All language subtitles for Black.Code.2016.720p.WEB-DL.x264.AAC-eSc

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English Download
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian Download
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish Download
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:15,969 --> 00:00:20,969 Subtitles by explosiveskull 2 00:00:34,365 --> 00:00:37,467 We are going through the most profound change 3 00:00:37,469 --> 00:00:41,240 in communication technologies in all of human history right now. 4 00:00:45,643 --> 00:00:50,346 Printing press, radio, telegraph, television. All very important. 5 00:00:50,348 --> 00:00:54,217 But I believe we're going through the most transformative, 6 00:00:54,219 --> 00:00:57,488 purely on the basis of three technologies. 7 00:00:57,490 --> 00:01:00,527 Mobile, social media and cloud computing. 8 00:01:07,700 --> 00:01:10,434 They share one very important characteristic. 9 00:01:10,436 --> 00:01:14,237 And that's the amount of private information. 10 00:01:14,239 --> 00:01:17,773 Information that used to be in our desktops or filing cabinets, 11 00:01:17,775 --> 00:01:19,442 even in our heads, 12 00:01:19,444 --> 00:01:22,379 that we now entrust to third parties. 13 00:01:24,750 --> 00:01:28,552 Data that we are conscious of, and deliberate about, 14 00:01:28,554 --> 00:01:31,621 like the e-mails we send and the tweets we post. 15 00:01:31,623 --> 00:01:34,323 But it also includes a lot of information 16 00:01:34,325 --> 00:01:37,296 that we're completely, or mostly, unconscious about. 17 00:01:38,496 --> 00:01:40,531 So if you take my mobile phone, 18 00:01:40,533 --> 00:01:43,866 even when I'm not using it, it's emitting a pulse, 19 00:01:43,868 --> 00:01:47,704 trying to locate the nearest Wi-Fi router or cell phone exchange, 20 00:01:47,706 --> 00:01:50,576 and within that beacon is the make and model of the phone, 21 00:01:51,576 --> 00:01:53,377 the fact that it's my phone, 22 00:01:53,379 --> 00:01:56,413 because my name is attached to the operating system, 23 00:01:56,415 --> 00:01:59,383 and most importantly, the geolocation of the phone. 24 00:02:09,828 --> 00:02:12,762 We are leaving this digital exhaust 25 00:02:12,764 --> 00:02:17,733 that contains extraordinarily precise information about our lives, 26 00:02:17,735 --> 00:02:22,371 our social relationships reduced to trillions of data points 27 00:02:22,373 --> 00:02:27,244 that form now this new ethereal layer around the planet 28 00:02:27,246 --> 00:02:29,745 that's only growing in all directions. 29 00:02:34,620 --> 00:02:38,354 Capabilities are being put in the hands of policy makers, 30 00:02:38,356 --> 00:02:41,959 five years ago, they'd never imagine that they would have. 31 00:02:41,961 --> 00:02:45,798 This is where big data meets Big Brother. 32 00:03:07,286 --> 00:03:08,288 Should be here. 33 00:03:10,489 --> 00:03:12,489 It is kind of in a rock, I think. 34 00:03:12,491 --> 00:03:14,458 Yeah, the entrance is in a rock. 35 00:03:14,460 --> 00:03:16,459 Or a bunker. 36 00:03:16,461 --> 00:03:18,463 Oh, yeah, the bunker. It is down there! 37 00:03:21,699 --> 00:03:23,466 There is a bunker under here. 38 00:03:23,468 --> 00:03:26,870 - Yeah. - It is between 33 and 39. 39 00:03:26,872 --> 00:03:28,304 Right there. Look at that door. 40 00:03:28,306 --> 00:03:29,538 - Yeah. - Yeah, this is it. 41 00:03:29,540 --> 00:03:31,477 - Bahnhof. - Okay. 42 00:03:53,799 --> 00:03:55,701 Hey, I guess we just go in. 43 00:04:55,560 --> 00:05:00,062 Many people believe that you have this cloud services that are floating around. 44 00:05:00,064 --> 00:05:02,466 People think, "Okay, it's a cloud server." 45 00:05:02,468 --> 00:05:05,935 But this is the actual physical location of the Internet. 46 00:05:14,379 --> 00:05:17,714 It's a constant struggle to protect data. 47 00:05:22,120 --> 00:05:26,589 The Swedish Security Police wanted to install tools 48 00:05:26,591 --> 00:05:31,863 to automatically log in to our data and get out the information. 49 00:05:32,964 --> 00:05:35,065 So I invited them to our facility, 50 00:05:35,067 --> 00:05:37,466 and then I had a microphone 51 00:05:37,468 --> 00:05:42,675 which I was provided by the Swedish Public Service, national radio. 52 00:05:57,055 --> 00:06:00,423 I taped this conversation, and they were so angry. 53 00:06:00,425 --> 00:06:03,459 And they also wanted us to sign a paper 54 00:06:03,461 --> 00:06:06,863 where they said that we could not say anything about it. 55 00:06:06,865 --> 00:06:08,798 It should be total secrecy. 56 00:06:08,800 --> 00:06:13,202 They said, "If a terrorist attack happens, it's your fault." 57 00:06:28,052 --> 00:06:30,553 It's, like, a creepy feeling. 58 00:06:30,555 --> 00:06:34,057 Nobody can say that any facility is safe. 59 00:06:34,059 --> 00:06:38,998 There are always possibilities to go in and find data and take it out. 60 00:06:42,634 --> 00:06:46,101 People say that, "Oh, I don't have anything to hide. 61 00:06:46,103 --> 00:06:47,937 They can read my mail. I don't have anything." 62 00:06:47,939 --> 00:06:51,041 But it's not that which is this problem. 63 00:06:51,043 --> 00:06:55,611 The problem is, without secrecy, there can be no democracy. 64 00:06:55,613 --> 00:06:58,483 Without secrecy, there can be no market economy. 65 00:06:59,117 --> 00:07:00,750 Right. 66 00:07:00,752 --> 00:07:03,586 There is an obvious candidate for the Nobel Peace Prize. 67 00:07:03,588 --> 00:07:05,956 - Really? - And that is Edward Snowden. 68 00:07:05,958 --> 00:07:07,493 I mean, yeah. 69 00:07:21,273 --> 00:07:28,043 Does the public enjoy the same right to privacy that we have in the past? 70 00:07:28,045 --> 00:07:30,846 Are we still private citizens, 71 00:07:30,848 --> 00:07:34,584 and then public officials, where the government knows very little about us, 72 00:07:34,586 --> 00:07:35,985 but we know everything about them? 73 00:07:35,987 --> 00:07:39,055 Why are we, the public, becoming disempowered 74 00:07:39,057 --> 00:07:41,892 at the same time that governments around the world, 75 00:07:41,894 --> 00:07:47,130 corporations around the world, institutions around the world, 76 00:07:47,132 --> 00:07:52,067 are gaining greater and greater leverage over the range of our activities, 77 00:07:52,069 --> 00:07:54,206 their knowledge of what we do? 78 00:08:07,952 --> 00:08:10,120 The Citizen Lab is an unusual place. 79 00:08:13,257 --> 00:08:16,561 We're a research unit at the University of Toronto. 80 00:08:18,697 --> 00:08:22,231 We combine the skills of engineers, computer scientists 81 00:08:22,233 --> 00:08:24,034 with social scientists. 82 00:08:24,036 --> 00:08:26,769 We collaborate with people from all over the world 83 00:08:26,771 --> 00:08:28,971 to do the field research that we do. 84 00:08:28,973 --> 00:08:32,342 And we do this to advance research on global security, 85 00:08:32,344 --> 00:08:34,280 cyberspace and human rights. 