Return to Video

Inside the massive (and unregulated) world of surveillance tech

  • 0:01 - 0:02
    A few years ago,
  • 0:02 - 0:04
    an American defense consultant I know
  • 0:04 - 0:07
    told me about a trip
    he took to Uzbekistan.
  • 0:07 - 0:09
    His role there was to help sell technology
  • 0:09 - 0:13
    that the Uzbek government could use
    to spy on its own citizens.
  • 0:13 - 0:16
    He eventually shared with me
    the marketing material
  • 0:16 - 0:18
    he'd presented to the Uzbek government.
  • 0:18 - 0:23
    One glossy brochure featured technology
    that could not just intercept phone calls,
  • 0:23 - 0:25
    but identify the caller,
  • 0:25 - 0:27
    regardless of what phone number
    they were using,
  • 0:27 - 0:29
    based on their unique voiceprint,
  • 0:29 - 0:33
    and then identify their exact
    geographic location.
  • 0:33 - 0:36
    This is a guy who had been involved
    with the arms trade for years.
  • 0:36 - 0:40
    He wasn't some Hollywood-type gunrunner
    doing backroom deals.
  • 0:40 - 0:43
    He was just a guy that worked
    with legitimate Western companies
  • 0:43 - 0:45
    to help sell their weapons abroad.
  • 0:45 - 0:47
    But he wasn't bothered
    by marketing this sort of technology.
  • 0:48 - 0:50
    For him, it was just the next step
    in the arms trade.
  • 0:50 - 0:53
    And it was even easier than, say,
    selling weapons to Iraq,
  • 0:53 - 0:55
    because it didn't require
    an export license
  • 0:56 - 0:57
    from the US State Department,
  • 0:57 - 0:59
    the way most arms sales would.
  • 0:59 - 1:01
    It turns out that these
    tools of surveillance
  • 1:01 - 1:03
    are almost completely unregulated,
  • 1:03 - 1:06
    because as of today,
    they're not defined as weapons.
  • 1:06 - 1:09
    But they should be, and we need
    to regulate them that way.
  • 1:10 - 1:12
    I'm a journalist
    who has spent the last two decades
  • 1:12 - 1:14
    looking at how the military
    and intelligence world
  • 1:15 - 1:17
    spurs the development
    of new science and technology.
  • 1:17 - 1:19
    I've tracked the emergence of new weapons
  • 1:19 - 1:20
    and looked to see what happens
  • 1:21 - 1:23
    when companies start to market
    these weapons abroad.
  • 1:23 - 1:26
    But what is a weapon
    in the information age?
  • 1:26 - 1:28
    We know that armed drones are weapons,
  • 1:28 - 1:30
    missiles and bombs are weapons,
  • 1:30 - 1:32
    but the State Department
    actually classifies
  • 1:32 - 1:35
    broad categories
    of technologies as weapons.
  • 1:35 - 1:39
    So for example, a scientist going abroad
    on an oceanographic research vessel,
  • 1:39 - 1:41
    they want to take
    the latest night-vision goggles?
  • 1:41 - 1:45
    That, according to the State Department,
    is potentially a weapon.
  • 1:45 - 1:46
    Why?
  • 1:46 - 1:49
    Well, because though night-vision goggles
    are used today by scientists
  • 1:49 - 1:51
    and hunters around the world,
  • 1:51 - 1:53
    it was a capability
    first developed for the military.
  • 1:53 - 1:55
    And yet, tools of surveillance
  • 1:55 - 1:58
    that an authoritarian regime could use
    to spy on its own citizens,
  • 1:58 - 2:00
    on dissidents, on journalists,
  • 2:00 - 2:03
    that, according to the US government
    today, is not a weapon.
  • 2:04 - 2:05
    And yet, these tools of surveillance
  • 2:05 - 2:09
    are part of a growing secretive
    multi-billion-dollar industry.
