All language subtitles for Black.Code.2016.1080p.WEBRip.x264-[YTS.AM].en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali Download
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa Download
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian Download
da Danish
en English Download
eo Esperanto Download
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish Download
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian Download
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak Download
sl Slovenian
so Somali
es Spanish Download
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish Download
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:06,000 --> 00:00:12,074 Advertise your product or brand here contact www.OpenSubtitles.org today 2 00:00:15,969 --> 00:00:20,969 Subtitles by explosiveskull 3 00:00:34,365 --> 00:00:37,467 We are going through the most profound change 4 00:00:37,469 --> 00:00:41,240 in communication technologies in all of human history right now. 5 00:00:45,643 --> 00:00:50,346 Printing press, radio, telegraph, television. All very important. 6 00:00:50,348 --> 00:00:54,217 But I believe we're going through the most transformative, 7 00:00:54,219 --> 00:00:57,488 purely on the basis of three technologies. 8 00:00:57,490 --> 00:01:00,527 Mobile, social media and cloud computing. 9 00:01:07,700 --> 00:01:10,434 They share one very important characteristic. 10 00:01:10,436 --> 00:01:14,237 And that's the amount of private information. 11 00:01:14,239 --> 00:01:17,773 Information that used to be in our desktops or filing cabinets, 12 00:01:17,775 --> 00:01:19,442 even in our heads, 13 00:01:19,444 --> 00:01:22,379 that we now entrust to third parties. 14 00:01:24,750 --> 00:01:28,552 Data that we are conscious of, and deliberate about, 15 00:01:28,554 --> 00:01:31,621 like the e-mails we send and the tweets we post. 16 00:01:31,623 --> 00:01:34,323 But it also includes a lot of information 17 00:01:34,325 --> 00:01:37,296 that we're completely, or mostly, unconscious about. 18 00:01:38,496 --> 00:01:40,531 So if you take my mobile phone, 19 00:01:40,533 --> 00:01:43,866 even when I'm not using it, it's emitting a pulse, 20 00:01:43,868 --> 00:01:47,704 trying to locate the nearest Wi-Fi router or cell phone exchange, 21 00:01:47,706 --> 00:01:50,576 and within that beacon is the make and model of the phone, 22 00:01:51,576 --> 00:01:53,377 the fact that it's my phone, 23 00:01:53,379 --> 00:01:56,413 because my name is attached to the operating system, 24 00:01:56,415 --> 00:01:59,383 and most importantly, the geolocation of the phone. 25 00:02:09,828 --> 00:02:12,762 We are leaving this digital exhaust 26 00:02:12,764 --> 00:02:17,733 that contains extraordinarily precise information about our lives, 27 00:02:17,735 --> 00:02:22,371 our social relationships reduced to trillions of data points 28 00:02:22,373 --> 00:02:27,244 that form now this new ethereal layer around the planet 29 00:02:27,246 --> 00:02:29,745 that's only growing in all directions. 30 00:02:34,620 --> 00:02:38,354 Capabilities are being put in the hands of policy makers, 31 00:02:38,356 --> 00:02:41,959 five years ago, they'd never imagine that they would have. 32 00:02:41,961 --> 00:02:45,798 This is where big data meets Big Brother. 33 00:03:07,286 --> 00:03:08,288 Should be here. 34 00:03:10,489 --> 00:03:12,489 It is kind of in a rock, I think. 35 00:03:12,491 --> 00:03:14,458 Yeah, the entrance is in a rock. 36 00:03:14,460 --> 00:03:16,459 Or a bunker. 37 00:03:16,461 --> 00:03:18,463 Oh, yeah, the bunker. It is down there! 38 00:03:21,699 --> 00:03:23,466 There is a bunker under here. 39 00:03:23,468 --> 00:03:26,870 - Yeah. - It is between 33 and 39. 40 00:03:26,872 --> 00:03:28,304 Right there. Look at that door. 41 00:03:28,306 --> 00:03:29,538 - Yeah. - Yeah, this is it. 42 00:03:29,540 --> 00:03:31,477 - Bahnhof. - Okay. 43 00:03:53,799 --> 00:03:55,701 Hey, I guess we just go in. 44 00:04:55,560 --> 00:05:00,062 Many people believe that you have this cloud services that are floating around. 45 00:05:00,064 --> 00:05:02,466 People think, "Okay, it's a cloud server." 46 00:05:02,468 --> 00:05:05,935 But this is the actual physical location of the Internet. 47 00:05:14,379 --> 00:05:17,714 It's a constant struggle to protect data. 48 00:05:22,120 --> 00:05:26,589 The Swedish Security Police wanted to install tools 49 00:05:26,591 --> 00:05:31,863 to automatically log in to our data and get out the information. 50 00:05:32,964 --> 00:05:35,065 So I invited them to our facility, 51 00:05:35,067 --> 00:05:37,466 and then I had a microphone 52 00:05:37,468 --> 00:05:42,675 which I was provided by the Swedish Public Service, national radio. 53 00:05:57,055 --> 00:06:00,423 I taped this conversation, and they were so angry. 54 00:06:00,425 --> 00:06:03,459 And they also wanted us to sign a paper 55 00:06:03,461 --> 00:06:06,863 where they said that we could not say anything about it. 56 00:06:06,865 --> 00:06:08,798 It should be total secrecy. 57 00:06:08,800 --> 00:06:13,202 They said, "If a terrorist attack happens, it's your fault." 58 00:06:28,052 --> 00:06:30,553 It's, like, a creepy feeling. 59 00:06:30,555 --> 00:06:34,057 Nobody can say that any facility is safe. 60 00:06:34,059 --> 00:06:38,998 There are always possibilities to go in and find data and take it out. 61 00:06:42,634 --> 00:06:46,101 People say that, "Oh, I don't have anything to hide. 62 00:06:46,103 --> 00:06:47,937 They can read my mail. I don't have anything." 63 00:06:47,939 --> 00:06:51,041 But it's not that which is this problem. 64 00:06:51,043 --> 00:06:55,611 The problem is, without secrecy, there can be no democracy. 65 00:06:55,613 --> 00:06:58,483 Without secrecy, there can be no market economy. 66 00:06:59,117 --> 00:07:00,750 Right. 67 00:07:00,752 --> 00:07:03,586 There is an obvious candidate for the Nobel Peace Prize. 68 00:07:03,588 --> 00:07:05,956 - Really? - And that is Edward Snowden. 69 00:07:05,958 --> 00:07:07,493 I mean, yeah. 70 00:07:21,273 --> 00:07:28,043 Does the public enjoy the same right to privacy that we have in the past? 71 00:07:28,045 --> 00:07:30,846 Are we still private citizens, 72 00:07:30,848 --> 00:07:34,584 and then public officials, where the government knows very little about us, 73 00:07:34,586 --> 00:07:35,985 but we know everything about them? 74 00:07:35,987 --> 00:07:39,055 Why are we, the public, becoming disempowered 75 00:07:39,057 --> 00:07:41,892 at the same time that governments around the world, 76 00:07:41,894 --> 00:07:47,130 corporations around the world, institutions around the world, 77 00:07:47,132 --> 00:07:52,067 are gaining greater and greater leverage over the range of our activities, 78 00:07:52,069 --> 00:07:54,206 their knowledge of what we do? 79 00:08:07,952 --> 00:08:10,120 The Citizen Lab is an unusual place. 