ABOUT THE SPEAKER
Caleb Barlow - Cybercrime fighter
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys.

Why you should listen

As a vice president at IBM Security, Caleb Barlow has insight into to one of the largest security intelligence operations in the world. His team stands watch protecting the information security of thousands of customers in more than a hundred countries. On a busy day they can process upwards of 35 billion potential security events across their global operations centers.

Barlow has been advising chief information security officers, boards of directors and government officials on security practices, frameworks and strategies for risk mitigation on a global basis. He is a sought-after speaker on the subject of security and regularly appears in both print and broadcast media, including NBC News, CNBC, BBC World Service, NPR, the Wall Street Journal and the Washington Post. His opinions have been solicited by members of Congress, the NSA, and NATO, and he was invited by the President of the UN General Assembly to discuss his views at the United Nations.

Most recently, Barlow is focusing on building a large-scale simulation environment to educate C-level executives on how to better prevent and respond to a cyber attack so they can maintain business resiliency in the face of crisis.

More profile about the speaker
Caleb Barlow | Speaker | TED.com
TED@IBM

Caleb Barlow: Where is cybercrime really coming from?

迦勒·巴洛: 网络犯罪到底来源何处?

Filmed:
1,639,157 views

网络犯罪行为在去年估计达到了4万5千亿的经济规模,全球范围内超过20亿条数据被盗取。安全专家迦勒·巴洛指出我们现有的保护策略是低效的。他的解决方案是我们合作打击网络犯罪,就像是国际卫生组织合作应对疾病感染一样,及时的分享有关谁被感染、疾病如何传播的信息。如果我们不这么做,他说,那么我们就变成了问题的一部分。
- Cybercrime fighter
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys. Full bio

Double-click the English transcript below to play the video.

