Skip to main content

tv   Documentary  RT  January 15, 2014 12:29am-1:01am EST

12:29 am
i mean in a way the streets like a kind of danger because they're coveted c.c.t.v. but no one's watching that's what's interesting about these two t.v. culture it takes away like the joy of having initiatives like natural filter. photographer henrietta williams for george kindle to ring of steel around london's financial district. forged from automated security gates and surveillance cameras anyone who enters is registered electronically and anything out of the ordinary triggers security protocols. even seemingly innocuous things like video cameras. all the fight not to live up to your ticket but with your car your car move along with your hear your car we can film whichever way we want. and what. you want to do with the police can rely on the private security. for that so if i fall through the malls you know let's pull it
12:30 am
out of the city and in fact in most cases the streets along this well were given to the developers so that they could enact the policy of complete rest rising street but also installing the defense and surveillance against terrorist attack i get sort of as you like during a phone presuming. the surveillance systems here aren't just simple kindness. anyone who behaves unexpectedly triggers another. imperceptibly humans can observe and evaluate behavior through the smart cameras without anyone noticing. if the camera detects an unusual event the subject is marked.
12:31 am
you know one of the world's leading scientists behind the developments of smart's cameras is professor james or one of kingston university. systems his team of developing can detect suspicious activity even before a crime occurs. the way is to present large volumes of data over many months possibly years and so that enables the system to develop a statistical model of what is normal and maybe what is abnormal and so then there is an automatic flagging of anything that is considered abnormal. in locations where thousands of people pass in front of the cameras every day it's even more difficult for the systems to determine what is normal behavior and what isn't. are these people simply on their way to work or does this group hide a terrorist. anyone suspected of crime in the u.k.
12:32 am
quickly loses their right to privacy. the face what units of the london police presents faces of suspects to the public using footage from security cameras posted on the internet. this is a gentleman of interest. and there's a recess appears. through a spot in there so it goes on a public web saw and so the. armor to clear the side of your throws a. pretty impressive net. and the image is now gone into the system that can be viewed by the public on the face or saw it on the face which. make novel the head of image recognition it's scotland yard if you use this kind of crowd sourced policing via the internet represents a powerful new weapon in the fight against crime. so to the people of register for the. and i tell you not only in the united kingdom people are very much that they
12:33 am
quite accept the c.c.t.v. they think the police to a good job or the c.c.t.v. and they while they're happy to identify criminals is not so much a fear of surveillance i don't think in the united kingdom as possibly on our mainland europe. over the past decade the u.k. has been constantly seeking new ways to combat the perceived threat of terrorism. but this military base two hours outside of london the newest techniques are getting put through that paces. mark lawrence is one of the new breed of experts offering instruction in the east of unmanned aerial vehicles or drones. you know official government sources who publicly talk about the effectiveness of this new technique only mark lawrence will speak with us. so what i'm planning to do now is hopefully track patrick than either on his way there or is way back if
12:34 am
i don't see him in a shot i will fly to the fourth track i see if we can pick him up. the one takes place across three mines. ok so we've got patrick we've located in he's in the trunk so we're going to fly towards a. big brother approaches unnoticed from the air. when the target is discovered the wavy becomes a constant companion it's a height of one hundred twenty meters. and what we're doing is using a g.p.s. lock to do this serve a double click here we can just keep the subject in the center string and screen and also at the same time the unit will follow him back with us fly this way. you got. to do it yeah we got you here in the hudson coming out as well. so that's why it's good to come. with surveillance. would be possible that we in
12:35 am
the future see drones flying over our heads maybe not directly overhead but definitely the police are using these now they're using them for surveillance work and not just sneaking around spying on people there's a lot of people seem to think so sometimes to catch the bad things going on you need to be a bit i could call it sly or just secretive about it. there are plans to fit the drones with improved cameras incorporating face recognition technology. widely public privacy is being exchanged for greater security. michael chandler is the head of vanquish security back in london he's also keen to demonstrate some of his techniques. some of which are alarmingly effective. like this how did you get that well basically what we done was we remotely source the what for i recorded a pre-determined time and that record and then upload it to our online platform
12:36 am
