Thuê các hacker! – Misha Kim

Hire the hackers! - Misha Glenny
play-sharp-fill

Hire the hackers! - Misha Glenny

 


[Music]




now<00:00:15.759> this<00:00:16.000> is<00:00:16.160> a<00:00:16.240> very<00:00:16.960> uh<00:00:17.359> unted<00:00:17.920> like<00:00:18.240> thing
now this is a very uh unted like thing now this is a very uh unted like thing to<00:00:18.720> do<00:00:19.039> but<00:00:19.520> let's<00:00:20.160> kick<00:00:20.400> off<00:00:20.640> the<00:00:20.880> afternoon to do but let's kick off the afternoon to do but let's kick off the afternoon with<00:00:22.320> a<00:00:22.560> message<00:00:23.119> from<00:00:23.760> a<00:00:24.240> mystery<00:00:25.039> sponsor with a message from a mystery sponsor with a message from a mystery sponsor dear<00:00:26.720> fox<00:00:27.199> news dear fox news dear fox news it<00:00:29.199> has<00:00:29.359> come<00:00:29.519> to<00:00:29.760> our<00:00:30.000> unfortunate<00:00:30.720> attention it has come to our unfortunate attention it has come to our unfortunate attention that<00:00:31.760> both<00:00:32.079> the<00:00:32.239> name<00:00:32.640> and<00:00:32.800> nature<00:00:33.120> of that both the name and nature of that both the name and nature of anonymous<00:00:34.160> has<00:00:34.320> been<00:00:34.559> ravaged anonymous has been ravaged anonymous has been ravaged we<00:00:36.239> are<00:00:36.399> everyone<00:00:36.960> and<00:00:37.120> we<00:00:37.360> are<00:00:37.520> no<00:00:37.680> one we are everyone and we are no one we are everyone and we are no one we<00:00:38.879> are<00:00:39.040> anonymous<00:00:40.160> we<00:00:40.320> are<00:00:40.559> legion<00:00:41.440> we<00:00:41.600> do<00:00:41.760> not we are anonymous we are legion we do not we are anonymous we are legion we do not forgive<00:00:42.640> we<00:00:42.800> do<00:00:42.960> not<00:00:43.200> forget forgive we do not forget forgive we do not forget we<00:00:45.200> are<00:00:45.360> the<00:00:45.600> face<00:00:46.320> of<00:00:46.559> chaos



anonymous<00:00:50.800> ladies<00:00:51.200> and<00:00:51.360> gentlemen
anonymous ladies and gentlemen anonymous ladies and gentlemen a<00:00:52.800> sophisticated<00:00:53.760> group<00:00:54.079> of<00:00:54.239> politically a sophisticated group of politically a sophisticated group of politically motivated<00:00:55.760> hackers<00:00:56.640> who<00:00:56.800> have<00:00:57.039> emerged<00:00:57.680> in motivated hackers who have emerged in motivated hackers who have emerged in 2011 2011 2011 and<00:01:00.320> they're<00:01:00.719> pretty<00:01:01.120> scary<00:01:01.840> you<00:01:02.079> never<00:01:02.320> know and they're pretty scary you never know and they're pretty scary you never know when<00:01:03.120> they're<00:01:03.359> going<00:01:03.680> to<00:01:03.840> attack<00:01:04.320> next<00:01:04.960> who<00:01:05.680> or when they're going to attack next who or when they're going to attack next who or what<00:01:06.159> the<00:01:06.320> consequences<00:01:07.200> will<00:01:07.439> be what the consequences will be what the consequences will be but<00:01:08.640> interestingly but interestingly but interestingly they<00:01:10.240> have<00:01:10.880> a<00:01:11.040> sense<00:01:11.360> of<00:01:11.520> humor they have a sense of humor they have a sense of humor these<00:01:13.119> guys<00:01:13.600> hacked<00:01:14.000> into<00:01:14.560> fox<00:01:14.960> news's these guys hacked into fox news's these guys hacked into fox news's twitter<00:01:15.920> account<00:01:16.479> to<00:01:16.640> announce<00:01:17.520> president twitter account to announce president twitter account to announce president obama's<00:01:19.040> assassination obama's assassination obama's assassination now<00:01:20.960> you<00:01:21.119> can<00:01:21.360> imagine<00:01:21.759> the<00:01:21.920> panic<00:01:22.240> that<00:01:22.400> would now you can imagine the panic that would now you can imagine the panic that would have<00:01:22.720> generated<00:01:23.680> in<00:01:23.920> the<00:01:24.240> newsroom<00:01:25.200> at<00:01:25.439> fox have generated in the newsroom at fox have generated in the newsroom at fox what<00:01:26.320> do<00:01:26.479> we<00:01:26.560> do<00:01:26.799> now<00:01:27.520> put<00:01:27.680> on<00:01:27.759> a<00:01:27.920> black<00:01:28.159> armband what do we do now put on a black armband what do we do now put on a black armband or<00:01:29.200> crack<00:01:29.520> open<00:01:29.759> the<00:01:29.920> champagne or crack open the champagne or crack open the champagne and<00:01:31.600> of<00:01:31.759> course and of course and of course who<00:01:33.840> could who could who could who<00:01:34.960> could<00:01:35.200> escape<00:01:35.759> the<00:01:36.000> irony<00:01:36.560> of<00:01:36.720> a<00:01:36.799> member who could escape the irony of a member who could escape the irony of a member of<00:01:37.680> rupert<00:01:38.079> murdoch's<00:01:38.640> news<00:01:38.960> corp<00:01:39.680> being<00:01:40.079> a of rupert murdoch's news corp being a of rupert murdoch's news corp being a victim<00:01:40.720> of<00:01:40.880> hacking<00:01:41.360> for<00:01:41.520> a<00:01:41.680> change victim of hacking for a change victim of hacking for a change sometimes



sometimes<00:01:49.280> you<00:01:49.439> know
sometimes you know sometimes you know you<00:01:50.640> turn<00:01:50.880> on<00:01:50.960> the<00:01:51.040> news<00:01:51.360> and<00:01:51.439> you<00:01:51.520> say<00:01:51.680> is you turn on the news and you say is you turn on the news and you say is there<00:01:52.000> anyone<00:01:52.399> left<00:01:52.880> to<00:01:53.119> hack<00:01:53.920> sony there anyone left to hack sony there anyone left to hack sony playstation<00:01:55.040> network playstation network playstation network done<00:01:56.799> the<00:01:56.960> government<00:01:57.360> of<00:01:57.520> turkey<00:01:58.079> tick done the government of turkey tick done the government of turkey tick britain's<00:01:59.200> serious<00:01:59.680> organized<00:02:00.159> crime<00:02:00.560> agency britain's serious organized crime agency britain's serious organized crime agency a<00:02:01.360> breeze<00:02:01.840> the<00:02:02.000> cia<00:02:02.640> falling<00:02:02.960> off<00:02:03.200> a<00:02:03.280> log<00:02:03.840> in a breeze the cia falling off a log in a breeze the cia falling off a log in fact<00:02:04.240> a<00:02:04.320> friend<00:02:04.560> of<00:02:04.640> mine<00:02:04.880> from<00:02:05.040> the<00:02:05.119> security fact a friend of mine from the security fact a friend of mine from the security industry<00:02:06.320> told<00:02:06.479> me<00:02:06.719> the<00:02:06.799> other<00:02:07.040> day<00:02:07.520> that industry told me the other day that industry told me the other day that there<00:02:08.000> are<00:02:08.319> two<00:02:08.560> types<00:02:08.879> of<00:02:09.039> companies<00:02:09.599> in<00:02:09.679> the there are two types of companies in the there are two types of companies in the world<00:02:10.479> those<00:02:10.800> that<00:02:11.039> know<00:02:11.200> they've<00:02:11.440> been world those that know they've been world those that know they've been hacked<00:02:12.400> and<00:02:12.560> those<00:02:12.879> that<00:02:13.120> don't<00:02:14.000> i<00:02:14.080> mean hacked and those that don't i mean hacked and those that don't i mean three<00:02:15.840> companies<00:02:16.640> providing three companies providing three companies providing cyber<00:02:18.319> security<00:02:18.959> services<00:02:19.520> to<00:02:19.680> the<00:02:19.840> fbi<00:02:20.800> have cyber security services to the fbi have cyber security services to the fbi have been<00:02:21.280> hacked<00:02:22.000> i<00:02:22.160> mean<00:02:22.800> is<00:02:23.200> nothing<00:02:23.680> sacred been hacked i mean is nothing sacred been hacked i mean is nothing sacred anymore<00:02:24.480> for<00:02:24.640> heaven's<00:02:25.040> sake anymore for heaven's sake anymore for heaven's sake anyway<00:02:26.720> this<00:02:26.959> mysterious<00:02:27.920> group<00:02:28.239> anonymous anyway this mysterious group anonymous anyway this mysterious group anonymous and<00:02:28.879> they<00:02:29.040> would<00:02:29.200> say<00:02:29.440> this<00:02:29.680> themselves<00:02:30.160> they and they would say this themselves they and they would say this themselves they are<00:02:30.480> providing<00:02:30.959> a<00:02:31.200> service<00:02:32.000> by<00:02:32.400> demonstrating are providing a service by demonstrating are providing a service by demonstrating how<00:02:33.599> useless<00:02:34.239> companies<00:02:34.959> are<00:02:35.599> at<00:02:36.160> protecting how useless companies are at protecting how useless companies are at protecting our<00:02:37.280> data<00:02:38.080> but<00:02:38.239> there<00:02:38.480> is<00:02:38.640> also<00:02:39.120> a<00:02:39.200> very our data but there is also a very our data but there is also a very serious<00:02:40.000> aspect<00:02:40.480> to<00:02:40.640> anonymous<00:02:41.519> they<00:02:41.760> are serious aspect to anonymous they are serious aspect to anonymous they are ideologically ideologically ideologically driven driven driven