• 4 months ago
‘Seguridad’ explora los problemas y amenazas que existen a la privacidad en Internet, imaginando un escenario futuro en el que Internet colapse bajo su propio peso o fuera derribado por un sabotaje. ¿Cuánto tiempo podría seguir funcionando nuestra sociedad hiperconectada antes de que una nuevo sistema cibernético entrase en funcionamiento?

Category

😹
Fun
Transcript
00:00The hackers have accessed the traffic control of some of the European high-speed railway networks.
00:12They have controlled the direction and the brakes of a sub-last model with terrifying results in power.
00:23In addition to the computerized controls of the high furnaces of a German workshop.
00:30And this.
00:45Can you imagine hearing the voice of a stranger in the baby monitor of your child's room?
00:50How scary is that?
00:52Well, something like that happened to a couple in Washington State.
00:55They hacked their baby monitor last model.
00:59But we should not be surprised, because we know that the Internet is practically everywhere.
01:04And that it can be connected to almost any device that makes my life and yours more comfortable.
01:10From phones to Facebook, we have chosen comfort before privacy, but at a price.
01:21As consumers, as citizens, as technologists, we do not anticipate the dark side.
01:28They try to infiltrate companies, steal our identity, funds, intellectual property, steal national secrets.
01:36It is different from the physical environment of war. What is the proportional response to a cyber attack?
01:43There is no absolute sense of good and evil.
01:49The tools come and go, the skills come and go, the threats come and go as usual.
01:55The culture of routine surveillance has begun.
02:00Clearly they are following us. But how much data do you have about me? And what are you going to do with it?
02:06One of the things that we are still not clear about is who does technology really work for?
02:11Does it work for the individual? For the state? For the company? For the institution?
02:25Internet keys. Security.
02:34People want devices that make their lives easier.
02:39And security is largely granted.
02:43People naturally assume that they have taken the appropriate actions, and it is rarely like that.
02:49Trying to make the Internet a safe place, a safe place, has become a multimillion-dollar industry.
02:56It is an industry designed to really do one thing.
02:59Take a step ahead of malicious hackers.
03:03Now you will have noticed that I have said malicious hackers, because it turns out that there are hackers of all kinds.
03:08White hats are the good guys, black hats are the bad guys, and gray hats are in between.
03:14My friend Sami Kamkar is one of the good guys.
03:18I got into hacking and technology when I was 10 years old, when they gave me my first computer.
03:24My mother spent all her savings on that computer.
03:27The day they gave it to me, I connected to the Internet, and it was one of the best days of my life.
03:31I connected and started searching for things on Expediente X, one of the best series.
03:35And I found a chat room where I could talk to people about the series.
03:38I entered that chat room, and immediately someone told me to go.
03:41I was like, why do they tell me to go? I said no.
03:44And they told me I had 10 seconds to go.
03:46I said it would be the typical weirdo on the Internet, so I stayed in the chat room.
03:50And 10 seconds later, my computer crashed.
03:53The screen went blue.
03:55I had no idea what had happened.
03:57My mother had spent all her money, and I was scared that the computer had been damaged.
04:01But at the same time, I thought it was the coolest thing in the world.
04:04How could I do that?
04:06Hacking in the mid-90s was very different from how it is conceived today.
04:12There were no malicious intentions.
04:14There was no theft.
04:16It was all driven largely by intellectual curiosity.
04:20Driven by that curiosity, Sammy, who at the time was not even old enough to drink,
04:25found out how to hack MySpace, a pioneering and very popular social network.
04:31When he finished, everyone who visited his MySpace page
04:35found the phrase, Sammy is my hero, on his MySpace page.
04:40Basically, he had created a worm, a virus,
04:42and there was no way to stop it.
04:45Sammy's curiosity infected more than a million MySpace users
04:49and forced the company to close its page for 24 hours.
04:54MySpace did not report me, but the government did, for creating the virus.
05:00In the end, I accepted an agreement.
05:02I would not touch a computer in three years of my life.
05:05Now Sammy makes a living looking for vulnerable points in products that can be connected to the network,
05:09such as refrigerators, cars, and babysitters.
05:13Everything we have now has technology,
05:16whether it's the garage, the car, or even the door lock.
05:19I want to see how the system should work and how we don't want it to work.
05:24Sammy is part of a group of new international professionals,
05:29the young white hat hackers,
05:31hired to access impenetrable systems and seal their cracks.
05:35Welcome to HackerOne.
05:38Is that safe?
05:40I hope so.
05:42Companies that want to identify vulnerabilities that are difficult to detect, or bugs,
05:47often offer cash rewards, the so-called bug bounties.
05:51And like a cutting-edge technology talent hunter, HackerOne connects talent to the mission.
05:56We use the term hacking, but we must stop considering it something related to criminals.
06:01It's a very diverse community of software engineers,
06:03handlers, amateurs, academics, security researchers.
06:07Microsoft has paid a reward to a five-year-old hacker who mocked parental controls on his Xbox.
06:13Google has done the same to a seven-year-old hacker.
06:17Technology bugs are everywhere, and anyone is capable of finding them.
06:22This is the Uber reward program.
06:25We're talking to a hacker named AimDB.
