1 00:00:17,359 --> 00:00:20,257 I'd like to start by asking you a few questions. 2 00:00:20,257 --> 00:00:23,542 Please raise your hand if you have a smartphone. 3 00:00:23,542 --> 00:00:26,344 OK. Is there anyone here without a smartphone? 4 00:00:26,344 --> 00:00:28,902 Oh, I'm sorry. (Laughter) 5 00:00:28,902 --> 00:00:31,611 Raise your hand if you have a Facebook account. 6 00:00:31,611 --> 00:00:34,781 OK. Is there anyone here without a Facebook account? 7 00:00:34,781 --> 00:00:38,969 Wow, I'll speak more slowly. (Laughter) 8 00:00:38,969 --> 00:00:43,036 Is there anyone here that has more than one Facebook account? 9 00:00:43,036 --> 00:00:44,951 OK, interesting. 10 00:00:44,951 --> 00:00:48,297 How about Twitter? Instagram? 11 00:00:48,297 --> 00:00:51,828 Have you ever bought something from Ebay? 12 00:00:51,828 --> 00:00:56,743 Amazon? Deal Extreme? With that, you are very good. 13 00:00:56,743 --> 00:01:00,379 Is there anyone here that has bitcoins? 14 00:01:00,379 --> 00:01:01,753 OK, interesting. 15 00:01:01,753 --> 00:01:03,683 OK, last one. Listen carefully. 16 00:01:03,683 --> 00:01:06,984 If you had to choose between spending three days 17 00:01:06,984 --> 00:01:10,000 without your smartphone or without your toothbrush, 18 00:01:10,000 --> 00:01:12,873 what would you choose? (Laughter) 19 00:01:12,873 --> 00:01:16,369 Don't answer. There are cameras here. 20 00:01:16,369 --> 00:01:19,291 Ever since I was a kid, I was fascinated with computers. 21 00:01:19,291 --> 00:01:22,732 I loved taking them apart and putting them back together. 22 00:01:22,732 --> 00:01:25,685 Putting them back together didn't always work. 23 00:01:25,685 --> 00:01:28,098 Nevertheless, I learned a lot. 24 00:01:28,098 --> 00:01:31,362 But there was a downside to this, as you would expect. 25 00:01:31,362 --> 00:01:34,374 Friends, and friends of friends, and even their parents, 26 00:01:34,374 --> 00:01:35,679 used to call me and ask, 27 00:01:35,679 --> 00:01:39,431 "Do you have a spare minute? I need you to fix my computer." 28 00:01:39,431 --> 00:01:40,825 It never took a minute. 29 00:01:40,825 --> 00:01:45,370 And I hated the fact that computers had so many problems. 30 00:01:45,370 --> 00:01:47,102 One day, I decided, "Enough. 31 00:01:47,102 --> 00:01:50,751 From now on, I'm going to charge anyone who wants me to fix his computer." 32 00:01:50,751 --> 00:01:53,577 Amazingly enough, that actually worked. 33 00:01:53,577 --> 00:01:56,988 People started paying me to fix their computers. 34 00:01:56,988 --> 00:02:01,310 From that moment on, I loved the fact that computers had so many problems. 35 00:02:01,310 --> 00:02:02,653 (Laughter) 36 00:02:02,653 --> 00:02:05,473 So at the age of 15, I actually opened my first business 37 00:02:05,473 --> 00:02:07,711 together with a friend of mine from school. 38 00:02:07,711 --> 00:02:09,665 And it was a huge success for us. 39 00:02:09,665 --> 00:02:12,796 We didn't have to take anymore money from our parents. 40 00:02:12,796 --> 00:02:15,320 And we started with fixing computers 41 00:02:15,320 --> 00:02:18,079 and at some point we started selling computers. 42 00:02:18,079 --> 00:02:21,629 But the most amazing thing about this story 43 00:02:21,629 --> 00:02:24,882 is that so few people know it. 44 00:02:24,882 --> 00:02:27,997 This is actually the first time I'm sharing this business card. 45 00:02:27,997 --> 00:02:33,805 I only took this picture four days ago for the sake of this presentation. 