< Return to Video

Naked Citizens - World

  • 0:21 - 0:25
    Welcome to London,
    the world's capital of surveillance
  • 0:25 - 0:29
    Eventhough the year isn't 1984,
    you may be forgiven
  • 0:29 - 0:32
    for imagining Big Brother
    really is watching you.
  • 0:32 - 0:35
    I can see one, two...
  • 0:35 - 0:39
    six, seven...
    fourteen, fifteen... eighteen cameras.
  • 0:39 - 0:41
    On this spot.
  • 0:41 - 0:44
    Every bit of public ground
    is monitored all the time,
  • 0:44 - 0:46
    so that every single street.
  • 0:46 - 0:50
    But also just because all the different
    companies, different Londoners,
  • 0:50 - 0:53
    have their own CCTV cameras,
    so every spot is watched by everybody.
  • 0:54 - 0:56
    In the most monitored city
    in the world,
  • 0:56 - 0:59
    there is one camera
    for every 14 people.
  • 0:59 - 1:02
    But does this intense surveillance
    keep Londoners safe?
  • 1:02 - 1:06
    I mean, in a way
    these streets are kind of dangerous,
  • 1:06 - 1:09
    because they're covered in CCTVs,
    but no one is watching.
  • 1:09 - 1:11
    That's what's interesting
    about CCTV culture.
  • 1:11 - 1:15
    It takes away the drive
    for having initiatives
  • 1:15 - 1:17
    like natural surveillance
    being built in.
  • 1:18 - 1:22
    Photographer Henrietta Williams
    and cartographer George Gingell
  • 1:22 - 1:25
    have mapped a 'Ring of Steel'
    around London's financial district,
  • 1:28 - 1:30
    forged from automatic bollards,
  • 1:30 - 1:32
    security gates,
    and surveillance cameras.
  • 1:32 - 1:35
    Anyone who enters
    is registered electronically,
  • 1:35 - 1:38
    and anything out of the ordinary
    triggers security protocols,
  • 1:39 - 1:43
    even seemingly innocuous things
    like video cameras.
  • 1:44 - 1:47
    You have to use the other side,
    not facing the building door.
  • 1:47 - 1:51
    You can, as long as you're here.
  • 1:51 - 1:54
    We can film whichever way we want.
  • 1:55 - 1:57
    I'm not arguing with you,
    I'm telling you what I'm told.
  • 1:57 - 1:59
    I'm only doing my job.
  • 2:00 - 2:03
    The police can rely on the private security
    to jump in there before them.
  • 2:03 - 2:05
    So it's like a faster response unit
  • 2:05 - 2:08
    for less money by the government
    and for the city of London.
  • 2:08 - 2:12
    In fact in most cases,
    the streets along this block
  • 2:12 - 2:14
    were given to the developers
  • 2:15 - 2:19
    so they could enact the policy
    of complete pedestrian streets,
  • 2:19 - 2:24
    but also installing the defense
    and surveillance against terrorist attack
  • 2:24 - 2:27
    and again sort of petty loitering.
  • 2:32 - 2:36
    The surveillance systems here
    aren't just simple cameras.
  • 2:37 - 2:40
    Anyone who behaves unexpectedly
    triggers an alarm.
  • 2:40 - 2:44
    Imperceptibly, humans can observe
    and evaluate behaviour
  • 2:44 - 2:47
    through these smart cameras
    without anyone noticing.
  • 2:52 - 2:55
    If the camera detects
    an unusual event,
  • 2:55 - 2:56
    the subject is marked.
  • 3:03 - 3:08
    One of the world's leading scientists
    behind the development of smart cameras
  • 3:08 - 3:11
    is Prof. James Orwell,
    of Kinston University.
  • 3:14 - 3:18
    The system his teams are developing
    can detect suspicious activity,
  • 3:18 - 3:20
    even before a crime occurs.
  • 3:22 - 3:25
    The way is to present
    large volums of data
  • 3:25 - 3:28
    over many months,
    possibly years.
  • 3:28 - 3:32
    And so that enables the system
    to develop a statistical model
  • 3:32 - 3:36
    of what is normal
    or maybe what is abnormal.
  • 3:36 - 3:38
    And so then
    there is automatic flagging
  • 3:38 - 3:41
    of anything
    that is considered abnormal.
  • 3:42 - 3:46
    Pr. Orwell has been monitoring
    the university carpark
  • 3:46 - 3:48
    with one of these new cameras.
  • 3:52 - 3:55
    This system is learning
    normal patterns of behaviour:
  • 3:56 - 3:59
    who leaves,
    who arrives, and how they act.
  • 4:03 - 4:05
    We're able to measure
  • 4:05 - 4:08
    how long they spend in this area,
  • 4:08 - 4:12
    and so we can flag
    if there is some suspicious behaviour,
  • 4:12 - 4:16
    for example if somebody
    is loitering in this area.
  • 4:17 - 4:21
    Loitering is not allowed
    in the carparks of Kingston University.
  • 4:22 - 4:25
    But the system doesn't perfectly
    understand human behaviour.
