Problem connecting to Twitter. Please try again.
Problem connecting to Twitter. Please try again.
Problem connecting to Twitter. Please try again.
Problem connecting to Twitter. Please try again.

Return to Video

Inside the massive (and unregulated) world of surveillance tech

  • 0:01 - 0:02
    A few years ago,
  • 0:02 - 0:04
    an American defense consultant I know
  • 0:04 - 0:07
    told me about a trip
    he took to Uzbekistan.
  • 0:07 - 0:09
    His role there was to help sell technology
  • 0:09 - 0:13
    that the Uzbek government could use
    to spy on its own citizens.
  • 0:13 - 0:16
    He eventually shared with me
    the marketing material
  • 0:16 - 0:18
    he'd presented to the Uzbek government.
  • 0:18 - 0:23
    One glossy brochure featured technology
    that could not just intercept phone calls,
  • 0:23 - 0:25
    but identify the caller,
  • 0:25 - 0:27
    regardless of what phone number
    they were using,
  • 0:27 - 0:29
    based on their unique voiceprint,
  • 0:29 - 0:33
    and then identify their exact
    geographic location.
  • 0:33 - 0:36
    This is a guy who had been involved
    with the arms trade for years.
  • 0:36 - 0:40
    He wasn't some Hollywood-type gunrunner
    doing backroom deals.
  • 0:40 - 0:43
    He was just a guy that worked
    with legitimate Western companies
  • 0:43 - 0:45
    to help sell their weapons abroad.
  • 0:45 - 0:47
    But he wasn't bothered
    by marketing this sort of technology.
  • 0:48 - 0:50
    For him, it was just the next step
    in the arms trade.
  • 0:50 - 0:53
    And it was even easier than, say,
    selling weapons to Iraq,
  • 0:53 - 0:55
    because it didn't require
    an export license
  • 0:56 - 0:57
    from the US State Department,
  • 0:57 - 0:59
    the way most arms sales would.
  • 0:59 - 1:01
    It turns out that these
    tools of surveillance
  • 1:01 - 1:03
    are almost completely unregulated,
  • 1:03 - 1:06
    because as of today,
    they're not defined as weapons.
  • 1:06 - 1:09
    But they should be, and we need
    to regulate them that way.
  • 1:10 - 1:12
    I'm a journalist
    who has spent the last two decades
  • 1:12 - 1:14
    looking at how the military
    and intelligence world
  • 1:15 - 1:17
    spurs the development
    of new science and technology.
  • 1:17 - 1:19
    I've tracked the emergence of new weapons
  • 1:19 - 1:20
    and looked to see what happens
  • 1:21 - 1:23
    when companies start to market
    these weapons abroad.
  • 1:23 - 1:26
    But what is a weapon
    in the information age?
  • 1:26 - 1:28
    We know that armed drones are weapons,
  • 1:28 - 1:30
    missiles and bombs are weapons,
  • 1:30 - 1:32
    but the State Department
    actually classifies
  • 1:32 - 1:35
    broad categories
    of technologies as weapons.
  • 1:35 - 1:39
    So for example, a scientist going abroad
    on an oceanographic research vessel,
  • 1:39 - 1:41
    they want to take
    the latest night-vision goggles?
  • 1:41 - 1:45
    That, according to the State Department,
    is potentially a weapon.
  • 1:45 - 1:46
    Why?
  • 1:46 - 1:49
    Well, because though night-vision goggles
    are used today by scientists
  • 1:49 - 1:51
    and hunters around the world,
  • 1:51 - 1:53
    it was a capability
    first developed for the military.
  • 1:53 - 1:55
    And yet, tools of surveillance
  • 1:55 - 1:58
    that an authoritarian regime could use
    to spy on its own citizens,
  • 1:58 - 2:00
    on dissidents, on journalists,
  • 2:00 - 2:03
    that, according to the US government
    today, is not a weapon.
