WEBVTT 00:00:17.359 --> 00:00:20.257 I'd like to start by asking you a few questions. 00:00:20.257 --> 00:00:23.542 Please raise your hand if you have a smartphone. 00:00:23.542 --> 00:00:26.344 OK. Is there anyone here without a smartphone? 00:00:26.344 --> 00:00:28.902 Oh, I'm sorry. (Laughter) 00:00:28.902 --> 00:00:31.611 Raise your hand if you have a Facebook account. 00:00:31.611 --> 00:00:34.781 OK. Is there anyone here without a Facebook account? 00:00:34.781 --> 00:00:38.969 Wow, I'll speak more slowly. (Laughter) 00:00:38.969 --> 00:00:43.036 Is there anyone here that has more than one Facebook account? 00:00:43.036 --> 00:00:44.951 OK, interesting. 00:00:44.951 --> 00:00:48.297 How about Twitter? Instagram? 00:00:48.297 --> 00:00:51.828 Have you ever bought something from Ebay? 00:00:51.828 --> 00:00:56.743 Amazon? Deal Extreme? With that, you are very good. 00:00:56.743 --> 00:01:00.379 Is there anyone here that has bitcoins? 00:01:00.379 --> 00:01:01.753 OK, interesting. 00:01:01.753 --> 00:01:03.683 OK, last one. Listen carefully. 00:01:03.683 --> 00:01:06.984 If you had to choose between spending three days 00:01:06.984 --> 00:01:10.000 without your smartphone or without your toothbrush, 00:01:10.000 --> 00:01:12.873 what would you choose? (Laughter) 00:01:12.873 --> 00:01:16.369 Don't answer. There are cameras here. 00:01:16.369 --> 00:01:19.291 Ever since I was a kid, I was fascinated with computers. 00:01:19.291 --> 00:01:22.732 I loved taking them apart and putting them back together. 00:01:22.732 --> 00:01:25.685 Putting them back together didn't always work. 00:01:25.685 --> 00:01:28.098 Nevertheless, I learned a lot. 00:01:28.098 --> 00:01:31.362 But there was a downside to this, as you would expect. 00:01:31.362 --> 00:01:34.374 Friends, and friends of friends, and even their parents, 00:01:34.374 --> 00:01:35.679 used to call me and ask, 00:01:35.679 --> 00:01:39.431 "Do you have a spare minute? I need you to fix my computer." 00:01:39.431 --> 00:01:40.825 It never took a minute. 00:01:40.825 --> 00:01:45.370 And I hated the fact that computers had so many problems. 00:01:45.370 --> 00:01:47.102 One day, I decided, "Enough. 00:01:47.102 --> 00:01:50.751 From now on, I'm going to charge anyone who wants me to fix his computer." 00:01:50.751 --> 00:01:53.577 Amazingly enough, that actually worked. 00:01:53.577 --> 00:01:56.988 People started paying me to fix their computers. 00:01:56.988 --> 00:02:01.310 From that moment on, I loved the fact that computers had so many problems. 00:02:01.310 --> 00:02:02.653 (Laughter) 00:02:02.653 --> 00:02:05.473 So at the age of 15, I actually opened my first business 00:02:05.473 --> 00:02:07.711 together with a friend of mine from school. 00:02:07.711 --> 00:02:09.665 And it was a huge success for us. 00:02:09.665 --> 00:02:12.796 We didn't have to take anymore money from our parents. 00:02:12.796 --> 00:02:15.320 And we started with fixing computers 00:02:15.320 --> 00:02:18.079 and at some point we started selling computers. 00:02:18.079 --> 00:02:21.629 But the most amazing thing about this story 00:02:21.629 --> 00:02:24.882 is that so few people know it. 00:02:24.882 --> 00:02:27.997 This is actually the first time I'm sharing this business card. 00:02:27.997 --> 00:02:33.805 I only took this picture four days ago for the sake of this presentation. 00:02:33.805 --> 00:02:36.288 I'm from the last generation that knows 00:02:36.288 --> 00:02:39.730 how the world looked like before the Internet. 00:02:39.730 --> 00:02:44.607 Now, keep that in mind, and think about the children of our grandchildren. 00:02:44.607 --> 00:02:46.687 They will know us so well. 00:02:46.687 --> 00:02:50.110 I have no clue who was my great grandfather. 00:02:50.110 --> 00:02:53.114 It could have been anyone. 00:02:53.114 --> 00:02:56.197 There is so little information about past generations. 