All language subtitles for Black.Code.2016.1080p.WEBRip.H264.AAC

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian Download
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:23,280 --> 00:00:26,382 We are going through the most profound change 2 00:00:26,384 --> 00:00:30,155 in communication technologies in all of human history right now. 3 00:00:34,558 --> 00:00:39,261 Printing press, radio, telegraph, television. All very important. 4 00:00:39,263 --> 00:00:43,132 But I believe we're going through the most transformative, 5 00:00:43,134 --> 00:00:46,403 purely on the basis of three technologies. 6 00:00:46,405 --> 00:00:49,442 Mobile, social media and cloud computing. 7 00:00:56,615 --> 00:00:59,349 They share one very important characteristic. 8 00:00:59,351 --> 00:01:03,152 And that's the amount of private information. 9 00:01:03,154 --> 00:01:06,688 Information that used to be in our desktops or filing cabinets, 10 00:01:06,690 --> 00:01:08,357 even in our heads, 11 00:01:08,359 --> 00:01:11,294 that we now entrust to third parties. 12 00:01:13,665 --> 00:01:17,467 Data that we are conscious of, and deliberate about, 13 00:01:17,469 --> 00:01:20,536 like the e-mails we send and the tweets we post. 14 00:01:20,538 --> 00:01:23,238 But it also includes a lot of information 15 00:01:23,240 --> 00:01:26,211 that we're completely, or mostly, unconscious about. 16 00:01:27,411 --> 00:01:29,446 So if you take my mobile phone, 17 00:01:29,448 --> 00:01:32,781 even when I'm not using it, it's emitting a pulse, 18 00:01:32,783 --> 00:01:36,619 trying to locate the nearest Wi-Fi router or cell phone exchange, 19 00:01:36,621 --> 00:01:39,491 and within that beacon is the make and model of the phone, 20 00:01:40,491 --> 00:01:42,292 the fact that it's my phone, 21 00:01:42,294 --> 00:01:45,328 because my name is attached to the operating system, 22 00:01:45,330 --> 00:01:48,298 and most importantly, the geolocation of the phone. 23 00:01:58,743 --> 00:02:01,677 We are leaving this digital exhaust 24 00:02:01,679 --> 00:02:06,648 that contains extraordinarily precise information about our lives, 25 00:02:06,650 --> 00:02:11,286 our social relationships reduced to trillions of data points 26 00:02:11,288 --> 00:02:16,159 that form now this new ethereal layer around the planet 27 00:02:16,161 --> 00:02:18,660 that's only growing in all directions. 28 00:02:23,535 --> 00:02:27,269 Capabilities are being put in the hands of policy makers, 29 00:02:27,271 --> 00:02:30,874 five years ago, they'd never imagine that they would have. 30 00:02:30,876 --> 00:02:34,713 This is where big data meets Big Brother. 31 00:02:56,201 --> 00:02:57,203 Should be here. 32 00:02:59,404 --> 00:03:01,404 It is kind of in a rock, I think. 33 00:03:01,406 --> 00:03:03,373 Yeah, the entrance is in a rock. 34 00:03:03,375 --> 00:03:05,374 Or a bunker. 35 00:03:05,376 --> 00:03:07,378 Oh, yeah, the bunker. It is down there! 36 00:03:10,614 --> 00:03:12,381 There is a bunker under here. 37 00:03:12,383 --> 00:03:15,785 - Yeah. - It is between 33 and 39. 38 00:03:15,787 --> 00:03:17,219 Right there. Look at that door. 39 00:03:17,221 --> 00:03:18,453 - Yeah. - Yeah, this is it. 40 00:03:18,455 --> 00:03:20,392 - Bahnhof. - Okay. 41 00:03:42,714 --> 00:03:44,616 Hey, I guess we just go in. 42 00:04:44,475 --> 00:04:48,977 Many people believe that you have this cloud services that are floating around. 43 00:04:48,979 --> 00:04:51,381 People think, "Okay, it's a cloud server." 44 00:04:51,383 --> 00:04:54,850 But this is the actual physical location of the Internet. 45 00:05:03,294 --> 00:05:06,629 It's a constant struggle to protect data. 46 00:05:11,035 --> 00:05:15,504 The Swedish Security Police wanted to install tools 47 00:05:15,506 --> 00:05:20,778 to automatically log in to our data and get out the information. 48 00:05:21,879 --> 00:05:23,980 So I invited them to our facility, 49 00:05:23,982 --> 00:05:26,381 and then I had a microphone 50 00:05:26,383 --> 00:05:31,590 which I was provided by the Swedish Public Service, national radio. 51 00:05:45,970 --> 00:05:49,338 I taped this conversation, and they were so angry. 52 00:05:49,340 --> 00:05:52,374 And they also wanted us to sign a paper 53 00:05:52,376 --> 00:05:55,778 where they said that we could not say anything about it. 54 00:05:55,780 --> 00:05:57,713 It should be total secrecy. 55 00:05:57,715 --> 00:06:02,117 They said, "If a terrorist attack happens, it's your fault." 56 00:06:16,967 --> 00:06:19,468 It's, like, a creepy feeling. 57 00:06:19,470 --> 00:06:22,972 Nobody can say that any facility is safe. 58 00:06:22,974 --> 00:06:27,913 There are always possibilities to go in and find data and take it out. 59 00:06:31,549 --> 00:06:35,016 People say that, "Oh, I don't have anything to hide. 60 00:06:35,018 --> 00:06:36,852 They can read my mail. I don't have anything." 61 00:06:36,854 --> 00:06:39,956 But it's not that which is this problem. 62 00:06:39,958 --> 00:06:44,526 The problem is, without secrecy, there can be no democracy. 63 00:06:44,528 --> 00:06:47,398 Without secrecy, there can be no market economy. 64 00:06:48,032 --> 00:06:49,665 Right. 65 00:06:49,667 --> 00:06:52,501 There is an obvious candidate for the Nobel Peace Prize. 66 00:06:52,503 --> 00:06:54,871 - Really? - And that is Edward Snowden. 67 00:06:54,873 --> 00:06:56,408 I mean, yeah. 68 00:07:10,188 --> 00:07:16,958 Does the public enjoy the same right to privacy that we have in the past? 69 00:07:16,960 --> 00:07:19,761 Are we still private citizens, 70 00:07:19,763 --> 00:07:23,499 and then public officials, where the government knows very little about us, 71 00:07:23,501 --> 00:07:24,900 but we know everything about them? 72 00:07:24,902 --> 00:07:27,970 Why are we, the public, becoming disempowered 73 00:07:27,972 --> 00:07:30,807 at the same time that governments around the world, 74 00:07:30,809 --> 00:07:36,045 corporations around the world, institutions around the world, 75 00:07:36,047 --> 00:07:40,982 are gaining greater and greater leverage over the range of our activities, 76 00:07:40,984 --> 00:07:43,121 their knowledge of what we do? 77 00:07:56,867 --> 00:07:59,035 The Citizen Lab is an unusual place. 78 00:08:02,172 --> 00:08:05,476 We're a research unit at the University of Toronto. 79 00:08:07,612 --> 00:08:11,146 We combine the skills of engineers, computer scientists 80 00:08:11,148 --> 00:08:12,949 with social scientists. 81 00:08:12,951 --> 00:08:15,684 We collaborate with people from all over the world 82 00:08:15,686 --> 00:08:17,886 to do the field research that we do. 83 00:08:17,888 --> 00:08:21,257 And we do this to advance research on global security, 84 00:08:21,259 --> 00:08:23,195 cyberspace and human rights. 