Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,060 --> 00:00:07,800
cybercrime is set to cost the world 10.5 trillion
dollars by 2025. this is larger than the entire
2
00:00:07,800 --> 00:00:13,860
GDP of Germany France and the UK combined in
2021 but what if I told you that the world's
3
00:00:13,860 --> 00:00:19,260
most dangerous virus is completely legal and could
be running on your phone right now without a trace
4
00:00:19,260 --> 00:00:25,620
introducing Pegasus the world's most dangerous
computer virus why is it so dangerous well the
5
00:00:25,620 --> 00:00:30,480
virus Grant almost complete access to your device
and to get infected you don't need to click a link
6
00:00:30,480 --> 00:00:37,620
download something by mistake or do well anything
Pegasus tracks everything you do with or near your
7
00:00:37,620 --> 00:00:42,840
smartphone and does so undetected a government
anywhere in the world could be accessing your
8
00:00:42,840 --> 00:00:47,940
phone learning all of your activities and using
that information against you or those around you
9
00:00:47,940 --> 00:00:54,060
simply put Pegasus is a malware program which
is a small viral file usually delivered online
10
00:00:54,060 --> 00:00:59,100
a malware file might enable the tracking of
how a computer is used and even its immediate
11
00:00:59,100 --> 00:01:04,500
environment but exactly what it does depends on
how it was programmed in the case of Pegasus the
12
00:01:04,500 --> 00:01:10,200
access is almost complete it enables hackers
to record phone calls track location use the
13
00:01:10,200 --> 00:01:15,900
phone camera to take photos or video read text
messages and much more the system then passes
14
00:01:15,900 --> 00:01:20,820
back this data to the person who planted them
out where the name comes from Greek mythology a
15
00:01:20,820 --> 00:01:26,280
nod to the winged horse of the same name it was
first discovered in 2016 when it was found in a
16
00:01:26,280 --> 00:01:31,740
message to the iPhone of a human rights activist
called Ahmed Mansour Mansour forwarded the link
17
00:01:31,740 --> 00:01:36,960
to the citizen lab of the University of Toronto
who were able to work out its capabilities at the
18
00:01:36,960 --> 00:01:42,600
time the virus was programmed to exploit three
specific unknown security vulnerabilities these
19
00:01:42,600 --> 00:01:47,100
vulnerabilities were found in phone apps and
allowed the Pegasus file to infiltrate a phone
20
00:01:47,100 --> 00:01:53,220
without the knowledge of users the Pegasus malware
has existed since at least 2013 having taken so
21
00:01:53,220 --> 00:01:58,140
many years to discover and has proven to be very
high profile in its use the killing of journalist
22
00:01:58,140 --> 00:02:03,120
Jamal khasogi and the Saudi Arab Arabian
Consulate in Abu Dhabi for example resulted
23
00:02:03,120 --> 00:02:07,860
in a lawsuit against the makers of Pegasus by
friends of khasogi who alleged it was used by
24
00:02:07,860 --> 00:02:13,260
the Saudi government to spy on them in late 2021
it was proven that Pegasus had been on the phone
25
00:02:13,260 --> 00:02:18,660
of kasoki's wife for several months placed there
by a government agency the information gathered
26
00:02:18,660 --> 00:02:24,240
before his death in 2018 may have led to kasogi
becoming a Target and the connection is explored
27
00:02:24,240 --> 00:02:29,940
in the Frontline documentary on kosogi produced
by PBS many people first heard of Pegasus though
28
00:02:29,940 --> 00:02:36,180
when it was used to hack Amazon boss Jeff Bezos
in 2018 the same year kosogi died the Bezos hack
29
00:02:36,180 --> 00:02:42,000
is likely connected to WhatsApp messages exchanged
with Saudi Prince Mohammed bin Salman who bezos's
30
00:02:42,000 --> 00:02:47,220
Washington Post had been critical of the hackers
had access to bezos's phone for months as well
31
00:02:47,220 --> 00:02:52,320
as compromising his business privacy the hack also
notably led to the destruction of bezos's marriage
32
00:02:52,320 --> 00:02:57,480
this was after leaked texts publicly revealed his
affair with reporter Lauren Sanchez the reason
33
00:02:57,480 --> 00:03:02,280
Pegasus is a particularly dangerous example
full of this kind of spying is that it is sold
34
00:03:02,280 --> 00:03:08,160
specifically to governments often for millions of
dollars made by the Israeli NSO group the purpose
35
00:03:08,160 --> 00:03:13,560
officially is to track and Trace terrorists and
their activities however in practice the way
36
00:03:13,560 --> 00:03:18,660
Pegasus is used is suspected to often be quite
a lot more underhand since its introduction
37
00:03:18,660 --> 00:03:24,060
Pegasus has gone through several versions each
more powerful and capable than the last in its