46 00:02:33,805 --> 00:02:36,288 I'm from the last generation that knows 47 00:02:36,288 --> 00:02:39,730 how the world looked like before the Internet. 48 00:02:39,730 --> 00:02:44,607 Now, keep that in mind, and think about the children of our grandchildren. 49 00:02:44,607 --> 00:02:46,687 They will know us so well. 50 00:02:46,687 --> 00:02:50,110 I have no clue who was my great grandfather. 51 00:02:50,110 --> 00:02:53,114 It could have been anyone. 52 00:02:53,114 --> 00:02:56,197 There is so little information about past generations. 53 00:02:56,197 --> 00:02:59,395 And only selected few had received this highest honor 54 00:02:59,395 --> 00:03:01,169 of having their life documented. 55 00:03:01,169 --> 00:03:03,696 Right, kings and philosophers. 56 00:03:03,696 --> 00:03:07,926 But for us, we document our lives as we go. 57 00:03:07,926 --> 00:03:13,420 Every 60 seconds, 100 hours of movies are being uploaded to YouTube. 58 00:03:13,420 --> 00:03:19,227 In those 60 seconds, approximately 40,000 pictures are being posted on Instagram. 59 00:03:19,227 --> 00:03:22,733 And 350,000 tweets are being shared. 60 00:03:22,733 --> 00:03:26,713 So, future generations will have so much information about us, 61 00:03:26,713 --> 00:03:28,937 they wouldn't know what to do with it. 62 00:03:28,937 --> 00:03:32,195 They could know us so well, but so could anyone else. 63 00:03:32,195 --> 00:03:34,954 Including our future potential boss 64 00:03:34,954 --> 00:03:37,465 that might approach a new type of psychologist, 65 00:03:37,465 --> 00:03:41,856 that will be asked to determine whether we fit for the job that we applied to. 66 00:03:41,856 --> 00:03:44,434 And he would do that without even meeting us. 67 00:03:44,434 --> 00:03:47,972 Just by browsing through the information we shared, 68 00:03:47,972 --> 00:03:51,537 and, yes, sometimes the information we forgot we've shared. 69 00:03:51,537 --> 00:03:52,933 (Laughter) 70 00:03:52,933 --> 00:03:55,426 I have no excuse, I'm sorry. 71 00:03:56,286 --> 00:03:59,076 No one needs to meet us in order to know us. 72 00:03:59,076 --> 00:04:01,768 So sometimes we will find out if we got the job 73 00:04:01,768 --> 00:04:04,381 even before we had the interview. 74 00:04:04,381 --> 00:04:09,382 Strange as it may sound, today, 75% of employers 75 00:04:09,382 --> 00:04:13,056 are already browsing through candidates' personal profiles 76 00:04:13,056 --> 00:04:14,659 before hiring them. 77 00:04:14,659 --> 00:04:18,699 One in every three admitted having disqualified a candidate 78 00:04:18,699 --> 00:04:22,291 because of information found online. 79 00:04:22,291 --> 00:04:26,022 And we're becoming even better at sharing information, right? 80 00:04:26,022 --> 00:04:29,227 So, amazing companies are creating great tools 81 00:04:29,227 --> 00:04:32,592 that will help us share more and more information. 82 00:04:32,592 --> 00:04:35,758 They do that because they understand the great value 83 00:04:35,758 --> 00:04:40,982 in holding huge amounts of personal information, of our infomation. 84 00:04:40,982 --> 00:04:44,003 We should think of them as a great machine 85 00:04:44,003 --> 00:04:49,136 that knows how to transform personal data into profit. 86 00:04:49,136 --> 00:04:52,054 And they make billions of money. 87 00:04:52,054 --> 00:04:55,938 But I want to speak about a different type of machines. 