85 00:08:26,064 --> 00:08:27,996 The world is a very dangerous place 86 00:08:27,998 --> 00:08:31,234 as we saw recently in... in tragic incidents in Paris, 87 00:08:31,236 --> 00:08:36,038 and you want to have security agencies be well adept at discerning 88 00:08:36,040 --> 00:08:38,573 what those threats are over our horizon. 89 00:08:38,575 --> 00:08:43,879 But is it okay that the government sets up a giant digital X-ray machine 90 00:08:43,881 --> 00:08:45,748 over everything that we do? 91 00:08:45,750 --> 00:08:47,950 Because that's effectively where we're headed right now. 92 00:08:51,289 --> 00:08:54,624 We've been a kind of digital early warning system, 93 00:08:54,626 --> 00:08:56,759 scanning the horizon. 94 00:08:56,761 --> 00:08:59,729 And what we've seen, frankly, has been really disturbing. 95 00:12:22,400 --> 00:12:26,235 Tibetans are watched from every angle and from every corner. 96 00:12:26,237 --> 00:12:30,071 It's in their homes, it's in their offices, it's in the streets. 97 00:12:30,073 --> 00:12:32,041 In Tibet, certainly in central Tibet 98 00:12:32,043 --> 00:12:34,442 and around the capital city of Lhasa, 99 00:12:34,444 --> 00:12:38,047 Chinese authorities, together with Chinese corporations, 100 00:12:38,049 --> 00:12:40,215 telecommunications companies, 101 00:12:40,217 --> 00:12:44,986 they've integrated the ability to spy on people via their mobile phone, 102 00:12:44,988 --> 00:12:47,989 via the last communications they may have had over the Internet. 103 00:12:47,991 --> 00:12:51,195 Down to the closed circuit television camera on the streets. 104 00:12:52,863 --> 00:12:55,965 The Chinese so strictly control access to Tibet, 105 00:12:55,967 --> 00:12:57,932 it's just like a black hole 106 00:12:57,934 --> 00:13:01,169 for media, for independent observers, 107 00:13:01,171 --> 00:13:02,907 for international agencies, for anything. 108 00:13:33,103 --> 00:13:37,940 How I escaped is a secret. 109 00:13:56,560 --> 00:13:59,161 People are incredibly courageous. 110 00:13:59,163 --> 00:14:02,364 People inside Tibet will send out news and information. 111 00:14:02,366 --> 00:14:05,370 And they'll say, "I want this story to be told." 112 00:14:06,469 --> 00:14:07,970 They could be imprisoned. 113 00:14:07,972 --> 00:14:09,337 They could be tortured. 114 00:14:09,339 --> 00:14:11,039 Their family could pay the price. 115 00:14:12,309 --> 00:14:14,442 We on the outside have to decide 116 00:14:14,444 --> 00:14:20,114 how to walk this very, sort of, fine line between protecting people's security 117 00:14:20,116 --> 00:14:23,885 and honoring their wishes about getting news and information out. 118 00:14:23,887 --> 00:14:28,289 And we know for a fact, thanks to Citizen Lab's report, 119 00:14:28,291 --> 00:14:31,393 that we are being successfully targeted. 120 00:14:33,396 --> 00:14:38,033 A new report has been released from a group of digital detectives. 121 00:14:38,035 --> 00:14:42,004 From their computers in Toronto, they've tracked a high-tech spy ring 122 00:14:42,006 --> 00:14:43,275 that reaches around the world. 123 00:14:48,011 --> 00:14:49,177 For the past ten months, 124 00:14:49,179 --> 00:14:52,447 these computer experts have been working as cyber sleuths 125 00:14:52,449 --> 00:14:55,884 hot on the trail of a massive electronic spy network. 126 00:14:55,886 --> 00:15:00,188 They say it has taken control of nearly 1,300 high-level computers 127 00:15:00,190 --> 00:15:02,358 in more than 100 countries. 128 00:15:02,360 --> 00:15:05,994 A discovery that could have major political implications. 129 00:15:05,996 --> 00:15:08,496 They can extract any document they wanted. 130 00:15:08,498 --> 00:15:12,467 They could turn on web cameras, turn on audio devices, 131 00:15:12,469 --> 00:15:14,503 so that they could, in effect, use the computers 132 00:15:14,505 --> 00:15:16,538 as a listening device in the offices. 133 00:15:16,540 --> 00:15:19,274 The web of intrigue started with the Dalai Lama 134 00:15:19,276 --> 00:15:21,078 who thought his computer had been hacked. 135 00:15:25,283 --> 00:15:30,085 Up until about 2007 or 2008, I'd never really heard of malware. 136 00:15:30,087 --> 00:15:32,421 You know, I'd heard of viruses, obviously, 137 00:15:32,423 --> 00:15:35,390 but I hadn't really heard about targeted malware attacks 138 00:15:35,392 --> 00:15:37,091 affecting the human rights community. 139 00:15:42,466 --> 00:15:45,967 First time I heard about it was in the context of the Tibetans. 140 00:15:45,969 --> 00:15:50,438 Gradually we started piecing together, they are under surveillance. 141 00:15:50,440 --> 00:15:54,576 The surveillance comes from groups within China. 142 00:15:54,578 --> 00:15:59,648 They're using malicious software and socially-engineered e-mails. 143 00:15:59,650 --> 00:16:02,350 E-mails that are crafted to get them to open it up 144 00:16:02,352 --> 00:16:04,189 to get inside their devices. 145 00:16:05,555 --> 00:16:07,656 Nart Villeneuve, a computer wiz, 146 00:16:07,658 --> 00:16:10,024 figured out how the operation worked 147 00:16:10,026 --> 00:16:12,728 by getting the attackers to hack into his computer. 148 00:16:12,730 --> 00:16:14,495 We're monitoring these groups 149 00:16:14,497 --> 00:16:16,632 for long periods of time, 150 00:16:16,634 --> 00:16:19,567 and you're essentially waiting for them to screw up, right? 151 00:16:19,569 --> 00:16:21,637 And when they do, you take advantage of that. 152 00:16:21,639 --> 00:16:23,739 Sometimes it takes a long time. 153 00:16:23,741 --> 00:16:26,975 You could be monitoring a group for a year and get nothing. 154 00:16:26,977 --> 00:16:31,446 Then one day, they just use a server that they don't lock down 155 00:16:31,448 --> 00:16:33,217 and all the data's just sitting there. 156 00:16:35,151 --> 00:16:37,621 I was at home. It was pretty late. 157 00:17:09,153 --> 00:17:10,551 Nart was scouring through it, 158 00:17:10,553 --> 00:17:13,355 trying to figure out what actor is responsible 159 00:17:13,357 --> 00:17:15,557 for getting inside the Dalai Lama's office. 160 00:17:15,559 --> 00:17:19,627 And there was a 22 or 24 character string that kept coming up 161 00:17:19,629 --> 00:17:22,364 that he couldn't figure out, "What is the meaning of this?" 162 00:17:22,366 --> 00:17:26,634 So on a whim, he just copied and pasted it into Google. 163 00:17:26,636 --> 00:17:30,008 One website came up, and it was Chinese characters. 164 00:17:33,577 --> 00:17:35,210 So he clicked on it. 165 00:17:37,647 --> 00:17:41,549 To my surprise, what came back was the actual page 166 00:17:41,551 --> 00:17:45,820 that the attackers used to interface with the compromised systems. 167 00:17:45,822 --> 00:17:49,825 So they set up a website where they could monitor their victims. 168 00:17:49,827 --> 00:17:52,094 But they didn't password protect it! 169 00:17:52,096 --> 00:17:55,032 So it was like a window into everything they were doing. 