Press "Enter" to skip to content

The Other Side of Ego | Jonathan Gravenor | TEDxOcala


with living guys so I will start with a

with living guys so I will start with a very easy question to you how many of

very easy question to you how many of

very easy question to you how many of you here own a computer

you here own a computer

you here own a computer don’t be shy okay this is exactly what I

don’t be shy okay this is exactly what I

don’t be shy okay this is exactly what I expected

expected

expected well you know today in our computers we

well you know today in our computers we

well you know today in our computers we contain our lives we have photos we have

contain our lives we have photos we have

contain our lives we have photos we have documents with everything in our

documents with everything in our

documents with everything in our computers imagine if someone can steal

computers imagine if someone can steal

computers imagine if someone can steal your computer imagine if someone can own

your computer imagine if someone can own

your computer imagine if someone can own everything that you contain in your

everything that you contain in your

everything that you contain in your computer imagine for example a knocker

computer imagine for example a knocker

computer imagine for example a knocker that can I have access to your browser

that can I have access to your browser

that can I have access to your browser history of course in our daily life we

history of course in our daily life we

history of course in our daily life we can visit the Financial Times The

can visit the Financial Times The

can visit the Financial Times The Washington Post the Uni book only delete

Washington Post the Uni book only delete

Washington Post the Uni book only delete and then you burn we can access to

and then you burn we can access to

and then you burn we can access to everything we can of course you guys

everything we can of course you guys

everything we can of course you guys when you are in front of your computer

when you are in front of your computer

when you are in front of your computer during the evening you actually are in

during the evening you actually are in

during the evening you actually are in front of the screen and then you access

front of the screen and then you access

front of the screen and then you access to everything up through the internet so

to everything up through the internet so

to everything up through the internet so imagine when this happens to someone –

imagine when this happens to someone –

imagine when this happens to someone – if if our computer is access a is

if if our computer is access a is

if if our computer is access a is entered by a person who is on the other

entered by a person who is on the other

entered by a person who is on the other side of the globe it can be Russian

side of the globe it can be Russian

side of the globe it can be Russian hacker it can be a Chinese occur that

hacker it can be a Chinese occur that

hacker it can be a Chinese occur that actually knows your photos your

actually knows your photos your

actually knows your photos your documents you can write everything on

documents you can write everything on

documents you can write everything on your computer but well guys this happens

your computer but well guys this happens

your computer but well guys this happens to us and our data’s our personal

to us and our data’s our personal

to us and our data’s our personal details are very very important for us

details are very very important for us

details are very very important for us but imagine if the same thing happens to

but imagine if the same thing happens to

but imagine if the same thing happens to multinational companies imagine if they

multinational companies imagine if they

multinational companies imagine if they can even if they can enter the bank

can even if they can enter the bank

can even if they can enter the bank accounts of dismantle insurance

accounts of dismantle insurance

accounts of dismantle insurance companies they can enter the database in

companies they can enter the database in

companies they can enter the database in which there are our personal details the

