All language subtitles for Hackers Wanted 2009-web -dl

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English Download
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish Download
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian Download
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian Download
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese Download
sk Slovak
sl Slovenian
so Somali
es Spanish Download
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:10,860 --> 00:00:58,860 HIGH Security team 2 00:00:59,860 --> 00:01:02,370 man has been and will always be 3 00:01:02,370 --> 00:01:06,360 simultaneously fascinated and terrified aviano 4 00:01:06,870 --> 00:01:11,830 change is the necessary ingredient for all advancement 5 00:01:11,830 --> 00:01:15,070 and yet it is something that very few can accept 6 00:01:15,070 --> 00:01:20,090 without a fight in the quest to understand outer space 7 00:01:20,090 --> 00:01:23,550 the Greek mathematician pythagoras was the first to propose 8 00:01:23,560 --> 00:01:27,430 that the world was a sphere rotating on its own access 9 00:01:27,430 --> 00:01:31,110 an idea that seemed absurd to a sixth century BC Society 10 00:01:31,110 --> 00:01:34,170 that believes in a flat stationary world 11 00:01:34,170 --> 00:01:40,200 they out casper factories and insisted that an invisible man in a chariot with 12 00:01:40,200 --> 00:01:42,560 flying horses dragged to the Sun 13 00:01:42,560 --> 00:01:47,910 across the sky each day I'm 14 00:01:47,910 --> 00:01:51,000 supported by the newly formed Roman Catholic Church 15 00:01:51,000 --> 00:01:55,900 this birth centered universe model remain generally accepted for fifteen 16 00:01:55,900 --> 00:01:56,690 centuries 17 00:01:58,100 --> 00:02:03,230 in that time many scientists theorize that the model was incorrect 18 00:02:03,230 --> 00:02:07,260 but few dared to share their findings and those who did 19 00:02:07,260 --> 00:02:11,830 where outcast the last of these rebels was Galileo 20 00:02:11,830 --> 00:02:15,100 the first astronomer to use a telescope 21 00:02:15,100 --> 00:02:18,880 and the last to be persecuted by the church for suggesting that the earth 22 00:02:18,880 --> 00:02:19,620 traveled 23 00:02:19,620 --> 00:02:24,210 around the Sun he was summoned to answer on charges of heresy 24 00:02:24,210 --> 00:02:28,830 at his trial before the church Galloway I was forced to curse 25 00:02:28,830 --> 00:02:32,270 a viewer and test his theory that the earth moved 26 00:02:32,270 --> 00:02:36,860 around the Sun have you not done this he would have been burned alive 27 00:02:36,860 --> 00:02:40,680 at the stake although galloway I'll complied 28 00:02:40,680 --> 00:02:44,100 he was ordered to spend the rest of his life under house arrest 29 00:02:44,100 --> 00:02:47,580 and was allowed no visitors or outside contact 30 00:02:47,580 --> 00:02:52,040 immediately after being sentenced a stunned Callao 31 00:02:52,040 --> 00:02:55,100 calmly declared and yet the earth moves do she 32 00:02:55,100 --> 00:03:02,100 8, 7, 6, 5, 4, 3, 2, 1, now ! 33 00:03:02,900 --> 00:03:06,860 I'll 34 00:03:06,860 --> 00:03:13,550 %uh the 35 00:03:13,550 --> 00:03:14,550 today 36 00:03:14,550 --> 00:03:21,550 you know all of our infrastructure is run by computers 37 00:03:25,880 --> 00:03:29,130 computers are playing a central role 38 00:03:29,130 --> 00:03:36,130 electricity oil distribution 39 00:03:36,180 --> 00:03:39,120 water water treatment 40 00:03:39,120 --> 00:03:44,880 finances everything 41 00:03:44,880 --> 00:03:48,310 go brought back a few years times you have pure text 42 00:03:48,310 --> 00:03:50,180 things like %uh air traffic 43 00:03:50,180 --> 00:03:51,280 shut it down ATM 44 00:03:51,280 --> 00:03:54,720 systems shutting down 911 emergency systems 45 00:03:54,720 --> 00:03:57,970 so I was happening so much now now yeah 46 00:03:57,970 --> 00:03:59,070 you know that could happen 47 00:04:00,980 --> 00:04:06,150 when we first started working with computer security 48 00:04:06,150 --> 00:04:09,250 I think with a lot security practitioners I have just spent 49 00:04:09,850 --> 00:04:12,950 these guys CIA & NSA in the FBI 50 00:04:12,950 --> 00:04:17,080 you know they were like like