edward -you might have bought the phone but whoever hacked it they are the one who owns it. any device that is on here you can operate independently. shane - so it is true, you can get into the phone and turn the camera on? e - ya, absolutely. s - is there a way you can tell if your phone has been hacked? e - perhaps the most terrifying thing is if your phone had been hacked you would never know. s - this week on vice: the inside story of america's surveillance program. e - i'm going to be detaching the camera.
the devices that you paid for, watch you, on our behalf. s - it seems like technology allows, almost anyone to spy, on almost anyone. e - even if you trust the government today... what happens when it changes? when eventually we get an individual who says... "you know what? let's flip that switch." s - first of all i'd like to say thank you for meeting us today here at the storied hotel metropol in moscow. i say storied because for the longest time it was the
designated hotel where foreigners were allowed to stay. and it was rumoured that every room was bugged. e - *laughs* i would definitely presume that in any world capital when you're in a major business hotel... if the hotel rooms aren't pre-wired for surveillance they can be wired almost immediately. s - for the last 3 years, a controversy has raged about the us governments surveillance of its own people. the terrorist attack last december in san bernardino, ca
brought this debate to a tipping point. reporter - 14 people are dead and 21 people have been injured after a married couple opened fire at the inland regional centre in san bernardino. reporter #2 - a judge is ordering apple to help the fbi break into a cellphone used by one of the san bernardino shooters. reporter #3 - apple is saying "look this is something that no court can order us to do. tim cook - what is at stake here is...
can the government compel apple to write software that would make hundreds of millions of customers vulnerable around the world? obama - if it is possible to make an impenetrable device. how do we solve or disrupt a terrorist plot? s - but according to the most famous whistleblower in the world, the government already had this capability. s - as it turns out, snowden, was proved right. because the fbi was able to crack the iphone,
without apples help. now edward snowden remains a polarizing figure in america. politics. because on one side he's considered a hero on the level of woodward and bernstein who broke the watergate scandal. but on the other, he is considered a traitor who jeapardized american intelligence and security around the world senator burr - a traitor! a traitor to the united states.
senator nelson - these records were spread about publicly by edward snowden. intentionally. recklessly. and i might say illegally. s - so we went to moscow to speak to this controversial figure about the state of surveillance in america today. so nsa, cia, fbi... can they get into my phone?
e - yes. s - can they get into my laptop? e - absolutely. s - ipad...? e - anything. as long as they can dedicate people, money and time to the target... they can get it. s - and what kind of information can they get from my phone for example? e - uh, everything in your contacts list.
every sms messenger that you use. every place that has ever been where the phone is physically located. even if you've got gps disabled because they can see which wireless access points are near you. every part of a private life, today, is found on someones phone. we used to say a mans home is his castle. today, a mans phone is his castle. s - my question to you is why don't more people care? because we've gone from cold war, pre-9/11
to effectively a police state that is watching your every move and everyone went "meh". why? e - part of it is the fact it happened invisibly. if a politician had said we want to watch everybody in the country. people would have been up in arms about it. in the wake of september 11th the vice president of the united states, dick cheney, and his personal lawyer david addington conspired with a number of top level officials
in the nsa and other agencies to change not only what they considered to be the legal restraints but actually the culture of surveillance in the intelligence community. they moved from the exceptional surveillance to the surveillance of everyone. technology has changed, instead of sending people to follow you; we use the devices that you pay for. the services and the systems that surround you invisibly every day to watch you, on our behalf.
metadata, is the fact that a communication occurred. s - so i called you e - you called me, when you called me, where you called me from. this information is the same thing that's produced when a private investigator follows you around all day. they can't sit close enough to you in every cafe to hear every word you're saying. but they can be close enough to know when you left your house,
what the license plate of the car you're driving with, where you went, who you sat with. how long you were there, when you left, where you went after that. that's metadata. s - now all of this metadata it turns out is actually remarkably easy to get at. in fact you don't even have to hack the phone at all. all you need is technology that is readily available. called an imsi catcher that can intercept your phones
metadata remotely. e - every phone has what's called an imsi. s - uh huh. e - which is actually for the sim card. that's your subscriber information. what your name is; what your phone number is. all of our devices, as they travel throughout the day are constantly broadcasting in sort of this radio orchestra. imsi catchers masquerade as the legitimate cellphone tower.
