Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:10,860 --> 00:00:58,860
HIGH Security team
2
00:00:59,860 --> 00:01:02,370
man has been and will always be
3
00:01:02,370 --> 00:01:06,360
simultaneously fascinated and terrified
aviano
4
00:01:06,870 --> 00:01:11,830
change is the necessary ingredient for
all advancement
5
00:01:11,830 --> 00:01:15,070
and yet it is something that very few
can accept
6
00:01:15,070 --> 00:01:20,090
without a fight in the quest to
understand outer space
7
00:01:20,090 --> 00:01:23,550
the Greek mathematician pythagoras was
the first to propose
8
00:01:23,560 --> 00:01:27,430
that the world was a sphere rotating on
its own access
9
00:01:27,430 --> 00:01:31,110
an idea that seemed absurd to a sixth
century BC Society
10
00:01:31,110 --> 00:01:34,170
that believes in a flat stationary world
11
00:01:34,170 --> 00:01:40,200
they out casper factories and insisted
that an invisible man in a chariot with
12
00:01:40,200 --> 00:01:42,560
flying horses dragged to the Sun
13
00:01:42,560 --> 00:01:47,910
across the sky each day I'm
14
00:01:47,910 --> 00:01:51,000
supported by the newly formed Roman
Catholic Church
15
00:01:51,000 --> 00:01:55,900
this birth centered universe model
remain generally accepted for fifteen
16
00:01:55,900 --> 00:01:56,690
centuries
17
00:01:58,100 --> 00:02:03,230
in that time many scientists theorize
that the model was incorrect
18
00:02:03,230 --> 00:02:07,260
but few dared to share their findings
and those who did
19
00:02:07,260 --> 00:02:11,830
where outcast the last of these rebels
was Galileo
20
00:02:11,830 --> 00:02:15,100
the first astronomer to use a telescope
21
00:02:15,100 --> 00:02:18,880
and the last to be persecuted by the
church for suggesting that the earth
22
00:02:18,880 --> 00:02:19,620
traveled
23
00:02:19,620 --> 00:02:24,210
around the Sun he was summoned to answer
on charges of heresy
24
00:02:24,210 --> 00:02:28,830
at his trial before the church Galloway
I was forced to curse
25
00:02:28,830 --> 00:02:32,270
a viewer and test his theory that the
earth moved
26
00:02:32,270 --> 00:02:36,860
around the Sun have you not done this he
would have been burned alive
27
00:02:36,860 --> 00:02:40,680
at the stake although galloway I'll
complied
28
00:02:40,680 --> 00:02:44,100
he was ordered to spend the rest of his
life under house arrest
29
00:02:44,100 --> 00:02:47,580
and was allowed no visitors or outside
contact
30
00:02:47,580 --> 00:02:52,040
immediately after being sentenced a
stunned Callao
31
00:02:52,040 --> 00:02:55,100
calmly declared and yet the earth moves do she
32
00:02:55,100 --> 00:03:02,100
8, 7, 6, 5, 4, 3, 2, 1, now !
33
00:03:02,900 --> 00:03:06,860
I'll
34
00:03:06,860 --> 00:03:13,550
%uh the
35
00:03:13,550 --> 00:03:14,550
today
36
00:03:14,550 --> 00:03:21,550
you know all of our infrastructure is
run by computers
37
00:03:25,880 --> 00:03:29,130
computers are playing a central role
38
00:03:29,130 --> 00:03:36,130
electricity oil distribution
39
00:03:36,180 --> 00:03:39,120
water water treatment
40
00:03:39,120 --> 00:03:44,880
finances everything
41
00:03:44,880 --> 00:03:48,310
go brought back a few years times you
have pure text
42
00:03:48,310 --> 00:03:50,180
things like %uh air traffic
43
00:03:50,180 --> 00:03:51,280
shut it down ATM
44
00:03:51,280 --> 00:03:54,720
systems shutting down 911 emergency
systems
45
00:03:54,720 --> 00:03:57,970
so I was happening so much now now yeah
46
00:03:57,970 --> 00:03:59,070
you know that could happen
47
00:04:00,980 --> 00:04:06,150
when we first
started working with computer security
48
00:04:06,150 --> 00:04:09,250
I think with a lot security
practitioners I have just spent
49
00:04:09,850 --> 00:04:12,950
these guys CIA & NSA in the FBI
50
00:04:12,950 --> 00:04:17,080
you know they were like like
the computer systems and mission impossible
51
00:04:17,450 --> 00:04:20,640
you know where they have these
incredibly secure systems and they
52
00:04:20,640 --> 00:04:21,510
actually mean with the
53
00:04:21,510 --> 00:04:25,310
dealing and within a couple years I
realized I was teaching them
54
00:04:25,940 --> 00:04:29,900
Imagine a bar graph and government computer
security is
55
00:04:29,900 --> 00:04:33,410
is here corporate computer security is
56
00:04:33,410 --> 00:04:37,190
here and my home network is up about there
