源 稿 窗
(CNN Student News) -- March 28, 2017
Britain Starts the Process of Leaving E.U.; Australia Assesses the Damage from Cyclone Debbie; The Debate over Access to Encryption Technology
THIS IS A RUSH TRANSCRIPT. THIS COPY MAY NOT BE IN ITS FINAL FORM AND MAY BE UPDATED.
CARL AZUZ, CNN 10 ANCHOR: Article 50 is story number one on CNN 10 today. I`m Carl Azuz. It`s good to have you watching.
We`re talking about the Brexit, the British exit from the European Union. The E.U. has been around for decades. It`s a political and economic partnership of 28 European Countries. Last June, Britain`s voted 51.9 percent to 48.1 percent to separate from the E.U., potentially leaving 27 countries in it.
One major issue in Britain`s decision was immigration. A majority of voters wanted Britain itself, not the E.U., to set British immigration rules. Another issue was the economy. Those who wanted to leave felt that Britain could do better business without European Union rules.
Britain was and is deeply divided over the vote. But the nation`s prime minister, Theresa May, has said Brexit means Brexit. And now, she`s just one day away from formally triggering Article 50. That`s part of the European Union agreement.
What Article 50 does is begin the two-year process to separate Britain from the E.U. Two sides have to agree on the terms of their division. Why would something like this take so long? One reason is paperwork.
NINA DOS SANTOS, CNN INTERNATIONAL CORRESPONDENT: At the heart of Europe, five floors down, on five miles of shelving, thousands upon thousands of containers, row after row of red tape that Brexit supporters want Britain to leave behind.
Here in the archives of the Council of the European Union, you get an idea of the sheer scale of the paperwork that`s involved with being a member of the E.U. Each of these boxes contains hundreds of legal documents, various texts and policy papers. And as the U.K. leaves, well, it will have to decide which ones it wants to keep, and which ones it wants to lose.
But for all the millions of words stored in Brussels, only 255 are needed to start that decision-making process. The five brief paragraphs of Article 50 provide the blueprint for exiting the European Union. With everyone watching, both the E.U. and the U.K. are hoping for a speedy harmonious conclusion, so that the writing at different floors in agreements that will eventually line these shelves can begin.
Nina Dos Santos, CNN, Brussels.
AZUZ: Authorities in northeastern Australia are trying to get a sense of the destruction from Cyclone Debbie. The system made landfall early on Tuesday. It was capable of devastating damage and Debbie had gotten stronger as it approached land. Wind speeds of up to 150 miles per hour, a storm surge, a rise in the sea level of more than 13 feet was possible.
Thousands of people in the Australian state of Queensland had been ordered to leave their homes. Police warned that they could not shelter from a storm surge.
Queensland`s premier said the cyclone would be nasty, that it was capable of being as severe as the last major storm to hit the area. Cyclone Yasi knocked home off their foundations and destroyed farmland back in 2011.
Debbie was also expected to have particularly bad timing. Our affiliate 7 News said its landfall would coincide with the high tide, threatening homes anywhere near the coasts. Schools were closed, emergency workers were deployed to the region as the equivalent of a category 3 hurricane approach.
SUBTITLE: Typhoons vs. hurricanes: What`s the difference?
MYERS: Typhoons are hurricanes, are cyclones. They are the same thing, just in different oceans. A lot like a hot cake is a flat jack is a pancake is short stack.
If you are west of the dateline, so west of Hawaii, north of the equator, you`re a typhoon. If you`re in the Atlantic or the Pacific, around America, you are a hurricane. And if you are around the Indian Ocean or in the southern hemisphere, you`re a cyclone.
So, it`s not out of the question for a hurricane to become a typhoon if it moves over the dateline. In fact, after crossing the international dateline, Hurricane Genevieve turned into Typhoon Genevieve a few years ago.
(BEGIN VIDEO CLIP)
AZUZ (voice-over): Ten-second trivia:
Cryptography is the study of what?
Burial grounds, secret writing, cave formations, or subzero temperatures?
Cryptography from which we get the word "encrypt" is the study of secret writing.
(END VIDEO CLIP)
AZUZ: Government officials in multiple countries want more access to the technology that encrypts electronic messages. One reason, Khalid Masood, the 52-year-old terrorist who attacked pedestrians and a policeman in London in last week was reportedly active on WhatsApp two minutes before the attacks. WhatsApp is a popular messaging application that uses encryption technology. Because of that British investigators haven`t been able to access what Masood was saying.
