All language subtitles for Through.the.Wormhole.S05E04.How.to.Collapse.a.Superpower.720p.HDTV.x264-DHD

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:04,610 --> 00:00:06,678 The most powerful nations 2 00:00:06,680 --> 00:00:12,117 fear a new form of warfare that could bring them to their knees. 3 00:00:15,021 --> 00:00:17,990 In this age where armies, governments, and economies 4 00:00:17,992 --> 00:00:22,244 all depend on an intricate global infrastructure, 5 00:00:22,246 --> 00:00:27,132 you don't need guns and bombs to bring down a superpower. 6 00:00:27,134 --> 00:00:30,635 All you need is imagination. 7 00:00:34,224 --> 00:00:40,262 Shift time by a millionth of a second and create chaos. 8 00:00:40,264 --> 00:00:44,933 Use the human body to spread a killer computer virus. 9 00:00:44,935 --> 00:00:50,355 Turn the technology we are addicted to against us. 10 00:00:50,357 --> 00:00:53,408 Will human ingenuity triumph? 11 00:00:53,410 --> 00:00:57,412 Or will our ingenuity prove our undoing? 12 00:01:03,753 --> 00:01:08,590 Space, time, life itself... 13 00:01:10,676 --> 00:01:15,180 The secrets of the cosmos lie through the wormhole. 14 00:01:15,182 --> 00:01:19,182 ♪ Through the Wormhole 05x04 ♪ How to Collapse a Superpower Original Air Date on June 11, 15 00:01:28,144 --> 00:01:33,231 You and I rely on our modern civilization, 16 00:01:33,233 --> 00:01:35,600 but there are plenty of people who don't like it, 17 00:01:35,602 --> 00:01:37,786 for a variety of reasons, 18 00:01:37,788 --> 00:01:42,407 religion, politics, or maybe fear about our future. 19 00:01:42,409 --> 00:01:46,828 For now, let's call these people "terrorists." 20 00:01:46,830 --> 00:01:50,048 Terrorists don't fight by conventional means. 21 00:01:50,050 --> 00:01:53,301 They strike in ways we don't expect. 22 00:01:53,303 --> 00:01:55,220 Now, we have given them a weapon 23 00:01:55,222 --> 00:01:58,924 that could change the global balance of power. 24 00:01:58,926 --> 00:02:03,562 The stability of the U.S., Europe, China, 25 00:02:03,564 --> 00:02:05,630 and any global power depends on 26 00:02:05,632 --> 00:02:09,484 high-speed digital communication. 27 00:02:09,486 --> 00:02:13,522 With a little imagination, could a few terrorists sabotage 28 00:02:13,524 --> 00:02:18,160 this massive network, cripple a mighty nation, 29 00:02:18,162 --> 00:02:24,916 perhaps even tear down modern civilization? 30 00:02:24,918 --> 00:02:26,918 Batter is Jackie Robinson. 31 00:02:26,920 --> 00:02:29,621 One ball, one strike. Two on, two out. 32 00:02:29,623 --> 00:02:31,840 When I was growing up in Mississippi, 33 00:02:31,842 --> 00:02:34,209 I loved to listen to the old Brooklyn Dodgers 34 00:02:34,211 --> 00:02:40,432 baseball games, broadcast live all the way from New York. 35 00:02:40,434 --> 00:02:43,802 It amazed me to think that my family was cheering 36 00:02:43,804 --> 00:02:48,306 one of Jackie Robinson's big hits at the same instant 37 00:02:48,308 --> 00:02:52,027 as tens of thousands of fans at Ebbets Field. 38 00:02:52,029 --> 00:02:53,645 Way back, it's gone! 39 00:02:53,647 --> 00:02:55,647 That's a home run for Jackie Robinson. 40 00:02:55,649 --> 00:02:58,617 Invisible radio signals that connected millions of people 41 00:02:58,619 --> 00:03:01,486 and synchronized us all. 42 00:03:01,488 --> 00:03:04,456 They're coming out of the dugout now to shake hands... 43 00:03:07,126 --> 00:03:11,196 Today, we are more connected than ever before. 44 00:03:11,198 --> 00:03:13,582 And all the machines that connect us, 45 00:03:13,584 --> 00:03:16,668 the machines that keep the modern world running, 46 00:03:16,670 --> 00:03:20,972 rely on precisely synchronized time. 47 00:03:20,974 --> 00:03:24,209 But could time be turned against us? 48 00:03:24,211 --> 00:03:27,212 The National Institute of Standards and Technology 49 00:03:27,214 --> 00:03:30,048 in Boulder, Colorado, is the home base 50 00:03:30,050 --> 00:03:33,435 of physicist Judah Levine. 51 00:03:33,437 --> 00:03:36,938 Whenever you use a computer or your cell phone, 52 00:03:36,940 --> 00:03:40,275 you're tapping into Judah's greatest creation, 53 00:03:40,277 --> 00:03:43,028 the Internet time service. 54 00:03:43,030 --> 00:03:46,248 The Internet time service sends out signals that let computers 55 00:03:46,250 --> 00:03:49,734 synchronize their clocks to within a millionth of a second, 56 00:03:49,736 --> 00:03:53,205 and the number of devices that need precise time 57 00:03:53,207 --> 00:03:55,907 is skyrocketing. 58 00:03:55,909 --> 00:04:00,128 The growth has been 5% per month, 59 00:04:00,130 --> 00:04:03,581 compounded for 15 years. 60 00:04:03,583 --> 00:04:07,585 And so, we started out with 50,000 requests a day, and now, 61 00:04:07,587 --> 00:04:10,138 we have about six billion requests a day. 62 00:04:10,140 --> 00:04:13,424 No single clock keeps time for the world. 63 00:04:13,426 --> 00:04:15,977 N.I.S.T. has a dozen, 64 00:04:15,979 --> 00:04:20,031 each measuring time in different ways. 65 00:04:20,033 --> 00:04:23,201 The accuracy of Judah's clocks is vital for controlling 66 00:04:23,203 --> 00:04:25,287 electric power grids, 67 00:04:25,289 --> 00:04:28,123 synchronizing telecommunications networks, 68 00:04:28,125 --> 00:04:32,827 timing financial transactions, and perhaps most importantly, 69 00:04:32,829 --> 00:04:36,715 making the global positioning system work. 70 00:04:36,717 --> 00:04:39,134 Imagine if terrorists threw those clocks off 71 00:04:39,136 --> 00:04:41,786 by just a tiny bit. 72 00:04:41,788 --> 00:04:43,421 What would happen? 73 00:04:43,423 --> 00:04:46,124 The G.P.S. navigation system depends on the fact that 74 00:04:46,126 --> 00:04:49,761 all the satellites are synchronized to the same time, 75 00:04:49,763 --> 00:04:52,230 which is called G.P.S. system time. 76 00:04:52,232 --> 00:04:54,316 The system fundamentally requires that, 77 00:04:54,318 --> 00:04:55,800 and it won't work without it. 78 00:04:55,802 --> 00:04:57,902 It just doesn't work at all. It's not that it degrades. 79 00:04:57,904 --> 00:05:00,155 It just doesn't work. 80 00:05:00,157 --> 00:05:01,573 Around the world, 81 00:05:01,575 --> 00:05:06,311 more than 5,000 planes are in the air at any given time. 82 00:05:06,313 --> 00:05:10,699 To keep them from colliding, controllers must track time, 83 00:05:10,701 --> 00:05:14,753 speed and distance with great precision. 84 00:05:14,755 --> 00:05:19,040 A few seconds' disruption in th network could mean disaster 85 00:05:19,042 --> 00:05:23,928 in the tightly packed airspace around a major airport. 86 00:05:23,930 --> 00:05:26,881 Now imagine that effect simultaneously hitting 87 00:05:26,883 --> 00:05:32,170 the entire infrastructure that keeps a superpower running. 88 00:05:32,172 --> 00:05:37,275 Power plants, hospitals, food delivery, oil production, 89 00:05:37,277 --> 00:05:40,478 all depend on time-critical functions. 90 00:05:40,480 --> 00:05:42,147 Throw them out of sync, 91 00:05:42,149 --> 00:05:45,350 and there could be a catastrophic chain reaction. 92 00:05:48,322 --> 00:05:51,956 Small effects, if they're not damped out quickly, 93 00:05:51,958 --> 00:05:57,128 can grow to become much bigger problems. 