Hire the hackers! - Misha Glenny
[Music]
now<00:00:15.759> this<00:00:16.000> is<00:00:16.160> a<00:00:16.240> very<00:00:16.960> uh<00:00:17.359> unted<00:00:17.920> like<00:00:18.240> thing
now this is a very uh unted like thing
now this is a very uh unted like thing
to<00:00:18.720> do<00:00:19.039> but<00:00:19.520> let's<00:00:20.160> kick<00:00:20.400> off<00:00:20.640> the<00:00:20.880> afternoon
to do but let's kick off the afternoon
to do but let's kick off the afternoon
with<00:00:22.320> a<00:00:22.560> message<00:00:23.119> from<00:00:23.760> a<00:00:24.240> mystery<00:00:25.039> sponsor
with a message from a mystery sponsor
with a message from a mystery sponsor
dear<00:00:26.720> fox<00:00:27.199> news
dear fox news
dear fox news
it<00:00:29.199> has<00:00:29.359> come<00:00:29.519> to<00:00:29.760> our<00:00:30.000> unfortunate<00:00:30.720> attention
it has come to our unfortunate attention
it has come to our unfortunate attention
that<00:00:31.760> both<00:00:32.079> the<00:00:32.239> name<00:00:32.640> and<00:00:32.800> nature<00:00:33.120> of
that both the name and nature of
that both the name and nature of
anonymous<00:00:34.160> has<00:00:34.320> been<00:00:34.559> ravaged
anonymous has been ravaged
anonymous has been ravaged
we<00:00:36.239> are<00:00:36.399> everyone<00:00:36.960> and<00:00:37.120> we<00:00:37.360> are<00:00:37.520> no<00:00:37.680> one
we are everyone and we are no one
we are everyone and we are no one
we<00:00:38.879> are<00:00:39.040> anonymous<00:00:40.160> we<00:00:40.320> are<00:00:40.559> legion<00:00:41.440> we<00:00:41.600> do<00:00:41.760> not
we are anonymous we are legion we do not
we are anonymous we are legion we do not
forgive<00:00:42.640> we<00:00:42.800> do<00:00:42.960> not<00:00:43.200> forget
forgive we do not forget
forgive we do not forget
we<00:00:45.200> are<00:00:45.360> the<00:00:45.600> face<00:00:46.320> of<00:00:46.559> chaos
anonymous<00:00:50.800> ladies<00:00:51.200> and<00:00:51.360> gentlemen
anonymous ladies and gentlemen
anonymous ladies and gentlemen
a<00:00:52.800> sophisticated<00:00:53.760> group<00:00:54.079> of<00:00:54.239> politically
a sophisticated group of politically
a sophisticated group of politically
motivated<00:00:55.760> hackers<00:00:56.640> who<00:00:56.800> have<00:00:57.039> emerged<00:00:57.680> in
motivated hackers who have emerged in
motivated hackers who have emerged in
2011
2011
2011
and<00:01:00.320> they're<00:01:00.719> pretty<00:01:01.120> scary<00:01:01.840> you<00:01:02.079> never<00:01:02.320> know
and they're pretty scary you never know
and they're pretty scary you never know
when<00:01:03.120> they're<00:01:03.359> going<00:01:03.680> to<00:01:03.840> attack<00:01:04.320> next<00:01:04.960> who<00:01:05.680> or
when they're going to attack next who or
when they're going to attack next who or
what<00:01:06.159> the<00:01:06.320> consequences<00:01:07.200> will<00:01:07.439> be
what the consequences will be
what the consequences will be
but<00:01:08.640> interestingly
but interestingly
but interestingly
they<00:01:10.240> have<00:01:10.880> a<00:01:11.040> sense<00:01:11.360> of<00:01:11.520> humor
they have a sense of humor
they have a sense of humor
these<00:01:13.119> guys<00:01:13.600> hacked<00:01:14.000> into<00:01:14.560> fox<00:01:14.960> news's
these guys hacked into fox news's
these guys hacked into fox news's
twitter<00:01:15.920> account<00:01:16.479> to<00:01:16.640> announce<00:01:17.520> president
twitter account to announce president
twitter account to announce president
obama's<00:01:19.040> assassination
obama's assassination
obama's assassination
now<00:01:20.960> you<00:01:21.119> can<00:01:21.360> imagine<00:01:21.759> the<00:01:21.920> panic<00:01:22.240> that<00:01:22.400> would
now you can imagine the panic that would
now you can imagine the panic that would
have<00:01:22.720> generated<00:01:23.680> in<00:01:23.920> the<00:01:24.240> newsroom<00:01:25.200> at<00:01:25.439> fox
have generated in the newsroom at fox
have generated in the newsroom at fox
what<00:01:26.320> do<00:01:26.479> we<00:01:26.560> do<00:01:26.799> now<00:01:27.520> put<00:01:27.680> on<00:01:27.759> a<00:01:27.920> black<00:01:28.159> armband
what do we do now put on a black armband
what do we do now put on a black armband
or<00:01:29.200> crack<00:01:29.520> open<00:01:29.759> the<00:01:29.920> champagne
or crack open the champagne
or crack open the champagne
and<00:01:31.600> of<00:01:31.759> course
and of course
and of course
who<00:01:33.840> could
who could
who could
who<00:01:34.960> could<00:01:35.200> escape<00:01:35.759> the<00:01:36.000> irony<00:01:36.560> of<00:01:36.720> a<00:01:36.799> member
who could escape the irony of a member
who could escape the irony of a member
of<00:01:37.680> rupert<00:01:38.079> murdoch's<00:01:38.640> news<00:01:38.960> corp<00:01:39.680> being<00:01:40.079> a
of rupert murdoch's news corp being a
of rupert murdoch's news corp being a
victim<00:01:40.720> of<00:01:40.880> hacking<00:01:41.360> for<00:01:41.520> a<00:01:41.680> change
victim of hacking for a change
victim of hacking for a change
sometimes
sometimes<00:01:49.280> you<00:01:49.439> know
sometimes you know
sometimes you know
you<00:01:50.640> turn<00:01:50.880> on<00:01:50.960> the<00:01:51.040> news<00:01:51.360> and<00:01:51.439> you<00:01:51.520> say<00:01:51.680> is
you turn on the news and you say is
you turn on the news and you say is
there<00:01:52.000> anyone<00:01:52.399> left<00:01:52.880> to<00:01:53.119> hack<00:01:53.920> sony
there anyone left to hack sony
there anyone left to hack sony
playstation<00:01:55.040> network
playstation network
playstation network
done<00:01:56.799> the<00:01:56.960> government<00:01:57.360> of<00:01:57.520> turkey<00:01:58.079> tick
done the government of turkey tick
done the government of turkey tick
britain's<00:01:59.200> serious<00:01:59.680> organized<00:02:00.159> crime<00:02:00.560> agency
britain's serious organized crime agency
britain's serious organized crime agency
a<00:02:01.360> breeze<00:02:01.840> the<00:02:02.000> cia<00:02:02.640> falling<00:02:02.960> off<00:02:03.200> a<00:02:03.280> log<00:02:03.840> in
a breeze the cia falling off a log in
a breeze the cia falling off a log in
fact<00:02:04.240> a<00:02:04.320> friend<00:02:04.560> of<00:02:04.640> mine<00:02:04.880> from<00:02:05.040> the<00:02:05.119> security
fact a friend of mine from the security
fact a friend of mine from the security
industry<00:02:06.320> told<00:02:06.479> me<00:02:06.719> the<00:02:06.799> other<00:02:07.040> day<00:02:07.520> that
industry told me the other day that
industry told me the other day that
there<00:02:08.000> are<00:02:08.319> two<00:02:08.560> types<00:02:08.879> of<00:02:09.039> companies<00:02:09.599> in<00:02:09.679> the
there are two types of companies in the
there are two types of companies in the
world<00:02:10.479> those<00:02:10.800> that<00:02:11.039> know<00:02:11.200> they've<00:02:11.440> been
world those that know they've been
world those that know they've been
hacked<00:02:12.400> and<00:02:12.560> those<00:02:12.879> that<00:02:13.120> don't<00:02:14.000> i<00:02:14.080> mean
hacked and those that don't i mean
hacked and those that don't i mean
three<00:02:15.840> companies<00:02:16.640> providing
three companies providing
three companies providing
cyber<00:02:18.319> security<00:02:18.959> services<00:02:19.520> to<00:02:19.680> the<00:02:19.840> fbi<00:02:20.800> have
cyber security services to the fbi have
cyber security services to the fbi have
been<00:02:21.280> hacked<00:02:22.000> i<00:02:22.160> mean<00:02:22.800> is<00:02:23.200> nothing<00:02:23.680> sacred
been hacked i mean is nothing sacred
been hacked i mean is nothing sacred
anymore<00:02:24.480> for<00:02:24.640> heaven's<00:02:25.040> sake
anymore for heaven's sake
anymore for heaven's sake
anyway<00:02:26.720> this<00:02:26.959> mysterious<00:02:27.920> group<00:02:28.239> anonymous
anyway this mysterious group anonymous
anyway this mysterious group anonymous
and<00:02:28.879> they<00:02:29.040> would<00:02:29.200> say<00:02:29.440> this<00:02:29.680> themselves<00:02:30.160> they
and they would say this themselves they
and they would say this themselves they
are<00:02:30.480> providing<00:02:30.959> a<00:02:31.200> service<00:02:32.000> by<00:02:32.400> demonstrating
are providing a service by demonstrating
are providing a service by demonstrating
how<00:02:33.599> useless<00:02:34.239> companies<00:02:34.959> are<00:02:35.599> at<00:02:36.160> protecting
how useless companies are at protecting
how useless companies are at protecting
our<00:02:37.280> data<00:02:38.080> but<00:02:38.239> there<00:02:38.480> is<00:02:38.640> also<00:02:39.120> a<00:02:39.200> very
our data but there is also a very
our data but there is also a very
serious<00:02:40.000> aspect<00:02:40.480> to<00:02:40.640> anonymous<00:02:41.519> they<00:02:41.760> are
serious aspect to anonymous they are
serious aspect to anonymous they are
ideologically
ideologically
ideologically
driven
driven
driven
they<00:02:45.120> claim<00:02:45.599> that<00:02:45.760> they<00:02:46.000> are<00:02:46.319> battling<00:02:46.879> a