they<00:02:45.120> claim<00:02:45.599> that<00:02:45.760> they<00:02:46.000> are<00:02:46.319> battling<00:02:46.879> a they claim that they are battling a they claim that they are battling a dastardly<00:02:48.080> conspiracy dastardly conspiracy dastardly conspiracy they<00:02:49.680> say<00:02:50.000> that<00:02:50.400> governments<00:02:50.959> are<00:02:51.120> trying<00:02:51.360> to they say that governments are trying to they say that governments are trying to take<00:02:52.000> over<00:02:52.640> the<00:02:52.879> internet<00:02:53.360> and<00:02:53.599> control<00:02:54.160> it take over the internet and control it take over the internet and control it and<00:02:54.959> that<00:02:55.200> they and that they and that they anonymous<00:02:57.040> are<00:02:57.200> the<00:02:57.360> authentic<00:02:58.080> voice<00:02:58.480> of anonymous are the authentic voice of anonymous are the authentic voice of resistance<00:02:59.760> be<00:03:00.000> it<00:03:00.160> against<00:03:00.640> middle<00:03:00.879> eastern resistance be it against middle eastern resistance be it against middle eastern dictatorships<00:03:02.080> against<00:03:02.480> global<00:03:02.879> media dictatorships against global media dictatorships against global media corporations<00:03:04.560> or<00:03:04.800> against<00:03:05.599> intelligence corporations or against intelligence corporations or against intelligence agencies<00:03:07.120> or<00:03:07.280> whoever<00:03:07.760> it<00:03:07.920> is<00:03:08.640> and<00:03:08.720> their agencies or whoever it is and their agencies or whoever it is and their politics<00:03:09.599> are<00:03:09.760> not<00:03:10.000> entirely<00:03:11.120> unattractive politics are not entirely unattractive politics are not entirely unattractive okay<00:03:12.959> they're<00:03:13.200> a<00:03:13.280> little<00:03:13.920> in<00:03:14.239> koat<00:03:15.040> and okay they're a little in koat and okay they're a little in koat and there's<00:03:15.440> a<00:03:16.000> there's<00:03:16.239> a<00:03:16.400> strong<00:03:16.800> whiff<00:03:17.040> of<00:03:17.200> sort there's a there's a strong whiff of sort there's a there's a strong whiff of sort of<00:03:17.519> half-baked<00:03:18.319> anarchism<00:03:19.360> uh<00:03:19.680> about<00:03:20.080> them of half-baked anarchism uh about them of half-baked anarchism uh about them but<00:03:21.040> one<00:03:21.360> thing<00:03:21.599> is<00:03:21.840> true but one thing is true but one thing is true we<00:03:23.200> are<00:03:23.519> at<00:03:23.599> the<00:03:23.760> beginning<00:03:24.720> of<00:03:24.879> a<00:03:25.040> mighty we are at the beginning of a mighty we are at the beginning of a mighty struggle struggle struggle for<00:03:27.040> control<00:03:27.840> of<00:03:28.000> the<00:03:28.239> internet for control of the internet for control of the internet the<00:03:29.519> web<00:03:29.840> links<00:03:30.480> everything<00:03:31.120> and<00:03:31.360> very<00:03:31.599> soon the web links everything and very soon the web links everything and very soon it<00:03:32.480> will<00:03:32.640> mediate<00:03:33.200> most<00:03:33.599> human<00:03:34.239> activity it will mediate most human activity it will mediate most human activity because<00:03:35.760> the<00:03:35.920> internet<00:03:36.560> has<00:03:36.799> fashioned<00:03:37.360> a<00:03:37.519> new because the internet has fashioned a new because the internet has fashioned a new and<00:03:38.239> complicated<00:03:39.040> environment<00:03:40.159> for<00:03:40.319> an<00:03:40.560> old and complicated environment for an old and complicated environment for an old age<00:03:41.120> dilemma<00:03:42.159> that<00:03:42.400> pits<00:03:43.040> the<00:03:43.200> demands<00:03:43.760> of age dilemma that pits the demands of age dilemma that pits the demands of security security security with<00:03:46.159> the<00:03:46.799> desire with the desire with the desire for<00:03:48.480> freedom<00:03:49.040> now<00:03:49.680> this<00:03:49.920> is<00:03:50.080> a<00:03:50.239> very for freedom now this is a very for freedom now this is a very complicated<00:03:51.840> struggle<00:03:52.319> and<00:03:52.480> unfortunately complicated struggle and unfortunately complicated struggle and unfortunately for<00:03:53.360> mortals<00:03:53.920> like<00:03:54.480> uh<00:03:54.720> you<00:03:54.959> and<00:03:55.120> me for mortals like uh you and me for mortals like uh you and me we<00:03:56.080> probably<00:03:56.879> can't<00:03:57.519> uh<00:03:57.840> understand<00:03:58.480> it<00:03:58.640> very we probably can't uh understand it very we probably can't uh understand it very well<00:03:59.040> nonetheless<00:04:00.000> in<00:04:00.319> an<00:04:00.640> unexpected<00:04:01.439> attack well nonetheless in an unexpected attack well nonetheless in an unexpected attack of<00:04:02.000> hubris<00:04:02.720> a<00:04:02.879> couple<00:04:03.120> of<00:04:03.280> years<00:04:03.519> ago<00:04:04.159> i of hubris a couple of years ago i of hubris a couple of years ago i decided<00:04:05.200> i<00:04:05.439> would<00:04:05.760> try<00:04:06.000> and<00:04:06.239> do<00:04:06.480> that<00:04:07.200> and<00:04:07.519> uh<00:04:08.080> i decided i would try and do that and uh i decided i would try and do that and uh i sought<00:04:09.599> i<00:04:09.840> sort<00:04:10.720> of<00:04:11.040> get<00:04:11.280> it<00:04:11.840> these<00:04:12.080> were<00:04:12.239> the sought i sort of get it these were the sought i sort of get it these were the various<00:04:12.720> things<00:04:12.959> that<00:04:13.120> i<00:04:13.200> was<00:04:13.360> looking<00:04:13.680> at<00:04:14.080> as various things that i was looking at as various things that i was looking at as i<00:04:14.319> was<00:04:14.480> trying<00:04:14.640> to<00:04:14.799> understand<00:04:15.280> it<00:04:15.360> but<00:04:15.760> in i was trying to understand it but in i was trying to understand it but in order<00:04:16.239> to<00:04:16.400> try<00:04:16.560> and<00:04:16.720> explain<00:04:17.280> the<00:04:17.440> whole<00:04:17.759> thing order to try and explain the whole thing order to try and explain the whole thing i<00:04:18.400> would<00:04:18.639> need<00:04:19.120> another<00:04:19.519> 18<00:04:19.919> minutes<00:04:20.320> or<00:04:20.400> so<00:04:20.959> to i would need another 18 minutes or so to i would need another 18 minutes or so to do<00:04:21.440> it<00:04:21.840> so<00:04:22.160> you're<00:04:22.320> just<00:04:22.479> going<00:04:22.639> to<00:04:22.720> have<00:04:22.960> to do it so you're just going to have to do it so you're just going to have to take<00:04:23.520> it<00:04:23.759> on<00:04:24.000> trust<00:04:24.320> from<00:04:24.560> me<00:04:24.800> on<00:04:24.880> this take it on trust from me on this take it on trust from me on this occasion<00:04:26.240> and<00:04:26.800> let<00:04:26.960> me<00:04:27.120> assure<00:04:27.360> you<00:04:27.520> that<00:04:27.759> all occasion and let me assure you that all occasion and let me assure you that all of<00:04:28.080> these<00:04:28.320> issues<00:04:28.880> are<00:04:29.120> involved<00:04:29.520> in<00:04:29.680> cyber of these issues are involved in cyber of these issues are involved in cyber security<00:04:30.639> and<00:04:30.800> control<00:04:31.280> of<00:04:31.360> the<00:04:31.520> internet<00:04:32.400> one security and control of the internet one security and control of the internet one way<00:04:33.040> or<00:04:33.280> the<00:04:33.440> other<00:04:33.600> but<00:04:33.840> in<00:04:34.000> a<00:04:34.080> configuration way or the other but in a configuration way or the other but in a configuration that<00:04:35.600> uh<00:04:35.919> even<00:04:36.240> stephen<00:04:36.639> hawkins<00:04:37.040> would that uh even stephen hawkins would that uh even stephen hawkins would probably<00:04:37.520> have<00:04:37.759> difficulty<00:04:38.720> trying<00:04:39.040> to<00:04:39.199> get probably have difficulty trying to get probably have difficulty trying to get uh<00:04:40.560> trying<00:04:40.800> to<00:04:40.880> get<00:04:41.120> his<00:04:41.360> head<00:04:41.600> around uh trying to get his head around uh trying to get his head around so<00:04:42.639> there<00:04:42.800> you<00:04:43.040> are<00:04:43.520> and<00:04:43.680> as<00:04:43.840> you<00:04:44.000> see<00:04:44.320> in<00:04:44.479> the so there you are and as you see in the so there you are and as you see in the middle<00:04:45.120> there<00:04:45.440> is<00:04:45.600> our<00:04:45.919> old<00:04:46.400> friend<00:04:46.880> the middle there is our old friend the middle there is our old friend the hacker hacker hacker the<00:04:48.560> hacker<00:04:48.960> is<00:04:49.199> absolutely<00:04:50.080> central<00:04:50.960> to<00:04:51.120> many the hacker is absolutely central to many the hacker is absolutely central to many of<00:04:51.600> the<00:04:51.759> political<00:04:52.479> social<00:04:53.280> and<00:04:53.600> economic of the political social and economic of the political social and economic issues<00:04:54.800> affecting<00:04:55.280> the<00:04:55.520> net<00:04:55.840> and<00:04:56.000> so<00:04:56.639> i issues affecting the net and so i