57
00:04:40,810 --> 00:04:44,030
cyber terror is a kind of warfare on the
virtual frontier
58
00:04:49,060 --> 00:04:52,250
and sometimes though it can be but outside
of the virtual round
59
00:04:52,250 --> 00:04:56,650
the physical world such as one for
example automated controls on power systems
60
00:04:57,500 --> 00:05:02,220
are attacked and then they cause power
outages was a cause dams to burst
61
00:05:02,220 --> 00:05:05,280
or pipelines to cease their flows and
62
00:05:05,280 --> 00:05:10,710
this is the realm of the cyber terrorist
63
00:05:11,720 --> 00:05:14,950
yeah I think as computers continue to
underpin our society
64
00:05:14,950 --> 00:05:18,170
become really part of what we are now
saying i think is really a digital
65
00:05:18,170 --> 00:05:18,870
nervous system
66
00:05:18,870 --> 00:05:22,420
that underpins our entire economy we
ought to be cognizant of the threat of
67
00:05:22,420 --> 00:05:24,060
computer crime computer criminals
68
00:05:24,060 --> 00:05:27,550
you know hacker is unnecessarily in a
popular
69
00:05:27,550 --> 00:05:30,750
you know vernacular a bad thing hackers
somebody
70
00:05:30,750 --> 00:05:35,210
who explores in a quest for knowledge
bowl was looking assistant see how it works
71
00:05:35,550 --> 00:05:39,790
life around me really changed me for way
my analytical skills
72
00:05:39,790 --> 00:05:43,270
skyrocket was a star programming is more
73
00:05:43,270 --> 00:05:46,430
actually burden and lesbians crazy
74
00:05:46,430 --> 00:05:49,690
and this Washington Street a
75
00:05:49,690 --> 00:05:54,420
work I wonder how these buses were has
doors opening an assignment or having a
76
00:05:54,420 --> 00:05:55,050
stink about
77
00:05:55,050 --> 00:05:59,220
I think about your work into it all hacking is expanding the boundaries
78
00:05:59,220 --> 00:06:03,270
is exploring and said exploring the
global exploring space exploring the
79
00:06:03,270 --> 00:06:03,970
inner spaces
80
00:06:03,970 --> 00:06:07,010
I've telecommunications networks are the
personal computer
81
00:06:07,010 --> 00:06:09,110
and trying to find out what more you can
do
82
00:06:09,410 --> 00:06:11,400
to crack for someone who takes those skills
83
00:06:11,400 --> 00:06:14,530
and use them for for ill use them for
for bad things
84
00:06:14,530 --> 00:06:18,790
most hackers are above mine in 10
they're just curious
85
00:06:18,790 --> 00:06:23,210
and in those hackers who are destructive
for criminal they should be punished
86
00:06:23,210 --> 00:06:26,320
the FBI does track the average you know
87
00:06:26,320 --> 00:06:29,910
white hat hacker we don't have the
resources or any interest in doing
88
00:06:29,910 --> 00:06:33,500
we're specifically listed in individuals
they're breaking federal law
89
00:06:33,500 --> 00:06:38,440
hacking to me is expressing human drive
to know more to go for the day
90
00:06:38,440 --> 00:06:42,220
to experiment that to me is is
fundamental
91
00:06:42,220 --> 00:06:45,600
I think the Wild West is the best valid
92
00:06:45,610 --> 00:06:49,070
you're here in an area where laws
93
00:06:49,070 --> 00:06:53,290
never really considered any this and
where
94
00:06:53,290 --> 00:06:56,910
new things are happening exciting things
are happening we don't know what's right
95
00:06:56,910 --> 00:06:58,460
or wrong exactly, it's a little fuzzy
96
00:06:58,660 --> 00:07:02,520
to a white hat
hacker is someone who might
97
00:07:02,520 --> 00:07:06,040
sakes for their own company network
98
00:07:06,050 --> 00:07:09,580
to determine how much more about how to
protect against up
99
00:07:09,580 --> 00:07:13,280
black at hackers and crackers are those
that use that knowledge use their ability
100
00:07:13,280 --> 00:07:17,260
to make commit crimes in those people
the way it should
101
00:07:17,260 --> 00:07:20,870
between the white hat good guys and the
black hat bad guys
102
00:07:20,870 --> 00:07:25,840
is a very interesting character known as
the grey had unethical vigilante of the
103
00:07:25,840 --> 00:07:26,770
cyber West
104
00:07:26,770 --> 00:07:31,430
although he's not paid for his services
like some white hats
105
00:07:31,430 --> 00:07:35,660
the curious grey hat takes it upon
himself to hack into computers and
106
00:07:35,660 --> 00:07:40,600
find security holes he then informs