they claim that they are battling a
they claim that they are battling a
dastardly<00:02:48.080> conspiracy
dastardly conspiracy
dastardly conspiracy
they<00:02:49.680> say<00:02:50.000> that<00:02:50.400> governments<00:02:50.959> are<00:02:51.120> trying<00:02:51.360> to
they say that governments are trying to
they say that governments are trying to
take<00:02:52.000> over<00:02:52.640> the<00:02:52.879> internet<00:02:53.360> and<00:02:53.599> control<00:02:54.160> it
take over the internet and control it
take over the internet and control it
and<00:02:54.959> that<00:02:55.200> they
and that they
and that they
anonymous<00:02:57.040> are<00:02:57.200> the<00:02:57.360> authentic<00:02:58.080> voice<00:02:58.480> of
anonymous are the authentic voice of
anonymous are the authentic voice of
resistance<00:02:59.760> be<00:03:00.000> it<00:03:00.160> against<00:03:00.640> middle<00:03:00.879> eastern
resistance be it against middle eastern
resistance be it against middle eastern
dictatorships<00:03:02.080> against<00:03:02.480> global<00:03:02.879> media
dictatorships against global media
dictatorships against global media
corporations<00:03:04.560> or<00:03:04.800> against<00:03:05.599> intelligence
corporations or against intelligence
corporations or against intelligence
agencies<00:03:07.120> or<00:03:07.280> whoever<00:03:07.760> it<00:03:07.920> is<00:03:08.640> and<00:03:08.720> their
agencies or whoever it is and their
agencies or whoever it is and their
politics<00:03:09.599> are<00:03:09.760> not<00:03:10.000> entirely<00:03:11.120> unattractive
politics are not entirely unattractive
politics are not entirely unattractive
okay<00:03:12.959> they're<00:03:13.200> a<00:03:13.280> little<00:03:13.920> in<00:03:14.239> koat<00:03:15.040> and
okay they're a little in koat and
okay they're a little in koat and
there's<00:03:15.440> a<00:03:16.000> there's<00:03:16.239> a<00:03:16.400> strong<00:03:16.800> whiff<00:03:17.040> of<00:03:17.200> sort
there's a there's a strong whiff of sort
there's a there's a strong whiff of sort
of<00:03:17.519> half-baked<00:03:18.319> anarchism<00:03:19.360> uh<00:03:19.680> about<00:03:20.080> them
of half-baked anarchism uh about them
of half-baked anarchism uh about them
but<00:03:21.040> one<00:03:21.360> thing<00:03:21.599> is<00:03:21.840> true
but one thing is true
but one thing is true
we<00:03:23.200> are<00:03:23.519> at<00:03:23.599> the<00:03:23.760> beginning<00:03:24.720> of<00:03:24.879> a<00:03:25.040> mighty
we are at the beginning of a mighty
we are at the beginning of a mighty
struggle
struggle
struggle
for<00:03:27.040> control<00:03:27.840> of<00:03:28.000> the<00:03:28.239> internet
for control of the internet
for control of the internet
the<00:03:29.519> web<00:03:29.840> links<00:03:30.480> everything<00:03:31.120> and<00:03:31.360> very<00:03:31.599> soon
the web links everything and very soon
the web links everything and very soon
it<00:03:32.480> will<00:03:32.640> mediate<00:03:33.200> most<00:03:33.599> human<00:03:34.239> activity
it will mediate most human activity
it will mediate most human activity
because<00:03:35.760> the<00:03:35.920> internet<00:03:36.560> has<00:03:36.799> fashioned<00:03:37.360> a<00:03:37.519> new
because the internet has fashioned a new
because the internet has fashioned a new
and<00:03:38.239> complicated<00:03:39.040> environment<00:03:40.159> for<00:03:40.319> an<00:03:40.560> old
and complicated environment for an old
and complicated environment for an old
age<00:03:41.120> dilemma<00:03:42.159> that<00:03:42.400> pits<00:03:43.040> the<00:03:43.200> demands<00:03:43.760> of
age dilemma that pits the demands of
age dilemma that pits the demands of
security
security
security
with<00:03:46.159> the<00:03:46.799> desire
with the desire
with the desire
for<00:03:48.480> freedom<00:03:49.040> now<00:03:49.680> this<00:03:49.920> is<00:03:50.080> a<00:03:50.239> very
for freedom now this is a very
for freedom now this is a very
complicated<00:03:51.840> struggle<00:03:52.319> and<00:03:52.480> unfortunately
complicated struggle and unfortunately
complicated struggle and unfortunately
for<00:03:53.360> mortals<00:03:53.920> like<00:03:54.480> uh<00:03:54.720> you<00:03:54.959> and<00:03:55.120> me
for mortals like uh you and me
for mortals like uh you and me
we<00:03:56.080> probably<00:03:56.879> can't<00:03:57.519> uh<00:03:57.840> understand<00:03:58.480> it<00:03:58.640> very
we probably can't uh understand it very
we probably can't uh understand it very
well<00:03:59.040> nonetheless<00:04:00.000> in<00:04:00.319> an<00:04:00.640> unexpected<00:04:01.439> attack
well nonetheless in an unexpected attack
well nonetheless in an unexpected attack
of<00:04:02.000> hubris<00:04:02.720> a<00:04:02.879> couple<00:04:03.120> of<00:04:03.280> years<00:04:03.519> ago<00:04:04.159> i
of hubris a couple of years ago i
of hubris a couple of years ago i
decided<00:04:05.200> i<00:04:05.439> would<00:04:05.760> try<00:04:06.000> and<00:04:06.239> do<00:04:06.480> that<00:04:07.200> and<00:04:07.519> uh<00:04:08.080> i
decided i would try and do that and uh i
decided i would try and do that and uh i
sought<00:04:09.599> i<00:04:09.840> sort<00:04:10.720> of<00:04:11.040> get<00:04:11.280> it<00:04:11.840> these<00:04:12.080> were<00:04:12.239> the
sought i sort of get it these were the
sought i sort of get it these were the
various<00:04:12.720> things<00:04:12.959> that<00:04:13.120> i<00:04:13.200> was<00:04:13.360> looking<00:04:13.680> at<00:04:14.080> as
various things that i was looking at as
various things that i was looking at as
i<00:04:14.319> was<00:04:14.480> trying<00:04:14.640> to<00:04:14.799> understand<00:04:15.280> it<00:04:15.360> but<00:04:15.760> in
i was trying to understand it but in
i was trying to understand it but in
order<00:04:16.239> to<00:04:16.400> try<00:04:16.560> and<00:04:16.720> explain<00:04:17.280> the<00:04:17.440> whole<00:04:17.759> thing
order to try and explain the whole thing
order to try and explain the whole thing
i<00:04:18.400> would<00:04:18.639> need<00:04:19.120> another<00:04:19.519> 18<00:04:19.919> minutes<00:04:20.320> or<00:04:20.400> so<00:04:20.959> to
i would need another 18 minutes or so to
i would need another 18 minutes or so to
do<00:04:21.440> it<00:04:21.840> so<00:04:22.160> you're<00:04:22.320> just<00:04:22.479> going<00:04:22.639> to<00:04:22.720> have<00:04:22.960> to
do it so you're just going to have to
do it so you're just going to have to
take<00:04:23.520> it<00:04:23.759> on<00:04:24.000> trust<00:04:24.320> from<00:04:24.560> me<00:04:24.800> on<00:04:24.880> this
take it on trust from me on this
take it on trust from me on this
occasion<00:04:26.240> and<00:04:26.800> let<00:04:26.960> me<00:04:27.120> assure<00:04:27.360> you<00:04:27.520> that<00:04:27.759> all
occasion and let me assure you that all
occasion and let me assure you that all
of<00:04:28.080> these<00:04:28.320> issues<00:04:28.880> are<00:04:29.120> involved<00:04:29.520> in<00:04:29.680> cyber
of these issues are involved in cyber
of these issues are involved in cyber
security<00:04:30.639> and<00:04:30.800> control<00:04:31.280> of<00:04:31.360> the<00:04:31.520> internet<00:04:32.400> one
security and control of the internet one
security and control of the internet one
way<00:04:33.040> or<00:04:33.280> the<00:04:33.440> other<00:04:33.600> but<00:04:33.840> in<00:04:34.000> a<00:04:34.080> configuration
way or the other but in a configuration
way or the other but in a configuration
that<00:04:35.600> uh<00:04:35.919> even<00:04:36.240> stephen<00:04:36.639> hawkins<00:04:37.040> would
that uh even stephen hawkins would
that uh even stephen hawkins would
probably<00:04:37.520> have<00:04:37.759> difficulty<00:04:38.720> trying<00:04:39.040> to<00:04:39.199> get
probably have difficulty trying to get
probably have difficulty trying to get
uh<00:04:40.560> trying<00:04:40.800> to<00:04:40.880> get<00:04:41.120> his<00:04:41.360> head<00:04:41.600> around
uh trying to get his head around
uh trying to get his head around
so<00:04:42.639> there<00:04:42.800> you<00:04:43.040> are<00:04:43.520> and<00:04:43.680> as<00:04:43.840> you<00:04:44.000> see<00:04:44.320> in<00:04:44.479> the
so there you are and as you see in the
so there you are and as you see in the
middle<00:04:45.120> there<00:04:45.440> is<00:04:45.600> our<00:04:45.919> old<00:04:46.400> friend<00:04:46.880> the
middle there is our old friend the
middle there is our old friend the
hacker
hacker
hacker
the<00:04:48.560> hacker<00:04:48.960> is<00:04:49.199> absolutely<00:04:50.080> central<00:04:50.960> to<00:04:51.120> many
the hacker is absolutely central to many
the hacker is absolutely central to many
of<00:04:51.600> the<00:04:51.759> political<00:04:52.479> social<00:04:53.280> and<00:04:53.600> economic
of the political social and economic
of the political social and economic
issues<00:04:54.800> affecting<00:04:55.280> the<00:04:55.520> net<00:04:55.840> and<00:04:56.000> so<00:04:56.639> i
issues affecting the net and so i
issues affecting the net and so i
