with living guys so I will start with a
with living guys so I will start with a very easy question to you how many of
very easy question to you how many of
very easy question to you how many of you here own a computer
you here own a computer
you here own a computer don’t be shy okay this is exactly what I
don’t be shy okay this is exactly what I
don’t be shy okay this is exactly what I expected
expected
expected well you know today in our computers we
well you know today in our computers we
well you know today in our computers we contain our lives we have photos we have
contain our lives we have photos we have
contain our lives we have photos we have documents with everything in our
documents with everything in our
documents with everything in our computers imagine if someone can steal
computers imagine if someone can steal
computers imagine if someone can steal your computer imagine if someone can own
your computer imagine if someone can own
your computer imagine if someone can own everything that you contain in your
everything that you contain in your
everything that you contain in your computer imagine for example a knocker
computer imagine for example a knocker
computer imagine for example a knocker that can I have access to your browser
that can I have access to your browser
that can I have access to your browser history of course in our daily life we
history of course in our daily life we
history of course in our daily life we can visit the Financial Times The
can visit the Financial Times The
can visit the Financial Times The Washington Post the Uni book only delete
Washington Post the Uni book only delete
Washington Post the Uni book only delete and then you burn we can access to
and then you burn we can access to
and then you burn we can access to everything we can of course you guys
everything we can of course you guys
everything we can of course you guys when you are in front of your computer
when you are in front of your computer
when you are in front of your computer during the evening you actually are in
during the evening you actually are in
during the evening you actually are in front of the screen and then you access
front of the screen and then you access
front of the screen and then you access to everything up through the internet so
to everything up through the internet so
to everything up through the internet so imagine when this happens to someone –
imagine when this happens to someone –
imagine when this happens to someone – if if our computer is access a is
if if our computer is access a is
if if our computer is access a is entered by a person who is on the other
entered by a person who is on the other
entered by a person who is on the other side of the globe it can be Russian
side of the globe it can be Russian
side of the globe it can be Russian hacker it can be a Chinese occur that
hacker it can be a Chinese occur that
hacker it can be a Chinese occur that actually knows your photos your
actually knows your photos your
actually knows your photos your documents you can write everything on
documents you can write everything on
documents you can write everything on your computer but well guys this happens
your computer but well guys this happens
your computer but well guys this happens to us and our data’s our personal
to us and our data’s our personal
to us and our data’s our personal details are very very important for us
details are very very important for us
details are very very important for us but imagine if the same thing happens to
but imagine if the same thing happens to
but imagine if the same thing happens to multinational companies imagine if they
multinational companies imagine if they
multinational companies imagine if they can even if they can enter the bank
can even if they can enter the bank
can even if they can enter the bank accounts of dismantle insurance
accounts of dismantle insurance
accounts of dismantle insurance companies they can enter the database in
companies they can enter the database in
companies they can enter the database in which there are our personal details the
which there are our personal details the
which there are our personal details the personal details of all of you and this
personal details of all of you and this
personal details of all of you and this happens very very often so maybe in this
happens very very often so maybe in this
happens very very often so maybe in this moment someone is observing the screen
moment someone is observing the screen
moment someone is observing the screen of your computer but maybe someone is
of your computer but maybe someone is
of your computer but maybe someone is observing the screen of the next layer
observing the screen of the next layer
observing the screen of the next layer database or of Zahraa and so on could
database or of Zahraa and so on could
database or of Zahraa and so on could you imagine that are you really aware of
you imagine that are you really aware of
you imagine that are you really aware of the fact the actually at the end of the
the fact the actually at the end of the
the fact the actually at the end of the day everything that we could we have in
day everything that we could we have in
day everything that we could we have in our computer is not safe technological
our computer is not safe technological
our computer is not safe technological tools are deeply unsafe or inherently
tools are deeply unsafe or inherently
tools are deeply unsafe or inherently unsafe they make our lives easier but