06:28And you see he's talking to a member of the Uber security team
06:31to understand the troubleshoot he found.
06:35What's most surprising to me, looking at this chain,
06:38is just how friendly the conversation is.
06:41That's a little bit like, hey, I found this bug.
06:44And they're like, hey, yeah, you've got the money. Here's some money.
06:47It's a conversation.
06:49It's the ideal response that we'd like to see in a company.
06:54It's good to see this type of cooperation,
06:57but it wouldn't be necessary if the vulnerabilities weren't so serious in power.
07:01What stops a white hat hacker from becoming a bad guy
07:04if he finds a very good vulnerability?
07:07The same thing that stops your medical doctor from taking a kidney
07:10and selling it in the black market.
07:12We rely on ethics and laws and the morals of people.
07:16The number of rotten apples that would use that knowledge
07:20with a criminal or evil purpose is relatively small.
07:23And nothing will happen as long as we're prepared for it
07:26and we anticipate that eventuality.
07:29Crime has obviously been with us since the dawn of civilization.
07:34Technology only makes it easier for someone to automate their attacks,
07:38to make them more important.
07:40That's why now we can have a guy in Europe attacking someone in the United States
07:44without a great deal of effort.
07:46And that's why it's so different now.
07:50That morning I was busy.
07:53I was answering emails and watching TV when my mother called me.
07:56She told me she had problems with her computer
08:00and she's using words like hijacked and these things without shame.
08:06First I realized that my computer was going incredibly slow.
08:11And then I saw the message there.
08:15All your files are encrypted.
08:18Welcome to the world of Ransomware,
08:20a virus that is surprisingly easy to infect.
08:24Usually Ransomware is introduced through an unsolicited email.
08:29This is usually a cybercrime.
08:32Someone manipulates an email address from someone we know,
08:36changes a letter or a punctuation mark,
08:39and when you open that email and you click on the link,
08:42your computer is infected.
08:44Then the virus takes over all the personal files on the computer
08:48and blocks them, encrypts them, with something called a key.
08:51Without that encrypted key, everything on our computer is inaccessible.
08:55It's lost forever.
08:57Unless we pay.
08:59That's why it's called Ransomware, because Ransom means rescue.
09:02Ransomware is very profitable and popular
09:05because most people don't have copies of their files.
09:09I had a lot of photos of my granddaughter, but no copies.
09:14They were unique.
09:16But anyway, a clock appeared that said,
09:18you have to pay in seven days.
09:23And they wanted $500.
09:26And I said it was in Russia or Ukraine.
09:31I had to do it.
09:33I didn't have a choice.
09:36It's incredible to see how many people have been victims of this,
09:40how many companies pay the ransom.
09:43They don't have to get everyone's ransom,
09:45but if only 10% pay, it's hundreds of millions of dollars.
09:51My mom paid the ransom and she got her files back.
09:55There's no getting around it.
09:57Either you get sick of it and you don't have the files,
09:59and you have to start from scratch,
10:01or you pay the ransom because those files are very valuable to you.
10:05Ransomware has become a powerful and international criminal company.
10:10In the first three months of 2016,
10:11private individuals, government agencies, police departments and hospitals
10:16paid more than $209 million just to access their own files.
10:21And when such serious amounts of money are moved,
10:24the Secret Service is also moving.
10:27Good afternoon, everybody.
10:29Let's start.
10:31What do we have this week in the city?
10:33The Secret Service is doing a dual mission.
10:36Fundamentally, it protects the President of the United States
10:38and the most important elected officials.
10:41The other side is the mission to investigate the Secret Service.
10:45We investigate the economic crimes
10:48and the use of computers that can attack the economic infrastructure
10:51and the financial markets of our nation.
10:55Good morning.
10:57Today we will execute an arrest warrant for the Lunar Eclipse operation.
11:00We have credible information about a suspect
11:03who has been located in the lower Manhattan area.
11:05The suspect is a 40-50-year-old white man.
11:09He was last seen on the first avenue.
11:12We're going to execute three teams.
11:14If we think of bank robbers,
11:17we probably think of mountain robbers, weapons and explosives.
11:20But modern thieves know that real money is no longer in the physical world.
11:25One of the biggest bank robberies in history was a cyber crime.
11:29In 2013, some high-level hackers
11:31stole $40 million from thousands of cash registers around the world.
11:35And all in just a few hours.
11:43The hackers infiltrated the computer system
11:46of a company that manages credit cards from a bank in Oman.
11:50This was a logistical cyber crime like Oceans Eleven.
11:54The hackers found a vulnerability
11:57on the company's payment processing platform.
11:59They eliminated the limits of hundreds of prepaid debit cards
12:03and then printed them in the three-dimensional world.
12:06Then they distributed the cards to a wide network of so-called street cash registers.
12:10Thieves located in cash registers in dozens of countries
12:13who were ready to enter the card, collect the money and run away.
12:18There were hundreds waiting for them to be given the PIN.
12:22And then, like a clock...
12:25They release the PIN number.
12:26These individuals go to the cash register and withdraw the funds.
12:35This was a very large pyramid.
12:38And at the top were the hackers,
12:41then the coordinators and then the field operatives
12:44who simultaneously withdrew money in 25 countries on five continents
12:48for a total of more than $45 million in 12 hours.
