All language subtitles for VICE S05E27 Russian Hacking & Contagion

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian Download
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,155 --> 00:00:03,586 This week on "Vice," 2 00:00:03,621 --> 00:00:06,022 a deep dive into Russian hacking. 3 00:00:14,783 --> 00:00:17,132 Is there any personal information of mine 4 00:00:17,169 --> 00:00:18,768 that you couldn't have gotten access to? 5 00:00:18,803 --> 00:00:22,138 If someone wants to hack you, they're gonna be able to. 6 00:00:22,173 --> 00:00:24,140 And then, the race to stop 7 00:00:24,175 --> 00:00:25,809 the next global pandemic. 8 00:00:25,923 --> 00:00:28,658 We are walking into the Zika Forest. 9 00:00:28,694 --> 00:00:31,060 There are mosquitoes flying all around me right now. 10 00:00:31,095 --> 00:00:32,695 Doesn't fill me with warm and fuzzies. 11 00:00:33,765 --> 00:00:35,832 Outbreaks are inevitable, 12 00:00:35,868 --> 00:00:37,701 pandemics are optional. 13 00:00:44,241 --> 00:00:45,542 Go, go, go! 14 00:00:48,246 --> 00:00:49,978 We are not animals! 15 00:01:01,525 --> 00:01:03,393 Russia's been in the news a lot lately 16 00:01:03,427 --> 00:01:07,296 for allegedly hacking the 2016 US election. 17 00:01:07,331 --> 00:01:08,664 The Russian government pursued 18 00:01:08,700 --> 00:01:10,599 a multi-faceted influence campaign 19 00:01:10,635 --> 00:01:12,134 in the run-up to the election, 20 00:01:12,170 --> 00:01:15,103 including aggressive use of cyber-capabilities. 21 00:01:15,138 --> 00:01:16,673 Russian cyber-criminals 22 00:01:16,707 --> 00:01:19,375 have been accused of everything from digital bank robberies 23 00:01:19,411 --> 00:01:21,944 to tampering with critical infrastructure. 24 00:01:21,978 --> 00:01:24,379 So we sent Gianna Toboni to investigate 25 00:01:24,414 --> 00:01:26,448 the severity of this growing threat. 26 00:01:41,432 --> 00:01:43,432 We're about an hour outside of Portland, Maine. 27 00:01:43,466 --> 00:01:45,567 It's a pretty rural part of the state, 28 00:01:45,603 --> 00:01:48,204 and we're heading into this Sheriff's Department, 29 00:01:48,239 --> 00:01:49,604 because they've been hacked, 30 00:01:49,640 --> 00:01:52,875 along with every other police department in the county. 31 00:01:52,909 --> 00:01:55,643 This is the office where we received the virus. 32 00:01:55,677 --> 00:01:58,146 Um, it was downloaded from an e-mail, 33 00:01:58,180 --> 00:02:00,013 um, right here at this terminal. 34 00:02:00,049 --> 00:02:02,483 We didn't know anything had happened until, again, 35 00:02:02,518 --> 00:02:03,818 the system started to slow down. 36 00:02:03,853 --> 00:02:06,987 Files weren't accessible, we started getting error messages. 37 00:02:07,022 --> 00:02:09,022 This is a copy 38 00:02:09,058 --> 00:02:11,793 of the ransom information. 39 00:02:11,828 --> 00:02:14,962 Now, right on the top here it has "Cryptowall 3.0." 40 00:02:14,997 --> 00:02:16,730 It was a readme-type file. 41 00:02:16,766 --> 00:02:19,199 Um... don't ask me to explain that. 42 00:02:19,235 --> 00:02:20,735 Um, "What does this mean? 43 00:02:20,771 --> 00:02:23,704 This means that the structure and data within your files 44 00:02:23,740 --> 00:02:26,074 have been irrevocably changed, 45 00:02:26,109 --> 00:02:28,709 um, and you won't be able to work with them, 46 00:02:28,745 --> 00:02:30,478 read them, or see them." 47 00:02:30,513 --> 00:02:32,579 What did you end up doing after you read this? 48 00:02:32,615 --> 00:02:35,283 We ended up clicking on the... 49 00:02:35,317 --> 00:02:38,286 the IT folks went to the, um... 50 00:02:38,320 --> 00:02:40,954 the http address, 51 00:02:40,990 --> 00:02:42,423 and were able to locate 52 00:02:42,457 --> 00:02:45,725 the request for ransom 53 00:02:45,762 --> 00:02:48,663 that they were asking for in bitcoin. 54 00:02:48,698 --> 00:02:50,129 I'd never heard of a bitcoin... 55 00:02:50,165 --> 00:02:52,667 ... at that point, myself. You know what I mean? 56 00:02:52,701 --> 00:02:55,169 You know, we're a law enforcement agency, right? 57 00:02:55,204 --> 00:02:56,569 And my first reaction was, 58 00:02:56,605 --> 00:02:59,407 "I'll be damned if I pay ransom." 59 00:02:59,442 --> 00:03:01,509 It's the cardinal rule, right? Never negotiate. 60 00:03:01,544 --> 00:03:03,343 We're the police, you can't ransom us. 61 00:03:03,378 --> 00:03:07,213 Which, uh, obviously I had a rude awakening there, 62 00:03:07,248 --> 00:03:08,747 and actually, I was really surprised 63 00:03:08,783 --> 00:03:11,050 when our IT folks recommended that... 64 00:03:11,086 --> 00:03:11,985 that we pay the ransom. 