thought<00:04:57.120> to<00:04:57.280> myself<00:04:58.000> well
thought to myself well
thought to myself well
these<00:04:59.199> are<00:04:59.280> the<00:04:59.440> guys<00:04:59.919> who<00:05:00.320> i<00:05:00.720> want<00:05:01.040> to<00:05:01.199> talk<00:05:01.440> to
these are the guys who i want to talk to
these are the guys who i want to talk to
and<00:05:02.240> what<00:05:02.400> do<00:05:02.560> you<00:05:02.720> know
and what do you know
and what do you know
nobody<00:05:04.880> else<00:05:05.120> does<00:05:05.440> talk<00:05:05.759> to<00:05:05.919> the<00:05:06.080> hackers
nobody else does talk to the hackers
nobody else does talk to the hackers
they're<00:05:07.520> completely<00:05:08.240> anonymous<00:05:09.039> as<00:05:09.199> it<00:05:09.360> were
they're completely anonymous as it were
they're completely anonymous as it were
so<00:05:10.160> despite<00:05:10.639> the<00:05:10.880> fact<00:05:11.440> that<00:05:11.600> we<00:05:11.840> are
so despite the fact that we are
so despite the fact that we are
beginning<00:05:12.400> to<00:05:12.639> pour
beginning to pour
beginning to pour
billions<00:05:14.400> hundreds<00:05:14.960> of<00:05:15.120> billions<00:05:15.680> of<00:05:15.840> dollars
billions hundreds of billions of dollars
billions hundreds of billions of dollars
into<00:05:17.680> cyber<00:05:18.160> security<00:05:19.199> for<00:05:19.440> the<00:05:19.520> most
into cyber security for the most
into cyber security for the most
extraordinary<00:05:20.639> technical
extraordinary technical
extraordinary technical
uh<00:05:22.240> solutions
uh solutions
uh solutions
no<00:05:23.680> one<00:05:23.919> wants<00:05:24.160> to<00:05:24.320> talk<00:05:24.880> to<00:05:25.520> these<00:05:25.840> guys<00:05:26.160> the
no one wants to talk to these guys the
no one wants to talk to these guys the
hackers<00:05:27.199> who<00:05:27.680> are<00:05:28.400> doing
hackers who are doing
hackers who are doing
everything<00:05:30.240> instead<00:05:30.800> we<00:05:31.039> prefer<00:05:31.440> these
everything instead we prefer these
everything instead we prefer these
really<00:05:32.400> dazzling<00:05:32.960> technological<00:05:33.840> solutions
really dazzling technological solutions
really dazzling technological solutions
um<00:05:35.440> which<00:05:35.759> cost<00:05:36.400> a<00:05:36.560> huge<00:05:36.880> amount<00:05:37.280> of<00:05:37.440> money<00:05:38.240> so
um which cost a huge amount of money so
um which cost a huge amount of money so
nothing<00:05:39.440> is<00:05:39.600> going<00:05:39.919> into<00:05:40.479> into<00:05:40.720> the<00:05:40.880> hackers
nothing is going into into the hackers
nothing is going into into the hackers
well<00:05:42.320> i<00:05:42.560> say<00:05:42.880> nothing<00:05:43.759> but<00:05:44.080> actually<00:05:44.960> there<00:05:45.199> is
well i say nothing but actually there is
well i say nothing but actually there is
one<00:05:45.680> teeny<00:05:46.160> weeny<00:05:46.479> little<00:05:46.800> research<00:05:47.360> unit<00:05:48.000> in
one teeny weeny little research unit in
one teeny weeny little research unit in
turin<00:05:49.039> italy<00:05:49.680> called<00:05:49.919> the<00:05:50.320> hackers<00:05:51.120> profiling
turin italy called the hackers profiling
turin italy called the hackers profiling
project<00:05:52.720> and<00:05:52.960> they<00:05:53.199> are<00:05:53.280> doing<00:05:53.600> some
project and they are doing some
project and they are doing some
fantastic<00:05:54.720> research<00:05:55.759> into<00:05:56.400> the
fantastic research into the
fantastic research into the
characteristics<00:05:58.240> into<00:05:58.479> the<00:05:58.560> abilities<00:05:59.440> and
characteristics into the abilities and
characteristics into the abilities and
the<00:05:59.680> socialization<00:06:00.960> of<00:06:01.199> hackers<00:06:01.600> but<00:06:01.759> because
the socialization of hackers but because
the socialization of hackers but because
they're<00:06:02.240> a<00:06:02.320> un<00:06:03.039> operation<00:06:03.680> maybe<00:06:03.919> that's<00:06:04.240> why
they're a un operation maybe that's why
they're a un operation maybe that's why
governments<00:06:04.880> and<00:06:04.960> corporations<00:06:05.840> aren't<00:06:06.000> that
governments and corporations aren't that
governments and corporations aren't that
interested<00:06:06.880> in<00:06:07.039> them<00:06:07.280> and<00:06:07.440> because<00:06:07.680> it's<00:06:07.919> a<00:06:08.000> un
interested in them and because it's a un
interested in them and because it's a un
operation<00:06:09.199> of<00:06:09.440> course<00:06:10.080> it<00:06:10.560> lacks<00:06:11.280> funding<00:06:12.160> but
operation of course it lacks funding but
operation of course it lacks funding but
i<00:06:12.639> think<00:06:12.880> they're<00:06:13.120> doing<00:06:13.759> very<00:06:14.160> important
i think they're doing very important
i think they're doing very important
work<00:06:15.440> because<00:06:16.319> where<00:06:16.560> we<00:06:16.800> have<00:06:17.199> a<00:06:17.440> surfeit<00:06:18.400> of
work because where we have a surfeit of
work because where we have a surfeit of
technology<00:06:19.600> in<00:06:19.759> the<00:06:19.919> cyber<00:06:20.319> security
technology in the cyber security
technology in the cyber security
industry<00:06:22.400> we<00:06:22.720> have<00:06:23.440> a<00:06:23.759> definite<00:06:24.560> lack
industry we have a definite lack
industry we have a definite lack
of<00:06:25.759> call<00:06:25.919> me<00:06:26.160> old-fashioned
of call me old-fashioned
of call me old-fashioned
human<00:06:28.319> intelligence
human intelligence
human intelligence
now<00:06:30.240> so<00:06:30.400> far<00:06:30.720> i've<00:06:30.960> mentioned<00:06:31.440> the<00:06:31.759> hackers
now so far i've mentioned the hackers
now so far i've mentioned the hackers
anonymous<00:06:33.520> who<00:06:33.680> are<00:06:33.840> a<00:06:33.919> politically
anonymous who are a politically
anonymous who are a politically
motivated<00:06:35.600> hacking<00:06:36.000> group<00:06:36.560> of<00:06:36.639> course<00:06:36.880> the
motivated hacking group of course the
motivated hacking group of course the
criminal<00:06:37.440> justice<00:06:37.840> system<00:06:38.240> treats<00:06:38.479> them<00:06:38.720> as
criminal justice system treats them as
criminal justice system treats them as
common<00:06:39.360> or<00:06:39.520> garden<00:06:39.919> criminals<00:06:40.319> but
common or garden criminals but
common or garden criminals but
interestingly<00:06:41.199> anonymous<00:06:42.000> does<00:06:42.319> not<00:06:42.639> make
interestingly anonymous does not make
interestingly anonymous does not make
use<00:06:43.600> of<00:06:43.840> its<00:06:44.080> hacked<00:06:44.479> information<00:06:45.360> for
use of its hacked information for
use of its hacked information for
financial<00:06:46.319> gain
financial gain
financial gain
but<00:06:47.280> what<00:06:47.520> about<00:06:47.919> the<00:06:48.479> real<00:06:49.039> cyber<00:06:49.520> criminals
but what about the real cyber criminals
but what about the real cyber criminals
well<00:06:50.880> real<00:06:51.199> organized<00:06:51.759> crime<00:06:52.240> on<00:06:52.400> the
well real organized crime on the
well real organized crime on the
internet<00:06:53.199> goes<00:06:53.600> back<00:06:54.240> about<00:06:54.720> 10<00:06:55.039> years<00:06:55.919> when<00:06:56.240> a
internet goes back about 10 years when a
internet goes back about 10 years when a
group<00:06:56.720> of<00:06:57.280> gifted<00:06:58.160> ukrainian<00:06:59.039> hackers
group of gifted ukrainian hackers
group of gifted ukrainian hackers
developed<00:07:01.199> a<00:07:01.360> website
developed a website
developed a website
which<00:07:02.720> led<00:07:03.039> to<00:07:03.199> the
which led to the
which led to the
industrialization<00:07:05.199> of<00:07:05.520> cybercrime<00:07:06.720> welcome
industrialization of cybercrime welcome
industrialization of cybercrime welcome
to<00:07:07.280> the<00:07:07.440> now<00:07:07.759> forgotten<00:07:08.319> realm<00:07:09.039> of<00:07:09.360> carter
to the now forgotten realm of carter
to the now forgotten realm of carter
planet
this<00:07:13.599> is<00:07:13.759> how<00:07:14.160> they<00:07:14.319> were<00:07:14.639> advertising
this is how they were advertising
this is how they were advertising
themselves<00:07:15.919> a<00:07:16.080> decade<00:07:16.560> ago
themselves a decade ago
themselves a decade ago
on<00:07:17.919> the<00:07:18.080> net<00:07:18.400> now<00:07:18.720> carla<00:07:19.039> planet<00:07:19.280> was<00:07:19.440> very
on the net now carla planet was very
on the net now carla planet was very
interesting<00:07:20.240> cyber<00:07:20.560> criminals<00:07:21.039> would<00:07:21.280> go
interesting cyber criminals would go
interesting cyber criminals would go
there<00:07:22.160> to<00:07:22.479> buy<00:07:22.800> and<00:07:23.039> sell<00:07:23.680> stolen<00:07:24.240> credit<00:07:24.560> card
there to buy and sell stolen credit card
there to buy and sell stolen credit card
