Naked Citizens - World
-
0:21 - 0:25Welcome to London,
the world's capital of surveillance -
0:25 - 0:29Eventhough the year isn't 1984,
you may be forgiven -
0:29 - 0:32for imagining Big Brother
really is watching you. -
0:32 - 0:35I can see one, two...
-
0:35 - 0:39six, seven...
fourteen, fifteen... eighteen cameras. -
0:39 - 0:41On this spot.
-
0:41 - 0:44Every bit of public ground
is monitored all the time, -
0:44 - 0:46so that every single street.
-
0:46 - 0:50But also just because all the different
companies, different Londoners, -
0:50 - 0:53have their own CCTV cameras,
so every spot is watched by everybody. -
0:54 - 0:56In the most monitored city
in the world, -
0:56 - 0:59there is one camera
for every 14 people. -
0:59 - 1:02But does this intense surveillance
keep Londoners safe? -
1:02 - 1:06I mean, in a way
these streets are kind of dangerous, -
1:06 - 1:09because they're covered in CCTVs,
but no one is watching. -
1:09 - 1:11That's what's interesting
about CCTV culture. -
1:11 - 1:15It takes away the drive
for having initiatives -
1:15 - 1:17like natural surveillance
being built in. -
1:18 - 1:22Photographer Henrietta Williams
and cartographer George Gingell -
1:22 - 1:25have mapped a 'Ring of Steel'
around London's financial district, -
1:28 - 1:30forged from automatic bollards,
-
1:30 - 1:32security gates,
and surveillance cameras. -
1:32 - 1:35Anyone who enters
is registered electronically, -
1:35 - 1:38and anything out of the ordinary
triggers security protocols, -
1:39 - 1:43even seemingly innocuous things
like video cameras. -
1:44 - 1:47You have to use the other side,
not facing the building door. -
1:47 - 1:51You can, as long as you're here.
-
1:51 - 1:54We can film whichever way we want.
-
1:55 - 1:57I'm not arguing with you,
I'm telling you what I'm told. -
1:57 - 1:59I'm only doing my job.
-
2:00 - 2:03The police can rely on the private security
to jump in there before them. -
2:03 - 2:05So it's like a faster response unit
-
2:05 - 2:08for less money by the government
and for the city of London. -
2:08 - 2:12In fact in most cases,
the streets along this block -
2:12 - 2:14were given to the developers
-
2:15 - 2:19so they could enact the policy
of complete pedestrian streets, -
2:19 - 2:24but also installing the defense
and surveillance against terrorist attack -
2:24 - 2:27and again sort of petty loitering.
-
2:32 - 2:36The surveillance systems here
aren't just simple cameras. -
2:37 - 2:40Anyone who behaves unexpectedly
triggers an alarm. -
2:40 - 2:44Imperceptibly, humans can observe
and evaluate behaviour -
2:44 - 2:47through these smart cameras
without anyone noticing. -
2:52 - 2:55If the camera detects
an unusual event, -
2:55 - 2:56the subject is marked.
-
3:03 - 3:08One of the world's leading scientists
behind the development of smart cameras -
3:08 - 3:11is Prof. James Orwell,
of Kinston University. -
3:14 - 3:18The system his teams are developing
can detect suspicious activity, -
3:18 - 3:20even before a crime occurs.
-
3:22 - 3:25The way is to present
large volums of data -
3:25 - 3:28over many months,
possibly years. -
3:28 - 3:32And so that enables the system
to develop a statistical model -
3:32 - 3:36of what is normal
or maybe what is abnormal. -
3:36 - 3:38And so then
there is automatic flagging -
3:38 - 3:41of anything
that is considered abnormal. -
3:42 - 3:46Pr. Orwell has been monitoring
the university carpark -
3:46 - 3:48with one of these new cameras.
-
3:52 - 3:55This system is learning
normal patterns of behaviour: -
3:56 - 3:59who leaves,
who arrives, and how they act. -
4:03 - 4:05We're able to measure
-
4:05 - 4:08how long they spend in this area,
-
4:08 - 4:12and so we can flag
if there is some suspicious behaviour, -
4:12 - 4:16for example if somebody
is loitering in this area. -
4:17 - 4:21Loitering is not allowed
in the carparks of Kingston University. -
4:22 - 4:25But the system doesn't perfectly
understand human behaviour. -
4:27 - 4:30An individual only needs
to linger moments early -
4:31 - 4:34before the system flags them
as potentially undesireable. -
4:40 - 4:44In locations where thousands of people
pass in front of the cameras everyday, -
4:44 - 4:47it's even more difficult
for the systems to determine -
4:47 - 4:50what is normal behaviour
and what is not. -
4:51 - 4:54Are these people
simply on their way to work? -
4:54 - 4:56Or does this group hide a terrorist?
