tv Made in Germany Deutsche Welle April 10, 2019 2:30am-3:01am CEST
2:30 am
when you close faster everyone needs to but. the lack of water is equally dangerous . there's no good if people move south so they can plant crops and find food. floods and droughts climate change become the main driver of mass migration you can write any kind of peace night if you want and probably most of them to come to. the carnifex of this starts it will courteous on t w. now these guys might try to look scary but honestly they're so ninety nine today's criminals don't need massed scroll bars or guns to get their hands on your cash the
2:31 am
requirements for brazen burglars nowadays include a computer a solid wife i connection and preferably some coding skills welcome to made where our topic this week cyber crime office report takes us to the philippines where a ring of online fraudsters was busted last year in a massive operation the perpetrators exploited people's hopes dreams and greed and sweet talk them into handing over shoot sums of cash. on june sixth twenty eight team a special police unit raided a call center near manila and detained almost five hundred people working there. the outfit was allegedly involved in a scam that cost unwitting people around the world hundreds of millions of dollars . they'd all received a phone call campaign where you get. this small but the fact that the other.
2:32 am
had our major out of three i'll. get. into it. and that that the whole make my life. a former member of staff turned whistleblower and told the philippine national police and the cyber crime group how the scheme operated. the police then spent months gathering evidence before moving in and shutting the operation down. name on it or people who are showing interest to invest so they receive emails that if they want the best they can be the way they can provide assistance such first day we offer. minimum of two hundred fifty dollars us dollars us as the start of the investment they will see their money
2:33 am
growing from day to day and when they show interest on investing more in this the time that they will fall there that's. the people accused of running the scam come from israel and twenty sixteen they set up the call center in the philippines called the marketing the operators allegedly persuaded the old early people in south africa new zealand and australia to invest in non existant assets and in the process gained access to their bank details money from the scam ended up in a bank account in denmark none of it has been returned. in a moment it took time for some of the cole center operators to realise they were involved in a scheme to rip people off. so it would have been down in the debit order reselling it we weren't selling anything. the agents were selling dreams that's what the company said. that we were supposed to encourage clients to make
2:34 am
a deposit to invest. in manila alone around five thousand cyber crimes are reported to the police every year. it's hard for even the specialist unit to keep up with what the scammers are doing their tricks are evolving all the time. so it's really a difficult case not only this case but mostly most of the cyber crime cases it's something new from the law enforcement do. to the judge just to the prosecutors it's something new. according to one estimate and twenty seventeen close to a billion people worldwide were cheated out of around one hundred forty six billion europe's common tricks include stealing passwords by means of phishing emails setting up fake online investment platforms where potential targets leave their names and phone numbers direct tacking into computers and networks and online
2:35 am
romance scams which in the u.s. coast victims some one hundred twenty seven million euros last year the thing is are you buy into the right people are you investing to the right people are you investing to the right company isn't it in a company you only have your concessions online you don't see these people you don't see them in person you don't know where they are that's the characteristic of cybercrime and the unity you know opportunity so i think it's the reason why there's a lot of big themes of cybercrime in investment. the dark depths of the internet that's for cyber criminals usually hide sometimes they break into your computer directly that requires a fair bit of know how and that's where the hacker comes it the stereotype is the skilled computer whiz kid for whom a fire wall is just another hurdle to hop over but who are hackers really and what motivates them we broke it down for you take a look. hackers found
2:36 am