00:02:56.197 --> 00:02:59.395 And only selected few had received this highest honor 00:02:59.395 --> 00:03:01.169 of having their life documented. 00:03:01.169 --> 00:03:03.696 Right, kings and philosophers. 00:03:03.696 --> 00:03:07.926 But for us, we document our lives as we go. 00:03:07.926 --> 00:03:13.420 Every 60 seconds, 100 hours of movies are being uploaded to YouTube. 00:03:13.420 --> 00:03:19.227 In those 60 seconds, approximately 40,000 pictures are being posted on Instagram. 00:03:19.227 --> 00:03:22.733 And 350,000 tweets are being shared. 00:03:22.733 --> 00:03:26.713 So, future generations will have so much information about us, 00:03:26.713 --> 00:03:28.937 they wouldn't know what to do with it. 00:03:28.937 --> 00:03:32.195 They could know us so well, but so could anyone else. 00:03:32.195 --> 00:03:34.954 Including our future potential boss 00:03:34.954 --> 00:03:37.465 that might approach a new type of psychologist, 00:03:37.465 --> 00:03:41.856 that will be asked to determine whether we fit for the job that we applied to. 00:03:41.856 --> 00:03:44.434 And he would do that without even meeting us. 00:03:44.434 --> 00:03:47.972 Just by browsing through the information we shared, 00:03:47.972 --> 00:03:51.537 and, yes, sometimes the information we forgot we've shared. 00:03:51.537 --> 00:03:52.933 (Laughter) 00:03:52.933 --> 00:03:55.426 I have no excuse, I'm sorry. 00:03:56.286 --> 00:03:59.076 No one needs to meet us in order to know us. 00:03:59.076 --> 00:04:01.768 So sometimes we will find out if we got the job 00:04:01.768 --> 00:04:04.381 even before we had the interview. 00:04:04.381 --> 00:04:09.382 Strange as it may sound, today, 75% of employers 00:04:09.382 --> 00:04:13.056 are already browsing through candidates' personal profiles 00:04:13.056 --> 00:04:14.659 before hiring them. 00:04:14.659 --> 00:04:18.699 One in every three admitted having disqualified a candidate 00:04:18.699 --> 00:04:22.291 because of information found online. 00:04:22.291 --> 00:04:26.022 And we're becoming even better at sharing information, right? 00:04:26.022 --> 00:04:29.227 So, amazing companies are creating great tools 00:04:29.227 --> 00:04:32.592 that will help us share more and more information. 00:04:32.592 --> 00:04:35.758 They do that because they understand the great value 00:04:35.758 --> 00:04:40.982 in holding huge amounts of personal information, of our infomation. 00:04:40.982 --> 00:04:44.003 We should think of them as a great machine 00:04:44.003 --> 00:04:49.136 that knows how to transform personal data into profit. 00:04:49.136 --> 00:04:52.054 And they make billions of money. 00:04:52.054 --> 00:04:55.938 But I want to speak about a different type of machines. 00:04:55.938 --> 00:04:59.964 Those machines also take personal data, the same data, 00:04:59.964 --> 00:05:04.313 but they transform it into National Security. 00:05:04.313 --> 00:05:08.179 Those are governments and intelligence agencies. 00:05:08.179 --> 00:05:12.391 So, with Facebook, we know how they get the information. 00:05:12.391 --> 00:05:14.840 We give it to them, free of charge. 00:05:14.840 --> 00:05:18.132 But how would intelligence agencies get this information? 00:05:18.132 --> 00:05:21.520 It's not very easy to collect, right? 00:05:21.520 --> 00:05:23.030 But wait a minute. 00:05:23.030 --> 00:05:27.351 If someone already collected it, maybe we can use it. 00:05:27.351 --> 00:05:33.212 So, many states understand now that they have a great incentive 00:05:33.212 --> 00:05:36.990 to put a spy inside Facebook. 00:05:36.990 --> 00:05:39.055 But not just Facebook. 00:05:39.055 --> 00:05:43.639 Many companies in the private sector are unwillingly becoming pawned 00:05:43.639 --> 00:05:47.970 in the national security games, in the homeland security campaigns. 00:05:47.970 --> 00:05:49.833 You probably recognize this guy, right? 00:05:49.833 --> 00:05:52.593 This is Edward Snowden, who worked for the NSA. 00:05:52.593 --> 00:05:55.702 The NSA is the National Security Agency. 