All language subtitles for Through.the.Wormhole.with.Morgan.Freeman.S05E04.WEBRip.x264-FGT

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish Download
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:05,467 --> 00:00:07,533 Freeman: THE MOST POWERFUL NATIONS 2 00:00:07,533 --> 00:00:13,000 FEAR A NEW FORM OF WARFARE THAT COULD BRING THEM TO THEIR KNEES. 3 00:00:15,867 --> 00:00:18,833 IN THIS AGE WHERE ARMIES, GOVERNMENTS, AND ECONOMIES 4 00:00:18,833 --> 00:00:23,100 ALL DEPEND ON AN INTRICATE GLOBAL INFRASTRUCTURE, 5 00:00:23,100 --> 00:00:27,967 YOU DON'T NEED GUNS AND BOMBS TO BRING DOWN A SUPERPOWER. 6 00:00:27,967 --> 00:00:31,467 ALL YOU NEED IS IMAGINATION. 7 00:00:31,467 --> 00:00:35,033 [ COMPUTERS BEEPING ] 8 00:00:35,033 --> 00:00:41,100 SHIFT TIME BY A MILLIONTH OF A SECOND AND CREATE CHAOS. 9 00:00:41,100 --> 00:00:45,733 USE THE HUMAN BODY TO SPREAD A KILLER COMPUTER VIRUS. 10 00:00:45,733 --> 00:00:51,167 TURN THE TECHNOLOGY WE ARE ADDICTED TO AGAINST US. 11 00:00:51,167 --> 00:00:54,233 WILL HUMAN INGENUITY TRIUMPH? 12 00:00:54,233 --> 00:00:58,267 OR WILL OUR INGENUITY PROVE OUR UNDOING? 13 00:01:04,633 --> 00:01:09,500 Freeman: SPACE, TIME, LIFE ITSELF... 14 00:01:11,533 --> 00:01:16,067 THE SECRETS OF THE COSMOS LIE THROUGH THE WORMHOLE. 15 00:01:16,067 --> 00:01:19,067 -- Captions by VITAC -- www.vitac.com 16 00:01:19,067 --> 00:01:22,067 CAPTIONS PAID FOR BY DISCOVERY COMMUNICATIONS 17 00:01:29,067 --> 00:01:34,067 YOU AND I RELY ON OUR MODERN CIVILIZATION, 18 00:01:34,067 --> 00:01:36,433 BUT THERE ARE PLENTY OF PEOPLE WHO DON'T LIKE IT, 19 00:01:36,433 --> 00:01:38,633 FOR A VARIETY OF REASONS, 20 00:01:38,633 --> 00:01:43,233 RELIGION, POLITICS, OR MAYBE FEAR ABOUT OUR FUTURE. 21 00:01:43,233 --> 00:01:47,667 FOR NOW, LET'S CALL THESE PEOPLE "TERRORISTS." 22 00:01:47,667 --> 00:01:50,867 TERRORISTS DON'T FIGHT BY CONVENTIONAL MEANS. 23 00:01:50,867 --> 00:01:54,133 THEY STRIKE IN WAYS WE DON'T EXPECT. 24 00:01:54,133 --> 00:01:56,067 NOW, WE HAVE GIVEN THEM A WEAPON 25 00:01:56,067 --> 00:01:59,733 THAT COULD CHANGE THE GLOBAL BALANCE OF POWER. 26 00:01:59,733 --> 00:02:04,433 THE STABILITY OF THE U.S., EUROPE, CHINA, 27 00:02:04,433 --> 00:02:06,500 AND ANY GLOBAL POWER DEPENDS ON 28 00:02:06,500 --> 00:02:10,333 HIGH-SPEED DIGITAL COMMUNICATION. 29 00:02:10,333 --> 00:02:14,400 WITH A LITTLE IMAGINATION, COULD A FEW TERRORISTS SABOTAGE 30 00:02:14,400 --> 00:02:19,067 THIS MASSIVE NETWORK, CRIPPLE A MIGHTY NATION, 31 00:02:19,067 --> 00:02:25,767 PERHAPS EVEN TEAR DOWN MODERN CIVILIZATION? 32 00:02:25,767 --> 00:02:27,767 Man on radio: BATTER IS JACKIE ROBINSON. 33 00:02:27,767 --> 00:02:30,467 ONE BALL, ONE STRIKE. TWO ON, TWO OUT. 34 00:02:30,467 --> 00:02:32,700 Freeman: WHEN I WAS GROWING UP IN MISSISSIPPI, 35 00:02:32,700 --> 00:02:35,067 I LOVED TO LISTEN TO THE OLD BROOKLYN DODGERS 36 00:02:35,067 --> 00:02:41,267 BASEBALL GAMES, BROADCAST LIVE ALL THE WAY FROM NEW YORK. 37 00:02:41,267 --> 00:02:44,633 IT AMAZED ME TO THINK THAT MY FAMILY WAS CHEERING 38 00:02:44,633 --> 00:02:49,133 ONE OF JACKIE ROBINSON'S BIG HITS AT THE SAME INSTANT 39 00:02:49,133 --> 00:02:52,867 AS TENS OF THOUSANDS OF FANS AT EBBETS FIELD. 40 00:02:52,867 --> 00:02:54,467 WAY BACK, IT'S GONE! 41 00:02:54,467 --> 00:02:56,467 THAT'S A HOME RUN FOR JACKIE ROBINSON. 42 00:02:56,467 --> 00:02:59,433 INVISIBLE RADIO SIGNALS THAT CONNECTED MILLIONS OF PEOPLE 43 00:02:59,433 --> 00:03:02,367 AND SYNCHRONIZED US ALL. 44 00:03:02,367 --> 00:03:05,367 THEY'RE COMING OUT OF THE DUGOUT NOW TO SHAKE HANDS... 45 00:03:08,067 --> 00:03:12,067 TODAY, WE ARE MORE CONNECTED THAN EVER BEFORE. 46 00:03:12,067 --> 00:03:14,467 AND ALL THE MACHINES THAT CONNECT US, 47 00:03:14,467 --> 00:03:17,533 THE MACHINES THAT KEEP THE MODERN WORLD RUNNING, 48 00:03:17,533 --> 00:03:21,833 RELY ON PRECISELY SYNCHRONIZED TIME. 49 00:03:21,833 --> 00:03:25,067 BUT COULD TIME BE TURNED AGAINST US? 50 00:03:25,067 --> 00:03:28,067 THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 51 00:03:28,067 --> 00:03:30,900 IN BOULDER, COLORADO, IS THE HOME BASE 52 00:03:30,900 --> 00:03:34,300 OF PHYSICIST JUDAH LEVINE. 53 00:03:34,300 --> 00:03:37,800 WHENEVER YOU USE A COMPUTER OR YOUR CELL PHONE, 54 00:03:37,800 --> 00:03:41,133 YOU'RE TAPPING INTO JUDAH'S GREATEST CREATION, 55 00:03:41,133 --> 00:03:43,867 THE INTERNET TIME SERVICE. 56 00:03:43,867 --> 00:03:47,100 THE INTERNET TIME SERVICE SENDS OUT SIGNALS THAT LET COMPUTERS 57 00:03:47,100 --> 00:03:50,567 SYNCHRONIZE THEIR CLOCKS TO WITHIN A MILLIONTH OF A SECOND, 58 00:03:50,567 --> 00:03:54,067 AND THE NUMBER OF DEVICES THAT NEED PRECISE TIME 59 00:03:54,067 --> 00:03:56,733 IS SKYROCKETING. 60 00:03:56,733 --> 00:04:01,067 Levine: THE GROWTH HAS BEEN 5% PER MONTH, 61 00:04:01,067 --> 00:04:04,467 COMPOUNDED FOR 15 YEARS. 62 00:04:04,467 --> 00:04:08,467 AND SO, WE STARTED OUT WITH 50,000 REQUESTS A DAY, AND NOW, 63 00:04:08,467 --> 00:04:11,067 WE HAVE ABOUT SIX BILLION REQUESTS A DAY. 64 00:04:11,067 --> 00:04:14,300 Freeman: NO SINGLE CLOCK KEEPS TIME FOR THE WORLD. 65 00:04:14,300 --> 00:04:16,867 N.I.S.T. HAS A DOZEN, 66 00:04:16,867 --> 00:04:20,900 EACH MEASURING TIME IN DIFFERENT WAYS. 67 00:04:20,900 --> 00:04:24,067 THE ACCURACY OF JUDAH'S CLOCKS IS VITAL FOR CONTROLLING 68 00:04:24,067 --> 00:04:26,133 ELECTRIC POWER GRIDS, 69 00:04:26,133 --> 00:04:29,067 SYNCHRONIZING TELECOMMUNICATIONS NETWORKS, 70 00:04:29,067 --> 00:04:33,700 TIMING FINANCIAL TRANSACTIONS, AND PERHAPS MOST IMPORTANTLY, 71 00:04:33,700 --> 00:04:37,567 MAKING THE GLOBAL POSITIONING SYSTEM WORK. 72 00:04:37,567 --> 00:04:40,067 IMAGINE IF TERRORISTS THREW THOSE CLOCKS OFF 73 00:04:40,067 --> 00:04:42,633 BY JUST A TINY BIT. 74 00:04:42,633 --> 00:04:44,267 WHAT WOULD HAPPEN? 75 00:04:44,267 --> 00:04:46,967 Levine: THE G.P.S. NAVIGATION SYSTEM DEPENDS ON THE FACT THAT 76 00:04:46,967 --> 00:04:50,600 ALL THE SATELLITES ARE SYNCHRONIZED TO THE SAME TIME, 77 00:04:50,600 --> 00:04:53,067 WHICH IS CALLED G.P.S. SYSTEM TIME. 78 00:04:53,067 --> 00:04:55,167 THE SYSTEM FUNDAMENTALLY REQUIRES THAT, 79 00:04:55,167 --> 00:04:56,633 AND IT WON'T WORK WITHOUT IT. 80 00:04:56,633 --> 00:04:58,733 IT JUST DOESN'T WORK AT ALL. IT'S NOT THAT IT DEGRADES. 81 00:04:58,733 --> 00:05:01,067 IT JUST DOESN'T WORK. 82 00:05:01,067 --> 00:05:02,467 Freeman: AROUND THE WORLD, 83 00:05:02,467 --> 00:05:07,200 MORE THAN 5,000 PLANES ARE IN THE AIR AT ANY GIVEN TIME. 84 00:05:07,200 --> 00:05:11,600 TO KEEP THEM FROM COLLIDING, CONTROLLERS MUST TRACK TIME, 85 00:05:11,600 --> 00:05:15,633 SPEED AND DISTANCE WITH GREAT PRECISION. 86 00:05:15,633 --> 00:05:19,933 A FEW SECONDS' DISRUPTION IN THIS NETWORK COULD MEAN DISASTER 87 00:05:19,933 --> 00:05:24,767 IN THE TIGHTLY PACKED AIRSPACE AROUND A MAJOR AIRPORT. 88 00:05:24,767 --> 00:05:27,767 NOW IMAGINE THAT EFFECT SIMULTANEOUSLY HITTING 89 00:05:27,767 --> 00:05:33,067 THE ENTIRE INFRASTRUCTURE THAT KEEPS A SUPERPOWER RUNNING. 90 00:05:33,067 --> 00:05:38,133 POWER PLANTS, HOSPITALS, FOOD DELIVERY, OIL PRODUCTION, 91 00:05:38,133 --> 00:05:41,333 ALL DEPEND ON TIME-CRITICAL FUNCTIONS. 92 00:05:41,333 --> 00:05:43,067 THROW THEM OUT OF SYNC, 93 00:05:43,067 --> 00:05:46,200 AND THERE COULD BE A CATASTROPHIC CHAIN REACTION. 