下載App 希平方
攻其不背
App 開放下載中
下載App 希平方
攻其不背
App 開放下載中
IE版本不足
你的 IE 瀏覽器太舊了 更新 IE 瀏覽器或點選連結下載 Google Chrome 瀏覽器 前往下載

免費註冊
! 這組帳號已經註冊過了
Email 帳號
密碼請填入 6 位數以上密碼
已經有帳號了?
忘記密碼
! 這組帳號已經註冊過了
您的 Email
請輸入您註冊時填寫的 Email,
我們將會寄送設定新密碼的連結給您。
寄信了!請到信箱打開密碼連結信
密碼信已寄至
沒有收到信嗎? 點這裡重寄一次
如果您尚未收到信,請前往垃圾郵件查看,謝謝!

恭喜您註冊成功!

查看會員功能

註冊未完成

《HOPE English 希平方》服務條款關於個人資料收集與使用之規定

隱私權政策
上次更新日期:2014-12-30

希平方 為一英文學習平台,我們每天固定上傳優質且豐富的影片內容,讓您不但能以有趣的方式學習英文,還能增加內涵,豐富知識。我們非常注重您的隱私,以下說明為當您使用我們平台時,我們如何收集、使用、揭露、轉移及儲存你的資料。請您花一些時間熟讀我們的隱私權做法,我們歡迎您的任何疑問或意見,提供我們將產品、服務、內容、廣告做得更好。

本政策涵蓋的內容包括:希平方 如何處理蒐集或收到的個人資料。
本隱私權保護政策只適用於: 希平方 平台,不適用於非 希平方 平台所有或控制的公司,也不適用於非 希平方 僱用或管理之人。

個人資料的收集與使用
當您註冊 希平方 平台時,我們會詢問您姓名、電子郵件、出生日期、職位、行業及個人興趣等資料。在您註冊完 希平方 帳號並登入我們的服務後,我們就能辨認您的身分,讓您使用更完整的服務,或參加相關宣傳、優惠及贈獎活動。希平方 也可能從商業夥伴或其他公司處取得您的個人資料,並將這些資料與 希平方 所擁有的您的個人資料相結合。

我們所收集的個人資料, 將用於通知您有關 希平方 最新產品公告、軟體更新,以及即將發生的事件,也可用以協助改進我們的服務。

我們也可能使用個人資料為內部用途。例如:稽核、資料分析、研究等,以改進 希平方公司 產品、服務及客戶溝通。

瀏覽資料的收集與使用
希平方 自動接收並記錄您電腦和瀏覽器上的資料,包括 IP 位址、希平方 cookie 中的資料、軟體和硬體屬性以及您瀏覽的網頁紀錄。

隱私權政策修訂
我們會不定時修正與變更《隱私權政策》,不會在未經您明確同意的情況下,縮減本《隱私權政策》賦予您的權利。隱私權政策變更時一律會在本頁發佈;如果屬於重大變更,我們會提供更明顯的通知 (包括某些服務會以電子郵件通知隱私權政策的變更)。我們還會將本《隱私權政策》的舊版加以封存,方便您回顧。

服務條款
歡迎您加入看 ”希平方”
上次更新日期:2013-09-09

歡迎您加入看 ”希平方”
感謝您使用我們的產品和服務(以下簡稱「本服務」),本服務是由 希平方 所提供。
本服務條款訂立的目的,是為了保護會員以及所有使用者(以下稱會員)的權益,並構成會員與本服務提供者之間的契約,在使用者完成註冊手續前,應詳細閱讀本服務條款之全部條文,一旦您按下「註冊」按鈕,即表示您已知悉、並完全同意本服務條款的所有約定。如您是法律上之無行為能力人或限制行為能力人(如未滿二十歲之未成年人),則您在加入會員前,請將本服務條款交由您的法定代理人(如父母、輔助人或監護人)閱讀,並得到其同意,您才可註冊及使用 希平方 所提供之會員服務。當您開始使用 希平方 所提供之會員服務時,則表示您的法定代理人(如父母、輔助人或監護人)已經閱讀、了解並同意本服務條款。 我們可能會修改本條款或適用於本服務之任何額外條款,以(例如)反映法律之變更或本服務之變動。您應定期查閱本條款內容。這些條款如有修訂,我們會在本網頁發佈通知。變更不會回溯適用,並將於公布變更起十四天或更長時間後方始生效。不過,針對本服務新功能的變更,或基於法律理由而為之變更,將立即生效。如果您不同意本服務之修訂條款,則請停止使用該本服務。

