background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете."

input logo icon
Video tags
|

Video tags

мир открытой двери
world open door
эдвард сноуден
Edward Snowden
кибер безопасность
цифровая гигиена
должен знать каждый
анб
сеть
интернет
информационная безопасность
спецслужбы
доказательства
защита в сети
защита в интернете
ключи шифрования
слежка
слежка в интернете
Internet surveillance
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:14
[music]
00:00:47
at this stage you will have to take my
00:00:50
word for it I work for the government and am
00:00:53
connected with intelligence I hope you understand the
00:00:56
risk I am running by communicating with
00:00:59
you and agree to take all the
00:01:00
precautions I have suggested
00:01:03
believe me this is not a waste of time it is not
00:01:07
difficult for someone familiar with the technique
00:01:09
will take a couple of minutes, I want to make sure
00:01:13
in non-email correspondence that the key
00:01:14
we exchanged will not be
00:01:17
intercepted or replaced, I'm
00:01:19
waiting for confirmation that no one has a
00:01:21
copy of your personal leverage, choose a strong
00:01:24
password, your opponent is guessing
00:01:27
passwords at a speed of 1 trillion options
00:01:29
per second if the device on which
00:01:31
the keys are stored where you enter the password
00:01:33
will be hacked deciphering our
00:01:35
correspondence will not be difficult these measures do not
00:01:38
guarantee one hundred percent protection but gives
00:01:41
us some room for maneuver and
00:01:43
finally if the source materials are
00:01:45
made public suspicion will immediately fall on
00:01:47
me but this should not deter you from
00:01:50
publishing the provided
00:01:51
thank you for my information and be careful
00:01:54
zenfone networks
00:01:59
all these zenfone the truth of Snowden
00:02:12
[music]
00:02:16
and now let me sum up some
00:02:18
only
00:02:19
according to your words the snowball gives us the
00:02:20
opportunity to check those facts we get Nastya
00:02:22
which we doubt we eliminate
00:02:24
surveillance from we are destroyed the chance
00:02:27
to establish that this or that baht is not fabricated
00:02:29
the authorities are right we are talking about
00:02:32
creating an objective source for me
00:02:34
it all comes down to the issue of independent
00:02:36
control over the activities of the government
00:02:38
so I come back to the problem
00:02:41
again and again we will continue the conversation with
00:02:46
David Orphans news release
00:02:48
weather forecast estimates on the radio what types of
00:02:50
dinnerbone
00:02:57
hello can you hear me that I'm David, as
00:03:01
you wish, well, from the very beginning, I want to
00:03:07
remind you that Barack Obama himself touched on
00:03:09
these issues when he was elected to the position
00:03:12
he now holds in December of the
00:03:14
seventh year, he said that the president
00:03:16
does not have the authority to unilaterally
00:03:19
authorize a military offensive in a
00:03:21
situation where we are not talking about
00:03:23
actual
00:03:24
or an imminent threat to the nation,
00:03:27
thus, according to Obama himself, according to
00:03:28
the constitution, the president has no right to
00:03:30
what he is doing now,
00:03:31
why is this so important, on August 1, 2007,
00:03:35
when he told why he decided to
00:03:38
run for this position and
00:03:39
why it is so important to change the existing
00:03:41
structure, he said this that we cannot
00:03:44
ignore the law just because
00:03:46
it is inconvenient to us,
00:03:47
we must again demonstrate to the world
00:03:49
that the law is not subject to the whims of
00:03:51
capricious rulers so
00:03:54
that the president
00:03:59
[music]
00:04:10
[music]
00:04:22
you ask why I chose you I didn’t
00:04:25
choose you did it
00:04:27
surveillance installed on you means
00:04:29
that you have been selected and this term
00:04:31
will become clearer when you learn how the
00:04:33
modern system works, sits
00:04:36
you know that every time you cross
00:04:39
a border, make purchases, dial
00:04:41
a number, drive past a cell tower,
00:04:43
communicate with friends, write an article,
00:04:46
visit a website and write
00:04:48
emails or send the data you are
00:04:50
controlled by the sister of the matches the coverage is
00:04:52
unlimited because the protection is not
00:04:54
flawless since you became a victim of the
00:04:57
nb system then you are one of those few who
00:05:00
are aware and can talk about the threat
00:05:02
that the
00:05:05
secret police unlimited in their means poses to democracy
00:05:13
[music]
00:05:25
[music]
00:05:54
[music ]
00:06:02
thank you for the invitation and for the
00:06:04
opportunity to share
00:06:06
my story,
00:06:07
to begin with, having served myself a little for about
00:06:11
four years in the armed forces, I
00:06:13
almost immediately entered the MB
00:06:16
and in general the complexity of my service
00:06:18
is about 37 years, in general it was
00:06:21
interesting and believe me, I liked
00:06:23
solving puzzles and solving problems
00:06:25
stuff like that and that’s what I was doing there,
00:06:28
my work was related to data, I
00:06:30
studied how the information
00:06:31
system works and worked on the concept of
00:06:34
analysis in which data
00:06:35
is distributed in such a way that it
00:06:37
can be encoded and processed
00:06:39
electronically, that is, to
00:06:40
automate the analysis process, we’re talking about
00:06:43
metadata and the study of the relationship and
00:06:46
approximately this was the scope of my
00:06:48
VNB activities, I
00:06:50
eventually came to this and I was the only one you were
00:06:52
doing this one way or another,
00:06:55
the terrorist attack of September 11 happened and and after it
00:06:59
almost immediately two days later it may be
00:07:02
a week after the events and they decided
00:07:04
that they would start spying on everyone who
00:07:06
lives in our country and they wanted the
00:07:09
spying to be carried out by specialists from
00:07:12
our program, so yes, that’s what they
00:07:17
did,
00:07:18
then they started collecting
00:07:20
telecommunications data and went further
00:07:22
to take at least these companies to go, which
00:07:26
provided them with 320 million records a
00:07:28
day, every 45 days, the program was re
00:07:31
-approved as I called it by the
00:07:34
committee, which included Aiden, mint, and
00:07:37
our Department of Justice,
00:07:39
this program was called stellar wind,
00:07:42
first I turned to my friend from the
00:07:45
House Intelligence Committee
00:07:46
and she spoke with the
00:07:49
chairman of the committee, Nancy Pelosi,
00:07:50
the leader of the minority caucus
00:07:53
they were all instructed on
00:07:56
this program by the way and on everything
00:07:58
else including various cr programs
00:08:01
I was supported by four other members and
00:08:05
we and all these years we worked in the
00:08:07
government trying to convince them not to
00:08:08
deviate from constitutional principles in
00:08:12
particular to bring loans into the case by
00:08:13
ensuring judicial oversight and we all
00:08:17
naively believed that
00:08:19
this was possible, but we were mistaken,
00:08:23
moreover, after all our
00:08:26
numerous efforts, they began to put pressure on us, shut
00:08:29
our mouths and threaten us, all of our
00:08:32
four were pursued at the same time, they
00:08:35
didn’t come to me personally with weapons, I don’t know
00:08:37
why they needed it
00:08:42
[music]
00:08:57
[music]
00:08:59
Laura I’ll try to answer those of your
00:09:02
questions that I can remember,
00:09:04
forgive me for the confusion, I’m not a writer,
00:09:06
besides, the letter was compiled in great
00:09:08
haste, the stellar wind project
00:09:12
is developing with the expanded nb group
00:09:16
for operations with special sources,
00:09:18
picking up the shaya of the stellar
00:09:20
wind’s activities spread throughout around the world,
00:09:23
covering almost all the territories of the United States,
00:09:26
it is alarming that the range of
00:09:28
American communication means
00:09:30
controlled by ANB continues to
00:09:32
expand. We complain that the crisis is
00:09:34
growing. We ourselves continue to increase
00:09:37
our access to personal information throughout
00:09:40
our history, ANB has collected data in such volumes
00:09:43
as Now I know the location of
00:09:47
most data interception points,
00:09:49
I have proof that the
00:09:51
largest telecommunications companies
00:09:53
in the United States are deceiving the trust of their customers, we are
00:09:57
building the most powerful weapon of oppression in the
00:09:59
history of mankind, its creators
00:10:02
absolve themselves of all responsibility,
00:10:05
nb director Keith Alexander
00:10:08
lied to Congress and I can prove it to
00:10:11
billions of communications connections in
00:10:14
the USA are being intercepted, I collected
00:10:17
primarily facts about violations of the rights of American
00:10:19
citizens, but believe me, compared to
00:10:22
what we do in other countries,
00:10:23
Americans are in a privileged
00:10:25
position,
00:10:27
this I can also prove, the government
00:10:31
claims that we still
00:10:33
lack rules to regulate cyber
00:10:35
operations, yet another yours we have a
00:10:38
detailed policy of sorts of a
00:10:40
marshal plan for cyber operations developed by the
00:10:42
white house it is called presidential
00:10:45
directive number twenty and was completed
00:10:48
at the end of last year the
00:10:49
evidence I also have is
00:10:52
grateful to you for caring about my
00:10:54
security nose I know how this
00:10:57
will end for me and I am ready take a risk and if
00:11:00
I'm lucky and you're careful you'll
00:11:02
get everything you need I
00:11:04
ask one thing for this information to
00:11:05
reach the American public
00:11:09
does a n b intercept electronic
00:11:12
correspondence of American citizens no does
00:11:17
pleo rb intercept telephone conversations
00:11:22
of Americans no search queries no
00:11:26
sms messages no orders on amazon.com
00:11:31
no banking information no what
00:11:35
legal permissions are required from AN
00:11:38
to intercept communication
00:11:40
connections and information relating to
00:11:42
American citizens in the
00:11:45
states, this requires requests from the FBI if
00:11:48
we are talking about foreigners located in the
00:11:49
USA, you also need a request from the FBI, which
00:11:52
can work together with a nb or
00:11:54
another intelligence agency, but in
00:11:57
order to begin collecting data,
00:12:00
we need the consent of the court and the court must
00:12:04
approve the decision, we do not have such power,
00:12:06
we do not do this, the us court of appeals,
00:12:15
everyone stand up, the meeting of the
00:12:19
court of appeals from the 9th circuit of the us begins, I
00:12:22
ask everyone to sit down
00:12:33
welcome to the Ninth Circuit and
00:12:36
today our first case is Juan v.