  • 4:27 - 4:30
    An individual only needs
    to linger moments early
  • 4:31 - 4:34
    before the system flags them
    as potentially undesireable.
  • 4:40 - 4:44
    In locations where thousands of people
    pass in front of the cameras everyday,
  • 4:44 - 4:47
    it's even more difficult
    for the systems to determine
  • 4:47 - 4:50
    what is normal behaviour
    and what is not.
  • 4:51 - 4:54
    Are these people
    simply on their way to work?
  • 4:54 - 4:56
    Or does this group hide a terrorist?
  • 4:57 - 5:01
    Either way, inaccurate identification
    can have serious consequences.
  • 5:02 - 5:05
    It's the case that French national
    David Mery demonstrates.
  • 5:08 - 5:12
    In July 2005, the IT expert
    enters the Southwark underground station.
  • 5:14 - 5:16
    Eastward security cameras
    passed over him.
  • 5:16 - 5:18
    He was flagged up as different,
  • 5:18 - 5:21
    wearing a jacket
    despite the warm summer weather.
  • 5:21 - 5:24
    And he does not immediately
    board the first train
  • 5:24 - 5:26
    to arrive at the platform.
  • 5:27 - 5:30
    David now knows as first hand
    that he has been constantly evaluated.
  • 5:31 - 5:35
    They found my behaviour suspicious,
    because I was not looking at them
  • 5:35 - 5:38
    or at others when I entered the station,
    I looked at the steps.
  • 5:39 - 5:41
    This was enough for David
  • 5:41 - 5:44
    to warrant the full attention
    of the security cameras.
  • 5:45 - 5:49
    I would prefer to avoid the cameras
    but it's impossible,
  • 5:49 - 5:52
    there are too many cameras in London.
  • 5:52 - 5:55
    David Mery was arrested and searched.
  • 5:55 - 5:59
    When nothing was found on his person,
    police raided his apartment.
  • 5:59 - 6:03
    One diagram in particular
    suggested the officials
  • 6:03 - 6:06
    that they had apprehended
    a dangerous criminal.
  • 6:07 - 6:10
    I had been on the phone
    or something else.
  • 6:10 - 6:13
    And they were
    very interested in that.
  • 6:13 - 6:18
    They asked whether
    this was a map of the tub station.
  • 6:19 - 6:22
    As it's doodles, you can see
    anything you want in them.
  • 6:22 - 6:26
    It's impossible
    to disproof what it isn't.
  • 6:26 - 6:27
    It's just doodles.
  • 6:28 - 6:31
    Only three weeks before the police
    were quizzing David Mery
  • 6:31 - 6:33
    about his suspicious drawing,
  • 6:33 - 6:35
    London had experienced
  • 6:35 - 6:39
    the most devastating terrorist attack
    in the city's history.
  • 6:39 - 6:42
    52 people lost their lives
    when four suicide bombers
  • 6:43 - 6:46
    detonated explosives
    on public transports.
  • 6:46 - 6:49
    Three of them
    were filmed ahead of the attack,
  • 6:49 - 6:51
    during a test run on the underground.
  • 6:51 - 6:54
    But despite the thorough documentation
    of their preparations,
  • 6:55 - 6:56
    there was still no way
  • 6:56 - 6:59
    for their devastating crime
    to be prevented.
  • 7:00 - 7:02
    Suspicion instead
    falls on David Mery,
  • 7:02 - 7:06
    whose details are stored
    in a file of terrorist suspects.
  • 7:06 - 7:10
    8 years on, and the authorities
    still haven't removed him from the file.
  • 7:10 - 7:14
    I cannot travel to the United States.
    And considering that my arrest
  • 7:14 - 7:17
    was in relation with terrorism,
    even though I was never charged,
  • 7:17 - 7:20
    I have no chance of getting a visa.
  • 7:25 - 7:27
    Anyone suspected of crime in the UK
  • 7:27 - 7:30
    quickly loses their right to privacy.
  • 7:32 - 7:35
    The Face Watch unit
    of the London police
  • 7:35 - 7:38
    presents faces
    of suspects to the public
  • 7:38 - 7:42
    using footage from security cameras
    posted on the Internet.
  • 7:44 - 7:46
    This is a gentleman of interest.
  • 7:46 - 7:49
    And his image appears there.
  • 7:49 - 7:53
    We tick the authorized button here so it
    goes on the public website and to the app.
  • 7:53 - 7:56
    And we tick
    that we decide that we authorize it.
  • 7:56 - 7:58
    And then I press submit.
  • 7:59 - 8:02
    And that image
    is now gone into the system
  • 8:02 - 8:04
    and can be viewed by the public
    on the Face Watch site
  • 8:04 - 8:06
    and on the Face Watch app.
  • 8:10 - 8:13
    Mick Neville is head of image recognition
    at Scotland Yard.
  • 8:14 - 8:17
    He feels this kind of
    crowdsourced policing by the Internet
  • 8:17 - 8:21
    represents a powerful new weapon
    in the fight against crime.
  • 8:23 - 8:26
    Thousands of people
    have registered for the app.
