Return to Video

A vision of crimes in the future

  • 0:00 - 0:03
    I study the future
  • 0:03 - 0:07
    of crime and terrorism,
  • 0:07 - 0:10
    and frankly, I'm afraid.
  • 0:10 - 0:12
    I'm afraid by what I see.
  • 0:12 - 0:14
    I sincerely want to believe
  • 0:14 - 0:17
    that technology can bring us
  • 0:17 - 0:20
    the techno-utopia that we've been promised,
  • 0:20 - 0:21
    but, you see,
  • 0:21 - 0:25
    I've spent a career in law enforcement,
  • 0:25 - 0:27
    and that's informed my perspective on things.
  • 0:27 - 0:29
    I've been a street police officer,
  • 0:29 - 0:31
    an undercover investigator,
  • 0:31 - 0:33
    a counter-terrorism strategist,
  • 0:33 - 0:35
    and I've worked in more than 70 countries
  • 0:35 - 0:37
    around the world.
  • 0:37 - 0:38
    I've had to see more than my fair share
  • 0:38 - 0:42
    of violence and the darker underbelly of society,
  • 0:42 - 0:46
    and that's informed my opinions.
  • 0:46 - 0:48
    My work with criminals and terrorists
  • 0:48 - 0:50
    has actually been highly educational.
  • 0:50 - 0:53
    They have taught me a lot, and I'd like to be able
  • 0:53 - 0:56
    to share some of these observations with you.
  • 0:56 - 0:59
    Today I'm going to show you the flip side
  • 0:59 - 1:03
    of all those technologies that we marvel at,
  • 1:03 - 1:05
    the ones that we love.
  • 1:05 - 1:06
    In the hands of the TED community,
  • 1:06 - 1:09
    these are awesome tools which will bring about
  • 1:09 - 1:13
    great change for our world,
  • 1:13 - 1:16
    but in the hands of suicide bombers,
  • 1:16 - 1:19
    the future can look quite different.
  • 1:19 - 1:21
    I started observing
  • 1:21 - 1:23
    technology and how criminals were using it
  • 1:23 - 1:25
    as a young patrol officer.
  • 1:25 - 1:29
    In those days, this was the height of technology.
  • 1:29 - 1:31
    Laugh though you will,
  • 1:31 - 1:32
    all the drug dealers and gang members
  • 1:32 - 1:35
    with whom I dealt had one of these
  • 1:35 - 1:39
    long before any police officer I knew did.
  • 1:39 - 1:42
    Twenty years later, criminals are still using
  • 1:42 - 1:46
    mobile phones, but they're also building
  • 1:46 - 1:48
    their own mobile phone networks,
  • 1:48 - 1:50
    like this one, which has been deployed
  • 1:50 - 1:54
    in all 31 states of Mexico by the narcos.
  • 1:54 - 1:56
    They have a national encrypted
  • 1:56 - 1:59
    radio communications system.
  • 1:59 - 2:01
    Think about that.
  • 2:01 - 2:05
    Think about the innovation that went into that.
  • 2:05 - 2:08
    Think about the infrastructure to build it.
  • 2:08 - 2:09
    And then think about this:
  • 2:09 - 2:13
    Why can't I get a cell phone signal in San Francisco? (Laughter)
  • 2:13 - 2:18
    How is this possible? (Laughter) It makes no sense. (Applause)
  • 2:18 - 2:20
    We consistently underestimate
  • 2:20 - 2:23
    what criminals and terrorists can do.
  • 2:23 - 2:25
    Technology has made our world
  • 2:25 - 2:27
    increasingly open, and for the most part,
  • 2:27 - 2:29
    that's great, but all of this openness
  • 2:29 - 2:31
    may have unintended consequences.
  • 2:31 - 2:36
    Consider the 2008 terrorist attack on Mumbai.
  • 2:36 - 2:39
    The men that carried that attack out were armed
  • 2:39 - 2:42
    with AK-47s, explosives and hand grenades.