-
4:57 - 5:01Either way, inaccurate identification
can have serious consequences. -
5:02 - 5:05It's the case that French national
David Mery demonstrates. -
5:08 - 5:12In July 2005, the IT expert
enters the Southwark underground station. -
5:14 - 5:16Eastward security cameras
passed over him. -
5:16 - 5:18He was flagged up as different,
-
5:18 - 5:21wearing a jacket
despite the warm summer weather. -
5:21 - 5:24And he does not immediately
board the first train -
5:24 - 5:26to arrive at the platform.
-
5:27 - 5:30David now knows as first hand
that he has been constantly evaluated. -
5:31 - 5:35They found my behaviour suspicious,
because I was not looking at them -
5:35 - 5:38or at others when I entered the station,
I looked at the steps. -
5:39 - 5:41This was enough for David
-
5:41 - 5:44to warrant the full attention
of the security cameras. -
5:45 - 5:49I would prefer to avoid the cameras
but it's impossible, -
5:49 - 5:52there are too many cameras in London.
-
5:52 - 5:55David Mery was arrested and searched.
-
5:55 - 5:59When nothing was found on his person,
police raided his apartment. -
5:59 - 6:03One diagram in particular
suggested the officials -
6:03 - 6:06that they had apprehended
a dangerous criminal. -
6:07 - 6:10I had been on the phone
or something else. -
6:10 - 6:13And they were
very interested in that. -
6:13 - 6:18They asked whether
this was a map of the tub station. -
6:19 - 6:22As it's doodles, you can see
anything you want in them. -
6:22 - 6:26It's impossible
to disproof what it isn't. -
6:26 - 6:27It's just doodles.
-
6:28 - 6:31Only three weeks before the police
were quizzing David Mery -
6:31 - 6:33about his suspicious drawing,
-
6:33 - 6:35London had experienced
-
6:35 - 6:39the most devastating terrorist attack
in the city's history. -
6:39 - 6:4252 people lost their lives
when four suicide bombers -
6:43 - 6:46detonated explosives
on public transports. -
6:46 - 6:49Three of them
were filmed ahead of the attack, -
6:49 - 6:51during a test run on the underground.
-
6:51 - 6:54But despite the thorough documentation
of their preparations, -
6:55 - 6:56there was still no way
-
6:56 - 6:59for their devastating crime
to be prevented. -
7:00 - 7:02Suspicion instead
falls on David Mery, -
7:02 - 7:06whose details are stored
in a file of terrorist suspects. -
7:06 - 7:108 years on, and the authorities
still haven't removed him from the file. -
7:10 - 7:14I cannot travel to the United States.
And considering that my arrest -
7:14 - 7:17was in relation with terrorism,
even though I was never charged, -
7:17 - 7:20I have no chance of getting a visa.
-
7:25 - 7:27Anyone suspected of crime in the UK
-
7:27 - 7:30quickly loses their right to privacy.
-
7:32 - 7:35The Face Watch unit
of the London police -
7:35 - 7:38presents faces
of suspects to the public -
7:38 - 7:42using footage from security cameras
posted on the Internet. -
7:44 - 7:46This is a gentleman of interest.
-
7:46 - 7:49And his image appears there.
-
7:49 - 7:53We tick the authorized button here so it
goes on the public website and to the app. -
7:53 - 7:56And we tick
that we decide that we authorize it. -
7:56 - 7:58And then I press submit.
-
7:59 - 8:02And that image
is now gone into the system -
8:02 - 8:04and can be viewed by the public
on the Face Watch site -
8:04 - 8:06and on the Face Watch app.
-
8:10 - 8:13Mick Neville is head of image recognition
at Scotland Yard. -
8:14 - 8:17He feels this kind of
crowdsourced policing by the Internet -
8:17 - 8:21represents a powerful new weapon
in the fight against crime. -
8:23 - 8:26Thousands of people
have registered for the app. -
8:26 - 8:28In the United Kingdom,
-
8:28 - 8:32people quite accept the CCTV.