38
00:03:24,060 --> 00:03:29,220
newest guys if the malware is installed on your
device then nearly everything you do involving
39
00:03:29,220 --> 00:03:35,220
or close to your smartphone becomes available to
the user Pegasus does this by exploiting security
40
00:03:35,220 --> 00:03:40,200
bugs a type of security related programming
error in things like software packages and
41
00:03:40,200 --> 00:03:46,200
operating platforms specifically Pegasus looks for
something called zero day vulnerabilities which is
42
00:03:46,800 --> 00:03:51,480
suck issues that are known by some top security
Specialists but not yet known by the programmers
43
00:03:51,480 --> 00:03:56,400
who created the software these weaknesses which
can be found across all operating systems allow
44
00:03:56,400 --> 00:04:01,200
Pegasus to exploit the system to gain admin
rights to a smartphone or other device which
45
00:04:01,200 --> 00:04:07,140
in turn grants extensive access the easiest way
for Pegasus malware to arrive on a device is via
46
00:04:07,140 --> 00:04:12,120
a disguised link though there are far more subtle
methods too at one stage for example a security
47
00:04:12,120 --> 00:04:17,760
issue meant that simply making a call to a device
via FaceTime on the iPhone allowed Pegasus to
48
00:04:17,760 --> 00:04:23,220
install itself that security glitch thankfully
has now been fixed but new ones are always being
49
00:04:23,220 --> 00:04:28,260
filmed when a government wants to make use of a
program like Pegasus it is nearly impossible to
50
00:04:28,260 --> 00:04:32,820
prevent to the point that some Security Experts
simply recommend throwing out a smartphone as
51
00:04:32,820 --> 00:04:37,860
the best solution or of course not carrying a
smartphone at certain strategic times to allow
52
00:04:37,860 --> 00:04:42,840
for privacy others suggest removing a camera from
the device or other functionality that poses a
53
00:04:42,840 --> 00:04:48,660
clear security risk a more practical if incomplete
solution is key keeping a smartphone fully up to
54
00:04:48,660 --> 00:04:53,340
date which helps limit the security gaps that
Pegasus can operate through as companies learn
55
00:04:53,340 --> 00:04:58,440
of them remember though that Pegasus often targets
security gaps that the program makers are not yet
56
00:04:58,440 --> 00:05:04,020
aware of in its most modern formats Pegasus
is incredibly extensive it essentially uses
57
00:05:04,020 --> 00:05:09,300
your phone at the same time as you anonymously
pulling in huge amounts of data and supplying
58
00:05:09,300 --> 00:05:13,980
that data back to whoever placed the malware so
why should this worry you of course you're most
59
00:05:13,980 --> 00:05:18,960
likely to be at risk if you do something that your
government won't like while terrorist tracking is
60
00:05:18,960 --> 00:05:23,220
the official purpose of Pegasus it's quite likely
to have been used around the world for things
61
00:05:23,220 --> 00:05:27,840
ranging from tracking protesters to learning
about the activities of political opponents
62
00:05:27,840 --> 00:05:33,720
with use highly secretive and likely to be subject
to protest in itself if discovered it is hard in
63
00:05:33,720 --> 00:05:38,580
practice to know quite how governments are using
the software what is certain though is that it has
64
00:05:38,580 --> 00:05:43,800
been used against some journalists and activists
with the not-for-profit Forbidden stories doing a
65
00:05:43,800 --> 00:05:48,780
wide-reaching expose in 2021 they even found
that relatively modern States like Hungary
66
00:05:48,780 --> 00:05:53,580
and Poland have abused the software while another
investigation uncovered 10 other states using the
67
00:05:53,580 --> 00:06:00,360
malware including India Mexico and Morocco in fact
research done by Amnesty International found 50
68
00:06:00,360 --> 00:06:05,880
000 specific targets including 180 journalists
from 20 countries they included journalists
69
00:06:05,880 --> 00:06:11,400
with CNN Al Jazeera the financial times and the
Wall Street Journal that's likely the tip of the
70
00:06:11,400 --> 00:06:16,380
iceberg after all it would be a bit naive to think
the amnesty report caught everything while the
71
00:06:16,380 --> 00:06:21,060
average person might feel their data isn't worth
stealing and in comparison to journalists and
72
00:06:21,060 --> 00:06:26,280
politicians perhaps it isn't it's also true that
data is now used in everything from advertising
73
00:06:26,280 --> 00:06:31,080
to monitoring Behavior so everyone's data has
some value while there is certainly something
74
00:06:31,080 --> 00:06:36,240
to be gained commercially in tracking the average
person on the street and due to its very nature
75