the owners have these vulnerable computers
107
00:07:40,670 --> 00:07:44,560
about the problems to help them prevent
any villain is black hats
108
00:07:44,560 --> 00:07:48,190
from later exploiting the holes for
unethical for criminal purposes
109
00:07:48,190 --> 00:07:52,000
there individualists have the first
degree that's what they are
110
00:07:52,000 --> 00:07:55,910
there the Cowboys there they're out
there on the edge of the wild west of
111
00:07:55,910 --> 00:07:57,010
the outlaw world
112
00:07:57,010 --> 00:08:00,160
going out any and trying new stuff
113
00:08:00,160 --> 00:08:04,390
and and seeing where the borders are
seeing where the edges like seeing where
114
00:08:04,390 --> 00:08:07,640
you know there be monsters what it what
ministers are out there
115
00:08:07,640 --> 00:08:12,480
that's he does and you know you got your
white herbs are going out there and try
116
00:08:12,480 --> 00:08:13,280
to ship these guys
117
00:08:13,280 --> 00:08:16,660
is very hard to make this Asian legal or
illegal when you're talking hacking
118
00:08:16,660 --> 00:08:18,900
because intent is very much part
119
00:08:18,900 --> 00:08:23,050
or justice system it's very hard know
what some reason 10
120
00:08:23,050 --> 00:08:26,930
I understand the government's point to
feel I understand that they feel they
121
00:08:26,930 --> 00:08:28,150
need to send a message that
122
00:08:28,150 --> 00:08:31,320
crime can't be tolerated no matter how
well-intentioned is and
123
00:08:31,320 --> 00:08:36,250
each I think that in some ways. they're unable to look beyond that message
124
00:08:36,340 --> 00:08:39,460
I don't think that necessarily see the
social impact of what they do
125
00:08:39,460 --> 00:08:43,960
and I think that you can't use all
models
126
00:08:43,960 --> 00:08:48,060
and rules and apply them to this these
new situations they don't buy
127
00:08:48,060 --> 00:08:51,980
him
128
00:08:51,980 --> 00:08:58,980
am
129
00:09:14,500 --> 00:09:16,980
as convoluted as its modern-day usage
130
00:09:16,980 --> 00:09:21,480
the dictionary definition of the word
hack is either the active coming through
131
00:09:21,480 --> 00:09:22,690
something with quick
132
00:09:22,690 --> 00:09:26,530
unskilled blows for the ability to find
a way to manage
133
00:09:26,530 --> 00:09:29,900
a given challenge such as can you hack it or not
134
00:09:30,010 --> 00:09:35,810
how this word transformed into
what we know today as the hacker
135
00:09:35,810 --> 00:09:42,390
was not through the computer but through
the model train
136
00:09:42,390 --> 00:09:46,840
in 1946 the tech Model Railroad Club was
formed at MIT
137
00:09:46,840 --> 00:09:51,600
comprised of engineering students and
model train enthusiasts of all ages
138
00:09:51,600 --> 00:09:56,160
the purpose of the club was to challenge
and modify the functional design of
139
00:09:56,160 --> 00:09:57,170
model trains
140
00:09:57,170 --> 00:10:01,670
in order to hack a better train they
define a hacker
141
00:10:01,670 --> 00:10:05,900
as one who applies ingenuity to create a
clever result
142
00:10:05,900 --> 00:10:10,570
called i hack still in existence today
143
00:10:10,580 --> 00:10:15,090
the tech model railroad club: remains
proud that it originated the word hacker
144
00:10:15,090 --> 00:10:23,330
and disapproves using the term to
represent illegal acts of computer crimes
145
00:10:24,200 --> 00:10:30,330
in as the term hacker moved from the
world of model trains to modern computers
146
00:10:30,460 --> 00:10:36,500
one of its key evolutionary phases was
the telephone
147
00:10:36,500 --> 00:10:39,710
1969 nobody had a computer faking list
148
00:10:39,710 --> 00:10:43,500
was at that time hacking the phones
there are no computers fact it was only
149
00:10:43,500 --> 00:10:44,350
the phone system
150
00:10:44,350 --> 00:10:47,620
always been working with electronics
spinning around with things
151
00:10:47,620 --> 00:10:51,630
trying different things finding out why
things did work on why we work so well
152
00:10:51,630 --> 00:10:56,800
others don't work so well did mostly
through experimentation despite round
153
00:10:56,800 --> 00:10:57,300
there
154
00:10:57,300 --> 00:11:00,520
I have not actually been discovered of
the Captain Crunch
155
00:11:00,520 --> 00:11:07,520
vessel to Captain Crunch so solicitous