-
8:32 - 8:35They think the police
do a good job with CCTV, -
8:35 - 8:38and they're happy
to identify a criminal. -
8:38 - 8:42There's not so much fear of surveillance,
I don't think, in United Kingdom, -
8:42 - 8:44as possibly on mainland Europe.
-
8:46 - 8:50Over the past decade, the UK
has been constantly seeking new ways -
8:50 - 8:52to combat
the passive threat of terrorism. -
8:52 - 8:55In this military base
two hours outside of London, -
8:55 - 8:59the newest techniques
are getting put through their paces. -
9:00 - 9:02Mark Lawrence is one
of the new breed of experts, -
9:02 - 9:06offering instructions in the use
of unmanned aerial vehicles (UAV), -
9:06 - 9:08or drones.
-
9:09 - 9:11No official government sources
-
9:11 - 9:14will publicly talk
about the effectiveness -
9:14 - 9:15of this new technique.
-
9:16 - 9:18Only Mark Lawrence
will speak with us. -
9:20 - 9:23So what I'm planning to do now
is hopefully track Patrick down, -
9:24 - 9:27either on his way there
or his way back. -
9:27 - 9:29And if I see him in this yard,
-
9:29 - 9:32I will fly to the horse track
-
9:32 - 9:34to see if we can pick him up there.
-
9:37 - 9:40The hunt takes place
across three miles. -
9:42 - 9:45So we've got Patrick,
we've located him, he is in the drone, -
9:45 - 9:47so we're gonna fly towards him there.
-
9:48 - 9:51Big Brother approaches unnoticed
from the air. -
9:53 - 9:57When the target is discovered,
the UAV becomes a constant companion -
9:57 - 9:59at a height of 120 meters.
-
10:00 - 10:03What we're doing
is using a GPS lock to do this. -
10:04 - 10:05So if I double click here
-
10:05 - 10:08we can just keep the subject
in the center of the screen, -
10:08 - 10:12and also at the same time
the unit will follow him backwards. -
10:12 - 10:13So let's fly this way.
-
10:16 - 10:18There you go.
-
10:19 - 10:20So, did it work?
-
10:20 - 10:24Yeah we got you. We got you
in the house and coming out as well. -
10:24 - 10:27So that's why it's good
for covered surveillance. -
10:29 - 10:33Is it possible that in the future
we see drones flying over our heads? -
10:33 - 10:35Maybe not directly over your head
but definitely, -
10:36 - 10:39the police are using them now.
They're using them for surveillance work -
10:39 - 10:41and not just sneaking around
spying on people, -
10:41 - 10:43as a lot of people seem to think.
-
10:43 - 10:46Sometimes,
to catch the bad things going on, -
10:46 - 10:48you need to be
- I suppose you could call it sly - -
10:49 - 10:50or just secretive about it.
-
10:51 - 10:54There are plans
to fit the drones with improved cameras -
10:54 - 10:57incorporating
face-recognition technology. -
10:58 - 11:02Quietly, public privacy
is being exchanged for greater security. -
11:03 - 11:06Mickael Chandler is the head
of Vanquish security back in London. -
11:07 - 11:10He's also keen
to demonstrate some of his techniques, -
11:11 - 11:14some of which
are alarmingly effective. -
11:17 - 11:18Hey, how's it going?
-
11:18 - 11:20How did you get that?
-
11:20 - 11:23Well, basically, what we've done was
we remotely switched on -
11:23 - 11:26the microphone in your phone
and recorded at a predetermined time -
11:26 - 11:30and that recording
then uploaded to our online platform. -
11:32 - 11:33The phone was bugged,
-
11:34 - 11:36whilst it was left unattended
on the table -
11:36 - 11:38during our interview with the police.
-
11:39 - 11:41Professor Orwell was also monitored.
-
11:42 - 11:45... then there is automatic flagging
-
11:45 - 11:48of anything
that is considered abnormal. -
11:48 - 11:53Okay, so here is the photograph
taken in the Police Station I believe. -
11:54 - 11:56There's that one
and there's this one. -
11:58 - 11:59Here are the calls.
-
12:00 - 12:03So obviously,
these are all your phone calls, -
12:03 - 12:06text messages,
which has been only one. -
12:06 - 12:08You have an overview
of your location which is - -
12:08 - 12:12because it's an overview, you've only got
your location for this afternoon. -
12:12 - 12:15But in general, it's also got
the photographs that have been taken. -
12:15 - 12:18And also, all the voice recordings
that we have made. -
12:18 - 12:22So you just can see everything
without my knowledge actually? -
12:22 - 12:24Basically yeah.
