[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:01.34,0:00:03.07,Default,,0000,0000,0000,,For more than 100 years, Dialogue: 0,0:00:03.10,0:00:07.12,Default,,0000,0000,0000,,the telephone companies have provided\Nwiretapping assistance to governments. Dialogue: 0,0:00:07.15,0:00:10.68,Default,,0000,0000,0000,,For much of this time,\Nthis assistance was manual. Dialogue: 0,0:00:10.71,0:00:14.83,Default,,0000,0000,0000,,Surveillance took place manually\Nand wires were connected by hand. Dialogue: 0,0:00:14.85,0:00:16.60,Default,,0000,0000,0000,,Calls were recorded to tape. Dialogue: 0,0:00:17.33,0:00:19.48,Default,,0000,0000,0000,,But as in so many other industries, Dialogue: 0,0:00:19.50,0:00:21.27,Default,,0000,0000,0000,,computing has changed everything. Dialogue: 0,0:00:21.72,0:00:24.75,Default,,0000,0000,0000,,The telephone companies\Nbuilt surveillance features Dialogue: 0,0:00:24.77,0:00:26.82,Default,,0000,0000,0000,,into the very core of their networks. Dialogue: 0,0:00:27.49,0:00:29.47,Default,,0000,0000,0000,,I want that to sink in for a second: Dialogue: 0,0:00:29.50,0:00:33.76,Default,,0000,0000,0000,,Our telephones and the networks\Nthat carry our calls Dialogue: 0,0:00:33.78,0:00:36.16,Default,,0000,0000,0000,,were wired for surveillance first. Dialogue: 0,0:00:36.18,0:00:37.58,Default,,0000,0000,0000,,First and foremost. Dialogue: 0,0:00:38.76,0:00:42.59,Default,,0000,0000,0000,,So what that means is that\Nwhen you're talking to your spouse, Dialogue: 0,0:00:42.61,0:00:46.94,Default,,0000,0000,0000,,your children, a colleague\Nor your doctor on the telephone, Dialogue: 0,0:00:46.96,0:00:48.44,Default,,0000,0000,0000,,someone could be listening. Dialogue: 0,0:00:48.90,0:00:51.47,Default,,0000,0000,0000,,Now, that someone might\Nbe your own government; Dialogue: 0,0:00:51.49,0:00:55.65,Default,,0000,0000,0000,,it could also be another government,\Na foreign intelligence service, Dialogue: 0,0:00:55.68,0:00:58.50,Default,,0000,0000,0000,,or a hacker, or a criminal, or a stalker Dialogue: 0,0:00:58.53,0:01:02.10,Default,,0000,0000,0000,,or any other party that breaks into\Nthe surveillance system, Dialogue: 0,0:01:02.12,0:01:06.61,Default,,0000,0000,0000,,that hacks into the surveillance system\Nof the telephone companies. Dialogue: 0,0:01:07.83,0:01:12.36,Default,,0000,0000,0000,,But while the telephone companies\Nhave built surveillance as a priority, Dialogue: 0,0:01:12.38,0:01:14.20,Default,,0000,0000,0000,,Silicon Valley companies have not. Dialogue: 0,0:01:14.52,0:01:17.04,Default,,0000,0000,0000,,And increasingly,\Nover the last couple years, Dialogue: 0,0:01:17.07,0:01:20.73,Default,,0000,0000,0000,,Silicon Valley companies have built\Nstrong encryption technology Dialogue: 0,0:01:20.75,0:01:22.69,Default,,0000,0000,0000,,into their communications products Dialogue: 0,0:01:22.71,0:01:24.98,Default,,0000,0000,0000,,that makes surveillance\Nextremely difficult. Dialogue: 0,0:01:25.42,0:01:27.59,Default,,0000,0000,0000,,For example, many of you\Nmight have an iPhone, Dialogue: 0,0:01:27.61,0:01:30.30,Default,,0000,0000,0000,,and if you use an iPhone\Nto send a text message Dialogue: 0,0:01:30.33,0:01:32.50,Default,,0000,0000,0000,,to other people who have an iPhone, Dialogue: 0,0:01:32.53,0:01:35.54,Default,,0000,0000,0000,,those text messages\Ncannot easily