  • 2:42 - 2:44
    They threw these hand grenades
  • 2:44 - 2:47
    at innocent people as they sat eating in cafes
  • 2:47 - 2:52
    and waited to catch trains on their way home from work.
  • 2:52 - 2:56
    But heavy artillery is nothing new in terrorist operations.
  • 2:56 - 2:58
    Guns and bombs are nothing new.
  • 2:58 - 2:59
    What was different this time
  • 2:59 - 3:02
    is the way that the terrorists used
  • 3:02 - 3:05
    modern information communications technologies
  • 3:05 - 3:10
    to locate additional victims and slaughter them.
  • 3:10 - 3:12
    They were armed with mobile phones.
  • 3:12 - 3:14
    They had BlackBerries.
  • 3:14 - 3:16
    They had access to satellite imagery.
  • 3:16 - 3:21
    They had satellite phones, and they even had night vision goggles.
  • 3:21 - 3:24
    But perhaps their greatest innovation was this.
  • 3:24 - 3:26
    We've all seen pictures like this
  • 3:26 - 3:29
    on television and in the news. This is an operations center.
  • 3:29 - 3:32
    And the terrorists built their very own op center
  • 3:32 - 3:35
    across the border in Pakistan,
  • 3:35 - 3:37
    where they monitored the BBC,
  • 3:37 - 3:41
    al Jazeera, CNN and Indian local stations.
  • 3:41 - 3:46
    They also monitored the Internet and social media
  • 3:46 - 3:48
    to monitor the progress of their attacks
  • 3:48 - 3:51
    and how many people they had killed.
  • 3:51 - 3:54
    They did all of this in real time.
  • 3:54 - 3:57
    The innovation of the terrorist operations center
  • 3:57 - 4:01
    gave terrorists unparalleled situational awareness
  • 4:01 - 4:03
    and tactical advantage over the police
  • 4:03 - 4:06
    and over the government.
  • 4:06 - 4:07
    What did they do with this?
  • 4:07 - 4:09
    They used it to great effect.
  • 4:09 - 4:11
    At one point during the 60-hour siege,
  • 4:11 - 4:13
    the terrorists were going room to room
  • 4:13 - 4:16
    trying to find additional victims.
  • 4:16 - 4:18
    They came upon a suite on the top floor
  • 4:18 - 4:20
    of the hotel, and they kicked down the door
  • 4:20 - 4:22
    and they found a man hiding by his bed.
  • 4:22 - 4:24
    And they said to him, "Who are you,
  • 4:24 - 4:26
    and what are you doing here?"
  • 4:26 - 4:28
    And the man replied,
  • 4:28 - 4:31
    "I'm just an innocent schoolteacher."
  • 4:31 - 4:33
    Of course, the terrorists knew
  • 4:33 - 4:37
    that no Indian schoolteacher stays at a suite in the Taj.
  • 4:37 - 4:39
    They picked up his identification,
  • 4:39 - 4:42
    and they phoned his name in to the terrorist war room,
  • 4:42 - 4:45
    where the terrorist war room Googled him,
  • 4:45 - 4:48
    and found a picture and called their operatives
  • 4:48 - 4:49
    on the ground and said,
  • 4:49 - 4:54
    "Your hostage, is he heavyset?
  • 4:54 - 4:58
    Is he bald in front? Does he wear glasses?"
  • 4:58 - 5:03
    "Yes, yes, yes," came the answers.
  • 5:03 - 5:05
    The op center had found him and they had a match.
  • 5:05 - 5:06
    He was not a schoolteacher.
  • 5:06 - 5:10
    He was the second-wealthiest businessman in India,
  • 5:10 - 5:12
    and after discovering this information,
  • 5:12 - 5:15
    the terrorist war room gave the order
  • 5:15 - 5:17
    to the terrorists on the ground in Mumbai.
  • 5:17 - 5:20
    ("Kill him.")
  • 5:20 - 5:24
    We all worry about our privacy settings
  • 5:24 - 5:26
    on Facebook,
  • 5:26 - 5:28
    but the fact of the matter is,
  • 5:28 - 5:32
    our openness can be used against us.