65 00:03:12,021 --> 00:03:14,621 We've made several changes since then, 66 00:03:14,656 --> 00:03:16,389 and we were not successful. 67 00:03:16,425 --> 00:03:19,693 Another e-mail came through, and low and behold, 68 00:03:19,728 --> 00:03:22,429 we started to experience the problem again. 69 00:03:22,463 --> 00:03:23,896 You guys paid twice. 70 00:03:23,932 --> 00:03:26,432 What makes you think these hackers won't come back again? 71 00:03:26,467 --> 00:03:30,236 We've been fortunate not to have encountered the virus again, 72 00:03:30,271 --> 00:03:32,671 but I'm not kidding myself. 73 00:03:32,707 --> 00:03:34,674 I don't believe we're a hundred percent immune. 74 00:03:34,710 --> 00:03:37,978 A cyber-attack has spread to every corner of the world. 75 00:03:38,013 --> 00:03:40,646 Lincoln County, Maine, is not alone. 76 00:03:40,682 --> 00:03:43,415 Across the country, thousands of police stations, 77 00:03:43,451 --> 00:03:45,183 hospitals, and businesses, 78 00:03:45,219 --> 00:03:47,252 have been hit by ransomware attacks. 79 00:03:47,288 --> 00:03:48,555 In 2016 alone, 80 00:03:48,590 --> 00:03:50,923 Americans paid close to a billion dollars 81 00:03:50,959 --> 00:03:52,391 in digital ransom. 82 00:03:52,426 --> 00:03:54,192 This massive uptick in attacks 83 00:03:54,228 --> 00:03:56,795 has the Department of Homeland Security on high alert. 84 00:03:56,831 --> 00:03:59,211 We went to their National Cybersecurity 85 00:03:59,212 --> 00:04:01,199 & Communications Integration Center 86 00:04:01,235 --> 00:04:03,669 to see just how dire the situation is. 87 00:04:07,307 --> 00:04:09,074 Thank you. 88 00:04:09,110 --> 00:04:13,045 So, in order to get into this control room here, 89 00:04:13,081 --> 00:04:15,814 yeah, we've got to leave our phones behind. 90 00:04:15,850 --> 00:04:18,216 Ultra secure in here. 91 00:04:20,086 --> 00:04:21,353 Wow. 92 00:04:22,523 --> 00:04:24,622 So, this is our main watch-floor 93 00:04:24,658 --> 00:04:26,124 for the National Cybersecurity 94 00:04:26,158 --> 00:04:28,093 & Communications Integration Center. 95 00:04:28,127 --> 00:04:31,596 And this is where we have our 24/7 watch operations 96 00:04:31,632 --> 00:04:34,165 looking for threats and incidents 97 00:04:34,201 --> 00:04:35,701 across the federal government 98 00:04:35,735 --> 00:04:39,004 and in our critical infrastructures domestically. 99 00:04:39,038 --> 00:04:41,238 - We're hearing a lot about ransomware. - Mm-hmm. 100 00:04:41,274 --> 00:04:42,875 - Are you concerned about that? - Yes. 101 00:04:42,909 --> 00:04:46,745 Ransomware has expanded significantly. 102 00:04:46,781 --> 00:04:51,415 Existing organizations are now taking advantage of the Internet. 103 00:04:51,451 --> 00:04:53,951 What is the nature of the type of hacking 104 00:04:53,985 --> 00:04:55,386 that we see in the US 105 00:04:55,422 --> 00:04:57,922 that originates in Russian-speaking countries? 106 00:04:57,956 --> 00:05:01,125 Everything from cyber-criminals, 107 00:05:01,160 --> 00:05:05,095 um, to more organized capabilities, 108 00:05:05,130 --> 00:05:09,300 and the Russian influence in our election process. 109 00:05:09,334 --> 00:05:12,101 We put out, um, 110 00:05:12,137 --> 00:05:15,773 what we call a joint-analysis report back in December. 111 00:05:15,809 --> 00:05:18,341 This report was the first time government officials 112 00:05:18,377 --> 00:05:21,745 published evidence of the 2016 Russian election hack, 113 00:05:21,781 --> 00:05:23,814 which showed Russia's ability to penetrate 114 00:05:23,848 --> 00:05:25,581 major American networks. 115 00:05:25,617 --> 00:05:29,153 To understand why Russia has become such a hub for hacking, 116 00:05:29,187 --> 00:05:30,687 we traveled to Moscow. 117 00:05:41,433 --> 00:05:44,067 Andrei Soldatov is an investigative journalist 118 00:05:44,103 --> 00:05:46,170 who recently wrote a definitive account 119 00:05:46,204 --> 00:05:48,137 of Russia's cyber-espionage. 120 00:05:48,173 --> 00:05:49,605 Of course, it was huge news in the US 121 00:05:49,641 --> 00:05:52,242 when the DNC and Clinton campaign e-mails were hacked, 122 00:05:52,278 --> 00:05:55,545 but is there really any evidence to show that direct link? 123 00:06:03,822 --> 00:06:05,521 And how do we know that? 124 00:06:11,096 --> 00:06:13,196 So you can say with certainty that those hackers 125 00:06:13,230 --> 00:06:15,632 were working with the Russian government? 126 00:07:17,995 --> 00:07:20,394 To actually see Russian hacking at work, 127 00:07:20,430 --> 00:07:21,663 we went to one of the country's 128 00:07:21,699 --> 00:07:23,699 biggest gatherings of hackers. 