  • 2:10 - 2:13
    The genesis of this spy bazaar
    goes back some 18 years,
  • 2:13 - 2:15
    to a Hilton hotel in northern Virginia,
  • 2:15 - 2:18
    just a few miles away
    from the US Central Intelligence Agency.
  • 2:19 - 2:21
    A few dozen people,
    mostly dark-suited men,
  • 2:21 - 2:23
    gathered there in the spring of 2002
  • 2:23 - 2:26
    for a conference with
    the unassuming name of ISS World.
  • 2:27 - 2:30
    You know, at first glance, this conference
    probably looked like dozens of events
  • 2:30 - 2:33
    that used to take place
    around the Washington, DC area.
  • 2:33 - 2:35
    But this event was unique.
  • 2:35 - 2:38
    ISS stands for Intelligence
    Support Systems,
  • 2:38 - 2:39
    and the people who were there
  • 2:39 - 2:42
    were from companies
    that built technologies to spy
  • 2:42 - 2:44
    on private communications.
  • 2:44 - 2:47
    In other words, these were
    sort of wire-tappers for hire.
  • 2:47 - 2:50
    And the reason they were there
    was that less than a year earlier,
  • 2:50 - 2:52
    the 9/11 terrorist attacks
    on New York and Washington
  • 2:52 - 2:55
    had spurred the Congress
    to press through legislation
  • 2:55 - 2:57
    known as the Patriot Act.
  • 2:57 - 3:00
    This gave the government
    broad new authorities
  • 3:00 - 3:02
    to monitor communications.
  • 3:02 - 3:04
    Emails, internet activity, phone calls,
  • 3:04 - 3:06
    even financial transactions.
  • 3:06 - 3:09
    This created an instant demand for data.
  • 3:09 - 3:12
    And in the true American
    entrepreneurial spirit,
  • 3:12 - 3:15
    an industry rose up
    to help collect this data.
  • 3:15 - 3:16
    But back in 2002,
  • 3:16 - 3:18
    this was still a pretty modest affair.
  • 3:18 - 3:21
    Only about 10 percent
    of the world's population
  • 3:21 - 3:22
    was even online using the internet.
  • 3:22 - 3:27
    So most of what was being collected
    were simple emails and phone calls
  • 3:27 - 3:29
    over landlines and cell phones.
  • 3:29 - 3:30
    But over the next few years,
  • 3:30 - 3:33
    the way that we communicate
    began to change rapidly.
  • 3:33 - 3:36
    There was the introduction
    of Skype, Facebook
  • 3:36 - 3:38
    and then, crucially, the iPhone,
  • 3:38 - 3:39
    and within a few years,
  • 3:39 - 3:43
    billions of us were walking around
    with little computers in our pockets
  • 3:43 - 3:45
    that do everything
    from monitor our exercise habits
  • 3:45 - 3:48
    to help us find romantic partners.
  • 3:48 - 3:51
    And suddenly, you didn't necessarily need
    the advanced capability
  • 3:51 - 3:54
    of the National Security Agency
    or big telecoms
  • 3:54 - 3:56
    to monitor everyone's communication.
  • 3:56 - 3:57
    In some cases,
  • 3:57 - 4:01
    all you needed was access
    to that device in their pockets.
  • 4:01 - 4:04
    And that gave birth to an entirely
    new type of industry.
  • 4:04 - 4:07
    You know, not many companies
    can build missiles or aircraft,
  • 4:07 - 4:11
    but it doesn't take a lot of capital
    to create software
  • 4:11 - 4:13
    that can hack into someone's smartphone.
  • 4:13 - 4:15
    Computer hackers
    have been around for years,
  • 4:15 - 4:18
    but now their skills could be used
    to build technologies
  • 4:18 - 4:20
    that were in high demand
    by law enforcement
  • 4:20 - 4:22
    and intelligence agencies.
  • 4:22 - 4:25
    And soon, dozens
    and even hundreds of companies
  • 4:25 - 4:28
    were getting into this
    wire-tappers' market.
