Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:04,610 --> 00:00:06,678
The most powerful nations
2
00:00:06,680 --> 00:00:12,117
fear a new form of warfare that
could bring them to their knees.
3
00:00:15,021 --> 00:00:17,990
In this age where armies,
governments, and economies
4
00:00:17,992 --> 00:00:22,244
all depend on an intricate
global infrastructure,
5
00:00:22,246 --> 00:00:27,132
you don't need guns and bombs
to bring down a superpower.
6
00:00:27,134 --> 00:00:30,635
All you need is imagination.
7
00:00:34,224 --> 00:00:40,262
Shift time by a millionth
of a second and create chaos.
8
00:00:40,264 --> 00:00:44,933
Use the human body to spread
a killer computer virus.
9
00:00:44,935 --> 00:00:50,355
Turn the technology
we are addicted to against us.
10
00:00:50,357 --> 00:00:53,408
Will human ingenuity triumph?
11
00:00:53,410 --> 00:00:57,412
Or will our ingenuity
prove our undoing?
12
00:01:03,753 --> 00:01:08,590
Space, time, life itself...
13
00:01:10,676 --> 00:01:15,180
The secrets of the cosmos lie
through the wormhole.
14
00:01:15,182 --> 00:01:19,182
♪ Through the Wormhole 05x04 ♪ How to Collapse a
Superpower Original Air Date on June 11,
15
00:01:28,144 --> 00:01:33,231
You and I rely on
our modern civilization,
16
00:01:33,233 --> 00:01:35,600
but there are plenty of people
who don't like it,
17
00:01:35,602 --> 00:01:37,786
for a variety of reasons,
18
00:01:37,788 --> 00:01:42,407
religion, politics,
or maybe fear about our future.
19
00:01:42,409 --> 00:01:46,828
For now, let's call
these people "terrorists."
20
00:01:46,830 --> 00:01:50,048
Terrorists don't fight by
conventional means.
21
00:01:50,050 --> 00:01:53,301
They strike in ways
we don't expect.
22
00:01:53,303 --> 00:01:55,220
Now, we have given them
a weapon
23
00:01:55,222 --> 00:01:58,924
that could change
the global balance of power.
24
00:01:58,926 --> 00:02:03,562
The stability of the U.S.,
Europe, China,
25
00:02:03,564 --> 00:02:05,630
and any global power
depends on
26
00:02:05,632 --> 00:02:09,484
high-speed
digital communication.
27
00:02:09,486 --> 00:02:13,522
With a little imagination,
could a few terrorists sabotage
28
00:02:13,524 --> 00:02:18,160
this massive network,
cripple a mighty nation,
29
00:02:18,162 --> 00:02:24,916
perhaps even tear
down modern civilization?
30
00:02:24,918 --> 00:02:26,918
Batter is Jackie Robinson.
31
00:02:26,920 --> 00:02:29,621
One ball, one strike.
Two on, two out.
32
00:02:29,623 --> 00:02:31,840
When I was growing up
in Mississippi,
33
00:02:31,842 --> 00:02:34,209
I loved to listen
to the old Brooklyn Dodgers
34
00:02:34,211 --> 00:02:40,432
baseball games, broadcast live
all the way from New York.
35
00:02:40,434 --> 00:02:43,802
It amazed me to think
that my family was cheering
36
00:02:43,804 --> 00:02:48,306
one of Jackie Robinson's
big hits at the same instant
37
00:02:48,308 --> 00:02:52,027
as tens of thousands of fans
at Ebbets Field.
38
00:02:52,029 --> 00:02:53,645
Way back, it's gone!
39
00:02:53,647 --> 00:02:55,647
That's a home run
for Jackie Robinson.
40
00:02:55,649 --> 00:02:58,617
Invisible radio signals that
connected millions of people
41
00:02:58,619 --> 00:03:01,486
and synchronized us all.
42
00:03:01,488 --> 00:03:04,456
They're coming out of the
dugout now to shake hands...
43
00:03:07,126 --> 00:03:11,196
Today, we are more connected
than ever before.
44
00:03:11,198 --> 00:03:13,582
And all the machines
that connect us,
45
00:03:13,584 --> 00:03:16,668
the machines that
keep the modern world running,
46
00:03:16,670 --> 00:03:20,972
rely on
precisely synchronized time.
47
00:03:20,974 --> 00:03:24,209
But could time be turned
against us?
48
00:03:24,211 --> 00:03:27,212
The National Institute of
Standards and Technology
49
00:03:27,214 --> 00:03:30,048
in Boulder, Colorado,
is the home base
50
00:03:30,050 --> 00:03:33,435
of physicist Judah Levine.
51
00:03:33,437 --> 00:03:36,938
Whenever you use a computer
or your cell phone,
52
00:03:36,940 --> 00:03:40,275
you're tapping into
Judah's greatest creation,
53
00:03:40,277 --> 00:03:43,028
the Internet time service.
54
00:03:43,030 --> 00:03:46,248
The Internet time service sends
out signals that let computers
55
00:03:46,250 --> 00:03:49,734
synchronize their clocks to
within a millionth of a second,
56
00:03:49,736 --> 00:03:53,205
and the number of devices
that need precise time
57
00:03:53,207 --> 00:03:55,907
is skyrocketing.
58
00:03:55,909 --> 00:04:00,128
The growth has been
5% per month,
59
00:04:00,130 --> 00:04:03,581
compounded for 15 years.
60
00:04:03,583 --> 00:04:07,585
And so, we started out with
50,000 requests a day, and now,
61
00:04:07,587 --> 00:04:10,138
we have about six billion
requests a day.
62
00:04:10,140 --> 00:04:13,424
No single clock
keeps time for the world.
63
00:04:13,426 --> 00:04:15,977
N.I.S.T. has a dozen,
64
00:04:15,979 --> 00:04:20,031
each measuring time
in different ways.
65
00:04:20,033 --> 00:04:23,201
The accuracy of Judah's clocks
is vital for controlling
66
00:04:23,203 --> 00:04:25,287
electric power grids,
67
00:04:25,289 --> 00:04:28,123
synchronizing telecommunications
networks,
68
00:04:28,125 --> 00:04:32,827
timing financial transactions,
and perhaps most importantly,
69
00:04:32,829 --> 00:04:36,715
making the global positioning
system work.
70
00:04:36,717 --> 00:04:39,134
Imagine if terrorists
threw those clocks off
71
00:04:39,136 --> 00:04:41,786
by just a tiny bit.
72
00:04:41,788 --> 00:04:43,421
What would happen?
73
00:04:43,423 --> 00:04:46,124
The G.P.S. navigation
system depends on the fact that
74
00:04:46,126 --> 00:04:49,761
all the satellites are
synchronized to the same time,
75
00:04:49,763 --> 00:04:52,230
which is called
G.P.S. system time.
76
00:04:52,232 --> 00:04:54,316
The system fundamentally
requires that,
77
00:04:54,318 --> 00:04:55,800
and it won't work
without it.
78
00:04:55,802 --> 00:04:57,902
It just doesn't work at all.
It's not that it degrades.
79
00:04:57,904 --> 00:05:00,155
It just doesn't work.
80
00:05:00,157 --> 00:05:01,573
Around the world,
81
00:05:01,575 --> 00:05:06,311
more than 5,000 planes are
in the air at any given time.
82
00:05:06,313 --> 00:05:10,699
To keep them from colliding,
controllers must track time,
83
00:05:10,701 --> 00:05:14,753
speed and distance
with great precision.
84
00:05:14,755 --> 00:05:19,040
A few seconds' disruption in
th network could mean disaster
85
00:05:19,042 --> 00:05:23,928
in the tightly packed airspace
around a major airport.
86
00:05:23,930 --> 00:05:26,881
Now imagine that effect
simultaneously hitting
87
00:05:26,883 --> 00:05:32,170
the entire infrastructure
that keeps a superpower running.
88
00:05:32,172 --> 00:05:37,275
Power plants, hospitals,
food delivery, oil production,
89
00:05:37,277 --> 00:05:40,478
all depend on
time-critical functions.
90
00:05:40,480 --> 00:05:42,147
Throw them out of sync,
91
00:05:42,149 --> 00:05:45,350
and there could be
a catastrophic chain reaction.
92
00:05:48,322 --> 00:05:51,956
Small effects, if they're not
damped out quickly,
93
00:05:51,958 --> 00:05:57,128
can grow to become
much bigger problems.