80 00:08:13,257 --> 00:08:16,561 We're a research unit at the University of Toronto. 81 00:08:18,697 --> 00:08:22,231 We combine the skills of engineers, computer scientists 82 00:08:22,233 --> 00:08:24,034 with social scientists. 83 00:08:24,036 --> 00:08:26,769 We collaborate with people from all over the world 84 00:08:26,771 --> 00:08:28,971 to do the field research that we do. 85 00:08:28,973 --> 00:08:32,342 And we do this to advance research on global security, 86 00:08:32,344 --> 00:08:34,280 cyberspace and human rights. 87 00:08:37,149 --> 00:08:39,081 The world is a very dangerous place 88 00:08:39,083 --> 00:08:42,319 as we saw recently in... in tragic incidents in Paris, 89 00:08:42,321 --> 00:08:47,123 and you want to have security agencies be well adept at discerning 90 00:08:47,125 --> 00:08:49,658 what those threats are over our horizon. 91 00:08:49,660 --> 00:08:54,964 But is it okay that the government sets up a giant digital X-ray machine 92 00:08:54,966 --> 00:08:56,833 over everything that we do? 93 00:08:56,835 --> 00:08:59,035 Because that's effectively where we're headed right now. 94 00:09:02,374 --> 00:09:05,709 We've been a kind of digital early warning system, 95 00:09:05,711 --> 00:09:07,844 scanning the horizon. 96 00:09:07,846 --> 00:09:10,814 And what we've seen, frankly, has been really disturbing. 97 00:12:33,485 --> 00:12:37,320 Tibetans are watched from every angle and from every corner. 98 00:12:37,322 --> 00:12:41,156 It's in their homes, it's in their offices, it's in the streets. 99 00:12:41,158 --> 00:12:43,126 In Tibet, certainly in central Tibet 100 00:12:43,128 --> 00:12:45,527 and around the capital city of Lhasa, 101 00:12:45,529 --> 00:12:49,132 Chinese authorities, together with Chinese corporations, 102 00:12:49,134 --> 00:12:51,300 telecommunications companies, 103 00:12:51,302 --> 00:12:56,071 they've integrated the ability to spy on people via their mobile phone, 104 00:12:56,073 --> 00:12:59,074 via the last communications they may have had over the Internet. 105 00:12:59,076 --> 00:13:02,280 Down to the closed circuit television camera on the streets. 106 00:13:03,948 --> 00:13:07,050 The Chinese so strictly control access to Tibet, 107 00:13:07,052 --> 00:13:09,017 it's just like a black hole 108 00:13:09,019 --> 00:13:12,254 for media, for independent observers, 109 00:13:12,256 --> 00:13:13,992 for international agencies, for anything. 110 00:13:44,188 --> 00:13:49,025 How I escaped is a secret. 111 00:14:07,645 --> 00:14:10,246 People are incredibly courageous. 112 00:14:10,248 --> 00:14:13,449 People inside Tibet will send out news and information. 113 00:14:13,451 --> 00:14:16,455 And they'll say, "I want this story to be told." 114 00:14:17,554 --> 00:14:19,055 They could be imprisoned. 115 00:14:19,057 --> 00:14:20,422 They could be tortured. 116 00:14:20,424 --> 00:14:22,124 Their family could pay the price. 117 00:14:23,394 --> 00:14:25,527 We on the outside have to decide 118 00:14:25,529 --> 00:14:31,199 how to walk this very, sort of, fine line between protecting people's security 119 00:14:31,201 --> 00:14:34,970 and honoring their wishes about getting news and information out. 120 00:14:34,972 --> 00:14:39,374 And we know for a fact, thanks to Citizen Lab's report, 121 00:14:39,376 --> 00:14:42,478 that we are being successfully targeted. 122 00:14:44,481 --> 00:14:49,118 A new report has been released from a group of digital detectives. 123 00:14:49,120 --> 00:14:53,089 From their computers in Toronto, they've tracked a high-tech spy ring 124 00:14:53,091 --> 00:14:54,360 that reaches around the world. 125 00:14:59,096 --> 00:15:00,262 For the past ten months, 126 00:15:00,264 --> 00:15:03,532 these computer experts have been working as cyber sleuths 127 00:15:03,534 --> 00:15:06,969 hot on the trail of a massive electronic spy network. 128 00:15:06,971 --> 00:15:11,273 They say it has taken control of nearly 1,300 high-level computers 129 00:15:11,275 --> 00:15:13,443 in more than 100 countries. 130 00:15:13,445 --> 00:15:17,079 A discovery that could have major political implications. 131 00:15:17,081 --> 00:15:19,581 They can extract any document they wanted. 132 00:15:19,583 --> 00:15:23,552 They could turn on web cameras, turn on audio devices, 133 00:15:23,554 --> 00:15:25,588 so that they could, in effect, use the computers 134 00:15:25,590 --> 00:15:27,623 as a listening device in the offices. 135 00:15:27,625 --> 00:15:30,359 The web of intrigue started with the Dalai Lama 136 00:15:30,361 --> 00:15:32,163 who thought his computer had been hacked. 137 00:15:36,368 --> 00:15:41,170 Up until about 2007 or 2008, I'd never really heard of malware. 138 00:15:41,172 --> 00:15:43,506 You know, I'd heard of viruses, obviously, 139 00:15:43,508 --> 00:15:46,475 but I hadn't really heard about targeted malware attacks 140 00:15:46,477 --> 00:15:48,176 affecting the human rights community. 141 00:15:53,551 --> 00:15:57,052 First time I heard about it was in the context of the Tibetans. 142 00:15:57,054 --> 00:16:01,523 Gradually we started piecing together, they are under surveillance. 143 00:16:01,525 --> 00:16:05,661 The surveillance comes from groups within China. 144 00:16:05,663 --> 00:16:10,733 They're using malicious software and socially-engineered e-mails. 145 00:16:10,735 --> 00:16:13,435 E-mails that are crafted to get them to open it up 146 00:16:13,437 --> 00:16:15,274 to get inside their devices. 147 00:16:16,640 --> 00:16:18,741 Nart Villeneuve, a computer wiz, 148 00:16:18,743 --> 00:16:21,109 figured out how the operation worked 149 00:16:21,111 --> 00:16:23,813 by getting the attackers to hack into his computer. 150 00:16:23,815 --> 00:16:25,580 We're monitoring these groups 151 00:16:25,582 --> 00:16:27,717 for long periods of time, 152 00:16:27,719 --> 00:16:30,652 and you're essentially waiting for them to screw up, right? 153 00:16:30,654 --> 00:16:32,722 And when they do, you take advantage of that. 154 00:16:32,724 --> 00:16:34,824 Sometimes it takes a long time. 155 00:16:34,826 --> 00:16:38,060 You could be monitoring a group for a year and get nothing. 156 00:16:38,062 --> 00:16:42,531 Then one day, they just use a server that they don't lock down 157 00:16:42,533 --> 00:16:44,302 and all the data's just sitting there. 158 00:16:46,236 --> 00:16:48,706 I was at home. It was pretty late. 159 00:17:20,238 --> 00:17:21,636 Nart was scouring through it, 160 00:17:21,638 --> 00:17:24,440 trying to figure out what actor is responsible 161 00:17:24,442 --> 00:17:26,642 for getting inside the Dalai Lama's office. 162 00:17:26,644 --> 00:17:30,712 And there was a 22 or 24 character string that kept coming up 163 00:17:30,714 --> 00:17:33,449 that he couldn't figure out, "What is the meaning of this?" 164 00:17:33,451 --> 00:17:37,719 So on a whim, he just copied and pasted it into Google. 165 00:17:37,721 --> 00:17:41,093 One website came up, and it was Chinese characters. 