unsafe they make our lives easier but
unsafe they make our lives easier but today we can know we can be observed in
today we can know we can be observed in
today we can know we can be observed in every moment of our lives because we we
every moment of our lives because we we
every moment of our lives because we we have lives in our PC but let’s see some
have lives in our PC but let’s see some
have lives in our PC but let’s see some types of cyber crimes could you mention
types of cyber crimes could you mention
types of cyber crimes could you mention some types of cyber crimes
some types of cyber crimes
some types of cyber crimes well there is a leak on toxic financial
well there is a leak on toxic financial
well there is a leak on toxic financial operations cracks my boat sails through
operations cracks my boat sails through
operations cracks my boat sails through internet interaction among criminals by
internet interaction among criminals by
internet interaction among criminals by use of emails and other technological
use of emails and other technological
use of emails and other technological platforms
platforms
platforms do you know telegram telegram is very
do you know telegram telegram is very
do you know telegram telegram is very safe for terrorists and for criminal
safe for terrorists and for criminal
safe for terrorists and for criminal organization they can interact among
organization they can interact among
organization they can interact among them being very very sure about the fact
them being very very sure about the fact
them being very very sure about the fact that they are not going to be
that they are not going to be
that they are not going to be intercepted theft of password and
intercepted theft of password and
intercepted theft of password and accessing network codes unlawful
accessing network codes unlawful
accessing network codes unlawful information coming including commercial
information coming including commercial
information coming including commercial and confidential one and then of course
and confidential one and then of course
and confidential one and then of course a carrot ax Akers can do whatever they
a carrot ax Akers can do whatever they
a carrot ax Akers can do whatever they want they can access they accessed my
want they can access they accessed my
want they can access they accessed my online banking actually one time one day
online banking actually one time one day
online banking actually one time one day when I was in the United States I saw
when I was in the United States I saw
when I was in the United States I saw that actually someone was buying stuff
that actually someone was buying stuff
that actually someone was buying stuff soon amazona in Norwegian in Norway in
soon amazona in Norwegian in Norway in
soon amazona in Norwegian in Norway in Finland they just used my credit card
Finland they just used my credit card
Finland they just used my credit card and that’s it and there was a depth of
and that’s it and there was a depth of
and that’s it and there was a depth of 7600 euros on my on my credit card this
7600 euros on my on my credit card this
7600 euros on my on my credit card this is crazy but it can happen every every
is crazy but it can happen every every
is crazy but it can happen every every day of course this is a very legal
day of course this is a very legal
day of course this is a very legal problem this is a very a very very
problem this is a very a very very
problem this is a very a very very serious legal problem and you know guys
serious legal problem and you know guys
serious legal problem and you know guys there is no real legal definition
there is no real legal definition
there is no real legal definition in any law or in any regulation there is
in any law or in any regulation there is
in any law or in any regulation there is just there are just some case law of the
just there are just some case law of the
just there are just some case law of the European Commission which actually
European Commission which actually
European Commission which actually mentioned this problem and they find
mentioned this problem and they find
mentioned this problem and they find cybercrime of criminal acts that are
cybercrime of criminal acts that are
cybercrime of criminal acts that are committed online by using electronic
committed online by using electronic
committed online by using electronic communication networks and information
communication networks and information
communication networks and information systems but this is very general I mean
systems but this is very general I mean
systems but this is very general I mean it doesn’t mean anything you don’t have
it doesn’t mean anything you don’t have
it doesn’t mean anything you don’t have a piece of law a piece of written law
a piece of law a piece of written law
a piece of law a piece of written law which actually takes into a text
which actually takes into a text
which actually takes into a text seriously into consideration the problem
seriously into consideration the problem
seriously into consideration the problem of cybercrime but actually nowadays
of cybercrime but actually nowadays
of cybercrime but actually nowadays subprime is really is really a piece of
subprime is really is really a piece of
subprime is really is really a piece of criminal law can be considered as a
criminal law can be considered as a
criminal law can be considered as a piece of Korean law as itself well we