00:13
Cybercrime犯罪 is out of control控制.
0
1012
4217
网络犯罪行为已经难以遏制,
00:18
It's everywhere到处.
1
6186
1365
它无处不在。
00:19
We hear about it every一切 single day.
2
7575
4288
我们每天都能听到它。
00:24
This year,
3
12771
1214
今年,
00:26
over two billion十亿 records记录 lost丢失 or stolen被盗.
4
14009
5134
有超过20亿的数据记录丢失或被盗取。
00:32
And last year, 100 million百万 of us,
mostly大多 Americans美国人,
5
20050
5635
在去年,
1亿人的医保信息落入盗贼手中,
绝大多数是美国人,包括我自己。
00:37
lost丢失 our health健康 insurance保险 data数据
to thieves盗贼 -- myself included包括.
6
25709
5134
00:44
What's particularly尤其 concerning关于 about this
is that in most cases,
7
32303
5448
尤其令人感到担忧的是,
在大多数情况下,
00:49
it was months个月 before anyone任何人 even
reported报道 that these records记录 were stolen被盗.
8
37775
5911
人们要在几个月后才会
报告这些资料已经泄露。
00:57
So if you watch the evening晚间 news新闻,
9
45164
3043
如果你留意晚间新闻,
01:00
you would think that most of this
is espionage间谍 or nation-state民族国家 activity活动.
10
48231
5206
你可能觉得这是
国家级别的间谍行为,
01:05
And, well, some of it is.
11
53993
2093
没错,某些事件确实是这样,
01:08
Espionage间谍, you see, is an accepted公认
international国际 practice实践.
12
56694
4438
间谍活动是国际上合法的。
01:13
But in this case案件,
13
61793
1483
但是对网络犯罪来说,
01:15
it is only a small portion一部分
of the problem问题 that we're dealing交易 with.
14
63300
5453
间谍行为只占网络犯罪的
很小的一部分。
01:21
How often经常 do we hear about a breach突破口
15
69639
3335
我们很少听到报道说
某次信息泄露是由于精心谋划的
国际间谍行为。
01:24
followed其次 by, "... it was the result结果
of a sophisticated复杂的 nation-state民族国家 attack攻击?"
16
72998
4851
01:30
Well, often经常 that is companies公司
not being存在 willing愿意 to own拥有 up
17
78661
4861
事实上,常常是由于那些公司不愿意承认
01:35
to their own拥有 lackluster乏善可陈
security安全 practices做法.
18
83546
2980
自己的安保措施不堪一击。
01:39
There is also a widely广泛 held保持 belief信仰
19
87065
2500
很多人相信
01:42
that by blaming归咎 an attack攻击
on a nation-state民族国家,
20
90355
3851
把网络攻击归咎于国家行动,
这样监管机构就没办法监管这些公司了,
01:46
you are putting regulators监管机构 at bay --
21
94230
2681
起码在一段时间内。
01:48
at least最小 for a period of time.
22
96935
2034
01:51
So where is all of this coming未来 from?
23
99837
4483
那么,这些网络攻击到底
是从何而来呢?
01:56
The United联合的 Nations国家 estimates估计
that 80 percent百分 of it
24
104997
5493
联合国估计80%的网络犯罪,
是由高度组织化且十分老练的
犯罪团伙实施的。
02:02
is from highly高度 organized有组织的
and ultrasophisticatedultrasophisticated criminal刑事 gangs帮派.
25
110514
5770
02:09
To date日期,
26
117254
1719
迄今为止,
02:10
this represents代表 one of the largest最大
illegal非法 economies经济 in the world世界,
27
118997
6600
网络犯罪是金额最庞大的
全球非法经济之一,
目前已经达到了
02:17
topping配料 out at, now get this,
28
125621
3120
4450亿美元。
02:20
445 billion十亿 dollars美元.
29
128765
4316
02:25
Let me put that in perspective透视
for all of you:
30
133539
2912
我来做个对比让大家感受下,
02:28
445 billion十亿 dollars美元 is larger than the GDPGDP
31
136475
6104
4450亿美元比160个国家的GDP还要高,
02:34
of 160 nations国家,
32
142603
2666
其中包括
02:37
including包含 Ireland爱尔兰, Finland芬兰,
Denmark丹麦 and Portugal葡萄牙,
33
145293
4545
爱尔兰、芬兰、丹麦、葡萄牙等等。
02:41
to name名称 a few少数.
34
149862
1230
02:44
So how does this work?
35
152293
2004
网络犯罪是如何运转的?
这些犯罪行为是如何发生的?
02:46
How do these criminals罪犯 operate操作?
36
154321
1906
02:48
Well, let me tell you a little story故事.
37
156701
2856
请先让我讲一个小故事。
02:52
About a year ago,
38
160531
1194
大约一年之前,
02:53
our security安全 researchers研究人员 were tracking追踪
39
161749
3310
我们的网络安全人员在追踪一种
看似普通但复杂的,叫做
"Dyre Wolf"的木马病毒。
02:57
a somewhat有些 ordinary普通 but sophisticated复杂的
banking银行业 Trojan木马 called the DyreDyre Wolf.
40
165083
6046
03:03
The DyreDyre Wolf would get on your computer电脑
41
171925
2221