be wiretapped. Dialogue: 0,0:01:35.56,0:01:37.39,Default,,0000,0000,0000,,And in fact, according to Apple, Dialogue: 0,0:01:37.42,0:01:40.31,Default,,0000,0000,0000,,they're not able to even see\Nthe text messages themselves. Dialogue: 0,0:01:40.66,0:01:44.53,Default,,0000,0000,0000,,Likewise, if you use FaceTime\Nto make an audio call Dialogue: 0,0:01:44.55,0:01:47.16,Default,,0000,0000,0000,,or a video call with one of your\Nfriends or loved ones, Dialogue: 0,0:01:47.19,0:01:49.32,Default,,0000,0000,0000,,that, too, cannot be easily wiretapped. Dialogue: 0,0:01:49.34,0:01:50.88,Default,,0000,0000,0000,,And it's not just Apple. Dialogue: 0,0:01:51.32,0:01:53.67,Default,,0000,0000,0000,,WhatsApp, which is now owned by Facebook Dialogue: 0,0:01:53.69,0:01:56.55,Default,,0000,0000,0000,,and used by hundreds of millions\Nof people around the world, Dialogue: 0,0:01:56.57,0:02:00.08,Default,,0000,0000,0000,,also has built strong\Nencryption technology into its product, Dialogue: 0,0:02:00.10,0:02:03.61,Default,,0000,0000,0000,,which means that people\Nin the Global South can easily communicate Dialogue: 0,0:02:03.64,0:02:06.44,Default,,0000,0000,0000,,without their governments,\Noften authoritarian, Dialogue: 0,0:02:06.47,0:02:08.20,Default,,0000,0000,0000,,wiretapping their text messages. Dialogue: 0,0:02:09.60,0:02:14.54,Default,,0000,0000,0000,,So, after 100 years of being able\Nto listen to any telephone call -- Dialogue: 0,0:02:14.57,0:02:17.12,Default,,0000,0000,0000,,anytime, anywhere -- Dialogue: 0,0:02:17.15,0:02:20.28,Default,,0000,0000,0000,,you might imagine that government\Nofficials are not very happy. Dialogue: 0,0:02:20.30,0:02:22.09,Default,,0000,0000,0000,,And in fact, that's what's happening. Dialogue: 0,0:02:22.11,0:02:24.33,Default,,0000,0000,0000,,Government officials are extremely mad. Dialogue: 0,0:02:24.35,0:02:28.23,Default,,0000,0000,0000,,And they're not mad because\Nthese encryption tools are now available. Dialogue: 0,0:02:28.25,0:02:30.07,Default,,0000,0000,0000,,What upsets them the most Dialogue: 0,0:02:30.10,0:02:34.26,Default,,0000,0000,0000,,is that the tech companies have built\Nencryption features into their products Dialogue: 0,0:02:34.29,0:02:36.16,Default,,0000,0000,0000,,and turned them on by default. Dialogue: 0,0:02:36.55,0:02:38.52,Default,,0000,0000,0000,,It's the default piece that matters. Dialogue: 0,0:02:38.54,0:02:42.32,Default,,0000,0000,0000,,In short, the tech companies\Nhave democratized encryption. Dialogue: 0,0:02:43.16,0:02:46.96,Default,,0000,0000,0000,,And so, government officials\Nlike British Prime Minister David Cameron, Dialogue: 0,0:02:46.99,0:02:51.83,Default,,0000,0000,0000,,they believe that all communications --\Nemails, texts, voice calls -- Dialogue: 0,0:02:51.86,0:02:54.44,Default,,0000,0000,0000,,all of these should be\Navailable to governments, Dialogue: 0,0:02:54.47,0:02:56.57,Default,,0000,0000,0000,,and encryption is making that difficult. Dialogue: 0,0:02:57.48,0:03:00.86,Default,,0000,0000,0000,,Now, look -- I'm extremely sympathetic\Nto their point of view. Dialogue: 0,0:03:00.89,0:03:03.42,Default,,0000,0000,0000,,We live in a dangerous time\Nin a dangerous world, Dialogue: 0,0:03:03.44,0:03:05.44,Default,,0000,0000,0000,,and there really are bad people out there. Dialogue: 0,0:03:05.47,0:03:08.58,Default,,0000,0000,0000,,There