Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,155 --> 00:00:03,586
This week on "Vice,"
2
00:00:03,621 --> 00:00:06,022
a deep dive into Russian hacking.
3
00:00:14,783 --> 00:00:17,132
Is there any personal
information of mine
4
00:00:17,169 --> 00:00:18,768
that you couldn't have gotten access to?
5
00:00:18,803 --> 00:00:22,138
If someone wants to hack
you, they're gonna be able to.
6
00:00:22,173 --> 00:00:24,140
And then, the race to stop
7
00:00:24,175 --> 00:00:25,809
the next global pandemic.
8
00:00:25,923 --> 00:00:28,658
We are walking into the Zika Forest.
9
00:00:28,694 --> 00:00:31,060
There are mosquitoes flying
all around me right now.
10
00:00:31,095 --> 00:00:32,695
Doesn't fill me with warm and fuzzies.
11
00:00:33,765 --> 00:00:35,832
Outbreaks are inevitable,
12
00:00:35,868 --> 00:00:37,701
pandemics are optional.
13
00:00:44,241 --> 00:00:45,542
Go, go, go!
14
00:00:48,246 --> 00:00:49,978
We are not animals!
15
00:01:01,525 --> 00:01:03,393
Russia's been in the news a lot lately
16
00:01:03,427 --> 00:01:07,296
for allegedly hacking
the 2016 US election.
17
00:01:07,331 --> 00:01:08,664
The Russian government pursued
18
00:01:08,700 --> 00:01:10,599
a multi-faceted influence campaign
19
00:01:10,635 --> 00:01:12,134
in the run-up to the election,
20
00:01:12,170 --> 00:01:15,103
including aggressive use
of cyber-capabilities.
21
00:01:15,138 --> 00:01:16,673
Russian cyber-criminals
22
00:01:16,707 --> 00:01:19,375
have been accused of everything
from digital bank robberies
23
00:01:19,411 --> 00:01:21,944
to tampering with
critical infrastructure.
24
00:01:21,978 --> 00:01:24,379
So we sent Gianna Toboni to investigate
25
00:01:24,414 --> 00:01:26,448
the severity of this growing threat.
26
00:01:41,432 --> 00:01:43,432
We're about an hour
outside of Portland, Maine.
27
00:01:43,466 --> 00:01:45,567
It's a pretty rural part of the state,
28
00:01:45,603 --> 00:01:48,204
and we're heading into
this Sheriff's Department,
29
00:01:48,239 --> 00:01:49,604
because they've been hacked,
30
00:01:49,640 --> 00:01:52,875
along with every other police
department in the county.
31
00:01:52,909 --> 00:01:55,643
This is the office where
we received the virus.
32
00:01:55,677 --> 00:01:58,146
Um, it was downloaded from an e-mail,
33
00:01:58,180 --> 00:02:00,013
um, right here at this terminal.
34
00:02:00,049 --> 00:02:02,483
We didn't know anything
had happened until, again,
35
00:02:02,518 --> 00:02:03,818
the system started to slow down.
36
00:02:03,853 --> 00:02:06,987
Files weren't accessible, we
started getting error messages.
37
00:02:07,022 --> 00:02:09,022
This is a copy
38
00:02:09,058 --> 00:02:11,793
of the ransom information.
39
00:02:11,828 --> 00:02:14,962
Now, right on the top here
it has "Cryptowall 3.0."
40
00:02:14,997 --> 00:02:16,730
It was a readme-type file.
41
00:02:16,766 --> 00:02:19,199
Um... don't ask me to explain that.
42
00:02:19,235 --> 00:02:20,735
Um, "What does this mean?
43
00:02:20,771 --> 00:02:23,704
This means that the structure
and data within your files
44
00:02:23,740 --> 00:02:26,074
have been irrevocably changed,
45
00:02:26,109 --> 00:02:28,709
um, and you won't be
able to work with them,
46
00:02:28,745 --> 00:02:30,478
read them, or see them."
47
00:02:30,513 --> 00:02:32,579
What did you end up
doing after you read this?
48
00:02:32,615 --> 00:02:35,283
We ended up clicking on the...
49
00:02:35,317 --> 00:02:38,286
the IT folks went to the, um...
50
00:02:38,320 --> 00:02:40,954
the http address,
51
00:02:40,990 --> 00:02:42,423
and were able to locate
52
00:02:42,457 --> 00:02:45,725
the request for ransom
53
00:02:45,762 --> 00:02:48,663
that they were asking for in bitcoin.
54
00:02:48,698 --> 00:02:50,129
I'd never heard of a bitcoin...
55
00:02:50,165 --> 00:02:52,667
... at that point, myself.
You know what I mean?
56
00:02:52,701 --> 00:02:55,169
You know, we're a law
enforcement agency, right?
57
00:02:55,204 --> 00:02:56,569
And my first reaction was,
58
00:02:56,605 --> 00:02:59,407
"I'll be damned if I pay ransom."
59
00:02:59,442 --> 00:03:01,509
It's the cardinal rule,
right? Never negotiate.
60
00:03:01,544 --> 00:03:03,343
We're the police, you can't ransom us.
61
00:03:03,378 --> 00:03:07,213
Which, uh, obviously I
had a rude awakening there,
62
00:03:07,248 --> 00:03:08,747
and actually, I was really surprised
63
00:03:08,783 --> 00:03:11,050
when our IT folks recommended that...
64
00:03:11,086 --> 00:03:11,985
that we pay the ransom.
