• last month
¿Qué pasaría si Internet se colapsara o fuera derribado por un sabotaje? ¿Cuánto tiempo podría seguir funcionando nuestra sociedad hiperconectada?

Category

😹
Fun
Transcript
00:00HACKERS
00:04Groups of hackers have accessed the traffic controls of high-speed European railways.
00:13They have taken control of the direction and the brakes of a last-model off-road vehicle, with potentially terrifying results.
00:24They have done the same with the computerized controls of a stove in a steel plant in Germany.
00:31And also this.
00:46Can you imagine hearing the voice of a stranger in the baby monitor of your son?
00:51I mean, how scary is that?
00:53But something like this happened to a couple in Washington State.
00:57They hacked their last-generation baby monitor.
01:02But we shouldn't be surprised, because we know that the Internet is everywhere,
01:06and it can be connected to almost all the devices that make my life and yours more comfortable.
01:14From the phone to Facebook, we have preferred comfort to privacy.
01:18But that has a price.
01:20Nice pajamas, Tommy.
01:23You know, we as consumers, we as citizens, and we as technologists,
01:28didn't prevent that dark side.
01:31They're trying to infiltrate companies, they're trying to steal our identity, our funds,
01:36the intellectual property of secret mafia organizations.
01:40It's different than the physical domains of war.
01:42What is the proportional response to a cyber attack?
01:47There is no absolute sense of good or evil.
01:50Police! Don't move! Against the wall!
01:53The tools, the capabilities, and the threats come and go.
01:57They change regularly.
01:59What it's really implanted is a culture of routine surveillance.
02:04Clearly they're tracking us, but how much data do they have on me?
02:09And what do you do with that?
02:11One of the things we should decide is who this technology really works for.
02:16Does it work for the individual, or does it work for the state?
02:19Does it work for the company, does it work for the institution?
02:31People want the device that's going to make their life easier,
02:35and secure to a large extent that it's safe.
02:40People just assume that that's under control,
02:43but that rarely happens.
02:47Trying to make the internet a safe place
02:49has become an industry of billions of dollars.
02:53An industry dedicated to a single goal,
02:56to stay one step ahead of malicious hackers.
03:00Now you'll notice I've said malicious hackers,
03:03because I've heard of different types of hackers.
03:05The white hats are the good guys, the black hats are the bad guys,
03:09and the gray hats are in the middle.
03:12My friend Sami Kamkar is one of the good guys.
03:16I came into contact with technology and hacking
03:19when I was about ten years old, and I got my first computer.
03:22My mom spent all her savings,
03:25and as soon as she gave it to me, I connected it to the internet.
03:28It was one of the best days of my life.
03:30I connected, I started looking for things about X-Files,
03:33one of my favorite shows,
03:35and I found a chat room where I could chat with people about X-Files.
03:39I entered that chat room, and someone said to me,
03:41And I'm like, what? Why would I get up?
03:43I said, no.
03:44And he said, you have ten seconds to get up.
03:46And I said, okay, there's people like that on the internet.
03:49I stayed in the chat, and ten seconds later, my computer crashed.
03:52I got a blue screen.
03:54I had no idea what had happened to me.
03:56My mom had spent all her money on that computer,
03:58and I panicked.
04:00I was afraid that it would have been destroyed,
04:02but at the same time, I thought, how do I do that?
04:07Hacking in the mid-90s was very different from what people see today.
04:13There was no malicious intent.
04:15There was no theft.
04:17It was all very much driven by an intellectual curiosity.
04:22Driven by that curiosity,
04:24Sammy, who at the time was not even old enough to drink,
04:27found a way to hack MySpace,
04:29one of the first social networks,
04:31and then one of the most popular.
04:33When he finished his work,
04:35everyone who visited his MySpace page
04:37saw the phrase appear,
04:39Sammy is my hero, on his own MySpace page.
04:42He created a worm, a virus,
04:44and there was no way to stop it.
04:46Sammy's curiosity infected more than a million MySpace users,
04:51forcing the company to disconnect the entire portal in less than 24 hours.
04:56MySpace didn't go after me, but the government did.
04:59They sued me for programming the virus.
05:02I pleaded guilty, and I was sentenced to not touch a computer for three years.
05:07Now, Sammy makes a living looking for vulnerabilities
05:10in products that connect to the Internet,
05:12such as refrigerators, cars, or baby monitors.
05:16Everything has technology, whether it's the garage, the car, or the door lock.
05:21What I do is find out how a system is supposed to work,
05:25and what ways you don't want it to be used.
05:29Sammy is part of a new force of international work in expansion.
05:33Young white-cap hackers hired to attack vulnerable systems
05:37and close their security holes.
05:40Welcome to HackerOne.
05:43Is that secure?
05:44I hope so.
05:47When companies want to detect hidden vulnerabilities in their systems,
05:51they often offer money rewards.
05:54And as a high-tech talent-hunting company,
05:57HackerOne connects talent with work.
06:00We use the term hacking, but it's not something related to crime.
06:05This is a very, very diverse community of software engineers,
06:08technicians, hobbyists, academics, security researchers.
06:12Microsoft has paid a reward to a five-year-old hacker
06:16who skipped parental control on his Xbox.
06:19Google has done the same with a seven-year-old hacker.
06:23In technology, there are vulnerabilities everywhere.
06:26Anyone can find them.
06:28In fact, this is the Uber rewards program.
06:31Here we are working with a hacker named MDV.
