00:00:00.000 --> 00:00:03.160
Everyone is talking about 'cyber'.

00:00:03.160 --> 00:00:08.380
'Cyberattacks', 'Cyberweapons' and of course: 'Cyberwar'

00:00:08.380 --> 00:00:11.620
But what does a 'cyberwar' actually look like?

00:00:11.620 --> 00:00:13.620
And what would be new about it?

00:00:13.620 --> 00:00:16.120
We all know what a 'normal' war looks like:

00:00:16.120 --> 00:00:19.380
Several parties arm themselves with deadly weapons.

00:00:19.380 --> 00:00:22.980
Either by producing or by importing them.

00:00:22.980 --> 00:00:25.560
And if war breaks out, these weapons are being used

00:00:25.560 --> 00:00:27.760
to harm one another.

00:00:27.760 --> 00:00:30.200
And a absurd as this sounds:

00:00:30.200 --> 00:00:32.540
Even for brutal conflicts like these

00:00:32.540 --> 00:00:34.360
humans came to agreements

00:00:34.360 --> 00:00:38.740
to outlaw the most cruel weapons.

00:00:38.740 --> 00:00:41.540
And to sanction their use.

00:00:41.540 --> 00:00:45.180
But a so called cyberwar would look very different.

00:00:45.180 --> 00:00:48.780
Because just building factories to produce cyberweapons

00:00:48.780 --> 00:00:50.780
is impossible.

00:00:50.780 --> 00:00:54.200
Because cyberweapons - in most cases - are malware

00:00:54.200 --> 00:00:57.040
like viruses, worms and trojans.

00:00:57.040 --> 00:01:02.020
And these usually work, based on vulnerabilities in other systems.

00:01:02.020 --> 00:01:04.660
So cyberwar armament means

00:01:04.660 --> 00:01:08.620
infiltrating and penetrating foreign networks and systems

00:01:08.640 --> 00:01:10.740
to finad security holes.

00:01:10.740 --> 00:01:14.320
Or as a more deceitful way:

00:01:14.320 --> 00:01:17.040
Those vulnerabilities are installed on purpose.

00:01:17.040 --> 00:01:19.520
But of course there's also a market

00:01:19.520 --> 00:01:24.160
where you can buy access or knowledge about these flaws.

00:01:24.160 --> 00:01:26.020
And if it comes to a cyberwar

00:01:26.020 --> 00:01:29.600
the attackers will abuse control over those systems

00:01:29.600 --> 00:01:31.780
to harm the opponent.

00:01:31.780 --> 00:01:33.220
That means:

00:01:33.220 --> 00:01:36.960
everything that contains a computer can be attacked

00:01:37.000 --> 00:01:39.900
And it doesn't need a lot of imagination

00:01:39.900 --> 00:01:42.560
what will happen

00:01:42.560 --> 00:01:45.040
if every router, every phone

00:01:45.040 --> 00:01:47.960
every central control system

00:01:47.960 --> 00:01:52.780
and nowadays even our cars, home appliances and our smarthomes

00:01:52.780 --> 00:01:55.480
could be turned into a cyberweapon.

00:01:55.480 --> 00:01:57.720
If our essential infrastructure

00:01:57.720 --> 00:02:02.000
like waterworks, traffic systems, hospitals and power plants

00:02:02.000 --> 00:02:05.340
are being shut down or used against us.

00:02:05.340 --> 00:02:08.800
This could have consequences as devastating

00:02:08.800 --> 00:02:11.840
as an attack with conventional weapons.

00:02:11.840 --> 00:02:17.360
Nevertheless almost all countries around the world arm themselves for cyberwar.

00:02:17.360 --> 00:02:20.360
But there's never been a real discussion

00:02:20.360 --> 00:02:24.840
whether intelligence agencies and armies should be allowed 

00:02:24.840 --> 00:02:27.140
to turn our devices into weapons

00:02:27.140 --> 00:02:29.000
to use them against ourselves.