details<00:07:25.759> to<00:07:26.000> exchange<00:07:26.560> information<00:07:27.440> about
details to exchange information about
details to exchange information about
new<00:07:28.240> malware<00:07:28.880> that<00:07:29.039> was<00:07:29.599> was<00:07:30.000> out<00:07:30.160> there
new malware that was was out there
new malware that was was out there
and<00:07:31.280> remember<00:07:31.680> this<00:07:31.919> is<00:07:32.000> a<00:07:32.160> time<00:07:32.639> when<00:07:33.120> we're
and remember this is a time when we're
and remember this is a time when we're
seeing<00:07:33.680> for<00:07:33.840> the<00:07:34.000> first<00:07:34.319> time<00:07:34.960> so-called
seeing for the first time so-called
seeing for the first time so-called
off-the-shelf<00:07:36.319> malware<00:07:36.800> this<00:07:37.039> is<00:07:37.199> sort<00:07:37.360> of
off-the-shelf malware this is sort of
off-the-shelf malware this is sort of
ready<00:07:38.319> for<00:07:38.560> use<00:07:39.039> out<00:07:39.280> of<00:07:39.440> the<00:07:39.599> box<00:07:40.000> stuff<00:07:40.319> which
ready for use out of the box stuff which
ready for use out of the box stuff which
you<00:07:40.800> can<00:07:40.960> deploy<00:07:41.680> even<00:07:42.000> if<00:07:42.080> you're<00:07:42.319> not<00:07:42.479> a
you can deploy even if you're not a
you can deploy even if you're not a
terribly<00:07:43.360> sophisticated
terribly sophisticated
terribly sophisticated
hacker<00:07:45.199> and<00:07:45.360> so<00:07:45.919> carter<00:07:46.319> planet<00:07:46.639> became<00:07:47.039> a
hacker and so carter planet became a
hacker and so carter planet became a
sort<00:07:47.360> of<00:07:47.840> supermarket<00:07:48.960> for<00:07:49.440> cyber<00:07:49.840> criminals
sort of supermarket for cyber criminals
sort of supermarket for cyber criminals
and<00:07:51.120> its<00:07:51.599> creators<00:07:52.240> were<00:07:52.479> incredibly<00:07:53.199> smart
and its creators were incredibly smart
and its creators were incredibly smart
and<00:07:53.919> entrepreneurial<00:07:54.800> because<00:07:55.120> they<00:07:55.280> were
and entrepreneurial because they were
and entrepreneurial because they were
faced<00:07:56.160> with<00:07:56.479> one<00:07:57.199> enormous<00:07:57.919> challenge<00:07:58.400> as
faced with one enormous challenge as
faced with one enormous challenge as
cyber<00:07:59.120> criminals<00:07:59.680> and<00:07:59.759> that<00:08:00.000> challenge<00:08:00.560> is
cyber criminals and that challenge is
cyber criminals and that challenge is
how<00:08:02.080> do<00:08:02.319> you<00:08:02.479> do<00:08:02.800> business<00:08:03.599> how<00:08:03.840> do<00:08:04.000> you<00:08:04.240> trust
how do you do business how do you trust
how do you do business how do you trust
somebody<00:08:05.520> on<00:08:05.680> the<00:08:05.759> web<00:08:06.080> who<00:08:06.240> you<00:08:06.319> want<00:08:06.560> to<00:08:06.639> do
somebody on the web who you want to do
somebody on the web who you want to do
business<00:08:07.360> with<00:08:08.080> when<00:08:08.240> you<00:08:08.400> know<00:08:08.639> that<00:08:08.800> they're
business with when you know that they're
business with when you know that they're
a<00:08:09.199> criminal
a criminal
a criminal
i<00:08:10.840> mean<00:08:12.319> it's<00:08:12.560> axiomatic<00:08:13.440> that<00:08:13.599> they're<00:08:13.840> dodgy
i mean it's axiomatic that they're dodgy
i mean it's axiomatic that they're dodgy
and<00:08:14.319> they're<00:08:14.479> going<00:08:14.639> to<00:08:14.720> want<00:08:14.960> to<00:08:15.039> try<00:08:15.280> and<00:08:15.440> rip
and they're going to want to try and rip
and they're going to want to try and rip
you<00:08:15.919> off
you off
you off
so
so
so
the<00:08:18.160> family<00:08:18.639> as<00:08:18.720> the<00:08:18.879> inner<00:08:19.120> core<00:08:19.440> of<00:08:19.520> carter
the family as the inner core of carter
the family as the inner core of carter
planet<00:08:20.319> was<00:08:20.560> known<00:08:20.879> came<00:08:21.120> up<00:08:21.199> with<00:08:21.360> this
planet was known came up with this
planet was known came up with this
brilliant<00:08:22.000> idea<00:08:22.720> called<00:08:22.960> the<00:08:23.199> escrow<00:08:23.759> system
brilliant idea called the escrow system
brilliant idea called the escrow system
they<00:08:24.960> appointed<00:08:25.840> an<00:08:26.319> officer
they appointed an officer
they appointed an officer
who<00:08:27.840> would<00:08:28.080> mediate<00:08:28.639> between<00:08:28.960> the<00:08:29.199> vendor<00:08:30.080> and
who would mediate between the vendor and
who would mediate between the vendor and
the<00:08:30.560> purchaser<00:08:31.120> the<00:08:31.280> vendor<00:08:31.599> say<00:08:31.759> of<00:08:31.919> stolen
the purchaser the vendor say of stolen
the purchaser the vendor say of stolen
credit<00:08:32.560> card<00:08:32.880> details<00:08:33.760> uh<00:08:34.159> the<00:08:34.240> purchase
credit card details uh the purchase
credit card details uh the purchase
don't<00:08:34.880> wanted<00:08:35.200> to<00:08:35.360> get<00:08:35.519> hold<00:08:35.760> of<00:08:35.839> them<00:08:36.000> the
don't wanted to get hold of them the
don't wanted to get hold of them the
purchaser<00:08:36.640> would<00:08:37.039> send<00:08:37.919> the<00:08:38.080> administrative
purchaser would send the administrative
purchaser would send the administrative
officer<00:08:39.839> um<00:08:40.320> some<00:08:40.719> dollars<00:08:41.120> digitally<00:08:41.919> and
officer um some dollars digitally and
officer um some dollars digitally and
the<00:08:42.640> vendor<00:08:43.039> would<00:08:43.279> sell<00:08:43.440> the<00:08:43.599> stolen<00:08:44.000> credit
the vendor would sell the stolen credit
the vendor would sell the stolen credit
card<00:08:44.480> details<00:08:45.120> and<00:08:45.279> the<00:08:45.680> officer<00:08:46.080> would<00:08:46.240> then
card details and the officer would then
card details and the officer would then
verify<00:08:47.200> if<00:08:47.440> the<00:08:47.600> credit<00:08:47.920> card<00:08:48.640> uh<00:08:48.880> the<00:08:49.040> stolen
verify if the credit card uh the stolen
verify if the credit card uh the stolen
credit<00:08:49.680> cards<00:08:50.000> worked<00:08:50.720> and<00:08:50.880> if<00:08:51.040> they<00:08:51.200> did<00:08:51.519> he
credit cards worked and if they did he
credit cards worked and if they did he
then<00:08:52.000> passed<00:08:52.399> on<00:08:52.880> the<00:08:53.040> money<00:08:53.360> to<00:08:53.519> the<00:08:53.680> vendor
then passed on the money to the vendor
then passed on the money to the vendor
and<00:08:54.399> the<00:08:54.560> stolen<00:08:54.880> credit<00:08:55.120> card<00:08:55.360> details<00:08:56.000> to
and the stolen credit card details to
and the stolen credit card details to
the<00:08:56.320> purchaser<00:08:57.440> and<00:08:57.920> it<00:08:58.160> was<00:08:58.880> this<00:08:59.680> which
the purchaser and it was this which
the purchaser and it was this which
completely<00:09:00.920> revolutionized<00:09:02.399> cybercrime<00:09:03.600> on
completely revolutionized cybercrime on
completely revolutionized cybercrime on
the<00:09:03.920> web<00:09:04.399> and<00:09:04.720> uh<00:09:04.959> after<00:09:05.279> that<00:09:05.519> it<00:09:05.760> just<00:09:06.000> went
the web and uh after that it just went
the web and uh after that it just went
while<00:09:06.560> we<00:09:06.720> had<00:09:07.279> a<00:09:07.519> champagne<00:09:08.240> decade<00:09:09.120> for
while we had a champagne decade for
while we had a champagne decade for
people<00:09:09.680> we<00:09:09.839> know<00:09:10.480> we<00:09:10.640> know<00:09:10.880> as<00:09:11.040> carters<00:09:11.519> now<00:09:11.680> i
people we know we know as carters now i
people we know we know as carters now i
spoke<00:09:12.000> to<00:09:12.080> one<00:09:12.240> of<00:09:12.320> these<00:09:12.640> carters<00:09:13.360> who<00:09:13.600> will
spoke to one of these carters who will
spoke to one of these carters who will
call<00:09:14.080> red<00:09:14.320> brigade<00:09:15.040> although<00:09:15.440> that<00:09:15.600> was<00:09:15.760> not
call red brigade although that was not
call red brigade although that was not
even<00:09:16.560> his<00:09:16.720> proper<00:09:16.959> nickname<00:09:17.360> but<00:09:17.519> i<00:09:17.600> promised
even his proper nickname but i promised
even his proper nickname but i promised
i<00:09:18.000> wouldn't<00:09:18.240> reveal<00:09:18.880> who<00:09:19.120> he<00:09:19.279> was<00:09:19.680> and<00:09:19.839> he
i wouldn't reveal who he was and he
i wouldn't reveal who he was and he
explained<00:09:20.399> to<00:09:20.560> me<00:09:20.800> how<00:09:21.040> in<00:09:21.279> 2003<00:09:22.080> and<00:09:22.240> 2004<00:09:22.959> he
explained to me how in 2003 and 2004 he
explained to me how in 2003 and 2004 he
would<00:09:23.200> go<00:09:23.440> on<00:09:23.600> sprees
would go on sprees
would go on sprees
in<00:09:25.200> new<00:09:25.360> york<00:09:25.839> taking<00:09:26.240> out<00:09:26.800> 10<00:09:27.120> 000<00:09:27.839> from<00:09:28.000> an
