[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.28,0:00:03.10,Default,,0000,0000,0000,,I study the future Dialogue: 0,0:00:03.10,0:00:07.39,Default,,0000,0000,0000,,of crime and terrorism, Dialogue: 0,0:00:07.39,0:00:09.75,Default,,0000,0000,0000,,and frankly, I'm afraid. Dialogue: 0,0:00:09.75,0:00:11.71,Default,,0000,0000,0000,,I'm afraid by what I see. Dialogue: 0,0:00:11.71,0:00:13.85,Default,,0000,0000,0000,,I sincerely want to believe Dialogue: 0,0:00:13.85,0:00:16.65,Default,,0000,0000,0000,,that technology can bring us Dialogue: 0,0:00:16.65,0:00:19.70,Default,,0000,0000,0000,,the techno-utopia that we've been promised, Dialogue: 0,0:00:19.70,0:00:21.44,Default,,0000,0000,0000,,but, you see, Dialogue: 0,0:00:21.44,0:00:24.55,Default,,0000,0000,0000,,I've spent a career in law enforcement, Dialogue: 0,0:00:24.55,0:00:27.32,Default,,0000,0000,0000,,and that's informed my perspective on things. Dialogue: 0,0:00:27.32,0:00:28.96,Default,,0000,0000,0000,,I've been a street police officer, Dialogue: 0,0:00:28.96,0:00:31.03,Default,,0000,0000,0000,,an undercover investigator, Dialogue: 0,0:00:31.03,0:00:33.04,Default,,0000,0000,0000,,a counter-terrorism strategist, Dialogue: 0,0:00:33.04,0:00:35.26,Default,,0000,0000,0000,,and I've worked in more than 70 countries Dialogue: 0,0:00:35.26,0:00:36.73,Default,,0000,0000,0000,,around the world. Dialogue: 0,0:00:36.73,0:00:38.38,Default,,0000,0000,0000,,I've had to see more than my fair share Dialogue: 0,0:00:38.38,0:00:41.63,Default,,0000,0000,0000,,of violence and the darker underbelly of society, Dialogue: 0,0:00:41.63,0:00:46.09,Default,,0000,0000,0000,,and that's informed my opinions. Dialogue: 0,0:00:46.09,0:00:47.68,Default,,0000,0000,0000,,My work with criminals and terrorists Dialogue: 0,0:00:47.68,0:00:49.80,Default,,0000,0000,0000,,has actually been highly educational. Dialogue: 0,0:00:49.80,0:00:52.51,Default,,0000,0000,0000,,They have taught me a lot, and I'd like to be able Dialogue: 0,0:00:52.51,0:00:56.40,Default,,0000,0000,0000,,to share some of these observations with you. Dialogue: 0,0:00:56.40,0:00:58.72,Default,,0000,0000,0000,,Today I'm going to show you the flip side Dialogue: 0,0:00:58.72,0:01:02.74,Default,,0000,0000,0000,,of all those technologies that we marvel at, Dialogue: 0,0:01:02.74,0:01:04.60,Default,,0000,0000,0000,,the ones that we love. Dialogue: 0,0:01:04.60,0:01:06.47,Default,,0000,0000,0000,,In the hands of the TED community, Dialogue: 0,0:01:06.47,0:01:09.38,Default,,0000,0000,0000,,these are awesome tools which will bring about Dialogue: 0,0:01:09.38,0:01:12.84,Default,,0000,0000,0000,,great change for our world, Dialogue: 0,0:01:12.84,0:01:15.57,Default,,0000,0000,0000,,but in the hands of suicide bombers, Dialogue: 0,0:01:15.57,0:01:19.00,Default,,0000,0000,0000,,the future can look quite different. Dialogue: 0,0:01:19.00,0:01:21.16,Default,,0000,0000,0000,,I started observing Dialogue: 0,0:01:21.16,0:01:23.05,Default,,0000,0000,0000,,technology and how criminals were using it Dialogue: 0,0:01:23.05,0:01:25.04,Default,,0000,0000,0000,,as a young patrol officer. Dialogue: 0,0:01:25.04,0:01:29.50,Default,,0000,0000,0000,,In those days, this was the height of technology. Dialogue: 0,0:01:29.50,0:01:31.07,Default,,0000,0000,0000,,Laugh