Skip to playerSkip to main content
The GPS navigation system depends on the synchronization of all the satellites at the same time.

Scientists around the world are dealing with new threats such as body hacking, Trojan horse viruses, and brain-damaging Internet addiction. But what if the ultimate threat isn't an attack on technology, but the technology? Could the final superpower be the disembodied mind of the Internet itself?
Julius Caesar used the Caesar cipher for clandestine communication. The one-time pad is more complex.

Thanks for watching. Follow for more videos.
#cosmosspacescience
#throughthewormhole
#season5
#episode4
#cosmology
#astronomy
#spacetime
#spacescience
#space
#nasa
#spacedocumentary
#morganfreeman
#superpower
#collapseofsuperpower
Transcript
00:00The most powerful nations fear a new form of warfare that could bring them to their knees.
00:14In this age where armies, governments, and economies all depend on an intricate global
00:20infrastructure, you don't need guns and bombs to bring down a superpower. All you need is imagination.
00:30Shift time by a millionth of a second and create chaos. Use the human body to spread a killer
00:42computer virus. Turn the technology we are addicted to against us. Will human ingenuity triumph or will
00:53our ingenuity prove our undoing?
01:03Space. Time. Life itself.
01:10The secrets of the cosmos lie through the wormhole.
01:14You and I rely on our modern civilization. But there are plenty of people who don't like it for a variety of reasons.
01:36Religion, politics, or maybe fear about our future. For now, let's call these people terrorists. Terrorists don't fight by conventional means. They strike in ways we don't expect.
01:51Now we have given them a weapon that could change the global balance of power. The stability of the US, Europe, China, and any global power depends on high-speed digital communication.
02:06With a little imagination, could a few terrorists sabotage this massive network?
02:13Could a few terrorists sabotage this massive network? Triple a mighty nation? Perhaps even tear down modern civilization?
02:21When I was growing up in Mississippi, I loved to listen to the old Brooklyn Dodgers baseball games broadcast live all the way from New York.
02:39It amazed me to think that my family was cheering one of Jackie Robinson's big hits at the same instant as tens of thousands of fans at Ebbets Field.
02:50Way back, it's gone. Invisible radio signals that connected millions of people and synchronized us all.
02:57Today we are more connected than ever before. And all the machines that connect us, the machines that keep the modern world running, rely on precisely synchronized time.
03:19But could time be turned against us? The National Institute of Standards and Technology in Boulder, Colorado is the home base of physicist Judah Levine.
03:32Whenever you use a computer or your cell phone, you're tapping into Judah's greatest creation, the Internet Time Service.
03:42The Internet Time Service sends out signals that let computers synchronize their clocks to within a millionth of a second, and the number of devices that need precise time is skyrocketing.
03:54The growth has been 5% per month compounded for 15 years. And so we started out with 50,000 requests a day, and now we have about 6 billion requests a day.
04:09No single clock keeps time for the world. NIST has a dozen. Each measuring time in different ways.
04:19The accuracy of Judah's clocks is vital for controlling electric power grids, synchronizing telecommunications networks, timing financial transactions, and perhaps most importantly, making the global positioning system work.
04:35Imagine if terrorists threw those clocks off by just a tiny bit. What would happen?
04:42The GPS navigation system depends on the fact that all the satellites are synchronized to the same time, which is called GPS system time.
04:51The system fundamentally requires that. It won't work without it. It just doesn't work at all. It's not that it degrades. It just doesn't work.
04:58Around the world, more than 5,000 planes are in the air at any given time. To keep them from colliding, controllers must track time, speed, and distance with great precision.
05:14A few seconds' disruption in this network could mean disaster in the tightly packed airspace around a major airport.
05:23Now imagine that effect simultaneously hitting the entire infrastructure that keeps a superpower running.
05:30Power plants, hospitals, food delivery, oil production, all depend on time-critical functions.
05:39Throw them out of sync, and there could be a catastrophic chain reaction.
05:44Small effects, if they're not damped out quickly, can grow to become much bigger problems.
05:56Judah's challenge is to keep that chain reaction from happening. His biggest threat comes from hackers.
06:04The last year or two has seen a dramatic increase in hackers.
06:09It used to be that you really had to understand how to write some of these attacks.
06:14But now one person writes the attack and distributes it among 50 people or 500 people or 5,000 people who don't necessarily understand even how the attack works.