129 00:07:25,401 --> 00:07:28,202 Welcome to Russia's biggest cyber-security conference. 130 00:07:28,237 --> 00:07:31,139 You have guys who are hacking into ATM machines right here, 131 00:07:31,175 --> 00:07:33,207 into BMWs, Teslas. 132 00:07:33,242 --> 00:07:35,742 The average age here is probably 25, 26. 133 00:07:35,778 --> 00:07:39,112 You have teenagers. Everyone seems to be under 30. 134 00:07:41,350 --> 00:07:43,550 Cyber-security expert and even organizer, 135 00:07:43,586 --> 00:07:45,920 Andrew Bershadsky, showed us around. 136 00:08:08,954 --> 00:08:10,410 All right, so what are you excited about here? 137 00:08:10,411 --> 00:08:11,677 Can you show me some things? 138 00:09:03,998 --> 00:09:05,807 So, what's their angle? If they attack this, 139 00:09:05,808 --> 00:09:06,908 what do they want to happen? 140 00:09:30,756 --> 00:09:32,724 We wanted to see hacking in real-time, 141 00:09:32,759 --> 00:09:35,259 so we asked former NSA hacker, Patrick Wardle, 142 00:09:35,296 --> 00:09:37,696 and his associate, Mikhail Sosonkin, 143 00:09:37,730 --> 00:09:40,231 to put my personal cyber-security to the test. 144 00:09:40,267 --> 00:09:42,533 Well, you know, this was your first hacker conference, 145 00:09:42,570 --> 00:09:45,870 and we really wanted to make the experience very authentic, 146 00:09:45,905 --> 00:09:47,905 so we decided to just 147 00:09:47,941 --> 00:09:50,974 hack you in as many ways as possible. 148 00:09:51,009 --> 00:09:53,110 While I thought our crew was filming background footage, 149 00:09:53,144 --> 00:09:56,813 they were in fact capturing me getting hacked. 150 00:09:56,849 --> 00:09:59,683 Generally, there's two main ways to hack people: 151 00:09:59,719 --> 00:10:01,918 Remotely and with physical access. 152 00:10:01,953 --> 00:10:05,355 Um, so we designed some attacks to do both of these. 153 00:10:05,390 --> 00:10:08,057 Basically, we set up wireless access points 154 00:10:08,094 --> 00:10:11,261 and we made it look like it was a hotel Wi-Fi. 155 00:10:11,297 --> 00:10:13,062 But it was, like, a little thing that suggested 156 00:10:13,099 --> 00:10:15,032 the correct one... it says "guest." 157 00:10:15,067 --> 00:10:17,032 So you probably thought that that's the one 158 00:10:17,033 --> 00:10:18,802 - you should be connecting to. - Oh, wow. 159 00:10:18,836 --> 00:10:20,303 So, when you connected to it, 160 00:10:20,340 --> 00:10:21,639 everything you entered in there, 161 00:10:21,673 --> 00:10:23,740 like your last name, your room number, 162 00:10:23,775 --> 00:10:25,808 we basically collected that. 163 00:10:25,845 --> 00:10:28,611 Hotel room numbers... it's kind of what hotels use 164 00:10:28,647 --> 00:10:30,679 - as an authentication key. - Oh, my God. 165 00:10:30,716 --> 00:10:32,446 And with that, then we were able 166 00:10:32,447 --> 00:10:34,217 to pull off a social engineering attack, 167 00:10:34,253 --> 00:10:36,653 which gave us a copy of your room key. 168 00:10:37,623 --> 00:10:38,621 Good afternoon. 169 00:10:38,657 --> 00:10:41,825 Could you print another key for my room, please? 170 00:10:41,860 --> 00:10:44,861 We needed someone to impersonate you, essentially, 171 00:10:44,897 --> 00:10:47,063 and we had my lovely wife, Diana, 172 00:10:47,099 --> 00:10:48,697 call up the reception and say, 173 00:10:48,734 --> 00:10:52,201 "Hey, can you please give my colleague another key?" 174 00:10:52,538 --> 00:10:55,371 My co-worker, Gianna, she's in room 2086. 175 00:10:55,407 --> 00:10:56,811 No other questions asked, 176 00:10:56,812 --> 00:10:58,410 they gave me a key to your room. 177 00:10:58,476 --> 00:11:01,610 Then with that, we were able to gain access to your room, 178 00:11:01,647 --> 00:11:03,513 where we installed some hidden cameras 179 00:11:03,548 --> 00:11:06,014 so we could see, when you access the safe, 180 00:11:06,083 --> 00:11:07,583 - what the keypad was. - Wow. 181 00:11:07,619 --> 00:11:08,684 So, even if you had put your laptop 182 00:11:08,720 --> 00:11:10,986 or your phone in there, it wouldn't have mattered, 183 00:11:11,022 --> 00:11:12,688 - we could have gotten in. - You could have gotten in. 184 00:11:12,724 --> 00:11:17,058 So, at this point, we kind of had complete access to your laptop... 185 00:11:18,529 --> 00:11:20,496 - There's the binary. - Nice. 186 00:11:20,532 --> 00:11:22,465 What we basically did was we installed 187 00:11:22,500 --> 00:11:24,966 something called a backdoor on your system, 188 00:11:25,003 --> 00:11:28,270 that would then connect out to a computer we controlled, 189 00:11:28,307 --> 00:11:31,508 allowing us to execute commands on your computer. 