though you will, Dialogue: 0,0:01:31.07,0:01:32.36,Default,,0000,0000,0000,,all the drug dealers and gang members Dialogue: 0,0:01:32.36,0:01:34.56,Default,,0000,0000,0000,,with whom I dealt had one of these Dialogue: 0,0:01:34.56,0:01:38.85,Default,,0000,0000,0000,,long before any police officer I knew did. Dialogue: 0,0:01:38.85,0:01:41.71,Default,,0000,0000,0000,,Twenty years later, criminals are still using Dialogue: 0,0:01:41.71,0:01:45.60,Default,,0000,0000,0000,,mobile phones, but they're also building Dialogue: 0,0:01:45.60,0:01:47.95,Default,,0000,0000,0000,,their own mobile phone networks, Dialogue: 0,0:01:47.95,0:01:50.18,Default,,0000,0000,0000,,like this one, which has been deployed Dialogue: 0,0:01:50.18,0:01:53.98,Default,,0000,0000,0000,,in all 31 states of Mexico by the narcos. Dialogue: 0,0:01:53.98,0:01:56.11,Default,,0000,0000,0000,,They have a national encrypted Dialogue: 0,0:01:56.11,0:01:59.32,Default,,0000,0000,0000,,radio communications system. Dialogue: 0,0:01:59.32,0:02:01.43,Default,,0000,0000,0000,,Think about that. Dialogue: 0,0:02:01.43,0:02:04.82,Default,,0000,0000,0000,,Think about the innovation that went into that. Dialogue: 0,0:02:04.82,0:02:07.71,Default,,0000,0000,0000,,Think about the infrastructure to build it. Dialogue: 0,0:02:07.71,0:02:09.12,Default,,0000,0000,0000,,And then think about this: Dialogue: 0,0:02:09.12,0:02:13.17,Default,,0000,0000,0000,,Why can't I get a cell phone signal in San Francisco? (Laughter) Dialogue: 0,0:02:13.17,0:02:18.25,Default,,0000,0000,0000,,How is this possible? (Laughter) It makes no sense. (Applause) Dialogue: 0,0:02:18.25,0:02:19.61,Default,,0000,0000,0000,,We consistently underestimate Dialogue: 0,0:02:19.61,0:02:22.92,Default,,0000,0000,0000,,what criminals and terrorists can do. Dialogue: 0,0:02:22.92,0:02:24.52,Default,,0000,0000,0000,,Technology has made our world Dialogue: 0,0:02:24.52,0:02:26.60,Default,,0000,0000,0000,,increasingly open, and for the most part, Dialogue: 0,0:02:26.60,0:02:28.96,Default,,0000,0000,0000,,that's great, but all of this openness Dialogue: 0,0:02:28.96,0:02:31.00,Default,,0000,0000,0000,,may have unintended consequences. Dialogue: 0,0:02:31.00,0:02:35.72,Default,,0000,0000,0000,,Consider the 2008 terrorist attack on Mumbai. Dialogue: 0,0:02:35.72,0:02:38.88,Default,,0000,0000,0000,,The men that carried that attack out were armed Dialogue: 0,0:02:38.88,0:02:42.35,Default,,0000,0000,0000,,with AK-47s, explosives and hand grenades. Dialogue: 0,0:02:42.35,0:02:44.18,Default,,0000,0000,0000,,They threw these hand grenades Dialogue: 0,0:02:44.18,0:02:47.38,Default,,0000,0000,0000,,at innocent people as they sat eating in cafes Dialogue: 0,0:02:47.38,0:02:52.23,Default,,0000,0000,0000,,and waited to catch trains on their way home from work. Dialogue: 0,0:02:52.23,0:02:55.58,Default,,0000,0000,0000,,But heavy artillery is nothing new in terrorist operations. Dialogue: 0,0:02:55.58,0:02:57.99,Default,,0000,0000,0000,,Guns and bombs are nothing new. Dialogue: 0,0:02:57.99,0:02:59.22,Default,,0000,0000,0000,,What was different this time Dialogue: 0,0:02:59.22,0:03:01.91,Default,,0000,0000,0000,,is the way that the terrorists used Dialogue: 0,0:03:01.91,0:03:04.65,Default,,0000,0000,0000,,modern