170 00:18:05,608 --> 00:18:09,077 This wasn't just targeted at Tibetan organizations 171 00:18:09,079 --> 00:18:11,313 or human rights organizations. 172 00:18:11,315 --> 00:18:15,384 This was global, a pretty wide range of institutions 173 00:18:15,386 --> 00:18:18,353 that showed that these attackers were... were quite busy. 174 00:18:18,355 --> 00:18:20,759 There was huge pickup in the media. It was all over the world. 175 00:18:27,397 --> 00:18:31,202 And it put us on a different kind of footing in terms of our credibility. 176 00:18:34,472 --> 00:18:38,373 In the cyber security community, we were novices at that time. 177 00:18:38,375 --> 00:18:39,344 We were kind of outsiders. 178 00:18:41,846 --> 00:18:44,779 So we were kind of calling it on the fly. 179 00:18:44,781 --> 00:18:46,714 Like, what do we do? What's the right thing to do? 180 00:18:46,716 --> 00:18:48,282 Who do we notify? 181 00:18:48,284 --> 00:18:50,719 I knew that publishing it was important. 182 00:18:50,721 --> 00:18:53,355 We had to redact a lot of the information to protect people. 183 00:18:53,357 --> 00:18:55,691 Should we notify the government? 184 00:18:55,693 --> 00:18:57,625 Should we notify the Canadian government? 185 00:18:57,627 --> 00:19:01,630 How do we notify other governments that are being victimized? 186 00:19:01,632 --> 00:19:03,397 At the time, you know, 187 00:19:03,399 --> 00:19:06,268 we didn't want to completely disclose everything that we had done, 188 00:19:06,270 --> 00:19:08,237 because we wanted to do it again. 189 00:19:08,239 --> 00:19:11,640 In some of the communities I mentioned, they loved it. 190 00:19:11,642 --> 00:19:15,143 But I got the feeling from, certainly inside my own government, 191 00:19:15,145 --> 00:19:16,778 there was a lot of weirdness. 192 00:19:16,780 --> 00:19:20,281 - Are we allowed to speculate? - Well, I think now we know 193 00:19:20,283 --> 00:19:24,853 because there's a Snowden disclosure that explicitly references the fact 194 00:19:24,855 --> 00:19:27,455 that the Canadians and the Americans, 195 00:19:27,457 --> 00:19:29,490 our signals intelligence agencies, 196 00:19:29,492 --> 00:19:32,528 were piggybacking off the GhostNet network. 197 00:19:32,530 --> 00:19:36,267 So, in publishing the report, we basically broke up their party. 198 00:19:44,607 --> 00:19:48,277 From our initial samples from the office of the Dalai Lama, 199 00:19:48,279 --> 00:19:51,212 they were actually compromised by two distinct groups. 200 00:19:51,214 --> 00:19:54,348 The GhostNet group obviously got the most attention. 201 00:19:54,350 --> 00:19:57,251 But there was another group that was also active. 202 00:19:57,253 --> 00:19:59,654 The GhostNet group shut down their operations, 203 00:19:59,656 --> 00:20:03,624 but the other group, um, they're still going. 204 00:21:47,330 --> 00:21:50,565 In our research, what we see are acts of war 205 00:21:50,567 --> 00:21:53,835 that take place against citizens, 206 00:21:53,837 --> 00:21:55,836 using these very technologies. 207 00:21:55,838 --> 00:21:58,874 Getting inside the computers of Tibetans and then arresting them, 208 00:21:58,876 --> 00:22:02,844 and possibly executing them, is a kind of act of war. 209 00:22:04,915 --> 00:22:07,816 We see this sort of thing every week, right? 210 00:22:07,818 --> 00:22:10,288 Minor to major versions of it. 211 00:22:12,790 --> 00:22:16,791 Everything on the site is correct except this. 212 00:22:16,793 --> 00:22:20,828 So this... The last log-in on the C panel was from Korea. 213 00:22:20,830 --> 00:22:23,332 - Mm-hmm. - Do you guys have any work in Korea? 214 00:22:23,334 --> 00:22:25,066 - Is there any... - No, no... 215 00:22:25,068 --> 00:22:28,036 So who actually accesses the website to update it and all that sort of thing? 216 00:22:28,038 --> 00:22:30,441 - It must be somebody unauthorized. - Yeah. 217 00:23:44,882 --> 00:23:47,652 One, two, three, 218 00:23:48,652 --> 00:23:53,491 four, five, six, 219 00:23:54,157 --> 00:23:55,923 seven. 220 00:26:16,232 --> 00:26:18,068 Hmm. 221 00:27:21,030 --> 00:27:24,365 Not that long ago, the government of Pakistan put out this tender 222 00:27:24,367 --> 00:27:28,903 for proposals for a nationwide Internet filtering system. 223 00:27:28,905 --> 00:27:32,140 They wanted to solicit proposals from companies to build, 224 00:27:32,142 --> 00:27:35,011 effectively, the Great Firewall of Pakistan. 225 00:27:41,151 --> 00:27:44,818 Today if you visit Pakistan and you get online 226 00:27:44,820 --> 00:27:48,626 and you try to access YouTube, this is what you'll see, 227 00:27:49,659 --> 00:27:50,894 a blocked page like this. 228 00:27:55,866 --> 00:27:58,001 I'm in Islamabad, putting in a SIM card. 229 00:28:02,138 --> 00:28:05,006 First and foremost, I'm really excited to see Shahzad. 230 00:28:05,008 --> 00:28:09,309 I first met Shahzad and the organization Bytes for All, 231 00:28:09,311 --> 00:28:10,711 eight years ago, I think? 232 00:28:10,713 --> 00:28:13,414 And he's been involved, in one way or another, 233 00:28:13,416 --> 00:28:15,285 in Citizen Lab research ever since. 234 00:28:28,432 --> 00:28:31,636 - Hi, Shahzad. - Hello! 235 00:28:33,103 --> 00:28:36,837 - So great to see you. - Here we are. Here we are. 236 00:28:38,774 --> 00:28:40,974 Bytes for All does what they do, 237 00:28:40,976 --> 00:28:45,180 fight for Internet rights and advocacy-based approach to Internet freedom 238 00:28:45,182 --> 00:28:47,816 under extreme duress. 239 00:28:47,818 --> 00:28:50,285 So they're operating in a country that, 240 00:28:50,287 --> 00:28:53,153 specifically around media and free expression, 241 00:28:53,155 --> 00:28:55,355 has got to be one of the worst places in the world. 242 00:28:55,357 --> 00:28:59,027 Uh, journalists are routinely kidnapped, murdered, 243 00:28:59,029 --> 00:29:01,863 uh, offices firebombed, et cetera, 244 00:29:01,865 --> 00:29:04,035 and they've experienced all of that. 245 00:29:05,402 --> 00:29:08,803 Death threats, staff members kidnapped, 246 00:29:08,805 --> 00:29:12,807 his own son beat up and thrown to the side of the road 247 00:29:12,809 --> 00:29:15,879 as a warning to Shahzad not to do what he's doing. 248 00:29:19,950 --> 00:29:22,282 In my opinion, 249 00:29:22,284 --> 00:29:26,690 Internet has opened up so many opportunities... 250 00:29:27,824 --> 00:29:29,423 for the people to express, 251 00:29:29,425 --> 00:29:33,862 and that is the sole reason that we are fighting for open Internet. 252 00:29:33,864 --> 00:29:37,397 They lost their public spaces. 253 00:29:37,399 --> 00:29:41,236 They lost their ability to go out freely. 