ï¼ç¯ç½ªã®ï¼æªæ¥ã¯ä» - Future Crimes by Marc Goodman
Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
ä½è
:Â Marc Goodman
çºå£²æ¥: 2015/02/24
Â
ãã¨ãã°å®¶ã«ç©ºãå·£ã«å ¥ãããã®ã¨ãã¢ããã«/ã°ã¼ã°ã«/ã¢ãã¾ã³/ãã§ã¤ã¹ããã¯/ãã¤ãã¿ã¼ã®ã¢ã«ã¦ã³ããå ¨ã¦ä¹ã£åãããã®ã¯ã©ã¡ããå«ã ãããã
Â
ãµã³ãã©ã³ã·ã¹ã³å¨ä½ã®ãããã»ãã¼ãã³ã¯ãå¾è ã«è¿ãäºæ ãçµé¨ããã
Wiredèªã®ã¬ãã¼ã¿ã¼ãæ å½ãã¦ããå½¼ãããæ¥å¨ã¨éãã§ããã¨ãiPhoneã®é»æºãçªç¶æ¶ãããé»æ± åãã¨æã£ã¦å é»ã±ã¼ãã«ãã¤ãªãã¨ãæ°è¦ã®ã»ããã¢ãããæ±ããã¡ãã»ã¼ã¸ã表示ããããæ éã ããããã§ãããã¯ã¢ããããããã大ä¸å¤«ãiCloudã«ãã°ã¤ã³ãããã¨ããã¨ãå¤ãã¦ããªãã¯ãã®ãã¹ã¯ã¼ããæå¦ããããå°ã£ãå½¼ããã¼ã«ã«ããã¯ã¢ããããã®å¾©å ã試ã¿ããã¨MacBookãèµ·ã¡ä¸ããã¨ãã«ã¬ã³ãã¼ã¢ããªããGmailã®ãã¹ã¯ã¼ããéããã¨éç¥ãã¦ãããããã¦ããã«Macbookã¯åèµ·åãã¦ãè¨å®ãã¦ããªãã¯ãã®ãã°ã¤ã³ãã¹ã¯ã¼ãã®å ¥åãæ±ããç»é¢ã«åãæ¿ãã£ãã»ã»
çµå±ããã¼ãã³ãiCloud/iPhone/Macbookä¸ã«ä¿åãã¦ãã家æã¨ã®æãåºã®åçã¯å ¨ã¦æ¶å»ããã¦ãããGmailã«èç©ãããã¡ã¼ã«ã¨Googleã¢ã«ã¦ã³ãã«ç´ã¥ããã¡ã¤ã«ãåæ§ã ã£ããããã¦ãå½¼ã®ãã¤ãã¿ã¼ã¢ã«ã¦ã³ãããæ°åã®ãã©ãã¯ã¼ã«åãã¦ã人種差å¥ã»åæ§æè å·®å¥ã®æ´è¨ããã¤ã¼ãããããå ¨ã¦ãè¦ç¥ãã¬å代ã®ããã«ã¼*1ã«ããæä½ã ã£ãã
Â
çæã§è¶³ãããããªæ°ã®ä¼æ¥/ãµã¼ãã¹ã«ãããã«æã ãè²´éãªæ å ±ã®å¤§é¨åãé ãã¦ãããããã¼ãã³ã®ã¨ãã½ã¼ãã¯ããã示ãã¦ãããããããæ¬æ¸âFuture Crimes"ã®ä¸»é¡ã¯ããããããç¾å¨ã®ãã»ãã¥ãªãã£ä¸ã®è å¨ã«é¢ããè¦åã§ã¯ãªãããæªæ¥ã®ããµã¤ãã¼ç¯ç½ªã¯ãããªãããããªãããã¨ããã®ãæ¬æ¸ã®ä¸»æ¨ã§ããã
Â
èè ã®ãã¼ã¯ã»ã°ãããã³ã¯ãè¦å¯ãªã©è¡æ¿æ©é¢ã§ãã対çãªã©ãæ å½ãã¦ããæ å ±ã»ãã¥ãªãã£ã®å°é家ã§ãæ¬æ¸ãåã®èæ¸ã«ããããç®æ¬¡ã¯ä»¥ä¸ã®éãã
Contentsï¼ç®æ¬¡ï¼
Â
