38000:21:47,486 --> 00:21:50,683Unfortunately for the hacker schoolspa terjemahan - 38000:21:47,486 --> 00:21:50,683Unfortunately for the hacker schoolspa Bahasa Indonesia Bagaimana mengatakan

38000:21:47,486 --> 00:21:50,683Unf

380
00:21:47,486 --> 00:21:50,683
Unfortunately for the hacker schools
passing out parade

381
00:21:50,822 --> 00:21:54,588
a new generation of black hats
across the world understands

382
00:21:54,726 --> 00:21:57,354
the thrill only too well.

383
00:22:00,832 --> 00:22:04,666
The white hats have to be ready for
an attack from anywhere.

384
00:22:04,803 --> 00:22:07,772
At the Global Threat Center,
all attention is suddenly drawn

385
00:22:07,906 --> 00:22:11,672
to internet intelligence expert
Carter Schoenberg.

386
00:22:12,444 --> 00:22:14,639
He's spotted something strange.

387
00:22:15,280 --> 00:22:18,181
A major electronic pipeline carrying
the internet's traffiic

388
00:22:18,316 --> 00:22:21,774
is being slowed down
by a suspected hacker attack.

389
00:22:21,920 --> 00:22:25,185
It looks like it's following
the time zones across the Pacific

390
00:22:25,323 --> 00:22:27,223
and heading for America.

391
00:22:27,359 --> 00:22:30,590
Indonesia is pretty much
getting slammed.

392
00:22:30,729 --> 00:22:33,197
It appears to be starting
in the Pacific Rim and making its way

393
00:22:33,331 --> 00:22:35,458
towards North America.

394
00:22:35,600 --> 00:22:39,366
South America still seems to be okay,
but it seems like it's making

395
00:22:39,504 --> 00:22:41,233
its way towards North America.

396
00:22:41,373 --> 00:22:43,671
It's a possible attack
on the infrastructure of

397
00:22:43,808 --> 00:22:45,639
the internet itself.

398
00:22:45,777 --> 00:22:48,575
It appears that for whatever
the reason, whatever this cause is

399
00:22:48,713 --> 00:22:50,271
it's moving with the sun,

400
00:22:50,415 --> 00:22:53,441
starting with the Pacific Rim
making its way towards the U.S.

401
00:22:53,585 --> 00:22:56,383
You're witnessing trench warfare
on the internet.

402
00:22:57,188 --> 00:23:00,157
If the attack hits America
as the working day gets underway

403
00:23:00,292 --> 00:23:02,886
it could affect millions
of people.

404
00:23:03,828 --> 00:23:05,989
If it hits
the North American continent

405
00:23:06,131 --> 00:23:07,758
like it's been hitting everybody else

406
00:23:07,899 --> 00:23:11,858
and then anybody that has their,
an attachment to the pipeline,

407
00:23:12,003 --> 00:23:17,873
any pipeline would probably see
some significant degradation.

408
00:23:18,610 --> 00:23:22,910
All traffiic relying on the suspect
internet pipeline could fail.

409
00:23:23,782 --> 00:23:25,079
Carter makes an urgent check call to

410
00:23:25,216 --> 00:23:27,776
their sister station
in Southeast Asia.

411
00:23:28,987 --> 00:23:30,011
As he does,

412
00:23:30,155 --> 00:23:33,556
both stations simultaneously
see the pipeline recover

413
00:23:33,692 --> 00:23:37,594
and the incident is over
as quickly as it appeared.

414
00:23:37,729 --> 00:23:39,356
It was just one of these anomalies,

415
00:23:39,497 --> 00:23:42,762
but it's an anomaly that
when it happens, we were on top of it

416
00:23:42,901 --> 00:23:43,993
right when it occurred,

417
00:23:44,135 --> 00:23:46,160
and we were able to bring it
to everybody's attention

418
00:23:46,905 --> 00:23:50,705
It's unclear what role, if any may
have been played by hackers.

419
00:23:50,842 --> 00:23:54,437
But for several minutes it looked like
exactly the kind of attack

420
00:23:54,579 --> 00:23:56,570
that the white hats fear most,

421
00:23:56,715 --> 00:23:59,206
an electronic Pearl Harbor,

422
00:23:59,351 --> 00:24:03,344
the real threat of
a deliberately launched info war.

423
00:24:03,488 --> 00:24:05,251
An info war is very real,

424
00:24:05,390 --> 00:24:09,793
and the possibility of info war
being used in coordination

425
00:24:09,928 --> 00:24:11,395
with an attack,

426
00:24:11,529 --> 00:24:16,626
an electronic Pearl Harbor
is absolutely a possibility

427
00:24:16,768 --> 00:24:21,637
and is an event that we effectively
think we're waiting to happen.

428
00:24:23,141 --> 00:24:24,608
For much of the 1990s,

429
00:24:24,743 --> 00:24:27,439
the computers of the United States
military were defended

430
00:24:27,579 --> 00:24:31,310
against such an attack by a team
led by Bob Ayers.