86 00:08:37,149 --> 00:08:39,081 The world is a very dangerous place 87 00:08:39,083 --> 00:08:42,319 as we saw recently in... in tragic incidents in Paris, 88 00:08:42,321 --> 00:08:47,123 and you want to have security agencies be well adept at discerning 89 00:08:47,125 --> 00:08:49,658 what those threats are over our horizon. 90 00:08:49,660 --> 00:08:54,964 But is it okay that the government sets up a giant digital X-ray machine 91 00:08:54,966 --> 00:08:56,833 over everything that we do? 92 00:08:56,835 --> 00:08:59,035 Because that's effectively where we're headed right now. 93 00:09:02,374 --> 00:09:05,709 We've been a kind of digital early warning system, 94 00:09:05,711 --> 00:09:07,844 scanning the horizon. 95 00:09:07,846 --> 00:09:10,814 And what we've seen, frankly, has been really disturbing. 96 00:12:33,485 --> 00:12:37,320 Tibetans are watched from every angle and from every corner. 97 00:12:37,322 --> 00:12:41,156 It's in their homes, it's in their offices, it's in the streets. 98 00:12:41,158 --> 00:12:43,126 In Tibet, certainly in central Tibet 99 00:12:43,128 --> 00:12:45,527 and around the capital city of Lhasa, 100 00:12:45,529 --> 00:12:49,132 Chinese authorities, together with Chinese corporations, 101 00:12:49,134 --> 00:12:51,300 telecommunications companies, 102 00:12:51,302 --> 00:12:56,071 they've integrated the ability to spy on people via their mobile phone, 103 00:12:56,073 --> 00:12:59,074 via the last communications they may have had over the Internet. 104 00:12:59,076 --> 00:13:02,280 Down to the closed circuit television camera on the streets. 105 00:13:03,948 --> 00:13:07,050 The Chinese so strictly control access to Tibet, 106 00:13:07,052 --> 00:13:09,017 it's just like a black hole 107 00:13:09,019 --> 00:13:12,254 for media, for independent observers, 108 00:13:12,256 --> 00:13:13,992 for international agencies, for anything. 109 00:13:44,188 --> 00:13:49,025 How I escaped is a secret. 110 00:14:07,645 --> 00:14:10,246 People are incredibly courageous. 111 00:14:10,248 --> 00:14:13,449 People inside Tibet will send out news and information. 112 00:14:13,451 --> 00:14:16,455 And they'll say, "I want this story to be told." 113 00:14:17,554 --> 00:14:19,055 They could be imprisoned. 114 00:14:19,057 --> 00:14:20,422 They could be tortured. 115 00:14:20,424 --> 00:14:22,124 Their family could pay the price. 116 00:14:23,394 --> 00:14:25,527 We on the outside have to decide 117 00:14:25,529 --> 00:14:31,199 how to walk this very, sort of, fine line between protecting people's security 118 00:14:31,201 --> 00:14:34,970 and honoring their wishes about getting news and information out. 119 00:14:34,972 --> 00:14:39,374 And we know for a fact, thanks to Citizen Lab's report, 120 00:14:39,376 --> 00:14:42,478 that we are being successfully targeted. 121 00:14:44,481 --> 00:14:49,118 A new report has been released from a group of digital detectives. 122 00:14:49,120 --> 00:14:53,089 From their computers in Toronto, they've tracked a high-tech spy ring 123 00:14:53,091 --> 00:14:54,360 that reaches around the world. 124 00:14:59,096 --> 00:15:00,262 For the past ten months, 125 00:15:00,264 --> 00:15:03,532 these computer experts have been working as cyber sleuths 126 00:15:03,534 --> 00:15:06,969 hot on the trail of a massive electronic spy network. 127 00:15:06,971 --> 00:15:11,273 They say it has taken control of nearly 1,300 high-level computers 128 00:15:11,275 --> 00:15:13,443 in more than 100 countries. 129 00:15:13,445 --> 00:15:17,079 A discovery that could have major political implications. 130 00:15:17,081 --> 00:15:19,581 They can extract any document they wanted. 131 00:15:19,583 --> 00:15:23,552 They could turn on web cameras, turn on audio devices, 132 00:15:23,554 --> 00:15:25,588 so that they could, in effect, use the computers 133 00:15:25,590 --> 00:15:27,623 as a listening device in the offices. 134 00:15:27,625 --> 00:15:30,359 The web of intrigue started with the Dalai Lama 135 00:15:30,361 --> 00:15:32,163 who thought his computer had been hacked. 136 00:15:36,368 --> 00:15:41,170 Up until about 2007 or 2008, I'd never really heard of malware. 137 00:15:41,172 --> 00:15:43,506 You know, I'd heard of viruses, obviously, 138 00:15:43,508 --> 00:15:46,475 but I hadn't really heard about targeted malware attacks 139 00:15:46,477 --> 00:15:48,176 affecting the human rights community. 140 00:15:53,551 --> 00:15:57,052 First time I heard about it was in the context of the Tibetans. 141 00:15:57,054 --> 00:16:01,523 Gradually we started piecing together, they are under surveillance. 142 00:16:01,525 --> 00:16:05,661 The surveillance comes from groups within China. 143 00:16:05,663 --> 00:16:10,733 They're using malicious software and socially-engineered e-mails. 144 00:16:10,735 --> 00:16:13,435 E-mails that are crafted to get them to open it up 145 00:16:13,437 --> 00:16:15,274 to get inside their devices. 146 00:16:16,640 --> 00:16:18,741 Nart Villeneuve, a computer wiz, 147 00:16:18,743 --> 00:16:21,109 figured out how the operation worked 148 00:16:21,111 --> 00:16:23,813 by getting the attackers to hack into his computer. 149 00:16:23,815 --> 00:16:25,580 We're monitoring these groups 150 00:16:25,582 --> 00:16:27,717 for long periods of time, 151 00:16:27,719 --> 00:16:30,652 and you're essentially waiting for them to screw up, right? 152 00:16:30,654 --> 00:16:32,722 And when they do, you take advantage of that. 153 00:16:32,724 --> 00:16:34,824 Sometimes it takes a long time. 154 00:16:34,826 --> 00:16:38,060 You could be monitoring a group for a year and get nothing. 155 00:16:38,062 --> 00:16:42,531 Then one day, they just use a server that they don't lock down 156 00:16:42,533 --> 00:16:44,302 and all the data's just sitting there. 157 00:16:46,236 --> 00:16:48,706 I was at home. It was pretty late. 158 00:17:20,238 --> 00:17:21,636 Nart was scouring through it, 159 00:17:21,638 --> 00:17:24,440 trying to figure out what actor is responsible 160 00:17:24,442 --> 00:17:26,642 for getting inside the Dalai Lama's office. 161 00:17:26,644 --> 00:17:30,712 And there was a 22 or 24 character string that kept coming up 162 00:17:30,714 --> 00:17:33,449 that he couldn't figure out, "What is the meaning of this?" 163 00:17:33,451 --> 00:17:37,719 So on a whim, he just copied and pasted it into Google. 164 00:17:37,721 --> 00:17:41,093 One website came up, and it was Chinese characters. 165 00:17:44,662 --> 00:17:46,295 So he clicked on it. 166 00:17:48,732 --> 00:17:52,634 To my surprise, what came back was the actual page 167 00:17:52,636 --> 00:17:56,905 that the attackers used to interface with the compromised systems. 