the computer systems and mission impossible 51 00:04:17,450 --> 00:04:20,640 you know where they have these incredibly secure systems and they 52 00:04:20,640 --> 00:04:21,510 actually mean with the 53 00:04:21,510 --> 00:04:25,310 dealing and within a couple years I realized I was teaching them 54 00:04:25,940 --> 00:04:29,900 Imagine a bar graph and government computer security is 55 00:04:29,900 --> 00:04:33,410 is here corporate computer security is 56 00:04:33,410 --> 00:04:37,190 here and my home network is up about there 57 00:04:40,810 --> 00:04:44,030 cyber terror is a kind of warfare on the virtual frontier 58 00:04:49,060 --> 00:04:52,250 and sometimes though it can be but outside of the virtual round 59 00:04:52,250 --> 00:04:56,650 the physical world such as one for example automated controls on power systems 60 00:04:57,500 --> 00:05:02,220 are attacked and then they cause power outages was a cause dams to burst 61 00:05:02,220 --> 00:05:05,280 or pipelines to cease their flows and 62 00:05:05,280 --> 00:05:10,710 this is the realm of the cyber terrorist 63 00:05:11,720 --> 00:05:14,950 yeah I think as computers continue to underpin our society 64 00:05:14,950 --> 00:05:18,170 become really part of what we are now saying i think is really a digital 65 00:05:18,170 --> 00:05:18,870 nervous system 66 00:05:18,870 --> 00:05:22,420 that underpins our entire economy we ought to be cognizant of the threat of 67 00:05:22,420 --> 00:05:24,060 computer crime computer criminals 68 00:05:24,060 --> 00:05:27,550 you know hacker is unnecessarily in a popular 69 00:05:27,550 --> 00:05:30,750 you know vernacular a bad thing hackers somebody 70 00:05:30,750 --> 00:05:35,210 who explores in a quest for knowledge bowl was looking assistant see how it works 71 00:05:35,550 --> 00:05:39,790 life around me really changed me for way my analytical skills 72 00:05:39,790 --> 00:05:43,270 skyrocket was a star programming is more 73 00:05:43,270 --> 00:05:46,430 actually burden and lesbians crazy 74 00:05:46,430 --> 00:05:49,690 and this Washington Street a 75 00:05:49,690 --> 00:05:54,420 work I wonder how these buses were has doors opening an assignment or having a 76 00:05:54,420 --> 00:05:55,050 stink about 77 00:05:55,050 --> 00:05:59,220 I think about your work into it all hacking is expanding the boundaries 78 00:05:59,220 --> 00:06:03,270 is exploring and said exploring the global exploring space exploring the 79 00:06:03,270 --> 00:06:03,970 inner spaces 80 00:06:03,970 --> 00:06:07,010 I've telecommunications networks are the personal computer 81 00:06:07,010 --> 00:06:09,110 and trying to find out what more you can do 82 00:06:09,410 --> 00:06:11,400 to crack for someone who takes those skills 83 00:06:11,400 --> 00:06:14,530 and use them for for ill use them for for bad things 84 00:06:14,530 --> 00:06:18,790 most hackers are above mine in 10 they're just curious 85 00:06:18,790 --> 00:06:23,210 and in those hackers who are destructive for criminal they should be punished 86 00:06:23,210 --> 00:06:26,320 the FBI does track the average you know 87 00:06:26,320 --> 00:06:29,910 white hat hacker we don't have the resources or any interest in doing 88 00:06:29,910 --> 00:06:33,500 we're specifically listed in individuals they're breaking federal law 89 00:06:33,500 --> 00:06:38,440 hacking to me is expressing human drive to know more to go for the day 90 00:06:38,440 --> 00:06:42,220 to experiment that to me is is fundamental 91 00:06:42,220 --> 00:06:45,600 I think the Wild West is the best valid 92 00:06:45,610 --> 00:06:49,070 you're here in an area where laws 93 00:06:49,070 --> 00:06:53,290 never really considered any this and where 94 00:06:53,290 --> 00:06:56,910 new things are happening exciting things are happening we don't know what's right 95 00:06:56,910 --> 00:06:58,460 or wrong exactly, it's a little fuzzy 96 00:06:58,660 --> 00:07:02,520 to a white hat hacker is someone who might 97 00:07:02,520 --> 00:07:06,040 sakes for their own company network 98 00:07:06,050 --> 00:07:09,580 to determine how much more about how to protect against up 99 00:07:09,580 --> 00:07:13,280 black at hackers and crackers are those that use that knowledge use their ability 100 00:07:13,280 --> 