[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:01.34,0:00:04.85,Default,,0000,0000,0000,,For more than a 100 years,\Nthe telephone companies have provided Dialogue: 0,0:00:04.85,0:00:06.78,Default,,0000,0000,0000,,wire-tapping assistance \Nto governments. Dialogue: 0,0:00:07.15,0:00:10.42,Default,,0000,0000,0000,,For much of this time, \Nthis assistance was manual. Dialogue: 0,0:00:10.82,0:00:14.56,Default,,0000,0000,0000,,Surveillance took place manually\Nand wires were connected by hand. Dialogue: 0,0:00:14.95,0:00:16.60,Default,,0000,0000,0000,,Calls were recorded to tape. Dialogue: 0,0:00:17.51,0:00:21.24,Default,,0000,0000,0000,,But as in so many other industries,\Ncomputing has changed everything. Dialogue: 0,0:00:21.88,0:00:24.42,Default,,0000,0000,0000,,The telephone companies \Nbuilt surveillance features Dialogue: 0,0:00:24.77,0:00:26.82,Default,,0000,0000,0000,,into the very core of their networks. Dialogue: 0,0:00:27.72,0:00:29.21,Default,,0000,0000,0000,,I want that to sink in for a second. Dialogue: 0,0:00:29.61,0:00:33.50,Default,,0000,0000,0000,,Our telephones and the networks \Nthat carry our calls Dialogue: 0,0:00:33.78,0:00:37.96,Default,,0000,0000,0000,,were wired for surveillance first,\Nfirst and foremost. Dialogue: 0,0:00:38.94,0:00:44.86,Default,,0000,0000,0000,,So, what that means is when you're talking\Nto your spouse, your children, a colleague Dialogue: 0,0:00:45.09,0:00:48.83,Default,,0000,0000,0000,,or your doctor on the telephone,\Nsomeone could be listening. Dialogue: 0,0:00:48.98,0:00:51.38,Default,,0000,0000,0000,,Now that someone might \Nbe your own government. Dialogue: 0,0:00:51.64,0:00:55.72,Default,,0000,0000,0000,,It could also be another government, \Na foreign intelligence service. Dialogue: 0,0:00:55.89,0:01:00.72,Default,,0000,0000,0000,,Or a hacker, or a criminal, or a stalker,\Nor any other party that breaks Dialogue: 0,0:01:00.73,0:01:04.72,Default,,0000,0000,0000,,into the surveillance system that hacks\Ninto the surveillance system Dialogue: 0,0:01:05.05,0:01:06.86,Default,,0000,0000,0000,,of the telephone companies. Dialogue: 0,0:01:07.91,0:01:12.25,Default,,0000,0000,0000,,But, while the telephone companies have\Nbuilt surveillance as a priority, Dialogue: 0,0:01:12.44,0:01:14.68,Default,,0000,0000,0000,,Silicon Valley companies have not. Dialogue: 0,0:01:14.69,0:01:19.14,Default,,0000,0000,0000,,And increasingly over the last couple\Nyears, Silicon Valley companies have built Dialogue: 0,0:01:19.24,0:01:23.12,Default,,0000,0000,0000,,strong encryption technology into their\Ncommunications products that makes Dialogue: 0,0:01:23.12,0:01:25.13,Default,,0000,0000,0000,,surveillance extremely difficult. Dialogue: 0,0:01:25.54,0:01:29.48,Default,,0000,0000,0000,,For example, many of you might have\Nan iPhone and if you use an iPhone Dialogue: 0,0:01:29.60,0:01:33.84,Default,,0000,0000,0000,,to send a text message to other people\Nthat have an iPhone, those text messages Dialogue: 0,0:01:33.84,0:01:35.72,Default,,0000,0000,0000,,cannot easily be wire-tapped. Dialogue: 0,0:01:35.82,0:01:38.69,Default,,0000,0000,0000,,And in fact, according to