where it really yeah the find was bugged whilst it was left unattended on a table during an interview with the police. professor well was also monitored. ok so here's the photograph taken in the play station i believe that that one and there's this one here the course so obviously there were phone calls ok text messages which has been only one you have an overview of the location which is because it's only the location for this afternoon but in general it's also got all the photographs that have been taken and also the all the voice recordings that we have made so you just can't see everything without my knowledge actually basically. ok that's it's all the way it works not only that. there is
12:37 am
absolutely no way for you to be able to find a device on your phone is totally hidden only we could only we would be able to find it ok so this is the photograph that we found in your phone currently i don't know what they are but what i can do is have a look at the times they were taken and they cross or cross or upset with one of the recorders we have also the location. we can show you that you were. in a play station on seymour street that goes through g.p.s. this is a g.p.s. report coming from your device and that's all legal this is totally legal absolutely legal yes well i think. this demonstration has revealed it's becoming easier to convert we track individuals using modern technology. and it's happening far more often than we realize. according to n.s.a. analyst william binney american security agencies now have the technology.
12:38 am
for their story at all they're collecting it all in store for the large storage facility that's what that's all about and the point is that they hope by storing it all now that sometime in the future they'll figure out how to go back into it and figure out what's important so they can retroactively analyze it that's why they need five zeta bytes of stories that you talk to store it all. to the u.s. government to yes he was responsible for electronic espionage a decade ago when you began to bug u.s. citizens who left the saudis to fight against terrorism seemed to change the rules of engagement. i mean there are virtually is nothing in the network that they can't have
12:39 am
a copy of if they start targeting youth so so so what they already have your data i can't find out what they're doing with my data. but i know they have it ok. so i make sure i write in there whatever i whatever i had to say about them i say that in there so that when they collect that they know what i'm thinking of them. with specially developed software. without since realizing. this is a promotional video from the money factor of. a surveillance program designed for the police. it is widely used across western europe and the principle is always the same. the authorities infect the victim's computer with known when they hide in a fake software update. the unsuspecting music clicks. and the police can now
12:40 am
observe everything as it happens on screen. the intruder gets passwords emails and can see store with data. using. stale humans who stay on my. calendar. i never say that it's not if it's one. and we have some time. then years later. what's the difference it made no difference for me because i should not see it but you can look make a difference for human to. act right to see it. first. and i would think that you're.
12:41 am
on a reporter's twitter. and instagram. could be an. on. one c.m. from around the world meeting. the theme of this year's meeting he states abatements keynote speaker jacob knows what it means to be. he's a close friend and supporter. to be free from suspicion is one of the
12:42 am
first freedoms that is important for being free in the rest of your life when you are followed around when you are being investigated because of the whim of someone this is the beginning of the end of your freedom. routinely intercept american citizens even. those the. americans. conversations. google searches. text messages. orders. bank records. but there was general alexander some most powerful person in the world probably even more powerful than the president of the united states or any it leader of any other country. first of all because we know for a fact. we know for
12:43 am
a fact from our client that the n.s.a. wasn't tracked during dragnet surveillance of all of those things i mean i don't really use a mobile phone for anything except security. so i don't really use a mobile phone i choose not to use facebook because i really think it's. just your systems that make tradeoffs that are not democratically decided. the icelandic capital of reykjavik is the perfect location from which to investigate the technologies states can use to track their citizens you know when you get ideas from. this infamous video and from the right. those involved with the release of the video suddenly found themselves facing up to a powerful opponent. jones to to. the media and to wiki leaks send photos from the video to the international press. this
12:44 am
activity transformed into a national security targets and to a right to did you to prove the sea was repealed even though there were no legal proceedings against. my person. within three days without my knowledge which means. we do have a very bad example. of the united states to go into people you know even parliamentarians. country. matters. most remarkable about this story is that boogie to john's. that it is a member of the icelandic parliament. furthermore to it was not the only source of private digital information to hand dates are over to the us security agencies.
