0:00:00.279,0:00:03.102 I study the future 0:00:03.102,0:00:07.387 of crime and terrorism, 0:00:07.387,0:00:09.747 and frankly, I'm afraid. 0:00:09.747,0:00:11.709 I'm afraid by what I see. 0:00:11.709,0:00:13.854 I sincerely want to believe 0:00:13.854,0:00:16.646 that technology can bring us 0:00:16.646,0:00:19.703 the techno-utopia that we've been promised, 0:00:19.703,0:00:21.439 but, you see, 0:00:21.439,0:00:24.552 I've spent a career in law enforcement, 0:00:24.552,0:00:27.325 and that's informed my perspective on things. 0:00:27.325,0:00:28.958 I've been a street police officer, 0:00:28.958,0:00:31.029 an undercover investigator, 0:00:31.029,0:00:33.037 a counter-terrorism strategist, 0:00:33.037,0:00:35.262 and I've worked in more than 70 countries 0:00:35.262,0:00:36.728 around the world. 0:00:36.728,0:00:38.384 I've had to see more than my fair share 0:00:38.384,0:00:41.629 of violence and the darker underbelly of society, 0:00:41.629,0:00:46.090 and that's informed my opinions. 0:00:46.090,0:00:47.677 My work with criminals and terrorists 0:00:47.677,0:00:49.797 has actually been highly educational. 0:00:49.797,0:00:52.506 They have taught me a lot, and I'd like to be able 0:00:52.506,0:00:56.405 to share some of these observations with you. 0:00:56.405,0:00:58.724 Today I'm going to show you the flip side 0:00:58.724,0:01:02.739 of all those technologies that we marvel at, 0:01:02.739,0:01:04.602 the ones that we love. 0:01:04.602,0:01:06.468 In the hands of the TED community, 0:01:06.468,0:01:09.381 these are awesome tools which will bring about 0:01:09.381,0:01:12.840 great change for our world, 0:01:12.840,0:01:15.566 but in the hands of suicide bombers, 0:01:15.566,0:01:19.002 the future can look quite different. 0:01:19.002,0:01:21.155 I started observing 0:01:21.155,0:01:23.051 technology and how criminals were using it 0:01:23.051,0:01:25.042 as a young patrol officer. 0:01:25.042,0:01:29.498 In those days, this was the height of technology. 0:01:29.498,0:01:31.067 Laugh though you will, 0:01:31.067,0:01:32.362 all the drug dealers and gang members 0:01:32.362,0:01:34.563 with whom I dealt had one of these 0:01:34.563,0:01:38.854 long before any police officer I knew did. 0:01:38.854,0:01:41.714 Twenty years later, criminals are still using 0:01:41.714,0:01:45.597 mobile phones, but they're also building 0:01:45.597,0:01:47.946 their own mobile phone networks, 0:01:47.946,0:01:50.178 like this one, which has been deployed 0:01:50.178,0:01:53.978 in all 31 states of Mexico by the narcos. 0:01:53.978,0:01:56.114 They have a national encrypted 0:01:56.114,0:01:59.323 radio communications system. 0:01:59.323,0:02:01.433 Think about that. 0:02:01.433,0:02:04.815 Think about the innovation that went into that. 0:02:04.815,0:02:07.712 Think about the infrastructure to build it. 0:02:07.712,0:02:09.117 And then think about this: 0:02:09.117,0:02:13.167 Why can't I get a cell phone signal in San Francisco? (Laughter) 0:02:13.167,0:02:18.254 How is this possible? (Laughter) It makes no sense. (Applause) 0:02:18.254,0:02:19.612 We consistently underestimate 0:02:19.612,0:02:22.916 what criminals and terrorists can do. 0:02:22.916,0:02:24.524 Technology has made our world 0:02:24.524,0:02:26.604 increasingly open, and for the most part, 0:02:26.604,0:02:28.957 that's great, but all of this openness 0:02:28.957,0:02:31.002 may have unintended consequences. 0:02:31.002,0:02:35.718 Consider the 2008 terrorist attack on Mumbai. 0:02:35.718,0:02:38.876 The men that carried that attack out were armed 0:02:38.876,0:02:42.346 with AK-47s, explosives and hand grenades. 