How to avoid surveillance ... with the phone in your pocket
-
0:01 - 0:03For more than 100 years,
-
0:03 - 0:07the telephone companies have provided
wiretapping assistance to governments. -
0:07 - 0:11For much of this time,
this assistance was manual. -
0:11 - 0:15Surveillance took place manually
and wires were connected by hand. -
0:15 - 0:17Calls were recorded to tape.
-
0:17 - 0:19But as in so many other industries,
-
0:20 - 0:21computing has changed everything.
-
0:22 - 0:25The telephone companies
built surveillance features -
0:25 - 0:27into the very core of their networks.
-
0:27 - 0:29I want that to sink in for a second:
-
0:29 - 0:34Our telephones and the networks
that carry our calls -
0:34 - 0:36were wired for surveillance first.
-
0:36 - 0:38First and foremost.
-
0:39 - 0:43So what that means is that
when you're talking to your spouse, -
0:43 - 0:47your children, a colleague
or your doctor on the telephone, -
0:47 - 0:48someone could be listening.
-
0:49 - 0:51Now, that someone might
be your own government; -
0:51 - 0:56it could also be another government,
a foreign intelligence service, -
0:56 - 0:59or a hacker, or a criminal, or a stalker
-
0:59 - 1:02or any other party that breaks into
the surveillance system, -
1:02 - 1:07that hacks into the surveillance system
of the telephone companies. -
1:08 - 1:12But while the telephone companies
have built surveillance as a priority, -
1:12 - 1:14Silicon Valley companies have not.
-
1:15 - 1:17And increasingly,
over the last couple years, -
1:17 - 1:21Silicon Valley companies have built
strong encryption technology -
1:21 - 1:23into their communications products
-
1:23 - 1:25that makes surveillance
extremely difficult. -
1:25 - 1:28For example, many of you
might have an iPhone, -
1:28 - 1:30and if you use an iPhone
to send a text message -
1:30 - 1:33to other people who have an iPhone,
-
1:33 - 1:36those text messages
cannot easily be wiretapped. -
1:36 - 1:37And in fact, according to Apple,
-
1:37 - 1:40they're not able to even see
the text messages themselves. -
1:41 - 1:45Likewise, if you use FaceTime
to make an audio call -
1:45 - 1:47or a video call with one of your
friends or loved ones, -
1:47 - 1:49that, too, cannot be easily wiretapped.
-
1:49 - 1:51And it's not just Apple.
-
1:51 - 1:54WhatsApp, which is now owned by Facebook
-
1:54 - 1:57and used by hundreds of millions
of people around the world, -
1:57 - 2:00also has built strong
encryption technology into its product, -
2:00 - 2:04which means that people
in the Global South can easily communicate -
2:04 - 2:06without their governments,
often authoritarian, -
2:06 - 2:08wiretapping their text messages.
-
2:10 - 2:15So, after 100 years of being able
to listen to any telephone call -- -
2:15 - 2:17anytime, anywhere --
-
2:17 - 2:20you might imagine that government
officials are not very happy. -
2:20 - 2:22And in fact, that's what's happening.
-
2:22 - 2:24Government officials are extremely mad.
-
2:24 - 2:28And they're not mad because
these encryption tools are now available. -
2:28 - 2:30What upsets them the most
-
2:30 - 2:34is that the tech companies have built
encryption features into their products -
2:34 - 2:36and turned them on by default.
-
2:37 - 2:39It's the default piece that matters.
-
2:39 - 2:42In short, the tech companies
have democratized encryption. -
2:43 - 2:47And so, government officials
like British Prime Minister David Cameron, -
2:47 - 2:52they believe that all communications --
emails, texts, voice calls -- -
2:52 - 2:54all of these should be
available to governments, -
2:54 - 2:57and encryption is making that difficult.
-
2:57 - 3:01Now, look -- I'm extremely sympathetic
to their point of view. -
3:01 - 3:03We live in a dangerous time
in a dangerous world, -
3:03 - 3:05and there really are bad people out there.
-
3:05 - 3:09There are terrorists and other
serious national security threats -
3:09 - 3:13that I suspect we all want
the FBI and the NSA to monitor. -
3:13 - 3:16But those surveillance
features come at a cost. -
3:17 - 3:19The reason for that is
-
3:19 - 3:21that there is no such thing
as a terrorist laptop, -
3:21 - 3:23or a drug dealer's cell phone.
-
3:23 - 3:26We all use the same
communications devices. -
3:27 - 3:30What that means is that
if the drug dealers' telephone calls -
3:30 - 3:33or the terrorists' telephone calls
can be intercepted, -
3:33 - 3:35then so can the rest of ours, too.