06:34You see that he is actively communicating with a member of the Uber security team
06:38to assess the problem he has found.
06:41What surprises me most when I see this chain of messages
06:44is how relaxed the conversation is.
06:47Absolutely.
06:48It's like, look, I found this bug, and they answer,
06:51it's true, thank you very much, here's your money.
06:54It's so cordial.
06:57This is absolutely the ideal response you want to see in a company.
07:01This kind of cooperation is nice to see,
07:04but it wouldn't be necessary if the vulnerabilities weren't really serious.
07:08What stops a white hat hacker from going to the other side
07:12if they find an important vulnerability?
07:15The same thing that stops your doctor from taking a kidney
07:18and selling it on the black market.
07:20We have some ethical guidelines and a legal code,
07:23in addition to the morality of each one.
07:25The number of rotten apples that could decide to use that knowledge
07:29for malicious or criminal purposes is small.
07:32And nothing happens, as long as we are prepared to face them
07:36and we have the possibility.
07:39Crime has always existed since the dawn of civilization.
07:44Technology simply allows someone to automate their attacks,
07:48so that now someone in Eastern Europe can be attacking someone here,
07:52in the United States, without too much effort.
07:55And that's what makes it different.
08:00I was busy answering emails and watching TV when my mother called me.
08:07She was going around about some problem she had with her computer,
08:10and she was using words like hijacked and these crooks.
08:16First I noticed that my computer was incredibly slow.
08:22And then I saw the message there.
08:25All your files are encrypted.
08:29Welcome to the world of ransomware,
08:31a type of virus that spreads surprisingly easily.
08:35Usually ransomware is introduced through an email,
08:39unauthorized emails.
08:41But sometimes it's a more elaborate crime,
08:44where someone may have manipulated an email address from someone you know,
08:48changing a letter or a sign.
08:50And when you open that email and click on the link,
08:53your computer is infected.
08:56Then the virus searches all the personal files on your computer and blocks them.
09:00It encrypts them with what is called a key.
09:04Without that encryption key, everything that your computer contains is inaccessible.
09:08You've lost it forever.
09:10Unless you pay the ransom.
09:12That's the origin of its name in English.
09:15Ransomware is profitable and popular
09:17because very few people have a detailed backup of their data.
09:22I had all kinds of photos of my granddaughter,
09:25but I didn't get extras.
09:27They were the only ones.
09:29But anyway, it shows you,
09:31and it says,
09:33you have to pay in seven days.
09:36And they wanted $500.
09:39And I said,
09:41it's Russia or Ukraine.
09:44I absolutely knew this,
09:46so I knew it.
09:48You don't have a choice.
09:50It's been incredible to see how many people have fallen into these attacks,
09:53how many companies pay for these ransoms.
09:56They don't have to get the reward of everyone.
09:58With 10% of the victims,
10:00they get hundreds of millions of dollars.
10:05My mom paid the ransom,
10:07and she got those files back.
10:10There's no getting around it.
10:12You either have to give up everything,
10:14they stole my files, I've got to start over,
10:16or you pay the ransom,
10:18because they're worth that much to you.
10:21Ransomware is an international criminal activity in expansion.
10:25In the first three months of 2016,
10:27private companies, government agencies,
10:29police departments and hospitals
10:31paid more than $209 million
10:34to recover their own files.
10:38And when there's a lot of money at stake,
10:41the Secret Service intervenes.
10:43Good afternoon, everybody.
10:45What do we have in the city this week?
10:48Former President Clinton comes to visit.
10:50The Secret Service has a dual mission.
10:53It is best known for its protection
10:55of the President of the United States
10:57and the main elected officials of the nation.
10:59On the other side, the less-known side
11:01is the investigative mission of the Secret Service.
11:03We have legal authority to investigate financial crimes
11:06and the use of computers to attack
11:08the country's economic infrastructure
11:10and financial markets.
11:13Good morning.
11:14Today we're going to execute an arrest
11:16within the Lunar Eclipse operation.
11:18We have credible information
11:20about a suspect that we have located
11:22in Lower Manhattan.
11:24The suspect is a white male,
11:26between 40 and 50 years old,
11:28last seen on First Avenue.
11:30We're going to execute in three teams.
11:33When we talk about bank robberies,
11:35we think of masks, guns, and explosives.
11:37But modern robbers know
11:39that the big loot
11:41is no longer in the physical world.
11:44One of the biggest bank robberies in history
11:46was a computer robbery.
11:48In 2013, a group of hacker experts
11:50stole $40 million
11:52from thousands of ATMs
11:54around the world,
11:56and all in a few hours.
12:01The hackers infiltrated
12:03a computer system
12:05of a credit card processing company
12:07in a bank in Oman.
12:10This is sort of an Ocean's Eleven
12:12logistic for cyber crime.
12:14The hackers found a vulnerability
12:16in the company's payment platform.
12:20They eliminated the spending limits
12:22of hundreds of prepaid debit cards
12:24and printed them in the three-dimensional world.
12:27Then they distributed the cards
12:29among an extensive network of collaborators
12:31located next to ATMs
12:33from two dozen countries,
12:35all waiting to enter their cards,
12:37withdraw the money, and disappear.
12:39Hundreds of people were waiting
12:41for a PIN code to be released.
12:43And finally, at the precise moment...
12:47They released the PIN code,
12:49and all those individuals
12:51went to the ATMs
12:53and began withdrawing cash.