166 00:17:44,662 --> 00:17:46,295 So he clicked on it. 167 00:17:48,732 --> 00:17:52,634 To my surprise, what came back was the actual page 168 00:17:52,636 --> 00:17:56,905 that the attackers used to interface with the compromised systems. 169 00:17:56,907 --> 00:18:00,910 So they set up a website where they could monitor their victims. 170 00:18:00,912 --> 00:18:03,179 But they didn't password protect it! 171 00:18:03,181 --> 00:18:06,117 So it was like a window into everything they were doing. 172 00:18:16,693 --> 00:18:20,162 This wasn't just targeted at Tibetan organizations 173 00:18:20,164 --> 00:18:22,398 or human rights organizations. 174 00:18:22,400 --> 00:18:26,469 This was global, a pretty wide range of institutions 175 00:18:26,471 --> 00:18:29,438 that showed that these attackers were... were quite busy. 176 00:18:29,440 --> 00:18:31,844 There was huge pickup in the media. It was all over the world. 177 00:18:38,482 --> 00:18:42,287 And it put us on a different kind of footing in terms of our credibility. 178 00:18:45,557 --> 00:18:49,458 In the cyber security community, we were novices at that time. 179 00:18:49,460 --> 00:18:50,429 We were kind of outsiders. 180 00:18:52,931 --> 00:18:55,864 So we were kind of calling it on the fly. 181 00:18:55,866 --> 00:18:57,799 Like, what do we do? What's the right thing to do? 182 00:18:57,801 --> 00:18:59,367 Who do we notify? 183 00:18:59,369 --> 00:19:01,804 I knew that publishing it was important. 184 00:19:01,806 --> 00:19:04,440 We had to redact a lot of the information to protect people. 185 00:19:04,442 --> 00:19:06,776 Should we notify the government? 186 00:19:06,778 --> 00:19:08,710 Should we notify the Canadian government? 187 00:19:08,712 --> 00:19:12,715 How do we notify other governments that are being victimized? 188 00:19:12,717 --> 00:19:14,482 At the time, you know, 189 00:19:14,484 --> 00:19:17,353 we didn't want to completely disclose everything that we had done, 190 00:19:17,355 --> 00:19:19,322 because we wanted to do it again. 191 00:19:19,324 --> 00:19:22,725 In some of the communities I mentioned, they loved it. 192 00:19:22,727 --> 00:19:26,228 But I got the feeling from, certainly inside my own government, 193 00:19:26,230 --> 00:19:27,863 there was a lot of weirdness. 194 00:19:27,865 --> 00:19:31,366 - Are we allowed to speculate? - Well, I think now we know 195 00:19:31,368 --> 00:19:35,938 because there's a Snowden disclosure that explicitly references the fact 196 00:19:35,940 --> 00:19:38,540 that the Canadians and the Americans, 197 00:19:38,542 --> 00:19:40,575 our signals intelligence agencies, 198 00:19:40,577 --> 00:19:43,613 were piggybacking off the GhostNet network. 199 00:19:43,615 --> 00:19:47,352 So, in publishing the report, we basically broke up their party. 200 00:19:55,692 --> 00:19:59,362 From our initial samples from the office of the Dalai Lama, 201 00:19:59,364 --> 00:20:02,297 they were actually compromised by two distinct groups. 202 00:20:02,299 --> 00:20:05,433 The GhostNet group obviously got the most attention. 203 00:20:05,435 --> 00:20:08,336 But there was another group that was also active. 204 00:20:08,338 --> 00:20:10,739 The GhostNet group shut down their operations, 205 00:20:10,741 --> 00:20:14,709 but the other group, um, they're still going. 206 00:21:58,415 --> 00:22:01,650 In our research, what we see are acts of war 207 00:22:01,652 --> 00:22:04,920 that take place against citizens, 208 00:22:04,922 --> 00:22:06,921 using these very technologies. 209 00:22:06,923 --> 00:22:09,959 Getting inside the computers of Tibetans and then arresting them, 210 00:22:09,961 --> 00:22:13,929 and possibly executing them, is a kind of act of war. 211 00:22:16,000 --> 00:22:18,901 We see this sort of thing every week, right? 212 00:22:18,903 --> 00:22:21,373 Minor to major versions of it. 213 00:22:23,875 --> 00:22:27,876 Everything on the site is correct except this. 214 00:22:27,878 --> 00:22:31,913 So this... The last log-in on the C panel was from Korea. 215 00:22:31,915 --> 00:22:34,417 - Mm-hmm. - Do you guys have any work in Korea? 216 00:22:34,419 --> 00:22:36,151 - Is there any... - No, no... 217 00:22:36,153 --> 00:22:39,121 So who actually accesses the website to update it and all that sort of thing? 218 00:22:39,123 --> 00:22:41,526 - It must be somebody unauthorized. - Yeah. 219 00:23:55,967 --> 00:23:58,737 One, two, three, 220 00:23:59,737 --> 00:24:04,576 four, five, six, 221 00:24:05,242 --> 00:24:07,008 seven. 222 00:26:27,317 --> 00:26:29,153 Hmm. 223 00:27:32,115 --> 00:27:35,450 Not that long ago, the government of Pakistan put out this tender 224 00:27:35,452 --> 00:27:39,988 for proposals for a nationwide Internet filtering system. 225 00:27:39,990 --> 00:27:43,225 They wanted to solicit proposals from companies to build, 226 00:27:43,227 --> 00:27:46,096 effectively, the Great Firewall of Pakistan. 227 00:27:52,236 --> 00:27:55,903 Today if you visit Pakistan and you get online 228 00:27:55,905 --> 00:27:59,711 and you try to access YouTube, this is what you'll see, 229 00:28:00,744 --> 00:28:01,979 a blocked page like this. 230 00:28:06,951 --> 00:28:09,086 I'm in Islamabad, putting in a SIM card. 231 00:28:13,223 --> 00:28:16,091 First and foremost, I'm really excited to see Shahzad. 232 00:28:16,093 --> 00:28:20,394 I first met Shahzad and the organization Bytes for All, 233 00:28:20,396 --> 00:28:21,796 eight years ago, I think? 234 00:28:21,798 --> 00:28:24,499 And he's been involved, in one way or another, 235 00:28:24,501 --> 00:28:26,370 in Citizen Lab research ever since. 236 00:28:39,517 --> 00:28:42,721 - Hi, Shahzad. - Hello! 237 00:28:44,188 --> 00:28:47,922 - So great to see you. - Here we are. Here we are. 238 00:28:49,859 --> 00:28:52,059 Bytes for All does what they do, 239 00:28:52,061 --> 00:28:56,265 fight for Internet rights and advocacy-based approach to Internet freedom 240 00:28:56,267 --> 00:28:58,901 under extreme duress. 241 00:28:58,903 --> 00:29:01,370 So they're operating in a country that, 242 00:29:01,372 --> 00:29:04,238 specifically around media and free expression, 243 00:29:04,240 --> 00:29:06,440 has got to be one of the worst places in the world. 244 00:29:06,442 --> 00:29:10,112 Uh, journalists are routinely kidnapped, murdered, 245 00:29:10,114 --> 00:29:12,948 uh, offices firebombed, et cetera, 246 00:29:12,950 --> 00:29:15,120 and they've experienced all of that. 247 00:29:16,487 --> 00:29:19,888 Death threats, staff members kidnapped, 248 00:29:19,890 --> 00:29:23,892 his own son beat up and thrown to the side of the road 249 00:29:23,894 --> 00:29:26,964 as a warning to Shahzad not to do what he's doing. 250 00:29:31,035 --> 00:29:33,367 In my opinion, 251 00:29:33,369 --> 00:29:37,775 Internet has opened up so many opportunities... 