issues affecting the net and so i thought<00:04:57.120> to<00:04:57.280> myself<00:04:58.000> well thought to myself well thought to myself well these<00:04:59.199> are<00:04:59.280> the<00:04:59.440> guys<00:04:59.919> who<00:05:00.320> i<00:05:00.720> want<00:05:01.040> to<00:05:01.199> talk<00:05:01.440> to these are the guys who i want to talk to these are the guys who i want to talk to and<00:05:02.240> what<00:05:02.400> do<00:05:02.560> you<00:05:02.720> know and what do you know and what do you know nobody<00:05:04.880> else<00:05:05.120> does<00:05:05.440> talk<00:05:05.759> to<00:05:05.919> the<00:05:06.080> hackers nobody else does talk to the hackers nobody else does talk to the hackers they're<00:05:07.520> completely<00:05:08.240> anonymous<00:05:09.039> as<00:05:09.199> it<00:05:09.360> were they're completely anonymous as it were they're completely anonymous as it were so<00:05:10.160> despite<00:05:10.639> the<00:05:10.880> fact<00:05:11.440> that<00:05:11.600> we<00:05:11.840> are so despite the fact that we are so despite the fact that we are beginning<00:05:12.400> to<00:05:12.639> pour beginning to pour beginning to pour billions<00:05:14.400> hundreds<00:05:14.960> of<00:05:15.120> billions<00:05:15.680> of<00:05:15.840> dollars billions hundreds of billions of dollars billions hundreds of billions of dollars into<00:05:17.680> cyber<00:05:18.160> security<00:05:19.199> for<00:05:19.440> the<00:05:19.520> most into cyber security for the most into cyber security for the most extraordinary<00:05:20.639> technical extraordinary technical extraordinary technical uh<00:05:22.240> solutions uh solutions uh solutions no<00:05:23.680> one<00:05:23.919> wants<00:05:24.160> to<00:05:24.320> talk<00:05:24.880> to<00:05:25.520> these<00:05:25.840> guys<00:05:26.160> the no one wants to talk to these guys the no one wants to talk to these guys the hackers<00:05:27.199> who<00:05:27.680> are<00:05:28.400> doing hackers who are doing hackers who are doing everything<00:05:30.240> instead<00:05:30.800> we<00:05:31.039> prefer<00:05:31.440> these everything instead we prefer these everything instead we prefer these really<00:05:32.400> dazzling<00:05:32.960> technological<00:05:33.840> solutions really dazzling technological solutions really dazzling technological solutions um<00:05:35.440> which<00:05:35.759> cost<00:05:36.400> a<00:05:36.560> huge<00:05:36.880> amount<00:05:37.280> of<00:05:37.440> money<00:05:38.240> so um which cost a huge amount of money so um which cost a huge amount of money so nothing<00:05:39.440> is<00:05:39.600> going<00:05:39.919> into<00:05:40.479> into<00:05:40.720> the<00:05:40.880> hackers nothing is going into into the hackers nothing is going into into the hackers well<00:05:42.320> i<00:05:42.560> say<00:05:42.880> nothing<00:05:43.759> but<00:05:44.080> actually<00:05:44.960> there<00:05:45.199> is well i say nothing but actually there is well i say nothing but actually there is one<00:05:45.680> teeny<00:05:46.160> weeny<00:05:46.479> little<00:05:46.800> research<00:05:47.360> unit<00:05:48.000> in one teeny weeny little research unit in one teeny weeny little research unit in turin<00:05:49.039> italy<00:05:49.680> called<00:05:49.919> the<00:05:50.320> hackers<00:05:51.120> profiling turin italy called the hackers profiling turin italy called the hackers profiling project<00:05:52.720> and<00:05:52.960> they<00:05:53.199> are<00:05:53.280> doing<00:05:53.600> some project and they are doing some project and they are doing some fantastic<00:05:54.720> research<00:05:55.759> into<00:05:56.400> the fantastic research into the fantastic research into the characteristics<00:05:58.240> into<00:05:58.479> the<00:05:58.560> abilities<00:05:59.440> and characteristics into the abilities and characteristics into the abilities and the<00:05:59.680> socialization<00:06:00.960> of<00:06:01.199> hackers<00:06:01.600> but<00:06:01.759> because the socialization of hackers but because the socialization of hackers but because they're<00:06:02.240> a<00:06:02.320> un<00:06:03.039> operation<00:06:03.680> maybe<00:06:03.919> that's<00:06:04.240> why they're a un operation maybe that's why they're a un operation maybe that's why governments<00:06:04.880> and<00:06:04.960> corporations<00:06:05.840> aren't<00:06:06.000> that governments and corporations aren't that governments and corporations aren't that interested<00:06:06.880> in<00:06:07.039> them<00:06:07.280> and<00:06:07.440> because<00:06:07.680> it's<00:06:07.919> a<00:06:08.000> un interested in them and because it's a un interested in them and because it's a un operation<00:06:09.199> of<00:06:09.440> course<00:06:10.080> it<00:06:10.560> lacks<00:06:11.280> funding<00:06:12.160> but operation of course it lacks funding but operation of course it lacks funding but i<00:06:12.639> think<00:06:12.880> they're<00:06:13.120> doing<00:06:13.759> very<00:06:14.160> important i think they're doing very important i think they're doing very important work<00:06:15.440> because<00:06:16.319> where<00:06:16.560> we<00:06:16.800> have<00:06:17.199> a<00:06:17.440> surfeit<00:06:18.400> of work because where we have a surfeit of work because where we have a surfeit of technology<00:06:19.600> in<00:06:19.759> the<00:06:19.919> cyber<00:06:20.319> security technology in the cyber security technology in the cyber security industry<00:06:22.400> we<00:06:22.720> have<00:06:23.440> a<00:06:23.759> definite<00:06:24.560> lack industry we have a definite lack industry we have a definite lack of<00:06:25.759> call<00:06:25.919> me<00:06:26.160> old-fashioned of call me old-fashioned of call me old-fashioned human<00:06:28.319> intelligence human intelligence human intelligence now<00:06:30.240> so<00:06:30.400> far<00:06:30.720> i've<00:06:30.960> mentioned<00:06:31.440> the<00:06:31.759> hackers now so far i've mentioned the hackers now so far i've mentioned the hackers anonymous<00:06:33.520> who<00:06:33.680> are<00:06:33.840> a<00:06:33.919> politically anonymous who are a politically anonymous who are a politically motivated<00:06:35.600> hacking<00:06:36.000> group<00:06:36.560> of<00:06:36.639> course<00:06:36.880> the motivated hacking group of course the motivated hacking group of course the criminal<00:06:37.440> justice<00:06:37.840> system<00:06:38.240> treats<00:06:38.479> them<00:06:38.720> as criminal justice system treats them as criminal justice system treats them as common<00:06:39.360> or<00:06:39.520> garden<00:06:39.919> criminals<00:06:40.319> but common or garden criminals but common or garden criminals but interestingly<00:06:41.199> anonymous<00:06:42.000> does<00:06:42.319> not<00:06:42.639> make interestingly anonymous does not make interestingly anonymous does not make use<00:06:43.600> of<00:06:43.840> its<00:06:44.080> hacked<00:06:44.479> information<00:06:45.360> for use of its hacked information for use of its hacked information for financial<00:06:46.319> gain financial gain financial gain but<00:06:47.280> what<00:06:47.520> about<00:06:47.919> the<00:06:48.479> real<00:06:49.039> cyber<00:06:49.520> criminals but what about the real cyber criminals but what about the real cyber criminals well<00:06:50.880> real<00:06:51.199> organized<00:06:51.759> crime<00:06:52.240> on<00:06:52.400> the well real organized crime on the well real organized crime on the internet<00:06:53.199> goes<00:06:53.600> back<00:06:54.240> about<00:06:54.720> 10<00:06:55.039> years<00:06:55.919> when<00:06:56.240> a internet goes back about 10 years when a internet goes back about 10 years when a group<00:06:56.720> of<00:06:57.280> gifted<00:06:58.160> ukrainian<00:06:59.039> hackers group of gifted ukrainian hackers group of gifted ukrainian hackers developed<00:07:01.199> a<00:07:01.360> website developed a website developed a website which<00:07:02.720> led<00:07:03.039> to<00:07:03.199> the which led to the which led to the industrialization<00:07:05.199> of<00:07:05.520> cybercrime<00:07:06.720> welcome industrialization of cybercrime welcome industrialization of cybercrime welcome to<00:07:07.280> the<00:07:07.440> now<00:07:07.759> forgotten<00:07:08.319> realm<00:07:09.039> of<00:07:09.360> carter to the now forgotten realm of carter to the now forgotten realm of carter planet



this<00:07:13.599> is<00:07:13.759> how<00:07:14.160> they<00:07:14.319> were<00:07:14.639> advertising
