[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:01.34,0:00:04.73,Default,,0000,0000,0000,,For more than a 100 years,\Nthe telephone companies have provided Dialogue: 0,0:00:04.73,0:00:06.78,Default,,0000,0000,0000,,wire-tapping assistance \Nto governments. Dialogue: 0,0:00:07.15,0:00:10.42,Default,,0000,0000,0000,,For much of this time, \Nthis assistance was manual. Dialogue: 0,0:00:10.71,0:00:14.56,Default,,0000,0000,0000,,Surveillance took place manually\Nand wires were connected by hand. Dialogue: 0,0:00:14.95,0:00:16.60,Default,,0000,0000,0000,,Calls were recorded to tape. Dialogue: 0,0:00:17.51,0:00:21.24,Default,,0000,0000,0000,,But as in so many other industries,\Ncomputing has changed everything. Dialogue: 0,0:00:21.88,0:00:24.42,Default,,0000,0000,0000,,The telephone companies \Nbuilt surveillance features Dialogue: 0,0:00:24.77,0:00:26.82,Default,,0000,0000,0000,,into the very core of their networks. Dialogue: 0,0:00:27.72,0:00:29.21,Default,,0000,0000,0000,,I want that to sink in for a second. Dialogue: 0,0:00:29.61,0:00:33.50,Default,,0000,0000,0000,,Our telephones and the networks \Nthat carry our calls Dialogue: 0,0:00:33.78,0:00:37.96,Default,,0000,0000,0000,,were wired for surveillance first,\Nfirst and foremost. Dialogue: 0,0:00:38.94,0:00:44.86,Default,,0000,0000,0000,,So, what that means is when you're talking\Nto your spouse, your children, a colleague Dialogue: 0,0:00:44.95,0:00:48.83,Default,,0000,0000,0000,,or your doctor on the telephone,\Nsomeone could be listening. Dialogue: 0,0:00:48.98,0:00:51.38,Default,,0000,0000,0000,,Now that someone might \Nbe your own government. Dialogue: 0,0:00:51.64,0:00:55.72,Default,,0000,0000,0000,,It could also be another government, \Na foreign intelligence service. Dialogue: 0,0:00:55.89,0:01:00.72,Default,,0000,0000,0000,,Or a hacker, or a criminal, or a stalker,\Nor any other party that breaks Dialogue: 0,0:01:00.73,0:01:04.72,Default,,0000,0000,0000,,into the surveillance system that hacks\Ninto the surveillance system Dialogue: 0,0:01:05.05,0:01:06.86,Default,,0000,0000,0000,,of the telephone companies. Dialogue: 0,0:01:07.91,0:01:12.25,Default,,0000,0000,0000,,But, while the telephone companies have\Nbuilt surveillance as a priority, Dialogue: 0,0:01:12.44,0:01:14.68,Default,,0000,0000,0000,,Silicon Valley companies have not. Dialogue: 0,0:01:14.69,0:01:19.14,Default,,0000,0000,0000,,And increasingly over the last couple\Nyears, Silicon Valley companies have built Dialogue: 0,0:01:19.24,0:01:23.12,Default,,0000,0000,0000,,strong encryption technology into their\Ncommunications products that makes Dialogue: 0,0:01:23.12,0:01:25.13,Default,,0000,0000,0000,,surveillance extremely difficult. Dialogue: 0,0:01:25.54,0:01:29.48,Default,,0000,0000,0000,,For example, many of you might have\Nan iPhone and if you use an iPhone Dialogue: 0,0:01:29.60,0:01:33.84,Default,,0000,0000,0000,,to send a text message to other people\Nthat have an iPhone, those text messages Dialogue: 0,0:01:33.84,0:01:35.72,Default,,0000,0000,0000,,cannot easily be wire-tapped. Dialogue: 0,0:01:35.76,0:01:38.69,Default,,0000,0000,0000,,And in fact, according to Apple\Nthey're