06:23And all they have to do is copy it and run it. So it's a problem that's only going to get worse.
06:29Judah's Internet Time Service protects itself by spreading its clocks around.
06:35This goes back to the original purpose of the Internet, distributing control so losing a few sites won't take down the entire network.
06:44The Nest Internet Time Service is more difficult to jam because it's so distributed.
06:51There are 45 servers. They're all at different locations. They don't have the same address. They don't have the same physical networks.
06:58So jamming all of them simultaneously would be, I wouldn't want to say it was impossible because probably nothing's impossible.
07:06But it would be quite a job.
07:08But the illusion of security may be the greatest threat we face.
07:13The false belief we are safe when we are not.
07:18People tend to believe what they see and what they are told.
07:23Especially when it comes from a trusted figure.
07:27I've come here to Cairo to seek a new beginning between the United States and Muslims around the world.
07:33That America is not and never will be at war with Islam.
07:38But what if you couldn't trust anyone anymore?
07:41With today's technology, it is easy to turn harmless words into something completely incendiary.
07:49I've seen a war with Islam.
07:51If someone sees this fake and believes it is real, it could start a religious war.
07:57Islam has demonstrated hatred rather than peace.
08:00I've seen a war with Islam.
08:02Protecting our identities and those of our leaders against terrorist assault is a top priority for governments, militaries and businesses.
08:19Here at Switzerland's Ediab Research Institute, one man is shoring up the virtual battlements that keep out the cyber terrorists.
08:27Sebastian Marcel is an expert in biometrics, the science of using the unique signatures of the body to verify a person's identity.
08:38Biometric security is a vast leap beyond passwords and ID cards, which is why a shadowy army is trying to defeat it.
08:48The challenge is to make the task so difficult for possible attackers that they will just not try to do it.
08:57There are many different kinds of biometrics. Fingerprints, the iris, the way you walk.
09:05The more individual the biometric, the harder it is to hack.
09:09Sebastian plays the dual roles of cyber terrorists looking for vulnerabilities and defender of the system.
09:18We always come first with a form of attack, then find a countermeasure for that, then give us an idea on another way to make a more clever attack.
09:27And then we do it again and again.
09:29Eventually we reach a point where it's not going to be possible to make any new form of attacks that can bypass the system.
09:36If a terrorist tricked security systems into believing he is the president or one of his trusted aides, he could start a war.
09:47It's not as far-fetched as it sounds.
09:50Even something unique like your face isn't enough to safeguard your identity.
09:57So here I have a laptop which is protected by Biontrait face recognition with an account created by a colleague.
10:04And I'm trying to be recognized as my colleague and my, well, basically doesn't work because I'm not her.
10:12I've taken a picture of my colleague here and I'm just going to show it in front of the camera and let's see what happened.
10:21So here you can see that I've been able to log it very easily actually. It was instantaneous.
10:30Now Sebastian switches back to guard duty.
10:34He activates a countermeasure that strengthens the laptop's biometric shield.
10:39The software looks not just for a specific face but also blinking eyes.
10:46So here you see that actually, well, it's no longer possible to attack the system.
10:54Even this added layer of biometric defense cannot, however, deter an imaginative attacker.
11:02By scanning a photograph with 3D imaging software, Sebastian has created a mask of his colleague.
11:10So now I'm going to put the mask of my colleague on and try to see if I'm recognized.
11:22Yeah. So I've been recognized and because I was blinking and I was able to bypass the countermeasure.
11:30It is harder to copy someone's body than a password, but nothing is foolproof.
11:37The more biometric data available, photographs, medical records, fingerprints, the more vulnerable we become.
11:45You can take any public biometric data you can find on the Internet.
11:51You can find some pictures of people, even presidents, world leaders, and to build this kind of attacks.
11:57Playing the role of attentive defender and malicious invader has taught Sebastian that he is in a life-or-death race with no finish line.
12:08The infrastructure that supports modern civilization may always be one clever attack away from disaster.
12:16My feeling is that if this problem is not taken seriously into account, then we might see an attack that was successful.
12:26So this is a major risk.
12:29This is the new arms race for the 21st century.
12:33Staying a step ahead of those who want to infiltrate our networks.
12:37But there is one attack we might never see coming, when people themselves are hacked and turned against their own country without their even knowing.