00:05:55.702 --> 00:05:58.636 What do they do there, inside the NSA? 00:05:58.636 --> 00:06:03.833 In the world of intelligence, they are called SIGINT Intelligence gathering Unit. 00:06:03.833 --> 00:06:07.298 SIGINT stands for Signals Intelligence. 00:06:07.298 --> 00:06:09.598 That means that the NSA, 00:06:09.598 --> 00:06:11.746 much like Facebook and Google and others, 00:06:11.746 --> 00:06:16.599 is in the business of collecting digital data and processing it. 00:06:16.599 --> 00:06:20.235 So, every country in the world has an agency 00:06:20.235 --> 00:06:22.224 that is responsible for SIGINT gathering. 00:06:22.224 --> 00:06:24.065 In the United States, it's the NSA. 00:06:24.065 --> 00:06:25.614 Edward Snowden worked there, 00:06:25.614 --> 00:06:27.453 and one day he decided to do something 00:06:27.453 --> 00:06:30.766 that completely changed the way we speak about privacy. 00:06:30.766 --> 00:06:33.214 He took many documents and published them; 00:06:33.214 --> 00:06:36.914 many classified documents from within the NSA, and published them. 00:06:36.914 --> 00:06:39.311 You should understand, that until that point, 00:06:39.311 --> 00:06:44.628 people in my field of work addressed NSA as No Such Agency. 00:06:44.948 --> 00:06:46.715 This is how we called them. 00:06:46.715 --> 00:06:50.267 But right now, we have so much information about what is going on in there. 00:06:50.267 --> 00:06:52.524 So, one of the first things that Edward Snowden 00:06:52.524 --> 00:06:54.477 actually published, revealed to the world 00:06:54.477 --> 00:06:58.482 this secret secret secret project, named PRISM. 00:06:58.852 --> 00:07:00.855 This is what Edward Snowden published. 00:07:00.855 --> 00:07:04.935 This is what used to be a top secret presentation. 00:07:04.935 --> 00:07:09.353 It was so secret that only selected few inside the NSA 00:07:09.353 --> 00:07:11.584 were cleared to see it. 00:07:11.584 --> 00:07:16.824 While viewing this presentation, we come to understand two amazing things. 00:07:16.824 --> 00:07:21.107 The first one, they design terrible presentations inside the NSA. 00:07:21.107 --> 00:07:22.480 (Laughter) 00:07:22.480 --> 00:07:26.655 This design is unforgivable. Seriously, guys. 00:07:26.655 --> 00:07:29.934 The second thing that we learned is what PRISM is. 00:07:29.934 --> 00:07:33.518 PRISM is an intelligence gathering program, 00:07:33.518 --> 00:07:38.029 through which the NSA actually had access to private companies, 00:07:38.029 --> 00:07:40.676 to information that was stored inside private companies, 00:07:40.676 --> 00:07:45.570 like Microsoft, Yahoo, Google and Facebook, Skype, YouTube and Apple. 00:07:45.570 --> 00:07:48.218 The NSA could access those companies 00:07:48.218 --> 00:07:51.411 in order to gain access to our information. 00:07:51.411 --> 00:07:54.422 Obviously these things that Edward Snowden published 00:07:54.422 --> 00:07:57.347 created a lot of public criticism surrounding the NSA, right? 00:07:57.347 --> 00:07:59.524 The public wasn't happy with that. 00:07:59.524 --> 00:08:02.482 So, someone had to tell the other side of the story. 00:08:02.482 --> 00:08:06.976 The job fell on the shoulders of this guy, General Keith Alexander, 00:08:06.976 --> 00:08:09.936 who until recently was the head of the NSA. 00:08:09.936 --> 00:08:13.206 So, his job was to demonstrate the trade-off. 00:08:13.206 --> 00:08:14.979 So if you have privacy in one hand, 00:08:14.979 --> 00:08:16.754 and national security in the other, 00:08:16.754 --> 00:08:18.667 and you want more national security, 00:08:18.667 --> 00:08:20.885 you should compromise privacy. That's that. 00:08:20.885 --> 00:08:26.119 So, he tries to convince us that the NSA is actually an efficient machine 00:08:26.119 --> 00:08:29.697 for transforming personal data into national security. 00:08:29.697 --> 00:08:31.115 How did he do that? 00:08:31.115 --> 00:08:32.651 One of the things that he did, 00:08:32.651 --> 00:08:39.102 he went onstage at a big cyber conference in Las Vegas. 