piece of Korean law as itself well we
piece of Korean law as itself well we can distinguish between three types of
can distinguish between three types of
can distinguish between three types of cybercrime three be very very broad
cybercrime three be very very broad
cybercrime three be very very broad categories first of all we have site
categories first of all we have site
categories first of all we have site crimes which are specifically related to
crimes which are specifically related to
crimes which are specifically related to the internet such as attacks against
the internet such as attacks against
the internet such as attacks against information system or phishing then we
information system or phishing then we
information system or phishing then we have the online fraud and forgery
have the online fraud and forgery
have the online fraud and forgery so large-scale fraud can be committed
so large-scale fraud can be committed
so large-scale fraud can be committed online through instruments such as
online through instruments such as
online through instruments such as identity theft fishing or spamming of
identity theft fishing or spamming of
identity theft fishing or spamming of course you receive tones of these emails
course you receive tones of these emails
course you receive tones of these emails where they ask to insert the data of
where they ask to insert the data of
where they ask to insert the data of your credit card or maybe they ask you
your credit card or maybe they ask you
your credit card or maybe they ask you to they they actually reported you to
to they they actually reported you to
to they they actually reported you to you a problem with your credit card
you a problem with your credit card
you a problem with your credit card maybe we post a pay or PayPal and so on
maybe we post a pay or PayPal and so on
maybe we post a pay or PayPal and so on I received tons and tons of this kind of
I received tons and tons of this kind of
I received tons and tons of this kind of emails
emails
emails well actually we can experience this
well actually we can experience this
well actually we can experience this kind of stuff every day and they are
kind of stuff every day and they are
kind of stuff every day and they are very dangerous because of course we can
very dangerous because of course we can
very dangerous because of course we can be smart but we can be also very further
be smart but we can be also very further
be smart but we can be also very further stupid and then there are illegal online
stupid and then there are illegal online
stupid and then there are illegal online content including pornographic material
content including pornographic material
content including pornographic material involving children inside incitement to
involving children inside incitement to
involving children inside incitement to racism an incitement to
racism an incitement to
racism an incitement to violence glorification of violence and
violence glorification of violence and
violence glorification of violence and xenophobia we experience every day even
xenophobia we experience every day even
xenophobia we experience every day even on Facebook even on Twitter the fact
on Facebook even on Twitter the fact
on Facebook even on Twitter the fact that actually actually this kind of
that actually actually this kind of
that actually actually this kind of content can be published on websites and
content can be published on websites and
content can be published on websites and social media and people sometimes are
social media and people sometimes are
social media and people sometimes are not aware of the fact that they are
not aware of the fact that they are
not aware of the fact that they are committing a crime of course it is a
committing a crime of course it is a
committing a crime of course it is a very serious problem but then we have
very serious problem but then we have
very serious problem but then we have also to take into consideration the fact
also to take into consideration the fact
also to take into consideration the fact that cyber crimes a very very specific
that cyber crimes a very very specific
that cyber crimes a very very specific characteristic first of all the
characteristic first of all the
characteristic first of all the technological device can be the aim so a
technological device can be the aim so a
technological device can be the aim so a knocker wants to access the computer in
knocker wants to access the computer in
knocker wants to access the computer in order to store all your personal data
order to store all your personal data
order to store all your personal data but then it can be also the tool of
but then it can be also the tool of
but then it can be also the tool of course as cycles cyber stalking stalking
course as cycles cyber stalking stalking
course as cycles cyber stalking stalking in the past was very difficult
in the past was very difficult
in the past was very difficult you should phone the person and you can
you should phone the person and you can
you should phone the person and you can be intercepted by the police and so on
be intercepted by the police and so on
be intercepted by the police and so on but now cyber stalking is talking this
but now cyber stalking is talking this
but now cyber stalking is talking this is is further much it more easy more
is is further much it more easy more
is is further much it more easy more easier through the internet you can just