-
3:35 - 3:36And I think we really need to ask:
-
3:37 - 3:40Should a billion people
around the world be using devices -
3:40 - 3:41that are wiretap friendly?
-
3:43 - 3:47So the scenario of hacking of surveillance
systems that I've described -- -
3:47 - 3:49this is not imaginary.
-
3:50 - 3:51In 2009,
-
3:51 - 3:55the surveillance systems that Google
and Microsoft built into their networks -- -
3:55 - 3:58the systems that they use to respond
to lawful surveillance requests -
3:58 - 4:00from the police --
-
4:00 - 4:02those systems were compromised
by the Chinese government, -
4:02 - 4:05because the Chinese government
wanted to figure out -
4:05 - 4:08which of their own agents
the US government was monitoring. -
4:08 - 4:10By the same token,
-
4:10 - 4:13in 2004, the surveillance system
built into the network -
4:13 - 4:16of Vodafone Greece --
Greece's largest telephone company -- -
4:16 - 4:19was compromised by an unknown entity,
-
4:19 - 4:21and that feature,
the surveillance feature, -
4:21 - 4:23was used to wiretap
the Greek Prime Minister -
4:23 - 4:25and members of the Greek cabinet.
-
4:25 - 4:28The foreign government or hackers
who did that were never caught. -
4:30 - 4:34And really, this gets to the very problem
with these surveillance features, -
4:34 - 4:35or backdoors.
-
4:35 - 4:38When you build a backdoor
into a communications network -
4:38 - 4:39or piece of technology,
-
4:40 - 4:43you have no way of controlling
who's going to go through it. -
4:43 - 4:45You have no way of controlling
-
4:45 - 4:47whether it'll be used by your side
or the other side, -
4:48 - 4:49by good guys, or by bad guys.
-
4:50 - 4:52And so for that reason,
I think that it's better -
4:53 - 4:55to build networks
to be as secure as possible. -
4:56 - 4:59Yes, this means that in the future,
-
4:59 - 5:01encryption is going to make
wiretapping more difficult. -
5:01 - 5:04It means that the police
are going to have a tougher time -
5:04 - 5:05catching bad guys.
-
5:05 - 5:08But the alternative would mean
to live in a world -
5:08 - 5:12where anyone's calls or anyone's
text messages could be surveilled -
5:12 - 5:15by criminals, by stalkers
and by foreign intelligence agencies. -
5:15 - 5:18And I don't want to live
in that kind of world. -
5:18 - 5:21And so right now,
you probably have the tools -
5:21 - 5:23to thwart many kinds
of government surveillance -
5:23 - 5:26already on your phones
and already in your pockets, -
5:26 - 5:30you just might not realize how strong
and how secure those tools are, -
5:30 - 5:34or how weak the other ways
you've used to communicate really are. -
5:35 - 5:37And so, my message to you is this:
-
5:38 - 5:40We need to use these tools.
-
5:40 - 5:43We need to secure our telephone calls.
-
5:43 - 5:44We need to secure our text messages.
-
5:45 - 5:47I want you to use these tools.
-
5:47 - 5:50I want you to tell your loved ones,
I want you to tell your colleagues: -
5:50 - 5:52Use these encrypted communications tools.
-
5:52 - 5:55Don't just use them
because they're cheap and easy, -
5:55 - 5:57but use them because they're secure.
-
5:57 - 5:58Thank you.
-
5:58 - 6:02(Applause)
- Title:
- How to avoid surveillance ... with the phone in your pocket
- Speaker:
- Christopher Soghoian
- Description:
-
Who is listening in on your phone calls? On a landline, it could be anyone, says privacy activist Christopher Soghoian, because surveillance backdoors are built into the phone system by default, to allow governments to listen in. But then again, so could a foreign intelligence service ... or a criminal. Which is why, says Soghoian, some tech companies are resisting governments' call to build the same backdoors into mobile phones and new messaging systems. Learn how some tech companies are working to keep your calls and messages private.
- Video Language:
- English
- Team:
closed TED
- Project:
- TEDTalks
- Duration:
- 06:16
![]() |
Brian Greene edited English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Brian Greene edited English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Cynthia Betubiza edited English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Brian Greene edited English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Cynthia Betubiza approved English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Cynthia Betubiza edited English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Cynthia Betubiza edited English subtitles for A brief history of phone wiretapping — and how to avoid it | |
![]() |
Cynthia Betubiza edited English subtitles for A brief history of phone wiretapping — and how to avoid it |