  • 8:26 - 8:28
    In the United Kingdom,
  • 8:28 - 8:32
    people quite accept the CCTV.
  • 8:32 - 8:35
    They think the police
    do a good job with CCTV,
  • 8:35 - 8:38
    and they're happy
    to identify a criminal.
  • 8:38 - 8:42
    There's not so much fear of surveillance,
    I don't think, in United Kingdom,
  • 8:42 - 8:44
    as possibly on mainland Europe.
  • 8:46 - 8:50
    Over the past decade, the UK
    has been constantly seeking new ways
  • 8:50 - 8:52
    to combat
    the passive threat of terrorism.
  • 8:52 - 8:55
    In this military base
    two hours outside of London,
  • 8:55 - 8:59
    the newest techniques
    are getting put through their paces.
  • 9:00 - 9:02
    Mark Lawrence is one
    of the new breed of experts,
  • 9:02 - 9:06
    offering instructions in the use
    of unmanned aerial vehicles (UAV),
  • 9:06 - 9:08
    or drones.
  • 9:09 - 9:11
    No official government sources
  • 9:11 - 9:14
    will publicly talk
    about the effectiveness
  • 9:14 - 9:15
    of this new technique.
  • 9:16 - 9:18
    Only Mark Lawrence
    will speak with us.
  • 9:20 - 9:23
    So what I'm planning to do now
    is hopefully track Patrick down,
  • 9:24 - 9:27
    either on his way there
    or his way back.
  • 9:27 - 9:29
    And if I see him in this yard,
  • 9:29 - 9:32
    I will fly to the horse track
  • 9:32 - 9:34
    to see if we can pick him up there.
  • 9:37 - 9:40
    The hunt takes place
    across three miles.
  • 9:42 - 9:45
    So we've got Patrick,
    we've located him, he is in the drone,
  • 9:45 - 9:47
    so we're gonna fly towards him there.
  • 9:48 - 9:51
    Big Brother approaches unnoticed
    from the air.
  • 9:53 - 9:57
    When the target is discovered,
    the UAV becomes a constant companion
  • 9:57 - 9:59
    at a height of 120 meters.
  • 10:00 - 10:03
    What we're doing
    is using a GPS lock to do this.
  • 10:04 - 10:05
    So if I double click here
  • 10:05 - 10:08
    we can just keep the subject
    in the center of the screen,
  • 10:08 - 10:12
    and also at the same time
    the unit will follow him backwards.
  • 10:12 - 10:13
    So let's fly this way.
  • 10:16 - 10:18
    There you go.
  • 10:19 - 10:20
    So, did it work?
  • 10:20 - 10:24
    Yeah we got you. We got you
    in the house and coming out as well.
  • 10:24 - 10:27
    So that's why it's good
    for covered surveillance.
  • 10:29 - 10:33
    Is it possible that in the future
    we see drones flying over our heads?
  • 10:33 - 10:35
    Maybe not directly over your head
    but definitely,
  • 10:36 - 10:39
    the police are using them now.
    They're using them for surveillance work
  • 10:39 - 10:41
    and not just sneaking around
    spying on people,
  • 10:41 - 10:43
    as a lot of people seem to think.
  • 10:43 - 10:46
    Sometimes,
    to catch the bad things going on,
  • 10:46 - 10:48
    you need to be
    - I suppose you could call it sly -
  • 10:49 - 10:50
    or just secretive about it.
  • 10:51 - 10:54
    There are plans
    to fit the drones with improved cameras
  • 10:54 - 10:57
    incorporating
    face-recognition technology.
  • 10:58 - 11:02
    Quietly, public privacy
    is being exchanged for greater security.
  • 11:03 - 11:06
    Mickael Chandler is the head
    of Vanquish security back in London.
  • 11:07 - 11:10
    He's also keen
    to demonstrate some of his techniques,
  • 11:11 - 11:14
    some of which
    are alarmingly effective.
  • 11:17 - 11:18
    Hey, how's it going?
  • 11:18 - 11:20
    How did you get that?
  • 11:20 - 11:23
    Well, basically, what we've done was
    we remotely switched on
  • 11:23 - 11:26
    the microphone in your phone
    and recorded at a predetermined time
  • 11:26 - 11:30
    and that recording
    then uploaded to our online platform.
  • 11:32 - 11:33
    The phone was bugged,
  • 11:34 - 11:36
    whilst it was left unattended
    on the table
  • 11:36 - 11:38
    during our interview with the police.
  • 11:39 - 11:41
    Professor Orwell was also monitored.
  • 11:42 - 11:45
    ... then there is automatic flagging
  • 11:45 - 11:48
    of anything
    that is considered abnormal.
  • 11:48 - 11:53
    Okay, so here is the photograph
    taken in the Police Station I believe.
  • 11:54 - 11:56
    There's that one
    and there's this one.
  • 11:58 - 11:59
    Here are the calls.
  • 12:00 - 12:03
    So obviously,
    these are all your phone calls,
  • 12:03 - 12:06
    text messages,
    which has been only one.
  • 12:06 - 12:08
    You have an overview
    of your location which is -
  • 12:08 - 12:12
    because it's an overview, you've only got
    your location for this afternoon.
