All language subtitles for Spycraft - S01E07 WEB.eng

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian Download
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:12,360 --> 00:00:16,080 Codes and ciphers have been used to protect secrets 2 00:00:16,160 --> 00:00:18,840 from ancient times to modern day. 3 00:00:19,520 --> 00:00:21,960 Breaking these codes and ciphers 4 00:00:22,040 --> 00:00:25,680 is crucial spycraft for successful espionage. 5 00:00:26,200 --> 00:00:28,560 And it gave us vital information 6 00:00:28,640 --> 00:00:31,400 that we needed, for example, around the D-Day invasions. 7 00:00:32,320 --> 00:00:34,040 As codes are broken, 8 00:00:34,120 --> 00:00:37,320 more complex systems are developed to protect them. 9 00:00:38,400 --> 00:00:43,000 They created 11 models of Colossus, 10 00:00:43,080 --> 00:00:46,440 which was the world's first electronic computer. 11 00:00:47,160 --> 00:00:50,960 Nevertheless, advancements in technology come with risks. 12 00:00:52,240 --> 00:00:54,560 But to go into the ones and zeros 13 00:00:54,640 --> 00:00:57,240 and discover a vulnerability you can exploit. 14 00:00:57,320 --> 00:01:00,480 - That's the next level. - Next level technology 15 00:01:00,560 --> 00:01:04,440 seeks to override the safety measures of cryptography. 16 00:01:08,000 --> 00:01:09,800 Unlike physical attacks, 17 00:01:09,880 --> 00:01:13,960 cyber-related attacks have a immediate impact. 18 00:01:15,640 --> 00:01:17,400 They don't need to send bombs. 19 00:01:21,640 --> 00:01:22,640 How bad can it get? 20 00:01:22,680 --> 00:01:25,600 I've used words catastrophic and existential. 21 00:01:25,680 --> 00:01:28,040 As the threat intensifies, 22 00:01:28,120 --> 00:01:30,880 so does the job of the codebreaker. 23 00:01:31,400 --> 00:01:35,040 They always describe the espionage as a chess match. 24 00:01:35,120 --> 00:01:37,080 It's the same thing with electronics. 25 00:02:09,080 --> 00:02:12,160 Codes and ciphers have played an important role 26 00:02:12,280 --> 00:02:15,040 in keeping information private throughout history. 27 00:02:16,000 --> 00:02:19,320 What began with secret writings to hide information 28 00:02:19,400 --> 00:02:22,560 has progressed to electro-mechanical ciphers 29 00:02:22,640 --> 00:02:27,760 and then computers to send messages, and to decipher and break them. 30 00:02:28,400 --> 00:02:32,480 Today, cyber espionage is used by intelligence agencies 31 00:02:32,560 --> 00:02:34,520 and adversaries alike, 32 00:02:34,600 --> 00:02:39,120 and has proved a useful strategy in the collection or corruption of data, 33 00:02:39,640 --> 00:02:44,640 stealing technology and patents, disrupting critical infrastructures, 34 00:02:44,720 --> 00:02:48,360 and allowing for advanced warning of an enemy's attack. 35 00:02:48,960 --> 00:02:53,800 Every government in history has prized secrecy, 36 00:02:53,880 --> 00:02:57,560 and has understood the importance of being able to communicate 37 00:02:58,400 --> 00:03:02,080 among the leaders, and among their various embassies, 38 00:03:02,160 --> 00:03:05,840 in a way that could not be read by their opponents. 39 00:03:06,560 --> 00:03:09,600 Codes and ciphers can be used to send messages 40 00:03:09,680 --> 00:03:11,880 that can be communicated secretly, 41 00:03:12,480 --> 00:03:14,760 but the two are often confused. 42 00:03:14,840 --> 00:03:17,360 So if you use a code word, Geronimo, 43 00:03:17,440 --> 00:03:23,040 it may mean we successfully assassinated Osama Bin Laden. 44 00:03:24,560 --> 00:03:27,520 One word means many things. 45 00:03:27,600 --> 00:03:34,360 A cipher, in the contrast, is a particular type of code which usually means 46 00:03:34,440 --> 00:03:38,440 that letters had been transposed or interchanged, 47 00:03:39,000 --> 00:03:43,240 so that a message that had 550 characters 48 00:03:43,840 --> 00:03:46,280 may still again have 550 characters, 49 00:03:46,360 --> 00:03:48,560 but they've been arranged in a way 50 00:03:48,640 --> 00:03:51,800 that they're unreadable without the key to the cipher. 51 00:03:52,800 --> 00:03:55,320 Ciphers are a form of codes. 52 00:03:57,880 --> 00:03:59,440 Thomas Jefferson, 53 00:03:59,520 --> 00:04:02,400 one of the founding fathers of the United States, 54 00:04:02,480 --> 00:04:04,400 and a great statesman, 55 00:04:04,480 --> 00:04:07,480 realized the value of secret correspondence. 56 00:04:07,560 --> 00:04:09,240 And in his papers, 57 00:04:09,840 --> 00:04:15,440 were found the plans for a device we call the Jeffersonian cipher wheel. 58 00:04:19,560 --> 00:04:21,280 You had a rod, 59 00:04:21,360 --> 00:04:25,480 and you would assemble the disks in a certain order. 60 00:04:25,560 --> 00:04:26,920 Once they were assembled, 61 00:04:27,000 --> 00:04:30,560 you would adjust each disk when properly aligned, 62 00:04:30,640 --> 00:04:34,320 here were now the characters of your message. 63 00:04:34,400 --> 00:04:38,520 You would then arbitrarily pick a number, let's say ten. 64 00:04:38,600 --> 00:04:42,400 You would then go to the 10th row of letters above that, 65 00:04:42,480 --> 00:04:44,440 which'll just be gobbledygook, 66 00:04:44,520 --> 00:04:46,800 and you would write down those letters, 67 00:04:46,880 --> 00:04:50,520 and that is what you would send as your message. 