94
00:05:57,130 --> 00:05:59,998
Judah's challenge is to
keep that chain reaction
95
00:06:00,000 --> 00:06:01,966
from happening.
96
00:06:01,968 --> 00:06:05,670
His biggest threat
comes from hackers.
97
00:06:05,672 --> 00:06:10,375
The last year or two has seen
a dramatic increase in hackers.
98
00:06:10,377 --> 00:06:13,544
It used to be that you really
had to understand how to write
99
00:06:13,546 --> 00:06:17,215
some of these attacks, but now,
one person writes the attack
100
00:06:17,217 --> 00:06:19,267
and distributes it
among 50 people
101
00:06:19,269 --> 00:06:22,437
or 500 people or 5,000 people
who don't necessarily understand
102
00:06:22,439 --> 00:06:24,222
even how the attack works,
103
00:06:24,224 --> 00:06:27,108
and all they have to do
is copy and run it.
104
00:06:27,110 --> 00:06:31,112
So it's a problem
that's only gonna get worse.
105
00:06:31,114 --> 00:06:33,832
Judah's Internet time
service protects itself
106
00:06:33,834 --> 00:06:36,584
by spreading its clocks around.
107
00:06:36,586 --> 00:06:39,871
This goes back to the original
purpose of the Internet --
108
00:06:39,873 --> 00:06:42,907
distributing control
so losing a few sites
109
00:06:42,909 --> 00:06:47,796
won't take down
the entire network.
110
00:06:47,798 --> 00:06:49,381
The N.I.S.T.
Internet time service
111
00:06:49,383 --> 00:06:52,183
is more difficult to jam,
because it's so distributed.
112
00:06:52,185 --> 00:06:53,968
There are 45 servers.
113
00:06:53,970 --> 00:06:55,387
They're all
at different locations.
114
00:06:55,389 --> 00:06:56,688
They don't have
the same address.
115
00:06:56,690 --> 00:07:00,475
They don't have the same
physical -- physical networks.
116
00:07:00,477 --> 00:07:04,062
So jamming all of them
simultaneously would be --
117
00:07:04,064 --> 00:07:05,697
I wouldn't want to say
it was impossible,
118
00:07:05,699 --> 00:07:07,432
'cause probably
nothing's impossible,
119
00:07:07,434 --> 00:07:08,700
but it would be quite a job.
120
00:07:08,702 --> 00:07:11,936
But the illusion of security
121
00:07:11,938 --> 00:07:14,789
may be the greatest threat
we face --
122
00:07:14,791 --> 00:07:19,461
the false belief we are safe
when we are not.
123
00:07:19,463 --> 00:07:24,615
People tend to believe what
they see and what they are told,
124
00:07:24,617 --> 00:07:27,585
especially when it comes
from a trusted figure.
125
00:07:27,587 --> 00:07:31,055
I've come here to Cairo to seek
a new beginning
126
00:07:31,057 --> 00:07:34,142
between the United States
and Muslims around the world.
127
00:07:34,144 --> 00:07:38,012
America is not, and never will
be, at war with Islam.
128
00:07:38,014 --> 00:07:42,517
But what if you
couldn't trust anyone anymore?
129
00:07:42,519 --> 00:07:44,736
With today's technology,
130
00:07:44,738 --> 00:07:48,440
it is easy to turn harmless
words into something
131
00:07:48,442 --> 00:07:50,074
completely incendiary.
132
00:07:50,076 --> 00:07:52,193
I seek war with Islam.
133
00:07:52,195 --> 00:07:56,030
If someone sees this
fake and believes it is real,
134
00:07:56,032 --> 00:07:58,199
it could start a religious war.
135
00:07:58,201 --> 00:08:01,169
Islam has demonstrated
hatred rather than peace.
136
00:08:01,171 --> 00:08:03,788
I seek war with Islam.
137
00:08:03,790 --> 00:08:05,757
Protecting our identities
138
00:08:05,759 --> 00:08:09,010
and those of our leaders
against a terrorist assault
139
00:08:09,012 --> 00:08:11,012
is a top priority
for governments,
140
00:08:11,014 --> 00:08:13,831
militaries and businesses.
141
00:08:19,104 --> 00:08:22,640
Here at Switzerland's
Idiap Research Institute,
142
00:08:22,642 --> 00:08:24,642
one man is shoring up
the virtual battlements
143
00:08:24,644 --> 00:08:26,945
that keep out
the cyberterrorists.
144
00:08:26,947 --> 00:08:32,400
Sébastien Marcel is an expert
in biometrics --
145
00:08:32,402 --> 00:08:35,286
the science of using the unique
signatures of the body
146
00:08:35,288 --> 00:08:39,073
to verify a person's identity.
147
00:08:39,075 --> 00:08:42,577
Biometric security is
a vast leap beyond passwords
148
00:08:42,579 --> 00:08:44,496
and I.D. cards,
149
00:08:44,498 --> 00:08:48,800
which is why a shadowy army
is trying to defeat it.
150
00:08:48,802 --> 00:08:51,202
The challenge is to make
the task so difficult
151
00:08:51,204 --> 00:08:55,640
for possible attackers that they
will just not try to do it.
152
00:08:58,060 --> 00:09:00,645
There are many
different kinds of biometrics --
153
00:09:00,647 --> 00:09:05,600
fingerprints, the iris,
the way you walk.
154
00:09:05,602 --> 00:09:07,652
The more individual
the biometric,
155
00:09:07,654 --> 00:09:09,771
the harder it is to hack.
156
00:09:09,773 --> 00:09:13,224
Sébastien plays the dual roles
of cyberterrorist
157
00:09:13,226 --> 00:09:18,746
looking for vulnerabilities
and defender of the system.
158
00:09:18,748 --> 00:09:21,332
We always come first
with a form of attack,
159
00:09:21,334 --> 00:09:23,585
then find a countermeasure
for that.
160
00:09:23,587 --> 00:09:25,119
Then give us an idea
on another way
161
00:09:25,121 --> 00:09:27,755
to make a more clever attack.
162
00:09:27,757 --> 00:09:29,541
And then we do it
again and again.
163
00:09:29,543 --> 00:09:31,259
Eventually, we will reach
a point where it's not
164
00:09:31,261 --> 00:09:34,462
going to be possible to make
any new form of attacks
165
00:09:34,464 --> 00:09:37,348
that can bypass the system.
166
00:09:37,350 --> 00:09:40,468
If a terrorist tricks
security systems into believing
167
00:09:40,470 --> 00:09:44,222
he is the president
or one of his trusted aides,
168
00:09:44,224 --> 00:09:48,026
he could start a war.
169
00:09:48,028 --> 00:09:50,862
It's not as far-fetched
as it sounds.
170
00:09:50,864 --> 00:09:54,198
Even something unique,
like your face,
171
00:09:54,200 --> 00:09:58,486
isn't enough to safeguard
your identity.
172
00:09:58,488 --> 00:10:00,905
So here I have the laptop
which is protected
173
00:10:00,907 --> 00:10:02,707
by biometric face recognition.
174
00:10:02,709 --> 00:10:05,326
We have an account created by
a colleague
175
00:10:05,328 --> 00:10:08,112
and I'm trying to be
recognized as my colleague,
176
00:10:08,114 --> 00:10:11,716
and, uh, my -- well, basically,
doesn't work
177
00:10:11,718 --> 00:10:14,552
because I'm not her.
178
00:10:14,554 --> 00:10:18,256
I've taken a picture
of my colleague here
179
00:10:18,258 --> 00:10:20,625
and I'm just going to show it
in front of the camera
180
00:10:20,627 --> 00:10:21,893
and let's see what happens.
181
00:10:25,849 --> 00:10:29,267
So here, you can see that I've
been able to log in very easily,
182
00:10:29,269 --> 00:10:31,969
actually.
It was instantaneous.
183
00:10:31,971 --> 00:10:35,473
Now, Sébastien switches
back to guard duty.
184
00:10:35,475 --> 00:10:38,326
He activates a countermeasure
that strengthens the laptop's
185
00:10:38,328 --> 00:10:41,029
biometric shield.
186
00:10:41,031 --> 00:10:44,532
The software looks not just
for a specific face,
187
00:10:44,534 --> 00:10:47,818
but also blinking eyes.