0:02:42.346,0:02:44.178 They threw these hand grenades 0:02:44.178,0:02:47.378 at innocent people as they sat eating in cafes 0:02:47.378,0:02:52.231 and waited to catch trains on their way home from work. 0:02:52.231,0:02:55.584 But heavy artillery is nothing new in terrorist operations. 0:02:55.584,0:02:57.988 Guns and bombs are nothing new. 0:02:57.988,0:02:59.224 What was different this time 0:02:59.224,0:03:01.912 is the way that the terrorists used 0:03:01.912,0:03:04.648 modern information communications technologies 0:03:04.648,0:03:10.004 to locate additional victims and slaughter them. 0:03:10.004,0:03:12.217 They were armed with mobile phones. 0:03:12.217,0:03:13.816 They had BlackBerries. 0:03:13.816,0:03:16.053 They had access to satellite imagery. 0:03:16.053,0:03:21.018 They had satellite phones, and they even had night vision goggles. 0:03:21.018,0:03:24.005 But perhaps their greatest innovation was this. 0:03:24.005,0:03:26.093 We've all seen pictures like this 0:03:26.093,0:03:29.449 on television and in the news. This is an operations center. 0:03:29.449,0:03:31.876 And the terrorists built their very own op center 0:03:31.876,0:03:35.307 across the border in Pakistan, 0:03:35.307,0:03:36.588 where they monitored the BBC, 0:03:36.588,0:03:41.178 al Jazeera, CNN and Indian local stations. 0:03:41.178,0:03:46.206 They also monitored the Internet and social media 0:03:46.206,0:03:48.328 to monitor the progress of their attacks 0:03:48.328,0:03:50.698 and how many people they had killed. 0:03:50.698,0:03:53.766 They did all of this in real time. 0:03:53.766,0:03:57.104 The innovation of the terrorist operations center 0:03:57.104,0:04:01.078 gave terrorists unparalleled situational awareness 0:04:01.078,0:04:03.304 and tactical advantage over the police 0:04:03.304,0:04:05.947 and over the government. 0:04:05.947,0:04:07.212 What did they do with this? 0:04:07.212,0:04:09.188 They used it to great effect. 0:04:09.188,0:04:11.237 At one point during the 60-hour siege, 0:04:11.237,0:04:12.900 the terrorists were going room to room 0:04:12.900,0:04:15.961 trying to find additional victims. 0:04:15.961,0:04:17.612 They came upon a suite on the top floor 0:04:17.612,0:04:19.517 of the hotel, and they kicked down the door 0:04:19.517,0:04:22.404 and they found a man hiding by his bed. 0:04:22.404,0:04:24.431 And they said to him, "Who are you, 0:04:24.431,0:04:25.820 and what are you doing here?" 0:04:25.820,0:04:27.540 And the man replied, 0:04:27.540,0:04:31.214 "I'm just an innocent schoolteacher." 0:04:31.214,0:04:33.378 Of course, the terrorists knew 0:04:33.378,0:04:37.223 that no Indian schoolteacher stays at a suite in the Taj. 0:04:37.223,0:04:38.815 They picked up his identification, 0:04:38.815,0:04:42.338 and they phoned his name in to the terrorist war room, 0:04:42.338,0:04:45.162 where the terrorist war room Googled him, 0:04:45.162,0:04:47.803 and found a picture and called their operatives 0:04:47.803,0:04:48.996 on the ground and said, 0:04:48.996,0:04:53.675 "Your hostage, is he heavyset? 0:04:53.675,0:04:58.153 Is he bald in front? Does he wear glasses?" 0:04:58.153,0:05:02.759 "Yes, yes, yes," came the answers. 0:05:02.759,0:05:04.746 The op center had found him and they had a match. 0:05:04.746,0:05:06.113 He was not a schoolteacher. 0:05:06.113,0:05:09.987 He was the second-wealthiest businessman in India, 0:05:09.987,0:05:11.632 and after discovering this information, 0:05:11.632,0:05:14.687 the terrorist war room gave the order 0:05:14.687,0:05:17.313 to the terrorists on the ground in Mumbai. 