12:45 am
like looking at what experts say in this field in the states for example they speculate it is face perhaps skype or the holes in all five but the judge says refuses to buy acknowledge the requests from the barriers to unseal its companies it is. jones the tape did nothing illegal when she released the video but it was enough to warrant invasive snooping from the u.s. security agency's. me. my younger son older son. some people that i've got to know later i used to work with. three years ago the icelandic people took to the streets the banking crisis hit hit the small island nation heart the icelandic source been revolution ultimately forced the general election. as. quickly to john's that was elected to the
12:46 am
new parliament but for the u.s. government she remained a target. you know again. today jones to take campaigns but it's too rights and self-determination she wants iceland to become a safe haven for sensitive data. they want to put a stop to the prying eyes of the state. we actually want us around the world cherry picked all the best. e-mails for example would be protected in the same way as written correspondents. there is absolutely no country in the world this is actually properly addressed the fact how easily it is for governments and corporations to mine through our private data we in iceland are focusing on creating a standard and setting an example and then it would be really ideal and this is one
12:47 am
of the thoughts behind the spending want to meet initiative. be ideal if we can you know with these new set of laws create a haven in such a way that you know i would like to see it spread to other countries. the police can shut down illegal sites as was the case with this raid on the submarine for online file sharing site the pirate bay. the problem is with the legal information from other providers that may be lost in the process. to protect this data from any access it needs to be in an unreachable place in the future that place could be in iceland the idea of iceland as an inverse tax saving. of say a person to protect people's privacy and this information. free speech protecting people against the touch. is a very nice woman. stuff really something which. it will take time so
12:48 am
you know. it flew for a long time everything should be a search it. but the gates of jones that's here who continue to use facebook twitter and google claiming she's a guinea pig in the monitored space. she says whoever spied on her feels they can do it with impunity and that's how the case should be a warning. it is a temptation to go into somebody's home without them ever being able to know about it and then i'm referring to my online home for it is just as sacred as my offline home this is where all my private stuff is this is where all my personal lighters are this is where all my thoughts and all mac to beauty of movement can be traced so you know hands off my home. a
12:49 am
similar case of monitoring is currently on reveling in berlin. under a home is a noted sociologist who is teaching at the home boat university. for months he was shadowed and monitored. suspected is the leader of a militant group the committed arson attacks in berlin in two thousand and seven. as far as the awful i was i stay only a small sum of produce the morning of the thirty first of july so some a day in the morning before seven in the summer and work up to a pounding on the front door and then a mass of armed men fell on me with six eight and three me to the ground tired as my hands fixed behind my back that said what's on as off you don't get the impression that you're in a film. because they behave as in one of the thrillers all action movies.
12:50 am
give us all callousness so i was already aware that there is such a thing as house searches and arrests directed also against left wing activists in the still listed as a that was already going through my head but i could not understand what they actually had to do with me directly at home so it was an abstract fair designed at that point. a home was arrested by special detachment and brought to federal court in cannes room. only later did home learn that he had been systematically monitored. up to federal investigators that been studying his academic essays and the widespread use of expressions such as gentrification and casualisation had inflamed their suspicions these were terms also used by the militant group that had claimed responsibility for the
12:51 am
berlin arson attacks. investigating authorities had created a character great to use in the investigation which suggested suspects should have extraordinary political and historical knowledge and the scientific and analytical ability to execute the attacks. following his arrest the investigating judge ordered holmes detention. after thirty days in solitary confinement the federal court ruled that there was no strong suspicion. for the first time since his arrest home is free and for the first time he learns about the surveillance protocols surrounding him the excerpts from the minutes reveal a detailed investigation into all aspects of holmes life. investigators monitored home social environment in couldn't find any evidence to incriminate him. but this only caused them to intensify their surveillance.