  • 12:12 - 12:15
    But in general, it's also got
    the photographs that have been taken.
  • 12:15 - 12:18
    And also, all the voice recordings
    that we have made.
  • 12:18 - 12:22
    So you just can see everything
    without my knowledge actually?
  • 12:22 - 12:24
    Basically yeah.
  • 12:24 - 12:27
    That's exactly what it was.
    And not only that.
  • 12:27 - 12:29
    There's absolutely no way for you
  • 12:29 - 12:32
    to be able to find the device
    on your phone. It's totally hidden.
  • 12:32 - 12:34
    Only we would be able to find it.
  • 12:35 - 12:38
    OK so this is the photographs
    that we found in your phone.
  • 12:38 - 12:41
    Probably I don't know what they are,
    but what I can do
  • 12:41 - 12:44
    is have a look
    at the time they were taken.
  • 12:44 - 12:47
    And then cross it
    not only with the recordings we have
  • 12:47 - 12:48
    but also the location.
  • 12:51 - 12:53
    We can show you that you were...
  • 12:54 - 12:57
    at a police station
    on Seymour Street.
  • 12:57 - 12:59
    That goes through GPS?
  • 12:59 - 13:01
    This is a GPS report
    coming from your device.
  • 13:02 - 13:03
    And that's all legal?
  • 13:03 - 13:05
    This is totally legal.
  • 13:06 - 13:07
    Absolutely legal, yes.
  • 13:08 - 13:10
    Amazing.
  • 13:12 - 13:14
    As this demonstration has revealed,
  • 13:14 - 13:17
    it's becoming ever easier
    to covertly track individuals,
  • 13:17 - 13:19
    using modern technology.
  • 13:20 - 13:23
    And it's happening
    far more often than we realize.
  • 13:24 - 13:27
    According to
    ex-NSA analyst William Binney,
  • 13:27 - 13:30
    American security agency
    now have the technology
  • 13:30 - 13:32
    to eavesdrop whenever they want.
  • 13:34 - 13:38
    So they're storing it all.
    They're collecting it all and storing.
  • 13:38 - 13:42
    It's all in large storing facilities,
    that's what that's all about.
  • 13:42 - 13:45
    And the point is
    that they hope by storing it all now
  • 13:45 - 13:49
    that some time in the future
    they'll figure out how to go back into it
  • 13:49 - 13:52
    and figure out what is important,
    so they can reanalyze it.
  • 13:52 - 13:56
    That's why they need
    5 zettabytes of storage in Utah.
  • 13:57 - 13:58
    They store it all.
  • 14:03 - 14:06
    William worked
    for the US government for 32 years.
  • 14:06 - 14:09
    He was responsible
    for electronic espionage.
  • 14:09 - 14:10
    A decade ago,
  • 14:10 - 14:13
    when the authorities began
    to bug US citizens,
  • 14:13 - 14:15
    he left the service.
  • 14:15 - 14:16
    The fight against terrorism
  • 14:17 - 14:20
    seems to change the rules
    of engagement over night.
  • 14:24 - 14:29
    I mean there virtually is nothing in the
    network that they can't have a copy of.
  • 14:29 - 14:33
    If they start targeting you, so what?
    They already have your data.
  • 14:33 - 14:36
    I can't find out
    what they are doing with my data.
  • 14:37 - 14:39
    But I know they have it.
  • 14:40 - 14:43
    So I make sure I write in there
    whatever I have to say about them,
  • 14:43 - 14:44
    I say that in there.
  • 14:45 - 14:48
    So when they collect it,
    they know what I'm thinking of them.
  • 14:52 - 14:54
    With specially developed software,
  • 14:54 - 14:57
    the authorities
    can tap into our computers
  • 14:57 - 14:59
    without us realizing.
  • 15:00 - 15:03
    This is a promotional video
    from the manufacturer FinSpy.
  • 15:03 - 15:06
    A surveillance program
    designed for the police.
  • 15:09 - 15:11
    It is widely used
    across western Europe,
  • 15:11 - 15:14
    and the principle is always the same.
  • 15:16 - 15:19
    The authorities infect
    the victim's computer with malware,
  • 15:19 - 15:22
    whilst they're hiding
    a fake software update.
  • 15:23 - 15:25
    The unsuspecting user clicks on 'OK',
  • 15:25 - 15:28
    and the police
    can now observe everything
  • 15:28 - 15:29
    as it happens on screen.
  • 15:33 - 15:35
    The intruder gets passwords,
  • 15:36 - 15:38
    emails,
    and can see stored data.
  • 15:43 - 15:47
    Not everybody in here
    works for FinFisher, right?
  • 15:47 - 15:50
    This is the largest
    hacker convention in Europe.
  • 15:51 - 15:55
    In fact, probably more people in here
    work against FinFisher. Thanks for that.
  • 15:56 - 16:00
    So, to that end, we can make a choice
    about what we'd like to do.
  • 16:01 - 16:04
    Once a year, hackers
    from around the world meet in Hamburg.