which there are our personal details the

which there are our personal details the personal details of all of you and this

personal details of all of you and this

personal details of all of you and this happens very very often so maybe in this

happens very very often so maybe in this

happens very very often so maybe in this moment someone is observing the screen

moment someone is observing the screen

moment someone is observing the screen of your computer but maybe someone is

of your computer but maybe someone is

of your computer but maybe someone is observing the screen of the next layer

observing the screen of the next layer

observing the screen of the next layer database or of Zahraa and so on could

database or of Zahraa and so on could

database or of Zahraa and so on could you imagine that are you really aware of

you imagine that are you really aware of

you imagine that are you really aware of the fact the actually at the end of the

the fact the actually at the end of the

the fact the actually at the end of the day everything that we could we have in

day everything that we could we have in

day everything that we could we have in our computer is not safe technological

our computer is not safe technological

our computer is not safe technological tools are deeply unsafe or inherently

tools are deeply unsafe or inherently

tools are deeply unsafe or inherently unsafe they make our lives easier but

unsafe they make our lives easier but

unsafe they make our lives easier but today we can know we can be observed in

today we can know we can be observed in

today we can know we can be observed in every moment of our lives because we we

every moment of our lives because we we

every moment of our lives because we we have lives in our PC but let’s see some

have lives in our PC but let’s see some

have lives in our PC but let’s see some types of cyber crimes could you mention

types of cyber crimes could you mention

types of cyber crimes could you mention some types of cyber crimes

some types of cyber crimes

some types of cyber crimes well there is a leak on toxic financial

well there is a leak on toxic financial

well there is a leak on toxic financial operations cracks my boat sails through

operations cracks my boat sails through

operations cracks my boat sails through internet interaction among criminals by

internet interaction among criminals by

internet interaction among criminals by use of emails and other technological

use of emails and other technological

use of emails and other technological platforms

platforms

platforms do you know telegram telegram is very

do you know telegram telegram is very

do you know telegram telegram is very safe for terrorists and for criminal

safe for terrorists and for criminal

safe for terrorists and for criminal organization they can interact among

organization they can interact among

organization they can interact among them being very very sure about the fact

them being very very sure about the fact

them being very very sure about the fact that they are not going to be

that they are not going to be

that they are not going to be intercepted theft of password and

intercepted theft of password and

intercepted theft of password and accessing network codes unlawful

accessing network codes unlawful

accessing network codes unlawful information coming including commercial

information coming including commercial

information coming including commercial and confidential one and then of course

and confidential one and then of course

and confidential one and then of course a carrot ax Akers can do whatever they

a carrot ax Akers can do whatever they

a carrot ax Akers can do whatever they want they can access they accessed my

want they can access they accessed my

want they can access they accessed my online banking actually one time one day

online banking actually one time one day

online banking actually one time one day when I was in the United States I saw

when I was in the United States I saw

when I was in the United States I saw that actually someone was buying stuff

that actually someone was buying stuff

that actually someone was buying stuff soon amazona in Norwegian in Norway in

soon amazona in Norwegian in Norway in

soon amazona in Norwegian in Norway in Finland they just used my credit card

Finland they just used my credit card

Finland they just used my credit card and that’s it and there was a depth of

and that’s it and there was a depth of

and that’s it and there was a depth of 7600 euros on my on my credit card this

7600 euros on my on my credit card this

7600 euros on my on my credit card this is crazy but it can happen every every

is crazy but it can happen every every

is crazy but it can happen every every day of course this is a very legal

day of course this is a very legal

day of course this is a very legal problem this is a very a very very

problem this is a very a very very

problem this is a very a very very serious legal problem and you know guys

serious legal problem and you know guys

serious legal problem and you know guys there is no real legal definition

there is no real legal definition

there is no real legal definition in any law or in any regulation there is

in any law or in any regulation there is

in any law or in any regulation there is just there are just some case law of the