252 00:29:38,909 --> 00:29:40,508 for the people to express, 253 00:29:40,510 --> 00:29:44,947 and that is the sole reason that we are fighting for open Internet. 254 00:29:44,949 --> 00:29:48,482 They lost their public spaces. 255 00:29:48,484 --> 00:29:52,321 They lost their ability to go out freely. 256 00:29:52,323 --> 00:29:56,290 So, as they are putting controls and curbs on physical spaces, 257 00:29:56,292 --> 00:30:00,295 they are doing exactly the same in online spaces as well. 258 00:30:00,297 --> 00:30:04,232 So precisely the reason we are standing out there to reclaim those spaces. 259 00:30:04,234 --> 00:30:05,933 And we have to at some point, 260 00:30:05,935 --> 00:30:07,504 and we'll continue to do that. 261 00:30:08,939 --> 00:30:11,472 Oh, my God. 262 00:30:11,474 --> 00:30:15,110 The government has the ability to ban specific pages. 263 00:30:17,181 --> 00:30:19,448 You ban all of Facebook, businesses are suffering, 264 00:30:19,450 --> 00:30:20,548 people communicate. 265 00:30:20,550 --> 00:30:23,384 I mean, you can laugh and joke and say, 266 00:30:23,386 --> 00:30:26,153 "For a few days people won't play FarmVille," but it's not about that. 267 00:30:26,155 --> 00:30:29,490 It's about your fundamental rights being snatched from you 268 00:30:29,492 --> 00:30:33,061 and no government, in my opinion, should have the ability to do that. 269 00:30:33,063 --> 00:30:34,462 Right. 270 00:30:34,464 --> 00:30:37,599 Not only that, they banned Wikipedia for a little while. 271 00:30:37,601 --> 00:30:39,167 - Yes, mm-hmm. - YouTube. 272 00:30:39,169 --> 00:30:42,470 Uh, about several thousand websites were affected. 273 00:30:42,472 --> 00:30:46,107 I think the Internet is this vast, unregulated, 274 00:30:46,109 --> 00:30:48,610 wonderful, democratizing space 275 00:30:48,612 --> 00:30:51,380 and no matter what anyone does, people will find a way. 276 00:31:43,534 --> 00:31:46,701 Hi, I'm Sabeen Mahmud, and I'm the director of Peace Nation, 277 00:31:46,703 --> 00:31:48,737 a nonprofit organization. 278 00:31:48,739 --> 00:31:51,739 I've always believed that technology is always the driver of change, 279 00:31:51,741 --> 00:31:55,009 not business, not governments, but technology. 280 00:31:55,011 --> 00:32:00,082 And gender-based violence has always existed 281 00:32:00,084 --> 00:32:03,584 but with the advent of the Internet and the number of social networking tools, 282 00:32:03,586 --> 00:32:06,555 I think it's a great mobilization platform. 283 00:32:25,709 --> 00:32:28,477 Sabeen Mahmud was leaving a Karachi restaurant 284 00:32:28,479 --> 00:32:31,212 when the gunman attacked her in her car. 285 00:32:31,214 --> 00:32:34,382 Her mother who was also accompanying her was wounded 286 00:32:34,384 --> 00:32:36,551 and now is in a critical condition. 287 00:32:36,553 --> 00:32:40,055 Mahmud was taken to a hospital where she was pronounced dead. 288 00:32:56,406 --> 00:33:01,543 When she spoke in physical spaces, nothing happened. 289 00:33:01,545 --> 00:33:05,313 When she was carrying on her campaign, she was not targeted. 290 00:33:05,315 --> 00:33:07,382 People were amused or they ignored her, 291 00:33:07,384 --> 00:33:09,584 or they just walked past. 292 00:33:09,586 --> 00:33:14,088 But when this whole, sort of, campaign 293 00:33:14,090 --> 00:33:16,357 hit the Internet and the social media, 294 00:33:16,359 --> 00:33:18,526 that's when the lynch mobs gathered. 295 00:33:18,528 --> 00:33:21,196 And one of the reasons I find is, 296 00:33:21,198 --> 00:33:27,235 that speech in a physical space lasts only as long as you're speaking. 297 00:33:27,237 --> 00:33:33,574 But once it is uploaded onto the Internet on any platform, it is there forever. 298 00:33:33,576 --> 00:33:38,212 And then your attackers or, you know, whoever opposes you, 299 00:33:38,214 --> 00:33:40,449 they gather, and then they spread it further 300 00:33:40,451 --> 00:33:43,785 and more and more people join that group 301 00:33:43,787 --> 00:33:47,424 of people who are attacking and it takes on a life of its own. 302 00:34:07,376 --> 00:34:10,244 We're going through a demographic revolution. 303 00:34:10,246 --> 00:34:15,182 The center of gravity of cyberspace is shifting right before our eyes. 304 00:34:15,184 --> 00:34:18,552 From the north and the west of the planet, where it was invented, 305 00:34:18,554 --> 00:34:21,188 to the South and the East. 306 00:34:21,190 --> 00:34:25,360 The vast majority of Internet users today and into the future 307 00:34:25,362 --> 00:34:27,394 are coming from the developing world, 308 00:34:27,396 --> 00:34:30,699 for whom these technologies are empowering. 309 00:34:30,701 --> 00:34:35,737 What should we expect then from these next billion digital users 310 00:34:35,739 --> 00:34:38,539 as they come online in the post-Snowden era? 311 00:36:47,704 --> 00:36:50,371 Once we started with Midia Ninja, 312 00:36:50,373 --> 00:36:54,309 and we went to the streets and tried to do live streaming. 313 00:36:54,311 --> 00:36:58,012 There was a mobile station with an electric generator 314 00:36:58,014 --> 00:37:00,481 using gasoline, you know, 315 00:37:00,483 --> 00:37:05,487 a 4G modem, a laptop, a camera, a video switcher and... 316 00:37:26,576 --> 00:37:29,311 It was good in the first two or three times 317 00:37:29,313 --> 00:37:31,646 in more calm demonstrations. 318 00:37:31,648 --> 00:37:34,048 I remember there was a discussion, and then Carioca said, 319 00:37:34,050 --> 00:37:37,786 "No, I found an app. 320 00:37:37,788 --> 00:37:40,688 Its name is TwitCasting and maybe we can try it." 321 00:37:42,893 --> 00:37:48,565 It was a Japanese free app used by teenagers to hang out, you know. 322 00:38:19,829 --> 00:38:23,731 Looking at Brazil, this is one of those cases where you have 323 00:38:23,733 --> 00:38:25,900 a sporting event, in this case, 324 00:38:25,902 --> 00:38:31,005 which triggers all sorts of extra concern around security 325 00:38:31,007 --> 00:38:34,376 and the control of information, much of it legitimate. 326 00:38:34,378 --> 00:38:39,046 But what often happens is that the layering of surveillance, 327 00:38:39,048 --> 00:38:42,450 extra-legal measures that happens leading up to 328 00:38:42,452 --> 00:38:45,619 and during these events doesn't just disappear. 329 00:38:45,621 --> 00:38:47,988 It becomes part of the permanent architecture. 330 00:39:16,119 --> 00:39:19,554 Mobile phones are prevalent. Everyone has one in their hands. 331 00:39:19,556 --> 00:39:22,724 And the police now use a technique 332 00:39:22,726 --> 00:39:27,662 where they set up fake cell phone towers that captures everyone within the vicinity 333 00:39:27,664 --> 00:39:31,800 and gathers up identifying information that's emitted by the cell phones, 334 00:39:31,802 --> 00:39:33,901 which they then use to track people 335 00:39:33,903 --> 00:39:36,170 and associate them with each other 336 00:39:36,172 --> 00:39:39,740 and being at specific physical events like a protest 337 00:39:39,742 --> 00:39:42,142 and the government can go back in time 338 00:39:42,144 --> 00:39:47,081 and re-create every facet of your life on that particular day and hour. 339 00:39:47,083 --> 00:39:49,516 With whom you were communicating. 