00:12:40
National Security Agency,
00:12:41
you can proceed,
00:12:46
honorable court, I am Kevin Paxton
00:12:48
representing Carolyn Joel and ISO
00:12:51
plaintiffs in this case, your honor, so our
00:12:55
plaintiffs claim that the government
00:12:58
received information about their
00:12:59
communications connections, according to the
00:13:02
district court, we could not bring
00:13:05
facts indicating that our plaintiffs
00:13:07
suffered damage of a
00:13:08
different nature than all other
00:13:10
clients and shades, and through the connection the
00:13:13
records were intercepted,
00:13:15
concluding that since everyone
00:13:18
was subjected to surveillance, no one should
00:13:20
sue, however, the refusal of the victims on
00:13:23
such grounds means in general that the
00:13:26
most harmful and massive
00:13:28
government actions cannot be challenged
00:13:30
if you have evidence that
00:13:33
specifically your client’s connection
00:13:37
was intercepted, we have
00:13:40
evidence that all
00:13:42
connections between the network and TNT and other
00:13:45
networks in the north and the California communications center were intercepted,
00:13:48
this respectively includes the
00:13:50
Internet connection of our plaintiffs from
00:13:52
northern California so they 1
00:13:55
thanks to you your part
00:14:03
dear court I'll get rid of
00:14:05
the Department of Justice here I represent
00:14:07
the interests of the defendant we believe that this
00:14:10
lawsuit should not be heard in
00:14:12
federal court due to the fact that
00:14:14
control of the political branches of government by the
00:14:16
executive and legislative
00:14:19
provides the optimal opportunity for
00:14:23
successful resolution of issues related
00:14:26
to the national policy of alleged
00:14:28
surveillance that
00:14:32
concerns the plaintiffs even if it is
00:14:34
established that the interception of correspondence or
00:14:37
telephone conversations of our plaintiffs is in no way
00:14:40
related to national security in
00:14:43
your honor, I do not
00:14:44
know of cases where anyone has made
00:14:46
claims how similar you are to the
00:14:48
requirements of these two plaintiffs, we
00:14:50
believe that it would be more effective to consider such claims
00:14:53
brought against this defendant
00:14:55
under the
00:14:57
supervision of representatives of our
00:14:59
government to prove and I wonder
00:15:02
what role with such an approach you
00:15:06
assign the judicial body to the court at
00:15:09
gerson and I think they are not false to get in the way,
00:15:11
the correct one, I understood the judge jump
00:15:15
and I believe that there is a narrow
00:15:17
category of cases in which the court
00:15:19
can really, let’s say, step aside
00:15:22
only when considering these cases,
00:15:24
but you do not dispute the role of the courts in any
00:15:28
case, yours than in our honor to the greater
00:15:30
part, that is, we thought you were asking us to
00:15:34
refuse this role
00:15:36
is not your honor, the question of whether to consider
00:15:39
this case remains at the discretion of the court, but
00:15:42
we do believe that as
00:15:43
this process continues, a
00:15:46
number of issues will inevitably be raised involving
00:15:48
classified information, which, as the
00:15:51
director of national intelligence has already explained,
00:15:53
can cause exceptional harm to
00:15:55
national security,
00:16:01
thank you for inviting if
00:16:04
anyone - Do you have any questions, please
00:16:06
just raise your hand and I will contact
00:16:08
you as soon as I can,
00:16:09
and so who has the feeling that he
00:16:12
is being monitored and constantly, I
00:16:16
probably have everyone here, I understood from
00:16:19
almost everyone present how
00:16:20
many of you were arrested and your phones were taken away
00:16:22
back room on the day of the trial
00:16:24
who had their iris scanned wow
00:16:29
guys you are all here are kind of
00:16:32
canaries in the mine because they are all qi
00:16:34
ati you are directed against you saw
00:16:37
advertisements in the subway attach a card to the
00:16:39
metro credit cards to for auto replenishment
00:16:41
so this is the concept that we
00:16:44
will talk about today the so-called linking,
00:16:46
we take one set of data and link
00:16:48
it to another, for example, you have a
00:16:51
metro card and a payment card and you can
00:16:54
draw a line between them, so it
00:16:55
would seem no big deal, but
00:16:59
your bank card is linked to everything
00:17:01
you do, now they know where you are
00:17:03
you go to do some shopping, they are
00:17:05
interested in you, they can
00:17:07
recreate your every step using
00:17:09
your metro card and credit card,
00:17:11
they know where you went and what you bought and,
00:17:13
in principle, by comparing this with the data of
00:17:16
other people with a similar route, they
00:17:19
can determine who you
00:17:20
met, we take the data your cell phone
00:17:22
which tracks your location
00:17:24
and links it to your purchases,
00:17:27
subway rides and your payments and
00:17:29
receives so-called metadata
00:17:32
covering a person’s entire life in
00:17:34
total; this is a kind of
00:17:36
content; they tell your story,
00:17:38
which consists of facts but is not always
00:17:41
truthful, here’s an example: you were on the corner
00:17:44
streets where a crime was committed but this does
00:17:46
not mean that you are a criminal here it is important
00:17:48
to note that if someone considers you
00:17:50
guilty of anything it will haunt
00:17:53
you for the rest of your life so remember
00:17:56
everything that is now being applied to you take
00:17:58
fingerprints and iris scans
00:18:00
photographs that's all will be used
00:18:03
in the future to suppress people who are
00:18:05
trying to resist changes and
00:18:06
protest in a constitutional way and
00:18:09
again a question for you Director Clapper
00:18:12
about surveillance I hope we will limit ourselves to
00:18:14
yes and no answers since Senator
00:18:16
Feinstein wants to continue and is it true
00:18:19
that A N B is collecting data on that or of
00:18:22
any other nature about millions or hundreds of
00:18:25
millions of Americans the king does not lead
00:18:32
intentionally no except in some
00:18:35
cases unintentionally perhaps led but
00:18:40
intentionally not strictly
00:18:55
[music] the
00:19:07
encrypted archive will be in your
00:19:09
hands within 7 days
00:19:10
the key will be transferred when
00:19:12
everything else is done analyze the
00:19:16
provided it is beyond the
00:19:20
power of one person to conduct the necessary investigation recommending that
00:19:22
Glenn Greenwald be involved in the case,
00:19:24
assuming you are familiar,
00:19:28
outside the encrypted text
00:19:30
my real name will be indicated, I will let you
00:19:34
decide for yourself whether to report my
00:19:37
participation in this case,
00:19:38
personally, I would like all
00:19:40
responsibility to be entrusted to me
00:19:42
alone, no one, even the people closest to me,
00:19:46
knows about my intentions,
00:19:48
it will be dishonest if they come under
00:19:50
suspicion from my actions,
00:19:54
this can only be provided by you immediately pointing to
00:19:57
me without trying to maintain my
00:19:58
anonymity,
00:20:03
now about the time of our meeting in
00:20:05
Hong Kong, the first attempt to make sure
00:20:08
will take place on Monday at ten in the morning
00:20:10
local time we will meet in the lobby at the
00:20:13
entrance to the restaurant in the hotel of the world
00:20:17
you will recognize me I will solve a
00:20:20
Rubik's cube come up to me and ask
00:20:23
what time the restaurant opens and I will answer
00:20:26
that I don’t know for sure I will advise you to ask at
00:20:28
the reception and I will offer to conduct for you, this
00:20:33
means that we recognized each other, all you
00:20:35
have to do is follow me,
00:21:15
how best to position yourself, you probably
00:21:17
have a shooting plan, yes, I’ll move
00:21:19
there, this lighting is better, okay, so
00:21:28
this is where we can start, so we received
00:21:34
from you only shocking materials,
00:21:37
each of which is enough for reporting
00:21:39
to us, even these materials on a number of
00:21:43
specific documents can become
00:21:45
a sensation, I want to try to break them
00:21:47
into groups today, as soon as I woke up, I have already
00:21:50
started preparing articles and I would like to
00:21:53
tell them to include them in a day
00:21:55
or two,
00:21:56
yes, if this suits you, good as
00:22:00
for topics that we need to discuss,
00:22:03
I would divide them into two categories
00:22:06
because there are things that I would like to
00:22:10
talk about documents of their contents and
00:22:13
Laura also has a number of questions about how to
00:22:15
work with documents there are points
00:22:17
that you can help us understand
00:22:20
plus we have there is your story of which you were under
00:22:23
such pressure, why did you do this,
00:22:26
yes, I would start well with this, partly
00:22:30
because only you can tell about it,
00:22:32
yes, I suggest starting with this
00:22:35
part of this part also because you
00:22:38
shouldn’t delay with this, since there’s so much to everything
00:22:42
reasons to start with this what are yours
00:22:45
tell me how you came to this there
00:22:47
is and there is one important point I already
00:22:50
mentioned this in correspondence that
00:22:52
modern media pay too much
00:22:55
attention to the individual I agree and I am afraid
00:22:58
that if we go down this path they
00:23:02
will use it in my goals and I
00:23:06
would not want this to happen and I
00:23:08
continue to insist that this story is not
00:23:10
about me
00:23:12
you are worried about their poison they are useless
00:23:15
cheap hands
00:23:16
starladder.tv hands how it broke
00:23:18
continue to me
00:23:20
yes and I am ready to do everything for
00:23:23
this to come out I don’t really know how the
00:23:29
media works,
00:23:30
what’s what, so I’ll have to
00:23:34
learn on the go, and I would like to
00:23:38
understand why you decided to do what you
00:23:40
did for me, this is the question of
00:23:43
whether the state can violate the rights of people,
00:23:45
actively resist its power, I’m
00:23:49
coming to the office every day and I get paid to
00:23:52
develop methods
00:23:54
that will strengthen the power of this state
00:23:58
and I understand that if the election
00:24:01
guarantees, the only thing that limits this power, are
00:24:04
violated, then you have no
00:24:07
means to resist unless you are the
00:24:10
most sophisticated technical
00:24:13
specialist in history world, I
00:24:15
fear that no one, even the most
00:24:18
talented, will
00:24:19
have the strength alone to cope with
00:24:23
brilliant minds and even the most
00:24:25
mediocre employees
00:24:27
who have such tools and
00:24:29
means, so when I saw that the
00:24:31
promises of the Obama administration were being violated,
00:24:34
that its actions actually lead rather
00:24:37
to strengthening
00:24:38
the system that it promised everyone eradicate
00:24:41
with forces reduce contain
00:24:45
that everything has worsened take at least
00:24:47
the drones that I learned about in the vnb where
00:24:50
we watched video from their cameras on work
00:24:52
monitors what I saw and formed
00:24:58
my decision in real time in
00:25:00
real time, that is, a low-quality video stream
00:25:03
is sent directly to the desktop
00:25:06
usually this was observational data, but
00:25:08
there are also killer drones that
00:25:11
fly out to bomb a drone
00:25:13
can follow something at home for
00:25:16
many hours and you don’t know someone’s house
00:25:18
because you don’t have complete
00:25:20
information in front of you is a page that
00:25:23
lists data from drones in
00:25:25
various countries with different code
00:25:27
names and you click on any and