68 00:04:51,120 --> 00:04:53,560 Now the person with the corresponding piece 69 00:04:53,640 --> 00:04:58,000 had to know the order in which the rotors would be assembled. 70 00:04:58,600 --> 00:05:03,880 And once they did that, they would simply align the letters, 71 00:05:03,960 --> 00:05:06,000 so you would read the gobbledygook, 72 00:05:06,080 --> 00:05:09,400 and then they would back off ten characters, 73 00:05:09,480 --> 00:05:11,520 and there would be the precise message. 74 00:05:14,080 --> 00:05:15,800 In fact, it was so clever 75 00:05:16,200 --> 00:05:19,040 that the U.S. government found this in his files, 76 00:05:19,640 --> 00:05:23,960 and in 1920, began producing these for the U.S. Army, 77 00:05:24,040 --> 00:05:27,840 and it was called the M94 Signal Device. 78 00:05:27,920 --> 00:05:30,560 And it was actively used in the U.S. military 79 00:05:30,640 --> 00:05:34,000 between 1920 and the beginning of World War II. 80 00:05:34,600 --> 00:05:36,400 Back in Jefferson's time, 81 00:05:36,480 --> 00:05:39,400 ciphers and secret writings depended on algorithms 82 00:05:39,480 --> 00:05:41,320 created by the human mind. 83 00:05:42,280 --> 00:05:45,640 But between 1915 and 1924, 84 00:05:45,720 --> 00:05:48,800 things changed with the advent of a device 85 00:05:48,880 --> 00:05:51,480 called the Hebron Electric Rotor Machine. 86 00:05:51,560 --> 00:05:53,400 For the very first time, 87 00:05:53,480 --> 00:05:58,400 it was possible to produce a stream of ciphers 88 00:05:58,480 --> 00:06:01,800 created by an electromechanical rotor system 89 00:06:02,520 --> 00:06:06,520 that could not be solved by human minds alone. 90 00:06:07,080 --> 00:06:10,600 And it was the first of a series of rotor systems 91 00:06:10,680 --> 00:06:14,160 that would be used over the next 50 years 92 00:06:14,240 --> 00:06:16,600 that would change how ciphers were created. 93 00:06:17,560 --> 00:06:20,960 In 1924, a man named Arthur Scherbius 94 00:06:21,040 --> 00:06:24,360 took the same basic concept and created what would be 95 00:06:24,440 --> 00:06:28,720 one of the most important cipher devices of the 20th century, 96 00:06:28,800 --> 00:06:31,360 the German Enigma cipher machine. 97 00:06:33,120 --> 00:06:35,040 And his idea was 98 00:06:35,120 --> 00:06:36,800 that each machine 99 00:06:38,200 --> 00:06:40,360 contained a series of rotors. 100 00:06:40,880 --> 00:06:43,880 Each rotor had 26 settings 101 00:06:44,400 --> 00:06:45,920 that could be changed, 102 00:06:46,520 --> 00:06:49,400 and in the front of the machine 103 00:06:49,480 --> 00:06:52,480 were a series of Stécker or cords 104 00:06:53,080 --> 00:06:55,680 that was a plug board arrangement. 105 00:06:56,320 --> 00:06:58,080 And the idea was, 106 00:06:58,160 --> 00:07:01,080 it would take two people to operate the Enigma. 107 00:07:01,680 --> 00:07:04,840 And the first person would take the clear text message 108 00:07:05,360 --> 00:07:08,040 and he would press the letter A, for example, 109 00:07:08,120 --> 00:07:10,240 if that's the first letter of the message. 110 00:07:11,040 --> 00:07:15,120 And the message would then go from that A, 111 00:07:15,200 --> 00:07:17,400 down to the plug board, and the plug board 112 00:07:17,480 --> 00:07:20,680 would route it to a different number or a different letter. 113 00:07:21,720 --> 00:07:24,360 That letter would in turn go to the first rotor, 114 00:07:24,440 --> 00:07:26,600 into one of 26 permutations. 115 00:07:27,280 --> 00:07:30,360 Then it would go into the second rotor, 26 permutations, 116 00:07:30,440 --> 00:07:34,480 the third rotor, 26 permutations, hit a reflector, 117 00:07:35,040 --> 00:07:38,800 come back times 26, times 26, times 26, 118 00:07:39,320 --> 00:07:40,720 come into the plug board, 119 00:07:41,360 --> 00:07:45,720 and then another light would be lit. 120 00:07:45,800 --> 00:07:51,240 When it had completed its 26 rotations, which was called a jumbo, 121 00:07:51,320 --> 00:07:53,800 then all of the rotors moved. 122 00:07:53,880 --> 00:07:57,560 And the combination of the complexity of this device 123 00:07:58,520 --> 00:08:01,440 was greater than human minds could decipher. 124 00:08:02,040 --> 00:08:04,760 And the advantages of it 125 00:08:04,840 --> 00:08:07,840 quickly were recognized by the German military. 126 00:08:07,920 --> 00:08:10,400 It was adopted in the early 1930s 127 00:08:10,480 --> 00:08:13,080 as the primary communication tool 128 00:08:13,160 --> 00:08:16,560 of the Wehrmacht, the German military, the Luftwaffe. 129 00:08:25,160 --> 00:08:27,320 The Enigma Machine played a crucial part 130 00:08:27,400 --> 00:08:31,680 in the communication among the Nazi forces during World War II. 131 00:08:33,560 --> 00:08:35,520 In the early 1930s, 132 00:08:35,600 --> 00:08:39,680 Polish codebreakers had developed a machine called the Bomba 133 00:08:39,760 --> 00:08:43,520 that had successfully deciphered some of the Enigma messages, 134 00:08:44,680 --> 00:08:48,600 but the Germans kept modifying it to make it more complex. 