Skip to main content

tv   [untitled]    February 9, 2014 10:30am-11:01am EST

10:30 am
can a society protect itself against the encounter healable how should it react to attacks with retaliation. or like the citizens of norway and spain who opted for freedom and openness. london two thousand and five. on july the seventh four bombs exploded three in underground trains one in a double decker bus the result fifty six deaths and seven hundred injuries the attack is not from the outside nor from the end. the four young assassins a muslims three of them born in the u.k. . a traumatic experience for the metropolis in the blink of an eye the entire city fell out of step it's about her ability visible tool.
10:31 am
these things live on in the collective memory they become sources of mourning and the more and they have formal memorials and solemn but this is nothing actually new you know london has a two thousand year history of disasters of plague of wall of strife so there is a pragmatic culture to this city as with many other cities that you know you grief you move on you go through trauma and shock and then life goes on and what is the alternative to have one just stay at home. and bunker themselves off from the future of their world and their life in the city it's not an option. the police quickly identify the perpetrators and their accomplices naturally with the help of surveillance cameras. in a second series of attacks fourteen days later an innocent man was shot george
10:32 am
sheldon s.s. he had dark skin and was reportedly wearing a thick jacket with wires hanging from it as he fled. but the video shows he did not flee. the cameras could prevent neither the bomb attacks nor the death of an innocent man. the bombs of two thousand and five and more than twenty years of ira threats have led to an all pervasive architecture of security diverse obstructions guard against trucks laden with explosives. reinforced concrete barriers come of it as flower boxes and benches. while working on their project ring of
10:33 am
steel and reactor williams and george also discovered how open space is transforming in another different way this would be the public street by the public roads that is now being sold to a developer and is the comfort of a tight space so the the actual landscape begins to completely change and what you have in these spaces is they're put piece by private security guards and although you have the right to walk down as they can actually choose to so you have these like strange places that begin to to the compost of the city that all it's. welcoming to most people no spaces to linger and the whole idea is just for you know people to walk through to get somewhere and it becomes about being a consumer or anyone that's outside of us gets kind of ad brushed ours you know present a walk in you're presented with sort of charming flowers which are changed every few weeks on the big sign saying all the things that you must on the no circumstances do. i think so i think what's really interesting about it is that
10:34 am
visually looking like an architectural render it's not real life it's not the kind of of the city of the melting pot it's like a very sanitized version it becomes a sort of known place. rather than public. is civil rights apply only until the private investor chooses to deny access. how many of these known spaces in a city and. where can one lead to free urban life in such a controlled space. to create. the politics and geography of some cities and perhaps many cities are starting to really. some of the sort of medieval structures of and place of power with barriers access controls and of course instead of the big massive
10:35 am
stone structures of the medieval military architecture we now have systems bison outrunning passage control electronic access biometric scanning some people are suggesting that perhaps the app put is the paradigm space of the future city that maybe cities in the future might have apple style restrictions generalized across the whole landscape. london's canary wharf. when the financial markets were deregulated banks expanded. in the form of don't live in the they could implement a remarkably elaborate security concept. today more than seventy thousand people work in canary wharf there are hotels and apartments and a popular shopping mall. it's
10:36 am
a new scale of privatized space to very tightly defended the highly privatized idea of the city which has come under a lot of criticism as being a sort of and clave of powerful and wealthy groups literally separated off from the rest of the city almost by mediæval motes using the wall to systems of the dock plants. the access roads to the city within a city as accused by checkpoints. a private security service can deny access without reason at any time. is this the city of the future accessible only to the wealthy and powerful to fit into this brave new world. so the legal aspects of this a really important that means that they owners of this space define what is legally
10:37 am
allowed and what is prohibited through their oath by all their legal sanctions which means that political activity is actually illegal in this space it's illegal to have a political demonstration it's illegal to have a political mobilization it's illegal to bag it's illegal to. do all of the the full range of activities that you would expect to be. allowed in a democratic society. three d. model of the city designed by the german aerospace institute in berlin to simulate been development. from a simulation of the real city to the creation of
10:38 am
a virtual parallel urban environment a future in which computers communicate with other computers without people. where an internet of things develops. florin make a helis from the swiss federal institute of technology in zurich is working on the realisation of the ubiquity of computer is a combination of physical objects in virtual space the internet of things. bus vs under fifteen what we mean is really the spreading of the internet from computers into the real world to include real objects products and things like this could begin with products that simply have a number on them to find out where something is this could be products with sensors on them it could also apply to automobiles in order to register location data and
10:39 am
gather information from it actually the integration of various properties objects even humans in order to be able to offer more services and new applications to them based on the information gathered around me at the state one point unbeknown pizza can. implement here we've implemented an application which enables me to see which apps are being used here in the city. and over this way as i can see for example that two point two kilometers from here the swiss federal railway's out was downloaded two hours ago. i can now download this app and install it on my phone. instead but the idea is to be able to find useful apps in the parallel world that are related to the city and here it's all sinful as shine and. already we are surrounded by digital services. and be made visible.