-
12:24 - 12:27That's exactly what it was.
And not only that. -
12:27 - 12:29There's absolutely no way for you
-
12:29 - 12:32to be able to find the device
on your phone. It's totally hidden. -
12:32 - 12:34Only we would be able to find it.
-
12:35 - 12:38OK so this is the photographs
that we found in your phone. -
12:38 - 12:41Probably I don't know what they are,
but what I can do -
12:41 - 12:44is have a look
at the time they were taken. -
12:44 - 12:47And then cross it
not only with the recordings we have -
12:47 - 12:48but also the location.
-
12:51 - 12:53We can show you that you were...
-
12:54 - 12:57at a police station
on Seymour Street. -
12:57 - 12:59That goes through GPS?
-
12:59 - 13:01This is a GPS report
coming from your device. -
13:02 - 13:03And that's all legal?
-
13:03 - 13:05This is totally legal.
-
13:06 - 13:07Absolutely legal, yes.
-
13:08 - 13:10Amazing.
-
13:12 - 13:14As this demonstration has revealed,
-
13:14 - 13:17it's becoming ever easier
to covertly track individuals, -
13:17 - 13:19using modern technology.
-
13:20 - 13:23And it's happening
far more often than we realize. -
13:24 - 13:27According to
ex-NSA analyst William Binney, -
13:27 - 13:30American security agency
now have the technology -
13:30 - 13:32to eavesdrop whenever they want.
-
13:34 - 13:38So they're storing it all.
They're collecting it all and storing. -
13:38 - 13:42It's all in large storing facilities,
that's what that's all about. -
13:42 - 13:45And the point is
that they hope by storing it all now -
13:45 - 13:49that some time in the future
they'll figure out how to go back into it -
13:49 - 13:52and figure out what is important,
so they can reanalyze it. -
13:52 - 13:56That's why they need
5 zettabytes of storage in Utah. -
13:57 - 13:58They store it all.
-
14:03 - 14:06William worked
for the US government for 32 years. -
14:06 - 14:09He was responsible
for electronic espionage. -
14:09 - 14:10A decade ago,
-
14:10 - 14:13when the authorities began
to bug US citizens, -
14:13 - 14:15he left the service.
-
14:15 - 14:16The fight against terrorism
-
14:17 - 14:20seems to change the rules
of engagement over night. -
14:24 - 14:29I mean there virtually is nothing in the
network that they can't have a copy of. -
14:29 - 14:33If they start targeting you, so what?
They already have your data. -
14:33 - 14:36I can't find out
what they are doing with my data. -
14:37 - 14:39But I know they have it.
-
14:40 - 14:43So I make sure I write in there
whatever I have to say about them, -
14:43 - 14:44I say that in there.
-
14:45 - 14:48So when they collect it,
they know what I'm thinking of them. -
14:52 - 14:54With specially developed software,
-
14:54 - 14:57the authorities
can tap into our computers -
14:57 - 14:59without us realizing.
-
15:00 - 15:03This is a promotional video
from the manufacturer FinSpy. -
15:03 - 15:06A surveillance program
designed for the police. -
15:09 - 15:11It is widely used
across western Europe, -
15:11 - 15:14and the principle is always the same.
-
15:16 - 15:19The authorities infect
the victim's computer with malware, -
15:19 - 15:22whilst they're hiding
a fake software update. -
15:23 - 15:25The unsuspecting user clicks on 'OK',
-
15:25 - 15:28and the police
can now observe everything -
15:28 - 15:29as it happens on screen.
-
15:33 - 15:35The intruder gets passwords,
-
15:36 - 15:38emails,
and can see stored data. -
15:43 - 15:47Not everybody in here
works for FinFisher, right? -
15:47 - 15:50This is the largest
hacker convention in Europe. -
15:51 - 15:55In fact, probably more people in here
work against FinFisher. Thanks for that. -
15:56 - 16:00So, to that end, we can make a choice
about what we'd like to do. -
16:01 - 16:04Once a year, hackers
from around the world meet in Hamburg. -
16:04 - 16:08The theme of this year's meeting
is 'State surveillance'. -
16:08 - 16:12Keynote's speaker Jacob Appelbaum
knows what it means to be persecuted. -
16:12 - 16:15He's a close friend and supporter
of Julian Assange. -
16:17 - 16:20To be free from suspicion
is one of the first freedoms. -
16:21 - 16:24That is important for being free
in the rest of your life. -
16:24 - 16:28When you're followed around,
when you're being investigated, -
16:28 - 16:30because of the whim of someone,
-
16:30 - 16:33this is the beginning of the end
of your freedom. -
16:33 - 16:38Does the NSA routinely intercept
American citizens' emails? -
16:38 - 16:39No.
