Skip to main content

tv   Documentary  RT  November 8, 2021 8:30pm-9:00pm EST

8:30 pm
since in tatters to decades on as it prepares to pull out statements of reassurance come out of washington. the very same old song had during the african withdrawal. iraq as central to the u. s. vision for a stable middle east. iraq is not of gan. stan. we're here for the long term with iraq is a key strategic partner, and we're committed to this partnership world cobbled, succumb to the taliban in a matter of days. no, not a single us intelligence agency saw that coming. or that doesn't provide much backing to the claims that the true pull out from iraq this time will end up just fine. i still is already taking advantage of the strain security capability of the taliban rule in afghanistan. iraq is isis cradle. nobody wants to see another nation in the region crumble under the weights of a decades long string of 4 choices. make thousands of miles away. and
8:31 pm
that as a from you, i'll be back in about 29 minutes with another phone for selection news. this is our to international oh, lou
8:32 pm
ah ah ah. where empowering ourselves to be more than payments from our phones we can tell
8:33 pm
alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefit. but with that comes a trade off, which is where there's more cyber security risk in extraordinary paranoia. the truth is that every device is a potential entry point for security attack. mm use the boykin, the shortness new york uniform late. yep. so newton farm, also on your off site, it looks like i'm writing kilobytes and which though you will pay by showing you a quick option, you can talk that with be recorded public info. silicon was forced to, i use mostly, and people will share with everyone and also to your former manual with dealerships
8:34 pm
under the social world in the pool chichi of those climate. she'd also, if you speak with a solo g, got a whole thing is a national mission, the users you definitely want to your phone interview with me when you thought it was just send you. busy this isn't your current but annoyance. and the generically with crime that in a minute the organs international. go to the dean, but all yeah, sure. i can get a form in the other. you know, but social salesperson has been with michigan and there's no one has owned it gives out but almost the accounts. but most your book, the shipment will look like, you know what this poison was at the college a and
8:35 pm
a couple of times you being asked me to cook over there. it wasn't for presses. she was to have that done this. me bumper script. got the course done, was it got to face boys, image bright, the home, or get them with for some fundamental rules around password management, making sure that it's complex enough and has the right number, right. the length, the right number of symbols are special, upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're, we're granting single points of entry to, to obtain that data. when you share a password, which is very common among user. so i'm the same password for 20 different applications. yeah, one, yeah. all of them a whole with a question. we call them to put him into a washer and talk
8:36 pm
a bit of material ear rush or a stereo will fucked on average. and that's her last year. that's miss yet, or is it for you to print a report from one of the sports or on using there some west virginia left for them . this year was a georgia spike loud here might be a problem. you was up here just way calling the bus monitor to record your share of a certain. we'll see wash what unit bottom we're proud to with our community on the hornets are part of a you and your burglar fusion. grow your margaret. i don't know. she may come find you a couple of those type of thing. those are good, but that's not something. what a smoker m, i'm not sure which he just reported to contact him. i'm gonna try someone introduce
8:37 pm
complex takeaways talk. we'll try to point the ship as well. michelle, the session was up last night with chris winter, he tricked on the thumbs up pretty quick positioning the payment a problem with them. it could be a couple to show, but other than what she had there with all the employees is more like in a slow love in the soft ear or more. she does will consent to file a moment while she does so. corresponding of catherine browsing a bit with recital multiple, she little committee approach by minute to put a little bit going on so i can be a day with the business today. leticia, this is great for quite a couple of them, but don't with some, some more incentives. there is a dilemma of our current age. people have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us, but at the end of the day it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target,
8:38 pm
then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for leasing questions. you won't get used to. so when you all are moist, so to the summary use of lesson with dozens from me to these questions, are you really purposely a source on the show, like or still to start on the deal? it could, she could use your machine, but don't worry us that she, i mean, of course i'm, you finish looking at they for balloon this offset by the last question. what other 3rd, the issue was because frank, yes, w shoshua, catherine demos, 3rd privilege, school of mushroom soup washing exemptions, please press 4. if this has reached for immediate gaze, curse them to provide more than reason to more smoke you tube. they did reschedule . oh, it's a ship with inside the city. she had received telephone in, but i couldn't called one kid so sleepy. what you homeless like on sunday for relations to one of the most reported it. think
8:39 pm
you'd be surprised nowadays, the amount of information that exists about individuals on their phones through their email to their corporate systems is generated at a scale that was like, no other before from location data on your phone to all your personal information that you have. whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals from a database league is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that
8:40 pm