在你点击了钓鱼邮件的链接之后,
03:06
via通过 you clicking点击 on a link链接
in a phishing网络钓鱼 email电子邮件
42
174170
3000
这种病毒感会染电脑,
你其实不应该受到这些邮件。
03:09
that you probably大概 shouldn't不能 have.
43
177194
1952
它会在你的电脑里安静地等待,
03:11
It would then sit and wait.
44
179170
1997
03:13
It would wait until直到 you logged记录
into your bank银行 account帐户.
45
181755
3011
直到你登录自己的银行账户。
03:17
And when you did,
the bad guys would reach达到 in,
46
185299
3343
然后,坏人会侵入你的账户,
盗取你的安全证书,
03:20
steal your credentials证书,
47
188666
1653
利用你的证书偷走你的存款。
03:22
and then use that to steal your money.
48
190343
1901
03:25
This sounds声音 terrible可怕,
49
193023
1920
这听上去很糟糕,
03:26
but the reality现实 is,
in the security安全 industry行业,
50
194967
2793
但事实上,在安保领域,
这种形式的攻击是很常见的。
03:29
this form形成 of attack攻击
is somewhat有些 commonplace平凡.
51
197784
3682
03:36
However然而, the DyreDyre Wolf had
two distinctly历历 different不同 personalities个性 --
52
204002
6164
但是,Dyre Wolf病毒具有
两种截然不同的行动方式。
03:42
one for these small transactions交易,
53
210659
2341
其一用来针对小额转账,
03:45
but it took on an entirely完全
different不同 persona人物
54
213024
3040
但当你进行巨额在线商业转账时,
03:48
if you were in the business商业 of moving移动
large-scale大规模 wire线 transfers转让.
55
216088
3815
它会有完全不同的表现。
这样的表现在于,
03:51
Here's这里的 what would happen发生.
56
219927
1699
03:53
You start开始 the process处理
of issuing发行 a wire线 transfer转让,
57
221650
2800
当你开始处理这笔转账时,
03:56
and up in your browser浏览器 would pop流行的
a screen屏幕 from your bank银行,
58
224474
3008
你的浏览器会弹出一个银行窗口,
提示你的账户遇到了问题,
03:59
indicating说明 that there's a problem问题
with your account帐户,
59
227506
2597
04:02
and that you need to call
the bank银行 immediately立即,
60
230127
3191
需要你立即打电话联系银行,
同时给你提供一个假冒的银行电话。
04:05
along沿 with the number
to the bank's银行 fraud舞弊 department.
61
233342
2742
04:08
So you pick up the phone电话 and you call.
62
236835
2170
此时你会拿起手机拨打电话。
04:11
And after going through通过
the normal正常 voice语音 prompts提示,
63
239029
3011
在经过通常的语音流程后,
04:14
you're met会见 with
an English-speaking英语会话 operator操作者.
64
242064
2117
你会接通到一个说英语的接线员。
04:16
"Hello你好, AltoroAltoro Mutual相互 Bank银行.
How can I help you?"
65
244205
2868
“你好,这里是奥特罗银行,
有什么可以帮到您的?”
04:20
And you go through通过 the process处理
like you do every一切 time you call your bank银行,
66
248033
3653
然后你会按照每次电话银行
都要走的流程,
给他们提供你的姓名,账户号,
04:23
of giving them your name名称
and your account帐户 number,
67
251710
2791
并且通过安全查验来确定你的身份。
04:26
going through通过 the security安全 checks检查
to verify校验 you are who you said you are.
68
254525
3923
04:31
Most of us may可能 not know this,
69
259809
1488
可能许多人并不知道这些,
04:33
but in many许多 large-scale大规模 wire线 transfers转让,
70
261321
2229
但在很多大额转账中,
04:35
it requires要求 two people to sign标志 off
on the wire线 transfer转让,
71
263574
3111
要求有两个人一起确认交易,
04:38
so the operator操作者 then asks you
to get the second第二 person on the line线,
72
266709
3199
所以那个接线员会要求你
让另外一个人加入通话,
并且经过相同的安全信息查验。
04:41
and goes through通过 the same相同 set
of verifications验证 and checks检查.
73
269932
2801
04:45
Sounds声音 normal正常, right?
74
273960
1346
听起来还挺正常的吧?
04:47
Only one problem问题:
75
275909
1442
然而关键问题是,
04:49
you're not talking to the bank银行.
76
277375
1825
你并不是在和银行通话,
04:51
You're talking to the criminals罪犯.
77
279224
1586
而是犯罪分子,
04:52
They had built内置
an English-speaking英语会话 help desk,
78
280834
2198
他们安排了说英语的接线员,
04:55
fake overlays覆盖 to the banking银行业 website网站.
79
283056
2065
用假的界面冒充原本的银行网站。
04:57
And this was so flawlessly完美 executed执行
80
285145
3100
这些行径被完美无瑕地执行,
05:00
that they were moving移动
between之间 a half a million百万
81