so when you're saying "hey - cell phone tower" "can you hear me?" - instead a man in the middle, somebody with an imsi catcher in the trunk of their car. in a briefcase in their office has it send a louder signal back to you, than the cell phone tower, then say "i'm the cell phone tower". s - now this sounds pretty complex. how hard is it to make or buy an imsi catcher?
e - it's incredibly easy. you buy these things off the shelf. every police department in the united states seems to be buying these things nowadays. s - really? now the use of imsi catchers by police recently caused international headlines when a newspaper in norway attempted to track the amount of imsi catchers in oslo. and actually found so many that they questioned
if their tracker was working properly. after hiring a cyber security firm they discovered not only were they indeed correct but that these devices were actually being used to spy on their own government facilities. andreas - 5 places in oslo the measurement was so serious that they could say with high probability that there was imsi catchers. the most clear signs was in the area of the prime ministers office and the ministry of defense. we also got alerts up in the embassies area.
and in front of the parliament. s - and while the police initially denied using imsi catchers extensively; in the face of overwhelming evidence they were eventually forced to admit it. a - the police stated that "we are using imsi catchers at minimum once a week." that was the first time, ever, that the police had gone out and stated how often they were using these kinds of equipment. in all the areas that we detected signals, thousands of
people are flowing by every day. so that's, i think that is some of the problem with these kinds of technology because you are looking for one number but you are, in the same phase, you are collecting hundreds of numbers. s - now this technology is being used by police forces all over the world. in fact in new york city alone imsi catchers have been used more than a thousand times, by police, since 2008
and that's just the tip of the iceberg. as they are now being used all around us... all the time e - there is a joint cia/nsa program called appropriately enough, "shenanigans". shenanigans was a project to mount on airplanes an imsi catcher and fly it around the city. they can tell when you've travelled, they can tell when you move and this all happens without warrants. s - right.
e - shenanigans was happening in yemen. that is where it was being tested and you go "well look this is being used to aim missiles at terrorists." i'm okay with that. but these programs have a disturbing frequency, a tendency... to move from war front to home front. e - and within six months of shenanigans being reported, the wall street journal reported,
that the same technology was now being used domestically inside the united states. the fbi has a specific aviation unit that is flying around cities and frequently they are monitoring protesters instead of violent criminals. the black lives matter protests in baltimore, the fbi was flying surveillance over the protesters. s - now this has been cause for alarm because modern surveillance technologies are
already being used by oppressive regimes to suppress government opposition. "allahu akbar" (over and over) ala'a - since 2011, bahrain has witnessed some of the largest protests in its history where there are thousands of protesters taking to the streets. who are demanding more democratic reforms and a change in regime. s - ala'a shehabi is a bahraini activist who found herself the target
of government surveillance. a - in 2012 i was briefly arrested. immediately after i was released, i received a string of 4 or 5 emails that were very suspicious to me. i suspected that this was a cyber attack so i immediately sent the suspicious emails to my colleague morgan, at citizen lab, it actually turned out that this spyware was produced and operated by a british
and german company called finfisher. this is a company that specializes in producing hacking software. it claims it sells it to government regimes. so that immediately fitted with my suspicion that this was the bahraini regime. the spyware is capable of switching your microphone on, your camera, it is capable of logging every single thing that you type. there are a handful of key companies, in europe, that are openly marketing, promoting and selling these
tools in arms exhibitions. in european capitals. they are not being used in the name of tackling terrorism. they are being used to keep these regimes in place and in power. s - now to see exactly what type of information a hacked phone can yield, we contacted the same hacker who uncovered the bahraini scandal and asked him to hack one of our own reporters.
using the same type of software that targeted ala'a shehabi. we were able to completely commandeer bens phone and he never knew it. so ben was in pakistan doing a shoot on polio. so you hacked his phone and you figured out who he called morgan - right and so i mean what we've got here is i can see who he is calling and when he called them and how long the calls were. we can actually record his calls, lets have a listen to them.
m - this will also keep a list of bens web browsing history. and so for instance you can see here he is google searching for bbc. you can see news articles that he is writing. checking his twitter. it's sort of like reading someones mind. because you can sort of see what they're thinking while they're on the internet. so we've been location tracking ben. you can even get it to animate and so it will show where ben is at various sort of times. you can see him travelling around the city there
and you can tell exactly where he is. which is obviously you know in terms of keeping on someone a highly desirable thing. think about anything that the phone can do. right, like once you've actually installed this malicious software on the phone, then it's simply a matter of activating the phones capabilities. so i mean the phone has a camera right? well now we can turn on the camera. s - what are these ambient recordings? m - ya so the ambient recording is kind of the invisible microphone, the real sort of spy stuff.