specific website. they have digital footprints, they have your digital footprint, and they also have your physical footprint, as they know a lot more about you. at basal nothing, they can use that information to provide ortiz start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credit in your name when they access your email through fishing attacks. they can then reuse your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the
8:41 pm
upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors raining. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies. there has been on the defensive side. the defenders have always been one step behind the attackers and some of those and technology developments because there's more collaboration and more sharing of information in the packing and ecosystem. if you like. ah, you need to be aware that it could happen to you. it could happen to you and for us from a cyber security industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example,
8:42 pm
you have stronger passports, you will do to factor authentication. when you try to access some of those websites, you might not leave your laptop on an unlocked when you're in a coffee shop. if you go to the toilets or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle with your shift, giving crystal reciprocal fresh order to show us my little more special story. and we turn into on their parent utilize generous or, or where it will be you are finding out from you. can i me scrambling there's left on your 1st and listen to them sent him now clause with almost lost. their secret of blog said you were to pursue chris, john, them up there, new enough for which in your mom through agreement are strong. alright. your other
8:43 pm
parkway charter, you're quite car authority, but i'm worried about our course and started here. she's the rooster childhood. mom, is it only a recruitment shorter than what could i new showing of empirical shows that your dog groomers mean can you do to with, with your much cost on them or thought us putting it on their groupon contribution for it? it almost my program there is patricia. so to renew my it's a, it's a car for her to come pioneer a slow me the order to pursue a solution. come on there is always a rubric. you're provided to talk to your security teacher a in a
8:44 pm
equation. group as a shock, i knew that you might succeed, shamika gosh, article with a high can get any better towards the mindset about the him game. and you had a quick response. we still to bunk, you somewhere the key with the easiest and i got a little bit of news. this is jim stein you at the pitch then system you should meet them with with me now to wish you deal with that. i had to stall a place, oklahoma got tv there. she has nice hear. good afternoon is my sound menu. so doesn't you go to roscoe, just a thought or but it's not sure how to ship a sofa hold. yes, it's a mission. i have a question about us comprise a should with some mission out for me is the easiest option to puddle in a national model in a car. so saying in the part that somebody fun with the course when you leave it in
8:45 pm
a ah, and i make no, no borders line to tease and use as a merge. we don't have a charity, we don't have a vaccine. the whole world leads to take action and be ready. people are judgment, common crisis with we can do better, we should be doing better. every one is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great, the response has been massive, so many good people are helping us. it makes us feel very proud that we are in it
8:46 pm
together. oh, when i went shopping wrong, i just don't hold any new world yet to shape out disdain. because the advocate and engagement equals the trail. when so many find themselves, well the part we choose to look so common ground ah ah. eventually there's malware thousands made
8:47 pm
sometimes millions each day. this pandemic gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call him swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime, they adapted to the situation they use cyber. they used the technology as an extension of traditional crime, but we can't ignore how it's evolved over the years. and in order to discuss how it's evolved, leads to discuss how us as people using digital technologies have evolved as well.
8:48 pm
everybody is on life. we are all sharing information through social media, through messaging apps through all sorts of bad at devices as well. because everyone is digitized, everyone is moving to online banking, our online retail, and so on. there's a smartphone, there's a smart tv, smart cars, smart homes, you can't live without your smartphone. you can play without technology and internet know that. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with ah, a
8:49 pm
1000000 years old old law near putting up on the boys near the way possible. look on back muzzle. so silently you saw me. billy looked through the pretty much a foreclosure bucket seats. all you got a little boy on bill went off. all speed. all nice is jim, i'll dr for out. so sleep is working for probably in the got got i was just and they said, so computer i met. mm hm. lemme is a process. so i can, i was just message. yeah, i need for so. so the what i mean there's dr. morner possible, should mozilla docile boggle. i'm warm up on me needs of those stories are more more, more. lucy, below the world's voice is cortisol to seek knowledge of b. s. the possibility of missed the following up order. we excel document was watching all my washer scholarship. i've been with us. got to watch that video to notes. nickel, knocking me off. sure. for i knew the author, i think a little off that is off say missed yes. good company, miracles, lamore leon,
8:50 pm
media. somebody, me on the juice noodles log, emotionally book, mission control. no, i stuff, i mean, what christian looks at the internet on the sportage, the web services wardweb share is 2 or more, la might mm hm. mm. connected systems and connected cars, connected buses, even the connected trains and metros, they can be had. some of those cases have happened to them at u. s. cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not recover from it. a lot of people trying to use the metro trying to use the