431
00:24:32,283 --> 00:24:34,217
I was director of the U.S. DOD

432
00:24:34,352 --> 00:24:36,820
Defensive Information
Warfare Program.

433
00:24:36,955 --> 00:24:42,086
So if you think of the security
program that's keeping individuals out

434
00:24:42,227 --> 00:24:44,491
think of the Defensive
Information Warfare Program

435
00:24:44,629 --> 00:24:48,190
as designed to keep nation states
out of DOD systems.

436
00:24:49,000 --> 00:24:52,959
Hackers are already working for
over 100 foreign governments.

437
00:24:53,104 --> 00:24:57,837
127 nation states have
an active offensive information

438
00:24:57,976 --> 00:24:59,773
warfare program underway

439
00:25:00,745 --> 00:25:02,178
In the mid 1990s,

440
00:25:02,313 --> 00:25:05,407
one of the United States' most
secret military projects,

441
00:25:05,550 --> 00:25:09,247
the Stealth Bomber,
became the target of hackers.

442
00:25:09,387 --> 00:25:12,879
Leaks of its specifications
were highly sensitive.

443
00:25:13,024 --> 00:25:15,652
Extremely sensitive.
It's sensitive to this very day.

444
00:25:15,794 --> 00:25:20,288
At the time the, the existence of
the aircraft was, was known,

445
00:25:20,432 --> 00:25:23,868
however any of the characteristics
or indeed even the, the image

446
00:25:24,002 --> 00:25:25,765
of the aircraft itself was not known,

447
00:25:25,904 --> 00:25:28,771
so it was an item of
high curiosity.

448
00:25:28,907 --> 00:25:32,104
The secrets of the Stealth technology
were held on computers

449
00:25:32,243 --> 00:25:35,178
at the Rivers Air Force Base
in Rome, New York,

450
00:25:35,313 --> 00:25:38,805
home to the Air Force Research
and Development Laboratories.

451
00:25:39,751 --> 00:25:43,653
A system administrator
at Rivers Air Force Base in New York

452
00:25:43,788 --> 00:25:45,653
noticed the attacks taking place.

453
00:25:45,790 --> 00:25:48,486
He noticed it
three days after they began.

454
00:25:48,626 --> 00:25:51,857
And as soon as he noticed it
he reported it to,

455
00:25:51,996 --> 00:25:53,293
to my organization,

456
00:25:53,431 --> 00:25:56,889
and the, the reaction process
then began.

457
00:25:57,035 --> 00:25:59,026
They knew the secrets of
the Stealth project

458
00:25:59,170 --> 00:26:00,330
were being hacked into

459
00:26:00,472 --> 00:26:02,440
but they didn't know
who was doing it.

460
00:26:02,574 --> 00:26:05,270
There was a great deal of concern,
evidenced by these attacks

461
00:26:05,410 --> 00:26:08,436
because the U.S. Didn't know
where they were coming from.

462
00:26:09,647 --> 00:26:12,081
It's a classic diffiiculty
for the white hats.

463
00:26:12,217 --> 00:26:14,845
Hackers make perfect spies
because they can hide

464
00:26:14,986 --> 00:26:17,250
in the shadows of cyberspace.

465
00:26:18,156 --> 00:26:23,492
The problem is hackers typically
come through multiple launch points.

466
00:26:23,628 --> 00:26:26,688
And so they, they kind of
play hopscotch on the internet.

467
00:26:26,831 --> 00:26:32,861
You see typically the last IP address
that they came from

468
00:26:33,004 --> 00:26:34,403
into your network,

469
00:26:34,539 --> 00:26:38,771
and that'll resolve back to
some computer that they have hacked

470
00:26:38,910 --> 00:26:40,343
into and taken over

471
00:26:40,478 --> 00:26:43,879
for the purposes of masking
who they really are.

472
00:26:44,015 --> 00:26:49,612
It's very diffiicult to go back through
the chain of hops to find

473
00:26:49,754 --> 00:26:50,948
the actual source.

474
00:26:51,089 --> 00:26:54,684
So the technical attempts to,
in the terms of the day,

475
00:26:54,826 --> 00:26:57,989
to hack back to
find the source failed

476
00:26:58,129 --> 00:27:00,427
Who could have wanted
such information

477
00:27:00,565 --> 00:27:04,365
The immediate suspects
were hostile foreign powers.

478
00:27:05,103 --> 00:27:05,933
But in fact,

479
00:27:06,070 --> 00:27:09,506
the hackers who got under
the radar of the most sophisticated

480
00:27:09,641 --> 00:27:11,131
spying technology ever built

481
00:27:11,276 --> 00:27:15,042
were teenagers, sitting at home
in London, England.

482
00:27:15,180 --> 00:27:16,943
The young men
that were launching these attacks,

483
00:27:17,081 --> 00:27:20,050
they didn't go from London,
which was the environment they were in,

484
00:27:20,185 --> 00:27:21,379
directly to New York.

485
00:27:21,519 --> 00:27:26,252
They'd go from London
through South Africa through Mexico

486
00:27:26,391 --> 00:27:28,484
and then to the United States.