135 00:08:49,600 --> 00:08:53,200 The British and their allies were determined to break it, 136 00:08:53,280 --> 00:08:55,240 and in 1939, 137 00:08:55,320 --> 00:08:58,360 the British Government set up a code and cipher school 138 00:08:58,440 --> 00:09:02,640 known as Station X at Bletchley Park just outside of London. 139 00:09:06,200 --> 00:09:09,040 And it was built around the Bletchley Park Manor. 140 00:09:09,120 --> 00:09:11,520 That and a large number of huts. 141 00:09:12,120 --> 00:09:14,640 And the huts contained different groups 142 00:09:14,720 --> 00:09:17,400 which were attacking individual. 143 00:09:18,840 --> 00:09:20,080 Enigma ciphers. 144 00:09:21,120 --> 00:09:24,080 Every message transmitted by the Nazis 145 00:09:24,160 --> 00:09:26,480 went through British listening posts, 146 00:09:26,560 --> 00:09:29,320 which were copied down in their code groups 147 00:09:29,400 --> 00:09:33,720 and telegraphed to the secret army of codebreakers at Bletchley Park. 148 00:09:34,400 --> 00:09:39,440 The British described any intelligence gained from Enigma as Ultra 149 00:09:39,520 --> 00:09:41,360 and considered it top secret. 150 00:09:42,040 --> 00:09:46,000 And it gave us vital information that we needed, for example, 151 00:09:46,080 --> 00:09:48,120 around the D-Day invasions. 152 00:09:48,200 --> 00:09:50,400 And it helped us understand 153 00:09:50,480 --> 00:09:53,920 the success of some of our deception operations 154 00:09:54,000 --> 00:09:59,240 and helped us to tweak them to try to confuse the Germans. 155 00:10:03,840 --> 00:10:06,640 But the real game changer was Alan Turing, 156 00:10:06,720 --> 00:10:09,680 a 24-year-old mathematical genius. 157 00:10:14,040 --> 00:10:18,120 Turing, during World War II, worked at Bletchley Park, 158 00:10:18,600 --> 00:10:21,080 the government code and cipher school, 159 00:10:21,160 --> 00:10:25,920 and spent his time attacking the German Enigma cipher. 160 00:10:26,520 --> 00:10:29,800 Turing came up with the idea behind Colossus, 161 00:10:29,880 --> 00:10:33,840 a set of computers developed to help in cryptanalysis. 162 00:10:39,040 --> 00:10:44,480 During World War II, they created 11 models of Colossus, 163 00:10:45,240 --> 00:10:48,800 which was the world's first electronic computer. 164 00:10:48,880 --> 00:10:51,280 It was one of the great accomplishments of the war. 165 00:10:51,360 --> 00:10:56,120 Historians estimate that it shortened World War II 166 00:10:56,200 --> 00:10:58,640 by between two and four years. 167 00:10:58,720 --> 00:11:04,400 Turing, however, as brilliant as he was, had a very troubled personal life. 168 00:11:04,480 --> 00:11:08,480 He was a homosexual at a time that homosexuality 169 00:11:08,560 --> 00:11:11,960 was seen as a disability 170 00:11:12,040 --> 00:11:16,600 and seen as a vulnerability for recruitment by foreign spies. 171 00:11:16,680 --> 00:11:21,680 His security clearances were revoked in the early 1950s, and very sadly, 172 00:11:22,280 --> 00:11:26,760 he committed suicide by biting into a poisoned apple, 173 00:11:26,840 --> 00:11:29,360 and the world lost one of our great minds. 174 00:11:32,640 --> 00:11:37,240 It's very interesting today and probably only a coincidence, 175 00:11:37,960 --> 00:11:41,440 but if you look at the logo of Apple computer, 176 00:11:42,000 --> 00:11:45,760 you'll see an apple with a bite out of it, 177 00:11:46,320 --> 00:11:50,760 and though they disclaim any association with Alan Turing, 178 00:11:52,160 --> 00:11:54,080 it certainly seems, at one level, 179 00:11:54,160 --> 00:11:57,160 someone was paying homage to Turing 180 00:11:57,240 --> 00:12:01,320 and his role in creating the world's first electronic computer. 181 00:12:01,880 --> 00:12:08,040 Enigma's settings offered 158 quintillion possible solutions, 182 00:12:08,120 --> 00:12:12,080 yet the Allies were eventually able to crack its code. 183 00:12:12,840 --> 00:12:17,480 Thanks to the advances made by Alan Turing and other codebreakers today, 184 00:12:17,560 --> 00:12:19,920 mathematicians and scientists 185 00:12:20,000 --> 00:12:23,280 are developing next level quantum computing. 186 00:12:23,360 --> 00:12:25,160 In terms of espionage collection, 187 00:12:25,240 --> 00:12:27,760 quantum computing just basically makes cryptography 188 00:12:28,720 --> 00:12:32,280 potentially more difficult, because now people say, 189 00:12:32,360 --> 00:12:36,600 "Well, you're using algorithms that are known to be breakable." 190 00:12:36,680 --> 00:12:38,520 Yeah, they're known to be breakable, 191 00:12:38,600 --> 00:12:40,880 but it's going to take you a long time to break them. 192 00:12:40,960 --> 00:12:43,760 The information at that point's perishable. 193 00:12:43,840 --> 00:12:47,160 Now we're talking a different game all together. 194 00:12:47,240 --> 00:12:49,840 So if all the encryption algorithms we're using 195 00:12:49,920 --> 00:12:51,680 can be broken by the opposition 196 00:12:51,760 --> 00:12:53,960 at the same speed you're actually using it, 197 00:12:54,040 --> 00:12:55,960 when you're decrypting it with the key 198 00:12:56,040 --> 00:12:58,360 and they're decrypting it with quantum computing, 199 00:12:58,440 --> 00:13:00,720 ugh, that gets a little difficult. 200 00:13:02,360 --> 00:13:04,200 Modern computers, 201 00:13:04,280 --> 00:13:07,560 highly advanced versions of the ones used in Bletchley Park, 202 00:13:07,640 --> 00:13:10,240 now dominate the world of cryptology. 