第三人網站的連結 本服務或協力廠商可能會提供連結至其他網站或網路資源的連結。您可能會因此連結至其他業者經營的網站,但不表示希平方與該等業者有任何關係。其他業者經營的網站均由各該業者自行負責,不屬希平方控制及負責範圍之內。

兒童及青少年之保護 兒童及青少年上網已經成為無可避免之趨勢,使用網際網路獲取知識更可以培養子女的成熟度與競爭能力。然而網路上的確存有不適宜兒童及青少年接受的訊息,例如色情與暴力的訊息,兒童及青少年有可能因此受到心靈與肉體上的傷害。因此,為確保兒童及青少年使用網路的安全,並避免隱私權受到侵犯,家長(或監護人)應先檢閱各該網站是否有保護個人資料的「隱私權政策」,再決定是否同意提出相關的個人資料;並應持續叮嚀兒童及青少年不可洩漏自己或家人的任何資料(包括姓名、地址、電話、電子郵件信箱、照片、信用卡號等)給任何人。

為了維護 希平方 網站安全,我們需要您的協助:

您承諾絕不為任何非法目的或以任何非法方式使用本服務,並承諾遵守中華民國相關法規及一切使用網際網路之國際慣例。您若係中華民國以外之使用者,並同意遵守所屬國家或地域之法令。您同意並保證不得利用本服務從事侵害他人權益或違法之行為,包括但不限於:
A. 侵害他人名譽、隱私權、營業秘密、商標權、著作權、專利權、其他智慧財產權及其他權利;
B. 違反依法律或契約所應負之保密義務;
C. 冒用他人名義使用本服務;
D. 上載、張貼、傳輸或散佈任何含有電腦病毒或任何對電腦軟、硬體產生中斷、破壞或限制功能之程式碼之資料;
E. 干擾或中斷本服務或伺服器或連結本服務之網路,或不遵守連結至本服務之相關需求、程序、政策或規則等,包括但不限於:使用任何設備、軟體或刻意規避看 希平方 - 看 YouTube 學英文 之排除自動搜尋之標頭 (robot exclusion headers);

服務中斷或暫停
本公司將以合理之方式及技術,維護會員服務之正常運作,但有時仍會有無法預期的因素導致服務中斷或故障等現象,可能將造成您使用上的不便、資料喪失、錯誤、遭人篡改或其他經濟上損失等情形。建議您於使用本服務時宜自行採取防護措施。 希平方 對於您因使用(或無法使用)本服務而造成的損害,除故意或重大過失外,不負任何賠償責任。

版權宣告
上次更新日期:2013-09-16

希平方 內所有資料之著作權、所有權與智慧財產權,包括翻譯內容、程式與軟體均為 希平方 所有,須經希平方同意合法才得以使用。
希平方歡迎你分享網站連結、單字、片語、佳句,使用時須標明出處,並遵守下列原則:

  • 禁止用於獲取個人或團體利益,或從事未經 希平方 事前授權的商業行為
  • 禁止用於政黨或政治宣傳,或暗示有支持某位候選人
  • 禁止用於非希平方認可的產品或政策建議
  • 禁止公佈或傳送任何誹謗、侮辱、具威脅性、攻擊性、不雅、猥褻、不實、色情、暴力、違反公共秩序或善良風俗或其他不法之文字、圖片或任何形式的檔案
  • 禁止侵害或毀損希平方或他人名譽、隱私權、營業秘密、商標權、著作權、專利權、其他智慧財產權及其他權利、違反法律或契約所應付支保密義務
  • 嚴禁謊稱希平方辦公室、職員、代理人或發言人的言論背書,或作為募款的用途

網站連結
歡迎您分享 希平方 網站連結,與您的朋友一起學習英文。

抱歉傳送失敗!

不明原因問題造成傳送失敗,請儘速與我們聯繫!
希平方 x ICRT

「Marc Goodman:一窺未來犯罪樣貌」- A Vision of Crimes in the Future


框選或點兩下字幕可以直接查字典喔!

