vimarsana.com
Home
Live Updates
Transcripts For DW Made In Germany 20190410 15:30:00 : vimar
Transcripts For DW Made In Germany 20190410 15:30:00 : vimar
DW Made In Germany April 10, 2019 15:30:00
Think the roofs. Whitfield and stephanie strong. Party in chat with musicians from around the world. Make grooves every week. Now these guys might try to look scary but honestly theyre so
Nine Hundred Ninety
todays criminals dont need massed stroll bars or guns to get their hands on your cash the requirements for brazen burglars nowadays include a computer a solid wife i connection and preferably some coding skills welcome to made where our topic this week is cyber crime a first report takes us to the philippines where a ring of online fraudsters was busted last year and a massive operation the perpetrators exploited peoples hopes dreams and greed and sweet talk them into handing over shoot sums of cash. On june sixth twenty eighteen a
Special Police Unit
raided a call center near manila and detained almost five hundred people working there. The outfit was allegedly involved in a scam that cost unwitting people around the world hundreds of millions of dollars. Theyd all received a phone
Call Campaign
where you get. A small amount of the from. The other. An elevator or the brick wall they get. There. And that is that the whole make model. A former member of staff turned whistleblower and told the
Philippine National
police and the
Cyber Crime Group
how the scheme operated. The police then spent months gathering evidence before moving in and shutting the operation down. They money for people who are showing interest to invest so they receive emails that if they want the best they can they they can provide assistance such first day we offer. Minimum of
Two Hundred Fifty
dollars us dollars us as the start of the investment they will see their money growing from day to day and when they show interest on investing more does the find that they will for thats. The people accused of running the scam come from israel and twenty sixteen they set up the call center in the philippines called marketing the operators allegedly persuaded elderly people in south
Africa New Zealand
and australia to invest in nonexistent assets and in the process gained access to their bank details money from the scam ended up in a bank account in denmark none of it has been returned. In a moment it took time for some of the cole
Center Operators
to realise they were involved in a scheme to rip people off. But i mean that in order reselling it we werent selling anything that. The agents were selling dreams thats what the company said. We were supposed to encourage clients to make a deposit to invest. In manila alone around
Five Thousand
cyber crimes are reported to the police every year. Its hard for even the specialist unit to keep up with what the scammers are doing their tricks are evolving all the time. So its really a difficult case not only this case but most of most of the cyber crime cases its something new from the
Law Enforcement
do to the judge just the to the prosecutors its something new. According to one estimate and twenty seventeen close to a billion people worldwide were cheated out of around
One Hundred Forty Six Billion
europes common tricks include
Stealing Passwords
by means of
Phishing Emails
setting up fake online
Investment Platforms
where potential targets leave their names and
Phone Numbers
direct tacking into computers and networks and online romance scams which in the u. S. Cost victims some one hundred twenty seven
Million Euros
last year the thing is are you buying into the right people are you investing to the right people are you investing for the right company is or the company youre only having your concessions on like you dont see these people you dont see them in person you dont know where they are thats the characteristic of. You know. So i think its the reason why theres a lot of big names of cyber crime in investment. The dark depths of the internet thats for
Cyber Criminals
usually hide sometimes they break into your computer directly that requires a fair bit of know how and thats where the hacker comes that the stereotype is the skilled
Computer Whiz Kid
for whom a fire wall is just another hurdle to hop over but who are hackers really and what motivates them we broke it down for you take a look. Hackers are they good or bad in
One Thousand Nine Hundred Two
in the us a group of six teenagers calling themselves the four one force broke into some of the countrys classified
Computer Systems
including one that a
Nuclear Weapons
research lab. Public was alarmed the f. B. I. Investigators and the perpetrators were identified. Some of them went on trial for the intrusions and the term hacking began to be associated with crime. But hackers are not all inherently bad the
Computer Security
scene differentiates between good hackers and bad ones white hats have a legitimate agenda for instance they look for
Security Flaws
in
Computer Systems
to reveal all correct them. Gray hat hackers havent quite made their minds up they search for vulnerabilities and systems and occasionally exploit them. The black cats are bad theyre often motivated by greed to damage