  • 16:04 - 16:08
    The theme of this year's meeting
    is 'State surveillance'.
  • 16:08 - 16:12
    Keynote's speaker Jacob Appelbaum
    knows what it means to be persecuted.
  • 16:12 - 16:15
    He's a close friend and supporter
    of Julian Assange.
  • 16:17 - 16:20
    To be free from suspicion
    is one of the first freedoms.
  • 16:21 - 16:24
    That is important for being free
    in the rest of your life.
  • 16:24 - 16:28
    When you're followed around,
    when you're being investigated,
  • 16:28 - 16:30
    because of the whim of someone,
  • 16:30 - 16:33
    this is the beginning of the end
    of your freedom.
  • 16:33 - 16:38
    Does the NSA routinely intercept
    American citizens' emails?
  • 16:38 - 16:39
    No.
  • 16:43 - 16:45
    Does the NSA intercept
  • 16:46 - 16:49
    American's cellphone conversations?
  • 16:49 - 16:50
    No.
  • 16:50 - 16:52
    - Google searches?
    - No.
  • 16:53 - 16:55
    - Text messages?
    - No.
  • 16:55 - 16:58
    - Amazon.com orders?
    - No.
  • 16:58 - 17:00
    - Bank records?
    - No.
  • 17:01 - 17:05
    That was General Alexander,
    the most powerful person in the world.
  • 17:05 - 17:08
    Probably even more powerful
    than the President of the US,
  • 17:08 - 17:10
    or any leader of any other country.
  • 17:10 - 17:12
    That guy's a fucking liar,
    first of all.
  • 17:12 - 17:14
    Because, we know for a fact...
  • 17:19 - 17:22
    We know for a fact from Mark Klein
    that the NSA was in fact doing
  • 17:22 - 17:24
    dragnet surveillance
    of all of those things.
  • 17:24 - 17:26
    I don't really use a mobile phone
  • 17:26 - 17:29
    for anything
    except security research these days.
  • 17:29 - 17:31
    So I don't really use a mobile phone.
  • 17:31 - 17:33
    I chose not to use Facebook
  • 17:33 - 17:35
    because I really think
    it's more like 'StasiBook'.
  • 17:35 - 17:37
    We should not just use systems
  • 17:37 - 17:39
    that make trade ops
    we wouldn't agree with,
  • 17:39 - 17:41
    that are not democratically decided.
  • 17:43 - 17:45
    The Icelandic capital of Reykjavík
  • 17:45 - 17:49
    is the perfect location from which
    to investigate the technologies
  • 17:49 - 17:52
    states can use
    to track their citizens.
  • 17:53 - 17:58
    It was from here that Wikileaks released
    this infamous video from the Iraq war.
  • 18:02 - 18:04
    Those involved
    with the release of the video
  • 18:04 - 18:07
    suddenly found themselves
    facing up to a powerful opponent.
  • 18:08 - 18:12
    Birgitta Jónsdóttir, who has worked
    for the media and for Wikileaks,
  • 18:13 - 18:16
    sent photos from the video
    to the international press.
  • 18:19 - 18:23
    This activity transformed her
    into a national security target,
  • 18:24 - 18:27
    and her right to digital privacy
    was repelled,
  • 18:27 - 18:31
    eventhough there were
    no legal proceedings against her.
  • 18:32 - 18:36
    Twitter was demanded
    to hand over my personal stuff,
  • 18:36 - 18:39
    within three days,
    without my knowledge.
  • 18:39 - 18:41
    Which means that
  • 18:41 - 18:44
    they did a very bad example
  • 18:44 - 18:49
    for the government of the US
    to go into people's
  • 18:49 - 18:53
    - you know, even parliamentarians -
    in other countries,
  • 18:53 - 18:57
    to snoop into their personal matters.
  • 18:58 - 19:02
    What's most remarkable about this story
    is that Birgitta Jónsdóttir
  • 19:02 - 19:04
    is a Member
    of the Icelandic Parliament.
  • 19:06 - 19:10
    Furthermore, Twitter was not the only
    source of private digital information
  • 19:10 - 19:14
    to hand data over
    to the US security agencies.
  • 19:15 - 19:20
    Have a look at what experts say
    in this field in the States for example.
  • 19:20 - 19:21
    They speculated
  • 19:21 - 19:25
    it's Facebook, Google,
    perhaps Skype or IP hosts.
  • 19:25 - 19:28
    I don't know,
    but the judge refuses
  • 19:28 - 19:32
    to acknowledge
    the request from my lawyers
  • 19:32 - 19:34
    to unseal what companies it is.
  • 19:35 - 19:38
    Jónsdóttir did nothing illegal
    when she released the video.
  • 19:38 - 19:39
    But it was enough
  • 19:39 - 19:44
    to warrant invasive snooping
    from the US security agencies.
  • 19:44 - 19:45
    That's me,
  • 19:46 - 19:48
    my younger son, older son.
  • 19:49 - 19:53
    Some people that I've got to know later
    I worked with.
  • 19:57 - 20:00
    Three years ago, the Icelandic people
    took to the streets.
  • 20:01 - 20:04
    The banking crisis
    had hit the small island nation hard.
