Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:15,969 --> 00:00:20,969
Subtitles by explosiveskull
2
00:00:34,365 --> 00:00:37,467
We are going through
the most profound change
3
00:00:37,469 --> 00:00:41,240
in communication technologies in
all of human history right now.
4
00:00:45,643 --> 00:00:50,346
Printing press, radio, telegraph,
television. All very important.
5
00:00:50,348 --> 00:00:54,217
But I believe we're going
through the most transformative,
6
00:00:54,219 --> 00:00:57,488
purely on the basis
of three technologies.
7
00:00:57,490 --> 00:01:00,527
Mobile, social media
and cloud computing.
8
00:01:07,700 --> 00:01:10,434
They share one
very important characteristic.
9
00:01:10,436 --> 00:01:14,237
And that's the amount
of private information.
10
00:01:14,239 --> 00:01:17,773
Information that used to be in
our desktops or filing cabinets,
11
00:01:17,775 --> 00:01:19,442
even in our heads,
12
00:01:19,444 --> 00:01:22,379
that we now
entrust to third parties.
13
00:01:24,750 --> 00:01:28,552
Data that we are conscious of,
and deliberate about,
14
00:01:28,554 --> 00:01:31,621
like the e-mails we send
and the tweets we post.
15
00:01:31,623 --> 00:01:34,323
But it also includes
a lot of information
16
00:01:34,325 --> 00:01:37,296
that we're completely,
or mostly, unconscious about.
17
00:01:38,496 --> 00:01:40,531
So if you take my mobile phone,
18
00:01:40,533 --> 00:01:43,866
even when I'm not using it,
it's emitting a pulse,
19
00:01:43,868 --> 00:01:47,704
trying to locate the nearest Wi-Fi
router or cell phone exchange,
20
00:01:47,706 --> 00:01:50,576
and within that beacon is
the make and model of the phone,
21
00:01:51,576 --> 00:01:53,377
the fact that it's my phone,
22
00:01:53,379 --> 00:01:56,413
because my name is attached
to the operating system,
23
00:01:56,415 --> 00:01:59,383
and most importantly,
the geolocation of the phone.
24
00:02:09,828 --> 00:02:12,762
We are
leaving this digital exhaust
25
00:02:12,764 --> 00:02:17,733
that contains extraordinarily precise
information about our lives,
26
00:02:17,735 --> 00:02:22,371
our social relationships reduced
to trillions of data points
27
00:02:22,373 --> 00:02:27,244
that form now this new ethereal
layer around the planet
28
00:02:27,246 --> 00:02:29,745
that's only growing
in all directions.
29
00:02:34,620 --> 00:02:38,354
Capabilities are being put
in the hands of policy makers,
30
00:02:38,356 --> 00:02:41,959
five years ago, they'd never
imagine that they would have.
31
00:02:41,961 --> 00:02:45,798
This is where big data
meets Big Brother.
32
00:03:07,286 --> 00:03:08,288
Should be here.
33
00:03:10,489 --> 00:03:12,489
It is kind
of in a rock, I think.
34
00:03:12,491 --> 00:03:14,458
Yeah, the entrance is in a rock.
35
00:03:14,460 --> 00:03:16,459
Or a bunker.
36
00:03:16,461 --> 00:03:18,463
Oh, yeah, the bunker.
It is down there!
37
00:03:21,699 --> 00:03:23,466
There is a
bunker under here.
38
00:03:23,468 --> 00:03:26,870
- Yeah.
- It is between 33 and 39.
39
00:03:26,872 --> 00:03:28,304
Right there.
Look at that door.
40
00:03:28,306 --> 00:03:29,538
- Yeah.
- Yeah, this is it.
41
00:03:29,540 --> 00:03:31,477
- Bahnhof.
- Okay.
42
00:03:53,799 --> 00:03:55,701
Hey, I guess we just go in.
43
00:04:55,560 --> 00:05:00,062
Many people believe that you have this
cloud services that are floating around.
44
00:05:00,064 --> 00:05:02,466
People think, "Okay,
it's a cloud server."
45
00:05:02,468 --> 00:05:05,935
But this is the actual physical
location of the Internet.
46
00:05:14,379 --> 00:05:17,714
It's a
constant struggle to protect data.
47
00:05:22,120 --> 00:05:26,589
The Swedish Security Police
wanted to install tools
48
00:05:26,591 --> 00:05:31,863
to automatically log in to our
data and get out the information.
49
00:05:32,964 --> 00:05:35,065
So I invited them
to our facility,
50
00:05:35,067 --> 00:05:37,466
and then I had a microphone
51
00:05:37,468 --> 00:05:42,675
which I was provided by the Swedish
Public Service, national radio.
52
00:05:57,055 --> 00:06:00,423
I taped this conversation,
and they were so angry.
53
00:06:00,425 --> 00:06:03,459
And they also wanted us
to sign a paper
54
00:06:03,461 --> 00:06:06,863
where they said that we could
not say anything about it.
55
00:06:06,865 --> 00:06:08,798
It should be total secrecy.
56
00:06:08,800 --> 00:06:13,202
They said, "If a terrorist attack
happens, it's your fault."
57
00:06:28,052 --> 00:06:30,553
It's, like, a creepy feeling.
58
00:06:30,555 --> 00:06:34,057
Nobody can say that
any facility is safe.
59
00:06:34,059 --> 00:06:38,998
There are always possibilities to go
in and find data and take it out.
60
00:06:42,634 --> 00:06:46,101
People say that, "Oh, I don't
have anything to hide.
61
00:06:46,103 --> 00:06:47,937
They can read my mail.
I don't have anything."
62
00:06:47,939 --> 00:06:51,041
But it's not that
which is this problem.
63
00:06:51,043 --> 00:06:55,611
The problem is, without secrecy,
there can be no democracy.
64
00:06:55,613 --> 00:06:58,483
Without secrecy,
there can be no market economy.
65
00:06:59,117 --> 00:07:00,750
Right.
66
00:07:00,752 --> 00:07:03,586
There is an obvious candidate
for the Nobel Peace Prize.
67
00:07:03,588 --> 00:07:05,956
- Really?
- And that is Edward Snowden.
68
00:07:05,958 --> 00:07:07,493
I mean, yeah.
69
00:07:21,273 --> 00:07:28,043
Does the public enjoy the same right
to privacy that we have in the past?
70
00:07:28,045 --> 00:07:30,846
Are we still private citizens,
71
00:07:30,848 --> 00:07:34,584
and then public officials, where the
government knows very little about us,
72
00:07:34,586 --> 00:07:35,985
but we know
everything about them?
73
00:07:35,987 --> 00:07:39,055
Why are we, the public,
becoming disempowered
74
00:07:39,057 --> 00:07:41,892
at the same time that
governments around the world,
75
00:07:41,894 --> 00:07:47,130
corporations around the world,
institutions around the world,
76
00:07:47,132 --> 00:07:52,067
are gaining greater and greater leverage
over the range of our activities,
77
00:07:52,069 --> 00:07:54,206
their knowledge of what we do?
78
00:08:07,952 --> 00:08:10,120
The Citizen Lab
is an unusual place.
79
00:08:13,257 --> 00:08:16,561
We're a research unit
at the University of Toronto.
80
00:08:18,697 --> 00:08:22,231
We combine the skills of
engineers, computer scientists
81
00:08:22,233 --> 00:08:24,034
with social scientists.
82
00:08:24,036 --> 00:08:26,769
We collaborate with people
from all over the world
83
00:08:26,771 --> 00:08:28,971
to do the field research
that we do.
84
00:08:28,973 --> 00:08:32,342
And we do this to advance
research on global security,
85
00:08:32,344 --> 00:08:34,280
cyberspace
and human rights.