a good old fart in one thousand nine hundred two in the us a group of six teenagers calling themselves the four one four was broke into some of the country's classified computer systems including one that a nuclear weapons research lab. public was alarmed the f.b.i. investigators and the perpetrators were identified. some of them went on trial for the intrusions and the term hacking began to be associated with crime. but hackers are not all inherently bad the computer security scene differentiates between good hackers and bad ones white hats have a legitimate agenda for instance they look for security flaws in computer systems to reveal all correct them. gray hat hackers haven't quite made their minds up they search for vulnerabilities and systems and occasionally exploit them. the black cats are bad they're often motivated by greed to damage computer systems or steal
2:37 am
data. like in the two thousand and eight cyber attack on one of the world's biggest payment processors the hackers in that case wrote their own software smuggled it into the payment firm's computer system and made off with up to one hundred thirty million credit card numbers. but distinguishing the color of a hackers hat isn't always easy when it comes to hacking what's right and what's legal is not always clear cut. sometimes illegal behavior can end up revealing other illegal behavior. a good example of this is the panama paper scandal in it great hot hackers accessed millions of documents illegally. then they used them to expose tax evasion and fraud by well known and influential people. back in one thousand nine hundred two with the four one forced hacking was in its infancy now it's become a massive it's you in a digital networked world and in the virtual world just as in the real one the
2:38 am
dividing line between good and bad is sometimes very hard to define. now when companies get hacked it can cost them dearly not only if sensitive data gets stolen but also because huge amounts of share value can be wiped out estimates say that the global cost of cyber crime related incidents currently amounts to some five trillion euros a year access to sensitive corporate information can occur through spongy fire walls or outdated operating systems however more often than not it's employees and they're easy to remember twelve thirty four fifty six passwords that provide a crucial gateway. the weakest link in every computer system is the people that work with it. and employees are much easier to trick them technology they can help
2:39 am
you break through a company's security shield nearly heartful of all hacking cases linked to mistakes made by employee means. emails are a classic where hackers pose or someone else or leaving a u.s.b. stick lying around that someone sticks in a company computer or a compressed p.d.f. file sent in an e-mail disguised as a job application it gets printed on the back against control of the printer to. try as an employee can become a gateway to my employer's network. unlocking peyton's and business ideas packing is big business bigger than ever in fact computer security for mcafee as the maids it may have amounted to six hundred billion dollars in damages last year that figure includes companies liability risk and damage to their reputation my passwords and no match for cyber criminals. it's
2:40 am
a leopard is passionate about online security back in the nine hundred ninety see kept stumbling on the data of unsuspecting users who didn't take enough care so he went into business advising firms on how to protect their data. it's like taking all the money out of your company's bank account and piling up the cash in the yard for all to see it's basically the same thing everything's at stake because no company today works without computers and phones in europe and cyber attacks can be costly last month aluminum giant norsk hydro was attacked its share price plummeted wiping forty million dollars off the company's value hotel chain marriott also headed systems breached exposing the data of millions of guests including credit card details and passport numbers. better can even rarely hear about the most spectacular cyber attacks because they're spectacularly good ideally the victim will never even know about it that's the mark of
2:41 am
a successful hacking so you don't read much about it in the media form in. one's head because are in they have two key objectives industrial espionage aimed at quietly stealing as much information as possible without being noticed or extortion malware is used to shut down an entire system which can be reactivated only in exchange for money refused to pay up and you lose your data that's what pulled aims to prevent materials kozlovsky is a member of his team and his past head count today he's testing corney coming alters cloud services on behalf of the company if hackers were able to break into the cloud they could quickly access sensitive documents and customer data so my over to you first we analyze their website. we want to test out all the standard weak points. and i can then use those results to find other errors or security loopholes that could be used to carry out further attacks on the system. and.
