Skip to main content

tv   Made in Germany  Deutsche Welle  April 12, 2019 5:30am-6:01am CEST

5:30 am
tell stories of creative people and innovative projects around the world like to use the term the climate used to green energy solutions and reforestation. decreasing to interactive content teaching the next generation about environmental protection and we're determined to build something here for the next generation the ideas the multimedia environment series on d.w. . now these guys might try to look scary but honestly there are so ninety nine today's criminals don't need massed scroll bars or guns to get their hands on your cash the requirements for brazen burglars nowadays include a computer
5:31 am
a solid wife i connection and preferably some coding skills welcome to made where our topic this week is cyber crime office report takes us to the philippines where a ring of online fraudsters was busted last year in a massive operation the perpetrators exploited people's hopes dreams and greed and sweet talk them into handing over shoot sums of cash. on june sixth twenty eighteen a special police unit raided a call center near manila and detained almost five hundred people working there. the outfit was allegedly involved in a scam that cost unwitting people around the world hundreds of millions of dollars . they'd all received a phone call the country where you get. a small amount of the fact that the other.
5:32 am
had our major on the brink of the body of a good thing. and that is that the whole to make money. a former member of staff turned whistleblower and told the philippine national police and the cyber crime group how the scheme operated. the police then spent months gathering evidence before moving in and shutting the operation down. they monitor people who are showing interest to invest so they receive emails that if they want the best they can they they can provide assistance such first day we offer. minimum of two hundred fifty dollars us dollars us a start of the investment they will see their money growing from day to day and when they show interest on investing more or less the time that they will falter
5:33 am
that's. the people accused of running the scam come from israel and twenty sixteen they set up the call center in the philippines called the marketing the operators allegedly persuaded elderly people in south africa new zealand and australia to invest in non existant assets and in the process gained access to their bank details money from the scam ended up in a bank account in denmark none of it has been returned. in a moment it took time for some of the cole center operators to realise they were involved in a scheme to rip people off. but i went out i mean what i mean to them what are we selling it we weren't selling anything that. the agents were selling dreams that's what the company said that we were supposed to encourage clients to make a deposit to invest. in manila alone around five
5:34 am
thousand cyber crimes are reported to the police every year. it's hard for even the specialist unit to keep up with what the scammers are doing their tricks are evolving all the time. so it's really a difficult case not only of this case but mostly most of the cyber crime cases it's something new to all from the law enforcement. to the judge just to to the prosecutors it's something new. according to one estimate and twenty seventeen close to a billion people worldwide were cheated out of around one hundred forty six billion euro. common tricks include stealing passwords by means of phishing e-mails setting up fake online investment platforms where potential targets leave their names and phone numbers direct attacking into computers and networks and online romance scams which in the u.s. cost victims some one hundred twenty seven million euros last year the thing is are
5:35 am
you buy into the right people are you investing to the right people are you investing to the right company is an easy to make company your only having your transactions online you don't see these people you don't see them in person you don't know where they are that's the characteristic of cybercrime and the unity you know opportunity so i think it's the reason why there's a lot of big chance of cybercrime in investment. the dark depths of the internet that's for cyber criminals usually hide sometimes they break into your computer directly that requires a fair bit of know how and that's where the hacker comes it the stereotype is the skilled computer whiz kid for whom a fire wall is just another hurdle to hop over but who are hackers really and what motivates them we broke it down for you take a look. hackers found a good old fart in one thousand nine hundred two in the us a group of six teenagers
5:36 am
calling themselves the four one four was broke into some of the country's classified computer systems including one that a nuclear weapons research lab. public was alarmed the f.b.i. investigated and the perpetrators were identified. some of them went on trial for the intrusions and the term hacking began to be associated with crime. but hackers are not all inherently bad the computer security scene differentiates between good hackers and bad ones white hats have a legitimate agenda for instance they look for security flaws in computer systems to reveal all correct them. gray hat hackers haven't quite made their minds up they search for vulnerabilities in systems and occasionally exploit them. cats are bad they're often motivated by greed to damage computer systems or steal data. like in
5:37 am
the two thousand and eight cyber attack on one of the world's biggest payment processors the hackers in that case wrote their own software smuggled it into the payment firms computer system and made off with up to one hundred thirty million credit card numbers. but distinguishing the color of a hackers hat isn't always easy when it comes to hacking what's right and what's legal is not always clear cut. sometimes illegal behavior can end up revealing other illegal behavior. a good example of this is the panama paper scandal in it gray hat hackers accessed millions of documents illegally. then they used them to expose tax evasion and fraud by well known and influential people. back in one thousand nine hundred two with the four one forced hacking was in its infancy now it's become a massive it's you in a digital networked world. and in a virtual world just as in the real one the dividing line between good and bad is