00:25:30
watch the video
00:25:33
clearly so you are sincerely interested in
00:25:37
living in a world where the right to
00:25:38
privacy is
00:25:39
strictly respected but at the same time
00:25:42
your actions threaten you with prison where this
00:25:44
right will be completely negated how
00:25:47
you came to in order to sacrifice
00:25:48
personal comfort for the sake of publicity, I remember
00:25:52
what the Internet was like before it began to be
00:25:54
controlled, this is a unique period in the
00:25:56
history of mankind,
00:25:57
let's say the most ordinary children from one part of
00:26:02
the world could have an equal discussion in
00:26:05
which they could firmly count on
00:26:09
respect for their ideas and expression with
00:26:12
leading experts from another part of the
00:26:14
world on any topic wherever and however they want,
00:26:17
whenever they want,
00:26:20
freely, no restrictions, and we saw
00:26:23
how all this began to fade away, how
00:26:26
the model changed to the side of self-restraint of
00:26:29
their opinion, people began to joke
00:26:32
that they could be included in the list because of their
00:26:35
statements on political topics or
00:26:37
harsh remarks on forums, it has become common for us to
00:26:40
suspect that we are being watched;
00:26:43
many of my friends said that
00:26:46
they think about it before typing a query
00:26:48
in the search bar, I know that it will be
00:26:50
saved, which narrows the
00:26:52
scope of their intellectual research and
00:26:57
I would rather take the risk of
00:27:04
conclusion or others negative
00:27:07
consequences for me personally than I agree to
00:27:11
put at risk
00:27:13
my own intellectual freedom and the
00:27:16
freedom of those around me whose lives are
00:27:19
no less important to me than my own
00:27:23
and once again I want to emphasize that I am not
00:27:25
sacrificing myself,
00:27:27
I feel satisfaction from the knowledge
00:27:31
that I can make a contribution in the common good,
00:27:51
let's talk about this in more detail, yes, I don’t know
00:27:56
how aware you are about the programs as
00:27:59
well as about their real technical
00:28:00
capabilities, but there is an
00:28:02
infrastructure both in the USA and throughout the
00:28:04
world
00:28:05
that nb created in cooperation with
00:28:10
other countries,
00:28:12
it intercepts almost all
00:28:18
digital connections, all radios connections
00:28:21
all analog connections that
00:28:25
its equipment can record and with
00:28:30
such capabilities, in fact, the entire huge
00:28:34
variety of
00:28:35
connections based on computer
00:28:39
communications and between different devices, that
00:28:42
is, informal communication between people are
00:28:45
tracked automatically without
00:28:48
targeting, and this allows you to
00:28:51
retroactively search for your
00:28:54
connections based on the most confirmations,
00:28:57
for example, if I want to know the contents of
00:29:01
your correspondence or I don’t know
00:29:05
your wife’s telephone conversations, and so on, I can
00:29:08
use the so-called
00:29:10
selector, that is, any element of the
00:29:15
communication chain
00:29:17
that can accurately or almost accurately
00:29:20
identify your identity, this could
00:29:22
be email addresses and IP
00:29:25
addresses, telephone numbers credit cards, even
00:29:29
passwords that no
00:29:31
one except you uses, I can enter this
00:29:35
data into the system and it will not only
00:29:37
look through the entire database and tell you where I could have
00:29:40
met this data before, but essentially
00:29:44
conducts an additional level of surveillance
00:29:46
that covers the future, that is,
00:29:49
if it is a fact will be discovered now or in the
00:29:52
future information must be transmitted
00:29:54
to me immediately in real
00:29:56
time
00:29:57
information that you are communicating with someone
00:30:03
I know practically nothing about you
00:30:07
for I work for Guzal in Hamilton
00:30:12
this is a defense contractor for the KNB I am attached
00:30:16
temporarily but I am not I communicate with the management of
00:30:19
bu zalim does not receive any assignment, everything comes from
00:30:21
n.b. sorry didn't catch your name and
00:30:24
forgive me my name is edward snowden
00:30:27
can you stand edward joseph snowden
00:30:31
full of them from where are you from so that
00:30:37
means you were born in north
00:30:40
carolina in the small town of elizabeth city
00:30:43
there is a coast guard station there i'm
00:30:46
from the family military but I spent most of my
00:30:48
childhood driving a Ford I won’t give it to the state of
00:30:50
Maryland your family how this will turn out
00:30:56
for her this is perhaps the most
00:31:01
painful moment my family doesn’t know
00:31:03
what’s going on I didn’t tell them I don’t
00:31:08
think I can maintain the family
00:31:13
ties that I I managed to acquire it, I don’t
00:31:19
want them to be somehow connected with all
00:31:21
this, I leave it to you to decide what
00:31:25
to publish and what data to keep, I
00:31:27
count on your responsibility,
00:31:30
but I assume that the closer I am to
00:31:34
my family,
00:31:35
the more likely it is that they will be
00:31:37
pressured, that is, I should not be published, of
00:31:39
course, of course, we will do everything in
00:31:41
our power not to put ourselves at
00:31:44
risk in Asia, yes, of course, yes, I understand everything,
00:31:47
forgive me, but I suggest we pause for a moment to
00:31:50
sort out the documents and then
00:31:52
we will continue, of course, what I need
00:31:55
will need an email address or
00:31:57
but since since you have encrypted
00:32:00
the letter, you can send it from wherever
00:32:03
you want, the most important thing is to
00:32:05
encapsulate the data in such a way
00:32:08
that they cannot be decrypted and
00:32:09
read during the transfer of the settlement
00:32:12
or reception at one of the two endpoints,
00:32:15
you should know that these documents will be
00:32:17
downloaded before 72 understand how to use
00:32:21
this process for different purposes it seems
00:32:24
that it is difficult I am not so then I am
00:32:27
waiting for your instructions and
00:32:30
show me the current folder structure
00:32:32
where the files are stored
00:32:36
how many documents you said there are only
00:32:39
7 while you are with them ultra tough if you want
00:32:42
we can how many documents are we
00:32:47
talking about when garden worked with wikileaks,
00:32:49
our technicians created a system thanks to
00:32:51
which access to the data was open to everyone
00:32:53
and I’m thinking about whether we can do the
00:32:57
same; this, of course, would be an ideal option,
00:33:00
but since some of these
00:33:05
documents are officially classified, their
00:33:08
disclosure threatens the safety of people and
00:33:10
technology, I’m quite sure your
00:33:13
technical ability to protect them, that is,
00:33:16
you can threaten not to shoot or
00:33:18
torture me, I won’t be able to reveal the password even
00:33:20
if I wanted to, well, yes, I have enough skills for this, a
00:33:24
number of journalists are also capable of this,
00:33:28
but their circle is very limited,
00:33:31
and that’s the main question: can
00:33:34
organization to protect such information in
00:33:38
such a way as not to be at
00:33:41
risk of uncontrolled leakage
00:33:43
but he but I’m ready to come to terms with it seriously I don’t
00:33:46
want to be the one who decides
00:33:49
what can be talked about and what can’t be talked about that’s why
00:33:51
I don’t publish the material I myself don’t
00:33:55
speak openly
00:33:56
but act through journalists so that
00:33:59
my opinion so that my position, since
00:34:02
I have a strong conviction,
00:34:04
are left out of brackets and public
00:34:07
interests are represented with
00:34:09
maximum objectivity, and by the way,
00:34:12
given your awareness of
00:34:18
the situation in the UK,
00:34:20
I will say that the government communications center
00:34:24
has created
00:34:26
perhaps the most aggressive program for
00:34:31
intercepting network data in world and I
00:34:35
name tempor a t e m p o and this is the
00:34:39
world’s first full coverage, which means
00:34:42
collecting information that complements the data
00:34:44
on all articles, this is how I would like to
00:34:49
structure the further conversation if you don’t
00:34:51
mind,
00:34:52
you’ve already found out what you’re waiting for
00:34:55
then I would like to go back
00:34:59
to finish the articles
00:35:00
and we also have a lot of documents not
00:35:03
related to the first stories, I would like to
00:35:06
discuss them, of course, so that then I can move on to I do
00:35:08
n’t have a couple of minutes, I can check
00:35:12
from the diary for you, I’ll look at the whole
00:35:15
schedule for you don’t mind, the raven
00:35:17
can’t do it if you want
00:35:29
come
00:35:33
hello, yes, everything was very tasty,
00:35:39
thank you very much, no, I still have some left, perhaps
00:35:46
we’ll give it later, so I do
00:35:47
n’t need anything else, yes, great, thank you very much,
00:35:52
goodbye, now we’ll fix it, it
00:35:58
won’t take long, it’s interesting, I told
00:36:04
Laura on the phone and
00:36:06
these built-in protocols work not computers from which a
00:36:09
microphone can be recorded, even
00:36:10
when the handset is down, even if it’s just
00:36:13
plugged into the network,
00:36:14
you could be wiretapped, I don’t understand how
00:36:16
I didn’t think about this before, there are
00:36:18
many ways in which everything
00:36:21
that happens here can end up in the
00:36:23
public domain like this that we have to
00:36:25
take this into account because yes, I think you are right,
00:36:28
you have a computer with air balloons,
00:36:30
you can get it by
00:36:35
the way, you decided when the
00:36:38
printing of 1 article will be handed over, they will be published in London
00:36:41
at seven eight in the morning, well,
00:36:47
look at your
00:36:56
nails, here’s another one, let’s
00:37:00
never leave again identical sd cards
00:37:02
in laptops for the future at least you knew that
00:37:11
it’s still in yours in your laptop
00:37:15
and everything is clear okay I just in
00:37:17
case I understood yes here’s a treasure ok
00:37:21
thank you you will have a new archive that
00:37:23
looks exactly the same as the old one for you it
00:37:25
will be necessary to mark it somehow, you can
00:37:29
pass me my invisibility cloak
00:37:32
now, otherwise
00:37:40
this is in case of possible filming before it’s about
00:37:44
video surveillance, I think at this stage you
00:37:53
can’t do anything in the USA Kerry,
00:37:55
we’ve all become a little you in today
00:37:59
told me something like I’ll
00:38:01
never leave a single device in my room again in my life,
00:38:03
and I’ve got it, you’ve become
00:38:05
infected with paranoia, it happened to
00:38:06
all of us, he said that again, I wo
00:38:11
n’t leave a single device in my room
00:38:13
without a press, and I can barely carry mine, shine in
00:38:19
it, all the gadgets
00:38:20
are all yours bad influence so I
00:38:22
need you to see the
00:38:23
administrator password because I don’t know it
00:38:28
if you want to throw on a cloak please don’t be
00:38:30
shy no I go in your passwords
00:38:33
only four characters
00:38:34
should I use sometimes clay but this is
00:38:37
for one time yes everything is correct before he
00:38:40
was longer but when I found out that it was
00:38:42
needed for one session I chose the password
00:38:44
in short it's wrong but actually no
00:38:47
I already tried to explain this to Laura before that's the
00:38:50
point because your
00:38:51
computer has a mac address if anyone
00:38:54
can identify your device
00:38:56
but I couldn’t, considering that your material
00:38:59
will upset them very much,
00:39:00
so you can become a priority for them.