Apple\Nthey're not able to even see Dialogue: 0,0:01:38.69,0:01:40.66,Default,,0000,0000,0000,,the text messages themselves. Dialogue: 0,0:01:40.66,0:01:43.41,Default,,0000,0000,0000,,Likewise, if you use \NFaceTime to make\N Dialogue: 0,0:01:43.41,0:01:46.06,Default,,0000,0000,0000,,an audio call or a video call \Nwith one of your friends Dialogue: 0,0:01:46.06,0:01:49.40,Default,,0000,0000,0000,,or loved ones, that too\Ncannot be easily wire-tapped. Dialogue: 0,0:01:49.61,0:01:50.88,Default,,0000,0000,0000,,And it's not just Apple. Dialogue: 0,0:01:51.07,0:01:55.53,Default,,0000,0000,0000,,What'sApp, which is now owned by Facebook\Nand used by hundreds of millions of people Dialogue: 0,0:01:55.62,0:02:00.08,Default,,0000,0000,0000,,around the world, also has built strong\Nencryption technology into its product. Dialogue: 0,0:02:00.38,0:02:04.12,Default,,0000,0000,0000,,Which means that people in the global\Nsouth can easily communicate without Dialogue: 0,0:02:04.24,0:02:08.46,Default,,0000,0000,0000,,their governments, often authoritarian\Nwire-tapping their text messages. Dialogue: 0,0:02:09.60,0:02:14.43,Default,,0000,0000,0000,,So, after 100 years of being able\Nto listen to any telephone call, Dialogue: 0,0:02:14.57,0:02:16.68,Default,,0000,0000,0000,,anytime, anywhere. Dialogue: 0,0:02:17.26,0:02:20.63,Default,,0000,0000,0000,,You might imagine that government\Nofficials are not very happy. Dialogue: 0,0:02:20.77,0:02:22.55,Default,,0000,0000,0000,,And in fact, that's \Nwhat's happening. Dialogue: 0,0:02:22.60,0:02:25.82,Default,,0000,0000,0000,,Government officials are extremely mad\Nand they're not mad because these Dialogue: 0,0:02:25.82,0:02:27.67,Default,,0000,0000,0000,,encryptions tools are now available. Dialogue: 0,0:02:28.51,0:02:32.89,Default,,0000,0000,0000,,What upsets them the most, is that\Nthe tech companies have built encryption Dialogue: 0,0:02:32.90,0:02:36.61,Default,,0000,0000,0000,,features into their products \Nand turned them on by default. Dialogue: 0,0:02:36.84,0:02:38.77,Default,,0000,0000,0000,,It's the default piece that matters. Dialogue: 0,0:02:38.96,0:02:42.62,Default,,0000,0000,0000,,In short, the tech companies have\Ndemocratized encryption. Dialogue: 0,0:02:43.44,0:02:46.94,Default,,0000,0000,0000,,And so, government officials like British\NPrime Minister David Cameron, Dialogue: 0,0:02:47.18,0:02:51.96,Default,,0000,0000,0000,,they believe that all communications\N-- emails, texts, voice calls. Dialogue: 0,0:02:52.12,0:02:55.37,Default,,0000,0000,0000,,All of these should be available\Nto governments and encryption Dialogue: 0,0:02:55.60,0:02:57.37,Default,,0000,0000,0000,,is making that difficult. Dialogue: 0,0:02:57.79,0:03:00.83,Default,,0000,0000,0000,,Now look, I'm extremely sympathetic \Nto their point of view. Dialogue: 0,0:03:01.06,0:03:03.55,Default,,0000,0000,0000,,We live in a dangerous time, \Nin a dangerous world Dialogue: 0,0:03:03.73,0:03:06.10,Default,,0000,0000,0000,,and there really are \Nbad people out there. Dialogue: 0,0:03:06.24,0:03:09.28,Default,,0000,0000,0000,,There are terrorists and other serious\Nnational security threats