288269
2143
让犯罪分子每次能成功转移
五十万至一百五十万美元
05:02
and a million百万 and a half
dollars美元 per attempt尝试
82
290436
3087
到他们自己的保险箱里。
05:05
into their criminal刑事 coffers库房.
83
293547
1558
05:08
These criminal刑事 organizations组织 operate操作
84
296140
2615
这些犯罪集团像受到严格监管的,
05:10
like highly高度 regimented刻板,
legitimate合法 businesses企业.
85
298779
3025
合法的商业集团一样运作。
05:14
Their employees雇员 work
Monday星期一 through通过 Friday星期五.
86
302345
2483
他们的雇员在周一至周五工作,
05:17
They take the weekends周末 off.
87
305309
1536
并且拥有双休。
那我们是怎么知道这些的呢?
05:18
How do we know this?
88
306869
1383
05:20
We know this because
our security安全 researchers研究人员 see
89
308276
3133
我们的安全人员发现
05:23
repeated重复 spikes钉鞋 of malware恶意软件
on a Friday星期五 afternoon下午.
90
311433
3066
这些病毒软件会在周五下午持续入侵。
05:27
The bad guys, after a long weekend周末
with the wife妻子 and kids孩子,
91
315254
3215
这些犯罪分子在经过有妻儿陪伴的周末后,
05:30
come back in to see how well things went.
92
318493
2240
回到工作岗位检查病毒的工作进程。
05:35
The Dark黑暗 Web卷筒纸 is where
they spend their time.
93
323701
2674
他们把时间都花在了暗网中。
05:39
That is a term术语 used to describe描述
the anonymous匿名 underbelly软肋 of the internet互联网,
94
327295
5789
暗网用来表示互联网中的隐藏的阴暗面,
罪犯可以在其中匿名活动,
05:45
where thieves盗贼 can operate操作 with anonymity匿名
95
333108
2925
05:48
and without detection发现.
96
336057
1445
并且不会被检测到。
05:50
Here they peddle兜售 their attack攻击 software软件
97
338209
3027
在这里他们兜售木马软件,
并且分享最新木马技术的讯息。
05:53
and share分享 information信息
on new attack攻击 techniques技术.
98
341260
3456
05:57
You can buy购买 everything there,
99
345571
1850
你几乎能在这里买到所有东西,
05:59
from a base-level基准面 attack攻击
to a much more advanced高级 version.
100
347445
3656
从最基础的网络攻击到更高级的版本。
06:03
In fact事实, in many许多 cases, you even see
101
351842
2292
事实上,许多时候你还能发现,
06:06
gold, silver and bronze青铜 levels水平 of service服务.
102
354158
3172
这些服务有金、银、铜的等级。
06:09
You can check references引用.
103
357903
1671
你可以查看他们的履历,
06:11
You can even buy购买 attacks攻击
104
359977
2560
你甚至也可以购买
承诺无效退款的黑客攻击,
06:14
that come with a money-back退款 guarantee保证 --
105
362561
3328
(笑声)
06:17
(Laughter笑声)
106
365913
1045
如果入侵没有成功。
06:18
if you're not successful成功.
107
366982
1655
06:21
Now, these environments环境,
these marketplaces交易市场 --
108
369931
3091
现在看来,这些地下环境,这些市场,
06:25
they look like an Amazon亚马逊 or an eBay易趣.
109
373046
3347
似乎就和亚马逊和易贝一样。
06:28
You see products制品, prices价格,
ratings评级 and reviews评论.
110
376417
3956
你可以看见产品,以及它们的价格,评分和评价。
06:32
Of course课程, if you're going
to buy购买 an attack攻击,
111
380397
2254
理所当然的,如果你要购买一次网络攻击,
06:34
you're going to buy购买 from a reputable信誉
criminal刑事 with good ratings评级, right?
112
382675
3449
你肯定会选择好评多的,
信誉高的犯罪团伙吧?
(笑声)
06:38
(Laughter笑声)
113
386148
1004
这就像在去一家新的餐厅之前
06:39
This isn't any different不同
114
387176
1201
06:40
than checking检查 on Yelp喊叫 or TripAdvisor到到网
before going to a new restaurant餐厅.
115
388401
5190
上Yelp或TripAdvisor先了解一下。
06:46
So, here is an example.
116
394503
2093
这就是一个例子。
06:48
This is an actual实际 screenshot截图
of a vendor供应商 selling销售 malware恶意软件.
117
396620
5421
这是一张木马软件
卖家信息的真实截图,
06:54
Notice注意 they're a vendor供应商 level水平 four,
118
402065
1815
他们的卖家等级达到了4级,
信用等级为6。
06:55
they have a trust相信 level水平 of six.
119
403904
1841
他们在去年收到400封好评,
06:57
They've他们已经 had 400 positive reviews评论
in the last year,
120
405769
2335
07:00
and only two negative reviews评论
in the last month.
121
408128
2380
在上个月也只有两封差评。
07:03
We even see things like licensing许可 terms条款.
122
411072
3357
我们甚至能找到伪造证件。
07:06
Here's这里的 an example of a site现场 you can go to
123
414762