just there are just some case law of the

just there are just some case law of the European Commission which actually

European Commission which actually

European Commission which actually mentioned this problem and they find

mentioned this problem and they find

mentioned this problem and they find cybercrime of criminal acts that are

cybercrime of criminal acts that are

cybercrime of criminal acts that are committed online by using electronic

committed online by using electronic

committed online by using electronic communication networks and information

communication networks and information

communication networks and information systems but this is very general I mean

systems but this is very general I mean

systems but this is very general I mean it doesn’t mean anything you don’t have

it doesn’t mean anything you don’t have

it doesn’t mean anything you don’t have a piece of law a piece of written law

a piece of law a piece of written law

a piece of law a piece of written law which actually takes into a text

which actually takes into a text

which actually takes into a text seriously into consideration the problem

seriously into consideration the problem

seriously into consideration the problem of cybercrime but actually nowadays

of cybercrime but actually nowadays

of cybercrime but actually nowadays subprime is really is really a piece of

subprime is really is really a piece of

subprime is really is really a piece of criminal law can be considered as a

criminal law can be considered as a

criminal law can be considered as a piece of Korean law as itself well we

piece of Korean law as itself well we

piece of Korean law as itself well we can distinguish between three types of

can distinguish between three types of

can distinguish between three types of cybercrime three be very very broad

cybercrime three be very very broad

cybercrime three be very very broad categories first of all we have site

categories first of all we have site

categories first of all we have site crimes which are specifically related to

crimes which are specifically related to

crimes which are specifically related to the internet such as attacks against

the internet such as attacks against

the internet such as attacks against information system or phishing then we

information system or phishing then we

information system or phishing then we have the online fraud and forgery

have the online fraud and forgery

have the online fraud and forgery so large-scale fraud can be committed

so large-scale fraud can be committed

so large-scale fraud can be committed online through instruments such as

online through instruments such as

online through instruments such as identity theft fishing or spamming of

identity theft fishing or spamming of

identity theft fishing or spamming of course you receive tones of these emails

course you receive tones of these emails

course you receive tones of these emails where they ask to insert the data of

where they ask to insert the data of

where they ask to insert the data of your credit card or maybe they ask you

your credit card or maybe they ask you

your credit card or maybe they ask you to they they actually reported you to

to they they actually reported you to

to they they actually reported you to you a problem with your credit card

you a problem with your credit card

you a problem with your credit card maybe we post a pay or PayPal and so on

maybe we post a pay or PayPal and so on

maybe we post a pay or PayPal and so on I received tons and tons of this kind of

I received tons and tons of this kind of

I received tons and tons of this kind of emails

emails

emails well actually we can experience this

well actually we can experience this

well actually we can experience this kind of stuff every day and they are

kind of stuff every day and they are

kind of stuff every day and they are very dangerous because of course we can

very dangerous because of course we can

very dangerous because of course we can be smart but we can be also very further

be smart but we can be also very further

be smart but we can be also very further stupid and then there are illegal online

stupid and then there are illegal online

stupid and then there are illegal online content including pornographic material

content including pornographic material

content including pornographic material involving children inside incitement to

involving children inside incitement to

involving children inside incitement to racism an incitement to

racism an incitement to

racism an incitement to violence glorification of violence and

violence glorification of violence and

violence glorification of violence and xenophobia we experience every day even

xenophobia we experience every day even

xenophobia we experience every day even on Facebook even on Twitter the fact

on Facebook even on Twitter the fact

on Facebook even on Twitter the fact that actually actually this kind of

that actually actually this kind of

that actually actually this kind of content can be published on websites and

content can be published on websites and

content can be published on websites and social media and people sometimes are

social media and people sometimes are

social media and people sometimes are not aware of the fact that they are

not aware of the fact that they are

not aware of the fact that they are committing a crime of course it is a

committing a crime of course it is a

committing a crime of course it is a very serious problem but then we have

very serious problem but then we have

very serious problem but then we have also to take into consideration the fact

also to take into consideration the fact

also to take into consideration the fact that cyber crimes a very very specific

that cyber crimes a very very specific

that cyber crimes a very very specific characteristic first of all the

characteristic first of all the

characteristic first of all the technological device can be the aim so a

technological device can be the aim so a

technological device can be the aim so a knocker wants to access the computer in

knocker wants to access the computer in

knocker wants to access the computer in order to store all your personal data

order to store all your personal data

order to store all your personal data but then it can be also the tool of

but then it can be also the tool of

but then it can be also the tool of course as cycles cyber stalking stalking

course as cycles cyber stalking stalking

course as cycles cyber stalking stalking in the past was very difficult

in the past was very difficult

in the past was very difficult you should phone the person and you can

you should phone the person and you can

you should phone the person and you can be intercepted by the police and so on

be intercepted by the police and so on

be intercepted by the police and so on but now cyber stalking is talking this

but now cyber stalking is talking this

but now cyber stalking is talking this is is further much it more easy more

is is further much it more easy more

is is further much it more easy more easier through the internet you can just

easier through the internet you can just

easier through the internet you can just write to the victim on facebook on

write to the victim on facebook on

write to the victim on facebook on Twitter on whatsapp on telegram and so

Twitter on whatsapp on telegram and so

Twitter on whatsapp on telegram and so on and then of course of course how much

on and then of course of course how much

on and then of course of course how much of course we hear every day about by the

