WEBVTT 00:00:01.230 --> 00:00:02.389 A few years ago, 00:00:02.413 --> 00:00:04.190 an American defense consultant I know 00:00:04.214 --> 00:00:06.587 told me about a trip he took to Uzbekistan. 00:00:06.897 --> 00:00:09.325 His role there was to help sell technology 00:00:09.349 --> 00:00:13.016 that the Uzbek government could use to spy on its own citizens. 00:00:13.491 --> 00:00:15.889 He eventually shared with me the marketing material 00:00:15.913 --> 00:00:18.032 he'd presented to the Uzbek government. 00:00:18.056 --> 00:00:23.082 One glossy brochure featured technology that could not just intercept phone calls, 00:00:23.106 --> 00:00:24.689 but identify the caller, 00:00:24.713 --> 00:00:27.164 regardless of what phone number they were using, 00:00:27.188 --> 00:00:29.283 based on their unique voiceprint, 00:00:29.307 --> 00:00:32.577 and then identify their exact geographic location. NOTE Paragraph 00:00:32.926 --> 00:00:36.085 This is a guy who had been involved with the arms trade for years. 00:00:36.109 --> 00:00:39.617 He wasn't some Hollywood-type gunrunner doing backroom deals. 00:00:39.641 --> 00:00:42.617 He was just a guy that worked with legitimate Western companies 00:00:42.641 --> 00:00:44.586 to help sell their weapons abroad. 00:00:44.610 --> 00:00:47.499 But he wasn't bothered by marketing this sort of technology. 00:00:47.523 --> 00:00:50.285 For him, it was just the next step in the arms trade. 00:00:50.309 --> 00:00:53.253 And it was even easier than, say, selling weapons to Iraq, 00:00:53.277 --> 00:00:55.491 because it didn't require an export license 00:00:55.515 --> 00:00:56.926 from the US State Department, 00:00:56.950 --> 00:00:58.998 the way most arms sales would. 00:00:59.022 --> 00:01:01.133 It turns out that these tools of surveillance 00:01:01.157 --> 00:01:03.244 are almost completely unregulated, 00:01:03.268 --> 00:01:06.442 because as of today, they're not defined as weapons. 00:01:06.466 --> 00:01:09.378 But they should be, and we need to regulate them that way. NOTE Paragraph 00:01:09.688 --> 00:01:12.083 I'm a journalist who has spent the last two decades 00:01:12.107 --> 00:01:14.479 looking at how the military and intelligence world 00:01:14.503 --> 00:01:16.942 spurs the development of new science and technology. 00:01:16.966 --> 00:01:19.025 I've tracked the emergence of new weapons 00:01:19.049 --> 00:01:20.498 and looked to see what happens 00:01:20.522 --> 00:01:23.164 when companies start to market these weapons abroad. 00:01:23.188 --> 00:01:25.593 But what is a weapon in the information age? 00:01:25.617 --> 00:01:27.549 We know that armed drones are weapons, 00:01:27.573 --> 00:01:29.537 missiles and bombs are weapons, 00:01:29.561 --> 00:01:31.657 but the State Department actually classifies 00:01:31.681 --> 00:01:34.529 broad categories of technologies as weapons. NOTE Paragraph 00:01:34.553 --> 00:01:38.887 So for example, a scientist going abroad on an oceanographic research vessel, 00:01:38.911 --> 00:01:41.268 they want to take the latest night-vision goggles? 00:01:41.292 --> 00:01:44.585 That, according to the State Department, is potentially a weapon. 00:01:44.609 --> 00:01:45.775 Why? 00:01:45.799 --> 00:01:49.085 Well, because though night-vision goggles are used today by scientists 00:01:49.109 --> 00:01:50.506 and hunters around the world, 00:01:50.530 --> 00:01:53.347 it was a capability first developed for the military. NOTE Paragraph 00:01:53.371 --> 00:01:54.807 And yet, tools of surveillance 00:01:54.831 --> 00:01:58.246 that an authoritarian regime could use to spy on its own citizens, 00:01:58.270 --> 00:02:00.079 on dissidents, on journalists, 00:02:00.103 --> 00:02:03.190 that, according to the US government today, is not a weapon. 