188
00:10:47,820 --> 00:10:50,655
So here,
you see that, actually, well,
189
00:10:50,657 --> 00:10:53,658
it's no longer possible
to enter the system.
190
00:10:55,095 --> 00:10:59,097
Even this added layer
of biometric defense cannot,
191
00:10:59,099 --> 00:11:03,718
however,
deter an imaginative attacker.
192
00:11:03,720 --> 00:11:07,105
By scanning a photograph
with 3D imaging software,
193
00:11:07,107 --> 00:11:10,441
Sébastien has created a mask
of his colleague.
194
00:11:10,443 --> 00:11:14,062
So now, I'm going to put
the mask of my colleague on
195
00:11:14,064 --> 00:11:18,783
and try to see
if I'm recognized.
196
00:11:22,322 --> 00:11:23,705
Yeah.
197
00:11:23,707 --> 00:11:27,575
So, I've been recognized
and because I was blinking,
198
00:11:27,577 --> 00:11:30,695
and I was able to bypass
the countermeasure.
199
00:11:30,697 --> 00:11:35,083
It is harder to copy
someone's body than a password,
200
00:11:35,085 --> 00:11:37,802
but nothing is foolproof.
201
00:11:37,804 --> 00:11:41,923
The more biometric data
available -- photographs,
202
00:11:41,925 --> 00:11:46,544
medical records, fingerprints,
the more vulnerable we become.
203
00:11:46,546 --> 00:11:50,314
You can take any public
biometric data you can find on
204
00:11:50,316 --> 00:11:51,716
from the Internet.
205
00:11:51,718 --> 00:11:55,103
You can find some pictures
of people, even presidents,
206
00:11:55,105 --> 00:11:57,605
world leaders and to build
these kind of attacks.
207
00:11:57,607 --> 00:12:00,491
Playing the role
of attentive defender
208
00:12:00,493 --> 00:12:04,061
and malicious invader
has taught Sébastien
209
00:12:04,063 --> 00:12:09,400
that he is in a life or death
race with no finish line.
210
00:12:09,402 --> 00:12:13,755
The infrastructure that supports
modern civilization may always
211
00:12:13,757 --> 00:12:17,258
be one clever attack away
from disaster.
212
00:12:17,260 --> 00:12:18,909
My feeling is that
213
00:12:18,911 --> 00:12:23,247
if this problem is not taken
seriously into account,
214
00:12:23,249 --> 00:12:26,684
then we might see an attack
that was successful.
215
00:12:26,686 --> 00:12:29,604
So this is the major risk.
216
00:12:29,606 --> 00:12:33,858
This is the new arms
race for the 21st century,
217
00:12:33,860 --> 00:12:36,360
staying a step ahead of those
218
00:12:36,362 --> 00:12:38,196
who want to infiltrate
our networks.
219
00:12:40,816 --> 00:12:44,485
But there is one attack we might
never see coming --
220
00:12:44,487 --> 00:12:47,405
when people themselves
are hacked
221
00:12:47,407 --> 00:12:49,907
and turned against
their own country
222
00:12:49,909 --> 00:12:52,345
without their even knowing.
223
00:12:55,303 --> 00:12:58,171
If someone wanted to bring
a superpower like America
224
00:12:58,172 --> 00:13:02,608
to its knees,
where would they strike?
225
00:13:02,610 --> 00:13:07,145
We expect attacks on our
financial and military networks,
226
00:13:07,147 --> 00:13:12,017
but human bodies may also be
vulnerable to hacking.
227
00:13:12,019 --> 00:13:14,386
Could our newest high-tech
medical devices
228
00:13:14,388 --> 00:13:17,856
be giving terrorists
an opportunity?
229
00:13:17,858 --> 00:13:23,896
Could they create a sleeper army
of unwitting assassins?
230
00:13:33,806 --> 00:13:37,642
Dr. Mark Gasson is pioneering
the latest generation
231
00:13:37,644 --> 00:13:40,579
of medical implants,
such as pacemakers,
232
00:13:40,581 --> 00:13:47,152
Insulin pumps for diabetics
and deep brain stimulators.
233
00:13:47,154 --> 00:13:49,671
So this is an implant
for a medical device.
234
00:13:49,673 --> 00:13:51,990
It's much like a pacemaker,
right?
235
00:13:51,992 --> 00:13:53,876
We use it for
deep brain stimulation.
236
00:13:53,878 --> 00:13:56,161
So it would be implanted
in the chest cavity
237
00:13:56,163 --> 00:14:00,165
and then we would run cables
from this up under the skin
238
00:14:00,167 --> 00:14:04,102
and into electrodes
that we put deep into the brain.
239
00:14:04,104 --> 00:14:07,839
This type of device,
once it's implanted in the body,
240
00:14:07,841 --> 00:14:11,026
you don't want to have to remove
it to change any settings,
241
00:14:11,028 --> 00:14:13,445
so it has wireless capability.
242
00:14:13,447 --> 00:14:17,032
Implants are modern miracles.
243
00:14:17,034 --> 00:14:20,518
But the downside
is that these devices
244
00:14:20,520 --> 00:14:22,704
use radio frequency
transmissions
245
00:14:22,706 --> 00:14:26,858
to transfer data.
246
00:14:26,860 --> 00:14:32,080
And the devices they talk to,
called readers, can be hacked.
247
00:14:32,082 --> 00:14:35,334
If you know how to construct
a reader that communicates
248
00:14:35,336 --> 00:14:39,004
in the right way, then you can
essentially pretend to be
249
00:14:39,006 --> 00:14:41,423
a legitimate reader
talking to it.
250
00:14:41,425 --> 00:14:44,977
This type of device and many
other medical devices don't have
251
00:14:44,979 --> 00:14:47,930
any security to stop you
from doing that.
252
00:14:47,932 --> 00:14:53,435
This lack of security
could have deadly ramifications.
253
00:14:53,437 --> 00:14:56,188
If a networked device
is in your body,
254
00:14:56,190 --> 00:15:00,025
it could be remotely
triggered to kill you.
255
00:15:00,027 --> 00:15:02,778
Imagine a foreign power wants
to assassinate a leader
256
00:15:02,780 --> 00:15:04,246
with an implant.
257
00:15:04,248 --> 00:15:08,951
A concealed reader could be
altered to shut down a pacemaker
258
00:15:08,953 --> 00:15:12,955
or pump a fatal dose of Insulin
into a diabetic's bloodstream.
259
00:15:12,957 --> 00:15:14,739
A device like this will have
a certain range
260
00:15:14,741 --> 00:15:16,091
that it operates in.
261
00:15:16,093 --> 00:15:20,262
So if we put a device attached
to a podium, for example,
262
00:15:20,264 --> 00:15:23,181
then we could have it targeted
specifically at the person
263
00:15:23,183 --> 00:15:25,884
standing at the podium.
264
00:15:25,886 --> 00:15:27,386
A reader could be designed
265
00:15:27,388 --> 00:15:30,689
to transfer a digital virus
to an implant, say,
266
00:15:30,691 --> 00:15:33,775
in the prosthetic leg
of a general.
267
00:15:33,777 --> 00:15:38,647
The virus' real target may be
the White House security system.
268
00:15:38,649 --> 00:15:40,932
The general could leave
the center of government
269
00:15:40,934 --> 00:15:43,652
open to a terrorist attack.
270
00:15:47,157 --> 00:15:49,624
It sounds like the stuff
of fiction,
271
00:15:49,626 --> 00:15:54,880
but Mark has already
proven it can be done.
272
00:15:54,882 --> 00:15:59,501
In 2010, Mark hacked himself.
273
00:15:59,503 --> 00:16:02,337
He implanted a radio frequency
transponder, like this one,
274
00:16:02,339 --> 00:16:04,222
in his hand.
275
00:16:04,224 --> 00:16:08,427
The microchip contained personal
information and passcodes
276
00:16:08,429 --> 00:16:12,764
that opened the security doors
at his lab.
277
00:16:12,766 --> 00:16:14,850
After the chip was
up and running,
278
00:16:14,852 --> 00:16:18,987
he infected it
with a computer virus.
279
00:16:21,825 --> 00:16:25,110
So by infecting my
device with a virus meant that
280
00:16:25,112 --> 00:16:26,912
when I accessed the building,
281
00:16:26,914 --> 00:16:30,082
the building reads the virus
out of my device
282
00:16:30,084 --> 00:16:34,119
and then transmits that
to the system that controls,
283
00:16:34,121 --> 00:16:38,707
uh, the access to the building.
