Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:05,467 --> 00:00:07,533
Freeman:
THE MOST POWERFUL NATIONS
2
00:00:07,533 --> 00:00:13,000
FEAR A NEW FORM OF WARFARE THAT
COULD BRING THEM TO THEIR KNEES.
3
00:00:15,867 --> 00:00:18,833
IN THIS AGE WHERE ARMIES,
GOVERNMENTS, AND ECONOMIES
4
00:00:18,833 --> 00:00:23,100
ALL DEPEND ON AN INTRICATE
GLOBAL INFRASTRUCTURE,
5
00:00:23,100 --> 00:00:27,967
YOU DON'T NEED GUNS AND BOMBS
TO BRING DOWN A SUPERPOWER.
6
00:00:27,967 --> 00:00:31,467
ALL YOU NEED IS IMAGINATION.
7
00:00:31,467 --> 00:00:35,033
[ COMPUTERS BEEPING ]
8
00:00:35,033 --> 00:00:41,100
SHIFT TIME BY A MILLIONTH
OF A SECOND AND CREATE CHAOS.
9
00:00:41,100 --> 00:00:45,733
USE THE HUMAN BODY TO SPREAD
A KILLER COMPUTER VIRUS.
10
00:00:45,733 --> 00:00:51,167
TURN THE TECHNOLOGY
WE ARE ADDICTED TO AGAINST US.
11
00:00:51,167 --> 00:00:54,233
WILL HUMAN INGENUITY TRIUMPH?
12
00:00:54,233 --> 00:00:58,267
OR WILL OUR INGENUITY
PROVE OUR UNDOING?
13
00:01:04,633 --> 00:01:09,500
Freeman:
SPACE, TIME, LIFE ITSELF...
14
00:01:11,533 --> 00:01:16,067
THE SECRETS OF THE COSMOS LIE
THROUGH THE WORMHOLE.
15
00:01:16,067 --> 00:01:19,067
-- Captions by VITAC --
www.vitac.com
16
00:01:19,067 --> 00:01:22,067
CAPTIONS PAID FOR BY
DISCOVERY COMMUNICATIONS
17
00:01:29,067 --> 00:01:34,067
YOU AND I RELY ON
OUR MODERN CIVILIZATION,
18
00:01:34,067 --> 00:01:36,433
BUT THERE ARE PLENTY OF PEOPLE
WHO DON'T LIKE IT,
19
00:01:36,433 --> 00:01:38,633
FOR A VARIETY OF REASONS,
20
00:01:38,633 --> 00:01:43,233
RELIGION, POLITICS,
OR MAYBE FEAR ABOUT OUR FUTURE.
21
00:01:43,233 --> 00:01:47,667
FOR NOW, LET'S CALL
THESE PEOPLE "TERRORISTS."
22
00:01:47,667 --> 00:01:50,867
TERRORISTS DON'T FIGHT BY
CONVENTIONAL MEANS.
23
00:01:50,867 --> 00:01:54,133
THEY STRIKE IN WAYS
WE DON'T EXPECT.
24
00:01:54,133 --> 00:01:56,067
NOW, WE HAVE GIVEN THEM
A WEAPON
25
00:01:56,067 --> 00:01:59,733
THAT COULD CHANGE
THE GLOBAL BALANCE OF POWER.
26
00:01:59,733 --> 00:02:04,433
THE STABILITY OF THE U.S.,
EUROPE, CHINA,
27
00:02:04,433 --> 00:02:06,500
AND ANY GLOBAL POWER
DEPENDS ON
28
00:02:06,500 --> 00:02:10,333
HIGH-SPEED
DIGITAL COMMUNICATION.
29
00:02:10,333 --> 00:02:14,400
WITH A LITTLE IMAGINATION,
COULD A FEW TERRORISTS SABOTAGE
30
00:02:14,400 --> 00:02:19,067
THIS MASSIVE NETWORK,
CRIPPLE A MIGHTY NATION,
31
00:02:19,067 --> 00:02:25,767
PERHAPS EVEN TEAR
DOWN MODERN CIVILIZATION?
32
00:02:25,767 --> 00:02:27,767
Man on radio:
BATTER IS JACKIE ROBINSON.
33
00:02:27,767 --> 00:02:30,467
ONE BALL, ONE STRIKE.
TWO ON, TWO OUT.
34
00:02:30,467 --> 00:02:32,700
Freeman: WHEN I WAS GROWING UP
IN MISSISSIPPI,
35
00:02:32,700 --> 00:02:35,067
I LOVED TO LISTEN
TO THE OLD BROOKLYN DODGERS
36
00:02:35,067 --> 00:02:41,267
BASEBALL GAMES, BROADCAST LIVE
ALL THE WAY FROM NEW YORK.
37
00:02:41,267 --> 00:02:44,633
IT AMAZED ME TO THINK
THAT MY FAMILY WAS CHEERING
38
00:02:44,633 --> 00:02:49,133
ONE OF JACKIE ROBINSON'S
BIG HITS AT THE SAME INSTANT
39
00:02:49,133 --> 00:02:52,867
AS TENS OF THOUSANDS OF FANS
AT EBBETS FIELD.
40
00:02:52,867 --> 00:02:54,467
WAY BACK, IT'S GONE!
41
00:02:54,467 --> 00:02:56,467
THAT'S A HOME RUN
FOR JACKIE ROBINSON.
42
00:02:56,467 --> 00:02:59,433
INVISIBLE RADIO SIGNALS THAT
CONNECTED MILLIONS OF PEOPLE
43
00:02:59,433 --> 00:03:02,367
AND SYNCHRONIZED US ALL.
44
00:03:02,367 --> 00:03:05,367
THEY'RE COMING OUT OF THE
DUGOUT NOW TO SHAKE HANDS...
45
00:03:08,067 --> 00:03:12,067
TODAY, WE ARE MORE CONNECTED
THAN EVER BEFORE.
46
00:03:12,067 --> 00:03:14,467
AND ALL THE MACHINES
THAT CONNECT US,
47
00:03:14,467 --> 00:03:17,533
THE MACHINES THAT
KEEP THE MODERN WORLD RUNNING,
48
00:03:17,533 --> 00:03:21,833
RELY ON
PRECISELY SYNCHRONIZED TIME.
49
00:03:21,833 --> 00:03:25,067
BUT COULD TIME BE TURNED
AGAINST US?
50
00:03:25,067 --> 00:03:28,067
THE NATIONAL INSTITUTE OF
STANDARDS AND TECHNOLOGY
51
00:03:28,067 --> 00:03:30,900
IN BOULDER, COLORADO,
IS THE HOME BASE
52
00:03:30,900 --> 00:03:34,300
OF PHYSICIST JUDAH LEVINE.
53
00:03:34,300 --> 00:03:37,800
WHENEVER YOU USE A COMPUTER
OR YOUR CELL PHONE,
54
00:03:37,800 --> 00:03:41,133
YOU'RE TAPPING INTO
JUDAH'S GREATEST CREATION,
55
00:03:41,133 --> 00:03:43,867
THE INTERNET TIME SERVICE.
56
00:03:43,867 --> 00:03:47,100
THE INTERNET TIME SERVICE SENDS
OUT SIGNALS THAT LET COMPUTERS
57
00:03:47,100 --> 00:03:50,567
SYNCHRONIZE THEIR CLOCKS TO
WITHIN A MILLIONTH OF A SECOND,
58
00:03:50,567 --> 00:03:54,067
AND THE NUMBER OF DEVICES
THAT NEED PRECISE TIME
59
00:03:54,067 --> 00:03:56,733
IS SKYROCKETING.
60
00:03:56,733 --> 00:04:01,067
Levine: THE GROWTH HAS BEEN
5% PER MONTH,
61
00:04:01,067 --> 00:04:04,467
COMPOUNDED FOR 15 YEARS.
62
00:04:04,467 --> 00:04:08,467
AND SO, WE STARTED OUT WITH
50,000 REQUESTS A DAY, AND NOW,
63
00:04:08,467 --> 00:04:11,067
WE HAVE ABOUT SIX BILLION
REQUESTS A DAY.
64
00:04:11,067 --> 00:04:14,300
Freeman: NO SINGLE CLOCK
KEEPS TIME FOR THE WORLD.
65
00:04:14,300 --> 00:04:16,867
N.I.S.T. HAS A DOZEN,
66
00:04:16,867 --> 00:04:20,900
EACH MEASURING TIME
IN DIFFERENT WAYS.
67
00:04:20,900 --> 00:04:24,067
THE ACCURACY OF JUDAH'S CLOCKS
IS VITAL FOR CONTROLLING
68
00:04:24,067 --> 00:04:26,133
ELECTRIC POWER GRIDS,
69
00:04:26,133 --> 00:04:29,067
SYNCHRONIZING TELECOMMUNICATIONS
NETWORKS,
70
00:04:29,067 --> 00:04:33,700
TIMING FINANCIAL TRANSACTIONS,
AND PERHAPS MOST IMPORTANTLY,
71
00:04:33,700 --> 00:04:37,567
MAKING THE GLOBAL POSITIONING
SYSTEM WORK.
72
00:04:37,567 --> 00:04:40,067
IMAGINE IF TERRORISTS
THREW THOSE CLOCKS OFF
73
00:04:40,067 --> 00:04:42,633
BY JUST A TINY BIT.
74
00:04:42,633 --> 00:04:44,267
WHAT WOULD HAPPEN?
75
00:04:44,267 --> 00:04:46,967
Levine: THE G.P.S. NAVIGATION
SYSTEM DEPENDS ON THE FACT THAT
76
00:04:46,967 --> 00:04:50,600
ALL THE SATELLITES ARE
SYNCHRONIZED TO THE SAME TIME,
77
00:04:50,600 --> 00:04:53,067
WHICH IS CALLED
G.P.S. SYSTEM TIME.
78
00:04:53,067 --> 00:04:55,167
THE SYSTEM FUNDAMENTALLY
REQUIRES THAT,
79
00:04:55,167 --> 00:04:56,633
AND IT WON'T WORK
WITHOUT IT.
80
00:04:56,633 --> 00:04:58,733
IT JUST DOESN'T WORK AT ALL.
IT'S NOT THAT IT DEGRADES.
81
00:04:58,733 --> 00:05:01,067
IT JUST DOESN'T WORK.
82
00:05:01,067 --> 00:05:02,467
Freeman: AROUND THE WORLD,
83
00:05:02,467 --> 00:05:07,200
MORE THAN 5,000 PLANES ARE
IN THE AIR AT ANY GIVEN TIME.
84
00:05:07,200 --> 00:05:11,600
TO KEEP THEM FROM COLLIDING,
CONTROLLERS MUST TRACK TIME,
85
00:05:11,600 --> 00:05:15,633
SPEED AND DISTANCE
WITH GREAT PRECISION.
86
00:05:15,633 --> 00:05:19,933
A FEW SECONDS' DISRUPTION IN
THIS NETWORK COULD MEAN DISASTER
87
00:05:19,933 --> 00:05:24,767
IN THE TIGHTLY PACKED AIRSPACE
AROUND A MAJOR AIRPORT.
88
00:05:24,767 --> 00:05:27,767
NOW IMAGINE THAT EFFECT
SIMULTANEOUSLY HITTING
89
00:05:27,767 --> 00:05:33,067
THE ENTIRE INFRASTRUCTURE
THAT KEEPS A SUPERPOWER RUNNING.
90
00:05:33,067 --> 00:05:38,133
POWER PLANTS, HOSPITALS,
FOOD DELIVERY, OIL PRODUCTION,
91
00:05:38,133 --> 00:05:41,333
ALL DEPEND ON
TIME-CRITICAL FUNCTIONS.
92
00:05:41,333 --> 00:05:43,067
THROW THEM OUT OF SYNC,
93
00:05:43,067 --> 00:05:46,200
AND THERE COULD BE
A CATASTROPHIC CHAIN REACTION.
94
00:05:46,200 --> 00:05:49,167
[ GLASS SHATTERS ]
95
00:05:49,167 --> 00:05:52,800
SMALL EFFECTS, IF THEY'RE NOT
DAMPED OUT QUICKLY,
96
00:05:52,800 --> 00:05:57,967
CAN GROW TO BECOME
MUCH BIGGER PROBLEMS.