65
00:03:12,021 --> 00:03:14,621
We've made several changes since then,
66
00:03:14,656 --> 00:03:16,389
and we were not successful.
67
00:03:16,425 --> 00:03:19,693
Another e-mail came
through, and low and behold,
68
00:03:19,728 --> 00:03:22,429
we started to experience
the problem again.
69
00:03:22,463 --> 00:03:23,896
You guys paid twice.
70
00:03:23,932 --> 00:03:26,432
What makes you think these
hackers won't come back again?
71
00:03:26,467 --> 00:03:30,236
We've been fortunate not to
have encountered the virus again,
72
00:03:30,271 --> 00:03:32,671
but I'm not kidding myself.
73
00:03:32,707 --> 00:03:34,674
I don't believe we're a
hundred percent immune.
74
00:03:34,710 --> 00:03:37,978
A cyber-attack has spread
to every corner of the world.
75
00:03:38,013 --> 00:03:40,646
Lincoln County, Maine, is not alone.
76
00:03:40,682 --> 00:03:43,415
Across the country,
thousands of police stations,
77
00:03:43,451 --> 00:03:45,183
hospitals, and businesses,
78
00:03:45,219 --> 00:03:47,252
have been hit by ransomware attacks.
79
00:03:47,288 --> 00:03:48,555
In 2016 alone,
80
00:03:48,590 --> 00:03:50,923
Americans paid close
to a billion dollars
81
00:03:50,959 --> 00:03:52,391
in digital ransom.
82
00:03:52,426 --> 00:03:54,192
This massive uptick in attacks
83
00:03:54,228 --> 00:03:56,795
has the Department of Homeland
Security on high alert.
84
00:03:56,831 --> 00:03:59,211
We went to their National Cybersecurity
85
00:03:59,212 --> 00:04:01,199
& Communications Integration Center
86
00:04:01,235 --> 00:04:03,669
to see just how dire the situation is.
87
00:04:07,307 --> 00:04:09,074
Thank you.
88
00:04:09,110 --> 00:04:13,045
So, in order to get into
this control room here,
89
00:04:13,081 --> 00:04:15,814
yeah, we've got to
leave our phones behind.
90
00:04:15,850 --> 00:04:18,216
Ultra secure in here.
91
00:04:20,086 --> 00:04:21,353
Wow.
92
00:04:22,523 --> 00:04:24,622
So, this is our main watch-floor
93
00:04:24,658 --> 00:04:26,124
for the National Cybersecurity
94
00:04:26,158 --> 00:04:28,093
& Communications Integration Center.
95
00:04:28,127 --> 00:04:31,596
And this is where we have
our 24/7 watch operations
96
00:04:31,632 --> 00:04:34,165
looking for threats and incidents
97
00:04:34,201 --> 00:04:35,701
across the federal government
98
00:04:35,735 --> 00:04:39,004
and in our critical
infrastructures domestically.
99
00:04:39,038 --> 00:04:41,238
- We're hearing a lot about ransomware.
- Mm-hmm.
100
00:04:41,274 --> 00:04:42,875
- Are you concerned about that?
- Yes.
101
00:04:42,909 --> 00:04:46,745
Ransomware has expanded significantly.
102
00:04:46,781 --> 00:04:51,415
Existing organizations are now
taking advantage of the Internet.
103
00:04:51,451 --> 00:04:53,951
What is the nature
of the type of hacking
104
00:04:53,985 --> 00:04:55,386
that we see in the US
105
00:04:55,422 --> 00:04:57,922
that originates in
Russian-speaking countries?
106
00:04:57,956 --> 00:05:01,125
Everything from cyber-criminals,
107
00:05:01,160 --> 00:05:05,095
um, to more organized capabilities,
108
00:05:05,130 --> 00:05:09,300
and the Russian influence
in our election process.
109
00:05:09,334 --> 00:05:12,101
We put out, um,
110
00:05:12,137 --> 00:05:15,773
what we call a joint-analysis
report back in December.
111
00:05:15,809 --> 00:05:18,341
This report was the first
time government officials
112
00:05:18,377 --> 00:05:21,745
published evidence of the
2016 Russian election hack,
113
00:05:21,781 --> 00:05:23,814
which showed Russia's
ability to penetrate
114
00:05:23,848 --> 00:05:25,581
major American networks.
115
00:05:25,617 --> 00:05:29,153
To understand why Russia has
become such a hub for hacking,
116
00:05:29,187 --> 00:05:30,687
we traveled to Moscow.
117
00:05:41,433 --> 00:05:44,067
Andrei Soldatov is an
investigative journalist
118
00:05:44,103 --> 00:05:46,170
who recently wrote a definitive account
119
00:05:46,204 --> 00:05:48,137
of Russia's cyber-espionage.
120
00:05:48,173 --> 00:05:49,605
Of course, it was huge news in the US
121
00:05:49,641 --> 00:05:52,242
when the DNC and Clinton
campaign e-mails were hacked,
122
00:05:52,278 --> 00:05:55,545
but is there really any evidence
to show that direct link?
123
00:06:03,822 --> 00:06:05,521
And how do we know that?
124
00:06:11,096 --> 00:06:13,196
So you can say with
certainty that those hackers
125
00:06:13,230 --> 00:06:15,632
were working with the
Russian government?
126
00:07:17,995 --> 00:07:20,394
To actually see Russian hacking at work,
127
00:07:20,430 --> 00:07:21,663
we went to one of the country's
128
00:07:21,699 --> 00:07:23,699
biggest gatherings of hackers.