12:56This was a very large pyramid,
12:58the highest of which were the hackers.
13:00At the top of the pyramid
13:02were managers,
13:04and finally,
13:06you had people who withdrew
13:08all that money at the same time
13:10in 25 countries,
13:12five continents,
13:14and cashed it out
13:16for $45 million in 12 hours.
13:18Internet made this crime possible,
13:20but don't get confused.
13:22Not all cyber criminals
13:24are criminals.
13:26There were two individuals
13:28who couldn't resist
13:30announcing on their social media
13:32that they had stolen
13:34a large amount of money,
13:36and then take a selfie
13:38with a bunch of cash.
13:40And that was one of the methods
13:42that allowed us to make arrests
13:44in this case.
13:46Police! Don't move!
13:48Against the wall!
13:50Don't move!
13:52I've been in this business
13:54for five or seven years,
13:56and it's usually very international.
13:58I can come from Canada,
14:00from Eastern Europe,
14:02from Finland, Russia, Australia,
14:04and everybody is using
14:06the same kind of weapon,
14:08which is the Internet.
14:102015 was an excellent year
14:12for international cybercrime,
14:14which cost $400 billion
14:16in all the world.
14:18But not all cybercriminals
14:20are criminals.
14:22In the case of the attack
14:24on Sony Pictures,
14:26believed to be the work
14:28of the North Korean government.
14:30Yes.
14:32A devastating attack
14:34that has hurt
14:36one of the most powerful
14:38entertainment studios
14:40in the world.
14:42Nobody knows
14:44why the North Koreans
14:46leaked thousands of
14:48dollars into the business.
14:50I don't think it was
14:52because they wanted
14:54to enter the film business.
14:56A theory is that it was
14:58an answer to a Sony movie,
15:00the interview,
15:02a comedy about an
15:04attempt to murder
15:06its beloved leader.
15:08President Kim Jong-un.
15:10If we think about that,
15:12it means that a country
15:14attacked a company.
15:16It was an act of war,
15:18a moral attack on its leader.
15:20They thought it was a direct
15:22attack on the North Korean regime.
15:24They didn't like the movie,
15:26they didn't like what it said.
15:28The movie was quite simple,
15:30but the attack was very sophisticated.
15:32They attacked system administrators
15:34and stole their credentials,
15:36so they got privileges
15:38of administrator
15:40that allowed them to deploy
15:42their malware
15:44It was a very important
15:46moment for the United States
15:48because it wasn't just
15:50an attack on the company
15:52and its employees.
15:54They also threatened
15:56the movie theaters
15:58across the country.
16:00People were just afraid.
16:02That to me is terrorism
16:04and that comes with
16:06very serious consequences.
16:08I think the United States
16:10government is still figuring
16:12if agents from another state
16:14attack Lockheed Martin,
16:16for example,
16:18or some critical infrastructure
16:20in the hands of a private company,
16:22or sanitary facilities
16:24belonging to the private sector,
16:26or the financial sector
16:28that keeps my money
16:30preventing me
16:32from withdrawing money from an ATM.
16:34That can happen
16:36and we're trying to figure out
16:38where this line is,
16:40when a computer attack
16:42becomes an act of war.
16:44As you all know,
16:46recent reports indicate
16:48that the space world of the Air Force
16:50has been hacked.
16:52We don't know much,
16:54we know it was a serious intrusion.
16:56We believe the access route
16:58was through a contractor
17:00from the Industrial Defense Base.
17:02We don't know what they got,
17:04but our GPS system
17:06has been compromised.
17:08What is the security
17:10that's going to protect
17:12missiles and nuclear warheads?
17:14What is the security
17:16that's going to protect
17:18our electrical network
17:20or our GPS system?
17:22These are vital questions
17:24and the consequences
17:26of these wars are extreme.
17:28Here in West Point,
17:30instructors like Major Sean Lonergan
17:32are analysing these questions
17:34as they train the next generation
17:36of cyberspace engineers.
17:38The United States has always enjoyed
17:40great security with friends
17:42in the North and the South
17:44and our two best allies,
17:46the Pacific and the Atlantic.
17:48But now cyberspace is a war scenario
17:50in which we have rivals at our level.
17:52People in other countries
17:54that can attack the territory
17:56of the United States
17:58and that concerns us.
18:00Do you think we could give
18:02the civil sector access
18:04to our GPS network?
18:06If someone hacked our
18:08global satellite positioning network
18:10like in this exercise,
18:12they'd be surprised
18:14at the consequences.
18:16Without a GPS network
18:18we wouldn't have automatic
18:20tracking of targets
18:22or guided missiles,
18:24but it would largely
18:26have an impact
18:28on agriculture.
18:30They're using computers
18:32to harvest.
18:34And if we take GPS out of that equation,
18:36those machines can't work anymore.
18:38We'd lose billions of dollars.
18:40So what happens
18:42if we blame Pakistan
18:44even if they're not the real culprits?
18:46One of the biggest problems
18:48of cybercrime and
18:50computer warfare is attribution.
18:52If you rob a bank,
18:54there's a picture of you going into the bank
18:56and we're pretty sure
18:58that you're the one who robbed it.
19:00If another country attacks you in cyberspace
19:02and you can't even figure out
19:04who attacked you,
19:06what can you do
19:08as a matter of national policy?
19:10It's a new type of war.
19:12Before, any country would have
19:14needed long-range missiles
19:16to attack us.
19:18Now they can hurt us
19:20with little more than a keyboard.