00:07:17,260 to make commit crimes in those people the way it should 101 00:07:17,260 --> 00:07:20,870 between the white hat good guys and the black hat bad guys 102 00:07:20,870 --> 00:07:25,840 is a very interesting character known as the grey had unethical vigilante of the 103 00:07:25,840 --> 00:07:26,770 cyber West 104 00:07:26,770 --> 00:07:31,430 although he's not paid for his services like some white hats 105 00:07:31,430 --> 00:07:35,660 the curious grey hat takes it upon himself to hack into computers and 106 00:07:35,660 --> 00:07:40,600 find security holes he then informs the owners have these vulnerable computers 107 00:07:40,670 --> 00:07:44,560 about the problems to help them prevent any villain is black hats 108 00:07:44,560 --> 00:07:48,190 from later exploiting the holes for unethical for criminal purposes 109 00:07:48,190 --> 00:07:52,000 there individualists have the first degree that's what they are 110 00:07:52,000 --> 00:07:55,910 there the Cowboys there they're out there on the edge of the wild west of 111 00:07:55,910 --> 00:07:57,010 the outlaw world 112 00:07:57,010 --> 00:08:00,160 going out any and trying new stuff 113 00:08:00,160 --> 00:08:04,390 and and seeing where the borders are seeing where the edges like seeing where 114 00:08:04,390 --> 00:08:07,640 you know there be monsters what it what ministers are out there 115 00:08:07,640 --> 00:08:12,480 that's he does and you know you got your white herbs are going out there and try 116 00:08:12,480 --> 00:08:13,280 to ship these guys 117 00:08:13,280 --> 00:08:16,660 is very hard to make this Asian legal or illegal when you're talking hacking 118 00:08:16,660 --> 00:08:18,900 because intent is very much part 119 00:08:18,900 --> 00:08:23,050 or justice system it's very hard know what some reason 10 120 00:08:23,050 --> 00:08:26,930 I understand the government's point to feel I understand that they feel they 121 00:08:26,930 --> 00:08:28,150 need to send a message that 122 00:08:28,150 --> 00:08:31,320 crime can't be tolerated no matter how well-intentioned is and 123 00:08:31,320 --> 00:08:36,250 each I think that in some ways. they're unable to look beyond that message 124 00:08:36,340 --> 00:08:39,460 I don't think that necessarily see the social impact of what they do 125 00:08:39,460 --> 00:08:43,960 and I think that you can't use all models 126 00:08:43,960 --> 00:08:48,060 and rules and apply them to this these new situations they don't buy 127 00:08:48,060 --> 00:08:51,980 him 128 00:08:51,980 --> 00:08:58,980 am 129 00:09:14,500 --> 00:09:16,980 as convoluted as its modern-day usage 130 00:09:16,980 --> 00:09:21,480 the dictionary definition of the word hack is either the active coming through 131 00:09:21,480 --> 00:09:22,690 something with quick 132 00:09:22,690 --> 00:09:26,530 unskilled blows for the ability to find a way to manage 133 00:09:26,530 --> 00:09:29,900 a given challenge such as can you hack it or not 134 00:09:30,010 --> 00:09:35,810 how this word transformed into what we know today as the hacker 135 00:09:35,810 --> 00:09:42,390 was not through the computer but through the model train 136 00:09:42,390 --> 00:09:46,840 in 1946 the tech Model Railroad Club was formed at MIT 137 00:09:46,840 --> 00:09:51,600 comprised of engineering students and model train enthusiasts of all ages 138 00:09:51,600 --> 00:09:56,160 the purpose of the club was to challenge and modify the functional design of 139 00:09:56,160 --> 00:09:57,170 model trains 140 00:09:57,170 --> 00:10:01,670 in order to hack a better train they define a hacker 141 00:10:01,670 --> 00:10:05,900 as one who applies ingenuity to create a clever result 142 00:10:05,900 --> 00:10:10,570 called i hack still in existence today 143 00:10:10,580 --> 00:10:15,090 the tech model railroad club: remains proud that it originated the word hacker 144 00:10:15,090 --> 00:10:23,330 and disapproves using the term to represent illegal acts of computer crimes 145 00:10:24,200 --> 00:10:30,330 in as the term hacker moved from the world of model trains to modern computers 146 00:10:30,460 --> 00:10:36,500 one of its key evolutionary phases was the telephone 147 00:10:36,500 --> 00:10:39,710 1969 nobody had a computer faking list 148 00:10:39,710 --> 00:10:43,500 was at that time hacking the phones there are no computers fact it was only 149 00:10:43,500 --> 00:10:44,350 the phone system 150 00:10:44,350 --> 00:10:47,620 always been working with electronics spinning around with things 151 00:10:47,620 --> 00:10:51,630 trying different things finding out why things did work on why we work so well 152 00:10:51,630 --> 00:10:56,800 others don't work so well did mostly through experimentation despite round 153 00:10:56,800 --> 00:10:57,300 there 154 00:10:57,300 --> 00:11:00,520 I have not actually been discovered of the Captain Crunch 155 00:11:00,520 --> 00:11:07,520 vessel to Captain Crunch so solicitous covered by the blanket 156 00:11:07,580 --> 00:11:10,070 and that it is just by chance 157 00:11:10,070 --> 00:11:14,130 they happen to play around with the whistle an experiment around what 158 00:11:14,130 --> 00:11:17,570 pressing different roles get different pitch like to try this one 159 00:11:17,570 --> 00:11:20,700 it's not 2600 with perfect pitch 160 00:11:20,700 --> 00:11:23,760 that story's center 161 00:11:23,760 --> 00:11:26,870 but (2600 ton) twice serotonin is 162 00:11:26,870 --> 00:11:33,870 used to activate encamped along this is struck 163 00:11:35,210 --> 00:11:38,360 I read and a newspaper article there that 164 00:11:38,360 --> 00:11:41,840 it was now possible for certain cities dial overseas 165 00:11:41,840 --> 00:11:46,230 directly without going to an operator I said gee house after possible 166 00:11:46,230 --> 00:11:50,500 so too little socially engineering. social engineering is intact were basically 167 00:11:50,500 --> 00:11:51,390 what you doing 168 00:11:51,390 --> 00:11:55,010 is your following someone into giving access 169 00:11:55,010 --> 00:11:58,710 to someplace the don't having business be am 170 00:11:58,710 --> 00:12:01,750 this is a technique that a lot of people is not just hack 171 00:12:01,750 --> 00:12:04,980 for example sales guys will use social engineering 172 00:12:04,980 --> 00:12:10,100 for selling is working with people if helping them make the gym 173 00:12:10,100 --> 00:12:13,110 good decision helping them by 174 00:12:13,110 --> 00:12:17,310 so too little social engineering I was having an opportunity to tell me oh you 175 00:12:17,310 --> 00:12:19,150 doubt people's twenty to start 176 00:12:19,150 --> 00:12:22,400 networking oversee senator from there you just to keep both 177 00:12:22,400 --> 00:12:26,200 0 for 4 and the country code in the city code numbers start 178 00:12:26,210 --> 00:12:31,080 you can connect oh wow so I took down mapped out the entire 179 00:12:31,080 --> 00:12:34,870 entire country go to the world not only can I call country 180 00:12:34,870 --> 00:12:37,920 like to experiment around these codes you can find a way words could go to 181 00:12:37,920 --> 00:12:41,280 in scope but have codes that were not published because would 182 00:12:41,280 --> 00:12:45,140 we're getting the satellite systems and phone system so 183 00:12:45,140 --> 00:12:49,850 ship sure phone systems they have their own country Co throws just understanding 184 00:12:49,850 --> 00:12:52,000 other phone system work 185 00:12:52,000 --> 00:12:56,540 hackers have thus been involved with each new technological development 186 00:12:56,540 --> 00:13:00,790 leading to the computer for centuries enjoying the intellectual challenges 187 00:13:00,790 --> 00:13:03,830 have creatively overcoming the limitations of each age 188 00:13:03,840 --> 00:13:09,860 contrary to popular belief when hackers finally did meet modern day computers 189 00:13:09,860 --> 00:13:13,740 they did not intrude upon them they invented them 190 00:13:13,740 --> 00:13:18,430 to those of us who are real hardcore in the computer industry 191 00:13:18,430 --> 00:13:22,460 were hacking was a white to people who hacked away 192 00:13:22,470 --> 00:13:25,910 all night long people usually that didn't have 193 00:13:25,910 --> 00:13:30,100 all computers up there on the didn't have any money but they were University 194 00:13:30,100 --> 00:13:33,150 and they found out that if they stayed up all night long there were some 195 00:13:33,150 --> 00:13:37,160 your son's and they call that hacking because the hacked away 196 