12:52 am
according to their logic home is an intellectual who is highly conspiratorial and expertly concealing his misdeeds. that they may be on the tail of an innocent person didn't seem to occur to his boss u.s. . consulate you have what you that's what if he were completely monitored our personal e-mails have been read it could have basically found ways even before the online search to gain access to our computers. or the stock of there is also a sense of political outrage in the country. over the loss of freedom to choose what the main ingredients of domestic social values should be. elementary because those personal freedoms are trampled in the course of these kinds of investigations and it's over from the ice and little plastic also cause because it's been. finally
12:53 am
anyone who now search is underway home on the internet we receive a huge number of results in many articles linking him to terrorism. for the rest of his life and ray home will be tainted by the phrase terror suspects. people are more conscious of the need to protect their digital privacy than ever before the call for digital self-defense is heard everywhere. emails are sent encrypted but many are choosing to do without social networks like facebook and twitter. in vienna this group meet once a week for a cypher party they discuss how to make themselves invisible in the network. whether the theory taught is the goal of the dough when the people it's operating on a anonymity that is from web browsing chats or other internet services to make it anonymous
12:54 am
most of the credit. until now encryption techniques have only been in the domain of the authorities and the late internet geeks these people want to spread the word. of the potus something besides the parties have formed spontaneously all over the planet the interest of the population has risen in the course of more government control and more profiling by large companies such as google facebook and others and the interpretation and openness of this profound data is a major problem and a major threat. is a basic human right. back with the internet you're back with big brother so maybe it's a good idea just like we understood with. it is we have
12:55 am
a personal responsibility to not infect our friends and lovers and neighbors and when you use the internet without any without anonymity without privacy what you do is you. and probably even to your country certainly. with most. of the.
12:56 am
well you know i think one of the real turning points was the massacre at that we heard about in one nine hundred fifty three and sharon had been given orders to create as much destruction as he could by ben-gurion the americans condemned this act there were seventy people with largely women and children killed they condemned the act of said the person who perpetrated this should be punished and so forth that your own established this policy smashing. the palestinians and the arabs and hitting them ten times harder than they could get israel it looks like you know they're at a dead end here with this so-called peace process which of course sharon was against from the very very beginning he wanted to create small pockets of palestinian presence in the west bank that would be surrounded with israeli settlements and so that is his legacy today and you know israel stuck with that reality today and is dealing with this question of centrally apartheid.
12:57 am
on june sixteenth one thousand forty one we had a graduation party at school and the war broke out. the shops were always full of goods. in september leningrad was blocked. one day mom went to some of the oldest shells were empty. in november they bombed the warehouses it was the main storage place for all the food in the city people would be eating the earth because it had some. traces of sugar in it i tried to eat it as well but i couldn't. look at the list and credibly. it was
12:58 am
a directory very shelter and everyone was buried underneath. all of them. wealthy british style wholesome. markets financed scandal find out what's really happening to the global economy for a no holds barred look at the global financial headlines to name two kinds of reports. millions around the globe struggle with hunger each good. what if someone offers a lifetime food supply no charge. against
12:59 am
g.m.o. and we think that's. pretty cool. there is no. evidence to this any problem with genetic engineering. or is free cheese always in a mouse trap. free. enterprise is profit. for this golden rice. sigrid laboratory to mccurdy was able to build a new it's most sincere. which certainly doesn't sound anything to mission to teach creation and why you should care about human to. dish is why you should
1:00 am
care only. it's another day for egyptians to say yes or no to a new military backed constitution after attempts by islamist opponents to sabotage the voting and in bloodshed. the u.k. is criticized for refusing to let in syria the war refugees who are struggling to survive the world's worst humanitarian crisis in decades. and say hello to a new version of cyberspace where internet providers get to decide which websites you see based on their commercial interests we explain shortly. you're watching our.

25 Views

info Stream Only

Uploaded by TV Archive on