high incidence of hackers like these
363
938000
2000
15:55
who have characteristics which are consistent
364
940000
3000
15:58
with Asperger's syndrome.
365
943000
3000
16:01
Now I discussed this
366
946000
2000
16:03
with Professor Simon Baron-Cohen
367
948000
2000
16:05
who's the professor of developmental psychopathology at Cambridge.
368
950000
4000
16:09
And he has done path-breaking work on autism
369
954000
4000
16:13
and confirmed, also for the authorities here,
370
958000
2000
16:15
that Gary McKinnon --
371
960000
2000
16:17
who is wanted by the United States
372
962000
2000
16:19
for hacking into the Pentagon --
373
964000
2000
16:21
suffers from Asperger's
374
966000
2000
16:23
and a secondary condition
375
968000
2000
16:25
of depression.
376
970000
2000
16:27
And Baron-Cohen explained
377
972000
2000
16:29
that certain disabilities
378
974000
2000
16:31
can manifest themselves in the hacking and computing world
379
976000
3000
16:34
as tremendous skills,
380
979000
2000
16:36
and that we should not be throwing in jail
381
981000
2000
16:38
people who have such disabilities and skills
382
983000
3000
16:41
because they have lost their way socially
383
986000
3000
16:44
or been duped.
384
989000
2000
16:46
Now I think we're missing a trick here,
385
991000
3000
16:49
because I don't think people like Max Vision should be in jail.
386
994000
3000
16:52
And let me be blunt about this.
387
997000
2000
16:54
In China, in Russia and in loads of other countries
388
999000
3000
16:57
that are developing cyber-offensive capabilities,
389
1002000
3000
17:00
this is exactly what they are doing.
390
1005000
2000
17:02
They are recruiting hackers
391
1007000
2000
17:04
both before and after they become involved
392
1009000
3000
17:07
in criminal and industrial espionage activities --
393
1012000
3000
17:10
are mobilizing them
394
1015000
2000
17:12
on behalf of the state.
395
1017000
2000
17:14
We need to engage
396
1019000
2000
17:16
and find ways of offering guidance
397
1021000
2000
17:18
to these young people,
398
1023000
2000
17:20
because they are a remarkable breed.
399
1025000
2000
17:22
And if we rely, as we do at the moment,
400
1027000
2000
17:24
solely on the criminal justice system
401
1029000
3000
17:27
and the threat of punitive sentences,
402
1032000
3000
17:30
we will be nurturing a monster we cannot tame.
403
1035000
3000
17:33
Thank you very much for listening.
404
1038000
2000
17:35
(Applause)
405
1040000
13000
17:48
Chris Anderson: So your idea worth spreading
406
1053000
2000
17:50
is hire hackers.
407
1055000
2000
17:52
How would someone get over that kind of fear
408
1057000
4000
17:56
that the hacker they hire
409
1061000
2000
17:58
might preserve that little teensy wormhole?
410
1063000
2000
18:00
MG: I think to an extent,
411
1065000
2000
18:02
you have to understand
412
1067000
2000
18:04
that it's axiomatic among hackers that they do that.
413
1069000
3000
18:07
They're just relentless and obsessive
414
1072000
3000
18:10
about what they do.
415
1075000
2000
18:12
But all of the people who I've spoken to
416
1077000
2000
18:14
who have fallen foul of the law,
417
1079000
2000
18:16
they have all said, "Please, please give us a chance
418
1081000
3000
18:19
to work in the legitimate industry.
419
1084000
3000
18:22
We just never knew how to get there, what we were doing.
420
1087000
3000
18:25
We want to work with you."
421
1090000
2000
18:27
Chris Anderson: Okay, well that makes sense. Thanks a lot Misha.
422
1092000
3000
18:30
(Applause)
423
1095000
3000

▲Back to top

ABOUT THE SPEAKER
Misha Glenny - Underworld investigator
Journalist Misha Glenny leaves no stone unturned (and no failed state unexamined) in his excavation of criminal globalization.

Why you should listen

In minute detail, Misha Glenny's 2008 book McMafia illuminates the byzantine outlines of global organized crime. Whether it's pot smugglers in British Columbia, oil/weapons/people traffickers in Eastern Europe, Japanese yakuza or Nigerian scammers, to research this magisterial work Glenny penetrated the convoluted, globalized and franchised modern underworld -- often at considerable personal risk.

The book that resulted is an exhaustive look at an unseen industry that Glenny believes may account for 15% of the world's GDP.

Legal society ignores this world at its peril, but Glenny suggests that conventional law enforcement might not be able to combat a problem whose roots lie in global instability.

While covering the Central Europe beat for the Guardian and the BBC, Glenny wrote several acclaimed books on the fall of Yugoslavia and the rise of the Balkan nations. He's researching a new book on cybercrime, of which he says: "The key to cybercrime is what we call social engineering. Or to use the technical term for it, there's one born every minute."

Watch TED's exclusive video Q&A with Glenny: "Behind the Scenes of McMafia" >>

More profile about the speaker
Misha Glenny | Speaker | TED.com

Data provided by TED.

This site was created in May 2015 and the last update was on January 12, 2020. It will no longer be updated.

We are currently creating a new site called "eng.lish.video" and would be grateful if you could access it.

If you have any questions or suggestions, please feel free to write comments in your language on the contact form.

Privacy Policy

Developer's Blog

Buy Me A Coffee