  • 20:05 - 20:09
    The Icelandic saucepan revolution
    ultimately forced the general election.
  • 20:13 - 20:16
    Birgitta Jónsdóttir
    was elected to the new Parliament.
  • 20:17 - 20:20
    But for the US government,
    she remained a target.
  • 20:24 - 20:26
    Today, Jónsdóttir campaigns
  • 20:26 - 20:29
    for digital rights
    and self-determination.
  • 20:29 - 20:33
    She wants Iceland to become
    a safe haven for sensitive data.
  • 20:34 - 20:37
    They want to put a stop
    to the prying eyes of the state.
  • 20:39 - 20:41
    We went on a quest around the world
  • 20:42 - 20:45
    to cherry-pick all the best
    functioning laws in this regard.
  • 20:46 - 20:47
    Emails, for example,
  • 20:47 - 20:51
    would be protected in the same way
    as written correspondence.
  • 20:53 - 20:56
    There is absolutely
    no country in the world
  • 20:56 - 20:58
    that actually properly addressed
  • 20:58 - 21:03
    how easy it is
    for government and corporations
  • 21:03 - 21:05
    to mine through our private data.
  • 21:06 - 21:10
    We in Iceland
    are focusing on creating a standard
  • 21:11 - 21:15
    and setting an example,
    and it would be really ideal,
  • 21:15 - 21:20
    and this is one of the thoughts behind
    the Icelandic Modern Media Initiative.
  • 21:21 - 21:23
    The ideal if we can,
  • 21:23 - 21:27
    with this new set of laws,
    create a haven
  • 21:27 - 21:31
    in such a way that I would like
    to see it spread to other countries.
  • 21:35 - 21:39
    International demand
    to store confidential data in Iceland
  • 21:39 - 21:41
    has increased dramatically.
  • 21:42 - 21:45
    But according to Smári McCarthy
    there is also global uncertainty
  • 21:46 - 21:47
    about this issue.
  • 21:48 - 21:51
    He is director of the
    International Institute for the Media.
  • 21:52 - 21:55
    Journalists and their sources
    have deep concerns
  • 21:55 - 21:58
    about their data being protected.
  • 22:01 - 22:03
    Your data
    is just being shifted around,
  • 22:04 - 22:06
    and they turn computers off,
    and they turn computers on
  • 22:07 - 22:10
    and your data is wherever
    they think it's gonna be cheapest.
  • 22:10 - 22:12
    This is great
    if you're running a business.
  • 22:12 - 22:16
    It is terrible if you own data
    and you don't know where it is.
  • 22:16 - 22:20
    Suddenly the cat folders are droploaded
    or subject to Brazilian law.
  • 22:21 - 22:23
    That's not something
    you signed up for.
  • 22:25 - 22:28
    The police
    can shut down illegal sites.
  • 22:28 - 22:31
    It was the case
    with this raid on the server room
  • 22:31 - 22:34
    for online file sharing site
    The PirateBay.
  • 22:35 - 22:39
    The problem is with the legal information
    from other providers
  • 22:39 - 22:41
    that may be lost in the process.
  • 22:42 - 22:45
    To protect these data
    from any access,
  • 22:45 - 22:47
    it needs to be
    in an unreachable place.
  • 22:48 - 22:51
    In the future,
    that place could be in Iceland.
  • 22:51 - 22:55
    The idea of Iceland
    as an inverse tax haven
  • 22:55 - 22:58
    - this is a place
    that protects people's privacy
  • 22:58 - 23:01
    and people's information,
    and free speech rights
  • 23:01 - 23:04
    rather than protecting people
    against the tax authorities
  • 23:05 - 23:06
    is a very nice one
  • 23:06 - 23:11
    and it's definitely
    something worth striving towards.
  • 23:11 - 23:12
    It'll take time.
  • 23:13 - 23:17
    Hopefully over time every country
    will be a Switzerland of bits.
  • 23:19 - 23:21
    But Birgitta Jónsdóttir
  • 23:21 - 23:24
    will continue to use
    Facebook, Twitter and Google,
  • 23:24 - 23:28
    claiming she is a Guinea pig
    in the monitored space.
  • 23:29 - 23:33
    She says whoever spied on her
    feels they can do it with impunity,
  • 23:33 - 23:35
    and that her case
    should be a warning.
  • 23:37 - 23:40
    It is such a temptation
    to go into somebody's home
  • 23:40 - 23:43
    without them
    ever being able to know about it.
  • 23:43 - 23:47
    And then I'm referring
    to my online home,
  • 23:47 - 23:51
    for it is just
    as sacred as my offline home.
  • 23:51 - 23:53
    This is where
    all my private stuff is.
  • 23:53 - 23:56
    This is where
    all my personal matters are.
  • 23:56 - 23:58
    This is where all my thoughts are,
  • 23:58 - 24:00
    and all my activity
    and moment can be traced.
  • 24:01 - 24:04
    So, you know, hands off my home!
  • 24:06 - 24:10
    A similar case of monitoring
    is currently unraveling in Berlin.
