[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:01.23,0:00:02.39,Default,,0000,0000,0000,,A few years ago, Dialogue: 0,0:00:02.41,0:00:04.19,Default,,0000,0000,0000,,an American defense consultant I know Dialogue: 0,0:00:04.21,0:00:06.59,Default,,0000,0000,0000,,told me about a trip\Nhe took to Uzbekistan. Dialogue: 0,0:00:06.90,0:00:09.32,Default,,0000,0000,0000,,His role there was to help sell technology Dialogue: 0,0:00:09.35,0:00:13.02,Default,,0000,0000,0000,,that the Uzbek government could use\Nto spy on its own citizens. Dialogue: 0,0:00:13.49,0:00:15.89,Default,,0000,0000,0000,,He eventually shared with me\Nthe marketing material Dialogue: 0,0:00:15.91,0:00:18.03,Default,,0000,0000,0000,,he's presented to the Uzbek government. Dialogue: 0,0:00:18.06,0:00:20.60,Default,,0000,0000,0000,,One glossy brochure featured technology Dialogue: 0,0:00:20.63,0:00:23.08,Default,,0000,0000,0000,,that could not just intercept phone calls, Dialogue: 0,0:00:23.11,0:00:24.69,Default,,0000,0000,0000,,but identify the caller, Dialogue: 0,0:00:24.71,0:00:27.16,Default,,0000,0000,0000,,regardless of what phone number\Nthey were using, Dialogue: 0,0:00:27.19,0:00:29.28,Default,,0000,0000,0000,,based on their unique voice print, Dialogue: 0,0:00:29.31,0:00:32.58,Default,,0000,0000,0000,,and then identify their exact\Ngeographic location. Dialogue: 0,0:00:32.93,0:00:36.08,Default,,0000,0000,0000,,This is a guys who had been involved\Nwith the arms trade for years. Dialogue: 0,0:00:36.11,0:00:39.62,Default,,0000,0000,0000,,He wasn't some Hollywood-type gun runner\Ndoing backroom deals. Dialogue: 0,0:00:39.64,0:00:42.62,Default,,0000,0000,0000,,He was just a guy that worked\Nwith legitimate Western companies Dialogue: 0,0:00:42.64,0:00:44.59,Default,,0000,0000,0000,,to help sell their weapons abroad. Dialogue: 0,0:00:44.61,0:00:47.50,Default,,0000,0000,0000,,But he wasn't bothered by marketing\Nthis sort of technology. Dialogue: 0,0:00:47.52,0:00:50.28,Default,,0000,0000,0000,,For him, it was just the next step\Nin the arms trade. Dialogue: 0,0:00:50.31,0:00:53.25,Default,,0000,0000,0000,,And it was even easier than, say,\Nselling weapons to Iraq Dialogue: 0,0:00:53.28,0:00:55.49,Default,,0000,0000,0000,,because it didn't require\Nan export license Dialogue: 0,0:00:55.52,0:00:56.93,Default,,0000,0000,0000,,from the US State Department, Dialogue: 0,0:00:56.95,0:00:58.100,Default,,0000,0000,0000,,the way most arms sales would. Dialogue: 0,0:00:59.02,0:01:01.13,Default,,0000,0000,0000,,It turns out that these\Ntools of surveillance Dialogue: 0,0:01:01.16,0:01:03.24,Default,,0000,0000,0000,,are almost completely unregulated Dialogue: 0,0:01:03.27,0:01:06.44,Default,,0000,0000,0000,,because as of today,\Nthey're not defined as weapons. Dialogue: 0,0:01:06.47,0:01:09.38,Default,,0000,0000,0000,,But they should be and we need\Nto regulate them that way. Dialogue: 0,0:01:09.69,0:01:11.90,Default,,0000,0000,0000,,I'm a journalist who spent\Nthe last two decades Dialogue: 0,0:01:11.92,0:01:14.29,Default,,0000,0000,0000,,looking at how the military\Nand intelligence world Dialogue: 0,0:01:14.32,0:01:16.94,Default,,0000,0000,0000,,spurs the development\Nof new science and technology. Dialogue: 0,0:01:16.97,0:01:19.02,Default,,0000,0000,0000,,I've tracked the emergence of new weapons Dialogue: 0,0:01:19.05,0:01:20.50,Default,,0000,0000,0000,,and looked to see what