PART ONE: A GATHERING STORMï¼ç«ã¡è¾¼ããåµï¼
1. CONNECTED,DEPENDENT,AND VULNERABLEï¼ã¤ãªãããä¾åãèå¼±æ§ï¼
2. SYSTEM CRASHï¼ã·ã¹ãã ã¯ã©ãã·ã¥ï¼
3. MOOREâS OUTLAWSï¼ã ã¼ã¢ã®ãéãæ³åï¼
4. YOUâRE NOT THE CUSTOMER, YOUâRE THE PRODUCTï¼ããªãã¯é¡§å®¢ã§ã¯ãªã製åã§ãï¼
5. THE SURVEILLANCE ECONOMYï¼ç£è¦çµæ¸ï¼
6. BIG DATA, BIG RISKï¼ããã°ãã¼ã¿ãããã°ãªã¹ã¯ï¼
7. I.T. PHONES HOMEï¼I.T. ãã©ã³ã»ãã¼ã ï¼
8. IN SCREEN WE TRUSTï¼ã¹ã¯ãªã¼ã³ã®å¾¡éã®ãã¨ã«ï¼
9. MOâ SCREENS, MOâ PROBLEMSï¼ã¹ã¯ãªã¼ã³ãå¤ãã»ã©åé¡ãå¤ãï¼*2
Â
PART TWO: THE FUTURE OF CRIMEï¼ç¯ç½ªã®æªæ¥ï¼
10. CRIME, INC.ï¼ç¯ç½ªæ³äººï¼
11. INSIDE THE DIGITAL UNDERGROUNDï¼ãã¸ã¿ã«ã»ã¢ã³ãã¼ã°ã©ã¦ã³ãã®å é¨ï¼
12. WHEN ALL THINGS ARE HACKABLEï¼å ¨ã¦ããããã³ã°å¯è½ã«ãªãã¨ãï¼
13. HACKING YOUï¼ãããã³ã°ã»ã¦ã¼ï¼
14. RISE OF THE MACHINES: WHEN CYBER CRIME GOES 3-Dï¼æ©æ¢°ã®éçï¼ãµã¤ãã¼ç¯ç½ªã3-Dã«ãªãã¨ãï¼
15. NEXT-GENERATION SECURITY THREATSï¼æ¬¡ä¸ä»£ã®ã»ãã¥ãªãã£è å¨ï¼
Â
PART THREE: SURVIVING PROGRESSï¼çãæ®ãããã®åé²ï¼
16. SURVIVING PROGRESSï¼çãæ®ãããã®åé²ï¼
17. THE WAY FORWARDï¼é²ãã¹ãéï¼
The Dark Side of Creativity and Innovation
 IoTï¼ã¢ãã®ã¤ã³ã¿ã¼ãããï¼ã®æ¬æ ¼åã人工ç¥è½ã¨ããããæè¡ã®çºå±ã3-Dããªã³ã¿ã®æ®åãããããæè¡ãã¬ã³ãã¯å´åãçæ´»ã®ããæ¹ãå¤ããã¨èãããã¦ãããããã©ãå½ããåã®è©±ã ãæ°ããæè¡ã«ã¯æªç¨ããå¾ãã¨ãããã¼ã¯ãµã¤ãã常ã«ã¤ãã¾ã¨ããèè ã«ããã°ãçµç¹åãããç¯ç½ªéå£ã¯æ°ããæè¡ã®ã¢ã¼ãªã¼ã»ã¢ããã¿ã¼ã§ããã
Â