00:06:36,240 --> 00:06:42,180
nobody including its makers likely knows quite
how widespread Pegasus actually is it is though
76
00:06:42,180 --> 00:06:46,620
thought to still be in the hands of governments
alone which is somewhat reassuring when you think
77
00:06:46,620 --> 00:06:51,300
how its wider use could be abused one of the
best efforts to work out just how common the
78
00:06:51,300 --> 00:06:56,760
malware is was by the Pegasus project which saw
major media organizations from around the world
79
00:06:56,760 --> 00:07:01,140
investigate the malware over 80 journalists
from Publications including the Wall Street
80
00:07:01,140 --> 00:07:07,080
Journal the guardian and LaMont spent months
working on amnesty International's list of 50
81
00:07:07,080 --> 00:07:11,580
000 phone numbers and trying to establish its
accuracy they were able to link many of the
82
00:07:11,580 --> 00:07:16,860
phone numbers concerned to the Pegasus spyware
despite this Pegasus makers denied a connection
83
00:07:16,860 --> 00:07:21,720
this is an attempt to build something on a crazy
lack of information they said there is something
84
00:07:21,720 --> 00:07:26,460
fundamentally wrong with this investigation
they also claim that the list has nothing to
85
00:07:26,460 --> 00:07:32,760
do with us in fact despite pegasus's abuse the
NSO group consistently defend the software in
86
00:07:32,760 --> 00:07:38,280
the same way they say that they provide authorized
governments with technology that helps them combat
87
00:07:38,280 --> 00:07:43,740
Terror and crime naturally your feelings about
pegasus's use might depend on the extent of your
88
00:07:43,740 --> 00:07:48,480
trust of various National governments but the
more skeptical experts point out that as well
89
00:07:48,480 --> 00:07:54,060
as the NSO group app producers have a degree of
responsibility here they are after all providing
90
00:07:54,060 --> 00:07:59,460
the apps that have security vulnerabilities to so
many mobile devices experts feel tech companies
91
00:07:59,460 --> 00:08:04,260
rewards for finding such vulnerabilities are not
enough to compete with the black market values
92
00:08:04,260 --> 00:08:09,840
of the same information Apple for example top out
their bug Bounty at two hundred thousand dollars
93
00:08:09,840 --> 00:08:15,060
while the black market value of some bugs could
be in the millions as it has developed Pegasus
94
00:08:15,060 --> 00:08:20,520
has expanded the amount of information that can be
accessed has expanded too and even includes access
95
00:08:20,520 --> 00:08:25,920
to Wi-Fi passwords through a device a version that
targets Android phones has been found and dubbed
96
00:08:25,920 --> 00:08:30,960
chrysal after pegasus's brother in the Greek myth
the list of countries where the software is used
97
00:08:30,960 --> 00:08:36,240
or has been deployed is ever expanding the FBI
are thought to use the software in the US and
98
00:08:36,240 --> 00:08:41,100
it's been found on the phones of several State
Department employees at least two EU officials
99
00:08:41,100 --> 00:08:45,780
have been targeted while Israel's refusal to
sell the software to Ukraine to assist with
100
00:08:45,780 --> 00:08:50,700
their defense against Russia is widely seen as
a sign of Israeli support for Russian leader of
101
00:08:50,700 --> 00:08:55,500
Vladimir Putin naturally you might want to know
why such a thing is legal it's legal in most
102
00:08:55,500 --> 00:09:00,960
places only where it is used with permission the
software has a genuine practical application it
103
00:09:00,960 --> 00:09:04,800
could be on a government official's phone for
the purpose of recording their environment or
104
00:09:04,800 --> 00:09:10,500
meetings for example enabling a simple smartphone
to appear normal while being used to protect or
105
00:09:10,500 --> 00:09:15,840
take in information the fact that many uses of
the malware are illegal does not make Pegasus
106
00:09:15,840 --> 00:09:21,060
itself illegal in principle the Silver Lining
to the story is that Amnesty International has
107
00:09:21,060 --> 00:09:25,620
come up with a way of detecting Pegasus the
tool is explained thoroughly on the Amnesty
108
00:09:25,620 --> 00:09:30,540
International website and is definitely worth
considering for anyone with serious worries the
109
00:09:30,540 --> 00:09:36,060
tool copies the entire contents of a phone onto a
computer and then examines it for signs of Pegasus
110
00:09:36,060 --> 00:09:41,100
some level of computing knowledge is helpful
but not necessary at the end of the day Pegasus
111
00:09:41,100 --> 00:09:46,140
is a scary reminder that our private information
isn't as private as we might like to think it is
15029
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.