190 00:11:31,543 --> 00:11:33,308 So, at that point, we could share your screen, 191 00:11:33,344 --> 00:11:36,043 see exactly what you were looking at at all times. 192 00:11:36,078 --> 00:11:37,946 Uh, we could record off the webcam 193 00:11:37,980 --> 00:11:39,980 to watch you as you walked around the room, 194 00:11:40,017 --> 00:11:42,451 hijack your Skype sessions. 195 00:11:42,485 --> 00:11:43,918 So, how did you get my credit card information? 196 00:11:43,953 --> 00:11:45,544 Every time you press a button, 197 00:11:45,546 --> 00:11:46,955 there is an event that happens in the machine, 198 00:11:46,990 --> 00:11:48,724 and we can capture that. You can see here, 199 00:11:48,759 --> 00:11:50,192 we have your credit card information 200 00:11:50,226 --> 00:11:52,695 from when you were booking your trip to Cuba. 201 00:11:52,730 --> 00:11:55,364 Is there any personal information of mine 202 00:11:55,399 --> 00:11:57,466 that you couldn't have gotten access to? 203 00:11:57,500 --> 00:11:58,667 I don't think so. 204 00:11:58,702 --> 00:12:01,168 So, you could have hijacked my whole identity? 205 00:12:01,205 --> 00:12:03,038 Yeah, and you know, the attacks we pulled off here 206 00:12:03,072 --> 00:12:05,573 really weren't hyper sophisticated, 207 00:12:05,609 --> 00:12:08,643 so I always like to say, if someone wants to hack you, 208 00:12:08,677 --> 00:12:11,077 - they're gonna be able to. - Yeah. 209 00:12:11,113 --> 00:12:13,347 We bought you some souvenirs. 210 00:12:13,383 --> 00:12:14,816 This is, obviously, the flag of Russia. 211 00:12:14,850 --> 00:12:17,951 - Thank you very much. - Actually, you know, we used your credit card, so. 212 00:12:17,986 --> 00:12:19,354 Right. 213 00:12:19,389 --> 00:12:21,221 Cyber-attacks originating in Russia 214 00:12:21,256 --> 00:12:23,057 have become increasingly brazen, 215 00:12:23,091 --> 00:12:27,227 including a data breach of more than 500 million Yahoo Mail accounts 216 00:12:27,263 --> 00:12:30,731 and a scheme that stole 160 million credit cards 217 00:12:30,767 --> 00:12:32,366 from American corporations. 218 00:12:32,402 --> 00:12:36,003 Russian cyber-security firm, Group IB, hunts hackers. 219 00:12:36,038 --> 00:12:37,937 They showed us online hacker forums 220 00:12:37,974 --> 00:12:40,974 filled with troves of stolen data. 221 00:13:11,706 --> 00:13:14,572 We're looking at websites that are D.C., 222 00:13:14,609 --> 00:13:16,041 US government websites, 223 00:13:16,076 --> 00:13:17,174 and when we click on them, 224 00:13:17,211 --> 00:13:19,511 you can see the username and the login. 225 00:13:19,547 --> 00:13:22,047 Uh, it's all the information to access these accounts. 226 00:13:22,081 --> 00:13:24,750 So, these people may not know 227 00:13:24,786 --> 00:13:27,952 that her e-mail has been hacked? 228 00:13:29,724 --> 00:13:30,822 Wow. 229 00:13:32,259 --> 00:13:34,293 So, my name could be in there. I wouldn't even know. 230 00:13:50,143 --> 00:13:51,241 These cyber crimes 231 00:13:51,277 --> 00:13:52,911 are committed by blackhat hackers 232 00:13:52,946 --> 00:13:56,047 who can steal critical data and damage networks. 233 00:13:56,081 --> 00:13:57,948 They exist anonymously on the web, 234 00:13:57,984 --> 00:14:00,618 but we found one who agreed to talk to us. 235 00:14:01,988 --> 00:14:02,921 Hi, there. 236 00:14:04,090 --> 00:14:06,023 Gianna. Nice to meet you. 237 00:14:06,058 --> 00:14:07,991 - Gianna. Nice to meet you. - Hi. 238 00:14:15,501 --> 00:14:18,201 Though he first hesitated, Kostya eventually agreed 239 00:14:18,236 --> 00:14:20,104 to show us some of his hacks. 240 00:14:54,273 --> 00:14:57,005 And, so, what are you doing with all this personal information? 241 00:15:03,548 --> 00:15:06,081 And then what will they use that information for? 242 00:15:20,630 --> 00:15:21,773 What's the most amount of money 243 00:15:21,774 --> 00:15:24,200 you've made off of a hack like this one? 244 00:15:29,706 --> 00:15:32,006 Spurred by the trillions of dollars online 245 00:15:32,043 --> 00:15:33,975 and a generation raised on the Web, 246 00:15:34,010 --> 00:15:36,311 hacking from Russia and around the world, 247 00:15:36,346 --> 00:15:37,745 is flourishing. 248 00:15:37,780 --> 00:15:39,780 And increasingly, hackers are targeting 249 00:15:39,816 --> 00:15:41,982 the world's most lucrative market, 250 00:15:42,019 --> 00:15:43,152 the US. 251 00:15:43,187 --> 00:15:44,552 But at DHS, 252 00:15:44,587 --> 00:15:47,788 the first line of defense are hackers themselves. 