  • 5:32 - 5:33
    Terrorists are doing this.
  • 5:33 - 5:37
    A search engine can determine
  • 5:37 - 5:41
    who shall live and who shall die.
  • 5:41 - 5:44
    This is the world that we live in.
  • 5:44 - 5:45
    During the Mumbai siege,
  • 5:45 - 5:48
    terrorists were so dependent on technology
  • 5:48 - 5:50
    that several witnesses reported that
  • 5:50 - 5:53
    as the terrorists were shooting hostages with one hand,
  • 5:53 - 5:56
    they were checking their mobile phone messages
  • 5:56 - 5:58
    in the very other hand.
  • 5:58 - 6:01
    In the end, 300 people were gravely wounded
  • 6:01 - 6:05
    and over 172 men, women and children
  • 6:05 - 6:09
    lost their lives that day.
  • 6:09 - 6:11
    Think about what happened.
  • 6:11 - 6:14
    During this 60-hour siege on Mumbai,
  • 6:14 - 6:19
    10 men armed not just with weapons,
  • 6:19 - 6:21
    but with technology,
  • 6:21 - 6:24
    were able to bring a city of 20 million people
  • 6:24 - 6:26
    to a standstill.
  • 6:26 - 6:28
    Ten people brought 20 million people
  • 6:28 - 6:32
    to a standstill, and this traveled around the world.
  • 6:32 - 6:39
    This is what radicals can do with openness.
  • 6:39 - 6:41
    This was done nearly four years ago.
  • 6:41 - 6:43
    What could terrorists do today
  • 6:43 - 6:46
    with the technologies available that we have?
  • 6:46 - 6:49
    What will they do tomorrow?
  • 6:49 - 6:51
    The ability of one to affect many
  • 6:51 - 6:54
    is scaling exponentially,
  • 6:54 - 6:58
    and it's scaling for good and it's scaling for evil.
  • 6:58 - 7:00
    It's not just about terrorism, though.
  • 7:00 - 7:03
    There's also been a big paradigm shift in crime.
  • 7:03 - 7:07
    You see, you can now commit more crime as well.
  • 7:07 - 7:09
    In the old days, it was a knife and a gun.
  • 7:09 - 7:12
    Then criminals moved to robbing trains.
  • 7:12 - 7:15
    You could rob 200 people on a train, a great innovation.
  • 7:15 - 7:17
    Moving forward, the Internet
  • 7:17 - 7:19
    allowed things to scale even more.
  • 7:19 - 7:21
    In fact, many of you will remember
  • 7:21 - 7:22
    the recent Sony PlayStation hack.
  • 7:22 - 7:29
    In that incident, over 100 million people were robbed.
  • 7:29 - 7:31
    Think about that.
  • 7:31 - 7:32
    When in the history of humanity
  • 7:32 - 7:34
    has it ever been possible for one person
  • 7:34 - 7:40
    to rob 100 million?
  • 7:40 - 7:42
    Of course, it's not just about stealing things.
  • 7:42 - 7:44
    There are other avenues of technology
  • 7:44 - 7:45
    that criminals can exploit.
  • 7:45 - 7:49
    Many of you will remember this super cute video
  • 7:49 - 7:51
    from the last TED,
  • 7:51 - 7:56
    but not all quadcopter swarms are so nice and cute.
  • 7:56 - 7:58
    They don't all have drumsticks.
  • 7:58 - 8:00
    Some can be armed with HD cameras
  • 8:00 - 8:02
    and do countersurveillance on protesters,
  • 8:02 - 8:05
    or, as in this little bit of movie magic,
  • 8:05 - 8:09
    quadcopters can be loaded with firearms
  • 8:09 - 8:13
    and automatic weapons.
  • 8:13 - 8:15
    Little robots are cute when they play music to you.
  • 8:15 - 8:18
    When they swarm and chase you down the block
  • 8:18 - 8:22
    to shoot you, a little bit less so.
  • 8:22 - 8:24
    Of course, criminals and terrorists weren't the first
  • 8:24 - 8:27
    to give guns to robots. We know where that started.