covered by the blanket
156
00:11:07,580 --> 00:11:10,070
and that it is just by chance
157
00:11:10,070 --> 00:11:14,130
they happen to play around with the
whistle an experiment around what
158
00:11:14,130 --> 00:11:17,570
pressing different roles get different
pitch like to try this one
159
00:11:17,570 --> 00:11:20,700
it's not 2600 with perfect pitch
160
00:11:20,700 --> 00:11:23,760
that story's center
161
00:11:23,760 --> 00:11:26,870
but (2600 ton) twice serotonin is
162
00:11:26,870 --> 00:11:33,870
used to activate encamped along this is
struck
163
00:11:35,210 --> 00:11:38,360
I read and a newspaper article there
that
164
00:11:38,360 --> 00:11:41,840
it was now possible for certain cities
dial overseas
165
00:11:41,840 --> 00:11:46,230
directly without going to an operator I
said gee house after possible
166
00:11:46,230 --> 00:11:50,500
so too little socially engineering. social engineering is intact were basically
167
00:11:50,500 --> 00:11:51,390
what you doing
168
00:11:51,390 --> 00:11:55,010
is your following someone into giving
access
169
00:11:55,010 --> 00:11:58,710
to someplace the don't having business
be am
170
00:11:58,710 --> 00:12:01,750
this is a technique that a lot of people
is not just hack
171
00:12:01,750 --> 00:12:04,980
for example sales guys will use social
engineering
172
00:12:04,980 --> 00:12:10,100
for selling is working with people if
helping them make the gym
173
00:12:10,100 --> 00:12:13,110
good decision helping them by
174
00:12:13,110 --> 00:12:17,310
so too little social engineering I was
having an opportunity to tell me oh you
175
00:12:17,310 --> 00:12:19,150
doubt people's twenty to start
176
00:12:19,150 --> 00:12:22,400
networking oversee senator from there
you just to keep both
177
00:12:22,400 --> 00:12:26,200
0 for 4 and the country code in the city
code numbers start
178
00:12:26,210 --> 00:12:31,080
you can connect oh wow so I took down
mapped out the entire
179
00:12:31,080 --> 00:12:34,870
entire country go to the world not only
can I call country
180
00:12:34,870 --> 00:12:37,920
like to experiment around these codes
you can find a way words could go to
181
00:12:37,920 --> 00:12:41,280
in scope but have codes that were not
published because would
182
00:12:41,280 --> 00:12:45,140
we're getting the satellite systems and
phone system so
183
00:12:45,140 --> 00:12:49,850
ship sure phone systems they have their
own country Co throws just understanding
184
00:12:49,850 --> 00:12:52,000
other phone system work
185
00:12:52,000 --> 00:12:56,540
hackers have thus been involved with
each new technological development
186
00:12:56,540 --> 00:13:00,790
leading to the computer for centuries
enjoying the intellectual challenges
187
00:13:00,790 --> 00:13:03,830
have creatively overcoming the
limitations of each age
188
00:13:03,840 --> 00:13:09,860
contrary to popular belief when hackers
finally did meet modern day computers
189
00:13:09,860 --> 00:13:13,740
they did not intrude upon them they
invented them
190
00:13:13,740 --> 00:13:18,430
to those of us who are real hardcore in
the computer industry
191
00:13:18,430 --> 00:13:22,460
were hacking was a white to people who
hacked away
192
00:13:22,470 --> 00:13:25,910
all night long people usually that
didn't have
193
00:13:25,910 --> 00:13:30,100
all computers up there on the didn't
have any money but they were University
194
00:13:30,100 --> 00:13:33,150
and they found out that if they stayed
up all night long there were some
195
00:13:33,150 --> 00:13:37,160
your son's and they call that hacking
because the hacked away
196
00:13:37,160 --> 00:13:40,730
took a program have to get up and try to
make it a little better little better
197
00:13:40,730 --> 00:13:44,110
way back in the high slot open
government have a computer sunday and he
198
00:13:44,110 --> 00:13:45,550
said it cost as much as a house
199
00:13:45,550 --> 00:13:49,400
I said we'll all live in an apartment I
was going to have a computer and even if
200
00:13:49,400 --> 00:13:50,480
it cost me a house
201
00:13:50,480 --> 00:13:55,560
I got a phone call from a friend
202
00:13:55,560 --> 00:13:58,510
well as a group getting together in
their interest in things like terminals
203
00:13:58,510 --> 00:13:59,750
I can just design
204
00:13:59,750 --> 00:14:03,090
video terminal work with my phone color