I study the future of crime and terrorism, and frankly, I'm afraid. I'm afraid by what I see. I sincerely want to believe that technology can bring us the techno—utopia that we've been promised, but, you see, I've spent a career in law enforcement, and that's informed my perspective on things. I've been a street police officer, an undercover investigator, a counter—terrorism strategist, and I've worked in more than 70 countries around the world. I've had to see more than my fair share of violence and the darker underbelly of society, and that's informed my opinions. My work with criminals and terrorists has actually been highly educational. They have taught me a lot, and I'd like to be able to share some of these observations with you.

Today I'm going to show you the flip side of all those technologies that we marvel at, the ones that we love. In the hands of the TED community, these are awesome tools which will bring about great change for our world, but in the hands of suicide bombers, the future can look quite different.

I started observing technology and how criminals were using it as a young patrol officer. In those days, this was the height of technology. Laugh though you will, all the drug dealers and gang members with whom I dealt had one of these long before any police officer I knew did.

Twenty years later, criminals are still using mobile phones, but they're also building their own mobile phone networks, like this one, which has been deployed in all 31 states of Mexico by the narcos. They have a national encrypted radio communications system. Think about that. Think about the innovation that went into that. Think about the infrastructure to build it. And then think about this: Why can't I get a cell phone signal in San Francisco? How is this possible? It makes no sense.

We consistently underestimate what criminals and terrorists can do. Technology has made our world increasingly open, and for the most part, that's great, but all of this openness may have unintended consequences.

Consider the 2008 terrorist attack on Mumbai. The men that carried that attack out were armed with AK—47s, explosives and hand grenades. They threw these hand grenades at innocent people as they sat eating in cafes and waited to catch trains on their way home from work. But heavy artillery is nothing new in terrorist operations. Guns and bombs are nothing new. What was different this time is the way that the terrorists used modern information communications technologies to locate additional victims and slaughter them. They were armed with mobile phones. They had BlackBerries. They had access to satellite imagery. They had satellite phones, and they even had night vision goggles. But perhaps their greatest innovation was this. We've all seen pictures like this on television and in the news. This is an operations center. And the terrorists built their very own op center across the border in Pakistan, where they monitored the BBC, al Jazeera, CNN and Indian local stations. They also monitored the Internet and social media to monitor the progress of their attacks and how many people they had killed. They did all of this in real time.

The innovation of the terrorist operations center gave terrorists unparalleled situational awareness and tactical advantage over the police and over the government. What did they do with this? They used it to great effect.

At one point during the 60—hour siege, the terrorists were going room to room trying to find additional victims. They came upon a suite on the top floor of the hotel, and they kicked down the door and they found a man hiding by his bed. And they said to him, "Who are you, and what are you doing here?" And the man replied, "I'm just an innocent schoolteacher." Of course, the terrorists knew that no Indian schoolteacher stays at a suite in the Taj. They picked up his identification, and they phoned his name in to the terrorist war room, where the terrorist war room Googled him, and found a picture and called their operatives on the ground and said, "Your hostage, is he heavyset? Is he bald in front? Does he wear glasses?" "Yes, yes, yes," came the answers. The op center had found him and they had a match. He was not a schoolteacher. He was the second—wealthiest businessman in India, and after discovering this information, the terrorist war room gave the order to the terrorists on the ground in Mumbai. ("Kill him.")

We all worry about our privacy settings on Facebook, but the fact of the matter is, our openness can be used against us. Terrorists are doing this. A search engine can determine who shall live and who shall die. This is the world that we live in.

During the Mumbai siege, terrorists were so dependent on technology that several witnesses reported that as the terrorists were shooting hostages with one hand, they were checking their mobile phone messages in the very other hand. In the end, 300 people were gravely wounded and over 172 men, women and children lost their lives that day.

Think about what happened. During this 60—hour siege on Mumbai, 10 men armed not just with weapons, but with technology, were able to bring a city of 20 million people to a standstill. Ten people brought 20 million people to a standstill, and this traveled around the world. This is what radicals can do with openness.

This was done nearly four years ago. What could terrorists do today with the technologies available that we have? What will they do tomorrow? The ability of one to affect many is scaling exponentially, and it's scaling for good and it's scaling for evil.

It's not just about terrorism, though. There's also been a big paradigm shift in crime. You see, you can now commit more crime as well. In the old days, it was a knife and a gun. Then criminals moved to robbing trains. You could rob 200 people on a train, a great innovation. Moving forward, the Internet allowed things to scale even more. In fact, many of you will remember the recent Sony PlayStation hack. In that incident, over 100 million people were robbed. Think about that. When in the history of humanity has it ever been possible for one person to rob 100 million?