129
00:07:25,401 --> 00:07:28,202
Welcome to Russia's biggest
cyber-security conference.
130
00:07:28,237 --> 00:07:31,139
You have guys who are hacking
into ATM machines right here,
131
00:07:31,175 --> 00:07:33,207
into BMWs, Teslas.
132
00:07:33,242 --> 00:07:35,742
The average age here is probably 25, 26.
133
00:07:35,778 --> 00:07:39,112
You have teenagers. Everyone
seems to be under 30.
134
00:07:41,350 --> 00:07:43,550
Cyber-security expert
and even organizer,
135
00:07:43,586 --> 00:07:45,920
Andrew Bershadsky, showed us around.
136
00:08:08,954 --> 00:08:10,410
All right, so what are
you excited about here?
137
00:08:10,411 --> 00:08:11,677
Can you show me some things?
138
00:09:03,998 --> 00:09:05,807
So, what's their angle?
If they attack this,
139
00:09:05,808 --> 00:09:06,908
what do they want to happen?
140
00:09:30,756 --> 00:09:32,724
We wanted to see hacking in real-time,
141
00:09:32,759 --> 00:09:35,259
so we asked former NSA
hacker, Patrick Wardle,
142
00:09:35,296 --> 00:09:37,696
and his associate, Mikhail Sosonkin,
143
00:09:37,730 --> 00:09:40,231
to put my personal
cyber-security to the test.
144
00:09:40,267 --> 00:09:42,533
Well, you know, this was
your first hacker conference,
145
00:09:42,570 --> 00:09:45,870
and we really wanted to make
the experience very authentic,
146
00:09:45,905 --> 00:09:47,905
so we decided to just
147
00:09:47,941 --> 00:09:50,974
hack you in as many ways as possible.
148
00:09:51,009 --> 00:09:53,110
While I thought our crew was
filming background footage,
149
00:09:53,144 --> 00:09:56,813
they were in fact
capturing me getting hacked.
150
00:09:56,849 --> 00:09:59,683
Generally, there's two
main ways to hack people:
151
00:09:59,719 --> 00:10:01,918
Remotely and with physical access.
152
00:10:01,953 --> 00:10:05,355
Um, so we designed some
attacks to do both of these.
153
00:10:05,390 --> 00:10:08,057
Basically, we set up
wireless access points
154
00:10:08,094 --> 00:10:11,261
and we made it look like
it was a hotel Wi-Fi.
155
00:10:11,297 --> 00:10:13,062
But it was, like, a
little thing that suggested
156
00:10:13,099 --> 00:10:15,032
the correct one... it says "guest."
157
00:10:15,067 --> 00:10:17,032
So you probably thought
that that's the one
158
00:10:17,033 --> 00:10:18,802
- you should be connecting to.
- Oh, wow.
159
00:10:18,836 --> 00:10:20,303
So, when you connected to it,
160
00:10:20,340 --> 00:10:21,639
everything you entered in there,
161
00:10:21,673 --> 00:10:23,740
like your last name, your room number,
162
00:10:23,775 --> 00:10:25,808
we basically collected that.
163
00:10:25,845 --> 00:10:28,611
Hotel room numbers... it's
kind of what hotels use
164
00:10:28,647 --> 00:10:30,679
- as an authentication key.
- Oh, my God.
165
00:10:30,716 --> 00:10:32,446
And with that, then we were able
166
00:10:32,447 --> 00:10:34,217
to pull off a social engineering attack,
167
00:10:34,253 --> 00:10:36,653
which gave us a copy of your room key.
168
00:10:37,623 --> 00:10:38,621
Good afternoon.
169
00:10:38,657 --> 00:10:41,825
Could you print another
key for my room, please?
170
00:10:41,860 --> 00:10:44,861
We needed someone to
impersonate you, essentially,
171
00:10:44,897 --> 00:10:47,063
and we had my lovely wife, Diana,
172
00:10:47,099 --> 00:10:48,697
call up the reception and say,
173
00:10:48,734 --> 00:10:52,201
"Hey, can you please give
my colleague another key?"
174
00:10:52,538 --> 00:10:55,371
My co-worker, Gianna,
she's in room 2086.
175
00:10:55,407 --> 00:10:56,811
No other questions asked,
176
00:10:56,812 --> 00:10:58,410
they gave me a key to your room.
177
00:10:58,476 --> 00:11:01,610
Then with that, we were able
to gain access to your room,
178
00:11:01,647 --> 00:11:03,513
where we installed some hidden cameras
179
00:11:03,548 --> 00:11:06,014
so we could see, when
you access the safe,
180
00:11:06,083 --> 00:11:07,583
- what the keypad was.
- Wow.
181
00:11:07,619 --> 00:11:08,684
So, even if you had put your laptop
182
00:11:08,720 --> 00:11:10,986
or your phone in there,
it wouldn't have mattered,
183
00:11:11,022 --> 00:11:12,688
- we could have gotten in.
- You could have gotten in.
184
00:11:12,724 --> 00:11:17,058
So, at this point, we kind of had
complete access to your laptop...
185
00:11:18,529 --> 00:11:20,496
- There's the binary.
- Nice.
186
00:11:20,532 --> 00:11:22,465
What we basically did was we installed
187
00:11:22,500 --> 00:11:24,966
something called a
backdoor on your system,
188
00:11:25,003 --> 00:11:28,270
that would then connect out
to a computer we controlled,
189
00:11:28,307 --> 00:11:31,508
allowing us to execute
commands on your computer.
