502
00:28:21,045 --> 00:28:22,410
It's an,
it's an ever-ongoing battle.
503
00:28:22,547 --> 00:28:23,844
It's like digging a hole in the sand.
504
00:28:23,982 --> 00:28:26,143
The more and more you work,
the more and more it fills up.
505
00:28:26,284 --> 00:28:28,616
Vulnerabilities are found everyday.
506
00:28:29,888 --> 00:28:31,685
Chris is on the side of the angels,
507
00:28:31,823 --> 00:28:36,692
but today he's setting off
on what hackers call, a war drive.
508
00:28:38,596 --> 00:28:41,497
He's heading for the heart of
the federal government to expose
509
00:28:41,633 --> 00:28:43,396
a new way in for hackers,
510
00:28:43,534 --> 00:28:47,129
created by the growing use
of wireless networks.
511
00:28:47,272 --> 00:28:48,466
We use the same techniques,
512
00:28:48,606 --> 00:28:50,597
methodologies and
all that hackers use
513
00:28:50,742 --> 00:28:53,711
in order to basically secure networks
for the U.S. Government,
514
00:28:53,845 --> 00:28:57,474
financial institutions and
other types of agencies.
515
00:28:59,284 --> 00:29:03,015
As well as countless corporations,
a host of government departments
516
00:29:03,154 --> 00:29:04,587
use wireless networks,
517
00:29:04,722 --> 00:29:08,954
vulnerable to hackers on the outside
equipped with a simple rig.
518
00:29:09,794 --> 00:29:12,695
All that you need to put together
a war-driving rig is
519
00:29:12,830 --> 00:29:13,819
what they call it.
520
00:29:13,965 --> 00:29:16,729
I have a GPS receiver.
521
00:29:16,868 --> 00:29:19,393
I have my antenna and
my wireless card,
522
00:29:19,537 --> 00:29:20,970
which I've pieced together here.
523
00:29:21,105 --> 00:29:23,266
You can tell it's been used
quite a bit.
524
00:29:32,817 --> 00:29:37,379
What Chris calls a war drive is
an electronic fishing expedition
525
00:29:37,522 --> 00:29:40,514
looking for vulnerable
wireless networks.
526
00:29:41,526 --> 00:29:43,687
Every time you hear a beep
on the computer you know
527
00:29:43,828 --> 00:29:45,659
it's another wireless network.
528
00:29:46,764 --> 00:29:48,061
There you go.
529
00:29:48,700 --> 00:29:51,464
They just found a couple.
Up on Capitol Hill
530
00:29:51,602 --> 00:29:52,591
you'll just start going crazy.
531
00:29:52,737 --> 00:29:54,705
It'll sound
like a pinball machine here.
532
00:29:56,441 --> 00:29:57,635
There's one.
533
00:29:59,110 --> 00:30:00,236
Got another one.
534
00:30:00,912 --> 00:30:02,436
Every building around here
is a federal building.
535
00:30:02,580 --> 00:30:04,343
All right, right in front of
the federal building
536
00:30:04,482 --> 00:30:05,847
we just got another network.
537
00:30:05,984 --> 00:30:07,474
By glancing at the screen,
538
00:30:07,618 --> 00:30:09,176
Chris can instantly assess
539
00:30:09,320 --> 00:30:12,915
how long it would take him to hack
into any of the wireless networks
540
00:30:13,057 --> 00:30:16,493
broadcasting their presence onto
the streets of the Capitol.
541
00:30:17,795 --> 00:30:21,322
Most of them are not even encrypted
to protect them.
542
00:30:22,233 --> 00:30:25,031
Right now I have 20 networks
on my computer.
543
00:30:25,169 --> 00:30:28,263
Out of the 20 only six
of them have encryption.
544
00:30:28,406 --> 00:30:31,170
It would take me probably
about 20 seconds out of 14
545
00:30:31,309 --> 00:30:33,709
of the 20 networks for me
to reconfigure my wireless card
546
00:30:33,845 --> 00:30:35,642
and enter these networks.