00:02:03.587 --> 00:02:05.317 And yet, these tools of surveillance 00:02:05.341 --> 00:02:09.245 are part of a growing secretive multi-billion-dollar industry. NOTE Paragraph 00:02:09.848 --> 00:02:12.753 The genesis of this spy bazaar goes back some 18 years, 00:02:12.777 --> 00:02:14.792 to a Hilton hotel in northern Virginia, 00:02:14.816 --> 00:02:18.413 just a few miles away from the US Central Intelligence Agency. 00:02:18.721 --> 00:02:21.079 A few dozen people, mostly dark-suited men, 00:02:21.103 --> 00:02:23.190 gathered there in the spring of 2002 00:02:23.214 --> 00:02:26.324 for a conference with the unassuming name of ISS World. 00:02:26.627 --> 00:02:30.405 You know, at first glance, this conference probably looked like dozens of events 00:02:30.429 --> 00:02:33.067 that used to take place around the Washington, DC area. 00:02:33.091 --> 00:02:34.781 But this event was unique. 00:02:34.805 --> 00:02:37.749 ISS stands for Intelligence Support Systems, 00:02:37.773 --> 00:02:39.185 and the people who were there 00:02:39.209 --> 00:02:41.639 were from companies that built technologies to spy 00:02:41.663 --> 00:02:43.513 on private communications. 00:02:43.537 --> 00:02:46.535 In other words, these were sort of wire-tappers for hire. NOTE Paragraph 00:02:46.855 --> 00:02:49.903 And the reason they were there was that less than a year earlier, 00:02:49.927 --> 00:02:52.439 the 9/11 terrorist attacks on New York and Washington 00:02:52.463 --> 00:02:55.323 had spurred the Congress to press through legislation 00:02:55.347 --> 00:02:57.027 known as the Patriot Act. 00:02:57.347 --> 00:02:59.506 This gave the government broad new authorities 00:02:59.530 --> 00:03:01.744 to monitor communications. 00:03:01.768 --> 00:03:04.117 Emails, internet activity, phone calls, 00:03:04.141 --> 00:03:06.251 even financial transactions. 00:03:06.275 --> 00:03:09.149 This created an instant demand for data. 00:03:09.173 --> 00:03:11.784 And in the true American entrepreneurial spirit, 00:03:11.808 --> 00:03:14.559 an industry rose up to help collect this data. NOTE Paragraph 00:03:15.004 --> 00:03:16.208 But back in 2002, 00:03:16.232 --> 00:03:18.266 this was still a pretty modest affair. 00:03:18.290 --> 00:03:20.512 Only about 10 percent of the world's population 00:03:20.536 --> 00:03:22.464 was even online using the internet. 00:03:22.488 --> 00:03:26.741 So most of what was being collected were simple emails and phone calls 00:03:26.765 --> 00:03:29.018 over landlines and cell phones. 00:03:29.042 --> 00:03:30.392 But over the next few years, 00:03:30.416 --> 00:03:33.367 the way that we communicate began to change rapidly. 00:03:33.391 --> 00:03:35.783 There was the introduction of Skype, Facebook 00:03:35.807 --> 00:03:37.966 and then, crucially, the iPhone, 00:03:37.990 --> 00:03:39.181 and within a few years, 00:03:39.205 --> 00:03:42.539 billions of us were walking around with little computers in our pockets 00:03:42.563 --> 00:03:45.243 that do everything from monitor our exercise habits 00:03:45.267 --> 00:03:47.655 to help us find romantic partners. 00:03:48.022 --> 00:03:51.171 And suddenly, you didn't necessarily need the advanced capability 00:03:51.195 --> 00:03:53.770 of the National Security Agency or big telecoms 00:03:53.794 --> 00:03:56.042 to monitor everyone's communication. 00:03:56.066 --> 00:03:57.247 In some cases, 00:03:57.271 --> 00:04:00.514 all you needed was access to that device in their pockets. 00:04:00.538 --> 00:04:03.926 And that gave birth to an entirely new type of industry. NOTE Paragraph 00:04:03.950 --> 00:04:07.331 You know, not many companies can build missiles or aircraft, 00:04:07.355 --> 00:04:10.605 but it doesn't take a lot of capital to create software 00:04:10.629 --> 00:04:13.013 that can hack into someone's smartphone. 00:04:13.037 --> 00:04:15.101 Computer hackers have been around for years, 00:04:15.125 --> 00:04:18.125 but now their skills could be used to build technologies 00:04:18.149 --> 00:04:20.259 that were in high demand by law enforcement 00:04:20.283 --> 00:04:22.016 and intelligence agencies. 