253 00:15:47,823 --> 00:15:50,192 I hack into agencies, and then, 254 00:15:50,226 --> 00:15:51,326 after the hacking is done, 255 00:15:51,361 --> 00:15:52,826 I go in, and I teach them how we did it, 256 00:15:52,863 --> 00:15:55,431 so then, they can actually go through and fix those vulnerabilities 257 00:15:55,466 --> 00:15:57,599 so the actual bad guys can't get in. 258 00:15:57,634 --> 00:15:59,567 That's a map of 82,000 259 00:15:59,602 --> 00:16:01,602 critical infrastructures sites in the United States 260 00:16:01,638 --> 00:16:03,538 that are basically exposed directly to the Internet. 261 00:16:03,573 --> 00:16:06,139 - Wow. - We're talking about water systems, 262 00:16:06,176 --> 00:16:08,208 manufacturing plants, building automation. 263 00:16:08,244 --> 00:16:11,745 When you start to aggregate it at a scale of 82,000, right, 264 00:16:11,782 --> 00:16:14,682 now, intruding upon a lot of those systems all at once 265 00:16:14,717 --> 00:16:16,951 could cause, you know, a significant issue. 266 00:16:16,986 --> 00:16:20,020 How do you see cyber-attacks, uh, advancing, 267 00:16:20,057 --> 00:16:21,923 in the next 10, 20, 30 years? 268 00:16:21,958 --> 00:16:24,926 At a technical level, we're gonna be constantly evolving. 269 00:16:24,961 --> 00:16:27,596 As adversaries create new capabilities, 270 00:16:27,630 --> 00:16:28,863 we'll create new countermeasures. 271 00:16:28,899 --> 00:16:31,365 As we advance past their capabilities with countermeasures, 272 00:16:31,400 --> 00:16:33,134 they'll create new capabilities. 273 00:16:33,168 --> 00:16:36,738 It's always gonna be that kind of arms race type of activity. 274 00:16:36,773 --> 00:16:39,006 I think this problem is one that... 275 00:16:39,042 --> 00:16:40,807 it's certainly one that we can work on, 276 00:16:40,842 --> 00:16:43,211 but I don't think it's ever gonna completely go away. 277 00:16:43,245 --> 00:16:45,312 This is gonna be with us for a long time, I think. 278 00:16:48,618 --> 00:16:51,851 Since 1980, outbreaks of infectious diseases 279 00:16:51,886 --> 00:16:53,553 have more than tripled worldwide. 280 00:16:53,590 --> 00:16:55,623 Nearly every year, somewhere around the globe, 281 00:16:55,658 --> 00:16:57,524 a different disease has emerged, 282 00:16:57,559 --> 00:17:00,394 leading to varying degrees of infection and widespread panic. 283 00:17:00,430 --> 00:17:04,397 Fear of Ebola in infected countries and beyond, is palpable. 284 00:17:04,433 --> 00:17:06,166 Bird Flu has hit North America. 285 00:17:06,201 --> 00:17:08,769 As our world continues to become more interconnected, 286 00:17:08,804 --> 00:17:10,637 the threat of one of these outbreaks 287 00:17:10,673 --> 00:17:12,539 growing into a global pandemic 288 00:17:12,575 --> 00:17:14,307 is becoming increasingly real. 289 00:17:14,343 --> 00:17:16,609 To see if and how we can actually prevent 290 00:17:16,645 --> 00:17:18,577 this next pandemic from happening, 291 00:17:18,614 --> 00:17:21,815 we sent Suroosh Alvi to the Zika Forest in Uganda. 292 00:17:38,034 --> 00:17:40,834 So, we are walking into the Zika Forest right now. 293 00:17:40,869 --> 00:17:42,234 We're with our pals 294 00:17:42,270 --> 00:17:45,872 from the Uganda Virus Research Institute. 295 00:17:45,906 --> 00:17:48,575 We are gonna set up some insect traps, 296 00:17:48,609 --> 00:17:50,676 and discover new viruses. 297 00:18:13,401 --> 00:18:16,569 So, this is the very tower that was used 298 00:18:16,605 --> 00:18:19,306 to discover the original Zika virus? 299 00:18:19,340 --> 00:18:21,039 It was right here? 300 00:18:21,076 --> 00:18:24,542 Long before the Zika outbreak in Brazil caused global panic, 301 00:18:24,578 --> 00:18:28,047 it was first discovered here in Uganda in 1947. 302 00:18:28,083 --> 00:18:30,048 Pathogens are constantly mutating 303 00:18:30,085 --> 00:18:31,917 and acquiring new traits, 304 00:18:31,952 --> 00:18:34,319 so researchers monitor the mosquitoes 305 00:18:34,355 --> 00:18:36,122 to track the emerging infections 306 00:18:36,156 --> 00:18:38,124 that could ignite the next pandemic. 307 00:18:41,930 --> 00:18:43,328 Okay. 308 00:18:43,364 --> 00:18:45,396 There are mosquitoes flying all around me right now. 309 00:18:45,432 --> 00:18:47,733 Doesn't fill me with warm and fuzzies. 310 00:18:48,836 --> 00:18:50,301 Tropical forests like this 311 00:18:50,337 --> 00:18:52,403 are breeding grounds for new viruses. 