  • 2:04 - 2:05
    And yet, these tools of surveillance
  • 2:05 - 2:09
    are part of a growing secretive
    multi-billion-dollar industry.
  • 2:10 - 2:13
    The genesis of this spy bazaar
    goes back some 18 years,
  • 2:13 - 2:15
    to a Hilton hotel in northern Virginia,
  • 2:15 - 2:18
    just a few miles away
    from the US Central Intelligence Agency.
  • 2:19 - 2:21
    A few dozen people,
    mostly dark-suited men,
  • 2:21 - 2:23
    gathered there in the spring of 2002
  • 2:23 - 2:26
    for a conference with
    the unassuming name of ISS World.
  • 2:27 - 2:30
    You know, at first glance, this conference
    probably looked like dozens of events
  • 2:30 - 2:33
    that used to take place
    around the Washington, DC area.
  • 2:33 - 2:35
    But this event was unique.
  • 2:35 - 2:38
    ISS stands for Intelligence
    Support Systems,
  • 2:38 - 2:39
    and the people who were there
  • 2:39 - 2:42
    were from companies
    that built technologies to spy
  • 2:42 - 2:44
    on private communications.
  • 2:44 - 2:47
    In other words, these were
    sort of wire-tappers for hire.
  • 2:47 - 2:50
    And the reason they were there
    was that less than a year earlier,
  • 2:50 - 2:52
    the 9/11 terrorist attacks
    on New York and Washington
  • 2:52 - 2:55
    had spurred the Congress
    to press through legislation
  • 2:55 - 2:57
    known as the Patriot Act.
  • 2:57 - 3:00
    This gave the government
    broad new authorities
  • 3:00 - 3:02
    to monitor communications.
  • 3:02 - 3:04
    Emails, internet activity, phone calls,
  • 3:04 - 3:06
    even financial transactions.
  • 3:06 - 3:09
    This created an instant demand for data.
  • 3:09 - 3:12
    And in the true American
    entrepreneurial spirit,
  • 3:12 - 3:15
    an industry rose up
    to help collect this data.
  • 3:15 - 3:16
    But back in 2002,
  • 3:16 - 3:18
    this was still a pretty modest affair.
  • 3:18 - 3:21
    Only about 10 percent
    of the world's population
  • 3:21 - 3:22
    was even online using the internet.
  • 3:22 - 3:27
    So most of what was being collected
    were simple emails and phone calls
  • 3:27 - 3:29
    over landlines and cell phones.
  • 3:29 - 3:30
    But over the next few years,
  • 3:30 - 3:33
    the way that we communicate
    began to change rapidly.
  • 3:33 - 3:36
    There was the introduction
    of Skype, Facebook
  • 3:36 - 3:38
    and then, crucially, the iPhone,
  • 3:38 - 3:39
    and within a few years,
  • 3:39 - 3:43
    billions of us were walking around
    with little computers in our pockets
  • 3:43 - 3:45
    that do everything
    from monitor our exercise habits
  • 3:45 - 3:48
    to help us find romantic partners.
  • 3:48 - 3:51
    And suddenly, you didn't necessarily need
    the advanced capability
  • 3:51 - 3:54
    of the National Security Agency
    or big telecoms
  • 3:54 - 3:56
    to monitor everyone's communication.
  • 3:56 - 3:57
    In some cases,
  • 3:57 - 4:01
    all you needed was access
    to that device in their pockets.
  • 4:01 - 4:04
    And that gave birth to an entirely
    new type of industry.
  • 4:04 - 4:07
    You know, not many companies
    can build missiles or aircraft,
  • 4:07 - 4:11
    but it doesn't take a lot of capital
    to create software
  • 4:11 - 4:13
    that can hack into someone's smartphone.
  • 4:13 - 4:15
    Computer hackers
    have been around for years,
  • 4:15 - 4:18
    but now their skills could be used
    to build technologies
  • 4:18 - 4:20
    that were in high demand
    by law enforcement
  • 4:20 - 4:22
    and intelligence agencies.