  • 8:27 - 8:28
    But they're adapting quickly.
  • 8:28 - 8:30
    Recently, the FBI arrested
  • 8:30 - 8:32
    an al Qaeda affiliate in the United States,
  • 8:32 - 8:34
    who was planning on using these remote-controlled
  • 8:34 - 8:37
    drone aircraft to fly C4 explosives
  • 8:37 - 8:39
    into government buildings in the United States.
  • 8:39 - 8:45
    By the way, these travel at over 600 miles an hour.
  • 8:45 - 8:47
    Every time a new technology is being introduced,
  • 8:47 - 8:50
    criminals are there to exploit it.
  • 8:50 - 8:51
    We've all seen 3D printers.
  • 8:51 - 8:53
    We know with them that you can print
  • 8:53 - 8:55
    in many materials ranging from plastic
  • 8:55 - 9:00
    to chocolate to metal and even concrete.
  • 9:00 - 9:01
    With great precision
  • 9:01 - 9:03
    I actually was able to make this
  • 9:03 - 9:05
    just the other day, a very cute little ducky.
  • 9:10 - 9:12
    But I wonder to myself,
  • 9:12 - 9:19
    for those people that strap bombs to their chests
  • 9:19 - 9:20
    and blow themselves up,
  • 9:20 - 9:24
    how might they use 3D printers?
  • 9:24 - 9:28
    Perhaps like this.
  • 9:28 - 9:30
    You see, if you can print in metal,
  • 9:30 - 9:33
    you can print one of these,
  • 9:33 - 9:36
    and in fact
  • 9:39 - 9:43
    you can also print one of these too.
  • 9:46 - 9:50
    The UK I know has some very strict firearms laws.
  • 9:50 - 9:52
    You needn't bring the gun into the UK anymore.
  • 9:52 - 9:54
    You just bring the 3D printer
  • 9:54 - 9:57
    and print the gun while you're here,
  • 9:57 - 10:00
    and, of course, the magazines for your bullets.
  • 10:00 - 10:01
    But as these get bigger in the future,
  • 10:01 - 10:03
    what other items will you be able to print?
  • 10:03 - 10:07
    The technologies are allowing bigger printers.
  • 10:07 - 10:08
    As we move forward,
  • 10:08 - 10:11
    we'll see new technologies also, like the Internet of Things.
  • 10:11 - 10:13
    Every day we're connecting more and more of our lives
  • 10:13 - 10:15
    to the Internet, which means
  • 10:15 - 10:20
    that the Internet of Things will soon be
  • 10:20 - 10:21
    the Internet of Things To Be Hacked.
  • 10:21 - 10:23
    All of the physical objects in our space
  • 10:23 - 10:26
    are being transformed into information technologies,
  • 10:26 - 10:30
    and that has a radical implication for our security,
  • 10:30 - 10:33
    because more connections to more devices
  • 10:33 - 10:35
    means more vulnerabilities.
  • 10:35 - 10:37
    Criminals understand this.
  • 10:37 - 10:39
    Terrorists understand this. Hackers understand this.
  • 10:39 - 10:42
    If you control the code, you control the world.
  • 10:42 - 10:47
    This is the future that awaits us.
  • 10:47 - 10:50
    There has not yet been an operating system
  • 10:50 - 10:52
    or a technology that hasn't been hacked.
  • 10:52 - 10:55
    That's troubling, since the human body itself
  • 10:55 - 10:58
    is now becoming an information technology.
  • 10:58 - 11:02
    As we've seen here, we're transforming ourselves into cyborgs.
  • 11:02 - 11:04
    Every year, thousands of cochlear implants,
  • 11:04 - 11:07
    diabetic pumps, pacemakers
  • 11:07 - 11:09
    and defibrillators are being implanted in people.
  • 11:09 - 11:11
    In the United States, there are 60,000 people
  • 11:11 - 11:14
    who have a pacemaker that connects to the Internet.