00:13:37,160 --> 00:13:40,730 took a program have to get up and try to make it a little better little better 197 00:13:40,730 --> 00:13:44,110 way back in the high slot open government have a computer sunday and he 198 00:13:44,110 --> 00:13:45,550 said it cost as much as a house 199 00:13:45,550 --> 00:13:49,400 I said we'll all live in an apartment I was going to have a computer and even if 200 00:13:49,400 --> 00:13:50,480 it cost me a house 201 00:13:50,480 --> 00:13:55,560 I got a phone call from a friend 202 00:13:55,560 --> 00:13:58,510 well as a group getting together in their interest in things like terminals 203 00:13:58,510 --> 00:13:59,750 I can just design 204 00:13:59,750 --> 00:14:03,090 video terminal work with my phone color TV and spiky type in 205 00:14:03,090 --> 00:14:07,190 and talked with think all the ARPANET the ARPANET was started by the military in 206 00:14:07,190 --> 00:14:07,210 put the whole bunch campuses across the United States together in 207 00:14:07,210 --> 00:14:10,240 put the whole bunch campuses across the United States together 208 00:14:10,240 --> 00:14:14,030 so I could actually like Chuck chess on it computer MIT 209 00:14:14,030 --> 00:14:17,830 bent over to computer Stanford some files and over to Berkeley 210 00:14:17,840 --> 00:14:21,330 to other parts of the world long before the internet have to have that's why 211 00:14:21,330 --> 00:14:22,550 don't my hunter milf and 212 00:14:22,550 --> 00:14:26,470 when Alan Tam said their a computer but starting for people with terminal somethings 213 00:14:26,610 --> 00:14:30,480 I thought copy the short migrate the low chip design and went to the club 214 00:14:30,480 --> 00:14:34,190 so excited about it summer these people were all talking about microprocessors 215 00:14:34,190 --> 00:14:37,810 had some we made it possible to have a computer at a low cost 216 00:14:37,810 --> 00:14:41,640 it came out of a group of people that were kind of liberal thinking about 217 00:14:41,640 --> 00:14:42,840 computers for the people 218 00:14:42,840 --> 00:14:47,010 the whole mentality him for Computer Club was extremely open information 219 00:14:47,010 --> 00:14:47,380 should be 220 00:14:47,380 --> 00:14:51,390 published handed out because basically we work creating stuff that was gonna 221 00:14:51,390 --> 00:14:55,470 move the world for work and we should do are our best to be good contributors to 222 00:14:55,470 --> 00:15:01,150 society in that way 223 00:15:01,150 --> 00:15:03,870 and that's really where that word hacker originated 224 00:15:03,870 --> 00:15:08,680 for a long time technology computer technology digital technology 225 00:15:08,680 --> 00:15:10,170 was the relative hacker alone 226 00:15:10,170 --> 00:15:14,220 people are really into it that was theirs big business 227 00:15:14,230 --> 00:15:18,360 laughed at IBM said that they'll never be a market for more than 20 computers 228 00:15:18,360 --> 00:15:19,260 in the world 229 00:15:19,260 --> 00:15:23,800 a market for that so personal computing was really 230 00:15:23,800 --> 00:15:26,840 created by hackers for hackers and that's what you know we play with this 231 00:15:26,840 --> 00:15:29,130 stuff then business 232 00:15:29,130 --> 00:15:33,730 industry government star as a whole ours money to be made here and they started 233 00:15:33,730 --> 00:15:34,580 taking over 234 00:15:34,580 --> 00:15:39,450 first by commercializing over the last decade 235 00:15:39,450 --> 00:15:43,860 commercialization of the Internet has exploded into a multi-billion dollar industry 236 00:15:43,860 --> 00:15:48,010 prompting governments to argue that they must control the Internet to ensure the 237 00:15:48,010 --> 00:15:49,270 economy safety 238 00:15:49,270 --> 00:15:53,070 in an international organization named I can 239 00:15:53,080 --> 00:15:56,700 was thus created by the United States government in 1998 240 00:15:56,700 --> 00:16:01,950 based in Marina del Rey California I can controls the 13 computers 241 00:16:01,950 --> 00:16:05,260 which manage the domain names over the world 242 00:16:05,260 --> 00:16:10,240 whoever controls these 13 computers controls the World Wide Web 243 00:16:10,240 --> 00:16:15,880 the rest of the world opposed to this