happens Dialogue: 0,0:01:20.52,0:01:23.16,Default,,0000,0000,0000,,when companies start to market\Nthese weapons abroad. Dialogue: 0,0:01:23.19,0:01:25.59,Default,,0000,0000,0000,,But what is a weapon\Nin the information age? Dialogue: 0,0:01:25.62,0:01:27.55,Default,,0000,0000,0000,,We know that armed drones are weapons, Dialogue: 0,0:01:27.57,0:01:29.54,Default,,0000,0000,0000,,missiles and bombs are weapons, Dialogue: 0,0:01:29.56,0:01:31.66,Default,,0000,0000,0000,,but the State Department\Nactually classifies Dialogue: 0,0:01:31.68,0:01:34.53,Default,,0000,0000,0000,,broad categories\Nof technologies as weapons. Dialogue: 0,0:01:34.55,0:01:36.75,Default,,0000,0000,0000,,So for example, a scientist going abroad Dialogue: 0,0:01:36.78,0:01:38.89,Default,,0000,0000,0000,,on oceanographic research vessel, Dialogue: 0,0:01:38.91,0:01:41.27,Default,,0000,0000,0000,,they want to take\Nthe latest night vision goggles. Dialogue: 0,0:01:41.29,0:01:44.58,Default,,0000,0000,0000,,That, according to the State Department\Nis potentially a weapon. Dialogue: 0,0:01:44.61,0:01:45.78,Default,,0000,0000,0000,,Why? Dialogue: 0,0:01:45.80,0:01:49.04,Default,,0000,0000,0000,,Well because though night vision goggles\Nare used today by scientists Dialogue: 0,0:01:49.06,0:01:50.46,Default,,0000,0000,0000,,and hunters around the world, Dialogue: 0,0:01:50.48,0:01:53.35,Default,,0000,0000,0000,,it was a capability\Nfirst developed for the military. Dialogue: 0,0:01:53.37,0:01:54.81,Default,,0000,0000,0000,,And yet, tools of surveillance Dialogue: 0,0:01:54.83,0:01:58.25,Default,,0000,0000,0000,,that an authoritarian regime could use\Nto spy on its own citizens, Dialogue: 0,0:01:58.27,0:02:00.08,Default,,0000,0000,0000,,on dissidents, on journalists, Dialogue: 0,0:02:00.10,0:02:03.19,Default,,0000,0000,0000,,that according to the US government\Ntoday is not a weapon. Dialogue: 0,0:02:03.59,0:02:05.32,Default,,0000,0000,0000,,And yet, these tools of surveillance Dialogue: 0,0:02:05.34,0:02:09.24,Default,,0000,0000,0000,,are part of a growing secretive\Nmulti-billion-dollar industry. Dialogue: 0,0:02:09.85,0:02:12.75,Default,,0000,0000,0000,,The genesis of this spy bizarre\Ngoes back some 18 years, Dialogue: 0,0:02:12.78,0:02:14.79,Default,,0000,0000,0000,,to a Hilton hotel in northern Virginia, Dialogue: 0,0:02:14.82,0:02:18.41,Default,,0000,0000,0000,,just a few miles away\Nfrom the US Central Intelligence Agency. Dialogue: 0,0:02:18.72,0:02:21.08,Default,,0000,0000,0000,,A few dozen people,\Nmostly dark-suited men, Dialogue: 0,0:02:21.10,0:02:23.19,Default,,0000,0000,0000,,gathered there in the spring of 2002 Dialogue: 0,0:02:23.21,0:02:26.32,Default,,0000,0000,0000,,for a conference with\Nthe unassuming name of ISS World. Dialogue: 0,0:02:26.63,0:02:30.40,Default,,0000,0000,0000,,You know, at first glance, this conference\Nprobably looked like dozens of events Dialogue: 0,0:02:30.43,0:02:33.07,Default,,0000,0000,0000,,that used to take place\Naround the Washington DC area. Dialogue: 0,0:02:33.09,0:02:34.78,Default,,0000,0000,0000,,But this event was unique. Dialogue: 0,0:02:34.80,0:02:37.75,Default,,0000,0000,0000,,ISS stands for Intelligence\NSupport Systems Dialogue: 0,0:02:37.77,0:02:40.10,Default,,0000,0000,0000,,and the people who were there\Nwere from companies Dialogue: 0,0:02:40.12,0:02:43.51,Default,,0000,0000,0000,,that built technologies to spy\Non private