312 00:18:52,440 --> 00:18:54,873 Once untouched, human populations 313 00:18:54,907 --> 00:18:58,344 now destroy around seven million hectares of forest each year, 314 00:18:58,378 --> 00:19:01,011 allowing diseases to have an easier time 315 00:19:01,048 --> 00:19:03,080 getting into human populations. 316 00:19:03,116 --> 00:19:04,650 There are houses right there. 317 00:19:04,684 --> 00:19:07,051 There's been encroachment upon the forest, 318 00:19:07,086 --> 00:19:09,186 and the airport is just past the houses. 319 00:19:10,691 --> 00:19:12,057 What are the implications 320 00:19:12,092 --> 00:19:14,559 of people living so close to this forest? 321 00:19:27,642 --> 00:19:28,740 Each year, 322 00:19:28,776 --> 00:19:30,407 a million people are killed 323 00:19:30,442 --> 00:19:32,509 by diseases transmitted from mosquitoes. 324 00:19:32,545 --> 00:19:35,445 And with increasing temperatures and population growth, 325 00:19:35,481 --> 00:19:38,415 that death toll is expected to climb in the coming years. 326 00:19:38,451 --> 00:19:41,419 The Zika vaccine trials are progressing right now, 327 00:19:41,453 --> 00:19:44,588 and even though it's daunting to vaccinate the entire world, 328 00:19:44,624 --> 00:19:47,724 scientists have proven they can eliminate threats. 329 00:19:49,429 --> 00:19:50,795 In 1967, 330 00:19:50,829 --> 00:19:53,130 the World Health Organization launched a campaign 331 00:19:53,165 --> 00:19:56,467 to eliminate one of the biggest killers in human history. 332 00:19:56,502 --> 00:19:59,202 Dr. Larry Brilliant was part of the team 333 00:19:59,238 --> 00:20:00,637 that eradicated smallpox 334 00:20:00,673 --> 00:20:02,873 using a very simple concept. 335 00:20:02,909 --> 00:20:05,474 Instead of gong all through India or Bangladesh 336 00:20:05,510 --> 00:20:07,042 and trying to vaccinate everybody, 337 00:20:07,077 --> 00:20:08,345 we got the idea 338 00:20:08,380 --> 00:20:10,314 that if we gave the vaccine 339 00:20:10,348 --> 00:20:11,847 only to those 340 00:20:11,883 --> 00:20:14,718 who were closest to an infected person, 341 00:20:14,752 --> 00:20:17,621 and you put a ring around every infected person, 342 00:20:17,655 --> 00:20:19,423 with your scarce vaccine, 343 00:20:19,458 --> 00:20:21,290 you would abort the epidemic, 344 00:20:21,326 --> 00:20:22,925 and that's what worked. 345 00:20:22,961 --> 00:20:24,126 We have a lot of vaccines, 346 00:20:24,162 --> 00:20:27,096 but the vaccines we have are for known viruses. 347 00:20:27,132 --> 00:20:29,566 When the next unknown virus 348 00:20:29,601 --> 00:20:31,099 jumps from an animal to a human, 349 00:20:31,135 --> 00:20:33,670 we're not gonna have a vaccine on day one. 350 00:20:39,109 --> 00:20:40,742 These live bird markets are prevalent 351 00:20:40,778 --> 00:20:42,176 throughout the developing world, 352 00:20:42,212 --> 00:20:44,947 and the tight quarters that these animals are in 353 00:20:44,981 --> 00:20:46,315 make it very easy 354 00:20:46,351 --> 00:20:48,517 for pathogens and infectious disease 355 00:20:48,552 --> 00:20:50,752 to spread from animals to humans. 356 00:20:53,724 --> 00:20:57,759 Almost 70% of human infections 357 00:20:57,795 --> 00:20:59,561 actually come from animals. 358 00:20:59,596 --> 00:21:01,396 Dr. Denis Byarugaba 359 00:21:01,432 --> 00:21:04,232 investigates the threat of avian influenza 360 00:21:04,268 --> 00:21:06,000 in live bird markets. 361 00:21:06,036 --> 00:21:07,269 - Standing there... - Yeah? 362 00:21:07,304 --> 00:21:10,338 ... you could smell some little bit of stuff... 363 00:21:10,375 --> 00:21:12,173 - Yeah. - ... from the cages. 364 00:21:12,209 --> 00:21:15,376 Now, these are aerosols that are coming from the cages. 365 00:21:15,412 --> 00:21:18,011 And should there be an infection in those cages, 366 00:21:18,047 --> 00:21:19,446 you are automatically inhaling them. 367 00:21:19,482 --> 00:21:21,682 So, that smell that I was smelling over there... 368 00:21:21,718 --> 00:21:24,117 what you are referring to as an aerosol, 369 00:21:24,153 --> 00:21:25,720 is potentially really bad for us? 370 00:21:25,756 --> 00:21:28,556 If there was any potential pathogen 371 00:21:28,592 --> 00:21:30,392 that was within those poultry, 372 00:21:30,426 --> 00:21:33,326 the likelihood that you would pick it up from those aerosols, 373 00:21:33,363 --> 00:21:36,564 as the birds fluff their feathers, is very high. 374 00:21:37,601 --> 00:21:39,534 There is a high concentration of poultry 375 00:21:39,568 --> 00:21:41,167 from different regions, 376 00:21:41,203 --> 00:21:44,506 where they are exposed and come in with different infections. 