97
00:05:57,967 --> 00:06:00,900
Freeman: JUDAH'S CHALLENGE IS TO
KEEP THAT CHAIN REACTION
98
00:06:00,900 --> 00:06:02,867
FROM HAPPENING.
99
00:06:02,867 --> 00:06:06,567
HIS BIGGEST THREAT
COMES FROM HACKERS.
100
00:06:06,567 --> 00:06:11,267
THE LAST YEAR OR TWO HAS SEEN
A DRAMATIC INCREASE IN HACKERS.
101
00:06:11,267 --> 00:06:14,433
IT USED TO BE THAT YOU REALLY
HAD TO UNDERSTAND HOW TO WRITE
102
00:06:14,433 --> 00:06:18,067
SOME OF THESE ATTACKS, BUT NOW,
ONE PERSON WRITES THE ATTACK
103
00:06:18,067 --> 00:06:20,167
AND DISTRIBUTES IT
AMONG 50 PEOPLE
104
00:06:20,167 --> 00:06:23,333
OR 500 PEOPLE OR 5,000 PEOPLE
WHO DON'T NECESSARILY UNDERSTAND
105
00:06:23,333 --> 00:06:25,100
EVEN HOW THE ATTACK WORKS,
106
00:06:25,100 --> 00:06:28,067
AND ALL THEY HAVE TO DO
IS COPY AND RUN IT.
107
00:06:28,067 --> 00:06:32,067
SO IT'S A PROBLEM
THAT'S ONLY GONNA GET WORSE.
108
00:06:32,067 --> 00:06:34,700
Freeman: JUDAH'S INTERNET TIME
SERVICE PROTECTS ITSELF
109
00:06:34,700 --> 00:06:37,467
BY SPREADING ITS CLOCKS AROUND.
[ SATELLITE BEEPING ]
110
00:06:37,467 --> 00:06:40,733
THIS GOES BACK TO THE ORIGINAL
PURPOSE OF THE INTERNET --
111
00:06:40,733 --> 00:06:43,767
DISTRIBUTING CONTROL
SO LOSING A FEW SITES
112
00:06:43,767 --> 00:06:48,667
WON'T TAKE DOWN
THE ENTIRE NETWORK.
113
00:06:48,667 --> 00:06:50,233
THE N.I.S.T.
INTERNET TIME SERVICE
114
00:06:50,233 --> 00:06:53,067
IS MORE DIFFICULT TO JAM,
BECAUSE IT'S SO DISTRIBUTED.
115
00:06:53,067 --> 00:06:54,833
THERE ARE 45 SERVERS.
116
00:06:54,833 --> 00:06:56,233
THEY'RE ALL
AT DIFFERENT LOCATIONS.
117
00:06:56,233 --> 00:06:57,533
THEY DON'T HAVE
THE SAME ADDRESS.
118
00:06:57,533 --> 00:07:01,400
THEY DON'T HAVE THE SAME
PHYSICAL -- PHYSICAL NETWORKS.
119
00:07:01,400 --> 00:07:04,967
SO JAMMING ALL OF THEM
SIMULTANEOUSLY WOULD BE --
120
00:07:04,967 --> 00:07:06,600
I WOULDN'T WANT TO SAY
IT WAS IMPOSSIBLE,
121
00:07:06,600 --> 00:07:08,333
'CAUSE PROBABLY
NOTHING'S IMPOSSIBLE,
122
00:07:08,333 --> 00:07:09,600
BUT IT WOULD BE QUITE A JOB.
123
00:07:09,600 --> 00:07:12,833
Freeland:
BUT THE ILLUSION OF SECURITY
124
00:07:12,833 --> 00:07:15,700
MAY BE THE GREATEST THREAT
WE FACE --
125
00:07:15,700 --> 00:07:20,367
THE FALSE BELIEF WE ARE SAFE
WHEN WE ARE NOT.
126
00:07:20,367 --> 00:07:25,500
PEOPLE TEND TO BELIEVE WHAT
THEY SEE AND WHAT THEY ARE TOLD,
127
00:07:25,500 --> 00:07:28,467
ESPECIALLY WHEN IT COMES
FROM A TRUSTED FIGURE.
128
00:07:28,467 --> 00:07:31,933
I'VE COME HERE TO CAIRO TO SEEK
A NEW BEGINNING
129
00:07:31,933 --> 00:07:35,067
BETWEEN THE UNITED STATES
AND MUSLIMS AROUND THE WORLD.
130
00:07:35,067 --> 00:07:38,900
AMERICA IS NOT, AND NEVER WILL
BE, AT WAR WITH ISLAM.
131
00:07:38,900 --> 00:07:43,400
Freeman: BUT WHAT IF YOU
COULDN'T TRUST ANYONE ANYMORE?
132
00:07:43,400 --> 00:07:45,600
WITH TODAY'S TECHNOLOGY,
133
00:07:45,600 --> 00:07:49,300
IT IS EASY TO TURN HARMLESS
WORDS INTO SOMETHING
134
00:07:49,300 --> 00:07:50,933
COMPLETELY INCENDIARY.
135
00:07:50,933 --> 00:07:53,067
I SEEK WAR WITH ISLAM.
136
00:07:53,067 --> 00:07:56,900
Freeman: IF SOMEONE SEES THIS
FAKE AND BELIEVES IT IS REAL,
137
00:07:56,900 --> 00:07:59,067
IT COULD START A RELIGIOUS WAR.
138
00:07:59,067 --> 00:08:02,100
ISLAM HAS DEMONSTRATED
HATRED RATHER THAN PEACE.
139
00:08:02,100 --> 00:08:04,700
I SEEK WAR WITH ISLAM.
140
00:08:04,700 --> 00:08:06,633
Freeman:
PROTECTING OUR IDENTITIES
141
00:08:06,633 --> 00:08:09,933
AND THOSE OF OUR LEADERS
AGAINST A TERRORIST ASSAULT
142
00:08:09,933 --> 00:08:11,900
IS A TOP PRIORITY
FOR GOVERNMENTS,
143
00:08:11,900 --> 00:08:14,767
MILITARIES AND BUSINESSES.
144
00:08:20,067 --> 00:08:23,533
HERE AT SWITZERLAND'S
IDIAP RESEARCH INSTITUTE,
145
00:08:23,533 --> 00:08:25,533
ONE MAN IS SHORING UP
THE VIRTUAL BATTLEMENTS
146
00:08:25,533 --> 00:08:27,833
THAT KEEP OUT
THE CYBERTERRORISTS.
147
00:08:27,833 --> 00:08:33,300
SéBASTIEN MARCEL IS AN EXPERT
IN BIOMETRICS --
148
00:08:33,300 --> 00:08:36,133
THE SCIENCE OF USING THE UNIQUE
SIGNATURES OF THE BODY
149
00:08:36,133 --> 00:08:39,967
TO VERIFY A PERSON'S IDENTITY.
150
00:08:39,967 --> 00:08:43,467
BIOMETRIC SECURITY IS
A VAST LEAP BEYOND PASSWORDS
151
00:08:43,467 --> 00:08:45,367
AND I.D. CARDS,
152
00:08:45,367 --> 00:08:49,667
WHICH IS WHY A SHADOWY ARMY
IS TRYING TO DEFEAT IT.
153
00:08:49,667 --> 00:08:52,067
THE CHALLENGE IS TO MAKE
THE TASK SO DIFFICULT
154
00:08:52,067 --> 00:08:56,533
FOR POSSIBLE ATTACKERS THAT THEY
WILL JUST NOT TRY TO DO IT.
155
00:08:58,933 --> 00:09:01,567
Freeman: THERE ARE MANY
DIFFERENT KINDS OF BIOMETRICS --
156
00:09:01,567 --> 00:09:06,533
FINGERPRINTS, THE IRIS,
THE WAY YOU WALK.
157
00:09:06,533 --> 00:09:08,567
THE MORE INDIVIDUAL
THE BIOMETRIC,
158
00:09:08,567 --> 00:09:10,700
THE HARDER IT IS TO HACK.
159
00:09:10,700 --> 00:09:14,100
SéBASTIEN PLAYS THE DUAL ROLES
OF CYBERTERRORIST
160
00:09:14,100 --> 00:09:19,667
LOOKING FOR VULNERABILITIES
AND DEFENDER OF THE SYSTEM.
161
00:09:19,667 --> 00:09:22,233
WE ALWAYS COME FIRST
WITH A FORM OF ATTACK,
162
00:09:22,233 --> 00:09:24,500
THEN FIND A COUNTERMEASURE
FOR THAT.
163
00:09:24,500 --> 00:09:26,067
THEN GIVE US AN IDEA
ON ANOTHER WAY
164
00:09:26,067 --> 00:09:28,667
TO MAKE A MORE CLEVER ATTACK.
165
00:09:28,667 --> 00:09:30,433
AND THEN WE DO IT
AGAIN AND AGAIN.
166
00:09:30,433 --> 00:09:32,167
EVENTUALLY, WE WILL REACH
A POINT WHERE IT'S NOT
167
00:09:32,167 --> 00:09:35,367
GOING TO BE POSSIBLE TO MAKE
ANY NEW FORM OF ATTACKS
168
00:09:35,367 --> 00:09:38,233
THAT CAN BYPASS THE SYSTEM.
169
00:09:38,233 --> 00:09:41,367
Freeman: IF A TERRORIST TRICKS
SECURITY SYSTEMS INTO BELIEVING
170
00:09:41,367 --> 00:09:45,100
HE IS THE PRESIDENT
OR ONE OF HIS TRUSTED AIDES,
171
00:09:45,100 --> 00:09:48,900
HE COULD START A WAR.
[ BEEPING ]
172
00:09:48,900 --> 00:09:51,733
IT'S NOT AS FAR-FETCHED
AS IT SOUNDS.
173
00:09:51,733 --> 00:09:55,067
EVEN SOMETHING UNIQUE,
LIKE YOUR FACE,
174
00:09:55,067 --> 00:09:59,367
ISN'T ENOUGH TO SAFEGUARD
YOUR IDENTITY.
175
00:09:59,367 --> 00:10:01,767
SO HERE I HAVE THE LAPTOP
WHICH IS PROTECTED
176
00:10:01,767 --> 00:10:03,567
BY BIOMETRIC FACE RECOGNITION.
177
00:10:03,567 --> 00:10:06,200
WE HAVE AN ACCOUNT CREATED BY
A COLLEAGUE
178
00:10:06,200 --> 00:10:08,967
AND I'M TRYING TO BE
RECOGNIZED AS MY COLLEAGUE,
179
00:10:08,967 --> 00:10:12,567
AND, UH, MY -- WELL, BASICALLY,
DOESN'T WORK
180
00:10:12,567 --> 00:10:15,400
BECAUSE I'M NOT HER.
181
00:10:15,400 --> 00:10:19,100
I'VE TAKEN A PICTURE
OF MY COLLEAGUE HERE
182
00:10:19,100 --> 00:10:21,467
AND I'M JUST GOING TO SHOW IT
IN FRONT OF THE CAMERA
183
00:10:21,467 --> 00:10:22,700
AND LET'S SEE WHAT HAPPENS.
184
00:10:22,700 --> 00:10:26,700
[ COMPUTER BEEPING ]
185
00:10:26,700 --> 00:10:30,100
SO HERE, YOU CAN SEE THAT I'VE
BEEN ABLE TO LOG IN VERY EASILY,
186
00:10:30,100 --> 00:10:32,800
ACTUALLY.
IT WAS INSTANTANEOUS.
187
00:10:32,800 --> 00:10:36,300
Freeman: NOW, SéBASTIEN SWITCHES
BACK TO GUARD DUTY.
188
00:10:36,300 --> 00:10:39,167
HE ACTIVATES A COUNTERMEASURE
THAT STRENGTHENS THE LAPTOP'S
189
00:10:39,167 --> 00:10:41,867
BIOMETRIC SHIELD.
190
00:10:41,867 --> 00:10:45,367
THE SOFTWARE LOOKS NOT JUST
FOR A SPECIFIC FACE,
191
00:10:45,367 --> 00:10:48,633
BUT ALSO BLINKING EYES.