94 00:05:57,130 --> 00:05:59,998 Judah's challenge is to keep that chain reaction 95 00:06:00,000 --> 00:06:01,966 from happening. 96 00:06:01,968 --> 00:06:05,670 His biggest threat comes from hackers. 97 00:06:05,672 --> 00:06:10,375 The last year or two has seen a dramatic increase in hackers. 98 00:06:10,377 --> 00:06:13,544 It used to be that you really had to understand how to write 99 00:06:13,546 --> 00:06:17,215 some of these attacks, but now, one person writes the attack 100 00:06:17,217 --> 00:06:19,267 and distributes it among 50 people 101 00:06:19,269 --> 00:06:22,437 or 500 people or 5,000 people who don't necessarily understand 102 00:06:22,439 --> 00:06:24,222 even how the attack works, 103 00:06:24,224 --> 00:06:27,108 and all they have to do is copy and run it. 104 00:06:27,110 --> 00:06:31,112 So it's a problem that's only gonna get worse. 105 00:06:31,114 --> 00:06:33,832 Judah's Internet time service protects itself 106 00:06:33,834 --> 00:06:36,584 by spreading its clocks around. 107 00:06:36,586 --> 00:06:39,871 This goes back to the original purpose of the Internet -- 108 00:06:39,873 --> 00:06:42,907 distributing control so losing a few sites 109 00:06:42,909 --> 00:06:47,796 won't take down the entire network. 110 00:06:47,798 --> 00:06:49,381 The N.I.S.T. Internet time service 111 00:06:49,383 --> 00:06:52,183 is more difficult to jam, because it's so distributed. 112 00:06:52,185 --> 00:06:53,968 There are 45 servers. 113 00:06:53,970 --> 00:06:55,387 They're all at different locations. 114 00:06:55,389 --> 00:06:56,688 They don't have the same address. 115 00:06:56,690 --> 00:07:00,475 They don't have the same physical -- physical networks. 116 00:07:00,477 --> 00:07:04,062 So jamming all of them simultaneously would be -- 117 00:07:04,064 --> 00:07:05,697 I wouldn't want to say it was impossible, 118 00:07:05,699 --> 00:07:07,432 'cause probably nothing's impossible, 119 00:07:07,434 --> 00:07:08,700 but it would be quite a job. 120 00:07:08,702 --> 00:07:11,936 But the illusion of security 121 00:07:11,938 --> 00:07:14,789 may be the greatest threat we face -- 122 00:07:14,791 --> 00:07:19,461 the false belief we are safe when we are not. 123 00:07:19,463 --> 00:07:24,615 People tend to believe what they see and what they are told, 124 00:07:24,617 --> 00:07:27,585 especially when it comes from a trusted figure. 125 00:07:27,587 --> 00:07:31,055 I've come here to Cairo to seek a new beginning 126 00:07:31,057 --> 00:07:34,142 between the United States and Muslims around the world. 127 00:07:34,144 --> 00:07:38,012 America is not, and never will be, at war with Islam. 128 00:07:38,014 --> 00:07:42,517 But what if you couldn't trust anyone anymore? 129 00:07:42,519 --> 00:07:44,736 With today's technology, 130 00:07:44,738 --> 00:07:48,440 it is easy to turn harmless words into something 131 00:07:48,442 --> 00:07:50,074 completely incendiary. 132 00:07:50,076 --> 00:07:52,193 I seek war with Islam. 133 00:07:52,195 --> 00:07:56,030 If someone sees this fake and believes it is real, 134 00:07:56,032 --> 00:07:58,199 it could start a religious war. 135 00:07:58,201 --> 00:08:01,169 Islam has demonstrated hatred rather than peace. 136 00:08:01,171 --> 00:08:03,788 I seek war with Islam. 137 00:08:03,790 --> 00:08:05,757 Protecting our identities 138 00:08:05,759 --> 00:08:09,010 and those of our leaders against a terrorist assault 139 00:08:09,012 --> 00:08:11,012 is a top priority for governments, 140 00:08:11,014 --> 00:08:13,831 militaries and businesses. 141 00:08:19,104 --> 00:08:22,640 Here at Switzerland's Idiap Research Institute, 142 00:08:22,642 --> 00:08:24,642 one man is shoring up the virtual battlements 143 00:08:24,644 --> 00:08:26,945 that keep out the cyberterrorists. 144 00:08:26,947 --> 00:08:32,400 Sébastien Marcel is an expert in biometrics -- 145 00:08:32,402 --> 00:08:35,286 the science of using the unique signatures of the body 146 00:08:35,288 --> 00:08:39,073 to verify a person's identity. 147 00:08:39,075 --> 00:08:42,577 Biometric security is a vast leap beyond passwords 148 00:08:42,579 --> 00:08:44,496 and I.D. cards, 149 00:08:44,498 --> 00:08:48,800 which is why a shadowy army is trying to defeat it. 150 00:08:48,802 --> 00:08:51,202 The challenge is to make the task so difficult 151 00:08:51,204 --> 00:08:55,640 for possible attackers that they will just not try to do it. 152 00:08:58,060 --> 00:09:00,645 There are many different kinds of biometrics -- 153 00:09:00,647 --> 00:09:05,600 fingerprints, the iris, the way you walk. 154 00:09:05,602 --> 00:09:07,652 The more individual the biometric, 155 00:09:07,654 --> 00:09:09,771 the harder it is to hack. 156 00:09:09,773 --> 00:09:13,224 Sébastien plays the dual roles of cyberterrorist 157 00:09:13,226 --> 00:09:18,746 looking for vulnerabilities and defender of the system. 158 00:09:18,748 --> 00:09:21,332 We always come first with a form of attack, 159 00:09:21,334 --> 00:09:23,585 then find a countermeasure for that. 160 00:09:23,587 --> 00:09:25,119 Then give us an idea on another way 161 00:09:25,121 --> 00:09:27,755 to make a more clever attack. 162 00:09:27,757 --> 00:09:29,541 And then we do it again and again. 163 00:09:29,543 --> 00:09:31,259 Eventually, we will reach a point where it's not 164 00:09:31,261 --> 00:09:34,462 going to be possible to make any new form of attacks 165 00:09:34,464 --> 00:09:37,348 that can bypass the system. 166 00:09:37,350 --> 00:09:40,468 If a terrorist tricks security systems into believing 167 00:09:40,470 --> 00:09:44,222 he is the president or one of his trusted aides, 168 00:09:44,224 --> 00:09:48,026 he could start a war. 169 00:09:48,028 --> 00:09:50,862 It's not as far-fetched as it sounds. 170 00:09:50,864 --> 00:09:54,198 Even something unique, like your face, 171 00:09:54,200 --> 00:09:58,486 isn't enough to safeguard your identity. 172 00:09:58,488 --> 00:10:00,905 So here I have the laptop which is protected 173 00:10:00,907 --> 00:10:02,707 by biometric face recognition. 174 00:10:02,709 --> 00:10:05,326 We have an account created by a colleague 175 00:10:05,328 --> 00:10:08,112 and I'm trying to be recognized as my colleague, 176 00:10:08,114 --> 00:10:11,716 and, uh, my -- well, basically, doesn't work 177 00:10:11,718 --> 00:10:14,552 because I'm not her. 178 00:10:14,554 --> 00:10:18,256 I've taken a picture of my colleague here 179 00:10:18,258 --> 00:10:20,625 and I'm just going to show it in front of the camera 180 00:10:20,627 --> 00:10:21,893 and let's see what happens. 181 00:10:25,849 --> 00:10:29,267 So here, you can see that I've been able to log in very easily, 182 00:10:29,269 --> 00:10:31,969 actually. It was instantaneous. 183 00:10:31,971 --> 00:10:35,473 Now, Sébastien switches back to guard duty. 184 00:10:35,475 --> 00:10:38,326 He activates a countermeasure that strengthens the laptop's 185 00:10:38,328 --> 00:10:41,029 biometric shield. 186 00:10:41,031 --> 00:10:44,532 The software looks not just for a specific face, 187 00:10:44,534 --> 00:10:47,818 but also blinking eyes. 188 00:10:47,820 --> 00:10:50,655 So here, you see that, actually, well, 189 00:10:50,657 --> 00:10:53,658 it's no longer possible to enter the system. 