12:53The Internet made this crime possible.
12:56But remember, not all cybercriminals are bright minds.
13:01There were two individuals who were brave enough
13:04to publish on their social networks that they had stolen a large amount of money.
13:08And they proceeded to take a selfie with a lot of money.
13:12And that was one of the methods used to make arrests in this case.
13:22Cyberintrusions are a relatively new field.
13:26It has only been with us between 5 and 7 years.
13:29It is usually something international.
13:32It can emanate from Canada, Eastern Europe, Finland, Russia, Australia...
13:37And everyone uses the same tool, the Internet.
13:412015 was a record year for international cybercrime
13:45and cost the world $400 billion.
13:48But not all cybercriminals do it for the money.
13:52Think of the famous hack of Sony Pictures,
13:55for example, a work allegedly by the North Korean government.
13:59It's a devastating hack,
14:02crippling one of the world's most powerful entertainment studios.
14:05No one knows why the North Koreans leaked thousands of embarrassing corporate emails,
14:09numbers of social security, employees and even movies waiting to be released.
14:14Fury and the remake of Annie were posted on illicit websites.
14:18Why did North Korea go after Sony?
14:21I don't think it was because they wanted to enter the movie business.
14:25One theory is that they wanted to respond to a Sony movie, The Interview,
14:29a comedy that featured the murder of their beloved leader.
14:33President Kim Jong-un.
14:35What you gonna do? What you gonna do?
14:38Think about that for a second.
14:40That means that a country attacked a company.
14:43It's pretty crazy.
14:45The North Korean regime has called the movie terrorism, an act of war,
14:49a moral attack on its leadership.
14:51They thought it was a direct attack on the North Korean regime.
14:55They didn't like the movie. They didn't like what it said.
14:58Did you just say dong?
15:00The movie was crude, but the cyberattack was sophisticated.
15:04They specifically targeted administrators and stole their credentials.
15:09So they actually had privileges at the level of an administrator across the network
15:13across the whole system.
15:15To me, it was an incredibly important moment for the United States
15:19because it wasn't just an attack on a company and its employees.
15:23They actually threatened all the theaters across the country.
15:27People were scared.
15:29To me, that's terrorism, and that could have very serious consequences.
15:32I think the United States government still doesn't have very clear rules
15:37when it comes to when it should step forward to defend its property
15:41and the rights of a company.
15:44So, let's imagine that a state acted against Lockheed Martin, for example,
15:49or some other vital infrastructure that's in private hands,
15:53or against our health care insurance, or against the private sector,
15:57or against the financial sector, where I have my money
16:01and I can't receive anything from a cashier.
16:04I mean, at some point, we're going to have to figure out where this line is,
16:08where does hacking become an act of war?
16:13As you know, recent reports suggest that the air force's space control was hacked.
16:18We don't know if there was a serious leak.
16:21We believe that the access route occurred through a subcontractor
16:25that is part of the defense's industrial base.
16:28We don't know what they got, but we believe that our GPS system has been compromised.
16:33Okay, at this point, these issues of national network security are not going to form a scale.
16:39What is the security that's going to take care of blocking nuclear warheads?
16:43What is the security that's going to take care of protecting our GPS system?
16:47These are very vital questions, and the consequences of doing wrong are extreme.
16:53Here at West Point, instructors like Major Sean Lonergan
16:56analyze these questions in an intense way
16:59as they train the next generation of soldiers to be cyber warriors.
17:03The United States has enjoyed, since its founding, great security.
17:08We have friendly neighbors in the north and the south,
17:11and our two best allies, the Pacific and the Atlantic, normally protect us.
17:15But now, cyberspace is the only war zone where we face rivals at our level.
17:20There are people abroad who can touch us and attack the United States,
17:24and that's a concern for us.
17:27Do you think we should give access to the civilian sector to military GPS?
17:31If the global positioning system based on satellites were hacked,
17:35as in this exercise, you would be surprised at how serious the consequences would be.
17:40Without GPS, there is no tracking of targets, there are no guided missiles.
17:45But the biggest impact would be in agriculture.
17:50Now GPS is used to sow, water and harvest.
17:54And if we remove the GPS from that equation,
17:58those machines will not know where they are.
18:01We would lose billions of dollars.
18:04So what happens if we consider Pakistan responsible, even if it is not the culprit?
18:10One of the big problems in cybercrime and cyberwar is attribution.
18:14It's one thing if you rob a bank,
18:17and there is a picture of us entering the bank,
18:20and it's clear who has stolen the bank.
18:23But if another nation attacks you in cyberspace,
18:27and you don't know who has attacked you as a nation, what can you do about that?
18:31It's a new war.
18:33In the old days, countries needed long-range missiles to attack.
18:37Now you can do a lot more damage with little more than a keyboard.
18:41We know that there are attempts to access the infrastructure of this country,
18:46but not just our infrastructure.
18:48I think we are seeing more and more of these persistent threats.
18:52The hacker activists, the criminals, the states,
18:55on many occasions we don't even know what they want to achieve.
18:58In 2016, the Department of Defense allocated 5.5 billion dollars to cyber operations,
19:04and a high percentage was dedicated to the US Cyber Command.