communications. Dialogue: 0,0:02:43.54,0:02:46.54,Default,,0000,0000,0000,,In other words, these were\Nsort of wire-tappers for hire. Dialogue: 0,0:02:46.87,0:02:49.90,Default,,0000,0000,0000,,And the reason they were there\Nwas that less than a year earlier Dialogue: 0,0:02:49.93,0:02:52.44,Default,,0000,0000,0000,,the 9/11 terrorist attacks\Non New York and Washington Dialogue: 0,0:02:52.46,0:02:55.32,Default,,0000,0000,0000,,had spurred the Congress\Nto press through legislation Dialogue: 0,0:02:55.35,0:02:57.03,Default,,0000,0000,0000,,known as the Patriot Act. Dialogue: 0,0:02:57.35,0:02:59.51,Default,,0000,0000,0000,,This gave the government\Nbroad new authorities Dialogue: 0,0:02:59.53,0:03:01.26,Default,,0000,0000,0000,,to monitor communications. Dialogue: 0,0:03:01.77,0:03:04.12,Default,,0000,0000,0000,,E-mails, internet activity, phone calls, Dialogue: 0,0:03:04.14,0:03:06.25,Default,,0000,0000,0000,,even financial transactions. Dialogue: 0,0:03:06.28,0:03:09.15,Default,,0000,0000,0000,,This created an instant demand for data. Dialogue: 0,0:03:09.17,0:03:11.78,Default,,0000,0000,0000,,And in the true American\Nentrepreneurial spirit, Dialogue: 0,0:03:11.81,0:03:14.56,Default,,0000,0000,0000,,an industry rose up\Nto help collect this data. Dialogue: 0,0:03:15.00,0:03:16.21,Default,,0000,0000,0000,,But back in 2002, Dialogue: 0,0:03:16.23,0:03:18.27,Default,,0000,0000,0000,,this was still a pretty modest affair. Dialogue: 0,0:03:18.29,0:03:20.51,Default,,0000,0000,0000,,Only about 10 percent\Nof the world's population Dialogue: 0,0:03:20.54,0:03:22.46,Default,,0000,0000,0000,,was even online using the internet. Dialogue: 0,0:03:22.49,0:03:26.74,Default,,0000,0000,0000,,So most of what was being collected\Nwere simple e-mails and phone calls Dialogue: 0,0:03:26.76,0:03:29.02,Default,,0000,0000,0000,,over land lines and cell phones. Dialogue: 0,0:03:29.04,0:03:30.39,Default,,0000,0000,0000,,But over the next few years, Dialogue: 0,0:03:30.42,0:03:33.37,Default,,0000,0000,0000,,the way that we communicate\Nbegan to change rapidly. Dialogue: 0,0:03:33.39,0:03:35.78,Default,,0000,0000,0000,,There was the introduction\Nof Skype, Facebook, Dialogue: 0,0:03:35.81,0:03:37.97,Default,,0000,0000,0000,,and then crucially the iPhone, Dialogue: 0,0:03:37.99,0:03:40.78,Default,,0000,0000,0000,,and within a few years,\Nbillions of us were walking around Dialogue: 0,0:03:40.81,0:03:42.53,Default,,0000,0000,0000,,with little computers in our pockets Dialogue: 0,0:03:42.55,0:03:45.24,Default,,0000,0000,0000,,that do everything from monitor\Nour exercise habits, Dialogue: 0,0:03:45.27,0:03:47.66,Default,,0000,0000,0000,,to help us find romantic partners. Dialogue: 0,0:03:48.02,0:03:51.17,Default,,0000,0000,0000,,And suddenly, you didn't necessarily need\Nthe advanced capability Dialogue: 0,0:03:51.20,0:03:52.68,Default,,0000,0000,0000,,of the National Security Agency Dialogue: 0,0:03:52.70,0:03:56.04,Default,,0000,0000,0000,,or big telecoms, to monitor\Neveryone's communication. Dialogue: 0,0:03:56.07,0:03:57.25,Default,,0000,0000,0000,,In some cases, Dialogue: 0,0:03:57.27,0:04:00.51,Default,,0000,0000,0000,,all you needed was access\Nto that device in their pockets. Dialogue: 0,0:04:00.54,0:04:03.93,Default,,0000,0000,0000,,And that gave birth to an entirely\Nnew type of industry. Dialogue: 0,0:04:03.95,0:04:07.33,Default,,0000,0000,0000,,You know, not