19:22We know that this country's infrastructure
19:24is growing, but not just our infrastructure.
19:26I think that we are seeing
19:28more and more of these persistent threats.
19:30Hackers, criminals, foreign states.
19:32We don't even know
19:34what they want to achieve by them.
19:36In 2016,
19:38the Department of Defense
19:40allocated $5.5 billion
19:42to cyber operations.
19:44A large part of that amount
19:46was allocated to the US Cyber Command.
19:48But ironically,
19:50one of our biggest advances in cyber defense
19:52was due to a terrifically rudimentary attack.
19:58There are good reasons
20:00to have a large capacity
20:02to collect intelligence
20:04in a country.
20:06We want to be able
20:08to capture people
20:10who are actually suspicious
20:12of serious crimes,
20:14who are buying materials
20:16to make bombs,
20:18who are trying to launch
20:20nuclear programs,
20:22who are trying to
20:24launch nuclear weapons,
20:26nuclear programs.
20:28Things that are very destabilizing
20:30and very dangerous on that scale.
20:32The former NSA contractor
20:34Edward Snowden was the one who revealed
20:36how a program designed to locate
20:38terrorists abroad
20:40had expanded massively
20:42and in secret after September 11
20:44to spy on American citizens.
20:46I worked in the NSA
20:48directly with those
20:50massive surveillance tools
20:52in my last position in Hawaii.
20:54I could see the internet traffic
20:56all over the world.
20:58From my desk,
21:00I could type any name,
21:02any phone number
21:04and check the records
21:06associated with their activity.
21:08Now, there are some
21:10policy restrictions
21:12on how to use those tools.
21:14They say that to investigate
21:16an American, for example,
21:18I should get a warrant
21:20before I do it.
21:22Of course, the NSA
21:24had a great help.
21:26The ability to track
21:28already existed on the internet.
21:30Companies like Apple, Google,
21:32Microsoft and Facebook
21:34were already collecting, storing
21:36and happily selling data
21:38from their users,
21:40that is, us.
21:42A lot of people are worried
21:44about government agencies
21:46spying on them,
21:48but they don't seem to be worried
21:50because they handle the data
21:52minute by minute
21:54and, in fact, they realize
21:56whatever they want with it.
21:58You have to realize
22:00that when you're using the internet,
22:02the byproduct of our daily activities
22:04are producing a lot of data.
22:08And when you connect Google,
22:10when you connect Facebook,
22:12when you connect the government,
22:14the insurance companies,
22:16your purchase record on Amazon,
22:18they all form a perfect record
22:20of our private lives,
22:22as it had never existed
22:24in the history of the human world.
22:28What has begun is a culture
22:30of routine surveillance.
22:34But as it has come in a flurry,
22:36wrapped up in advantages for the consumer,
22:38in the end,
22:40we end up shrugging our shoulders.
22:42Facebook is watching us.
22:44Maybe Apple is listening to me
22:46or iPhone right now.
22:48I suppose they're listening to me.
22:50We've all become more and more
22:52like tagged bears,
22:54and we put the radio collar on ourselves.
22:56It's called a smartphone.
23:00Now, this tracks us as efficiently
23:02as if we were wearing a collar
23:04around your neck.
23:06So we are unwitting accomplices
23:08to our own loss of privacy.
23:12Many companies have found
23:14ways to make money
23:16with the data we've provided them.
23:18Our customs, our interests,
23:20high-value personal information
23:22for advertisers.
23:24And a company has discovered
23:26that there is still very personal
23:28information that can be collected
23:30and capitalized.
23:32Hello.
23:34Hey, how are you?
23:36Derek.
23:38Me too.
23:40It's a good name.
23:42It has built-in sensors
23:44that allow us to monitor
23:46how all the people
23:48in an organization interact with each other.
23:50HumanEyes is an emerging company
23:52based in Boston
23:54that has taken tracking technology
23:56to a new level and a new setting,
23:58the workplace.
24:00We're really working on collecting
24:02all the relevant data
24:04around human interaction.
24:06Most companies collect data
24:08about their customers,
24:10but they have no idea
24:12what they're doing.
24:14The card has two microphones.
24:16They don't record what you say,
24:18but we do a real-time voice processing.
24:20Right now, for example,
24:22it's capturing the percentage
24:24of time I'm talking,
24:26my tone of voice,
24:28the volume of my voice.
24:30The idea that if I start speaking
24:32a little bit more quickly,
24:34that indicates something
24:36about our conversation.
24:38We have a motion sensor
24:40in my office.
24:42If I have two teams
24:44that need to communicate a lot,
24:46I know the idea is to figure out
24:48if I have two teams, for example,
24:50that need to talk a lot,
24:52which data do they have,
24:54and how can I use that
24:56to change the way that people interact with each other?
24:58All right, so these two sensors
25:00are posture sensors,
25:02and we've got some very interesting
25:04things in here.
25:06What were you doing
25:08between about 3.24
25:10and 3.30?
25:12I was possibly sitting
25:14in a chair and reading
25:16something on my phone.
25:18Okay, so essentially,
25:20we can see that there's
25:22a 10-minute period
25:24where you're sitting
25:26in your office.
25:28It's important to underline
25:30that we don't say,
25:32look at this specific behavior
25:34because we don't show
25:36this type of data to anybody,
25:38not even our customers.
25:40But when you have this specific
25:42level of granularity,
25:44hundreds of thousands of people,
25:46you start to think about
25:48the sort of things
25:50that you can learn
25:52at that scale
25:54over the course of 50 years.