00:39:15
so the fire alarm
00:39:21
is clear, it looks like it’s a regular
00:39:25
three-second one, and check it out, or maybe
00:39:29
call the reception to find out, well, I don’t
00:39:33
think it’s anything serious at all,
00:39:35
although it’s interesting that this has already happened,
00:39:37
maybe they’re angry that they
00:39:39
can’t listen to us through the phone anymore, and
00:39:44
they used to they turned on the alarm,
00:39:45
no, this happened the first time,
00:39:47
but just in case, we need to check if
00:39:50
they have something connected to all this unusually,
00:39:57
maybe we need it, so much the better
00:40:00
and ignore it, then we need it
00:40:04
before it was turned off,
00:40:06
I meant if it turns on again
00:40:13
now we let's go down to tell us they
00:40:15
beat us, yeah, so let's
00:40:21
forget about it for a while, let's finish things up,
00:40:35
they're unlikely to answer them now
00:40:38
7,000 people are calling, hello, there's
00:40:44
something ringing on the tenth floor, can
00:40:45
you tell me what happened, it's clear and clear,
00:40:51
great, thank you, goodbye,
00:40:54
check the fire alarm,
00:40:57
yes yes yes, well that’s what we wanted, how nice
00:41:00
of them that they didn’t forget
00:41:02
to warn us, I’ll give you a little
00:41:10
tour when the ENT saw this, her
00:41:13
mouth started watering and she couldn’t tear herself away
00:41:15
from these gifts, we’ll try to control ourselves, I’m
00:41:18
sure it will work out, okay, for starters
00:41:21
some explanations, a
00:41:22
short overview of how all this is
00:41:23
organized, here are a couple of interesting
00:41:25
documents, the main goal of the 2nd archive is
00:41:29
to draw attention to s o as
00:41:31
opposed to
00:41:32
prism, generally speaking, the sensor
00:41:35
works from a spoke with sources, it
00:41:37
passively collects data from networks around the
00:41:39
world,
00:41:40
that is both American and
00:41:42
foreign, various methods are used for this,
00:41:45
but one of the main ones is
00:41:48
cooperation with corporations, both
00:41:50
local and international companies
00:41:52
with a base in the USA, they can be forced to
00:41:55
cooperate or simply pay them,
00:41:57
they can also offer
00:41:59
mutually beneficial deals to the authorities of other
00:42:01
countries on approximately the following conditions we
00:42:03
install a system for you, you give us
00:42:06
access to all the data, you see here we have
00:42:10
much more data here than
00:42:13
one person or team could collect exquise
00:42:17
cardiff dive or just x [ __ ] and here
00:42:20
we have a huge folder with documents on its
00:42:22
work,
00:42:23
this system allows the analyst to
00:42:27
navigate in the boundless ocean of
00:42:29
raw data, the segment here has everything
00:42:32
you need for searching in retrospect but
00:42:34
also in real time for marking
00:42:36
objects exquise corr interface for
00:42:38
all this I want to show you one slide
00:42:41
that
00:42:43
ENT and it turned out to be very important, I talked
00:42:45
about the fact that these tools become more and more over time
00:42:49
more and more powerful,
00:42:52
very clearly in fiscal year 2011,
00:42:55
they were able to monitor 1 billion
00:42:57
telephone Internet connections
00:42:59
simultaneously on each of these
00:43:02
devices and they collected data at a
00:43:05
speed of about 100 25 gigabytes per
00:43:07
second, which is you robits of each
00:43:10
of these devices of each of the devices
00:43:12
on and how many devices were there at that
00:43:16
time? There were 20 points
00:43:18
10 at the bases of the Ministry of Defense, but this
00:43:22
data is outdated, we
00:43:24
are developing rapidly, but even 20 points are already 20
00:43:29
billion, as you can see, all this needs to be
00:43:31
published at least so that people
00:43:33
can imagine their capabilities, this is
00:43:37
obvious don’t let them be science fiction, all
00:43:40
this is happening in reality, no, I’m talking
00:43:42
rather about the scale of all this, and
00:43:44
although this is an absolutely inaccessible
00:43:47
technical document,
00:43:48
even in this form it’s deafening,
00:43:52
you know what I’m talking about
00:43:53
at this point, it would be worth it to have a
00:43:55
debate about whether we want we want the authorities to say that
00:43:58
all this is so unusual, such a scale, it’s
00:44:01
amazing for even if you know it,
00:44:03
you know what happens when you see all
00:44:06
these schemes in reality, so to speak in
00:44:09
technical terms, it
00:44:10
just makes an indelible
00:44:12
impression, this is what it needs
00:44:20
on the air, news prices, new sensational
00:44:24
report again brings back concerns that the
00:44:26
right to privacy is being violated for
00:44:29
security reasons a
00:44:30
court order has been made public
00:44:33
giving a n b full access to the
00:44:35
data of millions of We
00:44:37
Raise customers on a daily basis I was
00:44:39
lucky enough to record the first
00:44:41
television interview with the reporter who brought
00:44:44
this story to the world Glenn Greenwald from garden
00:44:48
congratulations on the sensation explain to our
00:44:50
viewers why this is so important is because
00:44:54
people have realized that the law under which this is
00:44:57
done, the Patriot Act, passed
00:44:59
after 9/11,
00:45:00
gives the government extremely broad
00:45:02
powers to collect data on people without
00:45:05
reasonable grounds for suspicion
00:45:07
required by traditional
00:45:09
standards
00:45:10
under the Patriot Act
00:45:12
if there is suspicion that you are involved
00:45:14
in Is it a crime of terrorism that the authorities
00:45:16
can collect information on you? Why are
00:45:19
we so alarmed by this
00:45:21
court decision? It is aimed not only at those
00:45:23
people who are suspected of
00:45:25
crimes or participation in
00:45:26
terrorist activities. It
00:45:28
allows the recording of calls from each of
00:45:31
Verizon's clients, as well as
00:45:34
wiretapping of conversations, both
00:45:36
international and local. covering
00:45:38
everyone indiscriminately, in fact, this program
00:45:41
is aimed at collecting data about all
00:45:42
Americans
00:45:43
and not just those who have reason to
00:45:45
suspect
00:46:46
of something; it is very difficult to find out that the
00:46:51
person you love with whom you
00:46:53
lived together for 10 years may not return
00:47:00
why didn’t they ask
00:47:04
when we last saw each other where
00:47:07
now
00:47:08
what am I doing and what does she know about my
00:47:12
illness in this regard, yes, so they are
00:47:20
quite knowledgeable
00:47:22
since I’m definitely not on sick leave
00:47:48
hello good afternoon hello
00:47:51
whiner now I’ll leave the Internet but
00:47:57
as it is news
00:48:01
and news and what kind of truth we had
00:48:04
guests today, it seems just a couple of hours
00:48:07
ago that someone came to your house and
00:48:13
women from the personnel department design b it’s
00:48:15
unlikely she’s from she’s not from the hut Zolin because there
00:48:19
was a policeman with her, he’s clearly from the
00:48:21
police n. b.
00:48:22
regular police wouldn't try to
00:48:24
break into my house your girlfriend lives there
00:48:28
yes she lives there I told the genius
00:48:30
to cooperate with them
00:48:32
one second I can't find the phone and do
00:48:35
n't worry about anything now wait I'll
00:48:37
get everything we need okay
00:48:40
listen well it's you it was worth expecting,
00:48:42
yes, I was preparing for it, you just know
00:48:45
when a blow falls on your loved ones and you
00:48:47
find out about it, it’s another winter, and of course,
00:48:50
maybe they just noticed that you
00:48:53
disappeared, I know the probability is not too
00:48:56
likely, yes, but they’re unlikely to
00:49:03
go, you’re lying,
00:49:08
forgive me today somehow she didn’t care about
00:49:10
her appearance, how she
00:49:15
reacted relatively calmly,
00:49:17
relatively calmly, the weight is what you are
00:49:20
doing and the page doesn’t know anything and
00:49:23
therefore, although I feel very unpleasant, this is the only way
00:49:28
I can at 9 and they didn’t
00:49:31
order anything, something like I need to leave
00:49:33
I can’t explain the reason to you or you
00:49:35
just disappeared waiting until she went
00:49:37
on vacation I left her a note that I
00:49:41
need to leave for a while in my work
00:49:43
this happens no no clearly these are the
00:49:45
things
00:49:46
I can ask you a couple of questions they
00:49:49
can check your things to find out what
00:49:51
you took it, but they may generally
00:49:59
suspect something, but it’s doubtful
00:50:02
what exactly, yes, because I cast
00:50:04
such a big net that if they
00:50:06
guess you, they will inevitably have a
00:50:08
heart attack, they will decide the guy had
00:50:10
access to everything and they are unlikely to understand that
00:50:12
it was me I did, I think that they will experience
00:50:16
relief, although all this still will
00:50:21
not cause them great joy when they
00:50:23
saw that my revelations reflect
00:50:24
trends, that I do not give any
00:50:26
lists indicating names and positions,
00:50:28
it is true, and yet I think that they will probably
00:50:31
have enough paranoia and that they will
00:50:34
prepare for the worst and this may well
00:50:37
force them to turn to methods that are not entirely, let’s
00:50:40
say, rational. I agree,
00:50:44
but at the same time it seems to me that now
00:50:47
their hands are tied, yes, I agree, I
00:50:50
had time to prepare everything in such a way
00:50:52
that we would all be at least at least
00:50:54
minimally protected regardless of
00:50:56
who will be involved all this let's say you
00:50:59
magazine virgo a kind of immunity so
00:51:01
we have time to play on
00:51:03
this before they become dangerous for us it will
00:51:05
take weeks before their lawyers,
00:51:07
as always, lead their song this is a
00:51:09
special situation how can we turn it
00:51:11
to our advantage, we
00:51:13
have already seen more than once how they do this, be
00:51:15
it drones or wiretapping and so
00:51:17
on, as the law of 1840 states,
00:51:20
nature is such and such,
00:51:22
but it takes time and it requires
00:51:25
effort and and besides, I believe that the
00:51:27
more publicly we behave as
00:51:30
journalists, the more we will be protected.