00:04:22.363 --> 00:04:25.363 And soon, dozens and even hundreds of companies 00:04:25.387 --> 00:04:28.045 were getting into this wire-tappers' market. 00:04:28.069 --> 00:04:30.180 And that little conference in Virginia, 00:04:30.204 --> 00:04:33.948 it grew and soon became known as the Wiretappers' Ball. NOTE Paragraph 00:04:34.250 --> 00:04:36.734 Well, not much was known about the Wiretappers' Ball 00:04:36.758 --> 00:04:37.908 in those early years, 00:04:37.932 --> 00:04:40.139 because the conferences were closed to everyone 00:04:40.163 --> 00:04:42.829 except the companies and their government customers. 00:04:42.853 --> 00:04:45.330 But journalists did begin to see and hear reports 00:04:45.354 --> 00:04:48.386 of companies getting into this private spy market. 00:04:48.410 --> 00:04:51.033 Spooky entrepreneurs going around the world, 00:04:51.057 --> 00:04:52.235 doing deals, 00:04:52.259 --> 00:04:54.211 often with authoritarian regimes. NOTE Paragraph 00:04:54.235 --> 00:04:57.831 And it was, from the start, a really loosely regulated market. 00:04:58.188 --> 00:05:02.227 Some countries do require permission to sell these technologies abroad, 00:05:02.251 --> 00:05:06.267 but rarely with the type of scrutiny that is given to traditional arms. 00:05:06.680 --> 00:05:10.029 So for example, the Italian-based company Hacking Team 00:05:10.053 --> 00:05:12.852 reportedly sold its technology to authoritarian regimes 00:05:12.876 --> 00:05:14.556 in Egypt and Kazakhstan. 00:05:15.018 --> 00:05:18.815 The Israeli-based company NSO Group has reportedly sold its technology 00:05:18.839 --> 00:05:20.625 to the regime in Saudi Arabia, 00:05:20.649 --> 00:05:22.491 which has been accused of harassing, 00:05:22.515 --> 00:05:25.569 and even, in one case, killing one of its political opponents. 00:05:25.982 --> 00:05:30.137 And we do think of weapons as things that kill people. 00:05:30.161 --> 00:05:31.470 But in the information age, 00:05:31.494 --> 00:05:35.414 some of the most powerful weapons are things that can track and identify us. NOTE Paragraph 00:05:35.724 --> 00:05:39.034 This is something that the Pentagon and CIA have recognized for years, 00:05:39.058 --> 00:05:40.930 and they've tried to build technologies 00:05:40.954 --> 00:05:44.579 that can track people, suspected terrorists, around the globe. 00:05:44.904 --> 00:05:47.943 The Pentagon has invested in something called smart dust, 00:05:47.967 --> 00:05:50.555 little microsensors the size of specs of dust 00:05:50.579 --> 00:05:53.589 that you could scatter on people without them knowing it, 00:05:53.613 --> 00:05:55.835 and then use it to track their location. 00:05:55.859 --> 00:05:58.447 The Pentagon, through its venture capital firm, 00:05:58.471 --> 00:06:02.783 has invested in a beauty products company once featured in "Oprah Magazine" 00:06:02.807 --> 00:06:05.807 to build a device that could surreptitiously collect DNA 00:06:05.831 --> 00:06:08.031 just by swiping across the skin. NOTE Paragraph 00:06:08.537 --> 00:06:11.473 But something remarkable has happened over the past decade. 00:06:11.497 --> 00:06:14.467 In many cases, what the private marketplace has been able to do 00:06:14.491 --> 00:06:18.721 has far outstripped what the Pentagon or CIA even thought was possible. 00:06:18.745 --> 00:06:19.921 Back in 2008, 00:06:19.945 --> 00:06:24.087 the Pentagon had a secretive database of DNA from terrorists. 00:06:24.111 --> 00:06:26.436 It had about 80,000 samples. 00:06:26.871 --> 00:06:29.371 Well, the private company AncestryDNA 00:06:29.395 --> 00:06:32.728 today has samples from over 15 million people. 00:06:32.752 --> 00:06:36.263 23andMe, the second-largest genealogical database, 00:06:36.287 --> 00:06:38.724 has samples from over 10 million people. 