86
00:08:37,149 --> 00:08:39,081
The world is
a very dangerous place
87
00:08:39,083 --> 00:08:42,319
as we saw recently in... in
tragic incidents in Paris,
88
00:08:42,321 --> 00:08:47,123
and you want to have security
agencies be well adept at discerning
89
00:08:47,125 --> 00:08:49,658
what those threats
are over our horizon.
90
00:08:49,660 --> 00:08:54,964
But is it okay that the government
sets up a giant digital X-ray machine
91
00:08:54,966 --> 00:08:56,833
over everything that we do?
92
00:08:56,835 --> 00:08:59,035
Because that's effectively
where we're headed right now.
93
00:09:02,374 --> 00:09:05,709
We've been a kind of
digital early warning system,
94
00:09:05,711 --> 00:09:07,844
scanning the horizon.
95
00:09:07,846 --> 00:09:10,814
And what we've seen, frankly,
has been really disturbing.
96
00:12:33,485 --> 00:12:37,320
Tibetans are watched
from every angle and from every corner.
97
00:12:37,322 --> 00:12:41,156
It's in their homes, it's in their
offices, it's in the streets.
98
00:12:41,158 --> 00:12:43,126
In Tibet,
certainly in central Tibet
99
00:12:43,128 --> 00:12:45,527
and around
the capital city of Lhasa,
100
00:12:45,529 --> 00:12:49,132
Chinese authorities, together
with Chinese corporations,
101
00:12:49,134 --> 00:12:51,300
telecommunications companies,
102
00:12:51,302 --> 00:12:56,071
they've integrated the ability to spy
on people via their mobile phone,
103
00:12:56,073 --> 00:12:59,074
via the last communications they
may have had over the Internet.
104
00:12:59,076 --> 00:13:02,280
Down to the closed circuit
television camera on the streets.
105
00:13:03,948 --> 00:13:07,050
The Chinese so strictly
control access to Tibet,
106
00:13:07,052 --> 00:13:09,017
it's just like a black hole
107
00:13:09,019 --> 00:13:12,254
for media,
for independent observers,
108
00:13:12,256 --> 00:13:13,992
for international agencies,
for anything.
109
00:13:44,188 --> 00:13:49,025
How I escaped is a secret.
110
00:14:07,645 --> 00:14:10,246
People are
incredibly courageous.
111
00:14:10,248 --> 00:14:13,449
People inside Tibet will
send out news and information.
112
00:14:13,451 --> 00:14:16,455
And they'll say,
"I want this story to be told."
113
00:14:17,554 --> 00:14:19,055
They could be imprisoned.
114
00:14:19,057 --> 00:14:20,422
They could be tortured.
115
00:14:20,424 --> 00:14:22,124
Their family
could pay the price.
116
00:14:23,394 --> 00:14:25,527
We on the outside have to decide
117
00:14:25,529 --> 00:14:31,199
how to walk this very, sort of, fine line
between protecting people's security
118
00:14:31,201 --> 00:14:34,970
and honoring their wishes about
getting news and information out.
119
00:14:34,972 --> 00:14:39,374
And we know for a fact,
thanks to Citizen Lab's report,
120
00:14:39,376 --> 00:14:42,478
that we are being
successfully targeted.
121
00:14:44,481 --> 00:14:49,118
A new report has been released from
a group of digital detectives.
122
00:14:49,120 --> 00:14:53,089
From their computers in Toronto,
they've tracked a high-tech spy ring
123
00:14:53,091 --> 00:14:54,360
that reaches around the world.
124
00:14:59,096 --> 00:15:00,262
For the past ten months,
125
00:15:00,264 --> 00:15:03,532
these computer experts have
been working as cyber sleuths
126
00:15:03,534 --> 00:15:06,969
hot on the trail of a massive
electronic spy network.
127
00:15:06,971 --> 00:15:11,273
They say it has taken control of
nearly 1,300 high-level computers
128
00:15:11,275 --> 00:15:13,443
in more than 100 countries.
129
00:15:13,445 --> 00:15:17,079
A discovery that could have
major political implications.
130
00:15:17,081 --> 00:15:19,581
They can extract any
document they wanted.
131
00:15:19,583 --> 00:15:23,552
They could turn on web cameras,
turn on audio devices,
132
00:15:23,554 --> 00:15:25,588
so that they could,
in effect, use the computers
133
00:15:25,590 --> 00:15:27,623
as a listening device
in the offices.
134
00:15:27,625 --> 00:15:30,359
The web of intrigue
started with the Dalai Lama
135
00:15:30,361 --> 00:15:32,163
who thought his computer
had been hacked.
136
00:15:36,368 --> 00:15:41,170
Up until about 2007 or 2008, I'd
never really heard of malware.
137
00:15:41,172 --> 00:15:43,506
You know, I'd heard
of viruses, obviously,
138
00:15:43,508 --> 00:15:46,475
but I hadn't really heard
about targeted malware attacks
139
00:15:46,477 --> 00:15:48,176
affecting
the human rights community.
140
00:15:53,551 --> 00:15:57,052
First time I heard about it was
in the context of the Tibetans.
141
00:15:57,054 --> 00:16:01,523
Gradually we started piecing together,
they are under surveillance.
142
00:16:01,525 --> 00:16:05,661
The surveillance comes
from groups within China.
143
00:16:05,663 --> 00:16:10,733
They're using malicious software
and socially-engineered e-mails.
144
00:16:10,735 --> 00:16:13,435
E-mails that are crafted
to get them to open it up
145
00:16:13,437 --> 00:16:15,274
to get inside their devices.
146
00:16:16,640 --> 00:16:18,741
Nart Villeneuve, a computer wiz,
147
00:16:18,743 --> 00:16:21,109
figured out
how the operation worked
148
00:16:21,111 --> 00:16:23,813
by getting the attackers
to hack into his computer.
149
00:16:23,815 --> 00:16:25,580
We're monitoring these groups
150
00:16:25,582 --> 00:16:27,717
for long periods of time,
151
00:16:27,719 --> 00:16:30,652
and you're essentially waiting
for them to screw up, right?
152
00:16:30,654 --> 00:16:32,722
And when they do,
you take advantage of that.
153
00:16:32,724 --> 00:16:34,824
Sometimes it takes a long time.
154
00:16:34,826 --> 00:16:38,060
You could be monitoring a group
for a year and get nothing.
155
00:16:38,062 --> 00:16:42,531
Then one day, they just use a
server that they don't lock down
156
00:16:42,533 --> 00:16:44,302
and all the data's
just sitting there.
157
00:16:46,236 --> 00:16:48,706
I was at home.
It was pretty late.
158
00:17:20,238 --> 00:17:21,636
Nart was scouring through it,
159
00:17:21,638 --> 00:17:24,440
trying to figure out
what actor is responsible
160
00:17:24,442 --> 00:17:26,642
for getting inside
the Dalai Lama's office.
161
00:17:26,644 --> 00:17:30,712
And there was a 22 or 24 character
string that kept coming up
162
00:17:30,714 --> 00:17:33,449
that he couldn't figure out,
"What is the meaning of this?"
163
00:17:33,451 --> 00:17:37,719
So on a whim, he just copied
and pasted it into Google.
164
00:17:37,721 --> 00:17:41,093
One website came up,
and it was Chinese characters.
165
00:17:44,662 --> 00:17:46,295
So he clicked on it.
166
00:17:48,732 --> 00:17:52,634
To my surprise, what came
back was the actual page
167
00:17:52,636 --> 00:17:56,905
that the attackers used to interface
with the compromised systems.
168
00:17:56,907 --> 00:18:00,910
So they set up a website where
they could monitor their victims.
169
00:18:00,912 --> 00:18:03,179
But they didn't
password protect it!
170
00:18:03,181 --> 00:18:06,117
So it was like a window
into everything they were doing.