168 00:17:56,907 --> 00:18:00,910 So they set up a website where they could monitor their victims. 169 00:18:00,912 --> 00:18:03,179 But they didn't password protect it! 170 00:18:03,181 --> 00:18:06,117 So it was like a window into everything they were doing. 171 00:18:16,693 --> 00:18:20,162 This wasn't just targeted at Tibetan organizations 172 00:18:20,164 --> 00:18:22,398 or human rights organizations. 173 00:18:22,400 --> 00:18:26,469 This was global, a pretty wide range of institutions 174 00:18:26,471 --> 00:18:29,438 that showed that these attackers were... were quite busy. 175 00:18:29,440 --> 00:18:31,844 There was huge pickup in the media. It was all over the world. 176 00:18:38,482 --> 00:18:42,287 And it put us on a different kind of footing in terms of our credibility. 177 00:18:45,557 --> 00:18:49,458 In the cyber security community, we were novices at that time. 178 00:18:49,460 --> 00:18:50,429 We were kind of outsiders. 179 00:18:52,931 --> 00:18:55,864 So we were kind of calling it on the fly. 180 00:18:55,866 --> 00:18:57,799 Like, what do we do? What's the right thing to do? 181 00:18:57,801 --> 00:18:59,367 Who do we notify? 182 00:18:59,369 --> 00:19:01,804 I knew that publishing it was important. 183 00:19:01,806 --> 00:19:04,440 We had to redact a lot of the information to protect people. 184 00:19:04,442 --> 00:19:06,776 Should we notify the government? 185 00:19:06,778 --> 00:19:08,710 Should we notify the Canadian government? 186 00:19:08,712 --> 00:19:12,715 How do we notify other governments that are being victimized? 187 00:19:12,717 --> 00:19:14,482 At the time, you know, 188 00:19:14,484 --> 00:19:17,353 we didn't want to completely disclose everything that we had done, 189 00:19:17,355 --> 00:19:19,322 because we wanted to do it again. 190 00:19:19,324 --> 00:19:22,725 In some of the communities I mentioned, they loved it. 191 00:19:22,727 --> 00:19:26,228 But I got the feeling from, certainly inside my own government, 192 00:19:26,230 --> 00:19:27,863 there was a lot of weirdness. 193 00:19:27,865 --> 00:19:31,366 - Are we allowed to speculate? - Well, I think now we know 194 00:19:31,368 --> 00:19:35,938 because there's a Snowden disclosure that explicitly references the fact 195 00:19:35,940 --> 00:19:38,540 that the Canadians and the Americans, 196 00:19:38,542 --> 00:19:40,575 our signals intelligence agencies, 197 00:19:40,577 --> 00:19:43,613 were piggybacking off the GhostNet network. 198 00:19:43,615 --> 00:19:47,352 So, in publishing the report, we basically broke up their party. 199 00:19:55,692 --> 00:19:59,362 From our initial samples from the office of the Dalai Lama, 200 00:19:59,364 --> 00:20:02,297 they were actually compromised by two distinct groups. 201 00:20:02,299 --> 00:20:05,433 The GhostNet group obviously got the most attention. 202 00:20:05,435 --> 00:20:08,336 But there was another group that was also active. 203 00:20:08,338 --> 00:20:10,739 The GhostNet group shut down their operations, 204 00:20:10,741 --> 00:20:14,709 but the other group, um, they're still going. 205 00:21:58,415 --> 00:22:01,650 In our research, what we see are acts of war 206 00:22:01,652 --> 00:22:04,920 that take place against citizens, 207 00:22:04,922 --> 00:22:06,921 using these very technologies. 208 00:22:06,923 --> 00:22:09,959 Getting inside the computers of Tibetans and then arresting them, 209 00:22:09,961 --> 00:22:13,929 and possibly executing them, is a kind of act of war. 210 00:22:16,000 --> 00:22:18,901 We see this sort of thing every week, right? 211 00:22:18,903 --> 00:22:21,373 Minor to major versions of it. 212 00:22:23,875 --> 00:22:27,876 Everything on the site is correct except this. 213 00:22:27,878 --> 00:22:31,913 So this... The last log-in on the C panel was from Korea. 214 00:22:31,915 --> 00:22:34,417 - Mm-hmm. - Do you guys have any work in Korea? 215 00:22:34,419 --> 00:22:36,151 - Is there any... - No, no... 216 00:22:36,153 --> 00:22:39,121 So who actually accesses the website to update it and all that sort of thing? 217 00:22:39,123 --> 00:22:41,526 - It must be somebody unauthorized. - Yeah. 218 00:23:55,967 --> 00:23:58,737 One, two, three, 219 00:23:59,737 --> 00:24:04,576 four, five, six, 220 00:24:05,242 --> 00:24:07,008 seven. 221 00:26:27,317 --> 00:26:29,153 Hmm. 222 00:27:32,115 --> 00:27:35,450 Not that long ago, the government of Pakistan put out this tender 223 00:27:35,452 --> 00:27:39,988 for proposals for a nationwide Internet filtering system. 224 00:27:39,990 --> 00:27:43,225 They wanted to solicit proposals from companies to build, 225 00:27:43,227 --> 00:27:46,096 effectively, the Great Firewall of Pakistan. 226 00:27:52,236 --> 00:27:55,903 Today if you visit Pakistan and you get online 227 00:27:55,905 --> 00:27:59,711 and you try to access YouTube, this is what you'll see, 228 00:28:00,744 --> 00:28:01,979 a blocked page like this. 229 00:28:06,951 --> 00:28:09,086 I'm in Islamabad, putting in a SIM card. 230 00:28:13,223 --> 00:28:16,091 First and foremost, I'm really excited to see Shahzad. 231 00:28:16,093 --> 00:28:20,394 I first met Shahzad and the organization Bytes for All, 232 00:28:20,396 --> 00:28:21,796 eight years ago, I think? 233 00:28:21,798 --> 00:28:24,499 And he's been involved, in one way or another, 234 00:28:24,501 --> 00:28:26,370 in Citizen Lab research ever since. 235 00:28:39,517 --> 00:28:42,721 - Hi, Shahzad. - Hello! 236 00:28:44,188 --> 00:28:47,922 - So great to see you. - Here we are. Here we are. 237 00:28:49,859 --> 00:28:52,059 Bytes for All does what they do, 238 00:28:52,061 --> 00:28:56,265 fight for Internet rights and advocacy-based approach to Internet freedom 239 00:28:56,267 --> 00:28:58,901 under extreme duress. 240 00:28:58,903 --> 00:29:01,370 So they're operating in a country that, 241 00:29:01,372 --> 00:29:04,238 specifically around media and free expression, 242 00:29:04,240 --> 00:29:06,440 has got to be one of the worst places in the world. 243 00:29:06,442 --> 00:29:10,112 Uh, journalists are routinely kidnapped, murdered, 244 00:29:10,114 --> 00:29:12,948 uh, offices firebombed, et cetera, 245 00:29:12,950 --> 00:29:15,120 and they've experienced all of that. 246 00:29:16,487 --> 00:29:19,888 Death threats, staff members kidnapped, 247 00:29:19,890 --> 00:29:23,892 his own son beat up and thrown to the side of the road 248 00:29:23,894 --> 00:29:26,964 as a warning to Shahzad not to do what he's doing. 249 00:29:31,035 --> 00:29:33,367 In my opinion, 250 00:29:33,369 --> 00:29:37,775 Internet has opened up so many opportunities... 251 00:29:38,909 --> 00:29:40,508 for the people to express, 252 00:29:40,510 --> 00:29:44,947 and that is the sole reason that we are fighting for open Internet. 253 00:29:44,949 --> 00:29:48,482 They lost their public spaces. 254 00:29:48,484 --> 00:29:52,321 They lost their ability to go out freely. 