  • 4:28 - 4:30
    And that little conference in Virginia,
  • 4:30 - 4:34
    it grew and soon became known
    as the Wiretappers' Ball.
  • 4:34 - 4:37
    Well, not much was known
    about the Wiretappers' Ball
  • 4:37 - 4:38
    in those early years,
  • 4:38 - 4:40
    because the conferences
    were closed to everyone
  • 4:40 - 4:43
    except the companies
    and their government customers.
  • 4:43 - 4:45
    But journalists did begin to see
    and hear reports
  • 4:45 - 4:48
    of companies getting
    into this private spy market.
  • 4:48 - 4:51
    Spooky entrepreneurs
    going around the world,
  • 4:51 - 4:52
    doing deals,
  • 4:52 - 4:54
    often with authoritarian regimes.
  • 4:54 - 4:58
    And it was, from the start,
    a really loosely regulated market.
  • 4:58 - 5:02
    Some countries do require permission
    to sell these technologies abroad,
  • 5:02 - 5:06
    but rarely with the type of scrutiny
    that is given to traditional arms.
  • 5:07 - 5:10
    So for example, the Italian-based
    company Hacking Team
  • 5:10 - 5:13
    reportedly sold its technology
    to authoritarian regimes
  • 5:13 - 5:15
    in Egypt and Kazakhstan.
  • 5:15 - 5:19
    The Israeli-based company NSO Group
    has reportedly sold its technology
  • 5:19 - 5:21
    to the regime in Saudi Arabia,
  • 5:21 - 5:22
    which has been accused of harassing,
  • 5:23 - 5:26
    and even, in one case,
    killing one of its political opponents.
  • 5:26 - 5:30
    And we do think of weapons
    as things that kill people.
  • 5:30 - 5:31
    But in the information age,
  • 5:31 - 5:35
    some of the most powerful weapons
    are things that can track and identify us.
  • 5:36 - 5:39
    This is something that the Pentagon
    and CIA have recognized for years,
  • 5:39 - 5:41
    and they've tried to build technologies
  • 5:41 - 5:45
    that can track people,
    suspected terrorists, around the globe.
  • 5:45 - 5:48
    The Pentagon has invested
    in something called smart dust,
  • 5:48 - 5:51
    little microsensors
    the size of specs of dust
  • 5:51 - 5:54
    that you could scatter on people
    without them knowing it,
  • 5:54 - 5:56
    and then use it to track their location.
  • 5:56 - 5:58
    The Pentagon, through
    its venture capital firm,
  • 5:58 - 6:03
    has invested in a beauty products company
    once featured in "Oprah Magazine"
  • 6:03 - 6:06
    to build a device that could
    surreptitiously collect DNA
  • 6:06 - 6:08
    just by swiping across the skin.
  • 6:09 - 6:11
    But something remarkable has happened
    over the past decade.
  • 6:11 - 6:14
    In many cases, what the private
    marketplace has been able to do
  • 6:14 - 6:19
    has far outstripped what the Pentagon
    or CIA even thought was possible.
  • 6:19 - 6:20
    Back in 2008,
  • 6:20 - 6:24
    the Pentagon had a secretive database
    of DNA from terrorists.
  • 6:24 - 6:26
    It had about 80,000 samples.
  • 6:27 - 6:29
    Well, the private company AncestryDNA
  • 6:29 - 6:33
    today has samples
    from over 15 million people.
  • 6:33 - 6:36
    23andMe, the second-largest
    genealogical database,
  • 6:36 - 6:39
    has samples from over 10 million people.
  • 6:39 - 6:42
    So now, maybe you don't need
    these James Bond-worthy techniques
  • 6:42 - 6:44
    of collecting DNA
  • 6:44 - 6:47
    if we're willingly handing it over
    to private companies
  • 6:47 - 6:49
    and even paying for the honor of doing it.