many companies\Ncan build missiles or aircraft. Dialogue: 0,0:04:07.36,0:04:10.60,Default,,0000,0000,0000,,But it doesn't take a lot of capital\Nto create software Dialogue: 0,0:04:10.63,0:04:13.01,Default,,0000,0000,0000,,that can hack into someone's smart phone. Dialogue: 0,0:04:13.04,0:04:15.10,Default,,0000,0000,0000,,Computer hackers have been\Naround for years, Dialogue: 0,0:04:15.12,0:04:18.12,Default,,0000,0000,0000,,but now their skills could be used\Nto build technologies Dialogue: 0,0:04:18.15,0:04:20.26,Default,,0000,0000,0000,,that were in high demand\Nby law enforcement Dialogue: 0,0:04:20.28,0:04:22.02,Default,,0000,0000,0000,,and intelligence agencies. Dialogue: 0,0:04:22.36,0:04:25.36,Default,,0000,0000,0000,,And soon, dozens\Nand even hundreds of companies Dialogue: 0,0:04:25.39,0:04:28.04,Default,,0000,0000,0000,,were getting into this\Nwire-tapper's market. Dialogue: 0,0:04:28.07,0:04:30.18,Default,,0000,0000,0000,,And that little conference in Virginia, Dialogue: 0,0:04:30.20,0:04:33.95,Default,,0000,0000,0000,,it grew and soon became known\Nas the wire-tapper's ball. Dialogue: 0,0:04:34.25,0:04:36.73,Default,,0000,0000,0000,,Well, not much was known\Nabout the wire-tapper's ball Dialogue: 0,0:04:36.76,0:04:37.91,Default,,0000,0000,0000,,in those early years, Dialogue: 0,0:04:37.93,0:04:40.14,Default,,0000,0000,0000,,because the conferences\Nwere closed to everyone Dialogue: 0,0:04:40.16,0:04:42.83,Default,,0000,0000,0000,,except the companies\Nand their government customers. Dialogue: 0,0:04:42.85,0:04:45.33,Default,,0000,0000,0000,,But journalists did begin to see\Nand hear reports Dialogue: 0,0:04:45.35,0:04:48.39,Default,,0000,0000,0000,,of companies getting into\Nthis private spy market. Dialogue: 0,0:04:48.41,0:04:51.03,Default,,0000,0000,0000,,Spooky entrepreneurs\Ngoing around the world, Dialogue: 0,0:04:51.06,0:04:52.24,Default,,0000,0000,0000,,doing deals, Dialogue: 0,0:04:52.26,0:04:54.21,Default,,0000,0000,0000,,often with authoritarian regimes. Dialogue: 0,0:04:54.24,0:04:57.83,Default,,0000,0000,0000,,And it was from the start\Na really loosely regulated market. Dialogue: 0,0:04:58.19,0:05:00.16,Default,,0000,0000,0000,,Some countries do require permission Dialogue: 0,0:05:00.19,0:05:02.23,Default,,0000,0000,0000,,to sell these technologies abroad, Dialogue: 0,0:05:02.25,0:05:06.27,Default,,0000,0000,0000,,but rarely with the type of scrutiny\Nthat is given to traditional arms. Dialogue: 0,0:05:06.68,0:05:10.03,Default,,0000,0000,0000,,So for example, the Italian-based\Ncompany Hacking Team Dialogue: 0,0:05:10.05,0:05:12.85,Default,,0000,0000,0000,,reportedly sold its technology\Nto authoritarian regimes Dialogue: 0,0:05:12.88,0:05:14.56,Default,,0000,0000,0000,,in Egypt and Kazakhstan. Dialogue: 0,0:05:15.02,0:05:18.82,Default,,0000,0000,0000,,The Israeli-based company NSO Group\Nhas reportedly sold its technology Dialogue: 0,0:05:18.84,0:05:20.62,Default,,0000,0000,0000,,to the regime in Saudi Arabia, Dialogue: 0,0:05:20.65,0:05:22.49,Default,,0000,0000,0000,,which has been accused of harassing, Dialogue: 0,0:05:22.52,0:05:25.57,Default,,0000,0000,0000,,and even in one case killing\None of its political opponents. Dialogue: 0,0:05:25.98,0:05:30.14,Default,,0000,0000,0000,,And we do think of weapons\Nas things that kill people. Dialogue: 0,0:05:30.16,0:05:31.47,Default,,0000,0000,0000,,But in the information