not able to even see Dialogue: 0,0:01:38.69,0:01:40.66,Default,,0000,0000,0000,,the text messages themselves. Dialogue: 0,0:01:40.66,0:01:43.41,Default,,0000,0000,0000,,Likewise, if you use \NFaceTime to make\N Dialogue: 0,0:01:43.41,0:01:45.99,Default,,0000,0000,0000,,an audio call or a video call \Nwith one of your friends Dialogue: 0,0:01:45.99,0:01:49.40,Default,,0000,0000,0000,,or loved ones, that too\Ncannot be easily wire-tapped. Dialogue: 0,0:01:49.53,0:01:50.88,Default,,0000,0000,0000,,And it's not just Apple. Dialogue: 0,0:01:51.07,0:01:55.52,Default,,0000,0000,0000,,WhatsApp, which is now owned by Facebook\Nand used by hundreds of millions of people Dialogue: 0,0:01:55.52,0:02:00.08,Default,,0000,0000,0000,,around the world, also has built strong\Nencryption technology into its product. Dialogue: 0,0:02:00.38,0:02:04.12,Default,,0000,0000,0000,,Which means that people in the global\Nsouth can easily communicate without Dialogue: 0,0:02:04.13,0:02:08.46,Default,,0000,0000,0000,,their governments, often authoritarian,\Nwire-tapping their text messages. Dialogue: 0,0:02:09.60,0:02:14.43,Default,,0000,0000,0000,,So, after 100 years of being able\Nto listen to any telephone call, Dialogue: 0,0:02:14.57,0:02:16.68,Default,,0000,0000,0000,,anytime, anywhere. Dialogue: 0,0:02:17.26,0:02:20.38,Default,,0000,0000,0000,,You might imagine that government\Nofficials are not very happy. Dialogue: 0,0:02:20.38,0:02:22.14,Default,,0000,0000,0000,,And in fact, that's \Nwhat's happening. Dialogue: 0,0:02:22.14,0:02:24.25,Default,,0000,0000,0000,,Government officials \Nare extremely mad.\N Dialogue: 0,0:02:24.25,0:02:26.49,Default,,0000,0000,0000,,And they're not mad \Nbecause these encryption Dialogue: 0,0:02:26.49,0:02:28.30,Default,,0000,0000,0000,,tools are now available. Dialogue: 0,0:02:28.51,0:02:32.46,Default,,0000,0000,0000,,What upsets them the most, is that\Nthe tech companies have built encryption Dialogue: 0,0:02:32.46,0:02:36.61,Default,,0000,0000,0000,,features into their products \Nand turned them on by default. Dialogue: 0,0:02:36.69,0:02:38.77,Default,,0000,0000,0000,,It's the default piece that matters. Dialogue: 0,0:02:38.87,0:02:42.62,Default,,0000,0000,0000,,In short, the tech companies have\Ndemocratized encryption. Dialogue: 0,0:02:43.38,0:02:46.94,Default,,0000,0000,0000,,And so, government officials like British\NPrime Minister David Cameron, Dialogue: 0,0:02:47.18,0:02:51.96,Default,,0000,0000,0000,,they believe that all communications\N-- emails, texts, voice calls. Dialogue: 0,0:02:52.03,0:02:55.20,Default,,0000,0000,0000,,All of these should be available\Nto governments and encryption Dialogue: 0,0:02:55.20,0:02:57.08,Default,,0000,0000,0000,,is making that difficult. Dialogue: 0,0:02:57.48,0:03:00.83,Default,,0000,0000,0000,,Now look, I'm extremely sympathetic \Nto their point of view. Dialogue: 0,0:03:01.06,0:03:03.44,Default,,0000,0000,0000,,We live in a dangerous time, \Nin a dangerous world Dialogue: 0,0:03:03.44,0:03:05.44,Default,,0000,0000,0000,,and there really are \Nbad people out there. Dialogue: 0,0:03:05.44,0:03:09.39,Default,,0000,0000,0000,,There are terrorists and other