  • 6:50 - 6:53
    Well, what could you do
    with a sample of someone's DNA?
  • 6:53 - 6:55
    In the United States and China,
  • 6:55 - 6:57
    researchers are working
    on using DNA samples
  • 6:57 - 7:00
    to build images of people's faces.
  • 7:00 - 7:04
    So if you pair DNA
    with facial recognition technology,
  • 7:04 - 7:07
    you have the basis of a really
    powerful surveillance system
  • 7:07 - 7:10
    that could be used to track individuals
    or entire ethnic groups.
  • 7:10 - 7:13
    And if you think that sounds
    a little bit paranoid,
  • 7:13 - 7:16
    keep in mind that the Pentagon
    last year sent out a memo
  • 7:16 - 7:18
    to all of its service members,
  • 7:18 - 7:21
    warning them precisely not to use
    those commercial DNA kits
  • 7:21 - 7:24
    over concerns that information
    could be used to track them
  • 7:24 - 7:26
    or their family members.
  • 7:26 - 7:30
    And yet, even with the Pentagon
    raising concerns about this technology,
  • 7:30 - 7:33
    almost nothing has been done
    to reign in this market.
  • 7:33 - 7:35
    One American company, Clearview AI,
  • 7:35 - 7:38
    has been collecting billions
    of images of people's faces
  • 7:38 - 7:39
    from across the internet,
  • 7:39 - 7:43
    like those pictures you post on Instagram
    of you and your friends and family,
  • 7:43 - 7:46
    and then selling its facial
    recognition services
  • 7:46 - 7:49
    to US government
    and law-enforcement agencies.
  • 7:49 - 7:50
    And even if you think
  • 7:50 - 7:53
    that's a perfectly acceptable
    application of this technology,
  • 7:53 - 7:56
    there's nothing to stop them
    from selling to private individuals,
  • 7:56 - 7:59
    corporations or even foreign governments.
  • 7:59 - 8:02
    And that's exactly
    what some companies are doing.
  • 8:02 - 8:05
    That Wiretappers' Ball
    that started in northern Virginia?
  • 8:05 - 8:09
    Today, it's held in multiple cities
    around the globe.
  • 8:09 - 8:13
    Thousands of people now attend
    the ISS trainings and conferences.
  • 8:13 - 8:17
    And more of the companies showing up
    are coming from the Middle East and China.
  • 8:17 - 8:19
    The spy bazaar has gone global.
  • 8:20 - 8:21
    And at arms shows now around the world,
  • 8:21 - 8:25
    you'll see companies displaying
    facial recognition technology
  • 8:25 - 8:26
    and phone hacking software,
  • 8:26 - 8:29
    displaying right next
    to traditional arms manufacturers
  • 8:29 - 8:31
    with tanks and missiles.
  • 8:31 - 8:33
    And walking around these arms shows,
  • 8:33 - 8:36
    it's pretty easy to go down
    dystopian rabbit holes,
  • 8:36 - 8:38
    thinking about future
    surveillance technology
  • 8:38 - 8:40
    that will track our every move.
  • 8:40 - 8:42
    And I remember one
    Pentagon adviser telling me
  • 8:42 - 8:45
    that what the military really needed
    were space-based satellites
  • 8:45 - 8:49
    that could track people anywhere on earth
    based just on their DNA.
  • 8:49 - 8:52
    It's enough to make you invest
    in tinfoil hats.
  • 8:52 - 8:53
    But the truth is,
  • 8:53 - 8:56
    we don't know what sort
    of technology the future will bring.
  • 8:56 - 8:59
    But we know that today,
    in the absence of regulation,
  • 8:59 - 9:01
    this marketplace is already exploding.
  • 9:01 - 9:05
    And in fact, one of those companies
    accused of selling surveillance technology
  • 9:05 - 9:07
    to authoritarian regimes,
  • 9:07 - 9:11
    today, it's offering to help track
    those infected with COVID-19.