190 00:10:55,095 --> 00:10:59,097 Even this added layer of biometric defense cannot, 191 00:10:59,099 --> 00:11:03,718 however, deter an imaginative attacker. 192 00:11:03,720 --> 00:11:07,105 By scanning a photograph with 3D imaging software, 193 00:11:07,107 --> 00:11:10,441 Sébastien has created a mask of his colleague. 194 00:11:10,443 --> 00:11:14,062 So now, I'm going to put the mask of my colleague on 195 00:11:14,064 --> 00:11:18,783 and try to see if I'm recognized. 196 00:11:22,322 --> 00:11:23,705 Yeah. 197 00:11:23,707 --> 00:11:27,575 So, I've been recognized and because I was blinking, 198 00:11:27,577 --> 00:11:30,695 and I was able to bypass the countermeasure. 199 00:11:30,697 --> 00:11:35,083 It is harder to copy someone's body than a password, 200 00:11:35,085 --> 00:11:37,802 but nothing is foolproof. 201 00:11:37,804 --> 00:11:41,923 The more biometric data available -- photographs, 202 00:11:41,925 --> 00:11:46,544 medical records, fingerprints, the more vulnerable we become. 203 00:11:46,546 --> 00:11:50,314 You can take any public biometric data you can find on 204 00:11:50,316 --> 00:11:51,716 from the Internet. 205 00:11:51,718 --> 00:11:55,103 You can find some pictures of people, even presidents, 206 00:11:55,105 --> 00:11:57,605 world leaders and to build these kind of attacks. 207 00:11:57,607 --> 00:12:00,491 Playing the role of attentive defender 208 00:12:00,493 --> 00:12:04,061 and malicious invader has taught Sébastien 209 00:12:04,063 --> 00:12:09,400 that he is in a life or death race with no finish line. 210 00:12:09,402 --> 00:12:13,755 The infrastructure that supports modern civilization may always 211 00:12:13,757 --> 00:12:17,258 be one clever attack away from disaster. 212 00:12:17,260 --> 00:12:18,909 My feeling is that 213 00:12:18,911 --> 00:12:23,247 if this problem is not taken seriously into account, 214 00:12:23,249 --> 00:12:26,684 then we might see an attack that was successful. 215 00:12:26,686 --> 00:12:29,604 So this is the major risk. 216 00:12:29,606 --> 00:12:33,858 This is the new arms race for the 21st century, 217 00:12:33,860 --> 00:12:36,360 staying a step ahead of those 218 00:12:36,362 --> 00:12:38,196 who want to infiltrate our networks. 219 00:12:40,816 --> 00:12:44,485 But there is one attack we might never see coming -- 220 00:12:44,487 --> 00:12:47,405 when people themselves are hacked 221 00:12:47,407 --> 00:12:49,907 and turned against their own country 222 00:12:49,909 --> 00:12:52,345 without their even knowing. 223 00:12:55,303 --> 00:12:58,171 If someone wanted to bring a superpower like America 224 00:12:58,172 --> 00:13:02,608 to its knees, where would they strike? 225 00:13:02,610 --> 00:13:07,145 We expect attacks on our financial and military networks, 226 00:13:07,147 --> 00:13:12,017 but human bodies may also be vulnerable to hacking. 227 00:13:12,019 --> 00:13:14,386 Could our newest high-tech medical devices 228 00:13:14,388 --> 00:13:17,856 be giving terrorists an opportunity? 229 00:13:17,858 --> 00:13:23,896 Could they create a sleeper army of unwitting assassins? 230 00:13:33,806 --> 00:13:37,642 Dr. Mark Gasson is pioneering the latest generation 231 00:13:37,644 --> 00:13:40,579 of medical implants, such as pacemakers, 232 00:13:40,581 --> 00:13:47,152 Insulin pumps for diabetics and deep brain stimulators. 233 00:13:47,154 --> 00:13:49,671 So this is an implant for a medical device. 234 00:13:49,673 --> 00:13:51,990 It's much like a pacemaker, right? 235 00:13:51,992 --> 00:13:53,876 We use it for deep brain stimulation. 236 00:13:53,878 --> 00:13:56,161 So it would be implanted in the chest cavity 237 00:13:56,163 --> 00:14:00,165 and then we would run cables from this up under the skin 238 00:14:00,167 --> 00:14:04,102 and into electrodes that we put deep into the brain. 239 00:14:04,104 --> 00:14:07,839 This type of device, once it's implanted in the body, 240 00:14:07,841 --> 00:14:11,026 you don't want to have to remove it to change any settings, 241 00:14:11,028 --> 00:14:13,445 so it has wireless capability. 242 00:14:13,447 --> 00:14:17,032 Implants are modern miracles. 243 00:14:17,034 --> 00:14:20,518 But the downside is that these devices 244 00:14:20,520 --> 00:14:22,704 use radio frequency transmissions 245 00:14:22,706 --> 00:14:26,858 to transfer data. 246 00:14:26,860 --> 00:14:32,080 And the devices they talk to, called readers, can be hacked. 247 00:14:32,082 --> 00:14:35,334 If you know how to construct a reader that communicates 248 00:14:35,336 --> 00:14:39,004 in the right way, then you can essentially pretend to be 249 00:14:39,006 --> 00:14:41,423 a legitimate reader talking to it. 250 00:14:41,425 --> 00:14:44,977 This type of device and many other medical devices don't have 251 00:14:44,979 --> 00:14:47,930 any security to stop you from doing that. 252 00:14:47,932 --> 00:14:53,435 This lack of security could have deadly ramifications. 253 00:14:53,437 --> 00:14:56,188 If a networked device is in your body, 254 00:14:56,190 --> 00:15:00,025 it could be remotely triggered to kill you. 255 00:15:00,027 --> 00:15:02,778 Imagine a foreign power wants to assassinate a leader 256 00:15:02,780 --> 00:15:04,246 with an implant. 257 00:15:04,248 --> 00:15:08,951 A concealed reader could be altered to shut down a pacemaker 258 00:15:08,953 --> 00:15:12,955 or pump a fatal dose of Insulin into a diabetic's bloodstream. 259 00:15:12,957 --> 00:15:14,739 A device like this will have a certain range 260 00:15:14,741 --> 00:15:16,091 that it operates in. 261 00:15:16,093 --> 00:15:20,262 So if we put a device attached to a podium, for example, 262 00:15:20,264 --> 00:15:23,181 then we could have it targeted specifically at the person 263 00:15:23,183 --> 00:15:25,884 standing at the podium. 264 00:15:25,886 --> 00:15:27,386 A reader could be designed 265 00:15:27,388 --> 00:15:30,689 to transfer a digital virus to an implant, say, 266 00:15:30,691 --> 00:15:33,775 in the prosthetic leg of a general. 267 00:15:33,777 --> 00:15:38,647 The virus' real target may be the White House security system. 268 00:15:38,649 --> 00:15:40,932 The general could leave the center of government 269 00:15:40,934 --> 00:15:43,652 open to a terrorist attack. 270 00:15:47,157 --> 00:15:49,624 It sounds like the stuff of fiction, 271 00:15:49,626 --> 00:15:54,880 but Mark has already proven it can be done. 272 00:15:54,882 --> 00:15:59,501 In 2010, Mark hacked himself. 273 00:15:59,503 --> 00:16:02,337 He implanted a radio frequency transponder, like this one, 274 00:16:02,339 --> 00:16:04,222 in his hand. 275 00:16:04,224 --> 00:16:08,427 The microchip contained personal information and passcodes 276 00:16:08,429 --> 00:16:12,764 that opened the security doors at his lab. 277 00:16:12,766 --> 00:16:14,850 After the chip was up and running, 278 00:16:14,852 --> 00:16:18,987 he infected it with a computer virus. 279 00:16:21,825 --> 00:16:25,110 So by infecting my device with a virus meant that 280 00:16:25,112 --> 00:16:26,912 when I accessed the building, 281 00:16:26,914 --> 00:16:30,082 the building reads the virus out of my device 282 00:16:30,084 --> 00:16:34,119 and then transmits that to the system that controls, 283 00:16:34,121 --> 00:16:38,707 uh, the access to the building. 