190
00:11:31,543 --> 00:11:33,308
So, at that point, we
could share your screen,
191
00:11:33,344 --> 00:11:36,043
see exactly what you were
looking at at all times.
192
00:11:36,078 --> 00:11:37,946
Uh, we could record off the webcam
193
00:11:37,980 --> 00:11:39,980
to watch you as you
walked around the room,
194
00:11:40,017 --> 00:11:42,451
hijack your Skype sessions.
195
00:11:42,485 --> 00:11:43,918
So, how did you get my
credit card information?
196
00:11:43,953 --> 00:11:45,544
Every time you press a button,
197
00:11:45,546 --> 00:11:46,955
there is an event that
happens in the machine,
198
00:11:46,990 --> 00:11:48,724
and we can capture
that. You can see here,
199
00:11:48,759 --> 00:11:50,192
we have your credit card information
200
00:11:50,226 --> 00:11:52,695
from when you were
booking your trip to Cuba.
201
00:11:52,730 --> 00:11:55,364
Is there any personal
information of mine
202
00:11:55,399 --> 00:11:57,466
that you couldn't have gotten access to?
203
00:11:57,500 --> 00:11:58,667
I don't think so.
204
00:11:58,702 --> 00:12:01,168
So, you could have
hijacked my whole identity?
205
00:12:01,205 --> 00:12:03,038
Yeah, and you know, the
attacks we pulled off here
206
00:12:03,072 --> 00:12:05,573
really weren't hyper sophisticated,
207
00:12:05,609 --> 00:12:08,643
so I always like to say, if
someone wants to hack you,
208
00:12:08,677 --> 00:12:11,077
- they're gonna be able to.
- Yeah.
209
00:12:11,113 --> 00:12:13,347
We bought you some souvenirs.
210
00:12:13,383 --> 00:12:14,816
This is, obviously, the flag of Russia.
211
00:12:14,850 --> 00:12:17,951
- Thank you very much.
- Actually, you know, we used your credit card, so.
212
00:12:17,986 --> 00:12:19,354
Right.
213
00:12:19,389 --> 00:12:21,221
Cyber-attacks originating in Russia
214
00:12:21,256 --> 00:12:23,057
have become increasingly brazen,
215
00:12:23,091 --> 00:12:27,227
including a data breach of more
than 500 million Yahoo Mail accounts
216
00:12:27,263 --> 00:12:30,731
and a scheme that stole
160 million credit cards
217
00:12:30,767 --> 00:12:32,366
from American corporations.
218
00:12:32,402 --> 00:12:36,003
Russian cyber-security firm,
Group IB, hunts hackers.
219
00:12:36,038 --> 00:12:37,937
They showed us online hacker forums
220
00:12:37,974 --> 00:12:40,974
filled with troves of stolen data.
221
00:13:11,706 --> 00:13:14,572
We're looking at websites that are D.C.,
222
00:13:14,609 --> 00:13:16,041
US government websites,
223
00:13:16,076 --> 00:13:17,174
and when we click on them,
224
00:13:17,211 --> 00:13:19,511
you can see the username and the login.
225
00:13:19,547 --> 00:13:22,047
Uh, it's all the information
to access these accounts.
226
00:13:22,081 --> 00:13:24,750
So, these people may not know
227
00:13:24,786 --> 00:13:27,952
that her e-mail has been hacked?
228
00:13:29,724 --> 00:13:30,822
Wow.
229
00:13:32,259 --> 00:13:34,293
So, my name could be in
there. I wouldn't even know.
230
00:13:50,143 --> 00:13:51,241
These cyber crimes
231
00:13:51,277 --> 00:13:52,911
are committed by blackhat hackers
232
00:13:52,946 --> 00:13:56,047
who can steal critical
data and damage networks.
233
00:13:56,081 --> 00:13:57,948
They exist anonymously on the web,
234
00:13:57,984 --> 00:14:00,618
but we found one who
agreed to talk to us.
235
00:14:01,988 --> 00:14:02,921
Hi, there.
236
00:14:04,090 --> 00:14:06,023
Gianna. Nice to meet you.
237
00:14:06,058 --> 00:14:07,991
- Gianna. Nice to meet you.
- Hi.
238
00:14:15,501 --> 00:14:18,201
Though he first hesitated,
Kostya eventually agreed
239
00:14:18,236 --> 00:14:20,104
to show us some of his hacks.
240
00:14:54,273 --> 00:14:57,005
And, so, what are you doing with
all this personal information?
241
00:15:03,548 --> 00:15:06,081
And then what will they
use that information for?
242
00:15:20,630 --> 00:15:21,773
What's the most amount of money
243
00:15:21,774 --> 00:15:24,200
you've made off of a hack like this one?
244
00:15:29,706 --> 00:15:32,006
Spurred by the trillions
of dollars online
245
00:15:32,043 --> 00:15:33,975
and a generation raised on the Web,
246
00:15:34,010 --> 00:15:36,311
hacking from Russia
and around the world,
247
00:15:36,346 --> 00:15:37,745
is flourishing.
248
00:15:37,780 --> 00:15:39,780
And increasingly, hackers are targeting
249
00:15:39,816 --> 00:15:41,982
the world's most lucrative market,
250
00:15:42,019 --> 00:15:43,152
the US.