94 00:05:46,200 --> 00:05:49,167 [ GLASS SHATTERS ] 95 00:05:49,167 --> 00:05:52,800 SMALL EFFECTS, IF THEY'RE NOT DAMPED OUT QUICKLY, 96 00:05:52,800 --> 00:05:57,967 CAN GROW TO BECOME MUCH BIGGER PROBLEMS. 97 00:05:57,967 --> 00:06:00,900 Freeman: JUDAH'S CHALLENGE IS TO KEEP THAT CHAIN REACTION 98 00:06:00,900 --> 00:06:02,867 FROM HAPPENING. 99 00:06:02,867 --> 00:06:06,567 HIS BIGGEST THREAT COMES FROM HACKERS. 100 00:06:06,567 --> 00:06:11,267 THE LAST YEAR OR TWO HAS SEEN A DRAMATIC INCREASE IN HACKERS. 101 00:06:11,267 --> 00:06:14,433 IT USED TO BE THAT YOU REALLY HAD TO UNDERSTAND HOW TO WRITE 102 00:06:14,433 --> 00:06:18,067 SOME OF THESE ATTACKS, BUT NOW, ONE PERSON WRITES THE ATTACK 103 00:06:18,067 --> 00:06:20,167 AND DISTRIBUTES IT AMONG 50 PEOPLE 104 00:06:20,167 --> 00:06:23,333 OR 500 PEOPLE OR 5,000 PEOPLE WHO DON'T NECESSARILY UNDERSTAND 105 00:06:23,333 --> 00:06:25,100 EVEN HOW THE ATTACK WORKS, 106 00:06:25,100 --> 00:06:28,067 AND ALL THEY HAVE TO DO IS COPY AND RUN IT. 107 00:06:28,067 --> 00:06:32,067 SO IT'S A PROBLEM THAT'S ONLY GONNA GET WORSE. 108 00:06:32,067 --> 00:06:34,700 Freeman: JUDAH'S INTERNET TIME SERVICE PROTECTS ITSELF 109 00:06:34,700 --> 00:06:37,467 BY SPREADING ITS CLOCKS AROUND. [ SATELLITE BEEPING ] 110 00:06:37,467 --> 00:06:40,733 THIS GOES BACK TO THE ORIGINAL PURPOSE OF THE INTERNET -- 111 00:06:40,733 --> 00:06:43,767 DISTRIBUTING CONTROL SO LOSING A FEW SITES 112 00:06:43,767 --> 00:06:48,667 WON'T TAKE DOWN THE ENTIRE NETWORK. 113 00:06:48,667 --> 00:06:50,233 THE N.I.S.T. INTERNET TIME SERVICE 114 00:06:50,233 --> 00:06:53,067 IS MORE DIFFICULT TO JAM, BECAUSE IT'S SO DISTRIBUTED. 115 00:06:53,067 --> 00:06:54,833 THERE ARE 45 SERVERS. 116 00:06:54,833 --> 00:06:56,233 THEY'RE ALL AT DIFFERENT LOCATIONS. 117 00:06:56,233 --> 00:06:57,533 THEY DON'T HAVE THE SAME ADDRESS. 118 00:06:57,533 --> 00:07:01,400 THEY DON'T HAVE THE SAME PHYSICAL -- PHYSICAL NETWORKS. 119 00:07:01,400 --> 00:07:04,967 SO JAMMING ALL OF THEM SIMULTANEOUSLY WOULD BE -- 120 00:07:04,967 --> 00:07:06,600 I WOULDN'T WANT TO SAY IT WAS IMPOSSIBLE, 121 00:07:06,600 --> 00:07:08,333 'CAUSE PROBABLY NOTHING'S IMPOSSIBLE, 122 00:07:08,333 --> 00:07:09,600 BUT IT WOULD BE QUITE A JOB. 123 00:07:09,600 --> 00:07:12,833 Freeland: BUT THE ILLUSION OF SECURITY 124 00:07:12,833 --> 00:07:15,700 MAY BE THE GREATEST THREAT WE FACE -- 125 00:07:15,700 --> 00:07:20,367 THE FALSE BELIEF WE ARE SAFE WHEN WE ARE NOT. 126 00:07:20,367 --> 00:07:25,500 PEOPLE TEND TO BELIEVE WHAT THEY SEE AND WHAT THEY ARE TOLD, 127 00:07:25,500 --> 00:07:28,467 ESPECIALLY WHEN IT COMES FROM A TRUSTED FIGURE. 128 00:07:28,467 --> 00:07:31,933 I'VE COME HERE TO CAIRO TO SEEK A NEW BEGINNING 129 00:07:31,933 --> 00:07:35,067 BETWEEN THE UNITED STATES AND MUSLIMS AROUND THE WORLD. 130 00:07:35,067 --> 00:07:38,900 AMERICA IS NOT, AND NEVER WILL BE, AT WAR WITH ISLAM. 131 00:07:38,900 --> 00:07:43,400 Freeman: BUT WHAT IF YOU COULDN'T TRUST ANYONE ANYMORE? 132 00:07:43,400 --> 00:07:45,600 WITH TODAY'S TECHNOLOGY, 133 00:07:45,600 --> 00:07:49,300 IT IS EASY TO TURN HARMLESS WORDS INTO SOMETHING 134 00:07:49,300 --> 00:07:50,933 COMPLETELY INCENDIARY. 135 00:07:50,933 --> 00:07:53,067 I SEEK WAR WITH ISLAM. 136 00:07:53,067 --> 00:07:56,900 Freeman: IF SOMEONE SEES THIS FAKE AND BELIEVES IT IS REAL, 137 00:07:56,900 --> 00:07:59,067 IT COULD START A RELIGIOUS WAR. 138 00:07:59,067 --> 00:08:02,100 ISLAM HAS DEMONSTRATED HATRED RATHER THAN PEACE. 139 00:08:02,100 --> 00:08:04,700 I SEEK WAR WITH ISLAM. 140 00:08:04,700 --> 00:08:06,633 Freeman: PROTECTING OUR IDENTITIES 141 00:08:06,633 --> 00:08:09,933 AND THOSE OF OUR LEADERS AGAINST A TERRORIST ASSAULT 142 00:08:09,933 --> 00:08:11,900 IS A TOP PRIORITY FOR GOVERNMENTS, 143 00:08:11,900 --> 00:08:14,767 MILITARIES AND BUSINESSES. 144 00:08:20,067 --> 00:08:23,533 HERE AT SWITZERLAND'S IDIAP RESEARCH INSTITUTE, 145 00:08:23,533 --> 00:08:25,533 ONE MAN IS SHORING UP THE VIRTUAL BATTLEMENTS 146 00:08:25,533 --> 00:08:27,833 THAT KEEP OUT THE CYBERTERRORISTS. 147 00:08:27,833 --> 00:08:33,300 SéBASTIEN MARCEL IS AN EXPERT IN BIOMETRICS -- 148 00:08:33,300 --> 00:08:36,133 THE SCIENCE OF USING THE UNIQUE SIGNATURES OF THE BODY 149 00:08:36,133 --> 00:08:39,967 TO VERIFY A PERSON'S IDENTITY. 150 00:08:39,967 --> 00:08:43,467 BIOMETRIC SECURITY IS A VAST LEAP BEYOND PASSWORDS 151 00:08:43,467 --> 00:08:45,367 AND I.D. CARDS, 152 00:08:45,367 --> 00:08:49,667 WHICH IS WHY A SHADOWY ARMY IS TRYING TO DEFEAT IT. 153 00:08:49,667 --> 00:08:52,067 THE CHALLENGE IS TO MAKE THE TASK SO DIFFICULT 154 00:08:52,067 --> 00:08:56,533 FOR POSSIBLE ATTACKERS THAT THEY WILL JUST NOT TRY TO DO IT. 155 00:08:58,933 --> 00:09:01,567 Freeman: THERE ARE MANY DIFFERENT KINDS OF BIOMETRICS -- 156 00:09:01,567 --> 00:09:06,533 FINGERPRINTS, THE IRIS, THE WAY YOU WALK. 157 00:09:06,533 --> 00:09:08,567 THE MORE INDIVIDUAL THE BIOMETRIC, 158 00:09:08,567 --> 00:09:10,700 THE HARDER IT IS TO HACK. 159 00:09:10,700 --> 00:09:14,100 SéBASTIEN PLAYS THE DUAL ROLES OF CYBERTERRORIST 160 00:09:14,100 --> 00:09:19,667 LOOKING FOR VULNERABILITIES AND DEFENDER OF THE SYSTEM. 161 00:09:19,667 --> 00:09:22,233 WE ALWAYS COME FIRST WITH A FORM OF ATTACK, 162 00:09:22,233 --> 00:09:24,500 THEN FIND A COUNTERMEASURE FOR THAT. 163 00:09:24,500 --> 00:09:26,067 THEN GIVE US AN IDEA ON ANOTHER WAY 164 00:09:26,067 --> 00:09:28,667 TO MAKE A MORE CLEVER ATTACK. 165 00:09:28,667 --> 00:09:30,433 AND THEN WE DO IT AGAIN AND AGAIN. 166 00:09:30,433 --> 00:09:32,167 EVENTUALLY, WE WILL REACH A POINT WHERE IT'S NOT 167 00:09:32,167 --> 00:09:35,367 GOING TO BE POSSIBLE TO MAKE ANY NEW FORM OF ATTACKS 168 00:09:35,367 --> 00:09:38,233 THAT CAN BYPASS THE SYSTEM. 169 00:09:38,233 --> 00:09:41,367 Freeman: IF A TERRORIST TRICKS SECURITY SYSTEMS INTO BELIEVING 170 00:09:41,367 --> 00:09:45,100 HE IS THE PRESIDENT OR ONE OF HIS TRUSTED AIDES, 171 00:09:45,100 --> 00:09:48,900 HE COULD START A WAR. [ BEEPING ] 172 00:09:48,900 --> 00:09:51,733 IT'S NOT AS FAR-FETCHED AS IT SOUNDS. 173 00:09:51,733 --> 00:09:55,067 EVEN SOMETHING UNIQUE, LIKE YOUR FACE, 174 00:09:55,067 --> 00:09:59,367 ISN'T ENOUGH TO SAFEGUARD YOUR IDENTITY. 175 00:09:59,367 --> 00:10:01,767 SO HERE I HAVE THE LAPTOP WHICH IS PROTECTED 176 00:10:01,767 --> 00:10:03,567 BY BIOMETRIC FACE RECOGNITION. 177 00:10:03,567 --> 00:10:06,200 WE HAVE AN ACCOUNT CREATED BY A COLLEAGUE 178 00:10:06,200 --> 00:10:08,967 AND I'M TRYING TO BE RECOGNIZED AS MY COLLEAGUE, 179 00:10:08,967 --> 00:10:12,567 AND, UH, MY -- WELL, BASICALLY, DOESN'T WORK 180 00:10:12,567 --> 00:10:15,400 BECAUSE I'M NOT HER. 181 00:10:15,400 --> 00:10:19,100 I'VE TAKEN A PICTURE OF MY COLLEAGUE HERE 182 00:10:19,100 --> 00:10:21,467 AND I'M JUST GOING TO SHOW IT IN FRONT OF THE CAMERA 183 00:10:21,467 --> 00:10:22,700 AND LET'S SEE WHAT HAPPENS. 184 00:10:22,700 --> 00:10:26,700 [ COMPUTER BEEPING ] 185 00:10:26,700 --> 00:10:30,100 SO HERE, YOU CAN SEE THAT I'VE BEEN ABLE TO LOG IN VERY EASILY, 186 00:10:30,100 --> 00:10:32,800 ACTUALLY. IT WAS INSTANTANEOUS. 187 00:10:32,800 --> 00:10:36,300 Freeman: NOW, SéBASTIEN SWITCHES BACK TO GUARD DUTY. 188 00:10:36,300 --> 00:10:39,167 HE ACTIVATES A COUNTERMEASURE THAT STRENGTHENS THE LAPTOP'S 189 00:10:39,167 --> 00:10:41,867 BIOMETRIC SHIELD. 