2004
你可以访问像这样的网站,
07:08
if you want to change更改 your identity身分.
124
416790
1757
如果你需要伪造的身份证明。
07:10
They will sell you a fake IDID,
125
418571
1857
他们会卖给你假的身份证,
07:12
fake passports护照.
126
420452
1594
伪造的护照。
07:14
But note注意 the legally法律上 binding捆绑 terms条款
for purchasing购买 your fake IDID.
127
422603
5049
但请注意购买假身份证时要
遵守相关法律条款。
07:20
Give me a break打破.
128
428518
1521
开玩笑吧。
07:22
What are they going to do --
sue起诉 you if you violate违反 them?
129
430063
2858
就算你违反了,他们能怎么做?告你吗?
07:24
(Laughter笑声)
130
432945
1150
(笑声)
07:27
This occurred发生 a couple一对 of months个月 ago.
131
435458
2423
这发生在几个月之前。
07:29
One of our security安全
researchers研究人员 was looking
132
437905
3615
我们的一位安全研究人员在调查一种
07:33
at a new AndroidAndroid的 malware恶意软件 application应用
that we had discovered发现.
133
441544
4998
在安卓系统中新发现的木马病毒
07:38
It was called Bilal比拉尔 Botbot.
134
446566
1920
叫做Bilal Bot。
07:41
In a blog博客 post岗位,
135
449514
1926
在一篇博文中,
她认为Bilal Bot是先进的GM Bot病毒的
07:43
she positioned定位的 Bilal比拉尔 Botbot
as a new, inexpensive便宜 and beta公测 alternative替代
136
451464
6805
07:50
to the much more advanced高级 GMGM Botbot
137
458870
3338
新版的,更便宜的测试版替代品。
GM Bot在黑市中是很常见的软件。
07:54
that was commonplace平凡
in the criminal刑事 underground地下.
138
462232
2815
07:58
This review评论 did not sit well
with the authors作者 of Bilal比拉尔 Botbot.
139
466658
4010
这条评价令Bilal Bot的作者感到不服,
08:03
So they wrote her this very email电子邮件,
140
471237
2580
于是他们给她写了封Email,
08:07
pleading恳求 their case案件
and making制造 the argument论据
141
475028
2757
说明了他们的情况,并争论说,
08:09
that they felt she had evaluated评估
an older旧的 version.
142
477809
5429
她评估的是较旧的版本。
08:16
They asked her to please update更新
her blog博客 with more accurate准确 information信息
143
484198
4709
他们要求她在博客中更新更准确的信息,
甚至提供面谈的机会,
08:20
and even offered提供 to do an interview访问
144
488931
3412
来作出清楚地展示出
08:24
to describe描述 to her in detail详情
145
492367
2221
他们的病毒远比市面上的要强。
08:26
how their attack攻击 software软件 was now
far better than the competition竞争.
146
494612
4599
08:32
So look,
147
500365
1325
所以,
08:33
you don't have to like what they do,
148
501714
3864
你可以不喜欢他们做的事情,
08:37
but you do have to respect尊重
the entrepreneurial创业 nature性质
149
505602
4919
但你应该尊重他们的努力
以及表现出来的
企业家气质。
08:42
of their endeavors努力.
150
510545
1207
(笑声)
08:43
(Laughter笑声)
151
511776
1150
08:46
So how are we going to stop this?
152
514476
3855
那么我们该如何阻止这些事情发生呢?
08:51
It's not like we're going to be able能够
to identify鉴定 who's谁是 responsible主管 --
153
519714
5564
我们并不需要去确定这是谁的责任。
08:57
remember记得, they operate操作 with anonymity匿名
154
525302
2962
记住,他们是匿名操作的
09:00
and outside the reach达到 of the law.
155
528288
1985
而且是违法的。
09:03
We're certainly当然 not going to be able能够
to prosecute起诉 the offenders罪犯.
156
531217
3284
我们肯定没办法起诉他们。
09:07
I would propose提出 that we need
a completely全然 new approach途径.
157
535156
5545
我认为我们需要一种全新的方式
09:13
And that approach途径 needs需求
to be centered中心 on the idea理念
158
541763
3906
而且这种方式要以一种想法为中心,
09:17
that we need to change更改
the economics经济学 for the bad guys.
159
545693
3895
那就是我们要改变网络犯罪的
经济运作方式。
09:22
And to give you a perspective透视
on how this can work,
160
550245
3101
向大家解释一下这将如何生效,
09:25
let's think of the response响应 we see
to a healthcare卫生保健 pandemic流感大流行:
161
553370
4988
想想我们对流行病的对应方式,
09:30
SARSSARS, Ebola埃博拉病毒, bird flu流感, Zika兹卡.
162
558382
3003
非典、埃博拉病毒、禽流感、寨卡病毒,
09:34
What is the top最佳 priority优先?
163
562036
1921
优先顺序是什么?
09:35
It's knowing会心 who is infected感染
and how the disease疾病 is spreading传播.
164