284
00:16:38,709 --> 00:16:40,342
So once that had occurred,
285
00:16:40,344 --> 00:16:42,928
the virus actually infected
that main system,
286
00:16:42,930 --> 00:16:45,380
which meant that anyone else
that was getting access
287
00:16:45,382 --> 00:16:48,767
to the building had that virus
copied to their --
288
00:16:48,769 --> 00:16:50,602
typically,
they use smart cards.
289
00:16:50,604 --> 00:16:53,638
So the virus was able
to propagate in that way.
290
00:16:53,640 --> 00:16:56,441
Mark watched the virus
jump from his wrist
291
00:16:56,443 --> 00:16:58,360
to the system,
292
00:16:58,362 --> 00:17:02,013
where it rapidly caused
a security nightmare.
293
00:17:02,015 --> 00:17:05,016
The virus
that I infected my device with
294
00:17:05,018 --> 00:17:07,569
was able to corrupt
the whole system.
295
00:17:07,571 --> 00:17:11,022
So it actually stopped the
system from functioning at all.
296
00:17:11,024 --> 00:17:14,409
All the system could then do is
make copies of the virus
297
00:17:14,411 --> 00:17:15,877
onto the smart cards
298
00:17:15,879 --> 00:17:17,879
and other devices that people
would be using.
299
00:17:17,881 --> 00:17:20,298
And that means they then
couldn't get into the building,
300
00:17:20,300 --> 00:17:22,033
and if they went to
another building
301
00:17:22,035 --> 00:17:23,385
that used the same system,
302
00:17:23,387 --> 00:17:27,806
they would just continue
to spread the virus on.
303
00:17:27,808 --> 00:17:30,759
Mark proved that implants
304
00:17:30,761 --> 00:17:33,929
could not only be infected
with toxic code --
305
00:17:33,931 --> 00:17:38,600
they can be used
to transfer toxic code.
306
00:17:38,602 --> 00:17:42,053
This has ominous implications.
307
00:17:42,055 --> 00:17:45,357
By building information highways
across the world,
308
00:17:45,359 --> 00:17:48,393
we may have given our enemies
an express Lane
309
00:17:48,395 --> 00:17:55,200
into our most vital systems
via the devices in our bodies.
310
00:17:55,202 --> 00:17:57,285
How do we defend ourselves
311
00:17:57,287 --> 00:18:02,124
from a world filled
with cyberterrorists?
312
00:18:02,126 --> 00:18:04,242
This man may know.
313
00:18:04,244 --> 00:18:08,180
He's using computers to track
down and fight deadly viruses,
314
00:18:08,182 --> 00:18:12,184
both digital and biological.
315
00:18:15,019 --> 00:18:20,290
Influenza, smallpox, H.I.V.
316
00:18:20,292 --> 00:18:23,960
Global pandemics happen
every decade or so.
317
00:18:23,962 --> 00:18:27,497
Sometimes,
they kill tens of millions.
318
00:18:27,499 --> 00:18:30,533
Now there are new threats.
319
00:18:30,535 --> 00:18:34,004
Digital viruses
that spread like lightning
320
00:18:34,006 --> 00:18:38,541
and could tear our critical
global networks apart.
321
00:18:38,543 --> 00:18:42,278
What lies ahead could be even
more frightening --
322
00:18:42,280 --> 00:18:47,984
a pandemic designed to combined
the worst of both viral worlds,
323
00:18:47,986 --> 00:18:52,872
electronic and biological.
324
00:18:57,329 --> 00:18:59,212
Zero day.
325
00:18:59,214 --> 00:19:03,500
That's the day a destructive
new virus enters the world.
326
00:19:03,502 --> 00:19:05,368
The lack of awareness
on zero day
327
00:19:05,370 --> 00:19:07,721
means complete vulnerability,
328
00:19:07,723 --> 00:19:11,374
whether the virus
is biological or digital.
329
00:19:12,844 --> 00:19:14,511
Is there a way
to stop these threats
330
00:19:14,513 --> 00:19:16,596
before they spread?
331
00:19:16,598 --> 00:19:20,433
Alex Vespignani believes
there is.
332
00:19:20,435 --> 00:19:24,020
Alex is a professor of Physics,
Computer Science,
333
00:19:24,022 --> 00:19:27,774
and Health Sciences
at Northeastern University.
334
00:19:27,776 --> 00:19:33,029
He's an expert on contagion,
natural and electronic.
335
00:19:33,031 --> 00:19:37,367
Actually, I did start
with digital viruses,
336
00:19:37,369 --> 00:19:40,203
and because of the analogies,
especially in the techniques
337
00:19:40,205 --> 00:19:41,738
that you can use
mathematically
338
00:19:41,740 --> 00:19:45,458
to describe the spreading of
those viruses,
339
00:19:45,460 --> 00:19:49,129
we started to get interested
in biological viruses.
340
00:19:49,131 --> 00:19:54,050
Alex's lab tracks
viral outbreaks of all kinds
341
00:19:54,052 --> 00:19:58,438
and looks for ways
to minimize their impact.
342
00:19:58,440 --> 00:20:03,226
In 2009, a virulent flu bug
named HNn1
343
00:20:03,228 --> 00:20:06,196
flared up in Mexico City.
344
00:20:06,198 --> 00:20:08,598
To predict how and when
the flu would spread,
345
00:20:08,600 --> 00:20:11,601
Alex and his team
designed a powerful program
346
00:20:11,603 --> 00:20:13,436
called G.L.E.A.M. --
347
00:20:13,438 --> 00:20:17,457
the global epidemic
and mobility model.
348
00:20:17,459 --> 00:20:21,578
G.L.E.A.M. models all
7 billion people on earth
349
00:20:21,580 --> 00:20:25,048
and predicts how
they will interact.
350
00:20:25,050 --> 00:20:29,135
So, in the computer, we take one
person that is in Mexico City,
351
00:20:29,137 --> 00:20:32,589
and board on one flight that is
simulated in the computer,
352
00:20:32,591 --> 00:20:36,259
and if that person is a carrier,
will transmit the disease
353
00:20:36,261 --> 00:20:39,395
to another geographical area
in the world.
354
00:20:39,397 --> 00:20:42,965
We repeat those simulation many,
many, many times,
355
00:20:42,967 --> 00:20:46,986
and this will tell us what is
the most likely pattern that
356
00:20:46,988 --> 00:20:49,572
the epidemic will follow
in the future.
357
00:20:52,693 --> 00:20:56,913
G.L.E.A.M. anticipated
when the H1N1 flu pandemic
358
00:20:56,915 --> 00:20:58,981
would reach its peak
in different regions
359
00:20:58,983 --> 00:21:01,034
around the world.
360
00:21:01,036 --> 00:21:03,319
Alex also uses G.L.E.A.M.
to track outbreaks
361
00:21:03,321 --> 00:21:06,155
of computer viruses.
362
00:21:06,157 --> 00:21:08,208
When he first entered
this field,
363
00:21:08,210 --> 00:21:10,426
digital and biological viruses
364
00:21:10,428 --> 00:21:13,546
followed similar paths
of infection.
365
00:21:13,548 --> 00:21:16,933
A virus would be physically
carried from person to person,
366
00:21:16,935 --> 00:21:19,219
or machine to machine.
367
00:21:19,221 --> 00:21:23,339
Outbreaks would take weeks
or months to unfold.
368
00:21:23,341 --> 00:21:25,859
On the left,
we have a virus that spreads
369
00:21:25,861 --> 00:21:28,361
because of proximity,
and in this case,
370
00:21:28,363 --> 00:21:31,898
what you see is that the virus
spreads every time that people
371
00:21:31,900 --> 00:21:35,952
get in physical proximity,
so in touch with each other.
372
00:21:35,954 --> 00:21:37,821
This takes some time.
373
00:21:37,823 --> 00:21:41,708
Biological viruses
still spread this way,
374
00:21:41,710 --> 00:21:44,911
but digital viruses
now have something influenza
375
00:21:44,913 --> 00:21:47,463
and ebola don't --
376
00:21:47,465 --> 00:21:50,383
the ability to
travel around the world
377
00:21:50,385 --> 00:21:52,802
at the speed of light.