284 00:16:38,709 --> 00:16:40,342 So once that had occurred, 285 00:16:40,344 --> 00:16:42,928 the virus actually infected that main system, 286 00:16:42,930 --> 00:16:45,380 which meant that anyone else that was getting access 287 00:16:45,382 --> 00:16:48,767 to the building had that virus copied to their -- 288 00:16:48,769 --> 00:16:50,602 typically, they use smart cards. 289 00:16:50,604 --> 00:16:53,638 So the virus was able to propagate in that way. 290 00:16:53,640 --> 00:16:56,441 Mark watched the virus jump from his wrist 291 00:16:56,443 --> 00:16:58,360 to the system, 292 00:16:58,362 --> 00:17:02,013 where it rapidly caused a security nightmare. 293 00:17:02,015 --> 00:17:05,016 The virus that I infected my device with 294 00:17:05,018 --> 00:17:07,569 was able to corrupt the whole system. 295 00:17:07,571 --> 00:17:11,022 So it actually stopped the system from functioning at all. 296 00:17:11,024 --> 00:17:14,409 All the system could then do is make copies of the virus 297 00:17:14,411 --> 00:17:15,877 onto the smart cards 298 00:17:15,879 --> 00:17:17,879 and other devices that people would be using. 299 00:17:17,881 --> 00:17:20,298 And that means they then couldn't get into the building, 300 00:17:20,300 --> 00:17:22,033 and if they went to another building 301 00:17:22,035 --> 00:17:23,385 that used the same system, 302 00:17:23,387 --> 00:17:27,806 they would just continue to spread the virus on. 303 00:17:27,808 --> 00:17:30,759 Mark proved that implants 304 00:17:30,761 --> 00:17:33,929 could not only be infected with toxic code -- 305 00:17:33,931 --> 00:17:38,600 they can be used to transfer toxic code. 306 00:17:38,602 --> 00:17:42,053 This has ominous implications. 307 00:17:42,055 --> 00:17:45,357 By building information highways across the world, 308 00:17:45,359 --> 00:17:48,393 we may have given our enemies an express Lane 309 00:17:48,395 --> 00:17:55,200 into our most vital systems via the devices in our bodies. 310 00:17:55,202 --> 00:17:57,285 How do we defend ourselves 311 00:17:57,287 --> 00:18:02,124 from a world filled with cyberterrorists? 312 00:18:02,126 --> 00:18:04,242 This man may know. 313 00:18:04,244 --> 00:18:08,180 He's using computers to track down and fight deadly viruses, 314 00:18:08,182 --> 00:18:12,184 both digital and biological. 315 00:18:15,019 --> 00:18:20,290 Influenza, smallpox, H.I.V. 316 00:18:20,292 --> 00:18:23,960 Global pandemics happen every decade or so. 317 00:18:23,962 --> 00:18:27,497 Sometimes, they kill tens of millions. 318 00:18:27,499 --> 00:18:30,533 Now there are new threats. 319 00:18:30,535 --> 00:18:34,004 Digital viruses that spread like lightning 320 00:18:34,006 --> 00:18:38,541 and could tear our critical global networks apart. 321 00:18:38,543 --> 00:18:42,278 What lies ahead could be even more frightening -- 322 00:18:42,280 --> 00:18:47,984 a pandemic designed to combined the worst of both viral worlds, 323 00:18:47,986 --> 00:18:52,872 electronic and biological. 324 00:18:57,329 --> 00:18:59,212 Zero day. 325 00:18:59,214 --> 00:19:03,500 That's the day a destructive new virus enters the world. 326 00:19:03,502 --> 00:19:05,368 The lack of awareness on zero day 327 00:19:05,370 --> 00:19:07,721 means complete vulnerability, 328 00:19:07,723 --> 00:19:11,374 whether the virus is biological or digital. 329 00:19:12,844 --> 00:19:14,511 Is there a way to stop these threats 330 00:19:14,513 --> 00:19:16,596 before they spread? 331 00:19:16,598 --> 00:19:20,433 Alex Vespignani believes there is. 332 00:19:20,435 --> 00:19:24,020 Alex is a professor of Physics, Computer Science, 333 00:19:24,022 --> 00:19:27,774 and Health Sciences at Northeastern University. 334 00:19:27,776 --> 00:19:33,029 He's an expert on contagion, natural and electronic. 335 00:19:33,031 --> 00:19:37,367 Actually, I did start with digital viruses, 336 00:19:37,369 --> 00:19:40,203 and because of the analogies, especially in the techniques 337 00:19:40,205 --> 00:19:41,738 that you can use mathematically 338 00:19:41,740 --> 00:19:45,458 to describe the spreading of those viruses, 339 00:19:45,460 --> 00:19:49,129 we started to get interested in biological viruses. 340 00:19:49,131 --> 00:19:54,050 Alex's lab tracks viral outbreaks of all kinds 341 00:19:54,052 --> 00:19:58,438 and looks for ways to minimize their impact. 342 00:19:58,440 --> 00:20:03,226 In 2009, a virulent flu bug named HNn1 343 00:20:03,228 --> 00:20:06,196 flared up in Mexico City. 344 00:20:06,198 --> 00:20:08,598 To predict how and when the flu would spread, 345 00:20:08,600 --> 00:20:11,601 Alex and his team designed a powerful program 346 00:20:11,603 --> 00:20:13,436 called G.L.E.A.M. -- 347 00:20:13,438 --> 00:20:17,457 the global epidemic and mobility model. 348 00:20:17,459 --> 00:20:21,578 G.L.E.A.M. models all 7 billion people on earth 349 00:20:21,580 --> 00:20:25,048 and predicts how they will interact. 350 00:20:25,050 --> 00:20:29,135 So, in the computer, we take one person that is in Mexico City, 351 00:20:29,137 --> 00:20:32,589 and board on one flight that is simulated in the computer, 352 00:20:32,591 --> 00:20:36,259 and if that person is a carrier, will transmit the disease 353 00:20:36,261 --> 00:20:39,395 to another geographical area in the world. 354 00:20:39,397 --> 00:20:42,965 We repeat those simulation many, many, many times, 355 00:20:42,967 --> 00:20:46,986 and this will tell us what is the most likely pattern that 356 00:20:46,988 --> 00:20:49,572 the epidemic will follow in the future. 357 00:20:52,693 --> 00:20:56,913 G.L.E.A.M. anticipated when the H1N1 flu pandemic 358 00:20:56,915 --> 00:20:58,981 would reach its peak in different regions 359 00:20:58,983 --> 00:21:01,034 around the world. 360 00:21:01,036 --> 00:21:03,319 Alex also uses G.L.E.A.M. to track outbreaks 361 00:21:03,321 --> 00:21:06,155 of computer viruses. 362 00:21:06,157 --> 00:21:08,208 When he first entered this field, 363 00:21:08,210 --> 00:21:10,426 digital and biological viruses 364 00:21:10,428 --> 00:21:13,546 followed similar paths of infection. 365 00:21:13,548 --> 00:21:16,933 A virus would be physically carried from person to person, 366 00:21:16,935 --> 00:21:19,219 or machine to machine. 367 00:21:19,221 --> 00:21:23,339 Outbreaks would take weeks or months to unfold. 368 00:21:23,341 --> 00:21:25,859 On the left, we have a virus that spreads 369 00:21:25,861 --> 00:21:28,361 because of proximity, and in this case, 370 00:21:28,363 --> 00:21:31,898 what you see is that the virus spreads every time that people 371 00:21:31,900 --> 00:21:35,952 get in physical proximity, so in touch with each other. 372 00:21:35,954 --> 00:21:37,821 This takes some time. 373 00:21:37,823 --> 00:21:41,708 Biological viruses still spread this way, 374 00:21:41,710 --> 00:21:44,911 but digital viruses now have something influenza 375 00:21:44,913 --> 00:21:47,463 and ebola don't -- 376 00:21:47,465 --> 00:21:50,383 the ability to travel around the world 377 00:21:50,385 --> 00:21:52,802 at the speed of light. 