0:05:17.313,0:05:20.439 ("Kill him.") 0:05:20.439,0:05:23.880 We all worry about our privacy settings 0:05:23.880,0:05:25.616 on Facebook, 0:05:25.616,0:05:28.041 but the fact of the matter is, 0:05:28.041,0:05:31.503 our openness can be used against us. 0:05:31.503,0:05:33.409 Terrorists are doing this. 0:05:33.409,0:05:36.915 A search engine can determine 0:05:36.915,0:05:40.870 who shall live and who shall die. 0:05:40.870,0:05:43.899 This is the world that we live in. 0:05:43.899,0:05:45.468 During the Mumbai siege, 0:05:45.468,0:05:48.094 terrorists were so dependent on technology 0:05:48.094,0:05:50.340 that several witnesses reported that 0:05:50.340,0:05:53.219 as the terrorists were shooting hostages with one hand, 0:05:53.219,0:05:55.595 they were checking their mobile phone messages 0:05:55.595,0:05:58.050 in the very other hand. 0:05:58.050,0:06:01.200 In the end, 300 people were gravely wounded 0:06:01.200,0:06:05.105 and over 172 men, women and children 0:06:05.105,0:06:09.456 lost their lives that day. 0:06:09.456,0:06:11.221 Think about what happened. 0:06:11.221,0:06:14.232 During this 60-hour siege on Mumbai, 0:06:14.232,0:06:18.647 10 men armed not just with weapons, 0:06:18.647,0:06:20.541 but with technology, 0:06:20.541,0:06:24.071 were able to bring a city of 20 million people 0:06:24.071,0:06:26.233 to a standstill. 0:06:26.233,0:06:28.203 Ten people brought 20 million people 0:06:28.203,0:06:32.397 to a standstill, and this traveled around the world. 0:06:32.397,0:06:38.707 This is what radicals can do with openness. 0:06:38.707,0:06:41.225 This was done nearly four years ago. 0:06:41.225,0:06:42.766 What could terrorists do today 0:06:42.766,0:06:45.679 with the technologies available that we have? 0:06:45.679,0:06:49.014 What will they do tomorrow? 0:06:49.014,0:06:51.393 The ability of one to affect many 0:06:51.393,0:06:53.809 is scaling exponentially, 0:06:53.809,0:06:58.090 and it's scaling for good and it's scaling for evil. 0:06:58.090,0:07:00.344 It's not just about terrorism, though. 0:07:00.344,0:07:02.654 There's also been a big paradigm shift in crime. 0:07:02.654,0:07:06.947 You see, you can now commit more crime as well. 0:07:06.947,0:07:09.227 In the old days, it was a knife and a gun. 0:07:09.227,0:07:11.619 Then criminals moved to robbing trains. 0:07:11.619,0:07:15.246 You could rob 200 people on a train, a great innovation. 0:07:15.259,0:07:16.960 Moving forward, the Internet 0:07:16.960,0:07:19.128 allowed things to scale even more. 0:07:19.128,0:07:20.680 In fact, many of you will remember 0:07:20.680,0:07:22.416 the recent Sony PlayStation hack. 0:07:22.416,0:07:28.913 In that incident, over 100 million people were robbed. 0:07:28.913,0:07:30.639 Think about that. 0:07:30.639,0:07:32.105 When in the history of humanity 0:07:32.105,0:07:34.307 has it ever been possible for one person 0:07:34.307,0:07:39.706 to rob 100 million? 0:07:39.706,0:07:41.505 Of course, it's not just about stealing things. 0:07:41.505,0:07:43.792 There are other avenues of technology 0:07:43.792,0:07:45.237 that criminals can exploit. 0:07:45.237,0:07:48.529 Many of you will remember this super cute video 0:07:48.529,0:07:50.921 from the last TED, 0:07:50.921,0:07:55.991 but not all quadcopter swarms are so nice and cute. 0:07:55.991,0:07:58.138 They don't all have drumsticks. 0:07:58.138,0:07:59.996 Some can be armed with HD cameras 0:07:59.996,0:08:02.499 and do countersurveillance on protesters, 0:08:02.499,0:08:05.395 or, as in this little bit of movie magic, 0:08:05.395,0:08:09.098 quadcopters can be loaded with firearms 0:08:09.098,0:08:12.656 and automatic weapons. 0:08:12.656,0:08:15.369 Little robots are cute when they play music to you. 0:08:15.369,0:08:18.137 When they swarm and chase you down the block 0:08:18.137,0:08:21.769 to shoot you, a little bit less so. 0:08:21.769,0:08:23.818 Of course, criminals and terrorists weren't the first 0:08:23.818,0:08:26.656 to give guns to robots. We know where that started. 