this is how they were advertising this is how they were advertising themselves<00:07:15.919> a<00:07:16.080> decade<00:07:16.560> ago themselves a decade ago themselves a decade ago on<00:07:17.919> the<00:07:18.080> net<00:07:18.400> now<00:07:18.720> carla<00:07:19.039> planet<00:07:19.280> was<00:07:19.440> very on the net now carla planet was very on the net now carla planet was very interesting<00:07:20.240> cyber<00:07:20.560> criminals<00:07:21.039> would<00:07:21.280> go interesting cyber criminals would go interesting cyber criminals would go there<00:07:22.160> to<00:07:22.479> buy<00:07:22.800> and<00:07:23.039> sell<00:07:23.680> stolen<00:07:24.240> credit<00:07:24.560> card there to buy and sell stolen credit card there to buy and sell stolen credit card details<00:07:25.759> to<00:07:26.000> exchange<00:07:26.560> information<00:07:27.440> about details to exchange information about details to exchange information about new<00:07:28.240> malware<00:07:28.880> that<00:07:29.039> was<00:07:29.599> was<00:07:30.000> out<00:07:30.160> there new malware that was was out there new malware that was was out there and<00:07:31.280> remember<00:07:31.680> this<00:07:31.919> is<00:07:32.000> a<00:07:32.160> time<00:07:32.639> when<00:07:33.120> we're and remember this is a time when we're and remember this is a time when we're seeing<00:07:33.680> for<00:07:33.840> the<00:07:34.000> first<00:07:34.319> time<00:07:34.960> so-called seeing for the first time so-called seeing for the first time so-called off-the-shelf<00:07:36.319> malware<00:07:36.800> this<00:07:37.039> is<00:07:37.199> sort<00:07:37.360> of off-the-shelf malware this is sort of off-the-shelf malware this is sort of ready<00:07:38.319> for<00:07:38.560> use<00:07:39.039> out<00:07:39.280> of<00:07:39.440> the<00:07:39.599> box<00:07:40.000> stuff<00:07:40.319> which ready for use out of the box stuff which ready for use out of the box stuff which you<00:07:40.800> can<00:07:40.960> deploy<00:07:41.680> even<00:07:42.000> if<00:07:42.080> you're<00:07:42.319> not<00:07:42.479> a you can deploy even if you're not a you can deploy even if you're not a terribly<00:07:43.360> sophisticated terribly sophisticated terribly sophisticated hacker<00:07:45.199> and<00:07:45.360> so<00:07:45.919> carter<00:07:46.319> planet<00:07:46.639> became<00:07:47.039> a hacker and so carter planet became a hacker and so carter planet became a sort<00:07:47.360> of<00:07:47.840> supermarket<00:07:48.960> for<00:07:49.440> cyber<00:07:49.840> criminals sort of supermarket for cyber criminals sort of supermarket for cyber criminals and<00:07:51.120> its<00:07:51.599> creators<00:07:52.240> were<00:07:52.479> incredibly<00:07:53.199> smart and its creators were incredibly smart and its creators were incredibly smart and<00:07:53.919> entrepreneurial<00:07:54.800> because<00:07:55.120> they<00:07:55.280> were and entrepreneurial because they were and entrepreneurial because they were faced<00:07:56.160> with<00:07:56.479> one<00:07:57.199> enormous<00:07:57.919> challenge<00:07:58.400> as faced with one enormous challenge as faced with one enormous challenge as cyber<00:07:59.120> criminals<00:07:59.680> and<00:07:59.759> that<00:08:00.000> challenge<00:08:00.560> is cyber criminals and that challenge is cyber criminals and that challenge is how<00:08:02.080> do<00:08:02.319> you<00:08:02.479> do<00:08:02.800> business<00:08:03.599> how<00:08:03.840> do<00:08:04.000> you<00:08:04.240> trust how do you do business how do you trust how do you do business how do you trust somebody<00:08:05.520> on<00:08:05.680> the<00:08:05.759> web<00:08:06.080> who<00:08:06.240> you<00:08:06.319> want<00:08:06.560> to<00:08:06.639> do somebody on the web who you want to do somebody on the web who you want to do business<00:08:07.360> with<00:08:08.080> when<00:08:08.240> you<00:08:08.400> know<00:08:08.639> that<00:08:08.800> they're business with when you know that they're business with when you know that they're a<00:08:09.199> criminal a criminal a criminal i<00:08:10.840> mean<00:08:12.319> it's<00:08:12.560> axiomatic<00:08:13.440> that<00:08:13.599> they're<00:08:13.840> dodgy i mean it's axiomatic that they're dodgy i mean it's axiomatic that they're dodgy and<00:08:14.319> they're<00:08:14.479> going<00:08:14.639> to<00:08:14.720> want<00:08:14.960> to<00:08:15.039> try<00:08:15.280> and<00:08:15.440> rip and they're going to want to try and rip and they're going to want to try and rip you<00:08:15.919> off you off you off so so so the<00:08:18.160> family<00:08:18.639> as<00:08:18.720> the<00:08:18.879> inner<00:08:19.120> core<00:08:19.440> of<00:08:19.520> carter the family as the inner core of carter the family as the inner core of carter planet<00:08:20.319> was<00:08:20.560> known<00:08:20.879> came<00:08:21.120> up<00:08:21.199> with<00:08:21.360> this planet was known came up with this planet was known came up with this brilliant<00:08:22.000> idea<00:08:22.720> called<00:08:22.960> the<00:08:23.199> escrow<00:08:23.759> system brilliant idea called the escrow system brilliant idea called the escrow system they<00:08:24.960> appointed<00:08:25.840> an<00:08:26.319> officer they appointed an officer they appointed an officer who<00:08:27.840> would<00:08:28.080> mediate<00:08:28.639> between<00:08:28.960> the<00:08:29.199> vendor<00:08:30.080> and who would mediate between the vendor and who would mediate between the vendor and the<00:08:30.560> purchaser<00:08:31.120> the<00:08:31.280> vendor<00:08:31.599> say<00:08:31.759> of<00:08:31.919> stolen the purchaser the vendor say of stolen the purchaser the vendor say of stolen credit<00:08:32.560> card<00:08:32.880> details<00:08:33.760> uh<00:08:34.159> the<00:08:34.240> purchase credit card details uh the purchase credit card details uh the purchase don't<00:08:34.880> wanted<00:08:35.200> to<00:08:35.360> get<00:08:35.519> hold<00:08:35.760> of<00:08:35.839> them<00:08:36.000> the don't wanted to get hold of them the don't wanted to get hold of them the purchaser<00:08:36.640> would<00:08:37.039> send<00:08:37.919> the<00:08:38.080> administrative purchaser would send the administrative purchaser would send the administrative officer<00:08:39.839> um<00:08:40.320> some<00:08:40.719> dollars<00:08:41.120> digitally<00:08:41.919> and officer um some dollars digitally and officer um some dollars digitally and the<00:08:42.640> vendor<00:08:43.039> would<00:08:43.279> sell<00:08:43.440> the<00:08:43.599> stolen<00:08:44.000> credit the vendor would sell the stolen credit the vendor would sell the stolen credit card<00:08:44.480> details<00:08:45.120> and<00:08:45.279> the<00:08:45.680> officer<00:08:46.080> would<00:08:46.240> then card details and the officer would then card details and the officer would then verify<00:08:47.200> if<00:08:47.440> the<00:08:47.600> credit<00:08:47.920> card<00:08:48.640> uh<00:08:48.880> the<00:08:49.040> stolen verify if the credit card uh the stolen verify if the credit card uh the stolen credit<00:08:49.680> cards<00:08:50.000> worked<00:08:50.720> and<00:08:50.880> if<00:08:51.040> they<00:08:51.200> did<00:08:51.519> he credit cards worked and if they did he credit cards worked and if they did he then<00:08:52.000> passed<00:08:52.399> on<00:08:52.880> the<00:08:53.040> money<00:08:53.360> to<00:08:53.519> the<00:08:53.680> vendor then passed on the money to the vendor then passed on the money to the vendor and<00:08:54.399> the<00:08:54.560> stolen<00:08:54.880> credit<00:08:55.120> card<00:08:55.360> details<00:08:56.000> to and the stolen credit card details to and the stolen credit card details to the<00:08:56.320> purchaser<00:08:57.440> and<00:08:57.920> it<00:08:58.160> was<00:08:58.880> this<00:08:59.680> which the purchaser and it was this which the purchaser and it was this which completely<00:09:00.920> revolutionized<00:09:02.399> cybercrime<00:09:03.600> on completely revolutionized cybercrime on completely revolutionized cybercrime on the<00:09:03.920> web<00:09:04.399> and<00:09:04.720> uh<00:09:04.959> after<00:09:05.279> that<00:09:05.519> it<00:09:05.760> just<00:09:06.000> went the web and uh after that it just went the web and uh after that it just went while<00:09:06.560> we<00:09:06.720> had<00:09:07.279> a<00:09:07.519> champagne<00:09:08.240> decade<00:09:09.120> for while we had a champagne decade for while we had a champagne decade for people<00:09:09.680> we<00:09:09.839> know<00:09:10.480> we<00:09:10.640> know<00:09:10.880> as<00:09:11.040> carters<00:09:11.519> now<00:09:11.680> i people we know we know as carters now i people we know we know as carters now i spoke<00:09:12.000> to<00:09:12.080> one<00:09:12.240> of<00:09:12.320> these<00:09:12.640> carters<00:09:13.360> who<00:09:13.600> will spoke to one of these carters who will spoke to one of these carters who will call<00:09:14.080> red<00:09:14.320> brigade<00:09:15.040> although<00:09:15.440> that<00:09:15.600> was<00:09:15.760> not call red brigade although that was not call red brigade although that was not even<00:09:16.560> his<00:09:16.720> proper<00:09:16.959> nickname<00:09:17.360> but<00:09:17.519> i<00:09:17.600> promised even his proper nickname but i promised even his proper nickname but i promised i<00:09:18.000> wouldn't<00:09:18.240> reveal<00:09:18.880> who<00:09:19.120> he<00:09:19.279> was<00:09:19.680> and<00:09:19.839> he i wouldn't reveal who he was and he i wouldn't reveal who he was and he explained<00:09:20.399> to<00:09:20.560> me<00:09:20.800> how<00:09:21.040> in<00:09:21.279> 2003<00:09:22.080> and<00:09:22.240> 2004<00:09:22.959> he explained to me how in 2003 and 2004 he explained to me how in 2003 and 2004 he would<00:09:23.200> go<00:09:23.440> on<00:09:23.600> sprees would go on sprees would go on sprees in<00:09:25.200> new<00:09:25.360> york<00:09:25.839> taking<00:09:26.240> out<00:09:26.800> 10<00:09:27.120> 