171
00:18:16,693 --> 00:18:20,162
This wasn't just targeted
at Tibetan organizations
172
00:18:20,164 --> 00:18:22,398
or human rights organizations.
173
00:18:22,400 --> 00:18:26,469
This was global, a pretty
wide range of institutions
174
00:18:26,471 --> 00:18:29,438
that showed that these attackers were...
were quite busy.
175
00:18:29,440 --> 00:18:31,844
There was huge pickup in the media.
It was all over the world.
176
00:18:38,482 --> 00:18:42,287
And it put us on a different kind of
footing in terms of our credibility.
177
00:18:45,557 --> 00:18:49,458
In the cyber security community,
we were novices at that time.
178
00:18:49,460 --> 00:18:50,429
We were kind of outsiders.
179
00:18:52,931 --> 00:18:55,864
So we were kind of
calling it on the fly.
180
00:18:55,866 --> 00:18:57,799
Like, what do we do?
What's the right thing to do?
181
00:18:57,801 --> 00:18:59,367
Who do we notify?
182
00:18:59,369 --> 00:19:01,804
I knew that publishing it
was important.
183
00:19:01,806 --> 00:19:04,440
We had to redact a lot of the
information to protect people.
184
00:19:04,442 --> 00:19:06,776
Should we notify the government?
185
00:19:06,778 --> 00:19:08,710
Should we notify
the Canadian government?
186
00:19:08,712 --> 00:19:12,715
How do we notify other governments
that are being victimized?
187
00:19:12,717 --> 00:19:14,482
At the time, you know,
188
00:19:14,484 --> 00:19:17,353
we didn't want to completely disclose
everything that we had done,
189
00:19:17,355 --> 00:19:19,322
because we
wanted to do it again.
190
00:19:19,324 --> 00:19:22,725
In some of the communities
I mentioned, they loved it.
191
00:19:22,727 --> 00:19:26,228
But I got the feeling from,
certainly inside my own government,
192
00:19:26,230 --> 00:19:27,863
there was a lot of weirdness.
193
00:19:27,865 --> 00:19:31,366
- Are we allowed to speculate?
- Well, I think now we know
194
00:19:31,368 --> 00:19:35,938
because there's a Snowden disclosure
that explicitly references the fact
195
00:19:35,940 --> 00:19:38,540
that the Canadians
and the Americans,
196
00:19:38,542 --> 00:19:40,575
our signals
intelligence agencies,
197
00:19:40,577 --> 00:19:43,613
were piggybacking
off the GhostNet network.
198
00:19:43,615 --> 00:19:47,352
So, in publishing the report, we
basically broke up their party.
199
00:19:55,692 --> 00:19:59,362
From our initial samples from
the office of the Dalai Lama,
200
00:19:59,364 --> 00:20:02,297
they were actually compromised
by two distinct groups.
201
00:20:02,299 --> 00:20:05,433
The GhostNet group obviously
got the most attention.
202
00:20:05,435 --> 00:20:08,336
But there was another group
that was also active.
203
00:20:08,338 --> 00:20:10,739
The GhostNet group
shut down their operations,
204
00:20:10,741 --> 00:20:14,709
but the other group, um,
they're still going.
205
00:21:58,415 --> 00:22:01,650
In our research,
what we see are acts of war
206
00:22:01,652 --> 00:22:04,920
that take place
against citizens,
207
00:22:04,922 --> 00:22:06,921
using these very technologies.
208
00:22:06,923 --> 00:22:09,959
Getting inside the computers of
Tibetans and then arresting them,
209
00:22:09,961 --> 00:22:13,929
and possibly executing them,
is a kind of act of war.
210
00:22:16,000 --> 00:22:18,901
We see this sort
of thing every week, right?
211
00:22:18,903 --> 00:22:21,373
Minor to major versions of it.
212
00:22:23,875 --> 00:22:27,876
Everything on the site
is correct except this.
213
00:22:27,878 --> 00:22:31,913
So this... The last log-in on
the C panel was from Korea.
214
00:22:31,915 --> 00:22:34,417
- Mm-hmm.
- Do you guys have any work in Korea?
215
00:22:34,419 --> 00:22:36,151
- Is there any...
- No, no...
216
00:22:36,153 --> 00:22:39,121
So who actually accesses the website to
update it and all that sort of thing?
217
00:22:39,123 --> 00:22:41,526
- It must be somebody unauthorized.
- Yeah.
218
00:23:55,967 --> 00:23:58,737
One, two, three,
219
00:23:59,737 --> 00:24:04,576
four, five, six,
220
00:24:05,242 --> 00:24:07,008
seven.
221
00:26:27,317 --> 00:26:29,153
Hmm.
222
00:27:32,115 --> 00:27:35,450
Not that long ago, the government
of Pakistan put out this tender
223
00:27:35,452 --> 00:27:39,988
for proposals for a nationwide
Internet filtering system.
224
00:27:39,990 --> 00:27:43,225
They wanted to solicit proposals
from companies to build,
225
00:27:43,227 --> 00:27:46,096
effectively,
the Great Firewall of Pakistan.
226
00:27:52,236 --> 00:27:55,903
Today if you visit Pakistan
and you get online
227
00:27:55,905 --> 00:27:59,711
and you try to access YouTube,
this is what you'll see,
228
00:28:00,744 --> 00:28:01,979
a blocked page like this.
229
00:28:06,951 --> 00:28:09,086
I'm in Islamabad,
putting in a SIM card.
230
00:28:13,223 --> 00:28:16,091
First and foremost, I'm really
excited to see Shahzad.
231
00:28:16,093 --> 00:28:20,394
I first met Shahzad and
the organization Bytes for All,
232
00:28:20,396 --> 00:28:21,796
eight years ago, I think?
233
00:28:21,798 --> 00:28:24,499
And he's been involved,
in one way or another,
234
00:28:24,501 --> 00:28:26,370
in Citizen Lab research
ever since.
235
00:28:39,517 --> 00:28:42,721
- Hi, Shahzad.
- Hello!
236
00:28:44,188 --> 00:28:47,922
- So great to see you.
- Here we are. Here we are.
237
00:28:49,859 --> 00:28:52,059
Bytes for All does what they do,
238
00:28:52,061 --> 00:28:56,265
fight for Internet rights and
advocacy-based approach to Internet freedom
239
00:28:56,267 --> 00:28:58,901
under extreme duress.
240
00:28:58,903 --> 00:29:01,370
So they're operating
in a country that,
241
00:29:01,372 --> 00:29:04,238
specifically around media
and free expression,
242
00:29:04,240 --> 00:29:06,440
has got to be one of
the worst places in the world.
243
00:29:06,442 --> 00:29:10,112
Uh, journalists are
routinely kidnapped, murdered,
244
00:29:10,114 --> 00:29:12,948
uh, offices firebombed,
et cetera,
245
00:29:12,950 --> 00:29:15,120
and they've experienced
all of that.
246
00:29:16,487 --> 00:29:19,888
Death threats,
staff members kidnapped,
247
00:29:19,890 --> 00:29:23,892
his own son beat up and
thrown to the side of the road
248
00:29:23,894 --> 00:29:26,964
as a warning to Shahzad
not to do what he's doing.
249
00:29:31,035 --> 00:29:33,367
In my opinion,
250
00:29:33,369 --> 00:29:37,775
Internet has opened up
so many opportunities...
251
00:29:38,909 --> 00:29:40,508
for the people to express,
252
00:29:40,510 --> 00:29:44,947
and that is the sole reason that
we are fighting for open Internet.
253
00:29:44,949 --> 00:29:48,482
They lost their public spaces.
254
00:29:48,484 --> 00:29:52,321
They lost their ability
to go out freely.