00:08:39.102 --> 00:08:41.837 This conference is for hackers and security professionals. 00:08:41.837 --> 00:08:44.323 I was sitting there in the audience listening to him, 00:08:44.323 --> 00:08:48.841 and he said about PRISM and other intelligence gathering programs 00:08:48.841 --> 00:08:53.798 that they were a vital tool in stopping actual terrorist attacks. 00:08:53.798 --> 00:08:56.408 Oh my God! What should we take from it? 00:08:56.408 --> 00:09:00.432 What should we take from the fact that the NSA is using this information 00:09:00.432 --> 00:09:02.343 to stop terrorist attacks? 00:09:02.343 --> 00:09:07.062 It is now the undeniable truth that the information that sits 00:09:07.062 --> 00:09:10.807 within private companies such as Facebook, 00:09:10.807 --> 00:09:14.623 is valuable intelligence related information. 00:09:14.623 --> 00:09:17.932 It is the type of information that the United States can use 00:09:17.932 --> 00:09:21.299 in order to promote its old national security agenda. 00:09:21.299 --> 00:09:24.068 Now, the NSA had a pretty easy life 00:09:24.068 --> 00:09:27.051 because all of those companies are actually American companies, 00:09:27.051 --> 00:09:29.022 which sit within the United States. 00:09:29.022 --> 00:09:32.095 So they could approach a federal judge that will issue a warrant. 00:09:32.095 --> 00:09:33.359 This is a magic key. 00:09:33.359 --> 00:09:36.732 It forces everyone to hand over this information. 00:09:36.732 --> 00:09:38.772 But what can Russia do? 00:09:38.772 --> 00:09:40.244 What can China do? 00:09:40.244 --> 00:09:43.079 What can any other country in the world do? 00:09:43.079 --> 00:09:46.177 Every intelligence agency in the world 00:09:46.177 --> 00:09:49.832 wants the information that sits inside Facebook and other companies. 00:09:49.832 --> 00:09:52.337 If the United States can stop terrorist attacks 00:09:52.337 --> 00:09:53.861 using this information, 00:09:53.861 --> 00:09:56.572 everyone can use this information. 00:09:56.572 --> 00:09:57.969 Make no mistake. 00:09:57.969 --> 00:10:00.270 It is not a question of if they will get it. 00:10:00.270 --> 00:10:03.533 It is a question of how and when. 00:10:03.533 --> 00:10:06.516 They can try to actually approach the federal judge, 00:10:06.516 --> 00:10:08.209 right, the American federal judge. 00:10:08.209 --> 00:10:11.420 It won't help, though it might amuse him a lot. 00:10:11.730 --> 00:10:15.139 So there are basically two ways to go about it. 00:10:15.139 --> 00:10:17.970 One, they can try hacking into Facebook, 00:10:17.970 --> 00:10:20.062 which is not an easy thing to accomplish. 00:10:20.062 --> 00:10:22.446 Trust me. (Laughter) 00:10:22.446 --> 00:10:24.784 The second thing that they can do, 00:10:24.784 --> 00:10:27.360 they can try to put a spy inside Facebook, 00:10:27.360 --> 00:10:29.780 so that he will provide the information they need. 00:10:29.780 --> 00:10:32.613 Well, when we think about a spy inside Facebook, 00:10:32.613 --> 00:10:35.199 this is probably not a spy we have in mind. 00:10:35.199 --> 00:10:38.371 This is more like it. (Laughter) 00:10:38.371 --> 00:10:41.529 It's strange to think about state sponsored spies 00:10:41.529 --> 00:10:44.486 inside private companies, inside commercial companies. 00:10:44.486 --> 00:10:49.718 But there are several reasons that make this thing easier. 00:10:49.718 --> 00:10:54.024 One, it's much easier to get a job inside Facebook than inside the NSA, 00:10:54.024 --> 00:10:56.405 security clearance-wise. 00:10:56.405 --> 00:10:58.962 The second thing is that the risk is lower. 00:10:58.962 --> 00:11:01.131 Being a spy inside Facebook is not as risky 00:11:01.131 --> 00:11:03.245 as being a spy inside the NSA. 00:11:03.245 --> 00:11:07.203 And the third, in the past, if you wanted to be a good spy, 00:11:07.203 --> 00:11:11.671 if you wanted to hire a good spy, you wanted this guy. 00:11:11.671 --> 00:11:14.148 This is the guy that knew everything, right? 