563981
5293
先要知道谁被感染了,
而且这种疾病是如何传播的,
09:44
Now, governments政府, private私人的 institutions机构,
hospitals医院, physicians医师 --
165
572015
6147
现在,政府、私人机构、医院、医生
09:51
everyone大家 responds响应 openly公然 and quickly很快.
166
579061
3720
每个人都公开快速地回应。
09:55
This is a collective集体 and altruistic利他 effort功夫
167
583334
3971
这是一种集体和无私的努力
去阻止疾病的传播
09:59
to stop the spread传播 in its tracks轨道
168
587329
3900
并且让没被感染的人了解
10:03
and to inform通知 anyone任何人 not infected感染
169
591253
2877
如何保护和预防。
10:06
how to protect保护 or inoculate接种 themselves他们自己.
170
594154
2380
10:10
Unfortunately不幸, this is not at all
what we see in response响应 to a cyber网络 attack攻击.
171
598900
5694
不幸的是,这并不是我们
对网络攻击的应对方式。
10:17
Organizations组织 are far more likely容易
to keep information信息 on that attack攻击
172
605850
4451
机构在被攻击之后
更有可能把信息保密。
10:22
to themselves他们自己.
173
610325
1625
10:25
Why?
174
613082
1156
为什么会这样?
因为他们担心会损伤竞争力,
10:26
Because they're worried担心
about competitive竞争的 advantage优点,
175
614262
2970
10:30
litigation诉讼
176
618043
1571
引发诉讼,
或是监管部门介入。
10:31
or regulation.
177
619638
1306
10:33
We need to effectively有效 democratize民主化
threat威胁 intelligence情报 data数据.
178
621827
5770
我们要把威胁的数据有效地公布给大众。
10:39
We need to get all of these organizations组织
to open打开 up and share分享
179
627975
5476
我们要让这些组织公开共享
他们私人武器库里的信息。
10:45
what is in their private私人的 arsenal兵工厂
of information信息.
180
633475
3622
10:51
The bad guys are moving移动 fast快速;
181
639010
2794
犯罪分子的动作很快,
我们就要比他们更快。
10:53
we've我们已经 got to move移动 faster更快.
182
641828
2117
10:56
And the best最好 way to do that is to open打开 up
183
644750
3722
最好的方式就是
共享数据。
11:00
and share分享 data数据 on what's happening事件.
184
648496
2347
11:03
Let's think about this in the construct构造
of security安全 professionals专业人士.
185
651304
4326
让我们看看安全专家的想法,
11:08
Remember记得, they're programmed程序 right
into their DNA脱氧核糖核酸 to keep secrets秘密.
186
656164
4976
这些安全专家都非常注重保守秘密。
现在我们已经让这些安全专家有了共识。
11:13
We've我们已经 got to turn
that thinking思维 on its head.
187
661164
3024
我们让政府、私人机构
11:16
We've我们已经 got to get governments政府,
private私人的 institutions机构
188
664212
3281
和安全企业
11:19
and security安全 companies公司
189
667517
1443
都愿意能够快速分享信息。
11:20
willing愿意 to share分享 information信息 at speed速度.
190
668984
2731
原因是
11:23
And here's这里的 why:
191
671739
1676
当你分享安全攻击信息的时候,
11:25
because if you share分享 the information信息,
192
673439
1877
你类似于接种了疫苗。
11:27
it's equivalent当量 to inoculation接种.
193
675340
2017
11:30
And if you're not sharing分享,
194
678663
1547
如果你选择保密,
那么你实际上就变成了问题的一部分,
11:32
you're actually其实 part部分 of the problem问题,
195
680234
2101
因为你增加了其他人被同样的黑客技术
11:34
because you're increasing增加 the odds可能性
that other people could be impacted影响
196
682359
5768
攻击的可能性。
11:40
by the same相同 attack攻击 techniques技术.
197
688151
2630
11:43
But there's an even bigger benefit效益.
198
691986
2049
但是还有一个更大的好处,
11:47
By destroying销毁 criminals'罪犯 devices设备
closer接近 to real真实 time,
199
695198
4746
就是这能快速毁灭犯罪分子的病毒
破坏了他们的计划。
11:51
we break打破 their plans计划.
200
699968
1753
11:55
We inform通知 the people they aim目标 to hurt伤害
201
703462
3240
我们在那些网络犯罪分子
实施攻击之前,
就通知潜在的受害者。
11:58
far sooner than they had ever anticipated预期.
202
706726
2645
12:02
We ruin废墟 their reputations名誉,
203
710520
2201
我们破坏他们的名声,
降低他们的用户评分和评价结果。
12:04
we crush粉碎 their ratings评级 and reviews评论.
204
712745
3092
12:08
We make cybercrime网络犯罪 not pay工资.
205
716305
3832
我们让网络犯罪赚不到钱。
12:12
We change更改 the economics经济学 for the bad guys.
206
720931
3768
我们把坏人赚钱的模式改变了。
12:18
But to do this,