378 00:21:52,804 --> 00:21:54,721 A single computer virus can infect 379 00:21:54,723 --> 00:21:58,608 tens of millions of computers before anyone realizes 380 00:21:58,610 --> 00:22:00,310 what is happening. 381 00:22:00,312 --> 00:22:01,594 So on the right side, 382 00:22:01,596 --> 00:22:04,230 we have a virus that spreads wirelessly, 383 00:22:04,232 --> 00:22:06,065 basically, on the Internet. 384 00:22:06,067 --> 00:22:09,385 This doesn't require the physical proximity. 385 00:22:09,387 --> 00:22:11,187 You don't need the carriers to be in a place 386 00:22:11,189 --> 00:22:12,388 to transmit the disease. 387 00:22:12,390 --> 00:22:15,942 The disease is teleported, in a sense. 388 00:22:15,944 --> 00:22:19,061 And you will see that, in just a few minutes, 389 00:22:19,063 --> 00:22:21,230 it reaches the entire population. 390 00:22:21,232 --> 00:22:26,235 So it blows out like a big explosion all at once. 391 00:22:26,237 --> 00:22:30,373 How do you fight pathogens that can spread around 392 00:22:30,375 --> 00:22:33,343 the world in seconds? 393 00:22:33,345 --> 00:22:38,381 Alex's colleagues are trying to create a global digital defense, 394 00:22:38,383 --> 00:22:40,884 similar to the human immune system, 395 00:22:40,886 --> 00:22:44,304 bits of code that act like biological t-cells, 396 00:22:44,306 --> 00:22:48,925 swarming viruses to isolate and eliminate them. 397 00:22:51,645 --> 00:22:55,031 Unfortunately, clever hackers are getting better 398 00:22:55,033 --> 00:22:58,234 at creating undetectable viruses. 399 00:22:58,236 --> 00:23:01,771 In the digital world, viruses or malwares 400 00:23:01,773 --> 00:23:04,908 are constantly changing, so that it's not easy 401 00:23:04,910 --> 00:23:07,777 to write an algorithm that detect them 402 00:23:07,779 --> 00:23:10,079 and clean the machine right away. 403 00:23:13,500 --> 00:23:16,386 Trojan horse malware is specifically designed 404 00:23:16,388 --> 00:23:18,588 to blend into the background 405 00:23:18,590 --> 00:23:21,808 until it reaches its intended target. 406 00:23:21,810 --> 00:23:24,093 Once it invades a critical system, say, 407 00:23:24,095 --> 00:23:28,181 the control software of cooling rods at a nuclear power plant, 408 00:23:28,183 --> 00:23:32,185 it can lay dormant for weeks or months. 409 00:23:32,187 --> 00:23:35,772 Then, one day, it activates. 410 00:23:35,774 --> 00:23:38,808 This is day zero, and the new malware is going to 411 00:23:38,810 --> 00:23:41,861 exploit the vulnerabilities of those servers. 412 00:23:41,863 --> 00:23:46,115 It can hide here or proliferate over the Internet, 413 00:23:46,117 --> 00:23:48,618 and finally unleash all the damage 414 00:23:48,620 --> 00:23:51,871 it has been programmed for. 415 00:23:58,680 --> 00:24:03,499 But there is an even more disturbing threat. 416 00:24:03,501 --> 00:24:07,353 What if terrorists apply the principles of malware 417 00:24:07,355 --> 00:24:10,189 to biological pathogens? 418 00:24:10,191 --> 00:24:13,026 Imagine biological viruses designed 419 00:24:13,028 --> 00:24:16,396 to masquerade as harmless germs. 420 00:24:16,398 --> 00:24:20,733 They'd spread throughout the population, then detonate. 421 00:24:20,735 --> 00:24:25,121 It would be a nightmare scenario. 422 00:24:25,123 --> 00:24:28,041 But the dangers of engineering pathogens are so great, 423 00:24:28,043 --> 00:24:31,244 and the results so hard to control, 424 00:24:31,246 --> 00:24:35,131 that even terrorists may not risk it. 425 00:24:35,133 --> 00:24:36,716 Even the simplest biological viruses 426 00:24:36,718 --> 00:24:40,470 are much, much, more complicated than computer viruses. 427 00:24:40,472 --> 00:24:43,372 As soon as you start manipulating a virus, 428 00:24:43,374 --> 00:24:47,143 it's very difficult to guess what is going to happen. 429 00:24:47,145 --> 00:24:52,315 It's a very dangerous game, so trying to alter nature 430 00:24:52,317 --> 00:24:58,488 is something, uh, that can easily lead to doomsday. 431 00:24:58,490 --> 00:25:02,892 The future may be filled with frightening outbreaks 432 00:25:02,894 --> 00:25:05,227 unless we find a way to lock down 433 00:25:05,229 --> 00:25:08,281 our critical information networks. 434 00:25:08,283 --> 00:25:10,917 In a world where privacy is fading away 435 00:25:10,919 --> 00:25:14,003 and everything is open to attack, 436 00:25:14,005 --> 00:25:19,575 can there ever again be such a thing as... a secret? 437 00:25:21,825 --> 00:25:23,970 During the Cold War, 438 00:25:23,971 --> 00:25:26,204 the Soviet Union and the United States 439 00:25:26,206 --> 00:25:29,591 were locked in a nuclear arms race. 440 00:25:29,593 --> 00:25:32,394 The philosophy behind it was M.A.D., 441 00:25:32,396 --> 00:25:36,932 which stood for "mutually assured destruction." 442 00:25:36,934 --> 00:25:39,717 Today's arms race could be called 443 00:25:39,719 --> 00:25:42,887 "mutually assured decryption." 444 00:25:42,889 --> 00:25:44,739 Computer networks develop 445 00:25:44,741 --> 00:25:48,059 ever-more secure encryption schemes, 446 00:25:48,061 --> 00:25:50,278 and ever-more powerful attack networks 447 00:25:50,280 --> 00:25:53,331 figure out how to crack them. 448 00:25:53,333 --> 00:25:59,070 But there may be a way to stop this madness by creating a code 449 00:25:59,072 --> 00:26:02,674 that can never be cracked. 450 00:26:06,462 --> 00:26:09,747 Roarke Horstmeyer is a cryptographic researcher 451 00:26:09,749 --> 00:26:11,633 at Caltech. 452 00:26:11,635 --> 00:26:16,254 Though he works with computers, he follows an ancient quest. 453 00:26:16,256 --> 00:26:19,724 Roarke seeks the perfect code, 454 00:26:19,726 --> 00:26:23,528 a foolproof way to keep secrets secret. 455 00:26:23,530 --> 00:26:25,981 So this is an example of a secret code. 456 00:26:25,983 --> 00:26:28,483 And right now, it doesn't look like anything. 457 00:26:28,485 --> 00:26:31,936 Most of us see random letters, 458 00:26:31,938 --> 00:26:36,741 but an expert sees a message encrypted with a Caesar cipher, 459 00:26:36,743 --> 00:26:38,793 named after Julius Caesar, 460 00:26:38,795 --> 00:26:42,831 who used it for clandestine communications. 461 00:26:42,833 --> 00:26:44,382 The way you crack a Caesar cipher is you just look 462 00:26:44,384 --> 00:26:47,118 for the most frequent letter. 463 00:26:47,120 --> 00:26:49,787 So here, "I" is the most common letter. 464 00:26:49,789 --> 00:26:52,641 And you know that "E" is the most common letter 465 00:26:52,643 --> 00:26:54,476 that appears in the English language. 466 00:26:54,478 --> 00:26:58,180 So I can match "I" to "E," and then I can count 467 00:26:58,182 --> 00:27:01,933 and see that that's four letters changed. 468 00:27:01,935 --> 00:27:05,487 Repeating the same for "X," I can count back four letters 469 00:27:05,489 --> 00:27:07,489 and see it might be representing "t." 470 00:27:07,491 --> 00:27:11,660 X-L-I is being converted to "the." 471 00:27:11,662 --> 00:27:13,862 Letter transposition codes were high-tech 472 00:27:13,864 --> 00:27:15,697 in the Roman empire, 473 00:27:15,699 --> 00:27:18,583 but in this age of computational power, 474 00:27:18,585 --> 00:27:21,336 they are trivially easy to break. 