192
00:10:48,633 --> 00:10:51,467
SO HERE,
YOU SEE THAT, ACTUALLY, WELL,
193
00:10:51,467 --> 00:10:54,467
IT'S NO LONGER POSSIBLE
TO ENTER THE SYSTEM.
194
00:10:54,467 --> 00:10:55,900
[ COMPUTER BEEPS ]
195
00:10:55,900 --> 00:10:59,900
Freeman: EVEN THIS ADDED LAYER
OF BIOMETRIC DEFENSE CANNOT,
196
00:10:59,900 --> 00:11:04,600
HOWEVER,
DETER AN IMAGINATIVE ATTACKER.
197
00:11:04,600 --> 00:11:07,967
BY SCANNING A PHOTOGRAPH
WITH 3D IMAGING SOFTWARE,
198
00:11:07,967 --> 00:11:11,300
SéBASTIEN HAS CREATED A MASK
OF HIS COLLEAGUE.
199
00:11:11,300 --> 00:11:14,933
SO NOW, I'M GOING TO PUT
THE MASK OF MY COLLEAGUE ON
200
00:11:14,933 --> 00:11:19,633
AND TRY TO SEE
IF I'M RECOGNIZED.
201
00:11:19,633 --> 00:11:23,167
[ COMPUTER BEEPING ]
202
00:11:23,167 --> 00:11:24,567
YEAH.
203
00:11:24,567 --> 00:11:28,433
SO, I'VE BEEN RECOGNIZED
AND BECAUSE I WAS BLINKING,
204
00:11:28,433 --> 00:11:31,533
AND I WAS ABLE TO BYPASS
THE COUNTERMEASURE.
205
00:11:31,533 --> 00:11:35,933
Freeman: IT IS HARDER TO COPY
SOMEONE'S BODY THAN A PASSWORD,
206
00:11:35,933 --> 00:11:38,633
BUT NOTHING IS FOOLPROOF.
207
00:11:38,633 --> 00:11:42,733
THE MORE BIOMETRIC DATA
AVAILABLE -- PHOTOGRAPHS,
208
00:11:42,733 --> 00:11:47,367
MEDICAL RECORDS, FINGERPRINTS,
THE MORE VULNERABLE WE BECOME.
209
00:11:47,367 --> 00:11:51,133
YOU CAN TAKE ANY PUBLIC
BIOMETRIC DATA YOU CAN FIND ON
210
00:11:51,133 --> 00:11:52,533
FROM THE INTERNET.
211
00:11:52,533 --> 00:11:55,933
YOU CAN FIND SOME PICTURES
OF PEOPLE, EVEN PRESIDENTS,
212
00:11:55,933 --> 00:11:58,433
WORLD LEADERS AND TO BUILD
THESE KIND OF ATTACKS.
213
00:11:58,433 --> 00:12:01,367
Freeman: PLAYING THE ROLE
OF ATTENTIVE DEFENDER
214
00:12:01,367 --> 00:12:04,933
AND MALICIOUS INVADER
HAS TAUGHT SéBASTIEN
215
00:12:04,933 --> 00:12:10,267
THAT HE IS IN A LIFE OR DEATH
RACE WITH NO FINISH LINE.
216
00:12:10,267 --> 00:12:14,633
THE INFRASTRUCTURE THAT SUPPORTS
MODERN CIVILIZATION MAY ALWAYS
217
00:12:14,633 --> 00:12:18,133
BE ONE CLEVER ATTACK AWAY
FROM DISASTER.
218
00:12:18,133 --> 00:12:19,767
MY FEELING IS THAT
219
00:12:19,767 --> 00:12:24,100
IF THIS PROBLEM IS NOT TAKEN
SERIOUSLY INTO ACCOUNT,
220
00:12:24,100 --> 00:12:27,533
THEN WE MIGHT SEE AN ATTACK
THAT WAS SUCCESSFUL.
221
00:12:27,533 --> 00:12:30,467
SO THIS IS THE MAJOR RISK.
222
00:12:30,467 --> 00:12:34,700
Freeman: THIS IS THE NEW ARMS
RACE FOR THE 21st CENTURY,
223
00:12:34,700 --> 00:12:37,200
STAYING A STEP AHEAD OF THOSE
224
00:12:37,200 --> 00:12:39,067
WHO WANT TO INFILTRATE
OUR NETWORKS.
225
00:12:41,667 --> 00:12:45,333
BUT THERE IS ONE ATTACK WE MIGHT
NEVER SEE COMING --
226
00:12:45,333 --> 00:12:48,233
WHEN PEOPLE THEMSELVES
ARE HACKED
227
00:12:48,233 --> 00:12:50,733
AND TURNED AGAINST
THEIR OWN COUNTRY
228
00:12:50,733 --> 00:12:55,067
WITHOUT THEIR EVEN KNOWING.
229
00:12:58,067 --> 00:13:00,067
IF SOMEONE WANTED TO BRING
A SUPERPOWER LIKE AMERICA
230
00:13:00,067 --> 00:13:04,500
TO ITS KNEES,
WHERE WOULD THEY STRIKE?
231
00:13:04,500 --> 00:13:09,067
WE EXPECT ATTACKS ON OUR
FINANCIAL AND MILITARY NETWORKS,
232
00:13:09,067 --> 00:13:13,900
BUT HUMAN BODIES MAY ALSO BE
VULNERABLE TO HACKING.
233
00:13:13,900 --> 00:13:16,267
COULD OUR NEWEST HIGH-TECH
MEDICAL DEVICES
234
00:13:16,267 --> 00:13:19,733
BE GIVING TERRORISTS
AN OPPORTUNITY?
235
00:13:19,733 --> 00:13:25,800
COULD THEY CREATE A SLEEPER ARMY
OF UNWITTING ASSASSINS?
236
00:13:35,667 --> 00:13:39,500
DR. MARK GASSON IS PIONEERING
THE LATEST GENERATION
237
00:13:39,500 --> 00:13:42,433
OF MEDICAL IMPLANTS,
SUCH AS PACEMAKERS,
238
00:13:42,433 --> 00:13:49,067
INSULIN PUMPS FOR DIABETICS
AND DEEP BRAIN STIMULATORS.
239
00:13:49,067 --> 00:13:51,533
SO THIS IS AN IMPLANT
FOR A MEDICAL DEVICE.
240
00:13:51,533 --> 00:13:53,833
IT'S MUCH LIKE A PACEMAKER,
RIGHT?
241
00:13:53,833 --> 00:13:55,733
WE USE IT FOR
DEEP BRAIN STIMULATION.
242
00:13:55,733 --> 00:13:58,067
SO IT WOULD BE IMPLANTED
IN THE CHEST CAVITY
243
00:13:58,067 --> 00:14:02,067
AND THEN WE WOULD RUN CABLES
FROM THIS UP UNDER THE SKIN
244
00:14:02,067 --> 00:14:06,067
AND INTO ELECTRODES
THAT WE PUT DEEP INTO THE BRAIN.
245
00:14:06,067 --> 00:14:09,733
THIS TYPE OF DEVICE,
ONCE IT'S IMPLANTED IN THE BODY,
246
00:14:09,733 --> 00:14:12,933
YOU DON'T WANT TO HAVE TO REMOVE
IT TO CHANGE ANY SETTINGS,
247
00:14:12,933 --> 00:14:15,333
SO IT HAS WIRELESS CAPABILITY.
248
00:14:15,333 --> 00:14:18,933
Freeman:
IMPLANTS ARE MODERN MIRACLES.
249
00:14:18,933 --> 00:14:22,400
BUT THE DOWNSIDE
IS THAT THESE DEVICES
250
00:14:22,400 --> 00:14:24,600
USE RADIO FREQUENCY
TRANSMISSIONS
251
00:14:24,600 --> 00:14:28,700
TO TRANSFER DATA.
252
00:14:28,700 --> 00:14:33,933
AND THE DEVICES THEY TALK TO,
CALLED READERS, CAN BE HACKED.
253
00:14:33,933 --> 00:14:37,200
IF YOU KNOW HOW TO CONSTRUCT
A READER THAT COMMUNICATES
254
00:14:37,200 --> 00:14:40,867
IN THE RIGHT WAY, THEN YOU CAN
ESSENTIALLY PRETEND TO BE
255
00:14:40,867 --> 00:14:43,300
A LEGITIMATE READER
TALKING TO IT.
256
00:14:43,300 --> 00:14:46,833
THIS TYPE OF DEVICE AND MANY
OTHER MEDICAL DEVICES DON'T HAVE
257
00:14:46,833 --> 00:14:49,800
ANY SECURITY TO STOP YOU
FROM DOING THAT.
258
00:14:49,800 --> 00:14:55,300
Freeman: THIS LACK OF SECURITY
COULD HAVE DEADLY RAMIFICATIONS.
259
00:14:55,300 --> 00:14:58,067
IF A NETWORKED DEVICE
IS IN YOUR BODY,
260
00:14:58,067 --> 00:15:01,933
IT COULD BE REMOTELY
TRIGGERED TO KILL YOU.
261
00:15:01,933 --> 00:15:04,667
IMAGINE A FOREIGN POWER WANTS
TO ASSASSINATE A LEADER
262
00:15:04,667 --> 00:15:06,167
WITH AN IMPLANT.
263
00:15:06,167 --> 00:15:10,867
A CONCEALED READER COULD BE
ALTERED TO SHUT DOWN A PACEMAKER
264
00:15:10,867 --> 00:15:14,867
OR PUMP A FATAL DOSE OF INSULIN
INTO A DIABETIC'S BLOODSTREAM.
265
00:15:14,867 --> 00:15:16,633
A DEVICE LIKE THIS WILL HAVE
A CERTAIN RANGE
266
00:15:16,633 --> 00:15:18,067
THAT IT OPERATES IN.
267
00:15:18,067 --> 00:15:22,167
SO IF WE PUT A DEVICE ATTACHED
TO A PODIUM, FOR EXAMPLE,
268
00:15:22,167 --> 00:15:25,067
THEN WE COULD HAVE IT TARGETED
SPECIFICALLY AT THE PERSON
269
00:15:25,067 --> 00:15:27,767
STANDING AT THE PODIUM.
270
00:15:27,767 --> 00:15:29,233
Freeman:
A READER COULD BE DESIGNED
271
00:15:29,233 --> 00:15:32,567
TO TRANSFER A DIGITAL VIRUS
TO AN IMPLANT, SAY,
272
00:15:32,567 --> 00:15:35,667
IN THE PROSTHETIC LEG
OF A GENERAL.
273
00:15:35,667 --> 00:15:40,533
THE VIRUS' REAL TARGET MAY BE
THE WHITE HOUSE SECURITY SYSTEM.
274
00:15:40,533 --> 00:15:42,800
THE GENERAL COULD LEAVE
THE CENTER OF GOVERNMENT
275
00:15:42,800 --> 00:15:45,533
OPEN TO A TERRORIST ATTACK.
276
00:15:45,533 --> 00:15:49,067
[ STATIC ]
277
00:15:49,067 --> 00:15:51,500
IT SOUNDS LIKE THE STUFF
OF FICTION,
278
00:15:51,500 --> 00:15:56,733
BUT MARK HAS ALREADY
PROVEN IT CAN BE DONE.
279
00:15:56,733 --> 00:16:01,433
IN 2010, MARK HACKED HIMSELF.
280
00:16:01,433 --> 00:16:04,267
HE IMPLANTED A RADIO FREQUENCY
TRANSPONDER, LIKE THIS ONE,
281
00:16:04,267 --> 00:16:06,133
IN HIS HAND.
282
00:16:06,133 --> 00:16:10,300
THE MICROCHIP CONTAINED PERSONAL
INFORMATION AND PASSCODES
283
00:16:10,300 --> 00:16:14,667
THAT OPENED THE SECURITY DOORS
AT HIS LAB.
284
00:16:14,667 --> 00:16:16,767
AFTER THE CHIP WAS
UP AND RUNNING,
285
00:16:16,767 --> 00:16:20,900
HE INFECTED IT
WITH A COMPUTER VIRUS.