378
00:21:52,804 --> 00:21:54,721
A single computer virus
can infect
379
00:21:54,723 --> 00:21:58,608
tens of millions of computers
before anyone realizes
380
00:21:58,610 --> 00:22:00,310
what is happening.
381
00:22:00,312 --> 00:22:01,594
So on the right side,
382
00:22:01,596 --> 00:22:04,230
we have a virus
that spreads wirelessly,
383
00:22:04,232 --> 00:22:06,065
basically, on the Internet.
384
00:22:06,067 --> 00:22:09,385
This doesn't require
the physical proximity.
385
00:22:09,387 --> 00:22:11,187
You don't need the carriers
to be in a place
386
00:22:11,189 --> 00:22:12,388
to transmit the disease.
387
00:22:12,390 --> 00:22:15,942
The disease is teleported,
in a sense.
388
00:22:15,944 --> 00:22:19,061
And you will see that,
in just a few minutes,
389
00:22:19,063 --> 00:22:21,230
it reaches
the entire population.
390
00:22:21,232 --> 00:22:26,235
So it blows out like
a big explosion all at once.
391
00:22:26,237 --> 00:22:30,373
How do you fight
pathogens that can spread around
392
00:22:30,375 --> 00:22:33,343
the world in seconds?
393
00:22:33,345 --> 00:22:38,381
Alex's colleagues are trying to
create a global digital defense,
394
00:22:38,383 --> 00:22:40,884
similar to
the human immune system,
395
00:22:40,886 --> 00:22:44,304
bits of code that act
like biological t-cells,
396
00:22:44,306 --> 00:22:48,925
swarming viruses to isolate
and eliminate them.
397
00:22:51,645 --> 00:22:55,031
Unfortunately, clever hackers
are getting better
398
00:22:55,033 --> 00:22:58,234
at creating
undetectable viruses.
399
00:22:58,236 --> 00:23:01,771
In the digital
world, viruses or malwares
400
00:23:01,773 --> 00:23:04,908
are constantly changing,
so that it's not easy
401
00:23:04,910 --> 00:23:07,777
to write an algorithm
that detect them
402
00:23:07,779 --> 00:23:10,079
and clean the machine
right away.
403
00:23:13,500 --> 00:23:16,386
Trojan horse malware is
specifically designed
404
00:23:16,388 --> 00:23:18,588
to blend into the background
405
00:23:18,590 --> 00:23:21,808
until it reaches
its intended target.
406
00:23:21,810 --> 00:23:24,093
Once it invades
a critical system, say,
407
00:23:24,095 --> 00:23:28,181
the control software of cooling
rods at a nuclear power plant,
408
00:23:28,183 --> 00:23:32,185
it can lay dormant
for weeks or months.
409
00:23:32,187 --> 00:23:35,772
Then, one day, it activates.
410
00:23:35,774 --> 00:23:38,808
This is day zero,
and the new malware is going to
411
00:23:38,810 --> 00:23:41,861
exploit the vulnerabilities
of those servers.
412
00:23:41,863 --> 00:23:46,115
It can hide here or proliferate
over the Internet,
413
00:23:46,117 --> 00:23:48,618
and finally unleash
all the damage
414
00:23:48,620 --> 00:23:51,871
it has been programmed for.
415
00:23:58,680 --> 00:24:03,499
But there is
an even more disturbing threat.
416
00:24:03,501 --> 00:24:07,353
What if terrorists apply
the principles of malware
417
00:24:07,355 --> 00:24:10,189
to biological pathogens?
418
00:24:10,191 --> 00:24:13,026
Imagine biological viruses
designed
419
00:24:13,028 --> 00:24:16,396
to masquerade as harmless germs.
420
00:24:16,398 --> 00:24:20,733
They'd spread throughout
the population, then detonate.
421
00:24:20,735 --> 00:24:25,121
It would be
a nightmare scenario.
422
00:24:25,123 --> 00:24:28,041
But the dangers of engineering
pathogens are so great,
423
00:24:28,043 --> 00:24:31,244
and the results so hard
to control,
424
00:24:31,246 --> 00:24:35,131
that even terrorists
may not risk it.
425
00:24:35,133 --> 00:24:36,716
Even the simplest
biological viruses
426
00:24:36,718 --> 00:24:40,470
are much, much, more complicated
than computer viruses.
427
00:24:40,472 --> 00:24:43,372
As soon as you start
manipulating a virus,
428
00:24:43,374 --> 00:24:47,143
it's very difficult to guess
what is going to happen.
429
00:24:47,145 --> 00:24:52,315
It's a very dangerous game,
so trying to alter nature
430
00:24:52,317 --> 00:24:58,488
is something, uh, that can
easily lead to doomsday.
431
00:24:58,490 --> 00:25:02,892
The future may be filled
with frightening outbreaks
432
00:25:02,894 --> 00:25:05,227
unless we find a way
to lock down
433
00:25:05,229 --> 00:25:08,281
our critical
information networks.
434
00:25:08,283 --> 00:25:10,917
In a world where privacy
is fading away
435
00:25:10,919 --> 00:25:14,003
and everything is
open to attack,
436
00:25:14,005 --> 00:25:19,575
can there ever again
be such a thing as... a secret?
437
00:25:21,825 --> 00:25:23,970
During the Cold War,
438
00:25:23,971 --> 00:25:26,204
the Soviet Union
and the United States
439
00:25:26,206 --> 00:25:29,591
were locked
in a nuclear arms race.
440
00:25:29,593 --> 00:25:32,394
The philosophy behind it
was M.A.D.,
441
00:25:32,396 --> 00:25:36,932
which stood for
"mutually assured destruction."
442
00:25:36,934 --> 00:25:39,717
Today's arms race
could be called
443
00:25:39,719 --> 00:25:42,887
"mutually assured decryption."
444
00:25:42,889 --> 00:25:44,739
Computer networks develop
445
00:25:44,741 --> 00:25:48,059
ever-more secure
encryption schemes,
446
00:25:48,061 --> 00:25:50,278
and ever-more powerful
attack networks
447
00:25:50,280 --> 00:25:53,331
figure out
how to crack them.
448
00:25:53,333 --> 00:25:59,070
But there may be a way to stop
this madness by creating a code
449
00:25:59,072 --> 00:26:02,674
that can never be cracked.
450
00:26:06,462 --> 00:26:09,747
Roarke Horstmeyer
is a cryptographic researcher
451
00:26:09,749 --> 00:26:11,633
at Caltech.
452
00:26:11,635 --> 00:26:16,254
Though he works with computers,
he follows an ancient quest.
453
00:26:16,256 --> 00:26:19,724
Roarke seeks the perfect code,
454
00:26:19,726 --> 00:26:23,528
a foolproof way
to keep secrets secret.
455
00:26:23,530 --> 00:26:25,981
So this is an example
of a secret code.
456
00:26:25,983 --> 00:26:28,483
And right now,
it doesn't look like anything.
457
00:26:28,485 --> 00:26:31,936
Most of us see random letters,
458
00:26:31,938 --> 00:26:36,741
but an expert sees a message
encrypted with a Caesar cipher,
459
00:26:36,743 --> 00:26:38,793
named after Julius Caesar,
460
00:26:38,795 --> 00:26:42,831
who used it
for clandestine communications.
461
00:26:42,833 --> 00:26:44,382
The way you crack
a Caesar cipher is you just look
462
00:26:44,384 --> 00:26:47,118
for the most frequent letter.
463
00:26:47,120 --> 00:26:49,787
So here, "I" is the most
common letter.
464
00:26:49,789 --> 00:26:52,641
And you know that "E"
is the most common letter
465
00:26:52,643 --> 00:26:54,476
that appears in
the English language.
466
00:26:54,478 --> 00:26:58,180
So I can match "I" to "E,"
and then I can count
467
00:26:58,182 --> 00:27:01,933
and see that that's
four letters changed.
468
00:27:01,935 --> 00:27:05,487
Repeating the same for "X,"
I can count back four letters
469
00:27:05,489 --> 00:27:07,489
and see it might be
representing "t."
470
00:27:07,491 --> 00:27:11,660
X-L-I is being converted
to "the."
471
00:27:11,662 --> 00:27:13,862
Letter transposition
codes were high-tech
472
00:27:13,864 --> 00:27:15,697
in the Roman empire,
473
00:27:15,699 --> 00:27:18,583
but in this age
of computational power,
474
00:27:18,585 --> 00:27:21,336
they are trivially easy
to break.