254 00:29:41,238 --> 00:29:45,205 So, as they are putting controls and curbs on physical spaces, 255 00:29:45,207 --> 00:29:49,210 they are doing exactly the same in online spaces as well. 256 00:29:49,212 --> 00:29:53,147 So precisely the reason we are standing out there to reclaim those spaces. 257 00:29:53,149 --> 00:29:54,848 And we have to at some point, 258 00:29:54,850 --> 00:29:56,419 and we'll continue to do that. 259 00:29:57,854 --> 00:30:00,387 Oh, my God. 260 00:30:00,389 --> 00:30:04,025 The government has the ability to ban specific pages. 261 00:30:06,096 --> 00:30:08,363 You ban all of Facebook, businesses are suffering, 262 00:30:08,365 --> 00:30:09,463 people communicate. 263 00:30:09,465 --> 00:30:12,299 I mean, you can laugh and joke and say, 264 00:30:12,301 --> 00:30:15,068 "For a few days people won't play FarmVille," but it's not about that. 265 00:30:15,070 --> 00:30:18,405 It's about your fundamental rights being snatched from you 266 00:30:18,407 --> 00:30:21,976 and no government, in my opinion, should have the ability to do that. 267 00:30:21,978 --> 00:30:23,377 Right. 268 00:30:23,379 --> 00:30:26,514 Not only that, they banned Wikipedia for a little while. 269 00:30:26,516 --> 00:30:28,082 - Yes, mm-hmm. - YouTube. 270 00:30:28,084 --> 00:30:31,385 Uh, about several thousand websites were affected. 271 00:30:31,387 --> 00:30:35,022 I think the Internet is this vast, unregulated, 272 00:30:35,024 --> 00:30:37,525 wonderful, democratizing space 273 00:30:37,527 --> 00:30:40,295 and no matter what anyone does, people will find a way. 274 00:31:32,449 --> 00:31:35,616 Hi, I'm Sabeen Mahmud, and I'm the director of Peace Nation, 275 00:31:35,618 --> 00:31:37,652 a nonprofit organization. 276 00:31:37,654 --> 00:31:40,654 I've always believed that technology is always the driver of change, 277 00:31:40,656 --> 00:31:43,924 not business, not governments, but technology. 278 00:31:43,926 --> 00:31:48,997 And gender-based violence has always existed 279 00:31:48,999 --> 00:31:52,499 but with the advent of the Internet and the number of social networking tools, 280 00:31:52,501 --> 00:31:55,470 I think it's a great mobilization platform. 281 00:32:14,624 --> 00:32:17,392 Sabeen Mahmud was leaving a Karachi restaurant 282 00:32:17,394 --> 00:32:20,127 when the gunman attacked her in her car. 283 00:32:20,129 --> 00:32:23,297 Her mother who was also accompanying her was wounded 284 00:32:23,299 --> 00:32:25,466 and now is in a critical condition. 285 00:32:25,468 --> 00:32:28,970 Mahmud was taken to a hospital where she was pronounced dead. 286 00:32:45,321 --> 00:32:50,458 When she spoke in physical spaces, nothing happened. 287 00:32:50,460 --> 00:32:54,228 When she was carrying on her campaign, she was not targeted. 288 00:32:54,230 --> 00:32:56,297 People were amused or they ignored her, 289 00:32:56,299 --> 00:32:58,499 or they just walked past. 290 00:32:58,501 --> 00:33:03,003 But when this whole, sort of, campaign 291 00:33:03,005 --> 00:33:05,272 hit the Internet and the social media, 292 00:33:05,274 --> 00:33:07,441 that's when the lynch mobs gathered. 293 00:33:07,443 --> 00:33:10,111 And one of the reasons I find is, 294 00:33:10,113 --> 00:33:16,150 that speech in a physical space lasts only as long as you're speaking. 295 00:33:16,152 --> 00:33:22,489 But once it is uploaded onto the Internet on any platform, it is there forever. 296 00:33:22,491 --> 00:33:27,127 And then your attackers or, you know, whoever opposes you, 297 00:33:27,129 --> 00:33:29,364 they gather, and then they spread it further 298 00:33:29,366 --> 00:33:32,700 and more and more people join that group 299 00:33:32,702 --> 00:33:36,339 of people who are attacking and it takes on a life of its own. 300 00:33:56,291 --> 00:33:59,159 We're going through a demographic revolution. 301 00:33:59,161 --> 00:34:04,097 The center of gravity of cyberspace is shifting right before our eyes. 302 00:34:04,099 --> 00:34:07,467 From the north and the west of the planet, where it was invented, 303 00:34:07,469 --> 00:34:10,103 to the South and the East. 304 00:34:10,105 --> 00:34:14,275 The vast majority of Internet users today and into the future 305 00:34:14,277 --> 00:34:16,309 are coming from the developing world, 306 00:34:16,311 --> 00:34:19,614 for whom these technologies are empowering. 307 00:34:19,616 --> 00:34:24,652 What should we expect then from these next billion digital users 308 00:34:24,654 --> 00:34:27,454 as they come online in the post-Snowden era? 309 00:36:36,619 --> 00:36:39,286 Once we started with Midia Ninja, 310 00:36:39,288 --> 00:36:43,224 and we went to the streets and tried to do live streaming. 311 00:36:43,226 --> 00:36:46,927 There was a mobile station with an electric generator 312 00:36:46,929 --> 00:36:49,396 using gasoline, you know, 313 00:36:49,398 --> 00:36:54,402 a 4G modem, a laptop, a camera, a video switcher and... 314 00:37:15,491 --> 00:37:18,226 It was good in the first two or three times 315 00:37:18,228 --> 00:37:20,561 in more calm demonstrations. 316 00:37:20,563 --> 00:37:22,963 I remember there was a discussion, and then Carioca said, 317 00:37:22,965 --> 00:37:26,701 "No, I found an app. 318 00:37:26,703 --> 00:37:29,603 Its name is TwitCasting and maybe we can try it." 319 00:37:31,808 --> 00:37:37,480 It was a Japanese free app used by teenagers to hang out, you know. 320 00:38:08,744 --> 00:38:12,646 Looking at Brazil, this is one of those cases where you have 321 00:38:12,648 --> 00:38:14,815 a sporting event, in this case, 322 00:38:14,817 --> 00:38:19,920 which triggers all sorts of extra concern around security 323 00:38:19,922 --> 00:38:23,291 and the control of information, much of it legitimate. 324 00:38:23,293 --> 00:38:27,961 But what often happens is that the layering of surveillance, 325 00:38:27,963 --> 00:38:31,365 extra-legal measures that happens leading up to 326 00:38:31,367 --> 00:38:34,534 and during these events doesn't just disappear. 327 00:38:34,536 --> 00:38:36,903 It becomes part of the permanent architecture. 328 00:39:05,034 --> 00:39:08,469 Mobile phones are prevalent. Everyone has one in their hands. 329 00:39:08,471 --> 00:39:11,639 And the police now use a technique 330 00:39:11,641 --> 00:39:16,577 where they set up fake cell phone towers that captures everyone within the vicinity 331 00:39:16,579 --> 00:39:20,715 and gathers up identifying information that's emitted by the cell phones, 332 00:39:20,717 --> 00:39:22,816 which they then use to track people 333 00:39:22,818 --> 00:39:25,085 and associate them with each other 334 00:39:25,087 --> 00:39:28,655 and being at specific physical events like a protest 335 00:39:28,657 --> 00:39:31,057 and the government can go back in time 336 00:39:31,059 --> 00:39:35,996 and re-create every facet of your life on that particular day and hour. 337 00:39:35,998 --> 00:39:38,431 With whom you were communicating. 