00:51:33
You have already thought about when you are ready
00:51:36
to speak, I am ready as soon as I can honestly
00:51:41
say, I believe that this should in no way
00:51:43
prevent the publication of my materials for
00:51:45
me this is the most important point, I would not
00:51:47
want to draw attention to myself
00:51:50
before it is necessary based on the
00:51:52
development of the situation from the publications
00:52:14
[music]
00:52:27
[music]
00:52:33
we are talking about tens of millions of
00:52:35
Americans who were not
00:52:37
suspected of anything but who were
00:52:39
monitored
00:52:48
on air news cnn published a new
00:52:53
scandalous article, this time in the
00:52:55
washington post newspaper, a sensational report
00:52:57
exposes another large-scale
00:52:59
secret government program,
00:53:01
both the washington post and garden in
00:53:04
london report that the nb fbi has
00:53:07
direct access to the central server of 9
00:53:09
leading internet companies including
00:53:12
microsoft
00:53:13
yahoo google facebook and wahl skype
00:53:16
youtube and
00:53:17
apple, as the author claims, they transmit
00:53:20
audio-video
00:53:21
photographs letters, log documents by
00:53:23
an analyst to track
00:53:26
proposals and a person’s circle of contacts,
00:53:28
let’s discuss the latest revelation,
00:53:30
we are little by little starting to get used to them
00:53:32
bilby is not a former employee of a n b who
00:53:34
quit in 2001 due to the fact that
00:53:37
what happened there now you are known as a
00:53:39
whistleblower beat what can you say
00:53:41
about the article in the washington post
00:53:43
I believe this is just a continuation of a long-standing
00:53:46
course of action that is, you are not surprised, but do
00:53:48
you think through whom
00:53:51
the leak could have occurred I don’t know who
00:53:53
did it but I have no doubt that
00:53:54
the administration will launch an investigation not
00:53:57
against the people who established the program,
00:53:59
but against those who leaked the information.
00:54:01
I’m not surprised that the companies are
00:54:04
denying everything. I won’t say that there
00:54:06
may be some technical
00:54:08
basis that allows them to say that they are
00:54:11
not actively cooperating with the authorities or
00:54:13
that in their understanding the government is not
00:54:15
has direct access to servers, but I have
00:54:18
had to talk more than once with different
00:54:20
people who, sitting at a table through a web
00:54:23
portal, typed commands and
00:54:25
accessed servers remotely, so whatever you
00:54:29
call it, the fact remains a fact, I
00:54:31
can call this the most blatant
00:54:33
violation of the civil rights of Americans
00:54:35
for the whole story here's
00:54:36
what's interesting today the New York Times
00:54:39
wrote that the administration has lost the
00:54:41
trust of citizens the New York Times
00:54:42
attacked President Obama this is
00:54:45
nothing new they attacked Bush
00:54:47
and when he tried to protect the country we
00:54:49
must not let our guard down or we
00:54:51
will be attacked again we already saw
00:54:54
in boston remember people were ready to
00:54:56
sacrifice their freedoms they needed to
00:54:58
escape to a little play
00:55:00
devil's advocate how to live and believe in
00:55:02
freedom if we have secret courts and
00:55:04
secret operations such as prism
00:55:06
secret investigations recording
00:55:09
every sneeze every spit of every
00:55:10
American
00:55:11
without putting the public is aware of
00:55:13
this, in your opinion, this freedom in 2008 was
00:55:16
taken from us and canceled warrants for
00:55:18
wiretapping conversations, with the exception of
00:55:20
those with Americans in the
00:55:22
United States, that is, now they do not
00:55:24
need permission to wiretap those
00:55:27
who are outside the country or
00:55:30
for Americans on territories of the
00:55:31
United States who
00:55:32
negotiate with people located in
00:55:35
other countries and again emphasize the
00:55:37
fact that no one checks or
00:55:39
controls the activities of nb means
00:55:41
that they can do whatever they
00:55:43
want and since their work is surrounded by a
00:55:45
veil of secrecy and those who are ready
00:55:47
to reveal their secrets are intimidated even when
00:55:50
they break the law we have no chance of
00:55:51
knowing until we
00:55:53
begin to investigate and
00:55:55
provide absolute transparency with
00:55:56
our government Glenn
00:55:58
Greenwald congratulations again on this
00:56:00
scoop thank you for your comment
00:56:38
and I have heard from lenses and She's
00:56:54
already been alive for a long time and is free. Apparently, the rent for the
00:56:57
apartment doesn't reach
00:56:59
the landlords. We were told that if we don't
00:57:04
pay within five days, we'll be evicted.
00:57:06
It's strange, because I have an automatic
00:57:08
payment transfer system set up;
00:57:13
there are also construction vehicles across the street from my house.
00:57:15
so that it means I
00:57:21
wonder what I’m not looking for
00:58:04
mixed feelings, it’s
00:58:09
hard for me to describe or express them in
00:58:13
words because you don’t know what will happen
00:58:17
tomorrow in an hour in a week you feel
00:58:21
fear and some strange freedom you
00:58:23
understand me the planning stage was
00:58:27
easier I didn’t have to take into account
00:58:29
just different factors, just take one more step
00:58:31
after it, calls
00:58:35
are recorded through digital channels, not
00:58:37
content, only data about where and
00:58:39
where the call was made, as it turned out, the authorities
00:58:42
have direct access to the servers of large
00:58:44
Internet companies,
00:58:45
as the government proves that this is
00:58:47
necessary for national
00:58:49
security purposes and is not a violation of
00:58:51
privacy is a
00:58:54
difficult question because, as Pete
00:58:56
mentioned, yesterday around midnight the
00:58:58
director of
00:59:00
national intelligence announced a
00:59:02
leak of information about them, there is panic
00:59:05
in the intelligence committee,
00:59:06
leaders of both parties have already announced
00:59:09
support for the administration, the
00:59:11
government communications center has its own
00:59:12
Wikipedia on the most closed most
00:59:15
classified level
00:59:16
where every intelligence officer can
00:59:18
find everything he needs,
00:59:20
I’m sharing with you this information, it’s your business
00:59:22
to decide what you need and what you don’t, it
00:59:25
contains documents of different types,
00:59:27
pictures, documents, powerpoint word, and so
00:59:29
on, forgive the necessary squat, yes,
00:59:34
sorry for interrupting,
00:59:36
that means these documents show there
00:59:40
are documents on our topic in one
00:59:42
of the sections of, say, the tempor document and a number of other
00:59:44
issues, this is a separate Wikipedia article, it
00:59:46
also talks about an original
00:59:49
tool called you dug yu dak is a
00:59:52
mechanism for searching data across the entire
00:59:55
array of material in surveillance then
00:59:57
troubleshooting page projects
00:59:59
for certain tools can be described
01:00:01
thank you
01:00:03
what is our next step when you are thinking of
01:00:06
making yourself known and are you I think now
01:00:09
soon events will unfold
01:00:11
truly rapidly as soon as they
01:00:13
begin to shift attention to us
01:00:15
which can happen at any minute I
01:00:19
will open up to tell them and guys this is
01:00:22
not a question from which you can
01:00:25
hide in the shadows this is a public matter
01:00:27
not my personal
01:00:29
this is the business of each of us and I am not afraid of you
01:00:32
you will not make me silent like you could
01:00:35
make everyone else and since everyone
01:00:38
continues to remain silent I will say I believe that
01:00:40
after me, no matter what you do to me,
01:00:42
someone will appear who will do the same on
01:00:45
the Internet, this principle is called hydra,
01:00:48
as soon as you run over one of us,
01:00:50
7 new roads will immediately appear and yet you
01:00:56
are worried, actually no, I think that
01:01:02
this stress does not scare me to a greater
01:01:07
extent because I knew what I was going into before,
01:01:10
since I voluntarily went for it, I have
01:01:16
already gotten
01:01:18
used to this idea, it doesn’t scare me,
01:01:21
if we break down the door, I’ll probably be
01:01:23
scared, but until this happens,
01:01:26
I’m holding on less began to eat that's all that that's
01:01:31
all that has changed
01:01:39
let's discuss the timing of when you will reveal the
01:01:41
secret of your identity yes we must
01:01:45
discuss everything because this
01:01:48
question worries me yes I'm listening to you the thing is that
01:01:52
if we reveal the cards I know that you are
01:01:56
sure that you will figure out in any case
01:01:59
and that this will happen very soon today
01:02:02
in the New York Times, Charlie Savage, our
01:02:05
charming Sherlock Holmes of political
01:02:07
reporting, concluded by deduction that a
01:02:10
continuous series of leaks indicates that there is
01:02:12
one person behind all this,
01:02:14
otherwise he quoted you as saying that it is one from
01:02:16
your reader before or and others
01:02:17
assume that overall this is good I
01:02:20
want people I want people to know that
01:02:22
this is one person I want to
01:02:25
prepare our public for the idea that this is a
01:02:27
person with a certain set of
01:02:29
political beliefs who wants the
01:02:32
world to know about what happens at the same time,
01:02:34
I maintain your complete anonymity
01:02:36
and I want to start introducing people to you, so
01:02:39
to speak, gradually, but what
01:02:41
worries me is that if we just
01:02:44
come out and say here is the person who
01:02:46
did everything that we talked about in
01:02:48
essence, we will do it for the government
01:02:51
his work, that is, it turns out that we
01:02:53
will give them your confession and help
01:02:57
them establish the source of the leak, that is,
01:02:59
maybe you are right, maybe they will quickly find you and
01:03:01
be able to find out everything, but what if
01:03:03
we fail, then it turns out that we are
01:03:06
giving them all the trump cards or or and everyone already
01:03:10
knows it’s hiding it because they don’t
01:03:12
want to or don’t know and we’ll tell them everything
01:03:14
so if the likelihood is that it would take them
01:03:16
two or three months of work and we’ll solve
01:03:19
this problem for them or let me
01:03:22
finish, maybe it’s not important for you maybe that's what
01:03:25
you want,
01:03:26
maybe you want to open up not because
01:03:29
you're going to get caught and you need to get ahead of
01:03:32
them, you're opening up because you want to be
01:03:34
heard clearly, that's what it's
01:03:37
all about, I don't want to hide or
01:03:39
hide, I don't have to do that, there
01:03:42
's certainly a reason for it but I
01:03:44
think it’s a sign of strength to come out and tell
01:03:47
them and I’m not afraid of you and others
01:03:50
shouldn’t have you either
01:03:51
just a week ago I was sitting in the office next
01:03:53
to you, we’re all interested in this, this is
01:03:56
our country,
01:03:57
but now the balance of power between citizens
01:03:59
and the government has become balanced between the
01:04:02
managers and the governed, instead of a
01:04:04
balance between
01:04:05
electing them and the voters, it’s clear that’s what I
01:04:09
wanted to hear, that is, that’s not the point at all,
01:04:12
no, I want to finish, I don’t think that
01:04:15
there is a possibility that I
01:04:16
will never be discovered at all, it’s just a matter of
01:04:18
time, maybe it will take a lot of time
01:04:21
although I doubt it, I didn’t even try to
01:04:24
cover my tracks since from the very beginning
01:04:25
I intended to come out in the open, well
01:04:27
today I’m publishing a general article on the defense of the
01:04:31
Rochon whistleblowers in it I’ll mention
01:04:33
you and without breaking your identity
01:04:36
I’ll deal with it as soon as I return and at the same time
01:04:38
I intend to send it away to all those who
01:04:40
insist on the need for investigations, I
01:04:42
want this to be an
01:04:43
apologia for fearlessness in the face of intimidation tactics,
01:04:46
so that everything we do will be carried out
01:04:49
under this sign, this is wonderful,
01:04:51
I like your principles and I fully
01:04:53
support we are turning inside out the
01:04:56
model imposed on us by the government
01:04:58
when the person who wants to speak
01:05:00
the truth must hide hide in the
01:05:03
shadows speak anonymously and so on I
01:05:05
agree that’s what the plan will be I’ll sum it
01:05:10
up since we all here believe that this is exactly how it
01:05:12
should be under this matter you yourself
01:05:15
feel the power of your chosen one understand
01:05:17
me
01:05:18
yes I want everyone to feel this power
01:05:20
I'm asleep and
01:05:21
this is a real challenge, a bold challenge has been thrown
01:05:24
and in their face I won't hide for
01:05:27
a single second, I won't, I'll tell
01:05:30
you everything in your eyes, yes, I need
01:05:31
an investigation, investigate nothing here,
01:05:34
I'm facing war and the truth, and I think that
01:05:37
this is a very strong position and
01:05:39
only one question arises: how can we achieve the
01:05:42
maximum effect, yes, but this is my
01:05:44
task and I will complete it,
01:05:46
so this morning I am publishing my article,
01:05:49
unless the garden backs down, then
01:05:52
the article comes out in the morning to
01:05:54
maintain the momentum to prepare the public for a
01:05:56
new revelation, a new article in the evening
01:05:58
and in with it we are preparing everyone for the
01:06:01
biggest leak and tomorrow when we
01:06:03
publish what we are going to publish the
01:06:05
question will arise what kind of leak it is and who the
01:06:08
source is and I guarantee you
01:06:19
in a second I will check
01:06:21
move it a little I just move
01:06:23
and I can cross all seven I just
01:06:25
need to do this everything can be removed
01:06:31
first some general biographical
01:06:33
information
01:06:34
state your name tell us about your
01:06:36
position in the intelligence community
01:06:38
and how long you worked in it well I don’t
01:06:42
know how much detail you need to
01:06:44
tell just in general in general I’m an
01:06:46
infrastructure analyst at booz
01:06:48
allen hamilton
01:06:49
without delving into my background ok something
01:06:52
like your resume ok mine have
01:06:55
snowden
01:06:56
im 29 years old i work at booz allen
01:07:00
hamilton as an infrastructure analyst for
01:07:02
nb in the state of hawaii before this have you held
01:07:07
any positions in the intelligence
01:07:09
community i was with a systems engineer system
01:07:12
administrator senior consultant
01:07:16
this is in central intelligence
01:07:19
management methodological consultant and
01:07:22
administrators of telecommunications
01:07:24
information systems and
01:07:26
what level of clearance to classified
01:07:28
information did you have top secret
01:07:36
people with my level of access to system
01:07:39
administration or to
01:07:41
infrastructures us analysis usually have
01:07:45
higher levels of access than ordinary
01:07:47
employees mb
01:07:48
usually nb uses such levels of
01:07:51
clearance like shh ai si kay and gamma, that
01:07:57
is, top secret signal markings,
01:08:00
admission by talent and gamma, each of them
01:08:03
touches on certain key aspects of the
01:08:04
activity of the n.b.