that I suspect Dialogue: 0,0:03:09.47,0:03:12.83,Default,,0000,0000,0000,,we all want to the FBI \Nand the NSA to monitor. Dialogue: 0,0:03:13.39,0:03:16.39,Default,,0000,0000,0000,,But those surveillance \Nfeatures come at a cost. Dialogue: 0,0:03:17.62,0:03:20.87,Default,,0000,0000,0000,,The reason for that, is that there is no\Nsuch thing as a terrorist laptop, Dialogue: 0,0:03:21.19,0:03:22.89,Default,,0000,0000,0000,,or a drug dealer's cell phone. Dialogue: 0,0:03:23.12,0:03:26.14,Default,,0000,0000,0000,,We all use the same \Ncommunications devices. Dialogue: 0,0:03:26.84,0:03:30.60,Default,,0000,0000,0000,,What that means, is that if the drug\Ndealer's telephone calls Dialogue: 0,0:03:30.66,0:03:33.25,Default,,0000,0000,0000,,or the terrorist telephone calls \Ncan be intercepted, Dialogue: 0,0:03:33.30,0:03:34.62,Default,,0000,0000,0000,,then so can the rest \Nof ours too. Dialogue: 0,0:03:35.11,0:03:38.55,Default,,0000,0000,0000,,And I think we really need to ask, should \Na billion people around the world be Dialogue: 0,0:03:38.71,0:03:41.24,Default,,0000,0000,0000,,using devices that \Nare wire-tap friendly? Dialogue: 0,0:03:43.54,0:03:50.04,Default,,0000,0000,0000,,The scenario of hacking of surveillance \Nsystems that I described is not imaginary. Dialogue: 0,0:03:50.04,0:03:53.92,Default,,0000,0000,0000,,In 2009, the surveillance systems\Nthat Google and Microsoft built Dialogue: 0,0:03:54.06,0:03:54.94,Default,,0000,0000,0000,,into the networks. Dialogue: 0,0:03:55.10,0:03:58.79,Default,,0000,0000,0000,,The systems that they used to respond\Nto lawful surveillance requests Dialogue: 0,0:03:58.91,0:03:59.79,Default,,0000,0000,0000,,from the police. Dialogue: 0,0:03:59.95,0:04:02.46,Default,,0000,0000,0000,,Those systems were compromised\Nby the Chinese government Dialogue: 0,0:04:02.60,0:04:05.39,Default,,0000,0000,0000,,because the Chinese government\Nwanted to figure out which of their own Dialogue: 0,0:04:05.55,0:04:07.66,Default,,0000,0000,0000,,agents the US government\Nwas monitoring. Dialogue: 0,0:04:08.57,0:04:12.77,Default,,0000,0000,0000,,By the same token, in 2004\Nthe surveillance system built Dialogue: 0,0:04:12.86,0:04:16.84,Default,,0000,0000,0000,,into the network of Vodafone Greece\N-- Greece's largest telephone company Dialogue: 0,0:04:16.84,0:04:21.08,Default,,0000,0000,0000,,was compromised by unknown entity\Nand that feature, the surveillance feature Dialogue: 0,0:04:21.08,0:04:24.01,Default,,0000,0000,0000,,was used to wire-tap the Greek\NPrime Minister and members Dialogue: 0,0:04:24.01,0:04:25.77,Default,,0000,0000,0000,,of the Greek cabinet. Dialogue: 0,0:04:26.35,0:04:28.51,Default,,0000,0000,0000,,The foreign government or hackers\Nwho did that were never caught. Dialogue: 0,0:04:30.32,0:04:33.90,Default,,0000,0000,0000,,And really, this gets to the very problem\Nwith these surveillance features Dialogue: 0,0:04:34.02,0:04:35.27,Default,,0000,0000,0000,,or back doors. Dialogue: 0,0:04:35.78,0:04:38.22,Default,,0000,0000,0000,,When you build a back door into\Na communications network Dialogue: 0,0:04:38.34,0:04:41.14,Default,,0000,0000,0000,,or piece of