are terrorists and other\Nserious national security threats Dialogue: 0,0:03:08.60,0:03:12.58,Default,,0000,0000,0000,,that I suspect we all want\Nthe FBI and the NSA to monitor. Dialogue: 0,0:03:13.34,0:03:16.05,Default,,0000,0000,0000,,But those surveillance\Nfeatures come at a cost. Dialogue: 0,0:03:17.36,0:03:18.51,Default,,0000,0000,0000,,The reason for that is Dialogue: 0,0:03:18.54,0:03:21.02,Default,,0000,0000,0000,,that there is no such thing\Nas a terrorist laptop, Dialogue: 0,0:03:21.05,0:03:22.55,Default,,0000,0000,0000,,or a drug dealer's cell phone. Dialogue: 0,0:03:22.90,0:03:25.86,Default,,0000,0000,0000,,We all use the same\Ncommunications devices. Dialogue: 0,0:03:26.58,0:03:30.25,Default,,0000,0000,0000,,What that means is that\Nif the drug dealers' telephone calls Dialogue: 0,0:03:30.28,0:03:32.82,Default,,0000,0000,0000,,or the terrorists' telephone calls\Ncan be intercepted, Dialogue: 0,0:03:32.84,0:03:34.84,Default,,0000,0000,0000,,then so can the rest of ours, too. Dialogue: 0,0:03:34.86,0:03:36.49,Default,,0000,0000,0000,,And I think we really need to ask: Dialogue: 0,0:03:36.52,0:03:39.64,Default,,0000,0000,0000,,Should a billion people\Naround the world be using devices Dialogue: 0,0:03:39.67,0:03:41.09,Default,,0000,0000,0000,,that are wiretap friendly? Dialogue: 0,0:03:43.41,0:03:47.16,Default,,0000,0000,0000,,So the scenario of hacking of surveillance\Nsystems that I've described -- Dialogue: 0,0:03:47.18,0:03:49.29,Default,,0000,0000,0000,,this is not imaginary. Dialogue: 0,0:03:49.62,0:03:50.77,Default,,0000,0000,0000,,In 2009, Dialogue: 0,0:03:50.80,0:03:54.84,Default,,0000,0000,0000,,the surveillance systems that Google\Nand Microsoft built into their networks -- Dialogue: 0,0:03:54.87,0:03:58.36,Default,,0000,0000,0000,,the systems that they use to respond\Nto lawful surveillance requests Dialogue: 0,0:03:58.38,0:03:59.55,Default,,0000,0000,0000,,from the police -- Dialogue: 0,0:03:59.57,0:04:02.24,Default,,0000,0000,0000,,those systems were compromised\Nby the Chinese government, Dialogue: 0,0:04:02.27,0:04:04.66,Default,,0000,0000,0000,,because the Chinese government\Nwanted to figure out Dialogue: 0,0:04:04.69,0:04:07.58,Default,,0000,0000,0000,,which of their own agents\Nthe US government was monitoring. Dialogue: 0,0:04:08.27,0:04:09.54,Default,,0000,0000,0000,,By the same token, Dialogue: 0,0:04:09.56,0:04:12.98,Default,,0000,0000,0000,,in 2004, the surveillance system\Nbuilt into the network Dialogue: 0,0:04:13.01,0:04:16.18,Default,,0000,0000,0000,,of Vodafone Greece --\NGreece's largest telephone company -- Dialogue: 0,0:04:16.20,0:04:18.78,Default,,0000,0000,0000,,was compromised by an unknown entity, Dialogue: 0,0:04:18.81,0:04:20.85,Default,,0000,0000,0000,,and that feature,\Nthe surveillance feature, Dialogue: 0,0:04:20.87,0:04:23.15,Default,,0000,0000,0000,,was used to wiretap\Nthe Greek Prime Minister Dialogue: 0,0:04:23.17,0:04:24.89,Default,,0000,0000,0000,,and members of the Greek cabinet. Dialogue: 0,0:04:25.31,0:04:28.38,Default,,0000,0000,0000,,The foreign government or hackers\Nwho did that were never caught. Dialogue: 0,0:04:29.96,0:04:33.65,Default,,0000,0000,0000,,And really, this gets to the very problem\Nwith these surveillance features, Dialogue: 0,0:04:33.68,0:04:34.94,Default,,0000,0000,0000,,or