255 00:29:52,323 --> 00:29:56,290 So, as they are putting controls and curbs on physical spaces, 256 00:29:56,292 --> 00:30:00,295 they are doing exactly the same in online spaces as well. 257 00:30:00,297 --> 00:30:04,232 So precisely the reason we are standing out there to reclaim those spaces. 258 00:30:04,234 --> 00:30:05,933 And we have to at some point, 259 00:30:05,935 --> 00:30:07,504 and we'll continue to do that. 260 00:30:08,939 --> 00:30:11,472 Oh, my God. 261 00:30:11,474 --> 00:30:15,110 The government has the ability to ban specific pages. 262 00:30:17,181 --> 00:30:19,448 You ban all of Facebook, businesses are suffering, 263 00:30:19,450 --> 00:30:20,548 people communicate. 264 00:30:20,550 --> 00:30:23,384 I mean, you can laugh and joke and say, 265 00:30:23,386 --> 00:30:26,153 "For a few days people won't play FarmVille," but it's not about that. 266 00:30:26,155 --> 00:30:29,490 It's about your fundamental rights being snatched from you 267 00:30:29,492 --> 00:30:33,061 and no government, in my opinion, should have the ability to do that. 268 00:30:33,063 --> 00:30:34,462 Right. 269 00:30:34,464 --> 00:30:37,599 Not only that, they banned Wikipedia for a little while. 270 00:30:37,601 --> 00:30:39,167 - Yes, mm-hmm. - YouTube. 271 00:30:39,169 --> 00:30:42,470 Uh, about several thousand websites were affected. 272 00:30:42,472 --> 00:30:46,107 I think the Internet is this vast, unregulated, 273 00:30:46,109 --> 00:30:48,610 wonderful, democratizing space 274 00:30:48,612 --> 00:30:51,380 and no matter what anyone does, people will find a way. 275 00:31:43,534 --> 00:31:46,701 Hi, I'm Sabeen Mahmud, and I'm the director of Peace Nation, 276 00:31:46,703 --> 00:31:48,737 a nonprofit organization. 277 00:31:48,739 --> 00:31:51,739 I've always believed that technology is always the driver of change, 278 00:31:51,741 --> 00:31:55,009 not business, not governments, but technology. 279 00:31:55,011 --> 00:32:00,082 And gender-based violence has always existed 280 00:32:00,084 --> 00:32:03,584 but with the advent of the Internet and the number of social networking tools, 281 00:32:03,586 --> 00:32:06,555 I think it's a great mobilization platform. 282 00:32:25,709 --> 00:32:28,477 Sabeen Mahmud was leaving a Karachi restaurant 283 00:32:28,479 --> 00:32:31,212 when the gunman attacked her in her car. 284 00:32:31,214 --> 00:32:34,382 Her mother who was also accompanying her was wounded 285 00:32:34,384 --> 00:32:36,551 and now is in a critical condition. 286 00:32:36,553 --> 00:32:40,055 Mahmud was taken to a hospital where she was pronounced dead. 287 00:32:56,406 --> 00:33:01,543 When she spoke in physical spaces, nothing happened. 288 00:33:01,545 --> 00:33:05,313 When she was carrying on her campaign, she was not targeted. 289 00:33:05,315 --> 00:33:07,382 People were amused or they ignored her, 290 00:33:07,384 --> 00:33:09,584 or they just walked past. 291 00:33:09,586 --> 00:33:14,088 But when this whole, sort of, campaign 292 00:33:14,090 --> 00:33:16,357 hit the Internet and the social media, 293 00:33:16,359 --> 00:33:18,526 that's when the lynch mobs gathered. 294 00:33:18,528 --> 00:33:21,196 And one of the reasons I find is, 295 00:33:21,198 --> 00:33:27,235 that speech in a physical space lasts only as long as you're speaking. 296 00:33:27,237 --> 00:33:33,574 But once it is uploaded onto the Internet on any platform, it is there forever. 297 00:33:33,576 --> 00:33:38,212 And then your attackers or, you know, whoever opposes you, 298 00:33:38,214 --> 00:33:40,449 they gather, and then they spread it further 299 00:33:40,451 --> 00:33:43,785 and more and more people join that group 300 00:33:43,787 --> 00:33:47,424 of people who are attacking and it takes on a life of its own. 301 00:34:07,376 --> 00:34:10,244 We're going through a demographic revolution. 302 00:34:10,246 --> 00:34:15,182 The center of gravity of cyberspace is shifting right before our eyes. 303 00:34:15,184 --> 00:34:18,552 From the north and the west of the planet, where it was invented, 304 00:34:18,554 --> 00:34:21,188 to the South and the East. 305 00:34:21,190 --> 00:34:25,360 The vast majority of Internet users today and into the future 306 00:34:25,362 --> 00:34:27,394 are coming from the developing world, 307 00:34:27,396 --> 00:34:30,699 for whom these technologies are empowering. 308 00:34:30,701 --> 00:34:35,737 What should we expect then from these next billion digital users 309 00:34:35,739 --> 00:34:38,539 as they come online in the post-Snowden era? 310 00:36:47,704 --> 00:36:50,371 Once we started with Midia Ninja, 311 00:36:50,373 --> 00:36:54,309 and we went to the streets and tried to do live streaming. 312 00:36:54,311 --> 00:36:58,012 There was a mobile station with an electric generator 313 00:36:58,014 --> 00:37:00,481 using gasoline, you know, 314 00:37:00,483 --> 00:37:05,487 a 4G modem, a laptop, a camera, a video switcher and... 315 00:37:26,576 --> 00:37:29,311 It was good in the first two or three times 316 00:37:29,313 --> 00:37:31,646 in more calm demonstrations. 317 00:37:31,648 --> 00:37:34,048 I remember there was a discussion, and then Carioca said, 318 00:37:34,050 --> 00:37:37,786 "No, I found an app. 319 00:37:37,788 --> 00:37:40,688 Its name is TwitCasting and maybe we can try it." 320 00:37:42,893 --> 00:37:48,565 It was a Japanese free app used by teenagers to hang out, you know. 321 00:38:19,829 --> 00:38:23,731 Looking at Brazil, this is one of those cases where you have 322 00:38:23,733 --> 00:38:25,900 a sporting event, in this case, 323 00:38:25,902 --> 00:38:31,005 which triggers all sorts of extra concern around security 324 00:38:31,007 --> 00:38:34,376 and the control of information, much of it legitimate. 325 00:38:34,378 --> 00:38:39,046 But what often happens is that the layering of surveillance, 326 00:38:39,048 --> 00:38:42,450 extra-legal measures that happens leading up to 327 00:38:42,452 --> 00:38:45,619 and during these events doesn't just disappear. 328 00:38:45,621 --> 00:38:47,988 It becomes part of the permanent architecture. 329 00:39:16,119 --> 00:39:19,554 Mobile phones are prevalent. Everyone has one in their hands. 330 00:39:19,556 --> 00:39:22,724 And the police now use a technique 331 00:39:22,726 --> 00:39:27,662 where they set up fake cell phone towers that captures everyone within the vicinity 332 00:39:27,664 --> 00:39:31,800 and gathers up identifying information that's emitted by the cell phones, 333 00:39:31,802 --> 00:39:33,901 which they then use to track people 334 00:39:33,903 --> 00:39:36,170 and associate them with each other 335 00:39:36,172 --> 00:39:39,740 and being at specific physical events like a protest 336 00:39:39,742 --> 00:39:42,142 and the government can go back in time 337 00:39:42,144 --> 00:39:47,081 and re-create every facet of your life on that particular day and hour. 338 00:39:47,083 --> 00:39:49,516 With whom you were communicating. 