technology,you \Nhave no way of controlling Dialogue: 0,0:04:41.14,0:04:42.77,Default,,0000,0000,0000,,who's going to go through it. Dialogue: 0,0:04:43.49,0:04:46.70,Default,,0000,0000,0000,,You have no way controlling whether\Nit'll be used by your side Dialogue: 0,0:04:46.90,0:04:47.86,Default,,0000,0000,0000,,or the other side. Dialogue: 0,0:04:48.02,0:04:49.30,Default,,0000,0000,0000,,By good guys, \Nor by bad guys. Dialogue: 0,0:04:50.34,0:04:53.48,Default,,0000,0000,0000,,And so, for that reason, I think \Nthat it's better to build networks Dialogue: 0,0:04:53.71,0:04:55.59,Default,,0000,0000,0000,,to be as secure as possible. Dialogue: 0,0:04:56.58,0:04:59.84,Default,,0000,0000,0000,,Yes, this means that in the future,\Nencryption is going to make Dialogue: 0,0:04:59.84,0:05:01.16,Default,,0000,0000,0000,,wire-tapping more difficult. Dialogue: 0,0:05:01.67,0:05:04.60,Default,,0000,0000,0000,,It means that the police are going to have\Na tougher time catching bad guys. Dialogue: 0,0:05:05.22,0:05:09.19,Default,,0000,0000,0000,,But the alternative would mean to live\Nin a world where anyone's calls Dialogue: 0,0:05:09.40,0:05:12.10,Default,,0000,0000,0000,,or anyone's text messages could\Nbe surveilled by criminals, Dialogue: 0,0:05:12.40,0:05:15.37,Default,,0000,0000,0000,,by stalkers and by foreign \Nintelligence agencies. Dialogue: 0,0:05:15.62,0:05:17.20,Default,,0000,0000,0000,,And I don't want to live\Nin that kind of world. Dialogue: 0,0:05:18.34,0:05:22.54,Default,,0000,0000,0000,,And so right now, you probably have\Nthe tools to thwart many kinds Dialogue: 0,0:05:22.62,0:05:24.47,Default,,0000,0000,0000,,of government surveillance\Nalready on your phones Dialogue: 0,0:05:24.77,0:05:26.31,Default,,0000,0000,0000,,and already in your pockets. Dialogue: 0,0:05:26.52,0:05:29.86,Default,,0000,0000,0000,,You just might not realize how strong\Nand how secure those tools are Dialogue: 0,0:05:30.16,0:05:33.44,Default,,0000,0000,0000,,or how weak the other ways you've used\Nto communicate really are. Dialogue: 0,0:05:34.94,0:05:39.19,Default,,0000,0000,0000,,And so, my message \Nto you is this. Dialogue: 0,0:05:39.26,0:05:40.66,Default,,0000,0000,0000,,We need to use \Nthese tools. Dialogue: 0,0:05:41.12,0:05:43.00,Default,,0000,0000,0000,,We need to secure our telephone calls. Dialogue: 0,0:05:43.09,0:05:44.74,Default,,0000,0000,0000,,We need to secure \Nour text messages. Dialogue: 0,0:05:45.30,0:05:47.20,Default,,0000,0000,0000,,I want you to use \Nthese tools. Dialogue: 0,0:05:47.37,0:05:48.39,Default,,0000,0000,0000,,I want you to tell \Nyour loved ones. Dialogue: 0,0:05:48.67,0:05:50.08,Default,,0000,0000,0000,,I want you to tell \Nyour colleagues. Dialogue: 0,0:05:50.24,0:05:52.38,Default,,0000,0000,0000,,Use these encrypted \Ncommunications tools. Dialogue: 0,0:05:52.61,0:05:55.80,Default,,0000,0000,0000,,Don't just use them because they're cheap\Nand easy, but use them because Dialogue: 0,0:05:56.03,0:05:57.02,Default,,0000,0000,0000,,they are secure. Dialogue: 0,0:05:57.30,0:05:58.56,Default,,0000,0000,0000,,Thank you. Dialogue: 0,0:05:58.84,0:06:00.69,Default,,0000,0000,0000,,(Applause)