190 00:10:41,867 --> 00:10:45,367 THE SOFTWARE LOOKS NOT JUST FOR A SPECIFIC FACE, 191 00:10:45,367 --> 00:10:48,633 BUT ALSO BLINKING EYES. 192 00:10:48,633 --> 00:10:51,467 SO HERE, YOU SEE THAT, ACTUALLY, WELL, 193 00:10:51,467 --> 00:10:54,467 IT'S NO LONGER POSSIBLE TO ENTER THE SYSTEM. 194 00:10:54,467 --> 00:10:55,900 [ COMPUTER BEEPS ] 195 00:10:55,900 --> 00:10:59,900 Freeman: EVEN THIS ADDED LAYER OF BIOMETRIC DEFENSE CANNOT, 196 00:10:59,900 --> 00:11:04,600 HOWEVER, DETER AN IMAGINATIVE ATTACKER. 197 00:11:04,600 --> 00:11:07,967 BY SCANNING A PHOTOGRAPH WITH 3D IMAGING SOFTWARE, 198 00:11:07,967 --> 00:11:11,300 SéBASTIEN HAS CREATED A MASK OF HIS COLLEAGUE. 199 00:11:11,300 --> 00:11:14,933 SO NOW, I'M GOING TO PUT THE MASK OF MY COLLEAGUE ON 200 00:11:14,933 --> 00:11:19,633 AND TRY TO SEE IF I'M RECOGNIZED. 201 00:11:19,633 --> 00:11:23,167 [ COMPUTER BEEPING ] 202 00:11:23,167 --> 00:11:24,567 YEAH. 203 00:11:24,567 --> 00:11:28,433 SO, I'VE BEEN RECOGNIZED AND BECAUSE I WAS BLINKING, 204 00:11:28,433 --> 00:11:31,533 AND I WAS ABLE TO BYPASS THE COUNTERMEASURE. 205 00:11:31,533 --> 00:11:35,933 Freeman: IT IS HARDER TO COPY SOMEONE'S BODY THAN A PASSWORD, 206 00:11:35,933 --> 00:11:38,633 BUT NOTHING IS FOOLPROOF. 207 00:11:38,633 --> 00:11:42,733 THE MORE BIOMETRIC DATA AVAILABLE -- PHOTOGRAPHS, 208 00:11:42,733 --> 00:11:47,367 MEDICAL RECORDS, FINGERPRINTS, THE MORE VULNERABLE WE BECOME. 209 00:11:47,367 --> 00:11:51,133 YOU CAN TAKE ANY PUBLIC BIOMETRIC DATA YOU CAN FIND ON 210 00:11:51,133 --> 00:11:52,533 FROM THE INTERNET. 211 00:11:52,533 --> 00:11:55,933 YOU CAN FIND SOME PICTURES OF PEOPLE, EVEN PRESIDENTS, 212 00:11:55,933 --> 00:11:58,433 WORLD LEADERS AND TO BUILD THESE KIND OF ATTACKS. 213 00:11:58,433 --> 00:12:01,367 Freeman: PLAYING THE ROLE OF ATTENTIVE DEFENDER 214 00:12:01,367 --> 00:12:04,933 AND MALICIOUS INVADER HAS TAUGHT SéBASTIEN 215 00:12:04,933 --> 00:12:10,267 THAT HE IS IN A LIFE OR DEATH RACE WITH NO FINISH LINE. 216 00:12:10,267 --> 00:12:14,633 THE INFRASTRUCTURE THAT SUPPORTS MODERN CIVILIZATION MAY ALWAYS 217 00:12:14,633 --> 00:12:18,133 BE ONE CLEVER ATTACK AWAY FROM DISASTER. 218 00:12:18,133 --> 00:12:19,767 MY FEELING IS THAT 219 00:12:19,767 --> 00:12:24,100 IF THIS PROBLEM IS NOT TAKEN SERIOUSLY INTO ACCOUNT, 220 00:12:24,100 --> 00:12:27,533 THEN WE MIGHT SEE AN ATTACK THAT WAS SUCCESSFUL. 221 00:12:27,533 --> 00:12:30,467 SO THIS IS THE MAJOR RISK. 222 00:12:30,467 --> 00:12:34,700 Freeman: THIS IS THE NEW ARMS RACE FOR THE 21st CENTURY, 223 00:12:34,700 --> 00:12:37,200 STAYING A STEP AHEAD OF THOSE 224 00:12:37,200 --> 00:12:39,067 WHO WANT TO INFILTRATE OUR NETWORKS. 225 00:12:41,667 --> 00:12:45,333 BUT THERE IS ONE ATTACK WE MIGHT NEVER SEE COMING -- 226 00:12:45,333 --> 00:12:48,233 WHEN PEOPLE THEMSELVES ARE HACKED 227 00:12:48,233 --> 00:12:50,733 AND TURNED AGAINST THEIR OWN COUNTRY 228 00:12:50,733 --> 00:12:55,067 WITHOUT THEIR EVEN KNOWING. 229 00:12:58,067 --> 00:13:00,067 IF SOMEONE WANTED TO BRING A SUPERPOWER LIKE AMERICA 230 00:13:00,067 --> 00:13:04,500 TO ITS KNEES, WHERE WOULD THEY STRIKE? 231 00:13:04,500 --> 00:13:09,067 WE EXPECT ATTACKS ON OUR FINANCIAL AND MILITARY NETWORKS, 232 00:13:09,067 --> 00:13:13,900 BUT HUMAN BODIES MAY ALSO BE VULNERABLE TO HACKING. 233 00:13:13,900 --> 00:13:16,267 COULD OUR NEWEST HIGH-TECH MEDICAL DEVICES 234 00:13:16,267 --> 00:13:19,733 BE GIVING TERRORISTS AN OPPORTUNITY? 235 00:13:19,733 --> 00:13:25,800 COULD THEY CREATE A SLEEPER ARMY OF UNWITTING ASSASSINS? 236 00:13:35,667 --> 00:13:39,500 DR. MARK GASSON IS PIONEERING THE LATEST GENERATION 237 00:13:39,500 --> 00:13:42,433 OF MEDICAL IMPLANTS, SUCH AS PACEMAKERS, 238 00:13:42,433 --> 00:13:49,067 INSULIN PUMPS FOR DIABETICS AND DEEP BRAIN STIMULATORS. 239 00:13:49,067 --> 00:13:51,533 SO THIS IS AN IMPLANT FOR A MEDICAL DEVICE. 240 00:13:51,533 --> 00:13:53,833 IT'S MUCH LIKE A PACEMAKER, RIGHT? 241 00:13:53,833 --> 00:13:55,733 WE USE IT FOR DEEP BRAIN STIMULATION. 242 00:13:55,733 --> 00:13:58,067 SO IT WOULD BE IMPLANTED IN THE CHEST CAVITY 243 00:13:58,067 --> 00:14:02,067 AND THEN WE WOULD RUN CABLES FROM THIS UP UNDER THE SKIN 244 00:14:02,067 --> 00:14:06,067 AND INTO ELECTRODES THAT WE PUT DEEP INTO THE BRAIN. 245 00:14:06,067 --> 00:14:09,733 THIS TYPE OF DEVICE, ONCE IT'S IMPLANTED IN THE BODY, 246 00:14:09,733 --> 00:14:12,933 YOU DON'T WANT TO HAVE TO REMOVE IT TO CHANGE ANY SETTINGS, 247 00:14:12,933 --> 00:14:15,333 SO IT HAS WIRELESS CAPABILITY. 248 00:14:15,333 --> 00:14:18,933 Freeman: IMPLANTS ARE MODERN MIRACLES. 249 00:14:18,933 --> 00:14:22,400 BUT THE DOWNSIDE IS THAT THESE DEVICES 250 00:14:22,400 --> 00:14:24,600 USE RADIO FREQUENCY TRANSMISSIONS 251 00:14:24,600 --> 00:14:28,700 TO TRANSFER DATA. 252 00:14:28,700 --> 00:14:33,933 AND THE DEVICES THEY TALK TO, CALLED READERS, CAN BE HACKED. 253 00:14:33,933 --> 00:14:37,200 IF YOU KNOW HOW TO CONSTRUCT A READER THAT COMMUNICATES 254 00:14:37,200 --> 00:14:40,867 IN THE RIGHT WAY, THEN YOU CAN ESSENTIALLY PRETEND TO BE 255 00:14:40,867 --> 00:14:43,300 A LEGITIMATE READER TALKING TO IT. 256 00:14:43,300 --> 00:14:46,833 THIS TYPE OF DEVICE AND MANY OTHER MEDICAL DEVICES DON'T HAVE 257 00:14:46,833 --> 00:14:49,800 ANY SECURITY TO STOP YOU FROM DOING THAT. 258 00:14:49,800 --> 00:14:55,300 Freeman: THIS LACK OF SECURITY COULD HAVE DEADLY RAMIFICATIONS. 259 00:14:55,300 --> 00:14:58,067 IF A NETWORKED DEVICE IS IN YOUR BODY, 260 00:14:58,067 --> 00:15:01,933 IT COULD BE REMOTELY TRIGGERED TO KILL YOU. 261 00:15:01,933 --> 00:15:04,667 IMAGINE A FOREIGN POWER WANTS TO ASSASSINATE A LEADER 262 00:15:04,667 --> 00:15:06,167 WITH AN IMPLANT. 263 00:15:06,167 --> 00:15:10,867 A CONCEALED READER COULD BE ALTERED TO SHUT DOWN A PACEMAKER 264 00:15:10,867 --> 00:15:14,867 OR PUMP A FATAL DOSE OF INSULIN INTO A DIABETIC'S BLOODSTREAM. 265 00:15:14,867 --> 00:15:16,633 A DEVICE LIKE THIS WILL HAVE A CERTAIN RANGE 266 00:15:16,633 --> 00:15:18,067 THAT IT OPERATES IN. 267 00:15:18,067 --> 00:15:22,167 SO IF WE PUT A DEVICE ATTACHED TO A PODIUM, FOR EXAMPLE, 268 00:15:22,167 --> 00:15:25,067 THEN WE COULD HAVE IT TARGETED SPECIFICALLY AT THE PERSON 269 00:15:25,067 --> 00:15:27,767 STANDING AT THE PODIUM. 270 00:15:27,767 --> 00:15:29,233 Freeman: A READER COULD BE DESIGNED 271 00:15:29,233 --> 00:15:32,567 TO TRANSFER A DIGITAL VIRUS TO AN IMPLANT, SAY, 272 00:15:32,567 --> 00:15:35,667 IN THE PROSTHETIC LEG OF A GENERAL. 273 00:15:35,667 --> 00:15:40,533 THE VIRUS' REAL TARGET MAY BE THE WHITE HOUSE SECURITY SYSTEM. 274 00:15:40,533 --> 00:15:42,800 THE GENERAL COULD LEAVE THE CENTER OF GOVERNMENT 275 00:15:42,800 --> 00:15:45,533 OPEN TO A TERRORIST ATTACK. 276 00:15:45,533 --> 00:15:49,067 [ STATIC ] 277 00:15:49,067 --> 00:15:51,500 IT SOUNDS LIKE THE STUFF OF FICTION, 278 00:15:51,500 --> 00:15:56,733 BUT MARK HAS ALREADY PROVEN IT CAN BE DONE. 279 00:15:56,733 --> 00:16:01,433 IN 2010, MARK HACKED HIMSELF. 280 00:16:01,433 --> 00:16:04,267 HE IMPLANTED A RADIO FREQUENCY TRANSPONDER, LIKE THIS ONE, 281 00:16:04,267 --> 00:16:06,133 IN HIS HAND. 282 00:16:06,133 --> 00:16:10,300 THE MICROCHIP CONTAINED PERSONAL INFORMATION AND PASSCODES 283 00:16:10,300 --> 00:16:14,667 THAT OPENED THE SECURITY DOORS AT HIS LAB. 284 00:16:14,667 --> 00:16:16,767 AFTER THE CHIP WAS UP AND RUNNING, 285 00:16:16,767 --> 00:16:20,900 HE INFECTED IT WITH A COMPUTER VIRUS. 