5:38 am
sometimes very hard to define. so now when companies get hacked it can cost them dearly not only if sensitive data gets stolen but also because huge amounts of share value can be wiped out estimates say that the global cost of cyber crime related incidents currently amounts to some five trillion euros a year access to sensitive corporate information can occur through spongy fire walls or outdated operating systems however more often than not it's employees and they're easy to remember twelve thirty four fifty six password that provide a crucial gateway. the weakest link in every computer system is the people that work with it. and employees are much easier to trick them technology they can help you break through a company's security shield nearly half of all hacking cases are linked to mistakes
5:39 am
made by employees. in most spoof emails or a classic where hackers pose of someone else or leaving a u.s.b. stick lying around that someone sticks in a company computer or a compressed p.d.f. file sent in an e-mail disguised as a drawback occasion it gets printed on the back against control of the printer to. try as an employee can become a gateway to my employer's network. unlocking peyton's and business ideas hacking is big business bigger than ever in fact computer security firm mcafee aster made it may have amounted to six hundred billion dollars in damages last year that figure includes companies liability risk and damage to their reputation my passwords and no match for cyber criminals. it's a leopard is passionate about online security back in the nine hundred ninety s. he kept stumbling on the data of unsuspecting users who didn't take enough care so
5:40 am
he went into business advising firms on how to protect their data. it's like taking all the money out of your company's bank account and piling up the cash in the yard for all to see it's basically the same thing everything's at stake because no company today works without computers and phones in europe and cyber attacks can be costly last month alone many m giant norsk hydro was attacked its share price plummeted wiping forty million dollars off the company's value hotel chain marriott also had it systems breached exposing the debtor of millions of guests including credit card details and passport numbers. can even rarely hear about the most spectacular cyber attacks because they're spectacularly good ideally the victim would have even know about it that's the mark of a successful hacking so you don't read much about it in the media government. wants
5:41 am
hackers are in they have two key objectives industrial espionage aimed at quietly stealing as much information as possible without being noticed or extortion malware is used to shut down an entire system which can be reactivated only in exchange for money refused to pay up and you lose your data that's what pits a leopard aims to prevent materials kozlovsky is a member of his team and his past head count today he's testing corney coming alters cloud services on behalf of the company if hackers were able to break into the cloud they could quickly access sensitive documents and customer data from line over to the first we analyze their website. we want to test out all the standard weak points. and i can then use those results to find other errors or security loopholes that could be used to carry out further attacks on the system. and.
5:42 am
corny coming alters i t security chief stuff now wants to acquire additional external security for the company and that's needed. him here we have tens of thousands of attacks every day some of them dangerous so far we've vertical more and we want to keep it that way. so is the firm's clout foolproof after all. we found nothing that could have been directly exploited. the biggest risk here too is posed by the employee use. in the social engineering is skyrocketing with hackers seeking to deceive employees it seems divulging their passwords so they can penetrate the system and with him on something. this kind of social engineering or human hacking works well in the age of social media where we all tend to give away more information than we should
5:43 am
. once we've been hacked we become accessories whether we like it or not. now as we've learned there are the black hats who do a shady business and the white hats who might use their skills by working for an i.t. company or for the government like for germany's foreign intelligence service for example or master hackers are urgently needed a license to hack that's how the agency is trying to recruit a new generation of computer wizards but seeing that young hackers usually don't have the most approving attitude towards the concept of nation states and governments who would have a resume here well we found one hacker that was willing to talk. spending hours days weeks trying to get into a system and getting nowhere can be very frustrating but when you finally succeed it's an amazing kick. interviewing lucas is an amazing kick for me to look at
5:44 am
this isn't his real name and we can show his face the work he does is highly sensitive. he works in cyber espionage germany's foreign intelligence agency the b.m.d. but no one is supposed to know that. we hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. we need lucas in a distant corner of the building the press box person and the safety officer up present throughout the entire interview. what exactly do you do you know obviously i can't go into detail about what exactly it is i do basically i'm a hacker that i intrude into i t. systems to gain information that it's true that the typical cases involve figuring out what's happening abroad and you might want to know what's going on in country x. or y.