-
16:43 - 16:45Does the NSA intercept
-
16:46 - 16:49American's cellphone conversations?
-
16:49 - 16:50No.
-
16:50 - 16:52- Google searches?
- No. -
16:53 - 16:55- Text messages?
- No. -
16:55 - 16:58- Amazon.com orders?
- No. -
16:58 - 17:00- Bank records?
- No. -
17:01 - 17:05That was General Alexander,
the most powerful person in the world. -
17:05 - 17:08Probably even more powerful
than the President of the US, -
17:08 - 17:10or any leader of any other country.
-
17:10 - 17:12That guy's a fucking liar,
first of all. -
17:12 - 17:14Because, we know for a fact...
-
17:19 - 17:22We know for a fact from Mark Klein
that the NSA was in fact doing -
17:22 - 17:24dragnet surveillance
of all of those things. -
17:24 - 17:26I don't really use a mobile phone
-
17:26 - 17:29for anything
except security research these days. -
17:29 - 17:31So I don't really use a mobile phone.
-
17:31 - 17:33I chose not to use Facebook
-
17:33 - 17:35because I really think
it's more like 'StasiBook'. -
17:35 - 17:37We should not just use systems
-
17:37 - 17:39that make trade ops
we wouldn't agree with, -
17:39 - 17:41that are not democratically decided.
-
17:43 - 17:45The Icelandic capital of Reykjavík
-
17:45 - 17:49is the perfect location from which
to investigate the technologies -
17:49 - 17:52states can use
to track their citizens. -
17:53 - 17:58It was from here that Wikileaks released
this infamous video from the Iraq war. -
18:02 - 18:04Those involved
with the release of the video -
18:04 - 18:07suddenly found themselves
facing up to a powerful opponent. -
18:08 - 18:12Birgitta Jónsdóttir, who has worked
for the media and for Wikileaks, -
18:13 - 18:16sent photos from the video
to the international press. -
18:19 - 18:23This activity transformed her
into a national security target, -
18:24 - 18:27and her right to digital privacy
was repelled, -
18:27 - 18:31eventhough there were
no legal proceedings against her. -
18:32 - 18:36Twitter was demanded
to hand over my personal stuff, -
18:36 - 18:39within three days,
without my knowledge. -
18:39 - 18:41Which means that
-
18:41 - 18:44they did a very bad example
-
18:44 - 18:49for the government of the US
to go into people's -
18:49 - 18:53- you know, even parliamentarians -
in other countries, -
18:53 - 18:57to snoop into their personal matters.
-
18:58 - 19:02What's most remarkable about this story
is that Birgitta Jónsdóttir -
19:02 - 19:04is a Member
of the Icelandic Parliament. -
19:06 - 19:10Furthermore, Twitter was not the only
source of private digital information -
19:10 - 19:14to hand data over
to the US security agencies. -
19:15 - 19:20Have a look at what experts say
in this field in the States for example. -
19:20 - 19:21They speculated
-
19:21 - 19:25it's Facebook, Google,
perhaps Skype or IP hosts. -
19:25 - 19:28I don't know,
but the judge refuses -
19:28 - 19:32to acknowledge
the request from my lawyers -
19:32 - 19:34to unseal what companies it is.
-
19:35 - 19:38Jónsdóttir did nothing illegal
when she released the video. -
19:38 - 19:39But it was enough
-
19:39 - 19:44to warrant invasive snooping
from the US security agencies. -
19:44 - 19:45That's me,
-
19:46 - 19:48my younger son, older son.