286
00:16:20,900 --> 00:16:23,733
[ COMPUTER BEEPS ]
287
00:16:23,733 --> 00:16:26,967
Gasson: SO BY INFECTING MY
DEVICE WITH A VIRUS MEANT THAT
288
00:16:26,967 --> 00:16:28,800
WHEN I ACCESSED THE BUILDING,
289
00:16:28,800 --> 00:16:31,967
THE BUILDING READS THE VIRUS
OUT OF MY DEVICE
290
00:16:31,967 --> 00:16:36,067
AND THEN TRANSMITS THAT
TO THE SYSTEM THAT CONTROLS,
291
00:16:36,067 --> 00:16:40,600
UH, THE ACCESS TO THE BUILDING.
292
00:16:40,600 --> 00:16:42,233
SO ONCE THAT HAD OCCURRED,
293
00:16:42,233 --> 00:16:44,800
THE VIRUS ACTUALLY INFECTED
THAT MAIN SYSTEM,
294
00:16:44,800 --> 00:16:47,267
WHICH MEANT THAT ANYONE ELSE
THAT WAS GETTING ACCESS
295
00:16:47,267 --> 00:16:50,633
TO THE BUILDING HAD THAT VIRUS
COPIED TO THEIR --
296
00:16:50,633 --> 00:16:52,433
TYPICALLY,
THEY USE SMART CARDS.
297
00:16:52,433 --> 00:16:55,500
SO THE VIRUS WAS ABLE
TO PROPAGATE IN THAT WAY.
298
00:16:55,500 --> 00:16:58,300
Freeman: MARK WATCHED THE VIRUS
JUMP FROM HIS WRIST
299
00:16:58,300 --> 00:17:00,300
TO THE SYSTEM,
300
00:17:00,300 --> 00:17:03,933
WHERE IT RAPIDLY CAUSED
A SECURITY NIGHTMARE.
301
00:17:03,933 --> 00:17:06,933
Gasson: THE VIRUS
THAT I INFECTED MY DEVICE WITH
302
00:17:06,933 --> 00:17:09,500
WAS ABLE TO CORRUPT
THE WHOLE SYSTEM.
303
00:17:09,500 --> 00:17:12,933
SO IT ACTUALLY STOPPED THE
SYSTEM FROM FUNCTIONING AT ALL.
304
00:17:12,933 --> 00:17:16,333
ALL THE SYSTEM COULD THEN DO IS
MAKE COPIES OF THE VIRUS
305
00:17:16,333 --> 00:17:17,800
ONTO THE SMART CARDS
306
00:17:17,800 --> 00:17:19,800
AND OTHER DEVICES THAT PEOPLE
WOULD BE USING.
307
00:17:19,800 --> 00:17:22,200
AND THAT MEANS THEY THEN
COULDN'T GET INTO THE BUILDING,
308
00:17:22,200 --> 00:17:23,933
AND IF THEY WENT TO
ANOTHER BUILDING
309
00:17:23,933 --> 00:17:25,300
THAT USED THE SAME SYSTEM,
310
00:17:25,300 --> 00:17:29,700
THEY WOULD JUST CONTINUE
TO SPREAD THE VIRUS ON.
311
00:17:29,700 --> 00:17:32,667
Freeman:
MARK PROVED THAT IMPLANTS
312
00:17:32,667 --> 00:17:35,833
COULD NOT ONLY BE INFECTED
WITH TOXIC CODE --
313
00:17:35,833 --> 00:17:40,500
THEY CAN BE USED
TO TRANSFER TOXIC CODE.
314
00:17:40,500 --> 00:17:43,933
THIS HAS OMINOUS IMPLICATIONS.
315
00:17:43,933 --> 00:17:47,233
BY BUILDING INFORMATION HIGHWAYS
ACROSS THE WORLD,
316
00:17:47,233 --> 00:17:50,267
WE MAY HAVE GIVEN OUR ENEMIES
AN EXPRESS LANE
317
00:17:50,267 --> 00:17:57,067
INTO OUR MOST VITAL SYSTEMS
VIA THE DEVICES IN OUR BODIES.
318
00:17:57,067 --> 00:17:59,167
HOW DO WE DEFEND OURSELVES
319
00:17:59,167 --> 00:18:04,067
FROM A WORLD FILLED
WITH CYBERTERRORISTS?
320
00:18:04,067 --> 00:18:06,167
THIS MAN MAY KNOW.
321
00:18:06,167 --> 00:18:10,100
HE'S USING COMPUTERS TO TRACK
DOWN AND FIGHT DEADLY VIRUSES,
322
00:18:10,100 --> 00:18:13,800
BOTH DIGITAL AND BIOLOGICAL.
323
00:18:18,367 --> 00:18:23,633
INFLUENZA, SMALLPOX, H.I.V.
324
00:18:23,633 --> 00:18:27,300
GLOBAL PANDEMICS HAPPEN
EVERY DECADE OR SO.
325
00:18:27,300 --> 00:18:30,800
SOMETIMES,
THEY KILL TENS OF MILLIONS.
326
00:18:30,800 --> 00:18:33,867
NOW THERE ARE NEW THREATS.
327
00:18:33,867 --> 00:18:37,333
DIGITAL VIRUSES
THAT SPREAD LIKE LIGHTNING
328
00:18:37,333 --> 00:18:41,867
AND COULD TEAR OUR CRITICAL
GLOBAL NETWORKS APART.
329
00:18:41,867 --> 00:18:45,600
WHAT LIES AHEAD COULD BE EVEN
MORE FRIGHTENING --
330
00:18:45,600 --> 00:18:51,300
A PANDEMIC DESIGNED TO COMBINED
THE WORST OF BOTH VIRAL WORLDS,
331
00:18:51,300 --> 00:18:56,233
ELECTRONIC AND BIOLOGICAL.
332
00:18:58,500 --> 00:19:00,700
[ COUGHING ]
333
00:19:00,700 --> 00:19:02,600
Freeman: ZERO DAY.
334
00:19:02,600 --> 00:19:06,867
THAT'S THE DAY A DESTRUCTIVE
NEW VIRUS ENTERS THE WORLD.
335
00:19:06,867 --> 00:19:08,700
THE LACK OF AWARENESS
ON ZERO DAY
336
00:19:08,700 --> 00:19:11,067
MEANS COMPLETE VULNERABILITY,
337
00:19:11,067 --> 00:19:14,733
WHETHER THE VIRUS
IS BIOLOGICAL OR DIGITAL.
338
00:19:14,733 --> 00:19:16,200
[ SNEEZES ]
339
00:19:16,200 --> 00:19:17,867
Freeman: IS THERE A WAY
TO STOP THESE THREATS
340
00:19:17,867 --> 00:19:19,967
BEFORE THEY SPREAD?
341
00:19:19,967 --> 00:19:23,800
ALEX VESPIGNANI BELIEVES
THERE IS.
342
00:19:23,800 --> 00:19:27,367
ALEX IS A PROFESSOR OF PHYSICS,
COMPUTER SCIENCE,
343
00:19:27,367 --> 00:19:31,100
AND HEALTH SCIENCES
AT NORTHEASTERN UNIVERSITY.
344
00:19:31,100 --> 00:19:36,367
HE'S AN EXPERT ON CONTAGION,
NATURAL AND ELECTRONIC.
345
00:19:36,367 --> 00:19:40,700
ACTUALLY, I DID START
WITH DIGITAL VIRUSES,
346
00:19:40,700 --> 00:19:43,533
AND BECAUSE OF THE ANALOGIES,
ESPECIALLY IN THE TECHNIQUES
347
00:19:43,533 --> 00:19:45,067
THAT YOU CAN USE
MATHEMATICALLY
348
00:19:45,067 --> 00:19:48,800
TO DESCRIBE THE SPREADING OF
THOSE VIRUSES,
349
00:19:48,800 --> 00:19:52,467
WE STARTED TO GET INTERESTED
IN BIOLOGICAL VIRUSES.
350
00:19:52,467 --> 00:19:57,367
Freeman: ALEX'S LAB TRACKS
VIRAL OUTBREAKS OF ALL KINDS
351
00:19:57,367 --> 00:20:01,767
AND LOOKS FOR WAYS
TO MINIMIZE THEIR IMPACT.
352
00:20:01,767 --> 00:20:06,533
IN 2009, A VIRULENT FLU BUG
NAMED H1N1
353
00:20:06,533 --> 00:20:09,500
FLARED UP IN MEXICO CITY.
354
00:20:09,500 --> 00:20:11,900
TO PREDICT HOW AND WHEN
THE FLU WOULD SPREAD,
355
00:20:11,900 --> 00:20:14,900
ALEX AND HIS TEAM
DESIGNED A POWERFUL PROGRAM
356
00:20:14,900 --> 00:20:16,733
CALLED G.L.E.A.M. --
357
00:20:16,733 --> 00:20:20,767
THE GLOBAL EPIDEMIC
AND MOBILITY MODEL.
358
00:20:20,767 --> 00:20:24,867
G.L.E.A.M. MODELS ALL
7 BILLION PEOPLE ON EARTH
359
00:20:24,867 --> 00:20:28,333
AND PREDICTS HOW
THEY WILL INTERACT.
360
00:20:28,333 --> 00:20:32,433
SO, IN THE COMPUTER, WE TAKE ONE
PERSON THAT IS IN MEXICO CITY,
361
00:20:32,433 --> 00:20:35,867
AND BOARD ON ONE FLIGHT THAT IS
SIMULATED IN THE COMPUTER,
362
00:20:35,867 --> 00:20:39,533
AND IF THAT PERSON IS A CARRIER,
WILL TRANSMIT THE DISEASE
363
00:20:39,533 --> 00:20:42,667
TO ANOTHER GEOGRAPHICAL AREA
IN THE WORLD.
364
00:20:42,667 --> 00:20:46,233
WE REPEAT THOSE SIMULATION MANY,
MANY, MANY TIMES,
365
00:20:46,233 --> 00:20:50,267
AND THIS WILL TELL US WHAT IS
THE MOST LIKELY PATTERN THAT
366
00:20:50,267 --> 00:20:52,867
THE EPIDEMIC WILL FOLLOW
IN THE FUTURE.
367
00:20:55,967 --> 00:21:00,233
Freeman: G.L.E.A.M. ANTICIPATED
WHEN THE H1N1 FLU PANDEMIC
368
00:21:00,233 --> 00:21:02,300
WOULD REACH ITS PEAK
IN DIFFERENT REGIONS
369
00:21:02,300 --> 00:21:04,367
AROUND THE WORLD.
370
00:21:04,367 --> 00:21:06,633
ALEX ALSO USES G.L.E.A.M.
TO TRACK OUTBREAKS
371
00:21:06,633 --> 00:21:09,467
OF COMPUTER VIRUSES.
372
00:21:09,467 --> 00:21:11,533
WHEN HE FIRST ENTERED
THIS FIELD,
373
00:21:11,533 --> 00:21:13,733
DIGITAL AND BIOLOGICAL VIRUSES
374
00:21:13,733 --> 00:21:16,867
FOLLOWED SIMILAR PATHS
OF INFECTION.
375
00:21:16,867 --> 00:21:20,233
A VIRUS WOULD BE PHYSICALLY
CARRIED FROM PERSON TO PERSON,
376
00:21:20,233 --> 00:21:22,533
OR MACHINE TO MACHINE.
377
00:21:22,533 --> 00:21:26,633
OUTBREAKS WOULD TAKE WEEKS
OR MONTHS TO UNFOLD.
378
00:21:26,633 --> 00:21:29,167
ON THE LEFT,
WE HAVE A VIRUS THAT SPREADS
379
00:21:29,167 --> 00:21:31,667
BECAUSE OF PROXIMITY,
AND IN THIS CASE,
380
00:21:31,667 --> 00:21:35,200
WHAT YOU SEE IS THAT THE VIRUS
SPREADS EVERY TIME THAT PEOPLE
381
00:21:35,200 --> 00:21:39,233
GET IN PHYSICAL PROXIMITY,
SO IN TOUCH WITH EACH OTHER.
382
00:21:39,233 --> 00:21:41,100
THIS TAKES SOME TIME.
383
00:21:41,100 --> 00:21:45,067
Freeman: BIOLOGICAL VIRUSES
STILL SPREAD THIS WAY,
384
00:21:45,067 --> 00:21:48,200
BUT DIGITAL VIRUSES
NOW HAVE SOMETHING INFLUENZA
385
00:21:48,200 --> 00:21:50,733
AND EBOLA DON'T --
386
00:21:50,733 --> 00:21:53,667
THE ABILITY TO
TRAVEL AROUND THE WORLD
387
00:21:53,667 --> 00:21:56,067
AT THE SPEED OF LIGHT.