00:06:38.748 --> 00:06:42.343 So now, maybe you don't need these James Bond-worthy techniques 00:06:42.367 --> 00:06:43.961 of collecting DNA 00:06:43.985 --> 00:06:46.937 if we're willingly handing it over to private companies 00:06:46.961 --> 00:06:49.410 and even paying for the honor of doing it. NOTE Paragraph 00:06:49.807 --> 00:06:53.138 Well, what could you do with a sample of someone's DNA? 00:06:53.162 --> 00:06:54.679 In the United States and China, 00:06:54.703 --> 00:06:57.178 researchers are working on using DNA samples 00:06:57.202 --> 00:06:59.520 to build images of people's faces. 00:06:59.544 --> 00:07:03.513 So if you pair DNA with facial recognition technology, 00:07:03.537 --> 00:07:06.600 you have the basis of a really powerful surveillance system 00:07:06.624 --> 00:07:10.449 that could be used to track individuals or entire ethnic groups. 00:07:10.473 --> 00:07:12.861 And if you think that sounds a little bit paranoid, 00:07:12.885 --> 00:07:15.625 keep in mind that the Pentagon last year sent out a memo 00:07:15.649 --> 00:07:17.537 to all of its service members, 00:07:17.561 --> 00:07:20.815 warning them precisely not to use those commercial DNA kits 00:07:20.839 --> 00:07:23.689 over concerns that information could be used to track them 00:07:23.713 --> 00:07:25.679 or their family members. 00:07:25.703 --> 00:07:29.926 And yet, even with the Pentagon raising concerns about this technology, 00:07:29.950 --> 00:07:32.878 almost nothing has been done to reign in this market. NOTE Paragraph 00:07:32.902 --> 00:07:35.109 One American company, Clearview AI, 00:07:35.133 --> 00:07:37.760 has been collecting billions of images of people's faces 00:07:37.784 --> 00:07:39.196 from across the internet, 00:07:39.220 --> 00:07:43.371 like those pictures you post on Instagram of you and your friends and family, 00:07:43.395 --> 00:07:45.649 and then selling its facial recognition services 00:07:45.673 --> 00:07:48.506 to US government and law-enforcement agencies. 00:07:48.530 --> 00:07:49.704 And even if you think 00:07:49.728 --> 00:07:52.738 that's a perfectly acceptable application of this technology, 00:07:52.762 --> 00:07:56.198 there's nothing to stop them from selling to private individuals, 00:07:56.222 --> 00:07:59.101 corporations or even foreign governments. 00:07:59.125 --> 00:08:01.823 And that's exactly what some companies are doing. NOTE Paragraph 00:08:01.847 --> 00:08:05.085 That Wiretappers' Ball that started in northern Virginia? 00:08:05.109 --> 00:08:08.932 Today, it's held in multiple cities around the globe. 00:08:08.956 --> 00:08:13.083 Thousands of people now attend the ISS trainings and conferences. 00:08:13.107 --> 00:08:16.829 And more of the companies showing up are coming from the Middle East and China. 00:08:16.853 --> 00:08:18.987 The spy bazaar has gone global. 00:08:19.545 --> 00:08:21.446 And at arms shows now around the world, 00:08:21.470 --> 00:08:24.531 you'll see companies displaying facial recognition technology 00:08:24.555 --> 00:08:26.139 and phone hacking software, 00:08:26.163 --> 00:08:29.022 displaying right next to traditional arms manufacturers 00:08:29.046 --> 00:08:30.903 with tanks and missiles. 00:08:30.927 --> 00:08:32.642 And walking around these arms shows, 00:08:32.666 --> 00:08:35.617 it's pretty easy to go down dystopian rabbit holes, 00:08:35.641 --> 00:08:37.759 thinking about future surveillance technology 00:08:37.783 --> 00:08:39.529 that will track our every move. 00:08:39.553 --> 00:08:41.696 And I remember one Pentagon adviser telling me 00:08:41.720 --> 00:08:44.816 that what the military really needed were space-based satellites 00:08:44.840 --> 00:08:48.839 that could track people anywhere on earth based just on their DNA. 00:08:48.863 --> 00:08:51.656 It's enough to make you invest in tinfoil hats. NOTE Paragraph 00:08:51.680 --> 00:08:52.839 But the truth is, 00:08:52.863 --> 00:08:55.958 we don't know what sort of technology the future will bring. 