01:08:06
if you are a system administrator, you are
01:08:09
entitled to special access, private
01:08:11
privileged access, it allows you to
01:08:14
operate information at any level,
01:08:16
regardless of what you need for
01:08:19
your work,
01:08:54
we will continue to remind you of the main news,
01:08:58
former technical employee n.b.
01:09:00
Edward Snowden takes
01:09:02
responsibility for the leak of information
01:09:04
that the US government is intercepting
01:09:06
data from telephone Internet connections, not
01:09:09
all US politicians have confirmed the VPO, a
01:09:11
criminal case will be opened, it’s better to
01:09:15
put it this way, or in short,
01:09:16
people have already seen me on video so that it’s
01:09:19
easier to recognize me shave look, it wo
01:09:21
n’t work out completely anyway, the stubble will
01:09:23
remain, I don’t have a blade in the room, are you
01:09:29
planning to discuss this topic with
01:09:31
other publications today, of course, yes, you
01:09:34
’ll look into the office, and Sasha has this press, we
01:09:36
would like to ask about where he is
01:09:37
alone now and what are his plans, but for
01:09:39
similar I won’t answer questions
01:09:41
tournament if you ask anything else in
01:09:42
the interview there is no point in you your plans you
01:09:45
will stay in Hong Kong for some time for
01:09:46
some time are you going to continue
01:09:49
covering this story or are we not expecting
01:09:51
new reports from you
01:09:52
no I will continue write about this
01:09:54
whether the US authorities tried to force you to
01:09:57
abandon this topic do
01:10:00
you know how the Hong Kong authorities feel about this matter
01:10:03
did they try to contact you
01:10:05
to find out the whereabouts of Snowden to find out
01:10:09
some information I was not contacted by
01:10:12
representatives of any authorities what do
01:10:15
you think they will do events will develop for
01:10:18
you, of course, for sleep I have for the
01:10:20
American media of the
01:10:21
American administration as a whole, but
01:10:24
I can say for myself that I will continue to
01:10:26
write articles about what our
01:10:28
government is doing and about what
01:10:30
my readers should know, that no one can know this before him
01:10:33
They could have sent
01:10:34
their people after me or brought in intermediaries to the case,
01:10:36
but they work
01:10:38
closely with the governments of other
01:10:40
countries, or they could pay the local 3 hells,
01:10:42
they have plenty of funds and
01:10:44
opportunities, the officer is located across the
01:10:47
street at the American consulate in
01:10:49
Hong Kong, representatives of the Ministry
01:10:51
of Justice continue to insist on that
01:10:54
all the statements made by their
01:10:56
representatives of the world are
01:10:57
not true,
01:10:59
stay on our channel, we will
01:11:01
closely monitor how
01:11:03
events develop
01:11:13
[music]
01:11:15
on the air of Daniil Retort from the main
01:11:18
news of the hour, despite the threat of criminal
01:11:20
prosecution, the whistleblower who told the
01:11:23
interception of data by the American authorities
01:11:25
decided to speak publicly.
01:11:28
security in Afghanistan,
01:11:29
Topol rebels are reported to have
01:11:32
attacked the airport in Kabul,
01:11:34
now a press review awaits you, you will find out the
01:11:37
weaning is written by newspapers around the world,
01:11:39
let's start with the garden and our main news, the
01:11:42
identity of a former CIA employee has been revealed,
01:11:45
we give the floor information about a cell of
01:11:47
incredible proportions that the British are
01:11:49
conducting on the Internet, Edward Snowden, an
01:11:53
exciting story
01:11:54
I’m listening to her, first of all, this is an
01:11:57
absolutely fantastic story, it’s
01:11:59
like they took it from a John le Carré novel,
01:12:01
think about it, first he got
01:12:03
the materials, then he decided to go to
01:12:05
where, in his opinion, America was an hour away from
01:12:08
getting to Hong Kong because,
01:12:10
purely technically, in China with his policy of
01:12:12
one country, two systems, he can
01:12:14
count on a certain protection, everything is
01:12:17
carefully planned, just like a
01:12:19
real spy novel,
01:12:21
but do we know the details, judging by the
01:12:26
latest, it doesn’t look very good, but it also looks like we’ll
01:12:29
soon find out much better hide I don’t
01:12:32
know, only the lower part is visible faces of
01:12:41
mobile phone providers
01:12:43
find out all about air miles and
01:12:45
travel companies at our station
01:12:48
if you are going on the road
01:12:50
join me every weekend
01:12:51
you before if you want to keep up to date with
01:12:59
international events listen to
01:13:02
BBC world news
01:13:04
well now we are back again with the
01:13:05
main news of the day,
01:13:07
Snowden claims that he was horrified by the
01:13:11
speed at which nb was growing its
01:13:14
influence, so he decided to release
01:13:16
documents that prove that this
01:13:18
organization not only wiretapped
01:13:20
millions of telephone conversations but had
01:13:22
direct access to the period of the world's largest
01:13:25
and how I feel, how can I
01:13:26
comment, well, what will
01:13:30
happen we talked about this I knew that I was
01:13:33
taking a risk
01:13:35
no, is it worth it to me, it means he will arrest us, we
01:13:39
managed to publish information that
01:13:42
needed to be published, it was revealed that you can
01:13:47
continue writing
01:13:48
regardless of what happens to me,
01:13:52
29-year-old Edward Snowden said that the
01:13:55
US authorities or the foundation will have information about
01:13:58
mobile calls of Americans, as well as
01:14:00
data from the Internet, the Guardian newspaper
01:14:02
claims that he revealed his appearance at
01:14:04
his request,
01:14:05
we have David visa and raise in touch and who is
01:14:08
it, I’m
01:14:11
afraid that you got to the wrong place, I’m
01:14:27
listening, can you repeat it, no
01:14:37
thanks, no calls, probably not
01:14:39
a mistake number yes and not from anyone thank
01:14:43
you I'm sorry if it's two men from
01:14:47
the lobby let them call except them
01:14:50
no one just let them through as you said
01:14:59
so commented yes wait you're a
01:15:10
lawyer no no no those who asked about me
01:15:15
find out they're not lawyers no
01:15:24
tell her what she was mistaken and Mr.