547
00:30:40,952 --> 00:30:43,079
They can spend millions of dollars
on security,
548
00:30:43,221 --> 00:30:45,587
have firewalls and have all kinds
of internal policies,
549
00:30:45,723 --> 00:30:49,215
it only takes one person with
one wireless access point to plug in
550
00:30:49,360 --> 00:30:52,090
and anybody sitting
where I am in my car right now
551
00:30:52,230 --> 00:30:55,427
can break into a government network
in about 20 seconds.
552
00:30:59,303 --> 00:31:01,430
Well what I've seen today
it really disturbs me.
553
00:31:01,572 --> 00:31:03,631
I don't understand
why there is wireless access points
554
00:31:03,775 --> 00:31:05,834
beaconing out these signals
out onto the roads,
555
00:31:05,977 --> 00:31:08,275
out into the parking lots of
these government buildings
556
00:31:08,413 --> 00:31:10,210
in Washington D.C.
557
00:31:10,681 --> 00:31:11,841
But hackers don't have to be
558
00:31:11,983 --> 00:31:15,248
on the doorstep to engage in
info war.
559
00:31:15,386 --> 00:31:17,820
The Chinese president Jiang Zemin
has urged the United States
560
00:31:17,955 --> 00:31:20,423
to stop all spy flights near China
561
00:31:20,558 --> 00:31:22,082
for the sake of healthy development
562
00:31:22,226 --> 00:31:24,319
of China and U.S. Relations.
563
00:31:26,264 --> 00:31:27,196
Following the collision of
564
00:31:27,331 --> 00:31:30,129
a Chinese fighter with a U.S.
Spy plane
565
00:31:30,268 --> 00:31:35,535
angry hackers from China launched
a hacker war against the U.S.
566
00:31:36,240 --> 00:31:37,867
Chinese hackers banded together.
567
00:31:38,009 --> 00:31:42,275
And, and for a period of a week
they showed solidarity and compromised
568
00:31:42,413 --> 00:31:45,246
over 10,000 U.S. Systems
in a period of a week.
569
00:31:45,383 --> 00:31:49,547
So we saw that basically
a loose group of, of hackers
570
00:31:49,687 --> 00:31:51,279
with one common political motivation
571
00:31:51,422 --> 00:31:53,356
can cause significant damage.
572
00:31:58,062 --> 00:31:59,859
The first wave of attacks was followed
573
00:31:59,997 --> 00:32:01,589
by the release of
a new type
574
00:32:01,732 --> 00:32:04,360
of virus, an attack worm.
575
00:32:04,502 --> 00:32:08,495
Apparently launched from China against
systems set to American English.
576
00:32:08,639 --> 00:32:11,267
It became known as Code Red.
577
00:32:13,244 --> 00:32:17,044
Viruses spread among computer systems
just the way colds spread among,
578
00:32:17,181 --> 00:32:19,979
you know grade school classrooms.
579
00:32:20,885 --> 00:32:23,319
Code Red imitated
the actions of a hacker
580
00:32:23,454 --> 00:32:26,912
and used compromised systems to
break into other systems.
581
00:32:27,058 --> 00:32:32,655
Significant portions of the internet
were either disabled or infected
582
00:32:32,797 --> 00:32:37,063
as a byproduct of the rapid
propagation of the Code Red worm.
583
00:32:37,201 --> 00:32:40,500
This propagation was
so dramatic and so fast,
584
00:32:40,638 --> 00:32:44,335
and the cascading effect of hundreds
of attacks coming from
585
00:32:44,475 --> 00:32:45,737
each infected computer
586
00:32:45,877 --> 00:32:48,710
simply overwhelmed the,
the internet.
587
00:32:49,480 --> 00:32:51,744
Code Red was set to stop and start
588
00:32:51,883 --> 00:32:55,785
when the internal computer clocks
hit certain dates and times.
589
00:32:55,920 --> 00:32:59,515
We noticed that, okay,
it stops propagating
590
00:32:59,657 --> 00:33:03,423
when the system clock in the computer
turns to the 20th of the month.
591
00:33:03,561 --> 00:33:06,359
It begins a new phase of activity,
592
00:33:06,497 --> 00:33:08,795
and that phase of activity
as we discovered
593
00:33:08,933 --> 00:33:12,198
was to launch a distributed denial of
service attack against
594
00:33:12,336 --> 00:33:13,928
the White House website.