203 00:13:15,120 --> 00:13:19,200 In an age when billions of people, governments, and rogue states 204 00:13:19,280 --> 00:13:21,000 are digitally connected, 205 00:13:21,080 --> 00:13:23,800 today's scientists and hackers 206 00:13:23,880 --> 00:13:26,840 have discovered that it is possible to use malware 207 00:13:26,920 --> 00:13:29,480 to steal data off your digital device 208 00:13:29,560 --> 00:13:34,000 that completely evades the protections built with cryptography. 209 00:13:39,800 --> 00:13:43,520 Spyware is a software that can be planted 210 00:13:43,600 --> 00:13:48,040 by adversarial parties on your system. 211 00:13:48,120 --> 00:13:51,360 They have the ability to collect information. 212 00:13:51,440 --> 00:13:53,840 They can collect your passwords. 213 00:13:53,920 --> 00:13:56,800 They can record your conversations. 214 00:13:56,880 --> 00:14:02,320 If you are making webinar calls or phone calls using your computer, 215 00:14:02,400 --> 00:14:08,720 they can turn on your camera and record anything that you are doing. 216 00:14:08,800 --> 00:14:13,480 All these are part of the spyware activities. 217 00:14:14,200 --> 00:14:18,120 And that can be used against the person or against the government. 218 00:14:20,160 --> 00:14:25,800 Foreign entities can use this information about people 219 00:14:25,880 --> 00:14:31,280 who have clearances, for instance, can go and target those people. 220 00:14:34,280 --> 00:14:37,920 It's not just a normal level of technical sophistication 221 00:14:38,000 --> 00:14:40,080 that gives you this kind of capability, 222 00:14:40,160 --> 00:14:44,200 but to go into the micro-electronics, and go into the ones and zeros 223 00:14:44,280 --> 00:14:48,000 and discover a vulnerability within that system that you can exploit. 224 00:14:48,600 --> 00:14:49,600 That's next level. 225 00:14:57,520 --> 00:15:00,520 There are multiple definitions for cyber warfare, 226 00:15:01,160 --> 00:15:04,120 but they generally all come down to the same thing. 227 00:15:04,920 --> 00:15:07,720 It's using techniques 228 00:15:08,480 --> 00:15:11,000 to attack another country 229 00:15:11,520 --> 00:15:14,400 over an electronic or cyber means, 230 00:15:14,480 --> 00:15:18,480 without resulting to physical warfare, 231 00:15:18,560 --> 00:15:24,400 but you're still causing significant damage and harm to the target. 232 00:15:24,480 --> 00:15:27,120 Between 2000 and 2003, 233 00:15:27,200 --> 00:15:30,880 a series of widespread cyberespionage attacks 234 00:15:30,960 --> 00:15:32,880 code-named Titan Rain 235 00:15:32,960 --> 00:15:36,680 were launched against the American defense infrastructure, 236 00:15:37,280 --> 00:15:43,320 targeting high-level organizations like NASA, Sandia, and Lockheed Martin. 237 00:15:44,040 --> 00:15:46,280 The longest running attack 238 00:15:46,360 --> 00:15:49,200 against the United States has been Titan Rain, 239 00:15:49,960 --> 00:15:53,680 which targeted specifically at our intelligence services. 240 00:15:53,760 --> 00:15:57,240 The cyberattacks extradited vital information, 241 00:15:57,320 --> 00:16:02,360 and left behind virtually undetectable beacons on compromised systems, 242 00:16:02,440 --> 00:16:05,040 allowing them to reenter at will. 243 00:16:05,120 --> 00:16:08,840 They averaged approximately 10-30 minutes per attack 244 00:16:09,440 --> 00:16:15,040 and transmitted to drop zones located in South Korea, Hong Kong, and Taiwan 245 00:16:15,120 --> 00:16:18,320 prior to forwarding the data on to mainland China. 246 00:16:19,640 --> 00:16:25,640 And it happens thousands and thousands of times a day, an hour, 247 00:16:25,720 --> 00:16:28,040 repeated attacks against our systems. 248 00:16:28,920 --> 00:16:30,440 And it's never let up. 249 00:16:31,760 --> 00:16:34,680 Investigators discovered the cyber breaches 250 00:16:34,760 --> 00:16:38,840 were part of state sponsored cyber espionage attacks 251 00:16:38,920 --> 00:16:41,560 conducted by the People's Republic of China. 252 00:16:42,600 --> 00:16:48,080 Some of the information exfiltrated included aerospace documentation, 253 00:16:48,160 --> 00:16:50,160 schematics from the Mars Orbiter, 254 00:16:50,240 --> 00:16:54,760 and flight planning software used by the United States Air Force. 255 00:16:58,840 --> 00:17:03,640 Another dramatic act of espionage was discovered in 2010 256 00:17:03,720 --> 00:17:06,480 and involved a multi-nation cyberattack 257 00:17:06,560 --> 00:17:08,880 against Iran's nuclear program. 258 00:17:08,960 --> 00:17:10,960 It was called Stuxnet. 259 00:17:19,480 --> 00:17:20,880 Stuxnet 260 00:17:21,800 --> 00:17:25,360 exists because it was written 261 00:17:25,880 --> 00:17:31,960 to attack the Siemens 7 operating system 262 00:17:32,040 --> 00:17:37,520 that ran in a Windows environment in the plants in Iran 263 00:17:37,600 --> 00:17:41,800 where they spun the centrifuges to enrich the uranium. 