WEBVTT 00:00:01.343 --> 00:00:04.726 For more than a 100 years, the telephone companies have provided 00:00:04.726 --> 00:00:06.778 wire-tapping assistance to governments. 00:00:07.146 --> 00:00:10.424 For much of this time, this assistance was manual. 00:00:10.708 --> 00:00:14.557 Surveillance took place manually and wires were connected by hand. 00:00:14.951 --> 00:00:16.600 Calls were recorded to tape. 00:00:17.506 --> 00:00:21.244 But as in so many other industries, computing has changed everything. 00:00:21.877 --> 00:00:24.425 The telephone companies built surveillance features 00:00:24.772 --> 00:00:26.817 into the very core of their networks. 00:00:27.722 --> 00:00:29.208 I want that to sink in for a second. 00:00:29.611 --> 00:00:33.504 Our telephones and the networks that carry our calls 00:00:33.782 --> 00:00:37.962 were wired for surveillance first, first and foremost. 00:00:38.937 --> 00:00:44.857 So, what that means is when you're talking to your spouse, your children, a colleague 00:00:44.949 --> 00:00:48.827 or your doctor on the telephone, someone could be listening. 00:00:48.977 --> 00:00:51.383 Now that someone might be your own government. 00:00:51.641 --> 00:00:55.724 It could also be another government, a foreign intelligence service. 00:00:55.892 --> 00:01:00.719 Or a hacker, or a criminal, or a stalker, or any other party that breaks 00:01:00.729 --> 00:01:04.724 into the surveillance system that hacks into the surveillance system 00:01:05.049 --> 00:01:06.861 of the telephone companies. NOTE Paragraph 00:01:07.911 --> 00:01:12.248 But, while the telephone companies have built surveillance as a priority, 00:01:12.442 --> 00:01:14.681 Silicon Valley companies have not. 00:01:14.694 --> 00:01:19.143 And increasingly over the last couple years, Silicon Valley companies have built 00:01:19.237 --> 00:01:23.119 strong encryption technology into their communications products that makes 00:01:23.119 --> 00:01:25.133 surveillance extremely difficult. 00:01:25.535 --> 00:01:29.475 For example, many of you might have an iPhone and if you use an iPhone 00:01:29.601 --> 00:01:33.843 to send a text message to other people that have an iPhone, those text messages 00:01:33.843 --> 00:01:35.721 cannot easily be wire-tapped. 00:01:35.755 --> 00:01:38.686 And in fact, according to Apple they're not able to even see 00:01:38.686 --> 00:01:40.662 the text messages themselves. 00:01:40.662 --> 00:01:43.408 Likewise, if you use FaceTime to make 00:01:43.408 --> 00:01:45.988 an audio call or a video call with one of your friends 00:01:45.988 --> 00:01:49.397 or loved ones, that too cannot be easily wire-tapped. 00:01:49.527 --> 00:01:50.885 And it's not just Apple. 00:01:51.070 --> 00:01:55.520 WhatsApp, which is now owned by Facebook and used by hundreds of millions of people 00:01:55.520 --> 00:02:00.079 around the world, also has built strong encryption technology into its product. 00:02:00.381 --> 00:02:04.119 Which means that people in the global south can easily communicate without 00:02:04.126 --> 00:02:08.460 their governments, often authoritarian, wire-tapping their text messages. NOTE Paragraph 00:02:09.599 --> 00:02:14.429 So, after 100 years of being able to listen to any telephone call, 00:02:14.568 --> 00:02:16.681 anytime, anywhere. 00:02:17.262 --> 00:02:20.508 You might imagine that government officials are not very happy. 00:02:20.508 --> 00:02:22.191 And in fact, that's what's happening. 00:02:22.191 --> 00:02:23.461 Government officials are extremely mad. 00:02:23.461 --> 00:02:25.817 And they're not mad because these encryption 00:02:25.817 --> 00:02:27.674 tools are now available. 00:02:28.510 --> 00:02:32.888 What upsets them the most, is that the tech companies have built encryption 00:02:32.897 --> 00:02:36.612 features into their products and turned them on by default. 00:02:36.844 --> 00:02:38.771 It's the default piece that matters. 00:02:38.957 --> 00:02:42.625 In short, the tech companies have democratized encryption. 00:02:43.437 --> 00:02:46.944 And so, government officials like British Prime Minister David Cameron, 00:02:47.177 --> 00:02:51.960 they believe that all communications -- emails, texts, voice calls. 00:02:52.122 --> 00:02:55.372 All of these should be available to governments and encryption 00:02:55.605 --> 00:02:57.369 is making that difficult. NOTE Paragraph 00:02:57.788 --> 00:03:00.830 Now look, I'm extremely sympathetic to their point of view. 00:03:01.062 --> 00:03:03.546 We live in a dangerous time, in a dangerous world 00:03:03.732 --> 00:03:06.100 and there really are bad people out there. 