Computer Systems
or steal data. Like in the
Two Thousand And Eight
cyber attack on one of the worlds biggest
Payment Processors
the hackers in that case wrote their own software smuggled it into the payment firms
Computer System
and made off with up to
One Hundred Thirty Million
credit card numbers. But distinguishing the color of a hackers hat isnt always easy when it comes to hacking whats right and whats legal is not always clear cut. Sometimes illegal behavior can end up revealing other illegal behavior. A good example of this is the panama paper scandal in it gray hat hackers accessed millions of documents illegally then they used them to expose tax evasion and fraud by well known and influential people. Back in
One Thousand Nine Hundred Two
with the four one for hacking was in its infancy now its become a massive its you in a digital networked world. And in a
Virtual World
just as in the real one the
Dividing Line
between good and bad sometimes very hard to define. Now when
Companies Get
hacked it can cost them dearly not only if
Sensitive Data
gets stolen but also because huge amounts of share value can be wiped out estimates say that the global cost of cyber crime related incidents currently amounts to some five trillion euros a year access to sensitive
Corporate Information
can occur through
Spongy Fire Walls
or outdated
Operating Systems
however more often than not its employees and theyre easy to remember twelve thirty four fifty six password that provide a crucial gateway. The weakest link in every
Computer System
is the people that work with it. And employees are much easier to trick them technology they can help you break through a companys
Security Shield
nearly hard for all hacking cases are linked to mistakes made by employees. In most books spoof emails are a classic where hackers pose of someone else or leaving a u. S. B. Stick lying around that someone sticks in a
Company Computer
or a compressed p. D. F. File sent in an email disguised as a drawback occasion it gets printed on the back against control of the printer to. Try as an employee can become a gateway to my employers network. Unlocking peytons and
Business Ideas
hacking is big business bigger than ever in fact
Computer Security
for mcafee as the maids it may have amounted to
Six Hundred Billion Dollars
in damages last year that figure includes
Companies Liability
risk and damage to their reputation my passwords and no match for
Cyber Criminals
. A leopard is passionate about
Online Security
back in the
Nine Hundred Ninety
s. He kept stumbling on the data of unsuspecting users who didnt take enough care so he went into business advising firms on how to protect their data. Its like taking all the money out of your companys bank account and piling up the cash in the yard for all to see its basically the same thing everythings at stake because no company today works without computers and phones and you and
Cyber Attacks
can be costly last month alone million giant norsk hydro was attacked its share price plummeted wiping forty
Million Dollars
off the companys
Value Hotel Chain
marriott also had it systems breached exposing the data of millions of guests including credit card details and passport numbers. Paper can even rarely hear about the most spectacular
Cyber Attacks
because theyre spectacularly good ideally the victim will never even know about it thats the mark of a successful hacking so you dont read much about it in the media from in. Ones head cars are in they have two key
Objectives Industrial Espionage
aimed at quietly stealing as much information as possible without being noticed or extortion malware is used to shut down an entire system which can be reactivated only in exchange for money refused to pay up and you lose your data thats what aims to prevent materials kozlovsky is a member of his team and his best headcount today hes testing
Corney Coming
alters
Cloud Services
on behalf of the company if hackers were able to break into the cloud they could quickly access sensitive documents and customer data. To first we analyze their web site. We want to test out all the standard weak points. And i can then use those results to find other errors or
Security Loopholes
that could be used to carry out further attacks on the system. Kuntar. Corney coming alters i t security
Chief Of Staff
are now wants to acquire additional external security for the company and thats needed. We have
Tens Of Thousands
of attacks every day some of them dangerous so far weve averted the more and we want to keep it that way. So is the firms clout foolproof after all. We found nothing that could have been directly exploited. The biggest risk here too is posed by the employee news. And thats not our
Social Engineering
is skyrocketing with hackers seeking to. See the employees in suits divulging their passwords so they can penetrate the system and with him on something. This kind of
Social Engineering
or
Human Hacking