s - so he's interviewing a gitmo detainee - a former gitmo detainee - so i guess when you talk about protecting journalists, protecting your source is a big issue. m - can you be said to be practicing journalism in a traditional sense if you can't guarantee source protection? you may be sort of actively endangering their livelihood, welfare and life. s - now with software like this and the other more commercially available software
it seems like technology allows... almost anyone to spy on almost anyone m - we live in a golden age of convenience enabled by technology. so that means that you and i can be on other sides of the planet and we can have a conversation in real time for no money. technology has enabled convenience of communication but also convenience of surveillance. s - now this so called golden age of technology has essentially made it possible for anyone to spy on anyone else
it begs the question - can people, for example journalists, ever go dark? is that even possible now with these new advancements? how do we go black? e - well so going black is a pretty big ask. for me for example, i really know what i'm doing. s - ya. e - but if the nsa wants to pop my box. you know they're totally going to do it. but if you know you're actively under threat,
if you know your phone has been hacked, these are ways that you can ensure that your phone works for you rather than working for somebody else. you might have bought the phone but whoever hacked it s - that's because third parties can actually turn on your phones microphones and cameras without you knowing it. e - any device that is on here you can operate independently. s - so it's true you can get into the phone and turn the camera on? e - ya, absolutely. so you would turn this guy on
and you'll just heat that guy until the solders molten. because i'm going to be detaching the rhythm cables... that are connecting the camera... as a surface mount device you'll be able to just pull it off like that. s - so this is the camera? what's that? e - this is the other camera. you got 2 cameras in your phone, you got your front facing camera, for sort of the selfies.
and you got your rear facing camera, that's it. i think this one has a multi microphone array which is going to be this guy this guy and this guy. s - but if you take out the microphones then how do you use it as a phone? e - you would add your own external microphone. for example the ipod type earbuds that have the mic integrated on the lanyard.
e - perhaps the most terrifying thing is, if your phone had been hacked you would never know. s - and as vice news reporter jason leopold found surveillance has become so ubiquitious that even the government agencies responsible for policing it are not secure. you got a foia request recently in the mail that is causing quite a stir. j - the way that this all surfaced, dianne feinstein,
she made this extraordinary floor speech. s - as the head of the senate intelligence committee feinstein delivered some shocking allegations. senator feinstein - on 2 occasions cia personnel electronically removed committee access to cia documents. j - she said that the cia had hacked into senate computers while these staffers who worked for her were
writing a report about the cia's torture program. john brennan, the director of the cia said that is proposterous. our only way to look deeper into it was to file a freedom of information act request. so these documents absolutely backed up everything that dianne feinstein said. what's most interesting though, what i would call a smoking gun, john brennan wrote a letter and he said that the cia
staff had improperly accessed your computers. but john brennan never sent this letter to dianne feinstein. they said that this letter was mistakenly turned over to us. it was an accident and it actually should not have been released to us and they asked us not to, uh, post it. s - because it's embarrassing? j - completely embarrassing for them. and we declined that request because there was no national security concerns in this letter. this is simply
something that john brennan did not want the public to see after making after making all of these statements about what the cia did not do. s - we now know that the cia officers were in fact spying on the committee charged with keeping them in line. so we spoke to one of those committee members senator ron wyden about the letter than brennan never meant to send. senator ron wyden - this will be the first time i've ever said this publicly.
my sense is there were clearly people at the cia who understood that what mister brennan had done was flat out wrong. and they drafted an apology letter. and yet, mr brennan was just unwilling to publicly acknowledge wrongdoing. this is basically re-writing the law. we are the agency that is required by law to conduct vigorous oversight over the cia. we can't do vigorous oversight over the agency
if the agency we're supposed to be overseeing is in fact secretly searching our files. s - now senator wyden has become a leader in attempting to reign in our intelligence community. w - director clapper, i want to ask you... e - senator ron wyden said "is the nsa collecting any kind of data at all on millions or hundreds of millions of americans?" and james clapper sort of scratched his head james clapper - no sir.