595
00:33:19,877 --> 00:33:23,608
The attack was tracked back to
a Chinese university.
596
00:33:23,748 --> 00:33:27,616
In the last line of,
of the software code it says,
597
00:33:27,752 --> 00:33:29,777
"hacked by Chinese."
598
00:33:30,688 --> 00:33:33,623
The White House simply changed
the numbers in their web address,
599
00:33:33,758 --> 00:33:36,625
but Code Red had a lasting impact.
600
00:33:37,261 --> 00:33:40,662
Code Red was potentially
a test to see
601
00:33:40,798 --> 00:33:43,858
if automated info war would work.
602
00:33:44,001 --> 00:33:47,402
If other key components of
the internet infrastructure
603
00:33:47,538 --> 00:33:51,770
had been targeted by Code Red
instead ofjust a web server,
604
00:33:51,909 --> 00:33:54,002
we could have seen
massive amount of damage.
605
00:33:54,145 --> 00:33:57,842
It was the most serious episode
in the health of the internet
606
00:33:57,982 --> 00:34:00,075
in the history of the internet.
607
00:34:01,085 --> 00:34:05,749
While cyber terrorism is regarded as
an inevitable threat for the future,
608
00:34:05,890 --> 00:34:09,018
the reality today is that the bulk of
hackers who break into
609
00:34:09,160 --> 00:34:10,991
high profile sites
610
00:34:11,128 --> 00:34:13,756
have a less alarming motivation.
611
00:34:14,498 --> 00:34:17,899
The Department of Defense
in the United States of course is,
612
00:34:18,035 --> 00:34:20,435
is like the, the Mount Everest of,
of you know,
613
00:34:20,571 --> 00:34:22,630
the targets that you can go after.
614
00:34:22,773 --> 00:34:26,903
I planted my flag
in a Pentagon computer system.
615
00:34:27,044 --> 00:34:28,341
You know that's a wonderful thing.
616
00:34:28,479 --> 00:34:31,642
They really didn't want to hurt
the Pentagon computer system.
617
00:34:31,782 --> 00:34:33,249
They didn't want to
look at any information.
618
00:34:33,384 --> 00:34:36,251
They just wanted to get it in there
and get it planted,
619
00:34:36,387 --> 00:34:39,220
and then brag about it
amongst their peers.
620
00:34:39,357 --> 00:34:42,451
Such recognition seems to
have driven the teenager
621
00:34:42,593 --> 00:34:46,927
who was branded one of
the world's most notorious hackers.
622
00:34:49,267 --> 00:34:51,633
Online, he's known as Cold Fire.
623
00:34:51,769 --> 00:34:54,329
He keeps his real name secret.
624
00:34:54,472 --> 00:34:56,167
His face is not yet famous
625
00:34:56,307 --> 00:35:00,107
but his hacker exploits have made him
a cyberspace celebrity.
626
00:35:00,244 --> 00:35:02,405
Britain's most notorious hacker.