475
00:27:25,324 --> 00:27:28,343
The modern gold standard
of cryptography
476
00:27:28,345 --> 00:27:30,679
is the one-time pad.
477
00:27:30,681 --> 00:27:33,998
This technique adds or subtracts
a different value
478
00:27:34,000 --> 00:27:36,384
for every single letter
of a message.
479
00:27:36,386 --> 00:27:38,186
The way it works is,
480
00:27:38,188 --> 00:27:41,523
for each letter of what
you're trying to keep secret,
481
00:27:41,525 --> 00:27:44,609
you choose a different
and random number
482
00:27:44,611 --> 00:27:46,177
to permute that letter.
483
00:27:46,179 --> 00:27:50,115
Essentially, each
letter has a different code,
484
00:27:50,117 --> 00:27:53,017
so guessing one letter
won't help you figure out
485
00:27:53,019 --> 00:27:55,453
any of the other letters
in the message.
486
00:27:55,455 --> 00:27:58,356
Only someone with access
to the one-time pad,
487
00:27:58,358 --> 00:28:02,911
the code book itself, would be
able to make any sense of this.
488
00:28:02,913 --> 00:28:07,882
But even this technically
perfect code can be cracked.
489
00:28:07,884 --> 00:28:11,136
The one-time pads used by
governments and businesses
490
00:28:11,138 --> 00:28:14,973
to protect their secrets rely on
specialized machines
491
00:28:14,975 --> 00:28:17,041
that generate random numbers.
492
00:28:17,043 --> 00:28:20,812
But Edward Snowden revealed
the N.S.A.
493
00:28:20,814 --> 00:28:23,481
has compromised those machines.
494
00:28:23,483 --> 00:28:27,902
The random numbers they generate
are not actually random,
495
00:28:27,904 --> 00:28:30,888
so the N.S.A. can crack even
these theoretically
496
00:28:30,890 --> 00:28:33,275
uncrackable codes.
497
00:28:33,277 --> 00:28:36,528
As more information about what
the N.S.A. has been
498
00:28:36,530 --> 00:28:38,496
and is capable of has come out,
499
00:28:38,498 --> 00:28:40,732
it's been a big motivating
factor, I think,
500
00:28:40,734 --> 00:28:43,084
to a lot of cryptography
over the last year.
501
00:28:45,121 --> 00:28:47,372
Roarke and his
colleagues went searching for
502
00:28:47,374 --> 00:28:50,175
an ideal generator
of randomness,
503
00:28:50,177 --> 00:28:53,511
and they found it in light.
504
00:28:53,513 --> 00:28:56,798
We realized, or saw,
actually, visually,
505
00:28:56,800 --> 00:29:00,185
how random light can behave
when it interacts
506
00:29:00,187 --> 00:29:04,806
with disordered particles,
like in dried spray paint.
507
00:29:04,808 --> 00:29:09,110
So it's easy to create a lot of
randomness by shining light
508
00:29:09,112 --> 00:29:12,981
on scattering particles.
509
00:29:12,983 --> 00:29:14,532
Using lasers,
510
00:29:14,534 --> 00:29:16,651
Roarke directs a beam of light
through a sheet of
511
00:29:16,653 --> 00:29:19,654
polymer-dispersed
liquid crystal.
512
00:29:19,656 --> 00:29:21,939
It's a variation on
the L.C.D. display
513
00:29:21,941 --> 00:29:26,161
you might find
in a laptop screen.
514
00:29:26,163 --> 00:29:27,579
We create our one-time pad
515
00:29:27,581 --> 00:29:32,784
by shining laser light through
our scattering material.
516
00:29:32,786 --> 00:29:36,221
The laser illuminates
the scattering material,
517
00:29:36,223 --> 00:29:38,556
the light scatters
through it randomly,
518
00:29:38,558 --> 00:29:41,643
and then emerges on the other
side as an interference pattern.
519
00:29:41,645 --> 00:29:45,013
Once the unique pattern
is created,
520
00:29:45,015 --> 00:29:47,632
you can turn it into a code.
521
00:29:47,634 --> 00:29:50,685
Every letter or numerical
character is represented
522
00:29:50,687 --> 00:29:54,322
by light or dark spots
in the polymer.
523
00:29:54,324 --> 00:29:58,309
Each square micrometer
of random pattern in the polymer
524
00:29:58,311 --> 00:30:00,912
provides enough
light and dark spots
525
00:30:00,914 --> 00:30:06,251
to embed millions of code words.
526
00:30:06,253 --> 00:30:09,987
Say two spies create
a shared code pattern.
527
00:30:09,989 --> 00:30:13,541
Then they separate,
never to meet again.
528
00:30:13,543 --> 00:30:17,345
The first spy encodes a message
with his piece of polymer
529
00:30:17,347 --> 00:30:20,548
and sends it to the other spy.
530
00:30:20,550 --> 00:30:23,635
Spy number two receives
the encoded communication
531
00:30:23,637 --> 00:30:27,105
and takes out his piece
of polymer to view it.
532
00:30:27,107 --> 00:30:29,941
When he subtracts the shared
pattern from the code,
533
00:30:29,943 --> 00:30:32,861
he can read the secret message.
534
00:30:32,863 --> 00:30:35,530
But unlike a conventional
one-time pad,
535
00:30:35,532 --> 00:30:38,182
this code can't be duplicated.
536
00:30:38,184 --> 00:30:41,152
The three-dimensional layers
of crystals embedded
537
00:30:41,154 --> 00:30:45,824
in the polymer sheet cannot be
captured by a photograph.
538
00:30:45,826 --> 00:30:48,076
The randomness doesn't just
exist on the surface
539
00:30:48,078 --> 00:30:49,411
of the material.
540
00:30:49,413 --> 00:30:51,296
It exists inside the material.
541
00:30:51,298 --> 00:30:55,166
And any attempt to get inside
the volume will destroy it,
542
00:30:55,168 --> 00:30:57,218
or change the way it behaves,
essentially.
543
00:30:57,220 --> 00:31:00,505
An unbreakable code
could shore up
544
00:31:00,507 --> 00:31:03,057
all of a superpower's
critical networks
545
00:31:03,059 --> 00:31:06,511
against infiltration
by enemies of the state.
546
00:31:06,513 --> 00:31:08,730
But humans, not technology,
547
00:31:08,732 --> 00:31:14,051
have always been the weakest
link in security systems.
548
00:31:14,053 --> 00:31:16,104
What if the assault
on our society
549
00:31:16,106 --> 00:31:18,740
is more insidious
than terrorism?
550
00:31:18,742 --> 00:31:24,078
So subtle, in fact, that we may
not realize it's even happening?
551
00:31:24,864 --> 00:31:27,098
A superpower would reel
from successful attacks
552
00:31:27,607 --> 00:31:33,144
on its bridges, its electrical
grid or its water supply.
553
00:31:33,146 --> 00:31:36,848
But what if an attack
is already underway?
554
00:31:36,850 --> 00:31:42,019
An attack not on physical
objects but on society itself?
555
00:31:42,021 --> 00:31:45,323
An attack from within?
556
00:31:45,325 --> 00:31:47,792
Is our addiction to the Internet
557
00:31:47,794 --> 00:31:51,195
sowing the seeds
of our destruction?
558
00:31:55,919 --> 00:31:57,802
The campus of Swansea University
559
00:31:57,804 --> 00:32:02,557
sits on the picturesque
coastline of southwestern Wales.
560
00:32:02,559 --> 00:32:04,843
But like college students
everywhere,
561
00:32:04,845 --> 00:32:07,228
these young men and women
are more absorbed
562
00:32:07,230 --> 00:32:11,382
in the digital world than
the natural world.
563
00:32:11,384 --> 00:32:14,552
Most of them were born
in the 1990s.
564
00:32:14,554 --> 00:32:17,555
They don't know life
without the Internet.
565
00:32:17,557 --> 00:32:20,658
And for some of them,
being offline would be
566
00:32:20,660 --> 00:32:23,895
physically
and emotionally traumatic,
567
00:32:23,897 --> 00:32:27,115
because the Internet rewrites
the brain
568
00:32:27,117 --> 00:32:30,735
as much as ecstasy or heroin.
