ミッコ・ヒッポネン 「サイバー攻撃の3つのタイプ」 | TEDのすゝめ ( TED 英語 スーパープレゼンテーション 洋楽 映画 スポーツ )

TEDのすゝめ ( TED 英語 スーパープレゼンテーション 洋楽 映画 スポーツ )

英語の勉強をしているみなさんに、おすすめのTEDトークを紹介します。
TEDのホームページには interactive transcript という便利な機能がついているので、直接、TEDのホームページで見ることをお勧めします。
あちこちへ脱線しますがご容赦ください~(^o^)v

ミッコ・ヒッポネン 「3種類のオンライン攻撃」
TEDのホームページ(日本語字幕付き)へはをクリックしてください。
直接ここで観ることもできます。
Mikko Hypponen: Three types of online attack

小さいことは気にすんなッ、主題と主張をつかもう!
「サイバー攻撃」という言葉をニュースでよく耳にするようになりましたが、決して他人事ではなく、我々の身近にあるものとして注意が必要だと感じました。

【話題】 個人の自由を脅かすもの
【時間】 9分23秒
【要約】
1.国家権力と市民
 1980年代の共産主義国家では、タイプライターは登録制だった
 現代の自由主義国でさえ、カラープリンターで印刷すると、
 黄色い追跡コードがついてくる
(メーカー、機種、製造番号、印刷日時がわかるらしい。建前は、「紙幣の偽造を防止するため」ということです)

2.私たちを攻撃する3つのグループ
 ①犯罪者(お金目当て)
 ②抗議活動、愉快犯
 ③国家(政府がその国民に対して攻撃)

3.DigiNotarの話
 オランダの認証局(証明書を発行するサービス)
 オンライン上で暗号化されたサービスを利用するためには証明書が必要
 DigiNotarがハックされ、偽の証明書が発行された
 全体主義国家で反体制派が偽の証明書を発行された可能性がある
 このプログラムを売ったのは西欧(ドイツ)の会社

4.国家による国民の傍聴
 エジプト政府は国民の通信を傍聴していた痕跡がある
 ドイツ政府も国民の通信を傍聴していたと思われる

5.一度手放した権利は戻ってこない
 プライバシーの問題ではなく、「個人の自由」の問題
 今の政府を信頼できても50年後の政府を信頼できるとは限らない

【語彙】
make a fuss :騒ぎ立てる
trojans :トロイの木馬、コンピュータに不正侵入し乗っ取るプログラム
keyloggers :キーロガー、キーボードの打ち込みを盗むプログラム
on the loose :逃亡して
anonymous :匿名の
hacktivist :政治的ハッカー、たぶんhackeractivistの造語でしょう
Certificate Authority :認証局
plausible :possible、もっともらしい、あり得る
certificate :証明書
SSL :Secure Sockets Layer、インターネット上のデータ送受信におけるセキュリティー規格のこと
totalitarian :全体主義の
dissidents :反体制派
rogue :不正な
rioters :暴徒
loot :略奪する
tap :盗聴する
implied :暗黙の
up for discussion :議論のなる
for good :for ever、永遠に

【transcripts】
In the 1980s in the communist Eastern Germany, if you owned a typewriter, you had to register it with the government. You had to register a sample sheet of text out of the typewriter. And this was done so the government could track where text was coming from. If they found a paper which had the wrong kind of thought, they could track down who created that thought. And we in the West couldn't understand how anybody could do this, how much this would restrict freedom of speech. We would never do that in our own countries.

But today in 2011, if you go and buy a color laser printer from any major laser printer manufacturer and print a page, that page will end up having slight yellow dots printed on every single page in a pattern which makes the page unique to you and to your printer. This is happening to us today. And nobody seems to be making a fuss about it. And this is an example of the ways that our own governments are using technology against us, the citizens. And this is one of the main three sources of online problems today.

