1 00:00:01,343 --> 00:00:04,726 For more than a 100 years, the telephone companies have provided 2 00:00:04,726 --> 00:00:06,778 wire-tapping assistance to governments. 3 00:00:07,146 --> 00:00:10,424 For much of this time, this assistance was manual. 4 00:00:10,708 --> 00:00:14,557 Surveillance took place manually and wires were connected by hand. 5 00:00:14,951 --> 00:00:16,600 Calls were recorded to tape. 6 00:00:17,506 --> 00:00:21,244 But as in so many other industries, computing has changed everything. 7 00:00:21,877 --> 00:00:24,425 The telephone companies built surveillance features 8 00:00:24,772 --> 00:00:26,817 into the very core of their networks. 9 00:00:27,722 --> 00:00:29,208 I want that to sink in for a second. 10 00:00:29,611 --> 00:00:33,504 Our telephones and the networks that carry our calls 11 00:00:33,782 --> 00:00:37,962 were wired for surveillance first, first and foremost. 12 00:00:38,937 --> 00:00:44,857 So, what that means is when you're talking to your spouse, your children, a colleague 13 00:00:44,949 --> 00:00:48,827 or your doctor on the telephone, someone could be listening. 14 00:00:48,977 --> 00:00:51,383 Now that someone might be your own government. 15 00:00:51,641 --> 00:00:55,724 It could also be another government, a foreign intelligence service. 16 00:00:55,892 --> 00:01:00,719 Or a hacker, or a criminal, or a stalker, or any other party that breaks 17 00:01:00,729 --> 00:01:04,724 into the surveillance system that hacks into the surveillance system 18 00:01:05,049 --> 00:01:06,861 of the telephone companies. 19 00:01:07,911 --> 00:01:12,248 But, while the telephone companies have built surveillance as a priority, 20 00:01:12,442 --> 00:01:14,681 Silicon Valley companies have not. 21 00:01:14,694 --> 00:01:19,143 And increasingly over the last couple years, Silicon Valley companies have built 22 00:01:19,237 --> 00:01:23,119 strong encryption technology into their communications products that makes 23 00:01:23,119 --> 00:01:25,133 surveillance extremely difficult. 24 00:01:25,535 --> 00:01:29,475 For example, many of you might have an iPhone and if you use an iPhone 25 00:01:29,601 --> 00:01:33,843 to send a text message to other people that have an iPhone, those text messages 26 00:01:33,843 --> 00:01:35,721 cannot easily be wire-tapped. 27 00:01:35,755 --> 00:01:38,686 And in fact, according to Apple they're not able to even see 28 00:01:38,686 --> 00:01:40,662 the text messages themselves. 29 00:01:40,662 --> 00:01:43,408 Likewise, if you use FaceTime to make 30 00:01:43,408 --> 00:01:45,988 an audio call or a video call with one of your friends 31 00:01:45,988 --> 00:01:49,397 or loved ones, that too cannot be easily wire-tapped. 32 00:01:49,527 --> 00:01:50,885 And it's not just Apple. 33 00:01:51,070 --> 00:01:55,520 WhatsApp, which is now owned by Facebook and used by hundreds of millions of people 34 00:01:55,520 --> 00:02:00,079 around the world, also has built strong encryption technology into its product. 35 00:02:00,381 --> 00:02:04,119 Which means that people in the global south can easily communicate without 36 00:02:04,126 --> 00:02:08,460 their governments, often authoritarian, wire-tapping their text messages. 37 00:02:09,599 --> 00:02:14,429 So, after 100 years of being able to listen to any telephone call, 38 00:02:14,568 --> 00:02:16,681 anytime, anywhere. 39 00:02:17,262 --> 00:02:20,378 You might imagine that government officials are not very happy. 40 00:02:20,378 --> 00:02:22,141 And in fact, that's what's happening. 41 00:02:22,141 --> 00:02:24,251 Government officials are extremely mad. 42 00:02:24,251 --> 00:02:26,487 And they're not mad because these encryption 43 00:02:26,487 --> 00:02:28,304 tools are now available. 44 00:02:28,510 --> 00:02:32,457 What upsets them the most, is that the tech companies have built encryption 45 00:02:32,457 --> 00:02:36,612 features into their products and turned them on by default. 46 00:02:36,694 --> 00:02:38,771 It's the default piece that matters. 47 00:02:38,867 --> 00:02:42,625 In short, the tech companies have democratized encryption. 48 00:02:43,377 --> 00:02:46,944 And so, government officials like British Prime Minister David Cameron, 49 00:02:47,177 --> 00:02:51,960 they believe that all communications -- emails, texts, voice calls. 50 00:02:52,032 --> 00:02:55,205 All of these should be available to governments and encryption 51 00:02:55,205 --> 00:02:57,079 is making that difficult. 52 00:02:57,478 --> 00:03:00,830 Now look, I'm extremely sympathetic to their point of view. 53 00:03:01,062 --> 00:03:03,442 We live in a dangerous time, in a dangerous world 54 00:03:03,442 --> 00:03:05,440 and there really are bad people out there. 