377 00:21:44,540 --> 00:21:46,907 There is slaughtering of these birds 378 00:21:46,942 --> 00:21:48,208 within the markets, 379 00:21:48,242 --> 00:21:51,278 in very unhygienic conditions. 380 00:21:52,146 --> 00:21:54,247 And if these are zoonotic, 381 00:21:54,282 --> 00:21:56,817 then you expose and get this infection 382 00:21:56,852 --> 00:21:58,183 into the human population. 383 00:21:58,220 --> 00:22:00,953 Could you define or explain what zoonosis is? 384 00:22:00,989 --> 00:22:03,323 Zoonosis is a disease that is transmitted 385 00:22:03,357 --> 00:22:05,357 from animals to humans. 386 00:22:05,394 --> 00:22:08,394 The typical example is, for example, influenza. 387 00:22:08,431 --> 00:22:09,996 And they are quite many. 388 00:22:12,300 --> 00:22:15,167 With the population increases in these countries, 389 00:22:15,202 --> 00:22:18,704 should the world be afraid of a crazy bird flu pandemic 390 00:22:18,740 --> 00:22:20,840 at a level that we've never seen before? 391 00:22:20,875 --> 00:22:23,476 For now, the major threat, actually, 392 00:22:23,510 --> 00:22:25,644 is those diseases that we are unable 393 00:22:25,680 --> 00:22:29,781 to find treatment for or contain. 394 00:22:29,817 --> 00:22:33,286 Each zoonotic disease poses a unique threat. 395 00:22:33,322 --> 00:22:35,188 Transmitted from bodily fluids, 396 00:22:35,222 --> 00:22:36,855 the deadly Ebola epidemic 397 00:22:36,891 --> 00:22:39,692 was exacerbated by the poorly-developed health systems 398 00:22:39,727 --> 00:22:42,828 and living conditions in West Africa. 399 00:22:42,864 --> 00:22:44,931 The SARS outbreak was less lethal 400 00:22:44,967 --> 00:22:47,467 but struck wealthy countries as it went airborne 401 00:22:47,501 --> 00:22:50,369 and spread between people in cities and hospitals. 402 00:22:50,404 --> 00:22:52,305 We are truly in the middle 403 00:22:52,340 --> 00:22:53,973 of the evolution of an epidemic. 404 00:22:54,009 --> 00:22:56,375 Global health systems were unprepared 405 00:22:56,410 --> 00:23:00,179 as these diseases devastated people around the globe. 406 00:23:00,213 --> 00:23:02,615 But if a disease as deadly as Ebola 407 00:23:02,650 --> 00:23:04,817 can transmit through the air like SARS, 408 00:23:04,853 --> 00:23:06,719 the consequences would be dire. 409 00:23:06,753 --> 00:23:08,554 In the Netherlands, 410 00:23:08,589 --> 00:23:10,556 a scientist proved just how easily 411 00:23:10,592 --> 00:23:12,257 this mutation could occur. 412 00:23:12,292 --> 00:23:14,460 Dr. Ron Fouchier demonstrated 413 00:23:14,496 --> 00:23:18,029 how he genetically modified the H5N1 bird flu virus 414 00:23:18,065 --> 00:23:20,398 to transmit through the air. 415 00:24:25,998 --> 00:24:30,468 A deadly airborne virus is potentially a nightmare scenario, 416 00:24:30,502 --> 00:24:32,001 so why create it? 417 00:24:32,038 --> 00:24:35,705 To prove that the H5N1 bird flu virus 418 00:24:35,740 --> 00:24:38,942 could acquire the traits of becoming airborne transmissible. 419 00:24:38,977 --> 00:24:41,677 So now we can find out exactly what it takes 420 00:24:41,712 --> 00:24:45,382 for an animal virus to become airborne. 421 00:24:45,416 --> 00:24:47,517 Despite the breakthrough of his findings, 422 00:24:47,552 --> 00:24:49,751 Dr. Fouchier's work sent shock waves 423 00:24:49,788 --> 00:24:51,555 through the international community. 424 00:24:51,589 --> 00:24:53,256 There were a lot of concerns about 425 00:24:53,291 --> 00:24:55,692 your findings being out in the public. 426 00:24:55,727 --> 00:24:59,061 Yes. So, when we submitted our manuscript for publication, 427 00:24:59,097 --> 00:25:02,332 the US government judged that our manuscript 428 00:25:02,366 --> 00:25:04,334 could be used by people to construct 429 00:25:04,368 --> 00:25:06,202 biological weapons of terror. 430 00:25:06,238 --> 00:25:09,405 We argued that the information that we collected 431 00:25:09,441 --> 00:25:11,708 had to be sent back 432 00:25:11,742 --> 00:25:14,042 to the countries where outbreaks are occurring 433 00:25:14,078 --> 00:25:17,346 to inform the people about what to be on the lookout for. 434 00:25:17,381 --> 00:25:19,882 You eventually did publish your findings, 435 00:25:19,917 --> 00:25:21,383 - is that correct? - That's correct. 436 00:25:21,419 --> 00:25:24,753 We convinced the World Health Organization 437 00:25:24,788 --> 00:25:26,623 to have a meeting with the countries 438 00:25:26,657 --> 00:25:28,324 that were facing outbreaks, 439 00:25:28,358 --> 00:25:31,393 to explain why they would need the information. 