340 00:39:49,518 --> 00:39:52,454 Not only what you're broadcasting but what you're saying privately 341 00:39:52,456 --> 00:39:55,059 and use this to incriminate you down the road. 342 00:41:18,541 --> 00:41:21,141 People realize there's some hidden mechanism of power 343 00:41:21,143 --> 00:41:23,778 going on through surveillance. 344 00:41:23,780 --> 00:41:27,615 And you begin to suspect, maybe, this device you can't trust. 345 00:41:27,617 --> 00:41:30,784 Maybe the state's in here or it's in my mobile phone or... 346 00:41:30,786 --> 00:41:33,253 And as that kind of seeps out there, 347 00:41:33,255 --> 00:41:36,891 people become much more unwilling to take risks. 348 00:41:36,893 --> 00:41:37,992 You know, even in our own work, 349 00:41:37,994 --> 00:41:41,329 we're much more cautious about what we say over e-mail, 350 00:41:41,331 --> 00:41:43,764 worried that somebody's listening and so on. 351 00:41:43,766 --> 00:41:47,334 It's like sand in the machinery. It kind of slows things down 352 00:41:47,336 --> 00:41:50,637 and everything becomes much more complicated, 353 00:41:50,639 --> 00:41:53,273 just to communicate basic instructions. 354 00:41:53,275 --> 00:41:55,712 You're like, "Oh, first I have to encrypt it." 355 00:41:57,313 --> 00:42:00,748 All these technologies too, cryptography things, 356 00:42:00,750 --> 00:42:02,684 they might be getting cheap, 357 00:42:02,686 --> 00:42:07,822 but if we consider in terms of time, they are expensive. 358 00:42:07,824 --> 00:42:11,325 You know, people are being murdered every day in the favelas. 359 00:42:11,327 --> 00:42:14,362 The military police are still running. 360 00:42:14,364 --> 00:42:17,898 So it's complicated now to stop the machines 361 00:42:17,900 --> 00:42:21,070 and adapt our system to a more safe mode. 362 00:46:40,996 --> 00:46:43,898 So at the same time that you have so many people 363 00:46:43,900 --> 00:46:48,369 able to communicate to a global audience at an instant, 364 00:46:48,371 --> 00:46:53,074 governments, in ways that they weren't 20 years ago, 365 00:46:53,076 --> 00:46:58,246 are really ramping up information controls because they see... 366 00:46:58,248 --> 00:47:01,148 And when we say "governments," we're really talking about entrenched powers, 367 00:47:01,150 --> 00:47:06,153 institutionalized, uh, you know, forms of capitalism in the state 368 00:47:06,155 --> 00:47:09,123 that see, you know, 369 00:47:09,125 --> 00:47:13,494 this type of unpredictable citizen activism as a threat to their interests 370 00:47:13,496 --> 00:47:15,932 and are developing ways to counter it. 371 00:47:18,300 --> 00:47:20,369 You have new challenges today. 372 00:47:22,204 --> 00:47:25,942 Sensitive data is transmitted over encrypted channels. 373 00:47:26,976 --> 00:47:29,577 You need more. 374 00:47:29,579 --> 00:47:32,382 You want to look through your target's eyes. 375 00:47:34,650 --> 00:47:36,619 You have to hack your target. 376 00:47:42,592 --> 00:47:47,030 You have to overcome encryption and capture relevant data. 377 00:47:48,630 --> 00:47:51,467 Being stealth and untraceable. 378 00:47:54,938 --> 00:47:56,940 Exactly what we do. 379 00:48:02,311 --> 00:48:07,148 The vendors of these products and services market them to governments, 380 00:48:07,150 --> 00:48:09,083 usually at trade shows 381 00:48:09,085 --> 00:48:13,153 that are only open to accredited law enforcement and intelligence agencies. 382 00:48:13,155 --> 00:48:16,691 Actually, I've got a big binder that I can... 383 00:48:16,693 --> 00:48:19,526 So, if you ignore the bag, actually which... 384 00:48:21,063 --> 00:48:25,231 someone, uh, deposited these in as a gift to me, 385 00:48:25,233 --> 00:48:29,202 but I think was hoping to disguise it in the kindergarten bag. 386 00:48:29,204 --> 00:48:35,108 These are brochures from the type of trade shows that we're talking about, 387 00:48:35,110 --> 00:48:39,280 products and services that allow cell phone detection, 388 00:48:39,282 --> 00:48:41,550 uh, insertion of malware... 389 00:48:43,753 --> 00:48:47,021 tracking, social media monitoring. 390 00:48:47,023 --> 00:48:50,023 In many ways, the way to think about this market 391 00:48:50,025 --> 00:48:53,526 is that it's the commercialization of cyber crime. 392 00:48:53,528 --> 00:48:57,430 You trick somebody into installing a software program 393 00:48:57,432 --> 00:48:59,532 that contains malicious code 394 00:48:59,534 --> 00:49:02,168 that exploits some vulnerability in the system, 395 00:49:02,170 --> 00:49:06,206 which then allows the attacker to do anything they want. 396 00:49:06,208 --> 00:49:09,577 Turn on the webcam, listen in on the microphone, 397 00:49:09,579 --> 00:49:13,780 record keystrokes, record the location, the movement. 398 00:49:13,782 --> 00:49:16,383 It operates without much accountability, 399 00:49:16,385 --> 00:49:20,021 certainly no corporate social responsibility, 400 00:49:20,023 --> 00:49:23,124 ripe for abuse in a place like Sudan or Ethiopia. 401 00:49:23,126 --> 00:49:25,525 We've seen in one case after another, 402 00:49:25,527 --> 00:49:28,628 how this ends up being used to target civil society. 403 00:49:28,630 --> 00:49:29,632 Aha. 404 00:49:31,300 --> 00:49:32,800 Gamma Group. 405 00:49:32,802 --> 00:49:35,769 Maker of the notorious FinFisher spyware. 406 00:52:18,668 --> 00:52:23,570 The attacker has to socially engineer or convince the target 407 00:52:23,572 --> 00:52:28,409 to open a file or to, you know, click through some security warning, 408 00:52:28,411 --> 00:52:30,811 um, in order to become infected. 409 00:52:30,813 --> 00:52:36,217 We had found a document that had pictures of Ethiopian opposition leaders in it, 410 00:52:36,219 --> 00:52:38,619 and it looked like it was targeted and designed to appeal 411 00:52:38,621 --> 00:52:40,920 to members of the Ethiopian diaspora. 412 00:52:40,922 --> 00:52:43,757 Uh, but in fact, the file was cleverly disguised 413 00:52:43,759 --> 00:52:46,526 to look like a document that's actually a computer program, 414 00:52:46,528 --> 00:52:48,262 an executable file. 415 00:52:48,264 --> 00:52:50,496 So when you run this, it will install software on your computer 416 00:52:50,498 --> 00:52:53,233 even though, you know, they changed the icon and everything 417 00:52:53,235 --> 00:52:56,369 to make it look like this is a document or a picture. 418 00:52:56,371 --> 00:52:57,540 This is actually a program. 419 00:53:31,773 --> 00:53:34,941 I was able to look at the memory of an infected computer. 420 00:53:34,943 --> 00:53:37,878 In other words, what's going on inside the computer when it's infected. 