19:07But ironically, one of our biggest strides in cyber defense
19:11was due to a terrifying attack where cutting-edge technology did not intervene.
19:29There are many good reasons to have a strong intelligence agency in any country.
19:34The idea is to be able to detain people who are suspicious of criminal acts,
19:40who buy materials to make bombs,
19:44who try to launch nuclear programs,
19:47things that are very destabilizing and dangerous on a large scale.
19:51The former NSA contractor, Edward Snowden,
19:54was the first to reveal how a program designed to look for terrorists abroad
19:58was used in a generalized and secretive way after the 11-S
20:01to spy on American citizens.
20:05I worked at the NSA.
20:08I worked directly with the massive surveillance tools in my last job in Hawaii.
20:12I could see the world's internet traffic.
20:15Sitting at my desk, I could type in any name,
20:19any phone number, and pull up the associated files of that traffic.
20:24Now, there are some legal restrictions to the use of this tool
20:30To spy on an American, for example, you need a court order.
20:35But technically, it's already in the system.
20:38You just have to look at it.
20:40Of course, the NSA had a lot of help.
20:43The ability to track was already included on the internet.
20:46Companies like Apple, Google, Microsoft, and Facebook
20:50collect, store, and happily sell data about their users.
20:54In other words, us.
20:57You know, a lot of people are worried about government agencies spying on them,
21:02but they don't seem to be worried about Google or AT&T
21:06or AT&T, who are handling their data minute by minute,
21:10and in fact, can do pretty much whatever they want.
21:13We have to be aware that when we use the internet,
21:17the byproduct of our daily activities in the modern world
21:21is that we produce records.
21:23And when we connect to Google, or Facebook,
21:26or our government, or our insurance,
21:29when we connect to an Amazon purchase record,
21:32we are creating the perfect records of our private lives,
21:38as has never been seen in the history of the world.
21:42A culture of routine surveillance has been inaugurated.
21:48But despite the fact that we have them,
21:50despite the fact that they have us in their hands,
21:53we respond by shrugging our shoulders.
21:56Hey, Facebook listens to us.
21:58Maybe Apple listens to me through my iPhone.
22:01I just sit down and they listen to me.
22:04We've all become identified bears.
22:08We put the radio collar on ourselves.
22:11It's called a smartphone.
22:13Now, this attracts us as efficiently
22:16as any radio collar we could put on our neck.
22:18So, without knowing it, we are co-conspirators
22:22in our own loss of privacy.
22:25Many companies have learned how to make money
22:28from all the personal data we have given them.
22:31Our habits, what interests us,
22:33very valuable personal information for advertisers.
22:36A company has discovered that there is still
22:38very personal information that has not been obtained,
22:40nor profited.
22:42Hello.
22:44Hi, how are you? I'm Derek.
22:46Me too. It's a good name.
22:48Do you have a card?
22:50Sure.
22:52What do you call this?
22:54This is called a sociometric card.
22:56It's like your company's identification card
22:58with sensors that allow you to control
23:00how members of an organization relate to each other.
23:02Humanize is a startup based in Boston
23:04that has taken tracking technology
23:06to a new level,
23:08and to a new place,
23:10the workspace.
23:12We really want to take all the data
23:14that is important for human interaction.
23:15Many companies accumulate data about their clients,
23:17but if I ask a company
23:19how much the engineering team
23:21talks with the sales team,
23:23they have no idea.
23:25We have two microphones on the card,
23:27one up and one in front.
23:29They don't record what you say,
23:31but we do a voice processing in real time.
23:33Right now, they're capturing the percentage of time
23:35that I'm talking,
23:37my voice tone, how loud I speak.
23:39The idea is that if I start speaking a little faster,
23:41that indicates something about our conversation.
23:43We also have information about proximity.
23:45If I have a card,
23:47it tells us that I'm talking to you,
23:49that is, it tells us who I'm in the office with.
23:51We also have a motion sensor,
23:53just like your cell phone,
23:55but really the idea is that if we have two teams
23:57that talk a lot to each other,
23:59we know where they're talking
24:01and how that can change
24:03the way people collaborate.
24:05The card records about 4 gigabytes
24:07of data from your carrier every day,
24:09and when a company signs a contract with Humanize,
24:11it buys the ability to track its employees
24:13with an amazing level of detail.
24:15All right, so these are two different types
24:17of position sensors,
24:19and we've got some very interesting things.
24:21What were you doing between 3.24 and like 3.30?
24:26I was probably lost sitting in a chair
24:28reading something on the phone.
24:30Okay, so essentially,
24:32we can see that there's this 10 minute period of time
24:35where you're in your own world there.
24:38And I think what's important here
24:40is not to say that we don't see these things
24:42individually,
24:43and we don't show this data to anybody,
24:45not even to our customers,
24:47but having this specific level of singularity
24:49among thousands or hundreds of thousands of people,
24:52imagine what you can learn
24:54about what's actually going on in a company.
24:57This would have been unthinkable 50 years ago,
25:01the notion that we're constantly being watched.
25:04It's the sort of thing that Orwell wrote
25:06and that we were scandalized about.
25:09Humanize analyzes the information
25:10from a group of employees
25:13to get the general picture.
25:15But the data they collect is so specific,
25:18so individual and so personal
25:20that it's hard to get used to it.