388
00:21:56,067 --> 00:21:58,067
A SINGLE COMPUTER VIRUS
CAN INFECT
389
00:21:58,067 --> 00:22:01,900
TENS OF MILLIONS OF COMPUTERS
BEFORE ANYONE REALIZES
390
00:22:01,900 --> 00:22:03,633
WHAT IS HAPPENING.
391
00:22:03,633 --> 00:22:04,933
SO ON THE RIGHT SIDE,
392
00:22:04,933 --> 00:22:07,567
WE HAVE A VIRUS
THAT SPREADS WIRELESSLY,
393
00:22:07,567 --> 00:22:09,400
BASICALLY, ON THE INTERNET.
394
00:22:09,400 --> 00:22:12,700
THIS DOESN'T REQUIRE
THE PHYSICAL PROXIMITY.
395
00:22:12,700 --> 00:22:14,500
YOU DON'T NEED THE CARRIERS
TO BE IN A PLACE
396
00:22:14,500 --> 00:22:15,700
TO TRANSMIT THE DISEASE.
397
00:22:15,700 --> 00:22:19,267
THE DISEASE IS TELEPORTED,
IN A SENSE.
398
00:22:19,267 --> 00:22:22,367
AND YOU WILL SEE THAT,
IN JUST A FEW MINUTES,
399
00:22:22,367 --> 00:22:24,533
IT REACHES
THE ENTIRE POPULATION.
400
00:22:24,533 --> 00:22:29,533
SO IT BLOWS OUT LIKE
A BIG EXPLOSION ALL AT ONCE.
401
00:22:29,533 --> 00:22:33,667
Freeman: HOW DO YOU FIGHT
PATHOGENS THAT CAN SPREAD AROUND
402
00:22:33,667 --> 00:22:36,633
THE WORLD IN SECONDS?
403
00:22:36,633 --> 00:22:41,667
ALEX'S COLLEAGUES ARE TRYING TO
CREATE A GLOBAL DIGITAL DEFENSE,
404
00:22:41,667 --> 00:22:44,167
SIMILAR TO
THE HUMAN IMMUNE SYSTEM,
405
00:22:44,167 --> 00:22:47,600
BITS OF CODE THAT ACT
LIKE BIOLOGICAL T-CELLS,
406
00:22:47,600 --> 00:22:52,233
SWARMING VIRUSES TO ISOLATE
AND ELIMINATE THEM.
407
00:22:54,933 --> 00:22:58,300
UNFORTUNATELY, CLEVER HACKERS
ARE GETTING BETTER
408
00:22:58,300 --> 00:23:01,567
AT CREATING
UNDETECTABLE VIRUSES.
409
00:23:01,567 --> 00:23:05,100
Vespignani: IN THE DIGITAL
WORLD, VIRUSES OR MALWARES
410
00:23:05,100 --> 00:23:08,233
ARE CONSTANTLY CHANGING,
SO THAT IT'S NOT EASY
411
00:23:08,233 --> 00:23:11,067
TO WRITE AN ALGORITHM
THAT DETECT THEM
412
00:23:11,067 --> 00:23:13,433
AND CLEAN THE MACHINE
RIGHT AWAY.
413
00:23:16,833 --> 00:23:19,700
Freeman: TROJAN HORSE MALWARE IS
SPECIFICALLY DESIGNED
414
00:23:19,700 --> 00:23:21,900
TO BLEND INTO THE BACKGROUND
415
00:23:21,900 --> 00:23:25,133
UNTIL IT REACHES
ITS INTENDED TARGET.
416
00:23:25,133 --> 00:23:27,400
ONCE IT INVADES
A CRITICAL SYSTEM, SAY,
417
00:23:27,400 --> 00:23:31,500
THE CONTROL SOFTWARE OF COOLING
RODS AT A NUCLEAR POWER PLANT,
418
00:23:31,500 --> 00:23:35,500
IT CAN LAY DORMANT
FOR WEEKS OR MONTHS.
419
00:23:35,500 --> 00:23:39,067
THEN, ONE DAY, IT ACTIVATES.
420
00:23:39,067 --> 00:23:42,100
THIS IS DAY ZERO,
AND THE NEW MALWARE IS GOING TO
421
00:23:42,100 --> 00:23:45,167
EXPLOIT THE VULNERABILITIES
OF THOSE SERVERS.
422
00:23:45,167 --> 00:23:49,400
IT CAN HIDE HERE OR PROLIFERATE
OVER THE INTERNET,
423
00:23:49,400 --> 00:23:51,900
AND FINALLY UNLEASH
ALL THE DAMAGE
424
00:23:51,900 --> 00:23:55,167
IT HAS BEEN PROGRAMMED FOR.
425
00:23:55,167 --> 00:23:59,133
[ HISSING ]
426
00:23:59,133 --> 00:24:02,067
[ EXPLOSION ]
427
00:24:02,067 --> 00:24:06,833
Freeman: BUT THERE IS
AN EVEN MORE DISTURBING THREAT.
428
00:24:06,833 --> 00:24:10,700
WHAT IF TERRORISTS APPLY
THE PRINCIPLES OF MALWARE
429
00:24:10,700 --> 00:24:13,533
TO BIOLOGICAL PATHOGENS?
430
00:24:13,533 --> 00:24:16,367
IMAGINE BIOLOGICAL VIRUSES
DESIGNED
431
00:24:16,367 --> 00:24:19,733
TO MASQUERADE AS HARMLESS GERMS.
[ COUGHS ]
432
00:24:19,733 --> 00:24:24,067
THEY'D SPREAD THROUGHOUT
THE POPULATION, THEN DETONATE.
433
00:24:24,067 --> 00:24:28,433
IT WOULD BE
A NIGHTMARE SCENARIO.
434
00:24:28,433 --> 00:24:31,367
BUT THE DANGERS OF ENGINEERING
PATHOGENS ARE SO GREAT,
435
00:24:31,367 --> 00:24:34,567
AND THE RESULTS SO HARD
TO CONTROL,
436
00:24:34,567 --> 00:24:38,433
THAT EVEN TERRORISTS
MAY NOT RISK IT.
437
00:24:38,433 --> 00:24:40,067
EVEN THE SIMPLEST
BIOLOGICAL VIRUSES
438
00:24:40,067 --> 00:24:43,767
ARE MUCH, MUCH, MORE COMPLICATED
THAN COMPUTER VIRUSES.
439
00:24:43,767 --> 00:24:46,667
AS SOON AS YOU START
MANIPULATING A VIRUS,
440
00:24:46,667 --> 00:24:50,433
IT'S VERY DIFFICULT TO GUESS
WHAT IS GOING TO HAPPEN.
441
00:24:50,433 --> 00:24:55,600
IT'S A VERY DANGEROUS GAME,
SO TRYING TO ALTER NATURE
442
00:24:55,600 --> 00:25:01,833
IS SOMETHING, UH, THAT CAN
EASILY LEAD TO DOOMSDAY.
443
00:25:01,833 --> 00:25:06,233
THE FUTURE MAY BE FILLED
WITH FRIGHTENING OUTBREAKS
444
00:25:06,233 --> 00:25:08,567
UNLESS WE FIND A WAY
TO LOCK DOWN
445
00:25:08,567 --> 00:25:11,633
OUR CRITICAL
INFORMATION NETWORKS.
446
00:25:11,633 --> 00:25:14,267
IN A WORLD WHERE PRIVACY
IS FADING AWAY
447
00:25:14,267 --> 00:25:17,333
AND EVERYTHING IS
OPEN TO ATTACK,
448
00:25:17,333 --> 00:25:22,933
CAN THERE EVER AGAIN
BE SUCH A THING AS... A SECRET?
449
00:25:26,933 --> 00:25:28,333
DURING THE COLD WAR,
450
00:25:28,333 --> 00:25:30,567
THE SOVIET UNION
AND THE UNITED STATES
451
00:25:30,567 --> 00:25:33,967
WERE LOCKED
IN A NUCLEAR ARMS RACE.
452
00:25:33,967 --> 00:25:36,767
THE PHILOSOPHY BEHIND IT
WAS M.A.D.,
453
00:25:36,767 --> 00:25:41,300
WHICH STOOD FOR
"MUTUALLY ASSURED DESTRUCTION."
454
00:25:41,300 --> 00:25:44,067
TODAY'S ARMS RACE
COULD BE CALLED
455
00:25:44,067 --> 00:25:47,233
"MUTUALLY ASSURED DECRYPTION."
456
00:25:47,233 --> 00:25:49,100
COMPUTER NETWORKS DEVELOP
457
00:25:49,100 --> 00:25:52,400
EVER-MORE SECURE
ENCRYPTION SCHEMES,
458
00:25:52,400 --> 00:25:54,633
AND EVER-MORE POWERFUL
ATTACK NETWORKS
459
00:25:54,633 --> 00:25:57,667
FIGURE OUT
HOW TO CRACK THEM.
460
00:25:57,667 --> 00:26:03,467
BUT THERE MAY BE A WAY TO STOP
THIS MADNESS BY CREATING A CODE
461
00:26:03,467 --> 00:26:07,100
THAT CAN NEVER BE CRACKED.
462
00:26:10,867 --> 00:26:14,133
ROARKE HORSTMEYER
IS A CRYPTOGRAPHIC RESEARCHER
463
00:26:14,133 --> 00:26:16,067
AT CALTECH.
464
00:26:16,067 --> 00:26:20,633
THOUGH HE WORKS WITH COMPUTERS,
HE FOLLOWS AN ANCIENT QUEST.
465
00:26:20,633 --> 00:26:24,100
ROARKE SEEKS THE PERFECT CODE,
466
00:26:24,100 --> 00:26:27,900
A FOOLPROOF WAY
TO KEEP SECRETS SECRET.
467
00:26:27,900 --> 00:26:30,367
SO THIS IS AN EXAMPLE
OF A SECRET CODE.
468
00:26:30,367 --> 00:26:32,867
AND RIGHT NOW,
IT DOESN'T LOOK LIKE ANYTHING.
469
00:26:32,867 --> 00:26:36,300
Freeman:
MOST OF US SEE RANDOM LETTERS,
470
00:26:36,300 --> 00:26:41,067
BUT AN EXPERT SEES A MESSAGE
ENCRYPTED WITH A CAESAR CIPHER,
471
00:26:41,067 --> 00:26:43,167
NAMED AFTER JULIUS CAESAR,
472
00:26:43,167 --> 00:26:47,200
WHO USED IT
FOR CLANDESTINE COMMUNICATIONS.
473
00:26:47,200 --> 00:26:48,733
THE WAY YOU CRACK
A CAESAR CIPHER IS YOU JUST LOOK
474
00:26:48,733 --> 00:26:51,467
FOR THE MOST FREQUENT LETTER.
475
00:26:51,467 --> 00:26:54,133
SO HERE, "I" IS THE MOST
COMMON LETTER.
476
00:26:54,133 --> 00:26:57,067
AND YOU KNOW THAT "E"
IS THE MOST COMMON LETTER
477
00:26:57,067 --> 00:26:58,833
THAT APPEARS IN
THE ENGLISH LANGUAGE.
478
00:26:58,833 --> 00:27:02,600
SO I CAN MATCH "I" TO "E,"
AND THEN I CAN COUNT
479
00:27:02,600 --> 00:27:06,333
AND SEE THAT THAT'S
FOUR LETTERS CHANGED.
480
00:27:06,333 --> 00:27:09,900
REPEATING THE SAME FOR "X,"
I CAN COUNT BACK FOUR LETTERS
481
00:27:09,900 --> 00:27:11,900
AND SEE IT MIGHT BE
REPRESENTING "T."
482
00:27:11,900 --> 00:27:16,067
X-L-I IS BEING CONVERTED
TO "THE."