5:45 am
. for example you want to find out about weapons and defense technology somewhere organized crime or of course terrorism these are all areas in which there's a serious demand for hacking. he makes this sound very. lucas's about thirty s. much as he's willing to say. acting skills by himself and sent it on spec application to the b m d a few years ago. now he has a job he can't tell anyone anything about. i usually tell people i have an office job in i.t. and then people usually don't bother asking any more questions it sounds like all i do is install printers and so on and no one's interested in that. so. the b.m.d. is an urgent need of people like lucas and i t experts with an unconventional approach. a glossy p.r.
5:46 am
campaign is designed to improve its image and the service is deliberately targeting job fairs and university students the trouble is potential candidates know their skills are in demand and that they can earn more in the private sector. at first glance they believe is at a competitive disadvantage we do try to be an attractive employer. that is what the spokesperson says what does lucas say. they get to do things that aren't legal in the outside world i also get to feel i've done something useful my contribution ends up in a report and makes a difference that it's not just the standard security tests that companies carry out. but actually has consequences in terms of foreign policy and political consequence i enjoy that out and it's worth getting paid less for a low in fact the pay is pretty decent that the fifteen. look is can't imagine
5:47 am
working anywhere else he's a civil servant so doesn't need to worry about getting fired but anonymity is everything. a few people know what i do know my immediate family and some close friends know it too. but in general the responses ok you work for the foreign intelligence agency this time obviously you can talk about it and that's it. sharing nothing of my life i'm not sure that would work for me. not talking about your work when you get home can be hard but i knew what i was letting myself in for . but doesn't make it any easier but i can live with it. and i'm good friends with two or three of my colleagues so if i really need to i can always drop by their offices and let off some steam. it must be strange leading a double life knowing things the general public will never be aware of i feel like
5:48 am
i got a sense of what it's probably like but have a learnt anything not really be india's the secret service it's very good at making sure that what it does stay secret. many of us have gotten used to digital solutions to our real world problems missing the right shoes to outfit order them on amazon don't want to bike to work in the rain just open your car sharing up well our next report is also about finding digital support but for a serious situation despite recent pushes for empowerment women in india still face a great deal of harassment and abuse in dark city alleys and villages at home and entrepreneur hopes to found a way to help. there was more going to the. boys really and
5:49 am
i'll give them get out from a life. the one kind of clothes. these women a speaking out about a subject that's often brushed out of sight india is one of the world's most dangerous countries for women. elza marie desilva knows how it feels for years she didn't like going on business trips by herself. when she was fourteen a stranger groped her on a train. sexual harassment and assault are part of everyday life a many girls and women in india. in twenty twelve a brutal gang rape on a bus in delhi shocked the nation and triggered protests suddenly the vast problem of sexual violence took center stage. to silver
5:50 am
discovered that there was no reliable data on the extent of the problem she resolved to change that and to devote herself to helping women she gave up her business career to do so. school for social entrepreneurship in berlin she wanted to meet to silva and learn about her organization before i started doing this work i have not shared my story and once i started doing this i said to myself if i'm expecting some. story then i should be my thing that's also what you want to achieve from the big. one to give. power to what has happened and choose to share their stories absolutely because you know we are talking about young girls who feel they can achieve anything and.
