-
Not Synced
For more than a hundred years,
the telephone companies have provided
-
Not Synced
wire-tapping assistance to the government.
-
Not Synced
For much of this time,
the assistance was manual.
-
Not Synced
Surveillance took place manually
and wires were connected by hand.
-
Not Synced
Calls were recorded to tape.
-
Not Synced
But as in so many other industries,
computing has changed everything.
-
Not Synced
The telephone companies
built surveillance features
-
Not Synced
into the very core of their networks.
-
Not Synced
I want that to sink in for a second.
-
Not Synced
Our telephones and the networks
that carry our calls
-
Not Synced
were wired for surveillance first,
first and foremost.
-
Not Synced
So, what that means is when you're talking
to your spouse, your children, a colleague
-
Not Synced
or your doctor on the telephone,
someone could be listening.
-
Not Synced
Now that someone might be your own government.
-
Not Synced
It could also be another government,
a foreign intelligence service.
-
Not Synced
Or a hacker, or a criminal, or a stalker,
or any other party that breaks
-
Not Synced
into the surveillance system that hacks
in to the surveillance system
-
Not Synced
of the telephone companies.
-
Not Synced
But, while the telephone companies have
built surveillance as a priority,
-
Not Synced
Silicon Valley companies have not.
-
Not Synced
And increasingly over the last couple
years, Silicon Valley companies have built
-
Not Synced
strong encryption technology into their
communications products that makes
-
Not Synced
surveillance extremely difficult.
-
Not Synced
For example, many of you might have
an iPhone and if you use an iPhone
-
Not Synced
to send a text message to other people
that have an iPhone, those text messages
-
Not Synced
cannot easily be wire-tapped.
-
Not Synced
And in fact, according to Apple
they're not able to even see
-
Not Synced
the text messages themselves.
-
Not Synced
Likewise, if you use FaceTime to make
an audio call or a video call with one
-
Not Synced
of your friends or loved ones, that too
cannot be easily wire-tapped.
-
Not Synced
And it's not just Apple.
-
Not Synced
What'sApp, which is now owned by Facebook
and used by hundreds of millions of people
-
Not Synced
around the world, also has built strong
encryption technology into its product.
-
Not Synced
Which means that people in the global
south can easily communicate without
-
Not Synced
their governments, often authoritarian
wire-tapping their text messages.
-
Not Synced
So, after 100 years of being able
to listen to any telephone call,
-
Not Synced
anytime, anywhere.
-
Not Synced
You might imagine that government
officials are not very happy
-
Not Synced
and in fact, that's what's happening.
-
Not Synced
Government officials are extremely mad
and they're not mad because these
-
Not Synced
encryptions tools are now available.
-
Not Synced
What upsets them the most, is that
the tech companies built encryption
-
Not Synced
features into their products
and turned them on by default.
-
Not Synced
It's the default piece that matters.
-
Not Synced
In short, the tech companies have
democratized encryption.
-
Not Synced
And so, government officials like British
Prime Minister David Cameron,
-
Not Synced
they believe that all communications
-- emails, texts, voice calls.
-
Not Synced
All of these should be available
to governments and encryption
-
Not Synced
is making that difficult.
-
Not Synced
Now look, I'm extremely sympathetic
to their point of view.
-
Not Synced
We live in a dangerous time,
in a dangerous world
-
Not Synced
and there really are
bad people out there.
-
Not Synced
There are terrorists and other serious
national security threats that I suspect
-
Not Synced
we all want to the FBI
and the NSA to monitor.
-
Not Synced
But those surveillance
features come at a cost.
-
Not Synced
The reason for that, is that there is no
such thing as a terrorist laptop,
-
Not Synced
or a drug dealer's cell phone.
-
Not Synced
We all use the same
communications devices.
-
Not Synced
What that means, is that if the drug
dealer's telephone calls
-
Not Synced
or the terrorist telephone calls
can be intercepted,
-
Not Synced
then so can the rest of ours too.
-
Not Synced
And I think we really need to ask, should
a billion people around the world be
-
Not Synced
using devices that are wire-tap friendly?
-
Not Synced
The scenario of hacking of surveillance
systems that I described is not imaginary.
-
Not Synced
In 2009, the surveillance systems
that Google and Microsoft built
-
Not Synced
into the networks.
-
Not Synced
The systems that they used to respond
to lawful surveillance requests
-
Not Synced
from the police.
-
Not Synced
Those systems were compromised
by the Chinese government
-
Not Synced
because the Chinese government
wanted to figure out which of their own
-
Not Synced
agents the US government
was monitoring.
-
Not Synced
By the same token, in 2004
the surveillance system built
-
Not Synced
into the network of Vodafone Greece
-- Greece's largest telephone company
-
Not Synced
was compromised by unknown entity
and that feature, the surveillance feature
-
Not Synced
was used to wire-tap the Greek
Prime Minister and members
-
Not Synced
of the Greek cabinet.
-
Not Synced
The foreign government or hackers
who did that were never caught.
-
Not Synced
And really, this gets to the very problem
with these surveillance features
-
Not Synced
or back doors.
-
Not Synced
When you build a back door into