000<00:09:27.839> from<00:09:28.000> an in new york taking out 10 000 from an in new york taking out 10 000 from an atm<00:09:28.640> here<00:09:28.959> 30<00:09:29.440> 000<00:09:29.760> from<00:09:30.000> an<00:09:30.399> uh<00:09:30.720> atm<00:09:31.279> there atm here 30 000 from an uh atm there atm here 30 000 from an uh atm there using<00:09:32.240> cloned<00:09:33.040> credit<00:09:33.360> cards<00:09:34.240> he<00:09:34.560> was<00:09:34.959> making using cloned credit cards he was making using cloned credit cards he was making on<00:09:36.080> average<00:09:36.640> a<00:09:36.800> week on average a week on average a week 150<00:09:39.680> 000 150 000 150 000 tax-free<00:09:41.680> of<00:09:41.760> course tax-free of course tax-free of course and<00:09:43.120> uh and uh and uh he<00:09:44.880> said<00:09:45.120> that he said that he said that he<00:09:46.160> had<00:09:46.480> so<00:09:46.720> much<00:09:46.959> money<00:09:47.360> stashed<00:09:47.920> in<00:09:48.080> his he had so much money stashed in his he had so much money stashed in his upper<00:09:48.640> east<00:09:48.880> side<00:09:49.200> apartment<00:09:49.760> at<00:09:49.920> one<00:09:50.160> point upper east side apartment at one point upper east side apartment at one point that<00:09:50.560> he<00:09:50.720> just<00:09:50.880> didn't<00:09:51.040> know<00:09:51.200> what<00:09:51.440> to<00:09:51.519> do<00:09:51.600> with that he just didn't know what to do with that he just didn't know what to do with it<00:09:51.920> and<00:09:52.080> actually<00:09:52.399> fell<00:09:52.640> into<00:09:52.880> a<00:09:52.959> depression it and actually fell into a depression it and actually fell into a depression but<00:09:53.920> that's<00:09:54.240> a<00:09:54.320> slightly<00:09:54.800> different<00:09:55.200> story but that's a slightly different story but that's a slightly different story which<00:09:57.200> i<00:09:57.360> won't<00:09:57.519> go<00:09:57.760> into<00:09:58.000> now<00:09:58.160> now<00:09:58.399> the which i won't go into now now the which i won't go into now now the interesting<00:09:59.040> thing<00:09:59.279> about<00:09:59.600> red<00:09:59.760> brigade<00:10:00.240> is interesting thing about red brigade is interesting thing about red brigade is is<00:10:00.560> that<00:10:00.800> he<00:10:00.959> wasn't<00:10:01.519> an<00:10:01.760> advanced<00:10:02.320> hacker<00:10:02.959> he is that he wasn't an advanced hacker he is that he wasn't an advanced hacker he sort<00:10:03.600> of<00:10:03.760> understood<00:10:04.240> the<00:10:04.480> technology<00:10:05.120> and<00:10:05.279> he sort of understood the technology and he sort of understood the technology and he realized<00:10:05.839> that<00:10:06.000> security<00:10:06.560> was<00:10:06.720> very realized that security was very realized that security was very important<00:10:07.760> if<00:10:08.000> you<00:10:08.080> were<00:10:08.240> going<00:10:08.560> to<00:10:08.720> be important if you were going to be important if you were going to be a<00:10:09.920> carder<00:10:10.320> but<00:10:10.480> he<00:10:10.640> didn't<00:10:10.880> spend<00:10:11.200> his<00:10:11.360> days a carder but he didn't spend his days a carder but he didn't spend his days and<00:10:11.839> nights<00:10:12.320> bent<00:10:12.640> over<00:10:12.880> a<00:10:12.959> computer<00:10:13.519> eating and nights bent over a computer eating and nights bent over a computer eating pizza pizza pizza drinking<00:10:15.600> coke<00:10:15.920> and<00:10:16.000> that<00:10:16.240> sort<00:10:16.399> of<00:10:16.480> thing<00:10:16.880> he drinking coke and that sort of thing he drinking coke and that sort of thing he was<00:10:17.279> out<00:10:17.440> there<00:10:17.600> on<00:10:17.760> the<00:10:17.920> town<00:10:18.160> having<00:10:18.399> a<00:10:18.560> fab was out there on the town having a fab was out there on the town having a fab time<00:10:19.200> in<00:10:19.680> enjoying<00:10:20.160> the<00:10:20.399> high<00:10:20.720> life<00:10:21.360> and<00:10:21.519> this time in enjoying the high life and this time in enjoying the high life and this is<00:10:21.920> because<00:10:22.720> hackers<00:10:23.279> are<00:10:23.600> only<00:10:24.079> one<00:10:24.560> element is because hackers are only one element is because hackers are only one element in<00:10:25.839> a<00:10:26.079> cyber<00:10:26.880> criminal<00:10:27.760> enterprise<00:10:28.959> and<00:10:29.680> often in a cyber criminal enterprise and often in a cyber criminal enterprise and often they're<00:10:30.399> the<00:10:30.560> most they're the most they're the most vulnerable<00:10:32.079> element<00:10:32.720> of<00:10:33.120> all<00:10:33.839> and vulnerable element of all and vulnerable element of all and i<00:10:35.360> want<00:10:35.519> to<00:10:35.760> explain<00:10:36.160> this<00:10:36.399> to<00:10:36.560> you<00:10:36.720> by i want to explain this to you by i want to explain this to you by introducing<00:10:37.519> you<00:10:37.680> to<00:10:37.920> six<00:10:38.320> characters<00:10:39.360> who<00:10:39.600> i introducing you to six characters who i introducing you to six characters who i met<00:10:40.480> while<00:10:40.720> i<00:10:40.880> was<00:10:41.200> uh<00:10:41.600> doing<00:10:41.920> this<00:10:42.640> research met while i was uh doing this research met while i was uh doing this research dimitri<00:10:44.320> golob<00:10:45.040> aka<00:10:45.680> script<00:10:46.640> born<00:10:46.959> in<00:10:47.120> odessa dimitri golob aka script born in odessa dimitri golob aka script born in odessa ukraine<00:10:48.480> in<00:10:48.920> 1982.<00:10:50.000> now<00:10:50.240> he<00:10:50.399> developed<00:10:50.880> his ukraine in 1982. now he developed his ukraine in 1982. now he developed his social<00:10:51.519> and<00:10:51.600> moral<00:10:52.000> compass<00:10:52.959> and<00:10:53.120> the<00:10:53.279> black social and moral compass and the black social and moral compass and the black sea<00:10:53.839> port<00:10:54.160> during<00:10:54.480> the<00:10:54.560> 1990s sea port during the 1990s sea port during the 1990s this<00:10:56.399> was<00:10:56.720> a<00:10:56.959> sink<00:10:57.279> or<00:10:57.600> swim<00:10:58.399> environment this was a sink or swim environment this was a sink or swim environment where<00:10:59.279> involvement where involvement where involvement in<00:11:00.720> criminal<00:11:01.120> or<00:11:01.279> corrupt<00:11:01.760> activities<00:11:02.880> was in criminal or corrupt activities was in criminal or corrupt activities was entirely<00:11:03.839> necessary<00:11:04.720> if<00:11:04.880> you<00:11:05.040> wanted<00:11:05.680> to entirely necessary if you wanted to entirely necessary if you wanted to survive<00:11:06.800> as<00:11:06.959> an<00:11:07.200> accomplished<00:11:07.920> computer<00:11:08.560> user survive as an accomplished computer user survive as an accomplished computer user what<00:11:09.519> dimitri<00:11:10.079> did<00:11:10.320> was<00:11:10.560> to<00:11:10.800> transfer<00:11:11.680> the what dimitri did was to transfer the what dimitri did was to transfer the gangster<00:11:12.399> capitalism<00:11:13.120> of<00:11:13.200> his<00:11:13.440> hometown gangster capitalism of his hometown gangster capitalism of his hometown on<00:11:14.959> to<00:11:15.120> the<00:11:15.360> world<00:11:15.760> wide<00:11:16.320> web<00:11:16.959> and<00:11:17.040> he<00:11:17.200> did<00:11:17.440> a on to the world wide web and he did a on to the world wide web and he did a great<00:11:17.839> job<00:11:18.079> in<00:11:18.240> it<00:11:18.399> you<00:11:18.560> have<00:11:18.640> to<00:11:18.800> understand great job in it you have to understand great job in it you have to understand over<00:11:20.079> that<00:11:20.320> from<00:11:20.480> his<00:11:20.720> ninth<00:11:21.120> birthday over that from his ninth birthday over that from his ninth birthday the<00:11:22.640> only<00:11:23.040> environment<00:11:23.920> that<00:11:24.160> he<00:11:24.399> knew<00:11:25.040> was the only environment that he knew was the only environment that he knew was gangsterism<00:11:26.320> he<00:11:26.560> knew<00:11:27.040> no<00:11:27.279> other<00:11:27.600> way<00:11:28.000> of gangsterism he knew no other way of gangsterism he knew no other way of making<00:11:28.480> a<00:11:28.640> living making a living making a living and<00:11:29.680> making<00:11:30.160> money<00:11:30.880> then<00:11:31.120> we<00:11:31.200> have<00:11:31.440> renuka and making money then we have renuka and making money then we have renuka subramaniam<00:11:32.959> aka<00:11:33.600> jilzy<00:11:34.480> founder<00:11:34.959> of<00:11:35.200> dark subramaniam aka jilzy founder of dark subramaniam aka jilzy founder of dark market<00:11:36.079> born<00:11:36.399> in<00:11:36.560> colombo<00:11:37.200> sri<00:11:37.519> lanka<00:11:38.240> as<00:11:38.399> an market born in colombo sri lanka as an market born in colombo sri lanka as an eight-year-old<00:11:39.360> he<00:11:39.519> and<00:11:39.680> his<00:11:39.920> parents<00:11:40.480> fled eight-year-old he and his parents fled eight-year-old he and his parents fled