10:40 am
and with each application we leave behind footprints which can be collected and used. an electronic book loaded practical quick and easy. the book is equipped with a chip the rental fee and alone in a registered with the push of a button each book's readers can be seen. so what if someone is interested in books about terrorism or chemistry. who else knows this and might consider it suspicious. for.
10:41 am
cities or basically by computer systems that are in the west especially everything that people do in a city generates they even driving around the city is increasingly monitored by computer systems moving around even walking if you have a small generates a truck through g.p.s. systems and geographical mapping systems whether we can also add credit card transactions we can at the c.c.t.v. systems on the street except for etc etc so it's being called a day to tsunami if you like the idea of my acid waves of data being collected not by humans really but by computers. normally we associate surveillance with the police and security services we forget that the major internet platforms and provide is are also trying to follow our every step.
10:42 am
the magic word is data mining. sophisticated programs comb through the streams of data worldwide in search of specific criteria which can then be used to create a market based records. there's a saying when you're in the arctic you have the entire world at your feet. she looks like a fairly simple ship but really she's not symbol of the whole handful of people ever have access to the nuclear icebreakers the real king here is at the polar bear and ice breakers come second not a single complex expedition to the optics can be conducted with the russian nuclear powered fleet of ice breakers we've undertaken a unique operation. the northern sea route russia's arctic
10:43 am
ice breakers. there is obviously more for the latest because it's pink. women wanted to avoid rape they really needed to buy guns and. this is the one that i want to go with them once again it's the fear of. women definitely the target of the gun lobby and you don't want to kill them when you're killing me but if somebody would he would just prefer. i know to say more and more if that's really scary marketing tactics which implies that women have some sort of moral obligation to protect their family and young girls shoot out here. so we do have a pink or. more kids young kids choke on food than are killed by firearms if being armed made us safer in america we should be the safest nation on earth
10:44 am
were clearly not the safest. but there are no words that the location of a voice still river. to the well there's of the high tension said you would stop this storm we might be more my people.
10:45 am
at goldsmiths college in london researchers are examining the interplay between digitalisation and society. matthew for learn to modify its are analyzing the workings of search engines and their role in everyday life. and more and more to keaton's both into. people's everyday lives the more and more it can be broken up into smaller smaller parts discrete parts in the reassembled as a last on the basis of correspondence with different kinds of abstract patterns and that's kind of what we found is an example of this kind of reconstitution of the person in the digital here. in the words how google
10:46 am
decides what we see the research is demonstrate how google evaluates search queries in very specific ways. if you look at the search interface there is actually you know in the case in that this is happening so usually people don't you know this is this is going on better search results are being filtered and now. it's the first to discover that google analyzes and personalize its users data changing it and will. ask me to search query for one of these philosophers resembled famously processed one for what we call normally misuse or. the anonymous user received offers for mass tourism the philosopher's offers for to those in the upper price segment does this mean that not everyone receives the same offers despite the
10:47 am
same search query. all computers deciding who travels well. we already predictable through and through. i we are no going leave being stigmatized and sorted out. further and finds his research shows that google makes decisions for users without their even realizing it. we need to understand these not simply as kind of repressive forces that can look people into place but also they produce new kinds of ways of being together in cities and that is what we think search engines and especially coupled with locative says is or. that of an urban based computing or you because it's competing all of these need to be. rethought in terms of how they they're understood as part of the public space in that citizens are able to take part in the design of reflection on these on these systems. how can citizens
10:48 am
participate in the design of these systems when developments in the digital parallel world taking place at breakneck speed citizens of both users and products alike the more specific the information gained about an individual the more valuable the data becomes how can we grasp the full extent of the digital penetration into our lives. in berlin sandro going to list conducting research into the freedom of information technology and war especially cyber war he advises government institutions and berlin and brussels. that in a lot of the tsunami there was another revolution and micro electronics which went almost completely unnoticed the whole area of sensors we've made incredible massive developments in sensor technology just some together with the information
10:49 am
revolution this sensor revolution has produced a general cognitive sphere in our technical environment in mind these technical environments are now able to monitor record and process the information they get it simple. and also follow. drones as help is in extreme situations. the combination of optical chemical and infrared senses enables not only the visualisation of situations in real time and three d. but also the analysis of hazardous substances ideal for firefighters rescue services disaster relief forces and the military. senses also facilitate virtual tracking through face recognition. this can already be observed in the internet. visitors at the glastonbury festival were captured in a large group which remained online long after the festival was over. through the
10:50 am