2:42 am
coming alters i t security chief could stuff walk now wants to require additional external security for the company and that's needed. we have tens of thousands of attacks every day some of them dangerous so far we've averted the more and we want to keep it that way. so is the firm's clout foolproof after all. we found nothing that could have been directly exploited. the biggest risk here too is posed by the employee use. and that sometimes social engineering is skyrocketing with hackers seeking to deceive employees into divulging their passwords so they can penetrate the system and with him on something. this kind of social engineering or human hacking works
2:43 am
well in the age of social media where we all tend to give away more information than we should. once we've been hacked we've become accessories whether we like it or not. now as we've learned there are the black hats who do a shady business and the white hats who might use their skills by working for an i.t. company or for the government like for germany's foreign intelligence service for example or master hackers are urgently needed a license to hack that's how the agency is trying to recruit a new generation of computer whizzes but seeing that young hackers usually don't have the most approving attitude towards the concept of nation states and governments who would head here well we found one hacker that was willing to talk. spending hours days weeks trying to get into
2:44 am
a system and getting nowhere can be very frustrating but when you finally succeed it's an amazing kick. interviewing lukas is an amazing kick for me look at this isn't his real name and we can't show his face the work he does is highly sensitive. he works in cyber espionage at germany's foreign intelligence agency the b n d but no one is supposed to know that. we hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. we need lucas in a distant corner of the building a press box person and a safety officer i present throughout the entire interview. what exactly do you do but obviously i can't go into detail about what exactly it is i do basically i'm a hacker that i intrude into i.t. systems to gain information that it's true that the typical cases involve figuring out what's happening abroad and you might want to know what's going on in country
2:45 am
x. or y. . for example you want to find out about weapons and defense technology somewhere organized crime or of course terrorism these are all areas in which there's a serious demand for hacking. he makes this sound very normal. says about thirty s. much as he's willing to say he learned his hacking skills by himself and sent it on spec application to the b. and d. a few years ago. now he has a job he can't tell anyone anything about. i usually tell people i have an office job in i.t. and then people usually don't bother asking any more questions it sounds like all i do is install printers and so on and no one's interested in that. so you know. the b.m.d. is an urgent need of people like lucas and i
2:46 am
t experts with an unconventional approach. a glossy p.r. campaign is designed to improve its image and the service is deliberately targeting job fairs and university students the trouble is potential candidates know their skills are in demand and that they can earn more in the private sector. at first glance they is at a competitive disadvantage we do try to be an attractive employer. that is what the spokesperson says what does lucas say. they get to do things that aren't legal in the outside world i also get to feel i've done something useful my contribution ends up in a report and makes a difference that it's not just the standard security tests that companies carry out. but actually has consequences in terms of foreign policy and political consequence i enjoy that out a lot and it's worth getting paid less for a low in fact the pay is pretty decent that the fifteen. look at can't imagine
2:47 am
working anywhere else he's a civil servant so doesn't need to worry about getting fired but anonymity is everything. a few people know what i do know my immediate family and some close friends know it too. but in general the responses ok you work for the foreign intelligence agency this time obviously you can talk about it and that's it. sharing nothing of my life i'm not sure that would work for me it's not talking about your work when you get home can be hard. but i knew what i was letting myself in for. but doesn't make it any easier but i can live with it well and by me and i'm good friends with two or three of my colleagues so if i really need to i can always drop by their offices and let off some steam. it must be
2:48 am
strange leading a double life knowing things the general public will never be aware of i feel like i got a sense of what it's probably like but have i learned anything not really the india is a secret service it's very good at making sure that what it does stay secret. many of us have gotten used to digital solutions to our real world problems missing the right shoes to outfit order them on amazon don't want to bike to work in the rain just open your car sharing up well our next report is also about finding digital support but for a serious situation despite recent pushes for empowerment women in india still face a great deal of harassment and abuse in dark city alleys villages. and entrepreneur hold star found a way to help. there
2:49 am
was more. this boy him very i'm going to get out from a life. there was the one kind of close. these women is speaking out about a subject that's often brushed out of sight india is one of the world's most dangerous countries for women. elza married to silva knows how it feels for years she didn't like going on business trips by herself. when she was fourteen and stranger group on a train. sexual harassment and assault are part of everyday life and many girls and women in india. and twenty twelve a brutal gang rape on a bus in delhi shocked the nation and triggered protests suddenly the vast problem