487
00:27:29,861 --> 00:27:33,353
Technology in the global hacker
community has expanded rapidly

488
00:27:33,498 --> 00:27:36,797
in the years since the Stealth
Bomber attacks.

489
00:27:37,602 --> 00:27:41,003
At that time the Department of Defense
calculated the total number

490
00:27:41,139 --> 00:27:43,471
of intrusions into its systems.

491
00:27:44,275 --> 00:27:46,539
The figure was extraordinary.

492
00:27:47,412 --> 00:27:50,609
Over a quarter of
a million times in 1995

493
00:27:50,748 --> 00:27:55,651
someone other than a DOD employee
was in charge of a DOD system.

494
00:27:55,787 --> 00:27:59,223
Now if that isn't the foundation
for an electronic Pearl Harbor,

495
00:27:59,357 --> 00:28:00,915
I don't know what is.

496
00:28:03,294 --> 00:28:06,627
Seven years later, new technology
brings a constant set

497
00:28:06,764 --> 00:28:08,425
of new vulnerabilities.

498
00:28:08,566 --> 00:28:10,693
Chris O'Ferrell is
a white hat who protects

499
00:28:10,835 --> 00:28:12,268
the U.S. Government systems

500
00:28:12,403 --> 00:28:16,772
and sees himself as a foot soldier
in a never-ending daily battle.

501
00:28:17,942 --> 00:28:20,911
Definitely there's a battle between
the black hats and the white hats.