25:56The notion that they're constantly
25:58watching us.
26:00Orwell could have written a book
26:02and it would have scared us.
26:04HumanEyes analyzes the cumulative
26:06information of the entire
26:08customer base to give them
26:10a general vision.
26:12But the data they collect
26:14is so specific, so individual
26:16and personal that it's a little
26:18hard to accept it.
26:20Do you think in three or four years
26:22most of the identification cards
26:24will have these sensors?
26:26But the question is,
26:28what do you do with the data?
26:30HumanEyes insists that the
26:32anonymity of the data
26:34collected by the employees
26:36is maintained.
26:38But it does make you think
26:40about the capabilities
26:42of this technology.
26:44I mean, the key is trust.
26:46Do you trust that your company
26:48is not going to spy on you?
26:50We know that at least in the US
26:52your company can read your e-mails,
26:54register your keystrokes,
26:56film you with video surveillance
26:58or even with your webcam.
27:00For now, most employees are
27:02allowing it, but some are pushing
27:04back.
27:06I was a
27:08district sales director
27:10at Intermex, a company
27:12that does online money transfers
27:14between the US and South America.
27:16My area included from Central California
27:18to Santa Cruz,
27:20so it's quite a bit to cover.
27:24The company wanted to implement
27:26a new program
27:28where they had an app download
27:30on their iPhones
27:32and this app was supposed to
27:34track everywhere we were at
27:36to the very smallest detail.
27:48The company even knew
27:50what speed it was driving
27:52and it was forbidden to close
27:54the app.
28:18We decided not to use the app
28:20and we were fired immediately.
28:22Myrna filed a lawsuit
28:24against the company.
28:26I was surprised by the brazenness
28:28that occurred here.
28:30I'm not surprised that a company
28:32would try to track its employees.
28:34We know from past experience
28:36that our employers take a lot of
28:38liberties with our privacy.
28:40And they tell us sometimes
28:42on the way in the door,
28:44you're on hard time, you're on your
28:46knees, we have the right to know
28:48what you're doing.
28:50But that was before the Internet
28:52invaded our workplaces.
28:54It's a very different scenario
28:56when you have people out,
28:58especially when you're using
29:00the same device for work
29:02as for personal use,
29:04where you're monitoring what
29:06they're doing on your breaks
29:08and after the hours.
29:10That feels creepy to me
29:12and it felt creepy to Myrna.
29:14Google and governments
29:16are all trying to say,
29:18what are we supposed to do?
29:20Just throw out our smartphones
29:22and disconnect from the Internet
29:24completely?
29:26That's not going to happen.
29:28So the other extreme
29:30is to try to completely
29:32give up on privacy.
29:34Do you think it's a little hard
29:36to imagine?
29:38Well, no, it's not.
29:40Welcome to Songdo, South Korea.
29:42The city of the future.
29:52Before 2001,
29:54all of this was under water.
29:58To build Songdo,
30:00the planners first had to create
30:02600 acres for the Yellow Sea.
30:04If you were expecting to see
30:06flying autonomous cars
30:08and moving railways,
30:10you won't find them here.
30:12What you will find is the
30:14tallest skyscraper in the world,
30:16the longest bridge,
30:18and most importantly,
30:20interconnectivity.
30:22Because Songdo was built
30:24literally from the ground up
30:26to be this smart city.
30:28Since it was built from scratch,
30:30it was easy to integrate
30:32a network of sensors
30:34throughout the city
30:36and it's just as easy
30:38to build an energy resource.
30:40Here, operators can monitor
30:42all of the vital functions
30:44of the city,
30:46everything from traffic,
30:48weather conditions,
30:50public transit,
30:52emergency response,
30:54to build energy resources
30:56and even waste management.
30:58This room is the brain of the city.
31:00From here, not only is the traffic
31:02monitored, but also controlled.
31:04Operators can modify the duration
31:06of the traffic flow.
31:08The system has a database
31:10of all the car registrations
31:12in the country and it knows
31:14all the cars in Songdo.
31:16And the security cameras
31:18installed throughout the city
31:20work like an omnipresent police
31:22that monitors and alerts
31:24any suspicious activity in real time.
31:26Brian Bailey is Product Director
31:28at Samsung Biologics
31:30and he moved to Songdo
31:32with his family in 2014.
31:34We've lived in several places.
31:36Songdo is the safest city
31:38we've ever lived in.
31:40We feel extremely safe
31:42with our children.
31:44They can go and come
31:46around the city without supervision
31:48and we don't have to worry
31:50about their safety.
31:52Living in a city of the future
31:54has clear advantages.
31:56The internet is everywhere,
31:58so anywhere you go
32:00you can get very good
32:02Wi-Fi signal.
32:04The buses have Wi-Fi,
32:06the metro, the cafes, restaurants
32:08and stores have it.
32:10So being able to
32:12access the internet
32:14is very convenient here.
32:16But in Songdo
32:18privacy is practically non-existent.
32:22You can't do anything
32:24without being caught by the cameras.
32:26I've heard that in that center
32:28you can point a camera at a person
32:30for hours in Songdo.
32:32For real? Can they follow you
32:34around the city for hours?
32:36With their facial recognition software
32:38they can know where you are.
32:40And what do you think about this?
32:42We just feel spied on
32:44wherever we are.
32:46Do you feel spied on?