12:54If someone wanted to bring a superpower like America to its knees, where would they strike?
13:02We expect attacks on our financial and military networks, but human bodies may also be vulnerable to hacking.
13:11Could our newest high-tech medical devices be giving terrorists an opportunity?
13:17Could they create a sleeper army of unwitting assassins?
13:21Could that be the most common sense?
13:33Doctor Marc Gasson is pioneering the latest generation of medical implants.
13:38Such as pacemakers, insulin pumps for diabetics, and deep brain stimulators.
13:44so this is a implantable medical device it's much like a pacemaker we use it for deep brain
13:53stimulation so it would be implanted in the chest cavity and then we would run cables from this up
13:59under the skin and then to electrodes that we'd put deep into the brain this type of device once
14:06it's implanted in the body you don't want to have to remove it to change any settings so it has
14:11wireless capability implants are modern miracles but the downside is that these devices use radio
14:21frequency transmissions to transfer data and the devices they talk to called readers can be hacked
14:31if you know how to construct a reader that communicates in the right way then you can
14:37essentially pretend to be a legitimate reader talking to it this type of device and many
14:43other medical devices don't have any security that stop you from doing that this lack of security
14:50could have deadly ramifications if a networked device is in your body it could be remotely triggered to
14:58kill you imagine a foreign power wants to assassinate a leader with an implant a concealed reader could be
15:05altered to shut down a pacemaker or pump a fatal dose of insulin into a diabetic's bloodstream a device
15:13like this will have a certain range that it operates in so if we put a device attached to a podium for
15:19example then we could have it targeted specifically at the person standing at the podium a reader could be
15:26designed to transfer to transfer a digital virus to an implant say in the prosthetic leg with general the
15:34virus's real target may be the white house security system the general could leave the center of government
15:41open to a terrorist attack it sounds like the stuff of fiction but mark has already proven it can be done
15:53in 2010 mark hacked himself he implanted a radio frequency transponder like this one in his hand the microchip
16:04contained personal information and passcodes that opened the security doors at his lab after the
16:13chip was up and running he infected it with a computer virus so by infecting my device with the virus meant
16:24that when I access the building the building reads the virus out of my device and then transmits that to
16:31the system that controls the access to the building so once that occurred the virus actually infected that
16:41main system which meant that anyone else that was getting access to the building had that virus copied
16:47to their typically they use smart cards so the virus was able to propagate in that way mark watched the
16:54virus jump from his wrist to the system where it rapidly caused a security nightmare at the virus
17:02that I infected my device with was able to corrupt the whole system so it actually stopped the system
17:09from functioning at all all the system could then do is make copies to the virus onto the smart cards and
17:15other devices that people were using and that means they then couldn't get into the building and if they
17:20went to another building that used the same system they would just continue to spread the virus off
17:24mark proved that implants could not only be infected with toxic code they can be used to transfer toxic
17:36code this has ominous implications by building information highways across the world we may have given our
17:46enemies an express lane into our most vital systems via the devices in our bodies how do we defend ourselves
17:56from a world filled with cyber terrorists this man may know he's using computers to track down and fight
18:06deadly viruses both digital and biological
18:15influenza smallpox HIV global pandemics happen every decade or so sometimes they kill tens of millions
18:27now there are new threats digital viruses that spread like lightning and could tear our critical global
18:36networks apart what lies ahead could be even more frightening a pandemic designed to combine the worst of both viral world
18:48electronic and biological
18:57zero day that's the day a destructive new virus enters the world
19:02the lack of awareness on zero day means complete vulnerability whether the virus is biological
19:10or digital
19:12is there a way to stop these threats before they spread
19:17alex vespignani believes there is alex is a professor of physics computer science and health sciences at northeastern
19:26university he's an expert on contagion natural and electronic actually i did start with the digital viruses
19:37and because of the analogies especially in the techniques that you can use mathematically to describe
19:42the spreading of those viruses we started to get interested in in biological viruses
19:49alex's lab tracks viral outbreaks of all kinds and looks for ways to minimize their impact
19:58in 2009 a virulent flu bug named h1n1 flared up in mexico city to predict how and when the flu would
20:07spread alex and his team designed a powerful program called gleam the global epidemic and mobility model
20:16and predict how they will interact so in the computer we take one person that is in mexico city and board
20:30on one fly that is simulated in the computer and if that person is a carrier will transmit the disease to