TV and spiky type in
205
00:14:03,090 --> 00:14:07,190
and talked with think all the ARPANET
the ARPANET was started by the military in
206
00:14:07,190 --> 00:14:07,210
put the whole bunch campuses across the
United States together
in
207
00:14:07,210 --> 00:14:10,240
put the whole bunch campuses across the
United States together
208
00:14:10,240 --> 00:14:14,030
so I could actually like Chuck chess on
it computer MIT
209
00:14:14,030 --> 00:14:17,830
bent over to computer Stanford some
files and over to Berkeley
210
00:14:17,840 --> 00:14:21,330
to other parts of the world long before
the internet have to have that's why
211
00:14:21,330 --> 00:14:22,550
don't my hunter milf and
212
00:14:22,550 --> 00:14:26,470
when Alan Tam said their a computer
but starting for people with terminal somethings
213
00:14:26,610 --> 00:14:30,480
I thought copy the short migrate the low
chip design and went to the club
214
00:14:30,480 --> 00:14:34,190
so excited about it summer these people
were all talking about microprocessors
215
00:14:34,190 --> 00:14:37,810
had some we made it possible to have a
computer at a low cost
216
00:14:37,810 --> 00:14:41,640
it came out of a group of people that
were kind of liberal thinking about
217
00:14:41,640 --> 00:14:42,840
computers for the people
218
00:14:42,840 --> 00:14:47,010
the whole mentality him for Computer
Club was extremely open information
219
00:14:47,010 --> 00:14:47,380
should be
220
00:14:47,380 --> 00:14:51,390
published handed out because basically
we work creating stuff that was gonna
221
00:14:51,390 --> 00:14:55,470
move the world for work and we should do
are our best to be good contributors to
222
00:14:55,470 --> 00:15:01,150
society in that way
223
00:15:01,150 --> 00:15:03,870
and that's really where that word hacker originated
224
00:15:03,870 --> 00:15:08,680
for a long time technology
computer technology digital technology
225
00:15:08,680 --> 00:15:10,170
was the relative hacker alone
226
00:15:10,170 --> 00:15:14,220
people are really into it that was
theirs big business
227
00:15:14,230 --> 00:15:18,360
laughed at IBM said that they'll never
be a market for more than 20 computers
228
00:15:18,360 --> 00:15:19,260
in the world
229
00:15:19,260 --> 00:15:23,800
a market for that so personal computing
was really
230
00:15:23,800 --> 00:15:26,840
created by hackers for hackers and
that's what you know we play with this
231
00:15:26,840 --> 00:15:29,130
stuff then business
232
00:15:29,130 --> 00:15:33,730
industry government star as a whole ours
money to be made here and they started
233
00:15:33,730 --> 00:15:34,580
taking over
234
00:15:34,580 --> 00:15:39,450
first by commercializing over the last
decade
235
00:15:39,450 --> 00:15:43,860
commercialization of the Internet has
exploded into a multi-billion dollar industry
236
00:15:43,860 --> 00:15:48,010
prompting governments to argue that they
must control the Internet to ensure the
237
00:15:48,010 --> 00:15:49,270
economy safety
238
00:15:49,270 --> 00:15:53,070
in an international organization named I
can
239
00:15:53,080 --> 00:15:56,700
was thus created by the United States
government in 1998
240
00:15:56,700 --> 00:16:01,950
based in Marina del Rey California I can
controls the 13 computers
241
00:16:01,950 --> 00:16:05,260
which manage the domain names over the world
242
00:16:05,260 --> 00:16:10,240
whoever controls these 13 computers
controls the World Wide Web
243
00:16:10,240 --> 00:16:15,880
the rest of the world opposed to this
United States dominated control if I can
244
00:16:15,880 --> 00:16:20,890
and so it was agreed that the UN would
create an international body in 2006
245
00:16:20,890 --> 00:16:21,980
to run I can
246
00:16:21,980 --> 00:16:25,560
and ensuring equal internet availability
to all countries
247
00:16:25,560 --> 00:16:29,280
when the time came to relinquish its
power however
248
00:16:29,280 --> 00:16:33,500
the United States Department of Commerce
instead declared that the United States
249
00:16:33,500 --> 00:16:35,750
would keep control if I can indefinitely
250
00:16:35,750 --> 00:16:41,020
the United States has since
made controversial you serve this
251
00:16:41,020 --> 00:16:43,260
self-declared monopoly on the Internet
252
00:16:43,260 --> 00:16:47,390
such as taking over the country codes
for iraq and Kazakhstan
253