251
00:15:43,187 --> 00:15:44,552
But at DHS,
252
00:15:44,587 --> 00:15:47,788
the first line of defense
are hackers themselves.
253
00:15:47,823 --> 00:15:50,192
I hack into agencies, and then,
254
00:15:50,226 --> 00:15:51,326
after the hacking is done,
255
00:15:51,361 --> 00:15:52,826
I go in, and I teach them how we did it,
256
00:15:52,863 --> 00:15:55,431
so then, they can actually go
through and fix those vulnerabilities
257
00:15:55,466 --> 00:15:57,599
so the actual bad guys can't get in.
258
00:15:57,634 --> 00:15:59,567
That's a map of 82,000
259
00:15:59,602 --> 00:16:01,602
critical infrastructures
sites in the United States
260
00:16:01,638 --> 00:16:03,538
that are basically exposed
directly to the Internet.
261
00:16:03,573 --> 00:16:06,139
- Wow.
- We're talking about water systems,
262
00:16:06,176 --> 00:16:08,208
manufacturing plants,
building automation.
263
00:16:08,244 --> 00:16:11,745
When you start to aggregate
it at a scale of 82,000, right,
264
00:16:11,782 --> 00:16:14,682
now, intruding upon a lot
of those systems all at once
265
00:16:14,717 --> 00:16:16,951
could cause, you know,
a significant issue.
266
00:16:16,986 --> 00:16:20,020
How do you see
cyber-attacks, uh, advancing,
267
00:16:20,057 --> 00:16:21,923
in the next 10, 20, 30 years?
268
00:16:21,958 --> 00:16:24,926
At a technical level, we're
gonna be constantly evolving.
269
00:16:24,961 --> 00:16:27,596
As adversaries create new capabilities,
270
00:16:27,630 --> 00:16:28,863
we'll create new countermeasures.
271
00:16:28,899 --> 00:16:31,365
As we advance past their
capabilities with countermeasures,
272
00:16:31,400 --> 00:16:33,134
they'll create new capabilities.
273
00:16:33,168 --> 00:16:36,738
It's always gonna be that kind
of arms race type of activity.
274
00:16:36,773 --> 00:16:39,006
I think this problem is one that...
275
00:16:39,042 --> 00:16:40,807
it's certainly one that we can work on,
276
00:16:40,842 --> 00:16:43,211
but I don't think it's ever
gonna completely go away.
277
00:16:43,245 --> 00:16:45,312
This is gonna be with us
for a long time, I think.
278
00:16:48,618 --> 00:16:51,851
Since 1980, outbreaks
of infectious diseases
279
00:16:51,886 --> 00:16:53,553
have more than tripled worldwide.
280
00:16:53,590 --> 00:16:55,623
Nearly every year,
somewhere around the globe,
281
00:16:55,658 --> 00:16:57,524
a different disease has emerged,
282
00:16:57,559 --> 00:17:00,394
leading to varying degrees of
infection and widespread panic.
283
00:17:00,430 --> 00:17:04,397
Fear of Ebola in infected
countries and beyond, is palpable.
284
00:17:04,433 --> 00:17:06,166
Bird Flu has hit North America.
285
00:17:06,201 --> 00:17:08,769
As our world continues to
become more interconnected,
286
00:17:08,804 --> 00:17:10,637
the threat of one of these outbreaks
287
00:17:10,673 --> 00:17:12,539
growing into a global pandemic
288
00:17:12,575 --> 00:17:14,307
is becoming increasingly real.
289
00:17:14,343 --> 00:17:16,609
To see if and how we
can actually prevent
290
00:17:16,645 --> 00:17:18,577
this next pandemic from happening,
291
00:17:18,614 --> 00:17:21,815
we sent Suroosh Alvi to
the Zika Forest in Uganda.
292
00:17:38,034 --> 00:17:40,834
So, we are walking into
the Zika Forest right now.
293
00:17:40,869 --> 00:17:42,234
We're with our pals
294
00:17:42,270 --> 00:17:45,872
from the Uganda Virus
Research Institute.
295
00:17:45,906 --> 00:17:48,575
We are gonna set up some insect traps,
296
00:17:48,609 --> 00:17:50,676
and discover new viruses.
297
00:18:13,401 --> 00:18:16,569
So, this is the very tower that was used
298
00:18:16,605 --> 00:18:19,306
to discover the original Zika virus?
299
00:18:19,340 --> 00:18:21,039
It was right here?
300
00:18:21,076 --> 00:18:24,542
Long before the Zika outbreak
in Brazil caused global panic,
301
00:18:24,578 --> 00:18:28,047
it was first discovered
here in Uganda in 1947.
302
00:18:28,083 --> 00:18:30,048
Pathogens are constantly mutating
303
00:18:30,085 --> 00:18:31,917
and acquiring new traits,
304
00:18:31,952 --> 00:18:34,319
so researchers monitor the mosquitoes
305
00:18:34,355 --> 00:18:36,122
to track the emerging infections
306
00:18:36,156 --> 00:18:38,124
that could ignite the next pandemic.
307
00:18:41,930 --> 00:18:43,328
Okay.
308
00:18:43,364 --> 00:18:45,396
There are mosquitoes flying
all around me right now.
309
00:18:45,432 --> 00:18:47,733
Doesn't fill me with warm and fuzzies.
310
00:18:48,836 --> 00:18:50,301
Tropical forests like this
311
00:18:50,337 --> 00:18:52,403
are breeding grounds for new viruses.