338 00:39:38,433 --> 00:39:41,369 Not only what you're broadcasting but what you're saying privately 339 00:39:41,371 --> 00:39:43,974 and use this to incriminate you down the road. 340 00:41:07,456 --> 00:41:10,056 People realize there's some hidden mechanism of power 341 00:41:10,058 --> 00:41:12,693 going on through surveillance. 342 00:41:12,695 --> 00:41:16,530 And you begin to suspect, maybe, this device you can't trust. 343 00:41:16,532 --> 00:41:19,699 Maybe the state's in here or it's in my mobile phone or... 344 00:41:19,701 --> 00:41:22,168 And as that kind of seeps out there, 345 00:41:22,170 --> 00:41:25,806 people become much more unwilling to take risks. 346 00:41:25,808 --> 00:41:26,907 You know, even in our own work, 347 00:41:26,909 --> 00:41:30,244 we're much more cautious about what we say over e-mail, 348 00:41:30,246 --> 00:41:32,679 worried that somebody's listening and so on. 349 00:41:32,681 --> 00:41:36,249 It's like sand in the machinery. It kind of slows things down 350 00:41:36,251 --> 00:41:39,552 and everything becomes much more complicated, 351 00:41:39,554 --> 00:41:42,188 just to communicate basic instructions. 352 00:41:42,190 --> 00:41:44,627 You're like, "Oh, first I have to encrypt it." 353 00:41:46,228 --> 00:41:49,663 All these technologies too, cryptography things, 354 00:41:49,665 --> 00:41:51,599 they might be getting cheap, 355 00:41:51,601 --> 00:41:56,737 but if we consider in terms of time, they are expensive. 356 00:41:56,739 --> 00:42:00,240 You know, people are being murdered every day in the favelas. 357 00:42:00,242 --> 00:42:03,277 The military police are still running. 358 00:42:03,279 --> 00:42:06,813 So it's complicated now to stop the machines 359 00:42:06,815 --> 00:42:09,985 and adapt our system to a more safe mode. 360 00:46:29,911 --> 00:46:32,813 So at the same time that you have so many people 361 00:46:32,815 --> 00:46:37,284 able to communicate to a global audience at an instant, 362 00:46:37,286 --> 00:46:41,989 governments, in ways that they weren't 20 years ago, 363 00:46:41,991 --> 00:46:47,161 are really ramping up information controls because they see... 364 00:46:47,163 --> 00:46:50,063 And when we say "governments," we're really talking about entrenched powers, 365 00:46:50,065 --> 00:46:55,068 institutionalized, uh, you know, forms of capitalism in the state 366 00:46:55,070 --> 00:46:58,038 that see, you know, 367 00:46:58,040 --> 00:47:02,409 this type of unpredictable citizen activism as a threat to their interests 368 00:47:02,411 --> 00:47:04,847 and are developing ways to counter it. 369 00:47:07,215 --> 00:47:09,284 You have new challenges today. 370 00:47:11,119 --> 00:47:14,857 Sensitive data is transmitted over encrypted channels. 371 00:47:15,891 --> 00:47:18,492 You need more. 372 00:47:18,494 --> 00:47:21,297 You want to look through your target's eyes. 373 00:47:23,565 --> 00:47:25,534 You have to hack your target. 374 00:47:31,507 --> 00:47:35,945 You have to overcome encryption and capture relevant data. 375 00:47:37,545 --> 00:47:40,382 Being stealth and untraceable. 376 00:47:43,853 --> 00:47:45,855 Exactly what we do. 377 00:47:51,226 --> 00:47:56,063 The vendors of these products and services market them to governments, 378 00:47:56,065 --> 00:47:57,998 usually at trade shows 379 00:47:58,000 --> 00:48:02,068 that are only open to accredited law enforcement and intelligence agencies. 380 00:48:02,070 --> 00:48:05,606 Actually, I've got a big binder that I can... 381 00:48:05,608 --> 00:48:08,441 So, if you ignore the bag, actually which... 382 00:48:09,978 --> 00:48:14,146 someone, uh, deposited these in as a gift to me, 383 00:48:14,148 --> 00:48:18,117 but I think was hoping to disguise it in the kindergarten bag. 384 00:48:18,119 --> 00:48:24,023 These are brochures from the type of trade shows that we're talking about, 385 00:48:24,025 --> 00:48:28,195 products and services that allow cell phone detection, 386 00:48:28,197 --> 00:48:30,465 uh, insertion of malware... 387 00:48:32,668 --> 00:48:35,936 tracking, social media monitoring. 388 00:48:35,938 --> 00:48:38,938 In many ways, the way to think about this market 389 00:48:38,940 --> 00:48:42,441 is that it's the commercialization of cyber crime. 390 00:48:42,443 --> 00:48:46,345 You trick somebody into installing a software program 391 00:48:46,347 --> 00:48:48,447 that contains malicious code 392 00:48:48,449 --> 00:48:51,083 that exploits some vulnerability in the system, 393 00:48:51,085 --> 00:48:55,121 which then allows the attacker to do anything they want. 394 00:48:55,123 --> 00:48:58,492 Turn on the webcam, listen in on the microphone, 395 00:48:58,494 --> 00:49:02,695 record keystrokes, record the location, the movement. 396 00:49:02,697 --> 00:49:05,298 It operates without much accountability, 397 00:49:05,300 --> 00:49:08,936 certainly no corporate social responsibility, 398 00:49:08,938 --> 00:49:12,039 ripe for abuse in a place like Sudan or Ethiopia. 399 00:49:12,041 --> 00:49:14,440 We've seen in one case after another, 400 00:49:14,442 --> 00:49:17,543 how this ends up being used to target civil society. 401 00:49:17,545 --> 00:49:18,547 Aha. 402 00:49:20,215 --> 00:49:21,715 Gamma Group. 403 00:49:21,717 --> 00:49:24,684 Maker of the notorious FinFisher spyware. 404 00:52:07,583 --> 00:52:12,485 The attacker has to socially engineer or convince the target 405 00:52:12,487 --> 00:52:17,324 to open a file or to, you know, click through some security warning, 406 00:52:17,326 --> 00:52:19,726 um, in order to become infected. 407 00:52:19,728 --> 00:52:25,132 We had found a document that had pictures of Ethiopian opposition leaders in it, 408 00:52:25,134 --> 00:52:27,534 and it looked like it was targeted and designed to appeal 409 00:52:27,536 --> 00:52:29,835 to members of the Ethiopian diaspora. 410 00:52:29,837 --> 00:52:32,672 Uh, but in fact, the file was cleverly disguised 411 00:52:32,674 --> 00:52:35,441 to look like a document that's actually a computer program, 412 00:52:35,443 --> 00:52:37,177 an executable file. 413 00:52:37,179 --> 00:52:39,411 So when you run this, it will install software on your computer 414 00:52:39,413 --> 00:52:42,148 even though, you know, they changed the icon and everything 415 00:52:42,150 --> 00:52:45,284 to make it look like this is a document or a picture. 416 00:52:45,286 --> 00:52:46,455 This is actually a program. 417 00:53:20,688 --> 00:53:23,856 I was able to look at the memory of an infected computer. 418 00:53:23,858 --> 00:53:26,793 In other words, what's going on inside the computer when it's infected. 419 00:53:26,795 --> 00:53:31,231 And I was able to identify several interesting artifacts in the memory, 420 00:53:31,233 --> 00:53:34,434 including a bunch of strings that said "FinFisher," "FinSpy," 421 00:53:34,436 --> 00:53:36,739 very clearly attributing this to the company. 