information communications technologies Dialogue: 0,0:03:04.65,0:03:10.00,Default,,0000,0000,0000,,to locate additional victims and slaughter them. Dialogue: 0,0:03:10.00,0:03:12.22,Default,,0000,0000,0000,,They were armed with mobile phones. Dialogue: 0,0:03:12.22,0:03:13.82,Default,,0000,0000,0000,,They had BlackBerries. Dialogue: 0,0:03:13.82,0:03:16.05,Default,,0000,0000,0000,,They had access to satellite imagery. Dialogue: 0,0:03:16.05,0:03:21.02,Default,,0000,0000,0000,,They had satellite phones, and they even had night vision goggles. Dialogue: 0,0:03:21.02,0:03:24.00,Default,,0000,0000,0000,,But perhaps their greatest innovation was this. Dialogue: 0,0:03:24.00,0:03:26.09,Default,,0000,0000,0000,,We've all seen pictures like this Dialogue: 0,0:03:26.09,0:03:29.45,Default,,0000,0000,0000,,on television and in the news. This is an operations center. Dialogue: 0,0:03:29.45,0:03:31.88,Default,,0000,0000,0000,,And the terrorists built their very own op center Dialogue: 0,0:03:31.88,0:03:35.31,Default,,0000,0000,0000,,across the border in Pakistan, Dialogue: 0,0:03:35.31,0:03:36.59,Default,,0000,0000,0000,,where they monitored the BBC, Dialogue: 0,0:03:36.59,0:03:41.18,Default,,0000,0000,0000,,al Jazeera, CNN and Indian local stations. Dialogue: 0,0:03:41.18,0:03:46.21,Default,,0000,0000,0000,,They also monitored the Internet and social media Dialogue: 0,0:03:46.21,0:03:48.33,Default,,0000,0000,0000,,to monitor the progress of their attacks Dialogue: 0,0:03:48.33,0:03:50.70,Default,,0000,0000,0000,,and how many people they had killed. Dialogue: 0,0:03:50.70,0:03:53.77,Default,,0000,0000,0000,,They did all of this in real time. Dialogue: 0,0:03:53.77,0:03:57.10,Default,,0000,0000,0000,,The innovation of the terrorist operations center Dialogue: 0,0:03:57.10,0:04:01.08,Default,,0000,0000,0000,,gave terrorists unparalleled situational awareness Dialogue: 0,0:04:01.08,0:04:03.30,Default,,0000,0000,0000,,and tactical advantage over the police Dialogue: 0,0:04:03.30,0:04:05.95,Default,,0000,0000,0000,,and over the government. Dialogue: 0,0:04:05.95,0:04:07.21,Default,,0000,0000,0000,,What did they do with this? Dialogue: 0,0:04:07.21,0:04:09.19,Default,,0000,0000,0000,,They used it to great effect. Dialogue: 0,0:04:09.19,0:04:11.24,Default,,0000,0000,0000,,At one point during the 60-hour siege, Dialogue: 0,0:04:11.24,0:04:12.90,Default,,0000,0000,0000,,the terrorists were going room to room Dialogue: 0,0:04:12.90,0:04:15.96,Default,,0000,0000,0000,,trying to find additional victims. Dialogue: 0,0:04:15.96,0:04:17.61,Default,,0000,0000,0000,,They came upon a suite on the top floor Dialogue: 0,0:04:17.61,0:04:19.52,Default,,0000,0000,0000,,of the hotel, and they kicked down the door Dialogue: 0,0:04:19.52,0:04:22.40,Default,,0000,0000,0000,,and they found a man hiding by his bed. Dialogue: 0,0:04:22.40,0:04:24.43,Default,,0000,0000,0000,,And they said to him, "Who are you, Dialogue: 0,0:04:24.43,0:04:25.82,Default,,0000,0000,0000,,and what are you doing here?" Dialogue: 0,0:04:25.82,0:04:27.54,Default,,0000,0000,0000,,And the man replied, Dialogue: 0,0:04:27.54,0:04:31.21,Default,,0000,0000,0000,,"I'm just an innocent schoolteacher." Dialogue: 0,0:04:31.21,0:04:33.38,Default,,0000,0000,0000,,Of course, the terrorists