339 00:39:49,518 --> 00:39:52,454 Not only what you're broadcasting but what you're saying privately 340 00:39:52,456 --> 00:39:55,059 and use this to incriminate you down the road. 341 00:41:18,541 --> 00:41:21,141 People realize there's some hidden mechanism of power 342 00:41:21,143 --> 00:41:23,778 going on through surveillance. 343 00:41:23,780 --> 00:41:27,615 And you begin to suspect, maybe, this device you can't trust. 344 00:41:27,617 --> 00:41:30,784 Maybe the state's in here or it's in my mobile phone or... 345 00:41:30,786 --> 00:41:33,253 And as that kind of seeps out there, 346 00:41:33,255 --> 00:41:36,891 people become much more unwilling to take risks. 347 00:41:36,893 --> 00:41:37,992 You know, even in our own work, 348 00:41:37,994 --> 00:41:41,329 we're much more cautious about what we say over e-mail, 349 00:41:41,331 --> 00:41:43,764 worried that somebody's listening and so on. 350 00:41:43,766 --> 00:41:47,334 It's like sand in the machinery. It kind of slows things down 351 00:41:47,336 --> 00:41:50,637 and everything becomes much more complicated, 352 00:41:50,639 --> 00:41:53,273 just to communicate basic instructions. 353 00:41:53,275 --> 00:41:55,712 You're like, "Oh, first I have to encrypt it." 354 00:41:57,313 --> 00:42:00,748 All these technologies too, cryptography things, 355 00:42:00,750 --> 00:42:02,684 they might be getting cheap, 356 00:42:02,686 --> 00:42:07,822 but if we consider in terms of time, they are expensive. 357 00:42:07,824 --> 00:42:11,325 You know, people are being murdered every day in the favelas. 358 00:42:11,327 --> 00:42:14,362 The military police are still running. 359 00:42:14,364 --> 00:42:17,898 So it's complicated now to stop the machines 360 00:42:17,900 --> 00:42:21,070 and adapt our system to a more safe mode. 361 00:46:40,996 --> 00:46:43,898 So at the same time that you have so many people 362 00:46:43,900 --> 00:46:48,369 able to communicate to a global audience at an instant, 363 00:46:48,371 --> 00:46:53,074 governments, in ways that they weren't 20 years ago, 364 00:46:53,076 --> 00:46:58,246 are really ramping up information controls because they see... 365 00:46:58,248 --> 00:47:01,148 And when we say "governments," we're really talking about entrenched powers, 366 00:47:01,150 --> 00:47:06,153 institutionalized, uh, you know, forms of capitalism in the state 367 00:47:06,155 --> 00:47:09,123 that see, you know, 368 00:47:09,125 --> 00:47:13,494 this type of unpredictable citizen activism as a threat to their interests 369 00:47:13,496 --> 00:47:15,932 and are developing ways to counter it. 370 00:47:18,300 --> 00:47:20,369 You have new challenges today. 371 00:47:22,204 --> 00:47:25,942 Sensitive data is transmitted over encrypted channels. 372 00:47:26,976 --> 00:47:29,577 You need more. 373 00:47:29,579 --> 00:47:32,382 You want to look through your target's eyes. 374 00:47:34,650 --> 00:47:36,619 You have to hack your target. 375 00:47:42,592 --> 00:47:47,030 You have to overcome encryption and capture relevant data. 376 00:47:48,630 --> 00:47:51,467 Being stealth and untraceable. 377 00:47:54,938 --> 00:47:56,940 Exactly what we do. 378 00:48:02,311 --> 00:48:07,148 The vendors of these products and services market them to governments, 379 00:48:07,150 --> 00:48:09,083 usually at trade shows 380 00:48:09,085 --> 00:48:13,153 that are only open to accredited law enforcement and intelligence agencies. 381 00:48:13,155 --> 00:48:16,691 Actually, I've got a big binder that I can... 382 00:48:16,693 --> 00:48:19,526 So, if you ignore the bag, actually which... 383 00:48:21,063 --> 00:48:25,231 someone, uh, deposited these in as a gift to me, 384 00:48:25,233 --> 00:48:29,202 but I think was hoping to disguise it in the kindergarten bag. 385 00:48:29,204 --> 00:48:35,108 These are brochures from the type of trade shows that we're talking about, 386 00:48:35,110 --> 00:48:39,280 products and services that allow cell phone detection, 387 00:48:39,282 --> 00:48:41,550 uh, insertion of malware... 388 00:48:43,753 --> 00:48:47,021 tracking, social media monitoring. 389 00:48:47,023 --> 00:48:50,023 In many ways, the way to think about this market 390 00:48:50,025 --> 00:48:53,526 is that it's the commercialization of cyber crime. 391 00:48:53,528 --> 00:48:57,430 You trick somebody into installing a software program 392 00:48:57,432 --> 00:48:59,532 that contains malicious code 393 00:48:59,534 --> 00:49:02,168 that exploits some vulnerability in the system, 394 00:49:02,170 --> 00:49:06,206 which then allows the attacker to do anything they want. 395 00:49:06,208 --> 00:49:09,577 Turn on the webcam, listen in on the microphone, 396 00:49:09,579 --> 00:49:13,780 record keystrokes, record the location, the movement. 397 00:49:13,782 --> 00:49:16,383 It operates without much accountability, 398 00:49:16,385 --> 00:49:20,021 certainly no corporate social responsibility, 399 00:49:20,023 --> 00:49:23,124 ripe for abuse in a place like Sudan or Ethiopia. 400 00:49:23,126 --> 00:49:25,525 We've seen in one case after another, 401 00:49:25,527 --> 00:49:28,628 how this ends up being used to target civil society. 402 00:49:28,630 --> 00:49:29,632 Aha. 403 00:49:31,300 --> 00:49:32,800 Gamma Group. 404 00:49:32,802 --> 00:49:35,769 Maker of the notorious FinFisher spyware. 405 00:52:18,668 --> 00:52:23,570 The attacker has to socially engineer or convince the target 406 00:52:23,572 --> 00:52:28,409 to open a file or to, you know, click through some security warning, 407 00:52:28,411 --> 00:52:30,811 um, in order to become infected. 408 00:52:30,813 --> 00:52:36,217 We had found a document that had pictures of Ethiopian opposition leaders in it, 409 00:52:36,219 --> 00:52:38,619 and it looked like it was targeted and designed to appeal 410 00:52:38,621 --> 00:52:40,920 to members of the Ethiopian diaspora. 411 00:52:40,922 --> 00:52:43,757 Uh, but in fact, the file was cleverly disguised 412 00:52:43,759 --> 00:52:46,526 to look like a document that's actually a computer program, 413 00:52:46,528 --> 00:52:48,262 an executable file. 414 00:52:48,264 --> 00:52:50,496 So when you run this, it will install software on your computer 415 00:52:50,498 --> 00:52:53,233 even though, you know, they changed the icon and everything 416 00:52:53,235 --> 00:52:56,369 to make it look like this is a document or a picture. 417 00:52:56,371 --> 00:52:57,540 This is actually a program. 418 00:53:31,773 --> 00:53:34,941 I was able to look at the memory of an infected computer. 419 00:53:34,943 --> 00:53:37,878 In other words, what's going on inside the computer when it's infected. 