422 00:54:12,708 --> 00:54:16,643 You don't have to be the NSA to get inside somebody's computer. 423 00:54:16,645 --> 00:54:19,980 Um, instead you can exploit their curiosity, 424 00:54:19,982 --> 00:54:23,849 their, um, need to communicate. 425 00:54:23,851 --> 00:54:27,487 And of course, journalists, at the very heart of what they do, 426 00:54:27,489 --> 00:54:31,458 is engage in communication with a lot of people 427 00:54:31,460 --> 00:54:34,360 and a lot of people that they don't know and trust necessarily. 428 00:54:34,362 --> 00:54:37,731 Because they're engaged in outreach and communicating constantly with sources. 429 00:54:51,313 --> 00:54:55,048 Fifty years ago, nobody would have known what happened in Syria. 430 00:54:55,050 --> 00:54:59,351 But in 2011, when it started, everybody had Facebook. 431 00:54:59,353 --> 00:55:04,893 Everybody has e-mails and everybody has WhatsApp and Viber. 432 00:55:06,328 --> 00:55:08,295 So you just can't stop people 433 00:55:08,297 --> 00:55:10,963 from telling what is happening to them. 434 00:55:10,965 --> 00:55:13,967 So when they besieged Daraa at the beginning, 435 00:55:13,969 --> 00:55:18,704 they shut down communication, Internet, land lines and even electricity. 436 00:55:18,706 --> 00:55:22,941 But they did not know that in the 21st century, people have their ways. 437 00:55:22,943 --> 00:55:26,079 People were charging their mobiles from their cars or generators, 438 00:55:26,081 --> 00:55:29,682 hand generators, um, manual generators. 439 00:55:29,684 --> 00:55:33,652 And people were using satellite connections. 440 00:55:33,654 --> 00:55:38,458 You don't need to use the country, uh, Internet to be connected to the Internet. 441 00:55:38,460 --> 00:55:39,858 You can use anything. 442 00:55:39,860 --> 00:55:43,896 And they were able to tell what was happening to them. 443 00:55:43,898 --> 00:55:49,635 Um, so the story got around. 444 00:55:57,978 --> 00:56:01,880 A few years ago many of us celebrated the Arab Spring 445 00:56:01,882 --> 00:56:05,018 as the paradigm of what these technologies could do. 446 00:56:05,020 --> 00:56:08,387 Remember we called it at the time "liberation technologies." 447 00:56:08,389 --> 00:56:10,556 They would bring about the end of authoritarian rule. 448 00:56:18,433 --> 00:56:24,137 Unfortunately, Syria has become the Arab Spring's dark aftermath. 449 00:56:31,380 --> 00:56:34,614 As groups sympathetic to the Assad regime 450 00:56:34,616 --> 00:56:38,918 have employed off-the-shelf malware crime kits to infiltrate social networks, 451 00:56:38,920 --> 00:56:42,454 arrest, torture and murder opposition groups 452 00:56:42,456 --> 00:56:44,426 and even target their air strikes. 453 00:57:13,554 --> 00:57:17,190 From the beginning, we believed that the camera is the most powerful weapon, 454 00:57:17,192 --> 00:57:19,726 and it was actually the only weapon we have 455 00:57:19,728 --> 00:57:21,697 to deliver our own message to the whole world. 456 00:57:29,737 --> 00:57:31,570 This is interesting. 457 00:57:31,572 --> 00:57:33,173 Baraa? 458 00:57:37,846 --> 00:57:42,748 It's a pleasure for me to introduce one of my best friends, 459 00:57:42,750 --> 00:57:48,188 Mr. Baraa, he's one of the most activist people inside Syria. 460 00:57:48,190 --> 00:57:51,557 He came a few days ago 'cause he has... 461 00:57:51,559 --> 00:57:56,896 He has... many broken bones on his body. 462 00:57:59,467 --> 00:58:02,570 He was there and covered the battle in Daraa City. 463 00:58:05,974 --> 00:58:08,974 And in the afternoon, they get a tank shell. 464 00:58:11,846 --> 00:58:15,550 He was with his friend, whom has this camera. 465 00:58:16,951 --> 00:58:19,085 And that good guy, you know, he gets killed 466 00:58:19,087 --> 00:58:22,621 by one tank shell from the regime's side. 467 00:58:25,559 --> 00:58:27,159 This video, you will see now, 468 00:58:27,161 --> 00:58:31,666 a remote control car and it exploded, a huge explosion. 469 00:58:33,201 --> 00:58:34,869 It was filmed by this camera. 470 00:58:39,641 --> 00:58:40,706 After that, 471 00:58:40,708 --> 00:58:42,909 the rocket launchers 472 00:58:42,911 --> 00:58:44,880 started to hit the place from the regime's side. 473 00:58:46,114 --> 00:58:49,916 So our activist, this media guy, 474 00:58:49,918 --> 00:58:53,219 he gets killed in here in this exact... this place. 475 00:58:53,221 --> 00:58:56,054 Now here. He was standing here. 476 00:58:56,056 --> 00:58:58,925 And people found the camera with him. 477 00:58:58,927 --> 00:59:01,530 We took out the memory card, and we post this... 478 00:59:02,730 --> 00:59:05,133 as, you know, in memory of Hussain. 479 00:59:20,581 --> 00:59:24,684 So now, Mr. Baraa here, just a few days just to heal. 480 00:59:24,686 --> 00:59:29,088 He paid a visit to some hospitals to check out himself, 481 00:59:29,090 --> 00:59:32,928 then he will go back into Syria to keep working. 482 00:59:34,795 --> 00:59:37,563 There is a war on Facebook. 483 00:59:37,565 --> 00:59:42,702 Uh, every side is using Facebook to promote themselves. 484 00:59:54,583 --> 00:59:57,816 The other way around, the regime will say, 485 00:59:57,818 --> 01:00:01,753 "We will occupy this area. We will take over this area." 486 01:00:01,755 --> 01:00:04,856 Then the FSA would leave because they're afraid of bombardment. 487 01:00:04,858 --> 01:00:05,895 It's just a game. 488 01:00:06,962 --> 01:00:08,163 Facebook is a game. 489 01:00:17,672 --> 01:00:19,007 It was just a silly joke I made. 490 01:00:20,342 --> 01:00:24,110 I didn't hurt anybody. I didn't insult anyone. 491 01:00:24,112 --> 01:00:28,146 It was not political. It was not racist. 492 01:00:28,148 --> 01:00:31,083 There is nothing that they could hold against me 493 01:00:31,085 --> 01:00:33,021 with a thing that I wrote on Facebook. 494 01:00:35,023 --> 01:00:38,794 But still, at a time of war... 495 01:00:40,962 --> 01:00:42,030 people get crazy. 496 01:00:50,639 --> 01:00:55,007 They did not drag me in the street or kidnap me. 497 01:00:55,009 --> 01:00:58,177 They just asked me to come to ask me a few questions. 498 01:00:58,179 --> 01:01:01,079 This is what they said, so I signed the paper that I'm coming. 499 01:01:01,081 --> 01:01:07,188 I went the next morning at 11:30, to the detention center. 500 01:01:08,857 --> 01:01:10,923 The security guy came to me. 501 01:01:10,925 --> 01:01:14,360 He's like... He's like half of my height. 502 01:01:14,362 --> 01:01:16,762 He blindfolded me, and I was like, 503 01:01:16,764 --> 01:01:20,099 I was okay with that because I thought, it's some... 504 01:01:20,101 --> 01:01:25,938 it's confidential secrets of the country that they don't want me to see. 505 01:01:25,940 --> 01:01:30,679 And then I was presented to the detective or the interrogator. 