  • 11:14 - 11:18
    The defibrillators allow a physician at a distance
  • 11:18 - 11:20
    to give a shock to a heart
  • 11:20 - 11:22
    in case a patient needs it.
  • 11:22 - 11:24
    But if you don't need it,
  • 11:24 - 11:26
    and somebody else gives you the shock,
  • 11:26 - 11:29
    it's not a good thing.
  • 11:29 - 11:33
    Of course, we're going to go even deeper than the human body.
  • 11:33 - 11:35
    We're going down to the cellular level these days.
  • 11:35 - 11:37
    Up until this point, all the technologies
  • 11:37 - 11:41
    I've been talking about have been silicon-based, ones and zeroes,
  • 11:41 - 11:44
    but there's another operating system out there:
  • 11:44 - 11:48
    the original operating system, DNA.
  • 11:48 - 11:53
    And to hackers, DNA is just another operating system
  • 11:53 - 11:55
    waiting to be hacked.
  • 11:55 - 11:56
    It's a great challenge for them.
  • 11:56 - 11:58
    There are people already working on hacking the software of life,
  • 12:00 - 12:03
    and while most of them are doing this to great good
  • 12:03 - 12:04
    and to help us all,
  • 12:04 - 12:07
    some won't be.
  • 12:07 - 12:09
    So how will criminals abuse this?
  • 12:09 - 12:11
    Well, with synthetic biology you can do some pretty neat things.
  • 12:11 - 12:15
    For example, I predict that we will move away
  • 12:15 - 12:18
    from a plant-based narcotics world
  • 12:18 - 12:21
    to a synthetic one. Why do you need the plants anymore?
  • 12:21 - 12:24
    You can just take the DNA code from marijuana
  • 12:24 - 12:29
    or poppies or coca leaves
  • 12:29 - 12:31
    and cut and past that gene
  • 12:31 - 12:34
    and put it into yeast,
  • 12:34 - 12:35
    and you can take those yeast
  • 12:35 - 12:38
    and make them make the cocaine for you,
  • 12:38 - 12:42
    or the marijuana, or any other drug.
  • 12:42 - 12:44
    So how we use yeast in the future
  • 12:44 - 12:46
    is going to be really interesting.
  • 12:46 - 12:48
    In fact, we may have some really interesting bread and beer
  • 12:48 - 12:52
    as we go into this next century.
  • 12:52 - 12:56
    The cost of sequencing the human genome is dropping precipitously.
  • 12:56 - 12:58
    It was proceeding at Moore's Law pace,
  • 12:58 - 13:00
    but then in 2008, something changed.
  • 13:00 - 13:02
    The technologies got better,
  • 13:02 - 13:06
    and now DNA sequencing is proceeding at a pace
  • 13:06 - 13:09
    five times that of Moore's Law.
  • 13:09 - 13:13
    That has significant implications for us.
  • 13:13 - 13:16
    It took us 30 years to get from
  • 13:16 - 13:18
    the introduction of the personal computer
  • 13:18 - 13:20
    to the level of cybercrime we have today,
  • 13:20 - 13:24
    but looking at how biology is proceeding so rapidly,
  • 13:24 - 13:25
    and knowing criminals and terrorists as I do,
  • 13:25 - 13:28
    we may get there a lot faster
  • 13:28 - 13:30
    with biocrime in the future.
  • 13:30 - 13:32
    It will be easy for anybody to go ahead
  • 13:32 - 13:34
    and print their own bio-virus,
  • 13:34 - 13:37
    enhanced versions of ebola or anthrax,
  • 13:37 - 13:38
    weaponized flu.
  • 13:38 - 13:41
    We recently saw a case where some researchers
  • 13:41 - 13:46
    made the H5N1 avian influenza virus more potent.
  • 13:46 - 13:50
    It already has a 70 percent mortality rate
  • 13:50 - 13:51
    if you get it, but it's hard to get.