5:51 am
you know they don't see the differences between them and the boy but. they are growing up you know society. you must not go out in the night except. fear can constrain women's lives parents keep their daughters at home men don't want their wives to take public transport to work professional opportunities amassed this is the kind of thing to combat with the online platform she established safe city it crowd sources personal stories of sexual harassment and abuse and aggregates the data on a map it works worldwide but has so far course on in about fifty cities not only in india but also in kenya cameroon and then paul for example. the aim is to raise the pressure on authorities to take action as well as to encourage
5:52 am
girls and women to speak out and stand up for their rights. i did open the door it did happen to me. did not mean. it never. still i will always be. no matter how much it haunts me. no matter how. good i am even now. i still have the guts to face the wasn't told them that this happened to me and yet be unfazed because now we know it was not very forward. these young women are really confident because they can't stand up for themselves
5:53 am
then nor their rights it makes me feel really proud that i've been part of creating the space for dialogue on this issue and bringing confidence to these women so that they don't feel afraid to access their rights or access opportunities and these young women are going to change the world because of their conflict. india has a long tradition of wrestling one of many activities reserved for men throughout the century but according to my mates our society is slowly changing many younger people simply do not accept the constraints women have to endure it's normal that. it's a new normal way that the normal. use the. money and for other young engineers have developed a device worn on a respond that transmits location details to emergency contacts and also records. that start up has won prizes for the device which is called safe approach the team
5:54 am
has secured funding and is now manufacturing it all you do is press this soon as you press it gives s.s.p. ascendant families people ok really one major problem. no work though. the sport. has a lot of safety security got these three thousand companies indians got it said and there were seven million people employed in that so that's why it would be up everything to where we are building their group of people who can actually come in and see people. he says the police alone cannot guarantee women's safety he wants to set up a platform to transform the security market first in india then want why this illusion that the tech they are crucial intelligent and. i think however we can let's use those technologies to create influence and change at the levels
5:55 am
where we can but let's not think that those are the only solutions we also have to think about other ways much more grassroots ways of how we can change mindsets to and violence against women. changing attitudes is also central to elsa murray distilled as a general. also need to ploys high tech to make city safer for women she also wants to empower women at home because danger does not only lurk in public spaces most violent against women occurs within that own families. so new technology can not only be used to clean our bank accounts it's also there to help and support people around the world and that's a positive note on which to end this edition of made for me and the entire team here in berlin thanks for watching.
5:56 am
5:57 am
the book. club three government international talk show before journalists discuss the topic of the week coming up on talk radio there are some one thousand battle hardened islamic state fighters and their families from germany or now heading home after i assess collapse what should germany do with them and how dangerous are they all that and more coming up . quadriga thirty minutes on w.
5:58 am
. coming presidential and had a bomb dimitri out in front timely the rebel army ended the one thousand. genocide wasn't lewd photo in the room there wasn't when it was given you. need to reinforce that a controversial leader whose success is beyond western could try to come in and wanted a tragedy in seventy five minutes on t w. when the water starts rising people fight for survival i want to hasten up and gets me but i get when there's a flood water comes up trying to waste on your clothes fast everyone i meet. the lack of water is equally dangerous. liaison keep to sleep will move south
5:59 am
so they can plant crops and trying to feed the system. floods and droughts climate change become the main driver of mass migration you can write any going to peace not if you want to and probably most of them to come to. a climate exodus starts in full thirty years on t w. get starlight to get gamma ray bursts we get i think race out there are extremely weak compared to the sunshine. so in a practical sense the sun is the only choice for a long term energy supply. well clearly more scientific discoveries and more engineering are required to enable the basic technologies to be cheap enough a lot of the electrical energy we produce is lost in the wires between the generator and the house so if we could make superconducting wires out that would be
6:00 am
a wonderful way to transport energy from one place to another so let's make those investments now so that we all know things that we need to own when the time comes . u.s. officials have charged weiqi leaks founder julian assange with conspiracy to commit computer intrusion just hours earlier british police arrested the songs after ecuador revoked his seven year asylum ecuador allowed police to enter the country's embassy in london to take him into custody he now faces extradition to the u.s. . pro-democracy demonstrators in sudan's capital khartoum continue to
6:01 am
protest after armed forces ousted president on.

31 Views

info Stream Only

Uploaded by TV Archive on