knew Dialogue: 0,0:04:33.38,0:04:37.22,Default,,0000,0000,0000,,that no Indian schoolteacher stays at a suite in the Taj. Dialogue: 0,0:04:37.22,0:04:38.82,Default,,0000,0000,0000,,They picked up his identification, Dialogue: 0,0:04:38.82,0:04:42.34,Default,,0000,0000,0000,,and they phoned his name in to the terrorist war room, Dialogue: 0,0:04:42.34,0:04:45.16,Default,,0000,0000,0000,,where the terrorist war room Googled him, Dialogue: 0,0:04:45.16,0:04:47.80,Default,,0000,0000,0000,,and found a picture and called their operatives Dialogue: 0,0:04:47.80,0:04:48.100,Default,,0000,0000,0000,,on the ground and said, Dialogue: 0,0:04:48.100,0:04:53.68,Default,,0000,0000,0000,,"Your hostage, is he heavyset? Dialogue: 0,0:04:53.68,0:04:58.15,Default,,0000,0000,0000,,Is he bald in front? Does he wear glasses?" Dialogue: 0,0:04:58.15,0:05:02.76,Default,,0000,0000,0000,,"Yes, yes, yes," came the answers. Dialogue: 0,0:05:02.76,0:05:04.75,Default,,0000,0000,0000,,The op center had found him and they had a match. Dialogue: 0,0:05:04.75,0:05:06.11,Default,,0000,0000,0000,,He was not a schoolteacher. Dialogue: 0,0:05:06.11,0:05:09.99,Default,,0000,0000,0000,,He was the second-wealthiest businessman in India, Dialogue: 0,0:05:09.99,0:05:11.63,Default,,0000,0000,0000,,and after discovering this information, Dialogue: 0,0:05:11.63,0:05:14.69,Default,,0000,0000,0000,,the terrorist war room gave the order Dialogue: 0,0:05:14.69,0:05:17.31,Default,,0000,0000,0000,,to the terrorists on the ground in Mumbai. Dialogue: 0,0:05:17.31,0:05:20.44,Default,,0000,0000,0000,,("Kill him.") Dialogue: 0,0:05:20.44,0:05:23.88,Default,,0000,0000,0000,,We all worry about our privacy settings Dialogue: 0,0:05:23.88,0:05:25.62,Default,,0000,0000,0000,,on Facebook, Dialogue: 0,0:05:25.62,0:05:28.04,Default,,0000,0000,0000,,but the fact of the matter is, Dialogue: 0,0:05:28.04,0:05:31.50,Default,,0000,0000,0000,,our openness can be used against us. Dialogue: 0,0:05:31.50,0:05:33.41,Default,,0000,0000,0000,,Terrorists are doing this. Dialogue: 0,0:05:33.41,0:05:36.92,Default,,0000,0000,0000,,A search engine can determine Dialogue: 0,0:05:36.92,0:05:40.87,Default,,0000,0000,0000,,who shall live and who shall die. Dialogue: 0,0:05:40.87,0:05:43.90,Default,,0000,0000,0000,,This is the world that we live in. Dialogue: 0,0:05:43.90,0:05:45.47,Default,,0000,0000,0000,,During the Mumbai siege, Dialogue: 0,0:05:45.47,0:05:48.09,Default,,0000,0000,0000,,terrorists were so dependent on technology Dialogue: 0,0:05:48.09,0:05:50.34,Default,,0000,0000,0000,,that several witnesses reported that Dialogue: 0,0:05:50.34,0:05:53.22,Default,,0000,0000,0000,,as the terrorists were shooting hostages with one hand, Dialogue: 0,0:05:53.22,0:05:55.60,Default,,0000,0000,0000,,they were checking their mobile phone messages Dialogue: 0,0:05:55.60,0:05:58.05,Default,,0000,0000,0000,,in the very other hand. Dialogue: 0,0:05:58.05,0:06:01.20,Default,,0000,0000,0000,,In the end, 300 people were gravely wounded Dialogue: 0,0:06:01.20,0:06:05.10,Default,,0000,0000,0000,,and over 172 men, women and children Dialogue: 0,0:06:05.10,0:06:09.46,Default,,0000,0000,0000,,lost their lives that day. Dialogue: 0,0:06:09.46,0:06:11.22,Default,,0000,0000,0000,,Think about what happened. Dialogue: 