a first mover was required需要 --
207
726315
3972
但是实现这些,
一个重要的前提条件是必须的,
整个信息安全产业的观念都需要改变。
12:22
someone有人 to change更改 the thinking思维
in the security安全 industry行业 overall总体.
208
730311
4601
12:28
About a year ago,
209
736067
1270
大概一年前,
我和同事有了一个大胆的想法。
12:29
my colleagues同事 and I had a radical激进 idea理念.
210
737361
2506
12:32
What if IBMIBM were to take our data数据 --
211
740624
4584
如果IBM将我们的数据,
12:37
we had one of the largest最大 threat威胁
intelligence情报 databases数据库 in the world世界 --
212
745987
3988
我们有世界上最大的威胁情报库,
并把它公开会怎样?
12:41
and open打开 it up?
213
749999
1359
12:43
It had information信息 not just
on what had happened发生 in the past过去,
214
751757
3461
库中不仅仅有过去发生的攻击信息,
同时也包括正在发生的攻击信息。
12:47
but what was happening事件 in near-real近实时 time.
215
755242
2475
如果我们免费公开的放在
互联网上会怎样?
12:49
What if we were to publish发布 it all
openly公然 on the internet互联网?
216
757741
3897
12:54
As you can imagine想像,
this got quite相当 a reaction反应.
217
762463
2494
你大概能想象到,大家反应很大。
12:56
First came来了 the lawyers律师:
218
764981
1364
律师先坐不住了,
12:58
What are the legal法律
implications启示 of doing that?
219
766369
2315
这样做有没有什么法律问题?
13:01
Then came来了 the business商业:
220
769385
1335
然后是商务,
13:02
What are the business商业
implications启示 of doing that?
221
770744
2400
这样做对于我们的商业利益
有什么影响?
13:05
And this was also met会见 with a good dose剂量
222
773622
2173
同时我们也遇到了很多人
13:07
of a lot of people just asking
if we were completely全然 crazy.
223
775819
3108
他们直接认为我们是不是疯了。
13:11
But there was one conversation会话
that kept不停 floating漂浮的 to the surface表面
224
779928
3786
然而在每一次我们跟人们的谈话中
有一句对白始终会出现:
13:15
in every一切 dialogue对话 that we would have:
225
783738
2051
13:18
the realization实现 that if we didn't do this,
226
786400
3547
我们意识到如果我们不这么做,
我们就成了问题的一部分。
13:21
then we were part部分 of the problem问题.
227
789971
2631
13:25
So we did something unheard闻所未闻 of
in the security安全 industry行业.
228
793514
2860
所以我们做了一件安全领域
从未有人做的事。
13:29
We started开始 publishing出版.
229
797045
1673
我们开始公开情报。
13:30
Over 700 terabytes兆兆字节 of actionable
threat威胁 intelligence情报 data数据,
230
798742
4410
超过700TB数据的威胁情报信息,
13:35
including包含 information信息 on real-time即时的 attacks攻击
231
803176
3005
包括正在发生的攻击情报
13:38
that can be used to stop
cybercrime网络犯罪 in its tracks轨道.
232
806205
2863
都可以帮助停止正在发生的
网络攻击行为。
13:41
And to date日期,
233
809813
1370
到今天,
13:43
over 4,000 organizations组织
are leveraging借力 this data数据,
234
811207
4044
超过4000家组织从这个情报中获益,
包括半数以上财富100强企业。
13:47
including包含 half of the Fortune幸运 100.
235
815275
1879
13:50
And our hope希望 as a next下一个 step
is to get all of those organizations组织
236
818599
4017
下一步,我们希望能够让这些组织
都加入我们的战斗,
13:54
to join加入 us in the fight斗争,
237
822640
1961
跟我们一样,
13:56
and do the same相同 thing
238
824625
1551
13:58
and share分享 their information信息
239
826200
2088
共享威胁信息,
报告他们何时以何种方式被入侵。
14:00
on when and how
they're being存在 attacked袭击 as well.
240
828312
2534
14:03
We all have the opportunity机会 to stop it,
241
831552
3018
我们都有机会来阻止网络犯罪,
我们也已经知道方法。
14:06
and we already已经 all know how.
242
834594
2161
14:09
All we have to do is look
to the response响应 that we see
243
837372
4370
我们要做的就是
向世界医疗机构学习,
14:13
in the world世界 of health健康 care关心,
244
841766
1506
学习他们是如何应对传染病的。
14:15
and how they respond响应 to a pandemic流感大流行.
245
843296
1903
14:17
Simply只是 put,
246
845623
1379
简单说,
我们需要开放和合作。
14:19
we need to be open打开 and collaborative共同.
247
847026
2276
14:21
Thank you.
248
849876
1151
谢谢大家。
(掌声)
14:23
(Applause掌声)
249
851051
3792
Translated by Wei Wu
Reviewed by Conway Ye