25:22Do you think that in three to four years
25:25all the identification cards will be like this?
25:28Oh, yes, I expect that in three or four years
25:31most of the identification cards
25:33will have these sensors.
25:35But the question is, what will you do with the data?
25:37Humanize insists that the data
25:38collected by the employees
25:40must remain anonymous.
25:42But it does make us think about
25:44the possibilities of this technology.
25:46I mean, the key is trust.
25:48Do you trust your boss not to spy on you?
25:51Because they certainly can if they want to.
25:54In the United States, at least,
25:56we know that the bosses can read our emails,
25:58register our activity on the keyboard,
26:00record us on a closed circuit,
26:02or even with our webcam.
26:04Now, most employees don't mind,
26:06but some are pushing back.
26:09I was in charge of sales at Intermex.
26:12It's a company that makes bank transfers
26:14between the United States and South America.
26:17My territory included from central California
26:20all the way to the coast of California
26:22and then all the way to Santa Cruz.
26:24So it's quite a lot to do there.
26:26The company wanted to implement a new program
26:29where they had an app
26:31downloaded onto their phones
26:33and this app was supposed to track
26:35everyone around you
26:36to the very smallest detail.
26:41Thanks to the iPhone's built-in GPS,
26:43the app tracked Mirna
26:45wherever she went and recorded
26:47how long she stayed in one place.
26:49Their bosses even knew
26:51at what speed she was driving
26:53and they wouldn't let her turn it off.
26:55They were following me all the time.
26:57So I felt, I don't know,
26:59watched all the time.
27:01I never said no at work,
27:03but they not only didn't follow me,
27:04but they recorded where we were going.
27:06What did they keep the data for?
27:08How much data did they have on me?
27:10And what were they going to do with it?
27:12All of that scared me.
27:14So another colleague and I
27:16decided not to use the app
27:18and we were fired immediately.
27:20Mirna sued her company.
27:22I was surprised by the disgrace in this
27:25that occurred here.
27:27I'm not surprised that a boss
27:29would try to follow his employees
27:31and we know from experience
27:32that our bosses take a lot of liberties
27:34with our right to privacy
27:36and on many occasions
27:38when we enter the office
27:40they tell us that our time is theirs,
27:42that we use their machines,
27:44that they have a right
27:46to see what we do.
27:48But that was before the internet
27:50invaded our workplaces.
27:52The scenario is very different
27:54when you have people on the street
27:56and especially when you use
27:58the same device to work
28:00as for your personal use.
28:02You can't control what they do
28:04during their breaks
28:06and after work.
28:08That scares me
28:10and I think it scares Mirna as well.
28:12So if our bosses
28:14and Google and our government
28:16are all trying to track us,
28:18what are we supposed to do?
28:20Just throw our smartphones
28:22and disconnect from the internet entirely?
28:24Let's face it,
28:26that's never really going to happen.
28:28So the other extreme is
28:30we can throw our privacy
28:32away.
28:34Welcome to Songdo,
28:36South Korea.
28:38Its developers call it
28:40the city of the future.
28:46Before 2001
28:50all of this was underwater.
28:55To build Songdo
28:57the planners first had to
28:59claim 600 hectares
29:00If you were expecting autonomous cars, flying cars and mobile roads, well, you won't find it here.
29:07But what you will find is the highest skyscraper in the country, the longest bridge and, most importantly, interconnectivity.
29:14Because Songdo was built literally from its foundations to be a smart city.
29:19As it was built from scratch, it was easy to integrate a network of sensors throughout the city.
29:25And just as easy is to forget that in Songdo, we are being watched.
29:31This is the Integrated Operations Center.
29:35Here, operators monitor all vital functions of the city.
29:38From traffic, weather conditions, public transport and emergency response,
29:43to advertising fences, energy consumption and waste disposal.
29:48This room is the brain of the city.
29:51Traffic is not only monitored from here, it is also controlled.
29:54Operators can control the synchronization of traffic lights and use signals to redirect traffic flow.
30:00The system has a database with all the country's license plates.
30:04It knows all the cars in Songdo.
30:09And the security cameras distributed throughout the city act as an omnipresent police force.
30:15They observe and report suspicious activities in real time.
30:19Brian Bailey is Product Director at Samsung Biologistics.
30:22He moved to Songdo with his family in 2014.
30:27We've lived in several places.
30:29Songdo is the safest city we've ever lived in.
30:33We feel very safe with our children.
30:36We let them go around the city alone.
30:39We don't have to worry about their safety.
30:43There are obvious advantages to living in the city of the future.
30:48The Internet is everywhere.
30:50So anywhere you go, you have a very good Wi-Fi signal.
30:54The buses have it, the subway has it, as well as all the cafes, restaurants and stores.
31:01So being able to have access to the Internet is very convenient here.
31:07But in Songdo, privacy is practically non-existent.
31:12You can't do anything without a camera recording you.
31:15I've heard that in the center they put a little dot for the camera and they follow you for hours all over Songdo.
31:21Really? They can follow you for hours?
31:24Thanks to the facial recognition software, they know where you are.
31:28And what do you think of that?
31:30We feel spied on everywhere.
31:33You feel spied on?
31:34Yeah.