-
19:49 - 19:53Some people that I've got to know later
I worked with. -
19:57 - 20:00Three years ago, the Icelandic people
took to the streets. -
20:01 - 20:04The banking crisis
had hit the small island nation hard. -
20:05 - 20:09The Icelandic saucepan revolution
ultimately forced the general election. -
20:13 - 20:16Birgitta Jónsdóttir
was elected to the new Parliament. -
20:17 - 20:20But for the US government,
she remained a target. -
20:24 - 20:26Today, Jónsdóttir campaigns
-
20:26 - 20:29for digital rights
and self-determination. -
20:29 - 20:33She wants Iceland to become
a safe haven for sensitive data. -
20:34 - 20:37They want to put a stop
to the prying eyes of the state. -
20:39 - 20:41We went on a quest around the world
-
20:42 - 20:45to cherry-pick all the best
functioning laws in this regard. -
20:46 - 20:47Emails, for example,
-
20:47 - 20:51would be protected in the same way
as written correspondence. -
20:53 - 20:56There is absolutely
no country in the world -
20:56 - 20:58that actually properly addressed
-
20:58 - 21:03how easy it is
for government and corporations -
21:03 - 21:05to mine through our private data.
-
21:06 - 21:10We in Iceland
are focusing on creating a standard -
21:11 - 21:15and setting an example,
and it would be really ideal, -
21:15 - 21:20and this is one of the thoughts behind
the Icelandic Modern Media Initiative. -
21:21 - 21:23The ideal if we can,
-
21:23 - 21:27with this new set of laws,
create a haven -
21:27 - 21:31in such a way that I would like
to see it spread to other countries. -
21:35 - 21:39International demand
to store confidential data in Iceland -
21:39 - 21:41has increased dramatically.
-
21:42 - 21:45But according to Smári McCarthy
there is also global uncertainty -
21:46 - 21:47about this issue.
-
21:48 - 21:51He is director of the
International Institute for the Media. -
21:52 - 21:55Journalists and their sources
have deep concerns -
21:55 - 21:58about their data being protected.
-
22:01 - 22:03Your data
is just being shifted around, -
22:04 - 22:06and they turn computers off,
and they turn computers on -
22:07 - 22:10and your data is wherever
they think it's gonna be cheapest. -
22:10 - 22:12This is great
if you're running a business. -
22:12 - 22:16It is terrible if you own data
and you don't know where it is. -
22:16 - 22:20Suddenly the cat folders are droploaded
or subject to Brazilian law. -
22:21 - 22:23That's not something
you signed up for. -
22:25 - 22:28The police
can shut down illegal sites. -
22:28 - 22:31It was the case
with this raid on the server room -
22:31 - 22:34for online file sharing site
The PirateBay. -
22:35 - 22:39The problem is with the legal information
from other providers -
22:39 - 22:41that may be lost in the process.
-
22:42 - 22:45To protect these data
from any access, -
22:45 - 22:47it needs to be
in an unreachable place. -
22:48 - 22:51In the future,
that place could be in Iceland. -
22:51 - 22:55The idea of Iceland
as an inverse tax haven -
22:55 - 22:58- this is a place
that protects people's privacy -
22:58 - 23:01and people's information,
and free speech rights -
23:01 - 23:04rather than protecting people
against the tax authorities -
23:05 - 23:06is a very nice one
-
23:06 - 23:11and it's definitely
something worth striving towards. -
23:11 - 23:12It'll take time.
-
23:13 - 23:17Hopefully over time every country
will be a Switzerland of bits. -
23:19 - 23:21But Birgitta Jónsdóttir
-
23:21 - 23:24will continue to use
Facebook, Twitter and Google, -
23:24 - 23:28claiming she is a Guinea pig
in the monitored space. -
23:29 - 23:33She says whoever spied on her
feels they can do it with impunity, -
23:33 - 23:35and that her case
should be a warning. -
23:37 - 23:40It is such a temptation
to go into somebody's home -
23:40 - 23:43without them
ever being able to know about it. -
23:43 - 23:47And then I'm referring
to my online home, -
23:47 - 23:51for it is just
as sacred as my offline home. -
23:51 - 23:53This is where
all my private stuff is. -
23:53 - 23:56This is where
all my personal matters are. -
23:56 - 23:58This is where all my thoughts are,
-
23:58 - 24:00and all my activity
and moment can be traced. -
24:01 - 24:04So, you know, hands off my home!