age, Dialogue: 0,0:05:31.49,0:05:33.08,Default,,0000,0000,0000,,some of the most powerful weapons Dialogue: 0,0:05:33.10,0:05:35.41,Default,,0000,0000,0000,,are things that can track and identify us. Dialogue: 0,0:05:35.72,0:05:39.03,Default,,0000,0000,0000,,This is something that the Pentagon\Nand CIA have recognized for years, Dialogue: 0,0:05:39.06,0:05:41.98,Default,,0000,0000,0000,,and they've tried to build technologies\Nthat can track people, Dialogue: 0,0:05:42.00,0:05:44.28,Default,,0000,0000,0000,,suspected terrorists around the globe. Dialogue: 0,0:05:44.90,0:05:47.94,Default,,0000,0000,0000,,The Pentagon has invested\Nin something called smart dust, Dialogue: 0,0:05:47.97,0:05:50.56,Default,,0000,0000,0000,,little micro sensors the size\Nof specs of dust, Dialogue: 0,0:05:50.58,0:05:53.59,Default,,0000,0000,0000,,that you could scatter on people\Nwithout them knowing it, Dialogue: 0,0:05:53.61,0:05:55.84,Default,,0000,0000,0000,,and then use it to track their location. Dialogue: 0,0:05:55.86,0:05:58.45,Default,,0000,0000,0000,,The Pentagon, through\Nits venture capital firm, Dialogue: 0,0:05:58.47,0:06:00.81,Default,,0000,0000,0000,,has invested in a beauty products company Dialogue: 0,0:06:00.83,0:06:02.78,Default,,0000,0000,0000,,once featured in "Oprah Magazine," Dialogue: 0,0:06:02.81,0:06:05.81,Default,,0000,0000,0000,,to build a device that could\Nsurreptitiously collect DNA Dialogue: 0,0:06:05.83,0:06:08.03,Default,,0000,0000,0000,,just by swiping across the skin. Dialogue: 0,0:06:08.54,0:06:11.47,Default,,0000,0000,0000,,But something remarkable has happened\Nover the past decade. Dialogue: 0,0:06:11.50,0:06:14.47,Default,,0000,0000,0000,,In many cases, what the private\Nmarketplace has been able to do Dialogue: 0,0:06:14.49,0:06:18.72,Default,,0000,0000,0000,,has far outstripped what the Pentagon\Nor CIA even thought was possible. Dialogue: 0,0:06:18.74,0:06:19.92,Default,,0000,0000,0000,,Back in 2008, Dialogue: 0,0:06:19.94,0:06:24.09,Default,,0000,0000,0000,,the Pentagon had a secretive database\Nof DNA from terrorists. Dialogue: 0,0:06:24.11,0:06:26.44,Default,,0000,0000,0000,,It had about 80,000 samples. Dialogue: 0,0:06:26.87,0:06:29.37,Default,,0000,0000,0000,,Well, the private company AncestryDNA Dialogue: 0,0:06:29.40,0:06:32.73,Default,,0000,0000,0000,,today has samples\Nfrom over 15 million people. Dialogue: 0,0:06:32.75,0:06:36.26,Default,,0000,0000,0000,,23andMe, the second-largest\Ngenealogical database, Dialogue: 0,0:06:36.29,0:06:38.72,Default,,0000,0000,0000,,has samples from over 10 million people. Dialogue: 0,0:06:38.75,0:06:42.34,Default,,0000,0000,0000,,So now, maybe you don't need\Nthese James Bond-worthy techniques Dialogue: 0,0:06:42.37,0:06:43.96,Default,,0000,0000,0000,,of collecting DNA Dialogue: 0,0:06:43.98,0:06:46.94,Default,,0000,0000,0000,,if we're willingly handing it over\Nto private companies Dialogue: 0,0:06:46.96,0:06:49.41,Default,,0000,0000,0000,,and even paying for the honor of doing it. Dialogue: 0,0:06:49.81,0:06:53.14,Default,,0000,0000,0000,,Well what could you do\Nwith a sample of someone's DNA? Dialogue: 0,0:06:53.16,0:06:54.68,Default,,0000,0000,0000,,In the United States and China Dialogue: 0,0:06:54.70,0:06:57.18,Default,,0000,0000,0000,,researchers are working\Non using DNA samples Dialogue: 0,0:06:57.20,0:06:59.52,Default,,0000,0000,0000,,to build images of people's