502
00:28:21,045 --> 00:28:22,410
It's an,
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
38000:21:47, 486--> 00:21:50, 683Sayangnya untuk sekolah-sekolah hackerparade pingsan38100:21:50, 822--> 00:21:54, 588generasi baru topi hitamdi seluruh dunia memahami38200:21:54, 726--> 00:21:57, 354sensasi hanya terlalu baik.38300:22:00, 832--> 00:22:04, 666Topi putih harus siap untukserangan dari mana saja.38400:22:04, 803--> 00:22:07, 772Di pusat ancaman Global,Semua perhatian tiba-tiba diambil38500:22:07, 906--> 00:22:11, 672untuk internet intelijen ahliCarter Schoenberg.38600:22:12, 444--> 00:22:14, 639Dia telah melihat sesuatu yang aneh.38700:22:15, 280--> 00:22:18, 181Membawa utama pipa elektronikinternet traffiic38800:22:18, 316--> 00:22:21, 774menjadi melambatoleh serangan hacker dicurigai.38900:22:21, 920--> 00:22:25, 185Sepertinya mengikutizona waktu di Pasifik39000:22:25, 323--> 00:22:27, 223dan menuju Amerika.39100:22:27, 359--> 00:22:30, 590Indonesia cukup banyakmendapatkan membanting.39200:22:30, 729--> 00:22:33, 197Tampaknya akan mulaiPacific Rim dan membuat jalan39300:22:33, 331--> 00:22:35, 458menuju Amerika Utara.39400:22:35, 600--> 00:22:39, 366Amerika Selatan masih tampak baik-baik saja,tapi tampaknya seperti itu membuat39500:22:39, 504--> 00:22:41, 233jalan menuju Amerika Utara.39600:22:41, 373--> 00:22:43, 671Ini adalah kemungkinan seranganpada infrastruktur39700:22:43, 808--> 00:22:45, 639internet itu sendiri.39800:22:45, 777--> 00:22:48, 575Tampaknya bahwa untuk apa punAlasannya, apa pun yang menyebabkan ini adalah39900:22:48, 713--> 00:22:50, 271bergerak dengan matahari,40000:22:50, 415--> 00:22:53, 441dimulai dengan Pacific Rimmembuat jalan menuju AS40100:22:53, 585--> 00:22:56, 383Anda menyaksikan pertempuran paritdi internet.40200:22:57, 188--> 00:23:00, 157Jika serangan hits Amerikasebagai hari kerja akan berlangsung40300:23:00, 292--> 00:23:02, 886itu bisa mempengaruhi jutaanorang-orang.40400:23:03, 828--> 00:23:05, 989Jika hitsbenua Amerika Utara40500:23:06, 131--> 00:23:07, 758seperti itu telah memukul orang lain40600:23:07, 899--> 00:23:11, 858dan kemudian siapa saja yang telah mereka,lampiran ke pipa,40700:23:12, 003--> 00:23:17, 873Pipa apapun mungkin akan melihatbeberapa kerusakan yang signifikan.40800:23:18, 610--> 00:23:22, 910Semua traffiic mengandalkan tersangkaPipa internet bisa gagal.40900:23:23, 782--> 00:23:25, 079Carter membuat pemeriksaan mendesak panggilan untuk41000:23:25, 216--> 00:23:27, 776kakak mereka Stasiundi Asia Tenggara.41100:23:28, 987--> 00:23:30, 011Seperti yang dilakukannya,41200:23:30, 155--> 00:23:33, 556kedua stasiun secara bersamaanmelihat pipa memulihkan41300:23:33, 692--> 00:23:37, 594dan kejadian berakhirsecepat itu muncul.41400:23:37, 729--> 00:23:39, 356Itu hanya salah satu anomali ini,41500:23:39, 497--> 00:23:42, 762Tapi itu sebuah anomali yangKetika itu terjadi, kami berada di atasnya41600:23:42, 901--> 00:23:43, 993tepat ketika itu terjadi,41700:23:44, 135--> 00:23:46, 160dan kami mampu untuk membawaperhatian semua orang41800:23:46, 905--> 00:23:50, 705Tidak jelas apakah peranan, jika ada mungkintelah dimainkan oleh hacker.41900:23:50, 842--> 00:23:54, 437Tapi selama beberapa menit itu tampak sepertipersis seperti serangan42000:23:54, 579--> 00:23:56, 570bahwa topi putih takut sebagian,42100:23:56, 715--> 00:23:59, 206elektronik Pearl Harbor,42200:23:59, 351--> 00:24:03, 344ancamaninfo sengaja diluncurkan perang.42300:24:03, 488--> 00:24:05, 251Info perang sangat nyata,42400:24:05, 390--> 00:24:09, 793dan kemungkinan info perangdigunakan dalam koordinasi42500:24:09, 928--> 00:24:11, 395dengan serangan,42600:24:11, 529--> 00:24:16, 626elektronik Pearl Harboradalah benar-benar kemungkinan42700:24:16, 768--> 00:24:21, 637dan adalah suatu peristiwa yang kita secara efektifberpikir kita sedang menunggu untuk terjadi.42800:24:23, 141--> 00:24:24, 608Untuk sebagian besar tahun 1990-an,42900:24:24, 743--> 00:24:27, 439komputer dari Amerika Serikatmiliter yang dipertahankan43000:24:27, 579--> 00:24:31, 310terhadap serangan seperti oleh timdipimpin oleh Bob Ayers.43100:24:32, 283--> 00:24:34, 217Saya adalah Direktur Departemen Pertahanan AS43200:24:34, 352--> 00:24:36, 820Informasi pertahananProgram peperangan.43300:24:36, 955 00:24:42 086-->Jadi, jika Anda berpikir keamananprogram yang menjaga