88 00:04:55,938 --> 00:04:59,964 Those machines also take personal data, the same data, 89 00:04:59,964 --> 00:05:04,313 but they transform it into National Security. 90 00:05:04,313 --> 00:05:08,179 Those are governments and intelligence agencies. 91 00:05:08,179 --> 00:05:12,391 So, with Facebook, we know how they get the information. 92 00:05:12,391 --> 00:05:14,840 We give it to them, free of charge. 93 00:05:14,840 --> 00:05:18,132 But how would intelligence agencies get this information? 94 00:05:18,132 --> 00:05:21,520 It's not very easy to collect, right? 95 00:05:21,520 --> 00:05:23,030 But wait a minute. 96 00:05:23,030 --> 00:05:27,351 If someone already collected it, maybe we can use it. 97 00:05:27,351 --> 00:05:33,212 So, many states understand now that they have a great incentive 98 00:05:33,212 --> 00:05:36,990 to put a spy inside Facebook. 99 00:05:36,990 --> 00:05:39,055 But not just Facebook. 100 00:05:39,055 --> 00:05:43,639 Many companies in the private sector are unwillingly becoming pawned 101 00:05:43,639 --> 00:05:47,970 in the national security games, in the homeland security campaigns. 102 00:05:47,970 --> 00:05:49,833 You probably recognize this guy, right? 103 00:05:49,833 --> 00:05:52,593 This is Edward Snowden, who worked for the NSA. 104 00:05:52,593 --> 00:05:55,702 The NSA is the National Security Agency. 105 00:05:55,702 --> 00:05:58,636 What do they do there, inside the NSA? 106 00:05:58,636 --> 00:06:03,833 In the world of intelligence, they are called SIGINT Intelligence gathering Unit. 107 00:06:03,833 --> 00:06:07,298 SIGINT stands for Signals Intelligence. 108 00:06:07,298 --> 00:06:09,598 That means that the NSA, 109 00:06:09,598 --> 00:06:11,746 much like Facebook and Google and others, 110 00:06:11,746 --> 00:06:16,599 is in the business of collecting digital data and processing it. 111 00:06:16,599 --> 00:06:20,235 So, every country in the world has an agency 112 00:06:20,235 --> 00:06:22,224 that is responsible for SIGINT gathering. 113 00:06:22,224 --> 00:06:24,065 In the United States, it's the NSA. 114 00:06:24,065 --> 00:06:25,614 Edward Snowden worked there, 115 00:06:25,614 --> 00:06:27,453 and one day he decided to do something 116 00:06:27,453 --> 00:06:30,766 that completely changed the way we speak about privacy. 117 00:06:30,766 --> 00:06:33,214 He took many documents and published them; 118 00:06:33,214 --> 00:06:36,914 many classified documents from within the NSA, and published them. 119 00:06:36,914 --> 00:06:39,311 You should understand, that until that point, 120 00:06:39,311 --> 00:06:44,628 people in my field of work addressed NSA as No Such Agency. 121 00:06:44,948 --> 00:06:46,715 This is how we called them. 122 00:06:46,715 --> 00:06:50,267 But right now, we have so much information about what is going on in there. 123 00:06:50,267 --> 00:06:52,524 So, one of the first things that Edward Snowden 124 00:06:52,524 --> 00:06:54,477 actually published, revealed to the world 125 00:06:54,477 --> 00:06:58,482 this secret secret secret project, named PRISM. 126 00:06:58,852 --> 00:07:00,855 This is what Edward Snowden published. 127 00:07:00,855 --> 00:07:04,935 This is what used to be a top secret presentation. 128 00:07:04,935 --> 00:07:09,353 It was so secret that only selected few inside the NSA 129 00:07:09,353 --> 00:07:11,584 were cleared to see it. 130 00:07:11,584 --> 00:07:16,824 While viewing this presentation, we come to understand two amazing things. 