faces. Dialogue: 0,0:06:59.54,0:07:03.51,Default,,0000,0000,0000,,So if you pair DNA\Nwith facial recognition technology Dialogue: 0,0:07:03.54,0:07:06.60,Default,,0000,0000,0000,,you have the basis of a really\Npowerful surveillance system Dialogue: 0,0:07:06.62,0:07:10.45,Default,,0000,0000,0000,,that could be used to track individuals\Nor entire ethnic groups. Dialogue: 0,0:07:10.47,0:07:12.86,Default,,0000,0000,0000,,And if you think that sounds\Na little bit paranoid, Dialogue: 0,0:07:12.88,0:07:15.62,Default,,0000,0000,0000,,keep in mind that the Pentagon\Nlast year sent out a memo Dialogue: 0,0:07:15.65,0:07:17.54,Default,,0000,0000,0000,,to all of its service members Dialogue: 0,0:07:17.56,0:07:20.82,Default,,0000,0000,0000,,warning them precisely not to use\Nthose commercial DNA kits Dialogue: 0,0:07:20.84,0:07:23.69,Default,,0000,0000,0000,,over concerns that information\Ncould be used to track them Dialogue: 0,0:07:23.71,0:07:25.68,Default,,0000,0000,0000,,or their family members. Dialogue: 0,0:07:25.70,0:07:29.93,Default,,0000,0000,0000,,And yet, even with the Pentagon\Nraising concerns about this technology, Dialogue: 0,0:07:29.95,0:07:32.88,Default,,0000,0000,0000,,almost nothing has been done\Nto reign in this market. Dialogue: 0,0:07:32.90,0:07:35.11,Default,,0000,0000,0000,,One American company, Clearview AI, Dialogue: 0,0:07:35.13,0:07:37.76,Default,,0000,0000,0000,,has been collecting billions\Nof images of people's faces Dialogue: 0,0:07:37.78,0:07:39.20,Default,,0000,0000,0000,,from across the internet. Dialogue: 0,0:07:39.22,0:07:41.54,Default,,0000,0000,0000,,Like those pictures you post\Non Instagram of you Dialogue: 0,0:07:41.56,0:07:43.37,Default,,0000,0000,0000,,and your friends and family, Dialogue: 0,0:07:43.40,0:07:45.65,Default,,0000,0000,0000,,and then selling its facial\Nrecognition services Dialogue: 0,0:07:45.67,0:07:48.51,Default,,0000,0000,0000,,to US government\Nand law enforcement agencies. Dialogue: 0,0:07:48.53,0:07:49.70,Default,,0000,0000,0000,,And even if you think Dialogue: 0,0:07:49.73,0:07:52.74,Default,,0000,0000,0000,,that's a perfectly acceptable\Napplication of this technology, Dialogue: 0,0:07:52.76,0:07:56.20,Default,,0000,0000,0000,,there's nothing to stop them\Nfrom selling to private individuals, Dialogue: 0,0:07:56.22,0:07:59.10,Default,,0000,0000,0000,,corporations, or even foreign governments. Dialogue: 0,0:07:59.12,0:08:01.82,Default,,0000,0000,0000,,And that's exactly\Nwhat some companies are doing. Dialogue: 0,0:08:01.85,0:08:05.08,Default,,0000,0000,0000,,That wire-tapper's ball\Nthat started in northern Virginia? Dialogue: 0,0:08:05.11,0:08:08.93,Default,,0000,0000,0000,,Today it's held in multiple cities\Naround the globe. Dialogue: 0,0:08:08.96,0:08:13.08,Default,,0000,0000,0000,,Thousands of people now attend\Nthe ISS trainings and conferences. Dialogue: 0,0:08:13.11,0:08:16.83,Default,,0000,0000,0000,,And more of the companies showing up\Nare coming from the Middle East and China. Dialogue: 0,0:08:16.85,0:08:18.99,Default,,0000,0000,0000,,The spy bizarre has gone global. Dialogue: 0,0:08:19.54,0:08:21.36,Default,,0000,0000,0000,,And at arms shows now around the world Dialogue: 0,0:08:21.39,0:08:24.53,Default,,0000,0000,0000,,you'll see companies displaying\Nfacial recognition technology Dialogue: 0,0:08:24.56,0:08:26.14,Default,,0000,0000,0000,,and phone hacking software, Dialogue: 