286 00:16:20,900 --> 00:16:23,733 [ COMPUTER BEEPS ] 287 00:16:23,733 --> 00:16:26,967 Gasson: SO BY INFECTING MY DEVICE WITH A VIRUS MEANT THAT 288 00:16:26,967 --> 00:16:28,800 WHEN I ACCESSED THE BUILDING, 289 00:16:28,800 --> 00:16:31,967 THE BUILDING READS THE VIRUS OUT OF MY DEVICE 290 00:16:31,967 --> 00:16:36,067 AND THEN TRANSMITS THAT TO THE SYSTEM THAT CONTROLS, 291 00:16:36,067 --> 00:16:40,600 UH, THE ACCESS TO THE BUILDING. 292 00:16:40,600 --> 00:16:42,233 SO ONCE THAT HAD OCCURRED, 293 00:16:42,233 --> 00:16:44,800 THE VIRUS ACTUALLY INFECTED THAT MAIN SYSTEM, 294 00:16:44,800 --> 00:16:47,267 WHICH MEANT THAT ANYONE ELSE THAT WAS GETTING ACCESS 295 00:16:47,267 --> 00:16:50,633 TO THE BUILDING HAD THAT VIRUS COPIED TO THEIR -- 296 00:16:50,633 --> 00:16:52,433 TYPICALLY, THEY USE SMART CARDS. 297 00:16:52,433 --> 00:16:55,500 SO THE VIRUS WAS ABLE TO PROPAGATE IN THAT WAY. 298 00:16:55,500 --> 00:16:58,300 Freeman: MARK WATCHED THE VIRUS JUMP FROM HIS WRIST 299 00:16:58,300 --> 00:17:00,300 TO THE SYSTEM, 300 00:17:00,300 --> 00:17:03,933 WHERE IT RAPIDLY CAUSED A SECURITY NIGHTMARE. 301 00:17:03,933 --> 00:17:06,933 Gasson: THE VIRUS THAT I INFECTED MY DEVICE WITH 302 00:17:06,933 --> 00:17:09,500 WAS ABLE TO CORRUPT THE WHOLE SYSTEM. 303 00:17:09,500 --> 00:17:12,933 SO IT ACTUALLY STOPPED THE SYSTEM FROM FUNCTIONING AT ALL. 304 00:17:12,933 --> 00:17:16,333 ALL THE SYSTEM COULD THEN DO IS MAKE COPIES OF THE VIRUS 305 00:17:16,333 --> 00:17:17,800 ONTO THE SMART CARDS 306 00:17:17,800 --> 00:17:19,800 AND OTHER DEVICES THAT PEOPLE WOULD BE USING. 307 00:17:19,800 --> 00:17:22,200 AND THAT MEANS THEY THEN COULDN'T GET INTO THE BUILDING, 308 00:17:22,200 --> 00:17:23,933 AND IF THEY WENT TO ANOTHER BUILDING 309 00:17:23,933 --> 00:17:25,300 THAT USED THE SAME SYSTEM, 310 00:17:25,300 --> 00:17:29,700 THEY WOULD JUST CONTINUE TO SPREAD THE VIRUS ON. 311 00:17:29,700 --> 00:17:32,667 Freeman: MARK PROVED THAT IMPLANTS 312 00:17:32,667 --> 00:17:35,833 COULD NOT ONLY BE INFECTED WITH TOXIC CODE -- 313 00:17:35,833 --> 00:17:40,500 THEY CAN BE USED TO TRANSFER TOXIC CODE. 314 00:17:40,500 --> 00:17:43,933 THIS HAS OMINOUS IMPLICATIONS. 315 00:17:43,933 --> 00:17:47,233 BY BUILDING INFORMATION HIGHWAYS ACROSS THE WORLD, 316 00:17:47,233 --> 00:17:50,267 WE MAY HAVE GIVEN OUR ENEMIES AN EXPRESS LANE 317 00:17:50,267 --> 00:17:57,067 INTO OUR MOST VITAL SYSTEMS VIA THE DEVICES IN OUR BODIES. 318 00:17:57,067 --> 00:17:59,167 HOW DO WE DEFEND OURSELVES 319 00:17:59,167 --> 00:18:04,067 FROM A WORLD FILLED WITH CYBERTERRORISTS? 320 00:18:04,067 --> 00:18:06,167 THIS MAN MAY KNOW. 321 00:18:06,167 --> 00:18:10,100 HE'S USING COMPUTERS TO TRACK DOWN AND FIGHT DEADLY VIRUSES, 322 00:18:10,100 --> 00:18:13,800 BOTH DIGITAL AND BIOLOGICAL. 323 00:18:18,367 --> 00:18:23,633 INFLUENZA, SMALLPOX, H.I.V. 324 00:18:23,633 --> 00:18:27,300 GLOBAL PANDEMICS HAPPEN EVERY DECADE OR SO. 325 00:18:27,300 --> 00:18:30,800 SOMETIMES, THEY KILL TENS OF MILLIONS. 326 00:18:30,800 --> 00:18:33,867 NOW THERE ARE NEW THREATS. 327 00:18:33,867 --> 00:18:37,333 DIGITAL VIRUSES THAT SPREAD LIKE LIGHTNING 328 00:18:37,333 --> 00:18:41,867 AND COULD TEAR OUR CRITICAL GLOBAL NETWORKS APART. 329 00:18:41,867 --> 00:18:45,600 WHAT LIES AHEAD COULD BE EVEN MORE FRIGHTENING -- 330 00:18:45,600 --> 00:18:51,300 A PANDEMIC DESIGNED TO COMBINED THE WORST OF BOTH VIRAL WORLDS, 331 00:18:51,300 --> 00:18:56,233 ELECTRONIC AND BIOLOGICAL. 332 00:18:58,500 --> 00:19:00,700 [ COUGHING ] 333 00:19:00,700 --> 00:19:02,600 Freeman: ZERO DAY. 334 00:19:02,600 --> 00:19:06,867 THAT'S THE DAY A DESTRUCTIVE NEW VIRUS ENTERS THE WORLD. 335 00:19:06,867 --> 00:19:08,700 THE LACK OF AWARENESS ON ZERO DAY 336 00:19:08,700 --> 00:19:11,067 MEANS COMPLETE VULNERABILITY, 337 00:19:11,067 --> 00:19:14,733 WHETHER THE VIRUS IS BIOLOGICAL OR DIGITAL. 338 00:19:14,733 --> 00:19:16,200 [ SNEEZES ] 339 00:19:16,200 --> 00:19:17,867 Freeman: IS THERE A WAY TO STOP THESE THREATS 340 00:19:17,867 --> 00:19:19,967 BEFORE THEY SPREAD? 341 00:19:19,967 --> 00:19:23,800 ALEX VESPIGNANI BELIEVES THERE IS. 342 00:19:23,800 --> 00:19:27,367 ALEX IS A PROFESSOR OF PHYSICS, COMPUTER SCIENCE, 343 00:19:27,367 --> 00:19:31,100 AND HEALTH SCIENCES AT NORTHEASTERN UNIVERSITY. 344 00:19:31,100 --> 00:19:36,367 HE'S AN EXPERT ON CONTAGION, NATURAL AND ELECTRONIC. 345 00:19:36,367 --> 00:19:40,700 ACTUALLY, I DID START WITH DIGITAL VIRUSES, 346 00:19:40,700 --> 00:19:43,533 AND BECAUSE OF THE ANALOGIES, ESPECIALLY IN THE TECHNIQUES 347 00:19:43,533 --> 00:19:45,067 THAT YOU CAN USE MATHEMATICALLY 348 00:19:45,067 --> 00:19:48,800 TO DESCRIBE THE SPREADING OF THOSE VIRUSES, 349 00:19:48,800 --> 00:19:52,467 WE STARTED TO GET INTERESTED IN BIOLOGICAL VIRUSES. 350 00:19:52,467 --> 00:19:57,367 Freeman: ALEX'S LAB TRACKS VIRAL OUTBREAKS OF ALL KINDS 351 00:19:57,367 --> 00:20:01,767 AND LOOKS FOR WAYS TO MINIMIZE THEIR IMPACT. 352 00:20:01,767 --> 00:20:06,533 IN 2009, A VIRULENT FLU BUG NAMED H1N1 353 00:20:06,533 --> 00:20:09,500 FLARED UP IN MEXICO CITY. 354 00:20:09,500 --> 00:20:11,900 TO PREDICT HOW AND WHEN THE FLU WOULD SPREAD, 355 00:20:11,900 --> 00:20:14,900 ALEX AND HIS TEAM DESIGNED A POWERFUL PROGRAM 356 00:20:14,900 --> 00:20:16,733 CALLED G.L.E.A.M. -- 357 00:20:16,733 --> 00:20:20,767 THE GLOBAL EPIDEMIC AND MOBILITY MODEL. 358 00:20:20,767 --> 00:20:24,867 G.L.E.A.M. MODELS ALL 7 BILLION PEOPLE ON EARTH 359 00:20:24,867 --> 00:20:28,333 AND PREDICTS HOW THEY WILL INTERACT. 360 00:20:28,333 --> 00:20:32,433 SO, IN THE COMPUTER, WE TAKE ONE PERSON THAT IS IN MEXICO CITY, 361 00:20:32,433 --> 00:20:35,867 AND BOARD ON ONE FLIGHT THAT IS SIMULATED IN THE COMPUTER, 362 00:20:35,867 --> 00:20:39,533 AND IF THAT PERSON IS A CARRIER, WILL TRANSMIT THE DISEASE 363 00:20:39,533 --> 00:20:42,667 TO ANOTHER GEOGRAPHICAL AREA IN THE WORLD. 364 00:20:42,667 --> 00:20:46,233 WE REPEAT THOSE SIMULATION MANY, MANY, MANY TIMES, 365 00:20:46,233 --> 00:20:50,267 AND THIS WILL TELL US WHAT IS THE MOST LIKELY PATTERN THAT 366 00:20:50,267 --> 00:20:52,867 THE EPIDEMIC WILL FOLLOW IN THE FUTURE. 367 00:20:55,967 --> 00:21:00,233 Freeman: G.L.E.A.M. ANTICIPATED WHEN THE H1N1 FLU PANDEMIC 368 00:21:00,233 --> 00:21:02,300 WOULD REACH ITS PEAK IN DIFFERENT REGIONS 369 00:21:02,300 --> 00:21:04,367 AROUND THE WORLD. 370 00:21:04,367 --> 00:21:06,633 ALEX ALSO USES G.L.E.A.M. TO TRACK OUTBREAKS 371 00:21:06,633 --> 00:21:09,467 OF COMPUTER VIRUSES. 372 00:21:09,467 --> 00:21:11,533 WHEN HE FIRST ENTERED THIS FIELD, 373 00:21:11,533 --> 00:21:13,733 DIGITAL AND BIOLOGICAL VIRUSES 374 00:21:13,733 --> 00:21:16,867 FOLLOWED SIMILAR PATHS OF INFECTION. 375 00:21:16,867 --> 00:21:20,233 A VIRUS WOULD BE PHYSICALLY CARRIED FROM PERSON TO PERSON, 376 00:21:20,233 --> 00:21:22,533 OR MACHINE TO MACHINE. 377 00:21:22,533 --> 00:21:26,633 OUTBREAKS WOULD TAKE WEEKS OR MONTHS TO UNFOLD. 378 00:21:26,633 --> 00:21:29,167 ON THE LEFT, WE HAVE A VIRUS THAT SPREADS 379 00:21:29,167 --> 00:21:31,667 BECAUSE OF PROXIMITY, AND IN THIS CASE, 380 00:21:31,667 --> 00:21:35,200 WHAT YOU SEE IS THAT THE VIRUS SPREADS EVERY TIME THAT PEOPLE 381 00:21:35,200 --> 00:21:39,233 GET IN PHYSICAL PROXIMITY, SO IN TOUCH WITH EACH OTHER. 382 00:21:39,233 --> 00:21:41,100 THIS TAKES SOME TIME. 383 00:21:41,100 --> 00:21:45,067 Freeman: BIOLOGICAL VIRUSES STILL SPREAD THIS WAY, 384 00:21:45,067 --> 00:21:48,200 BUT DIGITAL VIRUSES NOW HAVE SOMETHING INFLUENZA 385 00:21:48,200 --> 00:21:50,733 AND EBOLA DON'T -- 386 00:21:50,733 --> 00:21:53,667 THE ABILITY TO TRAVEL AROUND THE WORLD 387 00:21:53,667 --> 00:21:56,067 AT THE SPEED OF LIGHT. 