32:48Yes, I'm just walking down the street
32:50and there are eyes everywhere.
32:52You can't do anything
32:54without being caught.
32:56No, not anymore.
32:58At first when we installed the cameras
33:00people thought we were invading their privacy.
33:02But everything changes
33:04when an incident occurs.
33:06People say,
33:08there aren't enough cameras in our area.
33:10Or put cameras near my house.
33:12When you're in Songdo
33:14do you ever think about the cameras
33:16that are filming you?
33:18When I'm walking down the street
33:20I almost don't realize
33:22I haven't committed any crime.
33:24Why would I worry about the cameras?
33:26Saying that you don't care about privacy
33:28because you've got nothing to hide
33:30is the same as saying
33:32you don't care about freedom of speech
33:34because you've got nothing to say.
33:36That's a fundamental misinterpretation
33:38of the nature of rights.
33:40What is privacy
33:42and what is it for?
33:44Privacy is about
33:46having something to hide.
33:48Privacy is about having something to protect.
33:50And that something
33:52is freedom.
33:54One thing we learned
33:56from Edward Snowden
33:58is that our government
34:00has an insatiable appetite for data
34:02including data about American citizens.
34:04And that's the United States
34:06which is a sophisticated democracy.
34:08People around the world
34:10have even less protection than that
34:12from their governments.
34:24In 2014,
34:26participants in a demonstration
34:28in Kiev discovered it.
34:32After a collision with the police
34:34the demonstrators received
34:36a sinister text message.
34:38Dear subscriber,
34:40you have been registered as a participant
34:42in a massive disturbance.
34:46So we have to avoid mobile phones
34:48and video surveillance cameras
34:50if we don't want to be followed.
34:52But is there any way
34:54to avoid surveillance
34:56while we are on the internet?
34:58There is a very ingenious tool
35:00designed for this.
35:02It's a special browser
35:04called Tor.
35:06Supposing someone still doesn't know
35:08what Tor is.
35:10It's a solution to a problem
35:12that many people don't know
35:14they have on the internet.
35:16I was actually checking the New York Times
35:18and this is all of this stuff
35:20something called
35:22InWorldWide.com
35:24ClickTail.net
35:26All these people are getting a piece of my data.
35:28They are following me.
35:30There is a lot of money
35:32in the tracking of internet navigation
35:34and it's barely regulated in the United States.
35:36So how does Tor solve this problem?
35:38Well, Tor uses the technology
35:40The Onion Router
35:42which allows you to redirect your traffic
35:44through several different relay computers
35:46all over the world.
35:48Tor gets the name
35:50The Onion Router
35:52because it creates a number of layers
35:54between you and your identity
35:56that conceals your identity.
35:58That square in the center
36:00is my computer.
36:02When I click on a link
36:04my request travels from my computer
36:06to the volunteer number one
36:08who is in another part of the world
36:10and who in turn sends the request
36:12to a volunteer number two
36:14who doesn't know who I am.
36:16But this web and its tracking software
36:18can only see him.
36:20It's impossible for him to see me.
36:22It's all that complexity
36:24that protects my privacy.
36:26Now we go back
36:28to the New York Times page
36:30and we can see
36:32that our traffic has gone
36:34through a node in Germany
36:36another in France
36:38and another relay in France
36:40and from there it has gone to the internet.
36:42So now none of those webs
36:44are getting information.
36:46They are only getting information
36:48from the last node.
36:50What kind of people do you use Tor?
36:52Well, we have human rights volunteers
36:54and activists from different countries.
36:56We have victims of domestic abuse
36:58who are trying to
37:00choose some amount of personal
37:02communication security.
37:04We have regular people
37:06who don't want to be spied on
37:08by different governments
37:10or by advertisers
37:12like me,
37:14who love the idea
37:16of not sharing more than we have to.
37:18Tor underlines
37:20the nature of this conflict
37:22that our society is having right now
37:24because we must not forget
37:26that Tor was funded by the government.
37:28The Navy funded the development of Tor
37:30because they realized that spies
37:32also needed to communicate
37:34with security and that they were in danger.
37:36But there's a lot of people in the world
37:38who live under repressive governments
37:40that try to promote social changes
37:42that can be unpopular.
37:44I want those people
37:46to have the privacy
37:48they need to do the work they do.
37:50By the way, the follow-up question is
37:52don't terrorists use this?
37:54And the answer is yes, of course,
37:56but so do the activists.
37:58The security of devices,
38:00whether it's your computer
38:02or your phone or your washing machine
38:04is a binary state.
38:06Meaning there are only
38:08two possible options.
38:10It's either secure
38:12or it's not.
38:14There's no option
38:16to make a device
38:18secure against bad guys
38:20but insecure
38:22against good guys.
38:24All of us have security
38:26or no one has it.
38:29So here we are
38:31at the crossroads
38:33between internet security
38:35and freedom.
38:37We don't mind Google spying on us
38:39but we don't want our government to do it.
38:41And we know the internet can be hacked
38:43but that doesn't concern us
38:45about using it or not using it.
38:47We depend on the internet.
38:49We're addicted to it.
38:51Our finances, our relations,
38:53our work, basically our whole lives
38:55are online.
38:57But our virtual life
38:59is not in the clouds
39:01or in cyberspace.
39:03It's in cement buildings
39:05and bricks like this one
39:07in Lower Manhattan.
39:09And when you see the kilometers
39:11and kilometers of cables
39:13and all the hardware infrastructure
39:15that our online life has to go through,
39:17the internet seems less magical,
39:19more physical and possibly
39:21more vulnerable.