483
00:27:16,067 --> 00:27:18,267
Freeman: LETTER TRANSPOSITION
CODES WERE HIGH-TECH
484
00:27:18,267 --> 00:27:20,100
IN THE ROMAN EMPIRE,
485
00:27:20,100 --> 00:27:22,967
BUT IN THIS AGE
OF COMPUTATIONAL POWER,
486
00:27:22,967 --> 00:27:25,767
THEY ARE TRIVIALLY EASY
TO BREAK.
487
00:27:29,700 --> 00:27:32,733
THE MODERN GOLD STANDARD
OF CRYPTOGRAPHY
488
00:27:32,733 --> 00:27:35,067
IS THE ONE-TIME PAD.
489
00:27:35,067 --> 00:27:38,333
THIS TECHNIQUE ADDS OR SUBTRACTS
A DIFFERENT VALUE
490
00:27:38,333 --> 00:27:40,767
FOR EVERY SINGLE LETTER
OF A MESSAGE.
491
00:27:40,767 --> 00:27:42,533
THE WAY IT WORKS IS,
492
00:27:42,533 --> 00:27:45,900
FOR EACH LETTER OF WHAT
YOU'RE TRYING TO KEEP SECRET,
493
00:27:45,900 --> 00:27:48,967
YOU CHOOSE A DIFFERENT
AND RANDOM NUMBER
494
00:27:48,967 --> 00:27:50,533
TO PERMUTE THAT LETTER.
495
00:27:50,533 --> 00:27:54,467
Freeman: ESSENTIALLY, EACH
LETTER HAS A DIFFERENT CODE,
496
00:27:54,467 --> 00:27:57,367
SO GUESSING ONE LETTER
WON'T HELP YOU FIGURE OUT
497
00:27:57,367 --> 00:27:59,800
ANY OF THE OTHER LETTERS
IN THE MESSAGE.
498
00:27:59,800 --> 00:28:02,767
ONLY SOMEONE WITH ACCESS
TO THE ONE-TIME PAD,
499
00:28:02,767 --> 00:28:07,333
THE CODE BOOK ITSELF, WOULD BE
ABLE TO MAKE ANY SENSE OF THIS.
500
00:28:07,333 --> 00:28:12,300
BUT EVEN THIS TECHNICALLY
PERFECT CODE CAN BE CRACKED.
501
00:28:12,300 --> 00:28:15,533
THE ONE-TIME PADS USED BY
GOVERNMENTS AND BUSINESSES
502
00:28:15,533 --> 00:28:19,367
TO PROTECT THEIR SECRETS RELY ON
SPECIALIZED MACHINES
503
00:28:19,367 --> 00:28:21,433
THAT GENERATE RANDOM NUMBERS.
504
00:28:21,433 --> 00:28:25,200
BUT EDWARD SNOWDEN REVEALED
THE N.S.A.
505
00:28:25,200 --> 00:28:27,867
HAS COMPROMISED THOSE MACHINES.
506
00:28:27,867 --> 00:28:32,300
THE RANDOM NUMBERS THEY GENERATE
ARE NOT ACTUALLY RANDOM,
507
00:28:32,300 --> 00:28:35,267
SO THE N.S.A. CAN CRACK EVEN
THESE THEORETICALLY
508
00:28:35,267 --> 00:28:37,667
UNCRACKABLE CODES.
509
00:28:37,667 --> 00:28:40,900
AS MORE INFORMATION ABOUT WHAT
THE N.S.A. HAS BEEN
510
00:28:40,900 --> 00:28:42,867
AND IS CAPABLE OF HAS COME OUT,
511
00:28:42,867 --> 00:28:45,100
IT'S BEEN A BIG MOTIVATING
FACTOR, I THINK,
512
00:28:45,100 --> 00:28:47,500
TO A LOT OF CRYPTOGRAPHY
OVER THE LAST YEAR.
513
00:28:49,500 --> 00:28:51,733
Freeman: ROARKE AND HIS
COLLEAGUES WENT SEARCHING FOR
514
00:28:51,733 --> 00:28:54,533
AN IDEAL GENERATOR
OF RANDOMNESS,
515
00:28:54,533 --> 00:28:57,867
AND THEY FOUND IT IN LIGHT.
516
00:28:57,867 --> 00:29:01,233
WE REALIZED, OR SAW,
ACTUALLY, VISUALLY,
517
00:29:01,233 --> 00:29:04,567
HOW RANDOM LIGHT CAN BEHAVE
WHEN IT INTERACTS
518
00:29:04,567 --> 00:29:09,233
WITH DISORDERED PARTICLES,
LIKE IN DRIED SPRAY PAINT.
519
00:29:09,233 --> 00:29:13,533
SO IT'S EASY TO CREATE A LOT OF
RANDOMNESS BY SHINING LIGHT
520
00:29:13,533 --> 00:29:17,400
ON SCATTERING PARTICLES.
521
00:29:17,400 --> 00:29:18,933
Freeman: USING LASERS,
522
00:29:18,933 --> 00:29:21,067
ROARKE DIRECTS A BEAM OF LIGHT
THROUGH A SHEET OF
523
00:29:21,067 --> 00:29:24,067
POLYMER-DISPERSED
LIQUID CRYSTAL.
524
00:29:24,067 --> 00:29:26,333
IT'S A VARIATION ON
THE L.C.D. DISPLAY
525
00:29:26,333 --> 00:29:30,567
YOU MIGHT FIND
IN A LAPTOP SCREEN.
526
00:29:30,567 --> 00:29:31,967
Horstmeyer:
WE CREATE OUR ONE-TIME PAD
527
00:29:31,967 --> 00:29:37,167
BY SHINING LASER LIGHT THROUGH
OUR SCATTERING MATERIAL.
528
00:29:37,167 --> 00:29:40,600
THE LASER ILLUMINATES
THE SCATTERING MATERIAL,
529
00:29:40,600 --> 00:29:42,933
THE LIGHT SCATTERS
THROUGH IT RANDOMLY,
530
00:29:42,933 --> 00:29:46,067
AND THEN EMERGES ON THE OTHER
SIDE AS AN INTERFERENCE PATTERN.
531
00:29:46,067 --> 00:29:49,400
Freeman: ONCE THE UNIQUE PATTERN
IS CREATED,
532
00:29:49,400 --> 00:29:52,067
YOU CAN TURN IT INTO A CODE.
533
00:29:52,067 --> 00:29:55,067
EVERY LETTER OR NUMERICAL
CHARACTER IS REPRESENTED
534
00:29:55,067 --> 00:29:58,700
BY LIGHT OR DARK SPOTS
IN THE POLYMER.
535
00:29:58,700 --> 00:30:02,667
EACH SQUARE MICROMETER
OF RANDOM PATTERN IN THE POLYMER
536
00:30:02,667 --> 00:30:05,267
PROVIDES ENOUGH
LIGHT AND DARK SPOTS
537
00:30:05,267 --> 00:30:10,600
TO EMBED MILLIONS OF CODE WORDS.
538
00:30:10,600 --> 00:30:14,333
SAY TWO SPIES CREATE
A SHARED CODE PATTERN.
539
00:30:14,333 --> 00:30:17,900
THEN THEY SEPARATE,
NEVER TO MEET AGAIN.
540
00:30:17,900 --> 00:30:21,700
THE FIRST SPY ENCODES A MESSAGE
WITH HIS PIECE OF POLYMER
541
00:30:21,700 --> 00:30:24,900
AND SENDS IT TO THE OTHER SPY.
542
00:30:24,900 --> 00:30:27,967
SPY NUMBER TWO RECEIVES
THE ENCODED COMMUNICATION
543
00:30:27,967 --> 00:30:31,433
AND TAKES OUT HIS PIECE
OF POLYMER TO VIEW IT.
544
00:30:31,433 --> 00:30:34,267
WHEN HE SUBTRACTS THE SHARED
PATTERN FROM THE CODE,
545
00:30:34,267 --> 00:30:37,200
HE CAN READ THE SECRET MESSAGE.
546
00:30:37,200 --> 00:30:39,867
BUT UNLIKE A CONVENTIONAL
ONE-TIME PAD,
547
00:30:39,867 --> 00:30:42,500
THIS CODE CAN'T BE DUPLICATED.
548
00:30:42,500 --> 00:30:45,467
THE THREE-DIMENSIONAL LAYERS
OF CRYSTALS EMBEDDED
549
00:30:45,467 --> 00:30:50,133
IN THE POLYMER SHEET CANNOT BE
CAPTURED BY A PHOTOGRAPH.
550
00:30:50,133 --> 00:30:52,400
THE RANDOMNESS DOESN'T JUST
EXIST ON THE SURFACE
551
00:30:52,400 --> 00:30:53,733
OF THE MATERIAL.
552
00:30:53,733 --> 00:30:55,600
IT EXISTS INSIDE THE MATERIAL.
553
00:30:55,600 --> 00:30:59,433
AND ANY ATTEMPT TO GET INSIDE
THE VOLUME WILL DESTROY IT,
554
00:30:59,433 --> 00:31:01,600
OR CHANGE THE WAY IT BEHAVES,
ESSENTIALLY.
555
00:31:01,600 --> 00:31:04,867
Freeman: AN UNBREAKABLE CODE
COULD SHORE UP
556
00:31:04,867 --> 00:31:07,433
ALL OF A SUPERPOWER'S
CRITICAL NETWORKS
557
00:31:07,433 --> 00:31:10,867
AGAINST INFILTRATION
BY ENEMIES OF THE STATE.
558
00:31:10,867 --> 00:31:13,100
BUT HUMANS, NOT TECHNOLOGY,
559
00:31:13,100 --> 00:31:18,400
HAVE ALWAYS BEEN THE WEAKEST
LINK IN SECURITY SYSTEMS.
560
00:31:18,400 --> 00:31:20,467
WHAT IF THE ASSAULT
ON OUR SOCIETY
561
00:31:20,467 --> 00:31:23,100
IS MORE INSIDIOUS
THAN TERRORISM?
562
00:31:23,100 --> 00:31:27,233
SO SUBTLE, IN FACT, THAT WE MAY
NOT REALIZE IT'S EVEN HAPPENING?
563
00:31:30,967 --> 00:31:33,200
A SUPERPOWER WOULD REEL
FROM SUCCESSFUL ATTACKS
564
00:31:33,200 --> 00:31:38,733
ON ITS BRIDGES, ITS ELECTRICAL
GRID OR ITS WATER SUPPLY.
565
00:31:38,733 --> 00:31:42,433
BUT WHAT IF AN ATTACK
IS ALREADY UNDERWAY?
566
00:31:42,433 --> 00:31:47,600
AN ATTACK NOT ON PHYSICAL
OBJECTS BUT ON SOCIETY ITSELF?
567
00:31:47,600 --> 00:31:50,900
AN ATTACK FROM WITHIN?
568
00:31:50,900 --> 00:31:53,367
IS OUR ADDICTION TO THE INTERNET
569
00:31:53,367 --> 00:31:56,800
SOWING THE SEEDS
OF OUR DESTRUCTION?
570
00:31:57,800 --> 00:32:01,567
[ SEABIRD CRYING ]
571
00:32:01,567 --> 00:32:03,433
THE CAMPUS OF SWANSEA UNIVERSITY
572
00:32:03,433 --> 00:32:08,200
SITS ON THE PICTURESQUE
COASTLINE OF SOUTHWESTERN WALES.
573
00:32:08,200 --> 00:32:10,467
BUT LIKE COLLEGE STUDENTS
EVERYWHERE,
574
00:32:10,467 --> 00:32:12,867
THESE YOUNG MEN AND WOMEN
ARE MORE ABSORBED
575
00:32:12,867 --> 00:32:17,067
IN THE DIGITAL WORLD THAN
THE NATURAL WORLD.
576
00:32:17,067 --> 00:32:20,167
MOST OF THEM WERE BORN
IN THE 1990s.
577
00:32:20,167 --> 00:32:23,167
THEY DON'T KNOW LIFE
WITHOUT THE INTERNET.
578
00:32:23,167 --> 00:32:26,267
AND FOR SOME OF THEM,
BEING OFFLINE WOULD BE
579
00:32:26,267 --> 00:32:29,500
PHYSICALLY
AND EMOTIONALLY TRAUMATIC,
580
00:32:29,500 --> 00:32:32,733
BECAUSE THE INTERNET REWRITES
THE BRAIN
581
00:32:32,733 --> 00:32:36,333
AS MUCH AS ECSTASY OR HEROIN.