the<00:11:40.959> sri<00:11:41.200> lankan<00:11:41.680> capital<00:11:42.560> because<00:11:43.360> singali's the sri lankan capital because singali's the sri lankan capital because singali's mobs<00:11:44.399> were<00:11:44.640> roaming<00:11:44.959> the<00:11:45.120> city<00:11:45.760> looking<00:11:46.079> for mobs were roaming the city looking for mobs were roaming the city looking for tamils<00:11:46.720> like<00:11:47.040> renu<00:11:47.600> to<00:11:47.760> murder<00:11:48.320> at<00:11:48.560> 11<00:11:48.959> he<00:11:49.120> was tamils like renu to murder at 11 he was tamils like renu to murder at 11 he was interrogated<00:11:50.000> by<00:11:50.160> the<00:11:50.240> sri<00:11:50.480> lankan<00:11:50.800> military interrogated by the sri lankan military interrogated by the sri lankan military accused<00:11:51.680> of<00:11:51.760> being<00:11:52.000> a<00:11:52.079> terrorist<00:11:52.880> and<00:11:53.120> his accused of being a terrorist and his accused of being a terrorist and his parents<00:11:53.839> sent<00:11:54.079> him parents sent him parents sent him on<00:11:55.279> his<00:11:55.519> own<00:11:56.079> to<00:11:56.320> britain<00:11:56.959> as<00:11:57.200> a<00:11:57.279> refugee on his own to britain as a refugee on his own to britain as a refugee seeking<00:11:58.880> political<00:11:59.440> asylum<00:12:00.320> at<00:12:00.560> 13<00:12:01.519> with<00:12:01.760> only seeking political asylum at 13 with only seeking political asylum at 13 with only little<00:12:02.880> english<00:12:03.440> and<00:12:03.600> being<00:12:03.839> bullied<00:12:04.240> at little english and being bullied at little english and being bullied at school<00:12:05.120> he<00:12:05.360> escaped<00:12:05.920> into<00:12:06.160> a<00:12:06.320> world<00:12:06.639> of school he escaped into a world of school he escaped into a world of computers<00:12:07.519> where<00:12:07.760> he<00:12:07.920> showed<00:12:08.320> great computers where he showed great computers where he showed great technical<00:12:09.200> ability<00:12:10.079> but<00:12:10.320> he<00:12:10.480> was<00:12:10.720> soon<00:12:11.040> being technical ability but he was soon being technical ability but he was soon being seduced<00:12:12.399> by<00:12:12.639> people<00:12:13.360> uh<00:12:13.760> on<00:12:13.920> the<00:12:14.079> internet<00:12:14.639> he seduced by people uh on the internet he seduced by people uh on the internet he was<00:12:14.880> convicted<00:12:15.440> of<00:12:15.920> mortgage<00:12:16.399> and<00:12:16.480> credit was convicted of mortgage and credit was convicted of mortgage and credit card<00:12:17.040> fraud<00:12:17.440> and<00:12:17.600> he<00:12:17.680> will<00:12:17.839> be<00:12:18.000> released<00:12:18.399> from card fraud and he will be released from card fraud and he will be released from wormwood<00:12:19.279> scrubs<00:12:19.680> jail<00:12:20.000> in<00:12:20.079> london<00:12:20.720> in<00:12:21.200> 2012. wormwood scrubs jail in london in 2012. wormwood scrubs jail in london in 2012. matrix<00:12:23.600> zero<00:12:24.000> zero<00:12:24.399> one<00:12:24.959> matrix matrix zero zero one matrix matrix zero zero one matrix who<00:12:27.200> was<00:12:27.440> an<00:12:27.600> administrator<00:12:28.399> of<00:12:28.480> dark<00:12:28.800> market who was an administrator of dark market who was an administrator of dark market born<00:12:29.920> in<00:12:30.079> southern<00:12:30.480> germany<00:12:30.880> to<00:12:31.120> a<00:12:31.200> stable<00:12:31.600> and born in southern germany to a stable and born in southern germany to a stable and well<00:12:31.920> respected<00:12:32.560> middle<00:12:32.880> class<00:12:33.279> family<00:12:34.079> his well respected middle class family his well respected middle class family his obsession<00:12:34.880> with<00:12:35.200> gaming<00:12:35.920> as<00:12:36.160> a<00:12:36.240> teenager<00:12:37.120> led obsession with gaming as a teenager led obsession with gaming as a teenager led him<00:12:37.519> to<00:12:37.760> hacking<00:12:38.160> and<00:12:38.320> he<00:12:38.480> was<00:12:38.639> soon him to hacking and he was soon him to hacking and he was soon controlling<00:12:40.000> huge<00:12:40.480> servers<00:12:41.279> around<00:12:41.600> the controlling huge servers around the controlling huge servers around the world<00:12:42.399> where<00:12:42.560> he<00:12:42.800> stored<00:12:43.600> his<00:12:43.920> games<00:12:44.639> that<00:12:44.800> he world where he stored his games that he world where he stored his games that he had<00:12:45.120> cracked<00:12:45.600> and<00:12:45.760> pirated<00:12:46.800> his<00:12:47.040> slide<00:12:47.680> into had cracked and pirated his slide into had cracked and pirated his slide into criminality<00:12:49.040> was<00:12:49.519> incremental<00:12:50.639> and<00:12:50.720> when<00:12:50.880> he criminality was incremental and when he criminality was incremental and when he finally<00:12:51.440> woke<00:12:51.760> up<00:12:52.000> to<00:12:52.399> his<00:12:52.639> situation<00:12:53.680> and finally woke up to his situation and finally woke up to his situation and understood<00:12:54.320> the<00:12:54.480> implications<00:12:55.440> he<00:12:55.600> was understood the implications he was understood the implications he was already<00:12:56.320> in already in already in too<00:12:57.360> deep too deep too deep max<00:12:58.480> vision<00:12:59.040> aka<00:12:59.680> iceman<00:13:00.560> mastermind<00:13:01.600> of max vision aka iceman mastermind of max vision aka iceman mastermind of carder's<00:13:02.320> market<00:13:02.880> born<00:13:03.120> in<00:13:03.279> meridian<00:13:03.920> idaho carder's market born in meridian idaho carder's market born in meridian idaho max<00:13:05.360> vision<00:13:06.000> was<00:13:06.240> one<00:13:06.399> of<00:13:06.560> the<00:13:06.720> best max vision was one of the best max vision was one of the best penetration<00:13:08.160> testers<00:13:08.959> working<00:13:09.360> out<00:13:09.519> of<00:13:09.600> santa penetration testers working out of santa penetration testers working out of santa clara<00:13:10.399> california clara california clara california in<00:13:11.839> the<00:13:12.000> late<00:13:12.240> 90s<00:13:12.720> for<00:13:13.040> private<00:13:13.440> companies in the late 90s for private companies in the late 90s for private companies and<00:13:14.240> voluntarily and voluntarily and voluntarily for<00:13:15.839> the<00:13:16.320> fbi<00:13:16.959> now<00:13:17.120> in<00:13:17.200> the<00:13:17.279> late<00:13:17.519> 1990s<00:13:18.399> he for the fbi now in the late 1990s he for the fbi now in the late 1990s he discovered<00:13:19.120> a<00:13:19.200> vulnerability<00:13:20.320> on<00:13:20.639> all<00:13:21.360> u.s discovered a vulnerability on all u.s discovered a vulnerability on all u.s government<00:13:22.959> networks<00:13:24.160> and<00:13:24.320> he<00:13:24.560> went<00:13:24.880> in<00:13:25.120> and government networks and he went in and government networks and he went in and patched<00:13:25.760> it<00:13:25.920> up<00:13:26.079> because<00:13:26.399> this<00:13:26.720> included patched it up because this included patched it up because this included nuclear<00:13:27.680> research<00:13:28.160> facilities<00:13:29.279> sparing<00:13:29.839> the nuclear research facilities sparing the nuclear research facilities sparing the american<00:13:30.639> government<00:13:31.519> a<00:13:31.839> huge<00:13:32.560> security american government a huge security american government a huge security embarrassment<00:13:33.920> but<00:13:34.079> also<00:13:34.639> because<00:13:34.959> he<00:13:35.040> was<00:13:35.200> an embarrassment but also because he was an embarrassment but also because he was an investor<00:13:35.680> at<00:13:35.839> hacker<00:13:36.399> he<00:13:36.560> left<00:13:36.800> a<00:13:36.880> tiny investor at hacker he left a tiny investor at hacker he left a tiny digital digital digital wormhole<00:13:38.880> through<00:13:39.120> which<00:13:39.360> he<00:13:39.600> alone<00:13:40.000> could wormhole through which he alone could wormhole through which he alone could crawl<00:13:40.959> but<00:13:41.120> this<00:13:41.279> was<00:13:41.600> spotted<00:13:42.000> by<00:13:42.160> an<00:13:42.320> eagle crawl but this was spotted by an eagle crawl but this was spotted by an eagle eye<00:13:42.800> investigator<00:13:43.760> and<00:13:43.920> he<00:13:44.079> was<00:13:44.240> convicted<00:13:45.279> at eye investigator and he was convicted at eye investigator and he was convicted at his<00:13:45.600> open<00:13:46.000> prison<00:13:46.320> he<00:13:46.560> came<00:13:46.880> under<00:13:47.360> the his open prison he came under the his open prison he came under the influence<00:13:48.160> of<00:13:48.480> financial<00:13:49.120> fraudsters<00:13:50.160> and influence of financial fraudsters and influence of financial fraudsters and those<00:13:50.560> financial<00:13:51.120> fraudsters<00:13:51.600> persuaded<00:13:52.160> him those financial fraudsters persuaded him those financial fraudsters persuaded him to<00:13:52.560> work<00:13:52.880> for<00:13:53.040> them<00:13:53.600> on<00:13:53.839> his<00:13:54.399> uh<00:13:54.800> release<00:13:55.680> and to work for them on his uh release and to work for them on his uh release and this<00:13:56.480> man<00:13:56.880> with<00:13:57.199> a<00:13:57.360> planetary<00:13:58.079> sized<00:13:58.480> brain<00:13:59.199> is this man with a planetary sized brain is this man with a planetary sized brain is now<00:13:59.519> serving<00:13:59.920> a<00:14:00.079> 13-year<00:14:00.800> sentence<00:14:01.680> in now serving a 13-year sentence in now serving a 13-year sentence in california<00:14:03.040> adewale<00:14:03.760> taiwa<00:14:04.320> aka<00:14:04.959> freddie california adewale taiwa aka freddie california adewale taiwa aka freddie bibi<00:14:05.839> master<00:14:06.480> bank<00:14:06.959> account<00:14:07.360> cracker<00:14:07.920> from bibi master bank account cracker from bibi master bank account cracker from abuja<00:14:08.959> in<00:14:09.199> nigeria<00:14:10.320> he<00:14:10.639> set<00:14:10.880> up<00:14:11.279> his<00:14:11.760> presently abuja in nigeria he set up his presently abuja in nigeria he set up his presently entitled<00:14:13.120> news<00:14:13.440> group<00:14:13.920> bank<00:14:14.160> frauds<00:14:14.639> at entitled news group bank frauds at entitled news group bank frauds at dot<00:14:15.519> co<00:14:15.760> dot<00:14:16.000> uk