31:35You go down the street and there are eyes everywhere.
31:41You can't do that.
31:42No.
31:43Not anymore.
31:46When we put the cameras, people felt that we were invading their privacy.
31:50However, that changes when an incident occurs.
31:54People say, there are no cameras in our area.
31:57Install them near my house.
32:00When you're in Songdo, do you think of the cameras that are filming you?
32:04On the street, I'm not aware of it.
32:07I have not committed any crime, so why should I worry about the cameras?
32:12Saying that you don't care about privacy because you have nothing to hide
32:17is the same as saying that you don't care about freedom of expression because you have nothing to say.
32:22But that's a harassment to understand what the rights are and what privacy really is and what it's for.
32:30Privacy is not about having nothing to hide.
32:33It's about having something to protect.
32:36And in a free and open society, that thing is freedom.
32:41One thing we've learned from Edward Snowden is that our government has a voracious appetite for data,
32:47including data from American citizens.
32:49And that's the thing about the United States, it's a sophisticated democracy.
32:53People around the world are even less protected from their governments.
33:00And what can happen if we forget that the phone we have in our pocket is also a surveillance device?
33:05In 2014, the protesters in Kiev found out.
33:13After a confrontation with the police, the protesters in the area received a threatening text message.
33:18Dear user, you have been registered as a participant in a violation of the mass public order.
33:25So, the cell phones and surveillance cameras are obviously elements to be avoided if we don't want to be followed.
33:31But is there any way to prevent us from being followed if we connect to the Internet?
33:36Well, it turns out that there is a very interesting tool that does exactly that.
33:40It's a special browser called Tor.
33:43Assuming someone doesn't know what is Tor.
33:46It's a solution to a problem that a lot of people don't know they have on the Internet.
33:51I've been consulting the New York Times before, and this is all that has been loaded.
33:57It has gone to a place called s.motaz.com, to another called inworldwide.com, and to another called clicktail.net.
34:04And all these people have gotten my data.
34:07They all follow me.
34:09A lot of money is moving in the tracking of the web browser of completely normal people.
34:13And it's something that's not very regulated in the United States.
34:17So how does Tor solve this problem?
34:20Well, Tor uses a technology called routed onion.
34:23By which you divert traffic through several different computers run by volunteers distributed all over the world.
34:30Tor gets its name from routed onion.
34:32Because it creates several layers between us and the indiscreet eyes that can conceal our identity.
34:38That in the center is my computer.
34:40When I click on a link, my request travels from my machine to the number one volunteer machine that is somewhere else in the world.
34:48Automatically sends the request to the volunteer number two, who does not see me.
34:52Then his machine sends the request to the page I was trying to see.
34:56But that page and its tracking software only see her.
34:59They do not see me in any way.
35:02All that complexity is what protects our privacy.
35:07Here we can go to the New York Times.
35:10And we see that our traffic has been transmitted through a post in Germany.
35:15Another post in France.
35:16Another post in France.
35:18And then it has gone to the Internet.
35:20So none of those websites get your information.
35:23Exactly.
35:24But they receive the information of the last transmission.
35:26That's it.
35:27And what kind of people use Tor?
35:30Well, we have human rights volunteers and activists in different countries.
35:34We have victims of gender violence who are trying to get some security in the communications.
35:40We have normal people who do not want to be watched by different governments or advertisers.
35:46And we have advocates of crazy privacy like me, who like the idea of ​​not sharing about ourselves.
35:54Nothing more than the essential.
35:56Tor makes manifest the conflict that our society is facing right now.
36:00Because we must remember that Tor was funded by the government.
36:04The Navy put the money for the development of Tor.
36:07Because it was aware that spies also needed to communicate safely.
36:11And that they were at risk.
36:13There are many people in the world who live under repressive governments.
36:18And they try to carry out social changes that could be unpopular.
36:22I want those people to have the privacy they need to do their job.
36:26And I know the next question is, will the terrorists use it?
36:30The answer is yes, of course.
36:32But also the activists.
36:34The security of devices, whether it's our computer, our phone, or our washing machine,
36:41is a binary state.
36:44Meaning there are only two possible options.
36:47It's either secure or it's not.
36:50There is no option to make a device secure against bad guys,
36:56but insecure against good guys.
37:00Or all of us are secure.
37:02Or none of us are.
37:11So here we are.
37:12At the crossroads between internet security and freedom.
37:15We don't mind if Google follows us, but we don't want our government to do it.
37:19We know that internet can be hacked, but that doesn't concern us enough to stop using it.
37:23In fact, we can't stop using it.
37:26We depend on it.
37:27We are addicts.
37:28Our finances, relationships, our work.
37:30Now our whole life is online.
37:32But our virtual lives don't really live in the clouds or cyberspace.
37:37They live inside brick and mortar buildings, like this one in the lower Manhattan area.
37:42And when we see the kilometers of cable and all the physical infrastructure
37:46that our online lives have to go through,
37:48the internet seems less magical, more physical, and possibly more vulnerable.
37:55When I think of the internet, I often like to forget the abstract
37:58and stand in a specific place and think of all the communications that go through that spot.
38:03It's interesting.
38:0460 Hudson Street in New York is one of the most important internet buildings in the world.
38:09And it's a single building.