-
24:06 - 24:10A similar case of monitoring
is currently unraveling in Berlin. -
24:13 - 24:16Andrej Holm is a noted sociologist
-
24:16 - 24:19who is teaching
at the Humboldt University. -
24:20 - 24:23For months,
he was shadowed and monitored, -
24:24 - 24:27suspected as the leader
of a militant group -
24:27 - 24:31that committed arson attacks
in Berlin in 2007. -
24:42 - 24:45It is the morning of the 31st of July,
so it's summer day -
24:46 - 24:47in the morning, before seven.
-
24:48 - 24:51I woke up to a pounding
on the front door. -
24:52 - 24:55Then a massive armed man fell on me.
-
24:56 - 25:01They then threw me to the ground,
my hands fixed behind my back. -
25:02 - 25:05You then get the impression
that you're in a film, -
25:06 - 25:10because they behave as in
one of the thrillers or action movies. -
25:13 - 25:17I was already aware that there is
such things as house searches and arrests -
25:18 - 25:20directed also
against left-wing activists. -
25:21 - 25:23It was already going through my head,
-
25:24 - 25:27but I could not understand what
they actually had to do with me directly. -
25:28 - 25:31So it was an abstract fear
that I had at that point. -
25:34 - 25:37Andrej Holm was arrested
by a special detachment -
25:37 - 25:40and brought
in federal court in Karlsruhe. -
25:41 - 25:45Only later did Holm learn that
he had been systematically monitored. -
25:49 - 25:53The federal investigators
had been studying his academic essays, -
25:53 - 25:55and the wide spread use
of expressions -
25:56 - 25:59such as 'gentrification'
and 'casualization' -
25:59 - 26:01had inflamed their suspicions.
-
26:02 - 26:06These were terms also used
by the militant group -
26:06 - 26:09that had claimed responsibility
for the Berlin arson attacks. -
26:11 - 26:14The investigating authorities
had created a characters grid -
26:14 - 26:16to use in their investigation,
-
26:16 - 26:18which suggested suspects should have
-
26:19 - 26:22'extraordinary political
and historical knowledge' -
26:22 - 26:26and 'the scientific and analytical
ability to execute the attacks'. -
26:28 - 26:29Following his arrest,
-
26:29 - 26:32the investigating judge
ordered home detention. -
26:33 - 26:36After 30 days
in solitary confinement, -
26:36 - 26:37the federal court ruled
-
26:37 - 26:40that there was 'no strong suspicion'.
-
26:40 - 26:43For the first time since his arrest,
Holm is free. -
26:44 - 26:45And for the first time,
-
26:45 - 26:49he learns about the
surveillance protocols surrounding him. -
26:49 - 26:53The excerpts from the minutes
reveal a detailed investigation -
26:53 - 26:56into all aspects of Holm's life.
-
27:04 - 27:07You spend your whole life
second guessing yourself -
27:07 - 27:10how the police officers
have been listening to you, -
27:10 - 27:12interpret what
your actions or words mean. -
27:12 - 27:15You are doing
something completely harmless, -
27:15 - 27:19but they've already read in the files that
anything can be interpreted as malignant. -
27:19 - 27:22If I tie my shoes in the street,
then I don't turn my back -
27:22 - 27:26so as not to give the impression
that I am hiding something. -
27:29 - 27:33Then further friends and acquaintances
are intercepted. -
27:35 - 27:38Video cameras are installed
in front of the doorways. -
27:39 - 27:41You turn into
a totally transparent people. -
27:47 - 27:50The investigators monitored
Holm's social environment -
27:50 - 27:54and couldn't find
any evidence to incriminate him. -
27:55 - 27:58But this only caused them
to intensify their surveillance. -
27:59 - 28:02According to their logic,
Holm is an intellectual -
28:02 - 28:06who's highly conspiratorial
and expertly concealing his misdeeds. -
28:07 - 28:10That they may be
on the tail of an innocent person -
28:10 - 28:13didn't seem to occur to his pursuers.
-
28:18 - 28:23We were completely monitored.
Our personal emails have been read. -
28:24 - 28:28They obviously found ways,
even before the online search, -
28:28 - 28:30to gain access to our computers.
-
28:34 - 28:37There was also a sense
of political outrage in the country, -
28:38 - 28:40over the loss of freedom
-
28:40 - 28:44to choose what the main ingredients
of domestic social value should be. -
28:47 - 28:50Because those personal freedoms
are trampled -
28:50 - 28:53in the course
of these kinds of investigation. -
28:57 - 29:01Finally, anyone who now searches
Andrej Holm on the Internet -
29:01 - 29:04will receive
a huge number of results, -
29:04 - 29:07in many articles
linking him to terrorism. -
29:09 - 29:12For the rest of his life, Andrej Holm
will be tainted by the phrase -
29:12 - 29:14'terrorist suspect'.