  • 9:11 - 9:14
    And of course, technology does offer
    the tantalizing promise
  • 9:14 - 9:17
    of helping control a pandemic
    through contact tracing.
  • 9:17 - 9:21
    But it also opens up another door,
    to privatized mass surveillance.
  • 9:22 - 9:25
    So what do we do
    about this private spy bazaar?
  • 9:25 - 9:27
    We can hide, go offline,
  • 9:27 - 9:30
    get off social media,
    ditch our smartphones,
  • 9:30 - 9:31
    go live in a cave,
  • 9:31 - 9:34
    but the truth is, we're not trained
    to be professional spies,
  • 9:34 - 9:37
    we can't live under false identities
    or with no identities.
  • 9:38 - 9:42
    And even real spies are having a hard time
    staying below the radar, these days.
  • 9:42 - 9:44
    It doesn't matter how many
    passports Jason Bourne has
  • 9:44 - 9:47
    if his face or DNA
    is in someone's database.
  • 9:48 - 9:51
    But if even governments have lost control
    of the tools of spying,
  • 9:51 - 9:53
    is there anything we can do about it?
  • 9:53 - 9:54
    One argument I've heard
  • 9:54 - 9:56
    is that even if the US
    were to restrict companies
  • 9:56 - 9:59
    from selling this sort
    of technology abroad,
  • 9:59 - 10:01
    companies based in China
    might simply step in.
  • 10:01 - 10:04
    But we regulate the arms trade today,
  • 10:04 - 10:06
    even if we do it imperfectly.
  • 10:06 - 10:09
    And in fact, there was a multilateral
    proposal several years ago
  • 10:10 - 10:11
    to do just that,
  • 10:11 - 10:14
    to require export licenses
    for surveillance software.
  • 10:14 - 10:16
    The United States
    was among those countries
  • 10:16 - 10:19
    that agreed to these
    voluntary regulations,
  • 10:19 - 10:22
    but back in Washington,
    this proposal has simply languished.
  • 10:22 - 10:25
    We have an administration
    that would rather sell more weapons abroad
  • 10:25 - 10:26
    with fewer restrictions,
  • 10:26 - 10:28
    including to some of those countries
  • 10:28 - 10:30
    accused of abusing
    surveillance technology.
  • 10:31 - 10:34
    I think to move forward,
    we would need to revive that proposal,
  • 10:34 - 10:36
    but even go one step further.
  • 10:36 - 10:39
    We need to fundamentally change
    how we think of surveillance technology
  • 10:39 - 10:42
    and define these tools as weapons.
  • 10:42 - 10:43
    This would allow government
  • 10:43 - 10:46
    to regulate and control
    their sale and export
  • 10:46 - 10:49
    the way that they control
    traditional arms,
  • 10:49 - 10:51
    advanced aircraft and missiles.
  • 10:51 - 10:55
    But that means recognizing
    that technology that tracks who we are,
  • 10:55 - 10:57
    what we do, what we say,
  • 10:57 - 10:59
    and even in some cases, what we think,
  • 10:59 - 11:01
    is a form of advanced weaponry.
  • 11:01 - 11:03
    And these weapons
    are growing too powerful,
  • 11:03 - 11:05
    available to the highest bidder,
  • 11:05 - 11:07
    and according to the whims
    of the spy bazaar.
  • 11:08 - 11:09
    Thank you.
Title:
Inside the massive (and unregulated) world of surveillance tech
Speaker:
Sharon Weinberger
Description:

What is a weapon in the Information Age? From microscopic "smart dust" tracking devices to DNA-tracing tech and advanced facial recognition software, journalist Sharon Weinberger leads a hair-raising tour through the global, unregulated bazaar of privatized mass surveillance. To rein in this growing, multibillion-dollar marketplace that often caters to customers with nefarious intents, Weinberger believes the first step is for governments to classify surveillance tools as dangerous and powerful weapons.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
11:23

English subtitles

Revisions Compare revisions