of course we hear every day about by the

of course we hear every day about by the pornography on the internet there are

pornography on the internet there are

pornography on the internet there are some crimes which nowadays are

some crimes which nowadays are

some crimes which nowadays are absolutely easier to be done through the

absolutely easier to be done through the

absolutely easier to be done through the internet so now we should take into

internet so now we should take into

internet so now we should take into consideration some famous cases which

consideration some famous cases which

consideration some famous cases which were very which actually are a kind of

were very which actually are a kind of

were very which actually are a kind of tricky so the first one is the Sony

tricky so the first one is the Sony

tricky so the first one is the Sony Pictures Entertainment tag so Sony a

Pictures Entertainment tag so Sony a

Pictures Entertainment tag so Sony a Sony Pictures studios were producing a

Sony Pictures studios were producing a

Sony Pictures studios were producing a movie called the interview which was

movie called the interview which was

movie called the interview which was which plot was based on the

which plot was based on the

which plot was based on the assassination of Kim Jong Hyun the

assassination of Kim Jong Hyun the

assassination of Kim Jong Hyun the dictator of North Korea actually another

dictator of North Korea actually another

dictator of North Korea actually another group called the guardians of peace

group called the guardians of peace

group called the guardians of peace leaked the damp access indict the

leaked the damp access indict the

leaked the damp access indict the database

database

database of Sony Pictures Entertainment and are

of Sony Pictures Entertainment and are

of Sony Pictures Entertainment and are we and actually access to access to to a

we and actually access to access to to a

we and actually access to access to to a very confidential report regarding sony

very confidential report regarding sony

very confidential report regarding sony Sony Pictures and regarding the creation

Sony Pictures and regarding the creation

Sony Pictures and regarding the creation of this movie

of this movie

of this movie there are many suspects about about the

there are many suspects about about the

there are many suspects about about the fact that actually the the accurate act

fact that actually the the accurate act

fact that actually the the accurate act was done by North Korea the North Korean

was done by North Korea the North Korean

was done by North Korea the North Korean government then another case is the

government then another case is the

government then another case is the Ashley Madison AK the action where is

Ashley Madison AK the action where is

Ashley Madison AK the action where is Iraq is a kind of funny but even tragic

Iraq is a kind of funny but even tragic

Iraq is a kind of funny but even tragic case have you ever heard about Ashley

case have you ever heard about Ashley

case have you ever heard about Ashley Madison well actually Ashley Madison is

Madison well actually Ashley Madison is

Madison well actually Ashley Madison is is a website which main focus is

is a website which main focus is

is a website which main focus is extramarital affairs so actually this

extramarital affairs so actually this

extramarital affairs so actually this group of actor had access and published

group of actor had access and published

group of actor had access and published the database of this website and so the

the database of this website and so the

the database of this website and so the names the surnames and the um addresses

names the surnames and the um addresses

names the surnames and the um addresses and then the declared sexual fantasies

and then the declared sexual fantasies

and then the declared sexual fantasies of those people were published on the

of those people were published on the

of those people were published on the Internet this led of course to public

Internet this led of course to public

Internet this led of course to public shame but it lets it leads also to

shame but it lets it leads also to

shame but it lets it leads also to suicide there were people who had so

suicide there were people who had so

suicide there were people who had so many troubles that actually decide

many troubles that actually decide

many troubles that actually decide themselves and then target the target

themselves and then target the target

themselves and then target the target case involved this very big

case involved this very big

case involved this very big multinational company which is very

multinational company which is very

multinational company which is very popular in North America which is target

popular in North America which is target

popular in North America which is target it is similar to Zara or IKEA or H&M and