works well in the age of social media where we all tend to give away more information and we should. Once weve been hacked we become accessories whether we like it or not. Now as weve learned there are the black hats who do a shady business at the white hats who might use their skills by working for an i. T. Company or for the government like for germanys
Foreign Intelligence Service
for example where
Master Hackers
are urgently needed a license to hack thats how the agency is trying to recruit a new generation of
Computer Whizzes
but seeing that young hackers usually dont have the most approving attitude towards the concept of
Nation States
and governments who would have a resume here well we found one hacker that was willing to talk. Spending hours days weeks trying to get into a system and getting nowhere can be very frustrating but when you finally succeed its an amazing kick. Interviewing lucas is an amazing kick for me to look at this isnt his real name and we can show his face the work he does is highly sensitive. He works in
Cyber Espionage
at germanys
Foreign Intelligence Agency
the b. M. D. But no one is supposed to know that. We hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. We need lucas in a distant corner of the building the
Press Box Person
and the
Safety Officer
i present throughout the entire interview. What exactly do you do you know obviously i cant go into detail about what exactly it is i do basically im a hacker that i intrude into i t. Systems to gain information that its true that the typical cases involve figuring out whats happening abroad. You might want to know whats going on in country x. Or y. For example you want to find out about weapons and
Defense Technology
somewhere organized crime or of course terrorism these are all areas in which theres a serious demand for hacking. He makes this sound very normal lucas is about thirty that says much as hes willing to say. Hacking skills by himself and sent it on
Spec Application
to the b. Indeed a few years ago. Now he has a job he cant tell anyone anything about. I usually tell people i have an office job in i. T. And then people usually dont bother asking any more questions it sounds like all i do is install printers and so on and no ones interested in that. So you know. The b. M. D. Is an urgent need of people like lucas and i t experts with an unconventional approach. A glossy p. R. Campaign is designed to improve its image and the service is deliberately targeting job fairs and
University Students
the trouble is potential candidates know their skills are in demand and that they can earn more in the private sector. At first glance that is at a competitive disadvantage we do try to be an attractive employer. That is what the spokesperson says what does lucas say. I get to do things that arent legal in the outside world i also get to feel ive done something useful my contribution ends up in a report and makes a difference that its not just the standard security tests that
Companies Carry
out. But actually has consequences in terms of foreign policy. Which are consequent i enjoy that out and its worth getting paid less for a low in fact the pay is pretty decent. Look at
Cant Imagine Working Anywhere
else hes a
Civil Servant
so doesnt need to worry about getting fired but anonymity is everything. A few people know what i do know my immediate family and some
Close Friends
know it too. But in general the responses ok you work for the
Foreign Intelligence Agency
this time obviously you can talk about it and thats it. Sharing nothing of my life im not sure that would work for me its not talking about your work when you get home can be hard but i knew what i was letting myself in for. But doesnt make it any easier but i can live with it. And im good friends with two or three of my colleagues so if i really need to i can always drop by their offices and let off some steam scots. It must be strange leading a double life knowing things the
General Public
will never be aware of i feel like i got a sense of what its probably like but have i learnt anything not really the india is a
Secret Service
is very good at making sure that what it does stay secret. Many of us have gotten used to
Digital Solutions
to our real
World Problems
missing the right shoes to outfit order them on
Amazon Dont Want To Bike
to work in the rain just open your car sharing up well our next report is also about
Finding Digital Support
but for a serious situation despite recent pushes for empowerment
Women In India
still face a great deal of harassment and abuse in dark alleys villages. And entrepreneurs hope sir found a way to help. There was more. I did boy very very and ill get him to get out from a life. It was the one kind of clothes. These women a speaking out about a subject thats often brushed
Out Of Sight India
is one of the worlds most dangerous countries for women. Elza
Nine Hundred Ninety<\/a> todays criminals dont need massed stroll bars or guns to get their hands on your cash the requirements for brazen burglars nowadays include a computer a solid wife i connection and preferably some coding skills welcome to made where\rour topic this week is cyber crime a first report takes us to the philippines where a ring of online fraudsters was busted last year and a massive operation the perpetrators exploited peoples hopes dreams and greed and sweet talk them into handing over shoot sums of cash. On june sixth twenty eighteen a