440 00:25:31,429 --> 00:25:33,663 And so the people in Uganda 441 00:25:33,698 --> 00:25:36,098 or in Indonesia or China who do surveillance 442 00:25:36,134 --> 00:25:38,267 can be on the lookout for the mutations 443 00:25:38,301 --> 00:25:40,169 and the biological traits 444 00:25:40,203 --> 00:25:42,171 associated with increased risk. 445 00:25:42,205 --> 00:25:43,640 What you're doing in the lab 446 00:25:43,674 --> 00:25:46,075 is happening in nature all the time. 447 00:25:46,111 --> 00:25:49,545 Absolutely. Flu pandemics happen every 20, 30 years 448 00:25:49,579 --> 00:25:51,913 without any involvement of scientists... 449 00:25:51,949 --> 00:25:54,048 mad scientists or good scientists. 450 00:25:54,084 --> 00:25:56,652 What we did in the lab was nothing different 451 00:25:56,686 --> 00:25:58,319 from what is happening 452 00:25:58,355 --> 00:26:00,888 in animals around the globe every day. 453 00:26:03,961 --> 00:26:05,426 When an animal virus mutates 454 00:26:05,462 --> 00:26:07,262 and spreads into the human population, 455 00:26:07,298 --> 00:26:09,964 it inevitably causes chaos and panic. 456 00:26:12,803 --> 00:26:16,372 As the Ebola crisis spiraled out of control in 2014, 457 00:26:16,406 --> 00:26:20,709 the US government spent $2.4 billion in response, 458 00:26:20,743 --> 00:26:24,244 more than a quarter of the US's entire annual global health budget, 459 00:26:24,280 --> 00:26:27,013 pushing scientists like Dr. Brilliant 460 00:26:27,049 --> 00:26:30,017 to find more preemptive solutions for future outbreaks. 461 00:26:30,052 --> 00:26:32,186 We have to strengthen public health 462 00:26:32,221 --> 00:26:35,190 in the poorest countries to make ourselves safe. 463 00:26:35,224 --> 00:26:38,226 Human beings are only as strong 464 00:26:38,260 --> 00:26:42,096 as our weakest surveillance system. 465 00:26:42,131 --> 00:26:45,165 This is one instance where "America first" 466 00:26:45,201 --> 00:26:48,236 means working with the poorest countries of the world 467 00:26:48,270 --> 00:26:50,805 to protect them out of selfishness, 468 00:26:50,839 --> 00:26:53,240 our own enlightened self-interest. 469 00:26:55,477 --> 00:26:58,746 Uganda is now at the forefront of deadly disease monitoring, 470 00:26:58,780 --> 00:27:01,882 with a remarkably effective bio-surveillance system 471 00:27:01,917 --> 00:27:05,251 that was implemented with the help of American health agencies 472 00:27:05,287 --> 00:27:06,586 and the US Army. 473 00:27:06,622 --> 00:27:09,355 These motorcycle guys, there's a whole network of them. 474 00:27:09,391 --> 00:27:11,525 They ride around, they pick up blood samples, 475 00:27:11,559 --> 00:27:14,661 and they take it from the local clinics to the bigger hospitals. 476 00:27:14,696 --> 00:27:16,763 It was originally set up to deal with 477 00:27:16,798 --> 00:27:18,397 the HIV/AIDS epidemic. 478 00:27:18,433 --> 00:27:21,300 And then they had the very smart idea 479 00:27:21,336 --> 00:27:24,204 to piggyback the examination 480 00:27:24,240 --> 00:27:27,074 of the blood samples for other infections 481 00:27:27,109 --> 00:27:30,109 like Ebola, SARS, yellow fever. 482 00:27:30,144 --> 00:27:33,479 It's very lo-fi and rudimentary and cheap, 483 00:27:33,513 --> 00:27:34,847 but it's working. 484 00:27:44,992 --> 00:27:46,358 In 2007, 485 00:27:46,394 --> 00:27:50,462 146 people were infected by a small Ebola outbreak in Uganda. 486 00:27:50,498 --> 00:27:53,566 Since then, three outbreaks have emerged here, 487 00:27:53,601 --> 00:27:56,803 but this bio-surveillance system helped prevent each one 488 00:27:56,837 --> 00:28:00,405 from spreading beyond 25 infections. 489 00:28:00,441 --> 00:28:02,540 It's not just surveillance of humans, 490 00:28:02,576 --> 00:28:04,676 it's surveillance of animals 491 00:28:04,711 --> 00:28:07,613 who could carry a virus that we don't know about 492 00:28:07,648 --> 00:28:10,182 but has potential for human disease. 493 00:28:11,318 --> 00:28:13,951 We sample from poultry and swine, 494 00:28:13,988 --> 00:28:15,688 for rapid virus detection, 495 00:28:15,722 --> 00:28:17,890 so that immediately, we are able to detect it, 496 00:28:17,924 --> 00:28:21,192 before it spreads out massively to other areas. 497 00:28:21,228 --> 00:28:25,498 If we have good pandemic preparation, 498 00:28:25,532 --> 00:28:27,432 if we find outbreaks quickly, 499 00:28:27,468 --> 00:28:30,234 we won't have that pandemic. It's our option. 500 00:28:31,306 --> 00:28:33,172 Outbreaks are inevitable, 501 00:28:33,207 --> 00:28:35,840 pandemics are optional. 39240

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.