in new york taking out 10 000 from an
in new york taking out 10 000 from an
atm<00:09:28.640> here<00:09:28.959> 30<00:09:29.440> 000<00:09:29.760> from<00:09:30.000> an<00:09:30.399> uh<00:09:30.720> atm<00:09:31.279> there
atm here 30 000 from an uh atm there
atm here 30 000 from an uh atm there
using<00:09:32.240> cloned<00:09:33.040> credit<00:09:33.360> cards<00:09:34.240> he<00:09:34.560> was<00:09:34.959> making
using cloned credit cards he was making
using cloned credit cards he was making
on<00:09:36.080> average<00:09:36.640> a<00:09:36.800> week
on average a week
on average a week
150<00:09:39.680> 000
150 000
150 000
tax-free<00:09:41.680> of<00:09:41.760> course
tax-free of course
tax-free of course
and<00:09:43.120> uh
and uh
and uh
he<00:09:44.880> said<00:09:45.120> that
he said that
he said that
he<00:09:46.160> had<00:09:46.480> so<00:09:46.720> much<00:09:46.959> money<00:09:47.360> stashed<00:09:47.920> in<00:09:48.080> his
he had so much money stashed in his
he had so much money stashed in his
upper<00:09:48.640> east<00:09:48.880> side<00:09:49.200> apartment<00:09:49.760> at<00:09:49.920> one<00:09:50.160> point
upper east side apartment at one point
upper east side apartment at one point
that<00:09:50.560> he<00:09:50.720> just<00:09:50.880> didn't<00:09:51.040> know<00:09:51.200> what<00:09:51.440> to<00:09:51.519> do<00:09:51.600> with
that he just didn't know what to do with
that he just didn't know what to do with
it<00:09:51.920> and<00:09:52.080> actually<00:09:52.399> fell<00:09:52.640> into<00:09:52.880> a<00:09:52.959> depression
it and actually fell into a depression
it and actually fell into a depression
but<00:09:53.920> that's<00:09:54.240> a<00:09:54.320> slightly<00:09:54.800> different<00:09:55.200> story
but that's a slightly different story
but that's a slightly different story
which<00:09:57.200> i<00:09:57.360> won't<00:09:57.519> go<00:09:57.760> into<00:09:58.000> now<00:09:58.160> now<00:09:58.399> the
which i won't go into now now the
which i won't go into now now the
interesting<00:09:59.040> thing<00:09:59.279> about<00:09:59.600> red<00:09:59.760> brigade<00:10:00.240> is
interesting thing about red brigade is
interesting thing about red brigade is
is<00:10:00.560> that<00:10:00.800> he<00:10:00.959> wasn't<00:10:01.519> an<00:10:01.760> advanced<00:10:02.320> hacker<00:10:02.959> he
is that he wasn't an advanced hacker he
is that he wasn't an advanced hacker he
sort<00:10:03.600> of<00:10:03.760> understood<00:10:04.240> the<00:10:04.480> technology<00:10:05.120> and<00:10:05.279> he
sort of understood the technology and he
sort of understood the technology and he
realized<00:10:05.839> that<00:10:06.000> security<00:10:06.560> was<00:10:06.720> very
realized that security was very
realized that security was very
important<00:10:07.760> if<00:10:08.000> you<00:10:08.080> were<00:10:08.240> going<00:10:08.560> to<00:10:08.720> be
important if you were going to be
important if you were going to be
a<00:10:09.920> carder<00:10:10.320> but<00:10:10.480> he<00:10:10.640> didn't<00:10:10.880> spend<00:10:11.200> his<00:10:11.360> days
a carder but he didn't spend his days
a carder but he didn't spend his days
and<00:10:11.839> nights<00:10:12.320> bent<00:10:12.640> over<00:10:12.880> a<00:10:12.959> computer<00:10:13.519> eating
and nights bent over a computer eating
and nights bent over a computer eating
pizza
pizza
pizza
drinking<00:10:15.600> coke<00:10:15.920> and<00:10:16.000> that<00:10:16.240> sort<00:10:16.399> of<00:10:16.480> thing<00:10:16.880> he
drinking coke and that sort of thing he
drinking coke and that sort of thing he
was<00:10:17.279> out<00:10:17.440> there<00:10:17.600> on<00:10:17.760> the<00:10:17.920> town<00:10:18.160> having<00:10:18.399> a<00:10:18.560> fab
was out there on the town having a fab
was out there on the town having a fab
time<00:10:19.200> in<00:10:19.680> enjoying<00:10:20.160> the<00:10:20.399> high<00:10:20.720> life<00:10:21.360> and<00:10:21.519> this
time in enjoying the high life and this
time in enjoying the high life and this
is<00:10:21.920> because<00:10:22.720> hackers<00:10:23.279> are<00:10:23.600> only<00:10:24.079> one<00:10:24.560> element
is because hackers are only one element
is because hackers are only one element
in<00:10:25.839> a<00:10:26.079> cyber<00:10:26.880> criminal<00:10:27.760> enterprise<00:10:28.959> and<00:10:29.680> often
in a cyber criminal enterprise and often
in a cyber criminal enterprise and often
they're<00:10:30.399> the<00:10:30.560> most
they're the most
they're the most
vulnerable<00:10:32.079> element<00:10:32.720> of<00:10:33.120> all<00:10:33.839> and
vulnerable element of all and
vulnerable element of all and
i<00:10:35.360> want<00:10:35.519> to<00:10:35.760> explain<00:10:36.160> this<00:10:36.399> to<00:10:36.560> you<00:10:36.720> by
i want to explain this to you by
i want to explain this to you by
introducing<00:10:37.519> you<00:10:37.680> to<00:10:37.920> six<00:10:38.320> characters<00:10:39.360> who<00:10:39.600> i
introducing you to six characters who i
introducing you to six characters who i
met<00:10:40.480> while<00:10:40.720> i<00:10:40.880> was<00:10:41.200> uh<00:10:41.600> doing<00:10:41.920> this<00:10:42.640> research
met while i was uh doing this research
met while i was uh doing this research
dimitri<00:10:44.320> golob<00:10:45.040> aka<00:10:45.680> script<00:10:46.640> born<00:10:46.959> in<00:10:47.120> odessa
dimitri golob aka script born in odessa
dimitri golob aka script born in odessa
ukraine<00:10:48.480> in<00:10:48.920> 1982.<00:10:50.000> now<00:10:50.240> he<00:10:50.399> developed<00:10:50.880> his
ukraine in 1982. now he developed his
ukraine in 1982. now he developed his
social<00:10:51.519> and<00:10:51.600> moral<00:10:52.000> compass<00:10:52.959> and<00:10:53.120> the<00:10:53.279> black
social and moral compass and the black
social and moral compass and the black
sea<00:10:53.839> port<00:10:54.160> during<00:10:54.480> the<00:10:54.560> 1990s
sea port during the 1990s
sea port during the 1990s
this<00:10:56.399> was<00:10:56.720> a<00:10:56.959> sink<00:10:57.279> or<00:10:57.600> swim<00:10:58.399> environment
this was a sink or swim environment
this was a sink or swim environment
where<00:10:59.279> involvement
where involvement
where involvement
in<00:11:00.720> criminal<00:11:01.120> or<00:11:01.279> corrupt<00:11:01.760> activities<00:11:02.880> was
in criminal or corrupt activities was
in criminal or corrupt activities was
entirely<00:11:03.839> necessary<00:11:04.720> if<00:11:04.880> you<00:11:05.040> wanted<00:11:05.680> to
entirely necessary if you wanted to
entirely necessary if you wanted to
survive<00:11:06.800> as<00:11:06.959> an<00:11:07.200> accomplished<00:11:07.920> computer<00:11:08.560> user
survive as an accomplished computer user
survive as an accomplished computer user
what<00:11:09.519> dimitri<00:11:10.079> did<00:11:10.320> was<00:11:10.560> to<00:11:10.800> transfer<00:11:11.680> the
what dimitri did was to transfer the
what dimitri did was to transfer the
gangster<00:11:12.399> capitalism<00:11:13.120> of<00:11:13.200> his<00:11:13.440> hometown
gangster capitalism of his hometown
gangster capitalism of his hometown
on<00:11:14.959> to<00:11:15.120> the<00:11:15.360> world<00:11:15.760> wide<00:11:16.320> web<00:11:16.959> and<00:11:17.040> he<00:11:17.200> did<00:11:17.440> a
on to the world wide web and he did a
on to the world wide web and he did a
great<00:11:17.839> job<00:11:18.079> in<00:11:18.240> it<00:11:18.399> you<00:11:18.560> have<00:11:18.640> to<00:11:18.800> understand
great job in it you have to understand
great job in it you have to understand
over<00:11:20.079> that<00:11:20.320> from<00:11:20.480> his<00:11:20.720> ninth<00:11:21.120> birthday
over that from his ninth birthday
over that from his ninth birthday
the<00:11:22.640> only<00:11:23.040> environment<00:11:23.920> that<00:11:24.160> he<00:11:24.399> knew<00:11:25.040> was
the only environment that he knew was
the only environment that he knew was
gangsterism<00:11:26.320> he<00:11:26.560> knew<00:11:27.040> no<00:11:27.279> other<00:11:27.600> way<00:11:28.000> of
gangsterism he knew no other way of
gangsterism he knew no other way of
making<00:11:28.480> a<00:11:28.640> living
making a living
making a living
and<00:11:29.680> making<00:11:30.160> money<00:11:30.880> then<00:11:31.120> we<00:11:31.200> have<00:11:31.440> renuka
and making money then we have renuka
and making money then we have renuka
subramaniam<00:11:32.959> aka<00:11:33.600> jilzy<00:11:34.480> founder<00:11:34.959> of<00:11:35.200> dark
subramaniam aka jilzy founder of dark
subramaniam aka jilzy founder of dark
market<00:11:36.079> born<00:11:36.399> in<00:11:36.560> colombo<00:11:37.200> sri<00:11:37.519> lanka<00:11:38.240> as<00:11:38.399> an
market born in colombo sri lanka as an
market born in colombo sri lanka as an
eight-year-old<00:11:39.360> he<00:11:39.519> and<00:11:39.680> his<00:11:39.920> parents<00:11:40.480> fled
eight-year-old he and his parents fled
eight-year-old he and his parents fled
the<00:11:40.959> sri<00:11:41.200> lankan<00:11:41.680> capital<00:11:42.560> because<00:11:43.360> singali's