627
00:35:02,546 --> 00:35:10,009
An
Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
50200:28:21, 045--> 00:28:22, 410Ini adalah,ini adalah pertempuran yang pernah berkelanjutan.50300:28:22, 547--> 00:28:23, 844Hal ini seperti menggali lubang di pasir.50400:28:23, 982--> 00:28:26, 143Semakin banyak Anda bekerja,semakin banyak mengisi.50500:28:26, 284--> 00:28:28, 616Kerentanan ditemukan sehari-hari.50600:28:29, 888--> 00:28:31, 685Chris adalah di sisi malaikat,50700:28:31, 823--> 00:28:36, 692Tapi hari ia berangkatapa panggilan hacker, berkendara perang.50800:28:38, 596--> 00:28:41 497Ia menuju jantungpemerintah federal untuk mengekspos50900:28:41, 633--> 00:28:43, 396cara baru untuk hacker,51000:28:43, 534--> 00:28:47, 129dibuat oleh meningkatnya penggunaanjaringan nirkabel.51100:28:47, 272--> 00:28:48, 466Kami menggunakan teknik yang sama,51200:28:48, 606--> 00:28:50, 597metodologi danSemua bahwa hacker menggunakan51300:28:50, 742--> 00:28:53, 711untuk pada dasarnya mengamankan jaringanuntuk pemerintah AS,51400:28:53, 845--> 00:28:57, 474lembaga keuangan danjenis lain dari lembaga.51500:28:59, 284--> 00:29:03, 015Juga sebagai banyak perusahaan,sejumlah departemen pemerintah51600:29:03, 154--> 00:29:04, 587menggunakan jaringan nirkabel,51700:29:04, 722--> 00:29:08, 954rentan terhadap hacker di luardilengkapi dengan sebuah rig yang sederhana.51800:29:09, 794--> 00:29:12, 695Semua yang Anda butuhkan untuk mengumpulkanrig perang-mengemudi51900:29:12, 830--> 00:29:13, 819apa yang mereka menyebutnya.52000:29:13, 965--> 00:29:16, 729Saya memiliki sebuah Penerima GPS.52100:29:16, 868--> 00:29:19, 393Saya memiliki antena saya dankartu nirkabel saya,52200:29:19, 537--> 00:29:20, 970yang saya telah pieced bersama-sama di sini.52300:29:21, 105--> 00:29:23, 266Anda dapat memberitahu itu telah digunakancukup sedikit.52400:29:32, 817--> 00:29:37, 379Apa panggilan Chris drive perang adalahsebuah ekspedisi Memancing elektronik52500:29:37, 522--> 00:29:40, 514mencari rentanjaringan nirkabel.52600:29:41, 526--> 00:29:43, 687Setiap kali Anda mendengar bunyi bippada komputer yang Anda tahu52700:29:43, 828--> 00:29:45, 659ini adalah jaringan nirkabel lainnya.52800:29:46, 764--> 00:29:48, 061Di sana Anda pergi.52900:29:48, 700--> 00:29:51, 464Mereka hanya menemukan beberapa.Sampai di Capitol Hill53000:29:51, 602 00:29:52, 591-->Anda hanya akan mulai gila.53100:29:52, 737--> 00:29:54, 705Itu akan terdengarseperti mesin pinball di sini.53200:29:56, 441--> 00:29:57, 635Ada satu.53300:29:59, 110--> 00:30:00, 236Mendapat satu lagi.53400:30:00, 912--> 00:30:02, 436Setiap bangunan di sinimerupakan sebuah bangunan federal.53500:30:02, 580--> 00:30:04, 343Baiklah, kanan depanGedung federal53600:30:04, 482--> 00:30:05, 847Kami baru saja jaringan lain.53700:30:05, 984--> 00:30:07, 474Oleh melirik layar,53800:30:07, 618--> 00:30:09, 176Chris langsung dapat menilai53900:30:09, 320--> 00:30:12, 915berapa lama itu akan membawanya hackke salah satu jaringan nirkabel54000:30:13, 057--> 00:30:16, 493Penyiaran kehadiran mereka kejalan-jalan dari Capitol.54100:30:17, 795--> 00:30:21, 322Sebagian besar dari mereka bahkan tidak terenkripsiuntuk melindungi mereka.54200:30:22, 233--> 00:30:25, 031Sekarang saya punya 20 jaringandi komputer saya.54300:30:25, 169--> 00:30:28, 263Dari 20 hanya enammereka memiliki