2:50 am
of sexual violence took center stage. to silver discovered that there was no reliable data on the extent of the problem she resolved to change that and to devote herself to helping women she gave up her business career to do so. school for social entrepreneurship in berlin she wanted to meet to silva and learn about her organization before i started doing this work i have not shared my story and once i started doing this i said to my so i'm expecting some. story then i should be ready and i think that's also what you want to achieve from the big. one to give. power to what has happened and true shared our stories absolutely because you know we are talking about young who feel they can achieve anything. and
2:51 am
. you know they don't see the differences between them and the boy. as they are growing up you know society put those. you must not go out in the night. fear can constrain women's lives parents keep their daughters at home men don't want their wives to take public transport to work professional opportunities a mixed this is the kind of thing aims to combat with the online platform she established safe city it crowd sources personal stories of sexual harassment and abuse and aggregates the data on a map it works worldwide but has so far course on in about fifty cities not only in india but also in kenya cameroon and then pull for example. the
2:52 am
aim is to raise the pressure on authorities to take action as well as to encourage girls and women to speak out for their rights. i did open the door it did happen to me. does not mean. it never. could. still. always be. no matter how much it haunts me. nor my dog how. good i am even now. i still have the guts to face the wasn't told them that this happened to me and yet be unfazed because now we know it was not my fault. these young women are really confident because they can't stand up for themselves
2:53 am
they nor their rights it makes me feel really proud that i've been part of creating the space for dialogue on this issue and bringing confidence to these women so that they don't feel afraid to access their rights or access opportunities and these young women are going to change the world because of their conflict. india has a long tradition of wrestling one of many activities reserved for men throughout the century but according to mani to me time society is slowly changing many younger people simply do not accept the constraints women have to endure. it's a new normal. in these things. and for other young engineers have developed a device worn on a respond that transmits location details to emergency contacts and also records.
2:54 am
start up has won prizes for the device which is called safe approach the team has secured funding and is now manufacturing it. as soon as you put it it gives defendant and people ok really one major problem. will work though. the sport. has a lot of safety security these three thousand companies indians got it said and there are seven million people employed in that so that's made up everything they do their real building that is for knows their group of people who can actually go and see people out. he says the police alone cannot guarantee women's safety he wants to set up a platform to transform the security market first in india then worldwide that's the news that our tech they are crucial intelligent and. i think
2:55 am
however we can let's use those technologies to create influence and change at the level where we can but let's not think that those are the only solutions we also have to think about other ways much more grassroots ways of how we can change mindsets too and violence against women. changing attitudes is also central to elsa married to silver's agenda also need to ploys high tech to make cities safer for women she also wants to empower women at home because danger does not only lurk in public spaces most finance against women occurs within that own family. so new technology can not only be used to clean our bank accounts it's also there to help and support people around the world and that's a positive note on which to end this edition of made for me and the entire team here in berlin thanks for watching.
2:57 am
the first clue. and carmi on the ropes germany's going to spare soldiers sometimes feel like a cinderella of the nation the public hears about crumbling capabilities abuse of power and right wing extremism morale is suffering the troops are fighting frustrated. people don't know what it's like the first year to get out have the
2:58 am
armed services lost their bearings. in fifteen minutes call detail. marriage counseling the islamic way. living together before marriage for kairos devout muslims it's fun thinkable. but how. well young couples know what makes a good partnership. but office offers courses with doses of the psychology and humor it loses fritos with a man to minutes on t w. a city in ruins moreover a. symbol of a long conflict in the philippines between the muslim and the christian population . structures occupied the city center in two thousand seventeen president to
2:59 am
churches response was crucial. i figure it will never again look all good of. the reconquest turned into tragedy this is not the kind of freedom that we want how did morality become a gateway to islamist terror. an exclusive report from a destroyed city. in the sights of i.a.s. starts april eleventh on t w. m. m m m. m m.
3:00 am
i. know in israel polls have closed in a closely fought general election that could see conservative prime minister binyamin netanyahu extend his tenure for a fifth term he's facing a strong challenge from his former military chief benny gantz exit polls have indicated a razor thin margin between netanyahu is likud.
43 Views
Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=1441127277)