the sri lankan capital because singali's
the sri lankan capital because singali's
mobs<00:11:44.399> were<00:11:44.640> roaming<00:11:44.959> the<00:11:45.120> city<00:11:45.760> looking<00:11:46.079> for
mobs were roaming the city looking for
mobs were roaming the city looking for
tamils<00:11:46.720> like<00:11:47.040> renu<00:11:47.600> to<00:11:47.760> murder<00:11:48.320> at<00:11:48.560> 11<00:11:48.959> he<00:11:49.120> was
tamils like renu to murder at 11 he was
tamils like renu to murder at 11 he was
interrogated<00:11:50.000> by<00:11:50.160> the<00:11:50.240> sri<00:11:50.480> lankan<00:11:50.800> military
interrogated by the sri lankan military
interrogated by the sri lankan military
accused<00:11:51.680> of<00:11:51.760> being<00:11:52.000> a<00:11:52.079> terrorist<00:11:52.880> and<00:11:53.120> his
accused of being a terrorist and his
accused of being a terrorist and his
parents<00:11:53.839> sent<00:11:54.079> him
parents sent him
parents sent him
on<00:11:55.279> his<00:11:55.519> own<00:11:56.079> to<00:11:56.320> britain<00:11:56.959> as<00:11:57.200> a<00:11:57.279> refugee
on his own to britain as a refugee
on his own to britain as a refugee
seeking<00:11:58.880> political<00:11:59.440> asylum<00:12:00.320> at<00:12:00.560> 13<00:12:01.519> with<00:12:01.760> only
seeking political asylum at 13 with only
seeking political asylum at 13 with only
little<00:12:02.880> english<00:12:03.440> and<00:12:03.600> being<00:12:03.839> bullied<00:12:04.240> at
little english and being bullied at
little english and being bullied at
school<00:12:05.120> he<00:12:05.360> escaped<00:12:05.920> into<00:12:06.160> a<00:12:06.320> world<00:12:06.639> of
school he escaped into a world of
school he escaped into a world of
computers<00:12:07.519> where<00:12:07.760> he<00:12:07.920> showed<00:12:08.320> great
computers where he showed great
computers where he showed great
technical<00:12:09.200> ability<00:12:10.079> but<00:12:10.320> he<00:12:10.480> was<00:12:10.720> soon<00:12:11.040> being
technical ability but he was soon being
technical ability but he was soon being
seduced<00:12:12.399> by<00:12:12.639> people<00:12:13.360> uh<00:12:13.760> on<00:12:13.920> the<00:12:14.079> internet<00:12:14.639> he
seduced by people uh on the internet he
seduced by people uh on the internet he
was<00:12:14.880> convicted<00:12:15.440> of<00:12:15.920> mortgage<00:12:16.399> and<00:12:16.480> credit
was convicted of mortgage and credit
was convicted of mortgage and credit
card<00:12:17.040> fraud<00:12:17.440> and<00:12:17.600> he<00:12:17.680> will<00:12:17.839> be<00:12:18.000> released<00:12:18.399> from
card fraud and he will be released from
card fraud and he will be released from
wormwood<00:12:19.279> scrubs<00:12:19.680> jail<00:12:20.000> in<00:12:20.079> london<00:12:20.720> in<00:12:21.200> 2012.
wormwood scrubs jail in london in 2012.
wormwood scrubs jail in london in 2012.
matrix<00:12:23.600> zero<00:12:24.000> zero<00:12:24.399> one<00:12:24.959> matrix
matrix zero zero one matrix
matrix zero zero one matrix
who<00:12:27.200> was<00:12:27.440> an<00:12:27.600> administrator<00:12:28.399> of<00:12:28.480> dark<00:12:28.800> market
who was an administrator of dark market
who was an administrator of dark market
born<00:12:29.920> in<00:12:30.079> southern<00:12:30.480> germany<00:12:30.880> to<00:12:31.120> a<00:12:31.200> stable<00:12:31.600> and
born in southern germany to a stable and
born in southern germany to a stable and
well<00:12:31.920> respected<00:12:32.560> middle<00:12:32.880> class<00:12:33.279> family<00:12:34.079> his
well respected middle class family his
well respected middle class family his
obsession<00:12:34.880> with<00:12:35.200> gaming<00:12:35.920> as<00:12:36.160> a<00:12:36.240> teenager<00:12:37.120> led
obsession with gaming as a teenager led
obsession with gaming as a teenager led
him<00:12:37.519> to<00:12:37.760> hacking<00:12:38.160> and<00:12:38.320> he<00:12:38.480> was<00:12:38.639> soon
him to hacking and he was soon
him to hacking and he was soon
controlling<00:12:40.000> huge<00:12:40.480> servers<00:12:41.279> around<00:12:41.600> the
controlling huge servers around the
controlling huge servers around the
world<00:12:42.399> where<00:12:42.560> he<00:12:42.800> stored<00:12:43.600> his<00:12:43.920> games<00:12:44.639> that<00:12:44.800> he
world where he stored his games that he
world where he stored his games that he
had<00:12:45.120> cracked<00:12:45.600> and<00:12:45.760> pirated<00:12:46.800> his<00:12:47.040> slide<00:12:47.680> into
had cracked and pirated his slide into
had cracked and pirated his slide into
criminality<00:12:49.040> was<00:12:49.519> incremental<00:12:50.639> and<00:12:50.720> when<00:12:50.880> he
criminality was incremental and when he
criminality was incremental and when he
finally<00:12:51.440> woke<00:12:51.760> up<00:12:52.000> to<00:12:52.399> his<00:12:52.639> situation<00:12:53.680> and
finally woke up to his situation and
finally woke up to his situation and
understood<00:12:54.320> the<00:12:54.480> implications<00:12:55.440> he<00:12:55.600> was
understood the implications he was
understood the implications he was
already<00:12:56.320> in
already in
already in
too<00:12:57.360> deep
too deep
too deep
max<00:12:58.480> vision<00:12:59.040> aka<00:12:59.680> iceman<00:13:00.560> mastermind<00:13:01.600> of
max vision aka iceman mastermind of
max vision aka iceman mastermind of
carder's<00:13:02.320> market<00:13:02.880> born<00:13:03.120> in<00:13:03.279> meridian<00:13:03.920> idaho
carder's market born in meridian idaho
carder's market born in meridian idaho
max<00:13:05.360> vision<00:13:06.000> was<00:13:06.240> one<00:13:06.399> of<00:13:06.560> the<00:13:06.720> best
max vision was one of the best
max vision was one of the best
penetration<00:13:08.160> testers<00:13:08.959> working<00:13:09.360> out<00:13:09.519> of<00:13:09.600> santa
penetration testers working out of santa
penetration testers working out of santa
clara<00:13:10.399> california
clara california
clara california
in<00:13:11.839> the<00:13:12.000> late<00:13:12.240> 90s<00:13:12.720> for<00:13:13.040> private<00:13:13.440> companies
in the late 90s for private companies
in the late 90s for private companies
and<00:13:14.240> voluntarily
and voluntarily
and voluntarily
for<00:13:15.839> the<00:13:16.320> fbi<00:13:16.959> now<00:13:17.120> in<00:13:17.200> the<00:13:17.279> late<00:13:17.519> 1990s<00:13:18.399> he
for the fbi now in the late 1990s he
for the fbi now in the late 1990s he
discovered<00:13:19.120> a<00:13:19.200> vulnerability<00:13:20.320> on<00:13:20.639> all<00:13:21.360> u.s
discovered a vulnerability on all u.s
discovered a vulnerability on all u.s
government<00:13:22.959> networks<00:13:24.160> and<00:13:24.320> he<00:13:24.560> went<00:13:24.880> in<00:13:25.120> and
government networks and he went in and
government networks and he went in and
patched<00:13:25.760> it<00:13:25.920> up<00:13:26.079> because<00:13:26.399> this<00:13:26.720> included
patched it up because this included
patched it up because this included
nuclear<00:13:27.680> research<00:13:28.160> facilities<00:13:29.279> sparing<00:13:29.839> the
nuclear research facilities sparing the
nuclear research facilities sparing the
american<00:13:30.639> government<00:13:31.519> a<00:13:31.839> huge<00:13:32.560> security
american government a huge security
american government a huge security
embarrassment<00:13:33.920> but<00:13:34.079> also<00:13:34.639> because<00:13:34.959> he<00:13:35.040> was<00:13:35.200> an
embarrassment but also because he was an
embarrassment but also because he was an
investor<00:13:35.680> at<00:13:35.839> hacker<00:13:36.399> he<00:13:36.560> left<00:13:36.800> a<00:13:36.880> tiny
investor at hacker he left a tiny
investor at hacker he left a tiny
digital
digital
digital
wormhole<00:13:38.880> through<00:13:39.120> which<00:13:39.360> he<00:13:39.600> alone<00:13:40.000> could
wormhole through which he alone could
wormhole through which he alone could
crawl<00:13:40.959> but<00:13:41.120> this<00:13:41.279> was<00:13:41.600> spotted<00:13:42.000> by<00:13:42.160> an<00:13:42.320> eagle
crawl but this was spotted by an eagle
crawl but this was spotted by an eagle
eye<00:13:42.800> investigator<00:13:43.760> and<00:13:43.920> he<00:13:44.079> was<00:13:44.240> convicted<00:13:45.279> at
eye investigator and he was convicted at
eye investigator and he was convicted at
his<00:13:45.600> open<00:13:46.000> prison<00:13:46.320> he<00:13:46.560> came<00:13:46.880> under<00:13:47.360> the
his open prison he came under the
his open prison he came under the
influence<00:13:48.160> of<00:13:48.480> financial<00:13:49.120> fraudsters<00:13:50.160> and
influence of financial fraudsters and
influence of financial fraudsters and
those<00:13:50.560> financial<00:13:51.120> fraudsters<00:13:51.600> persuaded<00:13:52.160> him
those financial fraudsters persuaded him
those financial fraudsters persuaded him
to<00:13:52.560> work<00:13:52.880> for<00:13:53.040> them<00:13:53.600> on<00:13:53.839> his<00:13:54.399> uh<00:13:54.800> release<00:13:55.680> and