Special Police Unit<\/a> raided a call center near manila and detained almost five hundred people working there. The outfit was allegedly involved in a scam that cost unwitting people around the world hundreds of millions of dollars. Theyd all received a phone
Call Campaign<\/a> where you get. A small amount of the from. The other. An elevator or the brick wall they get. There. And that is that the whole make model. A former member of staff turned whistleblower and told the
Philippine National<\/a> police and the
Cyber Crime Group<\/a> how the scheme operated. The police then spent months gathering evidence before moving in and shutting the operation down. They money for people who are showing interest to invest so they receive emails that if they want the best they can they they can provide assistance such first day we offer. Minimum of
Two Hundred Fifty<\/a> dollars us dollars us as the start of the investment they will see their money growing from day to day and when they show interest on investing more does the find that they will for thats. The people accused of running the scam come from\risrael and twenty sixteen they set up the call center in the philippines called marketing the operators allegedly persuaded elderly people in south
Africa New Zealand<\/a> and australia to invest in nonexistent assets and in the process gained access to their bank details money from the scam ended up in a bank account in denmark none of it has been returned. In a moment it took time for some of the cole
Center Operators<\/a> to realise they were involved in a scheme to rip people off. But i mean that in order reselling it we werent selling anything that. The agents were selling dreams thats what the company said. We were supposed to encourage clients to make a deposit to invest. In manila alone around
Five Thousand<\/a> cyber crimes are reported to the police every year. Its hard for even the\rspecialist unit to keep up with what the scammers are doing their tricks are evolving all the time. So its really a difficult case not only this case but most of most of the cyber crime cases its something new from the
Law Enforcement<\/a> do to the judge just the to the prosecutors its something new. According to one estimate and twenty seventeen close to a billion people worldwide were cheated out of around
One Hundred Forty Six Billion<\/a> europes common tricks include
Stealing Passwords<\/a> by means of
Phishing Emails<\/a> setting up fake online
Investment Platforms<\/a> where potential targets leave their names and
Phone Numbers<\/a> direct tacking into computers and networks and online romance scams which in the u. S. Cost victims some one hundred twenty seven
Million Euros<\/a> last year the thing is are you buying into the right people are you investing to the right people are you\rinvesting for the right company is or the company youre only having your concessions on like you dont see these people you dont see them in person you dont know where they are thats the characteristic of. You know. So i think its the reason why theres a lot of big names of cyber crime in investment. The dark depths of the internet thats for
Cyber Criminals<\/a> usually hide sometimes they break into your computer directly that requires a fair bit of know how and thats where the hacker comes that the stereotype is the skilled
Computer Whiz Kid<\/a> for whom a fire wall is just another hurdle to hop over but who are hackers really and what motivates them we broke it down for you take a look. Hackers are they good or bad in
One Thousand Nine Hundred Two<\/a> in the us a group of six teenagers calling themselves the four one force broke into some\rof the countrys classified
Computer Systems<\/a> including one that a
Nuclear Weapons<\/a> research lab. Public was alarmed the f. B. I. Investigators and the perpetrators were identified. Some of them went on trial for the intrusions and the term hacking began to be associated with crime. But hackers are not all inherently bad the
Computer Security<\/a> scene differentiates between good hackers and bad ones white hats have a legitimate agenda for instance they look for
Security Flaws<\/a> in
Computer Systems<\/a> to reveal all correct them. Gray hat hackers havent quite made their minds up they search for vulnerabilities and systems and occasionally exploit them. The black cats are bad theyre often motivated by greed to damage
Computer Systems<\/a> or steal data. Like in the
Two Thousand And Eight<\/a> cyber attack on one of the worlds biggest
Payment Processors<\/a> the hackers in that case wrote their own software smuggled it\rinto the payment firms
Computer System<\/a> and made off with up to
One Hundred Thirty Million<\/a> credit card numbers. But distinguishing the color of a hackers hat isnt always easy when it comes to hacking whats right and whats legal is not always clear cut. Sometimes illegal behavior can end up revealing other illegal behavior. A good example of this is the panama paper scandal in it gray hat hackers accessed millions of documents illegally then they used them to expose tax evasion and fraud by well known and influential people. Back in