  • 13:51 - 13:54
    Engineers, by moving around a small number
  • 13:54 - 13:56
    of genetic changes,
  • 13:56 - 13:57
    were able to weaponize it
  • 13:57 - 14:01
    and make it much more easy for human beings to catch,
  • 14:01 - 14:03
    so that not thousands of people would die,
  • 14:03 - 14:05
    but tens of millions.
  • 14:05 - 14:07
    You see, you can go ahead and create
  • 14:07 - 14:09
    new pandemics, and the researchers who did this
  • 14:09 - 14:11
    were so proud of their accomplishments,
  • 14:11 - 14:12
    they wanted to publish it openly
  • 14:12 - 14:15
    so that everybody could see this
  • 14:15 - 14:19
    and get access to this information.
  • 14:19 - 14:20
    But it goes deeper than that.
  • 14:20 - 14:22
    DNA researcher Andrew Hessel
  • 14:22 - 14:24
    has pointed out quite rightly
  • 14:24 - 14:26
    that if you can use cancer treatments,
  • 14:26 - 14:27
    modern cancer treatments,
  • 14:27 - 14:30
    to go after one cell while leaving all the other cells
  • 14:30 - 14:32
    around it intact,
  • 14:32 - 14:36
    then you can also go after any one person's cell.
  • 14:36 - 14:38
    Personalized cancer treatments
  • 14:38 - 14:41
    are the flip side of personalized bioweapons,
  • 14:41 - 14:44
    which means you can attack any one individual,
  • 14:44 - 14:48
    including all the people in this picture.
  • 14:48 - 14:52
    How will we protect them in the future?
  • 14:52 - 14:55
    What to do? What to do about all this?
  • 14:55 - 14:58
    That's what I get asked all the time.
  • 14:58 - 14:59
    For those of you who follow me on Twitter,
  • 14:59 - 15:04
    I will be tweeting out the answer later on today. (Laughter)
  • 15:04 - 15:06
    Actually, it's a bit more complex than that,
  • 15:06 - 15:08
    and there are no magic bullets.
  • 15:08 - 15:10
    I don't have all the answers,
  • 15:10 - 15:12
    but I know a few things.
  • 15:12 - 15:14
    In the wake of 9/11,
  • 15:14 - 15:17
    the best security minds
  • 15:17 - 15:19
    put together all their innovation
  • 15:19 - 15:23
    and this is what they created for security.
  • 15:23 - 15:27
    If you're expecting the people who built this to protect you
  • 15:27 - 15:31
    from the coming robopocalypse — (Laughter)
  • 15:31 - 15:34
    — uh, you may want to have a backup plan. (Laughter)
  • 15:34 - 15:40
    Just saying. Just think about that. (Applause)
  • 15:40 - 15:43
    Law enforcement is currently a closed system.
  • 15:43 - 15:46
    It's nation-based, while the threat is international.
  • 15:46 - 15:50
    Policing doesn't scale globally. At least, it hasn't,
  • 15:50 - 15:54
    and our current system of guns, border guards, big gates and fences
  • 15:54 - 15:57
    are outdated in the new world into which we're moving.
  • 15:57 - 16:00
    So how might we prepare for some of these specific threats,
  • 16:00 - 16:02
    like attacking a president or a prime minister?
  • 16:02 - 16:04
    This would be the natural government response,
  • 16:04 - 16:06
    to hide away all our government leaders
  • 16:06 - 16:08
    in hermetically sealed bubbles.
  • 16:08 - 16:10
    But this is not going to work.
  • 16:10 - 16:13
    The cost of doing a DNA sequence is going to be trivial.
  • 16:13 - 16:16
    Anybody will have it and we will all have them in the future.
  • 16:16 - 16:20
    So maybe there's a more radical way that we can look at this.
  • 16:20 - 16:22
    What happens if we were to take
  • 16:22 - 16:25
    the President's DNA, or a king or queen's,
  • 16:25 - 16:27
    and put it out to a group of a few hundred
  • 16:27 - 16:29
    trusted researchers so they could
  • 16:29 - 16:32
    study that DNA and do penetration testing against it
  • 16:32 - 16:34
    as a means of helping our leaders?
  • 16:34 - 16:37
    Or what if we sent it out to a few thousand?