39:23When I look at the internet
39:25I like to look at numbers and figures
39:27and I like to look at a single dot
39:29and all the communications
39:31that go through that dot.
39:33It's interesting,
39:35the 60th of Hudson Street
39:37in New York,
39:39one of the most important
39:41internet buildings in the world.
39:43And it's a single building
39:45so I can send a message
39:47to Helsinki this afternoon
39:49and with a little bit of work
39:51and the right tools
39:53that are on the map.
39:55There are only 12 points
39:57of internet exchange in the world
39:59as big as this one,
40:01but there are hundreds of smaller dots
40:03distributed all over the planet
40:05and according to the internet designers
40:07that distribution makes it safe
40:09or something safer.
40:11It has millions of pieces,
40:13each one of which
40:15operates independently
40:17and so there is no master switch
40:19that can stop it
40:21and that's a good thing.
40:23It makes the internet more resilient.
40:25It means no one can threaten
40:27successfully to turn it all off
40:29with their hand.
40:31My alias is Mudge.
40:33I and the six individuals
40:35sitting in front of you
40:37are part of the hackers group
40:39known as The Loft.
40:41Back in the 90's
40:43there was a security researcher,
40:45Mudge, who testified to the congress
40:47that he could turn off the internet
40:49and the last time I talked to him
40:51he said it would be an hour.
40:53The internet is absolutely in danger.
40:55However, the internet heals.
40:57The internet is no longer
40:59one thing,
41:01it's a combination
41:03of millions of things.
41:05If someone could coordinate
41:07an attack against the system
41:09it could impact,
41:11it could interrupt its operation
41:13briefly, but it could never end the network.
41:15But nature
41:17could have something to say
41:19about that statement.
41:21Solar radiation can destroy
41:23electronic devices.
41:25In 1895, a super solar storm
41:27hit the earth,
41:29plunging into chaos the internet
41:31of the 19th century,
41:33the telegraph network.
41:35Constantly solar storms occur,
41:37but this one, known as the Carrington event,
41:39made history.
41:41Rains of jokes jumped from the telegraphs
41:43and the messages burned spontaneously.
41:45In 2012, 2013 and 2014
41:47we got rid of
41:49few new solar impacts,
41:51so scientists think
41:53it's only a matter of time
41:55before a second Carrington event occurs.
41:57But today our electronic dependency
41:59is thousands, perhaps millions of times greater
42:01and at the center of everything
42:03is the internet.
42:05So what would really happen
42:07if all of a sudden the internet fell?
42:11It's 5 a.m.
42:13And in a couple of hours
42:15you'll notice that Google is down.
42:17By around 6.30
42:19Amazon, the New York Times
42:21and ESPN.com
42:23are also offline.
42:25Facebook goes down an hour later.
42:27At 8 a.m. the trains in New Delhi
42:29have stopped,
42:31and air traffic control
42:33from Norway to the Mediterranean
42:35has been attacked.
42:37At 10.53 all the traffic lights
42:39in Manhattan turn green.
42:41160 hospitals have been deleted.
42:43In 12 different banks
42:45the clients whose last name
42:47starts with the letter M
42:49suddenly see that all their funds
42:51have disappeared.
42:53At 4 p.m. China has denied
42:55its participation, like Pakistan.
42:57Iran is doing the same thing
42:59when suddenly diplomatic lines
43:01are cut off.
43:03At 7.22 p.m. the electricity
43:05in North America is interrupted
43:07and they're not coming back on.
43:09There are big traffic jams
43:11on the roads and on the streets.
43:13If the internet fell
43:15and there are ways it could happen,
43:17bizarre ways, but there are ways
43:19it could happen,
43:21our financial systems
43:23would collapse.
43:25The power systems,
43:27water systems, natural gas,
43:29telecommunications.
43:31I mean, how do you think a city
43:33like New York would be
43:35after not having power for six months?
43:37It doesn't have police communications,
43:39it doesn't have fire support,
43:41it doesn't have water.
43:43How would people survive?
43:45How many of us can make a fire
43:47without matches?
43:49I don't know.
43:51I don't know my children's phone numbers.
43:53Wait, I mean, that's crazy,
43:55but my iPhone knows my children's phone numbers.
43:57When I was a young boy I had a memory
43:59of 20 phone numbers from friends,
44:01parents and relatives.
44:03We're sort of outsourcing our memories
44:05to these devices.
44:07And we're so dependent on them now
44:09and there's no backup to the internet.
44:11If there was something,
44:13if there was a virus that landed
44:15on the internet with its knees,
44:17it's amazing how likely civilization
44:19might have fallen to its knees as well.
44:21The good news is that
44:23there is SurvivorLibrary.com.
44:25It's an online library
44:27that contains everything we need to know
44:29to survive,
44:31from packaging techniques
44:33to the survival of any survivor.
44:35But instead of weapons and canned food,
44:37it's a knowledge storage.
44:39The bad news is that it's on the internet.
44:43But even when they don't end up
44:45with the internet, solar winds
44:47and terrible cyber attacks,
44:49even when the internet is functioning normally,
44:51our precious information
44:53is still very fragile.
44:55Do you remember this?
44:57Or this?
44:59The same fate awaits
45:01all the storage formats
45:03we use today.