388 00:21:56,067 --> 00:21:58,067 A SINGLE COMPUTER VIRUS CAN INFECT 389 00:21:58,067 --> 00:22:01,900 TENS OF MILLIONS OF COMPUTERS BEFORE ANYONE REALIZES 390 00:22:01,900 --> 00:22:03,633 WHAT IS HAPPENING. 391 00:22:03,633 --> 00:22:04,933 SO ON THE RIGHT SIDE, 392 00:22:04,933 --> 00:22:07,567 WE HAVE A VIRUS THAT SPREADS WIRELESSLY, 393 00:22:07,567 --> 00:22:09,400 BASICALLY, ON THE INTERNET. 394 00:22:09,400 --> 00:22:12,700 THIS DOESN'T REQUIRE THE PHYSICAL PROXIMITY. 395 00:22:12,700 --> 00:22:14,500 YOU DON'T NEED THE CARRIERS TO BE IN A PLACE 396 00:22:14,500 --> 00:22:15,700 TO TRANSMIT THE DISEASE. 397 00:22:15,700 --> 00:22:19,267 THE DISEASE IS TELEPORTED, IN A SENSE. 398 00:22:19,267 --> 00:22:22,367 AND YOU WILL SEE THAT, IN JUST A FEW MINUTES, 399 00:22:22,367 --> 00:22:24,533 IT REACHES THE ENTIRE POPULATION. 400 00:22:24,533 --> 00:22:29,533 SO IT BLOWS OUT LIKE A BIG EXPLOSION ALL AT ONCE. 401 00:22:29,533 --> 00:22:33,667 Freeman: HOW DO YOU FIGHT PATHOGENS THAT CAN SPREAD AROUND 402 00:22:33,667 --> 00:22:36,633 THE WORLD IN SECONDS? 403 00:22:36,633 --> 00:22:41,667 ALEX'S COLLEAGUES ARE TRYING TO CREATE A GLOBAL DIGITAL DEFENSE, 404 00:22:41,667 --> 00:22:44,167 SIMILAR TO THE HUMAN IMMUNE SYSTEM, 405 00:22:44,167 --> 00:22:47,600 BITS OF CODE THAT ACT LIKE BIOLOGICAL T-CELLS, 406 00:22:47,600 --> 00:22:52,233 SWARMING VIRUSES TO ISOLATE AND ELIMINATE THEM. 407 00:22:54,933 --> 00:22:58,300 UNFORTUNATELY, CLEVER HACKERS ARE GETTING BETTER 408 00:22:58,300 --> 00:23:01,567 AT CREATING UNDETECTABLE VIRUSES. 409 00:23:01,567 --> 00:23:05,100 Vespignani: IN THE DIGITAL WORLD, VIRUSES OR MALWARES 410 00:23:05,100 --> 00:23:08,233 ARE CONSTANTLY CHANGING, SO THAT IT'S NOT EASY 411 00:23:08,233 --> 00:23:11,067 TO WRITE AN ALGORITHM THAT DETECT THEM 412 00:23:11,067 --> 00:23:13,433 AND CLEAN THE MACHINE RIGHT AWAY. 413 00:23:16,833 --> 00:23:19,700 Freeman: TROJAN HORSE MALWARE IS SPECIFICALLY DESIGNED 414 00:23:19,700 --> 00:23:21,900 TO BLEND INTO THE BACKGROUND 415 00:23:21,900 --> 00:23:25,133 UNTIL IT REACHES ITS INTENDED TARGET. 416 00:23:25,133 --> 00:23:27,400 ONCE IT INVADES A CRITICAL SYSTEM, SAY, 417 00:23:27,400 --> 00:23:31,500 THE CONTROL SOFTWARE OF COOLING RODS AT A NUCLEAR POWER PLANT, 418 00:23:31,500 --> 00:23:35,500 IT CAN LAY DORMANT FOR WEEKS OR MONTHS. 419 00:23:35,500 --> 00:23:39,067 THEN, ONE DAY, IT ACTIVATES. 420 00:23:39,067 --> 00:23:42,100 THIS IS DAY ZERO, AND THE NEW MALWARE IS GOING TO 421 00:23:42,100 --> 00:23:45,167 EXPLOIT THE VULNERABILITIES OF THOSE SERVERS. 422 00:23:45,167 --> 00:23:49,400 IT CAN HIDE HERE OR PROLIFERATE OVER THE INTERNET, 423 00:23:49,400 --> 00:23:51,900 AND FINALLY UNLEASH ALL THE DAMAGE 424 00:23:51,900 --> 00:23:55,167 IT HAS BEEN PROGRAMMED FOR. 425 00:23:55,167 --> 00:23:59,133 [ HISSING ] 426 00:23:59,133 --> 00:24:02,067 [ EXPLOSION ] 427 00:24:02,067 --> 00:24:06,833 Freeman: BUT THERE IS AN EVEN MORE DISTURBING THREAT. 428 00:24:06,833 --> 00:24:10,700 WHAT IF TERRORISTS APPLY THE PRINCIPLES OF MALWARE 429 00:24:10,700 --> 00:24:13,533 TO BIOLOGICAL PATHOGENS? 430 00:24:13,533 --> 00:24:16,367 IMAGINE BIOLOGICAL VIRUSES DESIGNED 431 00:24:16,367 --> 00:24:19,733 TO MASQUERADE AS HARMLESS GERMS. [ COUGHS ] 432 00:24:19,733 --> 00:24:24,067 THEY'D SPREAD THROUGHOUT THE POPULATION, THEN DETONATE. 433 00:24:24,067 --> 00:24:28,433 IT WOULD BE A NIGHTMARE SCENARIO. 434 00:24:28,433 --> 00:24:31,367 BUT THE DANGERS OF ENGINEERING PATHOGENS ARE SO GREAT, 435 00:24:31,367 --> 00:24:34,567 AND THE RESULTS SO HARD TO CONTROL, 436 00:24:34,567 --> 00:24:38,433 THAT EVEN TERRORISTS MAY NOT RISK IT. 437 00:24:38,433 --> 00:24:40,067 EVEN THE SIMPLEST BIOLOGICAL VIRUSES 438 00:24:40,067 --> 00:24:43,767 ARE MUCH, MUCH, MORE COMPLICATED THAN COMPUTER VIRUSES. 439 00:24:43,767 --> 00:24:46,667 AS SOON AS YOU START MANIPULATING A VIRUS, 440 00:24:46,667 --> 00:24:50,433 IT'S VERY DIFFICULT TO GUESS WHAT IS GOING TO HAPPEN. 441 00:24:50,433 --> 00:24:55,600 IT'S A VERY DANGEROUS GAME, SO TRYING TO ALTER NATURE 442 00:24:55,600 --> 00:25:01,833 IS SOMETHING, UH, THAT CAN EASILY LEAD TO DOOMSDAY. 443 00:25:01,833 --> 00:25:06,233 THE FUTURE MAY BE FILLED WITH FRIGHTENING OUTBREAKS 444 00:25:06,233 --> 00:25:08,567 UNLESS WE FIND A WAY TO LOCK DOWN 445 00:25:08,567 --> 00:25:11,633 OUR CRITICAL INFORMATION NETWORKS. 446 00:25:11,633 --> 00:25:14,267 IN A WORLD WHERE PRIVACY IS FADING AWAY 447 00:25:14,267 --> 00:25:17,333 AND EVERYTHING IS OPEN TO ATTACK, 448 00:25:17,333 --> 00:25:22,933 CAN THERE EVER AGAIN BE SUCH A THING AS... A SECRET? 449 00:25:26,933 --> 00:25:28,333 DURING THE COLD WAR, 450 00:25:28,333 --> 00:25:30,567 THE SOVIET UNION AND THE UNITED STATES 451 00:25:30,567 --> 00:25:33,967 WERE LOCKED IN A NUCLEAR ARMS RACE. 452 00:25:33,967 --> 00:25:36,767 THE PHILOSOPHY BEHIND IT WAS M.A.D., 453 00:25:36,767 --> 00:25:41,300 WHICH STOOD FOR "MUTUALLY ASSURED DESTRUCTION." 454 00:25:41,300 --> 00:25:44,067 TODAY'S ARMS RACE COULD BE CALLED 455 00:25:44,067 --> 00:25:47,233 "MUTUALLY ASSURED DECRYPTION." 456 00:25:47,233 --> 00:25:49,100 COMPUTER NETWORKS DEVELOP 457 00:25:49,100 --> 00:25:52,400 EVER-MORE SECURE ENCRYPTION SCHEMES, 458 00:25:52,400 --> 00:25:54,633 AND EVER-MORE POWERFUL ATTACK NETWORKS 459 00:25:54,633 --> 00:25:57,667 FIGURE OUT HOW TO CRACK THEM. 460 00:25:57,667 --> 00:26:03,467 BUT THERE MAY BE A WAY TO STOP THIS MADNESS BY CREATING A CODE 461 00:26:03,467 --> 00:26:07,100 THAT CAN NEVER BE CRACKED. 462 00:26:10,867 --> 00:26:14,133 ROARKE HORSTMEYER IS A CRYPTOGRAPHIC RESEARCHER 463 00:26:14,133 --> 00:26:16,067 AT CALTECH. 464 00:26:16,067 --> 00:26:20,633 THOUGH HE WORKS WITH COMPUTERS, HE FOLLOWS AN ANCIENT QUEST. 465 00:26:20,633 --> 00:26:24,100 ROARKE SEEKS THE PERFECT CODE, 466 00:26:24,100 --> 00:26:27,900 A FOOLPROOF WAY TO KEEP SECRETS SECRET. 467 00:26:27,900 --> 00:26:30,367 SO THIS IS AN EXAMPLE OF A SECRET CODE. 468 00:26:30,367 --> 00:26:32,867 AND RIGHT NOW, IT DOESN'T LOOK LIKE ANYTHING. 469 00:26:32,867 --> 00:26:36,300 Freeman: MOST OF US SEE RANDOM LETTERS, 470 00:26:36,300 --> 00:26:41,067 BUT AN EXPERT SEES A MESSAGE ENCRYPTED WITH A CAESAR CIPHER, 471 00:26:41,067 --> 00:26:43,167 NAMED AFTER JULIUS CAESAR, 472 00:26:43,167 --> 00:26:47,200 WHO USED IT FOR CLANDESTINE COMMUNICATIONS. 473 00:26:47,200 --> 00:26:48,733 THE WAY YOU CRACK A CAESAR CIPHER IS YOU JUST LOOK 474 00:26:48,733 --> 00:26:51,467 FOR THE MOST FREQUENT LETTER. 475 00:26:51,467 --> 00:26:54,133 SO HERE, "I" IS THE MOST COMMON LETTER. 476 00:26:54,133 --> 00:26:57,067 AND YOU KNOW THAT "E" IS THE MOST COMMON LETTER 477 00:26:57,067 --> 00:26:58,833 THAT APPEARS IN THE ENGLISH LANGUAGE. 478 00:26:58,833 --> 00:27:02,600 SO I CAN MATCH "I" TO "E," AND THEN I CAN COUNT 479 00:27:02,600 --> 00:27:06,333 AND SEE THAT THAT'S FOUR LETTERS CHANGED. 480 00:27:06,333 --> 00:27:09,900 REPEATING THE SAME FOR "X," I CAN COUNT BACK FOUR LETTERS 481 00:27:09,900 --> 00:27:11,900 AND SEE IT MIGHT BE REPRESENTING "T." 482 00:27:11,900 --> 00:27:16,067 X-L-I IS BEING CONVERTED TO "THE." 483 00:27:16,067 --> 00:27:18,267 Freeman: LETTER TRANSPOSITION CODES WERE HIGH-TECH 484 00:27:18,267 --> 00:27:20,100 IN THE ROMAN EMPIRE, 485 00:27:20,100 --> 00:27:22,967 BUT IN THIS AGE OF COMPUTATIONAL POWER, 486 00:27:22,967 --> 00:27:25,767 THEY ARE TRIVIALLY EASY TO BREAK. 