312
00:18:52,440 --> 00:18:54,873
Once untouched, human populations
313
00:18:54,907 --> 00:18:58,344
now destroy around seven million
hectares of forest each year,
314
00:18:58,378 --> 00:19:01,011
allowing diseases to have an easier time
315
00:19:01,048 --> 00:19:03,080
getting into human populations.
316
00:19:03,116 --> 00:19:04,650
There are houses right there.
317
00:19:04,684 --> 00:19:07,051
There's been encroachment
upon the forest,
318
00:19:07,086 --> 00:19:09,186
and the airport is just past the houses.
319
00:19:10,691 --> 00:19:12,057
What are the implications
320
00:19:12,092 --> 00:19:14,559
of people living so
close to this forest?
321
00:19:27,642 --> 00:19:28,740
Each year,
322
00:19:28,776 --> 00:19:30,407
a million people are killed
323
00:19:30,442 --> 00:19:32,509
by diseases transmitted from mosquitoes.
324
00:19:32,545 --> 00:19:35,445
And with increasing temperatures
and population growth,
325
00:19:35,481 --> 00:19:38,415
that death toll is expected
to climb in the coming years.
326
00:19:38,451 --> 00:19:41,419
The Zika vaccine trials
are progressing right now,
327
00:19:41,453 --> 00:19:44,588
and even though it's daunting
to vaccinate the entire world,
328
00:19:44,624 --> 00:19:47,724
scientists have proven
they can eliminate threats.
329
00:19:49,429 --> 00:19:50,795
In 1967,
330
00:19:50,829 --> 00:19:53,130
the World Health Organization
launched a campaign
331
00:19:53,165 --> 00:19:56,467
to eliminate one of the biggest
killers in human history.
332
00:19:56,502 --> 00:19:59,202
Dr. Larry Brilliant was part of the team
333
00:19:59,238 --> 00:20:00,637
that eradicated smallpox
334
00:20:00,673 --> 00:20:02,873
using a very simple concept.
335
00:20:02,909 --> 00:20:05,474
Instead of gong all
through India or Bangladesh
336
00:20:05,510 --> 00:20:07,042
and trying to vaccinate everybody,
337
00:20:07,077 --> 00:20:08,345
we got the idea
338
00:20:08,380 --> 00:20:10,314
that if we gave the vaccine
339
00:20:10,348 --> 00:20:11,847
only to those
340
00:20:11,883 --> 00:20:14,718
who were closest to an infected person,
341
00:20:14,752 --> 00:20:17,621
and you put a ring around
every infected person,
342
00:20:17,655 --> 00:20:19,423
with your scarce vaccine,
343
00:20:19,458 --> 00:20:21,290
you would abort the epidemic,
344
00:20:21,326 --> 00:20:22,925
and that's what worked.
345
00:20:22,961 --> 00:20:24,126
We have a lot of vaccines,
346
00:20:24,162 --> 00:20:27,096
but the vaccines we have
are for known viruses.
347
00:20:27,132 --> 00:20:29,566
When the next unknown virus
348
00:20:29,601 --> 00:20:31,099
jumps from an animal to a human,
349
00:20:31,135 --> 00:20:33,670
we're not gonna have
a vaccine on day one.
350
00:20:39,109 --> 00:20:40,742
These live bird markets are prevalent
351
00:20:40,778 --> 00:20:42,176
throughout the developing world,
352
00:20:42,212 --> 00:20:44,947
and the tight quarters
that these animals are in
353
00:20:44,981 --> 00:20:46,315
make it very easy
354
00:20:46,351 --> 00:20:48,517
for pathogens and infectious disease
355
00:20:48,552 --> 00:20:50,752
to spread from animals to humans.
356
00:20:53,724 --> 00:20:57,759
Almost 70% of human infections
357
00:20:57,795 --> 00:20:59,561
actually come from animals.
358
00:20:59,596 --> 00:21:01,396
Dr. Denis Byarugaba
359
00:21:01,432 --> 00:21:04,232
investigates the threat
of avian influenza
360
00:21:04,268 --> 00:21:06,000
in live bird markets.
361
00:21:06,036 --> 00:21:07,269
- Standing there...
- Yeah?
362
00:21:07,304 --> 00:21:10,338
... you could smell some
little bit of stuff...
363
00:21:10,375 --> 00:21:12,173
- Yeah.
- ... from the cages.
364
00:21:12,209 --> 00:21:15,376
Now, these are aerosols that
are coming from the cages.
365
00:21:15,412 --> 00:21:18,011
And should there be an
infection in those cages,
366
00:21:18,047 --> 00:21:19,446
you are automatically inhaling them.
367
00:21:19,482 --> 00:21:21,682
So, that smell that I
was smelling over there...
368
00:21:21,718 --> 00:21:24,117
what you are referring to as an aerosol,
369
00:21:24,153 --> 00:21:25,720
is potentially really bad for us?
370
00:21:25,756 --> 00:21:28,556
If there was any potential pathogen
371
00:21:28,592 --> 00:21:30,392
that was within those poultry,
372
00:21:30,426 --> 00:21:33,326
the likelihood that you would
pick it up from those aerosols,
373
00:21:33,363 --> 00:21:36,564
as the birds fluff their
feathers, is very high.
374
00:21:37,601 --> 00:21:39,534
There is a high concentration of poultry
375
00:21:39,568 --> 00:21:41,167
from different regions,
376
00:21:41,203 --> 00:21:44,506
where they are exposed and come
in with different infections.