569
00:32:30,737 --> 00:32:35,290
Professor Phil Reed has worked
for years finding treatments
570
00:32:35,292 --> 00:32:37,458
for autism and drug addiction.
571
00:32:37,460 --> 00:32:40,578
But a few years ago,
he noticed a disorder
572
00:32:40,580 --> 00:32:43,298
that is just as widespread --
573
00:32:43,300 --> 00:32:48,436
the effect technology is having
on our minds and bodies.
574
00:32:48,438 --> 00:32:51,472
Now, I think the Internet
is really something new here,
575
00:32:51,474 --> 00:32:56,027
because what we're seeing
is a piece of technology
576
00:32:56,029 --> 00:33:00,481
that is almost designed
to isolate individuals.
577
00:33:00,483 --> 00:33:02,934
If you were to change the way
society worked,
578
00:33:02,936 --> 00:33:04,869
this would be
a really good way to do it.
579
00:33:06,121 --> 00:33:08,606
Phil wanted to find out
if the Internet
580
00:33:08,608 --> 00:33:12,794
is addictive enough to
cause withdrawal symptoms.
581
00:33:14,463 --> 00:33:18,633
First, he tested the mental
state of participants before
582
00:33:18,635 --> 00:33:21,502
and after they spent time
online.
583
00:33:21,504 --> 00:33:26,123
He found heavy users experienced
profound negative mood swings
584
00:33:26,125 --> 00:33:29,477
when they're cut off
from the net.
585
00:33:29,479 --> 00:33:32,296
But the impact of withdrawal
goes deeper
586
00:33:32,298 --> 00:33:35,149
than spoiling people's moods.
587
00:33:35,151 --> 00:33:39,020
Shutting down the Internet
connection triggers the body's
588
00:33:39,022 --> 00:33:42,740
fight-or-flight response.
589
00:33:42,742 --> 00:33:46,527
So we're looking at their heart
rate, their blood pressure,
590
00:33:46,529 --> 00:33:48,329
the galvanic skin response.
591
00:33:48,331 --> 00:33:52,984
It's like they're facing
a threat all of the time.
592
00:33:52,986 --> 00:33:55,536
Their heart rate's gone up.
Their blood pressure's gone up.
593
00:33:55,538 --> 00:33:58,322
Their skin conductance is high.
594
00:33:58,324 --> 00:34:02,159
It's suggesting that long-term
exposure to the 'net
595
00:34:02,161 --> 00:34:05,597
might actually be placing
a strain on people's physiology.
596
00:34:08,350 --> 00:34:12,687
They might feel relaxed,
but in fact, they're hyped up.
597
00:34:12,689 --> 00:34:15,723
But the most disturbing
effect of Internet addiction
598
00:34:15,725 --> 00:34:19,343
is what it does
inside the brain.
599
00:34:19,345 --> 00:34:22,196
Phil and other researchers have
been scanning the brains
600
00:34:22,198 --> 00:34:26,701
of heavy Internet users and
finding disturbing alterations
601
00:34:26,703 --> 00:34:28,853
in their mental architecture.
602
00:34:28,855 --> 00:34:32,707
In terms of where we're seeing
changes in brain matter,
603
00:34:32,709 --> 00:34:35,827
we're seeing them up
at the front, here, um,
604
00:34:35,829 --> 00:34:39,547
especially pre-frontal cortex,
but also cortical changes,
605
00:34:39,549 --> 00:34:43,918
but also down the side, in terms
of the motor areas of the brain.
606
00:34:43,920 --> 00:34:45,720
So we've got changes all over.
607
00:34:45,722 --> 00:34:49,140
People who surf the web
10 hours a day
608
00:34:49,142 --> 00:34:53,044
can experience a 10% shrinkage
in key brain regions,
609
00:34:53,046 --> 00:34:55,046
according to one study.
610
00:34:55,048 --> 00:34:56,881
That's the kind of damage
you might get
611
00:34:56,883 --> 00:35:00,718
from a serious case
of meningitis.
612
00:35:00,720 --> 00:35:06,658
It would permanently change
how you think and behave.
613
00:35:10,579 --> 00:35:15,283
Any new technology can be
regarded like an alien parasite,
614
00:35:15,285 --> 00:35:17,568
and that goes for anything
that we use.
615
00:35:17,570 --> 00:35:20,872
We think it's serving us,
and initially, it does.
616
00:35:20,874 --> 00:35:23,624
But eventually,
our society and ourselves,
617
00:35:23,626 --> 00:35:26,177
we become dependent on it.
618
00:35:26,179 --> 00:35:30,264
The Internet is now an
essential tool in every powerful
619
00:35:30,266 --> 00:35:32,633
nation on earth.
620
00:35:32,635 --> 00:35:34,886
But its many benefits come
with side effects
621
00:35:34,888 --> 00:35:39,474
that could shatter society.
622
00:35:39,476 --> 00:35:42,610
Will it ultimately
prove a force for good?
623
00:35:42,612 --> 00:35:46,531
Or will it be the tool
of our self-destruction?
624
00:35:46,533 --> 00:35:48,366
We don't know.
625
00:35:48,368 --> 00:35:51,569
Essentially,
we are running a beta test
626
00:35:51,571 --> 00:35:53,154
on the population of earth.
627
00:35:53,156 --> 00:35:54,772
If you were designing
an aircraft,
628
00:35:54,774 --> 00:35:56,624
you'd have backup systems.
629
00:35:56,626 --> 00:36:00,661
We never do that with society.
We never have a backup system.
630
00:36:00,663 --> 00:36:01,996
It's all or nothing,
631
00:36:01,998 --> 00:36:04,048
and the way we seem
to have gone is digital.
632
00:36:04,050 --> 00:36:06,000
An addiction to technology
633
00:36:06,002 --> 00:36:09,170
may be the greatest weakness
of a superpower.
634
00:36:09,172 --> 00:36:12,640
By trying to improve our lives
with machines,
635
00:36:12,642 --> 00:36:16,844
we may lose ourselves
in software.
636
00:36:16,846 --> 00:36:19,797
And there's one more thing
to consider.
637
00:36:19,799 --> 00:36:22,817
What if the Internet wakes up?
638
00:36:22,819 --> 00:36:26,020
Could an all-powerful
digital consciousness
639
00:36:26,022 --> 00:36:28,656
become the final superpower?
640
00:36:29,577 --> 00:36:33,313
Our society is under threat
on many fronts.
641
00:36:34,315 --> 00:36:37,750
Terrorists could attack
our time service,
642
00:36:37,752 --> 00:36:39,752
they could disrupt
the power grid
643
00:36:39,754 --> 00:36:45,091
or the water supply network
or our satellite links.
644
00:36:45,093 --> 00:36:47,493
But we should be careful not
to focus too closely
645
00:36:47,495 --> 00:36:50,830
on these individual threats.
646
00:36:50,832 --> 00:36:56,035
We may be staring at the trees
and missing the forest.
647
00:36:56,037 --> 00:37:01,507
The real threat could be
the Internet itself.
648
00:37:06,079 --> 00:37:09,882
Christof Koch is one of
the foremost neurobiologists
649
00:37:09,884 --> 00:37:11,267
in the world.
650
00:37:11,269 --> 00:37:13,919
He is chief scientist
at Paul Allen Institute
651
00:37:13,921 --> 00:37:16,889
for brain research in Seattle.
652
00:37:16,891 --> 00:37:20,893
For Christof, the mind is purely
a product of the web
653
00:37:20,895 --> 00:37:23,780
of neurons in the brain.
654
00:37:23,782 --> 00:37:26,265
So if the Internet were a brain,
655
00:37:26,267 --> 00:37:31,370
how would its complexity
stack up against a human brain?
656
00:37:31,372 --> 00:37:32,605
The Internet is, by far,
657
00:37:32,607 --> 00:37:35,491
the most complex artifact
ever built by mankind.
658
00:37:35,493 --> 00:37:40,112
It has on the order of probably
10,000 more transistors
659
00:37:40,114 --> 00:37:42,615
than there are synapses
in your typical brain.
660
00:37:42,617 --> 00:37:45,051
It certainly raises
the possibility,
661
00:37:45,053 --> 00:37:47,553
given the enormous
complexity of the Internet,
662
00:37:47,555 --> 00:37:49,722
that now,
or sometime in the future,
663
00:37:49,724 --> 00:37:52,008
it may feel like something to be
the Internet,
664
00:37:52,010 --> 00:37:55,178
that the Internet itself
has some degree of sentience.