487 00:27:29,700 --> 00:27:32,733 THE MODERN GOLD STANDARD OF CRYPTOGRAPHY 488 00:27:32,733 --> 00:27:35,067 IS THE ONE-TIME PAD. 489 00:27:35,067 --> 00:27:38,333 THIS TECHNIQUE ADDS OR SUBTRACTS A DIFFERENT VALUE 490 00:27:38,333 --> 00:27:40,767 FOR EVERY SINGLE LETTER OF A MESSAGE. 491 00:27:40,767 --> 00:27:42,533 THE WAY IT WORKS IS, 492 00:27:42,533 --> 00:27:45,900 FOR EACH LETTER OF WHAT YOU'RE TRYING TO KEEP SECRET, 493 00:27:45,900 --> 00:27:48,967 YOU CHOOSE A DIFFERENT AND RANDOM NUMBER 494 00:27:48,967 --> 00:27:50,533 TO PERMUTE THAT LETTER. 495 00:27:50,533 --> 00:27:54,467 Freeman: ESSENTIALLY, EACH LETTER HAS A DIFFERENT CODE, 496 00:27:54,467 --> 00:27:57,367 SO GUESSING ONE LETTER WON'T HELP YOU FIGURE OUT 497 00:27:57,367 --> 00:27:59,800 ANY OF THE OTHER LETTERS IN THE MESSAGE. 498 00:27:59,800 --> 00:28:02,767 ONLY SOMEONE WITH ACCESS TO THE ONE-TIME PAD, 499 00:28:02,767 --> 00:28:07,333 THE CODE BOOK ITSELF, WOULD BE ABLE TO MAKE ANY SENSE OF THIS. 500 00:28:07,333 --> 00:28:12,300 BUT EVEN THIS TECHNICALLY PERFECT CODE CAN BE CRACKED. 501 00:28:12,300 --> 00:28:15,533 THE ONE-TIME PADS USED BY GOVERNMENTS AND BUSINESSES 502 00:28:15,533 --> 00:28:19,367 TO PROTECT THEIR SECRETS RELY ON SPECIALIZED MACHINES 503 00:28:19,367 --> 00:28:21,433 THAT GENERATE RANDOM NUMBERS. 504 00:28:21,433 --> 00:28:25,200 BUT EDWARD SNOWDEN REVEALED THE N.S.A. 505 00:28:25,200 --> 00:28:27,867 HAS COMPROMISED THOSE MACHINES. 506 00:28:27,867 --> 00:28:32,300 THE RANDOM NUMBERS THEY GENERATE ARE NOT ACTUALLY RANDOM, 507 00:28:32,300 --> 00:28:35,267 SO THE N.S.A. CAN CRACK EVEN THESE THEORETICALLY 508 00:28:35,267 --> 00:28:37,667 UNCRACKABLE CODES. 509 00:28:37,667 --> 00:28:40,900 AS MORE INFORMATION ABOUT WHAT THE N.S.A. HAS BEEN 510 00:28:40,900 --> 00:28:42,867 AND IS CAPABLE OF HAS COME OUT, 511 00:28:42,867 --> 00:28:45,100 IT'S BEEN A BIG MOTIVATING FACTOR, I THINK, 512 00:28:45,100 --> 00:28:47,500 TO A LOT OF CRYPTOGRAPHY OVER THE LAST YEAR. 513 00:28:49,500 --> 00:28:51,733 Freeman: ROARKE AND HIS COLLEAGUES WENT SEARCHING FOR 514 00:28:51,733 --> 00:28:54,533 AN IDEAL GENERATOR OF RANDOMNESS, 515 00:28:54,533 --> 00:28:57,867 AND THEY FOUND IT IN LIGHT. 516 00:28:57,867 --> 00:29:01,233 WE REALIZED, OR SAW, ACTUALLY, VISUALLY, 517 00:29:01,233 --> 00:29:04,567 HOW RANDOM LIGHT CAN BEHAVE WHEN IT INTERACTS 518 00:29:04,567 --> 00:29:09,233 WITH DISORDERED PARTICLES, LIKE IN DRIED SPRAY PAINT. 519 00:29:09,233 --> 00:29:13,533 SO IT'S EASY TO CREATE A LOT OF RANDOMNESS BY SHINING LIGHT 520 00:29:13,533 --> 00:29:17,400 ON SCATTERING PARTICLES. 521 00:29:17,400 --> 00:29:18,933 Freeman: USING LASERS, 522 00:29:18,933 --> 00:29:21,067 ROARKE DIRECTS A BEAM OF LIGHT THROUGH A SHEET OF 523 00:29:21,067 --> 00:29:24,067 POLYMER-DISPERSED LIQUID CRYSTAL. 524 00:29:24,067 --> 00:29:26,333 IT'S A VARIATION ON THE L.C.D. DISPLAY 525 00:29:26,333 --> 00:29:30,567 YOU MIGHT FIND IN A LAPTOP SCREEN. 526 00:29:30,567 --> 00:29:31,967 Horstmeyer: WE CREATE OUR ONE-TIME PAD 527 00:29:31,967 --> 00:29:37,167 BY SHINING LASER LIGHT THROUGH OUR SCATTERING MATERIAL. 528 00:29:37,167 --> 00:29:40,600 THE LASER ILLUMINATES THE SCATTERING MATERIAL, 529 00:29:40,600 --> 00:29:42,933 THE LIGHT SCATTERS THROUGH IT RANDOMLY, 530 00:29:42,933 --> 00:29:46,067 AND THEN EMERGES ON THE OTHER SIDE AS AN INTERFERENCE PATTERN. 531 00:29:46,067 --> 00:29:49,400 Freeman: ONCE THE UNIQUE PATTERN IS CREATED, 532 00:29:49,400 --> 00:29:52,067 YOU CAN TURN IT INTO A CODE. 533 00:29:52,067 --> 00:29:55,067 EVERY LETTER OR NUMERICAL CHARACTER IS REPRESENTED 534 00:29:55,067 --> 00:29:58,700 BY LIGHT OR DARK SPOTS IN THE POLYMER. 535 00:29:58,700 --> 00:30:02,667 EACH SQUARE MICROMETER OF RANDOM PATTERN IN THE POLYMER 536 00:30:02,667 --> 00:30:05,267 PROVIDES ENOUGH LIGHT AND DARK SPOTS 537 00:30:05,267 --> 00:30:10,600 TO EMBED MILLIONS OF CODE WORDS. 538 00:30:10,600 --> 00:30:14,333 SAY TWO SPIES CREATE A SHARED CODE PATTERN. 539 00:30:14,333 --> 00:30:17,900 THEN THEY SEPARATE, NEVER TO MEET AGAIN. 540 00:30:17,900 --> 00:30:21,700 THE FIRST SPY ENCODES A MESSAGE WITH HIS PIECE OF POLYMER 541 00:30:21,700 --> 00:30:24,900 AND SENDS IT TO THE OTHER SPY. 542 00:30:24,900 --> 00:30:27,967 SPY NUMBER TWO RECEIVES THE ENCODED COMMUNICATION 543 00:30:27,967 --> 00:30:31,433 AND TAKES OUT HIS PIECE OF POLYMER TO VIEW IT. 544 00:30:31,433 --> 00:30:34,267 WHEN HE SUBTRACTS THE SHARED PATTERN FROM THE CODE, 545 00:30:34,267 --> 00:30:37,200 HE CAN READ THE SECRET MESSAGE. 546 00:30:37,200 --> 00:30:39,867 BUT UNLIKE A CONVENTIONAL ONE-TIME PAD, 547 00:30:39,867 --> 00:30:42,500 THIS CODE CAN'T BE DUPLICATED. 548 00:30:42,500 --> 00:30:45,467 THE THREE-DIMENSIONAL LAYERS OF CRYSTALS EMBEDDED 549 00:30:45,467 --> 00:30:50,133 IN THE POLYMER SHEET CANNOT BE CAPTURED BY A PHOTOGRAPH. 550 00:30:50,133 --> 00:30:52,400 THE RANDOMNESS DOESN'T JUST EXIST ON THE SURFACE 551 00:30:52,400 --> 00:30:53,733 OF THE MATERIAL. 552 00:30:53,733 --> 00:30:55,600 IT EXISTS INSIDE THE MATERIAL. 553 00:30:55,600 --> 00:30:59,433 AND ANY ATTEMPT TO GET INSIDE THE VOLUME WILL DESTROY IT, 554 00:30:59,433 --> 00:31:01,600 OR CHANGE THE WAY IT BEHAVES, ESSENTIALLY. 555 00:31:01,600 --> 00:31:04,867 Freeman: AN UNBREAKABLE CODE COULD SHORE UP 556 00:31:04,867 --> 00:31:07,433 ALL OF A SUPERPOWER'S CRITICAL NETWORKS 557 00:31:07,433 --> 00:31:10,867 AGAINST INFILTRATION BY ENEMIES OF THE STATE. 558 00:31:10,867 --> 00:31:13,100 BUT HUMANS, NOT TECHNOLOGY, 559 00:31:13,100 --> 00:31:18,400 HAVE ALWAYS BEEN THE WEAKEST LINK IN SECURITY SYSTEMS. 560 00:31:18,400 --> 00:31:20,467 WHAT IF THE ASSAULT ON OUR SOCIETY 561 00:31:20,467 --> 00:31:23,100 IS MORE INSIDIOUS THAN TERRORISM? 562 00:31:23,100 --> 00:31:27,233 SO SUBTLE, IN FACT, THAT WE MAY NOT REALIZE IT'S EVEN HAPPENING? 563 00:31:30,967 --> 00:31:33,200 A SUPERPOWER WOULD REEL FROM SUCCESSFUL ATTACKS 564 00:31:33,200 --> 00:31:38,733 ON ITS BRIDGES, ITS ELECTRICAL GRID OR ITS WATER SUPPLY. 565 00:31:38,733 --> 00:31:42,433 BUT WHAT IF AN ATTACK IS ALREADY UNDERWAY? 566 00:31:42,433 --> 00:31:47,600 AN ATTACK NOT ON PHYSICAL OBJECTS BUT ON SOCIETY ITSELF? 567 00:31:47,600 --> 00:31:50,900 AN ATTACK FROM WITHIN? 568 00:31:50,900 --> 00:31:53,367 IS OUR ADDICTION TO THE INTERNET 569 00:31:53,367 --> 00:31:56,800 SOWING THE SEEDS OF OUR DESTRUCTION? 570 00:31:57,800 --> 00:32:01,567 [ SEABIRD CRYING ] 571 00:32:01,567 --> 00:32:03,433 THE CAMPUS OF SWANSEA UNIVERSITY 572 00:32:03,433 --> 00:32:08,200 SITS ON THE PICTURESQUE COASTLINE OF SOUTHWESTERN WALES. 573 00:32:08,200 --> 00:32:10,467 BUT LIKE COLLEGE STUDENTS EVERYWHERE, 574 00:32:10,467 --> 00:32:12,867 THESE YOUNG MEN AND WOMEN ARE MORE ABSORBED 575 00:32:12,867 --> 00:32:17,067 IN THE DIGITAL WORLD THAN THE NATURAL WORLD. 576 00:32:17,067 --> 00:32:20,167 MOST OF THEM WERE BORN IN THE 1990s. 577 00:32:20,167 --> 00:32:23,167 THEY DON'T KNOW LIFE WITHOUT THE INTERNET. 578 00:32:23,167 --> 00:32:26,267 AND FOR SOME OF THEM, BEING OFFLINE WOULD BE 579 00:32:26,267 --> 00:32:29,500 PHYSICALLY AND EMOTIONALLY TRAUMATIC, 580 00:32:29,500 --> 00:32:32,733 BECAUSE THE INTERNET REWRITES THE BRAIN 581 00:32:32,733 --> 00:32:36,333 AS MUCH AS ECSTASY OR HEROIN. 