377
00:21:44,540 --> 00:21:46,907
There is slaughtering of these birds
378
00:21:46,942 --> 00:21:48,208
within the markets,
379
00:21:48,242 --> 00:21:51,278
in very unhygienic conditions.
380
00:21:52,146 --> 00:21:54,247
And if these are zoonotic,
381
00:21:54,282 --> 00:21:56,817
then you expose and get this infection
382
00:21:56,852 --> 00:21:58,183
into the human population.
383
00:21:58,220 --> 00:22:00,953
Could you define or
explain what zoonosis is?
384
00:22:00,989 --> 00:22:03,323
Zoonosis is a disease
that is transmitted
385
00:22:03,357 --> 00:22:05,357
from animals to humans.
386
00:22:05,394 --> 00:22:08,394
The typical example is,
for example, influenza.
387
00:22:08,431 --> 00:22:09,996
And they are quite many.
388
00:22:12,300 --> 00:22:15,167
With the population
increases in these countries,
389
00:22:15,202 --> 00:22:18,704
should the world be afraid
of a crazy bird flu pandemic
390
00:22:18,740 --> 00:22:20,840
at a level that we've never seen before?
391
00:22:20,875 --> 00:22:23,476
For now, the major threat, actually,
392
00:22:23,510 --> 00:22:25,644
is those diseases that we are unable
393
00:22:25,680 --> 00:22:29,781
to find treatment for or contain.
394
00:22:29,817 --> 00:22:33,286
Each zoonotic disease
poses a unique threat.
395
00:22:33,322 --> 00:22:35,188
Transmitted from bodily fluids,
396
00:22:35,222 --> 00:22:36,855
the deadly Ebola epidemic
397
00:22:36,891 --> 00:22:39,692
was exacerbated by the
poorly-developed health systems
398
00:22:39,727 --> 00:22:42,828
and living conditions in West Africa.
399
00:22:42,864 --> 00:22:44,931
The SARS outbreak was less lethal
400
00:22:44,967 --> 00:22:47,467
but struck wealthy
countries as it went airborne
401
00:22:47,501 --> 00:22:50,369
and spread between people
in cities and hospitals.
402
00:22:50,404 --> 00:22:52,305
We are truly in the middle
403
00:22:52,340 --> 00:22:53,973
of the evolution of an epidemic.
404
00:22:54,009 --> 00:22:56,375
Global health systems were unprepared
405
00:22:56,410 --> 00:23:00,179
as these diseases devastated
people around the globe.
406
00:23:00,213 --> 00:23:02,615
But if a disease as deadly as Ebola
407
00:23:02,650 --> 00:23:04,817
can transmit through the air like SARS,
408
00:23:04,853 --> 00:23:06,719
the consequences would be dire.
409
00:23:06,753 --> 00:23:08,554
In the Netherlands,
410
00:23:08,589 --> 00:23:10,556
a scientist proved just how easily
411
00:23:10,592 --> 00:23:12,257
this mutation could occur.
412
00:23:12,292 --> 00:23:14,460
Dr. Ron Fouchier demonstrated
413
00:23:14,496 --> 00:23:18,029
how he genetically modified
the H5N1 bird flu virus
414
00:23:18,065 --> 00:23:20,398
to transmit through the air.
415
00:24:25,998 --> 00:24:30,468
A deadly airborne virus is
potentially a nightmare scenario,
416
00:24:30,502 --> 00:24:32,001
so why create it?
417
00:24:32,038 --> 00:24:35,705
To prove that the H5N1 bird flu virus
418
00:24:35,740 --> 00:24:38,942
could acquire the traits of
becoming airborne transmissible.
419
00:24:38,977 --> 00:24:41,677
So now we can find out
exactly what it takes
420
00:24:41,712 --> 00:24:45,382
for an animal virus to become airborne.
421
00:24:45,416 --> 00:24:47,517
Despite the breakthrough
of his findings,
422
00:24:47,552 --> 00:24:49,751
Dr. Fouchier's work sent shock waves
423
00:24:49,788 --> 00:24:51,555
through the international community.
424
00:24:51,589 --> 00:24:53,256
There were a lot of concerns about
425
00:24:53,291 --> 00:24:55,692
your findings being out in the public.
426
00:24:55,727 --> 00:24:59,061
Yes. So, when we submitted
our manuscript for publication,
427
00:24:59,097 --> 00:25:02,332
the US government judged
that our manuscript
428
00:25:02,366 --> 00:25:04,334
could be used by people to construct
429
00:25:04,368 --> 00:25:06,202
biological weapons of terror.
430
00:25:06,238 --> 00:25:09,405
We argued that the
information that we collected
431
00:25:09,441 --> 00:25:11,708
had to be sent back
432
00:25:11,742 --> 00:25:14,042
to the countries where
outbreaks are occurring
433
00:25:14,078 --> 00:25:17,346
to inform the people about
what to be on the lookout for.
434
00:25:17,381 --> 00:25:19,882
You eventually did
publish your findings,
435
00:25:19,917 --> 00:25:21,383
- is that correct?
- That's correct.
436
00:25:21,419 --> 00:25:24,753
We convinced the World
Health Organization
437
00:25:24,788 --> 00:25:26,623
to have a meeting with the countries
438
00:25:26,657 --> 00:25:28,324
that were facing outbreaks,
439
00:25:28,358 --> 00:25:31,393
to explain why they would
need the information.
