380
00:21:47,486 --> 00:21:50,683
Unfortunately for the hacker schools
passing out parade
381
00:21:50,822 --> 00:21:54,588
a new generation of black hats
across the world understands
382
00:21:54,726 --> 00:21:57,354
the thrill only too well.
383
00:22:00,832 --> 00:22:04,666
The white hats have to be ready for
an attack from anywhere.
384
00:22:04,803 --> 00:22:07,772
At the Global Threat Center,
all attention is suddenly drawn
385
00:22:07,906 --> 00:22:11,672
to internet intelligence expert
Carter Schoenberg.
386
00:22:12,444 --> 00:22:14,639
He's spotted something strange.
387
00:22:15,280 --> 00:22:18,181
A major electronic pipeline carrying
the internet's traffiic
388
00:22:18,316 --> 00:22:21,774
is being slowed down
by a suspected hacker attack.
389
00:22:21,920 --> 00:22:25,185
It looks like it's following
the time zones across the Pacific
390
00:22:25,323 --> 00:22:27,223
and heading for America.
391
00:22:27,359 --> 00:22:30,590
Indonesia is pretty much
getting slammed.
392
00:22:30,729 --> 00:22:33,197
It appears to be starting
in the Pacific Rim and making its way
393
00:22:33,331 --> 00:22:35,458
towards North America.
394
00:22:35,600 --> 00:22:39,366
South America still seems to be okay,
but it seems like it's making
395
00:22:39,504 --> 00:22:41,233
its way towards North America.
396
00:22:41,373 --> 00:22:43,671
It's a possible attack
on the infrastructure of
397
00:22:43,808 --> 00:22:45,639
the internet itself.
398
00:22:45,777 --> 00:22:48,575
It appears that for whatever
the reason, whatever this cause is
399
00:22:48,713 --> 00:22:50,271
it's moving with the sun,
400
00:22:50,415 --> 00:22:53,441
starting with the Pacific Rim
making its way towards the U.S.
401
00:22:53,585 --> 00:22:56,383
You're witnessing trench warfare
on the internet.
402
00:22:57,188 --> 00:23:00,157
If the attack hits America
as the working day gets underway
403
00:23:00,292 --> 00:23:02,886
it could affect millions
of people.
404
00:23:03,828 --> 00:23:05,989
If it hits
the North American continent
405
00:23:06,131 --> 00:23:07,758
like it's been hitting everybody else
406
00:23:07,899 --> 00:23:11,858
and then anybody that has their,
an attachment to the pipeline,
407
00:23:12,003 --> 00:23:17,873
any pipeline would probably see
some significant degradation.
408
00:23:18,610 --> 00:23:22,910
All traffiic relying on the suspect
internet pipeline could fail.
409
00:23:23,782 --> 00:23:25,079
Carter makes an urgent check call to
410
00:23:25,216 --> 00:23:27,776
their sister station
in Southeast Asia.
411
00:23:28,987 --> 00:23:30,011
As he does,
412
00:23:30,155 --> 00:23:33,556
both stations simultaneously
see the pipeline recover
413
00:23:33,692 --> 00:23:37,594
and the incident is over
as quickly as it appeared.
414
00:23:37,729 --> 00:23:39,356
It was just one of these anomalies,
415
00:23:39,497 --> 00:23:42,762
but it's an anomaly that
when it happens, we were on top of it
416
00:23:42,901 --> 00:23:43,993
right when it occurred,
417
00:23:44,135 --> 00:23:46,160
and we were able to bring it
to everybody's attention
418
00:23:46,905 --> 00:23:50,705
It's unclear what role, if any may
have been played by hackers.
419
00:23:50,842 --> 00:23:54,437
But for several minutes it looked like
exactly the kind of attack
420
00:23:54,579 --> 00:23:56,570
that the white hats fear most,
421
00:23:56,715 --> 00:23:59,206
an electronic Pearl Harbor,
422
00:23:59,351 --> 00:24:03,344
the real threat of
a deliberately launched info war.