0:08:26.656,0:08:27.992 But they're adapting quickly. 0:08:27.992,0:08:29.972 Recently, the FBI arrested 0:08:29.972,0:08:31.779 an al Qaeda affiliate in the United States, 0:08:31.779,0:08:33.700 who was planning on using these remote-controlled 0:08:33.700,0:08:36.627 drone aircraft to fly C4 explosives 0:08:36.627,0:08:39.236 into government buildings in the United States. 0:08:39.236,0:08:44.623 By the way, these travel at over 600 miles an hour. 0:08:44.623,0:08:46.997 Every time a new technology is being introduced, 0:08:46.997,0:08:49.638 criminals are there to exploit it. 0:08:49.638,0:08:51.085 We've all seen 3D printers. 0:08:51.085,0:08:52.517 We know with them that you can print 0:08:52.517,0:08:55.349 in many materials ranging from plastic 0:08:55.349,0:08:59.714 to chocolate to metal and even concrete. 0:08:59.714,0:09:01.100 With great precision 0:09:01.100,0:09:03.159 I actually was able to make this 0:09:03.159,0:09:04.708 just the other day, a very cute little ducky. 0:09:10.083,0:09:11.927 But I wonder to myself, 0:09:11.927,0:09:18.840 for those people that strap bombs to their chests 0:09:18.840,0:09:19.921 and blow themselves up, 0:09:19.921,0:09:23.678 how might they use 3D printers? 0:09:23.678,0:09:27.791 Perhaps like this. 0:09:27.791,0:09:29.984 You see, if you can print in metal, 0:09:29.984,0:09:33.331 you can print one of these, 0:09:33.331,0:09:35.798 and in fact 0:09:39.490,0:09:42.733 you can also print one of these too. 0:09:45.533,0:09:50.084 The UK I know has some very strict firearms laws. 0:09:50.084,0:09:52.205 You needn't bring the gun into the UK anymore. 0:09:52.205,0:09:53.860 You just bring the 3D printer 0:09:53.860,0:09:56.695 and print the gun while you're here, 0:09:56.695,0:09:59.800 and, of course, the magazines for your bullets. 0:09:59.800,0:10:01.336 But as these get bigger in the future, 0:10:01.336,0:10:03.481 what other items will you be able to print? 0:10:03.481,0:10:06.769 The technologies are allowing bigger printers. 0:10:06.769,0:10:08.117 As we move forward, 0:10:08.117,0:10:10.809 we'll see new technologies also, like the Internet of Things. 0:10:10.809,0:10:12.840 Every day we're connecting more and more of our lives 0:10:12.840,0:10:15.433 to the Internet, which means 0:10:15.433,0:10:19.659 that the Internet of Things will soon be 0:10:19.659,0:10:21.423 the Internet of Things To Be Hacked. 0:10:21.423,0:10:23.446 All of the physical objects in our space 0:10:23.446,0:10:26.310 are being transformed into information technologies, 0:10:26.310,0:10:29.865 and that has a radical implication for our security, 0:10:29.865,0:10:32.875 because more connections to more devices 0:10:32.875,0:10:35.454 means more vulnerabilities. 0:10:35.454,0:10:37.202 Criminals understand this. 0:10:37.202,0:10:39.081 Terrorists understand this. Hackers understand this. 0:10:39.081,0:10:42.244 If you control the code, you control the world. 0:10:42.244,0:10:46.915 This is the future that awaits us. 0:10:46.915,0:10:49.752 There has not yet been an operating system 0:10:49.752,0:10:52.352 or a technology that hasn't been hacked. 0:10:52.352,0:10:55.090 That's troubling, since the human body itself 0:10:55.090,0:10:58.188 is now becoming an information technology. 0:10:58.188,0:11:01.755 As we've seen here, we're transforming ourselves into cyborgs. 0:11:01.755,0:11:04.307 Every year, thousands of cochlear implants, 0:11:04.307,0:11:06.525 diabetic pumps, pacemakers 0:11:06.525,0:11:08.740 and defibrillators are being implanted in people. 0:11:08.740,0:11:11.388 In the United States, there are 60,000 people 0:11:11.388,0:11:14.350 who have a pacemaker that connects to the Internet. 