440
00:25:31,429 --> 00:25:33,663
And so the people in Uganda
441
00:25:33,698 --> 00:25:36,098
or in Indonesia or
China who do surveillance
442
00:25:36,134 --> 00:25:38,267
can be on the lookout for the mutations
443
00:25:38,301 --> 00:25:40,169
and the biological traits
444
00:25:40,203 --> 00:25:42,171
associated with increased risk.
445
00:25:42,205 --> 00:25:43,640
What you're doing in the lab
446
00:25:43,674 --> 00:25:46,075
is happening in nature all the time.
447
00:25:46,111 --> 00:25:49,545
Absolutely. Flu pandemics
happen every 20, 30 years
448
00:25:49,579 --> 00:25:51,913
without any involvement of scientists...
449
00:25:51,949 --> 00:25:54,048
mad scientists or good scientists.
450
00:25:54,084 --> 00:25:56,652
What we did in the lab
was nothing different
451
00:25:56,686 --> 00:25:58,319
from what is happening
452
00:25:58,355 --> 00:26:00,888
in animals around the globe every day.
453
00:26:03,961 --> 00:26:05,426
When an animal virus mutates
454
00:26:05,462 --> 00:26:07,262
and spreads into the human population,
455
00:26:07,298 --> 00:26:09,964
it inevitably causes chaos and panic.
456
00:26:12,803 --> 00:26:16,372
As the Ebola crisis spiraled
out of control in 2014,
457
00:26:16,406 --> 00:26:20,709
the US government spent
$2.4 billion in response,
458
00:26:20,743 --> 00:26:24,244
more than a quarter of the US's
entire annual global health budget,
459
00:26:24,280 --> 00:26:27,013
pushing scientists like Dr. Brilliant
460
00:26:27,049 --> 00:26:30,017
to find more preemptive
solutions for future outbreaks.
461
00:26:30,052 --> 00:26:32,186
We have to strengthen public health
462
00:26:32,221 --> 00:26:35,190
in the poorest countries
to make ourselves safe.
463
00:26:35,224 --> 00:26:38,226
Human beings are only as strong
464
00:26:38,260 --> 00:26:42,096
as our weakest surveillance system.
465
00:26:42,131 --> 00:26:45,165
This is one instance
where "America first"
466
00:26:45,201 --> 00:26:48,236
means working with the
poorest countries of the world
467
00:26:48,270 --> 00:26:50,805
to protect them out of selfishness,
468
00:26:50,839 --> 00:26:53,240
our own enlightened self-interest.
469
00:26:55,477 --> 00:26:58,746
Uganda is now at the forefront
of deadly disease monitoring,
470
00:26:58,780 --> 00:27:01,882
with a remarkably effective
bio-surveillance system
471
00:27:01,917 --> 00:27:05,251
that was implemented with the
help of American health agencies
472
00:27:05,287 --> 00:27:06,586
and the US Army.
473
00:27:06,622 --> 00:27:09,355
These motorcycle guys, there's
a whole network of them.
474
00:27:09,391 --> 00:27:11,525
They ride around, they
pick up blood samples,
475
00:27:11,559 --> 00:27:14,661
and they take it from the local
clinics to the bigger hospitals.
476
00:27:14,696 --> 00:27:16,763
It was originally set up to deal with
477
00:27:16,798 --> 00:27:18,397
the HIV/AIDS epidemic.
478
00:27:18,433 --> 00:27:21,300
And then they had the very smart idea
479
00:27:21,336 --> 00:27:24,204
to piggyback the examination
480
00:27:24,240 --> 00:27:27,074
of the blood samples
for other infections
481
00:27:27,109 --> 00:27:30,109
like Ebola, SARS, yellow fever.
482
00:27:30,144 --> 00:27:33,479
It's very lo-fi and
rudimentary and cheap,
483
00:27:33,513 --> 00:27:34,847
but it's working.
484
00:27:44,992 --> 00:27:46,358
In 2007,
485
00:27:46,394 --> 00:27:50,462
146 people were infected by a
small Ebola outbreak in Uganda.
486
00:27:50,498 --> 00:27:53,566
Since then, three
outbreaks have emerged here,
487
00:27:53,601 --> 00:27:56,803
but this bio-surveillance
system helped prevent each one
488
00:27:56,837 --> 00:28:00,405
from spreading beyond 25 infections.
489
00:28:00,441 --> 00:28:02,540
It's not just surveillance of humans,
490
00:28:02,576 --> 00:28:04,676
it's surveillance of animals
491
00:28:04,711 --> 00:28:07,613
who could carry a virus
that we don't know about
492
00:28:07,648 --> 00:28:10,182
but has potential for human disease.
493
00:28:11,318 --> 00:28:13,951
We sample from poultry and swine,
494
00:28:13,988 --> 00:28:15,688
for rapid virus detection,
495
00:28:15,722 --> 00:28:17,890
so that immediately, we
are able to detect it,
496
00:28:17,924 --> 00:28:21,192
before it spreads out
massively to other areas.
497
00:28:21,228 --> 00:28:25,498
If we have good pandemic preparation,
498
00:28:25,532 --> 00:28:27,432
if we find outbreaks quickly,
499
00:28:27,468 --> 00:28:30,234
we won't have that
pandemic. It's our option.
500
00:28:31,306 --> 00:28:33,172
Outbreaks are inevitable,
501
00:28:33,207 --> 00:28:35,840
pandemics are optional.
39240
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.