easier through the internet you can just
easier through the internet you can just write to the victim on facebook on
write to the victim on facebook on
write to the victim on facebook on Twitter on whatsapp on telegram and so
Twitter on whatsapp on telegram and so
Twitter on whatsapp on telegram and so on and then of course of course how much
on and then of course of course how much
on and then of course of course how much of course we hear every day about by the
of course we hear every day about by the
of course we hear every day about by the pornography on the internet there are
pornography on the internet there are
pornography on the internet there are some crimes which nowadays are
some crimes which nowadays are
some crimes which nowadays are absolutely easier to be done through the
absolutely easier to be done through the
absolutely easier to be done through the internet so now we should take into
internet so now we should take into
internet so now we should take into consideration some famous cases which
consideration some famous cases which
consideration some famous cases which were very which actually are a kind of
were very which actually are a kind of
were very which actually are a kind of tricky so the first one is the Sony
tricky so the first one is the Sony
tricky so the first one is the Sony Pictures Entertainment tag so Sony a
Pictures Entertainment tag so Sony a
Pictures Entertainment tag so Sony a Sony Pictures studios were producing a
Sony Pictures studios were producing a
Sony Pictures studios were producing a movie called the interview which was
movie called the interview which was
movie called the interview which was which plot was based on the
which plot was based on the
which plot was based on the assassination of Kim Jong Hyun the
assassination of Kim Jong Hyun the
assassination of Kim Jong Hyun the dictator of North Korea actually another
dictator of North Korea actually another
dictator of North Korea actually another group called the guardians of peace
group called the guardians of peace
group called the guardians of peace leaked the damp access indict the
leaked the damp access indict the
leaked the damp access indict the database
database
database of Sony Pictures Entertainment and are
of Sony Pictures Entertainment and are
of Sony Pictures Entertainment and are we and actually access to access to to a
we and actually access to access to to a
we and actually access to access to to a very confidential report regarding sony
very confidential report regarding sony
very confidential report regarding sony Sony Pictures and regarding the creation
Sony Pictures and regarding the creation
Sony Pictures and regarding the creation of this movie
of this movie
of this movie there are many suspects about about the
there are many suspects about about the
there are many suspects about about the fact that actually the the accurate act
fact that actually the the accurate act
fact that actually the the accurate act was done by North Korea the North Korean
was done by North Korea the North Korean
was done by North Korea the North Korean government then another case is the
government then another case is the
government then another case is the Ashley Madison AK the action where is
Ashley Madison AK the action where is
Ashley Madison AK the action where is Iraq is a kind of funny but even tragic
Iraq is a kind of funny but even tragic
Iraq is a kind of funny but even tragic case have you ever heard about Ashley
case have you ever heard about Ashley
case have you ever heard about Ashley Madison well actually Ashley Madison is
Madison well actually Ashley Madison is
Madison well actually Ashley Madison is is a website which main focus is
is a website which main focus is
is a website which main focus is extramarital affairs so actually this
extramarital affairs so actually this
extramarital affairs so actually this group of actor had access and published
group of actor had access and published
group of actor had access and published the database of this website and so the
the database of this website and so the
the database of this website and so the names the surnames and the um addresses
names the surnames and the um addresses
names the surnames and the um addresses and then the declared sexual fantasies
and then the declared sexual fantasies
and then the declared sexual fantasies of those people were published on the
of those people were published on the
of those people were published on the Internet this led of course to public
Internet this led of course to public
Internet this led of course to public shame but it lets it leads also to
shame but it lets it leads also to
shame but it lets it leads also to suicide there were people who had so
suicide there were people who had so
suicide there were people who had so many troubles that actually decide
many troubles that actually decide
many troubles that actually decide themselves and then target the target
themselves and then target the target
themselves and then target the target case involved this very big
case involved this very big
case involved this very big multinational company which is very
multinational company which is very
multinational company which is very popular in North America which is target
popular in North America which is target
popular in North America which is target it is similar to Zara or IKEA or H&M and
it is similar to Zara or IKEA or H&M and