before<00:14:19.760> arriving<00:14:20.399> in<00:14:20.560> britain<00:14:21.040> in<00:14:21.639> 2005<00:14:22.720> to
before arriving in britain in 2005 to before arriving in britain in 2005 to take<00:14:23.120> a<00:14:23.279> masters<00:14:23.760> in<00:14:23.920> chemical<00:14:24.320> engineering take a masters in chemical engineering take a masters in chemical engineering at<00:14:24.959> manchester<00:14:25.440> university<00:14:26.399> he<00:14:26.639> impressed<00:14:27.440> in at manchester university he impressed in at manchester university he impressed in the<00:14:27.760> private<00:14:28.320> sector<00:14:29.199> developing<00:14:30.160> chemical the private sector developing chemical the private sector developing chemical applications<00:14:31.440> for<00:14:31.600> the<00:14:32.079> oil<00:14:32.480> industry<00:14:32.880> while applications for the oil industry while applications for the oil industry while simultaneously<00:14:34.000> running<00:14:34.240> a<00:14:34.320> worldwide<00:14:34.880> bank simultaneously running a worldwide bank simultaneously running a worldwide bank and<00:14:35.279> credit<00:14:35.600> card<00:14:35.839> fraud<00:14:36.480> operation<00:14:36.959> that<00:14:37.120> was and credit card fraud operation that was and credit card fraud operation that was worth<00:14:37.519> millions<00:14:38.000> until<00:14:38.320> his<00:14:38.480> arrest<00:14:39.199> in<00:14:39.440> 2008. worth millions until his arrest in 2008. worth millions until his arrest in 2008. and<00:14:41.680> then<00:14:42.000> finally<00:14:42.480> chateau<00:14:43.040> eviapan<00:14:43.760> aka and then finally chateau eviapan aka and then finally chateau eviapan aka chao<00:14:45.199> one<00:14:45.360> of<00:14:45.440> the<00:14:45.519> most<00:14:45.839> remarkable<00:14:46.480> hackers chao one of the most remarkable hackers chao one of the most remarkable hackers ever<00:14:47.199> from<00:14:47.440> ankara<00:14:48.399> in<00:14:48.639> turkey<00:14:49.360> he<00:14:49.600> combines ever from ankara in turkey he combines ever from ankara in turkey he combines the<00:14:50.480> tremendous<00:14:51.440> skills<00:14:52.079> of<00:14:52.240> a<00:14:52.399> geek<00:14:53.120> with<00:14:53.680> the the tremendous skills of a geek with the the tremendous skills of a geek with the suave<00:14:54.959> social<00:14:55.440> engineering<00:14:56.160> skills<00:14:57.120> of<00:14:57.600> the suave social engineering skills of the suave social engineering skills of the master<00:14:58.800> uh<00:14:59.040> criminal<00:14:59.360> one<00:14:59.600> of<00:14:59.680> the<00:14:59.760> smartest master uh criminal one of the smartest master uh criminal one of the smartest people<00:15:01.040> uh<00:15:01.279> i've<00:15:01.600> ever<00:15:01.839> met<00:15:02.399> he<00:15:02.639> also<00:15:02.959> had<00:15:03.120> the people uh i've ever met he also had the people uh i've ever met he also had the most<00:15:03.600> effective<00:15:04.240> virtual<00:15:04.720> private<00:15:05.199> network most effective virtual private network most effective virtual private network security<00:15:06.320> arrangement<00:15:07.120> the<00:15:07.279> police<00:15:07.680> have security arrangement the police have security arrangement the police have ever<00:15:08.079> encountered<00:15:09.040> amongst<00:15:09.760> global<00:15:10.240> cyber ever encountered amongst global cyber ever encountered amongst global cyber criminals<00:15:11.040> now<00:15:11.519> the<00:15:11.760> important<00:15:12.320> thing<00:15:13.040> about criminals now the important thing about criminals now the important thing about all<00:15:13.760> of<00:15:13.920> these<00:15:14.240> people<00:15:14.959> is<00:15:15.120> they<00:15:15.360> share all of these people is they share all of these people is they share certain<00:15:16.079> characteristics<00:15:16.959> despite<00:15:17.440> the<00:15:17.519> fact certain characteristics despite the fact certain characteristics despite the fact that<00:15:17.839> they<00:15:18.000> come<00:15:18.240> from<00:15:18.480> very<00:15:18.800> different that they come from very different that they come from very different environments<00:15:20.880> they<00:15:21.120> are<00:15:21.440> all<00:15:22.240> people<00:15:22.560> who environments they are all people who environments they are all people who learnt<00:15:22.959> their<00:15:23.120> hacking<00:15:23.519> skills<00:15:24.000> in<00:15:24.160> their learnt their hacking skills in their learnt their hacking skills in their early<00:15:24.880> to<00:15:25.040> mid<00:15:25.440> teens early to mid teens early to mid teens they<00:15:27.199> are<00:15:27.519> all they are all they are all people<00:15:28.639> who<00:15:28.880> demonstrate<00:15:29.440> advanced<00:15:30.000> ability people who demonstrate advanced ability people who demonstrate advanced ability in<00:15:30.959> maths<00:15:31.600> and<00:15:32.000> the<00:15:32.160> sciences<00:15:33.279> remember<00:15:33.680> when in maths and the sciences remember when in maths and the sciences remember when they<00:15:34.079> develop<00:15:34.560> those<00:15:34.800> hacking<00:15:35.199> skills<00:15:35.920> their they develop those hacking skills their they develop those hacking skills their moral<00:15:36.560> compass<00:15:37.360> had<00:15:37.600> not<00:15:37.920> yet<00:15:38.560> developed<00:15:39.600> and moral compass had not yet developed and moral compass had not yet developed and most<00:15:40.240> of<00:15:40.320> them<00:15:40.480> with<00:15:40.639> the<00:15:40.800> exception<00:15:41.360> of most of them with the exception of most of them with the exception of script<00:15:42.000> and<00:15:42.240> chow<00:15:43.040> well<00:15:43.760> they script and chow well they script and chow well they did<00:15:44.959> not did not did not demonstrate<00:15:46.639> any<00:15:47.199> real<00:15:47.680> social<00:15:48.160> skills<00:15:48.720> in demonstrate any real social skills in demonstrate any real social skills in the<00:15:48.959> outside<00:15:49.519> world<00:15:50.240> only<00:15:51.120> on<00:15:51.519> the<00:15:51.680> web<00:15:52.000> and the outside world only on the web and the outside world only on the web and the<00:15:52.240> other<00:15:52.480> thing<00:15:52.720> is<00:15:52.959> is<00:15:53.440> the<00:15:53.680> high<00:15:54.000> incidence the other thing is is the high incidence the other thing is is the high incidence of<00:15:54.639> hackers<00:15:55.120> like<00:15:55.360> these<00:15:56.000> who<00:15:56.240> have of hackers like these who have of hackers like these who have characteristics<00:15:57.600> which<00:15:57.839> are<00:15:58.000> consistent characteristics which are consistent characteristics which are consistent with<00:15:59.360> asperger's<00:16:00.560> syndrome<00:16:01.360> now<00:16:01.600> i<00:16:01.920> discussed with asperger's syndrome now i discussed with asperger's syndrome now i discussed this<00:16:03.040> with<00:16:03.279> professor<00:16:04.079> simon<00:16:04.399> baron<00:16:04.800> cohen this with professor simon baron cohen this with professor simon baron cohen who's<00:16:05.440> the<00:16:05.519> professor<00:16:05.920> of<00:16:06.079> developmental who's the professor of developmental who's the professor of developmental psychopathology<00:16:08.240> at psychopathology at psychopathology at cambridge<00:16:09.680> and<00:16:09.759> he<00:16:10.000> has<00:16:10.160> done<00:16:10.720> path-breaking cambridge and he has done path-breaking cambridge and he has done path-breaking work<00:16:12.160> on<00:16:12.480> autism<00:16:13.519> and<00:16:13.759> confirmed<00:16:14.639> also<00:16:15.040> for work on autism and confirmed also for work on autism and confirmed also for the<00:16:15.279> authorities<00:16:15.920> here<00:16:16.240> that<00:16:16.480> gary<00:16:16.800> mckinnon