  • 4:22 - 4:25
    And soon, dozens
    and even hundreds of companies
  • 4:25 - 4:28
    were getting into this
    wire-tappers' market.
  • 4:28 - 4:30
    And that little conference in Virginia,
  • 4:30 - 4:34
    it grew and soon became known
    as the Wiretappers' Ball.
  • 4:34 - 4:37
    Well, not much was known
    about the Wiretappers' Ball
  • 4:37 - 4:38
    in those early years,
  • 4:38 - 4:40
    because the conferences
    were closed to everyone
  • 4:40 - 4:43
    except the companies
    and their government customers.
  • 4:43 - 4:45
    But journalists did begin to see
    and hear reports
  • 4:45 - 4:48
    of companies getting
    into this private spy market.
  • 4:48 - 4:51
    Spooky entrepreneurs
    going around the world,
  • 4:51 - 4:52
    doing deals,
  • 4:52 - 4:54
    often with authoritarian regimes.
  • 4:54 - 4:58
    And it was, from the start,
    a really loosely regulated market.
  • 4:58 - 5:02
    Some countries do require permission
    to sell these technologies abroad,
  • 5:02 - 5:06
    but rarely with the type of scrutiny
    that is given to traditional arms.
  • 5:07 - 5:10
    So for example, the Italian-based
    company Hacking Team
  • 5:10 - 5:13
    reportedly sold its technology
    to authoritarian regimes
  • 5:13 - 5:15
    in Egypt and Kazakhstan.
  • 5:15 - 5:19
    The Israeli-based company NSO Group
    has reportedly sold its technology
  • 5:19 - 5:21
    to the regime in Saudi Arabia,
  • 5:21 - 5:22
    which has been accused of harassing,
  • 5:23 - 5:26
    and even, in one case,
    killing one of its political opponents.
  • 5:26 - 5:30
    And we do think of weapons
    as things that kill people.
  • 5:30 - 5:31
    But in the information age,
  • 5:31 - 5:35
    some of the most powerful weapons
    are things that can track and identify us.
  • 5:36 - 5:39
    This is something that the Pentagon
    and CIA have recognized for years,
  • 5:39 - 5:41
    and they've tried to build technologies
  • 5:41 - 5:45
    that can track people,
    suspected terrorists, around the globe.
  • 5:45 - 5:48
    The Pentagon has invested
    in something called smart dust,
  • 5:48 - 5:51
    little microsensors
    the size of specs of dust
  • 5:51 - 5:54
    that you could scatter on people
    without them knowing it,
  • 5:54 - 5:56
    and then use it to track their location.
  • 5:56 - 5:58
    The Pentagon, through
    its venture capital firm,
  • 5:58 - 6:03
    has invested in a beauty products company
    once featured in "Oprah Magazine"
  • 6:03 - 6:06
    to build a device that could
    surreptitiously collect DNA
  • 6:06 - 6:08
    just by swiping across the skin.
  • 6:09 - 6:11
    But something remarkable has happened
    over the past decade.
  • 6:11 - 6:14
    In many cases, what the private
    marketplace has been able to do
  • 6:14 - 6:19
    has far outstripped what the Pentagon
    or CIA even thought was possible.
  • 6:19 - 6:20
    Back in 2008,
  • 6:20 - 6:24
    the Pentagon had a secretive database
    of DNA from terrorists.
  • 6:24 - 6:26
    It had about 80,000 samples.
  • 6:27 - 6:29
    Well, the private company AncestryDNA
  • 6:29 - 6:33
    today has samples
    from over 15 million people.
  • 6:33 - 6:36
    23andMe, the second-largest
    genealogical database,
  • 6:36 - 6:39
    has samples from over 10 million people.
  • 6:39 - 6:42
    So now, maybe you don't need
    these James Bond-worthy techniques
  • 6:42 - 6:44
    of collecting DNA
  • 6:44 - 6:47
    if we're willingly handing it over
    to private companies
  • 6:47 - 6:49
    and even paying for the honor of doing it.