0:11:14.350,0:11:17.714 The defibrillators allow a physician at a distance 0:11:17.714,0:11:19.504 to give a shock to a heart 0:11:19.504,0:11:21.854 in case a patient needs it. 0:11:21.854,0:11:23.945 But if you don't need it, 0:11:23.945,0:11:25.721 and somebody else gives you the shock, 0:11:25.721,0:11:29.112 it's not a good thing. 0:11:29.112,0:11:32.734 Of course, we're going to go even deeper than the human body. 0:11:32.734,0:11:34.984 We're going down to the cellular level these days. 0:11:34.984,0:11:37.127 Up until this point, all the technologies 0:11:37.127,0:11:40.915 I've been talking about have been silicon-based, ones and zeroes, 0:11:40.922,0:11:43.613 but there's another operating system out there: 0:11:43.613,0:11:48.309 the original operating system, DNA. 0:11:48.309,0:11:52.749 And to hackers, DNA is just another operating system 0:11:52.749,0:11:54.748 waiting to be hacked. 0:11:54.748,0:11:56.244 It's a great challenge for them. 0:11:56.244,0:11:57.645 There are people already working on hacking the software of life, 0:11:59.544,0:12:02.501 and while most of them are doing this to great good 0:12:02.501,0:12:03.902 and to help us all, 0:12:03.902,0:12:07.438 some won't be. 0:12:07.438,0:12:09.100 So how will criminals abuse this? 0:12:09.100,0:12:11.383 Well, with synthetic biology you can do some pretty neat things. 0:12:11.383,0:12:14.579 For example, I predict that we will move away 0:12:14.579,0:12:17.690 from a plant-based narcotics world 0:12:17.690,0:12:20.749 to a synthetic one. Why do you need the plants anymore? 0:12:20.749,0:12:23.866 You can just take the DNA code from marijuana 0:12:23.866,0:12:28.658 or poppies or coca leaves 0:12:28.658,0:12:30.978 and cut and past that gene 0:12:30.978,0:12:33.655 and put it into yeast, 0:12:33.655,0:12:35.057 and you can take those yeast 0:12:35.057,0:12:38.329 and make them make the cocaine for you, 0:12:38.329,0:12:42.113 or the marijuana, or any other drug. 0:12:42.113,0:12:43.897 So how we use yeast in the future 0:12:43.897,0:12:45.787 is going to be really interesting. 0:12:45.787,0:12:48.131 In fact, we may have some really interesting bread and beer 0:12:48.131,0:12:51.954 as we go into this next century. 0:12:51.954,0:12:55.952 The cost of sequencing the human genome is dropping precipitously. 0:12:55.952,0:12:58.340 It was proceeding at Moore's Law pace, 0:12:58.340,0:13:00.306 but then in 2008, something changed. 0:13:00.306,0:13:01.978 The technologies got better, 0:13:01.978,0:13:05.824 and now DNA sequencing is proceeding at a pace 0:13:05.824,0:13:08.942 five times that of Moore's Law. 0:13:08.942,0:13:12.766 That has significant implications for us. 0:13:12.766,0:13:15.509 It took us 30 years to get from 0:13:15.509,0:13:17.665 the introduction of the personal computer 0:13:17.665,0:13:19.894 to the level of cybercrime we have today, 0:13:19.894,0:13:23.521 but looking at how biology is proceeding so rapidly, 0:13:23.521,0:13:25.185 and knowing criminals and terrorists as I do, 0:13:25.185,0:13:28.054 we may get there a lot faster 0:13:28.054,0:13:29.923 with biocrime in the future. 0:13:29.923,0:13:31.962 It will be easy for anybody to go ahead 0:13:31.962,0:13:33.842 and print their own bio-virus, 0:13:33.842,0:13:36.604 enhanced versions of ebola or anthrax, 0:13:36.604,0:13:38.362 weaponized flu. 0:13:38.362,0:13:41.151 We recently saw a case where some researchers 0:13:41.151,0:13:46.177 made the H5N1 avian influenza virus more potent. 