ä¹±æ´ã«è¨ã£ã¦ãã¾ãã¨æ¬æ¸ã¯ããããã®æ°èæè¡ã«ã¤ãã¦ãããããªâ¯â¯ã¯å«ã ãã¨å¤§åå©ã®å®çªãã¿ã®ããã«äºä¾ãç´¹ä»ãã¦ããæ¬ã ããããªIoTã¯å«ã ãã»ã³ãµã¼ããã«ã¦ã§ã¢ã«ææãã¦èª¤ä½åããããããªäººå·¥ç¥è½ã¯å«ã ãæ¨è«è½åã§äººéãåé§ãã¦äººéã«å±å®³ãå ããããããª3-Dããªã³ã¿æè¡ã¯å«ã ããã¼ã¿ã転éãã¦ããªã³ãããã ãã§éå¨ãä½ããããã«ãªã空港ãªã©ã§ã®æ¦å¨æµå ¥ã³ã³ããã¼ã«ãç¡å¹åããããªã©ãªã©ã大åå©ã¨éã£ã¦ããã¿ã§ã¯ãªãç 究ãæ¢ã«é²ãã§ããç¾å®ã ãã©ã
Â
ããã¦ããã¼ãã«ãã¼çã§400é 以ä¸ã®æ¬ã§ããæ±ããã¦ããäºä¾ã¯å¤å²ã«æ¸¡ãããç¾å¨ã®ç¯ç½ªã¨æªæ¥ã®ç¯ç½ªã¨ã®éãããããã主ãªè¦ç´ ãåæã«ã¾ã¨ããã¨ã以ä¸ã®3ç¹ã«ãªããããããªãã
Â
1. ãããã¯ã¼ã¯ã«æ¥ç¶ãããããã¤ã¹æ°ã®å¤§å¹ ãªå¢å
- ã·ã¹ã³ç¤¾ã®è©¦ç®ã«ããã°ãã¤ã³ã¿ã¼ãããã«æ¥ç¶ããã¦ããããã¤ã¹ã®æ°ã¯2013å¹´æç¹ã§130åç¨åº¦ã§ãããã2020å¹´ã¾ã§ã«500åå°ã¾ã§å¢å ããã¨äºæ³ããããèªåè»ãä½å® ã«å§ã¾ã£ã¦ãæ©ãè¡ç¯ãå»çæ©å¨ããããã家çãªã©ãªã©ãæ¬æ¸ã«ããã°ããããã"hackable"ã§ãªãä¿è¨¼ã¯ãªãã
2. ãããã³ã°ã®ã3-Dåã
- 1.ã¨ãé¢é£ããããããµã¤ãã¼ç¯ç½ªãã¨ããã®ããããä¸ã®äºæ¬¡å ã®ãã¼ã¿æä½ã ãã«éãããã®ã§ã¯ãªããªãããããã³ã°ã§åããããã®ã3-Dåããã
3. ã¹ã¯ãªã¼ã³ã«è¦ãã¦ãããã®ã¨å®éã«åãã¦ããã¢ã«ã´ãªãºã ã®ä¹é¢
- æ ªå¼ã®é«éèªååå¼ï¼HFTï¼ãæ±ã£ããã¤ã±ã«ã»ã«ã¤ã¹ã®ãã³ãã£ã¯ã·ã§ã³ããã©ãã·ã¥ã»ãã¼ã¤ãºãã§ã¯ãã¹ã¯ãªã¼ã³ä¸ã§äººéã確èªãã¦ããåå¼ã®å 容ã¨ãèªåã¢ã«ã´ãªãºã ã«ãã£ã¦å®éã«æç«ãã¦ããåå¼ã¨ã®ä¹é¢ãæããã¦ãããã¹ã¯ãªã¼ã³ã«æ ã£ã¦ããå 容ãä¿¡ãããããªãã¨ããèå¼±æ§ããæ¬æ¸ã§ã¯"In God We Trust"ï¼ç¥ã®å¾¡éã®ãã¨ã«ï¼ãªãã¬"In Scree We Trust"ï¼ã¹ã¯ãªã¼ã³ã®å¾¡éã®ãã¨ã«ï¼ã¨è¡¨ç¾ãã¦ãããããã¯ã¹ãã¤ã¦ã§ã¢ãªã©ã§ç¾å¨ã«ãå½ã¦ã¯ã¾ãç¹å¾´ã§ããããã¹ã¯ãªã¼ã³æ°ã®å¢å ã¨ã¢ã«ã´ãªãºã ã®è¤éåã«ãã£ã¦åé¡ããã大ãããªãå¾ãã
Â
ã¡ãªã¿ã«ãä¸ã®3.ã«æãããã¹ã¯ãªã¼ã³ã«è¦ãã¦ãããã®ã¨å®éã®åä½ã®å·®ç°ã«ã¤ãã¦ãæ¬æ¸ãèªãã§é©ããä¾ãããã
Â