475 00:27:25,324 --> 00:27:28,343 The modern gold standard of cryptography 476 00:27:28,345 --> 00:27:30,679 is the one-time pad. 477 00:27:30,681 --> 00:27:33,998 This technique adds or subtracts a different value 478 00:27:34,000 --> 00:27:36,384 for every single letter of a message. 479 00:27:36,386 --> 00:27:38,186 The way it works is, 480 00:27:38,188 --> 00:27:41,523 for each letter of what you're trying to keep secret, 481 00:27:41,525 --> 00:27:44,609 you choose a different and random number 482 00:27:44,611 --> 00:27:46,177 to permute that letter. 483 00:27:46,179 --> 00:27:50,115 Essentially, each letter has a different code, 484 00:27:50,117 --> 00:27:53,017 so guessing one letter won't help you figure out 485 00:27:53,019 --> 00:27:55,453 any of the other letters in the message. 486 00:27:55,455 --> 00:27:58,356 Only someone with access to the one-time pad, 487 00:27:58,358 --> 00:28:02,911 the code book itself, would be able to make any sense of this. 488 00:28:02,913 --> 00:28:07,882 But even this technically perfect code can be cracked. 489 00:28:07,884 --> 00:28:11,136 The one-time pads used by governments and businesses 490 00:28:11,138 --> 00:28:14,973 to protect their secrets rely on specialized machines 491 00:28:14,975 --> 00:28:17,041 that generate random numbers. 492 00:28:17,043 --> 00:28:20,812 But Edward Snowden revealed the N.S.A. 493 00:28:20,814 --> 00:28:23,481 has compromised those machines. 494 00:28:23,483 --> 00:28:27,902 The random numbers they generate are not actually random, 495 00:28:27,904 --> 00:28:30,888 so the N.S.A. can crack even these theoretically 496 00:28:30,890 --> 00:28:33,275 uncrackable codes. 497 00:28:33,277 --> 00:28:36,528 As more information about what the N.S.A. has been 498 00:28:36,530 --> 00:28:38,496 and is capable of has come out, 499 00:28:38,498 --> 00:28:40,732 it's been a big motivating factor, I think, 500 00:28:40,734 --> 00:28:43,084 to a lot of cryptography over the last year. 501 00:28:45,121 --> 00:28:47,372 Roarke and his colleagues went searching for 502 00:28:47,374 --> 00:28:50,175 an ideal generator of randomness, 503 00:28:50,177 --> 00:28:53,511 and they found it in light. 504 00:28:53,513 --> 00:28:56,798 We realized, or saw, actually, visually, 505 00:28:56,800 --> 00:29:00,185 how random light can behave when it interacts 506 00:29:00,187 --> 00:29:04,806 with disordered particles, like in dried spray paint. 507 00:29:04,808 --> 00:29:09,110 So it's easy to create a lot of randomness by shining light 508 00:29:09,112 --> 00:29:12,981 on scattering particles. 509 00:29:12,983 --> 00:29:14,532 Using lasers, 510 00:29:14,534 --> 00:29:16,651 Roarke directs a beam of light through a sheet of 511 00:29:16,653 --> 00:29:19,654 polymer-dispersed liquid crystal. 512 00:29:19,656 --> 00:29:21,939 It's a variation on the L.C.D. display 513 00:29:21,941 --> 00:29:26,161 you might find in a laptop screen. 514 00:29:26,163 --> 00:29:27,579 We create our one-time pad 515 00:29:27,581 --> 00:29:32,784 by shining laser light through our scattering material. 516 00:29:32,786 --> 00:29:36,221 The laser illuminates the scattering material, 517 00:29:36,223 --> 00:29:38,556 the light scatters through it randomly, 518 00:29:38,558 --> 00:29:41,643 and then emerges on the other side as an interference pattern. 519 00:29:41,645 --> 00:29:45,013 Once the unique pattern is created, 520 00:29:45,015 --> 00:29:47,632 you can turn it into a code. 521 00:29:47,634 --> 00:29:50,685 Every letter or numerical character is represented 522 00:29:50,687 --> 00:29:54,322 by light or dark spots in the polymer. 523 00:29:54,324 --> 00:29:58,309 Each square micrometer of random pattern in the polymer 524 00:29:58,311 --> 00:30:00,912 provides enough light and dark spots 525 00:30:00,914 --> 00:30:06,251 to embed millions of code words. 526 00:30:06,253 --> 00:30:09,987 Say two spies create a shared code pattern. 527 00:30:09,989 --> 00:30:13,541 Then they separate, never to meet again. 528 00:30:13,543 --> 00:30:17,345 The first spy encodes a message with his piece of polymer 529 00:30:17,347 --> 00:30:20,548 and sends it to the other spy. 530 00:30:20,550 --> 00:30:23,635 Spy number two receives the encoded communication 531 00:30:23,637 --> 00:30:27,105 and takes out his piece of polymer to view it. 532 00:30:27,107 --> 00:30:29,941 When he subtracts the shared pattern from the code, 533 00:30:29,943 --> 00:30:32,861 he can read the secret message. 534 00:30:32,863 --> 00:30:35,530 But unlike a conventional one-time pad, 535 00:30:35,532 --> 00:30:38,182 this code can't be duplicated. 536 00:30:38,184 --> 00:30:41,152 The three-dimensional layers of crystals embedded 537 00:30:41,154 --> 00:30:45,824 in the polymer sheet cannot be captured by a photograph. 538 00:30:45,826 --> 00:30:48,076 The randomness doesn't just exist on the surface 539 00:30:48,078 --> 00:30:49,411 of the material. 540 00:30:49,413 --> 00:30:51,296 It exists inside the material. 541 00:30:51,298 --> 00:30:55,166 And any attempt to get inside the volume will destroy it, 542 00:30:55,168 --> 00:30:57,218 or change the way it behaves, essentially. 543 00:30:57,220 --> 00:31:00,505 An unbreakable code could shore up 544 00:31:00,507 --> 00:31:03,057 all of a superpower's critical networks 545 00:31:03,059 --> 00:31:06,511 against infiltration by enemies of the state. 546 00:31:06,513 --> 00:31:08,730 But humans, not technology, 547 00:31:08,732 --> 00:31:14,051 have always been the weakest link in security systems. 548 00:31:14,053 --> 00:31:16,104 What if the assault on our society 549 00:31:16,106 --> 00:31:18,740 is more insidious than terrorism? 550 00:31:18,742 --> 00:31:24,078 So subtle, in fact, that we may not realize it's even happening? 551 00:31:24,864 --> 00:31:27,098 A superpower would reel from successful attacks 552 00:31:27,607 --> 00:31:33,144 on its bridges, its electrical grid or its water supply. 553 00:31:33,146 --> 00:31:36,848 But what if an attack is already underway? 554 00:31:36,850 --> 00:31:42,019 An attack not on physical objects but on society itself? 555 00:31:42,021 --> 00:31:45,323 An attack from within? 556 00:31:45,325 --> 00:31:47,792 Is our addiction to the Internet 557 00:31:47,794 --> 00:31:51,195 sowing the seeds of our destruction? 558 00:31:55,919 --> 00:31:57,802 The campus of Swansea University 559 00:31:57,804 --> 00:32:02,557 sits on the picturesque coastline of southwestern Wales. 560 00:32:02,559 --> 00:32:04,843 But like college students everywhere, 561 00:32:04,845 --> 00:32:07,228 these young men and women are more absorbed 562 00:32:07,230 --> 00:32:11,382 in the digital world than the natural world. 563 00:32:11,384 --> 00:32:14,552 Most of them were born in the 1990s. 564 00:32:14,554 --> 00:32:17,555 They don't know life without the Internet. 565 00:32:17,557 --> 00:32:20,658 And for some of them, being offline would be 566 00:32:20,660 --> 00:32:23,895 physically and emotionally traumatic, 567 00:32:23,897 --> 00:32:27,115 because the Internet rewrites the brain 568 00:32:27,117 --> 00:32:30,735 as much as ecstasy or heroin. 569 00:32:30,737 --> 00:32:35,290 Professor Phil Reed has worked for years finding treatments 570 00:32:35,292 --> 00:32:37,458 for autism and drug addiction. 