255
00:29:52,323 --> 00:29:56,290
So, as they are putting controls
and curbs on physical spaces,
256
00:29:56,292 --> 00:30:00,295
they are doing exactly the same
in online spaces as well.
257
00:30:00,297 --> 00:30:04,232
So precisely the reason we are standing
out there to reclaim those spaces.
258
00:30:04,234 --> 00:30:05,933
And we have to at some point,
259
00:30:05,935 --> 00:30:07,504
and we'll continue to do that.
260
00:30:08,939 --> 00:30:11,472
Oh, my God.
261
00:30:11,474 --> 00:30:15,110
The government has the ability
to ban specific pages.
262
00:30:17,181 --> 00:30:19,448
You ban all of
Facebook, businesses are suffering,
263
00:30:19,450 --> 00:30:20,548
people communicate.
264
00:30:20,550 --> 00:30:23,384
I mean, you can
laugh and joke and say,
265
00:30:23,386 --> 00:30:26,153
"For a few days people won't play
FarmVille," but it's not about that.
266
00:30:26,155 --> 00:30:29,490
It's about your fundamental
rights being snatched from you
267
00:30:29,492 --> 00:30:33,061
and no government, in my opinion,
should have the ability to do that.
268
00:30:33,063 --> 00:30:34,462
Right.
269
00:30:34,464 --> 00:30:37,599
Not only that, they banned
Wikipedia for a little while.
270
00:30:37,601 --> 00:30:39,167
- Yes, mm-hmm.
- YouTube.
271
00:30:39,169 --> 00:30:42,470
Uh, about several thousand
websites were affected.
272
00:30:42,472 --> 00:30:46,107
I think the Internet is
this vast, unregulated,
273
00:30:46,109 --> 00:30:48,610
wonderful, democratizing space
274
00:30:48,612 --> 00:30:51,380
and no matter what anyone does,
people will find a way.
275
00:31:43,534 --> 00:31:46,701
Hi, I'm Sabeen Mahmud, and I'm
the director of Peace Nation,
276
00:31:46,703 --> 00:31:48,737
a nonprofit organization.
277
00:31:48,739 --> 00:31:51,739
I've always believed that technology
is always the driver of change,
278
00:31:51,741 --> 00:31:55,009
not business, not governments,
but technology.
279
00:31:55,011 --> 00:32:00,082
And gender-based violence
has always existed
280
00:32:00,084 --> 00:32:03,584
but with the advent of the Internet and
the number of social networking tools,
281
00:32:03,586 --> 00:32:06,555
I think it's
a great mobilization platform.
282
00:32:25,709 --> 00:32:28,477
Sabeen Mahmud
was leaving a Karachi restaurant
283
00:32:28,479 --> 00:32:31,212
when the gunman
attacked her in her car.
284
00:32:31,214 --> 00:32:34,382
Her mother who was also
accompanying her was wounded
285
00:32:34,384 --> 00:32:36,551
and now is in a critical
condition.
286
00:32:36,553 --> 00:32:40,055
Mahmud was taken to a hospital
where she was pronounced dead.
287
00:32:56,406 --> 00:33:01,543
When she spoke in physical
spaces, nothing happened.
288
00:33:01,545 --> 00:33:05,313
When she was carrying on her
campaign, she was not targeted.
289
00:33:05,315 --> 00:33:07,382
People were amused or they
ignored her,
290
00:33:07,384 --> 00:33:09,584
or they just walked past.
291
00:33:09,586 --> 00:33:14,088
But when this whole, sort of,
campaign
292
00:33:14,090 --> 00:33:16,357
hit the Internet
and the social media,
293
00:33:16,359 --> 00:33:18,526
that's when
the lynch mobs gathered.
294
00:33:18,528 --> 00:33:21,196
And one of
the reasons I find is,
295
00:33:21,198 --> 00:33:27,235
that speech in a physical space lasts
only as long as you're speaking.
296
00:33:27,237 --> 00:33:33,574
But once it is uploaded onto the Internet
on any platform, it is there forever.
297
00:33:33,576 --> 00:33:38,212
And then your attackers or,
you know, whoever opposes you,
298
00:33:38,214 --> 00:33:40,449
they gather,
and then they spread it further
299
00:33:40,451 --> 00:33:43,785
and more and more
people join that group
300
00:33:43,787 --> 00:33:47,424
of people who are attacking and
it takes on a life of its own.
301
00:34:07,376 --> 00:34:10,244
We're going through
a demographic revolution.
302
00:34:10,246 --> 00:34:15,182
The center of gravity of cyberspace
is shifting right before our eyes.
303
00:34:15,184 --> 00:34:18,552
From the north and the west of the
planet, where it was invented,
304
00:34:18,554 --> 00:34:21,188
to the South and the East.
305
00:34:21,190 --> 00:34:25,360
The vast majority of Internet
users today and into the future
306
00:34:25,362 --> 00:34:27,394
are coming
from the developing world,
307
00:34:27,396 --> 00:34:30,699
for whom these technologies
are empowering.
308
00:34:30,701 --> 00:34:35,737
What should we expect then from
these next billion digital users
309
00:34:35,739 --> 00:34:38,539
as they come online
in the post-Snowden era?
310
00:36:47,704 --> 00:36:50,371
Once we started
with Midia Ninja,
311
00:36:50,373 --> 00:36:54,309
and we went to the streets
and tried to do live streaming.
312
00:36:54,311 --> 00:36:58,012
There was a mobile station
with an electric generator
313
00:36:58,014 --> 00:37:00,481
using gasoline, you know,
314
00:37:00,483 --> 00:37:05,487
a 4G modem, a laptop,
a camera, a video switcher and...
315
00:37:26,576 --> 00:37:29,311
It was good
in the first two or three times
316
00:37:29,313 --> 00:37:31,646
in more calm demonstrations.
317
00:37:31,648 --> 00:37:34,048
I remember there was a discussion,
and then Carioca said,
318
00:37:34,050 --> 00:37:37,786
"No, I found an app.
319
00:37:37,788 --> 00:37:40,688
Its name is TwitCasting
and maybe we can try it."
320
00:37:42,893 --> 00:37:48,565
It was a Japanese free app used by
teenagers to hang out, you know.
321
00:38:19,829 --> 00:38:23,731
Looking at Brazil, this is one
of those cases where you have
322
00:38:23,733 --> 00:38:25,900
a sporting event, in this case,
323
00:38:25,902 --> 00:38:31,005
which triggers all sorts of
extra concern around security
324
00:38:31,007 --> 00:38:34,376
and the control of information,
much of it legitimate.
325
00:38:34,378 --> 00:38:39,046
But what often happens is that
the layering of surveillance,
326
00:38:39,048 --> 00:38:42,450
extra-legal measures that
happens leading up to
327
00:38:42,452 --> 00:38:45,619
and during these events
doesn't just disappear.
328
00:38:45,621 --> 00:38:47,988
It becomes part of
the permanent architecture.
329
00:39:16,119 --> 00:39:19,554
Mobile phones are prevalent.
Everyone has one in their hands.
330
00:39:19,556 --> 00:39:22,724
And the police
now use a technique
331
00:39:22,726 --> 00:39:27,662
where they set up fake cell phone towers
that captures everyone within the vicinity
332
00:39:27,664 --> 00:39:31,800
and gathers up identifying information
that's emitted by the cell phones,
333
00:39:31,802 --> 00:39:33,901
which they then
use to track people
334
00:39:33,903 --> 00:39:36,170
and associate them
with each other
335
00:39:36,172 --> 00:39:39,740
and being at specific
physical events like a protest
336
00:39:39,742 --> 00:39:42,142
and the government
can go back in time
337
00:39:42,144 --> 00:39:47,081
and re-create every facet of your
life on that particular day and hour.
338
00:39:47,083 --> 00:39:49,516
With whom
you were communicating.
