tv Documentary RT January 16, 2014 1:29pm-2:01pm EST
are wealthy it is that many of them have to get constant financing in order to maintain their positions and as you average folks know once you're in debt they've got you by the throat well that's just my opinion. the least he told language. programs in documentaries in arabic it's all here on our team reporting from the world talks about six of the ip interviews intriguing stories for you to. see in troy arabic to find out more visit our big. dog called. welcome to london the world's capital of surveillance even though the years since
one thousand nine hundred you may be forgiven for imagining big brother really is watching you i can see why. six. being. on the ball every bit the public ground. of everything the three but also just because all the different companies different owners have their own season every thought that's what everybody. in the most monitored city in the world there is one camera for every fourteen people but those this intense surveillance london is safe i mean in a way the streets like a kind of dangerous because that coveted c.c.t.v. but no one's watching that's what's interesting about these two to be culture if it takes away like the joy of having a mistress like naturists of a to go to. photographer henrietta williams for george going to have a ring of steel around london's financial district. forced from automated
bollards security gates and surveillance cameras anyone who enters is registered electronically and anything out of the ordinary triggers security protocols. even seemingly innocuous things like video cameras. on the side not a bit of it you can put with your car you can move on with your fear your car we can film on it whichever way we want i. want it all i want to do my job at least rely on the private security to jump before that so if i can fall through the malls you know it all at once modeled it on the city and in fact in most cases the streets along this walk well were given to the developers so that they kurds and that the policy of complete rest rising street but also installing the defense and surveillance against terrorist attack i get sort of as you
loitering at home presuming. the surveillance systems here are just simple kindness. anyone who behaves unexpectedly triggers in our intercept agree humans can observe and evaluate behavior through the smart cameras without anyone noticing. if the camera detects an unusual event the subject is marked. one of the world's leading scientists behind the developments of smart's cameras is professor james omar of kingston university. systems his team are developing can detect suspicious activity even before a crime occurs. the way is to present large volumes. over
many months possibly years and so that enables the system to develop a statistical model of what is normal and maybe what is abnormal and so then there is automatic flagging of anything that is considered abnormal. in locations where thousands of people pass in front of the cameras every day it's even more difficult for the systems to determine what is normal behavior and what isn't. people simply on their way to work what does this group hide a terrorist. anyone suspected of crime in the u.k. quickly loses their right to privacy. the face what units of the london police presents faces of suspects to the public using footage from security cameras posted on the internet. this is a gentleman of interest. and as jim says appears. through his problem there so it
goes on a public website and. we take care to cite a real throw is a. pretty impressive man. and the images now come into the system that can be viewed by the public on the face or saw it on the face which may. make neville is head of image recognition it's scotland yard if you use this kind of crowd sourced policing via the internet represents a powerful new weapon in the fight against crime. so says of people of register for the up. in the united kingdom people are very much they quite accept the c.c.t.v. and the police to a good job with the c.c.t.v. and while they're happy to identify criminals there's not so much a fear or surveillance. came that was possible on mainland europe. over the past decade the u.k. has been constant. we seeking new ways to combat the perceived threat of terrorism
. this military base two hours outside of london the newest techniques are getting put through that base its. mark lawrence is one of the new breed of experts offering instruction in the use of unmanned aerial vehicles or drones. you know official government sources who publicly talk about the effectiveness of this new technique only mark lawrence who speak with us. so one planning to do now is hopefully track patrick that either on his way there or is way back if i don't see him in a few odds i will fly to the horse track and see if we can pick him back. the hunt takes place across three mines. ok so we've got patrick we've located in using the drone so we're going to fly towards a. big brother approaches unnoticed from the air. when the
target is discovered the way the becomes a constant companion it's a height of one hundred twenty meters. and what we're doing is using a g.p.s. lock to do this sort of a double click here we can just keep the subject in the center string and screen and also at the same time the unit will follow him back with us fly this way. when you go. to work yeah we got you here in the hudson coming out as well. so that's why it's good for covert surveillance. would be possible that we in the future see drones flying over our heads maybe not directly overhead but definitely the police are using these now they're using them for surveillance work and not just sneaking around spying on people as a lot of people seem to think so sometimes to catch the bad things going on you need to be a bit i could call a sly. but just secretive about it. there are plans to fit the drones with improved
cameras incorporating face recognition technology. widely public previously is being exchanged for greater security. michael chandler is the head of vanquish security back in london he's also keen to demonstrate some of his techniques. some of which are alarmingly effective. like how did you get that well basically what we've done was we remotely sourced in the mark from your phone i recorded a pre-determined time and that recording then uploaded to our online platform where . the phone was bugged whilst it was left unattended on a table during an interview with the police. professor who was also monitored. ok so here's the photograph taken in the play station i believe. that one and
there's this one. here the course so obviously there were phone calls ok text messages which has been the only one we have an overview of your location which is because it's only the location for this afternoon but in general it's also got all the photographs that have been taken and also the all the voice recordings that we have made so you just can't see everything without my knowledge actually basically. ok it works only that. there is absolutely no way for you to be able to find a device on your phone is totally hidden only we could only we would be able to find it ok so this is the photograph that we found in your phone courier i don't know what they are but what i can do is have a look at the times they were taken and they crossed it with one of the recorders we have also the location. we can show you that you were.