it is similar to Zara or IKEA or H&M and

it is similar to Zara or IKEA or H&M and so the data’s and the credit cards of

so the data’s and the credit cards of

so the data’s and the credit cards of more than forty million customers were

more than forty million customers were

more than forty million customers were published and were used by these actors

published and were used by these actors

published and were used by these actors in order to make in order to buy stuffs

in order to make in order to buy stuffs

in order to make in order to buy stuffs all over the world actually target

all over the world actually target

all over the world actually target during the period between 2013 and 2014

during the period between 2013 and 2014

during the period between 2013 and 2014 had to pay damages for more than 300

had to pay damages for more than 300

had to pay damages for more than 300 millions of dollars so you can

millions of dollars so you can

millions of dollars so you can understand how even the most sensitive

understand how even the most sensitive

understand how even the most sensitive details such as the one involving

details such as the one involving

details such as the one involving extramarital affairs hurry the end of

extramarital affairs hurry the end of

extramarital affairs hurry the end of these people you should reflect that but

these people you should reflect that but

these people you should reflect that but then now if we look at the very at the

then now if we look at the very at the

then now if we look at the very at the very current situation we should take

very current situation we should take

very current situation we should take into consideration a very very dangerous

into consideration a very very dangerous

into consideration a very very dangerous phenomena such as Isis well Isis is very

phenomena such as Isis well Isis is very

phenomena such as Isis well Isis is very dangerous because actually Isis us today

dangerous because actually Isis us today

dangerous because actually Isis us today the possibility to deal with all these

the possibility to deal with all these

the possibility to deal with all these technological devices that were not

technological devices that were not

technological devices that were not existing when al-qaeda arise in 2001 in

existing when al-qaeda arise in 2001 in

existing when al-qaeda arise in 2001 in fact if you think about the 11 September

fact if you think about the 11 September

fact if you think about the 11 September attacks after the 11th September attack

attacks after the 11th September attack

attacks after the 11th September attack Osama bin Laden recorded a speech in

Osama bin Laden recorded a speech in

Osama bin Laden recorded a speech in Arabic and sent it to other Syria the

Arabic and sent it to other Syria the

Arabic and sent it to other Syria the Arabic television but you know so this

Arabic television but you know so this

Arabic television but you know so this is actually this type trip was

is actually this type trip was

is actually this type trip was transmitted on al-jazeera and that’s it

transmitted on al-jazeera and that’s it

transmitted on al-jazeera and that’s it and then some television reported it and

and then some television reported it and

and then some television reported it and so on but nowadays what Isis can do is

so on but nowadays what Isis can do is

so on but nowadays what Isis can do is to publish contents on social media such

to publish contents on social media such

to publish contents on social media such as Facebook and Twitter and then the

as Facebook and Twitter and then the

as Facebook and Twitter and then the these speeches can be translated in less

these speeches can be translated in less

these speeches can be translated in less than 10 minutes all over the world so

than 10 minutes all over the world so

than 10 minutes all over the world so this makes size is so so so dangerous

this makes size is so so so dangerous

this makes size is so so so dangerous and this is the reason why actually Isis

and this is the reason why actually Isis

and this is the reason why actually Isis is becoming so powerful because in the

is becoming so powerful because in the

is becoming so powerful because in the past when an al-qaeda was acting people

past when an al-qaeda was acting people

past when an al-qaeda was acting people had to go to Afghanistan in order to

had to go to Afghanistan in order to

had to go to Afghanistan in order to train themselves but nowadays you can

train themselves but nowadays you can

train themselves but nowadays you can train yourself even from your computer

train yourself even from your computer

train yourself even from your computer every one of you here can became an Isis

every one of you here can became an Isis

every one of you here can became an Isis terrorist you can in for example

terrorist you can in for example

terrorist you can in for example use some techniques in order to make you

use some techniques in order to make you

use some techniques in order to make you anonymous on the Internet and serve very