Of course, it's not just about stealing things. There are other avenues of technology that criminals can exploit. Many of you will remember this super cute video from the last TED, but not all quadcopter swarms are so nice and cute. They don't all have drumsticks. Some can be armed with HD cameras and do countersurveillance on protesters, or, as in this little bit of movie magic, quadcopters can be loaded with firearms and automatic weapons. Little robots are cute when they play music to you. When they swarm and chase you down the block to shoot you, a little bit less so.

Of course, criminals and terrorists weren't the first to give guns to robots. We know where that started. But they're adapting quickly. Recently, the FBI arrested an al Qaeda affiliate in the United States, who was planning on using these remote—controlled drone aircraft to fly C4 explosives into government buildings in the United States. By the way, these travel at over 600 miles an hour.

Every time a new technology is being introduced, criminals are there to exploit it. We've all seen 3D printers. We know with them that you can print in many materials ranging from plastic to chocolate to metal and even concrete. With great precision I actually was able to make this just the other day, a very cute little ducky. But I wonder to myself, for those people that strap bombs to their chests and blow themselves up, how might they use 3D printers?

Perhaps like this. You see, if you can print in metal, you can print one of these, and in fact you can also print one of these too. The UK I know has some very strict firearms laws. You needn't bring the gun into the UK anymore. You just bring the 3D printer and print the gun while you're here, and, of course, the magazines for your bullets.

But as these get bigger in the future, what other items will you be able to print? The technologies are allowing bigger printers.

As we move forward, we'll see new technologies also, like the Internet of Things. Every day we're connecting more and more of our lives to the Internet, which means that the Internet of Things will soon be the Internet of Things To Be Hacked. All of the physical objects in our space are being transformed into information technologies, and that has a radical implication for our security, because more connections to more devices means more vulnerabilities. Criminals understand this. Terrorists understand this. Hackers understand this. If you control the code, you control the world. This is the future that awaits us.

There has not yet been an operating system or a technology that hasn't been hacked. That's troubling, since the human body itself is now becoming an information technology. As we've seen here, we're transforming ourselves into cyborgs. Every year, thousands of cochlear implants, diabetic pumps, pacemakers and defibrillators are being implanted in people. In the United States, there are 60,000 people who have a pacemaker that connects to the Internet. The defibrillators allow a physician at a distance to give a shock to a heart in case a patient needs it. But if you don't need it, and somebody else gives you the shock, it's not a good thing.

Of course, we're going to go even deeper than the human body. We're going down to the cellular level these days. Up until this point, all the technologies I've been talking about have been silicon—based, ones and zeroes, but there's another operating system out there: the original operating system, DNA. And to hackers, DNA is just another operating system waiting to be hacked. It's a great challenge for them. There are people already working on hacking the software of life, and while most of them are doing this to great good and to help us all, some won't be.

So how will criminals abuse this? Well, with synthetic biology you can do some pretty neat things. For example, I predict that we will move away from a plant—based narcotics world to a synthetic one. Why do you need the plants anymore? You can just take the DNA code from marijuana or poppies or coca leaves and cut and past that gene and put it into yeast, and you can take those yeast and make them make the cocaine for you, or the marijuana, or any other drug. So how we use yeast in the future is going to be really interesting. In fact, we may have some really interesting bread and beer as we go into this next century.

The cost of sequencing the human genome is dropping precipitously. It was proceeding at Moore's Law pace, but then in 2008, something changed. The technologies got better, and now DNA sequencing is proceeding at a pace five times that of Moore's Law. That has significant implications for us.

It took us 30 years to get from the introduction of the personal computer to the level of cybercrime we have today, but looking at how biology is proceeding so rapidly, and knowing criminals and terrorists as I do, we may get there a lot faster with biocrime in the future. It will be easy for anybody to go ahead and print their own bio—virus, enhanced versions of ebola or anthrax, weaponized flu.

We recently saw a case where some researchers made the H5N1 avian influenza virus more potent. It already has a 70 percent mortality rate if you get it, but it's hard to get. Engineers, by moving around a small number of genetic changes, were able to weaponize it and make it much more easy for human beings to catch, so that not thousands of people would die, but tens of millions. You see, you can go ahead and create new pandemics, and the researchers who did this were so proud of their accomplishments, they wanted to publish it openly so that everybody could see this and get access to this information.