it is similar to Zara or IKEA or H&M and so the data’s and the credit cards of
so the data’s and the credit cards of
so the data’s and the credit cards of more than forty million customers were
more than forty million customers were
more than forty million customers were published and were used by these actors
published and were used by these actors
published and were used by these actors in order to make in order to buy stuffs
in order to make in order to buy stuffs
in order to make in order to buy stuffs all over the world actually target
all over the world actually target
all over the world actually target during the period between 2013 and 2014
during the period between 2013 and 2014
during the period between 2013 and 2014 had to pay damages for more than 300
had to pay damages for more than 300
had to pay damages for more than 300 millions of dollars so you can
millions of dollars so you can
millions of dollars so you can understand how even the most sensitive
understand how even the most sensitive
understand how even the most sensitive details such as the one involving
details such as the one involving
details such as the one involving extramarital affairs hurry the end of
extramarital affairs hurry the end of
extramarital affairs hurry the end of these people you should reflect that but
these people you should reflect that but
these people you should reflect that but then now if we look at the very at the
then now if we look at the very at the
then now if we look at the very at the very current situation we should take
very current situation we should take
very current situation we should take into consideration a very very dangerous
into consideration a very very dangerous
into consideration a very very dangerous phenomena such as Isis well Isis is very
phenomena such as Isis well Isis is very
phenomena such as Isis well Isis is very dangerous because actually Isis us today
dangerous because actually Isis us today
dangerous because actually Isis us today the possibility to deal with all these
the possibility to deal with all these
the possibility to deal with all these technological devices that were not
technological devices that were not
technological devices that were not existing when al-qaeda arise in 2001 in
existing when al-qaeda arise in 2001 in
existing when al-qaeda arise in 2001 in fact if you think about the 11 September
fact if you think about the 11 September
fact if you think about the 11 September attacks after the 11th September attack
attacks after the 11th September attack
attacks after the 11th September attack Osama bin Laden recorded a speech in
Osama bin Laden recorded a speech in
Osama bin Laden recorded a speech in Arabic and sent it to other Syria the
Arabic and sent it to other Syria the
Arabic and sent it to other Syria the Arabic television but you know so this
Arabic television but you know so this
Arabic television but you know so this is actually this type trip was
is actually this type trip was
is actually this type trip was transmitted on al-jazeera and that’s it
transmitted on al-jazeera and that’s it
transmitted on al-jazeera and that’s it and then some television reported it and
and then some television reported it and
and then some television reported it and so on but nowadays what Isis can do is
so on but nowadays what Isis can do is
so on but nowadays what Isis can do is to publish contents on social media such
to publish contents on social media such
to publish contents on social media such as Facebook and Twitter and then the
as Facebook and Twitter and then the
as Facebook and Twitter and then the these speeches can be translated in less
these speeches can be translated in less
these speeches can be translated in less than 10 minutes all over the world so
than 10 minutes all over the world so
than 10 minutes all over the world so this makes size is so so so dangerous
this makes size is so so so dangerous
this makes size is so so so dangerous and this is the reason why actually Isis
and this is the reason why actually Isis
and this is the reason why actually Isis is becoming so powerful because in the
is becoming so powerful because in the
is becoming so powerful because in the past when an al-qaeda was acting people
past when an al-qaeda was acting people
past when an al-qaeda was acting people had to go to Afghanistan in order to
had to go to Afghanistan in order to
had to go to Afghanistan in order to train themselves but nowadays you can
train themselves but nowadays you can
train themselves but nowadays you can train yourself even from your computer
train yourself even from your computer
train yourself even from your computer every one of you here can became an Isis
every one of you here can became an Isis
every one of you here can became an Isis terrorist you can in for example
terrorist you can in for example
terrorist you can in for example use some techniques in order to make you
use some techniques in order to make you
use some techniques in order to make you anonymous on the Internet and serve very
anonymous on the Internet and serve very
anonymous on the Internet and serve very very safely on the Internet
very safely on the Internet
very safely on the Internet so nowadays Isis is really becoming a
so nowadays Isis is really becoming a
so nowadays Isis is really becoming a media phenomenon Isis publish on the
media phenomenon Isis publish on the
media phenomenon Isis publish on the Internet
Internet
Internet comics videos cartoons and there are