582
00:32:36,333 --> 00:32:40,900
PROFESSOR PHIL REED HAS WORKED
FOR YEARS FINDING TREATMENTS
583
00:32:40,900 --> 00:32:43,067
FOR AUTISM AND DRUG ADDICTION.
584
00:32:43,067 --> 00:32:46,167
BUT A FEW YEARS AGO,
HE NOTICED A DISORDER
585
00:32:46,167 --> 00:32:48,900
THAT IS JUST AS WIDESPREAD --
586
00:32:48,900 --> 00:32:54,067
THE EFFECT TECHNOLOGY IS HAVING
ON OUR MINDS AND BODIES.
587
00:32:54,067 --> 00:32:57,067
NOW, I THINK THE INTERNET
IS REALLY SOMETHING NEW HERE,
588
00:32:57,067 --> 00:33:01,633
BECAUSE WHAT WE'RE SEEING
IS A PIECE OF TECHNOLOGY
589
00:33:01,633 --> 00:33:06,133
THAT IS ALMOST DESIGNED
TO ISOLATE INDIVIDUALS.
590
00:33:06,133 --> 00:33:08,567
IF YOU WERE TO CHANGE THE WAY
SOCIETY WORKED,
591
00:33:08,567 --> 00:33:10,533
THIS WOULD BE
A REALLY GOOD WAY TO DO IT.
592
00:33:11,767 --> 00:33:14,233
Freeman: PHIL WANTED TO FIND OUT
IF THE INTERNET
593
00:33:14,233 --> 00:33:18,467
IS ADDICTIVE ENOUGH TO
CAUSE WITHDRAWAL SYMPTOMS.
594
00:33:20,100 --> 00:33:24,267
FIRST, HE TESTED THE MENTAL
STATE OF PARTICIPANTS BEFORE
595
00:33:24,267 --> 00:33:27,133
AND AFTER THEY SPENT TIME
ONLINE.
596
00:33:27,133 --> 00:33:31,733
HE FOUND HEAVY USERS EXPERIENCED
PROFOUND NEGATIVE MOOD SWINGS
597
00:33:31,733 --> 00:33:35,100
WHEN THEY'RE CUT OFF
FROM THE NET.
598
00:33:35,100 --> 00:33:37,900
BUT THE IMPACT OF WITHDRAWAL
GOES DEEPER
599
00:33:37,900 --> 00:33:40,767
THAN SPOILING PEOPLE'S MOODS.
600
00:33:40,767 --> 00:33:44,633
SHUTTING DOWN THE INTERNET
CONNECTION TRIGGERS THE BODY'S
601
00:33:44,633 --> 00:33:48,300
FIGHT-OR-FLIGHT RESPONSE.
602
00:33:48,300 --> 00:33:52,133
SO WE'RE LOOKING AT THEIR HEART
RATE, THEIR BLOOD PRESSURE,
603
00:33:52,133 --> 00:33:53,900
THE GALVANIC SKIN RESPONSE.
604
00:33:53,900 --> 00:33:58,567
IT'S LIKE THEY'RE FACING
A THREAT ALL OF THE TIME.
605
00:33:58,567 --> 00:34:01,200
THEIR HEART RATE'S GONE UP.
THEIR BLOOD PRESSURE'S GONE UP.
606
00:34:01,200 --> 00:34:03,967
THEIR SKIN CONDUCTANCE IS HIGH.
607
00:34:03,967 --> 00:34:07,800
IT'S SUGGESTING THAT LONG-TERM
EXPOSURE TO THE 'NET
608
00:34:07,800 --> 00:34:11,267
MIGHT ACTUALLY BE PLACING
A STRAIN ON PEOPLE'S PHYSIOLOGY.
609
00:34:14,067 --> 00:34:18,333
THEY MIGHT FEEL RELAXED,
BUT IN FACT, THEY'RE HYPED UP.
610
00:34:18,333 --> 00:34:21,367
Freeman: BUT THE MOST DISTURBING
EFFECT OF INTERNET ADDICTION
611
00:34:21,367 --> 00:34:24,967
IS WHAT IT DOES
INSIDE THE BRAIN.
612
00:34:24,967 --> 00:34:27,833
PHIL AND OTHER RESEARCHERS HAVE
BEEN SCANNING THE BRAINS
613
00:34:27,833 --> 00:34:32,333
OF HEAVY INTERNET USERS AND
FINDING DISTURBING ALTERATIONS
614
00:34:32,333 --> 00:34:34,467
IN THEIR MENTAL ARCHITECTURE.
615
00:34:34,467 --> 00:34:38,333
IN TERMS OF WHERE WE'RE SEEING
CHANGES IN BRAIN MATTER,
616
00:34:38,333 --> 00:34:41,433
WE'RE SEEING THEM UP
AT THE FRONT, HERE, UM,
617
00:34:41,433 --> 00:34:45,167
ESPECIALLY PRE-FRONTAL CORTEX,
BUT ALSO CORTICAL CHANGES,
618
00:34:45,167 --> 00:34:49,533
BUT ALSO DOWN THE SIDE, IN TERMS
OF THE MOTOR AREAS OF THE BRAIN.
619
00:34:49,533 --> 00:34:51,300
SO WE'VE GOT CHANGES ALL OVER.
620
00:34:51,300 --> 00:34:54,733
Freeman: PEOPLE WHO SURF THE WEB
10 HOURS A DAY
621
00:34:54,733 --> 00:34:58,633
CAN EXPERIENCE A 10% SHRINKAGE
IN KEY BRAIN REGIONS,
622
00:34:58,633 --> 00:35:00,700
ACCORDING TO ONE STUDY.
623
00:35:00,700 --> 00:35:02,533
THAT'S THE KIND OF DAMAGE
YOU MIGHT GET
624
00:35:02,533 --> 00:35:06,367
FROM A SERIOUS CASE
OF MENINGITIS.
625
00:35:06,367 --> 00:35:12,333
IT WOULD PERMANENTLY CHANGE
HOW YOU THINK AND BEHAVE.
626
00:35:16,233 --> 00:35:20,933
Reed: ANY NEW TECHNOLOGY CAN BE
REGARDED LIKE AN ALIEN PARASITE,
627
00:35:20,933 --> 00:35:23,200
AND THAT GOES FOR ANYTHING
THAT WE USE.
628
00:35:23,200 --> 00:35:26,500
WE THINK IT'S SERVING US,
AND INITIALLY, IT DOES.
629
00:35:26,500 --> 00:35:29,267
BUT EVENTUALLY,
OUR SOCIETY AND OURSELVES,
630
00:35:29,267 --> 00:35:31,800
WE BECOME DEPENDENT ON IT.
631
00:35:31,800 --> 00:35:35,900
Freeman: THE INTERNET IS NOW AN
ESSENTIAL TOOL IN EVERY POWERFUL
632
00:35:35,900 --> 00:35:38,267
NATION ON EARTH.
633
00:35:38,267 --> 00:35:40,500
BUT ITS MANY BENEFITS COME
WITH SIDE EFFECTS
634
00:35:40,500 --> 00:35:45,100
THAT COULD SHATTER SOCIETY.
635
00:35:45,100 --> 00:35:48,233
WILL IT ULTIMATELY
PROVE A FORCE FOR GOOD?
636
00:35:48,233 --> 00:35:52,133
OR WILL IT BE THE TOOL
OF OUR SELF-DESTRUCTION?
637
00:35:52,133 --> 00:35:53,967
WE DON'T KNOW.
638
00:35:53,967 --> 00:35:57,167
ESSENTIALLY,
WE ARE RUNNING A BETA TEST
639
00:35:57,167 --> 00:35:58,767
ON THE POPULATION OF EARTH.
640
00:35:58,767 --> 00:36:00,433
IF YOU WERE DESIGNING
AN AIRCRAFT,
641
00:36:00,433 --> 00:36:02,300
YOU'D HAVE BACKUP SYSTEMS.
642
00:36:02,300 --> 00:36:06,333
WE NEVER DO THAT WITH SOCIETY.
WE NEVER HAVE A BACKUP SYSTEM.
643
00:36:06,333 --> 00:36:07,667
IT'S ALL OR NOTHING,
644
00:36:07,667 --> 00:36:09,700
AND THE WAY WE SEEM
TO HAVE GONE IS DIGITAL.
645
00:36:09,700 --> 00:36:11,633
Freeman:
AN ADDICTION TO TECHNOLOGY
646
00:36:11,633 --> 00:36:14,833
MAY BE THE GREATEST WEAKNESS
OF A SUPERPOWER.
647
00:36:14,833 --> 00:36:18,300
BY TRYING TO IMPROVE OUR LIVES
WITH MACHINES,
648
00:36:18,300 --> 00:36:22,500
WE MAY LOSE OURSELVES
IN SOFTWARE.
649
00:36:22,500 --> 00:36:25,433
AND THERE'S ONE MORE THING
TO CONSIDER.
650
00:36:25,433 --> 00:36:28,467
WHAT IF THE INTERNET WAKES UP?
651
00:36:28,467 --> 00:36:31,667
COULD AN ALL-POWERFUL
DIGITAL CONSCIOUSNESS
652
00:36:31,667 --> 00:36:33,900
BECOME THE FINAL SUPERPOWER?
653
00:36:38,067 --> 00:36:41,800
OUR SOCIETY IS UNDER THREAT
ON MANY FRONTS.
654
00:36:41,800 --> 00:36:45,233
TERRORISTS COULD ATTACK
OUR TIME SERVICE,
655
00:36:45,233 --> 00:36:47,233
THEY COULD DISRUPT
THE POWER GRID
656
00:36:47,233 --> 00:36:52,567
OR THE WATER SUPPLY NETWORK
OR OUR SATELLITE LINKS.
657
00:36:52,567 --> 00:36:54,967
BUT WE SHOULD BE CAREFUL NOT
TO FOCUS TOO CLOSELY
658
00:36:54,967 --> 00:36:58,300
ON THESE INDIVIDUAL THREATS.
659
00:36:58,300 --> 00:37:03,567
WE MAY BE STARING AT THE TREES
AND MISSING THE FOREST.
660
00:37:03,567 --> 00:37:09,067
THE REAL THREAT COULD BE
THE INTERNET ITSELF.
661
00:37:13,600 --> 00:37:17,367
CHRISTOF KOCH IS ONE OF
THE FOREMOST NEUROBIOLOGISTS
662
00:37:17,367 --> 00:37:18,800
IN THE WORLD.
663
00:37:18,800 --> 00:37:21,433
HE IS CHIEF SCIENTIST
AT PAUL ALLEN INSTITUTE
664
00:37:21,433 --> 00:37:24,400
FOR BRAIN RESEARCH IN SEATTLE.
665
00:37:24,400 --> 00:37:28,400
FOR CHRISTOF, THE MIND IS PURELY
A PRODUCT OF THE WEB
666
00:37:28,400 --> 00:37:31,300
OF NEURONS IN THE BRAIN.
667
00:37:31,300 --> 00:37:33,767
SO IF THE INTERNET WERE A BRAIN,
668
00:37:33,767 --> 00:37:38,867
HOW WOULD ITS COMPLEXITY
STACK UP AGAINST A HUMAN BRAIN?
669
00:37:38,867 --> 00:37:40,100
THE INTERNET IS, BY FAR,
670
00:37:40,100 --> 00:37:43,067
THE MOST COMPLEX ARTIFACT
EVER BUILT BY MANKIND.
671
00:37:43,067 --> 00:37:47,567
IT HAS ON THE ORDER OF PROBABLY
10,000 MORE TRANSISTORS
672
00:37:47,567 --> 00:37:50,100
THAN THERE ARE SYNAPSES
IN YOUR TYPICAL BRAIN.
673
00:37:50,100 --> 00:37:52,533
IT CERTAINLY RAISES
THE POSSIBILITY,
674
00:37:52,533 --> 00:37:55,067
GIVEN THE ENORMOUS
COMPLEXITY OF THE INTERNET,
675
00:37:55,067 --> 00:37:57,200
THAT NOW,
OR SOMETIME IN THE FUTURE,
676
00:37:57,200 --> 00:37:59,500
IT MAY FEEL LIKE SOMETHING TO BE
THE INTERNET,
677
00:37:59,500 --> 00:38:02,767
THAT THE INTERNET ITSELF
HAS SOME DEGREE OF SENTIENCE.