  • 6:50 - 6:53
    Well, what could you do
    with a sample of someone's DNA?
  • 6:53 - 6:55
    In the United States and China,
  • 6:55 - 6:57
    researchers are working
    on using DNA samples
  • 6:57 - 7:00
    to build images of people's faces.
  • 7:00 - 7:04
    So if you pair DNA
    with facial recognition technology,
  • 7:04 - 7:07
    you have the basis of a really
    powerful surveillance system
  • 7:07 - 7:10
    that could be used to track individuals
    or entire ethnic groups.
  • 7:10 - 7:13
    And if you think that sounds
    a little bit paranoid,
  • 7:13 - 7:16
    keep in mind that the Pentagon
    last year sent out a memo
  • 7:16 - 7:18
    to all of its service members,
  • 7:18 - 7:21
    warning them precisely not to use
    those commercial DNA kits
  • 7:21 - 7:24
    over concerns that information
    could be used to track them
  • 7:24 - 7:26
    or their family members.
  • 7:26 - 7:30
    And yet, even with the Pentagon
    raising concerns about this technology,
  • 7:30 - 7:33
    almost nothing has been done
    to reign in this market.
  • 7:33 - 7:35
    One American company, Clearview AI,
  • 7:35 - 7:38
    has been collecting billions
    of images of people's faces
  • 7:38 - 7:39
    from across the internet,
  • 7:39 - 7:43
    like those pictures you post on Instagram
    of you and your friends and family,
  • 7:43 - 7:46
    and then selling its facial
    recognition services
  • 7:46 - 7:49
    to US government
    and law-enforcement agencies.
  • 7:49 - 7:50
    And even if you think
  • 7:50 - 7:53
    that's a perfectly acceptable
    application of this technology,
  • 7:53 - 7:56
    there's nothing to stop them
    from selling to private individuals,
  • 7:56 - 7:59
    corporations or even foreign governments.
  • 7:59 - 8:02
    And that's exactly
    what some companies are doing.
  • 8:02 - 8:05
    That Wiretappers' Ball
    that started in northern Virginia?
  • 8:05 - 8:09
    Today, it's held in multiple cities
    around the globe.
  • 8:09 - 8:13
    Thousands of people now attend
    the ISS trainings and conferences.
  • 8:13 - 8:17
    And more of the companies showing up
    are coming from the Middle East and China.
  • 8:17 - 8:19
    The spy bazaar has gone global.
  • 8:20 - 8:21
    And at arms shows now around the world,
  • 8:21 - 8:25
    you'll see companies displaying
    facial recognition technology
  • 8:25 - 8:26
    and phone hacking software,
  • 8:26 - 8:29
    displaying right next
    to traditional arms manufacturers
  • 8:29 - 8:31
    with tanks and missiles.
  • 8:31 - 8:33
    And walking around these arms shows,
  • 8:33 - 8:36
    it's pretty easy to go down
    dystopian rabbit holes,
  • 8:36 - 8:38
    thinking about future
    surveillance technology
  • 8:38 - 8:40
    that will track our every move.
  • 8:40 - 8:42
    And I remember one
    Pentagon adviser telling me
  • 8:42 - 8:45
    that what the military really needed
    were space-based satellites
  • 8:45 - 8:49
    that could track people anywhere on earth
    based just on their DNA.
  • 8:49 - 8:52
    It's enough to make you invest
    in tinfoil hats.
  • 8:52 - 8:53
    But the truth is,
  • 8:53 - 8:56
    we don't know what sort
    of technology the future will bring.
  • 8:56 - 8:59
    But we know that today,
    in the absence of regulation,
  • 8:59 - 9:01
    this marketplace is already exploding.
  • 9:01 - 9:05
    And in fact, one of those companies
    accused of selling surveillance technology
  • 9:05 - 9:07
    to authoritarian regimes,
  • 9:07 - 9:11
    today, it's offering to help track
    those infected with COVID-19.