45:07We have another huge problem
45:09that we know,
45:11and it's the possibility
45:13that all the digital content
45:15might not be correctly interpreted
45:17100 years from now,
45:19because the software that knows
45:21how to read it doesn't exist anymore.
45:23This is another nightmare
45:25we have to face,
45:27the possibility of a dark digital age.
45:29This has always been around us.
45:31It doesn't matter if it's about
45:33transportation, it doesn't matter
45:35if it's about technology, it happens.
45:37When it comes to things like
45:39archival storage,
45:41you as the custodian
45:43of something that
45:45we believe we preserve
45:47for future generations,
45:49we need to be prepared
45:51to keep re-copying it
45:53into the current view
45:55of the day
45:57That's just life
45:59in the big city.
46:01And is it frustrating
46:03and annoying? Constantly.
46:05But sometimes
46:07the problem is not the technology,
46:09sometimes the normal functioning
46:11of the network makes
46:13precious information disappear.
46:15One thing we've discovered
46:17is that the network is
46:19completely ephemeral.
46:21On average, a page takes
46:23only 100 days to be changed
46:25Sometimes inadvertently
46:27and often for commercial reasons,
46:29companies take the decision
46:31to delete past jobs
46:33that have taken a long time
46:35to put on their websites.
46:37Keeping old material operational
46:39is not easy.
46:41That's why the goal of the
46:43Internet Archive is universal
46:45access to all knowledge.
46:47How do we build a world wide
46:49web that is reliable and
46:51that doesn't depend on
46:53the Internet Archive?
46:55The Internet Archive is the
46:57Wayback Machine
46:59that instantly takes
47:01web pages at regular intervals
47:03so that if its content changes
47:05or a company closes,
47:07that material is not lost forever.
47:09Now the websites are stored
47:11using a complex algorithm.
47:13But the ultimate goal
47:15of the Internet Archive
47:17is that all websites
47:19are represented.
47:21Now we collect about
47:23a billion pages every week.
47:25Our total collection is
47:27about 500 billion pages
47:29stored in the Wayback Machine.
47:31Employees in San Francisco
47:33and all over the world
47:35are digitizing
47:37unceasingly printed materials,
47:39videos, games and operating systems,
47:41all kinds of ephemeral material.
47:43Everyone who participates
47:45in the Internet Archive
47:47has at least one thing in common,
47:49they have a future.
47:51In the servers of this room
47:53there are about 5 petabytes of data
47:55and that's the main copy
47:57of the Internet Archive.
47:59I've been designing supercomputers
48:01all my career and the best thing
48:03is that those little lights
48:05actually mean something.
48:07Every time a light blinks
48:09somebody is uploading or downloading
48:11something from the Internet Archive.
48:13Those little lights represent
48:15our hopes of having a future
48:17and our fears and our weaknesses
48:19all wrapped up in the most
48:21versatile and inspiring invention
48:23of humanity.
48:25If you think about it
48:27our whole civilization rests
48:29on this infrastructure
48:31from the moment we get up
48:33to the moment we go to sleep
48:35from the moment you're born
48:37to the moment you die
48:39and everything in between.
48:41It's been 25 years since
48:43the first commercial website
48:45have we achieved the goal?
48:47Do we need a direction correction?
48:49I'm very optimistic.
48:51I think in another 25 years
48:53when we have these conversations
48:55celebrating the 100th anniversary
48:57of the commercial Internet
48:59we will say we have built
49:01a society that brings out
49:03the best of our value structure.
49:05Right now
49:07the Internet is
49:09a very powerful tool
49:11but it's still not the last
49:13that we're trying to figure out
49:15how to use best.
49:17And like any tool
49:19it depends on who's using it
49:21and why.
49:23Since there will always be
49:25good guys and bad guys
49:27we'll have to be vigilant
49:29but there's more.
49:31I think that if we look at
49:33those exponential growth curves
49:35we're at one of those moments
49:37where the curve is about
49:39to shoot up.
49:41It's not about the physical
49:43it's about the biological.
49:45It's an organism.
49:47It's an extension of us.
49:49Very intelligent people
49:51have warned that at any moment
49:53the Internet could evolve
49:55could become something more
49:57than just a tool.
49:59Perhaps an intelligence capable
50:01of using its own tools
50:03but where would that leave us?
50:05You know I worry a lot about
50:07just pure humanity
50:09and the technologies
50:11that are emerging
50:13and what our role is
50:15with these systems
50:17and machines that surround us.
50:19It's not clear that
50:21we will be the masters
50:23of our destiny any longer.
50:25We're in an amazing time
50:27in the lives.
50:29Today we have 14 million
50:31devices connected.
50:33My phone, my TV, my Tesla car
50:35all of those things
50:37are connected devices.
50:39We're going to be going
50:41from 14 million to 100 million
50:43by 2020.
50:45We're entering a world
50:47where everything is going
50:49to be imaged and we're going
50:51to be able to know
50:53anything we want,
50:55anytime we want,
50:57anywhere we want.
50:59This is our 1 billion
51:01sensors economy
51:03and the way we collect
51:05I am not able to make predictions
51:07about the internet
51:09in 20 years.
51:11I will assume that the internet
51:13will be ubiquitous,
51:15I will assume that it will be
51:17noisy around.
51:19I will assume that it will be
51:21controlled by corporations
51:23and partly controlled
51:25and partly independent
51:27and it will be complicated
51:29and a blessing and a curse
51:31at the same time.
51:33I don't think we're going to have to wait
51:35very long to find out.
51:37So don't you blink.

Recommended