339
00:39:49,518 --> 00:39:52,454
Not only what you're broadcasting
but what you're saying privately
340
00:39:52,456 --> 00:39:55,059
and use this to incriminate you
down the road.
341
00:41:18,541 --> 00:41:21,141
People realize there's
some hidden mechanism of power
342
00:41:21,143 --> 00:41:23,778
going on through surveillance.
343
00:41:23,780 --> 00:41:27,615
And you begin to suspect, maybe,
this device you can't trust.
344
00:41:27,617 --> 00:41:30,784
Maybe the state's in here
or it's in my mobile phone or...
345
00:41:30,786 --> 00:41:33,253
And as that kind of
seeps out there,
346
00:41:33,255 --> 00:41:36,891
people become much more
unwilling to take risks.
347
00:41:36,893 --> 00:41:37,992
You know, even in our own work,
348
00:41:37,994 --> 00:41:41,329
we're much more cautious
about what we say over e-mail,
349
00:41:41,331 --> 00:41:43,764
worried that
somebody's listening and so on.
350
00:41:43,766 --> 00:41:47,334
It's like sand in the machinery.
It kind of slows things down
351
00:41:47,336 --> 00:41:50,637
and everything becomes
much more complicated,
352
00:41:50,639 --> 00:41:53,273
just to communicate
basic instructions.
353
00:41:53,275 --> 00:41:55,712
You're like, "Oh,
first I have to encrypt it."
354
00:41:57,313 --> 00:42:00,748
All these technologies too,
cryptography things,
355
00:42:00,750 --> 00:42:02,684
they might be getting cheap,
356
00:42:02,686 --> 00:42:07,822
but if we consider in terms
of time, they are expensive.
357
00:42:07,824 --> 00:42:11,325
You know, people are being
murdered every day in the favelas.
358
00:42:11,327 --> 00:42:14,362
The military police
are still running.
359
00:42:14,364 --> 00:42:17,898
So it's complicated now
to stop the machines
360
00:42:17,900 --> 00:42:21,070
and adapt our system
to a more safe mode.
361
00:46:40,996 --> 00:46:43,898
So at the same time
that you have so many people
362
00:46:43,900 --> 00:46:48,369
able to communicate to
a global audience at an instant,
363
00:46:48,371 --> 00:46:53,074
governments, in ways that
they weren't 20 years ago,
364
00:46:53,076 --> 00:46:58,246
are really ramping up information
controls because they see...
365
00:46:58,248 --> 00:47:01,148
And when we say "governments," we're
really talking about entrenched powers,
366
00:47:01,150 --> 00:47:06,153
institutionalized, uh, you know,
forms of capitalism in the state
367
00:47:06,155 --> 00:47:09,123
that see, you know,
368
00:47:09,125 --> 00:47:13,494
this type of unpredictable citizen
activism as a threat to their interests
369
00:47:13,496 --> 00:47:15,932
and are developing ways
to counter it.
370
00:47:18,300 --> 00:47:20,369
You have new challenges today.
371
00:47:22,204 --> 00:47:25,942
Sensitive data is transmitted
over encrypted channels.
372
00:47:26,976 --> 00:47:29,577
You need more.
373
00:47:29,579 --> 00:47:32,382
You want to look through
your target's eyes.
374
00:47:34,650 --> 00:47:36,619
You have to hack your target.
375
00:47:42,592 --> 00:47:47,030
You have to overcome encryption
and capture relevant data.
376
00:47:48,630 --> 00:47:51,467
Being stealth and untraceable.
377
00:47:54,938 --> 00:47:56,940
Exactly what we do.
378
00:48:02,311 --> 00:48:07,148
The vendors of these products and
services market them to governments,
379
00:48:07,150 --> 00:48:09,083
usually at trade shows
380
00:48:09,085 --> 00:48:13,153
that are only open to accredited law
enforcement and intelligence agencies.
381
00:48:13,155 --> 00:48:16,691
Actually, I've got
a big binder that I can...
382
00:48:16,693 --> 00:48:19,526
So, if you ignore the bag,
actually which...
383
00:48:21,063 --> 00:48:25,231
someone, uh, deposited
these in as a gift to me,
384
00:48:25,233 --> 00:48:29,202
but I think was hoping to disguise
it in the kindergarten bag.
385
00:48:29,204 --> 00:48:35,108
These are brochures from the type of
trade shows that we're talking about,
386
00:48:35,110 --> 00:48:39,280
products and services that allow
cell phone detection,
387
00:48:39,282 --> 00:48:41,550
uh, insertion of malware...
388
00:48:43,753 --> 00:48:47,021
tracking,
social media monitoring.
389
00:48:47,023 --> 00:48:50,023
In many ways, the way to
think about this market
390
00:48:50,025 --> 00:48:53,526
is that it's the commercialization
of cyber crime.
391
00:48:53,528 --> 00:48:57,430
You trick somebody into
installing a software program
392
00:48:57,432 --> 00:48:59,532
that contains malicious code
393
00:48:59,534 --> 00:49:02,168
that exploits some vulnerability
in the system,
394
00:49:02,170 --> 00:49:06,206
which then allows the attacker
to do anything they want.
395
00:49:06,208 --> 00:49:09,577
Turn on the webcam,
listen in on the microphone,
396
00:49:09,579 --> 00:49:13,780
record keystrokes, record
the location, the movement.
397
00:49:13,782 --> 00:49:16,383
It operates without
much accountability,
398
00:49:16,385 --> 00:49:20,021
certainly no corporate
social responsibility,
399
00:49:20,023 --> 00:49:23,124
ripe for abuse in a place
like Sudan or Ethiopia.
400
00:49:23,126 --> 00:49:25,525
We've seen in one
case after another,
401
00:49:25,527 --> 00:49:28,628
how this ends up being used
to target civil society.
402
00:49:28,630 --> 00:49:29,632
Aha.
403
00:49:31,300 --> 00:49:32,800
Gamma Group.
404
00:49:32,802 --> 00:49:35,769
Maker of the notorious
FinFisher spyware.
405
00:52:18,668 --> 00:52:23,570
The attacker has to socially
engineer or convince the target
406
00:52:23,572 --> 00:52:28,409
to open a file or to, you know, click
through some security warning,
407
00:52:28,411 --> 00:52:30,811
um, in order to become infected.
408
00:52:30,813 --> 00:52:36,217
We had found a document that had pictures
of Ethiopian opposition leaders in it,
409
00:52:36,219 --> 00:52:38,619
and it looked like it was
targeted and designed to appeal
410
00:52:38,621 --> 00:52:40,920
to members of
the Ethiopian diaspora.
411
00:52:40,922 --> 00:52:43,757
Uh, but in fact,
the file was cleverly disguised
412
00:52:43,759 --> 00:52:46,526
to look like a document that's
actually a computer program,
413
00:52:46,528 --> 00:52:48,262
an executable file.
414
00:52:48,264 --> 00:52:50,496
So when you run this, it will
install software on your computer
415
00:52:50,498 --> 00:52:53,233
even though, you know, they
changed the icon and everything
416
00:52:53,235 --> 00:52:56,369
to make it look like this
is a document or a picture.
417
00:52:56,371 --> 00:52:57,540
This is actually a program.
418
00:53:31,773 --> 00:53:34,941
I was able to look at the memory
of an infected computer.
419
00:53:34,943 --> 00:53:37,878
In other words, what's going on inside
the computer when it's infected.
420
00:53:37,880 --> 00:53:42,316
And I was able to identify several
interesting artifacts in the memory,
421
00:53:42,318 --> 00:53:45,519
including a bunch of strings
that said "FinFisher," "FinSpy,"
422
00:53:45,521 --> 00:53:47,824
very clearly attributing this
to the company.