enkripsi.54400:30:28, 406--> 00:30:31, 170Itu akan membawa saya mungkinsekitar 20 detik dari 1454500:30:31, 309--> 00:30:33, 709Jaringan 20 bagi sayauntuk mengkonfigurasi ulang kartu nirkabel saya54600:30:33, 845--> 00:30:35, 642dan masukkan jaringan ini.54700:30:40, 952--> 00:30:43, 079Mereka dapat menghabiskan jutaan dolarkeamanan,54800:30:43, 221--> 00:30:45, 587memiliki firewall dan memiliki semua jeniskebijakan internal,54900:30:45, 723--> 00:30:49, 215hanya dibutuhkan satu orang dengansatu titik akses nirkabel untuk plug-in55000:30:49, 360--> 00:30:52, 090dan siapa saja yang dudukmana aku berada di mobil saya sekarang55100:30:52, 230--> 00:30:55, 427dapat masuk ke jaringan pemerintahdi sekitar 20 detik.55200:30:59, 303--> 00:31:01, 430Baik yang kulihat hari iniitu benar-benar mengganggu saya.55300:31:01, 572--> 00:31:03, 631Saya tidak mengertiMengapa ada titik akses nirkabel55400:31:03, 775--> 00:31:05, 834beaconing sinyal inikeluar menuju jalan,55500:31:05, 977--> 00:31:08, 275keluar ke banyak parkirGedung-gedung pemerintah ini55600:31:08, 413--> 00:31:10, 210di Washington D.C.55700:31:10, 681--> 00:31:11, 841Tapi hacker tidak harus55800:31:11, 983--> 00:31:15, 248di ambang pintu untuk terlibat dalamInfo perang.55900:31:15, 386--> 00:31:17, 820Presiden Cina Jiang Zemintelah mendesak Amerika Serikat56000:31:17, 955--> 00:31:20, 423untuk menghentikan semua mata-mata penerbangan di Cina56100:31:20, 558--> 00:31:22, 082demi perkembangan yang sehat56200:31:22, 226--> 00:31:24, 319Hubungan AS dan Cina.56300:31:26, 264--> 00:31:27, 196Mengikuti tumbukan56400:31:27, 331--> 00:31:30, 129seorang pejuang Cina dengan ASPesawat mata-mata56500:31:30, 268--> 00:31:35, 535marah meluncurkan hacker dari Cinahacker perang melawan Amerika Serikat56600:31:36, 240--> 00:31:37, 867Hacker Cina banded bersama.56700:31:38, 009--> 00:31:42, 275Dan, dan selama seminggumereka menunjukkan solidaritas dan dikompromikan56800:31:42, 413--> 00:31:45, 246lebih dari 10.000 US sistemdalam waktu seminggu.56900:31:45, 383--> 00:31:49, 547Jadi kita melihat bahwa pada dasarnyakelompok longgar, hacker57000:31:49, 687--> 00:31:51, 279dengan satu motivasi politik Umum57100:31:51, 422--> 00:31:53, 356dapat menyebabkan kerusakan yang signifikan.57200:31:58, 062--> 00:31:59, 859Gelombang pertama serangan diikuti57300:31:59, 997--> 00:32:01, 589dengan pelepasantipe baru57400:32:01, 732--> 00:32:04, 360virus, cacing serangan.57500:32:04, 502--> 00:32:08, 495Rupanya diluncurkan dari Cina melawanSistem diatur untuk bahasa Inggris Amerika.57600:32:08, 639--> 00:32:11, 267Dikenal sebagai kode merah.57700:32:13, 244--> 00:32:17, 044Virus menyebar di antara sistem komputerhanya cara pilek yang tersebar,57800:32:17, 181--> 00:32:19, 979Anda tahu ruang kelas sekolah dasar.57900:32:20, 885--> 00:32:23, 319Kode merah ditirutindakan seorang hacker58000:32:23, 454--> 00:32:26, 912dan sistem dikompromikan digunakan untukmasuk ke sistem lain.58100:32:27, 058--> 00:32:32, 655Sebagian besar internetbaik cacat atau terinfeksi58200:32:32, 797--> 00:32:37, 063sebagai produk sampingan yang cepatpenyebaran cacing kode merah.58300:32:37, 201--> 00:32:40, 500Propagasi ini adalahbegitu dramatis dan begitu cepat,58400:32:40, 638--> 00:32:44, 335dan efek cascading ratusanserangan-serangan yang berasal dari58500:32:44, 475--> 00:32:45, 737setiap komputer