a play station all seymour street that goes through g.p.s. this is a g.p.s. report coming from your device and that's all legal this is totally legal. absolutely legal yes i think. this demonstration has revealed it's becoming easier to covertly track individuals using modern technology. and it's happening far more often than we realize. according to ex n.s.a. analyst william binney american security agencies now have the technology. for their story at all they're collecting it all and storing for the large storage facility that's what that's all about and the point is that they hope by storing it all now that sometime in the future they'll figure out how to go back into it and
figure out what's important so they can retroactively analyze it that's why they need five zeta bytes of stories that you tough to store it all. you know what's the u.s. government that the two years he was responsible for electronic espionage a decade ago when you began to bug u.s. citizens who left the saudis to fight against terrorism seem to change the rules of engagement i don't want. i mean they're virtually is nothing in the network that they can't have a copy of if they start targeting youth so so so what they already have your data i can't find out what they're doing with my data. but i know they have it ok. so i make sure i write in there whatever i whatever i had to say about them i say that in there so that when they collect that they know what i'm thinking of them.
with specially developed software. happens while computers without says realizing. this is a promotional video from the money factor of. a surveillance program designed for the police. it is widely used across western europe and the principle is always the same. it's not your thoughts he's infect the victim's computer with moan when they hide in a fake software update. the unsuspecting music clicks one k. and the police can know everything is happens on screen. the intruder gets passwords emails and can see store with dates.
still in oregon is suing nike for one hundred million dollars claiming that the company failed to include a warning on its air jordan stickers that they could be used as dangerous weapons after he used his own pair to beat a man. in other pimp this from the pacific northwest bill gates continues to pimp out your privacy and data to the n.s.a. and any other forgot the spy agency want to give a few bucks rather than news snigger this pimp the boys this company software products including skype as a dangerous weapon against the constitutional rights of unsuspecting customers on the campus products. gates so himself when he gets caught. the playing. field in big spirit travels with the flame from its birthplace in
greece. joining james brown for an elemental and epic journey around russia and beyond. where i. from around the world meeting. the theme of this year's meeting he states abatements keynote speaker take about knows what it means to be persecuted he's a close friend and supporter of julian assange. to be free from suspicion is one of the first freedoms that is important for being free in the rest of your life when
you are followed around when you are being investigated because of the whim of someone this is the beginning of the end of your freedom does the n.s.a. routinely intercept american citizens e-mails you know those be in a say intercept americans cell phone conversations no google searches now text messages now i'm a son dot com orders no bank records no. but there was general alexander most powerful person in the world probably even more powerful than the president of the united states or any at leader of any other country. first of all because we know for a fact. we know for a fact from our client that the n.s.a. was in fact doing dragnet surveillance of all of those things well i mean i don't
really use a mobile phone for anything except security. so i don't really use a mobile phone i choose not to use facebook because i really think it's. just there's systems that make tradeoffs that are not democratically decided. the capital of reykjavik is the perfect location from which to investigate the technologies states can use to track their citizens you know when you have it was from. this infamous video and from the right. those involved with the release of the video suddenly found themselves facing up to a powerful opponent. who is the media and to wiki leaks sent photos from the video to the international press. this activity transformed into a national security targets and to
a right to digital privacy was repealed even though there were no legal proceedings against. my person. within three days without my not. the least we do have a very bad example. of the united states to go into people you know even parliamentarians. countries to. matters. most remarkable about this story is that the key to justice. that it is a member of the icelandic parliament. furthermore twitter was not the only source of private digital information to hand data over to the us security agencies. michael have not what i say in this field in the states for example they speculate it is face perhaps guy or i feels no five but the judge says refuses
to god acknowledge the request from her years to unseal its companies it is. jones that it did nothing illegal when she released the video but it was enough to warrant invasive snooping from the us security agencies. me. my younger son older son. some people that i've got to know later i used to work with. three years ago the icelandic people took to the streets the banking crisis hit hit the small island nation hard. the icelandic sauce pan revolution ultimately forced the general election. to johns that was elected to the new parliament but for the u.s. government she remained a target. again you only today jones to take campaigns
but it's to rights and self-determination she wants iceland to become a safe haven for sensitive data. they want to put a stop to the prying eyes of the state. we have one last. cherry pick the best. e-mails for example could be protected in the same way as written correspondence. there is absolutely no country in the world this is actually properly addressed the fact how easily it is for governments and corporations to mine through our private data we in iceland are focusing on creating a standard and setting an example and then it would be really ideal and this is one of the thoughts behind the spending want to meet initiative. be ideal if we can
you know with these new set of laws create a haven in such a way that you know i would like to see it spread to other countries. the police can shut down illegal sites as was the case with this raid on the submarine for online file sharing site the pirate bank. the problem is with the legal information from other providers that may be lost in the process. to protect these data from any access it needs to be in an unreachable place in the future that place could be in iceland the idea of iceland has an inverse touch saving. of say a place of protection because by the simplest information. free speech protecting people against touching it is a very nice woman. stephanie something with. which it will take time so you know. it flew for a long time everything should be a switch