serious\Nnational security threats that I suspect Dialogue: 0,0:03:09.47,0:03:12.83,Default,,0000,0000,0000,,we all want to the FBI \Nand the NSA to monitor. Dialogue: 0,0:03:13.39,0:03:16.39,Default,,0000,0000,0000,,But those surveillance \Nfeatures come at a cost. Dialogue: 0,0:03:17.36,0:03:20.87,Default,,0000,0000,0000,,The reason for that, is that there is no\Nsuch thing as a terrorist laptop, Dialogue: 0,0:03:21.19,0:03:22.89,Default,,0000,0000,0000,,or a drug dealer's cell phone. Dialogue: 0,0:03:23.12,0:03:26.14,Default,,0000,0000,0000,,We all use the same \Ncommunications devices. Dialogue: 0,0:03:26.84,0:03:30.60,Default,,0000,0000,0000,,What that means, is that if the drug\Ndealer's telephone calls Dialogue: 0,0:03:30.60,0:03:33.10,Default,,0000,0000,0000,,or the terrorist telephone calls \Ncan be intercepted, Dialogue: 0,0:03:33.11,0:03:34.72,Default,,0000,0000,0000,,then so can the rest \Nof ours too. Dialogue: 0,0:03:34.79,0:03:38.50,Default,,0000,0000,0000,,And I think we really need to ask, should \Na billion people around the world be Dialogue: 0,0:03:38.50,0:03:41.28,Default,,0000,0000,0000,,using devices that \Nare wire-tap friendly? Dialogue: 0,0:03:43.54,0:03:49.47,Default,,0000,0000,0000,,The scenario of hacking of surveillance \Nsystems that I described is not imaginary. Dialogue: 0,0:03:49.47,0:03:53.64,Default,,0000,0000,0000,,In 2009, the surveillance systems\Nthat Google and Microsoft built Dialogue: 0,0:03:53.64,0:03:54.93,Default,,0000,0000,0000,,into the networks. Dialogue: 0,0:03:54.93,0:03:58.78,Default,,0000,0000,0000,,The systems that they used to respond\Nto lawful surveillance requests Dialogue: 0,0:03:58.78,0:03:59.57,Default,,0000,0000,0000,,from the police. Dialogue: 0,0:03:59.57,0:04:02.25,Default,,0000,0000,0000,,Those systems were compromised\Nby the Chinese government Dialogue: 0,0:04:02.25,0:04:05.02,Default,,0000,0000,0000,,because the Chinese government \Nwanted to figure out which Dialogue: 0,0:04:05.02,0:04:07.58,Default,,0000,0000,0000,,of their own agents the US \Ngovernment was monitoring. Dialogue: 0,0:04:08.27,0:04:12.55,Default,,0000,0000,0000,,By the same token, in 2004\Nthe surveillance system built Dialogue: 0,0:04:12.55,0:04:16.20,Default,,0000,0000,0000,,into the network of Vodafone Greece\N-- Greece's largest telephone company Dialogue: 0,0:04:16.20,0:04:20.64,Default,,0000,0000,0000,,was compromised by unknown entity\Nand that feature, the surveillance feature Dialogue: 0,0:04:20.64,0:04:23.69,Default,,0000,0000,0000,,was used to wire-tap the Greek\NPrime Minister and members Dialogue: 0,0:04:23.69,0:04:25.43,Default,,0000,0000,0000,,of the Greek cabinet. Dialogue: 0,0:04:25.43,0:04:28.48,Default,,0000,0000,0000,,The foreign government or hackers\Nwho did that were never caught. Dialogue: 0,0:04:29.96,0:04:33.68,Default,,0000,0000,0000,,And really, this gets to the very problem\Nwith these surveillance features Dialogue: 0,0:04:33.68,0:04:35.07,Default,,0000,0000,0000,,or back doors. Dialogue: 0,0:04:35.15,0:04:38.19,Default,,0000,0000,0000,,When you build a back door into\Na communications network Dialogue: 0,0:04:38.19,0:04:41.14,Default,,0000,0000,0000,,or