571 00:32:37,460 --> 00:32:40,578 But a few years ago, he noticed a disorder 572 00:32:40,580 --> 00:32:43,298 that is just as widespread -- 573 00:32:43,300 --> 00:32:48,436 the effect technology is having on our minds and bodies. 574 00:32:48,438 --> 00:32:51,472 Now, I think the Internet is really something new here, 575 00:32:51,474 --> 00:32:56,027 because what we're seeing is a piece of technology 576 00:32:56,029 --> 00:33:00,481 that is almost designed to isolate individuals. 577 00:33:00,483 --> 00:33:02,934 If you were to change the way society worked, 578 00:33:02,936 --> 00:33:04,869 this would be a really good way to do it. 579 00:33:06,121 --> 00:33:08,606 Phil wanted to find out if the Internet 580 00:33:08,608 --> 00:33:12,794 is addictive enough to cause withdrawal symptoms. 581 00:33:14,463 --> 00:33:18,633 First, he tested the mental state of participants before 582 00:33:18,635 --> 00:33:21,502 and after they spent time online. 583 00:33:21,504 --> 00:33:26,123 He found heavy users experienced profound negative mood swings 584 00:33:26,125 --> 00:33:29,477 when they're cut off from the net. 585 00:33:29,479 --> 00:33:32,296 But the impact of withdrawal goes deeper 586 00:33:32,298 --> 00:33:35,149 than spoiling people's moods. 587 00:33:35,151 --> 00:33:39,020 Shutting down the Internet connection triggers the body's 588 00:33:39,022 --> 00:33:42,740 fight-or-flight response. 589 00:33:42,742 --> 00:33:46,527 So we're looking at their heart rate, their blood pressure, 590 00:33:46,529 --> 00:33:48,329 the galvanic skin response. 591 00:33:48,331 --> 00:33:52,984 It's like they're facing a threat all of the time. 592 00:33:52,986 --> 00:33:55,536 Their heart rate's gone up. Their blood pressure's gone up. 593 00:33:55,538 --> 00:33:58,322 Their skin conductance is high. 594 00:33:58,324 --> 00:34:02,159 It's suggesting that long-term exposure to the 'net 595 00:34:02,161 --> 00:34:05,597 might actually be placing a strain on people's physiology. 596 00:34:08,350 --> 00:34:12,687 They might feel relaxed, but in fact, they're hyped up. 597 00:34:12,689 --> 00:34:15,723 But the most disturbing effect of Internet addiction 598 00:34:15,725 --> 00:34:19,343 is what it does inside the brain. 599 00:34:19,345 --> 00:34:22,196 Phil and other researchers have been scanning the brains 600 00:34:22,198 --> 00:34:26,701 of heavy Internet users and finding disturbing alterations 601 00:34:26,703 --> 00:34:28,853 in their mental architecture. 602 00:34:28,855 --> 00:34:32,707 In terms of where we're seeing changes in brain matter, 603 00:34:32,709 --> 00:34:35,827 we're seeing them up at the front, here, um, 604 00:34:35,829 --> 00:34:39,547 especially pre-frontal cortex, but also cortical changes, 605 00:34:39,549 --> 00:34:43,918 but also down the side, in terms of the motor areas of the brain. 606 00:34:43,920 --> 00:34:45,720 So we've got changes all over. 607 00:34:45,722 --> 00:34:49,140 People who surf the web 10 hours a day 608 00:34:49,142 --> 00:34:53,044 can experience a 10% shrinkage in key brain regions, 609 00:34:53,046 --> 00:34:55,046 according to one study. 610 00:34:55,048 --> 00:34:56,881 That's the kind of damage you might get 611 00:34:56,883 --> 00:35:00,718 from a serious case of meningitis. 612 00:35:00,720 --> 00:35:06,658 It would permanently change how you think and behave. 613 00:35:10,579 --> 00:35:15,283 Any new technology can be regarded like an alien parasite, 614 00:35:15,285 --> 00:35:17,568 and that goes for anything that we use. 615 00:35:17,570 --> 00:35:20,872 We think it's serving us, and initially, it does. 616 00:35:20,874 --> 00:35:23,624 But eventually, our society and ourselves, 617 00:35:23,626 --> 00:35:26,177 we become dependent on it. 618 00:35:26,179 --> 00:35:30,264 The Internet is now an essential tool in every powerful 619 00:35:30,266 --> 00:35:32,633 nation on earth. 620 00:35:32,635 --> 00:35:34,886 But its many benefits come with side effects 621 00:35:34,888 --> 00:35:39,474 that could shatter society. 622 00:35:39,476 --> 00:35:42,610 Will it ultimately prove a force for good? 623 00:35:42,612 --> 00:35:46,531 Or will it be the tool of our self-destruction? 624 00:35:46,533 --> 00:35:48,366 We don't know. 625 00:35:48,368 --> 00:35:51,569 Essentially, we are running a beta test 626 00:35:51,571 --> 00:35:53,154 on the population of earth. 627 00:35:53,156 --> 00:35:54,772 If you were designing an aircraft, 628 00:35:54,774 --> 00:35:56,624 you'd have backup systems. 629 00:35:56,626 --> 00:36:00,661 We never do that with society. We never have a backup system. 630 00:36:00,663 --> 00:36:01,996 It's all or nothing, 631 00:36:01,998 --> 00:36:04,048 and the way we seem to have gone is digital. 632 00:36:04,050 --> 00:36:06,000 An addiction to technology 633 00:36:06,002 --> 00:36:09,170 may be the greatest weakness of a superpower. 634 00:36:09,172 --> 00:36:12,640 By trying to improve our lives with machines, 635 00:36:12,642 --> 00:36:16,844 we may lose ourselves in software. 636 00:36:16,846 --> 00:36:19,797 And there's one more thing to consider. 637 00:36:19,799 --> 00:36:22,817 What if the Internet wakes up? 638 00:36:22,819 --> 00:36:26,020 Could an all-powerful digital consciousness 639 00:36:26,022 --> 00:36:28,656 become the final superpower? 640 00:36:29,577 --> 00:36:33,313 Our society is under threat on many fronts. 641 00:36:34,315 --> 00:36:37,750 Terrorists could attack our time service, 642 00:36:37,752 --> 00:36:39,752 they could disrupt the power grid 643 00:36:39,754 --> 00:36:45,091 or the water supply network or our satellite links. 644 00:36:45,093 --> 00:36:47,493 But we should be careful not to focus too closely 645 00:36:47,495 --> 00:36:50,830 on these individual threats. 646 00:36:50,832 --> 00:36:56,035 We may be staring at the trees and missing the forest. 647 00:36:56,037 --> 00:37:01,507 The real threat could be the Internet itself. 648 00:37:06,079 --> 00:37:09,882 Christof Koch is one of the foremost neurobiologists 649 00:37:09,884 --> 00:37:11,267 in the world. 650 00:37:11,269 --> 00:37:13,919 He is chief scientist at Paul Allen Institute 651 00:37:13,921 --> 00:37:16,889 for brain research in Seattle. 652 00:37:16,891 --> 00:37:20,893 For Christof, the mind is purely a product of the web 653 00:37:20,895 --> 00:37:23,780 of neurons in the brain. 654 00:37:23,782 --> 00:37:26,265 So if the Internet were a brain, 655 00:37:26,267 --> 00:37:31,370 how would its complexity stack up against a human brain? 656 00:37:31,372 --> 00:37:32,605 The Internet is, by far, 657 00:37:32,607 --> 00:37:35,491 the most complex artifact ever built by mankind. 658 00:37:35,493 --> 00:37:40,112 It has on the order of probably 10,000 more transistors 659 00:37:40,114 --> 00:37:42,615 than there are synapses in your typical brain. 660 00:37:42,617 --> 00:37:45,051 It certainly raises the possibility, 661 00:37:45,053 --> 00:37:47,553 given the enormous complexity of the Internet, 662 00:37:47,555 --> 00:37:49,722 that now, or sometime in the future, 663 00:37:49,724 --> 00:37:52,008 it may feel like something to be the Internet, 664 00:37:52,010 --> 00:37:55,178 that the Internet itself has some degree of sentience. 