If we take a look at what's really happening in the online world, we can group the attacks based on the attackers. We have three main groups. We have online criminals. Like here, we have Mr. Dimitry Golubov from the city of Kiev in Ukraine. And the motives of online criminals are very easy to understand. These guys make money. They use online attacks to make lots of money, and lots and lots of it. We actually have several cases of millionaires online, multimillionaires, who made money with their attacks. Here's Vladimir Tsastsin form Tartu in Estonia. This is Alfred Gonzalez. This is Stephen Watt. This is Bjorn Sundin. This is Matthew Anderson, Tariq Al-Daour and so on and so on.

These guys make their fortunes online, but they make it through the illegal means of using things like banking trojans to steal money from our bank accounts while we do online banking, or with keyloggers to collect our credit card information while we are doing online shopping from an infected computer. The U.S. Secret Service, two months ago, froze the Swiss bank account of Mr. Sam Jain right here, and that bank account had 14.9 million U.S. dollars on it when it was frozen. Mr. Jain himself is on the loose; nobody knows where he is. And I claim it's already today that it's more likely for any of us to become the victim of a crime online than here in the real world. And it's very obvious that this is only going to get worse. In the future, the majority of crime will be happening online.

The second major group of attackers that we are watching today are not motivated by money. They're motivated by something else -- motivated by protests, motivated by an opinion, motivated by the laughs. Groups like Anonymous have risen up over the last 12 months and have become a major player in the field of online attacks.

So those are the three main attackers: criminals who do it for the money, hacktivists like Anonymous doing it for the protest, but then the last group are nation states, governments doing the attacks. And then we look at cases like what happened in DigiNotar. This is a prime example of what happens when governments attack against their own citizens. DigiNotar is a Certificate Authority from The Netherlands -- or actually, it was. It was running into bankruptcy last fall because they were hacked into. Somebody broke in and they hacked it thoroughly. And I asked last week in a meeting with Dutch government representatives, I asked one of the leaders of the team whether he found plausible that people died because of the DigiNotar hack. And his answer was yes.

So how do people die as the result of a hack like this? Well DigiNotar is a C.A. They sell certificates. What do you do with certificates? Well you need a certificate if you have a website that has https, SSL encrypted services, services like Gmail. Now we all, or a big part of us, use Gmail or one of their competitors, but these services are especially popular in totalitarian states like Iran, where dissidents use foreign services like Gmail because they know they are more trustworthy than the local services and they are encrypted over SSL connections, so the local government can't snoop on their discussions. Except they can if they hack into a foreign C.A. and issue rogue certificates. And this is exactly what happened with the case of DigiNotar.

What about Arab Spring and things that have been happening, for example, in Egypt? Well in Egypt, the rioters looted the headquarters of the Egyptian secret police in April 2011, and when they were looting the building they found lots of papers. Among those papers, was this binder entitled "FINFISHER." And within that binder were notes from a company based in Germany which had sold the Egyptian government a set of tools for intercepting -- and in very large scale -- all the communication of the citizens of the country. They had sold this tool for 280,000 Euros to the Egyptian government. The company headquarters are right here.

So Western governments are providing totalitarian governments with tools to do this against their own citizens. But Western governments are doing it to themselves as well. For example, in Germany, just a couple of weeks ago the so-called State Trojan was found, which was a trojan used by German government officials to investigate their own citizens. If you are a suspect in a criminal case, well it's pretty obvious, your phone will be tapped. But today, it goes beyond that. They will tap your Internet connection. They will even use tools like State Trojan to infect your computer with a trojan, which enables them to watch all your communication, to listen to your online discussions, to collect your passwords.

Now when we think deeper about things like these, the obvious response from people should be that, "Okay, that sounds bad, but that doesn't really affect me because I'm a legal citizen. Why should I worry? Because I have nothing to hide." And this is an argument, which doesn't make sense. Privacy is implied. Privacy is not up for discussion. This is not a question between privacy against security. It's a question of freedom against control. And while we might trust our governments right now, right here in 2011, any right we give away will be given away for good. And do we trust, do we blindly trust, any future government, a government we might have 50 years from now? And these are the questions that we have to worry about for the next 50 years.