00:16:47,390 --> 00:16:50,440
without requiring consent for my the
country
254
00:16:50,440 --> 00:16:53,520
the and by asking popular search engines
255
00:16:53,520 --> 00:16:57,820
to hand over private user information
and Internet activity patterns
256
00:16:57,820 --> 00:17:03,420
in the Internet is quickly becoming less
of a public information sharing network
257
00:17:03,420 --> 00:17:07,390
and more corporate tool for profit and a
government tool for control
258
00:17:07,390 --> 00:17:11,150
the hacking skills are gonna become
259
00:17:11,150 --> 00:17:14,190
critical to Liberty in this country
260
00:17:14,200 --> 00:17:17,440
because as as government and industry
starts to realize they can use
261
00:17:17,440 --> 00:17:18,270
technology
262
00:17:18,270 --> 00:17:22,740
to shut people down to reduce our
liberties the only freedom fighters out
263
00:17:22,740 --> 00:17:23,700
there will be hackers
264
00:17:23,700 --> 00:17:27,390
the next war is not before with bullets
and guns and bombs gonna be fought with
265
00:17:27,390 --> 00:17:27,890
co
266
00:17:27,890 --> 00:17:30,070
before the technology with computers
267
00:17:30,070 --> 00:17:33,700
that's how the words before and if you want to preserve liberties in this country
268
00:17:33,700 --> 00:17:36,220
I don't think it has anything to do with
the second member the right to bear
269
00:17:36,220 --> 00:17:40,210
arms the right to bear computers
270
00:17:40,810 --> 00:17:45,720
and (over time)Beaufort line the term hacking store nowadays has a meaning of
271
00:17:45,720 --> 00:17:49,540
I'm hacking my way in a chopping my way
into somebody else's computer
272
00:17:49,540 --> 00:17:53,730
and the newspapers and the media have
tried to make action to be a word that
273
00:17:53,730 --> 00:17:54,700
means ok
274
00:17:54,700 --> 00:17:58,470
got it something bad it's a threat was
invisible threads you don't know about
275
00:17:58,470 --> 00:18:03,040
there's a lot of like spilt in like come
to church here's the Dartmouth and that
276
00:18:03,040 --> 00:18:03,720
we have in
277
00:18:03,720 --> 00:18:08,080
our society today even government p
hackers are bad just one of those
278
00:18:08,080 --> 00:18:15,090
church grounds you don't like actors say
279
00:18:15,090 --> 00:18:17,090
socrates was a humble Greek philosopher
280
00:18:18,550 --> 00:18:23,070
who debated with patrons in the streets
winning every argument yet crediting his
281
00:18:23,070 --> 00:18:24,720
opponents for any insects
282
00:18:24,720 --> 00:18:28,350
that may have arisen he chose not to
teach for money
283
00:18:28,350 --> 00:18:31,570
as did the many professional so first
serve the time
284
00:18:31,570 --> 00:18:35,740
and yet he was considered by the masses
to be the most wise
285
00:18:35,740 --> 00:18:39,340
above all men the Athenian powers
however
286
00:18:39,340 --> 00:18:43,180
paranoid over Athens inevitable defeat
by the attacking Spartans
287
00:18:43,190 --> 00:18:48,060
concluded that intellectuals like
Socrates weakening Athenian society
288
00:18:48,060 --> 00:18:51,220
by undermining its traditional views and values
289
00:18:51,220 --> 00:18:54,250
socrates was arrested on charges
290
00:18:54,250 --> 00:18:57,410
refusing to recognize the official gods
have the state
291
00:18:57,410 --> 00:19:00,410
introducing new gods and corrupting
292
00:19:00,410 --> 00:19:06,060
the yen at his trial Socrates insisted
that he did not know enough to teach
293
00:19:06,060 --> 00:19:07,840
anybody anything claiming
294
00:19:07,840 --> 00:19:10,970
I am very conscious but I am NOT wise at all
295
00:19:10,970 --> 00:19:14,630
he was sentenced to death
296
00:19:14,630 --> 00:19:18,020
by drinking a cup of poisonous curb
called hemlock
297
00:19:18,020 --> 00:19:21,580
which produces a slow death I gradually
paralyzing
298
00:19:21,580 --> 00:19:24,990
the central nervous system Socrates
would be
299
00:19:24,990 --> 00:19:30,560
his on executioner the philosopher was
taken to the nearby jail
300
00:19:30,560 --> 00:19:33,770
where his sentence would be carried out
in the comfort of his friends
301
00:19:33,770 --> 00:19:36,850
disciples when he drank the cup hemlock
302
00:19:36,850 --> 00:19:40,670
his friends could not help he consoled
303
00:19:40,680 --> 00:19:43,920
to fear death my friends
304