They have released details of who he was. Masood was born in Britain under a different name. He`d been convicted for several violent crimes, starting in 1983, and Britain`s prime minister says Masood had links to violent extremism, though he was never before accused of terrorism.
Masood spent a couple of years working in Saudi Arabia as an English teacher. He had no criminal record there. Investigators are trying to figure out how and when he became radicalized.
The ISIS terrorist group said it was responsible for Wednesday`s attack which killed three pedestrians and a police officer. But investigators don`t think Masood had been communicating directly with ISIS. They think he was probably inspired by the terrorist group, gaining access to his messages could give police more information. But some developers are hesitant to trust governments with the keys.
LAURIE SEGALL, CNNMONEY: Throughout history, coding and decoding messages has fueled wars.
Take World War II. Mathematicians cracked German code created by a machine called Enigma.
UNDENTIFIED MALE: It`s the greatest encryption device in history and the Germans use it for all major communications.
SEGALL: Fast forward to Arab Spring, how did protesters organize safely? Many do something called encryption. But that`s also the same way terrorists might work together to plan a major attack.
The whole idea is to make your messages secret. Encryption jumbles words into random numbers, letters, characters. The words only decode for the person who`s meant to read them.
It`s this technique that sparked the debate at the highest levels of government, because the same tech that helps the good guys also shields the bad. And that tech is going mainstream.
At the center of it all, this guy.
MOXIE MARLINSPIKE, HACKER: We`re out of food, honestly.
UNIDENTIFIED FEMALE: And the means to cook it?
MARLINSPIKE: Yes, how does that feel?
SEGALL: His name is Moxie Marlinspike. It sounds made up because, well, it is. He`s a world renowned hacker and he`s obsessed with your privacy.
He won`t tell you where he`s from or really anything about his past. But everyone, from secret agents, to whistleblower Edward Snowden, looks to what he has to say on one topic, encryption.
MARLINSPIKE: If I share photos online with my friends, my intention is to share it with those friends. It`s not to share with like, you know, Twitter the company, or Facebook the company, or the government.
SEGALL: Moxie built an app called Signal, that makes encryption easy to use. His tech is also used by WhatsApp, the messaging service owned by Facebook.
MARLINSPIKE: It`s actually the most popular messenger in the world. Now, when people communicate with each other, those messages that they send are encrypted, all the way from their device to the recipient`s device. So, nobody in between can see what they`re saying.
SEGALL: It`s making it easier than ever to protect yourself and harder for law enforcement to crackdown.
Chris Inglis has spent decades fighting terrorists. He was a deputy director of the NSA.
CHRIS INGLIS, FMR. NSA DEPUTY DIRECTOR: Encryption is one of many ways than an adversary, whether that`s a criminal, a terrorist, a rouge nation, one of many ways that they might use to hide their activities.
SEGALL: Some in Washington want the ability to access encrypted conversations, if there`s reason to think there`s a threat. Think of it as asking for a key to a locked door.
INGLIS: I don`t think you want to stakeout (ph) encryption technology. But the question is, do we then try to provide some exceptional access to technologies of that sort, by building a front door under the bright light of the rule of law?
SEGALL: For Inglis, the answer is yes. But to Moxie, that`s just not possible.
MARLINSPIKE: They are not capable of managing those secrets, you know? Like they`re getting hacked every day.
SEGALL: Some folks in Washington want Silicon Valley to build secure solutions. It doesn`t look like Moxie is going to be the guy for that. He plays by his own of rules and a new era of where tech drives the good, the bad, and in this case, the policy.
MARLINSPIKE: We`re at the moment in history where it`s mostly possible for us to sort of ignore the policy discussions that are happening, instead of like asking people to change the law or to change their surveillance practices or whatever. We can just do it ourselves.
AZUZ: Ana Peninsula in northwestern Australia, scientists say they`ve tracked down something big. What measures five feet nine inches long is believed to be a footprint of a dinosaur. The record setting fossils reportedly from the food of a sauropod, thankfully, a herbivore.
Researchers estimate this one would have measured more than 17 feet high at its hip. The University of Queensland says this is one of 21 different dinosaur tracks found in the area.
So, who knows what other finds might be afoot. The fossils are fueling a lot of interests. Other research has been done to herbi-fore and you know that here, you`d hear about any major dinoscovery, whether you sauros online or download our sauropodcast.
This is CNN 10.