use of tags individuals could be identified and approached via facebook. the page was one of the most popular on the internet for quite some time but what does this have to say about the experience does the festival continue only in the parallel universe of the internet. to live in multiple realities simul taney asli. face recognition it can also be used in an entirely different dimension cameras incenses i capturing people and scanning them for suspicious physiological signs. is the aim. to detect hostile intentions before the suspect can cause harm. but if you don't fish why this is really important to nuts in ca because i can put it to extensive use for security measures and bombay sickly i can attach
10:51 am
a policeman on bus in other words a camera to any technical device which can process i t. i t. follow it and come i can put chips into all kinds of equipment in a specific environment and increase security enormously gunsmiths you but this is of course also a threat to personal liberty only if it is high. security or freedom the e.u. is funding a program to develop an intelligent information system to support surveillance search and capture for the safety of citizens in an urban environment increasingly now there are efforts to use computers to bring together all sorts of items of data every time an airline ticket is booked. i think in the u.k. now by law you have to have to collect fifty three separate pieces of information from also so different sources. to to to profile out information
10:52 am
until assess the degree of risk so this is very much again the question of building data from the past to make judgments in the present about the potential future risk straight out of minority report if you like. there's different recording systems are interconnected to form a comprehensive monitoring operators for preventive police work who controls the search criteria all the computers and senses. until we make a judgment about what might be considered normal in somewhere like london which is a big question everything is normal in london. but what happens is they is the data mining system to try and build a sense of the normality of the city which is then used to try and assess things
10:53 am
that are unusual and i think that's where the politics of the city increasingly lie based on who judges what is normal in a city and who judges what is abnormal in the city and it's a very political time. today security means the security of cities in new york the attack came from the head in london from underground in the streets. while these is still possible it's more likely the city will be attacked by computers disrupting the supply of electricity water and food. prices are as any other movie theoretically if the teeth fail us if someone attacks the i-t. centers and some areas that would have catastrophic consequences especially in cities the food supply would instantaneously collapse everything is time to market on that no one has
10:54 am
a larger anymore and if no one would know where to find food supply. communication systems would break down and there would be no water because the pumps couldn't operate without electricity this within a few days the city would degenerate into a primitive state because no one would have the resources to feed themselves to communicate or anything else this is an enormous risk that the. silent attack on a city without leaving a trace. this may sound like science fiction but it's already on the minds of hacking is criminals and terrorist groups. are also gearing up for cyber war.
10:55 am
times of peace these cyber war units ponder what to do if there's no war going on and i've got forces that can go anywhere and do anything then naturally i'll use them to attack other economies i can pursue economic political objectives i can conduct massive industrial espionage at such a high level that it can't even be detected and i can engage in sabotage and these units can sabotage an entire production and cause stock prices to plummet i can then buy up stocks cheaply or i can attack the stock exchanges directly with the price from an id perspective the stock markets are gigantic incredibly complex monsters they've never notice a skilled attacker in their midst and the attackers know this that's what makes the whole situation really attractive to what could happen is that these cyber war components which are simply there will start a secret economic war i consider this quite plausible because there are no means
10:56 am
for identifying the attackers there's no need to fear diplomatic repercussions or missiles from the united states no one can protect themselves against these skilled attackers and everything is being offered to them on a silver platter i'm sure there will be more developments in this direction he. images of a world fading away the boisterous stock market was yesterday today more than fifty percent of the u.s. stock trade is handled electronically from computer to computer algorithm to algorithm humans are much too slow for such transactions. perspective these i.t. security issues could be a reason to stock exchanges altogether because i can't guarantee. but let's show mayor represents the real value of companies
10:57 am
a lot of it is. in the next attack on the financial world no towers will fall yet the entire city will collapse and degenerate into chaos the attacker will come silently through the financial industry is a co-author is its hyper force networks we won't notice until after the fact if we notice as all it will be too late. what good is all the security if the fear of terrorism transforms our cities and society beyond recognition. if we are reduced to wandering through militarized security zones. if our longings to live together in a city make us a security risk. how many liberties must we sacrifice to overcome
10:58 am
our fears. i'm. thinking. with the economic ups and downs in the find at. the deal
10:59 am
and the rest that life. will be if we all think. the european union likes to think of itself as one of the brighter and fairer parts of the world the european commission report on corruption the first of its kind betrays a very different picture in every single member country there is corruption in some cases on a massive scale so what can the e.u. teach the world how corruption. we we will. see you will wait about. almost entirely in the olympic village if they are not to. tell the i.o.c. it will be all. the
11:00 am
host nation wins its first medals at twenty fourteen with hopes that silver and bronze will be followed by a gold later sunday there were side from the celebration of winter olympic sports. we. had happening in sochi and western media dishes out an avalanche of criticism raising questions about whether the hype and panic are actually justified plus in the weeks other headlines on r.t. international. and you know. the message reportedly coming from the u.s. assistant secretary of state as a leaked phone call reveals the depths of washington's involvement in ukraine's political turmoil. and switzerland votes narrowly in favor of a controversial.

38 Views

info Stream Only

Uploaded by TV Archive on