e - and he said no...senator wyden - it does not?e - ...they do not clapper - not wittingly. e - the most senior intelligence official in the united states of america raised his hand and swore an oath to tell the truth to congress. and he lied on camera. he wasn't charged, despite the fact that is a felony; he didn't even lose his job, he's still doing the same thing today. within a few months he admitted that he had lied. he said his answer was too cute by half
and the least untruthful statement that he felt he could have made at the time. w - my view is that if you're going to protect the american people you've got to embed those protections into law. and we of course have been very concerned about with what i call "secret law" s - and at the heart of that secret law is fisa
the foreign intelligence surveillance act. which authorised secret courts to greenlight domestic spying programs w - the government persuaded the court to say it was okay to collect metadata. when you read the fundamental law you didn't hear anything about metadata and collecting millions of records on law abiding people.
that was all done in secret. and in fact i went to the floor of the senate and i warned that when the american people found out how that law had been secretly interpreted they would be very angry. and that in fact was the case. s - now public anger hasn't been enough to end many of these programs. but increasingly the question isn't whether or not they can be justified under law but whether they're actually effective
in the first place. recently there were attacks in paris. what happens when you have a terrorist attack like that- within security agencies, the nsa for example? e - i was working at the nsa during the boston marathon bombing investigation. and as it was playing on the news myself and colleagues were in the cafeteria and we turned to each other
and said... i'll bet you anything... we already knew about these guys in the databases. and in paris, i'm certain that the same conversation happened. this is really the legacy of mass surveillance. it's the fact that when you are watching everyone you know who these individuals are, they're in the banks, you had the information you needed to stop, to prevent even the worst atrocities.
but the problem is when you cast the net too wide, when you're collecting everything, you understand nothing. we know for a fact that it is not effective for stopping terrorist attacks and it never has been. the white house appointed 2 independent commissions in the wake of my disclosures in 2013 to review mass surveillance programs
and go "alright do these have value? should they be changed? should they be reformed?" they looked at the evidence, the classified evidence, and they found wow, despite the fact that this been going since 2001, it had never stopped a single terrorist attack in the united states. and that's after monitoring the phone calls of everyone in the country. s - so that's a huge point. so two independent
commissions, started by the white house, said "mass surveillance has not stopped a terrorist attack." e - and both of them found that these programs should be ended and then they came up with forty two different points for reform that they recommended should happen to restrict the use of these powers. the last time that i saw a review of this, the president only adopted three of the forty two points.
s - why? e - because they would limit the exercise of executive power. this is something that you have to understand is not about this president... it's about...the presidency. it's clear that the public opposes a majority of these policies. and yet politicians, because the word terrorism is involved, they can't justify being the one to stand
and mount the vote, because they know there will be another terrorist attack. s - because if they say "no we're not doing this" and then there is a terrorist attack, they get painted with that brush. e - they know they'll be blamed by their political opponents and they're right. of course their political opponents will do this it's the easiest thing in the world to do. and unfortunately it's quite effective. because we live in a time where the
politics of fear are the most persuasive thing on the table. s - now while the debate over surveillance continues to rage here in the us, edward snowden remains a fugitive for his revelations about the nsa. and he had a cautionary statement about what's at stake. when the world was first introduced to you, you made a statement about turnkey tyranny...
what did you mean by that? e - it means that even if you trust the government today what happens when it changes? in our democracy we're never more than 8 years away from a total change of government. suddenly, everybody is vulnerable to this individual and the systems are already in place. what happens tomorrow, in a year, in 5 years, in 10 years,
when eventually we get an individual who says "you know what? lets flip that switch... and use the absolute full extent of our technical capabilities to ensure the political stability of this new administration." when we think about the future and where we go from here the question is are we going to change?
and enter sort of a quantified world where everywhere you've been, everyone you talk to, it's indexed it's analyzed, it's stored and it's used. maybe against you. cop - within our technologies here we have our license plate reader system, which we can capture dozens of license plates in a matter of a second. e - or will we recognize the danger of that
and embrace the fact that people should have space to make mistakes, without judgement, to have sort of the unconsidered thought or conversation with your friend. but if that was recorded in a database where you know, you say "i think donald trump should be kicked off a cliff" and donald trump becomes president someday, and then everybody who said that ends up getting thrown off a cliff.
that's a very dangerous world. and i think this really is... the question that... our political structures... are not yet comfortable even discussing. but whether they like it or not, it's a world that is coming and we're going to have to confront.
Thanks for reading Classic Furniture Vs Modern. Please share...!
0 Comment for "Classic Furniture Vs Modern"