piece of technology, you \Nhave no way of controlling Dialogue: 0,0:04:41.14,0:04:42.77,Default,,0000,0000,0000,,who's going to go through it. Dialogue: 0,0:04:43.30,0:04:46.70,Default,,0000,0000,0000,,You have no way controlling whether\Nit'll be used by your side Dialogue: 0,0:04:46.71,0:04:47.66,Default,,0000,0000,0000,,or the other side. Dialogue: 0,0:04:47.66,0:04:49.09,Default,,0000,0000,0000,,By good guys, \Nor by bad guys. Dialogue: 0,0:04:49.98,0:04:53.24,Default,,0000,0000,0000,,And so, for that reason, I think \Nthat it's better to build networks Dialogue: 0,0:04:53.24,0:04:55.18,Default,,0000,0000,0000,,to be as secure as possible. Dialogue: 0,0:04:56.40,0:04:59.66,Default,,0000,0000,0000,,Yes, this means that in the future,\Nencryption is going to make Dialogue: 0,0:04:59.66,0:05:01.16,Default,,0000,0000,0000,,wire-tapping more difficult. Dialogue: 0,0:05:01.32,0:05:04.90,Default,,0000,0000,0000,,It means that the police are going to have\Na tougher time catching bad guys. Dialogue: 0,0:05:05.22,0:05:09.19,Default,,0000,0000,0000,,But the alternative would mean to live\Nin a world where anyone's calls Dialogue: 0,0:05:09.27,0:05:12.10,Default,,0000,0000,0000,,or anyone's text messages could\Nbe surveilled by criminals, Dialogue: 0,0:05:12.40,0:05:15.06,Default,,0000,0000,0000,,by stalkers and by foreign \Nintelligence agencies. Dialogue: 0,0:05:15.06,0:05:17.30,Default,,0000,0000,0000,,And I don't want to live\Nin that kind of world. Dialogue: 0,0:05:18.10,0:05:22.18,Default,,0000,0000,0000,,And so right now, you probably have\Nthe tools to thwart many kinds Dialogue: 0,0:05:22.18,0:05:24.47,Default,,0000,0000,0000,,of government surveillance\Nalready on your phones Dialogue: 0,0:05:24.77,0:05:26.31,Default,,0000,0000,0000,,and already in your pockets. Dialogue: 0,0:05:26.36,0:05:29.86,Default,,0000,0000,0000,,You just might not realize how strong\Nand how secure those tools are Dialogue: 0,0:05:30.07,0:05:33.44,Default,,0000,0000,0000,,or how weak the other ways you've used\Nto communicate really are. Dialogue: 0,0:05:34.79,0:05:37.34,Default,,0000,0000,0000,,And so, my message \Nto you is this. Dialogue: 0,0:05:38.21,0:05:40.44,Default,,0000,0000,0000,,We need to use \Nthese tools. Dialogue: 0,0:05:40.44,0:05:42.40,Default,,0000,0000,0000,,We need to secure our telephone calls. Dialogue: 0,0:05:42.40,0:05:44.18,Default,,0000,0000,0000,,We need to secure \Nour text messages. Dialogue: 0,0:05:44.95,0:05:46.84,Default,,0000,0000,0000,,I want you to use these tools. Dialogue: 0,0:05:46.84,0:05:48.52,Default,,0000,0000,0000,,I want you to tell \Nyour loved ones. Dialogue: 0,0:05:48.57,0:05:50.23,Default,,0000,0000,0000,,I want you to tell \Nyour colleagues. Dialogue: 0,0:05:50.23,0:05:52.38,Default,,0000,0000,0000,,Use these encrypted \Ncommunications tools. Dialogue: 0,0:05:52.45,0:05:55.92,Default,,0000,0000,0000,,Don't just use them because they're cheap\Nand easy, but use them because Dialogue: 0,0:05:55.94,0:05:57.02,Default,,0000,0000,0000,,they are secure. Dialogue: 0,0:05:57.30,0:05:58.56,Default,,0000,0000,0000,,Thank you. Dialogue: 0,0:05:59.27,0:06:01.12,Default,,0000,0000,0000,,(Applause)