506 01:01:31,346 --> 01:01:32,347 I never saw him. 507 01:01:35,349 --> 01:01:39,885 He told me, "You're a computer engineer. Please be seated." 508 01:01:39,887 --> 01:01:44,690 And I sat next to him and he started reading all my Facebook posts. 509 01:01:44,692 --> 01:01:45,727 I was like, "Oh." 510 01:01:57,404 --> 01:01:59,806 One of the posts that I wrote was, 511 01:01:59,808 --> 01:02:02,874 "No praying, no fasting until the regime falls," 512 01:02:02,876 --> 01:02:04,679 which was actually making fun of both sides. 513 01:02:05,413 --> 01:02:06,978 And I laughed and he's like, 514 01:02:06,980 --> 01:02:09,784 "I'm not kidding with you. I'm not joking with you." 515 01:02:13,087 --> 01:02:15,353 He kicked me on my chest 516 01:02:15,355 --> 01:02:20,492 and then he requested the same short guy, 517 01:02:20,494 --> 01:02:22,427 because he was there in the room, 518 01:02:22,429 --> 01:02:24,429 to bring something called the "flying carpet," 519 01:02:24,431 --> 01:02:26,199 which is a torturing machine. 520 01:02:26,201 --> 01:02:30,969 It's a wooden board, like the door, 521 01:02:30,971 --> 01:02:34,042 but it has joints in the middle that can flip. 522 01:02:34,942 --> 01:02:39,077 And I had to lay on it. 523 01:02:39,079 --> 01:02:43,416 They tied my wrists and they tied me from the middle, they tied my legs. 524 01:02:43,418 --> 01:02:48,220 And they just closed it so my knees touched my chest. 525 01:02:48,222 --> 01:02:50,523 He took off my shoes and my socks 526 01:02:50,525 --> 01:02:56,165 and started beating me with a metal, uh, with a metal whip. 527 01:02:58,800 --> 01:03:02,771 The pain is unbelievable. 528 01:03:03,804 --> 01:03:05,271 You just can't take it anymore. 529 01:03:05,273 --> 01:03:09,278 You just can't endure this amount of agony. 530 01:03:17,886 --> 01:03:21,219 What we saw in Syria was a lot of use of, say, 531 01:03:21,221 --> 01:03:23,456 off-the-shelf remote access tools. 532 01:03:23,458 --> 01:03:27,126 So this is sort of software that you can get from underground message boards 533 01:03:27,128 --> 01:03:29,494 or maybe purchase for not so much money. 534 01:03:29,496 --> 01:03:33,532 Maybe $200-300 that give you the ability 535 01:03:33,534 --> 01:03:36,469 to record someone's keystrokes, read their e-mails, 536 01:03:36,471 --> 01:03:39,871 even look at them through their webcam. 537 01:03:39,873 --> 01:03:42,307 Record via the computer's microphone, 538 01:03:42,309 --> 01:03:45,146 conversations that are being had around the target's computer. 539 01:03:46,380 --> 01:03:48,914 Frequently what you would see 540 01:03:48,916 --> 01:03:51,583 is it would be bundled with some type of lured document 541 01:03:51,585 --> 01:03:55,987 which showed a deep understanding 542 01:03:55,989 --> 01:03:58,858 of the psychology of the people they were trying to target. 543 01:03:58,860 --> 01:04:03,595 For instance, one of the documents that was sent out that I keenly recall 544 01:04:03,597 --> 01:04:06,097 was a list. 545 01:04:06,099 --> 01:04:12,103 A purported list of insurgents identified by the Syrian government. 546 01:04:12,105 --> 01:04:17,108 So of course what happened was that this was promptly passed around 547 01:04:17,110 --> 01:04:20,213 to all sorts of very interesting groups in Syria 548 01:04:20,215 --> 01:04:23,215 because everyone wanted to know if they were on this list or not. 549 01:04:23,217 --> 01:04:29,021 So the actual spyware payload itself wasn't particularly sophisticated, 550 01:04:29,023 --> 01:04:32,090 but the social... 551 01:04:32,092 --> 01:04:35,394 the social and social engineering side of that operation, 552 01:04:35,396 --> 01:04:37,466 um, was quite smart. 553 01:04:43,938 --> 01:04:47,409 Internet entered almost all countries in the region 554 01:04:48,442 --> 01:04:49,944 before it entered Syria. 555 01:04:51,145 --> 01:04:52,144 Yes. 556 01:04:52,146 --> 01:04:54,480 Government in Syria, 557 01:04:54,482 --> 01:04:56,983 we are not as developed as Canada, for example, 558 01:04:56,985 --> 01:04:59,018 or not as developed as United States. 559 01:04:59,020 --> 01:05:02,121 In Canada they can monitor people and control people 560 01:05:02,123 --> 01:05:04,990 and spy people in a very intelligent way. 561 01:05:04,992 --> 01:05:07,429 And even they don't feel that they are... 562 01:05:10,297 --> 01:05:11,630 spied on. 563 01:05:11,632 --> 01:05:16,471 But in Syria, of course you go to old ways. 564 01:05:23,244 --> 01:05:26,144 They untie me and then I was... 565 01:05:26,146 --> 01:05:28,914 and then he asked me to sit next to him, and he said, 566 01:05:28,916 --> 01:05:29,918 "Let's start talking." 567 01:05:31,619 --> 01:05:35,186 And I told him, "I don't want to talk to you anymore." 568 01:05:35,188 --> 01:05:41,527 He said, "I want you to admit you work with the Free Syrian Electronic Army." 569 01:05:41,529 --> 01:05:44,163 I was like, "I don't know what that is." 570 01:05:44,165 --> 01:05:47,469 He said, "You like their page. You like their page on Facebook." 571 01:05:48,936 --> 01:05:50,936 I told him, "I like their page on Facebook, 572 01:05:50,938 --> 01:05:54,039 but there are too many pages on Facebook that you can like. 573 01:05:54,041 --> 01:05:56,478 I also like Assad's page on Facebook." 574 01:05:58,146 --> 01:06:00,579 Well, that did not convince him. 575 01:06:00,581 --> 01:06:05,717 So his boss came and he told him, "What is going on?" 576 01:06:05,719 --> 01:06:10,222 He told him, "This is the Facebook guy, and he's not cooperating." 577 01:06:10,224 --> 01:06:14,527 So then his boss told him to, "Send him down to the basement, 578 01:06:14,529 --> 01:06:18,530 peel his skin off and just remind me of him after a month." 579 01:06:18,532 --> 01:06:21,199 And I was like, "Can we go back to the flying carpet?" 580 01:06:24,538 --> 01:06:26,438 I stayed there for almost a month, 581 01:06:26,440 --> 01:06:30,011 and then I was released with a presidential amnesty. 582 01:06:32,112 --> 01:06:35,014 So I went in a taxi, 583 01:06:35,016 --> 01:06:39,150 covered with dust, dirt, shit and blood, 584 01:06:39,152 --> 01:06:42,554 all over my face, my clothes. 585 01:06:42,556 --> 01:06:46,691 And then the taxi driver felt pity for me, and he gave me a cigarette. 586 01:06:46,693 --> 01:06:48,963 I remember that was the first time I cried. 587 01:06:52,099 --> 01:06:56,202 And I went to my flat in Latakia where I used to study, 588 01:06:56,204 --> 01:06:58,073 and my roommates were shocked to see me alive. 589 01:06:59,706 --> 01:07:03,679 And then, like, two weeks after that I fled the country. 590 01:07:05,112 --> 01:07:06,612 I came to Jordan. 591 01:07:06,614 --> 01:07:07,683 I am a journalist now. 592 01:07:21,161 --> 01:07:24,697 With Syria, a lot of the bad things that are happening 593 01:07:24,699 --> 01:07:28,066 are happening to people who don't look like Westerners. 594 01:07:28,068 --> 01:07:31,637 The bad things happening to these people through technology, 595 01:07:31,639 --> 01:07:35,106 through the risks inherent in technology, 596 01:07:35,108 --> 01:07:38,210 are not different than the kinds of risks that we may face, 597 01:07:38,212 --> 01:07:40,445 um, although they look different. 598 01:07:40,447 --> 01:07:41,746 We see in the news almost every day, 599 01:07:41,748 --> 01:07:45,483 a report of a breach, some kind of a large hack. 600 01:07:45,485 --> 01:07:47,820 Data being exploited somewhere. 601 01:07:47,822 --> 01:07:50,688 It's the same problem, but in Syria, it looks very different 602 01:07:50,690 --> 01:07:53,425 and because there are dark-skinned people, 603 01:07:53,427 --> 01:07:56,161 uh, and there are guns and a foreign language, 604 01:07:56,163 --> 01:07:59,164 it feels, I think to many, exotic and different, 605 01:07:59,166 --> 01:08:00,632 and it couldn't happen here. 606 01:08:00,634 --> 01:08:03,269 And I think, in fact, what you're seeing in Syria 607 01:08:03,271 --> 01:08:06,272 is this is what happens when the risks get higher 608 01:08:06,274 --> 01:08:07,743 but the technology is the same. 609 01:08:09,243 --> 01:08:10,579 They're using the same Facebook that we are. 610 01:10:57,444 --> 01:11:00,312 What is this? This is surreal. 611 01:12:40,581 --> 01:12:43,385 Lots of people were there, by 7:00 in the night, 612 01:12:44,351 --> 01:12:46,718 and we were live. 613 01:12:51,559 --> 01:12:55,760 Suddenly a man came to Carioca, and he asked to interview him. 614 01:12:59,632 --> 01:13:03,901 And then the military police came to Carioca, searched his bag. 615 01:13:03,903 --> 01:13:08,473 And then they said he should be taken to jail 616 01:13:08,475 --> 01:13:12,777 as a preventive arrestment, to be searched and inquired. 617 01:13:18,385 --> 01:13:22,888 How this information was being virilized was really amazing. 618 01:13:22,890 --> 01:13:25,523 Like sharing, sharing, sharing, tweets, tweets, tweets, 619 01:13:25,525 --> 01:13:26,858 mention, mention, mention. 620 01:13:26,860 --> 01:13:28,626 "The Ninja is being arrested." 621 01:13:28,628 --> 01:13:31,028 And suddenly there was, like, a small crowd. 622 01:13:31,030 --> 01:13:33,398 Like 5,000 people. 623 01:13:33,400 --> 01:13:36,134 And all of them was screaming together, 624 01:15:07,161 --> 01:15:10,495 Then we posted this video from the mobile, like, real time, 625 01:15:10,497 --> 01:15:12,166 and it virilized very fast. 626 01:18:05,271 --> 01:18:08,740 The video was just getting bigger in the social media. 627 01:18:08,742 --> 01:18:10,709 Bruno Teles became a character. 628 01:18:39,773 --> 01:18:42,139 They said that Bruno was innocent, 629 01:18:42,141 --> 01:18:46,844 and they used Midia Ninja image. 630 01:18:46,846 --> 01:18:49,114 And they credited Midia Ninja. 631 01:18:49,116 --> 01:18:52,416 It was the first time that we were seeing 632 01:18:52,418 --> 01:18:57,022 Globo recognizing a free media collective 633 01:18:57,024 --> 01:19:01,459 as a legitimate player in the communication game. 634 01:19:01,461 --> 01:19:04,232 It was a next step. 635 01:19:35,229 --> 01:19:40,802 Oh, he's changing his shirt. 636 01:21:54,067 --> 01:21:59,103 Ninja! Ninja! Ninja! 637 01:22:18,190 --> 01:22:19,126 Ninja! 638 01:22:48,188 --> 01:22:51,690 I've always been a fan of the terms "hacking" and "hacktivism." 639 01:22:51,692 --> 01:22:53,325 Especially "hacktivism" 640 01:22:53,327 --> 01:22:56,727 which is the combination of hacking and political activism. 641 01:22:56,729 --> 01:23:01,566 And those combined are pretty powerful to me. 642 01:23:01,568 --> 01:23:06,340 It's about encouraging people not to accept technology at face value. 643 01:23:07,707 --> 01:23:09,574 We need to encourage people to think about 644 01:23:09,576 --> 01:23:12,509 what it is that surrounds them, 645 01:23:12,511 --> 01:23:14,980 to question authority 646 01:23:14,982 --> 01:23:19,150 in a sense of the authority being the technological environment around them 647 01:23:19,152 --> 01:23:24,522 and to realize that when you start pulling back the layers of all of this, 648 01:23:24,524 --> 01:23:26,724 that's where the exercise of power is. 649 01:23:26,726 --> 01:23:30,195 So if we want liberal democracy to flourish, 650 01:23:30,197 --> 01:23:33,197 we need people to start lifting back the layers 651 01:23:33,199 --> 01:23:34,568 and understanding what's going on. 652 01:23:50,216 --> 01:23:54,218 I think ultimately it comes down to understanding what your values are, 653 01:23:54,220 --> 01:23:56,687 because how do you develop your thoughts, right? 654 01:23:56,689 --> 01:23:58,757 How do you determine what it is that you truly believe? 655 01:23:58,759 --> 01:24:02,326 How do you determine what it is you really want to say, 656 01:24:02,328 --> 01:24:04,428 if you can't even keep notes safely? 657 01:24:04,430 --> 01:24:08,500 If you can't have some private space, some space for thought, 658 01:24:08,502 --> 01:24:11,369 some space to enjoy the product of your own intellect, 659 01:24:11,371 --> 01:24:13,772 to share that with people close to you who you trust. 660 01:24:13,774 --> 01:24:16,610 Whether they're family, whether they're colleagues, whether they're compatriots. 661 01:24:25,585 --> 01:24:31,156 One thing that I see a lot is, this idea of technology as a solution. 662 01:24:31,158 --> 01:24:33,691 It's a natural thing. Okay, technology is under threat. 663 01:24:33,693 --> 01:24:35,628 Let's find a technological solution. 664 01:24:37,197 --> 01:24:38,797 There are so many projects now 665 01:24:38,799 --> 01:24:42,733 around secure communications, platforms, chats, instant messaging. 666 01:24:42,735 --> 01:24:46,838 But it's only one component of a solution set. 667 01:24:46,840 --> 01:24:51,078 And I think often overlooked are the legal and political dimensions. 668 01:24:52,211 --> 01:24:53,343 If we're talking about 669 01:24:53,345 --> 01:24:55,480 protecting and preserving all of this, 670 01:24:55,482 --> 01:24:59,517 as a secure and open communication space, 671 01:24:59,519 --> 01:25:01,452 that means holding governments accountable. 672 01:25:01,454 --> 01:25:03,487 It means holding companies accountable. 673 01:25:03,489 --> 01:25:06,090 Putting in place rules and laws 674 01:25:06,092 --> 01:25:11,161 that ensures they can't do things that infringe on our freedoms and rights. 675 01:25:11,163 --> 01:25:14,299 That to me is, uh, 676 01:25:14,301 --> 01:25:18,338 such a critical foundation of a digital democracy today. 677 01:25:20,033 --> 01:25:25,033 Original subtitles by explosiveskull Resynced by TaiMicca 55206

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.