yang terinfeksi58600:32:45, 877--> 00:32:48, 710hanya kewalahan,internet.58700:32:49, 480--> 00:32:51, 744Kode merah ditetapkan untuk berhenti dan mulai58800:32:51, 883--> 00:32:55, 785Kapan jam internal komputermemukul tanggal dan waktu tertentu.58900:32:55, 920--> 00:32:59, 515Kami menyadari bahwa, oke,berhenti menyebarkan59000:32:59, 657--> 00:33:03, 423Ketika sistem jam di komputerternyata 20 bulan.59100:33:03, 561--> 00:33:06, 359Hotel ini dimulai babak baru kegiatan,59200:33:06, 497--> 00:33:08, 795dan fase kegiatanKetika kami menemukan59300:33:08, 933--> 00:33:12, 198untuk memulai didistribusikan penolakanService serangan terhadap59400:33:12, 336--> 00:33:13, 928situs Gedung Putih.59500:33:19, 877--> 00:33:23, 608Serangan dilacak kembali keUniversitas Cina.59600:33:23, 748--> 00:33:27, 616Dalam baris terakhirdari kode software itu mengatakan,59700:33:27, 752--> 00:33:29, 777"hacked oleh Cina."59800:33:30, 688--> 00:33:33, 623Gedung Putih hanya berubahangka-angka dalam alamat web mereka,59900:33:33, 758--> 00:33:36, 625tapi kode merah memiliki dampak yang langgeng.60000:33:37, 261--> 00:33:40, 662Kode merah adalah berpotensisebuah tes untuk melihat60100:33:40, 798--> 00:33:43, 858Jika otomatis info perang akan bekerja.60200:33:44, 001--> 00:33:47, 402Jika lainnya kunci komponeninfrastruktur internet60300:33:47, 538--> 00:33:51, 770telah ditargetkan oleh kode merahSebaliknya ofjust web server,60400:33:51, 909--> 00:33:54, 002kita bisa melihatjumlah kerusakan yang besar.60500:33:54, 145--> 00:33:57, 842Itu adalah episode paling seriusdalam kesehatan internet60600:33:57, 982--> 00:34:00, 075dalam sejarah internet.60700:34:01, 085--> 00:34:05, 749Sementara cyber terorisme dianggap sebagaiancaman yang tak terelakkan bagi masa depan,60800:34:05, 890--> 00:34:09, 018kenyataannya saat ini adalah bahwa sebagian besarhacker yang masuk ke60900:34:09, 160 00:34:10, 991-->situs profil tinggi61000:34:11, 128 00:34:13, 756-->memiliki motivasi kurang mengkhawatirkan.61100:34:14, 498--> 00:34:17, 899Departemen Pertahanandi Amerika Serikat tentu ini61200:34:18, 035--> 00:34:20, 435seperti, Gunung EverestAnda tahu,61300:34:20, 571--> 00:34:22, 630target yang dapat Anda pergi setelah.61400:34:22, 773--> 00:34:26, 903Aku menanam benderadalam sebuah sistem komputer Pentagon.61500:34:27, 044--> 00:34:28, 341Anda tahu bahwa adalah hal yang indah.61600:34:28, 479--> 00:34:31, 642Mereka benar-benar tidak ingin menyakitisistem komputer Pentagon.61700:34:31, 782--> 00:34:33, 249Mereka tidak maumelihat informasi.61800:34:33, 384--> 00:34:36, 251Mereka hanya ingin mendapatkannya di sanadan mendapatkannya ditanam,61900:34:36, 387--> 00:34:39, 220dan kemudian membual tentang hal ituantara rekan-rekan mereka.62000:34:39, 357--> 00:34:42, 451Pengakuan tersebut tampaknyatelah didorong remaja62100:34:42, 593--> 00:34:46, 927yang ini dicap salahhacker paling terkenal di dunia.62200:34:49, 267--> 00:34:51, 633Online, ia dikenal sebagai api dingin.62300:34:51, 769--> 00:34:54, 329Ia menyimpan rahasianya nama sebenarnya.62400:34:54, 472--> 00:34:56, 167Wajahnya masih belum terkenal62500:34:56, 307--> 00:35:00, 107tetapi eksploitasi hacker telah membuatnyaselebriti dunia maya.62600:35:00, 244--> 00:35:02, 405Britain's paling terkenal hacker.62700:35:02, 546--> 00:35:10, 009An
Sedang diterjemahkan, harap tunggu..