264 00:17:52,320 --> 00:17:55,880 The Stuxnet attack, which allegedly was done by combinations 265 00:17:55,960 --> 00:17:58,640 of Israel, the United States, western Europe, 266 00:17:58,720 --> 00:18:04,000 as time goes by, the population gets larger and larger of who was involved, 267 00:18:04,080 --> 00:18:07,280 attacked Iranian development nuclear production capabilities, 268 00:18:07,360 --> 00:18:09,840 and brought down various systems 269 00:18:09,920 --> 00:18:13,040 basically by being able to infect them with a virus. 270 00:18:13,120 --> 00:18:17,000 Since the Iranian computer systems didn't connect to the internet, 271 00:18:17,080 --> 00:18:21,960 the Stuxnet virus had to be introduced into the operating system 272 00:18:22,040 --> 00:18:24,680 through other more clandestine means. 273 00:18:24,760 --> 00:18:27,480 I've heard remote maintenance access. 274 00:18:27,560 --> 00:18:31,120 I've heard the laptop, they walked in, connected the laptop. 275 00:18:31,200 --> 00:18:36,320 You know, every possible means will be postulated as an attack. 276 00:18:37,800 --> 00:18:39,440 A popular theory 277 00:18:39,520 --> 00:18:43,080 is that the Stuxnet virus was introduced to the system 278 00:18:43,160 --> 00:18:48,320 through infected thumb drives placed around the nuclear facility in Iran. 279 00:18:56,280 --> 00:18:59,440 If you had a very high-grade thumb drive, 280 00:18:59,520 --> 00:19:01,880 and you drop them selectively in parking lots 281 00:19:01,960 --> 00:19:05,440 or you dropped them from the air, or you somehow introduced them, 282 00:19:05,520 --> 00:19:08,680 someone's going to finally take and put that into the machine 283 00:19:08,760 --> 00:19:10,440 to see who it belongs to. 284 00:19:10,520 --> 00:19:14,400 And that's all it takes is one time to basically infect it. 285 00:19:14,480 --> 00:19:18,360 The exact method of how the thumb drives were introduced 286 00:19:18,440 --> 00:19:19,920 has never been revealed, 287 00:19:20,440 --> 00:19:21,840 but the plan worked 288 00:19:21,920 --> 00:19:26,640 and Stuxnet penetrated Iran's operating system and attacked. 289 00:19:26,720 --> 00:19:33,160 What the system did was, it went to the Siemens controller, 290 00:19:34,200 --> 00:19:38,240 and it sent a signal then to the operator 291 00:19:38,320 --> 00:19:42,360 who's manning the speed of the centrifuges that says, 292 00:19:42,880 --> 00:19:45,640 "This centrifuge is slowing down," 293 00:19:46,200 --> 00:19:50,080 which would mean the operator would want to turn up the speed 294 00:19:50,840 --> 00:19:52,280 to increase it working. 295 00:19:52,880 --> 00:19:54,880 But that was a fake signal. 296 00:19:54,960 --> 00:19:59,440 And the more he turned it up, the more it appeared to slow down. 297 00:19:59,520 --> 00:20:03,600 And so the operators kept turning up the speed of the centrifuges, 298 00:20:03,680 --> 00:20:05,280 and in effect, 299 00:20:05,360 --> 00:20:07,440 they tore themselves apart, 300 00:20:07,960 --> 00:20:12,080 and literally it destroyed a significant component 301 00:20:12,160 --> 00:20:15,120 of the Iranian system for enriching uranium. 302 00:20:16,080 --> 00:20:20,840 It was a very, very effective attack, 303 00:20:20,920 --> 00:20:24,840 and the world's probably a bit safer for a while longer because of it. 304 00:20:26,520 --> 00:20:28,880 It's not only big government installations 305 00:20:28,960 --> 00:20:31,800 and organizations that are getting hit. 306 00:20:31,880 --> 00:20:36,280 Cyberattacks happen wherever there are loopholes or open ports 307 00:20:36,360 --> 00:20:38,160 that can be exploited, 308 00:20:38,240 --> 00:20:40,440 like our own personal devices. 309 00:20:41,360 --> 00:20:44,800 Today, every person carries with them a machine 310 00:20:44,880 --> 00:20:47,440 that's more powerful than Enigma, 311 00:20:47,520 --> 00:20:48,520 a cell phone. 312 00:20:51,320 --> 00:20:55,200 So where you're at, you're usually carrying a cell phone with you. 313 00:20:55,280 --> 00:20:59,440 So all your positioning information, where you've been, where you're going, 314 00:20:59,520 --> 00:21:01,760 you know, 'cause you've got things in your calendar, 315 00:21:01,840 --> 00:21:04,440 you've sent messages to people, um… 316 00:21:04,960 --> 00:21:07,800 All that information, I'm not saying is being collected, 317 00:21:07,880 --> 00:21:10,080 but all that information can be collected. 318 00:21:10,160 --> 00:21:14,440 The modern smartphone as we know today, 319 00:21:14,520 --> 00:21:16,760 has evolved over the decade. 320 00:21:17,680 --> 00:21:22,200 The processing power embedded in these systems are immense. 321 00:21:22,280 --> 00:21:26,360 They have the ability to do cryptography on the fly 322 00:21:26,440 --> 00:21:28,080 as a part of the hardware. 323 00:21:28,160 --> 00:21:34,000 This adds significant benefits for individuals but, for adversaries, 324 00:21:34,080 --> 00:21:39,600 it allows them to capture a great deal of private information about you. 325 00:21:40,200 --> 00:21:44,800 Not only are adversaries able to exploit information stolen from you, 326 00:21:45,320 --> 00:21:49,240 they can also benefit from some of the same applications. 327 00:21:52,640 --> 00:21:56,400 In late November 2008, 328 00:21:57,440 --> 00:21:59,640 the Lashkar-e-Taiba, 329 00:22:00,680 --> 00:22:03,360 the Pakistani terrorist group, 330 00:22:03,440 --> 00:22:08,840 launched a sophisticated coordinated attack 331 00:22:09,520 --> 00:22:11,560 against the city of Mumbai. 