423
00:54:23,793 --> 00:54:27,728
You don't have to be the NSA to
get inside somebody's computer.
424
00:54:27,730 --> 00:54:31,065
Um, instead you can
exploit their curiosity,
425
00:54:31,067 --> 00:54:34,934
their, um, need to communicate.
426
00:54:34,936 --> 00:54:38,572
And of course, journalists, at
the very heart of what they do,
427
00:54:38,574 --> 00:54:42,543
is engage in communication
with a lot of people
428
00:54:42,545 --> 00:54:45,445
and a lot of people that they
don't know and trust necessarily.
429
00:54:45,447 --> 00:54:48,816
Because they're engaged in outreach and
communicating constantly with sources.
430
00:55:02,398 --> 00:55:06,133
Fifty years ago, nobody would have
known what happened in Syria.
431
00:55:06,135 --> 00:55:10,436
But in 2011, when it started,
everybody had Facebook.
432
00:55:10,438 --> 00:55:15,978
Everybody has e-mails and
everybody has WhatsApp and Viber.
433
00:55:17,413 --> 00:55:19,380
So you just can't stop people
434
00:55:19,382 --> 00:55:22,048
from telling
what is happening to them.
435
00:55:22,050 --> 00:55:25,052
So when they besieged Daraa
at the beginning,
436
00:55:25,054 --> 00:55:29,789
they shut down communication, Internet,
land lines and even electricity.
437
00:55:29,791 --> 00:55:34,026
But they did not know that in the
21st century, people have their ways.
438
00:55:34,028 --> 00:55:37,164
People were charging their mobiles
from their cars or generators,
439
00:55:37,166 --> 00:55:40,767
hand generators,
um, manual generators.
440
00:55:40,769 --> 00:55:44,737
And people were using
satellite connections.
441
00:55:44,739 --> 00:55:49,543
You don't need to use the country, uh,
Internet to be connected to the Internet.
442
00:55:49,545 --> 00:55:50,943
You can use anything.
443
00:55:50,945 --> 00:55:54,981
And they were able to tell
what was happening to them.
444
00:55:54,983 --> 00:56:00,720
Um, so the story got around.
445
00:56:09,063 --> 00:56:12,965
A few years ago many of us
celebrated the Arab Spring
446
00:56:12,967 --> 00:56:16,103
as the paradigm of what
these technologies could do.
447
00:56:16,105 --> 00:56:19,472
Remember we called it at the
time "liberation technologies."
448
00:56:19,474 --> 00:56:21,641
They would bring about the end
of authoritarian rule.
449
00:56:29,518 --> 00:56:35,222
Unfortunately, Syria has become
the Arab Spring's dark aftermath.
450
00:56:42,465 --> 00:56:45,699
As groups
sympathetic to the Assad regime
451
00:56:45,701 --> 00:56:50,003
have employed off-the-shelf malware crime
kits to infiltrate social networks,
452
00:56:50,005 --> 00:56:53,539
arrest, torture and
murder opposition groups
453
00:56:53,541 --> 00:56:55,511
and even target
their air strikes.
454
00:57:24,639 --> 00:57:28,275
From the beginning, we believed that
the camera is the most powerful weapon,
455
00:57:28,277 --> 00:57:30,811
and it was actually
the only weapon we have
456
00:57:30,813 --> 00:57:32,782
to deliver our own message
to the whole world.
457
00:57:40,822 --> 00:57:42,655
This is interesting.
458
00:57:42,657 --> 00:57:44,258
Baraa?
459
00:57:48,931 --> 00:57:53,833
It's a pleasure for me to
introduce one of my best friends,
460
00:57:53,835 --> 00:57:59,273
Mr. Baraa, he's one of the most
activist people inside Syria.
461
00:57:59,275 --> 00:58:02,642
He came a few days ago
'cause he has...
462
00:58:02,644 --> 00:58:07,981
He has... many broken
bones on his body.
463
00:58:10,552 --> 00:58:13,655
He was there and covered
the battle in Daraa City.
464
00:58:17,059 --> 00:58:20,059
And in the afternoon,
they get a tank shell.
465
00:58:22,931 --> 00:58:26,635
He was with his friend,
whom has this camera.
466
00:58:28,036 --> 00:58:30,170
And that good guy, you know,
he gets killed
467
00:58:30,172 --> 00:58:33,706
by one tank shell
from the regime's side.
468
00:58:36,644 --> 00:58:38,244
This video, you will see now,
469
00:58:38,246 --> 00:58:42,751
a remote control car and
it exploded, a huge explosion.
470
00:58:44,286 --> 00:58:45,954
It was filmed
by this camera.
471
00:58:50,726 --> 00:58:51,791
After that,
472
00:58:51,793 --> 00:58:53,994
the rocket launchers
473
00:58:53,996 --> 00:58:55,965
started to hit the place
from the regime's side.
474
00:58:57,199 --> 00:59:01,001
So our activist, this media guy,
475
00:59:01,003 --> 00:59:04,304
he gets killed in here
in this exact... this place.
476
00:59:04,306 --> 00:59:07,139
Now here.
He was standing here.
477
00:59:07,141 --> 00:59:10,010
And people found
the camera with him.
478
00:59:10,012 --> 00:59:12,615
We took out the memory card,
and we post this...
479
00:59:13,815 --> 00:59:16,218
as, you know,
in memory of Hussain.
480
00:59:31,666 --> 00:59:35,769
So now, Mr. Baraa here,
just a few days just to heal.
481
00:59:35,771 --> 00:59:40,173
He paid a visit to some
hospitals to check out himself,
482
00:59:40,175 --> 00:59:44,013
then he will go back into Syria
to keep working.
483
00:59:45,880 --> 00:59:48,648
There is a war on Facebook.
484
00:59:48,650 --> 00:59:53,787
Uh, every side is using Facebook
to promote themselves.
485
01:00:05,668 --> 01:00:08,901
The other way around,
the regime will say,
486
01:00:08,903 --> 01:00:12,838
"We will occupy this area.
We will take over this area."
487
01:00:12,840 --> 01:00:15,941
Then the FSA would leave because
they're afraid of bombardment.
488
01:00:15,943 --> 01:00:16,980
It's just a game.
489
01:00:18,047 --> 01:00:19,248
Facebook is a game.
490
01:00:28,757 --> 01:00:30,092
It was just a silly joke I made.
491
01:00:31,427 --> 01:00:35,195
I didn't hurt anybody.
I didn't insult anyone.
492
01:00:35,197 --> 01:00:39,231
It was not political.
It was not racist.
493
01:00:39,233 --> 01:00:42,168
There is nothing
that they could hold against me
494
01:00:42,170 --> 01:00:44,106
with a thing that
I wrote on Facebook.
495
01:00:46,108 --> 01:00:49,879
But still,
at a time of war...
496
01:00:52,047 --> 01:00:53,115
people get crazy.
497
01:01:01,724 --> 01:01:06,092
They did not drag me
in the street or kidnap me.
498
01:01:06,094 --> 01:01:09,262
They just asked me to come
to ask me a few questions.
499
01:01:09,264 --> 01:01:12,164
This is what they said, so I
signed the paper that I'm coming.
500
01:01:12,166 --> 01:01:18,273
I went the next morning at
11:30, to the detention center.
501
01:01:19,942 --> 01:01:22,008
The security guy came to me.
502
01:01:22,010 --> 01:01:25,445
He's like...
He's like half of my height.
503
01:01:25,447 --> 01:01:27,847
He blindfolded me,
and I was like,
504
01:01:27,849 --> 01:01:31,184
I was okay with that
because I thought, it's some...
505
01:01:31,186 --> 01:01:37,023
it's confidential secrets of the country
that they don't want me to see.
506
01:01:37,025 --> 01:01:41,764
And then I was presented to the
detective or the interrogator.