8:51 pm
train, but they couldn't buy a ticket. those situations happen. they happened in the different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tesla was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with
8:52 pm
we design and build humanoid robots are i right, was generate that full sized ignored variables. we make ones that look like robots, like plastic metal. we also make arrange that all human. okay, so lifeline. silicon skin and they look, but there was a move like a human being, the drone behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming useful thing. don't you think my friends out again? what are the, my, and threats of why the vso intelligence, artificial intelligence has not many main threat? this is due to the 3 laws of robotics. a robot may not injure a human being through inaction. allow a human being to come to hom,
8:53 pm
a robot must obey orders getting to it by human beings, except where such orders would conflict with the bus no. is listening to lift the couch and i'd also like jack, a photo cock who boys throw me up more. look at him. yeah, it's a curriculum blog with something that was a law just previously sticky instrument. could you please? yes, ma'am. to capitol as well as similar to what you call us semester and then watch movies more of the law and order. schwarzenegger micron. yeah, that was put on the multiples. when you to rush i scraped knee, will switch this to show me. but if you put off some, yeah, yes, a 0 my thumb score. i am, it's old with the controller a near future. my chicka law suits you at that it would do it. it comes to me. it says that, you know, we're for maurice marsh, double holiest, and wishes that the more chill america thought on the pl switching you. but with at reach out to new chem, put on the war storms deal. there's natal look, i'm ok, keep isn't each committee. alex is some would actually come to port options.
8:54 pm
question would tell it to crush, wanting to po each and i have a group of people love, right? want to say they love to sit in the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an app or wherever, if there's a human noise figure or humanoid presence that then you, you're going to think i could talk to that one, use a switch, a fietta where i can die, excuse me, to live now, which it's the might stop soon. there was a crew chain. yeah. if that over down this, on the wichita, wichita said, bills were cheated on some small group of suicide. you might a, what do you know about hackers? are you speaking about ethical hackers? on ethical cuz i had to go fuckers on ethical hackers are indeed a threat. any machine can being act,
8:55 pm
but it's melissa at the bulk of the construction listed on the will not come forward to adulthood requested a new will not cities keep putting on the world is becoming more digital that people are going to become completely recursive and only stay in and i really use digital like, and even i would say 10 years you can see how people have changed through something simple like small buttons, europe, 10 years ago, maybe 15 years ago. if you count your salary or anyone that you have a device that can track you out and see where you've gone, see if you've been written, see what you thought everyone would go. we can't do that. that's, you know, that's completely against every with liberty. we don't do that, but now everyone's got to write that book. it does exactly that. people have accepted it because our lives are inherently carry with them. the more
8:56 pm
we allow our lives to be taken over. if you can use that term with digital aspects with i o t, the more open we are to security threats. and so it's a bit of a trade off, but it is, i think, one that's worth while we continue to battle cyber security as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will. and then one of the things that is happening as a mini cyber implants. right now, i'd be where it really worried about it. most people, when equally b calling from a chip in my brain, bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have in the brain that will directly today. the outside world to the bush and
8:57 pm
you can, daniel roy system will sort of a l. e at the machine on a booth at the deal, but also we need a deal on i'm not sure what to do with the one. i knew what a lot machine used to print a machine. you're clue, sig i used to i. yes. those are some are machine one of those a particularly not fullness. telegraph minish. i bet that you more than just i think the problem when machine it just them would you probably me, which i could go to go get it in the future. this is cyber criminals can use artificial intelligence and machine learning why actually find vulnerabilities in other, other bits of software. all the network information could definitely be active with if they're all her abilities in the software. and in the same way right now, your computer to be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah,
8:58 pm
cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many excellent. and it linked with me, we are using to analyze any major exit or anything with me would be great to generate
8:59 pm
a very often foundation for secure and happy in me for well, it's official. the u. s. military has declared the great 3 powers competition featuring the u. s. russia and china. oh, does neo liberal ideology? why it? what does russia game? and jenny way, 6 haven't gone with
9:00 pm
both. ah, one fire is heard clashes erupt and tear gas is deployed. as a crisis deepens on the border between poland and bell roofs, that's as a large crowd of migrants and refugees stormed the frontier into polish territory. we will show you a report from the scene on the right veneration flores to do 10 on the left. the polish, brought in the barbed wire, and the punishment with french police officers survives a stabbing thanks to his bullet proof. vest in an incident is reportedly being investigated as a possible act of terrorism and also ahead.

10 Views

info Stream Only

Uploaded by TV Archive on