00:19:43,920 --> 00:19:47,450
is only to think ourselves wise without
being wise
305
00:19:47,450 --> 00:19:51,420
for it is to think that we know what we
do not know
306
00:19:51,420 --> 00:19:57,040
society is always going to have trouble
with people who want to push them
307
00:19:57,040 --> 00:20:00,690
societies are designed around
308
00:20:00,690 --> 00:20:04,840
conformity what hacking is is saying I'm
gonna do a different
309
00:20:04,840 --> 00:20:09,040
see what else I can do wanna see where
else to go society is never gonna like
310
00:20:09,040 --> 00:20:09,380
that
311
00:20:09,390 --> 00:20:13,220
society will always make laws against
and thats
312
00:20:13,220 --> 00:20:17,440
appropriate for society do what I would
say it's very important for society
313
00:20:17,440 --> 00:20:20,820
have people were willing to push the
envelope
314
00:20:20,820 --> 00:20:26,050
otherwise aside world so hackers are
very very important part
315
00:20:26,050 --> 00:20:30,560
techno with how it you have no
motivation no growth spec
316
00:20:30,560 --> 00:20:34,380
and yet they pose a threat because
317
00:20:34,390 --> 00:20:37,590
they are breaking the rules they are
going to for
318
00:20:37,590 --> 00:20:42,590
that's their job you gotta have a im all
for my lifetime was for
319
00:20:42,590 --> 00:20:45,770
we have stopped out so many things that
are seeds
320
00:20:45,770 --> 00:20:50,350
creativity in this country a water water
teachers will just tell you
321
00:20:50,350 --> 00:20:54,630
don't really have school systems that
encourage the children to think of a
322
00:20:54,640 --> 00:20:56,640
problem in what the solution P
323
00:20:56,640 --> 00:21:01,560
no just like 10 fights with you were
talkin this chapter use that so we don't
324
00:21:01,560 --> 00:21:03,310
teach thinking as much as we teach
325
00:21:03,310 --> 00:21:08,550
you know rigorous wrote in intelligence
is not to fight somebody having a brain
326
00:21:08,550 --> 00:21:12,090
the cam think unseen consider all
possibilities and come up with the
327
00:21:12,090 --> 00:21:16,290
the best solution over now intelligences
saying the exact same things as everyone
328
00:21:16,290 --> 00:21:16,610
else
329
00:21:16,610 --> 00:21:20,350
you read the same newspaper articles
watched see new shows be the same box
330
00:21:20,350 --> 00:21:23,400
and now you can say exactly the same
things about how the world works
331
00:21:23,410 --> 00:21:27,160
see although your group it's almost like
a privilege we're all the same
332
00:21:27,160 --> 00:21:30,710
where intelligent because I C and you
see your Delta so I'm intelligent
333
00:21:30,710 --> 00:21:34,450
and we never really have a real good way
of measuring for you
334
00:21:34,450 --> 00:21:38,450
think him putting together and coming up
with your own
335
00:21:38,450 --> 00:21:45,450
solutions not we have defined as
intelligent we often find is down
336
00:21:46,130 --> 00:21:51,200
and and
337
00:21:51,200 --> 00:21:55,810
in what we see is a growing emerging
threat is the professional cybercrime
338
00:21:55,810 --> 00:21:59,010
from the former Soviet Union from places
like that where you have an educated
339
00:21:59,010 --> 00:21:59,660
populace
340
00:21:59,660 --> 00:22:04,060
my per starving for many there and so
it's not uncommon to find
341
00:22:04,060 --> 00:22:09,150
what are called large programming houses
these houses were all these with huge
342
00:22:09,160 --> 00:22:10,400
networks is set up
343
00:22:10,400 --> 00:22:14,060
usually out in the countryside totally
non-descript
344
00:22:14,060 --> 00:22:18,910
mostly funded by the Russian mafia types
organized crime is very much about
345
00:22:18,920 --> 00:22:24,530
there's a vast conspiracy among
financial
346
00:28:05,030 --> 00:28:08,230
when india detonated its nuclear blast,
347
00:28:08,330 --> 00:28:13,130
and pakistan followed suit a few day later in maw 1998
348
00:28:13,330 --> 00:28:16,230
then what happened was that
349
00:28:16,330 --> 00:28:18,330
a few days after the Indian blast,
350
00:28:18,430 --> 00:28:21,030
the bhabha atomic research center,
351
00:28:21,230 --> 00:28:24,030
which is india's major nuclear installation,
352
00:28:24,500 --> 00:28:28,500
its website was hacked by an anti-nuclear group
353
00:28:28,530 --> 00:28:31,110
a peace group, called mil0rm.