507
01:01:42,431 --> 01:01:43,432
I never saw him.
508
01:01:46,434 --> 01:01:50,970
He told me, "You're a computer engineer.
Please be seated."
509
01:01:50,972 --> 01:01:55,775
And I sat next to him and he started
reading all my Facebook posts.
510
01:01:55,777 --> 01:01:56,812
I was like, "Oh."
511
01:02:08,489 --> 01:02:10,891
One of the posts
that I wrote was,
512
01:02:10,893 --> 01:02:13,959
"No praying, no fasting
until the regime falls,"
513
01:02:13,961 --> 01:02:15,764
which was actually
making fun of both sides.
514
01:02:16,498 --> 01:02:18,063
And I laughed and he's like,
515
01:02:18,065 --> 01:02:20,869
"I'm not kidding with you.
I'm not joking with you."
516
01:02:24,172 --> 01:02:26,438
He kicked me on my chest
517
01:02:26,440 --> 01:02:31,577
and then he requested
the same short guy,
518
01:02:31,579 --> 01:02:33,512
because he was
there in the room,
519
01:02:33,514 --> 01:02:35,514
to bring something called
the "flying carpet,"
520
01:02:35,516 --> 01:02:37,284
which is a torturing machine.
521
01:02:37,286 --> 01:02:42,054
It's a wooden board,
like the door,
522
01:02:42,056 --> 01:02:45,127
but it has joints in the middle
that can flip.
523
01:02:46,027 --> 01:02:50,162
And I had to lay on it.
524
01:02:50,164 --> 01:02:54,501
They tied my wrists and they tied me
from the middle, they tied my legs.
525
01:02:54,503 --> 01:02:59,305
And they just closed it
so my knees touched my chest.
526
01:02:59,307 --> 01:03:01,608
He took off my shoes
and my socks
527
01:03:01,610 --> 01:03:07,250
and started beating me with a
metal, uh, with a metal whip.
528
01:03:09,885 --> 01:03:13,856
The pain is unbelievable.
529
01:03:14,889 --> 01:03:16,356
You just can't take it anymore.
530
01:03:16,358 --> 01:03:20,363
You just can't endure
this amount of agony.
531
01:03:28,971 --> 01:03:32,304
What we saw in Syria
was a lot of use of, say,
532
01:03:32,306 --> 01:03:34,541
off-the-shelf remote access
tools.
533
01:03:34,543 --> 01:03:38,211
So this is sort of software that you can
get from underground message boards
534
01:03:38,213 --> 01:03:40,579
or maybe purchase
for not so much money.
535
01:03:40,581 --> 01:03:44,617
Maybe $200-300 that
give you the ability
536
01:03:44,619 --> 01:03:47,554
to record someone's keystrokes,
read their e-mails,
537
01:03:47,556 --> 01:03:50,956
even look at them
through their webcam.
538
01:03:50,958 --> 01:03:53,392
Record via
the computer's microphone,
539
01:03:53,394 --> 01:03:56,231
conversations that are being had
around the target's computer.
540
01:03:57,465 --> 01:03:59,999
Frequently what you would see
541
01:04:00,001 --> 01:04:02,668
is it would be bundled
with some type of lured document
542
01:04:02,670 --> 01:04:07,072
which showed
a deep understanding
543
01:04:07,074 --> 01:04:09,943
of the psychology of the people
they were trying to target.
544
01:04:09,945 --> 01:04:14,680
For instance, one of the documents
that was sent out that I keenly recall
545
01:04:14,682 --> 01:04:17,182
was a list.
546
01:04:17,184 --> 01:04:23,188
A purported list of insurgents
identified by the Syrian government.
547
01:04:23,190 --> 01:04:28,193
So of course what happened was that
this was promptly passed around
548
01:04:28,195 --> 01:04:31,298
to all sorts of very
interesting groups in Syria
549
01:04:31,300 --> 01:04:34,300
because everyone wanted to know
if they were on this list or not.
550
01:04:34,302 --> 01:04:40,106
So the actual spyware payload itself
wasn't particularly sophisticated,
551
01:04:40,108 --> 01:04:43,175
but the social...
552
01:04:43,177 --> 01:04:46,479
the social and social engineering
side of that operation,
553
01:04:46,481 --> 01:04:48,551
um, was quite smart.
554
01:04:55,023 --> 01:04:58,494
Internet entered almost
all countries in the region
555
01:04:59,527 --> 01:05:01,029
before it entered Syria.
556
01:05:02,230 --> 01:05:03,229
Yes.
557
01:05:03,231 --> 01:05:05,565
Government in Syria,
558
01:05:05,567 --> 01:05:08,068
we are not as developed
as Canada, for example,
559
01:05:08,070 --> 01:05:10,103
or not as developed
as United States.
560
01:05:10,105 --> 01:05:13,206
In Canada they can monitor
people and control people
561
01:05:13,208 --> 01:05:16,075
and spy people in
a very intelligent way.
562
01:05:16,077 --> 01:05:18,514
And even they don't
feel that they are...
563
01:05:21,382 --> 01:05:22,715
spied on.
564
01:05:22,717 --> 01:05:27,556
But in Syria,
of course you go to old ways.
565
01:05:34,329 --> 01:05:37,229
They untie me and then I was...
566
01:05:37,231 --> 01:05:39,999
and then he asked me to
sit next to him, and he said,
567
01:05:40,001 --> 01:05:41,003
"Let's start talking."
568
01:05:42,704 --> 01:05:46,271
And I told him, "I don't want
to talk to you anymore."
569
01:05:46,273 --> 01:05:52,612
He said, "I want you to admit you work
with the Free Syrian Electronic Army."
570
01:05:52,614 --> 01:05:55,248
I was like,
"I don't know what that is."
571
01:05:55,250 --> 01:05:58,554
He said, "You like their page. You
like their page on Facebook."
572
01:06:00,021 --> 01:06:02,021
I told him,
"I like their page on Facebook,
573
01:06:02,023 --> 01:06:05,124
but there are too many pages
on Facebook that you can like.
574
01:06:05,126 --> 01:06:07,563
I also like Assad's page
on Facebook."
575
01:06:09,231 --> 01:06:11,664
Well, that did not convince him.
576
01:06:11,666 --> 01:06:16,802
So his boss came and he told
him, "What is going on?"
577
01:06:16,804 --> 01:06:21,307
He told him, "This is the Facebook
guy, and he's not cooperating."
578
01:06:21,309 --> 01:06:25,612
So then his boss told him to,
"Send him down to the basement,
579
01:06:25,614 --> 01:06:29,615
peel his skin off and just
remind me of him after a month."
580
01:06:29,617 --> 01:06:32,284
And I was like, "Can we go
back to the flying carpet?"
581
01:06:35,623 --> 01:06:37,523
I stayed there
for almost a month,
582
01:06:37,525 --> 01:06:41,096
and then I was released
with a presidential amnesty.
583
01:06:43,197 --> 01:06:46,099
So I went in a taxi,
584
01:06:46,101 --> 01:06:50,235
covered with dust,
dirt, shit and blood,
585
01:06:50,237 --> 01:06:53,639
all over my face,
my clothes.
586
01:06:53,641 --> 01:06:57,776
And then the taxi driver felt pity
for me, and he gave me a cigarette.
587
01:06:57,778 --> 01:07:00,048
I remember
that was the first time I cried.
588
01:07:03,184 --> 01:07:07,287
And I went to my flat in Latakia
where I used to study,
589
01:07:07,289 --> 01:07:09,158
and my roommates were
shocked to see me alive.
590
01:07:10,791 --> 01:07:14,764
And then, like, two weeks after
that I fled the country.
591
01:07:16,197 --> 01:07:17,697
I came to Jordan.
592
01:07:17,699 --> 01:07:18,768
I am a journalist now.