332 00:22:13,200 --> 00:22:14,760 It was so effective 333 00:22:15,360 --> 00:22:21,120 that it's the first attack that used cell phones 334 00:22:21,920 --> 00:22:24,680 as weapons of mass disruption. 335 00:22:25,200 --> 00:22:29,000 Ten individuals armed only with cell phones, small arms, 336 00:22:29,080 --> 00:22:31,960 and hand grenades were able to paralyze Mumbai, 337 00:22:32,040 --> 00:22:36,400 one of the largest cities in India, and capture the attention of the world. 338 00:22:37,120 --> 00:22:43,080 And it showed how useful cell phones can be 339 00:22:43,680 --> 00:22:47,680 to disrupt communications, to plan an attack. 340 00:22:49,160 --> 00:22:54,000 The Lashkar-e-Taiba layered 16 levels 341 00:22:54,080 --> 00:22:57,240 of commercial off-the-shelf technology, 342 00:22:58,200 --> 00:23:03,120 and enabled the terrorist to communicate secretly, 343 00:23:03,680 --> 00:23:10,240 and to be controlled in real time by their handlers back in Pakistan. 344 00:23:11,080 --> 00:23:15,840 In the same way that our U.S. military has the advanced technology 345 00:23:15,920 --> 00:23:20,720 that we can have cameras on a helmet, or can have an earphone, 346 00:23:20,800 --> 00:23:24,880 and you can talk to your command structure back thousands of miles away 347 00:23:25,600 --> 00:23:28,640 using only commercial technology, 348 00:23:29,440 --> 00:23:31,800 the terrorists were able to do the same thing 349 00:23:31,880 --> 00:23:34,640 from their control points in Pakistan. 350 00:23:35,320 --> 00:23:41,960 By swapping SIM cards, by swapping phones, by taking phones from victims, 351 00:23:42,040 --> 00:23:46,760 they were able to completely confuse, confound, 352 00:23:46,840 --> 00:23:49,080 and befuddle the Mumbai authorities. 353 00:23:49,160 --> 00:23:53,720 They had no idea how many people were attacking them. 354 00:23:53,800 --> 00:23:57,600 Estimates were, it was between one and 200 people. 355 00:23:57,680 --> 00:24:01,720 In reality, it was ten lone individuals. 356 00:24:02,760 --> 00:24:05,440 Seven years after the Mumbai attacks, 357 00:24:05,960 --> 00:24:09,640 terrorist attacks on the cafés, soccer stadium, 358 00:24:09,720 --> 00:24:13,760 and Bataclan theater in Paris showed striking similarities. 359 00:24:16,320 --> 00:24:19,680 It was all coordinated by a cell 360 00:24:20,760 --> 00:24:23,080 that was in Paris and in Brussels. 361 00:24:23,760 --> 00:24:26,240 And they had known each other for years. 362 00:24:27,000 --> 00:24:31,840 There was no advanced chatter detected on the internet, 363 00:24:32,760 --> 00:24:39,640 and they kept their communications point-to-point encryptioned, 364 00:24:39,720 --> 00:24:40,920 using systems 365 00:24:42,120 --> 00:24:44,840 that were encrypted the entire way, 366 00:24:44,920 --> 00:24:49,360 so there was no way to get any advanced warning of it. 367 00:24:49,440 --> 00:24:53,640 And it has to be the harbinger of future terrorist attacks. 368 00:24:54,240 --> 00:24:56,000 And it's frightening 369 00:24:56,880 --> 00:25:01,880 when we don't have the pre-attack chatter to help us be prepared. 370 00:25:07,360 --> 00:25:11,760 As our society becomes more and more dependent on technology, 371 00:25:11,840 --> 00:25:15,360 we also become more vulnerable to potential attacks. 372 00:25:15,440 --> 00:25:18,200 As the cities evolve, they become smarter. 373 00:25:18,280 --> 00:25:23,960 Today, your phone has the ability to emit you are a pedestrian 374 00:25:24,480 --> 00:25:26,400 in a smart city environment. 375 00:25:26,480 --> 00:25:29,640 So when cars come too close to the pedestrians, 376 00:25:29,720 --> 00:25:33,680 the smart cars have the ability to break and avoid the accident. 377 00:25:33,760 --> 00:25:35,520 But at the same time, 378 00:25:35,600 --> 00:25:38,360 that information can reveal your identity. 379 00:25:38,960 --> 00:25:42,240 Adversaries can utilize that information 380 00:25:42,320 --> 00:25:48,320 and turn car into assassination device to attack a person. 381 00:25:48,400 --> 00:25:51,240 Instead of stopping, they can accelerate the car. 382 00:25:54,400 --> 00:25:59,160 With billions of people online and every government sending out signals, 383 00:25:59,240 --> 00:26:03,440 the sheer scale of the codebreakers' job is mind boggling. 384 00:26:10,560 --> 00:26:14,640 As a result, ciphers have become increasingly complex. 385 00:26:15,200 --> 00:26:20,200 Chess… They always describe the espionage as a chess match, right? 386 00:26:20,280 --> 00:26:22,680 You move, we countermove, you move, we countermove. 387 00:26:22,760 --> 00:26:24,600 Same thing with electronics. 388 00:26:26,240 --> 00:26:30,520 A hostile organization having access to detailed information 389 00:26:30,600 --> 00:26:33,760 about a person or government is frightening. 390 00:26:33,840 --> 00:26:37,920 But even more daunting are cyber assaults that have the potential 391 00:26:38,000 --> 00:26:40,800 to shut down a country's infrastructure. 392 00:26:40,880 --> 00:26:44,960 The closest we've ever seen to a country being shut down 393 00:26:45,760 --> 00:26:47,880 was the Russian attack on Estonia. 