00:02:29.000 --> 00:02:31.180
Even though there are very good reasons 

00:02:31.180 --> 00:02:35.600
to outlaw cyberweapons the same way chemical biological weapons have.

00:02:35.880 --> 00:02:40.080
Reason 1: Cyberweapons can be used anonymously.

00:02:40.080 --> 00:02:43.840
In a world wide web like the internet

00:02:43.840 --> 00:02:49.480
one can never find out who the actual perpetrator is.

00:02:49.480 --> 00:02:54.220
Since attacks like these are usually made through several hacked nodes

00:02:54.220 --> 00:02:56.700
to prevent backtracing.

00:02:56.700 --> 00:03:01.220
And often they take place at a time that leads to another source.

00:03:01.220 --> 00:03:04.700
And even if traces of the attack can be found

00:03:04.700 --> 00:03:09.060
since they are digital, it's impossible to tell

00:03:09.060 --> 00:03:13.440
if they are real evidence or if they were left on purpose.

00:03:13.440 --> 00:03:17.920
Reason 2: Cyberwaeapons can't be controlled.

00:03:17.920 --> 00:03:21.060
Malware like worms, viruses and trojans

00:03:21.060 --> 00:03:23.060
are usually designed so that they

00:03:23.060 --> 00:03:26.060
lead a versatile life on it's own.

00:03:26.060 --> 00:03:29.660
And if they were being used as an act of war

00:03:29.660 --> 00:03:32.620
or unintentionally

00:03:32.620 --> 00:03:34.620
can't be reenacted.

00:03:34.620 --> 00:03:39.360
Weapons like these can even lie dormant for several years

00:03:39.360 --> 00:03:41.360
before they wreak havoc.

00:03:41.360 --> 00:03:43.360
And unlike analogue weapons

00:03:43.360 --> 00:03:47.380
'cyberweapons' can simply be stolen via copy and paste

00:03:47.380 --> 00:03:51.040
and can be cloned and spread infinitely.

00:03:51.040 --> 00:03:56.780
Reason 3: Cyberweapons are expensive and cause more harm than they do good.

00:03:56.780 --> 00:04:01.140
Intelligence Agencies and Military spend huge amounts of money

00:04:01.140 --> 00:04:05.620
to scan systems or purchase exploits.

00:04:05.620 --> 00:04:09.680
And since exploits only work with open security holes

00:04:09.680 --> 00:04:12.200
they have no interest in fixing the flaws.

00:04:12.200 --> 00:04:15.200
in our systems.

00:04:15.200 --> 00:04:19.520
In short: Huge amounts of money are being spend

00:04:19.520 --> 00:04:24.740
to deliberately keep our infrastructure weak and vulnerable.

00:04:24.740 --> 00:04:29.180
Just to have a backdoor for their own interests.

00:04:29.180 --> 00:04:32.180
And these flaws can of course be used by other criminals

00:04:32.180 --> 00:04:36.220
like as scammers or terrorists.

00:04:36.220 --> 00:04:41.920
Which happens everyday with ransomware and other malware.

00:04:41.920 --> 00:04:47.000
These are only three reasons why we urgently need a broad discussion

00:04:47.000 --> 00:04:49.680
about 'cyberwar'.

00:04:49.880 --> 00:04:52.460
We would all be safer

00:04:52.460 --> 00:04:56.440
if our governments would spend our money on fixing the vulnerabilities

00:04:56.440 --> 00:04:59.320
instead of deliberately leaving them open.

00:04:59.320 --> 00:05:03.300
Make Cyberpeace not Cyberwar.

00:05:03.300 --> 00:05:09.560
You can find more information at cyberpeace.fiff.de

00:05:09.560 --> 00:05:12.840
And if you think cyberpeace is an important topic

00:05:12.840 --> 00:05:18.000
please share this film with your friends and among all your acquaintances.