38:11I can send a text message to Helsinki this afternoon and with the right tools,
38:15say, okay, it went through this building, this building, and this building, and then this cable.
38:19And when you see the path it's taken, you see that it's been a real, physical path.
38:23It's been through real places on the map.
38:26In the world, there are only 12 points of internet exchange as big as this one.
38:30But there are hundreds smaller, distributed all over the planet.
38:34And according to internet designers, that distribution makes it safe, or at least safer.
38:41It has billions of parts, each of which operates independently.
38:46And so, there isn't any master switcher that turns everything on.
38:51And that's a good thing. It makes it more resistant.
38:54It means no one can threaten to turn it all off because they can't.
39:01My handle is Mudge.
39:02I and the six individuals seated before you make up the hacker group known as The Loft.
39:08Back in the 90s, there was a security investigator, Mudge,
39:12who testified to Congress that he could turn off the internet in 30 minutes.
39:17The last time I talked to him, he said it would take an hour.
39:21The internet is absolutely safe.
39:24However, the internet heals.
39:27The internet is not a thing anymore.
39:30It's a combination of millions of things.
39:33So, if someone is able to coordinate an attack against those systems,
39:36it will hurt them, it will leave them out of service for a season, but it will never be able to kill them.
39:42Nature could have something to say about it.
39:46Solar radiation can make electronic devices unusable.
39:50In 1859, a super solar storm bombed the earth and wreaked havoc on the internet of the 19th century.
39:56The telegraph network.
39:58Solar storms occur constantly, but this one, known as the Carrington event, made history.
40:04A rain of sparks sprang from the telegraph machines,
40:07and the messages burned in flames.
40:10We've had solar storms in 2012, 2013, and 2014.
40:14That's why scientists believe that a second Carrington event is a matter of time.
40:19Only today, our electronic dependence is thousands, even millions of times greater.
40:24And at the center of it all is the internet.
40:29So, what would really happen if it all suddenly went down?
40:33It's 5 a.m. in New York.
40:35The night watchers have been noticing for an hour that Google has gone down.
40:39At approximately 6.30 a.m., Amazon, the New York Times, and ESPN.com are dead.
40:46Facebook goes down an hour later.
40:48At 8 a.m., all the trains in New Delhi have stopped.
40:51And the air traffic control from Norway to the Mediterranean is out of service.
40:55Hundreds of flights are left on the ground.
40:57At 10.53 a.m., all the traffic lights in Manhattan turn green.
41:01London reports that the medical records of 160 hospitals have been erased.
41:05Customers whose last name starts with the letter M
41:08discover that their bank accounts have suddenly been emptied.
41:11In 12 different banks.
41:13At 4 p.m., China has denied being involved, as has Pakistan.
41:16Iran was denying its involvement when diplomatic telephone lines were cut off.
41:20At 7.22 p.m., the lights in Norway go out.
41:23No electricity, no subways, no water.
41:26On the roads, mass gridlock.
41:28The lines, stretching for miles.
41:30The Internet is paralyzed.
41:32And there are always ways for that to happen.
41:34Rare ways, but that could happen.
41:36Our financial systems would collapse.
41:38Our transportation network would collapse.
41:40The power system, the water system, the natural gas distribution,
41:44the telecommunications systems, would collapse.
41:47We would have no electricity.
41:49How do you think a city like New York would be
41:52after not having power for six months?
41:54Which also means that there would be no police communication,
41:58no fire service, no water.
42:01How would people survive?
42:03How many of us know how to make fire without matches?
42:06I do.
42:08I don't know my children's phone numbers.
42:10I mean, that's crazy.
42:12My iPhone knows my children's phone numbers.
42:15When I was little, we all knew like 20 numbers
42:18of our friends, parents, and relatives.
42:20Now we leave the memory on our devices,
42:22and we depend a lot on them.
42:24And there's no backup for the Internet, right?
42:27If there was something, if there was a virus
42:29that would end the Internet,
42:31it's incredible how quickly it would end civilization as well.
42:34The good news is that there is SurvivorLibrary.com.
42:37It's a library where you can find
42:39all the information you need to survive.
42:42From embalming to building carts,
42:44it's the dream of any survivor.
42:46But instead of weapons and food,
42:48it's a reserve of knowledge.
42:50But the bad news?
42:52It's on the Internet.
42:54But even when solar winds and the dreadful hackers
42:57don't finish it off,
42:59even when the Internet is functioning normally,
43:02our precious information is still there.
43:05It's still there.
43:07It's still there.
43:09I mean, remember these?
43:11Or this?
43:13The same fate of obsolescence
43:15awaits all the storage formats
43:17we use today.
43:19We have another huge problem
43:21that we know very well,
43:23and that's the possibility
43:25that all the digital content
43:27is not correctly interpretable
43:29in 100 years,
43:31because the software that knows what it means
43:33doesn't work anymore.
43:35So that's another problem.
43:37The threat of a digital age in full swing.
43:40The reality is that obsolescence
43:42has always been around us.
43:44It doesn't matter if it's about transportation
43:47or technology.
43:49It happens.