20:36another geographical area in the world we repeat those simulation many many many times and this will
20:44tell us what is the most likely pattern that the epidemic will will follow in the future
20:52gleam anticipated when the h1n1 flu pandemic would reach its peak in different regions around the world
21:00alex also uses gleam to track outbreaks of computer viruses when he first entered this field digital and
21:09biological viruses followed similar paths of infection a virus would be physically carried from person to
21:16person or machine to machine outbreaks would take weeks or months to unfold on the left we have a virus
21:25that spreads because of proximity and in this case what you see is that the virus spreads every time that
21:31people get in physical proximity so in touch with each other this takes some time biological viruses still
21:40spread this way but digital viruses now have something influenza and ebola don't the ability to travel around the
21:49world at the speed of light a single computer virus can infect tens of millions of computers before anyone
21:58realizes what is happening so on the right side we have a virus that spreads wirelessly basically on the
22:05internet this doesn't require the physical proximity you don't need the carriers to be in a place to transmit
22:11the disease the disease is teleported in a sense and you will see that in just a few minutes
22:19it reaches the entire population so it blows out like you know a big explosion all at once
22:26how do you fight pathogens that can spread around the world in seconds alex's colleagues are trying
22:35to create a global digital defense similar to the human immune system bits of code that act like
22:42biological t-cells swarming viruses to isolate and eliminate them
22:47unfortunately clever hackers are getting better at creating undetectable viruses in the digital world
22:59viruses or malwares are constantly changing so that it's not easy to write an algorithm that detect them
23:07and clean the machine right away
23:09trojan horse malware is specifically designed to blend into the background until it reaches its intended
23:20target once it invades a critical system say the control software of cooling rods at a nuclear power
23:27plant it can lay dormant for weeks or months then one day it activates this is day zero and the new
23:37malware is going to exploit the vulnerabilities of those servers it can hide here or proliferate over
23:45the internet and finally unleash all the damage has been programmed for
23:59but there is an even more disturbing threat
24:02what if terrorists apply the principles of malware to biological pathogens imagine biological viruses
24:12designed to masquerade as harmless germs they'd spread throughout the population then detonate
24:21it would be a nightmare scenario but the dangers of engineering pathogens are so great
24:27and the results so hard to control that even terrorists may not risk it even the simplest biological
24:35viruses are much much more complicated than computer viruses as soon as you start manipulating a virus
24:43it's very difficult to guess what is going to happen it's a very dangerous game so trying to alter nature
24:51it's something that uh can easily lead to doomsday the future may be filled with frightening outbreaks
25:03unless we find a way to lock down our critical information networks in a world where privacy is fading away
25:11and everything is open to attack can there ever again be such a thing as a secret
25:22during the cold war the soviet union and the united states were locked in a nuclear arms race
25:29the philosophy behind it was mad which stood for mutually assured destruction
25:37today's arms race could be called mutually assured decryption computer networks develop ever more secure
25:46encryption schemes and ever more powerful attack networks figure out how to crack them but there may be a way to stop this madness
25:56by creating a code that can never be cracked
26:00so this is an example of a secret code and right now it doesn't look like anything
26:28the most of us see random letters but an expert sees a message encrypted with a caesar cipher named after julius caesar
26:38who used it for clandestine communications the way you crack a caesar cipher is you just look for
26:45the most frequent letter so here i is the most common letter and you know that e is the most common letter that
26:52appears in the english language so i can match i to e and then i can count and see that that's four
26:59letters changed repeating the same for x i can count back four letters and see it might be
27:06representing t xli is being converted to the letter transposition codes were high-tech in
27:13the roman empire but in this age of computational power they are trivially easy to break
27:22the modern gold standard of cryptography is the one-time pad this technique adds or subtracts a
27:32different value for every single letter of a message the way it works is for each letter of
27:39what you're trying to keep secret you choose a different and random number to permute that letter
27:46essentially each letter has a different code so guessing one letter won't help you figure
27:52out any of the other letters and a message only someone with access to the one-time pad
27:58the codebook itself would be able to make any sense of this but even this technically perfect code
28:06can be cracked the one-time pads used by governments and businesses to protect their secrets rely on
28:13specialized machines that generate random numbers but edward snowden revealed the nsa has compromised
28:21those machines the random numbers they generate are not actually random so the nsa can crack even