anonymous on the Internet and serve very

anonymous on the Internet and serve very very safely on the Internet

very safely on the Internet

very safely on the Internet so nowadays Isis is really becoming a

so nowadays Isis is really becoming a

so nowadays Isis is really becoming a media phenomenon Isis publish on the

media phenomenon Isis publish on the

media phenomenon Isis publish on the Internet

Internet

Internet comics videos cartoons and there are

comics videos cartoons and there are

comics videos cartoons and there are people who really wants to become an

people who really wants to become an

people who really wants to become an Isis supporter because at the end of the

Isis supporter because at the end of the

Isis supporter because at the end of the day there are some people even that

day there are some people even that

day there are some people even that don’t commit terrorist attacks but they

don’t commit terrorist attacks but they

don’t commit terrorist attacks but they really claim these attacks because it’s

really claim these attacks because it’s

really claim these attacks because it’s like a social status maybe for us it’s

like a social status maybe for us it’s

like a social status maybe for us it’s crazy but there are some areas and some

crazy but there are some areas and some

crazy but there are some areas and some people who really need this kind of

people who really need this kind of

people who really need this kind of stuffs in order to be recognized by the

stuffs in order to be recognized by the

stuffs in order to be recognized by the society so but now we should take into

society so but now we should take into

society so but now we should take into consideration why it is so hard to fight

consideration why it is so hard to fight

consideration why it is so hard to fight cybercrime we already understood that

cybercrime we already understood that

cybercrime we already understood that actually did actually cyber crimes are

actually did actually cyber crimes are

actually did actually cyber crimes are characterized by a real real huge trans

characterized by a real real huge trans

characterized by a real real huge trans boundary trans boundary content so

boundary trans boundary content so

boundary trans boundary content so actually the victim and the victim and

actually the victim and the victim and

actually the victim and the victim and the aggressor usually are located in

the aggressor usually are located in

the aggressor usually are located in different areas of the world and this

different areas of the world and this

different areas of the world and this makes everything easier but then there

makes everything easier but then there

makes everything easier but then there is also a problem of enforcement because

is also a problem of enforcement because

is also a problem of enforcement because as I already said as I already said from

as I already said as I already said from

as I already said as I already said from the legal point of view laws are really

the legal point of view laws are really

the legal point of view laws are really different all around the world for

different all around the world for

different all around the world for example spam is not considered a

example spam is not considered a

example spam is not considered a criminal offence in more than this in

criminal offence in more than this in

criminal offence in more than this in more than 60% of the countries of the

more than 60% of the countries of the

more than 60% of the countries of the world so there are some countries in

world so there are some countries in

world so there are some countries in which you can go to jail for spamming

which you can go to jail for spamming

which you can go to jail for spamming but there are some countries in which

but there are some countries in which

but there are some countries in which you have just to pay a fine and then of

you have just to pay a fine and then of

you have just to pay a fine and then of course there is also a police problem

course there is also a police problem

course there is also a police problem because you have to coordinate all the

because you have to coordinate all the

because you have to coordinate all the effort and this is very expensive and

effort and this is very expensive and

effort and this is very expensive and then which is the other reason why

then which is the other reason why

then which is the other reason why fighting against cybercrime is so

fighting against cybercrime is so

fighting against cybercrime is so difficult because the web is huge it

difficult because the web is huge it

difficult because the web is huge it tends to infinity I’ve never heard about

tends to infinity I’ve never heard about

tends to infinity I’ve never heard about the Deep Web in the dark web

the Deep Web in the dark web

the Deep Web in the dark web so actually you should imagine the web

so actually you should imagine the web

so actually you should imagine the web as a nice burger and the web that we

as a nice burger and the web that we

as a nice burger and the web that we access every day actually is just the

access every day actually is just the

access every day actually is just the top of this iceberg because if you use

top of this iceberg because if you use

top of this iceberg because if you use some software’s such as you are you can

some software’s such as you are you can

some software’s such as you are you can actually go on anima slee on the

actually go on anima slee on the

actually go on anima slee on the internet and serve a very very secret

internet and serve a very very secret

internet and serve a very very secret part of the web because you know

part of the web because you know

part of the web because you know potentially the Internet service

potentially the Internet service

potentially the Internet service provider who is the guy with the person

provider who is the guy with the person

provider who is the guy with the person with the company which actually every

with the company which actually every

with the company which actually every day has the control of when and where

day has the control of when and where

day has the control of when and where people exist on the internet if you

people exist on the internet if you

people exist on the internet if you normally go on the Internet the internet

normally go on the Internet the internet

normally go on the Internet the internet service provider actually knows when and