  • 24:13 - 24:16
    Andrej Holm is a noted sociologist
  • 24:16 - 24:19
    who is teaching
    at the Humboldt University.
  • 24:20 - 24:23
    For months,
    he was shadowed and monitored,
  • 24:24 - 24:27
    suspected as the leader
    of a militant group
  • 24:27 - 24:31
    that committed arson attacks
    in Berlin in 2007.
  • 24:42 - 24:45
    It is the morning of the 31st of July,
    so it's summer day
  • 24:46 - 24:47
    in the morning, before seven.
  • 24:48 - 24:51
    I woke up to a pounding
    on the front door.
  • 24:52 - 24:55
    Then a massive armed man fell on me.
  • 24:56 - 25:01
    They then threw me to the ground,
    my hands fixed behind my back.
  • 25:02 - 25:05
    You then get the impression
    that you're in a film,
  • 25:06 - 25:10
    because they behave as in
    one of the thrillers or action movies.
  • 25:13 - 25:17
    I was already aware that there is
    such things as house searches and arrests
  • 25:18 - 25:20
    directed also
    against left-wing activists.
  • 25:21 - 25:23
    It was already going through my head,
  • 25:24 - 25:27
    but I could not understand what
    they actually had to do with me directly.
  • 25:28 - 25:31
    So it was an abstract fear
    that I had at that point.
  • 25:34 - 25:37
    Andrej Holm was arrested
    by a special detachment
  • 25:37 - 25:40
    and brought
    in federal court in Karlsruhe.
  • 25:41 - 25:45
    Only later did Holm learn that
    he had been systematically monitored.
  • 25:49 - 25:53
    The federal investigators
    had been studying his academic essays,
  • 25:53 - 25:55
    and the wide spread use
    of expressions
  • 25:56 - 25:59
    such as 'gentrification'
    and 'casualization'
  • 25:59 - 26:01
    had inflamed their suspicions.
  • 26:02 - 26:06
    These were terms also used
    by the militant group
  • 26:06 - 26:09
    that had claimed responsibility
    for the Berlin arson attacks.
  • 26:11 - 26:14
    The investigating authorities
    had created a characters grid
  • 26:14 - 26:16
    to use in their investigation,
  • 26:16 - 26:18
    which suggested suspects should have
  • 26:19 - 26:22
    'extraordinary political
    and historical knowledge'
  • 26:22 - 26:26
    and 'the scientific and analytical
    ability to execute the attacks'.
  • 26:28 - 26:29
    Following his arrest,
  • 26:29 - 26:32
    the investigating judge
    ordered home detention.
  • 26:33 - 26:36
    After 30 days
    in solitary confinement,
  • 26:36 - 26:37
    the federal court ruled
  • 26:37 - 26:40
    that there was 'no strong suspicion'.
  • 26:40 - 26:43
    For the first time since his arrest,
    Holm is free.
  • 26:44 - 26:45
    And for the first time,
  • 26:45 - 26:49
    he learns about the
    surveillance protocols surrounding him.
  • 26:49 - 26:53
    The excerpts from the minutes
    reveal a detailed investigation
  • 26:53 - 26:56
    into all aspects of Holm's life.
  • 27:04 - 27:07
    You spend your whole life
    second guessing yourself
  • 27:07 - 27:10
    how the police officers
    have been listening to you,
  • 27:10 - 27:12
    interpret what
    your actions or words mean.
  • 27:12 - 27:15
    You are doing
    something completely harmless,
  • 27:15 - 27:19
    but they've already read in the files that
    anything can be interpreted as malignant.
  • 27:19 - 27:22
    If I tie my shoes in the street,
    then I don't turn my back
  • 27:22 - 27:26
    so as not to give the impression
    that I am hiding something.
  • 27:29 - 27:33
    Then further friends and acquaintances
    are intercepted.
  • 27:35 - 27:38
    Video cameras are installed
    in front of the doorways.
  • 27:39 - 27:41
    You turn into
    a totally transparent people.
  • 27:47 - 27:50
    The investigators monitored
    Holm's social environment
  • 27:50 - 27:54
    and couldn't find
    any evidence to incriminate him.
  • 27:55 - 27:58
    But this only caused them
    to intensify their surveillance.
  • 27:59 - 28:02
    According to their logic,
    Holm is an intellectual
  • 28:02 - 28:06
    who's highly conspiratorial
    and expertly concealing his misdeeds.
  • 28:07 - 28:10
    That they may be
    on the tail of an innocent person
  • 28:10 - 28:13
    didn't seem to occur to his pursuers.
  • 28:18 - 28:23
    We were completely monitored.
    Our personal emails have been read.
  • 28:24 - 28:28
    They obviously found ways,
    even before the online search,
  • 28:28 - 28:30
    to gain access to our computers.
  • 28:34 - 28:37
    There was also a sense
    of political outrage in the country,
  • 28:38 - 28:40
    over the loss of freedom
  • 28:40 - 28:44
    to choose what the main ingredients
    of domestic social value should be.
  • 28:47 - 28:50
    Because those personal freedoms
    are trampled
  • 28:50 - 28:53
    in the course
    of these kinds of investigation.