But it goes deeper than that. DNA researcher Andrew Hessel has pointed out quite rightly that if you can use cancer treatments, modern cancer treatments, to go after one cell while leaving all the other cells around it intact, then you can also go after any one person's cell. Personalized cancer treatments are the flip side of personalized bioweapons, which means you can attack any one individual, including all the people in this picture. How will we protect them in the future?

What to do? What to do about all this? That's what I get asked all the time. For those of you who follow me on Twitter, I will be tweeting out the answer later on today.

Actually, it's a bit more complex than that, and there are no magic bullets. I don't have all the answers, but I know a few things. In the wake of 9/11, the best security minds put together all their innovation and this is what they created for security. If you're expecting the people who built this to protect you from the coming robopocalypse—uh, you may want to have a backup plan. Just saying. Just think about that.

Law enforcement is currently a closed system. It's nation—based, while the threat is international. Policing doesn't scale globally. At least, it hasn't, and our current system of guns, border guards, big gates and fences are outdated in the new world into which we're moving. So how might we prepare for some of these specific threats, like attacking a president or a prime minister? This would be the natural government response, to hide away all our government leaders in hermetically sealed bubbles. But this is not going to work. The cost of doing a DNA sequence is going to be trivial. Anybody will have it and we will all have them in the future.

So maybe there's a more radical way that we can look at this. What happens if we were to take the President's DNA, or a king or queen's, and put it out to a group of a few hundred trusted researchers so they could study that DNA and do penetration testing against it as a means of helping our leaders? Or what if we sent it out to a few thousand? Or, controversially, and not without its risks, what happens if we just gave it to the whole public? Then we could all be engaged in helping.

We've already seen examples of this working well. The Organized Crime and Corruption Reporting Project is staffed by journalists and citizens where they are crowd—sourcing what dictators and terrorists are doing with public funds around the world, and, in a more dramatic case, we've seen in Mexico, a country that has been racked by 50,000 narcotics—related murders in the past six years. They're killing so many people they can't even afford to bury them all in anything but these unmarked graves like this one outside of Ciudad Juarez. What can we do about this? The government has proven ineffective. So in Mexico, citizens, at great risk to themselves, are fighting back to build an effective solution. They're crowd—mapping the activities of the drug dealers.

Whether or not you realize it, we are at the dawn of a technological arms race, an arms race between people who are using technology for good and those who are using it for ill. The threat is serious, and the time to prepare for it is now. I can assure you that the terrorists and criminals are.

My personal belief is that, rather than having a small, elite force of highly trained government agents here to protect us all, we're much better off having average and ordinary citizens approaching this problem as a group and seeing what we can do. If we all do our part, I think we'll be in a much better space. The tools to change the world are in everybody's hands. How we use them is not just up to me, it's up to all of us.

This was a technology I would frequently deploy as a police officer. This technology has become outdated in our current world. It doesn't scale, it doesn't work globally, and it surely doesn't work virtually.

We've seen paradigm shifts in crime and terrorism. They call for a shift to a more open form and a more participatory form of law enforcement. So I invite you to join me. After all, public safety is too important to leave to the professionals.

Thank you.

播放本句

登入使用學習功能

使用Email登入

HOPE English 播放器使用小提示

  • 功能簡介

    單句重覆、上一句、下一句:顧名思義,以句子為單位重覆播放,單句重覆鍵顯示橘色時為重覆播放狀態;顯示灰色時為正常播放狀態。按上一句鍵、下一句鍵時就會自動重覆播放該句。
    收錄佳句:點擊可增減想收藏的句子。

    中、英文字幕開關:中、英文字幕按鍵為綠色為開啟,灰色為關閉。鼓勵大家搞懂每一句的內容以後,關上字幕聽聽看,會發現自己好像在聽中文說故事一樣,會很有成就感喔!
    收錄單字:用滑鼠框選英文單字可以收藏不會的單字。
  • 分享
    如果您覺得本篇短片很有趣或很喜歡,在短片結束時有分享連結,可以分享給朋友一同欣賞,一起看YouTube學英文!

    或是您有收錄很優秀的句子時,也可以分享佳句給大家,一同看佳句學英文!