comics videos cartoons and there are
comics videos cartoons and there are people who really wants to become an
people who really wants to become an
people who really wants to become an Isis supporter because at the end of the
Isis supporter because at the end of the
Isis supporter because at the end of the day there are some people even that
day there are some people even that
day there are some people even that don’t commit terrorist attacks but they
don’t commit terrorist attacks but they
don’t commit terrorist attacks but they really claim these attacks because it’s
really claim these attacks because it’s
really claim these attacks because it’s like a social status maybe for us it’s
like a social status maybe for us it’s
like a social status maybe for us it’s crazy but there are some areas and some
crazy but there are some areas and some
crazy but there are some areas and some people who really need this kind of
people who really need this kind of
people who really need this kind of stuffs in order to be recognized by the
stuffs in order to be recognized by the
stuffs in order to be recognized by the society so but now we should take into
society so but now we should take into
society so but now we should take into consideration why it is so hard to fight
consideration why it is so hard to fight
consideration why it is so hard to fight cybercrime we already understood that
cybercrime we already understood that
cybercrime we already understood that actually did actually cyber crimes are
actually did actually cyber crimes are
actually did actually cyber crimes are characterized by a real real huge trans
characterized by a real real huge trans
characterized by a real real huge trans boundary trans boundary content so
boundary trans boundary content so
boundary trans boundary content so actually the victim and the victim and
actually the victim and the victim and
actually the victim and the victim and the aggressor usually are located in
the aggressor usually are located in
the aggressor usually are located in different areas of the world and this
different areas of the world and this
different areas of the world and this makes everything easier but then there
makes everything easier but then there
makes everything easier but then there is also a problem of enforcement because
is also a problem of enforcement because
is also a problem of enforcement because as I already said as I already said from
as I already said as I already said from
as I already said as I already said from the legal point of view laws are really
the legal point of view laws are really
the legal point of view laws are really different all around the world for
different all around the world for
different all around the world for example spam is not considered a
example spam is not considered a
example spam is not considered a criminal offence in more than this in
criminal offence in more than this in
criminal offence in more than this in more than 60% of the countries of the
more than 60% of the countries of the
more than 60% of the countries of the world so there are some countries in
world so there are some countries in
world so there are some countries in which you can go to jail for spamming
which you can go to jail for spamming
which you can go to jail for spamming but there are some countries in which
but there are some countries in which
but there are some countries in which you have just to pay a fine and then of
you have just to pay a fine and then of
you have just to pay a fine and then of course there is also a police problem
course there is also a police problem
course there is also a police problem because you have to coordinate all the
because you have to coordinate all the
because you have to coordinate all the effort and this is very expensive and
effort and this is very expensive and
effort and this is very expensive and then which is the other reason why
then which is the other reason why
then which is the other reason why fighting against cybercrime is so
fighting against cybercrime is so
fighting against cybercrime is so difficult because the web is huge it
difficult because the web is huge it
difficult because the web is huge it tends to infinity I’ve never heard about
tends to infinity I’ve never heard about
tends to infinity I’ve never heard about the Deep Web in the dark web
the Deep Web in the dark web
the Deep Web in the dark web so actually you should imagine the web
so actually you should imagine the web
so actually you should imagine the web as a nice burger and the web that we
as a nice burger and the web that we
as a nice burger and the web that we access every day actually is just the
access every day actually is just the
access every day actually is just the top of this iceberg because if you use
top of this iceberg because if you use
top of this iceberg because if you use some software’s such as you are you can
some software’s such as you are you can
some software’s such as you are you can actually go on anima slee on the
actually go on anima slee on the
actually go on anima slee on the internet and serve a very very secret
internet and serve a very very secret
internet and serve a very very secret part of the web because you know
part of the web because you know
part of the web because you know potentially the Internet service
potentially the Internet service
potentially the Internet service provider who is the guy with the person
provider who is the guy with the person