131 00:07:16,824 --> 00:07:21,107 The first one, they design terrible presentations inside the NSA. 132 00:07:21,107 --> 00:07:22,480 (Laughter) 133 00:07:22,480 --> 00:07:26,655 This design is unforgivable. Seriously, guys. 134 00:07:26,655 --> 00:07:29,934 The second thing that we learned is what PRISM is. 135 00:07:29,934 --> 00:07:33,518 PRISM is an intelligence gathering program, 136 00:07:33,518 --> 00:07:38,029 through which the NSA actually had access to private companies, 137 00:07:38,029 --> 00:07:40,676 to information that was stored inside private companies, 138 00:07:40,676 --> 00:07:45,570 like Microsoft, Yahoo, Google and Facebook, Skype, YouTube and Apple. 139 00:07:45,570 --> 00:07:48,218 The NSA could access those companies 140 00:07:48,218 --> 00:07:51,411 in order to gain access to our information. 141 00:07:51,411 --> 00:07:54,422 Obviously these things that Edward Snowden published 142 00:07:54,422 --> 00:07:57,347 created a lot of public criticism surrounding the NSA, right? 143 00:07:57,347 --> 00:07:59,524 The public wasn't happy with that. 144 00:07:59,524 --> 00:08:02,482 So, someone had to tell the other side of the story. 145 00:08:02,482 --> 00:08:06,976 The job fell on the shoulders of this guy, General Keith Alexander, 146 00:08:06,976 --> 00:08:09,936 who until recently was the head of the NSA. 147 00:08:09,936 --> 00:08:13,206 So, his job was to demonstrate the trade-off. 148 00:08:13,206 --> 00:08:14,979 So if you have privacy in one hand, 149 00:08:14,979 --> 00:08:16,754 and national security in the other, 150 00:08:16,754 --> 00:08:18,667 and you want more national security, 151 00:08:18,667 --> 00:08:20,885 you should compromise privacy. That's that. 152 00:08:20,885 --> 00:08:26,119 So, he tries to convince us that the NSA is actually an efficient machine 153 00:08:26,119 --> 00:08:29,697 for transforming personal data into national security. 154 00:08:29,697 --> 00:08:31,115 How did he do that? 155 00:08:31,115 --> 00:08:32,651 One of the things that he did, 156 00:08:32,651 --> 00:08:39,102 he went onstage at a big cyber conference in Las Vegas. 157 00:08:39,102 --> 00:08:41,837 This conference is for hackers and security professionals. 158 00:08:41,837 --> 00:08:44,323 I was sitting there in the audience listening to him, 159 00:08:44,323 --> 00:08:48,841 and he said about PRISM and other intelligence gathering programs 160 00:08:48,841 --> 00:08:53,798 that they were a vital tool in stopping actual terrorist attacks. 161 00:08:53,798 --> 00:08:56,408 Oh my God! What should we take from it? 162 00:08:56,408 --> 00:09:00,432 What should we take from the fact that the NSA is using this information 163 00:09:00,432 --> 00:09:02,343 to stop terrorist attacks? 164 00:09:02,343 --> 00:09:07,062 It is now the undeniable truth that the information that sits 165 00:09:07,062 --> 00:09:10,807 within private companies such as Facebook, 166 00:09:10,807 --> 00:09:14,623 is valuable intelligence related information. 167 00:09:14,623 --> 00:09:17,932 It is the type of information that the United States can use 168 00:09:17,932 --> 00:09:21,299 in order to promote its old national security agenda. 169 00:09:21,299 --> 00:09:24,068 Now, the NSA had a pretty easy life 170 00:09:24,068 --> 00:09:27,051 because all of those companies are actually American companies, 171 00:09:27,051 --> 00:09:29,022 which sit within the United States. 172 00:09:29,022 --> 00:09:32,095 So they could approach a federal judge that will issue a warrant. 