0,0:08:26.16,0:08:29.02,Default,,0000,0000,0000,,displaying right next\Nto traditional arms manufacturers Dialogue: 0,0:08:29.05,0:08:30.90,Default,,0000,0000,0000,,with tanks and missiles. Dialogue: 0,0:08:30.93,0:08:32.64,Default,,0000,0000,0000,,And walking around these arms shows Dialogue: 0,0:08:32.67,0:08:35.62,Default,,0000,0000,0000,,it's pretty easy to go down\Ndystopian rabbit holes, Dialogue: 0,0:08:35.64,0:08:37.76,Default,,0000,0000,0000,,thinking about future\Nsurveillance technology Dialogue: 0,0:08:37.78,0:08:39.53,Default,,0000,0000,0000,,that will track our every move. Dialogue: 0,0:08:39.55,0:08:41.70,Default,,0000,0000,0000,,And I remember one\NPentagon adviser telling me Dialogue: 0,0:08:41.72,0:08:43.44,Default,,0000,0000,0000,,that what the military really needed Dialogue: 0,0:08:43.47,0:08:44.82,Default,,0000,0000,0000,,were space-based satellites Dialogue: 0,0:08:44.84,0:08:48.84,Default,,0000,0000,0000,,that could track people anywhere on earth\Nbased just on their DNA. Dialogue: 0,0:08:48.86,0:08:51.66,Default,,0000,0000,0000,,It's enough to make you invest\Nin tin foil hats. Dialogue: 0,0:08:51.68,0:08:52.84,Default,,0000,0000,0000,,But the truth is, Dialogue: 0,0:08:52.86,0:08:55.96,Default,,0000,0000,0000,,we don't know what sort\Nof technology the future will bring. Dialogue: 0,0:08:55.98,0:08:58.94,Default,,0000,0000,0000,,But we know that today,\Nin the absence of regulation, Dialogue: 0,0:08:58.97,0:09:01.24,Default,,0000,0000,0000,,this marketplace is already exploding. Dialogue: 0,0:09:01.27,0:09:04.96,Default,,0000,0000,0000,,And in fact, one of those companies\Naccused of selling surveillance technology Dialogue: 0,0:09:04.98,0:09:06.61,Default,,0000,0000,0000,,to authoritarian regimes, Dialogue: 0,0:09:06.63,0:09:11.15,Default,,0000,0000,0000,,today it's offering to help track\Nthose infected with COVID-19. Dialogue: 0,0:09:11.17,0:09:14.09,Default,,0000,0000,0000,,And of course, technology does offer\Nthe tantalizing promise Dialogue: 0,0:09:14.12,0:09:17.43,Default,,0000,0000,0000,,of helping control a pandemic\Nthrough contact tracing. Dialogue: 0,0:09:17.46,0:09:21.10,Default,,0000,0000,0000,,But it also opens up another door\Nto privatized mass surveillance. Dialogue: 0,0:09:21.70,0:09:24.70,Default,,0000,0000,0000,,So what do we do\Nabout this private spy bizarre? Dialogue: 0,0:09:25.00,0:09:26.93,Default,,0000,0000,0000,,We can hide, go offline, Dialogue: 0,0:09:26.95,0:09:29.74,Default,,0000,0000,0000,,get off social media,\Nditch our smart phones, Dialogue: 0,0:09:29.76,0:09:31.24,Default,,0000,0000,0000,,go live in a cave, Dialogue: 0,0:09:31.27,0:09:34.15,Default,,0000,0000,0000,,but the truth is, we're not trained\Nto be professional spies, Dialogue: 0,0:09:34.17,0:09:37.49,Default,,0000,0000,0000,,we can't live under false identities\Nor with no identities. Dialogue: 0,0:09:37.94,0:09:41.62,Default,,0000,0000,0000,,And even real spies are having a hard time\Nstaying below the radar these days. Dialogue: 0,0:09:41.64,0:09:44.35,Default,,0000,0000,0000,,It doesn't matter how many\Npassports Jason Borne has, Dialogue: 0,0:09:44.37,0:09:47.24,Default,,0000,0000,0000,,if his face or DNA\Nis in someone's database. Dialogue: 0,0:09:47.77,0:09:50.88,Default,,0000,0000,0000,,But if even governments have lost control\Nof the tools of spying, Dialogue: 0,0:09:50.90,0:09:52.92,Default,,0000,0000,0000,,is