individu keluar43400:24:42 227--> 00:24:44, 491memikirkan defensifPerang Program informasi43500:24:44, 629--> 00:24:48, 190seperti yang dirancang untuk menjaga negaradari sistem DOD.43600:24:49, 000--> 00:24:52, 959Hacker sudah bekerja untuklebih dari 100 pemerintah asing.43700:24:53, 104--> 00:24:57, 837127 negara telahinformasi ofensif aktif43800:24:57, 976--> 00:24:59, 773peperangan program berlangsung43900:25:00, 745--> 00:25:02, 178Pada pertengahan 1990,44000:25:02, 313--> 00:25:05, 407salah satu paling Amerika Serikatproyek-proyek militer rahasia,44100:25:05, 550--> 00:25:09, 247Stealth Bomber,menjadi target hacker.44200:25:09, 387--> 00:25:12, 879Kebocoran spesifikasinyayang sangat sensitif.44300:25:13, 024--> 00:25:15, 652Sangat sensitif.Sangat sensitif terhadap hari ini.44400:25:15, 794--> 00:25:20, 288Pada saat, keberadaanpesawat ini, dikenal,44500:25:20, 432--> 00:25:23, 868Namun apapun karakteristikatau memang bahkan, gambar44600:25:24, 002--> 00:25:25, 765pesawat itu sendiri tidak diketahui,44700:25:25, 904--> 00:25:28, 771Jadi itu itemrasa ingin tahu yang tinggi.44800:25:28, 907--> 00:25:32, 104Rahasia Teknologi Stealthdiadakan pada komputer44900:25:32, 243--> 00:25:35, 178di Sungai Air Force Basedi Roma, New York,45000:25:35, 313--> 00:25:38, 805rumah untuk penelitian Angkatan Udaradan laboratorium pengembangan.45100:25:39, 751--> 00:25:43, 653Administrator sistemdi Sungai Air Force Base di New York45200:25:43, 788--> 00:25:45, 653melihat serangan yang berlangsung.45300:25:45, 790--> 00:25:48, 486Ia melihat itutiga hari setelah mereka mulai.45400:25:48, 626--> 00:25:51, 857Dan segera setelah ia melihat ituDia melaporkan hal itu45500:25:51, 996--> 00:25:53, 293organisasi saya,45600:25:53, 431--> 00:25:56, 889dan proses reaksi,kemudian mulai.45700:25:57, 035--> 00:25:59, 026Mereka tahu rahasiaProyek Stealth45800:25:59, 170--> 00:26:00, 330menjadi hack ke45900:26:00, 472--> 00:26:02, 440tetapi mereka tidak mengertiyang melakukannya.46000:26:02, 574--> 00:26:05, 270Ada banyak perhatian,dibuktikan dengan serangan ini46100:26:05, 410--> 00:26:08, 436karena AS tidak tahumana mereka datang dari.46200:26:09, 647--> 00:26:12, 081Ini adalah diffiiculty klasikuntuk topi putih.46300:26:12, 217--> 00:26:14, 845Hacker membuat mata-mata yang sempurnakarena mereka dapat menyembunyikan66V00:26:14, 986--> 00:26:17, 250dalam bayang-bayang dunia maya.46500:26:18, 156--> 00:26:23, 492Masalahnya adalah hacker biasanyadatang melalui beberapa poin peluncuran.46600:26:23, 628--> 00:26:26, 688Dan begitu mereka, mereka baik dariBermain hopscotch di internet.46700:26:26, 831--> 00:26:32, 861Anda biasanya melihat alamat IP terakhirbahwa mereka datang dari46800:26:33, 004--> 00:26:34, 403ke jaringan Anda,46900:26:34, 539--> 00:26:38, 771dan yang akan menyelesaikan kembali kebeberapa komputer yang mereka telah hacked47000:26:38, 910--> 00:26:40, 343ke dan diambil alih47100:26:40, 478--> 00:26:43, 879untuk keperluan maskingsiapa mereka sebenarnya.47200:26:44, 015--> 00:26:49, 612Hal ini sangat diffiicult kembali kerantai melompat untuk menemukan47300:26:49, 754--> 00:26:50, 948sumber yang sebenarnya.47400:26:51, 089--> 00:26:54, 684Jadi teknis upaya untuk,dalam istilah hari,47500:26:54, 826--> 00:26:57, 989hack kembali kemenemukan sumber yang gagal47600:26:58, 129--> 00:27:00, 427Yang bisa inginkaninformasi tersebut47700:27:00, 565--> 00:27:04, 365Para tersangka segeraadalah kekuatan asing yang bermusuhan.47800:27:05, 103--> 00:27:05, 933Tetapi kenyataannya,47900:27:06, 070--> 00:27:09, 506Para hacker yang masuk ke bawahradar yang paling canggih48000:27:09, 641--> 00:27:11, 131teknologi yang pernah dibangun memata-matai48100:27:11, 276--> 00:27:15, 042remaja, duduk di rumahdi London, Inggris.48200:27:15, 180--> 00:27:16, 943Laki-laki mudayang meluncurkan serangan ini,48300:27:17, 081--> 00:27:20, 050mereka tidak pergi dari London,iaitu lingkungan mereka berada di,48400:27:20, 185--> 00:27:21, 379langsung ke New York.48500:27:21, 519--> 00:27:26, 252Mereka akan pergi dari Londonmelalui Afrika Selatan melalui Meksiko48600:27:26, 391--> 00:27:28, 484dan kemudian ke Amerika Serikat.48700:27:29, 861--> 00:27:33, 353Teknologi global hackermasyarakat telah berkembang pesat48800:27:33, 498--> 00:27:36, 797dalam tahun sejak StealthSerangan bom.48900:27:37, 602 00:27:41, 003-->Pada