394 00:26:48,680 --> 00:26:54,080 You have also the hacking community in Russia who are told, 395 00:26:54,880 --> 00:26:56,600 "You can steal as much as you want, 396 00:26:56,680 --> 00:26:59,360 but when the knock comes on the door in the middle of the night, 397 00:26:59,440 --> 00:27:01,640 we ask you to do something, you're gonna do it for us." 398 00:27:03,320 --> 00:27:04,680 By all accounts, 399 00:27:04,760 --> 00:27:08,320 the knock on the door came for The Republic of Estonia, 400 00:27:08,400 --> 00:27:13,840 a tech-savvy nation of 1.3 million, in April of 2007. 401 00:27:18,200 --> 00:27:22,520 The Russians virtually attacked the infrastructure of Estonia. 402 00:27:22,600 --> 00:27:25,920 They shut down the newspapers, the broadcasts. 403 00:27:26,000 --> 00:27:29,120 They shut down Parliament. They shut down the ministries. 404 00:27:29,880 --> 00:27:33,280 ATMs stopped working. The internet didn't work. 405 00:27:33,360 --> 00:27:35,840 Their society was dependent on it. 406 00:27:37,760 --> 00:27:43,560 They basically shut down the e-conomy, electronic-based economy, 407 00:27:43,640 --> 00:27:45,000 for a period of time. 408 00:27:45,080 --> 00:27:50,320 They did not utilize their military or intelligence assets. 409 00:27:50,400 --> 00:27:52,480 They used the criminal underground 410 00:27:53,520 --> 00:27:59,040 as a… in this covert action that was obviously sanctioned by the government. 411 00:28:00,200 --> 00:28:01,920 Cyberattacks on Estonia 412 00:28:02,000 --> 00:28:05,480 targeted websites of Estonian organizations, 413 00:28:05,560 --> 00:28:10,960 including the Parliament, banks, ministries, newspapers, and broadcasters. 414 00:28:11,800 --> 00:28:17,560 They used ping floods and botnets usually used for spam distribution. 415 00:28:18,480 --> 00:28:23,160 Estonia had just rebuilt, coming out of communism, 416 00:28:23,240 --> 00:28:24,920 so everything was relatively new. 417 00:28:25,000 --> 00:28:29,120 They had new infrastructure, but they were dependent on the internet. 418 00:28:29,200 --> 00:28:30,760 Everything was on the internet. 419 00:28:30,840 --> 00:28:37,120 Suddenly that goes down, and they're quickly thrown back decades almost into a, 420 00:28:37,200 --> 00:28:39,000 not the stone age, nothing worked. 421 00:28:39,080 --> 00:28:41,400 You couldn't draw money out. You couldn't get gasoline. 422 00:28:41,480 --> 00:28:42,680 You couldn't get food. 423 00:28:42,760 --> 00:28:44,720 Cities were very vulnerable. They taught that. 424 00:28:44,800 --> 00:28:48,560 The Russians have a very effective cyber warfare capability. 425 00:28:48,640 --> 00:28:52,520 Estonia was one victim of cyber warfare by the Russians. 426 00:28:52,600 --> 00:28:54,960 Then in 2016 Crimea, 427 00:28:55,040 --> 00:28:59,840 a disputed territory under the control of the Russian federation became another. 428 00:28:59,920 --> 00:29:06,320 Then you see the culmination of all of this with the Crimea invasion 429 00:29:06,400 --> 00:29:11,600 in which we see the so-called hybrid warfare, 430 00:29:12,320 --> 00:29:15,280 little green men, electronic attacks. 431 00:29:15,360 --> 00:29:19,680 Some of the first targets of the Spetsnaz, 432 00:29:19,760 --> 00:29:23,480 special forces of the Russians working undercover in Crimea 433 00:29:23,560 --> 00:29:28,760 with a… telephone switching stations because they took over those 434 00:29:28,840 --> 00:29:34,280 and they started sending malware into the broader cell phone networks 435 00:29:34,360 --> 00:29:37,640 of Ukraine, 436 00:29:37,720 --> 00:29:40,640 shutting down the ability of legislatures 437 00:29:40,720 --> 00:29:43,920 to use their cell phones, or government officials. 438 00:29:44,440 --> 00:29:47,320 Many believe Russia's attack on Crimea 439 00:29:47,400 --> 00:29:49,800 is only the beginning of what's to come. 440 00:29:50,440 --> 00:29:53,840 Today, the war that's going on in the Ukraine, 441 00:29:53,920 --> 00:29:57,160 this is the testing ground for electronic warfare, 442 00:29:57,240 --> 00:30:00,400 for information warfare, for hacking. 443 00:30:00,480 --> 00:30:03,800 They've used malware to shut down the electrical systems. 444 00:30:03,880 --> 00:30:05,600 This is a laboratory 445 00:30:06,280 --> 00:30:12,400 that they are using to perfect their science of new, 446 00:30:12,480 --> 00:30:15,760 integrated, or hybrid warfare. 447 00:30:17,840 --> 00:30:20,920 Cyber warfare is a form of asymmetrical warfare, 448 00:30:21,680 --> 00:30:26,000 in that it enables a smaller actor with smart people 449 00:30:26,720 --> 00:30:29,960 to use a bunch of computers and an internet service, 450 00:30:30,040 --> 00:30:34,760 and essentially attack a much larger opponent very effectively. 451 00:30:34,840 --> 00:30:39,040 So at times, depending on the size of your country, 452 00:30:39,160 --> 00:30:42,120 it can be a very good response. 453 00:30:42,200 --> 00:30:46,000 North Korea, Pakistan, China, 454 00:30:46,880 --> 00:30:52,240 they have effective, very effective cyber warfare capabilities. 455 00:30:52,840 --> 00:30:56,440 So, many countries see it as very useful. 456 00:30:57,040 --> 00:31:01,360 Of course, the allies, the U.S., Great Britain, Canada, Australia, 457 00:31:01,440 --> 00:31:05,600 we have very effective cyber warfare capabilities ourselves. 