665 00:37:57,848 --> 00:38:00,966 Some say the Internet may already be sentient 666 00:38:00,968 --> 00:38:04,737 or self-aware, but its level of consciousness may be similar 667 00:38:04,739 --> 00:38:06,606 to that of a newborn. 668 00:38:06,608 --> 00:38:09,975 Let's say the Internet has some sort of dim awareness. 669 00:38:09,977 --> 00:38:13,079 We have to ask how intelligent is that awareness. 670 00:38:13,081 --> 00:38:14,313 You know, if you're a little baby, 671 00:38:14,315 --> 00:38:16,365 you can be somewhat dimly aware of your mom, 672 00:38:16,367 --> 00:38:18,417 and that you're hungry, and that you're looking for milk, 673 00:38:18,419 --> 00:38:19,869 but you're not really very intelligent 674 00:38:19,871 --> 00:38:21,838 and you're not able to do a lot. 675 00:38:21,840 --> 00:38:23,039 But presumably, 676 00:38:23,041 --> 00:38:26,008 the Internet will learn and evolve. 677 00:38:26,010 --> 00:38:28,294 It will grow up. 678 00:38:28,296 --> 00:38:32,765 If it does, how will we know when it has become more than 679 00:38:32,767 --> 00:38:36,168 just a glorified calculator? 680 00:38:36,170 --> 00:38:41,691 One way to gauge consciousness is to apply the turing test. 681 00:38:41,693 --> 00:38:46,845 This imagines asking a man and a machine a series of questions 682 00:38:46,847 --> 00:38:51,150 without knowing who or what is giving the answers. 683 00:38:51,152 --> 00:38:53,953 If you can't figure out which one is the machine, 684 00:38:53,955 --> 00:38:57,240 if the machine has fooled you into thinking it is human, 685 00:38:57,242 --> 00:39:02,461 then for all practical purposes, it might as well be intelligent. 686 00:39:02,463 --> 00:39:06,532 Where do I look? At you? At me. 687 00:39:08,419 --> 00:39:09,919 Christof proposes a new, improved Turing test 688 00:39:09,921 --> 00:39:14,390 that measures not just intelligence, 689 00:39:14,392 --> 00:39:16,425 but consciousness. 690 00:39:16,427 --> 00:39:18,544 The test uses visual imagery. 691 00:39:18,546 --> 00:39:22,398 The computer must decide whether a series of photographs 692 00:39:22,400 --> 00:39:25,351 are right or wrong. 693 00:39:25,353 --> 00:39:27,820 Any humans looking at these photographs would know 694 00:39:27,822 --> 00:39:30,055 they are not real, 695 00:39:30,057 --> 00:39:34,277 but modern day computers are still easily fooled. 696 00:39:34,279 --> 00:39:37,697 A computer, unless you provide it with a very, very large list, 697 00:39:37,699 --> 00:39:40,166 an almost infinite large list of all the exceptions, 698 00:39:40,168 --> 00:39:41,751 could not deal with that. 699 00:39:41,753 --> 00:39:43,536 And that's the basic nature of this turing test 700 00:39:43,538 --> 00:39:45,288 for visual consciousness. 701 00:39:45,290 --> 00:39:47,757 Christof wants to apply this test 702 00:39:47,759 --> 00:39:50,042 to the entire Internet. 703 00:39:50,044 --> 00:39:53,930 If the vast global network of computers passes the test, 704 00:39:53,932 --> 00:39:58,100 by his definition, it is awake and aware. 705 00:39:58,102 --> 00:40:00,720 But what if the Internet is conscious? 706 00:40:00,722 --> 00:40:03,723 What would it want? How will it behave? 707 00:40:03,725 --> 00:40:08,978 Will it be friend or foe, servant or master? 708 00:40:08,980 --> 00:40:11,764 To the extent that the Internet developed independent behaviors 709 00:40:11,766 --> 00:40:13,733 would be scary, could be very scary. 710 00:40:13,735 --> 00:40:17,603 Of course, it could have all sorts of security implication. 711 00:40:17,605 --> 00:40:19,572 To that extent, that would certainly be a signal that 712 00:40:19,574 --> 00:40:21,958 there's something independent, autonomous there. 713 00:40:21,960 --> 00:40:26,545 If the Internet begins to do unpredictable things, 714 00:40:26,547 --> 00:40:30,299 we will know we are dealing with a new form of life. 715 00:40:30,301 --> 00:40:32,718 It may even follow an important precedent 716 00:40:32,720 --> 00:40:36,255 in the biological history of planet earth -- 717 00:40:36,257 --> 00:40:40,292 the absorption of smaller, simpler life forms 718 00:40:40,294 --> 00:40:44,897 into the bodies of larger, more complex ones. 719 00:40:44,899 --> 00:40:49,402 The future of humanity may be similar to that of mitochondria, 720 00:40:49,404 --> 00:40:53,939 the power generators inside most biological cells. 721 00:40:53,941 --> 00:40:58,077 Mitochondria were once independent organisms, 722 00:40:58,079 --> 00:40:59,996 but over evolutionary history, 723 00:40:59,998 --> 00:41:03,115 they were taken over by larger cells. 724 00:41:03,117 --> 00:41:05,584 The once-independent mitochondria 725 00:41:05,586 --> 00:41:09,755 became a mere power source for their Masters. 726 00:41:09,757 --> 00:41:13,626 We, and the civilizations we now think of as superpowers, 727 00:41:13,628 --> 00:41:18,180 may be absorbed by our own creation. 728 00:41:18,182 --> 00:41:23,769 But what would it wa front, other than occasional repairs? 729 00:41:23,771 --> 00:41:26,605 Perhaps it would want our energy. 730 00:41:26,607 --> 00:41:33,062 Or perhaps it will desire the one thing it doesn't have -- 731 00:41:33,064 --> 00:41:35,347 a soul. 732 00:41:35,349 --> 00:41:36,482 The soul is really spooky. 733 00:41:36,484 --> 00:41:38,701 If you can't measure it, why do you need it? 734 00:41:38,703 --> 00:41:42,354 What function does it do that you can't do 735 00:41:42,356 --> 00:41:44,156 with physical stuff anymore? 736 00:41:44,158 --> 00:41:46,158 So today, with the existence of computers, 737 00:41:46,160 --> 00:41:47,710 there isn't any need for soul stuff, 738 00:41:47,712 --> 00:41:49,912 because it can all be done using computations, 739 00:41:49,914 --> 00:41:51,964 using algorithms in software. 740 00:41:51,966 --> 00:41:55,217 A conscious, superpowerful Internet 741 00:41:55,219 --> 00:41:57,920 may not need a soul to function, 742 00:41:57,922 --> 00:42:01,390 but experiencing the joys and sorrows of humanity 743 00:42:01,392 --> 00:42:05,544 would give it another way to understand the world. 744 00:42:05,546 --> 00:42:09,214 So our defining difference from technology 745 00:42:09,216 --> 00:42:11,400 may ultimately keep the human race 746 00:42:11,402 --> 00:42:14,553 from becoming its victim. 747 00:42:14,555 --> 00:42:17,323 Throughout history, 748 00:42:17,325 --> 00:42:22,995 every technological advance has led to new forms of warfare. 749 00:42:22,997 --> 00:42:26,866 The Bronze Age gave us the ax and the sword. 750 00:42:26,868 --> 00:42:31,287 Iron gave us the cannon and the gun. 751 00:42:31,289 --> 00:42:36,125 The Information Age has birthed its own weapons. 752 00:42:36,127 --> 00:42:38,177 But information is not a physical resource 753 00:42:38,179 --> 00:42:40,546 that can be mined and controlled, 754 00:42:40,548 --> 00:42:42,965 like iron and bronze. 755 00:42:42,967 --> 00:42:45,918 It's a resource of the mind. 756 00:42:45,920 --> 00:42:49,605 In this new age, the fate of a nation, 757 00:42:49,607 --> 00:42:53,883 even the mightiest superpower rests on one thing -- 758 00:42:55,363 --> 00:42:58,152 the power of human imagination. 62076

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.