One Thousand Nine Hundred Two<\/a> with the four one for hacking was in its infancy now its become a massive its you in a digital networked world. And in a
Virtual World<\/a> just as in the real one the
Dividing Line<\/a> between good and bad sometimes very hard to define. Now when
Companies Get<\/a> hacked it can cost them dearly not only if
Sensitive Data<\/a> gets stolen but also because huge amounts of share value can be wiped out estimates say that the global cost of cyber crime related incidents currently amounts to some five trillion euros a year access to sensitive
Corporate Information<\/a> can occur through
Spongy Fire Walls<\/a> or outdated
Operating Systems<\/a> however more often than not its employees and theyre easy to remember twelve thirty four fifty six password that provide a crucial gateway. The weakest link in every
Computer System<\/a> is the people that work with it. And employees are much easier to trick them technology they can help you break through a companys
Security Shield<\/a> nearly hard for all hacking cases are linked to mistakes made by employees. In most books spoof emails are\ra classic where hackers pose of someone else or leaving a u. S. B. Stick lying around that someone sticks in a
Company Computer<\/a> or a compressed p. D. F. File sent in an email disguised as a drawback occasion it gets printed on the back against control of the printer to. Try as an employee can become a gateway to my employers network. Unlocking peytons and
Business Ideas<\/a> hacking is big business bigger than ever in fact
Computer Security<\/a> for mcafee as the maids it may have amounted to
Six Hundred Billion Dollars<\/a> in damages last year that figure includes
Companies Liability<\/a> risk and damage to their reputation my passwords and no match for
Cyber Criminals<\/a>. A leopard is passionate about
Online Security<\/a> back in the
Nine Hundred Ninety<\/a> s. He kept stumbling on the data of unsuspecting users who didnt take enough care so he went into business advising firms on how to protect their data. Its like taking\rall the money out of your companys bank account and piling up the cash in the yard for all to see its basically the same thing everythings at stake because no company today works without computers and phones and you and
Cyber Attacks<\/a> can be costly last month alone million giant norsk hydro was attacked its share price plummeted wiping forty
Million Dollars<\/a> off the companys
Value Hotel Chain<\/a> marriott also had it systems breached exposing the data of millions of guests including credit card details and passport numbers. Paper can even rarely hear about the most spectacular
Cyber Attacks<\/a> because theyre spectacularly good ideally the victim will never even know about it thats the mark of a successful hacking so you dont read much about it in the media from in. Ones head cars are in they have two key
Objectives Industrial Espionage<\/a> aimed at quietly\rstealing as much information as possible without being noticed or extortion malware is used to shut down an entire system which can be reactivated only in exchange for money refused to pay up and you lose your data thats what aims to prevent materials kozlovsky is a member of his team and his best headcount today hes testing
Corney Coming<\/a> alters
Cloud Services<\/a> on behalf of the company if hackers were able to break into the cloud they could quickly access sensitive documents and customer data. To first we analyze their web site. We want to test out all the standard weak points. And i can then use those results to find other errors or
Security Loopholes<\/a> that could be used to carry out further attacks on the system. Kuntar. Corney coming alters i t security
Chief Of Staff<\/a> are now wants to acquire additional external security for\rthe company and thats needed. We have
Tens Of Thousands<\/a> of attacks every day some of them dangerous so far weve averted the more and we want to keep it that way. So is the firms clout foolproof after all. We found nothing that could have been directly exploited. The biggest risk here too is posed by the employee news. And thats not our
Social Engineering<\/a> is skyrocketing with hackers seeking to. See the employees in suits divulging their passwords so they can penetrate the system and with him on something. This kind of
Social Engineering<\/a> or
Human Hacking<\/a> works well in the age of social media where we all tend to give away more information and we should. Once weve been hacked we become accessories whether we like it\ror not. Now as weve learned there are the black hats who do a shady business at the white hats who might use their skills by working for an i. T. Company or for the government like for germanys
Foreign Intelligence Service<\/a> for example where
Master Hackers<\/a> are urgently needed a license to hack thats how the agency is trying to recruit a new generation of
Computer Whizzes<\/a> but seeing that young hackers usually dont have the most approving attitude towards the concept of