backdoors. Dialogue: 0,0:04:34.96,0:04:38.16,Default,,0000,0000,0000,,When you build a backdoor\Ninto a communications network Dialogue: 0,0:04:38.19,0:04:39.49,Default,,0000,0000,0000,,or piece of technology, Dialogue: 0,0:04:39.51,0:04:42.56,Default,,0000,0000,0000,,you have no way of controlling\Nwho's going to go through it. Dialogue: 0,0:04:43.24,0:04:44.69,Default,,0000,0000,0000,,You have no way of controlling Dialogue: 0,0:04:44.71,0:04:47.48,Default,,0000,0000,0000,,whether it'll be used by your side\Nor the other side, Dialogue: 0,0:04:47.51,0:04:49.42,Default,,0000,0000,0000,,by good guys, or by bad guys. Dialogue: 0,0:04:49.98,0:04:52.50,Default,,0000,0000,0000,,And so for that reason,\NI think that it's better Dialogue: 0,0:04:52.52,0:04:55.18,Default,,0000,0000,0000,,to build networks\Nto be as secure as possible. Dialogue: 0,0:04:56.27,0:04:58.68,Default,,0000,0000,0000,,Yes, this means that in the future, Dialogue: 0,0:04:58.70,0:05:01.27,Default,,0000,0000,0000,,encryption is going to make\Nwiretapping more difficult. Dialogue: 0,0:05:01.28,0:05:03.95,Default,,0000,0000,0000,,It means that the police\Nare going to have a tougher time Dialogue: 0,0:05:03.95,0:05:05.28,Default,,0000,0000,0000,,catching bad guys. Dialogue: 0,0:05:05.31,0:05:07.86,Default,,0000,0000,0000,,But the alternative would mean\Nto live in a world Dialogue: 0,0:05:07.89,0:05:11.52,Default,,0000,0000,0000,,where anyone's calls or anyone's\Ntext messages could be surveilled Dialogue: 0,0:05:11.54,0:05:15.27,Default,,0000,0000,0000,,by criminals, by stalkers\Nand by foreign intelligence agencies. Dialogue: 0,0:05:15.29,0:05:17.61,Default,,0000,0000,0000,,And I don't want to live\Nin that kind of world. Dialogue: 0,0:05:18.10,0:05:20.82,Default,,0000,0000,0000,,And so right now,\Nyou probably have the tools Dialogue: 0,0:05:20.84,0:05:23.16,Default,,0000,0000,0000,,to thwart many kinds\Nof government surveillance Dialogue: 0,0:05:23.18,0:05:26.17,Default,,0000,0000,0000,,already on your phones\Nand already in your pockets, Dialogue: 0,0:05:26.19,0:05:29.97,Default,,0000,0000,0000,,you just might not realize how strong\Nand how secure those tools are, Dialogue: 0,0:05:29.99,0:05:33.52,Default,,0000,0000,0000,,or how weak the other ways\Nyou've used to communicate really are. Dialogue: 0,0:05:34.74,0:05:36.86,Default,,0000,0000,0000,,And so, my message to you is this: Dialogue: 0,0:05:38.11,0:05:39.76,Default,,0000,0000,0000,,We need to use these tools. Dialogue: 0,0:05:40.24,0:05:42.54,Default,,0000,0000,0000,,We need to secure our telephone calls. Dialogue: 0,0:05:42.57,0:05:44.42,Default,,0000,0000,0000,,We need to secure our text messages. Dialogue: 0,0:05:44.95,0:05:46.60,Default,,0000,0000,0000,,I want you to use these tools. Dialogue: 0,0:05:46.63,0:05:49.98,Default,,0000,0000,0000,,I want you to tell your loved ones,\NI want you to tell your colleagues: Dialogue: 0,0:05:50.01,0:05:52.43,Default,,0000,0000,0000,,Use these encrypted communications tools. Dialogue: 0,0:05:52.45,0:05:55.13,Default,,0000,0000,0000,,Don't just use them\Nbecause they're cheap and easy, Dialogue: 0,0:05:55.15,0:05:57.16,Default,,0000,0000,0000,,but use them because they're secure. Dialogue: 0,0:05:57.18,0:05:58.44,Default,,0000,0000,0000,,Thank you. Dialogue: 0,0:05:58.46,0:06:02.05,Default,,0000,0000,0000,,(Applause)