United States dominated control if I can 244 00:16:15,880 --> 00:16:20,890 and so it was agreed that the UN would create an international body in 2006 245 00:16:20,890 --> 00:16:21,980 to run I can 246 00:16:21,980 --> 00:16:25,560 and ensuring equal internet availability to all countries 247 00:16:25,560 --> 00:16:29,280 when the time came to relinquish its power however 248 00:16:29,280 --> 00:16:33,500 the United States Department of Commerce instead declared that the United States 249 00:16:33,500 --> 00:16:35,750 would keep control if I can indefinitely 250 00:16:35,750 --> 00:16:41,020 the United States has since made controversial you serve this 251 00:16:41,020 --> 00:16:43,260 self-declared monopoly on the Internet 252 00:16:43,260 --> 00:16:47,390 such as taking over the country codes for iraq and Kazakhstan 253 00:16:47,390 --> 00:16:50,440 without requiring consent for my the country 254 00:16:50,440 --> 00:16:53,520 the and by asking popular search engines 255 00:16:53,520 --> 00:16:57,820 to hand over private user information and Internet activity patterns 256 00:16:57,820 --> 00:17:03,420 in the Internet is quickly becoming less of a public information sharing network 257 00:17:03,420 --> 00:17:07,390 and more corporate tool for profit and a government tool for control 258 00:17:07,390 --> 00:17:11,150 the hacking skills are gonna become 259 00:17:11,150 --> 00:17:14,190 critical to Liberty in this country 260 00:17:14,200 --> 00:17:17,440 because as as government and industry starts to realize they can use 261 00:17:17,440 --> 00:17:18,270 technology 262 00:17:18,270 --> 00:17:22,740 to shut people down to reduce our liberties the only freedom fighters out 263 00:17:22,740 --> 00:17:23,700 there will be hackers 264 00:17:23,700 --> 00:17:27,390 the next war is not before with bullets and guns and bombs gonna be fought with 265 00:17:27,390 --> 00:17:27,890 co 266 00:17:27,890 --> 00:17:30,070 before the technology with computers 267 00:17:30,070 --> 00:17:33,700 that's how the words before and if you want to preserve liberties in this country 268 00:17:33,700 --> 00:17:36,220 I don't think it has anything to do with the second member the right to bear 269 00:17:36,220 --> 00:17:40,210 arms the right to bear computers 270 00:17:40,810 --> 00:17:45,720 and (over time)Beaufort line the term hacking store nowadays has a meaning of 271 00:17:45,720 --> 00:17:49,540 I'm hacking my way in a chopping my way into somebody else's computer 272 00:17:49,540 --> 00:17:53,730 and the newspapers and the media have tried to make action to be a word that 273 00:17:53,730 --> 00:17:54,700 means ok 274 00:17:54,700 --> 00:17:58,470 got it something bad it's a threat was invisible threads you don't know about 275 00:17:58,470 --> 00:18:03,040 there's a lot of like spilt in like come to church here's the Dartmouth and that 276 00:18:03,040 --> 00:18:03,720 we have in 277 00:18:03,720 --> 00:18:08,080 our society today even government p hackers are bad just one of those 278 00:18:08,080 --> 00:18:15,090 church grounds you don't like actors say 279 00:18:15,090 --> 00:18:17,090 socrates was a humble Greek philosopher 280 00:18:18,550 --> 00:18:23,070 who debated with patrons in the streets winning every argument yet crediting his 281 00:18:23,070 --> 00:18:24,720 opponents for any insects 282 00:18:24,720 --> 00:18:28,350 that may have arisen he chose not to teach for money 283 00:18:28,350 --> 00:18:31,570 as did the many professional so first serve the time 284 00:18:31,570 --> 00:18:35,740 and yet he was considered by the masses to be the most wise 285 00:18:35,740 --> 00:18:39,340 above all men the Athenian powers however 286 00:18:39,340 --> 00:18:43,180 paranoid over Athens inevitable defeat by the attacking Spartans 287 00:18:43,190 --> 00:18:48,060 concluded that intellectuals like Socrates weakening Athenian society 288 00:18:48,060 --> 00:18:51,220 by undermining its traditional views and values 289 00:18:51,220 --> 00:18:54,250 socrates was arrested on charges 290 00:18:54,250 --> 00:18:57,410 refusing to recognize the official gods have the state 291 00:18:57,410 --> 00:19:00,410 introducing new gods and corrupting 292 00:19:00,410 --> 00:19:06,060 the yen at his trial Socrates