0:13:46.177,0:13:49.643 It already has a 70 percent mortality rate 0:13:49.643,0:13:51.233 if you get it, but it's hard to get. 0:13:51.233,0:13:54.041 Engineers, by moving around a small number 0:13:54.041,0:13:55.697 of genetic changes, 0:13:55.697,0:13:57.396 were able to weaponize it 0:13:57.396,0:14:00.658 and make it much more easy for human beings to catch, 0:14:00.658,0:14:02.841 so that not thousands of people would die, 0:14:02.841,0:14:04.554 but tens of millions. 0:14:04.554,0:14:07.044 You see, you can go ahead and create 0:14:07.044,0:14:09.025 new pandemics, and the researchers who did this 0:14:09.025,0:14:10.537 were so proud of their accomplishments, 0:14:10.537,0:14:12.426 they wanted to publish it openly 0:14:12.426,0:14:14.529 so that everybody could see this 0:14:14.529,0:14:18.673 and get access to this information. 0:14:18.673,0:14:20.468 But it goes deeper than that. 0:14:20.468,0:14:22.410 DNA researcher Andrew Hessel 0:14:22.410,0:14:23.807 has pointed out quite rightly 0:14:23.807,0:14:26.090 that if you can use cancer treatments, 0:14:26.090,0:14:27.218 modern cancer treatments, 0:14:27.218,0:14:30.167 to go after one cell while leaving all the other cells 0:14:30.167,0:14:31.823 around it intact, 0:14:31.823,0:14:35.967 then you can also go after any one person's cell. 0:14:35.967,0:14:37.945 Personalized cancer treatments 0:14:37.945,0:14:40.559 are the flip side of personalized bioweapons, 0:14:40.559,0:14:43.945 which means you can attack any one individual, 0:14:43.945,0:14:48.128 including all the people in this picture. 0:14:48.128,0:14:52.256 How will we protect them in the future? 0:14:52.256,0:14:55.066 What to do? What to do about all this? 0:14:55.066,0:14:57.561 That's what I get asked all the time. 0:14:57.561,0:14:59.148 For those of you who follow me on Twitter, 0:14:59.148,0:15:03.678 I will be tweeting out the answer later on today. (Laughter) 0:15:03.678,0:15:06.313 Actually, it's a bit more complex than that, 0:15:06.313,0:15:08.392 and there are no magic bullets. 0:15:08.392,0:15:10.104 I don't have all the answers, 0:15:10.104,0:15:11.768 but I know a few things. 0:15:11.768,0:15:14.465 In the wake of 9/11, 0:15:14.465,0:15:17.255 the best security minds 0:15:17.255,0:15:19.239 put together all their innovation 0:15:19.239,0:15:23.378 and this is what they created for security. 0:15:23.378,0:15:27.399 If you're expecting the people who built this to protect you 0:15:27.399,0:15:31.115 from the coming robopocalypse — (Laughter) 0:15:31.115,0:15:34.067 — uh, you may want to have a backup plan. (Laughter) 0:15:34.067,0:15:40.266 Just saying. Just think about that. (Applause) 0:15:40.266,0:15:43.185 Law enforcement is currently a closed system. 0:15:43.185,0:15:45.987 It's nation-based, while the threat is international. 0:15:45.987,0:15:49.935 Policing doesn't scale globally. At least, it hasn't, 0:15:49.935,0:15:54.218 and our current system of guns, border guards, big gates and fences 0:15:54.218,0:15:57.329 are outdated in the new world into which we're moving. 0:15:57.329,0:15:59.605 So how might we prepare for some of these specific threats, 0:15:59.605,0:16:02.028 like attacking a president or a prime minister? 0:16:02.028,0:16:04.165 This would be the natural government response, 0:16:04.165,0:16:06.442 to hide away all our government leaders 0:16:06.442,0:16:08.253 in hermetically sealed bubbles. 0:16:08.253,0:16:10.085 But this is not going to work. 0:16:10.085,0:16:13.221 The cost of doing a DNA sequence is going to be trivial. 0:16:13.221,0:16:16.466 Anybody will have it and we will all have them in the future. 0:16:16.466,0:16:19.919 So maybe there's a more radical way that we can look at this. 0:16:19.923,0:16:21.851 What happens if we were to take 0:16:21.851,0:16:25.051 the President's DNA, or a king or queen's, 0:16:25.051,0:16:27.387 and put it out to a group of a few hundred 0:16:27.387,0:16:29.283 trusted researchers so they could 0:16:29.283,0:16:32.219 study that DNA and do penetration testing against it 0:16:32.219,0:16:34.427 as a means of helping our leaders? 