01:15:27
Snowden does not live here
01:15:37
hello Robert and you can
01:15:38
talk now and I managed to get into the room
01:15:41
I am now safe with the
01:15:45
client well we could now
01:15:47
discuss further actions is this
01:15:49
resolution already in force or not yet
01:15:51
formally yes but that is formally she it's
01:15:58
not working yet, do you mind
01:16:10
if I put it on speakerphone, excuse me,
01:16:14
yes, we're here, Robert, hello, client,
01:16:18
I'm fine, I'm not complaining, I
01:16:25
met with a representative of the UN High
01:16:27
Commissioner for Refugees in Hong Kong,
01:16:29
they know that you are applying for protection as
01:16:33
provided for in the statute of their department, they
01:16:36
they want us to go now, we will get to the
01:16:42
lunch break, clearly the building has
01:16:48
several separate exits, so if
01:16:52
someone and journalists are waiting for you,
01:16:57
that’s great, I can take
01:17:00
the equipment with me
01:17:01
if necessary, perhaps I will
01:17:03
have to leave somewhere and I will
01:17:05
never return to the hotel ok I'm ready
01:17:18
thank you thank you very much thank you very much the
01:17:21
air is about what steps he
01:17:24
should take next and where he
01:17:26
will live will they give him a private
01:17:28
apartment in which he can hide
01:17:29
from the police everything is clear I'll call
01:17:37
before we go out okay yes see you
01:17:42
okay then
01:17:44
so we don’t have a car, so I think
01:17:48
we can either ask the concierge to call a
01:17:52
car or go down and catch a taxi, but there
01:17:56
will be such traffic in this area
01:18:00
that catching a taxi will
01:18:01
not be easy, yes, I know, tell me, have there been
01:18:05
precedents when
01:18:06
Hong Kong has extradited someone for
01:18:08
political reasons no, I
01:18:12
haven’t heard that, if we report torture or
01:18:14
ask for asylum, by law you should be
01:18:18
given the right to continue to
01:18:21
stay in Hong Kong since they don’t
01:18:23
know where to send you while
01:19:08
we can go,
01:19:18
the president definitely does not welcome the
01:19:20
increased attention that
01:19:21
this debate has attracted last week there was a leak of
01:19:24
classified information about programs
01:19:25
designed to fight terrorists whose
01:19:27
activities can harm
01:19:28
American citizens, this is a big
01:19:30
problem, but the debate is quite legitimate,
01:19:32
which means it should be continued
01:19:41
[music]
01:19:54
[music]
01:21:01
[music]
01:21:17
chronicle was hounded
01:21:18
[music]
01:21:19
I need to go to the unofficial The United States
01:21:22
is intercepting millions of
01:21:24
emails and telephone conversations of Brazilians,
01:21:26
so I want to show you a new document
01:21:30
on the diagram, you can see it all
01:21:33
very clearly. This map shows the
01:21:36
cables
01:21:37
used in collecting data within the
01:21:39
Prism program,
01:21:41
here you can see the volume of
01:21:44
information being collected, look here
01:21:46
here the thicker the line the more data
01:21:48
they collect here you can see these lines
01:21:51
indicating cables in the south of Brazil
01:21:53
they are quite bold and here in the
01:21:56
north along the coast
01:21:57
we see the same thing that is, as part of the
01:22:00
prism program they collect a
01:22:02
lot of data here that in my opinion the view is extremely
01:22:04
important because prisms then Facebook is
01:22:06
skype youtube yahoo hotmail and here you can see
01:22:09
how much data is intercepted from
01:22:11
Brazil, but we cannot say whether the
01:22:15
Brazilian government knows about this or
01:22:17
does not cooperate only with Brazilian
01:22:20
companies, but I am sure that sooner or
01:22:22
later we will we will find out until one day we
01:22:24
will find out all or almost all of
01:23:25
which of them we can insert
01:23:28
operational data here we cannot
01:23:30
publish this we can edit you can
01:23:32
scroll to the top we could
01:23:34
quote Alexander Orda
01:23:36
tarmac folder why not conduct a continuous
01:23:38
interception of all signals here is your
01:23:41
homework for the base bear hill
01:23:43
Keith Alexander director nb
01:23:45
will go during a visit to the UK yes this is a
01:23:48
secret document so a secret
01:23:51
document we have the ability to put
01:23:53
text on only three separate slides if
01:23:56
we insert more than three the whole layout will fly
01:24:01
so yes well this is very dangerous material
01:24:06
for the Guardians you understand if you make
01:24:09
a mistake at the very end, given that we
01:24:11
kept everything secret, who knows how it will
01:24:14
end, they can break in and seal
01:24:17
everything here if we are in front of him, he
01:24:19
said that the Prime Minister is extremely
01:24:22
worried, everyone is saying that the wave is coming from the
01:24:24
very top
01:25:07
[music]
01:25:19
[music]
01:25:36
how you can see on the map the plane on board
01:25:39
there is Snowdon supposed to
01:25:41
land in Moscow in just
01:25:43
a few minutes she
01:25:44
must have heard about this CIA agent
01:25:50
who revealed a bunch of their secrets and so it
01:25:53
turned out that he was stuck at the Moscow
01:25:57
airport
01:25:58
we managed to get him out of Hong Kong but
01:26:00
when his plane landed at the
01:26:02
airport in Moscow, the
01:26:03
American government revoked
01:26:05
his passport, that is, formally he did not
01:26:08
enter Russian territory, he is in the
01:26:10
transit zone at the airport, he
01:26:13
is accompanied by one of our people, we
01:26:16
are trying to find him a private plane to
01:26:21
take him out of Moscow,
01:26:26
to Ecuador, or maybe better to Venezuela
01:26:30
perhaps to Iceland
01:26:32
where he will be safe I
01:26:47
ask you there is no time
01:26:50
limit for speaking thank you I welcome everyone
01:26:53
present I want to start with the fact that after the
01:26:56
attacks of September 11 the Americans
01:26:59
justify all their actions as the fight against
01:27:02
terrorism
01:27:03
everything is done in the name of national
01:27:04
security in the name of protecting our
01:27:07
population on in fact, everything is completely different; the
01:27:10
vast majority of documents
01:27:13
have nothing to do with the fight
01:27:16
against terrorism or national
01:27:19
security; they are related either to
01:27:21
rivalry between countries or to
01:27:24
industrial financial or
01:27:26
economic issues; I will also mention the
01:27:29
Oka score program
01:27:31
when we just started publishing 1 of
01:27:34
our articles, the government of the United States
01:27:36
justified itself by the fact that it does not
01:27:39
intercept the content of conversations but
01:27:40
only collects metadata, that is, the names of
01:27:43
those who call their interlocutors, the time and
01:27:46
duration of their conversation, the
01:27:48
place from where the call was made, the place to
01:27:50
which it was made, and so on and so
01:27:52
forth, but if I know for sure with
01:27:55
what kind of people you communicate with and if
01:27:58
I know about everyone with whom they communicate,
01:28:00
if I know where and when your communication took place, the
01:28:03
duration and place of your
01:28:06
conversations, then I can find out a
01:28:08
lot of your personality about your
01:28:10
activities about your life, that is, there is an
01:28:13
obvious invasion of personal
01:28:15
life but in fact this argument
01:28:17
to the government is absolutely false
01:28:20
since the American government has the
01:28:21
ability to collect not only
01:28:23
your metadata but also the contents of
01:28:26
letters that you send by
01:28:28
e-mail or listen to your
01:28:30
phone conversations,
01:28:31
they know the queries that you enter into the
01:28:34
search bar of your Internet browser,
01:28:36
they know what Internet sites you have
01:28:39
recently visited, what documents you
01:28:42
send to your colleagues at work, this
01:28:44
system is capable of tracking almost
01:28:47
everything that you, that any person does,
01:28:49
this is during Internet sessions, if you
01:28:53
work,
01:28:54
tell journalists and investigate the
01:28:56
actions of the American authorities,
01:28:58
or if you got a job at a
01:29:00
company that competes with
01:29:02
American corporations, if you
01:29:04
work in the field of human rights protection
01:29:06
and your activities affect the interests of
01:29:09
the authorities, in general, whatever you do,
01:29:11
you know that any of your negotiations
01:29:14
can easily be intercepted and if
01:29:17
you are an American and live in the United
01:29:19
States then they need to obtain
01:29:21
court permission to intercept your
01:29:23
data and they always get it, but
01:29:25
if you are not an American,
01:29:27
then for this they do not need anything, no
01:29:30
permission, no special
01:29:32
documents. I think that the consequences of
01:29:34
such an invasion of people’s privacy at
01:29:37
this stage are very difficult to predict, but
01:29:40
we must understand that one way or another this is a
01:29:42
huge blow for all of us because the
01:29:46
ability of citizens to protest,
01:29:47
organize demonstrations or, say,
01:29:49
organize some kind of political
01:29:51
demonstrations is sharply reduced when we are
01:29:54
deprived of our right to privacy,
01:30:04
please give me your phone numbers like this
01:30:13
please, I put everything in bag,
01:30:16
but hide their refrigerator, let's
01:30:29
start, and as you know, in June,
01:30:35
again, the Duma was charged with
01:30:39
3 serious crimes based on the law of the
01:30:43
First World War, which
01:30:45
is called the Espionage Act, the
01:30:49
Espionage Act provides for
01:30:51
criminal prosecution for the dissemination of
01:30:54
any information related to the defense
01:30:56
of the country it is only used to
01:31:00
prosecute people accused of
01:31:04
collaborating with foreign countries,
01:31:06
spies, not whistleblowers, and this is a very
01:31:09
unusual case, not only for all of
01:31:12
you, but for me too, this law
01:31:15
does not distinguish between whistleblowing in the
01:31:19
public interest and selling secrets to an
01:31:21
enemy of the country
01:31:22
for personal gain that is,
01:31:24
I can be justified by the fact that the
01:31:26
information released
01:31:28
should not have been kept at all or
01:31:30
classified as secret
01:31:32
information, that its distribution was
01:31:34
done in the interests of society and for
01:31:37
its benefit, and even if the court concludes that the
01:31:40
program in question violates
01:31:43
the law or Constitution, this will not serve as a
01:31:45
justification within the framework of this law,
01:31:47
the government is not obliged to explain
01:31:49
the secrecy or demonstrate the
01:31:51
harm caused by the leak, this is not
01:31:54
relevant, therefore they say that the process
01:31:57
will not be fair, we mean not
01:31:59
exactly what
01:32:02
human rights activists usually mean, but we also say that the law
01:32:04
itself excludes any possibility of being counted
01:32:07
that Snowdon could count on
01:32:09
and actually equates him to
01:32:12
spies and these 3 charges can easily be
01:32:15
turned into one hundred and two hundred or even 300 and
01:32:17
he can be tried separately for each
01:32:19
document that was published by
01:32:21
journalists and I think that we all
01:32:24
understand even though we meet here as
01:32:26
lawyers
01:32:27
at a bar meeting that the outcome of this
01:32:30
case will, alas, be determined by politics and
01:32:33
not by law 95 percent
01:32:58
[music]
01:33:09
Mr. Snowden is accused of serious
01:33:11
crimes, he should be returned to the
01:33:14
United States where he will be given a fair trial and
01:33:17
will be given all the rights due to a
01:33:19
US citizen in accordance with the
01:33:22
constitution of our country
01:33:31
[music]
01:33:38
[music]
01:33:49
[music]
01:34:15
no I do not consider Mr. Snowden a
01:34:16
patriot I have asked for a
01:34:19
comprehensive review of our
01:34:22
surveillance operations before these
01:34:24
leaks occurred for me it is a priority and I think
01:34:29
for the entire American people it
01:34:32
is rightful and methodical to
01:34:35
study of these laws and thoughtful,
01:34:40
objective debate that will help
01:34:44
make our lives better
01:34:48
[music]
01:35:21
[music]
01:35:23
as soon as David
01:35:27
[music]
01:35:30
and friend tell me
01:35:32
everything is okay
01:35:35
[music]
01:35:39
I want yes okay okay let's go don't pay
01:35:42
attention
01:35:50
but you when I'm okay
01:35:52
I just couldn’t sleep all night, it’s clear that
01:35:54
Brazil is demanding an explanation from the
01:35:56
British government,
01:36:17
according to the latest data, and Nb had access to
01:36:20
encryption keys and paid
01:36:21
technology companies to introduce
01:36:24
loopholes into encrypted protocols.