provider who is the guy with the person with the company which actually every
with the company which actually every
with the company which actually every day has the control of when and where
day has the control of when and where
day has the control of when and where people exist on the internet if you
people exist on the internet if you
people exist on the internet if you normally go on the Internet the internet
normally go on the Internet the internet
normally go on the Internet the internet service provider actually knows when and
service provider actually knows when and
service provider actually knows when and where you are going on the Internet
where you are going on the Internet
where you are going on the Internet but if you use this software which is
but if you use this software which is
but if you use this software which is called the tio are you can access the
called the tio are you can access the
called the tio are you can access the Internet Angra and actually you can hide
Internet Angra and actually you can hide
Internet Angra and actually you can hide your IP number so since you have hide
your IP number so since you have hide
your IP number so since you have hide your IP number you can just enter this
your IP number you can just enter this
your IP number you can just enter this part of the web which is totally secret
part of the web which is totally secret
part of the web which is totally secret at the first step you can find your
at the first step you can find your
at the first step you can find your personal details so very basically even
personal details so very basically even
personal details so very basically even your email or your or your bank account
your email or your or your bank account
your email or your or your bank account is part of the Deep Web because it’s
is part of the Deep Web because it’s
is part of the Deep Web because it’s something that can be accessed only
something that can be accessed only
something that can be accessed only through the use of password so it cannot
through the use of password so it cannot
through the use of password so it cannot be inducted by a normal search engine
be inducted by a normal search engine
be inducted by a normal search engine but then if you go step by step if you
but then if you go step by step if you
but then if you go step by step if you go to the bottom of the iceberg you can
go to the bottom of the iceberg you can
go to the bottom of the iceberg you can find the unthinkable you can find you
find the unthinkable you can find you
find the unthinkable you can find you can buy drugs you can buy weapons you
can buy drugs you can buy weapons you
can buy drugs you can buy weapons you can buy people the Deep Web is used by
can buy people the Deep Web is used by
can buy people the Deep Web is used by Isis and
Isis and
Isis and women organization in order in order to
women organization in order in order to
women organization in order in order to empower human trafficking so guys this
empower human trafficking so guys this
empower human trafficking so guys this is just these are just some tips in
is just these are just some tips in
is just these are just some tips in order to understand how useful is
order to understand how useful is
order to understand how useful is technologies
technologies
technologies technology makes our lives easier of
technology makes our lives easier of
technology makes our lives easier of course we cannot live without
course we cannot live without
course we cannot live without technologies today if you want to use
technologies today if you want to use
technologies today if you want to use car sharing if you want to if you want
car sharing if you want to if you want
car sharing if you want to if you want to see your marks at the at the final
to see your marks at the at the final
to see your marks at the at the final exam of course we cannot live without
exam of course we cannot live without
exam of course we cannot live without technology but you have to take into
technology but you have to take into
technology but you have to take into consideration the top of all this
consideration the top of all this
consideration the top of all this information one day can be used against
information one day can be used against
information one day can be used against of you so be aware about the fact that
of you so be aware about the fact that
of you so be aware about the fact that everything that we are doing even this
everything that we are doing even this
everything that we are doing even this video is going to remain on the web and
video is going to remain on the web and
video is going to remain on the web and everyone can use it against me
everyone can use it against me
everyone can use it against me every day in every moment of the life I
every day in every moment of the life I
every day in every moment of the life I don’t know maybe my one day when I’m
don’t know maybe my one day when I’m
don’t know maybe my one day when I’m going to work somewhere this is going to
going to work somewhere this is going to
going to work somewhere this is going to be this is going to be not appreciated
be this is going to be not appreciated
be this is going to be not appreciated by someone so I hope that my speech was
by someone so I hope that my speech was
by someone so I hope that my speech was interesting and thank you very much and
interesting and thank you very much and
interesting and thank you very much and now we open the floor to the debate