Nation States<\/a> and governments who would have a resume here well we found one hacker that was willing to talk. Spending hours days weeks trying to get into a system and getting nowhere can be very frustrating but when you finally succeed its an amazing kick. Interviewing lucas is an amazing kick for me to look at\rthis isnt his real name and we can show his face the work he does is highly sensitive. He works in
Cyber Espionage<\/a> at germanys
Foreign Intelligence Agency<\/a> the b. M. D. But no one is supposed to know that. We hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. We need lucas in a distant corner of the building the
Press Box Person<\/a> and the
Safety Officer<\/a> i present throughout the entire interview. What exactly do you do you know obviously i cant go into detail about what exactly it is i do basically im a hacker that i intrude into i t. Systems to gain information that its true that the typical cases involve figuring out whats happening abroad. You might want to know whats going on in country x. Or y. For example you want to find out about weapons and
Defense Technology<\/a> somewhere\rorganized crime or of course terrorism these are all areas in which theres a serious demand for hacking. He makes this sound very normal lucas is about thirty that says much as hes willing to say. Hacking skills by himself and sent it on
Spec Application<\/a> to the b. Indeed a few years ago. Now he has a job he cant tell anyone anything about. I usually tell people i have an office job in i. T. And then people usually dont bother asking any more questions it sounds like all i do is install printers and so on and no ones interested in that. So you know. The b. M. D. Is an urgent need of people like lucas and i t experts with an unconventional approach. A glossy p. R. Campaign is designed to improve its image and the service is deliberately targeting\rjob fairs and
University Students<\/a> the trouble is potential candidates know their skills are in demand and that they can earn more in the private sector. At first glance that is at a competitive disadvantage we do try to be an attractive employer. That is what the spokesperson says what does lucas say. I get to do things that arent legal in the outside world i also get to feel ive done something useful my contribution ends up in a report and makes a difference that its not just the standard security tests that
Companies Carry<\/a> out. But actually has consequences in terms of foreign policy. Which are consequent i enjoy that out and its worth getting paid less for a low in fact the pay is pretty decent. Look at
Cant Imagine Working Anywhere<\/a> else hes a
Civil Servant<\/a> so doesnt need to worry about getting fired but anonymity is\reverything. A few people know what i do know my immediate family and some
Close Friends<\/a> know it too. But in general the responses ok you work for the
Foreign Intelligence Agency<\/a> this time obviously you can talk about it and thats it. Sharing nothing of my life im not sure that would work for me its not talking about your work when you get home can be hard but i knew what i was letting myself in for. But doesnt make it any easier but i can live with it. And im good friends with two or three of my colleagues so if i really need to i can always drop by their offices and let off some steam scots. It must be strange leading a double life knowing things the
General Public<\/a> will never be aware of i feel like i got a sense of what its probably like but have i learnt anything not really the india\ris a
Secret Service<\/a> is very good at making sure that what it does stay secret. Many of us have gotten used to
Digital Solutions<\/a> to our real
World Problems<\/a> missing the right shoes to outfit order them on
Amazon Dont Want To Bike<\/a> to work in the rain just open your car sharing up well our next report is also about
Finding Digital Support<\/a> but for a serious situation despite recent pushes for empowerment
Women In India<\/a> still face a great deal of harassment and abuse in dark alleys villages. And entrepreneurs hope sir found a way to help. There was more. I did boy very very and\rill get him to get out from a life. It was the one kind of clothes. These women a speaking out about a subject thats often brushed
Out Of Sight India<\/a> is one of the worlds most dangerous countries for women. Elza
Marie Desilva<\/a> knows how it feels for years she didnt like going on
Business Trips<\/a> by herself. When she was fourteen a stranger groped her on a train. Sexual harassment and assault are part of everyday life a many girls and
Women In India<\/a>. In twenty twelve a brutal gang rape on a bus in delhi shocked the nation and triggered protests suddenly the vast problem of
Sexual Violence<\/a> took center stage. To silver\rdiscovered that there was no reliable data on the extent of the problem she resolved to change that and to devote herself to helping women she gave up her
