Black Code Page #2
hot on the trail of a massive
electronic spy network.
They say it has taken control of
nearly 1,300 high-level computers
in more than 100 countries.
major political implications.
They can extract any
document they wanted.
They could turn on web cameras,
turn on audio devices,
so that they could,
in effect, use the computers
as a listening device
in the offices.
[reporter] The web of intrigue
started with the Dalai Lama
who thought his computer
had been hacked.
Up until about 2007 or 2008, I'd
never really heard of malware.
You know, I'd heard
of viruses, obviously,
but I hadn't really heard
about targeted malware attacks
affecting
[clicking]
First time I heard about it was
in the context of the Tibetans.
Gradually we started piecing together,
they are under surveillance.
The surveillance comes
They're using malicious software
and socially-engineered e-mails.
E-mails that are crafted
to get them to open it up
[reporter]
Nart Villeneuve, a computer wiz,
figured out
how the operation worked
by getting the attackers
to hack into his computer.
We're monitoring these groups
for long periods of time,
and you're essentially waiting
for them to screw up, right?
And when they do,
you take advantage of that.
Sometimes it takes a long time.
You could be monitoring a group
for a year and get nothing.
Then one day, they just use a
server that they don't lock down
and all the data's
just sitting there.
I was at home.
It was pretty late.
[typing]
[Deibert]
trying to figure out
what actor is responsible
for getting inside
the Dalai Lama's office.
And there was a 22 or 24 character
string that kept coming up
that he couldn't figure out,
"What is the meaning of this?"
So on a whim, he just copied
and pasted it into Google.
One website came up,
and it was Chinese characters.
So he clicked on it.
[mouse clicks]
To my surprise, what came
back was the actual page
that the attackers used to interface
with the compromised systems.
So they set up a website where
they could monitor their victims.
But they didn't
password protect it!
So it was like a window
into everything they were doing.
[electronic music]
[Nart] This wasn't just targeted
at Tibetan organizations
or human rights organizations.
This was global, a pretty
wide range of institutions
that showed that these attackers were...
were quite busy.
There was huge pickup in the media.
It was all over the world.
And it put us on a different kind of
footing in terms of our credibility.
In the cyber security community,
we were novices at that time.
We were kind of outsiders.
[no audible dialogue]
So we were kind of
calling it on the fly.
Like, what do we do?
Who do we notify?
I knew that publishing it
was important.
We had to redact a lot of the
information to protect people.
Should we notify the government?
Should we notify
the Canadian government?
How do we notify other governments
that are being victimized?
At the time, you know,
we didn't want to completely disclose
everything that we had done,
because we
wanted to do it again.
[Deibert] In some of the communities
I mentioned, they loved it.
But I got the feeling from,
certainly inside my own government,
there was a lot of weirdness.
- [interviewer] Are we allowed to speculate?
- Well, I think now we know
because there's a Snowden disclosure
that explicitly references the fact
that the Canadians
and the Americans,
our signals
intelligence agencies,
were piggybacking
off the GhostNet network.
So, in publishing the report, we
basically broke up their party.
they were actually compromised
by two distinct groups.
got the most attention.
that was also active.
The GhostNet group
shut down their operations,
but the other group, um,
they're still going.
[birds tweeting]
[Tibetan horns]
[chattering]
[horns continue]
[gong rings]
[chanting in Tibetan
through megaphone]
[woman speaking Tibetan]
[Golog, in Tibetan]
In our research,
what we see are acts of war
that take place
against citizens,
using these very technologies.
Getting inside the computers of
Tibetans and then arresting them,
is a kind of act of war.
[speaking Tibetan]
[Deibert] We see this sort
Minor to major versions of it.
Everything on the site
So this... The last log-in on
the C panel was from Korea.
- Mm-hmm.
- Do you guys have any work in Korea?
- Is there any...
- No, no...
So who actually accesses the website to
update it and all that sort of thing?
- It must be somebody unauthorized.
- Yeah.
[bell ringing]
[ringing rapidly]
[stops]
[chanting]
[man, in Tibetan]
[in English] One, two, three,
four, five, six,
seven.
[in Tibetan]
[Tibetan horn]
[horn continues]
[horn resumes]
[man continues, in Tibetan]
[screaming]
- [shout]
- [gunshot]
[screaming continues]
[man shouts]
[screaming continues]
[stops]
- [indistinct]
- Hmm.
[typing]
[talking, quiet]
Not that long ago, the government
of Pakistan put out this tender
for proposals for a nationwide
Internet filtering system.
They wanted to solicit proposals
from companies to build,
effectively,
the Great Firewall of Pakistan.
Today if you visit Pakistan
and you get online
and you try to access YouTube,
this is what you'll see,
a blocked page like this.
I'm in Islamabad,
putting in a SIM card.
First and foremost, I'm really
excited to see Shahzad.
the organization Bytes for All,
eight years ago, I think?
And he's been involved,
in one way or another,
in Citizen Lab research
ever since.
[mouse clicks]
[chattering]
- Hi, Shahzad.
- Hello!
- So great to see you.
- Here we are. Here we are.
[both chuckling]
[Deibert]
Bytes for All does what they do,
advocacy-based approach to Internet freedom
under extreme duress.
So they're operating
in a country that,
specifically around media
and free expression,
has got to be one of
the worst places in the world.
Uh, journalists are
routinely kidnapped, murdered,
uh, offices firebombed,
et cetera,
and they've experienced
all of that.
Death threats,
staff members kidnapped,
his own son beat up and
thrown to the side of the road
as a warning to Shahzad
not to do what he's doing.
In my opinion,
Internet has opened up
so many opportunities...
for the people to express,
and that is the sole reason that
we are fighting for open Internet.
They lost their public spaces.
They lost their ability
to go out freely.
So, as they are putting controls
Translation
Translate and read this script in other languages:
Select another language:
- - Select -
- 简体中文 (Chinese - Simplified)
- 繁體中文 (Chinese - Traditional)
- Español (Spanish)
- Esperanto (Esperanto)
- 日本語 (Japanese)
- Português (Portuguese)
- Deutsch (German)
- العربية (Arabic)
- Français (French)
- Русский (Russian)
- ಕನ್ನಡ (Kannada)
- 한국어 (Korean)
- עברית (Hebrew)
- Gaeilge (Irish)
- Українська (Ukrainian)
- اردو (Urdu)
- Magyar (Hungarian)
- मानक हिन्दी (Hindi)
- Indonesia (Indonesian)
- Italiano (Italian)
- தமிழ் (Tamil)
- Türkçe (Turkish)
- తెలుగు (Telugu)
- ภาษาไทย (Thai)
- Tiếng Việt (Vietnamese)
- Čeština (Czech)
- Polski (Polish)
- Bahasa Indonesia (Indonesian)
- Românește (Romanian)
- Nederlands (Dutch)
- Ελληνικά (Greek)
- Latinum (Latin)
- Svenska (Swedish)
- Dansk (Danish)
- Suomi (Finnish)
- فارسی (Persian)
- ייִדיש (Yiddish)
- հայերեն (Armenian)
- Norsk (Norwegian)
- English (English)
Citation
Use the citation below to add this screenplay to your bibliography:
Style:MLAChicagoAPA
"Black Code" Scripts.com. STANDS4 LLC, 2024. Web. 18 Nov. 2024. <https://www.scripts.com/script/black_code_4167>.
Discuss this script with the community:
Report Comment
We're doing our best to make sure our content is useful, accurate and safe.
If by any chance you spot an inappropriate comment while navigating through our website please use this form to let us know, and we'll take care of it shortly.
Attachment
You need to be logged in to favorite.
Log In