00:08:55.982 --> 00:08:58.942 But we know that today, in the absence of regulation, 00:08:58.966 --> 00:09:01.243 this marketplace is already exploding. 00:09:01.267 --> 00:09:04.957 And in fact, one of those companies accused of selling surveillance technology 00:09:04.981 --> 00:09:06.608 to authoritarian regimes, 00:09:06.632 --> 00:09:11.146 today, it's offering to help track those infected with COVID-19. 00:09:11.170 --> 00:09:14.091 And of course, technology does offer the tantalizing promise 00:09:14.115 --> 00:09:17.434 of helping control a pandemic through contact tracing. 00:09:17.458 --> 00:09:21.101 But it also opens up another door, to privatized mass surveillance. NOTE Paragraph 00:09:21.696 --> 00:09:24.704 So what do we do about this private spy bazaar? 00:09:25.005 --> 00:09:26.926 We can hide, go offline, 00:09:26.950 --> 00:09:29.735 get off social media, ditch our smartphones, 00:09:29.759 --> 00:09:31.244 go live in a cave, 00:09:31.268 --> 00:09:34.148 but the truth is, we're not trained to be professional spies, 00:09:34.172 --> 00:09:37.490 we can't live under false identities or with no identities. 00:09:37.902 --> 00:09:41.617 And even real spies are having a hard time staying below the radar, these days. 00:09:41.641 --> 00:09:44.346 It doesn't matter how many passports Jason Bourne has 00:09:44.370 --> 00:09:47.237 if his face or DNA is in someone's database. 00:09:47.767 --> 00:09:50.879 But if even governments have lost control of the tools of spying, 00:09:50.903 --> 00:09:52.918 is there anything we can do about it? NOTE Paragraph 00:09:52.942 --> 00:09:54.109 One argument I've heard 00:09:54.133 --> 00:09:56.426 is that even if the US were to restrict companies 00:09:56.450 --> 00:09:58.537 from selling this sort of technology abroad, 00:09:58.561 --> 00:10:00.961 companies based in China might simply step in. 00:10:01.457 --> 00:10:03.815 But we regulate the arms trade today, 00:10:03.839 --> 00:10:05.772 even if we do it imperfectly. 00:10:06.466 --> 00:10:09.491 And in fact, there was a multilateral proposal several years ago 00:10:09.515 --> 00:10:10.672 to do just that, 00:10:10.696 --> 00:10:13.632 to require export licenses for surveillance software. 00:10:14.030 --> 00:10:16.046 The United States was among those countries 00:10:16.070 --> 00:10:18.629 that agreed to these voluntary regulations, 00:10:18.653 --> 00:10:21.914 but back in Washington, this proposal has simply languished. 00:10:21.938 --> 00:10:25.137 We have an administration that would rather sell more weapons abroad 00:10:25.161 --> 00:10:26.352 with fewer restrictions, 00:10:26.376 --> 00:10:28.145 including to some of those countries 00:10:28.169 --> 00:10:30.200 accused of abusing surveillance technology. NOTE Paragraph 00:10:30.559 --> 00:10:33.574 I think to move forward, we would need to revive that proposal, 00:10:33.598 --> 00:10:35.534 but even go one step further. 00:10:35.558 --> 00:10:39.241 We need to fundamentally change how we think of surveillance technology 00:10:39.265 --> 00:10:41.716 and define these tools as weapons. 00:10:41.740 --> 00:10:43.066 This would allow government 00:10:43.090 --> 00:10:45.923 to regulate and control their sale and export 00:10:45.947 --> 00:10:48.633 the way that they control traditional arms, 00:10:48.657 --> 00:10:50.724 advanced aircraft and missiles. NOTE Paragraph 00:10:51.074 --> 00:10:54.804 But that means recognizing that technology that tracks who we are, 00:10:54.828 --> 00:10:56.614 what we do, what we say, 00:10:56.638 --> 00:10:58.765 and even in some cases, what we think, 00:10:58.789 --> 00:11:00.789 is a form of advanced weaponry. 00:11:00.813 --> 00:11:02.936 And these weapons are growing too powerful, 00:11:02.960 --> 00:11:04.691 available to the highest bidder, 00:11:04.715 --> 00:11:07.127 and according to the whims of the spy bazaar. 00:11:07.532 --> 00:11:08.682 Thank you.