ã«ã¼ããããã¨å¼ã°ããã¿ã¤ãã®ã½ããã¦ã§ã¢ã®ä¸é¨ã¯ãã¹ããã«ã¤ã³ã¹ãã¼ã«ãããã¨ãé»è©±ã®æ¥ç¶å ãã³ã³ããã¼ã«ãã¦ãã¾ããã¢ãã¿ã¼ã«è¡¨ç¤ºããã¦ããé»è©±çªå·ã¨ãå®éã®æ¶é»å ãå¥ã®çªå·ã«ã§ããã®ã ãããç¯ç½ªçµç¹ã¯ãã®ã½ããã¦ã§ã¢ã使ç¨ãã¦ãéèæ©é¢ã®ã³ã¼ã«ã»ã³ã¿ã¼ã¨ãã¦spoofingï¼ãªããã¾ãï¼ãè¡ã£ããä»çµã¿ã¯ããã ããããããéèæ©é¢ã®ã³ã¼ã«ã»ã³ã¿ã¼ã®çªå·ãä½å件ãã«ã¼ããããã«è¨å®ãã¦ãããé»è©±ã®æã¡ä¸»ãã¿ããããçªå·ããã該å½ããå ´åãé»è©±ã®æ¥ç¶å ãå¤æ´ãã¦èªåãã¡ãé»è©±ãåãããæ¬äººç¢ºèªã¨ç§°ãã¦å£åº§æ å ±ãå人æ å ±ãèãåºãããããã·ã¹ãã ããã¦ã³ããã®ã§ããç´ããã¨ãé©å½ãªçç±ãä»ãã¦é»è©±ãåãï¼ä»¥ä¸ç¥ï¼ã
ãããã³ã¼ã«ã»ã³ã¿ã¼ãé ãæµ·å¤ã«ç½®ãã¦å¤§ããæè²ãããªãã¢ã¡ãªã«ã ããããã§ããæå£ãªããããªããã¨æã£ãã»ã»
Â
Good Cyber Hygiene
ãã¦æå¾ã«ãããããæªæ¥ã®ç¯ç½ªã«å¯¾ãã¦ããã£ããã©ã®ãããªå¯¾çãã¨ãããã¹ããªã®ã ãããã
Â
æ¬æ¸ã¯å·»æ«ä»é²ã§ããã¹ã¯ã¼ããã©ã®ç¨åº¦ã®é »åº¦ã§å¤ããã¹ãããã¨ãã£ãå ·ä½çãªå©è¨ããã¦ããããã ããããããå人çã«é¢ç½ãã£ãã®ã¯ããµã¤ãã¼ç¯ç½ªã¸ã®å¯¾å¦ã«ã¤ãã¦ã¯å ¬è¡è¡çã®èãæ¹ã«ãã£ã¨å¦ã¶ã¹ãã¨ããæè¨ã ã
Â
å¤ãã帰ã£ãããããææ´ããããªããããããã¿ãåºã¦é¢¨éªã£ã½ãã£ãã温ããããªããã親ã¯åã©ãã«ãããããã¨ãè¨ãèãããã大å¦ãç é¢ã«ã¯ãé¿å¦ã«ã¤ãã¦ã®çæ¿ããã£ããããããããããç¥ããªã人ããããã£ãUSBãã¤ãªããããã¡ããã¨ããå¿ åãããããããã¯ããã ãããã
Â
æ¬æ¸ã§ç´¹ä»ããã¦ãããªã¼ã¹ãã©ãªã¢æ¿åºæ©é¢ã®èª¿æ»ã«ããã°ãã¢ããªã±ã¼ã·ã§ã³æ´æ°ãèªåã«ããããã¡ã¼ã«/Webãã©ã¦ãºæã¯ç®¡çè 権éã¦ã¼ã¶ã§ã¯ãªããã¼ã·ãã¯ã¦ã¼ã¶ã使ãã¨ãã£ãç°¡åãªè¨å®ãå¹¾ã¤ãããã ãã§ãæ¨çåã®ä¾µå ¥ã®å¤§é¨åã¯é²å¾¡ã§ããããã ãç©çä¸çã®ç æ°äºé²ã¨åãããã«ãã³ã³ãã¥ã¼ã¿ã®ã»ãã¥ãªãã£ãæ¥å¸¸ã®å°ããªç¿æ £ãéè¦ãããããªãã
Â