678
00:38:05,400 --> 00:38:08,467
Freeman: SOME SAY THE INTERNET
MAY ALREADY BE SENTIENT
679
00:38:08,467 --> 00:38:12,267
OR SELF-AWARE, BUT ITS LEVEL OF
CONSCIOUSNESS MAY BE SIMILAR
680
00:38:12,267 --> 00:38:14,133
TO THAT OF A NEWBORN.
681
00:38:14,133 --> 00:38:17,500
LET'S SAY THE INTERNET
HAS SOME SORT OF DIM AWARENESS.
682
00:38:17,500 --> 00:38:20,600
WE HAVE TO ASK HOW INTELLIGENT
IS THAT AWARENESS.
683
00:38:20,600 --> 00:38:21,833
YOU KNOW,
IF YOU'RE A LITTLE BABY,
684
00:38:21,833 --> 00:38:23,900
YOU CAN BE SOMEWHAT DIMLY
AWARE OF YOUR MOM,
685
00:38:23,900 --> 00:38:25,933
AND THAT YOU'RE HUNGRY, AND THAT
YOU'RE LOOKING FOR MILK,
686
00:38:25,933 --> 00:38:27,400
BUT YOU'RE NOT REALLY
VERY INTELLIGENT
687
00:38:27,400 --> 00:38:29,367
AND YOU'RE NOT ABLE TO DO A LOT.
688
00:38:29,367 --> 00:38:30,567
Freeman: BUT PRESUMABLY,
689
00:38:30,567 --> 00:38:33,533
THE INTERNET WILL LEARN
AND EVOLVE.
690
00:38:33,533 --> 00:38:35,800
IT WILL GROW UP.
691
00:38:35,800 --> 00:38:40,267
IF IT DOES, HOW WILL WE KNOW
WHEN IT HAS BECOME MORE THAN
692
00:38:40,267 --> 00:38:43,667
JUST A GLORIFIED CALCULATOR?
693
00:38:43,667 --> 00:38:49,167
ONE WAY TO GAUGE CONSCIOUSNESS
IS TO APPLY THE TURING TEST.
694
00:38:49,167 --> 00:38:54,333
THIS IMAGINES ASKING A MAN AND
A MACHINE A SERIES OF QUESTIONS
695
00:38:54,333 --> 00:38:58,633
WITHOUT KNOWING WHO OR WHAT IS
GIVING THE ANSWERS.
696
00:38:58,633 --> 00:39:01,500
IF YOU CAN'T FIGURE OUT
WHICH ONE IS THE MACHINE,
697
00:39:01,500 --> 00:39:04,800
IF THE MACHINE HAS FOOLED YOU
INTO THINKING IT IS HUMAN,
698
00:39:04,800 --> 00:39:10,067
THEN FOR ALL PRACTICAL PURPOSES,
IT MIGHT AS WELL BE INTELLIGENT.
699
00:39:10,067 --> 00:39:14,067
WHERE DO I LOOK? AT YOU?
AT ME.
700
00:39:14,067 --> 00:39:15,967
[ SHUTTER CLICKS ]
701
00:39:15,967 --> 00:39:17,467
Freeman: CHRISTOF PROPOSES
A NEW, IMPROVED TURING TEST
702
00:39:17,467 --> 00:39:21,933
THAT MEASURES NOT JUST
INTELLIGENCE,
703
00:39:21,933 --> 00:39:23,967
BUT CONSCIOUSNESS.
704
00:39:23,967 --> 00:39:26,067
THE TEST USES VISUAL IMAGERY.
705
00:39:26,067 --> 00:39:29,933
THE COMPUTER MUST DECIDE WHETHER
A SERIES OF PHOTOGRAPHS
706
00:39:29,933 --> 00:39:32,833
ARE RIGHT OR WRONG.
707
00:39:32,833 --> 00:39:35,333
ANY HUMANS LOOKING AT THESE
PHOTOGRAPHS WOULD KNOW
708
00:39:35,333 --> 00:39:37,567
THEY ARE NOT REAL,
709
00:39:37,567 --> 00:39:41,800
BUT MODERN DAY COMPUTERS
ARE STILL EASILY FOOLED.
710
00:39:41,800 --> 00:39:45,200
A COMPUTER, UNLESS YOU PROVIDE
IT WITH A VERY, VERY LARGE LIST,
711
00:39:45,200 --> 00:39:47,667
AN ALMOST INFINITE LARGE LIST
OF ALL THE EXCEPTIONS,
712
00:39:47,667 --> 00:39:49,267
COULD NOT DEAL WITH THAT.
713
00:39:49,267 --> 00:39:51,067
AND THAT'S THE BASIC NATURE
OF THIS TURING TEST
714
00:39:51,067 --> 00:39:52,800
FOR VISUAL CONSCIOUSNESS.
715
00:39:52,800 --> 00:39:55,267
Freeman: CHRISTOF WANTS TO
APPLY THIS TEST
716
00:39:55,267 --> 00:39:57,533
TO THE ENTIRE INTERNET.
717
00:39:57,533 --> 00:40:01,433
IF THE VAST GLOBAL NETWORK
OF COMPUTERS PASSES THE TEST,
718
00:40:01,433 --> 00:40:05,600
BY HIS DEFINITION,
IT IS AWAKE AND AWARE.
719
00:40:05,600 --> 00:40:08,200
BUT WHAT IF THE INTERNET
IS CONSCIOUS?
720
00:40:08,200 --> 00:40:11,200
WHAT WOULD IT WANT?
HOW WILL IT BEHAVE?
721
00:40:11,200 --> 00:40:16,467
WILL IT BE FRIEND OR FOE,
SERVANT OR MASTER?
722
00:40:16,467 --> 00:40:19,233
TO THE EXTENT THAT THE INTERNET
DEVELOPED INDEPENDENT BEHAVIORS
723
00:40:19,233 --> 00:40:21,200
WOULD BE SCARY,
COULD BE VERY SCARY.
724
00:40:21,200 --> 00:40:25,067
OF COURSE, IT COULD HAVE ALL
SORTS OF SECURITY IMPLICATION.
725
00:40:25,067 --> 00:40:27,033
TO THAT EXTENT, THAT WOULD
CERTAINLY BE A SIGNAL THAT
726
00:40:27,033 --> 00:40:29,433
THERE'S SOMETHING INDEPENDENT,
AUTONOMOUS THERE.
727
00:40:29,433 --> 00:40:34,000
Freeman: IF THE INTERNET BEGINS
TO DO UNPREDICTABLE THINGS,
728
00:40:34,000 --> 00:40:37,767
WE WILL KNOW WE ARE DEALING
WITH A NEW FORM OF LIFE.
729
00:40:37,767 --> 00:40:40,167
IT MAY EVEN FOLLOW AN IMPORTANT
PRECEDENT
730
00:40:40,167 --> 00:40:43,700
IN THE BIOLOGICAL HISTORY
OF PLANET EARTH --
731
00:40:43,700 --> 00:40:47,733
THE ABSORPTION OF SMALLER,
SIMPLER LIFE FORMS
732
00:40:47,733 --> 00:40:52,333
INTO THE BODIES OF LARGER,
MORE COMPLEX ONES.
733
00:40:52,333 --> 00:40:56,833
THE FUTURE OF HUMANITY MAY BE
SIMILAR TO THAT OF MITOCHONDRIA,
734
00:40:56,833 --> 00:41:01,433
THE POWER GENERATORS INSIDE MOST
BIOLOGICAL CELLS.
735
00:41:01,433 --> 00:41:05,567
MITOCHONDRIA WERE ONCE
INDEPENDENT ORGANISMS,
736
00:41:05,567 --> 00:41:07,500
BUT OVER EVOLUTIONARY HISTORY,
737
00:41:07,500 --> 00:41:10,600
THEY WERE TAKEN OVER
BY LARGER CELLS.
738
00:41:10,600 --> 00:41:13,067
THE ONCE-INDEPENDENT
MITOCHONDRIA
739
00:41:13,067 --> 00:41:17,233
BECAME A MERE POWER SOURCE
FOR THEIR MASTERS.
740
00:41:17,233 --> 00:41:21,100
WE, AND THE CIVILIZATIONS WE NOW
THINK OF AS SUPERPOWERS,
741
00:41:21,100 --> 00:41:25,667
MAY BE ABSORBED BY
OUR OWN CREATION.
742
00:41:25,667 --> 00:41:31,233
BUT WHAT WOULD IT WANT FROM US,
OTHER THAN OCCASIONAL REPAIRS?
743
00:41:31,233 --> 00:41:34,067
PERHAPS IT WOULD WANT
OUR ENERGY.
744
00:41:34,067 --> 00:41:40,533
OR PERHAPS IT WILL DESIRE
THE ONE THING IT DOESN'T HAVE --
745
00:41:40,533 --> 00:41:42,800
A SOUL.
746
00:41:42,800 --> 00:41:43,933
THE SOUL IS REALLY SPOOKY.
747
00:41:43,933 --> 00:41:46,167
IF YOU CAN'T MEASURE IT,
WHY DO YOU NEED IT?
748
00:41:46,167 --> 00:41:49,800
WHAT FUNCTION DOES IT DO
THAT YOU CAN'T DO
749
00:41:49,800 --> 00:41:51,600
WITH PHYSICAL STUFF ANYMORE?
750
00:41:51,600 --> 00:41:53,600
SO TODAY, WITH THE EXISTENCE
OF COMPUTERS,
751
00:41:53,600 --> 00:41:55,167
THERE ISN'T ANY NEED
FOR SOUL STUFF,
752
00:41:55,167 --> 00:41:57,367
BECAUSE IT CAN ALL BE DONE
USING COMPUTATIONS,
753
00:41:57,367 --> 00:41:59,400
USING ALGORITHMS IN SOFTWARE.
754
00:41:59,400 --> 00:42:02,733
Freeman: A CONSCIOUS,
SUPERPOWERFUL INTERNET
755
00:42:02,733 --> 00:42:05,433
MAY NOT NEED A SOUL TO FUNCTION,
756
00:42:05,433 --> 00:42:08,900
BUT EXPERIENCING THE JOYS
AND SORROWS OF HUMANITY
757
00:42:08,900 --> 00:42:13,067
WOULD GIVE IT ANOTHER WAY
TO UNDERSTAND THE WORLD.
758
00:42:13,067 --> 00:42:16,700
SO OUR DEFINING DIFFERENCE
FROM TECHNOLOGY
759
00:42:16,700 --> 00:42:18,900
MAY ULTIMATELY KEEP
THE HUMAN RACE
760
00:42:18,900 --> 00:42:22,067
FROM BECOMING ITS VICTIM.
761
00:42:22,067 --> 00:42:24,800
THROUGHOUT HISTORY,
762
00:42:24,800 --> 00:42:30,467
EVERY TECHNOLOGICAL ADVANCE HAS
LED TO NEW FORMS OF WARFARE.
763
00:42:30,467 --> 00:42:34,333
THE BRONZE AGE GAVE US
THE AX AND THE SWORD.
764
00:42:34,333 --> 00:42:38,767
IRON GAVE US THE CANNON
AND THE GUN.
765
00:42:38,767 --> 00:42:43,600
THE INFORMATION AGE HAS BIRTHED
ITS OWN WEAPONS.
766
00:42:43,600 --> 00:42:45,633
BUT INFORMATION IS NOT
A PHYSICAL RESOURCE
767
00:42:45,633 --> 00:42:48,067
THAT CAN BE MINED
AND CONTROLLED,
768
00:42:48,067 --> 00:42:50,400
LIKE IRON AND BRONZE.
769
00:42:50,400 --> 00:42:53,367
IT'S A RESOURCE OF THE MIND.
770
00:42:53,367 --> 00:42:57,067
IN THIS NEW AGE,
THE FATE OF A NATION,
771
00:42:57,067 --> 00:43:02,867
EVEN THE MIGHTIEST SUPERPOWER
RESTS ON ONE THING --
772
00:43:02,867 --> 00:43:07,733
THE POWER OF HUMAN IMAGINATION.
63313
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.