420 00:53:37,880 --> 00:53:42,316 And I was able to identify several interesting artifacts in the memory, 421 00:53:42,318 --> 00:53:45,519 including a bunch of strings that said "FinFisher," "FinSpy," 422 00:53:45,521 --> 00:53:47,824 very clearly attributing this to the company. 423 00:54:23,793 --> 00:54:27,728 You don't have to be the NSA to get inside somebody's computer. 424 00:54:27,730 --> 00:54:31,065 Um, instead you can exploit their curiosity, 425 00:54:31,067 --> 00:54:34,934 their, um, need to communicate. 426 00:54:34,936 --> 00:54:38,572 And of course, journalists, at the very heart of what they do, 427 00:54:38,574 --> 00:54:42,543 is engage in communication with a lot of people 428 00:54:42,545 --> 00:54:45,445 and a lot of people that they don't know and trust necessarily. 429 00:54:45,447 --> 00:54:48,816 Because they're engaged in outreach and communicating constantly with sources. 430 00:55:02,398 --> 00:55:06,133 Fifty years ago, nobody would have known what happened in Syria. 431 00:55:06,135 --> 00:55:10,436 But in 2011, when it started, everybody had Facebook. 432 00:55:10,438 --> 00:55:15,978 Everybody has e-mails and everybody has WhatsApp and Viber. 433 00:55:17,413 --> 00:55:19,380 So you just can't stop people 434 00:55:19,382 --> 00:55:22,048 from telling what is happening to them. 435 00:55:22,050 --> 00:55:25,052 So when they besieged Daraa at the beginning, 436 00:55:25,054 --> 00:55:29,789 they shut down communication, Internet, land lines and even electricity. 437 00:55:29,791 --> 00:55:34,026 But they did not know that in the 21st century, people have their ways. 438 00:55:34,028 --> 00:55:37,164 People were charging their mobiles from their cars or generators, 439 00:55:37,166 --> 00:55:40,767 hand generators, um, manual generators. 440 00:55:40,769 --> 00:55:44,737 And people were using satellite connections. 441 00:55:44,739 --> 00:55:49,543 You don't need to use the country, uh, Internet to be connected to the Internet. 442 00:55:49,545 --> 00:55:50,943 You can use anything. 443 00:55:50,945 --> 00:55:54,981 And they were able to tell what was happening to them. 444 00:55:54,983 --> 00:56:00,720 Um, so the story got around. 445 00:56:09,063 --> 00:56:12,965 A few years ago many of us celebrated the Arab Spring 446 00:56:12,967 --> 00:56:16,103 as the paradigm of what these technologies could do. 447 00:56:16,105 --> 00:56:19,472 Remember we called it at the time "liberation technologies." 448 00:56:19,474 --> 00:56:21,641 They would bring about the end of authoritarian rule. 449 00:56:29,518 --> 00:56:35,222 Unfortunately, Syria has become the Arab Spring's dark aftermath. 450 00:56:42,465 --> 00:56:45,699 As groups sympathetic to the Assad regime 451 00:56:45,701 --> 00:56:50,003 have employed off-the-shelf malware crime kits to infiltrate social networks, 452 00:56:50,005 --> 00:56:53,539 arrest, torture and murder opposition groups 453 00:56:53,541 --> 00:56:55,511 and even target their air strikes. 454 00:57:24,639 --> 00:57:28,275 From the beginning, we believed that the camera is the most powerful weapon, 455 00:57:28,277 --> 00:57:30,811 and it was actually the only weapon we have 456 00:57:30,813 --> 00:57:32,782 to deliver our own message to the whole world. 457 00:57:40,822 --> 00:57:42,655 This is interesting. 458 00:57:42,657 --> 00:57:44,258 Baraa? 459 00:57:48,931 --> 00:57:53,833 It's a pleasure for me to introduce one of my best friends, 460 00:57:53,835 --> 00:57:59,273 Mr. Baraa, he's one of the most activist people inside Syria. 461 00:57:59,275 --> 00:58:02,642 He came a few days ago 'cause he has... 462 00:58:02,644 --> 00:58:07,981 He has... many broken bones on his body. 463 00:58:10,552 --> 00:58:13,655 He was there and covered the battle in Daraa City. 464 00:58:17,059 --> 00:58:20,059 And in the afternoon, they get a tank shell. 465 00:58:22,931 --> 00:58:26,635 He was with his friend, whom has this camera. 466 00:58:28,036 --> 00:58:30,170 And that good guy, you know, he gets killed 467 00:58:30,172 --> 00:58:33,706 by one tank shell from the regime's side. 468 00:58:36,644 --> 00:58:38,244 This video, you will see now, 469 00:58:38,246 --> 00:58:42,751 a remote control car and it exploded, a huge explosion. 470 00:58:44,286 --> 00:58:45,954 It was filmed by this camera. 471 00:58:50,726 --> 00:58:51,791 After that, 472 00:58:51,793 --> 00:58:53,994 the rocket launchers 473 00:58:53,996 --> 00:58:55,965 started to hit the place from the regime's side. 474 00:58:57,199 --> 00:59:01,001 So our activist, this media guy, 475 00:59:01,003 --> 00:59:04,304 he gets killed in here in this exact... this place. 476 00:59:04,306 --> 00:59:07,139 Now here. He was standing here. 477 00:59:07,141 --> 00:59:10,010 And people found the camera with him. 478 00:59:10,012 --> 00:59:12,615 We took out the memory card, and we post this... 479 00:59:13,815 --> 00:59:16,218 as, you know, in memory of Hussain. 480 00:59:31,666 --> 00:59:35,769 So now, Mr. Baraa here, just a few days just to heal. 481 00:59:35,771 --> 00:59:40,173 He paid a visit to some hospitals to check out himself, 482 00:59:40,175 --> 00:59:44,013 then he will go back into Syria to keep working. 483 00:59:45,880 --> 00:59:48,648 There is a war on Facebook. 484 00:59:48,650 --> 00:59:53,787 Uh, every side is using Facebook to promote themselves. 485 01:00:05,668 --> 01:00:08,901 The other way around, the regime will say, 486 01:00:08,903 --> 01:00:12,838 "We will occupy this area. We will take over this area." 487 01:00:12,840 --> 01:00:15,941 Then the FSA would leave because they're afraid of bombardment. 488 01:00:15,943 --> 01:00:16,980 It's just a game. 489 01:00:18,047 --> 01:00:19,248 Facebook is a game. 490 01:00:28,757 --> 01:00:30,092 It was just a silly joke I made. 491 01:00:31,427 --> 01:00:35,195 I didn't hurt anybody. I didn't insult anyone. 492 01:00:35,197 --> 01:00:39,231 It was not political. It was not racist. 493 01:00:39,233 --> 01:00:42,168 There is nothing that they could hold against me 494 01:00:42,170 --> 01:00:44,106 with a thing that I wrote on Facebook. 495 01:00:46,108 --> 01:00:49,879 But still, at a time of war... 496 01:00:52,047 --> 01:00:53,115 people get crazy. 497 01:01:01,724 --> 01:01:06,092 They did not drag me in the street or kidnap me. 498 01:01:06,094 --> 01:01:09,262 They just asked me to come to ask me a few questions. 499 01:01:09,264 --> 01:01:12,164 This is what they said, so I signed the paper that I'm coming. 500 01:01:12,166 --> 01:01:18,273 I went the next morning at 11:30, to the detention center. 501 01:01:19,942 --> 01:01:22,008 The security guy came to me. 502 01:01:22,010 --> 01:01:25,445 He's like... He's like half of my height. 503 01:01:25,447 --> 01:01:27,847 He blindfolded me, and I was like, 504 01:01:27,849 --> 01:01:31,184 I was okay with that because I thought, it's some... 505 01:01:31,186 --> 01:01:37,023 it's confidential secrets of the country that they don't want me to see. 506 01:01:37,025 --> 01:01:41,764 And then I was presented to the detective or the interrogator. 