173 00:09:32,095 --> 00:09:33,359 This is a magic key. 174 00:09:33,359 --> 00:09:36,732 It forces everyone to hand over this information. 175 00:09:36,732 --> 00:09:38,772 But what can Russia do? 176 00:09:38,772 --> 00:09:40,244 What can China do? 177 00:09:40,244 --> 00:09:43,079 What can any other country in the world do? 178 00:09:43,079 --> 00:09:46,177 Every intelligence agency in the world 179 00:09:46,177 --> 00:09:49,832 wants the information that sits inside Facebook and other companies. 180 00:09:49,832 --> 00:09:52,337 If the United States can stop terrorist attacks 181 00:09:52,337 --> 00:09:53,861 using this information, 182 00:09:53,861 --> 00:09:56,572 everyone can use this information. 183 00:09:56,572 --> 00:09:57,969 Make no mistake. 184 00:09:57,969 --> 00:10:00,270 It is not a question of if they will get it. 185 00:10:00,270 --> 00:10:03,533 It is a question of how and when. 186 00:10:03,533 --> 00:10:06,516 They can try to actually approach the federal judge, 187 00:10:06,516 --> 00:10:08,209 right, the American federal judge. 188 00:10:08,209 --> 00:10:11,420 It won't help, though it might amuse him a lot. 189 00:10:11,730 --> 00:10:15,139 So there are basically two ways to go about it. 190 00:10:15,139 --> 00:10:17,970 One, they can try hacking into Facebook, 191 00:10:17,970 --> 00:10:20,062 which is not an easy thing to accomplish. 192 00:10:20,062 --> 00:10:22,446 Trust me. (Laughter) 193 00:10:22,446 --> 00:10:24,784 The second thing that they can do, 194 00:10:24,784 --> 00:10:27,360 they can try to put a spy inside Facebook, 195 00:10:27,360 --> 00:10:29,780 so that he will provide the information they need. 196 00:10:29,780 --> 00:10:32,613 Well, when we think about a spy inside Facebook, 197 00:10:32,613 --> 00:10:35,199 this is probably not a spy we have in mind. 198 00:10:35,199 --> 00:10:38,371 This is more like it. (Laughter) 199 00:10:38,371 --> 00:10:41,529 It's strange to think about state sponsored spies 200 00:10:41,529 --> 00:10:44,486 inside private companies, inside commercial companies. 201 00:10:44,486 --> 00:10:49,718 But there are several reasons that make this thing easier. 202 00:10:49,718 --> 00:10:54,024 One, it's much easier to get a job inside Facebook than inside the NSA, 203 00:10:54,024 --> 00:10:56,405 security clearance-wise. 204 00:10:56,405 --> 00:10:58,962 The second thing is that the risk is lower. 205 00:10:58,962 --> 00:11:01,131 Being a spy inside Facebook is not as risky 206 00:11:01,131 --> 00:11:03,245 as being a spy inside the NSA. 207 00:11:03,245 --> 00:11:07,203 And the third, in the past, if you wanted to be a good spy, 208 00:11:07,203 --> 00:11:11,671 if you wanted to hire a good spy, you wanted this guy. 209 00:11:11,671 --> 00:11:14,148 This is the guy that knew everything, right? 210 00:11:14,148 --> 00:11:18,902 You wanted someone that would be as senior as possible inside the organization. 211 00:11:18,902 --> 00:11:21,944 But today, in the age of information, 212 00:11:21,944 --> 00:11:25,810 the people that actually have the power are those people, 213 00:11:25,810 --> 00:11:29,097 the hands-on guys, the engineers, the support team. 214 00:11:29,097 --> 00:11:33,052 Those people have unrestricted access to information. 215 00:11:33,052 --> 00:11:34,742 This is what you want. 216 00:11:34,742 --> 00:11:37,079 This makes your life much easier, 217 00:11:37,079 --> 00:11:39,719 if you want to put a spy inside a commercial company. 