ããã«ãå人ã¬ãã«ã ãã§ãªãããµã¤ãã¼ã¹ãã¼ã¹çã®WHOã®ãããªæ©é¢ãç½®ãã¹ãã¨æ¬æ¸ã¯è¨ããæè²ï¼å ¬è¡ã¸ã®åèãªã©ï¼ãç£è¦ï¼å¤§è¦æ¨¡ãªææãçºçãã¦ããªããã®ç£è¦ï¼ãå ç«åï¼ã¯ã¯ãã³é å¸ãªã©ï¼ãã¤ã³ã·ãã³ã対å¿ï¼åé¡çºçæã®å°é家派é£ãå½éå調ãªã©ï¼ãå ¬è¡è¡çã®ãããã対å¿æ çµã¿ã¯ã¤ã³ã¿ã¼ãããã®ã»ãã¥ãªãã£ã«ãæ´ç¨ã§ããããã ã
Â
å®éãITæè¡ãé«åº¦åãã¦ã便å©ã ãã©ä½ãã©ãåãã¦ãããã¯ã»ã¨ãã©èª°ãç¥ããªããã¨ããç¶æ ã«ãªãã»ã©ãä¸è¬ã®äººã«ã¨ã£ã¦ã»ãã¥ãªãã£ã®åé¡ã¯äººç½ã¨ãããããç æ°ã®æµè¡ãèªç¶ç½å®³ã«è¿ãæè¦ã«ãªãã®ã§ã¯ãªãã ããããããã§ã¯ããæªæãæã£ãç¯ç½ªè ã«è¦å¯ã対å³ãããããããå¥åº·ä¸ã®ãªã¹ã¯ã«ç¤¾ä¼å ¨ä½ã§å¯¾å¦ãããã¨ããå ¬è¡è¡çã®ã¤ã¡ã¼ã¸ãåãã®ãããããªãã
Â
ã風åå ¥ããããé æ´ãããã風éªã²ããªããããããªæã声ã«æ··ãã£ã¦ããããé©ç¨èªååããããã ã®ãéä¿¡ã¯æå·åããããã¨ãè¨ã£ããããæªæ¥ãæ¥ããã®ãããããªãããããæªããããããªãããã©ãã
Â
Marc GoodmanèâFuture Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About Itâã¯2015å¹´ã®2æã«USã§åºçããããã¥ã¼ã¨ã¼ã¯ã¿ã¤ã ãºãã¦ã©ã¼ã«ã¹ããªã¼ãã¸ã£ã¼ãã«ã®ãã¹ãã»ã©ã¼ã«ååãé£ããä¸åãæ¥æ¬èªçã®åºçäºå®ã¯ä¸æã
ï¼è¿½è¨ï¼é¦è¨³åºã¦ã¾ããï¼
ãã¥ã¼ãã£ã¼ã»ã¯ã©ã¤ã ââãµã¤ãã¼ç¯ç½ªããã®å®å ¨é²è¡ããã¥ã¢ã«
- ä½è : ãã¼ã¯ã»ã°ãããã³,æ¾æµ¦ä¿è¼
- åºç社/ã¡ã¼ã«ã¼: éå社
- çºå£²æ¥: 2016/02/08
- ã¡ãã£ã¢: åè¡æ¬
- ãã®ååãå«ãããã°ãè¦ã
ï¼è¿½è¨ï¼ãåºæ¬èªæ¸ãããã§ãç´¹ä»ããã¦ãã¾ããï¼ãã®ããã°ããããããããç¬
*1:ããã«ã¼ããã¯ã©ãã«ã¼ã¨å¼ã¶æ¹ãããã®ããããã¾ããããæ¬æ¸ãhackerã¨ããè¨èã使ã£ã¦ããã®ã§ãã®ã¨ã³ããªãåããã¨ãã¾ããã
*2:ã¨ã³ããªå 容ã¨å ¨ãé¢ä¿ãªãã§ããå ãã¿ã¯ä»¥ä¸ã§ãã
ã¡ãªã¿ã«ç®æ¬¡"11.INSIDE THE DIGITAL UNDERGROUND"ã2pacãããã°ã«ã¼ãåãå ãã¿ã§ãããã®æ¬ãããããªæ ç»ã¨ãæ¬ããã®å¼ç¨ãå¤ãã§ããSiriã«ãã«ã¼ã ã¡ã¤ããæ¶ããããã ãã©ãã¨ããç¸è«ããã¦ãã殺人ç¯ã"Siri and Clyde"ã¨å¼ãã ããã