insisted that he did not know enough to teach 293 00:19:06,060 --> 00:19:07,840 anybody anything claiming 294 00:19:07,840 --> 00:19:10,970 I am very conscious but I am NOT wise at all 295 00:19:10,970 --> 00:19:14,630 he was sentenced to death 296 00:19:14,630 --> 00:19:18,020 by drinking a cup of poisonous curb called hemlock 297 00:19:18,020 --> 00:19:21,580 which produces a slow death I gradually paralyzing 298 00:19:21,580 --> 00:19:24,990 the central nervous system Socrates would be 299 00:19:24,990 --> 00:19:30,560 his on executioner the philosopher was taken to the nearby jail 300 00:19:30,560 --> 00:19:33,770 where his sentence would be carried out in the comfort of his friends 301 00:19:33,770 --> 00:19:36,850 disciples when he drank the cup hemlock 302 00:19:36,850 --> 00:19:40,670 his friends could not help he consoled 303 00:19:40,680 --> 00:19:43,920 to fear death my friends 304 00:19:43,920 --> 00:19:47,450 is only to think ourselves wise without being wise 305 00:19:47,450 --> 00:19:51,420 for it is to think that we know what we do not know 306 00:19:51,420 --> 00:19:57,040 society is always going to have trouble with people who want to push them 307 00:19:57,040 --> 00:20:00,690 societies are designed around 308 00:20:00,690 --> 00:20:04,840 conformity what hacking is is saying I'm gonna do a different 309 00:20:04,840 --> 00:20:09,040 see what else I can do wanna see where else to go society is never gonna like 310 00:20:09,040 --> 00:20:09,380 that 311 00:20:09,390 --> 00:20:13,220 society will always make laws against and thats 312 00:20:13,220 --> 00:20:17,440 appropriate for society do what I would say it's very important for society 313 00:20:17,440 --> 00:20:20,820 have people were willing to push the envelope 314 00:20:20,820 --> 00:20:26,050 otherwise aside world so hackers are very very important part 315 00:20:26,050 --> 00:20:30,560 techno with how it you have no motivation no growth spec 316 00:20:30,560 --> 00:20:34,380 and yet they pose a threat because 317 00:20:34,390 --> 00:20:37,590 they are breaking the rules they are going to for 318 00:20:37,590 --> 00:20:42,590 that's their job you gotta have a im all for my lifetime was for 319 00:20:42,590 --> 00:20:45,770 we have stopped out so many things that are seeds 320 00:20:45,770 --> 00:20:50,350 creativity in this country a water water teachers will just tell you 321 00:20:50,350 --> 00:20:54,630 don't really have school systems that encourage the children to think of a 322 00:20:54,640 --> 00:20:56,640 problem in what the solution P 323 00:20:56,640 --> 00:21:01,560 no just like 10 fights with you were talkin this chapter use that so we don't 324 00:21:01,560 --> 00:21:03,310 teach thinking as much as we teach 325 00:21:03,310 --> 00:21:08,550 you know rigorous wrote in intelligence is not to fight somebody having a brain 326 00:21:08,550 --> 00:21:12,090 the cam think unseen consider all possibilities and come up with the 327 00:21:12,090 --> 00:21:16,290 the best solution over now intelligences saying the exact same things as everyone 328 00:21:16,290 --> 00:21:16,610 else 329 00:21:16,610 --> 00:21:20,350 you read the same newspaper articles watched see new shows be the same box 330 00:21:20,350 --> 00:21:23,400 and now you can say exactly the same things about how the world works 331 00:21:23,410 --> 00:21:27,160 see although your group it's almost like a privilege we're all the same 332 00:21:27,160 --> 00:21:30,710 where intelligent because I C and you see your Delta so I'm intelligent 333 00:21:30,710 --> 00:21:34,450 and we never really have a real good way of measuring for you 334 00:21:34,450 --> 00:21:38,450 think him putting together and coming up with your own 335 00:21:38,450 --> 00:21:45,450 solutions not we have defined as intelligent we often find is down 336 00:21:46,130 --> 00:21:51,200 and and 337 00:21:51,200 --> 00:21:55,810 in what we see is a growing emerging threat is the professional cybercrime 338 00:21:55,810 --> 00:21:59,010 from the former Soviet Union from places like that where you have an educated 339 00:21:59,010 --> 00:21:59,660 populace 340 00:21:59,660 --> 00:22:04,060 my per starving for many there and so it's not uncommon to find 341 00:22:04,060 --> 00:22:09,150 