  • 16:37 - 16:39
    Or, controversially, and not without its risks,
  • 16:39 - 16:42
    what happens if we just gave it to the whole public?
  • 16:42 - 16:46
    Then we could all be engaged in helping.
  • 16:46 - 16:48
    We've already seen examples of this working well.
  • 16:48 - 16:51
    The Organized Crime and Corruption Reporting Project
  • 16:51 - 16:53
    is staffed by journalists and citizens
  • 16:53 - 16:55
    where they are crowd-sourcing
  • 16:55 - 16:57
    what dictators and terrorists are doing
  • 16:57 - 16:59
    with public funds around the world,
  • 16:59 - 17:01
    and, in a more dramatic case,
  • 17:01 - 17:03
    we've seen in Mexico,
  • 17:03 - 17:05
    a country that has been racked
  • 17:05 - 17:09
    by 50,000 narcotics-related murders
  • 17:09 - 17:10
    in the past six years.
  • 17:10 - 17:12
    They're killing so many people
  • 17:12 - 17:14
    they can't even afford to bury them all
  • 17:14 - 17:16
    in anything but these unmarked graves
  • 17:16 - 17:19
    like this one outside of Ciudad Juarez.
  • 17:19 - 17:22
    What can we do about this? The government has proven ineffective.
  • 17:22 - 17:25
    So in Mexico, citizens, at great risk to themselves,
  • 17:25 - 17:30
    are fighting back to build an effective solution.
  • 17:30 - 17:34
    They're crowd-mapping the activities of the drug dealers.
  • 17:34 - 17:36
    Whether or not you realize it,
  • 17:36 - 17:39
    we are at the dawn of a technological arms race,
  • 17:39 - 17:41
    an arms race between people
  • 17:41 - 17:43
    who are using technology for good
  • 17:43 - 17:45
    and those who are using it for ill.
  • 17:45 - 17:49
    The threat is serious, and the time to prepare for it is now.
  • 17:49 - 17:53
    I can assure you that the terrorists and criminals are.
  • 17:53 - 17:55
    My personal belief is that,
  • 17:55 - 17:57
    rather than having a small, elite force
  • 17:57 - 17:59
    of highly trained government agents
  • 17:59 - 18:01
    here to protect us all,
  • 18:01 - 18:02
    we're much better off
  • 18:02 - 18:04
    having average and ordinary citizens
  • 18:04 - 18:07
    approaching this problem as a group
  • 18:07 - 18:08
    and seeing what we can do.
  • 18:08 - 18:09
    If we all do our part,
  • 18:09 - 18:12
    I think we'll be in a much better space.
  • 18:12 - 18:13
    The tools to change the world
  • 18:13 - 18:15
    are in everybody's hands.
  • 18:15 - 18:18
    How we use them is not just up to me,
  • 18:18 - 18:20
    it's up to all of us.
  • 18:20 - 18:23
    This was a technology I would frequently deploy
  • 18:23 - 18:25
    as a police officer.
  • 18:25 - 18:28
    This technology has become outdated in our current world.
  • 18:28 - 18:31
    It doesn't scale, it doesn't work globally,
  • 18:31 - 18:33
    and it surely doesn't work virtually.
  • 18:33 - 18:37
    We've seen paradigm shifts in crime and terrorism.
  • 18:37 - 18:41
    They call for a shift to a more open form
  • 18:41 - 18:46
    and a more participatory form of law enforcement.
  • 18:46 - 18:48
    So I invite you to join me.
  • 18:48 - 18:54
    After all, public safety is too important to leave to the professionals.
  • 18:54 - 18:56
    Thank you. (Applause)
  • 18:56 - 19:04
    (Applause)
Title:
A vision of crimes in the future
Speaker:
Marc Goodman
Description:

The world is becoming increasingly open, and that has implications both bright and dangerous. Marc Goodman paints a portrait of a grave future, in which technology's rapid development could allow crime to take a turn for the worse.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
19:43

English subtitles

Revisions Compare revisions