43:51When it comes to things like
43:53archival storage,
43:55you, as the custodian of something
43:57that we believe should be preserved
43:59for future generations,
44:01need to be prepared
44:03for the fact that
44:05future generations
44:07need to be prepared
44:09to keep re-copying it
44:11to the media of the day
44:13that seems to have some longevity.
44:16That's just life in a big city,
44:18and it's frustratingly annoying
44:20constantly.
44:22But sometimes the problem
44:24is not the technology.
44:26Sometimes it's the simple law of life
44:28that causes very valuable information
44:30to disappear.
44:32One thing we've discovered
44:34is that the internet
44:36only lasts about 100 days
44:38before a page is changed
44:40or deleted.
44:42100 days.
44:44Sometimes it's involuntary.
44:46Often it's for commercial reasons,
44:48when companies make the decision
44:50to delete the work
44:52that you've been putting
44:54on their websites.
44:56Keeping old stuff alive
44:58is not easy.
45:00So the goal of Internet Archive
45:02is that it doesn't depend
45:04on a physical element
45:06for a company to stay alive.
45:08The invention that defines
45:10Internet Archive
45:12is the time machine
45:14that takes instantaneous
45:16web pages at regular intervals
45:18so that if the content changes
45:20or a company ceases its activity,
45:22that material is not lost forever.
45:24Today, web pages are kept
45:26using a complicated algorithm,
45:28but the ultimate goal
45:30is to collect web data.
45:32There were probably only 30 million pages.
45:34Now we're collecting
45:361,000 million pages a week.
45:38Our total collection is about
45:40500 million pages
45:42that are in the time machine.
45:44Archive employees in San Francisco
45:46and around the world
45:48are constantly digitizing
45:50printed materials, videos, games
45:52and operating systems,
45:54all kinds of ephemeral products.
45:56All participants in the project
45:58of Internet Archive
46:00have at least one thing in common,
46:02hopes for the future.
46:04The servers in this room
46:06are 5 petabytes of data
46:08and that's the primary copy
46:10of Internet Archive.
46:12I've been designing supercomputers
46:14throughout my career
46:16and the great thing about them
46:18is that the lights do mean something
46:20every time a light flashes
46:22is that there's someone
46:24going up or down
46:26and that's where all our knowledge
46:28and all our weaknesses come from
46:30and it's all in the most versatile
46:32and extraordinary invention
46:34of humanity.
46:36If you think about it,
46:38our whole civilization
46:40depends on this infrastructure
46:42from the moment we wake up
46:44to the moment we go to sleep
46:46to the moment we're born
46:48to the moment we die
46:50and all the intermediate steps.
46:52I think it's been a quarter century
46:54and we have achieved what we believed
46:56where are we?
46:58Do we need to change course?
47:00I'm a huge optimist.
47:02I think when we have this conversation
47:04on our 50th birthday,
47:06on the 75th,
47:08on the 100th anniversary
47:10of commercial Internet,
47:12we will say that we have built
47:14a society that has taken the best
47:16out of this infrastructure.
47:18Right now, the Internet
47:20is a tool, a very powerful tool
47:22and we have to figure out
47:24how to use it best
47:26and like any tool,
47:28it depends on who's using it
47:30and why.
47:32Since there will always be good guys
47:34and bad guys,
47:36we'll have to stay vigilant.
47:38But there's more.
47:40If we think about those exponential growth curves,
47:42we're in one of those moments
47:44where we're about to jump up
47:46and do this.
47:48Technology is a living thing.
47:50It is an organism.
47:52It is an extension of us.
47:54Some very smart people have warned
47:56that at any moment
47:58the Internet could evolve.
48:00It could become something
48:02more than just a tool,
48:04perhaps an intelligence
48:06capable of using its own tools.
48:08But where would that take us?
48:10You know, I worry a lot about
48:12just pure mankind
48:14the way these technologies
48:16are emerging
48:18and, you know,
48:20what our role is
48:22in these systems and machines
48:24that are surrounding us
48:26and it's not clear that
48:28we can be the masters
48:30for our destiny in the future.
48:32We're in an amazing time
48:34to be alive.
48:36Today we have 14 billion devices
48:38connected. My phone, your TV,
48:40my Tesla car,
48:42there's 14 billion devices connected
48:44and we'll get to 100 billion
48:46in 2020.
48:48We're heading for a world
48:50where everything will be
48:52in images and will be recorded
48:54and we'll be able to do anything
48:56we want, whenever we want,
48:58wherever we want.
49:00This is our billion-sensor economy
49:02and how you combine that data
49:04and what questions you ask
49:06is what's really changing
49:08the way we live our lives.
49:10I'm not as stupid as I am
49:12to make predictions about the Internet
49:14and I will assume
49:16that the Internet will be omnipresent,
49:18I will assume it will be noisy
49:20and rowdy,
49:22I will assume that it will be
49:24a mix of controlled
49:26and fiercely independent
49:28and that will be complicated
49:30and a blessing and a curse
49:32at the same time.
49:34Given how fast technology is
49:36and how quickly we adapt to it,
49:38I don't think we have to wait
49:40very long to find out.
49:42Microsoft Mechanics
49:44www.microsoft.com
49:46www.microsoft.com
49:48www.microsoft.com
49:50www.microsoft.com
49:52www.microsoft.com
49:54www.microsoft.com
49:56www.microsoft.com

Recommended