what are called large programming houses these houses were all these with huge 342 00:22:09,160 --> 00:22:10,400 networks is set up 343 00:22:10,400 --> 00:22:14,060 usually out in the countryside totally non-descript 344 00:22:14,060 --> 00:22:18,910 mostly funded by the Russian mafia types organized crime is very much about 345 00:22:18,920 --> 00:22:24,530 there's a vast conspiracy among financial 346 00:28:05,030 --> 00:28:08,230 when india detonated its nuclear blast, 347 00:28:08,330 --> 00:28:13,130 and pakistan followed suit a few day later in maw 1998 348 00:28:13,330 --> 00:28:16,230 then what happened was that 349 00:28:16,330 --> 00:28:18,330 a few days after the Indian blast, 350 00:28:18,430 --> 00:28:21,030 the bhabha atomic research center, 351 00:28:21,230 --> 00:28:24,030 which is india's major nuclear installation, 352 00:28:24,500 --> 00:28:28,500 its website was hacked by an anti-nuclear group 353 00:28:28,530 --> 00:28:31,110 a peace group, called mil0rm. 354 00:28:31,230 --> 00:28:35,030 the first pakistan group was called pakistan hackers club 355 00:28:35,230 --> 00:28:37,630 the second group, which is probably the best 356 00:28:37,700 --> 00:28:41,000 is one called GForce Pakistan 357 00:28:41,230 --> 00:28:44,030 they broke into some of the networks of the army 358 00:28:44,230 --> 00:28:51,030 they gave a warning to India's army Nuclear research center at kalpakkam 359 00:28:51,230 --> 00:28:54,530 where GForce pakistan had told them on mondey 360 00:28:54,630 --> 00:28:57,030 we'll crack into you on thursday after noon 361 00:28:57,230 --> 00:29:00,330 and despite having given a full three days notice 362 00:29:01,030 --> 00:29:07,030 [they] managedto crack them precisely on Thursday afternoon 363 00:30:12,000 --> 00:30:16,000 now the thing about China is that it is not done 364 00:30:16,100 --> 00:30:18,000 so much by student and teenagers 365 00:30:18,030 --> 00:30:21,830 In china it is the PLA, the peaple's liberation Army, which is 366 00:30:22,030 --> 00:30:29,530 actually preparing for a very advanced program in information Warfare 367 00:30:30,030 --> 00:30:35,030 here it is a very organized initiative at the state level,at the army level 368 00:30:35,130 --> 00:30:40,030 well they had conducted some type of war exercises of the army 369 00:30:41,030 --> 00:30:42,530 which was directed against, 370 00:30:43,030 --> 00:30:44,530 it was directed against the U.S. 371 00:30:44,530 --> 00:30:48,030 but also directed against tawain, japan, South korea 372 00:30:48,030 --> 00:30:54,030 and there were simulations on how to bring the electronic infrastructure 373 00:30:54,030 --> 00:30:55,530 their trading systems 374 00:30:55,530 --> 00:31:00,530 their stock exchanges, their electricity grids to a halt 375 00:31:00,730 --> 00:31:04,030 china's chief of staff and several generals 376 00:31:04,070 --> 00:31:07,130 were involved in this planning exercise 377 00:31:07,190 --> 00:31:10,030 about five hundred soldiers were involved in this 378 00:31:10,030 --> 00:31:13,630 they did a lot of analysis on how they could 379 00:31:14,030 --> 00:31:18,630 carry out what are called blitzkrieg attacks 380 00:31:18,630 --> 00:31:22,630 because sudden attacks paralyze the information network 381 00:31:22,830 --> 00:31:27,630 the primary aim was the US Aircraft Carriers 382 00:31:28,000 --> 00:31:32,000 and some of the missile systems and then the aircrafts 383 00:31:32,000 --> 00:31:36,000 You know they are trying to incorporate imperial warfare 384 00:31:36,100 --> 00:31:43,000 sun tsu had written rules of warfare hundreds and thousands of years ago 385 00:31:43,100 --> 00:31:47,000 you try to get somebody else to carry out your assassination 386 00:31:47,100 --> 00:31:50,000 the idia is to make you believe that it came from within 387 00:31:50,200 --> 00:31:55,000 that they'll use cracker groups in various other countries 388 00:31:55,100 --> 00:31:59,000 such as children to act as a front for the PLA 389 00:31:59,100 --> 00:32:03,700 People who are attacked will think that it has come out of the universities 390 00:32:04,000 --> 00:32:09,000 whereas it really has come out of China's People's liberation army 35762

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.