to work for them on his uh release and
to work for them on his uh release and
this<00:13:56.480> man<00:13:56.880> with<00:13:57.199> a<00:13:57.360> planetary<00:13:58.079> sized<00:13:58.480> brain<00:13:59.199> is
this man with a planetary sized brain is
this man with a planetary sized brain is
now<00:13:59.519> serving<00:13:59.920> a<00:14:00.079> 13-year<00:14:00.800> sentence<00:14:01.680> in
now serving a 13-year sentence in
now serving a 13-year sentence in
california<00:14:03.040> adewale<00:14:03.760> taiwa<00:14:04.320> aka<00:14:04.959> freddie
california adewale taiwa aka freddie
california adewale taiwa aka freddie
bibi<00:14:05.839> master<00:14:06.480> bank<00:14:06.959> account<00:14:07.360> cracker<00:14:07.920> from
bibi master bank account cracker from
bibi master bank account cracker from
abuja<00:14:08.959> in<00:14:09.199> nigeria<00:14:10.320> he<00:14:10.639> set<00:14:10.880> up<00:14:11.279> his<00:14:11.760> presently
abuja in nigeria he set up his presently
abuja in nigeria he set up his presently
entitled<00:14:13.120> news<00:14:13.440> group<00:14:13.920> bank<00:14:14.160> frauds<00:14:14.639> at
entitled news group bank frauds at
entitled news group bank frauds at
dot<00:14:15.519> co<00:14:15.760> dot<00:14:16.000> uk
before<00:14:19.760> arriving<00:14:20.399> in<00:14:20.560> britain<00:14:21.040> in<00:14:21.639> 2005<00:14:22.720> to
before arriving in britain in 2005 to
before arriving in britain in 2005 to
take<00:14:23.120> a<00:14:23.279> masters<00:14:23.760> in<00:14:23.920> chemical<00:14:24.320> engineering
take a masters in chemical engineering
take a masters in chemical engineering
at<00:14:24.959> manchester<00:14:25.440> university<00:14:26.399> he<00:14:26.639> impressed<00:14:27.440> in
at manchester university he impressed in
at manchester university he impressed in
the<00:14:27.760> private<00:14:28.320> sector<00:14:29.199> developing<00:14:30.160> chemical
the private sector developing chemical
the private sector developing chemical
applications<00:14:31.440> for<00:14:31.600> the<00:14:32.079> oil<00:14:32.480> industry<00:14:32.880> while
applications for the oil industry while
applications for the oil industry while
simultaneously<00:14:34.000> running<00:14:34.240> a<00:14:34.320> worldwide<00:14:34.880> bank
simultaneously running a worldwide bank
simultaneously running a worldwide bank
and<00:14:35.279> credit<00:14:35.600> card<00:14:35.839> fraud<00:14:36.480> operation<00:14:36.959> that<00:14:37.120> was
and credit card fraud operation that was
and credit card fraud operation that was
worth<00:14:37.519> millions<00:14:38.000> until<00:14:38.320> his<00:14:38.480> arrest<00:14:39.199> in<00:14:39.440> 2008.
worth millions until his arrest in 2008.
worth millions until his arrest in 2008.
and<00:14:41.680> then<00:14:42.000> finally<00:14:42.480> chateau<00:14:43.040> eviapan<00:14:43.760> aka
and then finally chateau eviapan aka
and then finally chateau eviapan aka
chao<00:14:45.199> one<00:14:45.360> of<00:14:45.440> the<00:14:45.519> most<00:14:45.839> remarkable<00:14:46.480> hackers
chao one of the most remarkable hackers
chao one of the most remarkable hackers
ever<00:14:47.199> from<00:14:47.440> ankara<00:14:48.399> in<00:14:48.639> turkey<00:14:49.360> he<00:14:49.600> combines
ever from ankara in turkey he combines
ever from ankara in turkey he combines
the<00:14:50.480> tremendous<00:14:51.440> skills<00:14:52.079> of<00:14:52.240> a<00:14:52.399> geek<00:14:53.120> with<00:14:53.680> the
the tremendous skills of a geek with the
the tremendous skills of a geek with the
suave<00:14:54.959> social<00:14:55.440> engineering<00:14:56.160> skills<00:14:57.120> of<00:14:57.600> the
suave social engineering skills of the
suave social engineering skills of the
master<00:14:58.800> uh<00:14:59.040> criminal<00:14:59.360> one<00:14:59.600> of<00:14:59.680> the<00:14:59.760> smartest
master uh criminal one of the smartest
master uh criminal one of the smartest
people<00:15:01.040> uh<00:15:01.279> i've<00:15:01.600> ever<00:15:01.839> met<00:15:02.399> he<00:15:02.639> also<00:15:02.959> had<00:15:03.120> the
people uh i've ever met he also had the
people uh i've ever met he also had the
most<00:15:03.600> effective<00:15:04.240> virtual<00:15:04.720> private<00:15:05.199> network
most effective virtual private network
most effective virtual private network
security<00:15:06.320> arrangement<00:15:07.120> the<00:15:07.279> police<00:15:07.680> have
security arrangement the police have
security arrangement the police have
ever<00:15:08.079> encountered<00:15:09.040> amongst<00:15:09.760> global<00:15:10.240> cyber
ever encountered amongst global cyber
ever encountered amongst global cyber
criminals<00:15:11.040> now<00:15:11.519> the<00:15:11.760> important<00:15:12.320> thing<00:15:13.040> about
criminals now the important thing about
criminals now the important thing about
all<00:15:13.760> of<00:15:13.920> these<00:15:14.240> people<00:15:14.959> is<00:15:15.120> they<00:15:15.360> share
all of these people is they share
all of these people is they share
certain<00:15:16.079> characteristics<00:15:16.959> despite<00:15:17.440> the<00:15:17.519> fact
certain characteristics despite the fact
certain characteristics despite the fact
that<00:15:17.839> they<00:15:18.000> come<00:15:18.240> from<00:15:18.480> very<00:15:18.800> different
that they come from very different
that they come from very different
environments<00:15:20.880> they<00:15:21.120> are<00:15:21.440> all<00:15:22.240> people<00:15:22.560> who
environments they are all people who
environments they are all people who
learnt<00:15:22.959> their<00:15:23.120> hacking<00:15:23.519> skills<00:15:24.000> in<00:15:24.160> their
learnt their hacking skills in their
learnt their hacking skills in their
early<00:15:24.880> to<00:15:25.040> mid<00:15:25.440> teens
early to mid teens
early to mid teens
they<00:15:27.199> are<00:15:27.519> all
they are all
they are all
people<00:15:28.639> who<00:15:28.880> demonstrate<00:15:29.440> advanced<00:15:30.000> ability
people who demonstrate advanced ability
people who demonstrate advanced ability
in<00:15:30.959> maths<00:15:31.600> and<00:15:32.000> the<00:15:32.160> sciences<00:15:33.279> remember<00:15:33.680> when
in maths and the sciences remember when
in maths and the sciences remember when
they<00:15:34.079> develop<00:15:34.560> those<00:15:34.800> hacking<00:15:35.199> skills<00:15:35.920> their
they develop those hacking skills their
they develop those hacking skills their
moral<00:15:36.560> compass<00:15:37.360> had<00:15:37.600> not<00:15:37.920> yet<00:15:38.560> developed<00:15:39.600> and
moral compass had not yet developed and
moral compass had not yet developed and
most<00:15:40.240> of<00:15:40.320> them<00:15:40.480> with<00:15:40.639> the<00:15:40.800> exception<00:15:41.360> of
most of them with the exception of
most of them with the exception of
script<00:15:42.000> and<00:15:42.240> chow<00:15:43.040> well<00:15:43.760> they
script and chow well they
script and chow well they
did<00:15:44.959> not
did not
did not
demonstrate<00:15:46.639> any<00:15:47.199> real<00:15:47.680> social<00:15:48.160> skills<00:15:48.720> in
demonstrate any real social skills in
demonstrate any real social skills in
the<00:15:48.959> outside<00:15:49.519> world<00:15:50.240> only<00:15:51.120> on<00:15:51.519> the<00:15:51.680> web<00:15:52.000> and
the outside world only on the web and
the outside world only on the web and
the<00:15:52.240> other<00:15:52.480> thing<00:15:52.720> is<00:15:52.959> is<00:15:53.440> the<00:15:53.680> high<00:15:54.000> incidence
the other thing is is the high incidence
the other thing is is the high incidence
of<00:15:54.639> hackers<00:15:55.120> like<00:15:55.360> these<00:15:56.000> who<00:15:56.240> have
of hackers like these who have
of hackers like these who have
characteristics<00:15:57.600> which<00:15:57.839> are<00:15:58.000> consistent
characteristics which are consistent
characteristics which are consistent
with<00:15:59.360> asperger's<00:16:00.560> syndrome<00:16:01.360> now<00:16:01.600> i<00:16:01.920> discussed
with asperger's syndrome now i discussed
with asperger's syndrome now i discussed
this<00:16:03.040> with<00:16:03.279> professor<00:16:04.079> simon<00:16:04.399> baron<00:16:04.800> cohen
this with professor simon baron cohen
this with professor simon baron cohen
who's<00:16:05.440> the<00:16:05.519> professor<00:16:05.920> of<00:16:06.079> developmental
who's the professor of developmental
who's the professor of developmental
psychopathology<00:16:08.240> at
psychopathology at
psychopathology at
cambridge<00:16:09.680> and<00:16:09.759> he<00:16:10.000> has<00:16:10.160> done<00:16:10.720> path-breaking
cambridge and he has done path-breaking
cambridge and he has done path-breaking
work<00:16:12.160> on<00:16:12.480> autism<00:16:13.519> and<00:16:13.759> confirmed<00:16:14.639> also<00:16:15.040> for
work on autism and confirmed also for
work on autism and confirmed also for
the<00:16:15.279> authorities<00:16:15.920> here<00:16:16.240> that<00:16:16.480> gary<00:16:16.800> mckinnon