the authorities here that gary mckinnon the authorities here that gary mckinnon who<00:16:18.240> was<00:16:18.639> who<00:16:18.880> is<00:16:19.040> wanted<00:16:19.440> by<00:16:19.600> the<00:16:19.680> united who was who is wanted by the united who was who is wanted by the united states<00:16:20.399> for<00:16:20.560> hacking<00:16:20.880> into<00:16:21.120> the<00:16:21.519> to<00:16:21.680> the states for hacking into the to the states for hacking into the to the pentagon<00:16:22.480> suffers<00:16:22.880> from<00:16:23.040> expert<00:16:23.600> asperger's pentagon suffers from expert asperger's pentagon suffers from expert asperger's and<00:16:24.399> the<00:16:24.480> secondary<00:16:25.040> condition<00:16:26.000> of and the secondary condition of and the secondary condition of depression<00:16:27.519> and<00:16:27.759> baron<00:16:28.160> cohen<00:16:28.639> explained depression and baron cohen explained depression and baron cohen explained that<00:16:29.839> certain<00:16:30.560> disabilities<00:16:31.360> can<00:16:31.519> manifest that certain disabilities can manifest that certain disabilities can manifest themselves<00:16:32.800> in<00:16:32.880> the<00:16:33.040> hacking<00:16:33.440> and<00:16:33.600> computing themselves in the hacking and computing themselves in the hacking and computing world<00:16:34.800> as<00:16:35.120> tremendous<00:16:35.759> skills<00:16:36.240> and<00:16:36.320> that<00:16:36.480> we world as tremendous skills and that we world as tremendous skills and that we should<00:16:36.959> not<00:16:37.199> be<00:16:37.440> throwing<00:16:37.839> in<00:16:38.079> jail<00:16:38.800> people should not be throwing in jail people should not be throwing in jail people who<00:16:39.360> have<00:16:39.600> such<00:16:39.920> disabilities<00:16:41.199> and<00:16:41.440> skills who have such disabilities and skills who have such disabilities and skills because<00:16:42.560> they<00:16:42.720> have<00:16:42.880> lost<00:16:43.199> their<00:16:43.440> way because they have lost their way because they have lost their way socially<00:16:44.880> or<00:16:45.199> been<00:16:45.519> duped<00:16:46.480> now<00:16:46.720> i<00:16:46.959> think<00:16:47.279> we're socially or been duped now i think we're socially or been duped now i think we're missing<00:16:48.320> a<00:16:48.399> trick<00:16:48.800> here<00:16:49.360> because<00:16:49.680> i<00:16:49.839> don't missing a trick here because i don't missing a trick here because i don't think<00:16:50.320> people<00:16:50.560> like<00:16:50.800> max<00:16:51.120> vision<00:16:51.759> should<00:16:52.000> be think people like max vision should be think people like max vision should be in<00:16:52.320> jail<00:16:52.639> and<00:16:52.720> let<00:16:52.880> me<00:16:53.040> be<00:16:53.279> blunt<00:16:53.600> about<00:16:53.920> this in jail and let me be blunt about this in jail and let me be blunt about this in<00:16:54.720> china<00:16:55.360> in<00:16:55.519> russia<00:16:56.000> and<00:16:56.160> in<00:16:56.399> loads<00:16:56.639> of<00:16:56.800> other in china in russia and in loads of other in china in russia and in loads of other countries<00:16:57.360> that<00:16:57.600> are<00:16:57.680> developing<00:16:58.560> cyber countries that are developing cyber countries that are developing cyber offensive<00:16:59.600> capabilities<00:17:00.560> this<00:17:00.800> is<00:17:01.040> exactly offensive capabilities this is exactly offensive capabilities this is exactly what<00:17:01.839> they<00:17:02.079> are<00:17:02.160> doing what they are doing what they are doing they<00:17:03.279> are<00:17:03.440> recruiting<00:17:04.079> hackers<00:17:04.799> both<00:17:05.120> before they are recruiting hackers both before they are recruiting hackers both before and<00:17:05.919> after<00:17:06.240> they<00:17:06.480> become<00:17:06.959> involved<00:17:07.360> in and after they become involved in and after they become involved in criminal<00:17:08.160> and<00:17:08.319> industrial<00:17:08.959> espionage criminal and industrial espionage criminal and industrial espionage activities<00:17:10.880> and<00:17:11.120> mobilizing<00:17:11.839> them<00:17:12.400> on<00:17:12.559> behalf activities and mobilizing them on behalf activities and mobilizing them on behalf of<00:17:13.520> the<00:17:13.679> state of the state of the state we<00:17:14.799> need<00:17:15.039> to<00:17:15.199> engage<00:17:16.079> and<00:17:16.319> find<00:17:16.799> ways<00:17:17.600> of we need to engage and find ways of we need to engage and find ways of offering<00:17:18.400> guidance<00:17:19.120> to<00:17:19.280> these<00:17:19.600> young<00:17:19.919> people offering guidance to these young people offering guidance to these young people because<00:17:20.640> they<00:17:20.880> are<00:17:21.039> a<00:17:21.199> remarkable<00:17:21.919> breed<00:17:22.720> and because they are a remarkable breed and because they are a remarkable breed and if<00:17:23.039> we<00:17:23.199> rely<00:17:23.600> as<00:17:23.760> we<00:17:23.919> do<00:17:24.160> at<00:17:24.240> the<00:17:24.319> moment<00:17:24.799> solely if we rely as we do at the moment solely if we rely as we do at the moment solely on<00:17:25.679> the<00:17:25.839> criminal<00:17:26.319> justice<00:17:26.799> system<00:17:27.520> and<00:17:27.679> the on the criminal justice system and the on the criminal justice system and the threat<00:17:28.400> of<00:17:28.640> punitive<00:17:29.280> sentences<00:17:30.400> we<00:17:30.559> will<00:17:30.799> be threat of punitive sentences we will be threat of punitive sentences we will be nurturing<00:17:31.600> a<00:17:31.679> monster<00:17:32.480> we<00:17:32.799> cannot<00:17:33.360> tame nurturing a monster we cannot tame nurturing a monster we cannot tame thank<00:17:34.400> you<00:17:34.559> very<00:17:34.799> much<00:17:34.960> for<00:17:35.120> listening



so<00:17:46.799> um
so um so um so<00:17:48.720> your<00:17:48.960> idea<00:17:49.200> we're<00:17:49.440> spreading<00:17:49.919> is so your idea we're spreading is so your idea we're spreading is higher<00:17:50.880> hackers higher hackers higher hackers how how how how<00:17:54.240> would<00:17:54.480> someone<00:17:54.960> get<00:17:55.120> over<00:17:55.360> the<00:17:55.679> kind<00:17:55.840> of how would someone get over the kind of how would someone get over the kind of fear<00:17:56.480> that<00:17:56.799> the<00:17:56.960> hacker<00:17:57.280> they<00:17:57.440> hire<00:17:57.840> might fear that the hacker they hire might fear that the hacker they hire might preserve<00:17:58.799> that<00:17:58.960> little<00:17:59.440> teensy<00:17:59.840> wormhole preserve that little teensy wormhole preserve that little teensy wormhole i<00:18:01.280> think i think i think to<00:18:02.480> an<00:18:02.640> extent<00:18:03.039> you<00:18:03.200> have<00:18:03.360> to<00:18:03.520> understand<00:18:03.840> that to an extent you have to understand that to an extent you have to understand that it's<00:18:04.160> axiomatic<00:18:04.880> among<00:18:05.520> hackers<00:18:06.080> that<00:18:06.240> they it's axiomatic among hackers that they it's axiomatic among hackers that they do<00:18:06.720> that<00:18:07.520> they<00:18:07.919> are do that they are do that they are you<00:18:08.880> know<00:18:09.039> they're<00:18:09.200> just<00:18:09.440> relentless<00:18:10.080> and you know they're just relentless and you know they're just relentless and obsessive<00:18:11.039> about<00:18:11.440> what<00:18:11.679> they<00:18:12.000> do obsessive about what they do obsessive about what they do but<00:18:13.120> all<00:18:13.360> of<00:18:13.520> the<00:18:13.679> people<00:18:14.000> who<00:18:14.160> i've<00:18:14.400> spoken<00:18:14.720> to but all of the people who i've spoken to but all of the people who i've spoken to who've<00:18:15.120> fallen<00:18:15.520> foul<00:18:15.840> of<00:18:16.000> the<00:18:16.160> law<00:18:16.880> they<00:18:17.039> have who've fallen foul of the law they have who've fallen foul of the law they have all<00:18:17.520> said<00:18:18.000> please<00:18:18.480> please<00:18:18.960> give<00:18:19.200> us<00:18:19.360> a<00:18:19.520> chance all said please please give us a chance all said please please give us a chance to<00:18:20.480> work<00:18:20.799> in<00:18:20.880> the<00:18:21.039> legitimate<00:18:21.760> industry<00:18:22.480> we to work in the legitimate industry we to work in the legitimate industry we just<00:18:22.880> never<00:18:23.280> knew<00:18:23.600> how<00:18:23.840> to<00:18:24.000> get<00:18:24.240> there<00:18:24.480> what<00:18:24.720> we just never knew how to get there what we just never knew how to get there what we were<00:18:25.120> doing<00:18:25.760> we<00:18:26.000> want<00:18:26.320> to<00:18:26.480> work<00:18:26.880> with<00:18:27.120> you<00:18:28.240> okay were doing we want to work with you okay were doing we want to work with you okay well<00:18:28.720> that<00:18:28.880> makes<00:18:29.120> sense<00:18:29.679> thanks<00:18:29.919> a<00:18:30.000> lot

Misha Glenny, coder, hacker, cybersecurity, TED, TED-Ed, TED, Ed, TEDEducation

Hide picture