< Return to Video

How to avoid surveillance ... with the phone in your pocket

  • Not Synced
    For more than a hundred years,
    the telephone companies have provided
  • Not Synced
    wire-tapping assistance to the government.
  • Not Synced
    For much of this time,
    the assistance was manual.
  • Not Synced
    Surveillance took place manually
    and wires were connected by hand.
  • Not Synced
    Calls were recorded to tape.
  • Not Synced
    But as in so many other industries,
    computing has changed everything.
  • Not Synced
    The telephone companies
    built surveillance features
  • Not Synced
    into the very core of their networks.
  • Not Synced
    I want that to sink in for a second.
  • Not Synced
    Our telephones and the networks
    that carry our calls
  • Not Synced
    were wired for surveillance first,
    first and foremost.
  • Not Synced
    So, what that means is when you're talking
    to your spouse, your children, a colleague
  • Not Synced
    or your doctor on the telephone,
    someone could be listening.
  • Not Synced
    Now that someone might be your own government.
  • Not Synced
    It could also be another government,
    a foreign intelligence service.
  • Not Synced
    Or a hacker, or a criminal, or a stalker,
    or any other party that breaks
  • Not Synced
    into the surveillance system that hacks
    in to the surveillance system
  • Not Synced
    of the telephone companies.
  • Not Synced
    But, while the telephone companies have
    built surveillance as a priority,
  • Not Synced
    Silicon Valley companies have not.
  • Not Synced
    And increasingly over the last couple
    years, Silicon Valley companies have built
  • Not Synced
    strong encryption technology into their
    communications products that makes
  • Not Synced
    surveillance extremely difficult.
  • Not Synced
    For example, many of you might have
    an iPhone and if you use an iPhone
  • Not Synced
    to send a text message to other people
    that have an iPhone, those text messages
  • Not Synced
    cannot easily be wire-tapped.
  • Not Synced
    And in fact, according to Apple
    they're not able to even see
  • Not Synced
    the text messages themselves.
  • Not Synced
    Likewise, if you use FaceTime to make
    an audio call or a video call with one
  • Not Synced
    of your friends or loved ones, that too
    cannot be easily wire-tapped.
  • Not Synced
    And it's not just Apple.
  • Not Synced
    What'sApp, which is now owned by Facebook
    and used by hundreds of millions of people
  • Not Synced
    around the world, also has built strong
    encryption technology into its product.
  • Not Synced
    Which means that people in the global
    south can easily communicate without
  • Not Synced
    their governments, often authoritarian
    wire-tapping their text messages.
  • Not Synced
    So, after 100 years of being able
    to listen to any telephone call,
  • Not Synced
    anytime, anywhere.
  • Not Synced
    You might imagine that government
    officials are not very happy
  • Not Synced
    and in fact, that's what's happening.
  • Not Synced
    Government officials are extremely mad
    and they're not mad because these
  • Not Synced
    encryptions tools are now available.
  • Not Synced
    What upsets them the most, is that
    the tech companies built encryption
  • Not Synced
    features into their products
    and turned them on by default.
  • Not Synced
    It's the default piece that matters.
  • Not Synced
    In short, the tech companies have
    democratized encryption.
  • Not Synced
    And so, government officials like British
    Prime Minister David Cameron,
  • Not Synced
    they believe that all communications
    -- emails, texts, voice calls.
  • Not Synced
    All of these should be available
    to governments and encryption
  • Not Synced
    is making that difficult.
  • Not Synced
    Now look, I'm extremely sympathetic
    to their point of view.
  • Not Synced
    We live in a dangerous time,
    in a dangerous world
  • Not Synced
    and there really are
    bad people out there.
  • Not Synced
    There are terrorists and other serious
    national security threats that I suspect
  • Not Synced
    we all want to the FBI
    and the NSA to monitor.
  • Not Synced
    But those surveillance
    features come at a cost.
  • Not Synced
    The reason for that, is that there is no
    such thing as a terrorist laptop,
  • Not Synced
    or a drug dealer's cell phone.
  • Not Synced
    We all use the same
    communications devices.
  • Not Synced
    What that means, is that if the drug
    dealer's telephone calls
  • Not Synced
    or the terrorist telephone calls
    can be intercepted,
  • Not Synced
    then so can the rest of ours too.
  • Not Synced
    And I think we really need to ask, should
    a billion people around the world be
  • Not Synced
    using devices that are wire-tap friendly?
  • Not Synced
    The scenario of hacking of surveillance
    systems that I described is not imaginary.
  • Not Synced
    In 2009, the surveillance systems
    that Google and Microsoft built
  • Not Synced
    into the networks.
  • Not Synced
    The systems that they used to respond
    to lawful surveillance requests
  • Not Synced
    from the police.
  • Not Synced
    Those systems were compromised
    by the Chinese government
  • Not Synced
    because the Chinese government
    wanted to figure out which of their own
  • Not Synced
    agents the US government
    was monitoring.
  • Not Synced
    By the same token, in 2004
    the surveillance system built
  • Not Synced
    into the network of Vodafone Greece
    -- Greece's largest telephone company
  • Not Synced
    was compromised by unknown entity
    and that feature, the surveillance feature
  • Not Synced
    was used to wire-tap the Greek
    Prime Minister and members
  • Not Synced
    of the Greek cabinet.
  • Not Synced
    The foreign government or hackers
    who did that were never caught.
  • Not Synced
    And really, this gets to the very problem
    with these surveillance features
  • Not Synced
    or back doors.
  • Not Synced
    When you build a back door into
Title:
How to avoid surveillance ... with the phone in your pocket
Speaker:
Christopher Soghoian
Description:

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
06:16

English subtitles

Revisions Compare revisions