waktu Departemen Pertahananmenghitung jumlah49000:27:41, 139--> 00:27:43, 471dari campur tangan ke dalam sistem.49100:27:44, 275--> 00:27:46, 539Angka itu luar biasa.49200:27:47, 412--> 00:27:50, 609Lebih dari seperempatsatu juta kali pada tahun 199549300:27:50, 748--> 00:27:55, 651orang lain selain karyawan DODbertugas sistem DOD.49400:27:55, 787--> 00:27:59, 223Sekarang jika itu tidak Yayasanuntuk elektronik Pearl Harbor,49500:27:59, 357--> 00:28:00, 915Aku tidak tahu apa itu.49600:28:03, 294--> 00:28:06, 627Tujuh tahun kemudian, baru teknologimembawa konstan49700:28:06, 764--> 00:28:08, 425kerentanan baru.49800:28:08, 566--> 00:28:10, 693Chris O'Ferrell adalahtopi putih yang melindungi49900:28:10, 835--> 00:28:12, 268sistem pemerintah AS50000:28:12, 403--> 00:28:16, 772dan melihat dirinya sebagai seorang prajurit kakidalam harian tidak pernah berakhir pertempuran.50100:28:17, 942--> 00:28:20, 911Pasti ada pertempuran antarahitam topi dan topi putih.50200:28:21, 045--> 00:28:22, 410Ini adalah,
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
380
00: 21: 47.486 -> 00: 21: 50.683
Sayangnya untuk sekolah hacker
pingsan parade 381 00: 21: 50.822 -> 00: 21: 54.588 generasi baru topi hitam di seluruh dunia memahami 382 00:21 : 54726 -> 00: 21: 57.354 sensasi hanya terlalu baik. 383 00: 22: 00.832 -> 00: 22: 04.666 The topi putih harus siap untuk serangan dari mana saja. 384 00: 22: 04.803 - -> 00: 22: 07.772 Pada Global Threat Center, semua perhatian tiba-tiba ditarik 385 00: 22: 07.906 -> 00: 22: 11.672 ahli intelijen internet Carter Schoenberg. 386 00: 22: 12.444 -> 00: 22: 14.639 Dia melihat sesuatu yang aneh. 387 00: 22: 15.280 -> 00: 22: 18.181 Sebuah pipa elektronik besar membawa traffiic internet itu 388 00: 22: 18.316 -> 00: 22: 21.774 sedang melambat oleh diduga serangan hacker. 389 00: 22: 21.920 -> 00: 22: 25.185 Sepertinya itu berikut zona waktu di Pasifik 390 00: 22: 25.323 -> 00: 22: 27.223. dan menuju Amerika 391 00 : 22: 27.359 -> 00: 22: 30.590 Indonesia cukup banyak mendapatkan membanting. 392 00: 22: 30.729 -> 00: 22: 33.197 Ini tampaknya mulai di Pacific Rim dan membuat jalan 393 00:22 : 33331 -> 00: 22: 35.458 menuju Amerika Utara. 394 00: 22: 35.600 -> 00: 22: 39.366 Amerika Selatan nampaknya masih baik-baik saja, tetapi tampaknya seperti itu membuat 395 00: 22: 39.504 - > 00: 22: 41.233 jalan menuju Amerika Utara. 396 00: 22: 41.373 -> 00: 22: 43.671 Ini adalah kemungkinan serangan pada infrastruktur 397 00: 22: 43.808 -> 00: 22: 45.639 internet . itu sendiri 398 00: 22: 45.777 -> 00: 22: 48.575 Tampaknya apa pun alasannya, apa pun penyebabnya ini 399 00: 22: 48.713 -> 00: 22: 50.271 itu bergerak dengan matahari, 400 00 : 22: 50.415 -> 00: 22: 53.441 mulai dengan Pacific Rim membuat jalan menuju US 401 00: 22: 53.585 -> 00: 22: 56.383 Kau menyaksikan perang parit. di internet 402 00: 22: 57.188 -> 00: 23: 00.157 Jika menyerang hits Amerika sebagai hari kerja akan berlangsung 403 00: 23: 00.292 -> 00: 23: 02.886 itu bisa mempengaruhi jutaan orang. 404 00: 23: 03.828 - -> 00: 23: 05.989 Jika hits benua Amerika Utara 405 00: 23: 06.131 -> 00: 23: 07.758 seperti itu telah memukul orang lain 406 00: 23: 07.899 -> 00: 23: 11.858 dan kemudian siapa saja yang memiliki mereka, lampiran untuk pipa, 407 00: 23: 12.003 -> 00: 23: 17.873 setiap pipa mungkin akan melihat beberapa penurunan yang signifikan. 408 00: 23: 18.610 -> 00: 23: 22.910 Semua traffiic mengandalkan tersangka pipa internet bisa gagal. 409 00: 23: 23.782 -> 00: 23: 25.079 Carter membuat pemeriksaan panggilan mendesak untuk 410 00: 23: 25.216 -> 00: 23: 27.776 stasiun kakak mereka di Asia Tenggara . 411 00: 23: 28.987 -> 00: 23: 30.011 Seperti yang dia lakukan, 412 00: 23: 30.155 -> 00: 23: 33.556 kedua stasiun secara bersamaan melihat pipa memulihkan 413 00: 23: 33.692 -> 00 : 23: 37.594 dan insiden itu berakhir secepat itu muncul. 414 00: 23: 37.729 -> 00: 23: 39.356 Itu hanya salah satu dari anomali ini, 415 00: 23: 39.497 -> 00:23: 42.762 tapi itu anomali yang ketika itu terjadi, kami berada di atasnya 416 00: 23: 42.901 -> 00: 23: 43.993 yang tepat ketika terjadi, 417 00: 23: 44.135 -> 00: 23: 46.160 dan kami mampu membawanya ke perhatian semua orang 418 00: 23: 46.905 -> 00: 23: 50.705 Tidak jelas apa peran, jika ada mungkin telah dimainkan oleh hacker. 