423
00:24:03,488 --> 00:24:05,251
An info war is very real,
424
00:24:05,390 --> 00:24:09,793
and the possibility of info war
being used in coordination
425
00:24:09,928 --> 00:24:11,395
with an attack,
426
00:24:11,529 --> 00:24:16,626
an electronic Pearl Harbor
is absolutely a possibility
427
00:24:16,768 --> 00:24:21,637
and is an event that we effectively
think we're waiting to happen.
428
00:24:23,141 --> 00:24:24,608
For much of the 1990s,
429
00:24:24,743 --> 00:24:27,439
the computers of the United States
military were defended
430
00:24:27,579 --> 00:24:31,310
against such an attack by a team
led by Bob Ayers.
431
00:24:32,283 --> 00:24:34,217
I was director of the U.S. DOD
432
00:24:34,352 --> 00:24:36,820
Defensive Information
Warfare Program.
433
00:24:36,955 --> 00:24:42,086
So if you think of the security
program that's keeping individuals out
434
00:24:42,227 --> 00:24:44,491
think of the Defensive
Information Warfare Program
435
00:24:44,629 --> 00:24:48,190
as designed to keep nation states
out of DOD systems.
436
00:24:49,000 --> 00:24:52,959
Hackers are already working for
over 100 foreign governments.
437
00:24:53,104 --> 00:24:57,837
127 nation states have
an active offensive information
438
00:24:57,976 --> 00:24:59,773
warfare program underway
439
00:25:00,745 --> 00:25:02,178
In the mid 1990s,
440
00:25:02,313 --> 00:25:05,407
one of the United States' most
secret military projects,
441
00:25:05,550 --> 00:25:09,247
the Stealth Bomber,
became the target of hackers.
442
00:25:09,387 --> 00:25:12,879
Leaks of its specifications
were highly sensitive.
443
00:25:13,024 --> 00:25:15,652
Extremely sensitive.
It's sensitive to this very day.
444
00:25:15,794 --> 00:25:20,288
At the time the, the existence of
the aircraft was, was known,
445
00:25:20,432 --> 00:25:23,868
however any of the characteristics
or indeed even the, the image
446
00:25:24,002 --> 00:25:25,765
of the aircraft itself was not known,
447
00:25:25,904 --> 00:25:28,771
so it was an item of
high curiosity.
448
00:25:28,907 --> 00:25:32,104
The secrets of the Stealth technology
were held on computers
449
00:25:32,243 --> 00:25:35,178
at the Rivers Air Force Base
in Rome, New York,
450
00:25:35,313 --> 00:25:38,805
home to the Air Force Research
and Development Laboratories.
451
00:25:39,751 --> 00:25:43,653
A system administrator
at Rivers Air Force Base in New York
452
00:25:43,788 --> 00:25:45,653
noticed the attacks taking place.
453
00:25:45,790 --> 00:25:48,486
He noticed it
three days after they began.
454
00:25:48,626 --> 00:25:51,857
And as soon as he noticed it
he reported it to,
455
00:25:51,996 --> 00:25:53,293
to my organization,
456
00:25:53,431 --> 00:25:56,889
and the, the reaction process
then began.
457
00:25:57,035 --> 00:25:59,026
They knew the secrets of
the Stealth project
458
00:25:59,170 --> 00:26:00,330
were being hacked into
459
00:26:00,472 --> 00:26:02,440
but they didn't know
who was doing it.
460
00:26:02,574 --> 00:26:05,270
There was a great deal of concern,
evidenced by these attacks
461
00:26:05,410 --> 00:26:08,436
because the U.S. Didn't know
where they were coming from.
462
00:26:09,647 --> 00:26:12,081
It's a classic diffiiculty
for the white hats.
463
00:26:12,217 --> 00:26:14,845
Hackers make perfect spies
because they can hide
464
00:26:14,986 --> 00:26:17,250
in the shadows of cyberspace.
465
00:26:18,156 --> 00:26:23,492
The problem is hackers typically
come through multiple launch points.
466
00:26:23,628 --> 00:26:26,688
And so they, they kind of
play hopscotch on the internet.
467
00:26:26,831 --> 00:26:32,861
You see typically the last IP address
that they came from
468
00:26:33,004 --> 00:26:34,403
into your network,
469
00:26:34,539 --> 00:26:38,771
and that'll resolve back to
some computer that they have hacked
470
00:26:38,910 --> 00:26:40,343
into and taken over
471
00:26:40,478 --> 00:26:43,879
for the purposes of masking
who they really are.
472
00:26:44,015 --> 00:26:49,612
It's very diffiicult to go back through
the chain of hops to find
473
00:26:49,754 --> 00:26:50,948
the actual source.
474
00:26:51,089 --> 00:26:54,684
So the technical attempts to,
in the terms of the day,
475
00:26:54,826 --> 00:26:57,989
to hack back to
find the source failed
476
00:26:58,129 --> 00:27:00,427
Who could have wanted
such information
477
00:27:00,565 --> 00:27:04,365
The immediate suspects
were hostile foreign powers.
478
00:27:05,103 --> 00:27:05,933
But in fact,
479
00:27:06,070 --> 00:27:09,506
the hackers who got under
the radar of the most sophisticated
480
00:27:09,641 --> 00:27:11,131
spying technology ever built
481
00:27:11,276 --> 00:27:15,042
were teenagers, sitting at home
in London, England.
482
00:27:15,180 --> 00:27:16,943
The young men
that were launching these attacks,
483
00:27:17,081 --> 00:27:20,050
they didn't go from London,
which was the environment they were in,
484
00:27:20,185 --> 00:27:21,379
directly to New York.
485
00:27:21,519 --> 00:27:26,252
They'd go from London
through South Africa through Mexico
486
00:27:26,391 --> 00:27:28,484
and then to the United States.
487
00:27:29,861 --> 00:27:33,353
Technology in the global hacker
community has expanded rapidly
488
00:27:33,498 --> 00:27:36,797
in the years since the Stealth
Bomber attacks.
489
00:27:37,602 --> 00:27:41,003
At that time the Department of Defense
calculated the total number
490
00:27:41,139 --> 00:27:43,471
of intrusions into its systems.
491
00:27:44,275 --> 00:27:46,539
The figure was extraordinary.
492
00:27:47,412 --> 00:27:50,609
Over a quarter of
a million times in 1995
493
00:27:50,748 --> 00:27:55,651
someone other than a DOD employee
was in charge of a DOD system.
494
00:27:55,787 --> 00:27:59,223
Now if that isn't the foundation
for an electronic Pearl Harbor,
495
00:27:59,357 --> 00:28:00,915
I don't know what is.
496
00:28:03,294 --> 00:28:06,627
Seven years later, new technology
brings a constant set
497
00:28:06,764 --> 00:28:08,425
of new vulnerabilities.
498
00:28:08,566 --> 00:28:10,693
Chris O'Ferrell is
a white hat who protects
499
00:28:10,835 --> 00:28:12,268
the U.S. Government systems
500
00:28:12,403 --> 00:28:16,772
and sees himself as a foot soldier
in a never-ending daily battle.
501
00:28:17,942 --> 00:28:20,911
Definitely there's a battle between
the black hats and the white hats.
502
00:28:21,045 --> 00:28:22,410
It's an,
Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
38000:21:47, 486--> 00:21:50, 683Sayangnya untuk sekolah-sekolah hackerparade pingsan38100:21:50, 822--> 00:21:54, 588generasi baru topi hitamdi seluruh dunia memahami38200:21:54, 726--> 00:21:57, 354sensasi hanya terlalu baik.38300:22:00, 832--> 00:22:04, 666Topi putih harus siap untukserangan dari mana saja.38400:22:04, 803--> 00:22:07, 772Di pusat ancaman Global,Semua perhatian tiba-tiba diambil38500:22:07, 906--> 00:22:11, 672untuk internet intelijen ahliCarter Schoenberg.38600:22:12, 444--> 00:22:14, 639Dia telah melihat sesuatu yang aneh.38700:22:15, 280--> 00:22:18, 181Membawa utama pipa elektronikinternet traffiic38800:22:18, 316--> 00:22:21, 774menjadi melambatoleh serangan hacker dicurigai.38900:22:21, 920--> 00:22:25, 185Sepertinya mengikutizona waktu di Pasifik39000:22:25, 323--> 00:22:27, 223dan menuju Amerika.39100:22:27, 359--> 00:22:30, 590Indonesia cukup banyakmendapatkan membanting.39200:22:30, 729--> 00:22:33, 197Tampaknya akan mulaiPacific Rim dan membuat jalan39300:22:33, 331--> 00:22:35, 458menuju Amerika Utara.39400:22:35, 600--> 00:22:39, 366Amerika Selatan masih tampak baik-baik saja,tapi tampaknya seperti itu membuat39500:22:39, 504--> 00:22:41, 233jalan menuju Amerika Utara.39600:22:41, 373--> 00:22:43, 671Ini adalah kemungkinan seranganpada infrastruktur39700:22:43, 808--> 00:22:45, 639internet itu sendiri.39800:22:45, 777--> 00:22:48, 575Tampaknya bahwa untuk apa punAlasannya, apa pun yang menyebabkan ini adalah39900:22:48, 713--> 00:22:50, 271bergerak dengan matahari,40000:22:50, 415--> 00:22:53, 441dimulai dengan Pacific Rimmembuat jalan menuju AS40100:22:53, 585--> 00:22:56, 383Anda menyaksikan pertempuran paritdi internet.40200:22:57, 188--> 00:23:00, 157Jika serangan hits Amerikasebagai hari kerja akan berlangsung40300:23:00, 292--> 00:23:02, 886itu bisa mempengaruhi jutaanorang-orang.40400:23:03, 828--> 00:23:05, 989Jika hitsbenua Amerika Utara40500:23:06, 131--> 00:23:07, 758seperti itu telah memukul orang lain40600:23:07, 899--> 00:23:11, 858dan kemudian siapa saja yang telah mereka,lampiran ke pipa,40700:23:12, 003--> 00:23:17, 873Pipa apapun mungkin akan melihatbeberapa kerusakan yang signifikan.40800:23:18, 610--> 00:23:22, 910Semua traffiic mengandalkan tersangkaPipa internet bisa gagal.40900:23:23, 782--> 00:23:25, 079Carter membuat pemeriksaan mendesak panggilan untuk41000:23:25, 216--> 00:23:27, 776kakak mereka Stasiundi Asia Tenggara.41100:23:28, 987--> 00:23:30, 011Seperti yang dilakukannya,41200:23:30, 155--> 00:23:33, 556kedua stasiun secara bersamaanmelihat pipa memulihkan41300:23:33, 692--> 00:23:37, 594dan kejadian berakhirsecepat itu muncul.41400:23:37, 729--> 00:23:39, 356Itu hanya salah satu anomali ini,41500:23:39, 497--> 00:23:42, 762Tapi itu sebuah anomali yangKetika itu terjadi, kami berada di atasnya41600:23:42, 901--> 00:23:43, 993tepat ketika itu terjadi,41700:23:44, 135--> 00:23:46, 160dan kami mampu untuk membawaperhatian semua orang41800:23:46, 905--> 00:23:50, 705Tidak jelas apakah peranan, jika ada mungkintelah dimainkan oleh hacker.41900:23:50, 842--> 00:23:54, 437Tapi selama beberapa menit itu tampak sepertipersis seperti serangan42000:23:54, 579--> 00:23:56, 570bahwa topi putih takut sebagian,42100:23:56, 715--> 00:23:59, 206elektronik Pearl Harbor,42200:23:59, 351--> 00:24:03, 344ancamaninfo sengaja diluncurkan perang.42300:24:03, 488--> 00:24:05, 251Info perang sangat nyata,42400:24:05, 390--> 00:24:09, 793dan kemungkinan info perangdigunakan dalam koordinasi42500:24:09, 928--> 00:24:11, 395dengan serangan,42600:24:11, 529--> 00:24:16, 626elektronik Pearl Harboradalah benar-benar kemungkinan42700:24:16, 768--> 00:24:21, 637dan adalah suatu peristiwa yang kita secara efektifberpikir kita sedang menunggu untuk terjadi.42800:24:23, 141--> 00:24:24, 608Untuk sebagian besar tahun 1990-an,42900:24:24, 743--> 00:24:27, 439komputer dari Amerika Serikatmiliter yang dipertahankan43000:24:27, 579--> 00:24:31, 310terhadap serangan seperti oleh timdipimpin oleh Bob Ayers.43100:24:32, 283--> 00:24:34, 217Saya adalah Direktur Departemen Pertahanan AS43200:24:34, 352--> 00:24:36, 820Informasi pertahananProgram peperangan.43300:24:36, 955 00:24:42 086-->Jadi, jika Anda berpikir keamananprogram yang menjaga individu keluar43400:24:42 227--> 00:24:44, 491memikirkan defensifPerang Program informasi43500:24:44, 629--> 00:24:48, 190seperti yang dirancang untuk menjaga negaradari sistem DOD.43600:24:49, 000--> 00:24:52, 959Hacker sudah bekerja untuklebih dari 100 pemerintah asing.43700:24:53, 104--> 00:24:57, 837127 negara telahinformasi ofensif aktif43800:24:57, 976--> 00:24:59, 773peperangan program berlangsung43900:25:00, 745--> 00:25:02, 178Pada pertengahan 1990,44000:25:02, 313--> 00:25:05, 407salah satu paling Amerika Serikatproyek-proyek militer rahasia,44100:25:05, 550--> 00:25:09, 247Stealth Bomber,menjadi target hacker.44200:25:09, 387--> 00:25:12, 879Kebocoran spesifikasinyayang sangat sensitif.44300:25:13, 024--> 00:25:15, 652Sangat sensitif.Sangat sensitif terhadap hari ini.44400:25:15, 794--> 00:25:20, 288Pada saat, keberadaanpesawat ini, dikenal,44500:25:20, 432--> 00:25:23, 868Namun apapun karakteristikatau memang bahkan, gambar44600:25:24, 002--> 00:25:25, 765pesawat itu sendiri tidak diketahui,44700:25:25, 904--> 00:25:28, 771Jadi itu itemrasa ingin tahu yang tinggi.44800:25:28, 907--> 00:25:32, 104Rahasia Teknologi Stealthdiadakan pada komputer44900:25:32, 243--> 00:25:35, 178di Sungai Air Force Basedi Roma, New York,45000:25:35, 313--> 00:25:38, 805rumah untuk penelitian Angkatan Udaradan laboratorium pengembangan.45100:25:39, 751--> 00:25:43, 653Administrator sistemdi Sungai Air Force Base di New York45200:25:43, 788--> 00:25:45, 653melihat serangan yang berlangsung.45300:25:45, 790--> 00:25:48, 486Ia melihat itutiga hari setelah mereka mulai.45400:25:48, 626--> 00:25:51, 857Dan segera setelah ia melihat ituDia melaporkan hal itu45500:25:51, 996--> 00:25:53, 293organisasi saya,45600:25:53, 431--> 00:25:56, 889dan proses reaksi,kemudian mulai.45700:25:57, 035--> 00:25:59, 026Mereka tahu rahasiaProyek Stealth45800:25:59, 170--> 00:26:00, 330menjadi hack ke45900:26:00, 472--> 00:26:02, 440tetapi mereka tidak mengertiyang melakukannya.46000:26:02, 574--> 00:26:05, 270Ada banyak perhatian,dibuktikan dengan serangan ini46100:26:05, 410--> 00:26:08, 436karena AS tidak tahumana mereka datang dari.46200:26:09, 