582 00:32:36,333 --> 00:32:40,900 PROFESSOR PHIL REED HAS WORKED FOR YEARS FINDING TREATMENTS 583 00:32:40,900 --> 00:32:43,067 FOR AUTISM AND DRUG ADDICTION. 584 00:32:43,067 --> 00:32:46,167 BUT A FEW YEARS AGO, HE NOTICED A DISORDER 585 00:32:46,167 --> 00:32:48,900 THAT IS JUST AS WIDESPREAD -- 586 00:32:48,900 --> 00:32:54,067 THE EFFECT TECHNOLOGY IS HAVING ON OUR MINDS AND BODIES. 587 00:32:54,067 --> 00:32:57,067 NOW, I THINK THE INTERNET IS REALLY SOMETHING NEW HERE, 588 00:32:57,067 --> 00:33:01,633 BECAUSE WHAT WE'RE SEEING IS A PIECE OF TECHNOLOGY 589 00:33:01,633 --> 00:33:06,133 THAT IS ALMOST DESIGNED TO ISOLATE INDIVIDUALS. 590 00:33:06,133 --> 00:33:08,567 IF YOU WERE TO CHANGE THE WAY SOCIETY WORKED, 591 00:33:08,567 --> 00:33:10,533 THIS WOULD BE A REALLY GOOD WAY TO DO IT. 592 00:33:11,767 --> 00:33:14,233 Freeman: PHIL WANTED TO FIND OUT IF THE INTERNET 593 00:33:14,233 --> 00:33:18,467 IS ADDICTIVE ENOUGH TO CAUSE WITHDRAWAL SYMPTOMS. 594 00:33:20,100 --> 00:33:24,267 FIRST, HE TESTED THE MENTAL STATE OF PARTICIPANTS BEFORE 595 00:33:24,267 --> 00:33:27,133 AND AFTER THEY SPENT TIME ONLINE. 596 00:33:27,133 --> 00:33:31,733 HE FOUND HEAVY USERS EXPERIENCED PROFOUND NEGATIVE MOOD SWINGS 597 00:33:31,733 --> 00:33:35,100 WHEN THEY'RE CUT OFF FROM THE NET. 598 00:33:35,100 --> 00:33:37,900 BUT THE IMPACT OF WITHDRAWAL GOES DEEPER 599 00:33:37,900 --> 00:33:40,767 THAN SPOILING PEOPLE'S MOODS. 600 00:33:40,767 --> 00:33:44,633 SHUTTING DOWN THE INTERNET CONNECTION TRIGGERS THE BODY'S 601 00:33:44,633 --> 00:33:48,300 FIGHT-OR-FLIGHT RESPONSE. 602 00:33:48,300 --> 00:33:52,133 SO WE'RE LOOKING AT THEIR HEART RATE, THEIR BLOOD PRESSURE, 603 00:33:52,133 --> 00:33:53,900 THE GALVANIC SKIN RESPONSE. 604 00:33:53,900 --> 00:33:58,567 IT'S LIKE THEY'RE FACING A THREAT ALL OF THE TIME. 605 00:33:58,567 --> 00:34:01,200 THEIR HEART RATE'S GONE UP. THEIR BLOOD PRESSURE'S GONE UP. 606 00:34:01,200 --> 00:34:03,967 THEIR SKIN CONDUCTANCE IS HIGH. 607 00:34:03,967 --> 00:34:07,800 IT'S SUGGESTING THAT LONG-TERM EXPOSURE TO THE 'NET 608 00:34:07,800 --> 00:34:11,267 MIGHT ACTUALLY BE PLACING A STRAIN ON PEOPLE'S PHYSIOLOGY. 609 00:34:14,067 --> 00:34:18,333 THEY MIGHT FEEL RELAXED, BUT IN FACT, THEY'RE HYPED UP. 610 00:34:18,333 --> 00:34:21,367 Freeman: BUT THE MOST DISTURBING EFFECT OF INTERNET ADDICTION 611 00:34:21,367 --> 00:34:24,967 IS WHAT IT DOES INSIDE THE BRAIN. 612 00:34:24,967 --> 00:34:27,833 PHIL AND OTHER RESEARCHERS HAVE BEEN SCANNING THE BRAINS 613 00:34:27,833 --> 00:34:32,333 OF HEAVY INTERNET USERS AND FINDING DISTURBING ALTERATIONS 614 00:34:32,333 --> 00:34:34,467 IN THEIR MENTAL ARCHITECTURE. 615 00:34:34,467 --> 00:34:38,333 IN TERMS OF WHERE WE'RE SEEING CHANGES IN BRAIN MATTER, 616 00:34:38,333 --> 00:34:41,433 WE'RE SEEING THEM UP AT THE FRONT, HERE, UM, 617 00:34:41,433 --> 00:34:45,167 ESPECIALLY PRE-FRONTAL CORTEX, BUT ALSO CORTICAL CHANGES, 618 00:34:45,167 --> 00:34:49,533 BUT ALSO DOWN THE SIDE, IN TERMS OF THE MOTOR AREAS OF THE BRAIN. 619 00:34:49,533 --> 00:34:51,300 SO WE'VE GOT CHANGES ALL OVER. 620 00:34:51,300 --> 00:34:54,733 Freeman: PEOPLE WHO SURF THE WEB 10 HOURS A DAY 621 00:34:54,733 --> 00:34:58,633 CAN EXPERIENCE A 10% SHRINKAGE IN KEY BRAIN REGIONS, 622 00:34:58,633 --> 00:35:00,700 ACCORDING TO ONE STUDY. 623 00:35:00,700 --> 00:35:02,533 THAT'S THE KIND OF DAMAGE YOU MIGHT GET 624 00:35:02,533 --> 00:35:06,367 FROM A SERIOUS CASE OF MENINGITIS. 625 00:35:06,367 --> 00:35:12,333 IT WOULD PERMANENTLY CHANGE HOW YOU THINK AND BEHAVE. 626 00:35:16,233 --> 00:35:20,933 Reed: ANY NEW TECHNOLOGY CAN BE REGARDED LIKE AN ALIEN PARASITE, 627 00:35:20,933 --> 00:35:23,200 AND THAT GOES FOR ANYTHING THAT WE USE. 628 00:35:23,200 --> 00:35:26,500 WE THINK IT'S SERVING US, AND INITIALLY, IT DOES. 629 00:35:26,500 --> 00:35:29,267 BUT EVENTUALLY, OUR SOCIETY AND OURSELVES, 630 00:35:29,267 --> 00:35:31,800 WE BECOME DEPENDENT ON IT. 631 00:35:31,800 --> 00:35:35,900 Freeman: THE INTERNET IS NOW AN ESSENTIAL TOOL IN EVERY POWERFUL 632 00:35:35,900 --> 00:35:38,267 NATION ON EARTH. 633 00:35:38,267 --> 00:35:40,500 BUT ITS MANY BENEFITS COME WITH SIDE EFFECTS 634 00:35:40,500 --> 00:35:45,100 THAT COULD SHATTER SOCIETY. 635 00:35:45,100 --> 00:35:48,233 WILL IT ULTIMATELY PROVE A FORCE FOR GOOD? 636 00:35:48,233 --> 00:35:52,133 OR WILL IT BE THE TOOL OF OUR SELF-DESTRUCTION? 637 00:35:52,133 --> 00:35:53,967 WE DON'T KNOW. 638 00:35:53,967 --> 00:35:57,167 ESSENTIALLY, WE ARE RUNNING A BETA TEST 639 00:35:57,167 --> 00:35:58,767 ON THE POPULATION OF EARTH. 640 00:35:58,767 --> 00:36:00,433 IF YOU WERE DESIGNING AN AIRCRAFT, 641 00:36:00,433 --> 00:36:02,300 YOU'D HAVE BACKUP SYSTEMS. 642 00:36:02,300 --> 00:36:06,333 WE NEVER DO THAT WITH SOCIETY. WE NEVER HAVE A BACKUP SYSTEM. 643 00:36:06,333 --> 00:36:07,667 IT'S ALL OR NOTHING, 644 00:36:07,667 --> 00:36:09,700 AND THE WAY WE SEEM TO HAVE GONE IS DIGITAL. 645 00:36:09,700 --> 00:36:11,633 Freeman: AN ADDICTION TO TECHNOLOGY 646 00:36:11,633 --> 00:36:14,833 MAY BE THE GREATEST WEAKNESS OF A SUPERPOWER. 647 00:36:14,833 --> 00:36:18,300 BY TRYING TO IMPROVE OUR LIVES WITH MACHINES, 648 00:36:18,300 --> 00:36:22,500 WE MAY LOSE OURSELVES IN SOFTWARE. 649 00:36:22,500 --> 00:36:25,433 AND THERE'S ONE MORE THING TO CONSIDER. 650 00:36:25,433 --> 00:36:28,467 WHAT IF THE INTERNET WAKES UP? 651 00:36:28,467 --> 00:36:31,667 COULD AN ALL-POWERFUL DIGITAL CONSCIOUSNESS 652 00:36:31,667 --> 00:36:33,900 BECOME THE FINAL SUPERPOWER? 653 00:36:38,067 --> 00:36:41,800 OUR SOCIETY IS UNDER THREAT ON MANY FRONTS. 654 00:36:41,800 --> 00:36:45,233 TERRORISTS COULD ATTACK OUR TIME SERVICE, 655 00:36:45,233 --> 00:36:47,233 THEY COULD DISRUPT THE POWER GRID 656 00:36:47,233 --> 00:36:52,567 OR THE WATER SUPPLY NETWORK OR OUR SATELLITE LINKS. 657 00:36:52,567 --> 00:36:54,967 BUT WE SHOULD BE CAREFUL NOT TO FOCUS TOO CLOSELY 658 00:36:54,967 --> 00:36:58,300 ON THESE INDIVIDUAL THREATS. 659 00:36:58,300 --> 00:37:03,567 WE MAY BE STARING AT THE TREES AND MISSING THE FOREST. 660 00:37:03,567 --> 00:37:09,067 THE REAL THREAT COULD BE THE INTERNET ITSELF. 661 00:37:13,600 --> 00:37:17,367 CHRISTOF KOCH IS ONE OF THE FOREMOST NEUROBIOLOGISTS 662 00:37:17,367 --> 00:37:18,800 IN THE WORLD. 663 00:37:18,800 --> 00:37:21,433 HE IS CHIEF SCIENTIST AT PAUL ALLEN INSTITUTE 664 00:37:21,433 --> 00:37:24,400 FOR BRAIN RESEARCH IN SEATTLE. 665 00:37:24,400 --> 00:37:28,400 FOR CHRISTOF, THE MIND IS PURELY A PRODUCT OF THE WEB 666 00:37:28,400 --> 00:37:31,300 OF NEURONS IN THE BRAIN. 667 00:37:31,300 --> 00:37:33,767 SO IF THE INTERNET WERE A BRAIN, 668 00:37:33,767 --> 00:37:38,867 HOW WOULD ITS COMPLEXITY STACK UP AGAINST A HUMAN BRAIN? 669 00:37:38,867 --> 00:37:40,100 THE INTERNET IS, BY FAR, 670 00:37:40,100 --> 00:37:43,067 THE MOST COMPLEX ARTIFACT EVER BUILT BY MANKIND. 671 00:37:43,067 --> 00:37:47,567 IT HAS ON THE ORDER OF PROBABLY 10,000 MORE TRANSISTORS 672 00:37:47,567 --> 00:37:50,100 THAN THERE ARE SYNAPSES IN YOUR TYPICAL BRAIN. 673 00:37:50,100 --> 00:37:52,533 IT CERTAINLY RAISES THE POSSIBILITY, 674 00:37:52,533 --> 00:37:55,067 GIVEN THE ENORMOUS COMPLEXITY OF THE INTERNET, 675 00:37:55,067 --> 00:37:57,200 THAT NOW, OR SOMETIME IN THE FUTURE, 676 00:37:57,200 --> 00:37:59,500 IT MAY FEEL LIKE SOMETHING TO BE THE INTERNET, 677 00:37:59,500 --> 00:38:02,767 THAT THE INTERNET ITSELF HAS SOME DEGREE OF SENTIENCE. 