419 00: 23: 50.842 -> 00:23: 54.437 Tapi selama beberapa menit itu tampak seperti persis jenis serangan 420 00: 23: 54.579 -> 00: 23: 56.570 bahwa topi putih paling ditakuti, 421 00: 23: 56.715 -> 00: 23: 59.206 sebuah elektronik Pearl Harbor, 422 00: 23: 59.351 -> 00: 24: 03.344 ancaman nyata dari info perang sengaja diluncurkan. 423 00: 24: 03.488 -> 00: 24: 05.251 Sebuah perang Info sangat nyata, 424 00 : 24: 05.390 -> 00: 24: 09.793 dan kemungkinan Info perang yang digunakan dalam koordinasi 425 00: 24: 09.928 -> 00: 24: 11.395 dengan serangan, 426 00: 24: 11.529 -> 00 : 24: 16.626 sebuah elektronik Pearl Harbor benar-benar kemungkinan 427 00: 24: 16.768 -> 00: 24: 21.637 dan merupakan acara yang kita secara efektif. pikir kita menunggu untuk terjadi 428 00: 24: 23.141 -> 00: 24: 24.608 Untuk sebagian besar tahun 1990-an, 429 00: 24: 24.743 -> 00: 24: 27.439 komputer dari Amerika Serikat militer membela 430 00: 24: 27.579 -> 00: 24: 31.310 terhadap seperti serangan oleh tim yang dipimpin oleh Bob Ayers. 431 00: 24: 32.283 -> 00: 24: 34.217 Saya direktur US DOD 432 00: 24: 34.352 -> 00: 24: 36.820 Defensive Informasi Program Warfare. 433 00: 24: 36.955 -> 00: 24: 42.086 Jadi jika Anda berpikir tentang keamanan Program yang menjaga individu keluar 434 00: 24: 42.227 -> 00: 24: 44.491 berpikir dari Defensive Program Information Warfare 435 00: 24: 44.629 -> 00: 24: 48.190 seperti yang dirancang untuk menjaga negara bangsa keluar dari sistem DOD. 436 00: 24: 49,000 -> 00: 24: 52.959 Hacker sudah bekerja untuk. lebih dari 100 pemerintah asing 437 00:24 : 53104 -> 00: 24: 57.837 127 negara bangsa memiliki suatu informasi ofensif aktif 438 00: 24: 57.976 -> 00: 24: 59.773 Program peperangan berlangsung 439 00: 25: 00.745 -> 00: 25: 02.178 Dalam pertengahan tahun 1990, 440 00: 25: 02.313 -> 00: 25: 05.407 salah satu yang paling Amerika Serikat 'proyek rahasia militer, 441 00: 25: 05.550 -> 00: 25: 09.247 Bomber Stealth, menjadi target hacker. 442 00: 25: 09.387 -> 00: 25: 12.879 Kebocoran dari spesifikasinya yang sangat sensitif. 443 00: 25: 13.024 -> 00: 25: 15.652. Sangat sensitif. Ini sensitif sampai hari ini 444 00: 25: 15.794 -> 00: 25: 20.288 Pada saat itu, keberadaan dari pesawat itu, dikenal, 445 00: 25: 20.432 -> 00: 25: 23.868 Namun salah satu karakteristik atau memang bahkan , gambar 446 00: 25: 24.002 -> 00: 25: 25.765 dari pesawat itu sendiri tidak diketahui, 447 00: 25: 25.904 -> 00: 25: 28.771 sehingga item. rasa ingin tahu yang tinggi 448 00: 25: 28.907 -> 00: 25: 32.104 Rahasia teknologi Stealth diadakan pada komputer 449 00: 25: 32.243 -> 00: 25: 35.178 di Sungai Air Force Base di Roma, New York, 450 00: 25: 35.313 -> 00: 25: 38.805 rumah bagi Angkatan Udara Penelitian dan Pengembangan Laboratorium. 451 00: 25: 39.751 -> 00: 25: 43.653 Sebuah administrator sistem di Sungai Air Force Base di New York 452 00 : 25: 43.788 -> 00: 25: 45.653 melihat serangan yang terjadi. 453 00: 25: 45.790 -> 00: 25: 48.486 Dia melihat itu tiga hari setelah mereka mulai. 454 00: 25: 48.626 -> 00: 25: 51.857 Dan segera setelah ia melihat hal itu lalu memberitahu, 455 00: 25: 51.996 -> 00: 25: 53.293 untuk organisasi saya, 456 00: 25: 53.431 -> 00: 25: 56.889 dan , proses reaksi kemudian mulai. 457 00: 25: 57.035 -> 00: 25: 59.026 Mereka tahu rahasia proyek Stealth 458 00: 25: 59.170 -> 00: 26: 00.330 sedang menyusup ke 459 00 : 26: 00.472 -> 00: 26: 02.440 tapi mereka tidak tahu. yang melakukannya 460 00: 26: 02.574 -> 00: 26: 05.270 Ada banyak perhatian, terbukti dengan serangan ini 461 00: 26: 05.410 -> 00: 26: 08.436 karena AS Tidak tahu di mana mereka berasal. 462 00: 26: 09.647 -> 00: 26: 12.081 Ini adalah diffiiculty klasik. untuk topi putih 463 00: 26: 12.217 -> 00: 26: 14.845 Hacker membuat mata-mata yang sempurna karena mereka dapat menyembunyikan 464 00: 26: 14.986 -> 00: 26: 17.250. dalam bayang-bayang dunia maya 465 00: 26: 18.156 -> 00: 26: 23.492 Masalahnya adalah hacker biasanya datang melalui beberapa poin peluncuran. 466 00: 26: 23.628 -> 00: 26: 26.688 Dan sehingga mereka, mereka jenis bermain hopscotch di internet. 467 00: 26: 26.831 - -> 00: 26: 32.861 Anda lihat biasanya alamat IP terakhir bahwa mereka datang dari 468 00: 26: 33.004 -> 00: 26: 34.403 ke dalam jaringan Anda, 469 00: 26: 34.539 -> 00: 26: 38.771 dan yang akan menyelesaikan kembali ke beberapa komputer yang mereka telah meng-hack 470 00: 26: 38.910 -> 00: 26: 40.343 ke dalam dan mengambil alih 471 00: 26: 40.478 -> 00: 26: 43.879 untuk tujuan masking siapa mereka sebenarnya. 