647--> 00:26:12, 081Ini adalah diffiiculty klasikuntuk topi putih.46300:26:12, 217--> 00:26:14, 845Hacker membuat mata-mata yang sempurnakarena mereka dapat menyembunyikan66V00:26:14, 986--> 00:26:17, 250dalam bayang-bayang dunia maya.46500:26:18, 156--> 00:26:23, 492Masalahnya adalah hacker biasanyadatang melalui beberapa poin peluncuran.46600:26:23, 628--> 00:26:26, 688Dan begitu mereka, mereka baik dariBermain hopscotch di internet.46700:26:26, 831--> 00:26:32, 861Anda biasanya melihat alamat IP terakhirbahwa mereka datang dari46800:26:33, 004--> 00:26:34, 403ke jaringan Anda,46900:26:34, 539--> 00:26:38, 771dan yang akan menyelesaikan kembali kebeberapa komputer yang mereka telah hacked47000:26:38, 910--> 00:26:40, 343ke dan diambil alih47100:26:40, 478--> 00:26:43, 879untuk keperluan maskingsiapa mereka sebenarnya.47200:26:44, 015--> 00:26:49, 612Hal ini sangat diffiicult kembali kerantai melompat untuk menemukan47300:26:49, 754--> 00:26:50, 948sumber yang sebenarnya.47400:26:51, 089--> 00:26:54, 684Jadi teknis upaya untuk,dalam istilah hari,47500:26:54, 826--> 00:26:57, 989hack kembali kemenemukan sumber yang gagal47600:26:58, 129--> 00:27:00, 427Yang bisa inginkaninformasi tersebut47700:27:00, 565--> 00:27:04, 365Para tersangka segeraadalah kekuatan asing yang bermusuhan.47800:27:05, 103--> 00:27:05, 933Tetapi kenyataannya,47900:27:06, 070--> 00:27:09, 506Para hacker yang masuk ke bawahradar yang paling canggih48000:27:09, 641--> 00:27:11, 131teknologi yang pernah dibangun memata-matai48100:27:11, 276--> 00:27:15, 042remaja, duduk di rumahdi London, Inggris.48200:27:15, 180--> 00:27:16, 943Laki-laki mudayang meluncurkan serangan ini,48300:27:17, 081--> 00:27:20, 050mereka tidak pergi dari London,iaitu lingkungan mereka berada di,48400:27:20, 185--> 00:27:21, 379langsung ke New York.48500:27:21, 519--> 00:27:26, 252Mereka akan pergi dari Londonmelalui Afrika Selatan melalui Meksiko48600:27:26, 391--> 00:27:28, 484dan kemudian ke Amerika Serikat.48700:27:29, 861--> 00:27:33, 353Teknologi global hackermasyarakat telah berkembang pesat48800:27:33, 498--> 00:27:36, 797dalam tahun sejak StealthSerangan bom.48900:27:37, 602 00:27:41, 003-->Pada waktu Departemen Pertahananmenghitung jumlah49000:27:41, 139--> 00:27:43, 471dari campur tangan ke dalam sistem.49100:27:44, 275--> 00:27:46, 539Angka itu luar biasa.49200:27:47, 412--> 00:27:50, 609Lebih dari seperempatsatu juta kali pada tahun 199549300:27:50, 748--> 00:27:55, 651orang lain selain karyawan DODbertugas sistem DOD.49400:27:55, 787--> 00:27:59, 223Sekarang jika itu tidak Yayasanuntuk elektronik Pearl Harbor,49500:27:59, 357--> 00:28:00, 915Aku tidak tahu apa itu.49600:28:03, 294--> 00:28:06, 627Tujuh tahun kemudian, baru teknologimembawa konstan49700:28:06, 764--> 00:28:08, 425kerentanan baru.49800:28:08, 566--> 00:28:10, 693Chris O'Ferrell adalahtopi putih yang melindungi49900:28:10, 835--> 00:28:12, 268sistem pemerintah AS50000:28:12, 403--> 00:28:16, 772dan melihat dirinya sebagai seorang prajurit kakidalam harian tidak pernah berakhir pertempuran.50100:28:17, 942--> 00:28:20, 911Pasti ada pertempuran antarahitam topi dan topi putih.50200:28:21, 045--> 00:28:22, 410Ini adalah,
Sedang diterjemahkan, harap tunggu..