421 00:53:37,880 --> 00:53:42,316 And I was able to identify several interesting artifacts in the memory, 422 00:53:42,318 --> 00:53:45,519 including a bunch of strings that said "FinFisher," "FinSpy," 423 00:53:45,521 --> 00:53:47,824 very clearly attributing this to the company. 424 00:54:23,793 --> 00:54:27,728 You don't have to be the NSA to get inside somebody's computer. 425 00:54:27,730 --> 00:54:31,065 Um, instead you can exploit their curiosity, 426 00:54:31,067 --> 00:54:34,934 their, um, need to communicate. 427 00:54:34,936 --> 00:54:38,572 And of course, journalists, at the very heart of what they do, 428 00:54:38,574 --> 00:54:42,543 is engage in communication with a lot of people 429 00:54:42,545 --> 00:54:45,445 and a lot of people that they don't know and trust necessarily. 430 00:54:45,447 --> 00:54:48,816 Because they're engaged in outreach and communicating constantly with sources. 431 00:55:02,398 --> 00:55:06,133 Fifty years ago, nobody would have known what happened in Syria. 432 00:55:06,135 --> 00:55:10,436 But in 2011, when it started, everybody had Facebook. 433 00:55:10,438 --> 00:55:15,978 Everybody has e-mails and everybody has WhatsApp and Viber. 434 00:55:17,413 --> 00:55:19,380 So you just can't stop people 435 00:55:19,382 --> 00:55:22,048 from telling what is happening to them. 436 00:55:22,050 --> 00:55:25,052 So when they besieged Daraa at the beginning, 437 00:55:25,054 --> 00:55:29,789 they shut down communication, Internet, land lines and even electricity. 438 00:55:29,791 --> 00:55:34,026 But they did not know that in the 21st century, people have their ways. 439 00:55:34,028 --> 00:55:37,164 People were charging their mobiles from their cars or generators, 440 00:55:37,166 --> 00:55:40,767 hand generators, um, manual generators. 441 00:55:40,769 --> 00:55:44,737 And people were using satellite connections. 442 00:55:44,739 --> 00:55:49,543 You don't need to use the country, uh, Internet to be connected to the Internet. 443 00:55:49,545 --> 00:55:50,943 You can use anything. 444 00:55:50,945 --> 00:55:54,981 And they were able to tell what was happening to them. 445 00:55:54,983 --> 00:56:00,720 Um, so the story got around. 446 00:56:09,063 --> 00:56:12,965 A few years ago many of us celebrated the Arab Spring 447 00:56:12,967 --> 00:56:16,103 as the paradigm of what these technologies could do. 448 00:56:16,105 --> 00:56:19,472 Remember we called it at the time "liberation technologies." 449 00:56:19,474 --> 00:56:21,641 They would bring about the end of authoritarian rule. 450 00:56:29,518 --> 00:56:35,222 Unfortunately, Syria has become the Arab Spring's dark aftermath. 451 00:56:42,465 --> 00:56:45,699 As groups sympathetic to the Assad regime 452 00:56:45,701 --> 00:56:50,003 have employed off-the-shelf malware crime kits to infiltrate social networks, 453 00:56:50,005 --> 00:56:53,539 arrest, torture and murder opposition groups 454 00:56:53,541 --> 00:56:55,511 and even target their air strikes. 455 00:57:24,639 --> 00:57:28,275 From the beginning, we believed that the camera is the most powerful weapon, 456 00:57:28,277 --> 00:57:30,811 and it was actually the only weapon we have 457 00:57:30,813 --> 00:57:32,782 to deliver our own message to the whole world. 458 00:57:40,822 --> 00:57:42,655 This is interesting. 459 00:57:42,657 --> 00:57:44,258 Baraa? 460 00:57:48,931 --> 00:57:53,833 It's a pleasure for me to introduce one of my best friends, 461 00:57:53,835 --> 00:57:59,273 Mr. Baraa, he's one of the most activist people inside Syria. 462 00:57:59,275 --> 00:58:02,642 He came a few days ago 'cause he has... 463 00:58:02,644 --> 00:58:07,981 He has... many broken bones on his body. 464 00:58:10,552 --> 00:58:13,655 He was there and covered the battle in Daraa City. 465 00:58:17,059 --> 00:58:20,059 And in the afternoon, they get a tank shell. 466 00:58:22,931 --> 00:58:26,635 He was with his friend, whom has this camera. 467 00:58:28,036 --> 00:58:30,170 And that good guy, you know, he gets killed 468 00:58:30,172 --> 00:58:33,706 by one tank shell from the regime's side. 469 00:58:36,644 --> 00:58:38,244 This video, you will see now, 470 00:58:38,246 --> 00:58:42,751 a remote control car and it exploded, a huge explosion. 471 00:58:44,286 --> 00:58:45,954 It was filmed by this camera. 472 00:58:50,726 --> 00:58:51,791 After that, 473 00:58:51,793 --> 00:58:53,994 the rocket launchers 474 00:58:53,996 --> 00:58:55,965 started to hit the place from the regime's side. 475 00:58:57,199 --> 00:59:01,001 So our activist, this media guy, 476 00:59:01,003 --> 00:59:04,304 he gets killed in here in this exact... this place. 477 00:59:04,306 --> 00:59:07,139 Now here. He was standing here. 478 00:59:07,141 --> 00:59:10,010 And people found the camera with him. 479 00:59:10,012 --> 00:59:12,615 We took out the memory card, and we post this... 480 00:59:13,815 --> 00:59:16,218 as, you know, in memory of Hussain. 481 00:59:31,666 --> 00:59:35,769 So now, Mr. Baraa here, just a few days just to heal. 482 00:59:35,771 --> 00:59:40,173 He paid a visit to some hospitals to check out himself, 483 00:59:40,175 --> 00:59:44,013 then he will go back into Syria to keep working. 484 00:59:45,880 --> 00:59:48,648 There is a war on Facebook. 485 00:59:48,650 --> 00:59:53,787 Uh, every side is using Facebook to promote themselves. 486 01:00:05,668 --> 01:00:08,901 The other way around, the regime will say, 487 01:00:08,903 --> 01:00:12,838 "We will occupy this area. We will take over this area." 488 01:00:12,840 --> 01:00:15,941 Then the FSA would leave because they're afraid of bombardment. 489 01:00:15,943 --> 01:00:16,980 It's just a game. 490 01:00:18,047 --> 01:00:19,248 Facebook is a game. 491 01:00:28,757 --> 01:00:30,092 It was just a silly joke I made. 492 01:00:31,427 --> 01:00:35,195 I didn't hurt anybody. I didn't insult anyone. 493 01:00:35,197 --> 01:00:39,231 It was not political. It was not racist. 494 01:00:39,233 --> 01:00:42,168 There is nothing that they could hold against me 495 01:00:42,170 --> 01:00:44,106 with a thing that I wrote on Facebook. 496 01:00:46,108 --> 01:00:49,879 But still, at a time of war... 497 01:00:52,047 --> 01:00:53,115 people get crazy. 498 01:01:01,724 --> 01:01:06,092 They did not drag me in the street or kidnap me. 499 01:01:06,094 --> 01:01:09,262 They just asked me to come to ask me a few questions. 500 01:01:09,264 --> 01:01:12,164 This is what they said, so I signed the paper that I'm coming. 501 01:01:12,166 --> 01:01:18,273 I went the next morning at 11:30, to the detention center. 502 01:01:19,942 --> 01:01:22,008 The security guy came to me. 503 01:01:22,010 --> 01:01:25,445 He's like... He's like half of my height. 504 01:01:25,447 --> 01:01:27,847 He blindfolded me, and I was like, 505 01:01:27,849 --> 01:01:31,184 I was okay with that because I thought, it's some... 506 01:01:31,186 --> 01:01:37,023 it's confidential secrets of the country that they don't want me to see. 507 01:01:37,025 --> 01:01:41,764 And then I was presented to the detective or the interrogator. 