218 00:11:39,719 --> 00:11:41,577 And then the plot thickens, 219 00:11:41,577 --> 00:11:46,325 because there are many other companies that hold information that is valuable. 220 00:11:46,325 --> 00:11:51,492 For example, you might put a spy inside a mobile operator. 221 00:11:51,492 --> 00:11:53,905 And he could listen to your phone calls, 222 00:11:53,905 --> 00:11:57,984 and might be able to tell where you're at at every given moment. 223 00:11:57,984 --> 00:12:01,390 You might want to put a spy inside a credit card company. 224 00:12:01,390 --> 00:12:04,526 He will know everything about everyone 225 00:12:04,526 --> 00:12:06,946 while being inside a credit card company, 226 00:12:06,946 --> 00:12:09,717 and sometimes, your deepest secrets. 227 00:12:09,717 --> 00:12:11,711 And there are many other companies 228 00:12:11,711 --> 00:12:15,159 that hold valuable information for intelligence. 229 00:12:15,159 --> 00:12:18,963 So, where do we go from here? 230 00:12:18,963 --> 00:12:21,337 Someone hacked my presentation. 231 00:12:21,337 --> 00:12:23,058 (Laughter) 232 00:12:23,488 --> 00:12:25,760 Good job guys. 233 00:12:25,760 --> 00:12:27,697 Where do we go from here? 234 00:12:27,697 --> 00:12:30,128 We have to understand that today, 235 00:12:30,128 --> 00:12:34,850 commercial companies are actually better at collecting data 236 00:12:34,850 --> 00:12:37,345 than actual intelligence agencies. 237 00:12:37,345 --> 00:12:42,370 Companies like Facebook and Google are better at collecting our data 238 00:12:42,370 --> 00:12:44,971 than actual intelligence agencies. 239 00:12:44,971 --> 00:12:46,518 That's amazing. 240 00:12:46,518 --> 00:12:51,807 Think about Facebook facial recognition mechanism. 241 00:12:51,807 --> 00:12:54,059 This is an amazing tool for spies. 242 00:12:54,059 --> 00:12:55,916 Are you familiar with this mechanism? 243 00:12:55,916 --> 00:12:58,325 It means that you can take pictures of your friend 244 00:12:58,325 --> 00:13:00,683 and Facebook will automatically tag them. 245 00:13:00,683 --> 00:13:04,015 He will recognize your friends and will automatically tag them. 246 00:13:04,015 --> 00:13:08,037 So if you are a spy, you could create this amazing camera, 247 00:13:08,037 --> 00:13:11,273 and stand outside a secret agency, 248 00:13:11,273 --> 00:13:13,722 and take pictures of people coming out 249 00:13:13,722 --> 00:13:17,010 and immediately receive their names, the names of their friends, 250 00:13:17,010 --> 00:13:19,794 what are their deepest secrets, where are they going to be. 251 00:13:20,154 --> 00:13:22,769 Facebook is a dream place for spies. 252 00:13:22,769 --> 00:13:26,598 You can see how much the spy is happy. 253 00:13:26,598 --> 00:13:28,770 So where do we go from here? 254 00:13:28,770 --> 00:13:31,988 Should we educate our children only to use applications 255 00:13:31,988 --> 00:13:35,703 that were made by countries that we consider friendly? 256 00:13:35,703 --> 00:13:38,269 Or should we just accept that we are living in a world 257 00:13:38,269 --> 00:13:40,458 that has no secrets? 258 00:13:41,238 --> 00:13:45,374 What we can be sure of is that nothing is free. 259 00:13:45,374 --> 00:13:47,592 On the Internet nothing is free. 260 00:13:47,592 --> 00:13:52,057 We either pay with money or with our privacy. 261 00:13:52,057 --> 00:13:53,344 Thank you. 262 00:13:53,344 --> 00:13:58,229 (Applause)