00:11:14.148 --> 00:11:18.902 You wanted someone that would be as senior as possible inside the organization. 00:11:18.902 --> 00:11:21.944 But today, in the age of information, 00:11:21.944 --> 00:11:25.810 the people that actually have the power are those people, 00:11:25.810 --> 00:11:29.097 the hands-on guys, the engineers, the support team. 00:11:29.097 --> 00:11:33.052 Those people have unrestricted access to information. 00:11:33.052 --> 00:11:34.742 This is what you want. 00:11:34.742 --> 00:11:37.079 This makes your life much easier, 00:11:37.079 --> 00:11:39.719 if you want to put a spy inside a commercial company. 00:11:39.719 --> 00:11:41.577 And then the plot thickens, 00:11:41.577 --> 00:11:46.325 because there are many other companies that hold information that is valuable. 00:11:46.325 --> 00:11:51.492 For example, you might put a spy inside a mobile operator. 00:11:51.492 --> 00:11:53.905 And he could listen to your phone calls, 00:11:53.905 --> 00:11:57.984 and might be able to tell where you're at at every given moment. 00:11:57.984 --> 00:12:01.390 You might want to put a spy inside a credit card company. 00:12:01.390 --> 00:12:04.526 He will know everything about everyone 00:12:04.526 --> 00:12:06.946 while being inside a credit card company, 00:12:06.946 --> 00:12:09.717 and sometimes, your deepest secrets. 00:12:09.717 --> 00:12:11.711 And there are many other companies 00:12:11.711 --> 00:12:15.159 that hold valuable information for intelligence. 00:12:15.159 --> 00:12:18.963 So, where do we go from here? 00:12:18.963 --> 00:12:21.337 Someone hacked my presentation. 00:12:21.337 --> 00:12:23.058 (Laughter) 00:12:23.488 --> 00:12:25.760 Good job guys. 00:12:25.760 --> 00:12:27.697 Where do we go from here? 00:12:27.697 --> 00:12:30.128 We have to understand that today, 00:12:30.128 --> 00:12:34.850 commercial companies are actually better at collecting data 00:12:34.850 --> 00:12:37.345 than actual intelligence agencies. 00:12:37.345 --> 00:12:42.370 Companies like Facebook and Google are better at collecting our data 00:12:42.370 --> 00:12:44.971 than actual intelligence agencies. 00:12:44.971 --> 00:12:46.518 That's amazing. 00:12:46.518 --> 00:12:51.807 Think about Facebook facial recognition mechanism. 00:12:51.807 --> 00:12:54.059 This is an amazing tool for spies. 00:12:54.059 --> 00:12:55.916 Are you familiar with this mechanism? 00:12:55.916 --> 00:12:58.325 It means that you can take pictures of your friend 00:12:58.325 --> 00:13:00.683 and Facebook will automatically tag them. 00:13:00.683 --> 00:13:04.015 He will recognize your friends and will automatically tag them. 00:13:04.015 --> 00:13:08.037 So if you are a spy, you could create this amazing camera, 00:13:08.037 --> 00:13:11.273 and stand outside a secret agency, 00:13:11.273 --> 00:13:13.722 and take pictures of people coming out 00:13:13.722 --> 00:13:17.010 and immediately receive their names, the names of their friends, 00:13:17.010 --> 00:13:19.794 what are their deepest secrets, where are they going to be. 00:13:20.154 --> 00:13:22.769 Facebook is a dream place for spies. 00:13:22.769 --> 00:13:26.598 You can see how much the spy is happy. 00:13:26.598 --> 00:13:28.770 So where do we go from here? 00:13:28.770 --> 00:13:31.988 Should we educate our children only to use applications 00:13:31.988 --> 00:13:35.703 that were made by countries that we consider friendly? 00:13:35.703 --> 00:13:38.269 Or should we just accept that we are living in a world 00:13:38.269 --> 00:13:40.458 that has no secrets? 00:13:41.238 --> 00:13:45.374 What we can be sure of is that nothing is free. 00:13:45.374 --> 00:13:47.592 On the Internet nothing is free. 00:13:47.592 --> 00:13:52.057 We either pay with money or with our privacy. 00:13:52.057 --> 00:13:53.344 Thank you. 00:13:53.344 --> 00:13:58.229 (Applause)