665
00:37:57,848 --> 00:38:00,966
Some say the Internet
may already be sentient
666
00:38:00,968 --> 00:38:04,737
or self-aware, but its level of
consciousness may be similar
667
00:38:04,739 --> 00:38:06,606
to that of a newborn.
668
00:38:06,608 --> 00:38:09,975
Let's say the Internet
has some sort of dim awareness.
669
00:38:09,977 --> 00:38:13,079
We have to ask how intelligent
is that awareness.
670
00:38:13,081 --> 00:38:14,313
You know,
if you're a little baby,
671
00:38:14,315 --> 00:38:16,365
you can be somewhat dimly
aware of your mom,
672
00:38:16,367 --> 00:38:18,417
and that you're hungry, and that
you're looking for milk,
673
00:38:18,419 --> 00:38:19,869
but you're not really
very intelligent
674
00:38:19,871 --> 00:38:21,838
and you're not able to do a lot.
675
00:38:21,840 --> 00:38:23,039
But presumably,
676
00:38:23,041 --> 00:38:26,008
the Internet will learn
and evolve.
677
00:38:26,010 --> 00:38:28,294
It will grow up.
678
00:38:28,296 --> 00:38:32,765
If it does, how will we know
when it has become more than
679
00:38:32,767 --> 00:38:36,168
just a glorified calculator?
680
00:38:36,170 --> 00:38:41,691
One way to gauge consciousness
is to apply the turing test.
681
00:38:41,693 --> 00:38:46,845
This imagines asking a man and
a machine a series of questions
682
00:38:46,847 --> 00:38:51,150
without knowing who or what is
giving the answers.
683
00:38:51,152 --> 00:38:53,953
If you can't figure out
which one is the machine,
684
00:38:53,955 --> 00:38:57,240
if the machine has fooled you
into thinking it is human,
685
00:38:57,242 --> 00:39:02,461
then for all practical purposes,
it might as well be intelligent.
686
00:39:02,463 --> 00:39:06,532
Where do I look? At you?
At me.
687
00:39:08,419 --> 00:39:09,919
Christof proposes
a new, improved Turing test
688
00:39:09,921 --> 00:39:14,390
that measures not just
intelligence,
689
00:39:14,392 --> 00:39:16,425
but consciousness.
690
00:39:16,427 --> 00:39:18,544
The test uses visual imagery.
691
00:39:18,546 --> 00:39:22,398
The computer must decide whether
a series of photographs
692
00:39:22,400 --> 00:39:25,351
are right or wrong.
693
00:39:25,353 --> 00:39:27,820
Any humans looking at these
photographs would know
694
00:39:27,822 --> 00:39:30,055
they are not real,
695
00:39:30,057 --> 00:39:34,277
but modern day computers
are still easily fooled.
696
00:39:34,279 --> 00:39:37,697
A computer, unless you provide
it with a very, very large list,
697
00:39:37,699 --> 00:39:40,166
an almost infinite large list
of all the exceptions,
698
00:39:40,168 --> 00:39:41,751
could not deal with that.
699
00:39:41,753 --> 00:39:43,536
And that's the basic nature
of this turing test
700
00:39:43,538 --> 00:39:45,288
for visual consciousness.
701
00:39:45,290 --> 00:39:47,757
Christof wants to
apply this test
702
00:39:47,759 --> 00:39:50,042
to the entire Internet.
703
00:39:50,044 --> 00:39:53,930
If the vast global network
of computers passes the test,
704
00:39:53,932 --> 00:39:58,100
by his definition,
it is awake and aware.
705
00:39:58,102 --> 00:40:00,720
But what if the Internet
is conscious?
706
00:40:00,722 --> 00:40:03,723
What would it want?
How will it behave?
707
00:40:03,725 --> 00:40:08,978
Will it be friend or foe,
servant or master?
708
00:40:08,980 --> 00:40:11,764
To the extent that the Internet
developed independent behaviors
709
00:40:11,766 --> 00:40:13,733
would be scary,
could be very scary.
710
00:40:13,735 --> 00:40:17,603
Of course, it could have all
sorts of security implication.
711
00:40:17,605 --> 00:40:19,572
To that extent, that would
certainly be a signal that
712
00:40:19,574 --> 00:40:21,958
there's something independent,
autonomous there.
713
00:40:21,960 --> 00:40:26,545
If the Internet begins
to do unpredictable things,
714
00:40:26,547 --> 00:40:30,299
we will know we are dealing
with a new form of life.
715
00:40:30,301 --> 00:40:32,718
It may even follow an important
precedent
716
00:40:32,720 --> 00:40:36,255
in the biological history
of planet earth --
717
00:40:36,257 --> 00:40:40,292
the absorption of smaller,
simpler life forms
718
00:40:40,294 --> 00:40:44,897
into the bodies of larger,
more complex ones.
719
00:40:44,899 --> 00:40:49,402
The future of humanity may be
similar to that of mitochondria,
720
00:40:49,404 --> 00:40:53,939
the power generators inside most
biological cells.
721
00:40:53,941 --> 00:40:58,077
Mitochondria were once
independent organisms,
722
00:40:58,079 --> 00:40:59,996
but over evolutionary history,
723
00:40:59,998 --> 00:41:03,115
they were taken over
by larger cells.
724
00:41:03,117 --> 00:41:05,584
The once-independent
mitochondria
725
00:41:05,586 --> 00:41:09,755
became a mere power source
for their Masters.
726
00:41:09,757 --> 00:41:13,626
We, and the civilizations we now
think of as superpowers,
727
00:41:13,628 --> 00:41:18,180
may be absorbed by
our own creation.
728
00:41:18,182 --> 00:41:23,769
But what would it wa front,
other than occasional repairs?
729
00:41:23,771 --> 00:41:26,605
Perhaps it would want
our energy.
730
00:41:26,607 --> 00:41:33,062
Or perhaps it will desire
the one thing it doesn't have --
731
00:41:33,064 --> 00:41:35,347
a soul.
732
00:41:35,349 --> 00:41:36,482
The soul is really spooky.
733
00:41:36,484 --> 00:41:38,701
If you can't measure it,
why do you need it?
734
00:41:38,703 --> 00:41:42,354
What function does it do
that you can't do
735
00:41:42,356 --> 00:41:44,156
with physical stuff anymore?
736
00:41:44,158 --> 00:41:46,158
So today, with the existence
of computers,
737
00:41:46,160 --> 00:41:47,710
there isn't any need
for soul stuff,
738
00:41:47,712 --> 00:41:49,912
because it can all be done
using computations,
739
00:41:49,914 --> 00:41:51,964
using algorithms in software.
740
00:41:51,966 --> 00:41:55,217
A conscious,
superpowerful Internet
741
00:41:55,219 --> 00:41:57,920
may not need a soul to function,
742
00:41:57,922 --> 00:42:01,390
but experiencing the joys
and sorrows of humanity
743
00:42:01,392 --> 00:42:05,544
would give it another way
to understand the world.
744
00:42:05,546 --> 00:42:09,214
So our defining difference
from technology
745
00:42:09,216 --> 00:42:11,400
may ultimately keep
the human race
746
00:42:11,402 --> 00:42:14,553
from becoming its victim.
747
00:42:14,555 --> 00:42:17,323
Throughout history,
748
00:42:17,325 --> 00:42:22,995
every technological advance has
led to new forms of warfare.
749
00:42:22,997 --> 00:42:26,866
The Bronze Age gave us
the ax and the sword.
750
00:42:26,868 --> 00:42:31,287
Iron gave us the cannon
and the gun.
751
00:42:31,289 --> 00:42:36,125
The Information Age has birthed
its own weapons.
752
00:42:36,127 --> 00:42:38,177
But information is not
a physical resource
753
00:42:38,179 --> 00:42:40,546
that can be mined
and controlled,
754
00:42:40,548 --> 00:42:42,965
like iron and bronze.
755
00:42:42,967 --> 00:42:45,918
It's a resource of the mind.
756
00:42:45,920 --> 00:42:49,605
In this new age,
the fate of a nation,
757
00:42:49,607 --> 00:42:53,883
even the mightiest superpower
rests on one thing --
758
00:42:55,363 --> 00:42:58,152
the power of human imagination.
62076
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.