service provider actually knows when and

service provider actually knows when and where you are going on the Internet

where you are going on the Internet

where you are going on the Internet but if you use this software which is

but if you use this software which is

but if you use this software which is called the tio are you can access the

called the tio are you can access the

called the tio are you can access the Internet Angra and actually you can hide

Internet Angra and actually you can hide

Internet Angra and actually you can hide your IP number so since you have hide

your IP number so since you have hide

your IP number so since you have hide your IP number you can just enter this

your IP number you can just enter this

your IP number you can just enter this part of the web which is totally secret

part of the web which is totally secret

part of the web which is totally secret at the first step you can find your

at the first step you can find your

at the first step you can find your personal details so very basically even

personal details so very basically even

personal details so very basically even your email or your or your bank account

your email or your or your bank account

your email or your or your bank account is part of the Deep Web because it’s

is part of the Deep Web because it’s

is part of the Deep Web because it’s something that can be accessed only

something that can be accessed only

something that can be accessed only through the use of password so it cannot

through the use of password so it cannot

through the use of password so it cannot be inducted by a normal search engine

be inducted by a normal search engine

be inducted by a normal search engine but then if you go step by step if you

but then if you go step by step if you

but then if you go step by step if you go to the bottom of the iceberg you can

go to the bottom of the iceberg you can

go to the bottom of the iceberg you can find the unthinkable you can find you

find the unthinkable you can find you

find the unthinkable you can find you can buy drugs you can buy weapons you

can buy drugs you can buy weapons you

can buy drugs you can buy weapons you can buy people the Deep Web is used by

can buy people the Deep Web is used by

can buy people the Deep Web is used by Isis and

Isis and

Isis and women organization in order in order to

women organization in order in order to

women organization in order in order to empower human trafficking so guys this

empower human trafficking so guys this

empower human trafficking so guys this is just these are just some tips in

is just these are just some tips in

is just these are just some tips in order to understand how useful is

order to understand how useful is

order to understand how useful is technologies

technologies

technologies technology makes our lives easier of

technology makes our lives easier of

technology makes our lives easier of course we cannot live without

course we cannot live without

course we cannot live without technologies today if you want to use

technologies today if you want to use

technologies today if you want to use car sharing if you want to if you want

car sharing if you want to if you want

car sharing if you want to if you want to see your marks at the at the final

to see your marks at the at the final

to see your marks at the at the final exam of course we cannot live without

exam of course we cannot live without

exam of course we cannot live without technology but you have to take into

technology but you have to take into

technology but you have to take into consideration the top of all this

consideration the top of all this

consideration the top of all this information one day can be used against

information one day can be used against

information one day can be used against of you so be aware about the fact that

of you so be aware about the fact that

of you so be aware about the fact that everything that we are doing even this

everything that we are doing even this

everything that we are doing even this video is going to remain on the web and

video is going to remain on the web and

video is going to remain on the web and everyone can use it against me

everyone can use it against me

everyone can use it against me every day in every moment of the life I

every day in every moment of the life I

every day in every moment of the life I don’t know maybe my one day when I’m

don’t know maybe my one day when I’m

don’t know maybe my one day when I’m going to work somewhere this is going to

going to work somewhere this is going to

going to work somewhere this is going to be this is going to be not appreciated

be this is going to be not appreciated

be this is going to be not appreciated by someone so I hope that my speech was

by someone so I hope that my speech was

by someone so I hope that my speech was interesting and thank you very much and

interesting and thank you very much and

interesting and thank you very much and now we open the floor to the debate