354
00:28:31,230 --> 00:28:35,030
the first pakistan group was called pakistan hackers club
355
00:28:35,230 --> 00:28:37,630
the second group, which is probably the best
356
00:28:37,700 --> 00:28:41,000
is one called GForce Pakistan
357
00:28:41,230 --> 00:28:44,030
they broke into some of the networks of the army
358
00:28:44,230 --> 00:28:51,030
they gave a warning to India's army Nuclear research center at kalpakkam
359
00:28:51,230 --> 00:28:54,530
where GForce pakistan had told them on mondey
360
00:28:54,630 --> 00:28:57,030
we'll crack into you on thursday after noon
361
00:28:57,230 --> 00:29:00,330
and despite having given a full three days notice
362
00:29:01,030 --> 00:29:07,030
[they] managedto crack them precisely on Thursday afternoon
363
00:30:12,000 --> 00:30:16,000
now the thing about China is that it is not done
364
00:30:16,100 --> 00:30:18,000
so much by student and teenagers
365
00:30:18,030 --> 00:30:21,830
In china it is the PLA, the peaple's liberation Army, which is
366
00:30:22,030 --> 00:30:29,530
actually preparing for a very advanced program in information Warfare
367
00:30:30,030 --> 00:30:35,030
here it is a very organized initiative at the state level,at the army level
368
00:30:35,130 --> 00:30:40,030
well they had conducted some type of war exercises of the army
369
00:30:41,030 --> 00:30:42,530
which was directed against,
370
00:30:43,030 --> 00:30:44,530
it was directed against the U.S.
371
00:30:44,530 --> 00:30:48,030
but also directed against tawain, japan, South korea
372
00:30:48,030 --> 00:30:54,030
and there were simulations on how to bring the electronic infrastructure
373
00:30:54,030 --> 00:30:55,530
their trading systems
374
00:30:55,530 --> 00:31:00,530
their stock exchanges, their electricity grids to a halt
375
00:31:00,730 --> 00:31:04,030
china's chief of staff and several generals
376
00:31:04,070 --> 00:31:07,130
were involved in this planning exercise
377
00:31:07,190 --> 00:31:10,030
about five hundred soldiers were involved in this
378
00:31:10,030 --> 00:31:13,630
they did a lot of analysis on how they could
379
00:31:14,030 --> 00:31:18,630
carry out what are called blitzkrieg attacks
380
00:31:18,630 --> 00:31:22,630
because sudden attacks paralyze the information network
381
00:31:22,830 --> 00:31:27,630
the primary aim was the US Aircraft Carriers
382
00:31:28,000 --> 00:31:32,000
and some of the missile systems and then the aircrafts
383
00:31:32,000 --> 00:31:36,000
You know they are trying to incorporate imperial warfare
384
00:31:36,100 --> 00:31:43,000
sun tsu had written rules of warfare hundreds and thousands of years ago
385
00:31:43,100 --> 00:31:47,000
you try to get somebody else to carry out your assassination
386
00:31:47,100 --> 00:31:50,000
the idia is to make you believe that it came from within
387
00:31:50,200 --> 00:31:55,000
that they'll use cracker groups in various other countries
388
00:31:55,100 --> 00:31:59,000
such as children to act as a front for the PLA
389
00:31:59,100 --> 00:32:03,700
People who are attacked will think that it has come out of the universities
390
00:32:04,000 --> 00:32:09,000
whereas it really has come out of China's People's liberation army
35762
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.