55 00:03:05,440 --> 00:03:09,391 There are terrorists and other serious national security threats that I suspect 56 00:03:09,467 --> 00:03:12,834 we all want to the FBI and the NSA to monitor. 57 00:03:13,391 --> 00:03:16,386 But those surveillance features come at a cost. 58 00:03:17,357 --> 00:03:20,868 The reason for that, is that there is no such thing as a terrorist laptop, 59 00:03:21,193 --> 00:03:22,887 or a drug dealer's cell phone. 60 00:03:23,120 --> 00:03:26,138 We all use the same communications devices. 61 00:03:26,835 --> 00:03:30,595 What that means, is that if the drug dealer's telephone calls 62 00:03:30,605 --> 00:03:33,098 or the terrorist telephone calls can be intercepted, 63 00:03:33,108 --> 00:03:34,722 then so can the rest of ours too. 64 00:03:34,790 --> 00:03:38,499 And I think we really need to ask, should a billion people around the world be 65 00:03:38,499 --> 00:03:41,279 using devices that are wire-tap friendly? 66 00:03:43,537 --> 00:03:49,470 The scenario of hacking of surveillance systems that I described is not imaginary. 67 00:03:49,470 --> 00:03:53,637 In 2009, the surveillance systems that Google and Microsoft built 68 00:03:53,637 --> 00:03:54,931 into the networks. 69 00:03:54,931 --> 00:03:58,779 The systems that they used to respond to lawful surveillance requests 70 00:03:58,779 --> 00:03:59,574 from the police. 71 00:03:59,574 --> 00:04:02,250 Those systems were compromised by the Chinese government 72 00:04:02,250 --> 00:04:05,018 because the Chinese government wanted to figure out which 73 00:04:05,018 --> 00:04:07,579 of their own agents the US government was monitoring. 74 00:04:08,269 --> 00:04:12,554 By the same token, in 2004 the surveillance system built 75 00:04:12,554 --> 00:04:16,205 into the network of Vodafone Greece -- Greece's largest telephone company 76 00:04:16,205 --> 00:04:20,644 was compromised by unknown entity and that feature, the surveillance feature 77 00:04:20,644 --> 00:04:23,689 was used to wire-tap the Greek Prime Minister and members 78 00:04:23,689 --> 00:04:25,434 of the Greek cabinet. 79 00:04:25,434 --> 00:04:28,484 The foreign government or hackers who did that were never caught. 80 00:04:29,955 --> 00:04:33,676 And really, this gets to the very problem with these surveillance features 81 00:04:33,676 --> 00:04:35,071 or back doors. 82 00:04:35,151 --> 00:04:38,186 When you build a back door into a communications network 83 00:04:38,186 --> 00:04:41,145 or piece of technology, you have no way of controlling 84 00:04:41,145 --> 00:04:42,769 who's going to go through it. 85 00:04:43,299 --> 00:04:46,695 You have no way controlling whether it'll be used by your side 86 00:04:46,713 --> 00:04:47,665 or the other side. 87 00:04:47,665 --> 00:04:49,092 By good guys, or by bad guys. 88 00:04:49,980 --> 00:04:53,235 And so, for that reason, I think that it's better to build networks 89 00:04:53,235 --> 00:04:55,175 to be as secure as possible. 90 00:04:56,395 --> 00:04:59,657 Yes, this means that in the future, encryption is going to make 91 00:04:59,657 --> 00:05:01,160 wire-tapping more difficult. 92 00:05:01,320 --> 00:05:04,897 It means that the police are going to have a tougher time catching bad guys. 93 00:05:05,223 --> 00:05:09,194 But the alternative would mean to live in a world where anyone's calls 94 00:05:09,273 --> 00:05:12,096 or anyone's text messages could be surveilled by criminals, 95 00:05:12,398 --> 00:05:15,055 by stalkers and by foreign intelligence agencies. 96 00:05:15,055 --> 00:05:17,295 And I don't want to live in that kind of world. 97 00:05:18,102 --> 00:05:22,175 And so right now, you probably have the tools to thwart many kinds 98 00:05:22,175 --> 00:05:24,471 of government surveillance already on your phones 99 00:05:24,774 --> 00:05:26,307 and already in your pockets. 100 00:05:26,356 --> 00:05:29,859 You just might not realize how strong and how secure those tools are 101 00:05:30,071 --> 00:05:33,435 or how weak the other ways you've used to communicate really are. 102 00:05:34,793 --> 00:05:37,343 And so, my message to you is this. 103 00:05:38,213 --> 00:05:40,445 We need to use these tools. 104 00:05:40,445 --> 00:05:42,395 We need to secure our telephone calls. 105 00:05:42,395 --> 00:05:44,184 We need to secure our text messages. 106 00:05:44,950 --> 00:05:46,843 I want you to use these tools. 107 00:05:46,843 --> 00:05:48,515 I want you to tell your loved ones. 108 00:05:48,566 --> 00:05:50,232 I want you to tell your colleagues. 109 00:05:50,232 --> 00:05:52,381 Use these encrypted communications tools. 110 00:05:52,454 --> 00:05:55,925 Don't just use them because they're cheap and easy, but use them because 111 00:05:55,936 --> 00:05:57,025 they are secure. 112 00:05:57,304 --> 00:05:58,558 Thank you. 113 00:05:59,268 --> 00:06:01,125 (Applause)