28:29these theoretically uncrackable codes as more information about what the nsa has been and is
28:36capable of has come out it's been a big motivating factor i think to a lot of cryptography over the last
28:42year roick and his colleagues went searching for an ideal generator of randomness and they found it in
28:52light we realized or saw actually visually how random light can behave when it interacts with disordered
29:01particles like in dried spray paint so it's easy to create a lot of randomness by shining light on scattering
29:10particles using lasers roant directs a beam of light through a sheet of polymer dispersed liquid crystal
29:19it's a variation on the lcd display you might find in a laptop screen
29:26we create our one-time pad by shining laser light through our scattering material
29:31the laser illuminates the scattering material the light scatters through it randomly and then emerges
29:39on the other side as an interference pattern once the unique pattern is created you can turn it into a code
29:47every letter or numerical character is represented by light or dark spots in the polymer each square
29:55micrometer of random pattern in the polymer provides enough light and dark spots to embed millions of code words
30:06say two spies create a shared code pattern then they separate never to meet again
30:13the first spy encodes a message with his piece of polymer and sends it to the other spy spy number two
30:21receives the encoded communication and takes out his piece of polymer to view it when he subtracts the
30:28shared pattern from the code he can read the secret message but unlike a conventional one-time pad this code can't be duplicated
30:38the three-dimensional layers of crystals embedded in the polymer sheet cannot be captured by a photograph
30:45the randomness the randomness doesn't just exist on the surface of the material it exists inside the
30:50material and any attempt to get inside the volume will destroy it or change the way it behaves essentially
30:57an unbreakable code could sure up all of a superpower's critical networks against infiltration by enemies of
31:05the state but humans not technology have always been the weakest link in security systems
31:12what if the assault on our society is more insidious than terrorism so subtle in fact that we may not
31:21realize it's even happening a superpower would reel from successful attacks on its bridges its electrical
31:30grid or its water supply but what if an attack is already underway an attack not on physical objects
31:39but on society itself an attack from within is our addiction to the internet sowing the seeds of our destruction
31:55the campus of swansea university sits on the picturesque coastline of southwestern wales
32:02but like college students everywhere these young men and women are more absorbed in the digital world
32:09than the natural world most of them were born in the 1990s they don't know life without the internet
32:17and for some of them being offline would be physically and emotionally traumatic because the internet rewrites the
32:26brain as much as ecstasy or heroin professor phil reed has worked for years finding treatments for
32:35autism and drug addiction but a few years ago he noticed a disorder that is just as widespread
32:43the effect technology is having on our minds and bodies i think the internet is really something new
32:51here because what we're seeing is a piece of technology that is almost designed to isolate individuals
33:00if you were to change the way society worked this would be a really good way to do it
33:06bill wanted to find out if the internet is addictive enough to cause withdrawal symptoms
33:12first he tested the mental state of participants before and after they spent time online
33:22he found heavy users experience profound negative mood swings when they are cut off from the net
33:28but the impact of withdrawal goes deeper than spoiling people's moods shutting down the internet connection
33:37triggers the body's fight or flight response
33:41so we're looking at their heart rate their blood pressure the galvanic skin response it's like
33:49they're facing a threat all of the time their heart rate's gone up their blood pressure's gone up
33:55their skin conductance is is high it's suggesting that long-term exposure to the net might actually be
34:03placing a strain on people's physiology they might feel relaxed but in fact they're hyped up but the most
34:13disturbing effect of internet addiction is what it does inside the brain bill and other researchers have
34:21been scanning the brains of heavy internet users and finding disturbing alterations in their mental
34:27architecture in terms of where we're seeing changes in brain matter we're seeing them up at the frontier
34:35especially prefrontal cortex but also cortical changes but also down the side in terms of the
34:42motor areas of the brain so we got changes all over people who surf the web 10 hours a day
34:48can experience a 10% shrinkage in key brain regions according to one study that's the kind of damage you
34:56might get from a serious case of meningitis it would permanently change how you think and behave
35:10any technology can be regarded like an alien parasite and that goes for anything that we use
35:17we think it's serving us and initially it does but eventually our society and ourselves we become
35:24dependent on it the internet is now an essential tool in every powerful nation on earth but its many
35:33benefits come with side effects that could shatter society will it ultimately prove a force for good
35:42or will it be the tool of our self-destruction we don't know essentially we are running a beta test