507 01:01:42,431 --> 01:01:43,432 I never saw him. 508 01:01:46,434 --> 01:01:50,970 He told me, "You're a computer engineer. Please be seated." 509 01:01:50,972 --> 01:01:55,775 And I sat next to him and he started reading all my Facebook posts. 510 01:01:55,777 --> 01:01:56,812 I was like, "Oh." 511 01:02:08,489 --> 01:02:10,891 One of the posts that I wrote was, 512 01:02:10,893 --> 01:02:13,959 "No praying, no fasting until the regime falls," 513 01:02:13,961 --> 01:02:15,764 which was actually making fun of both sides. 514 01:02:16,498 --> 01:02:18,063 And I laughed and he's like, 515 01:02:18,065 --> 01:02:20,869 "I'm not kidding with you. I'm not joking with you." 516 01:02:24,172 --> 01:02:26,438 He kicked me on my chest 517 01:02:26,440 --> 01:02:31,577 and then he requested the same short guy, 518 01:02:31,579 --> 01:02:33,512 because he was there in the room, 519 01:02:33,514 --> 01:02:35,514 to bring something called the "flying carpet," 520 01:02:35,516 --> 01:02:37,284 which is a torturing machine. 521 01:02:37,286 --> 01:02:42,054 It's a wooden board, like the door, 522 01:02:42,056 --> 01:02:45,127 but it has joints in the middle that can flip. 523 01:02:46,027 --> 01:02:50,162 And I had to lay on it. 524 01:02:50,164 --> 01:02:54,501 They tied my wrists and they tied me from the middle, they tied my legs. 525 01:02:54,503 --> 01:02:59,305 And they just closed it so my knees touched my chest. 526 01:02:59,307 --> 01:03:01,608 He took off my shoes and my socks 527 01:03:01,610 --> 01:03:07,250 and started beating me with a metal, uh, with a metal whip. 528 01:03:09,885 --> 01:03:13,856 The pain is unbelievable. 529 01:03:14,889 --> 01:03:16,356 You just can't take it anymore. 530 01:03:16,358 --> 01:03:20,363 You just can't endure this amount of agony. 531 01:03:28,971 --> 01:03:32,304 What we saw in Syria was a lot of use of, say, 532 01:03:32,306 --> 01:03:34,541 off-the-shelf remote access tools. 533 01:03:34,543 --> 01:03:38,211 So this is sort of software that you can get from underground message boards 534 01:03:38,213 --> 01:03:40,579 or maybe purchase for not so much money. 535 01:03:40,581 --> 01:03:44,617 Maybe $200-300 that give you the ability 536 01:03:44,619 --> 01:03:47,554 to record someone's keystrokes, read their e-mails, 537 01:03:47,556 --> 01:03:50,956 even look at them through their webcam. 538 01:03:50,958 --> 01:03:53,392 Record via the computer's microphone, 539 01:03:53,394 --> 01:03:56,231 conversations that are being had around the target's computer. 540 01:03:57,465 --> 01:03:59,999 Frequently what you would see 541 01:04:00,001 --> 01:04:02,668 is it would be bundled with some type of lured document 542 01:04:02,670 --> 01:04:07,072 which showed a deep understanding 543 01:04:07,074 --> 01:04:09,943 of the psychology of the people they were trying to target. 544 01:04:09,945 --> 01:04:14,680 For instance, one of the documents that was sent out that I keenly recall 545 01:04:14,682 --> 01:04:17,182 was a list. 546 01:04:17,184 --> 01:04:23,188 A purported list of insurgents identified by the Syrian government. 547 01:04:23,190 --> 01:04:28,193 So of course what happened was that this was promptly passed around 548 01:04:28,195 --> 01:04:31,298 to all sorts of very interesting groups in Syria 549 01:04:31,300 --> 01:04:34,300 because everyone wanted to know if they were on this list or not. 550 01:04:34,302 --> 01:04:40,106 So the actual spyware payload itself wasn't particularly sophisticated, 551 01:04:40,108 --> 01:04:43,175 but the social... 552 01:04:43,177 --> 01:04:46,479 the social and social engineering side of that operation, 553 01:04:46,481 --> 01:04:48,551 um, was quite smart. 554 01:04:55,023 --> 01:04:58,494 Internet entered almost all countries in the region 555 01:04:59,527 --> 01:05:01,029 before it entered Syria. 556 01:05:02,230 --> 01:05:03,229 Yes. 557 01:05:03,231 --> 01:05:05,565 Government in Syria, 558 01:05:05,567 --> 01:05:08,068 we are not as developed as Canada, for example, 559 01:05:08,070 --> 01:05:10,103 or not as developed as United States. 560 01:05:10,105 --> 01:05:13,206 In Canada they can monitor people and control people 561 01:05:13,208 --> 01:05:16,075 and spy people in a very intelligent way. 562 01:05:16,077 --> 01:05:18,514 And even they don't feel that they are... 563 01:05:21,382 --> 01:05:22,715 spied on. 564 01:05:22,717 --> 01:05:27,556 But in Syria, of course you go to old ways. 565 01:05:34,329 --> 01:05:37,229 They untie me and then I was... 566 01:05:37,231 --> 01:05:39,999 and then he asked me to sit next to him, and he said, 567 01:05:40,001 --> 01:05:41,003 "Let's start talking." 568 01:05:42,704 --> 01:05:46,271 And I told him, "I don't want to talk to you anymore." 569 01:05:46,273 --> 01:05:52,612 He said, "I want you to admit you work with the Free Syrian Electronic Army." 570 01:05:52,614 --> 01:05:55,248 I was like, "I don't know what that is." 571 01:05:55,250 --> 01:05:58,554 He said, "You like their page. You like their page on Facebook." 572 01:06:00,021 --> 01:06:02,021 I told him, "I like their page on Facebook, 573 01:06:02,023 --> 01:06:05,124 but there are too many pages on Facebook that you can like. 574 01:06:05,126 --> 01:06:07,563 I also like Assad's page on Facebook." 575 01:06:09,231 --> 01:06:11,664 Well, that did not convince him. 576 01:06:11,666 --> 01:06:16,802 So his boss came and he told him, "What is going on?" 577 01:06:16,804 --> 01:06:21,307 He told him, "This is the Facebook guy, and he's not cooperating." 578 01:06:21,309 --> 01:06:25,612 So then his boss told him to, "Send him down to the basement, 579 01:06:25,614 --> 01:06:29,615 peel his skin off and just remind me of him after a month." 580 01:06:29,617 --> 01:06:32,284 And I was like, "Can we go back to the flying carpet?" 581 01:06:35,623 --> 01:06:37,523 I stayed there for almost a month, 582 01:06:37,525 --> 01:06:41,096 and then I was released with a presidential amnesty. 583 01:06:43,197 --> 01:06:46,099 So I went in a taxi, 584 01:06:46,101 --> 01:06:50,235 covered with dust, dirt, shit and blood, 585 01:06:50,237 --> 01:06:53,639 all over my face, my clothes. 586 01:06:53,641 --> 01:06:57,776 And then the taxi driver felt pity for me, and he gave me a cigarette. 587 01:06:57,778 --> 01:07:00,048 I remember that was the first time I cried. 588 01:07:03,184 --> 01:07:07,287 And I went to my flat in Latakia where I used to study, 589 01:07:07,289 --> 01:07:09,158 and my roommates were shocked to see me alive. 590 01:07:10,791 --> 01:07:14,764 And then, like, two weeks after that I fled the country. 591 01:07:16,197 --> 01:07:17,697 I came to Jordan. 