Business Career<\/a> to do so. School for social entrepreneurship in berlin she wanted to meet to silva and learn about her organization before i started doing this work i have not shared my story and once i started doing this i said to myself if im expecting some. Story then i should be ready and i think thats also what you want to achieve on the big scale with your organization. The power to what has happened and through share their stories absolutely because you know we are talking about young girls who feel they can achieve anything and. You know they dont see the differences between them and the boy but as they are growing up you know society put those. You. Go out in the night except. Fear can constrain womens lives parents keep their daughters at home men dont want their wives to take public transport to work professional opportunities amassed this is the kind of thing aims to combat with the
Online Platform<\/a> she established safe
City It Crowd<\/a> sources personal stories of
Sexual Harassment<\/a> and abuse and aggregates the data on a map it works worldwide but has so far called sean in about fifty cities not only in india but also in
Kenya Cameroon<\/a> and then pull for example. The aim is to raise the pressure on authorities to take action as well as to encourage girls and women to speak out and stand up for their rights. I did open the doors\rdid happen to me. Did not mean. It never. And you still always be. No matter how much it haunts me. No matter how. Good i am even now. I still have the guts to face the world and tell them that this happened to me and yet be unfazed because now we know it was not very forward. These young women are really confident because the big can stand up for themselves then nor their rights it makes me feel really proud that ive been part of creating\rthe space for dialogue on this issue and bringing confidence to these women so that they dont feel afraid to access their rights or access opportunities and these young women are going to change the world because of their confidence. India has a long tradition of wrestling one of many activities reserved for men throughout the century but according to. Society is slowly changing many younger people simply do not accept the constraints women have to endure its normal that. Its a new normal. Money and for other young engineers have developed a device worn on a respond that transmits location details to
Emergency Contacts<\/a> and also records. That start up has won prizes for the device which is called safe approach for the team has secured funding and is now manufacturing it. First this as soon as you put\rit it gives me a friends and family people ok. One major problem really know what though. The sport. Has a lot of
Safety Security<\/a> got these
Three Thousand<\/a> companies and theyve got it. And there are seven
Million People<\/a> employed in that so thats made up everything they do where we are building a
Sporting Goods<\/a> their group of people who can actually come in and see people out. He says the police alone cannot guarantee womens safety he wants to set up a platform to transform the
Security Market<\/a> first in india then worldwide this illusion that tech they are crucial intelligent and. I think however we can lets use those technologies to create influence and change at a level where we can but lets not think that those are the only solutions we also\rhave to think about other ways much more grassroots ways of how we can change mindsets too and violence against women. Changing attitudes is also central to elsa married to silvers agenda also need to ploys high tech to make city safer for women she also wants to empower women at home because danger does not only lurk in
Public Spaces<\/a> most finance against women occurs within that families. So new technology can not only be used to clean our
Bank Accounts<\/a> its also there to help and support people around the world and thats a positive note on which to end this edition of made for me and the entire team here thanks for watching. The be. The be. The be. Subject. To the be. Small cuts in smaller the changing the people making it possible to go to africa. Fantastic right. As they set out to save the environment. That i learned from one another the book and
Work Together<\/a> for the butcher. Cooking up for. W. And. I think its everything first im a muslim. School much different culture between here and the. So challenging for everything. From the syllabus i think it was worth it for me to come to germany. Shop and got my license to work as a
Swimming Instructor<\/a> here to share knowledge to children nothing to its just one of us to just assume. Thats your story take part share it on
Info Migrants Dot<\/a> this. This is a fifteen year old girl. Being gang raped. This teacher is beating a boy for talking back and class. For the rest of the class once as. Im sure a toddler is being hit by his mother. Breaking up lots. Of child sleeps in the streets because her family through her. Fear. Online bullying. Pushes a teenager over the edge. Just because you can see violence against children doesnt mean it isnt there make the invisible visible of us might violence against children disappear","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"https:\/\/vimarsana.com\/images\/vimarsana-bigimage.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240618T12:35:10+00:00"}