35:51on the population of earth if you were designing an aircraft you'd have backup systems we never do
35:57that with society we never have a backup system it's all or nothing and the way we seem to have gone
36:03is digital an addiction to technology may be the greatest weakness of a superpower by trying to improve
36:10our lives with machines we may lose ourselves in software and there's one more thing to consider
36:18what if the internet wakes up could an all-powerful digital consciousness become the final superpower
36:29our society is under threat on many fronts terrorists could attack our time service
36:37they could disrupt the power grid or the water supply network or our satellite links
36:43but we should be careful not to focus too closely on these individual threats
36:50we may be staring at the trees and missing the forest the real threat could be the internet itself
37:06christoph kopf is one of the foremost neurobiologists in the world
37:10he's chief scientist at paul allen institute for brain research in seattle for christoph
37:17the mind is purely a product of the web of neurons in the brain so if the internet were a brain how would
37:26its complexity stack up against a human brain the internet is by far the most complex artifact ever
37:34built by mankind it has on the order of probably 10 000 more transistors than their synapses in your
37:41typical brain it certainly raises the possibility given the enormous complexity of the internet
37:47that now sometimes in the future it may feel like something to be the internet that the internet itself has
37:53some degree of sentience some say the internet may already be essential or self-aware but its level
38:03of consciousness may be similar to that of a newborn let's say the internet has some sort of dim awareness
38:10we have to ask how intelligent is that awareness you know if you're a little baby you can be somewhat
38:15dimly aware of your mom and that you're hungry and that you're looking for milk but you're not really very
38:19intelligent and you're not able to do a lot but presumably the internet will learn and evolve it will
38:26grow up if it does how will we know when it has become more than just a glorified calculator
38:36one way to gauge consciousness is to apply the turing test this imagines asking a man and a machine
38:45a series of questions without knowing who or what is giving the answers if you can't figure out which
38:52one is the machine if the machine has fooled you into thinking it is human then for all practical
38:58purposes it might as well be intelligent and we will look at you at me christoph proposes a new improved
39:10turing test that measures not just intelligence but consciousness the test uses visual imagery the
39:18computer must decide whether a series of photographs are right or wrong any humans looking at these
39:26photographs would know they are not real but modern-day computers are still easily fooled
39:34a computer unless you provide it with a very very large list an almost infinite large list of all the
39:39exception could not deal with that and that's the basic nature of this turing test for visual
39:44consciousness christoph wants to apply this test to the entire internet if the vast global network of
39:51computers passes the test by his definition it is awake and aware but what if the internet is conscious
40:00what would it want how will it behave will it be friend or foe servant or master
40:08to the extent that the internet developed independent behaviors would be scary it could be very scary
40:13because it could have all sorts of security implication to that extent that would certainly
40:18be a signal that there's something independent autonomous there if the internet begins to do unpredictable
40:25things we will know we are dealing with a new form of life it may even follow an important precedent
40:33in the biological history of planet earth the absorption of smaller simpler life forms into the bodies of larger
40:42more complex ones the future of humanity may be similar to that of mitochondria the power generators
40:50inside most biological cells mitochondria were once independent organisms but over evolutionary history they
41:00were taken over by larger cells the once independent mitochondria became a mere power source for their masters
41:09we and the civilizations we now think of as superpowers may be absorbed by our own
41:15creation but what would it want from us other than occasional repairs perhaps it would want our energy
41:26or perhaps it will desire the one thing it doesn't have a soul if the soul is really spooky if you can't
41:36measure it why do you need it what function does it do that you can't do with physical stuff anymore
41:43so today with the existence of computers there isn't any need for soul stuff because can all be done
41:48using computations using algorithms in software a conscious super powerful internet may not need
41:56a soul to function but experiencing the joys and sorrows of humanity would give it another way to understand
42:03the world so our defining difference from technology may ultimately keep the human race from becoming its
42:12victim throughout history every technological advance has led to new forms of warfare the bronze age gave
42:24us the axe and the sword iron gave us the cannon and the gun the information age has birthed its own weapons
42:34weapons but information is not a physical resource that can be mined and controlled like iron and bronze
42:42it's a resource of the mind in this new age the fate of a nation even the mightiest superpower rests on one
42:53thing the power of human imagination
Be the first to comment
Add your comment

Recommended