508 01:01:42,431 --> 01:01:43,432 I never saw him. 509 01:01:46,434 --> 01:01:50,970 He told me, "You're a computer engineer. Please be seated." 510 01:01:50,972 --> 01:01:55,775 And I sat next to him and he started reading all my Facebook posts. 511 01:01:55,777 --> 01:01:56,812 I was like, "Oh." 512 01:02:08,489 --> 01:02:10,891 One of the posts that I wrote was, 513 01:02:10,893 --> 01:02:13,959 "No praying, no fasting until the regime falls," 514 01:02:13,961 --> 01:02:15,764 which was actually making fun of both sides. 515 01:02:16,498 --> 01:02:18,063 And I laughed and he's like, 516 01:02:18,065 --> 01:02:20,869 "I'm not kidding with you. I'm not joking with you." 517 01:02:24,172 --> 01:02:26,438 He kicked me on my chest 518 01:02:26,440 --> 01:02:31,577 and then he requested the same short guy, 519 01:02:31,579 --> 01:02:33,512 because he was there in the room, 520 01:02:33,514 --> 01:02:35,514 to bring something called the "flying carpet," 521 01:02:35,516 --> 01:02:37,284 which is a torturing machine. 522 01:02:37,286 --> 01:02:42,054 It's a wooden board, like the door, 523 01:02:42,056 --> 01:02:45,127 but it has joints in the middle that can flip. 524 01:02:46,027 --> 01:02:50,162 And I had to lay on it. 525 01:02:50,164 --> 01:02:54,501 They tied my wrists and they tied me from the middle, they tied my legs. 526 01:02:54,503 --> 01:02:59,305 And they just closed it so my knees touched my chest. 527 01:02:59,307 --> 01:03:01,608 He took off my shoes and my socks 528 01:03:01,610 --> 01:03:07,250 and started beating me with a metal, uh, with a metal whip. 529 01:03:09,885 --> 01:03:13,856 The pain is unbelievable. 530 01:03:14,889 --> 01:03:16,356 You just can't take it anymore. 531 01:03:16,358 --> 01:03:20,363 You just can't endure this amount of agony. 532 01:03:28,971 --> 01:03:32,304 What we saw in Syria was a lot of use of, say, 533 01:03:32,306 --> 01:03:34,541 off-the-shelf remote access tools. 534 01:03:34,543 --> 01:03:38,211 So this is sort of software that you can get from underground message boards 535 01:03:38,213 --> 01:03:40,579 or maybe purchase for not so much money. 536 01:03:40,581 --> 01:03:44,617 Maybe $200-300 that give you the ability 537 01:03:44,619 --> 01:03:47,554 to record someone's keystrokes, read their e-mails, 538 01:03:47,556 --> 01:03:50,956 even look at them through their webcam. 539 01:03:50,958 --> 01:03:53,392 Record via the computer's microphone, 540 01:03:53,394 --> 01:03:56,231 conversations that are being had around the target's computer. 541 01:03:57,465 --> 01:03:59,999 Frequently what you would see 542 01:04:00,001 --> 01:04:02,668 is it would be bundled with some type of lured document 543 01:04:02,670 --> 01:04:07,072 which showed a deep understanding 544 01:04:07,074 --> 01:04:09,943 of the psychology of the people they were trying to target. 545 01:04:09,945 --> 01:04:14,680 For instance, one of the documents that was sent out that I keenly recall 546 01:04:14,682 --> 01:04:17,182 was a list. 547 01:04:17,184 --> 01:04:23,188 A purported list of insurgents identified by the Syrian government. 548 01:04:23,190 --> 01:04:28,193 So of course what happened was that this was promptly passed around 549 01:04:28,195 --> 01:04:31,298 to all sorts of very interesting groups in Syria 550 01:04:31,300 --> 01:04:34,300 because everyone wanted to know if they were on this list or not. 551 01:04:34,302 --> 01:04:40,106 So the actual spyware payload itself wasn't particularly sophisticated, 552 01:04:40,108 --> 01:04:43,175 but the social... 553 01:04:43,177 --> 01:04:46,479 the social and social engineering side of that operation, 554 01:04:46,481 --> 01:04:48,551 um, was quite smart. 555 01:04:55,023 --> 01:04:58,494 Internet entered almost all countries in the region 556 01:04:59,527 --> 01:05:01,029 before it entered Syria. 557 01:05:02,230 --> 01:05:03,229 Yes. 558 01:05:03,231 --> 01:05:05,565 Government in Syria, 559 01:05:05,567 --> 01:05:08,068 we are not as developed as Canada, for example, 560 01:05:08,070 --> 01:05:10,103 or not as developed as United States. 561 01:05:10,105 --> 01:05:13,206 In Canada they can monitor people and control people 562 01:05:13,208 --> 01:05:16,075 and spy people in a very intelligent way. 563 01:05:16,077 --> 01:05:18,514 And even they don't feel that they are... 564 01:05:21,382 --> 01:05:22,715 spied on. 565 01:05:22,717 --> 01:05:27,556 But in Syria, of course you go to old ways. 566 01:05:34,329 --> 01:05:37,229 They untie me and then I was... 567 01:05:37,231 --> 01:05:39,999 and then he asked me to sit next to him, and he said, 568 01:05:40,001 --> 01:05:41,003 "Let's start talking." 569 01:05:42,704 --> 01:05:46,271 And I told him, "I don't want to talk to you anymore." 570 01:05:46,273 --> 01:05:52,612 He said, "I want you to admit you work with the Free Syrian Electronic Army." 571 01:05:52,614 --> 01:05:55,248 I was like, "I don't know what that is." 572 01:05:55,250 --> 01:05:58,554 He said, "You like their page. You like their page on Facebook." 573 01:06:00,021 --> 01:06:02,021 I told him, "I like their page on Facebook, 574 01:06:02,023 --> 01:06:05,124 but there are too many pages on Facebook that you can like. 575 01:06:05,126 --> 01:06:07,563 I also like Assad's page on Facebook." 576 01:06:09,231 --> 01:06:11,664 Well, that did not convince him. 577 01:06:11,666 --> 01:06:16,802 So his boss came and he told him, "What is going on?" 578 01:06:16,804 --> 01:06:21,307 He told him, "This is the Facebook guy, and he's not cooperating." 579 01:06:21,309 --> 01:06:25,612 So then his boss told him to, "Send him down to the basement, 580 01:06:25,614 --> 01:06:29,615 peel his skin off and just remind me of him after a month." 581 01:06:29,617 --> 01:06:32,284 And I was like, "Can we go back to the flying carpet?" 582 01:06:35,623 --> 01:06:37,523 I stayed there for almost a month, 583 01:06:37,525 --> 01:06:41,096 and then I was released with a presidential amnesty. 584 01:06:43,197 --> 01:06:46,099 So I went in a taxi, 585 01:06:46,101 --> 01:06:50,235 covered with dust, dirt, shit and blood, 586 01:06:50,237 --> 01:06:53,639 all over my face, my clothes. 587 01:06:53,641 --> 01:06:57,776 And then the taxi driver felt pity for me, and he gave me a cigarette. 588 01:06:57,778 --> 01:07:00,048 I remember that was the first time I cried. 589 01:07:03,184 --> 01:07:07,287 And I went to my flat in Latakia where I used to study, 590 01:07:07,289 --> 01:07:09,158 and my roommates were shocked to see me alive. 591 01:07:10,791 --> 01:07:14,764 And then, like, two weeks after that I fled the country. 592 01:07:16,197 --> 01:07:17,697 I came to Jordan. 593 01:07:17,699 --> 01:07:18,768 I am a journalist now. 594 01:07:32,246 --> 01:07:35,782 With Syria, a lot of the bad things that are happening 595 01:07:35,784 --> 01:07:39,151 are happening to people who don't look like Westerners. 