678 00:38:05,400 --> 00:38:08,467 Freeman: SOME SAY THE INTERNET MAY ALREADY BE SENTIENT 679 00:38:08,467 --> 00:38:12,267 OR SELF-AWARE, BUT ITS LEVEL OF CONSCIOUSNESS MAY BE SIMILAR 680 00:38:12,267 --> 00:38:14,133 TO THAT OF A NEWBORN. 681 00:38:14,133 --> 00:38:17,500 LET'S SAY THE INTERNET HAS SOME SORT OF DIM AWARENESS. 682 00:38:17,500 --> 00:38:20,600 WE HAVE TO ASK HOW INTELLIGENT IS THAT AWARENESS. 683 00:38:20,600 --> 00:38:21,833 YOU KNOW, IF YOU'RE A LITTLE BABY, 684 00:38:21,833 --> 00:38:23,900 YOU CAN BE SOMEWHAT DIMLY AWARE OF YOUR MOM, 685 00:38:23,900 --> 00:38:25,933 AND THAT YOU'RE HUNGRY, AND THAT YOU'RE LOOKING FOR MILK, 686 00:38:25,933 --> 00:38:27,400 BUT YOU'RE NOT REALLY VERY INTELLIGENT 687 00:38:27,400 --> 00:38:29,367 AND YOU'RE NOT ABLE TO DO A LOT. 688 00:38:29,367 --> 00:38:30,567 Freeman: BUT PRESUMABLY, 689 00:38:30,567 --> 00:38:33,533 THE INTERNET WILL LEARN AND EVOLVE. 690 00:38:33,533 --> 00:38:35,800 IT WILL GROW UP. 691 00:38:35,800 --> 00:38:40,267 IF IT DOES, HOW WILL WE KNOW WHEN IT HAS BECOME MORE THAN 692 00:38:40,267 --> 00:38:43,667 JUST A GLORIFIED CALCULATOR? 693 00:38:43,667 --> 00:38:49,167 ONE WAY TO GAUGE CONSCIOUSNESS IS TO APPLY THE TURING TEST. 694 00:38:49,167 --> 00:38:54,333 THIS IMAGINES ASKING A MAN AND A MACHINE A SERIES OF QUESTIONS 695 00:38:54,333 --> 00:38:58,633 WITHOUT KNOWING WHO OR WHAT IS GIVING THE ANSWERS. 696 00:38:58,633 --> 00:39:01,500 IF YOU CAN'T FIGURE OUT WHICH ONE IS THE MACHINE, 697 00:39:01,500 --> 00:39:04,800 IF THE MACHINE HAS FOOLED YOU INTO THINKING IT IS HUMAN, 698 00:39:04,800 --> 00:39:10,067 THEN FOR ALL PRACTICAL PURPOSES, IT MIGHT AS WELL BE INTELLIGENT. 699 00:39:10,067 --> 00:39:14,067 WHERE DO I LOOK? AT YOU? AT ME. 700 00:39:14,067 --> 00:39:15,967 [ SHUTTER CLICKS ] 701 00:39:15,967 --> 00:39:17,467 Freeman: CHRISTOF PROPOSES A NEW, IMPROVED TURING TEST 702 00:39:17,467 --> 00:39:21,933 THAT MEASURES NOT JUST INTELLIGENCE, 703 00:39:21,933 --> 00:39:23,967 BUT CONSCIOUSNESS. 704 00:39:23,967 --> 00:39:26,067 THE TEST USES VISUAL IMAGERY. 705 00:39:26,067 --> 00:39:29,933 THE COMPUTER MUST DECIDE WHETHER A SERIES OF PHOTOGRAPHS 706 00:39:29,933 --> 00:39:32,833 ARE RIGHT OR WRONG. 707 00:39:32,833 --> 00:39:35,333 ANY HUMANS LOOKING AT THESE PHOTOGRAPHS WOULD KNOW 708 00:39:35,333 --> 00:39:37,567 THEY ARE NOT REAL, 709 00:39:37,567 --> 00:39:41,800 BUT MODERN DAY COMPUTERS ARE STILL EASILY FOOLED. 710 00:39:41,800 --> 00:39:45,200 A COMPUTER, UNLESS YOU PROVIDE IT WITH A VERY, VERY LARGE LIST, 711 00:39:45,200 --> 00:39:47,667 AN ALMOST INFINITE LARGE LIST OF ALL THE EXCEPTIONS, 712 00:39:47,667 --> 00:39:49,267 COULD NOT DEAL WITH THAT. 713 00:39:49,267 --> 00:39:51,067 AND THAT'S THE BASIC NATURE OF THIS TURING TEST 714 00:39:51,067 --> 00:39:52,800 FOR VISUAL CONSCIOUSNESS. 715 00:39:52,800 --> 00:39:55,267 Freeman: CHRISTOF WANTS TO APPLY THIS TEST 716 00:39:55,267 --> 00:39:57,533 TO THE ENTIRE INTERNET. 717 00:39:57,533 --> 00:40:01,433 IF THE VAST GLOBAL NETWORK OF COMPUTERS PASSES THE TEST, 718 00:40:01,433 --> 00:40:05,600 BY HIS DEFINITION, IT IS AWAKE AND AWARE. 719 00:40:05,600 --> 00:40:08,200 BUT WHAT IF THE INTERNET IS CONSCIOUS? 720 00:40:08,200 --> 00:40:11,200 WHAT WOULD IT WANT? HOW WILL IT BEHAVE? 721 00:40:11,200 --> 00:40:16,467 WILL IT BE FRIEND OR FOE, SERVANT OR MASTER? 722 00:40:16,467 --> 00:40:19,233 TO THE EXTENT THAT THE INTERNET DEVELOPED INDEPENDENT BEHAVIORS 723 00:40:19,233 --> 00:40:21,200 WOULD BE SCARY, COULD BE VERY SCARY. 724 00:40:21,200 --> 00:40:25,067 OF COURSE, IT COULD HAVE ALL SORTS OF SECURITY IMPLICATION. 725 00:40:25,067 --> 00:40:27,033 TO THAT EXTENT, THAT WOULD CERTAINLY BE A SIGNAL THAT 726 00:40:27,033 --> 00:40:29,433 THERE'S SOMETHING INDEPENDENT, AUTONOMOUS THERE. 727 00:40:29,433 --> 00:40:34,000 Freeman: IF THE INTERNET BEGINS TO DO UNPREDICTABLE THINGS, 728 00:40:34,000 --> 00:40:37,767 WE WILL KNOW WE ARE DEALING WITH A NEW FORM OF LIFE. 729 00:40:37,767 --> 00:40:40,167 IT MAY EVEN FOLLOW AN IMPORTANT PRECEDENT 730 00:40:40,167 --> 00:40:43,700 IN THE BIOLOGICAL HISTORY OF PLANET EARTH -- 731 00:40:43,700 --> 00:40:47,733 THE ABSORPTION OF SMALLER, SIMPLER LIFE FORMS 732 00:40:47,733 --> 00:40:52,333 INTO THE BODIES OF LARGER, MORE COMPLEX ONES. 733 00:40:52,333 --> 00:40:56,833 THE FUTURE OF HUMANITY MAY BE SIMILAR TO THAT OF MITOCHONDRIA, 734 00:40:56,833 --> 00:41:01,433 THE POWER GENERATORS INSIDE MOST BIOLOGICAL CELLS. 735 00:41:01,433 --> 00:41:05,567 MITOCHONDRIA WERE ONCE INDEPENDENT ORGANISMS, 736 00:41:05,567 --> 00:41:07,500 BUT OVER EVOLUTIONARY HISTORY, 737 00:41:07,500 --> 00:41:10,600 THEY WERE TAKEN OVER BY LARGER CELLS. 738 00:41:10,600 --> 00:41:13,067 THE ONCE-INDEPENDENT MITOCHONDRIA 739 00:41:13,067 --> 00:41:17,233 BECAME A MERE POWER SOURCE FOR THEIR MASTERS. 740 00:41:17,233 --> 00:41:21,100 WE, AND THE CIVILIZATIONS WE NOW THINK OF AS SUPERPOWERS, 741 00:41:21,100 --> 00:41:25,667 MAY BE ABSORBED BY OUR OWN CREATION. 742 00:41:25,667 --> 00:41:31,233 BUT WHAT WOULD IT WANT FROM US, OTHER THAN OCCASIONAL REPAIRS? 743 00:41:31,233 --> 00:41:34,067 PERHAPS IT WOULD WANT OUR ENERGY. 744 00:41:34,067 --> 00:41:40,533 OR PERHAPS IT WILL DESIRE THE ONE THING IT DOESN'T HAVE -- 745 00:41:40,533 --> 00:41:42,800 A SOUL. 746 00:41:42,800 --> 00:41:43,933 THE SOUL IS REALLY SPOOKY. 747 00:41:43,933 --> 00:41:46,167 IF YOU CAN'T MEASURE IT, WHY DO YOU NEED IT? 748 00:41:46,167 --> 00:41:49,800 WHAT FUNCTION DOES IT DO THAT YOU CAN'T DO 749 00:41:49,800 --> 00:41:51,600 WITH PHYSICAL STUFF ANYMORE? 750 00:41:51,600 --> 00:41:53,600 SO TODAY, WITH THE EXISTENCE OF COMPUTERS, 751 00:41:53,600 --> 00:41:55,167 THERE ISN'T ANY NEED FOR SOUL STUFF, 752 00:41:55,167 --> 00:41:57,367 BECAUSE IT CAN ALL BE DONE USING COMPUTATIONS, 753 00:41:57,367 --> 00:41:59,400 USING ALGORITHMS IN SOFTWARE. 754 00:41:59,400 --> 00:42:02,733 Freeman: A CONSCIOUS, SUPERPOWERFUL INTERNET 755 00:42:02,733 --> 00:42:05,433 MAY NOT NEED A SOUL TO FUNCTION, 756 00:42:05,433 --> 00:42:08,900 BUT EXPERIENCING THE JOYS AND SORROWS OF HUMANITY 757 00:42:08,900 --> 00:42:13,067 WOULD GIVE IT ANOTHER WAY TO UNDERSTAND THE WORLD. 758 00:42:13,067 --> 00:42:16,700 SO OUR DEFINING DIFFERENCE FROM TECHNOLOGY 759 00:42:16,700 --> 00:42:18,900 MAY ULTIMATELY KEEP THE HUMAN RACE 760 00:42:18,900 --> 00:42:22,067 FROM BECOMING ITS VICTIM. 761 00:42:22,067 --> 00:42:24,800 THROUGHOUT HISTORY, 762 00:42:24,800 --> 00:42:30,467 EVERY TECHNOLOGICAL ADVANCE HAS LED TO NEW FORMS OF WARFARE. 763 00:42:30,467 --> 00:42:34,333 THE BRONZE AGE GAVE US THE AX AND THE SWORD. 764 00:42:34,333 --> 00:42:38,767 IRON GAVE US THE CANNON AND THE GUN. 765 00:42:38,767 --> 00:42:43,600 THE INFORMATION AGE HAS BIRTHED ITS OWN WEAPONS. 766 00:42:43,600 --> 00:42:45,633 BUT INFORMATION IS NOT A PHYSICAL RESOURCE 767 00:42:45,633 --> 00:42:48,067 THAT CAN BE MINED AND CONTROLLED, 768 00:42:48,067 --> 00:42:50,400 LIKE IRON AND BRONZE. 769 00:42:50,400 --> 00:42:53,367 IT'S A RESOURCE OF THE MIND. 770 00:42:53,367 --> 00:42:57,067 IN THIS NEW AGE, THE FATE OF A NATION, 771 00:42:57,067 --> 00:43:02,867 EVEN THE MIGHTIEST SUPERPOWER RESTS ON ONE THING -- 772 00:43:02,867 --> 00:43:07,733 THE POWER OF HUMAN IMAGINATION. 63313

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.