-
29:17 - 29:21People are more conscious of the need
to protect their digital privacy -
29:21 - 29:22than ever before.
-
29:23 - 29:26The call for digital self-defense
is heard everywhere. -
29:27 - 29:29Emails are sent encrypted.
-
29:29 - 29:34But many are choosing to do without
social networks like Facebook and Twitter. -
29:36 - 29:40In Vienna, this group
meets once a week for a cypherparty. -
29:41 - 29:45They discuss how to make themselves
invisible in the network. -
29:48 - 29:51What is the goal of Tor
and the people that operate it? -
29:52 - 29:55Anonymity,
that is from web browsing, -
29:55 - 29:58chats,
or other Internet services. -
29:58 - 29:59To make it anonymous.
-
30:01 - 30:05Until now, encryption techniques
have only been in the domain -
30:05 - 30:08of the authorities
and elite Internet geeks. -
30:09 - 30:11These people want to spread the word.
-
30:12 - 30:15I think we are
more and more transparent. -
30:15 - 30:19Even when I use a debit card or a
credit card, I have the same feeling. -
30:22 - 30:25I want to save data
as much as possible, -
30:25 - 30:27and leave
as little as possible behind. -
30:27 - 30:29I think it's wiser.
-
30:38 - 30:41Cypherparties have formed spontaneously
all over the planet. -
30:41 - 30:44The interest
of the population has risen -
30:44 - 30:48in the course of more government control
and more profiling by large companies -
30:48 - 30:51such as Google, Facebook, and others.
-
30:52 - 30:55And the interpretation
and openness of this profile data -
30:55 - 30:57is a major problem
and a major threat. -
30:59 - 31:02These groups
have straightforward aspirations. -
31:02 - 31:06No one should be able
to read their social media posts, -
31:06 - 31:08unless they want them to.
-
31:08 - 31:12And nobody should be able to leaf through
their photo albums without permission. -
31:13 - 31:16They argue this is not just paranoia.
-
31:19 - 31:21Privacy is a basic human right.
-
31:22 - 31:25And it must also apply
in the digital world. -
31:25 - 31:28When you bareback with the Internet,
you bareback with Big Brother. -
31:28 - 31:32So maybe it's a good idea,
just like we understood with HIV and AIDS, -
31:32 - 31:34we have a personal responsibility
-
31:34 - 31:37to not infect
our friends and lovers and neighbours. -
31:37 - 31:39And when you use the Internet
without any crypto, -
31:39 - 31:43without anonymity, without privacy,
what you do is you present -
31:43 - 31:46a transmitting risk to your community
and probably even to your country, -
31:46 - 31:48certainly to yourself.
-
31:51 - 31:53Big Brother is watching you.
-
31:54 - 31:57With most people having
a limited understanding -
31:57 - 32:01of this world of cybersurveillance
and how to protect themselves -
32:02 - 32:06are our most basic freedoms
already being lost. -
32:08 - 32:11Synch & transcript by Hell
- Title:
- Naked Citizens - World
- Description:
-
For downloads and more information visit: http://www.journey.webbler.co.uk/?lid=65226&bid=2
Increasing numbers of 'terror suspects' are being arrested on the basis of online and CCTV surveillance data. Authorities claim they act in the public interest, but does this intense surveillance keep us safer?
"I woke up to pounding on my door", says Andrej Holm, a sociologist from the Humboldt University. In what felt like a scene from a movie, he was taken from his Berlin home by armed men after a systematic monitoring of his academic research deemed him the probable leader of a militant group. After 30 days in solitary confinement, he was released without charges. Across Western Europe and the USA, surveillance of civilians has become a major business. With one camera for every 14 people in London and drones being used by police to track individuals, the threat of living in a Big Brother state is becoming a reality. At an annual conference of hackers, keynote speaker Jacob Appelbaum asserts, "to be free of suspicion is the most important right to be truly free". But with most people having a limited understanding of this world of cyber surveillance and how to protect ourselves, are our basic freedoms already being lost?
ORF
- Duration:
- 32:41
![]() |
Retired user edited English subtitles for Naked Citizens - World | |
![]() |
Retired user added a translation |