00:03:06.240 --> 00:03:09.281 There are terrorists and other serious national security threats that I suspect 00:03:09.467 --> 00:03:12.834 we all want to the FBI and the NSA to monitor. 00:03:13.391 --> 00:03:16.386 But those surveillance features come at a cost. 00:03:17.617 --> 00:03:20.868 The reason for that, is that there is no such thing as a terrorist laptop, 00:03:21.193 --> 00:03:22.887 or a drug dealer's cell phone. 00:03:23.120 --> 00:03:26.138 We all use the same communications devices. 00:03:26.835 --> 00:03:30.595 What that means, is that if the drug dealer's telephone calls 00:03:30.665 --> 00:03:33.252 or the terrorist telephone calls can be intercepted, 00:03:33.298 --> 00:03:34.622 then so can the rest of ours too. 00:03:35.110 --> 00:03:38.546 And I think we really need to ask, should a billion people around the world be 00:03:38.709 --> 00:03:41.239 using devices that are wire-tap friendly? 00:03:43.537 --> 00:03:50.040 The scenario of hacking of surveillance systems that I described is not imaginary. 00:03:50.040 --> 00:03:53.917 In 2009, the surveillance systems that Google and Microsoft built 00:03:54.057 --> 00:03:54.939 into the networks. 00:03:55.101 --> 00:03:58.793 The systems that they used to respond to lawful surveillance requests 00:03:58.909 --> 00:03:59.791 from the police. 00:03:59.954 --> 00:04:02.461 Those systems were compromised by the Chinese government 00:04:02.600 --> 00:04:05.388 because the Chinese government wanted to figure out which of their own 00:04:05.550 --> 00:04:07.662 agents the US government was monitoring. 00:04:08.569 --> 00:04:12.770 By the same token, in 2004 the surveillance system built 00:04:12.864 --> 00:04:16.835 into the network of Vodafone Greece -- Greece's largest telephone company 00:04:16.835 --> 00:04:21.084 was compromised by unknown entity and that feature, the surveillance feature 00:04:21.084 --> 00:04:24.009 was used to wire-tap the Greek Prime Minister and members 00:04:24.009 --> 00:04:25.774 of the Greek cabinet. 00:04:26.354 --> 00:04:28.514 The foreign government or hackers who did that were never caught. 00:04:30.325 --> 00:04:33.901 And really, this gets to the very problem with these surveillance features 00:04:34.016 --> 00:04:35.271 or back doors. NOTE Paragraph 00:04:35.781 --> 00:04:38.220 When you build a back door into a communications network 00:04:38.336 --> 00:04:41.145 or piece of technology,you have no way of controlling 00:04:41.145 --> 00:04:42.769 who's going to go through it. 00:04:43.489 --> 00:04:46.695 You have no way controlling whether it'll be used by your side 00:04:46.903 --> 00:04:47.855 or the other side. 00:04:48.018 --> 00:04:49.295 By good guys, or by bad guys. 00:04:50.340 --> 00:04:53.475 And so, for that reason, I think that it's better to build networks 00:04:53.707 --> 00:04:55.587 to be as secure as possible. 00:04:56.585 --> 00:04:59.837 Yes, this means that in the future, encryption is going to make 00:04:59.837 --> 00:05:01.160 wire-tapping more difficult. 00:05:01.670 --> 00:05:04.597 It means that the police are going to have a tougher time catching bad guys. 00:05:05.223 --> 00:05:09.194 But the alternative would mean to live in a world where anyone's calls 00:05:09.403 --> 00:05:12.096 or anyone's text messages could be surveilled by criminals, 00:05:12.398 --> 00:05:15.370 by stalkers and by foreign intelligence agencies. 00:05:15.625 --> 00:05:17.205 And I don't want to live in that kind of world. 00:05:18.342 --> 00:05:22.545 And so right now, you probably have the tools to thwart many kinds 00:05:22.615 --> 00:05:24.471 of government surveillance already on your phones 00:05:24.774 --> 00:05:26.307 and already in your pockets. 00:05:26.516 --> 00:05:29.859 You just might not realize how strong and how secure those tools are 00:05:30.161 --> 00:05:33.435 or how weak the other ways you've used to communicate really are. NOTE Paragraph 00:05:34.943 --> 00:05:39.193 And so, my message to you is this. 00:05:39.263 --> 00:05:40.655 We need to use these tools. 00:05:41.120 --> 00:05:43.000 We need to secure our telephone calls. 00:05:43.094 --> 00:05:44.743 We need to secure our text messages. 00:05:45.300 --> 00:05:47.203 I want you to use these tools. 00:05:47.366 --> 00:05:48.388 I want you to tell your loved ones. 00:05:48.666 --> 00:05:50.082 I want you to tell your colleagues. 00:05:50.245 --> 00:05:52.381 Use these encrypted communications tools. 00:05:52.614 --> 00:05:55.795 Don't just use them because they're cheap and easy, but use them because 00:05:56.026 --> 00:05:57.025 they are secure. 00:05:57.304 --> 00:05:58.558 Thank you. 00:05:58.837 --> 00:06:00.694 (Applause)