the authorities here that gary mckinnon
the authorities here that gary mckinnon
who<00:16:18.240> was<00:16:18.639> who<00:16:18.880> is<00:16:19.040> wanted<00:16:19.440> by<00:16:19.600> the<00:16:19.680> united
who was who is wanted by the united
who was who is wanted by the united
states<00:16:20.399> for<00:16:20.560> hacking<00:16:20.880> into<00:16:21.120> the<00:16:21.519> to<00:16:21.680> the
states for hacking into the to the
states for hacking into the to the
pentagon<00:16:22.480> suffers<00:16:22.880> from<00:16:23.040> expert<00:16:23.600> asperger's
pentagon suffers from expert asperger's
pentagon suffers from expert asperger's
and<00:16:24.399> the<00:16:24.480> secondary<00:16:25.040> condition<00:16:26.000> of
and the secondary condition of
and the secondary condition of
depression<00:16:27.519> and<00:16:27.759> baron<00:16:28.160> cohen<00:16:28.639> explained
depression and baron cohen explained
depression and baron cohen explained
that<00:16:29.839> certain<00:16:30.560> disabilities<00:16:31.360> can<00:16:31.519> manifest
that certain disabilities can manifest
that certain disabilities can manifest
themselves<00:16:32.800> in<00:16:32.880> the<00:16:33.040> hacking<00:16:33.440> and<00:16:33.600> computing
themselves in the hacking and computing
themselves in the hacking and computing
world<00:16:34.800> as<00:16:35.120> tremendous<00:16:35.759> skills<00:16:36.240> and<00:16:36.320> that<00:16:36.480> we
world as tremendous skills and that we
world as tremendous skills and that we
should<00:16:36.959> not<00:16:37.199> be<00:16:37.440> throwing<00:16:37.839> in<00:16:38.079> jail<00:16:38.800> people
should not be throwing in jail people
should not be throwing in jail people
who<00:16:39.360> have<00:16:39.600> such<00:16:39.920> disabilities<00:16:41.199> and<00:16:41.440> skills
who have such disabilities and skills
who have such disabilities and skills
because<00:16:42.560> they<00:16:42.720> have<00:16:42.880> lost<00:16:43.199> their<00:16:43.440> way
because they have lost their way
because they have lost their way
socially<00:16:44.880> or<00:16:45.199> been<00:16:45.519> duped<00:16:46.480> now<00:16:46.720> i<00:16:46.959> think<00:16:47.279> we're
socially or been duped now i think we're
socially or been duped now i think we're
missing<00:16:48.320> a<00:16:48.399> trick<00:16:48.800> here<00:16:49.360> because<00:16:49.680> i<00:16:49.839> don't
missing a trick here because i don't
missing a trick here because i don't
think<00:16:50.320> people<00:16:50.560> like<00:16:50.800> max<00:16:51.120> vision<00:16:51.759> should<00:16:52.000> be
think people like max vision should be
think people like max vision should be
in<00:16:52.320> jail<00:16:52.639> and<00:16:52.720> let<00:16:52.880> me<00:16:53.040> be<00:16:53.279> blunt<00:16:53.600> about<00:16:53.920> this
in jail and let me be blunt about this
in jail and let me be blunt about this
in<00:16:54.720> china<00:16:55.360> in<00:16:55.519> russia<00:16:56.000> and<00:16:56.160> in<00:16:56.399> loads<00:16:56.639> of<00:16:56.800> other
in china in russia and in loads of other
in china in russia and in loads of other
countries<00:16:57.360> that<00:16:57.600> are<00:16:57.680> developing<00:16:58.560> cyber
countries that are developing cyber
countries that are developing cyber
offensive<00:16:59.600> capabilities<00:17:00.560> this<00:17:00.800> is<00:17:01.040> exactly
offensive capabilities this is exactly
offensive capabilities this is exactly
what<00:17:01.839> they<00:17:02.079> are<00:17:02.160> doing
what they are doing
what they are doing
they<00:17:03.279> are<00:17:03.440> recruiting<00:17:04.079> hackers<00:17:04.799> both<00:17:05.120> before
they are recruiting hackers both before
they are recruiting hackers both before
and<00:17:05.919> after<00:17:06.240> they<00:17:06.480> become<00:17:06.959> involved<00:17:07.360> in
and after they become involved in
and after they become involved in
criminal<00:17:08.160> and<00:17:08.319> industrial<00:17:08.959> espionage
criminal and industrial espionage
criminal and industrial espionage
activities<00:17:10.880> and<00:17:11.120> mobilizing<00:17:11.839> them<00:17:12.400> on<00:17:12.559> behalf
activities and mobilizing them on behalf
activities and mobilizing them on behalf
of<00:17:13.520> the<00:17:13.679> state
of the state
of the state
we<00:17:14.799> need<00:17:15.039> to<00:17:15.199> engage<00:17:16.079> and<00:17:16.319> find<00:17:16.799> ways<00:17:17.600> of
we need to engage and find ways of
we need to engage and find ways of
offering<00:17:18.400> guidance<00:17:19.120> to<00:17:19.280> these<00:17:19.600> young<00:17:19.919> people
offering guidance to these young people
offering guidance to these young people
because<00:17:20.640> they<00:17:20.880> are<00:17:21.039> a<00:17:21.199> remarkable<00:17:21.919> breed<00:17:22.720> and
because they are a remarkable breed and
because they are a remarkable breed and
if<00:17:23.039> we<00:17:23.199> rely<00:17:23.600> as<00:17:23.760> we<00:17:23.919> do<00:17:24.160> at<00:17:24.240> the<00:17:24.319> moment<00:17:24.799> solely
if we rely as we do at the moment solely
if we rely as we do at the moment solely
on<00:17:25.679> the<00:17:25.839> criminal<00:17:26.319> justice<00:17:26.799> system<00:17:27.520> and<00:17:27.679> the
on the criminal justice system and the
on the criminal justice system and the
threat<00:17:28.400> of<00:17:28.640> punitive<00:17:29.280> sentences<00:17:30.400> we<00:17:30.559> will<00:17:30.799> be
threat of punitive sentences we will be
threat of punitive sentences we will be
nurturing<00:17:31.600> a<00:17:31.679> monster<00:17:32.480> we<00:17:32.799> cannot<00:17:33.360> tame
nurturing a monster we cannot tame
nurturing a monster we cannot tame
thank<00:17:34.400> you<00:17:34.559> very<00:17:34.799> much<00:17:34.960> for<00:17:35.120> listening
so<00:17:46.799> um
so um
so um
so<00:17:48.720> your<00:17:48.960> idea<00:17:49.200> we're<00:17:49.440> spreading<00:17:49.919> is
so your idea we're spreading is
so your idea we're spreading is
higher<00:17:50.880> hackers
higher hackers
higher hackers
how
how
how
how<00:17:54.240> would<00:17:54.480> someone<00:17:54.960> get<00:17:55.120> over<00:17:55.360> the<00:17:55.679> kind<00:17:55.840> of
how would someone get over the kind of
how would someone get over the kind of
fear<00:17:56.480> that<00:17:56.799> the<00:17:56.960> hacker<00:17:57.280> they<00:17:57.440> hire<00:17:57.840> might
fear that the hacker they hire might
fear that the hacker they hire might
preserve<00:17:58.799> that<00:17:58.960> little<00:17:59.440> teensy<00:17:59.840> wormhole
preserve that little teensy wormhole
preserve that little teensy wormhole
i<00:18:01.280> think
i think
i think
to<00:18:02.480> an<00:18:02.640> extent<00:18:03.039> you<00:18:03.200> have<00:18:03.360> to<00:18:03.520> understand<00:18:03.840> that
to an extent you have to understand that
to an extent you have to understand that
it's<00:18:04.160> axiomatic<00:18:04.880> among<00:18:05.520> hackers<00:18:06.080> that<00:18:06.240> they
it's axiomatic among hackers that they
it's axiomatic among hackers that they
do<00:18:06.720> that<00:18:07.520> they<00:18:07.919> are
do that they are
do that they are
you<00:18:08.880> know<00:18:09.039> they're<00:18:09.200> just<00:18:09.440> relentless<00:18:10.080> and
you know they're just relentless and
you know they're just relentless and
obsessive<00:18:11.039> about<00:18:11.440> what<00:18:11.679> they<00:18:12.000> do
obsessive about what they do
obsessive about what they do
but<00:18:13.120> all<00:18:13.360> of<00:18:13.520> the<00:18:13.679> people<00:18:14.000> who<00:18:14.160> i've<00:18:14.400> spoken<00:18:14.720> to
but all of the people who i've spoken to
but all of the people who i've spoken to
who've<00:18:15.120> fallen<00:18:15.520> foul<00:18:15.840> of<00:18:16.000> the<00:18:16.160> law<00:18:16.880> they<00:18:17.039> have
who've fallen foul of the law they have
who've fallen foul of the law they have
all<00:18:17.520> said<00:18:18.000> please<00:18:18.480> please<00:18:18.960> give<00:18:19.200> us<00:18:19.360> a<00:18:19.520> chance
all said please please give us a chance
all said please please give us a chance
to<00:18:20.480> work<00:18:20.799> in<00:18:20.880> the<00:18:21.039> legitimate<00:18:21.760> industry<00:18:22.480> we
to work in the legitimate industry we
to work in the legitimate industry we
just<00:18:22.880> never<00:18:23.280> knew<00:18:23.600> how<00:18:23.840> to<00:18:24.000> get<00:18:24.240> there<00:18:24.480> what<00:18:24.720> we
just never knew how to get there what we
just never knew how to get there what we
were<00:18:25.120> doing<00:18:25.760> we<00:18:26.000> want<00:18:26.320> to<00:18:26.480> work<00:18:26.880> with<00:18:27.120> you<00:18:28.240> okay
were doing we want to work with you okay
were doing we want to work with you okay
well<00:18:28.720> that<00:18:28.880> makes<00:18:29.120> sense<00:18:29.679> thanks<00:18:29.919> a<00:18:30.000> lot
Misha Glenny, coder, hacker, cybersecurity, TED, TED-Ed, TED, Ed, TEDEducation