a bit. but the gates of jones the who continue to use facebook twitter and google claiming she's a guinea pig in the monitored space. she says whoever spied on her feels they can do it with impunity and that's how the case should be a warning. and it is a temptation to go into somebody's home without them ever being able to know about it and then i'm referring to my online home for it is just as sacred as my offline home this is where all my private stuff is this is where all my personal matters are this is where all my thoughts and all marked a beauty of movement can be traced so you know hands off my home. a similar case of monitoring is currently on revelling in berlin. under a home is
a noted sociologist who is teaching at the home most university. for months he was shadowed and monitored. suspected is the leader of a militant group he committed arson attacks in berlin in two thousand and seven. thus far them off while i stay only a small sum of what was the mooning of the thirty first of july so some a day in the morning before seven and work up to a pounding on the front door and then a mass of armed men fell on me with thick they then three me to the ground tires in my hands fixed behind my back that's a twenty dollars off for you don't get the impression that you're in a film. because they behave like this in one of the thrillers all action movies. give us a callous or so i was already aware that there is such
a thing as house searches and arrests as if that's directed also against left wing activists the still listed as a that was already going through my head but i could not understand what they actually had to do with me directly at home so it was an abstract fair designed at that point. andrei home was arrested by special detachment and brought to federal court in cannes row. only later did home learn that he had been systematically monitored. the federal investigators that been studying his academic essays in the widespread use of expressions such as gentrification and casualisation had inflamed their suspicions these were terms also used by the militant group that it claimed responsibility for the berlin arson attacks. the investigating authorities had created a character great to use in the investigation which suggested suspects should have
extraordinary political and historical knowledge and the scientific and analytical ability to execute the attacks. following his arrest the investigating judge ordered holmes detention. after thirty days in solitary confinement the federal court ruled that there was no strong suspicion. for the first time since his arrest home is free and for the first time he learns about the surveillance protocols surrounding him the excerpts from the minutes reveal a detailed investigation into all aspects of holmes life. investigators monitored home social environment in couldn't find any evidence to incriminate him. but this only caused them to intensify their surveillance. according to their logic home is an intellectual who is highly conspiratorial and
expertly concealing his misdeeds. that they may be on the tail of an innocent person didn't seem to occur to his pursuance. of what conflict you have or what you that's what if he were completely monitored our personal e-mails have been right that they have basically found ways even before the online search to gain access to our computers. or the stock of there is also a sense of political outrage in the country. over the loss of freedom to choose what the main ingredients of domestic social values should be. elementary because those personal freedoms are trumpet in the course of these kinds of investigations and. massive also cause because it's. finally anyone who now searches under a home on the internet we receive a huge number of results in many articles linking him to terrorism. for the
rest of his life and ray home will be tainted by the phrase terrorist suspects. people are more conscious of the need to protect their digital privacy than ever before the cool for digital self defense is heard everywhere. emails are sent encrypted but many are choosing to do without social networks like facebook and twitter. in vienna this group meet once a week for a cypher party they discuss how to make themselves invisible in the network. whether the theory taught is the goal of that though when the people it's operating on and anonymity that is from web browsing chats or other internet services to make it anonymous most of the credit. until now encryption techniques have only been in
the domain of the authorities and the late internet geeks these people want to spread the word. of the potus from that site for parties of form spontaneously all over the planet the interest of the population has risen in the course of more government control and more profiling by large companies such as google facebook and others and the interpretation and openness of this profound data is a major problem and a major threat. is a basic human right. back with the internet back with big brother so maybe it's a good idea just like we understood with. the eighty's we have a personal responsibility in fact our friends and lovers and neighbors and when you use the internet without any without anonymity without privacy what you do is you.
position against g.m.o. and we think that. the genetically modified products are a priest tool tool there is no. evidence that there is any problem with genetic engineering when you make a deal. or is free cheese always in the most tragic i don't believe that the. poor and the free. enterprise is profit not. for this golden rice monarchy. prevail sleep peace keepers for a program of concerned with monitoring peace deals again at post conflict environment nowadays they are increasingly asked to operate in a high risk of violence while the only bible is too lenient always to stay.
motionless what these people have caused over almost twenty years for me when people killed millions of displaced and refugees tens of thousands of women raped tens of thousands of children and recruited those soldiers were all slaves no. one in the new cultural moment a law should be polish face time to surprise people. pleasure to have you with us here today.
this is a national tonight afghan outrage over the deaths of children in another american strike but officials insist it was an operation to disrupt. we've got a report coming up. a key syrian opposition group refuses to take part in next week's peace talks as moscow brings together a serious foreign ministers to help with the groundwork for the conference. hopes fading for the u.s. . as the route of a bug in the leadership.