  • 28:57 - 29:01
    Finally, anyone who now searches
    Andrej Holm on the Internet
  • 29:01 - 29:04
    will receive
    a huge number of results,
  • 29:04 - 29:07
    in many articles
    linking him to terrorism.
  • 29:09 - 29:12
    For the rest of his life, Andrej Holm
    will be tainted by the phrase
  • 29:12 - 29:14
    'terrorist suspect'.
  • 29:17 - 29:21
    People are more conscious of the need
    to protect their digital privacy
  • 29:21 - 29:22
    than ever before.
  • 29:23 - 29:26
    The call for digital self-defense
    is heard everywhere.
  • 29:27 - 29:29
    Emails are sent encrypted.
  • 29:29 - 29:34
    But many are choosing to do without
    social networks like Facebook and Twitter.
  • 29:36 - 29:40
    In Vienna, this group
    meets once a week for a cypherparty.
  • 29:41 - 29:45
    They discuss how to make themselves
    invisible in the network.
  • 29:48 - 29:51
    What is the goal of Tor
    and the people that operate it?
  • 29:52 - 29:55
    Anonymity,
    that is from web browsing,
  • 29:55 - 29:58
    chats,
    or other Internet services.
  • 29:58 - 29:59
    To make it anonymous.
  • 30:01 - 30:05
    Until now, encryption techniques
    have only been in the domain
  • 30:05 - 30:08
    of the authorities
    and elite Internet geeks.
  • 30:09 - 30:11
    These people want to spread the word.
  • 30:12 - 30:15
    I think we are
    more and more transparent.
  • 30:15 - 30:19
    Even when I use a debit card or a
    credit card, I have the same feeling.
  • 30:22 - 30:25
    I want to save data
    as much as possible,
  • 30:25 - 30:27
    and leave
    as little as possible behind.
  • 30:27 - 30:29
    I think it's wiser.
  • 30:38 - 30:41
    Cypherparties have formed spontaneously
    all over the planet.
  • 30:41 - 30:44
    The interest
    of the population has risen
  • 30:44 - 30:48
    in the course of more government control
    and more profiling by large companies
  • 30:48 - 30:51
    such as Google, Facebook, and others.
  • 30:52 - 30:55
    And the interpretation
    and openness of this profile data
  • 30:55 - 30:57
    is a major problem
    and a major threat.
  • 30:59 - 31:02
    These groups
    have straightforward aspirations.
  • 31:02 - 31:06
    No one should be able
    to read their social media posts,
  • 31:06 - 31:08
    unless they want them to.
  • 31:08 - 31:12
    And nobody should be able to leaf through
    their photo albums without permission.
  • 31:13 - 31:16
    They argue this is not just paranoia.
  • 31:19 - 31:21
    Privacy is a basic human right.
  • 31:22 - 31:25
    And it must also apply
    in the digital world.
  • 31:25 - 31:28
    When you bareback with the Internet,
    you bareback with Big Brother.
  • 31:28 - 31:32
    So maybe it's a good idea,
    just like we understood with HIV and AIDS,
  • 31:32 - 31:34
    we have a personal responsibility
  • 31:34 - 31:37
    to not infect
    our friends and lovers and neighbours.
  • 31:37 - 31:39
    And when you use the Internet
    without any crypto,
  • 31:39 - 31:43
    without anonymity, without privacy,
    what you do is you present
  • 31:43 - 31:46
    a transmitting risk to your community
    and probably even to your country,
  • 31:46 - 31:48
    certainly to yourself.
  • 31:51 - 31:53
    Big Brother is watching you.
  • 31:54 - 31:57
    With most people having
    a limited understanding
  • 31:57 - 32:01
    of this world of cybersurveillance
    and how to protect themselves
  • 32:02 - 32:06
    are our most basic freedoms
    already being lost.
  • 32:08 - 32:11
    Synch & transcript by Hell
Title:
Naked Citizens - World
Description:

For downloads and more information visit: http://www.journey.webbler.co.uk/?lid=65226&bid=2

Increasing numbers of 'terror suspects' are being arrested on the basis of online and CCTV surveillance data. Authorities claim they act in the public interest, but does this intense surveillance keep us safer?

"I woke up to pounding on my door", says Andrej Holm, a sociologist from the Humboldt University. In what felt like a scene from a movie, he was taken from his Berlin home by armed men after a systematic monitoring of his academic research deemed him the probable leader of a militant group. After 30 days in solitary confinement, he was released without charges. Across Western Europe and the USA, surveillance of civilians has become a major business. With one camera for every 14 people in London and drones being used by police to track individuals, the threat of living in a Big Brother state is becoming a reality. At an annual conference of hackers, keynote speaker Jacob Appelbaum asserts, "to be free of suspicion is the most important right to be truly free". But with most people having a limited understanding of this world of cyber surveillance and how to protect ourselves, are our basic freedoms already being lost?

ORF

more » « less
Duration:
32:41
Retired user edited English subtitles for Naked Citizens - World
Retired user added a translation

English subtitles

Revisions