there anything we can do about it? Dialogue: 0,0:09:52.94,0:09:54.11,Default,,0000,0000,0000,,One argument I've heard Dialogue: 0,0:09:54.13,0:09:56.43,Default,,0000,0000,0000,,is that even if the US\Nwere to restrict companies Dialogue: 0,0:09:56.45,0:09:58.54,Default,,0000,0000,0000,,from selling this sort\Nof technology abroad, Dialogue: 0,0:09:58.56,0:10:00.96,Default,,0000,0000,0000,,companies based in China\Nmight simply step in. Dialogue: 0,0:10:01.46,0:10:03.82,Default,,0000,0000,0000,,But we regulate the arms trade today, Dialogue: 0,0:10:03.84,0:10:05.77,Default,,0000,0000,0000,,even if we do it imperfectly. Dialogue: 0,0:10:06.47,0:10:09.49,Default,,0000,0000,0000,,And in fact, there was a multilateral\Nproposal several years ago Dialogue: 0,0:10:09.52,0:10:10.67,Default,,0000,0000,0000,,to do just that, Dialogue: 0,0:10:10.70,0:10:13.63,Default,,0000,0000,0000,,to require export licenses\Nfor surveillance software. Dialogue: 0,0:10:14.03,0:10:16.05,Default,,0000,0000,0000,,The United States\Nwas among those countries Dialogue: 0,0:10:16.07,0:10:18.63,Default,,0000,0000,0000,,that agreed to these\Nvoluntary regulations, Dialogue: 0,0:10:18.65,0:10:19.82,Default,,0000,0000,0000,,but back in Washington, Dialogue: 0,0:10:19.84,0:10:21.91,Default,,0000,0000,0000,,this proposal has simply languished. Dialogue: 0,0:10:21.94,0:10:25.14,Default,,0000,0000,0000,,We have an administration\Nthat would rather sell more weapons abroad Dialogue: 0,0:10:25.16,0:10:26.35,Default,,0000,0000,0000,,with fewer restrictions, Dialogue: 0,0:10:26.38,0:10:28.14,Default,,0000,0000,0000,,including to some of those countries Dialogue: 0,0:10:28.17,0:10:30.20,Default,,0000,0000,0000,,accused of abusing\Nsurveillance technology. Dialogue: 0,0:10:30.56,0:10:31.73,Default,,0000,0000,0000,,I think to move forward, Dialogue: 0,0:10:31.76,0:10:33.57,Default,,0000,0000,0000,,we would need to revive that proposal, Dialogue: 0,0:10:33.60,0:10:35.53,Default,,0000,0000,0000,,but even go one step further. Dialogue: 0,0:10:35.56,0:10:39.24,Default,,0000,0000,0000,,We need to fundamentally change\Nhow we think of surveillance technology Dialogue: 0,0:10:39.26,0:10:41.72,Default,,0000,0000,0000,,and define these tools as weapons. Dialogue: 0,0:10:41.74,0:10:43.07,Default,,0000,0000,0000,,This would allow government Dialogue: 0,0:10:43.09,0:10:45.92,Default,,0000,0000,0000,,to regulate and control\Ntheir sale and export, Dialogue: 0,0:10:45.95,0:10:48.63,Default,,0000,0000,0000,,the way that they control\Ntraditional arms, Dialogue: 0,0:10:48.66,0:10:50.72,Default,,0000,0000,0000,,advanced aircraft and missiles. Dialogue: 0,0:10:51.07,0:10:54.80,Default,,0000,0000,0000,,But that means recognizing\Nthat technology that tracks who we are, Dialogue: 0,0:10:54.83,0:10:56.61,Default,,0000,0000,0000,,what we do, what we say, Dialogue: 0,0:10:56.64,0:10:58.76,Default,,0000,0000,0000,,and even in some cases, what we think, Dialogue: 0,0:10:58.79,0:11:00.79,Default,,0000,0000,0000,,is a form of advanced weaponry. Dialogue: 0,0:11:00.81,0:11:02.94,Default,,0000,0000,0000,,And these weapons\Nare growing too powerful, Dialogue: 0,0:11:02.96,0:11:04.69,Default,,0000,0000,0000,,available to the highest bidder, Dialogue: 0,0:11:04.72,0:11:07.13,Default,,0000,0000,0000,,and according to the whims\Nof the spy bizarre. Dialogue: 0,0:11:07.53,0:11:08.68,Default,,0000,0000,0000,,Thank you.