▲Back to top

ABOUT THE SPEAKER
Caleb Barlow - Cybercrime fighter
IBM's Caleb Barlow is focused on how we solve the cyber security problem by changing the economics for the bad guys.

Why you should listen

As a vice president at IBM Security, Caleb Barlow has insight into to one of the largest security intelligence operations in the world. His team stands watch protecting the information security of thousands of customers in more than a hundred countries. On a busy day they can process upwards of 35 billion potential security events across their global operations centers.

Barlow has been advising chief information security officers, boards of directors and government officials on security practices, frameworks and strategies for risk mitigation on a global basis. He is a sought-after speaker on the subject of security and regularly appears in both print and broadcast media, including NBC News, CNBC, BBC World Service, NPR, the Wall Street Journal and the Washington Post. His opinions have been solicited by members of Congress, the NSA, and NATO, and he was invited by the President of the UN General Assembly to discuss his views at the United Nations.

Most recently, Barlow is focusing on building a large-scale simulation environment to educate C-level executives on how to better prevent and respond to a cyber attack so they can maintain business resiliency in the face of crisis.

More profile about the speaker
Caleb Barlow | Speaker | TED.com

Data provided by TED.

This site was created in May 2015 and the last update was on January 12, 2020. It will no longer be updated.

We are currently creating a new site called "eng.lish.video" and would be grateful if you could access it.

If you have any questions or suggestions, please feel free to write comments in your language on the contact form.

Privacy Policy

Developer's Blog

Buy Me A Coffee