01:36:26
Today we are gathered to talk about
01:36:28
methods by which you can
01:36:29
protect yourself from government
01:36:31
spying.
01:36:32
Jacob Apple Baum journalist and
01:36:35
developer of encryption and security
01:36:37
programs Ladar Levinson creator of a
01:36:39
secure electronic messaging service
01:36:42
lava bit which Edward
01:36:44
Snowden used the words thank you lava bits you
01:36:48
postal service which I hope one day
01:36:50
will become known to everyone and in itself and not
01:36:53
just in connection with the name Snowden I
01:36:56
created this service so that
01:36:58
no one could force me into violating
01:37:03
privacy, let's say my idea was
01:37:06
to exclude the service provider from the equation;
01:37:09
I do not keep logs on the server and do not have
01:37:13
access to the user's mail on disk,
01:37:15
which of course does not exclude the possibility
01:37:18
surveillance for that excludes me from
01:37:21
this equation where surveillance can
01:37:24
be established on any party,
01:37:26
both the sender and the recipient of
01:37:29
the message, but not so long ago an
01:37:32
FBI agent contacted me who said that
01:37:35
since I could not give him information about
01:37:38
any specific user then I
01:37:40
will have to give them the protocol keys with s l
01:37:42
and allow their people to secretly collect
01:37:44
data from all correspondence taking place on
01:37:46
my network, of course I was very
01:37:52
pleased with this, to put it mildly, even more
01:37:55
alarming to me was that I couldn’t tell anyone about
01:37:57
it, so I decided that if
01:38:01
I will not be able to make this situation public
01:38:04
if I do not have the opportunity
01:38:06
to tell people what is happening,
01:38:09
the only ethically correct choice is to
01:38:11
close the network, think about it, I believe in the
01:38:18
rule of law, I believe in the need
01:38:20
to conduct an investigation, but for any
01:38:23
investigation there must be a serious
01:38:25
reason for the violation of the right to privacy
01:38:28
and should be a
01:38:29
matter of concern because it is an act of
01:38:32
aggression because it is an act of destruction
01:38:35
if we have no right to privacy
01:38:38
so how can we have a free open
01:38:40
discussion what is the use of the right to freedom of
01:38:44
speech if it is not protected if you do
01:38:50
not have the opportunity have a private discussion
01:38:52
with another person about something you
01:38:54
disagree with think about what destructive
01:38:57
effect this will have what destructive
01:38:59
effect it will have on countries where there is already no
01:39:01
right to privacy
01:39:03
I would like to draw your attention to one
01:39:05
interesting point - what used to be
01:39:07
called freedom we we call the
01:39:09
right to privacy and we are immediately
01:39:12
ready to admit that we are deprived of this right, which is
01:39:15
why I am seriously worried about
01:39:17
my generation, especially when we talk
01:39:19
about the fact that nothing can surprise us anymore, we
01:39:21
must understand that without the right to privacy
01:39:24
we are deprived of the ability to act,
01:39:25
we lose freedom itself because we
01:39:28
cannot freely express our thoughts,
01:39:29
there is a myth about the passive
01:39:32
surveillance machine, but what is any surveillance
01:39:34
if not control and all these statements about
01:39:36
passivity are simply nonsense,
01:39:39
they act very actively in relation to
01:39:41
Europeans and Americans, too, essentially
01:39:43
in relation to anyone, if we are
01:39:45
required,
01:40:00
here a whole paragraph is devoted to the fact
01:40:03
that they are intercepting data from the
01:40:06
mobile communication device of
01:40:08
Chancellor Angela Merkel, look here there
01:40:11
is a number, but I think
01:40:34
no, it’s necessary, but of
01:40:36
course not
01:40:45
[music]
01:41:21
on you hello, what are you going to
01:41:27
tell the people of Germany I came
01:41:30
as a consultant and what do you intend to
01:41:33
tell but all I know is
01:41:35
the truth what will you talk to them about
01:41:39
it depends on their questions
01:41:42
I think yes yes well
01:41:45
thank you
01:41:51
good afternoon Mr. Bell hello how are
01:41:54
you how are you
01:41:55
galant 8 2 1 articles and I’m very glad
01:41:58
to see you,
01:42:08
I’m glad that I was called here because in
01:42:11
my opinion it is extremely important for us to talk about the
01:42:13
secret activities of intelligence
01:42:15
communities around the world and not only
01:42:18
nb all those programs that
01:42:21
Edward Snowden spoke about and these are essentially
01:42:23
tools for collecting information such
01:42:26
tools have been used by every
01:42:28
dictatorial regime in history, one of the most
01:42:30
important tasks for them is to know as
01:42:32
much as possible about their people,
01:42:33
for this they create such programs,
01:42:36
personally, I see them as the greatest threat to
01:42:39
democracy throughout the world
01:42:42
[music]
01:43:05
[music]
01:43:29
what do you think they do journalists
01:43:32
with those of us who work with
01:43:34
Snowden's documents, what do you think is the approach
01:43:37
they take towards such people you
01:43:39
are on the list of priority
01:43:41
targets this means that any
01:43:43
electronic device you
01:43:46
use will be tapped all the
01:43:48
data will be recorded and what they do with
01:43:50
this data they are trying to find out on what
01:43:52
we work on partly
01:43:54
including this but first of all
01:43:56
they will seek to identify your
01:43:59
sources of information that is, let's say
01:44:00
that I have a confidential
01:44:02
source supplying me with information
01:44:04
who works in the US government and
01:44:06
he believes that there is some kind of
01:44:09
violation of the constitution
01:44:10
and he gets in touch with me, what
01:44:14
next they will establish surveillance, they will
01:44:16
monitor his every move, and if he
01:44:19
starts transmitting information, he can be
01:44:20
captured right on the street, the most
01:44:22
correct thing to do here would be to do
01:44:24
as deep throat did
01:44:26
during the time of Nixon, meet in person in
01:44:29
underground parking lots
01:44:48
[ music]
01:45:12
let's separate our metadata for the last time
01:45:14
so that
01:45:16
your real name does not remain in the chain of our correspondence. Of
01:45:19
course, this will not give you the opportunity to
01:45:21
deny your involvement in this
01:45:23
story, but I am sure that it will be much better
01:45:25
if the revelations happen on your
01:45:28
terms and thanks again for everything what
01:45:33
did you do and once again forgive me for the
01:45:35
numerous delays we arrived in the
01:45:38
developed territory where we
01:45:40
had no one to take as a model and if everything
01:45:42
ends well, maybe our success
01:45:45
will inspire courage in the hearts of other people on the
01:45:47
network for
01:45:54
I wanted to share with you the news of a
01:45:56
new
01:46:00
source with which which we are on,
01:46:09
this is the person who does
01:46:12
most of it, you do most of the work, the place,
01:46:18
but actually
01:46:20
what happened and this is actually very
01:46:27
dangerous for the source, I hope he knows
01:46:33
what needs to be done so as not to get caught and
01:46:35
worry, he did it all
01:46:37
with the help of this quite well and
01:46:43
they talk so well, and
01:46:48
by the way, this is still a big question: where should they turn the
01:46:51
clutch? no, they are
01:46:53
extremely careful, yes, there is also this is good,
01:46:56
and this is where it is, they
01:47:10
already seriously
01:47:29
knew about it,
01:47:37
this is not a real airplane, you
01:47:41
mean the control system here the whole process
01:47:43
sends them to hell who is there there is
01:47:46
a graph on it the whole arrangement for each
01:47:49
element is very brave it’s a
01:47:51
very risky business but the most important thing is
01:47:53
that no one comes in and this is what
01:47:55
this graph looks like
01:47:56
on it you can see how a decision is made it’s
01:47:59
something like this and here
01:48:08
look at this decision-making scheme for
01:48:13
each of them the policy was given for sure
01:48:21
this is simply amazing
01:48:28
this is simply ridiculous
01:48:31
this is shocking and this is you you are the
01:48:43
population of the whole country and I what is this what
01:48:49
we are working on now
01:49:04
this man is it really scary I don’t
01:49:08
know, at the same time, he’s not bad at all, but
01:49:10
I just hope that
01:49:12
you’re right to him, his courage may shock,
01:49:14
but there is no doubt on the other side that he
01:49:16
was inspired by what you did, it
01:49:19
could, it could, it could
01:49:22
bring this whole political situation with
01:49:25
revelations
01:49:26
completely new level because this is
01:49:28
exactly how it will be, I don’t know, I think
01:49:32
it’s great that people will see what was
01:49:35
hidden from them once again, and
01:49:38
this time by a different branch of government
01:52:05
[music]

Description:

-------------- TELEGRAM COLLECTION--------------------- БАЗА КРЕАТИВА - https://www.youtube.com/channel/UCksG6P7r0gDkLK8TAm3Uolw Музыка Для Избранных - https://tele.gg/MuzWod Музыка - https://t.me/MuzWod Поддержать Мир Открытой Двери --- https://qiwi.com/n/CREATIVMOOD -------------------------------------------------------------------------------- В январе 2013 года Лора Пойтрас стала получать анонимные зашифрованные электронные письма от человека по имени «CITIZENFOUR», который утверждал, что у него есть доказательства существования нелегальных программ скрытого наблюдения, которое ведет АНБ в сотрудничестве с другими спецслужбами по всему миру. Музыка √ https://tglink.ru/muzwod ------------------------------------------------------------------ Ещё видео 1.Креативный взгляд --- https://www.youtube.com/watch?v=w5vdxEHfVNU 2.ИТОГИ креативных стараний - https://www.youtube.com/watch?v=1ZIsJGmDVgo 3.Обращение искусственного интеллекта https://www.youtube.com/watch?v=F4wRepUi-BQ 4СЧАСТЬЕ --- https://www.youtube.com/watch?v=jCSBmraj3pw 5.Мир Открытых Изменений --- https://www.youtube.com/watch?v=VmCU5SXzi6Q 6.Волк и Овцы --- https://www.youtube.com/watch?v=yxtMMmy3vYM 7.Последний снимок --- https://www.youtube.com/watch?v=kb4V7ED7lbo 8.Квантовый феномен --- https://www.youtube.com/watch?v=3fHRTyjPGIQ 9.Крипта и блокчейн вся правда --- https://www.youtube.com/watch?v=uNv6B3rR3k4 10.Самый добрый мультик --- https://www.youtube.com/watch?v=kqQbds83g0g 11.MAGASHOW --- https://www.youtube.com/watch?v=2lynNEQJXbs 12.Скамейка - https://www.youtube.com/watch?v=8qMuv_wWcQU 13..Хакеры пользуются -- https://www.youtube.com/watch?v=lVyFX... 14 .Лила --- https://www.youtube.com/watch?v=atStekV17-4

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете." video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете." video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете." video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете." video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете."?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Правда Сноудена Фильм - Информационная безопасность.- Защита в интернете."?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.