472 00: 26: 44.015 -> 00: 26: 49.612 Ini sangat diffiicult untuk kembali melalui rantai hop untuk menemukan 473 00: 26: 49.754 -> 00: 26: 50.948 sumber yang sebenarnya. 474 00: 26: 51.089 -> 00: 26: 54.684 Jadi upaya teknis untuk, dalam hal hari, 475 00: 26: 54.826 -> 00: 26: 57.989 untuk hack kembali ke menemukan sumber gagal 476 00: 26: 58.129 -> 00: 27: 00.427 Siapa yang bisa ingin informasi tersebut 477 00: 27: 00.565 -> 00: 27: 04.365 Para tersangka langsung yang kekuatan asing yang bermusuhan. 478 00: 27: 05.103 -> 00: 27: 05.933 Namun pada kenyataannya, 479 00: 27: 06.070 -> 00: 27: 09.506 hacker yang masuk ke bawah radar yang paling canggih 480 00: 27: 09.641 -> 00: 27: 11.131 teknologi mata-mata pernah dibangun 481 00: 27: 11.276 -> 00: 27: 15.042 remaja, duduk di rumah di London, Inggris. 482 00: 27: 15.180 -> 00: 27: 16.943 Orang-orang muda yang melancarkan serangan tersebut, 483 00: 27: 17.081 -> 00: 27: 20.050 mereka tidak pergi dari London, yang merupakan lingkungan mereka berada di, 484 00: 27: 20.185 -> 00: 27: 21.379. langsung ke New York 485 00: 27: 21.519 -> 00: 27: 26.252 Mereka akan pergi dari London melalui Afrika Selatan melalui Meksiko 486 00: 27: 26.391 -> 00: 27: 28.484. dan kemudian ke Amerika Serikat 487 00:27: 29.861 -> 00: 27: 33.353 Teknologi dalam hacker global yang masyarakat telah berkembang pesat 488 00: 27: 33.498 -> 00: 27: 36.797 di tahun-tahun sejak Stealth. serangan Bomber 489 00: 27: 37.602 -> 00: 27: 41.003 Pada saat itu Departemen Pertahanan dihitung jumlah total 490 00: 27: 41.139 -> 00: 27: 43.471 dari intrusi ke dalam sistem nya. 491 00: 27: 44.275 -> 00: 27: 46.539 Angka itu luar biasa. 492 00: 27: 47.412 -> 00: 27: 50.609 Lebih dari seperempat dari satu juta kali pada tahun 1995 493 00: 27: 50.748 -> 00: 27: 55.651 orang lain selain karyawan DOD berada di biaya dari sistem DOD. 494 00: 27: 55.787 -> 00: 27: 59.223 Sekarang jika itu bukan dasar untuk Pearl Harbor elektronik, 495 00: 27: 59.357 -> 00: 28: 00.915 Saya don 't tahu apa. 496 00: 28: 03.294 -> 00: 28: 06.627 Tujuh tahun kemudian, teknologi baru membawa satu set konstan 497 00: 28: 06.764 -> 00: 28: 08.425. kerentanan baru 498 00 : 28: 08.566 -> 00: 28: 10.693 Chris O'Ferrell adalah topi putih yang melindungi 499 00: 28: 10.835 -> 00: 28: 12.268 sistem Pemerintah AS 500 00: 28: 12.403 -> 00 : 28: 16.772 dan melihat dirinya sebagai seorang prajurit kaki dalam pertempuran sehari-hari yang tidak pernah berakhir. 501 00: 28: 17.942 -> 00: 28: 20.911 Pasti ada pertempuran antara. topi hitam dan topi putih 502 00:28 : 21045 -> 00: 28: 22.410 Ini adalah,425 dari kerentanan baru. 498 00: 28: 08.566 -> 00: 28: 10.693 Chris O'Ferrell adalah topi putih yang melindungi 499 00: 28: 10.835 -> 00: 28: 12.268 sistem Pemerintah AS 500 00: 28: 12.403 -> 00: 28: 16.772 dan melihat dirinya sebagai seorang prajurit kaki dalam pertempuran sehari-hari yang tidak pernah berakhir. 501 00: 28: 17.942 -> 00: 28: 20.911 Pasti ada pertempuran antara topi hitam dan topi putih. 502 00: 28: 21.045 -> 00: 28: 22.410 Ini adalah,425 dari kerentanan baru. 498 00: 28: 08.566 -> 00: 28: 10.693 Chris O'Ferrell adalah topi putih yang melindungi 499 00: 28: 10.835 -> 00: 28: 12.268 sistem Pemerintah AS 500 00: 28: 12.403 -> 00: 28: 16.772 dan melihat dirinya sebagai seorang prajurit kaki dalam pertempuran sehari-hari yang tidak pernah berakhir. 501 00: 28: 17.942 -> 00: 28: 20.911 Pasti ada pertempuran antara topi hitam dan topi putih. 502 00: 28: 21.045 -> 00: 28: 22.410 Ini adalah,



























































































































































































































































































































































































































































































































































































Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: