Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:23,280 --> 00:00:26,382
We are going through
the most profound change
2
00:00:26,384 --> 00:00:30,155
in communication technologies in
all of human history right now.
3
00:00:34,558 --> 00:00:39,261
Printing press, radio, telegraph,
television. All very important.
4
00:00:39,263 --> 00:00:43,132
But I believe we're going
through the most transformative,
5
00:00:43,134 --> 00:00:46,403
purely on the basis
of three technologies.
6
00:00:46,405 --> 00:00:49,442
Mobile, social media
and cloud computing.
7
00:00:56,615 --> 00:00:59,349
They share one
very important characteristic.
8
00:00:59,351 --> 00:01:03,152
And that's the amount
of private information.
9
00:01:03,154 --> 00:01:06,688
Information that used to be in
our desktops or filing cabinets,
10
00:01:06,690 --> 00:01:08,357
even in our heads,
11
00:01:08,359 --> 00:01:11,294
that we now
entrust to third parties.
12
00:01:13,665 --> 00:01:17,467
Data that we are conscious of,
and deliberate about,
13
00:01:17,469 --> 00:01:20,536
like the e-mails we send
and the tweets we post.
14
00:01:20,538 --> 00:01:23,238
But it also includes
a lot of information
15
00:01:23,240 --> 00:01:26,211
that we're completely,
or mostly, unconscious about.
16
00:01:27,411 --> 00:01:29,446
So if you take my mobile phone,
17
00:01:29,448 --> 00:01:32,781
even when I'm not using it,
it's emitting a pulse,
18
00:01:32,783 --> 00:01:36,619
trying to locate the nearest Wi-Fi
router or cell phone exchange,
19
00:01:36,621 --> 00:01:39,491
and within that beacon is
the make and model of the phone,
20
00:01:40,491 --> 00:01:42,292
the fact that it's my phone,
21
00:01:42,294 --> 00:01:45,328
because my name is attached
to the operating system,
22
00:01:45,330 --> 00:01:48,298
and most importantly,
the geolocation of the phone.
23
00:01:58,743 --> 00:02:01,677
We are
leaving this digital exhaust
24
00:02:01,679 --> 00:02:06,648
that contains extraordinarily precise
information about our lives,
25
00:02:06,650 --> 00:02:11,286
our social relationships reduced
to trillions of data points
26
00:02:11,288 --> 00:02:16,159
that form now this new ethereal
layer around the planet
27
00:02:16,161 --> 00:02:18,660
that's only growing
in all directions.
28
00:02:23,535 --> 00:02:27,269
Capabilities are being put
in the hands of policy makers,
29
00:02:27,271 --> 00:02:30,874
five years ago, they'd never
imagine that they would have.
30
00:02:30,876 --> 00:02:34,713
This is where big data
meets Big Brother.
31
00:02:56,201 --> 00:02:57,203
Should be here.
32
00:02:59,404 --> 00:03:01,404
It is kind
of in a rock, I think.
33
00:03:01,406 --> 00:03:03,373
Yeah, the entrance is in a rock.
34
00:03:03,375 --> 00:03:05,374
Or a bunker.
35
00:03:05,376 --> 00:03:07,378
Oh, yeah, the bunker.
It is down there!
36
00:03:10,614 --> 00:03:12,381
There is a
bunker under here.
37
00:03:12,383 --> 00:03:15,785
- Yeah.
- It is between 33 and 39.
38
00:03:15,787 --> 00:03:17,219
Right there.
Look at that door.
39
00:03:17,221 --> 00:03:18,453
- Yeah.
- Yeah, this is it.
40
00:03:18,455 --> 00:03:20,392
- Bahnhof.
- Okay.
41
00:03:42,714 --> 00:03:44,616
Hey, I guess we just go in.
42
00:04:44,475 --> 00:04:48,977
Many people believe that you have this
cloud services that are floating around.
43
00:04:48,979 --> 00:04:51,381
People think, "Okay,
it's a cloud server."
44
00:04:51,383 --> 00:04:54,850
But this is the actual physical
location of the Internet.
45
00:05:03,294 --> 00:05:06,629
It's a
constant struggle to protect data.
46
00:05:11,035 --> 00:05:15,504
The Swedish Security Police
wanted to install tools
47
00:05:15,506 --> 00:05:20,778
to automatically log in to our
data and get out the information.
48
00:05:21,879 --> 00:05:23,980
So I invited them
to our facility,
49
00:05:23,982 --> 00:05:26,381
and then I had a microphone
50
00:05:26,383 --> 00:05:31,590
which I was provided by the Swedish
Public Service, national radio.
51
00:05:45,970 --> 00:05:49,338
I taped this conversation,
and they were so angry.
52
00:05:49,340 --> 00:05:52,374
And they also wanted us
to sign a paper
53
00:05:52,376 --> 00:05:55,778
where they said that we could
not say anything about it.
54
00:05:55,780 --> 00:05:57,713
It should be total secrecy.
55
00:05:57,715 --> 00:06:02,117
They said, "If a terrorist attack
happens, it's your fault."
56
00:06:16,967 --> 00:06:19,468
It's, like, a creepy feeling.
57
00:06:19,470 --> 00:06:22,972
Nobody can say that
any facility is safe.
58
00:06:22,974 --> 00:06:27,913
There are always possibilities to go
in and find data and take it out.
59
00:06:31,549 --> 00:06:35,016
People say that, "Oh, I don't
have anything to hide.
60
00:06:35,018 --> 00:06:36,852
They can read my mail.
I don't have anything."
61
00:06:36,854 --> 00:06:39,956
But it's not that
which is this problem.
62
00:06:39,958 --> 00:06:44,526
The problem is, without secrecy,
there can be no democracy.
63
00:06:44,528 --> 00:06:47,398
Without secrecy,
there can be no market economy.
64
00:06:48,032 --> 00:06:49,665
Right.
65
00:06:49,667 --> 00:06:52,501
There is an obvious candidate
for the Nobel Peace Prize.
66
00:06:52,503 --> 00:06:54,871
- Really?
- And that is Edward Snowden.
67
00:06:54,873 --> 00:06:56,408
I mean, yeah.
68
00:07:10,188 --> 00:07:16,958
Does the public enjoy the same right
to privacy that we have in the past?
69
00:07:16,960 --> 00:07:19,761
Are we still private citizens,
70
00:07:19,763 --> 00:07:23,499
and then public officials, where the
government knows very little about us,
71
00:07:23,501 --> 00:07:24,900
but we know
everything about them?
72
00:07:24,902 --> 00:07:27,970
Why are we, the public,
becoming disempowered
73
00:07:27,972 --> 00:07:30,807
at the same time that
governments around the world,
74
00:07:30,809 --> 00:07:36,045
corporations around the world,
institutions around the world,
75
00:07:36,047 --> 00:07:40,982
are gaining greater and greater leverage
over the range of our activities,
76
00:07:40,984 --> 00:07:43,121
their knowledge of what we do?
77
00:07:56,867 --> 00:07:59,035
The Citizen Lab
is an unusual place.
78
00:08:02,172 --> 00:08:05,476
We're a research unit
at the University of Toronto.
79
00:08:07,612 --> 00:08:11,146
We combine the skills of
engineers, computer scientists
80
00:08:11,148 --> 00:08:12,949
with social scientists.
81
00:08:12,951 --> 00:08:15,684
We collaborate with people
from all over the world
82
00:08:15,686 --> 00:08:17,886
to do the field research
that we do.
83
00:08:17,888 --> 00:08:21,257
And we do this to advance
research on global security,
84
00:08:21,259 --> 00:08:23,195
cyberspace
and human rights.
85
00:08:26,064 --> 00:08:27,996
The world is
a very dangerous place
86
00:08:27,998 --> 00:08:31,234
as we saw recently in... in
tragic incidents in Paris,
87
00:08:31,236 --> 00:08:36,038
and you want to have security
agencies be well adept at discerning
88
00:08:36,040 --> 00:08:38,573
what those threats
are over our horizon.
89
00:08:38,575 --> 00:08:43,879
But is it okay that the government
sets up a giant digital X-ray machine
90
00:08:43,881 --> 00:08:45,748
over everything that we do?
91
00:08:45,750 --> 00:08:47,950
Because that's effectively
where we're headed right now.
92
00:08:51,289 --> 00:08:54,624
We've been a kind of
digital early warning system,
93
00:08:54,626 --> 00:08:56,759
scanning the horizon.
94
00:08:56,761 --> 00:08:59,729
And what we've seen, frankly,
has been really disturbing.
95
00:12:22,400 --> 00:12:26,235
Tibetans are watched
from every angle and from every corner.
96
00:12:26,237 --> 00:12:30,071
It's in their homes, it's in their
offices, it's in the streets.
97
00:12:30,073 --> 00:12:32,041
In Tibet,
certainly in central Tibet
98
00:12:32,043 --> 00:12:34,442
and around
the capital city of Lhasa,
99
00:12:34,444 --> 00:12:38,047
Chinese authorities, together
with Chinese corporations,
100
00:12:38,049 --> 00:12:40,215
telecommunications companies,
101
00:12:40,217 --> 00:12:44,986
they've integrated the ability to spy
on people via their mobile phone,
102
00:12:44,988 --> 00:12:47,989
via the last communications they
may have had over the Internet.
103
00:12:47,991 --> 00:12:51,195
Down to the closed circuit
television camera on the streets.
104
00:12:52,863 --> 00:12:55,965
The Chinese so strictly
control access to Tibet,
105
00:12:55,967 --> 00:12:57,932
it's just like a black hole
106
00:12:57,934 --> 00:13:01,169
for media,
for independent observers,
107
00:13:01,171 --> 00:13:02,907
for international agencies,
for anything.
108
00:13:33,103 --> 00:13:37,940
How I escaped is a secret.
109
00:13:56,560 --> 00:13:59,161
People are
incredibly courageous.
110
00:13:59,163 --> 00:14:02,364
People inside Tibet will
send out news and information.
111
00:14:02,366 --> 00:14:05,370
And they'll say,
"I want this story to be told."
112
00:14:06,469 --> 00:14:07,970
They could be imprisoned.
113
00:14:07,972 --> 00:14:09,337
They could be tortured.
114
00:14:09,339 --> 00:14:11,039
Their family
could pay the price.
115
00:14:12,309 --> 00:14:14,442
We on the outside have to decide
116
00:14:14,444 --> 00:14:20,114
how to walk this very, sort of, fine line
between protecting people's security
117
00:14:20,116 --> 00:14:23,885
and honoring their wishes about
getting news and information out.
118
00:14:23,887 --> 00:14:28,289
And we know for a fact,
thanks to Citizen Lab's report,
119
00:14:28,291 --> 00:14:31,393
that we are being
successfully targeted.
120
00:14:33,396 --> 00:14:38,033
A new report has been released from
a group of digital detectives.
121
00:14:38,035 --> 00:14:42,004
From their computers in Toronto,
they've tracked a high-tech spy ring
122
00:14:42,006 --> 00:14:43,275
that reaches around the world.
123
00:14:48,011 --> 00:14:49,177
For the past ten months,
124
00:14:49,179 --> 00:14:52,447
these computer experts have
been working as cyber sleuths
125
00:14:52,449 --> 00:14:55,884
hot on the trail of a massive
electronic spy network.
126
00:14:55,886 --> 00:15:00,188
They say it has taken control of
nearly 1,300 high-level computers
127
00:15:00,190 --> 00:15:02,358
in more than 100 countries.
128
00:15:02,360 --> 00:15:05,994
A discovery that could have
major political implications.
129
00:15:05,996 --> 00:15:08,496
They can extract any
document they wanted.
130
00:15:08,498 --> 00:15:12,467
They could turn on web cameras,
turn on audio devices,
131
00:15:12,469 --> 00:15:14,503
so that they could,
in effect, use the computers
132
00:15:14,505 --> 00:15:16,538
as a listening device
in the offices.
133
00:15:16,540 --> 00:15:19,274
The web of intrigue
started with the Dalai Lama
134
00:15:19,276 --> 00:15:21,078
who thought his computer
had been hacked.
135
00:15:25,283 --> 00:15:30,085
Up until about 2007 or 2008, I'd
never really heard of malware.
136
00:15:30,087 --> 00:15:32,421
You know, I'd heard
of viruses, obviously,
137
00:15:32,423 --> 00:15:35,390
but I hadn't really heard
about targeted malware attacks
138
00:15:35,392 --> 00:15:37,091
affecting
the human rights community.
139
00:15:42,466 --> 00:15:45,967
First time I heard about it was
in the context of the Tibetans.
140
00:15:45,969 --> 00:15:50,438
Gradually we started piecing together,
they are under surveillance.
141
00:15:50,440 --> 00:15:54,576
The surveillance comes
from groups within China.
142
00:15:54,578 --> 00:15:59,648
They're using malicious software
and socially-engineered e-mails.
143
00:15:59,650 --> 00:16:02,350
E-mails that are crafted
to get them to open it up
144
00:16:02,352 --> 00:16:04,189
to get inside their devices.
145
00:16:05,555 --> 00:16:07,656
Nart Villeneuve, a computer wiz,
146
00:16:07,658 --> 00:16:10,024
figured out
how the operation worked
147
00:16:10,026 --> 00:16:12,728
by getting the attackers
to hack into his computer.
148
00:16:12,730 --> 00:16:14,495
We're monitoring these groups
149
00:16:14,497 --> 00:16:16,632
for long periods of time,
150
00:16:16,634 --> 00:16:19,567
and you're essentially waiting
for them to screw up, right?
151
00:16:19,569 --> 00:16:21,637
And when they do,
you take advantage of that.
152
00:16:21,639 --> 00:16:23,739
Sometimes it takes a long time.
153
00:16:23,741 --> 00:16:26,975
You could be monitoring a group
for a year and get nothing.
154
00:16:26,977 --> 00:16:31,446
Then one day, they just use a
server that they don't lock down
155
00:16:31,448 --> 00:16:33,217
and all the data's
just sitting there.
156
00:16:35,151 --> 00:16:37,621
I was at home.
It was pretty late.
157
00:17:09,153 --> 00:17:10,551
Nart was scouring through it,
158
00:17:10,553 --> 00:17:13,355
trying to figure out
what actor is responsible
159
00:17:13,357 --> 00:17:15,557
for getting inside
the Dalai Lama's office.
160
00:17:15,559 --> 00:17:19,627
And there was a 22 or 24 character
string that kept coming up
161
00:17:19,629 --> 00:17:22,364
that he couldn't figure out,
"What is the meaning of this?"
162
00:17:22,366 --> 00:17:26,634
So on a whim, he just copied
and pasted it into Google.
163
00:17:26,636 --> 00:17:30,008
One website came up,
and it was Chinese characters.
164
00:17:33,577 --> 00:17:35,210
So he clicked on it.
165
00:17:37,647 --> 00:17:41,549
To my surprise, what came
back was the actual page
166
00:17:41,551 --> 00:17:45,820
that the attackers used to interface
with the compromised systems.
167
00:17:45,822 --> 00:17:49,825
So they set up a website where
they could monitor their victims.
168
00:17:49,827 --> 00:17:52,094
But they didn't
password protect it!
169
00:17:52,096 --> 00:17:55,032
So it was like a window
into everything they were doing.
170
00:18:05,608 --> 00:18:09,077
This wasn't just targeted
at Tibetan organizations
171
00:18:09,079 --> 00:18:11,313
or human rights organizations.
172
00:18:11,315 --> 00:18:15,384
This was global, a pretty
wide range of institutions
173
00:18:15,386 --> 00:18:18,353
that showed that these attackers were...
were quite busy.
174
00:18:18,355 --> 00:18:20,759
There was huge pickup in the media.
It was all over the world.
175
00:18:27,397 --> 00:18:31,202
And it put us on a different kind of
footing in terms of our credibility.
176
00:18:34,472 --> 00:18:38,373
In the cyber security community,
we were novices at that time.
177
00:18:38,375 --> 00:18:39,344
We were kind of outsiders.
178
00:18:41,846 --> 00:18:44,779
So we were kind of
calling it on the fly.
179
00:18:44,781 --> 00:18:46,714
Like, what do we do?
What's the right thing to do?
180
00:18:46,716 --> 00:18:48,282
Who do we notify?
181
00:18:48,284 --> 00:18:50,719
I knew that publishing it
was important.
182
00:18:50,721 --> 00:18:53,355
We had to redact a lot of the
information to protect people.
183
00:18:53,357 --> 00:18:55,691
Should we notify the government?
184
00:18:55,693 --> 00:18:57,625
Should we notify
the Canadian government?
185
00:18:57,627 --> 00:19:01,630
How do we notify other governments
that are being victimized?
186
00:19:01,632 --> 00:19:03,397
At the time, you know,
187
00:19:03,399 --> 00:19:06,268
we didn't want to completely disclose
everything that we had done,
188
00:19:06,270 --> 00:19:08,237
because we
wanted to do it again.
189
00:19:08,239 --> 00:19:11,640
In some of the communities
I mentioned, they loved it.
190
00:19:11,642 --> 00:19:15,143
But I got the feeling from,
certainly inside my own government,
191
00:19:15,145 --> 00:19:16,778
there was a lot of weirdness.
192
00:19:16,780 --> 00:19:20,281
- Are we allowed to speculate?
- Well, I think now we know
193
00:19:20,283 --> 00:19:24,853
because there's a Snowden disclosure
that explicitly references the fact
194
00:19:24,855 --> 00:19:27,455
that the Canadians
and the Americans,
195
00:19:27,457 --> 00:19:29,490
our signals
intelligence agencies,
196
00:19:29,492 --> 00:19:32,528
were piggybacking
off the GhostNet network.
197
00:19:32,530 --> 00:19:36,267
So, in publishing the report, we
basically broke up their party.
198
00:19:44,607 --> 00:19:48,277
From our initial samples from
the office of the Dalai Lama,
199
00:19:48,279 --> 00:19:51,212
they were actually compromised
by two distinct groups.
200
00:19:51,214 --> 00:19:54,348
The GhostNet group obviously
got the most attention.
201
00:19:54,350 --> 00:19:57,251
But there was another group
that was also active.
202
00:19:57,253 --> 00:19:59,654
The GhostNet group
shut down their operations,
203
00:19:59,656 --> 00:20:03,624
but the other group, um,
they're still going.
204
00:21:47,330 --> 00:21:50,565
In our research,
what we see are acts of war
205
00:21:50,567 --> 00:21:53,835
that take place
against citizens,
206
00:21:53,837 --> 00:21:55,836
using these very technologies.
207
00:21:55,838 --> 00:21:58,874
Getting inside the computers of
Tibetans and then arresting them,
208
00:21:58,876 --> 00:22:02,844
and possibly executing them,
is a kind of act of war.
209
00:22:04,915 --> 00:22:07,816
We see this sort
of thing every week, right?
210
00:22:07,818 --> 00:22:10,288
Minor to major versions of it.
211
00:22:12,790 --> 00:22:16,791
Everything on the site
is correct except this.
212
00:22:16,793 --> 00:22:20,828
So this... The last log-in on
the C panel was from Korea.
213
00:22:20,830 --> 00:22:23,332
- Mm-hmm.
- Do you guys have any work in Korea?
214
00:22:23,334 --> 00:22:25,066
- Is there any...
- No, no...
215
00:22:25,068 --> 00:22:28,036
So who actually accesses the website to
update it and all that sort of thing?
216
00:22:28,038 --> 00:22:30,441
- It must be somebody unauthorized.
- Yeah.
217
00:23:44,882 --> 00:23:47,652
One, two, three,
218
00:23:48,652 --> 00:23:53,491
four, five, six,
219
00:23:54,157 --> 00:23:55,923
seven.
220
00:26:16,232 --> 00:26:18,068
Hmm.
221
00:27:21,030 --> 00:27:24,365
Not that long ago, the government
of Pakistan put out this tender
222
00:27:24,367 --> 00:27:28,903
for proposals for a nationwide
Internet filtering system.
223
00:27:28,905 --> 00:27:32,140
They wanted to solicit proposals
from companies to build,
224
00:27:32,142 --> 00:27:35,011
effectively,
the Great Firewall of Pakistan.
225
00:27:41,151 --> 00:27:44,818
Today if you visit Pakistan
and you get online
226
00:27:44,820 --> 00:27:48,626
and you try to access YouTube,
this is what you'll see,
227
00:27:49,659 --> 00:27:50,894
a blocked page like this.
228
00:27:55,866 --> 00:27:58,001
I'm in Islamabad,
putting in a SIM card.
229
00:28:02,138 --> 00:28:05,006
First and foremost, I'm really
excited to see Shahzad.
230
00:28:05,008 --> 00:28:09,309
I first met Shahzad and
the organization Bytes for All,
231
00:28:09,311 --> 00:28:10,711
eight years ago, I think?
232
00:28:10,713 --> 00:28:13,414
And he's been involved,
in one way or another,
233
00:28:13,416 --> 00:28:15,285
in Citizen Lab research
ever since.
234
00:28:28,432 --> 00:28:31,636
- Hi, Shahzad.
- Hello!
235
00:28:33,103 --> 00:28:36,837
- So great to see you.
- Here we are. Here we are.
236
00:28:38,774 --> 00:28:40,974
Bytes for All does what they do,
237
00:28:40,976 --> 00:28:45,180
fight for Internet rights and
advocacy-based approach to Internet freedom
238
00:28:45,182 --> 00:28:47,816
under extreme duress.
239
00:28:47,818 --> 00:28:50,285
So they're operating
in a country that,
240
00:28:50,287 --> 00:28:53,153
specifically around media
and free expression,
241
00:28:53,155 --> 00:28:55,355
has got to be one of
the worst places in the world.
242
00:28:55,357 --> 00:28:59,027
Uh, journalists are
routinely kidnapped, murdered,
243
00:28:59,029 --> 00:29:01,863
uh, offices firebombed,
et cetera,
244
00:29:01,865 --> 00:29:04,035
and they've experienced
all of that.
245
00:29:05,402 --> 00:29:08,803
Death threats,
staff members kidnapped,
246
00:29:08,805 --> 00:29:12,807
his own son beat up and
thrown to the side of the road
247
00:29:12,809 --> 00:29:15,879
as a warning to Shahzad
not to do what he's doing.
248
00:29:19,950 --> 00:29:22,282
In my opinion,
249
00:29:22,284 --> 00:29:26,690
Internet has opened up
so many opportunities...
250
00:29:27,824 --> 00:29:29,423
for the people to express,
251
00:29:29,425 --> 00:29:33,862
and that is the sole reason that
we are fighting for open Internet.
252
00:29:33,864 --> 00:29:37,397
They lost their public spaces.
253
00:29:37,399 --> 00:29:41,236
They lost their ability
to go out freely.
254
00:29:41,238 --> 00:29:45,205
So, as they are putting controls
and curbs on physical spaces,
255
00:29:45,207 --> 00:29:49,210
they are doing exactly the same
in online spaces as well.
256
00:29:49,212 --> 00:29:53,147
So precisely the reason we are standing
out there to reclaim those spaces.
257
00:29:53,149 --> 00:29:54,848
And we have to at some point,
258
00:29:54,850 --> 00:29:56,419
and we'll continue to do that.
259
00:29:57,854 --> 00:30:00,387
Oh, my God.
260
00:30:00,389 --> 00:30:04,025
The government has the ability
to ban specific pages.
261
00:30:06,096 --> 00:30:08,363
You ban all of
Facebook, businesses are suffering,
262
00:30:08,365 --> 00:30:09,463
people communicate.
263
00:30:09,465 --> 00:30:12,299
I mean, you can
laugh and joke and say,
264
00:30:12,301 --> 00:30:15,068
"For a few days people won't play
FarmVille," but it's not about that.
265
00:30:15,070 --> 00:30:18,405
It's about your fundamental
rights being snatched from you
266
00:30:18,407 --> 00:30:21,976
and no government, in my opinion,
should have the ability to do that.
267
00:30:21,978 --> 00:30:23,377
Right.
268
00:30:23,379 --> 00:30:26,514
Not only that, they banned
Wikipedia for a little while.
269
00:30:26,516 --> 00:30:28,082
- Yes, mm-hmm.
- YouTube.
270
00:30:28,084 --> 00:30:31,385
Uh, about several thousand
websites were affected.
271
00:30:31,387 --> 00:30:35,022
I think the Internet is
this vast, unregulated,
272
00:30:35,024 --> 00:30:37,525
wonderful, democratizing space
273
00:30:37,527 --> 00:30:40,295
and no matter what anyone does,
people will find a way.
274
00:31:32,449 --> 00:31:35,616
Hi, I'm Sabeen Mahmud, and I'm
the director of Peace Nation,
275
00:31:35,618 --> 00:31:37,652
a nonprofit organization.
276
00:31:37,654 --> 00:31:40,654
I've always believed that technology
is always the driver of change,
277
00:31:40,656 --> 00:31:43,924
not business, not governments,
but technology.
278
00:31:43,926 --> 00:31:48,997
And gender-based violence
has always existed
279
00:31:48,999 --> 00:31:52,499
but with the advent of the Internet and
the number of social networking tools,
280
00:31:52,501 --> 00:31:55,470
I think it's
a great mobilization platform.
281
00:32:14,624 --> 00:32:17,392
Sabeen Mahmud
was leaving a Karachi restaurant
282
00:32:17,394 --> 00:32:20,127
when the gunman
attacked her in her car.
283
00:32:20,129 --> 00:32:23,297
Her mother who was also
accompanying her was wounded
284
00:32:23,299 --> 00:32:25,466
and now is in a critical
condition.
285
00:32:25,468 --> 00:32:28,970
Mahmud was taken to a hospital
where she was pronounced dead.
286
00:32:45,321 --> 00:32:50,458
When she spoke in physical
spaces, nothing happened.
287
00:32:50,460 --> 00:32:54,228
When she was carrying on her
campaign, she was not targeted.
288
00:32:54,230 --> 00:32:56,297
People were amused or they
ignored her,
289
00:32:56,299 --> 00:32:58,499
or they just walked past.
290
00:32:58,501 --> 00:33:03,003
But when this whole, sort of,
campaign
291
00:33:03,005 --> 00:33:05,272
hit the Internet
and the social media,
292
00:33:05,274 --> 00:33:07,441
that's when
the lynch mobs gathered.
293
00:33:07,443 --> 00:33:10,111
And one of
the reasons I find is,
294
00:33:10,113 --> 00:33:16,150
that speech in a physical space lasts
only as long as you're speaking.
295
00:33:16,152 --> 00:33:22,489
But once it is uploaded onto the Internet
on any platform, it is there forever.
296
00:33:22,491 --> 00:33:27,127
And then your attackers or,
you know, whoever opposes you,
297
00:33:27,129 --> 00:33:29,364
they gather,
and then they spread it further
298
00:33:29,366 --> 00:33:32,700
and more and more
people join that group
299
00:33:32,702 --> 00:33:36,339
of people who are attacking and
it takes on a life of its own.
300
00:33:56,291 --> 00:33:59,159
We're going through
a demographic revolution.
301
00:33:59,161 --> 00:34:04,097
The center of gravity of cyberspace
is shifting right before our eyes.
302
00:34:04,099 --> 00:34:07,467
From the north and the west of the
planet, where it was invented,
303
00:34:07,469 --> 00:34:10,103
to the South and the East.
304
00:34:10,105 --> 00:34:14,275
The vast majority of Internet
users today and into the future
305
00:34:14,277 --> 00:34:16,309
are coming
from the developing world,
306
00:34:16,311 --> 00:34:19,614
for whom these technologies
are empowering.
307
00:34:19,616 --> 00:34:24,652
What should we expect then from
these next billion digital users
308
00:34:24,654 --> 00:34:27,454
as they come online
in the post-Snowden era?
309
00:36:36,619 --> 00:36:39,286
Once we started
with Midia Ninja,
310
00:36:39,288 --> 00:36:43,224
and we went to the streets
and tried to do live streaming.
311
00:36:43,226 --> 00:36:46,927
There was a mobile station
with an electric generator
312
00:36:46,929 --> 00:36:49,396
using gasoline, you know,
313
00:36:49,398 --> 00:36:54,402
a 4G modem, a laptop,
a camera, a video switcher and...
314
00:37:15,491 --> 00:37:18,226
It was good
in the first two or three times
315
00:37:18,228 --> 00:37:20,561
in more calm demonstrations.
316
00:37:20,563 --> 00:37:22,963
I remember there was a discussion,
and then Carioca said,
317
00:37:22,965 --> 00:37:26,701
"No, I found an app.
318
00:37:26,703 --> 00:37:29,603
Its name is TwitCasting
and maybe we can try it."
319
00:37:31,808 --> 00:37:37,480
It was a Japanese free app used by
teenagers to hang out, you know.
320
00:38:08,744 --> 00:38:12,646
Looking at Brazil, this is one
of those cases where you have
321
00:38:12,648 --> 00:38:14,815
a sporting event, in this case,
322
00:38:14,817 --> 00:38:19,920
which triggers all sorts of
extra concern around security
323
00:38:19,922 --> 00:38:23,291
and the control of information,
much of it legitimate.
324
00:38:23,293 --> 00:38:27,961
But what often happens is that
the layering of surveillance,
325
00:38:27,963 --> 00:38:31,365
extra-legal measures that
happens leading up to
326
00:38:31,367 --> 00:38:34,534
and during these events
doesn't just disappear.
327
00:38:34,536 --> 00:38:36,903
It becomes part of
the permanent architecture.
328
00:39:05,034 --> 00:39:08,469
Mobile phones are prevalent.
Everyone has one in their hands.
329
00:39:08,471 --> 00:39:11,639
And the police
now use a technique
330
00:39:11,641 --> 00:39:16,577
where they set up fake cell phone towers
that captures everyone within the vicinity
331
00:39:16,579 --> 00:39:20,715
and gathers up identifying information
that's emitted by the cell phones,
332
00:39:20,717 --> 00:39:22,816
which they then
use to track people
333
00:39:22,818 --> 00:39:25,085
and associate them
with each other
334
00:39:25,087 --> 00:39:28,655
and being at specific
physical events like a protest
335
00:39:28,657 --> 00:39:31,057
and the government
can go back in time
336
00:39:31,059 --> 00:39:35,996
and re-create every facet of your
life on that particular day and hour.
337
00:39:35,998 --> 00:39:38,431
With whom
you were communicating.
338
00:39:38,433 --> 00:39:41,369
Not only what you're broadcasting
but what you're saying privately
339
00:39:41,371 --> 00:39:43,974
and use this to incriminate you
down the road.
340
00:41:07,456 --> 00:41:10,056
People realize there's
some hidden mechanism of power
341
00:41:10,058 --> 00:41:12,693
going on through surveillance.
342
00:41:12,695 --> 00:41:16,530
And you begin to suspect, maybe,
this device you can't trust.
343
00:41:16,532 --> 00:41:19,699
Maybe the state's in here
or it's in my mobile phone or...
344
00:41:19,701 --> 00:41:22,168
And as that kind of
seeps out there,
345
00:41:22,170 --> 00:41:25,806
people become much more
unwilling to take risks.
346
00:41:25,808 --> 00:41:26,907
You know, even in our own work,
347
00:41:26,909 --> 00:41:30,244
we're much more cautious
about what we say over e-mail,
348
00:41:30,246 --> 00:41:32,679
worried that
somebody's listening and so on.
349
00:41:32,681 --> 00:41:36,249
It's like sand in the machinery.
It kind of slows things down
350
00:41:36,251 --> 00:41:39,552
and everything becomes
much more complicated,
351
00:41:39,554 --> 00:41:42,188
just to communicate
basic instructions.
352
00:41:42,190 --> 00:41:44,627
You're like, "Oh,
first I have to encrypt it."
353
00:41:46,228 --> 00:41:49,663
All these technologies too,
cryptography things,
354
00:41:49,665 --> 00:41:51,599
they might be getting cheap,
355
00:41:51,601 --> 00:41:56,737
but if we consider in terms
of time, they are expensive.
356
00:41:56,739 --> 00:42:00,240
You know, people are being
murdered every day in the favelas.
357
00:42:00,242 --> 00:42:03,277
The military police
are still running.
358
00:42:03,279 --> 00:42:06,813
So it's complicated now
to stop the machines
359
00:42:06,815 --> 00:42:09,985
and adapt our system
to a more safe mode.
360
00:46:29,911 --> 00:46:32,813
So at the same time
that you have so many people
361
00:46:32,815 --> 00:46:37,284
able to communicate to
a global audience at an instant,
362
00:46:37,286 --> 00:46:41,989
governments, in ways that
they weren't 20 years ago,
363
00:46:41,991 --> 00:46:47,161
are really ramping up information
controls because they see...
364
00:46:47,163 --> 00:46:50,063
And when we say "governments," we're
really talking about entrenched powers,
365
00:46:50,065 --> 00:46:55,068
institutionalized, uh, you know,
forms of capitalism in the state
366
00:46:55,070 --> 00:46:58,038
that see, you know,
367
00:46:58,040 --> 00:47:02,409
this type of unpredictable citizen
activism as a threat to their interests
368
00:47:02,411 --> 00:47:04,847
and are developing ways
to counter it.
369
00:47:07,215 --> 00:47:09,284
You have new challenges today.
370
00:47:11,119 --> 00:47:14,857
Sensitive data is transmitted
over encrypted channels.
371
00:47:15,891 --> 00:47:18,492
You need more.
372
00:47:18,494 --> 00:47:21,297
You want to look through
your target's eyes.
373
00:47:23,565 --> 00:47:25,534
You have to hack your target.
374
00:47:31,507 --> 00:47:35,945
You have to overcome encryption
and capture relevant data.
375
00:47:37,545 --> 00:47:40,382
Being stealth and untraceable.
376
00:47:43,853 --> 00:47:45,855
Exactly what we do.
377
00:47:51,226 --> 00:47:56,063
The vendors of these products and
services market them to governments,
378
00:47:56,065 --> 00:47:57,998
usually at trade shows
379
00:47:58,000 --> 00:48:02,068
that are only open to accredited law
enforcement and intelligence agencies.
380
00:48:02,070 --> 00:48:05,606
Actually, I've got
a big binder that I can...
381
00:48:05,608 --> 00:48:08,441
So, if you ignore the bag,
actually which...
382
00:48:09,978 --> 00:48:14,146
someone, uh, deposited
these in as a gift to me,
383
00:48:14,148 --> 00:48:18,117
but I think was hoping to disguise
it in the kindergarten bag.
384
00:48:18,119 --> 00:48:24,023
These are brochures from the type of
trade shows that we're talking about,
385
00:48:24,025 --> 00:48:28,195
products and services that allow
cell phone detection,
386
00:48:28,197 --> 00:48:30,465
uh, insertion of malware...
387
00:48:32,668 --> 00:48:35,936
tracking,
social media monitoring.
388
00:48:35,938 --> 00:48:38,938
In many ways, the way to
think about this market
389
00:48:38,940 --> 00:48:42,441
is that it's the commercialization
of cyber crime.
390
00:48:42,443 --> 00:48:46,345
You trick somebody into
installing a software program
391
00:48:46,347 --> 00:48:48,447
that contains malicious code
392
00:48:48,449 --> 00:48:51,083
that exploits some vulnerability
in the system,
393
00:48:51,085 --> 00:48:55,121
which then allows the attacker
to do anything they want.
394
00:48:55,123 --> 00:48:58,492
Turn on the webcam,
listen in on the microphone,
395
00:48:58,494 --> 00:49:02,695
record keystrokes, record
the location, the movement.
396
00:49:02,697 --> 00:49:05,298
It operates without
much accountability,
397
00:49:05,300 --> 00:49:08,936
certainly no corporate
social responsibility,
398
00:49:08,938 --> 00:49:12,039
ripe for abuse in a place
like Sudan or Ethiopia.
399
00:49:12,041 --> 00:49:14,440
We've seen in one
case after another,
400
00:49:14,442 --> 00:49:17,543
how this ends up being used
to target civil society.
401
00:49:17,545 --> 00:49:18,547
Aha.
402
00:49:20,215 --> 00:49:21,715
Gamma Group.
403
00:49:21,717 --> 00:49:24,684
Maker of the notorious
FinFisher spyware.
404
00:52:07,583 --> 00:52:12,485
The attacker has to socially
engineer or convince the target
405
00:52:12,487 --> 00:52:17,324
to open a file or to, you know, click
through some security warning,
406
00:52:17,326 --> 00:52:19,726
um, in order to become infected.
407
00:52:19,728 --> 00:52:25,132
We had found a document that had pictures
of Ethiopian opposition leaders in it,
408
00:52:25,134 --> 00:52:27,534
and it looked like it was
targeted and designed to appeal
409
00:52:27,536 --> 00:52:29,835
to members of
the Ethiopian diaspora.
410
00:52:29,837 --> 00:52:32,672
Uh, but in fact,
the file was cleverly disguised
411
00:52:32,674 --> 00:52:35,441
to look like a document that's
actually a computer program,
412
00:52:35,443 --> 00:52:37,177
an executable file.
413
00:52:37,179 --> 00:52:39,411
So when you run this, it will
install software on your computer
414
00:52:39,413 --> 00:52:42,148
even though, you know, they
changed the icon and everything
415
00:52:42,150 --> 00:52:45,284
to make it look like this
is a document or a picture.
416
00:52:45,286 --> 00:52:46,455
This is actually a program.
417
00:53:20,688 --> 00:53:23,856
I was able to look at the memory
of an infected computer.
418
00:53:23,858 --> 00:53:26,793
In other words, what's going on inside
the computer when it's infected.
419
00:53:26,795 --> 00:53:31,231
And I was able to identify several
interesting artifacts in the memory,
420
00:53:31,233 --> 00:53:34,434
including a bunch of strings
that said "FinFisher," "FinSpy,"
421
00:53:34,436 --> 00:53:36,739
very clearly attributing this
to the company.
422
00:54:12,708 --> 00:54:16,643
You don't have to be the NSA to
get inside somebody's computer.
423
00:54:16,645 --> 00:54:19,980
Um, instead you can
exploit their curiosity,
424
00:54:19,982 --> 00:54:23,849
their, um, need to communicate.
425
00:54:23,851 --> 00:54:27,487
And of course, journalists, at
the very heart of what they do,
426
00:54:27,489 --> 00:54:31,458
is engage in communication
with a lot of people
427
00:54:31,460 --> 00:54:34,360
and a lot of people that they
don't know and trust necessarily.
428
00:54:34,362 --> 00:54:37,731
Because they're engaged in outreach and
communicating constantly with sources.
429
00:54:51,313 --> 00:54:55,048
Fifty years ago, nobody would have
known what happened in Syria.
430
00:54:55,050 --> 00:54:59,351
But in 2011, when it started,
everybody had Facebook.
431
00:54:59,353 --> 00:55:04,893
Everybody has e-mails and
everybody has WhatsApp and Viber.
432
00:55:06,328 --> 00:55:08,295
So you just can't stop people
433
00:55:08,297 --> 00:55:10,963
from telling
what is happening to them.
434
00:55:10,965 --> 00:55:13,967
So when they besieged Daraa
at the beginning,
435
00:55:13,969 --> 00:55:18,704
they shut down communication, Internet,
land lines and even electricity.
436
00:55:18,706 --> 00:55:22,941
But they did not know that in the
21st century, people have their ways.
437
00:55:22,943 --> 00:55:26,079
People were charging their mobiles
from their cars or generators,
438
00:55:26,081 --> 00:55:29,682
hand generators,
um, manual generators.
439
00:55:29,684 --> 00:55:33,652
And people were using
satellite connections.
440
00:55:33,654 --> 00:55:38,458
You don't need to use the country, uh,
Internet to be connected to the Internet.
441
00:55:38,460 --> 00:55:39,858
You can use anything.
442
00:55:39,860 --> 00:55:43,896
And they were able to tell
what was happening to them.
443
00:55:43,898 --> 00:55:49,635
Um, so the story got around.
444
00:55:57,978 --> 00:56:01,880
A few years ago many of us
celebrated the Arab Spring
445
00:56:01,882 --> 00:56:05,018
as the paradigm of what
these technologies could do.
446
00:56:05,020 --> 00:56:08,387
Remember we called it at the
time "liberation technologies."
447
00:56:08,389 --> 00:56:10,556
They would bring about the end
of authoritarian rule.
448
00:56:18,433 --> 00:56:24,137
Unfortunately, Syria has become
the Arab Spring's dark aftermath.
449
00:56:31,380 --> 00:56:34,614
As groups
sympathetic to the Assad regime
450
00:56:34,616 --> 00:56:38,918
have employed off-the-shelf malware crime
kits to infiltrate social networks,
451
00:56:38,920 --> 00:56:42,454
arrest, torture and
murder opposition groups
452
00:56:42,456 --> 00:56:44,426
and even target
their air strikes.
453
00:57:13,554 --> 00:57:17,190
From the beginning, we believed that
the camera is the most powerful weapon,
454
00:57:17,192 --> 00:57:19,726
and it was actually
the only weapon we have
455
00:57:19,728 --> 00:57:21,697
to deliver our own message
to the whole world.
456
00:57:29,737 --> 00:57:31,570
This is interesting.
457
00:57:31,572 --> 00:57:33,173
Baraa?
458
00:57:37,846 --> 00:57:42,748
It's a pleasure for me to
introduce one of my best friends,
459
00:57:42,750 --> 00:57:48,188
Mr. Baraa, he's one of the most
activist people inside Syria.
460
00:57:48,190 --> 00:57:51,557
He came a few days ago
'cause he has...
461
00:57:51,559 --> 00:57:56,896
He has... many broken
bones on his body.
462
00:57:59,467 --> 00:58:02,570
He was there and covered
the battle in Daraa City.
463
00:58:05,974 --> 00:58:08,974
And in the afternoon,
they get a tank shell.
464
00:58:11,846 --> 00:58:15,550
He was with his friend,
whom has this camera.
465
00:58:16,951 --> 00:58:19,085
And that good guy, you know,
he gets killed
466
00:58:19,087 --> 00:58:22,621
by one tank shell
from the regime's side.
467
00:58:25,559 --> 00:58:27,159
This video, you will see now,
468
00:58:27,161 --> 00:58:31,666
a remote control car and
it exploded, a huge explosion.
469
00:58:33,201 --> 00:58:34,869
It was filmed
by this camera.
470
00:58:39,641 --> 00:58:40,706
After that,
471
00:58:40,708 --> 00:58:42,909
the rocket launchers
472
00:58:42,911 --> 00:58:44,880
started to hit the place
from the regime's side.
473
00:58:46,114 --> 00:58:49,916
So our activist, this media guy,
474
00:58:49,918 --> 00:58:53,219
he gets killed in here
in this exact... this place.
475
00:58:53,221 --> 00:58:56,054
Now here.
He was standing here.
476
00:58:56,056 --> 00:58:58,925
And people found
the camera with him.
477
00:58:58,927 --> 00:59:01,530
We took out the memory card,
and we post this...
478
00:59:02,730 --> 00:59:05,133
as, you know,
in memory of Hussain.
479
00:59:20,581 --> 00:59:24,684
So now, Mr. Baraa here,
just a few days just to heal.
480
00:59:24,686 --> 00:59:29,088
He paid a visit to some
hospitals to check out himself,
481
00:59:29,090 --> 00:59:32,928
then he will go back into Syria
to keep working.
482
00:59:34,795 --> 00:59:37,563
There is a war on Facebook.
483
00:59:37,565 --> 00:59:42,702
Uh, every side is using Facebook
to promote themselves.
484
00:59:54,583 --> 00:59:57,816
The other way around,
the regime will say,
485
00:59:57,818 --> 01:00:01,753
"We will occupy this area.
We will take over this area."
486
01:00:01,755 --> 01:00:04,856
Then the FSA would leave because
they're afraid of bombardment.
487
01:00:04,858 --> 01:00:05,895
It's just a game.
488
01:00:06,962 --> 01:00:08,163
Facebook is a game.
489
01:00:17,672 --> 01:00:19,007
It was just a silly joke I made.
490
01:00:20,342 --> 01:00:24,110
I didn't hurt anybody.
I didn't insult anyone.
491
01:00:24,112 --> 01:00:28,146
It was not political.
It was not racist.
492
01:00:28,148 --> 01:00:31,083
There is nothing
that they could hold against me
493
01:00:31,085 --> 01:00:33,021
with a thing that
I wrote on Facebook.
494
01:00:35,023 --> 01:00:38,794
But still,
at a time of war...
495
01:00:40,962 --> 01:00:42,030
people get crazy.
496
01:00:50,639 --> 01:00:55,007
They did not drag me
in the street or kidnap me.
497
01:00:55,009 --> 01:00:58,177
They just asked me to come
to ask me a few questions.
498
01:00:58,179 --> 01:01:01,079
This is what they said, so I
signed the paper that I'm coming.
499
01:01:01,081 --> 01:01:07,188
I went the next morning at
11:30, to the detention center.
500
01:01:08,857 --> 01:01:10,923
The security guy came to me.
501
01:01:10,925 --> 01:01:14,360
He's like...
He's like half of my height.
502
01:01:14,362 --> 01:01:16,762
He blindfolded me,
and I was like,
503
01:01:16,764 --> 01:01:20,099
I was okay with that
because I thought, it's some...
504
01:01:20,101 --> 01:01:25,938
it's confidential secrets of the country
that they don't want me to see.
505
01:01:25,940 --> 01:01:30,679
And then I was presented to the
detective or the interrogator.
506
01:01:31,346 --> 01:01:32,347
I never saw him.
507
01:01:35,349 --> 01:01:39,885
He told me, "You're a computer engineer.
Please be seated."
508
01:01:39,887 --> 01:01:44,690
And I sat next to him and he started
reading all my Facebook posts.
509
01:01:44,692 --> 01:01:45,727
I was like, "Oh."
510
01:01:57,404 --> 01:01:59,806
One of the posts
that I wrote was,
511
01:01:59,808 --> 01:02:02,874
"No praying, no fasting
until the regime falls,"
512
01:02:02,876 --> 01:02:04,679
which was actually
making fun of both sides.
513
01:02:05,413 --> 01:02:06,978
And I laughed and he's like,
514
01:02:06,980 --> 01:02:09,784
"I'm not kidding with you.
I'm not joking with you."
515
01:02:13,087 --> 01:02:15,353
He kicked me on my chest
516
01:02:15,355 --> 01:02:20,492
and then he requested
the same short guy,
517
01:02:20,494 --> 01:02:22,427
because he was
there in the room,
518
01:02:22,429 --> 01:02:24,429
to bring something called
the "flying carpet,"
519
01:02:24,431 --> 01:02:26,199
which is a torturing machine.
520
01:02:26,201 --> 01:02:30,969
It's a wooden board,
like the door,
521
01:02:30,971 --> 01:02:34,042
but it has joints in the middle
that can flip.
522
01:02:34,942 --> 01:02:39,077
And I had to lay on it.
523
01:02:39,079 --> 01:02:43,416
They tied my wrists and they tied me
from the middle, they tied my legs.
524
01:02:43,418 --> 01:02:48,220
And they just closed it
so my knees touched my chest.
525
01:02:48,222 --> 01:02:50,523
He took off my shoes
and my socks
526
01:02:50,525 --> 01:02:56,165
and started beating me with a
metal, uh, with a metal whip.
527
01:02:58,800 --> 01:03:02,771
The pain is unbelievable.
528
01:03:03,804 --> 01:03:05,271
You just can't take it anymore.
529
01:03:05,273 --> 01:03:09,278
You just can't endure
this amount of agony.
530
01:03:17,886 --> 01:03:21,219
What we saw in Syria
was a lot of use of, say,
531
01:03:21,221 --> 01:03:23,456
off-the-shelf remote access
tools.
532
01:03:23,458 --> 01:03:27,126
So this is sort of software that you can
get from underground message boards
533
01:03:27,128 --> 01:03:29,494
or maybe purchase
for not so much money.
534
01:03:29,496 --> 01:03:33,532
Maybe $200-300 that
give you the ability
535
01:03:33,534 --> 01:03:36,469
to record someone's keystrokes,
read their e-mails,
536
01:03:36,471 --> 01:03:39,871
even look at them
through their webcam.
537
01:03:39,873 --> 01:03:42,307
Record via
the computer's microphone,
538
01:03:42,309 --> 01:03:45,146
conversations that are being had
around the target's computer.
539
01:03:46,380 --> 01:03:48,914
Frequently what you would see
540
01:03:48,916 --> 01:03:51,583
is it would be bundled
with some type of lured document
541
01:03:51,585 --> 01:03:55,987
which showed
a deep understanding
542
01:03:55,989 --> 01:03:58,858
of the psychology of the people
they were trying to target.
543
01:03:58,860 --> 01:04:03,595
For instance, one of the documents
that was sent out that I keenly recall
544
01:04:03,597 --> 01:04:06,097
was a list.
545
01:04:06,099 --> 01:04:12,103
A purported list of insurgents
identified by the Syrian government.
546
01:04:12,105 --> 01:04:17,108
So of course what happened was that
this was promptly passed around
547
01:04:17,110 --> 01:04:20,213
to all sorts of very
interesting groups in Syria
548
01:04:20,215 --> 01:04:23,215
because everyone wanted to know
if they were on this list or not.
549
01:04:23,217 --> 01:04:29,021
So the actual spyware payload itself
wasn't particularly sophisticated,
550
01:04:29,023 --> 01:04:32,090
but the social...
551
01:04:32,092 --> 01:04:35,394
the social and social engineering
side of that operation,
552
01:04:35,396 --> 01:04:37,466
um, was quite smart.
553
01:04:43,938 --> 01:04:47,409
Internet entered almost
all countries in the region
554
01:04:48,442 --> 01:04:49,944
before it entered Syria.
555
01:04:51,145 --> 01:04:52,144
Yes.
556
01:04:52,146 --> 01:04:54,480
Government in Syria,
557
01:04:54,482 --> 01:04:56,983
we are not as developed
as Canada, for example,
558
01:04:56,985 --> 01:04:59,018
or not as developed
as United States.
559
01:04:59,020 --> 01:05:02,121
In Canada they can monitor
people and control people
560
01:05:02,123 --> 01:05:04,990
and spy people in
a very intelligent way.
561
01:05:04,992 --> 01:05:07,429
And even they don't
feel that they are...
562
01:05:10,297 --> 01:05:11,630
spied on.
563
01:05:11,632 --> 01:05:16,471
But in Syria,
of course you go to old ways.
564
01:05:23,244 --> 01:05:26,144
They untie me and then I was...
565
01:05:26,146 --> 01:05:28,914
and then he asked me to
sit next to him, and he said,
566
01:05:28,916 --> 01:05:29,918
"Let's start talking."
567
01:05:31,619 --> 01:05:35,186
And I told him, "I don't want
to talk to you anymore."
568
01:05:35,188 --> 01:05:41,527
He said, "I want you to admit you work
with the Free Syrian Electronic Army."
569
01:05:41,529 --> 01:05:44,163
I was like,
"I don't know what that is."
570
01:05:44,165 --> 01:05:47,469
He said, "You like their page. You
like their page on Facebook."
571
01:05:48,936 --> 01:05:50,936
I told him,
"I like their page on Facebook,
572
01:05:50,938 --> 01:05:54,039
but there are too many pages
on Facebook that you can like.
573
01:05:54,041 --> 01:05:56,478
I also like Assad's page
on Facebook."
574
01:05:58,146 --> 01:06:00,579
Well, that did not convince him.
575
01:06:00,581 --> 01:06:05,717
So his boss came and he told
him, "What is going on?"
576
01:06:05,719 --> 01:06:10,222
He told him, "This is the Facebook
guy, and he's not cooperating."
577
01:06:10,224 --> 01:06:14,527
So then his boss told him to,
"Send him down to the basement,
578
01:06:14,529 --> 01:06:18,530
peel his skin off and just
remind me of him after a month."
579
01:06:18,532 --> 01:06:21,199
And I was like, "Can we go
back to the flying carpet?"
580
01:06:24,538 --> 01:06:26,438
I stayed there
for almost a month,
581
01:06:26,440 --> 01:06:30,011
and then I was released
with a presidential amnesty.
582
01:06:32,112 --> 01:06:35,014
So I went in a taxi,
583
01:06:35,016 --> 01:06:39,150
covered with dust,
dirt, shit and blood,
584
01:06:39,152 --> 01:06:42,554
all over my face,
my clothes.
585
01:06:42,556 --> 01:06:46,691
And then the taxi driver felt pity
for me, and he gave me a cigarette.
586
01:06:46,693 --> 01:06:48,963
I remember
that was the first time I cried.
587
01:06:52,099 --> 01:06:56,202
And I went to my flat in Latakia
where I used to study,
588
01:06:56,204 --> 01:06:58,073
and my roommates were
shocked to see me alive.
589
01:06:59,706 --> 01:07:03,679
And then, like, two weeks after
that I fled the country.
590
01:07:05,112 --> 01:07:06,612
I came to Jordan.
591
01:07:06,614 --> 01:07:07,683
I am a journalist now.
592
01:07:21,161 --> 01:07:24,697
With Syria, a lot of the
bad things that are happening
593
01:07:24,699 --> 01:07:28,066
are happening to people who
don't look like Westerners.
594
01:07:28,068 --> 01:07:31,637
The bad things happening to
these people through technology,
595
01:07:31,639 --> 01:07:35,106
through the risks
inherent in technology,
596
01:07:35,108 --> 01:07:38,210
are not different than the kinds
of risks that we may face,
597
01:07:38,212 --> 01:07:40,445
um, although they look
different.
598
01:07:40,447 --> 01:07:41,746
We see in the news
almost every day,
599
01:07:41,748 --> 01:07:45,483
a report of a breach,
some kind of a large hack.
600
01:07:45,485 --> 01:07:47,820
Data being exploited somewhere.
601
01:07:47,822 --> 01:07:50,688
It's the same problem, but in
Syria, it looks very different
602
01:07:50,690 --> 01:07:53,425
and because there are
dark-skinned people,
603
01:07:53,427 --> 01:07:56,161
uh, and there are guns
and a foreign language,
604
01:07:56,163 --> 01:07:59,164
it feels, I think to many,
exotic and different,
605
01:07:59,166 --> 01:08:00,632
and it couldn't happen here.
606
01:08:00,634 --> 01:08:03,269
And I think, in fact,
what you're seeing in Syria
607
01:08:03,271 --> 01:08:06,272
is this is what happens
when the risks get higher
608
01:08:06,274 --> 01:08:07,743
but the technology is the same.
609
01:08:09,243 --> 01:08:10,579
They're using the same Facebook
that we are.
610
01:10:57,444 --> 01:11:00,312
What is this? This is surreal.
611
01:12:40,581 --> 01:12:43,385
Lots of people were there,
by 7:00 in the night,
612
01:12:44,351 --> 01:12:46,718
and we were live.
613
01:12:51,559 --> 01:12:55,760
Suddenly a man came to Carioca,
and he asked to interview him.
614
01:12:59,632 --> 01:13:03,901
And then the military police
came to Carioca, searched his bag.
615
01:13:03,903 --> 01:13:08,473
And then they said
he should be taken to jail
616
01:13:08,475 --> 01:13:12,777
as a preventive arrestment,
to be searched and inquired.
617
01:13:18,385 --> 01:13:22,888
How this information was being
virilized was really amazing.
618
01:13:22,890 --> 01:13:25,523
Like sharing, sharing, sharing,
tweets, tweets, tweets,
619
01:13:25,525 --> 01:13:26,858
mention, mention, mention.
620
01:13:26,860 --> 01:13:28,626
"The Ninja is being arrested."
621
01:13:28,628 --> 01:13:31,028
And suddenly there was,
like, a small crowd.
622
01:13:31,030 --> 01:13:33,398
Like 5,000 people.
623
01:13:33,400 --> 01:13:36,134
And all of them was
screaming together,
624
01:15:07,161 --> 01:15:10,495
Then we posted this
video from the mobile, like, real time,
625
01:15:10,497 --> 01:15:12,166
and it virilized very fast.
626
01:18:05,271 --> 01:18:08,740
The video was just getting
bigger in the social media.
627
01:18:08,742 --> 01:18:10,709
Bruno Teles became a character.
628
01:18:39,773 --> 01:18:42,139
They said
that Bruno was innocent,
629
01:18:42,141 --> 01:18:46,844
and they used Midia Ninja image.
630
01:18:46,846 --> 01:18:49,114
And they credited Midia Ninja.
631
01:18:49,116 --> 01:18:52,416
It was the first time
that we were seeing
632
01:18:52,418 --> 01:18:57,022
Globo recognizing
a free media collective
633
01:18:57,024 --> 01:19:01,459
as a legitimate player
in the communication game.
634
01:19:01,461 --> 01:19:04,232
It was a next step.
635
01:19:35,229 --> 01:19:40,802
Oh, he's changing his shirt.
636
01:21:54,067 --> 01:21:59,103
Ninja! Ninja! Ninja!
637
01:22:18,190 --> 01:22:19,126
Ninja!
638
01:22:48,188 --> 01:22:51,690
I've always been a fan of the
terms "hacking" and "hacktivism."
639
01:22:51,692 --> 01:22:53,325
Especially "hacktivism"
640
01:22:53,327 --> 01:22:56,727
which is the combination of
hacking and political activism.
641
01:22:56,729 --> 01:23:01,566
And those combined
are pretty powerful to me.
642
01:23:01,568 --> 01:23:06,340
It's about encouraging people not
to accept technology at face value.
643
01:23:07,707 --> 01:23:09,574
We need to encourage people
to think about
644
01:23:09,576 --> 01:23:12,509
what it is that surrounds them,
645
01:23:12,511 --> 01:23:14,980
to question authority
646
01:23:14,982 --> 01:23:19,150
in a sense of the authority being the
technological environment around them
647
01:23:19,152 --> 01:23:24,522
and to realize that when you start
pulling back the layers of all of this,
648
01:23:24,524 --> 01:23:26,724
that's where
the exercise of power is.
649
01:23:26,726 --> 01:23:30,195
So if we want liberal democracy
to flourish,
650
01:23:30,197 --> 01:23:33,197
we need people
to start lifting back the layers
651
01:23:33,199 --> 01:23:34,568
and understanding
what's going on.
652
01:23:50,216 --> 01:23:54,218
I think ultimately it comes down
to understanding what your values are,
653
01:23:54,220 --> 01:23:56,687
because how do you
develop your thoughts, right?
654
01:23:56,689 --> 01:23:58,757
How do you determine what it
is that you truly believe?
655
01:23:58,759 --> 01:24:02,326
How do you determine what
it is you really want to say,
656
01:24:02,328 --> 01:24:04,428
if you can't even
keep notes safely?
657
01:24:04,430 --> 01:24:08,500
If you can't have some private
space, some space for thought,
658
01:24:08,502 --> 01:24:11,369
some space to enjoy the product
of your own intellect,
659
01:24:11,371 --> 01:24:13,772
to share that with people
close to you who you trust.
660
01:24:13,774 --> 01:24:16,610
Whether they're family, whether they're
colleagues, whether they're compatriots.
661
01:24:25,585 --> 01:24:31,156
One thing that I see a lot is,
this idea of technology as a solution.
662
01:24:31,158 --> 01:24:33,691
It's a natural thing. Okay,
technology is under threat.
663
01:24:33,693 --> 01:24:35,628
Let's find
a technological solution.
664
01:24:37,197 --> 01:24:38,797
There are so many projects now
665
01:24:38,799 --> 01:24:42,733
around secure communications,
platforms, chats, instant messaging.
666
01:24:42,735 --> 01:24:46,838
But it's only one component
of a solution set.
667
01:24:46,840 --> 01:24:51,078
And I think often overlooked are the
legal and political dimensions.
668
01:24:52,211 --> 01:24:53,343
If we're talking about
669
01:24:53,345 --> 01:24:55,480
protecting and preserving
all of this,
670
01:24:55,482 --> 01:24:59,517
as a secure and open
communication space,
671
01:24:59,519 --> 01:25:01,452
that means holding governments
accountable.
672
01:25:01,454 --> 01:25:03,487
It means holding
companies accountable.
673
01:25:03,489 --> 01:25:06,090
Putting in place rules and laws
674
01:25:06,092 --> 01:25:11,161
that ensures they can't do things that
infringe on our freedoms and rights.
675
01:25:11,163 --> 01:25:14,299
That to me is, uh,
676
01:25:14,301 --> 01:25:18,338
such a critical foundation
of a digital democracy today.
677
01:25:20,033 --> 01:25:25,033
Original subtitles by explosiveskull
Resynced by TaiMicca
55206
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.