596 01:07:39,153 --> 01:07:42,722 The bad things happening to these people through technology, 597 01:07:42,724 --> 01:07:46,191 through the risks inherent in technology, 598 01:07:46,193 --> 01:07:49,295 are not different than the kinds of risks that we may face, 599 01:07:49,297 --> 01:07:51,530 um, although they look different. 600 01:07:51,532 --> 01:07:52,831 We see in the news almost every day, 601 01:07:52,833 --> 01:07:56,568 a report of a breach, some kind of a large hack. 602 01:07:56,570 --> 01:07:58,905 Data being exploited somewhere. 603 01:07:58,907 --> 01:08:01,773 It's the same problem, but in Syria, it looks very different 604 01:08:01,775 --> 01:08:04,510 and because there are dark-skinned people, 605 01:08:04,512 --> 01:08:07,246 uh, and there are guns and a foreign language, 606 01:08:07,248 --> 01:08:10,249 it feels, I think to many, exotic and different, 607 01:08:10,251 --> 01:08:11,717 and it couldn't happen here. 608 01:08:11,719 --> 01:08:14,354 And I think, in fact, what you're seeing in Syria 609 01:08:14,356 --> 01:08:17,357 is this is what happens when the risks get higher 610 01:08:17,359 --> 01:08:18,828 but the technology is the same. 611 01:08:20,328 --> 01:08:21,664 They're using the same Facebook that we are. 612 01:11:08,529 --> 01:11:11,397 What is this? This is surreal. 613 01:12:51,666 --> 01:12:54,470 Lots of people were there, by 7:00 in the night, 614 01:12:55,436 --> 01:12:57,803 and we were live. 615 01:13:02,644 --> 01:13:06,845 Suddenly a man came to Carioca, and he asked to interview him. 616 01:13:10,717 --> 01:13:14,986 And then the military police came to Carioca, searched his bag. 617 01:13:14,988 --> 01:13:19,558 And then they said he should be taken to jail 618 01:13:19,560 --> 01:13:23,862 as a preventive arrestment, to be searched and inquired. 619 01:13:29,470 --> 01:13:33,973 How this information was being virilized was really amazing. 620 01:13:33,975 --> 01:13:36,608 Like sharing, sharing, sharing, tweets, tweets, tweets, 621 01:13:36,610 --> 01:13:37,943 mention, mention, mention. 622 01:13:37,945 --> 01:13:39,711 "The Ninja is being arrested." 623 01:13:39,713 --> 01:13:42,113 And suddenly there was, like, a small crowd. 624 01:13:42,115 --> 01:13:44,483 Like 5,000 people. 625 01:13:44,485 --> 01:13:47,219 And all of them was screaming together, 626 01:15:18,246 --> 01:15:21,580 Then we posted this video from the mobile, like, real time, 627 01:15:21,582 --> 01:15:23,251 and it virilized very fast. 628 01:18:16,356 --> 01:18:19,825 The video was just getting bigger in the social media. 629 01:18:19,827 --> 01:18:21,794 Bruno Teles became a character. 630 01:18:50,858 --> 01:18:53,224 They said that Bruno was innocent, 631 01:18:53,226 --> 01:18:57,929 and they used Midia Ninja image. 632 01:18:57,931 --> 01:19:00,199 And they credited Midia Ninja. 633 01:19:00,201 --> 01:19:03,501 It was the first time that we were seeing 634 01:19:03,503 --> 01:19:08,107 Globo recognizing a free media collective 635 01:19:08,109 --> 01:19:12,544 as a legitimate player in the communication game. 636 01:19:12,546 --> 01:19:15,317 It was a next step. 637 01:19:46,314 --> 01:19:51,887 Oh, he's changing his shirt. 638 01:22:05,152 --> 01:22:10,188 Ninja! Ninja! Ninja! 639 01:22:29,275 --> 01:22:30,211 Ninja! 640 01:22:59,273 --> 01:23:02,775 I've always been a fan of the terms "hacking" and "hacktivism." 641 01:23:02,777 --> 01:23:04,410 Especially "hacktivism" 642 01:23:04,412 --> 01:23:07,812 which is the combination of hacking and political activism. 643 01:23:07,814 --> 01:23:12,651 And those combined are pretty powerful to me. 644 01:23:12,653 --> 01:23:17,425 It's about encouraging people not to accept technology at face value. 645 01:23:18,792 --> 01:23:20,659 We need to encourage people to think about 646 01:23:20,661 --> 01:23:23,594 what it is that surrounds them, 647 01:23:23,596 --> 01:23:26,065 to question authority 648 01:23:26,067 --> 01:23:30,235 in a sense of the authority being the technological environment around them 649 01:23:30,237 --> 01:23:35,607 and to realize that when you start pulling back the layers of all of this, 650 01:23:35,609 --> 01:23:37,809 that's where the exercise of power is. 651 01:23:37,811 --> 01:23:41,280 So if we want liberal democracy to flourish, 652 01:23:41,282 --> 01:23:44,282 we need people to start lifting back the layers 653 01:23:44,284 --> 01:23:45,653 and understanding what's going on. 654 01:24:01,301 --> 01:24:05,303 I think ultimately it comes down to understanding what your values are, 655 01:24:05,305 --> 01:24:07,772 because how do you develop your thoughts, right? 656 01:24:07,774 --> 01:24:09,842 How do you determine what it is that you truly believe? 657 01:24:09,844 --> 01:24:13,411 How do you determine what it is you really want to say, 658 01:24:13,413 --> 01:24:15,513 if you can't even keep notes safely? 659 01:24:15,515 --> 01:24:19,585 If you can't have some private space, some space for thought, 660 01:24:19,587 --> 01:24:22,454 some space to enjoy the product of your own intellect, 661 01:24:22,456 --> 01:24:24,857 to share that with people close to you who you trust. 662 01:24:24,859 --> 01:24:27,695 Whether they're family, whether they're colleagues, whether they're compatriots. 663 01:24:36,670 --> 01:24:42,241 One thing that I see a lot is, this idea of technology as a solution. 664 01:24:42,243 --> 01:24:44,776 It's a natural thing. Okay, technology is under threat. 665 01:24:44,778 --> 01:24:46,713 Let's find a technological solution. 666 01:24:48,282 --> 01:24:49,882 There are so many projects now 667 01:24:49,884 --> 01:24:53,818 around secure communications, platforms, chats, instant messaging. 668 01:24:53,820 --> 01:24:57,923 But it's only one component of a solution set. 669 01:24:57,925 --> 01:25:02,163 And I think often overlooked are the legal and political dimensions. 670 01:25:03,296 --> 01:25:04,428 If we're talking about 671 01:25:04,430 --> 01:25:06,565 protecting and preserving all of this, 672 01:25:06,567 --> 01:25:10,602 as a secure and open communication space, 673 01:25:10,604 --> 01:25:12,537 that means holding governments accountable. 674 01:25:12,539 --> 01:25:14,572 It means holding companies accountable. 675 01:25:14,574 --> 01:25:17,175 Putting in place rules and laws 676 01:25:17,177 --> 01:25:22,246 that ensures they can't do things that infringe on our freedoms and rights. 677 01:25:22,248 --> 01:25:25,384 That to me is, uh, 678 01:25:25,386 --> 01:25:29,423 such a critical foundation of a digital democracy today. 679 01:25:31,118 --> 01:25:36,118 Subtitles by explosiveskull 680 01:25:37,305 --> 01:25:43,477 Support us and become VIP member to remove all ads from www.OpenSubtitles.org 58792

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.