593
01:07:32,246 --> 01:07:35,782
With Syria, a lot of the
bad things that are happening
594
01:07:35,784 --> 01:07:39,151
are happening to people who
don't look like Westerners.
595
01:07:39,153 --> 01:07:42,722
The bad things happening to
these people through technology,
596
01:07:42,724 --> 01:07:46,191
through the risks
inherent in technology,
597
01:07:46,193 --> 01:07:49,295
are not different than the kinds
of risks that we may face,
598
01:07:49,297 --> 01:07:51,530
um, although they look
different.
599
01:07:51,532 --> 01:07:52,831
We see in the news
almost every day,
600
01:07:52,833 --> 01:07:56,568
a report of a breach,
some kind of a large hack.
601
01:07:56,570 --> 01:07:58,905
Data being exploited somewhere.
602
01:07:58,907 --> 01:08:01,773
It's the same problem, but in
Syria, it looks very different
603
01:08:01,775 --> 01:08:04,510
and because there are
dark-skinned people,
604
01:08:04,512 --> 01:08:07,246
uh, and there are guns
and a foreign language,
605
01:08:07,248 --> 01:08:10,249
it feels, I think to many,
exotic and different,
606
01:08:10,251 --> 01:08:11,717
and it couldn't happen here.
607
01:08:11,719 --> 01:08:14,354
And I think, in fact,
what you're seeing in Syria
608
01:08:14,356 --> 01:08:17,357
is this is what happens
when the risks get higher
609
01:08:17,359 --> 01:08:18,828
but the technology is the same.
610
01:08:20,328 --> 01:08:21,664
They're using the same Facebook
that we are.
611
01:11:08,529 --> 01:11:11,397
What is this? This is surreal.
612
01:12:51,666 --> 01:12:54,470
Lots of people were there,
by 7:00 in the night,
613
01:12:55,436 --> 01:12:57,803
and we were live.
614
01:13:02,644 --> 01:13:06,845
Suddenly a man came to Carioca,
and he asked to interview him.
615
01:13:10,717 --> 01:13:14,986
And then the military police
came to Carioca, searched his bag.
616
01:13:14,988 --> 01:13:19,558
And then they said
he should be taken to jail
617
01:13:19,560 --> 01:13:23,862
as a preventive arrestment,
to be searched and inquired.
618
01:13:29,470 --> 01:13:33,973
How this information was being
virilized was really amazing.
619
01:13:33,975 --> 01:13:36,608
Like sharing, sharing, sharing,
tweets, tweets, tweets,
620
01:13:36,610 --> 01:13:37,943
mention, mention, mention.
621
01:13:37,945 --> 01:13:39,711
"The Ninja is being arrested."
622
01:13:39,713 --> 01:13:42,113
And suddenly there was,
like, a small crowd.
623
01:13:42,115 --> 01:13:44,483
Like 5,000 people.
624
01:13:44,485 --> 01:13:47,219
And all of them was
screaming together,
625
01:15:18,246 --> 01:15:21,580
Then we posted this
video from the mobile, like, real time,
626
01:15:21,582 --> 01:15:23,251
and it virilized very fast.
627
01:18:16,356 --> 01:18:19,825
The video was just getting
bigger in the social media.
628
01:18:19,827 --> 01:18:21,794
Bruno Teles became a character.
629
01:18:50,858 --> 01:18:53,224
They said
that Bruno was innocent,
630
01:18:53,226 --> 01:18:57,929
and they used Midia Ninja image.
631
01:18:57,931 --> 01:19:00,199
And they credited Midia Ninja.
632
01:19:00,201 --> 01:19:03,501
It was the first time
that we were seeing
633
01:19:03,503 --> 01:19:08,107
Globo recognizing
a free media collective
634
01:19:08,109 --> 01:19:12,544
as a legitimate player
in the communication game.
635
01:19:12,546 --> 01:19:15,317
It was a next step.
636
01:19:46,314 --> 01:19:51,887
Oh, he's changing his shirt.
637
01:22:05,152 --> 01:22:10,188
Ninja! Ninja! Ninja!
638
01:22:29,275 --> 01:22:30,211
Ninja!
639
01:22:59,273 --> 01:23:02,775
I've always been a fan of the
terms "hacking" and "hacktivism."
640
01:23:02,777 --> 01:23:04,410
Especially "hacktivism"
641
01:23:04,412 --> 01:23:07,812
which is the combination of
hacking and political activism.
642
01:23:07,814 --> 01:23:12,651
And those combined
are pretty powerful to me.
643
01:23:12,653 --> 01:23:17,425
It's about encouraging people not
to accept technology at face value.
644
01:23:18,792 --> 01:23:20,659
We need to encourage people
to think about
645
01:23:20,661 --> 01:23:23,594
what it is that surrounds them,
646
01:23:23,596 --> 01:23:26,065
to question authority
647
01:23:26,067 --> 01:23:30,235
in a sense of the authority being the
technological environment around them
648
01:23:30,237 --> 01:23:35,607
and to realize that when you start
pulling back the layers of all of this,
649
01:23:35,609 --> 01:23:37,809
that's where
the exercise of power is.
650
01:23:37,811 --> 01:23:41,280
So if we want liberal democracy
to flourish,
651
01:23:41,282 --> 01:23:44,282
we need people
to start lifting back the layers
652
01:23:44,284 --> 01:23:45,653
and understanding
what's going on.
653
01:24:01,301 --> 01:24:05,303
I think ultimately it comes down
to understanding what your values are,
654
01:24:05,305 --> 01:24:07,772
because how do you
develop your thoughts, right?
655
01:24:07,774 --> 01:24:09,842
How do you determine what it
is that you truly believe?
656
01:24:09,844 --> 01:24:13,411
How do you determine what
it is you really want to say,
657
01:24:13,413 --> 01:24:15,513
if you can't even
keep notes safely?
658
01:24:15,515 --> 01:24:19,585
If you can't have some private
space, some space for thought,
659
01:24:19,587 --> 01:24:22,454
some space to enjoy the product
of your own intellect,
660
01:24:22,456 --> 01:24:24,857
to share that with people
close to you who you trust.
661
01:24:24,859 --> 01:24:27,695
Whether they're family, whether they're
colleagues, whether they're compatriots.
662
01:24:36,670 --> 01:24:42,241
One thing that I see a lot is,
this idea of technology as a solution.
663
01:24:42,243 --> 01:24:44,776
It's a natural thing. Okay,
technology is under threat.
664
01:24:44,778 --> 01:24:46,713
Let's find
a technological solution.
665
01:24:48,282 --> 01:24:49,882
There are so many projects now
666
01:24:49,884 --> 01:24:53,818
around secure communications,
platforms, chats, instant messaging.
667
01:24:53,820 --> 01:24:57,923
But it's only one component
of a solution set.
668
01:24:57,925 --> 01:25:02,163
And I think often overlooked are the
legal and political dimensions.
669
01:25:03,296 --> 01:25:04,428
If we're talking about
670
01:25:04,430 --> 01:25:06,565
protecting and preserving
all of this,
671
01:25:06,567 --> 01:25:10,602
as a secure and open
communication space,
672
01:25:10,604 --> 01:25:12,537
that means holding governments
accountable.
673
01:25:12,539 --> 01:25:14,572
It means holding
companies accountable.
674
01:25:14,574 --> 01:25:17,175
Putting in place rules and laws
675
01:25:17,177 --> 01:25:22,246
that ensures they can't do things that
infringe on our freedoms and rights.
676
01:25:22,248 --> 01:25:25,384
That to me is, uh,
677
01:25:25,386 --> 01:25:29,423
such a critical foundation
of a digital democracy today.
678
01:25:31,118 --> 01:25:36,118
Subtitles by explosiveskull
58561
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.