458 00:31:06,600 --> 00:31:10,600 Unlike physical attacks, cyber-related attacks, 459 00:31:10,680 --> 00:31:13,520 because of the interconnected world, 460 00:31:14,440 --> 00:31:19,280 can have immediate impact on the performance of a city. 461 00:31:19,880 --> 00:31:23,120 So with attacks in critical infrastructure, 462 00:31:23,840 --> 00:31:29,960 cities can be disabled in a matter of minutes. 463 00:31:30,560 --> 00:31:32,200 They don't need to send bombs. 464 00:31:36,560 --> 00:31:39,840 A city's critical infrastructure might include 465 00:31:39,920 --> 00:31:45,840 its power grid, water supply, communications, transportation systems, 466 00:31:45,920 --> 00:31:51,560 food supplies, financial services, and nuclear power plants. 467 00:31:51,640 --> 00:31:56,920 A cyberattack on one or more of these systems could render a city helpless, 468 00:31:57,000 --> 00:32:00,680 while a sustained attack could have devastating consequences. 469 00:32:01,280 --> 00:32:04,360 If you stop ATM machines working, 470 00:32:05,000 --> 00:32:07,480 you stop gas going into a city 471 00:32:07,560 --> 00:32:10,720 and deliveries of food in every major city, 472 00:32:10,800 --> 00:32:16,120 within seven days it's expected you'll have full all-on riots. 473 00:32:16,200 --> 00:32:23,080 So the ability to launch a coordinated attack against our infrastructure 474 00:32:23,920 --> 00:32:26,720 could potentially be far worse than Pearl Harbor. 475 00:32:27,920 --> 00:32:30,920 One of the questions that I'm frequently asked is how bad can it get, 476 00:32:31,000 --> 00:32:34,680 and I've mentioned, I've used the words catastrophic and existential 477 00:32:34,760 --> 00:32:38,160 relative to the loss of everything 478 00:32:38,240 --> 00:32:41,800 electrical, computer, power, et cetera. 479 00:32:52,240 --> 00:32:56,280 There's no comms, there's no... Cars are not working, 480 00:32:56,360 --> 00:32:58,280 there's no power to the houses, 481 00:32:58,360 --> 00:33:02,960 that means refrigeration doesn't work, your cooking utensils don't work, 482 00:33:03,040 --> 00:33:04,760 nothing works, and no one knows why. 483 00:33:05,360 --> 00:33:07,960 Most everyone can survive a day or a few days 484 00:33:08,040 --> 00:33:10,800 based upon the supplies they have at home. 485 00:33:10,880 --> 00:33:14,000 When you start getting to a week it starts getting harder, 486 00:33:14,080 --> 00:33:16,800 especially, you know, there's no running water, right? 487 00:33:17,640 --> 00:33:19,920 Very low likelihood that this would happen, 488 00:33:20,000 --> 00:33:23,920 but low likelihood catastrophic impact that's worth thinking about, 489 00:33:24,000 --> 00:33:26,120 so I would recommend that everyone do that. 490 00:33:28,360 --> 00:33:30,960 Anytime now something happens in the world, 491 00:33:31,040 --> 00:33:34,760 you know, an airplane loses power in mid-air, 492 00:33:34,840 --> 00:33:38,600 or something happens to a communications network, 493 00:33:38,680 --> 00:33:42,080 God forbid a local ISP goes down for five seconds, 494 00:33:42,160 --> 00:33:44,760 somebody will be writing, "Oh, this is a potential... 495 00:33:44,840 --> 00:33:47,600 Possibly a hack from Iran." 496 00:33:47,680 --> 00:33:49,440 Well, I don't think so. 497 00:33:49,520 --> 00:33:53,200 You know, these networks are, believe me, are... 498 00:33:53,280 --> 00:33:55,240 They have some degree of reliability, 499 00:33:55,320 --> 00:34:01,720 but they're sensitive to perturbations of their infrastructure, so… 500 00:34:01,800 --> 00:34:04,920 And lots of moving pieces and things do go wrong. 501 00:34:06,160 --> 00:34:09,160 First of all, the future is here. The future is here. 502 00:34:09,240 --> 00:34:12,720 This is going on, and this is a challenge the U.S. has. 503 00:34:12,800 --> 00:34:16,040 We got out of the business years ago 504 00:34:17,960 --> 00:34:19,320 in electronic warfare, 505 00:34:19,400 --> 00:34:22,080 because we did not believe at the end of the Cold War, 506 00:34:22,160 --> 00:34:24,520 that we would face Russia as a… 507 00:34:25,200 --> 00:34:28,560 In a conventional military setting in Europe. 508 00:34:29,440 --> 00:34:32,520 Now, that has all changed. We have to be concerned about that. 509 00:34:35,000 --> 00:34:36,720 You basically have to deter it. 510 00:34:36,800 --> 00:34:39,320 You can't defend against it, so if you're a target, 511 00:34:39,400 --> 00:34:44,000 if you would be a target of interest of Russia today, or China today, they win. 512 00:34:44,080 --> 00:34:45,080 You lose. 513 00:34:46,600 --> 00:34:48,280 It's best not to be their target. 514 00:34:48,920 --> 00:34:55,440 Codes and ciphers are essential for businesses to survive and exist, 515 00:34:55,520 --> 00:34:59,520 for money to be transferred, for our economy to work. 516 00:34:59,600 --> 00:35:01,320 What we're struggling with is, 517 00:35:01,920 --> 00:35:06,600 how do we see that it's available for good use, 518 00:35:07,200 --> 00:35:10,360 but don't have it available so that the bad guys 519 00:35:10,440 --> 00:35:12,760 can exploit it and do bad things? 520 00:35:13,320 --> 00:35:15,920 And we haven't solved that question yet. 42369

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.