  • 9:11 - 9:14
    And of course, technology does offer
    the tantalizing promise
  • 9:14 - 9:17
    of helping control a pandemic
    through contact tracing.
  • 9:17 - 9:21
    But it also opens up another door,
    to privatized mass surveillance.
  • 9:22 - 9:25
    So what do we do
    about this private spy bazaar?
  • 9:25 - 9:27
    We can hide, go offline,
  • 9:27 - 9:30
    get off social media,
    ditch our smartphones,
  • 9:30 - 9:31
    go live in a cave,
  • 9:31 - 9:34
    but the truth is, we're not trained
    to be professional spies,
  • 9:34 - 9:37
    we can't live under false identities
    or with no identities.
  • 9:38 - 9:42
    And even real spies are having a hard time
    staying below the radar, these days.
  • 9:42 - 9:44
    It doesn't matter how many
    passports Jason Bourne has
  • 9:44 - 9:47
    if his face or DNA
    is in someone's database.
  • 9:48 - 9:51
    But if even governments have lost control
    of the tools of spying,
  • 9:51 - 9:53
    is there anything we can do about it?
  • 9:53 - 9:54
    One argument I've heard
  • 9:54 - 9:56
    is that even if the US
    were to restrict companies
  • 9:56 - 9:59
    from selling this sort
    of technology abroad,
  • 9:59 - 10:01
    companies based in China
    might simply step in.
  • 10:01 - 10:04
    But we regulate the arms trade today,
  • 10:04 - 10:06
    even if we do it imperfectly.
  • 10:06 - 10:09
    And in fact, there was a multilateral
    proposal several years ago
  • 10:10 - 10:11
    to do just that,
  • 10:11 - 10:14
    to require export licenses
    for surveillance software.
  • 10:14 - 10:16
    The United States
    was among those countries
  • 10:16 - 10:19
    that agreed to these
    voluntary regulations,
  • 10:19 - 10:22
    but back in Washington,
    this proposal has simply languished.
  • 10:22 - 10:25
    We have an administration
    that would rather sell more weapons abroad
  • 10:25 - 10:26
    with fewer restrictions,
  • 10:26 - 10:28
    including to some of those countries
  • 10:28 - 10:30
    accused of abusing
    surveillance technology.
  • 10:31 - 10:34
    I think to move forward,
    we would need to revive that proposal,
  • 10:34 - 10:36
    but even go one step further.
  • 10:36 - 10:39
    We need to fundamentally change
    how we think of surveillance technology
  • 10:39 - 10:42
    and define these tools as weapons.
  • 10:42 - 10:43
    This would allow government
  • 10:43 - 10:46
    to regulate and control
    their sale and export
  • 10:46 - 10:49
    the way that they control
    traditional arms,
  • 10:49 - 10:51
    advanced aircraft and missiles.
  • 10:51 - 10:55
    But that means recognizing
    that technology that tracks who we are,
  • 10:55 - 10:57
    what we do, what we say,
  • 10:57 - 10:59
    and even in some cases, what we think,
  • 10:59 - 11:01
    is a form of advanced weaponry.
  • 11:01 - 11:03
    And these weapons
    are growing too powerful,
  • 11:03 - 11:05
    available to the highest bidder,
  • 11:05 - 11:07
    and according to the whims
    of the spy bazaar.
  • 11:08 - 11:09
    Thank you.
Title:
Inside the massive (and unregulated) world of surveillance tech
Speaker:
Sharon Weinberger
Description:

What is a weapon in the Information Age? From microscopic "smart dust" tracking devices to DNA-tracing tech and advanced facial recognition software, journalist Sharon Weinberger leads a hair-raising tour through the global, unregulated bazaar of privatized mass surveillance. To rein in this growing, multibillion-dollar marketplace that often caters to customers with nefarious intents, Weinberger believes the first step is for governments to classify surveillance tools as dangerous and powerful weapons.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
11:23

English subtitles

Revisions Compare revisions