0:16:34.427,0:16:36.684 Or what if we sent it out to a few thousand? 0:16:36.684,0:16:39.346 Or, controversially, and not without its risks, 0:16:39.346,0:16:42.205 what happens if we just gave it to the whole public? 0:16:42.205,0:16:45.770 Then we could all be engaged in helping. 0:16:45.770,0:16:48.386 We've already seen examples of this working well. 0:16:48.386,0:16:51.314 The Organized Crime and Corruption Reporting Project 0:16:51.314,0:16:52.986 is staffed by journalists and citizens 0:16:52.986,0:16:54.722 where they are crowd-sourcing 0:16:54.722,0:16:57.335 what dictators and terrorists are doing 0:16:57.335,0:16:59.017 with public funds around the world, 0:16:59.017,0:17:00.684 and, in a more dramatic case, 0:17:00.684,0:17:02.988 we've seen in Mexico, 0:17:02.988,0:17:04.612 a country that has been racked 0:17:04.612,0:17:08.625 by 50,000 narcotics-related murders 0:17:08.625,0:17:10.391 in the past six years. 0:17:10.391,0:17:11.766 They're killing so many people 0:17:11.766,0:17:14.046 they can't even afford to bury them all 0:17:14.046,0:17:15.815 in anything but these unmarked graves 0:17:15.815,0:17:19.220 like this one outside of Ciudad Juarez. 0:17:19.220,0:17:22.328 What can we do about this? The government has proven ineffective. 0:17:22.328,0:17:25.465 So in Mexico, citizens, at great risk to themselves, 0:17:25.465,0:17:29.544 are fighting back to build an effective solution. 0:17:29.544,0:17:33.728 They're crowd-mapping the activities of the drug dealers. 0:17:33.728,0:17:35.520 Whether or not you realize it, 0:17:35.520,0:17:39.205 we are at the dawn of a technological arms race, 0:17:39.205,0:17:40.983 an arms race between people 0:17:40.983,0:17:42.745 who are using technology for good 0:17:42.745,0:17:44.953 and those who are using it for ill. 0:17:44.953,0:17:49.314 The threat is serious, and the time to prepare for it is now. 0:17:49.314,0:17:52.747 I can assure you that the terrorists and criminals are. 0:17:52.747,0:17:54.850 My personal belief is that, 0:17:54.850,0:17:56.795 rather than having a small, elite force 0:17:56.795,0:17:58.835 of highly trained government agents 0:17:58.835,0:18:00.556 here to protect us all, 0:18:00.556,0:18:02.259 we're much better off 0:18:02.259,0:18:04.338 having average and ordinary citizens 0:18:04.338,0:18:06.762 approaching this problem as a group 0:18:06.762,0:18:08.075 and seeing what we can do. 0:18:08.075,0:18:09.324 If we all do our part, 0:18:09.324,0:18:11.651 I think we'll be in a much better space. 0:18:11.651,0:18:13.118 The tools to change the world 0:18:13.118,0:18:14.811 are in everybody's hands. 0:18:14.811,0:18:17.650 How we use them is not just up to me, 0:18:17.650,0:18:20.132 it's up to all of us. 0:18:20.132,0:18:22.765 This was a technology I would frequently deploy 0:18:22.765,0:18:24.686 as a police officer. 0:18:24.686,0:18:28.461 This technology has become outdated in our current world. 0:18:28.474,0:18:31.186 It doesn't scale, it doesn't work globally, 0:18:31.186,0:18:33.258 and it surely doesn't work virtually. 0:18:33.258,0:18:36.526 We've seen paradigm shifts in crime and terrorism. 0:18:36.526,0:18:40.873 They call for a shift to a more open form 0:18:40.873,0:18:45.770 and a more participatory form of law enforcement. 0:18:45.770,0:18:48.409 So I invite you to join me. 0:18:48.409,0:18:53.597 After all, public safety is too important to leave to the professionals. 0:18:53.597,0:18:56.404 Thank you. (Applause) 0:18:56.404,0:19:04.285 (Applause)