592 01:07:17,699 --> 01:07:18,768 I am a journalist now. 593 01:07:32,246 --> 01:07:35,782 With Syria, a lot of the bad things that are happening 594 01:07:35,784 --> 01:07:39,151 are happening to people who don't look like Westerners. 595 01:07:39,153 --> 01:07:42,722 The bad things happening to these people through technology, 596 01:07:42,724 --> 01:07:46,191 through the risks inherent in technology, 597 01:07:46,193 --> 01:07:49,295 are not different than the kinds of risks that we may face, 598 01:07:49,297 --> 01:07:51,530 um, although they look different. 599 01:07:51,532 --> 01:07:52,831 We see in the news almost every day, 600 01:07:52,833 --> 01:07:56,568 a report of a breach, some kind of a large hack. 601 01:07:56,570 --> 01:07:58,905 Data being exploited somewhere. 602 01:07:58,907 --> 01:08:01,773 It's the same problem, but in Syria, it looks very different 603 01:08:01,775 --> 01:08:04,510 and because there are dark-skinned people, 604 01:08:04,512 --> 01:08:07,246 uh, and there are guns and a foreign language, 605 01:08:07,248 --> 01:08:10,249 it feels, I think to many, exotic and different, 606 01:08:10,251 --> 01:08:11,717 and it couldn't happen here. 607 01:08:11,719 --> 01:08:14,354 And I think, in fact, what you're seeing in Syria 608 01:08:14,356 --> 01:08:17,357 is this is what happens when the risks get higher 609 01:08:17,359 --> 01:08:18,828 but the technology is the same. 610 01:08:20,328 --> 01:08:21,664 They're using the same Facebook that we are. 611 01:11:08,529 --> 01:11:11,397 What is this? This is surreal. 612 01:12:51,666 --> 01:12:54,470 Lots of people were there, by 7:00 in the night, 613 01:12:55,436 --> 01:12:57,803 and we were live. 614 01:13:02,644 --> 01:13:06,845 Suddenly a man came to Carioca, and he asked to interview him. 615 01:13:10,717 --> 01:13:14,986 And then the military police came to Carioca, searched his bag. 616 01:13:14,988 --> 01:13:19,558 And then they said he should be taken to jail 617 01:13:19,560 --> 01:13:23,862 as a preventive arrestment, to be searched and inquired. 618 01:13:29,470 --> 01:13:33,973 How this information was being virilized was really amazing. 619 01:13:33,975 --> 01:13:36,608 Like sharing, sharing, sharing, tweets, tweets, tweets, 620 01:13:36,610 --> 01:13:37,943 mention, mention, mention. 621 01:13:37,945 --> 01:13:39,711 "The Ninja is being arrested." 622 01:13:39,713 --> 01:13:42,113 And suddenly there was, like, a small crowd. 623 01:13:42,115 --> 01:13:44,483 Like 5,000 people. 624 01:13:44,485 --> 01:13:47,219 And all of them was screaming together, 625 01:15:18,246 --> 01:15:21,580 Then we posted this video from the mobile, like, real time, 626 01:15:21,582 --> 01:15:23,251 and it virilized very fast. 627 01:18:16,356 --> 01:18:19,825 The video was just getting bigger in the social media. 628 01:18:19,827 --> 01:18:21,794 Bruno Teles became a character. 629 01:18:50,858 --> 01:18:53,224 They said that Bruno was innocent, 630 01:18:53,226 --> 01:18:57,929 and they used Midia Ninja image. 631 01:18:57,931 --> 01:19:00,199 And they credited Midia Ninja. 632 01:19:00,201 --> 01:19:03,501 It was the first time that we were seeing 633 01:19:03,503 --> 01:19:08,107 Globo recognizing a free media collective 634 01:19:08,109 --> 01:19:12,544 as a legitimate player in the communication game. 635 01:19:12,546 --> 01:19:15,317 It was a next step. 636 01:19:46,314 --> 01:19:51,887 Oh, he's changing his shirt. 637 01:22:05,152 --> 01:22:10,188 Ninja! Ninja! Ninja! 638 01:22:29,275 --> 01:22:30,211 Ninja! 639 01:22:59,273 --> 01:23:02,775 I've always been a fan of the terms "hacking" and "hacktivism." 640 01:23:02,777 --> 01:23:04,410 Especially "hacktivism" 641 01:23:04,412 --> 01:23:07,812 which is the combination of hacking and political activism. 642 01:23:07,814 --> 01:23:12,651 And those combined are pretty powerful to me. 643 01:23:12,653 --> 01:23:17,425 It's about encouraging people not to accept technology at face value. 644 01:23:18,792 --> 01:23:20,659 We need to encourage people to think about 645 01:23:20,661 --> 01:23:23,594 what it is that surrounds them, 646 01:23:23,596 --> 01:23:26,065 to question authority 647 01:23:26,067 --> 01:23:30,235 in a sense of the authority being the technological environment around them 648 01:23:30,237 --> 01:23:35,607 and to realize that when you start pulling back the layers of all of this, 649 01:23:35,609 --> 01:23:37,809 that's where the exercise of power is. 650 01:23:37,811 --> 01:23:41,280 So if we want liberal democracy to flourish, 651 01:23:41,282 --> 01:23:44,282 we need people to start lifting back the layers 652 01:23:44,284 --> 01:23:45,653 and understanding what's going on. 653 01:24:01,301 --> 01:24:05,303 I think ultimately it comes down to understanding what your values are, 654 01:24:05,305 --> 01:24:07,772 because how do you develop your thoughts, right? 655 01:24:07,774 --> 01:24:09,842 How do you determine what it is that you truly believe? 656 01:24:09,844 --> 01:24:13,411 How do you determine what it is you really want to say, 657 01:24:13,413 --> 01:24:15,513 if you can't even keep notes safely? 658 01:24:15,515 --> 01:24:19,585 If you can't have some private space, some space for thought, 659 01:24:19,587 --> 01:24:22,454 some space to enjoy the product of your own intellect, 660 01:24:22,456 --> 01:24:24,857 to share that with people close to you who you trust. 661 01:24:24,859 --> 01:24:27,695 Whether they're family, whether they're colleagues, whether they're compatriots. 662 01:24:36,670 --> 01:24:42,241 One thing that I see a lot is, this idea of technology as a solution. 663 01:24:42,243 --> 01:24:44,776 It's a natural thing. Okay, technology is under threat. 664 01:24:44,778 --> 01:24:46,713 Let's find a technological solution. 665 01:24:48,282 --> 01:24:49,882 There are so many projects now 666 01:24:49,884 --> 01:24:53,818 around secure communications, platforms, chats, instant messaging. 667 01:24:53,820 --> 01:24:57,923 But it's only one component of a solution set. 668 01:24:57,925 --> 01:25:02,163 And I think often overlooked are the legal and political dimensions. 669 01:25:03,296 --> 01:25:04,428 If we're talking about 670 01:25:04,430 --> 01:25:06,565 protecting and preserving all of this, 671 01:25:06,567 --> 01:25:10,602 as a secure and open communication space, 672 01:25:10,604 --> 01:25:12,537 that means holding governments accountable. 673 01:25:12,539 --> 01:25:14,572 It means holding companies accountable. 674 01:25:14,574 --> 01:25:17,175 Putting in place rules and laws 675 01:25:17,177 --> 01:25:22,246 that ensures they can't do things that infringe on our freedoms and rights. 676 01:25:22,248 --> 01:25:25,384 That to me is, uh, 677 01:25:25,386 --> 01:25:29,423 such a critical foundation of a digital democracy today. 678 01:25:31,118 --> 01:25:36,118 Subtitles by explosiveskull 58561

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.