0,0:06:11.22,0:06:14.23,Default,,0000,0000,0000,,During this 60-hour siege on Mumbai, Dialogue: 0,0:06:14.23,0:06:18.65,Default,,0000,0000,0000,,10 men armed not just with weapons, Dialogue: 0,0:06:18.65,0:06:20.54,Default,,0000,0000,0000,,but with technology, Dialogue: 0,0:06:20.54,0:06:24.07,Default,,0000,0000,0000,,were able to bring a city of 20 million people Dialogue: 0,0:06:24.07,0:06:26.23,Default,,0000,0000,0000,,to a standstill. Dialogue: 0,0:06:26.23,0:06:28.20,Default,,0000,0000,0000,,Ten people brought 20 million people Dialogue: 0,0:06:28.20,0:06:32.40,Default,,0000,0000,0000,,to a standstill, and this traveled around the world. Dialogue: 0,0:06:32.40,0:06:38.71,Default,,0000,0000,0000,,This is what radicals can do with openness. Dialogue: 0,0:06:38.71,0:06:41.22,Default,,0000,0000,0000,,This was done nearly four years ago. Dialogue: 0,0:06:41.22,0:06:42.77,Default,,0000,0000,0000,,What could terrorists do today Dialogue: 0,0:06:42.77,0:06:45.68,Default,,0000,0000,0000,,with the technologies available that we have? Dialogue: 0,0:06:45.68,0:06:49.01,Default,,0000,0000,0000,,What will they do tomorrow? Dialogue: 0,0:06:49.01,0:06:51.39,Default,,0000,0000,0000,,The ability of one to affect many Dialogue: 0,0:06:51.39,0:06:53.81,Default,,0000,0000,0000,,is scaling exponentially, Dialogue: 0,0:06:53.81,0:06:58.09,Default,,0000,0000,0000,,and it's scaling for good and it's scaling for evil. Dialogue: 0,0:06:58.09,0:07:00.34,Default,,0000,0000,0000,,It's not just about terrorism, though. Dialogue: 0,0:07:00.34,0:07:02.65,Default,,0000,0000,0000,,There's also been a big paradigm shift in crime. Dialogue: 0,0:07:02.65,0:07:06.95,Default,,0000,0000,0000,,You see, you can now commit more crime as well. Dialogue: 0,0:07:06.95,0:07:09.23,Default,,0000,0000,0000,,In the old days, it was a knife and a gun. Dialogue: 0,0:07:09.23,0:07:11.62,Default,,0000,0000,0000,,Then criminals moved to robbing trains. Dialogue: 0,0:07:11.62,0:07:15.25,Default,,0000,0000,0000,,You could rob 200 people on a train, a great innovation. Dialogue: 0,0:07:15.26,0:07:16.96,Default,,0000,0000,0000,,Moving forward, the Internet Dialogue: 0,0:07:16.96,0:07:19.13,Default,,0000,0000,0000,,allowed things to scale even more. Dialogue: 0,0:07:19.13,0:07:20.68,Default,,0000,0000,0000,,In fact, many of you will remember Dialogue: 0,0:07:20.68,0:07:22.42,Default,,0000,0000,0000,,the recent Sony PlayStation hack. Dialogue: 0,0:07:22.42,0:07:28.91,Default,,0000,0000,0000,,In that incident, over 100 million people were robbed. Dialogue: 0,0:07:28.91,0:07:30.64,Default,,0000,0000,0000,,Think about that. Dialogue: 0,0:07:30.64,0:07:32.10,Default,,0000,0000,0000,,When in the history of humanity Dialogue: 0,0:07:32.10,0:07:34.31,Default,,0000,0000,0000,,has it ever been possible for one person Dialogue: 0,0:07:34.31,0:07:39.71,Default,,0000,0000,0000,,to rob 100 million? Dialogue: 0,0:07:39.71,0:07:41.50,Default,,0000,0000,0000,,Of course, it's not just about stealing things. Dialogue: 0,0:07:41.50,0:07:43.79,Default,,0000,0000,0000,,There are other avenues of technology Dialogue: 0,0:07:43.79,0:07:45.24,Default,,0000,0000,0000,,that criminals can exploit. Dialogue: 0,0:07:45.24,0:07:48.53,Default,,0000,0000,0000,,Many of you will remember this super cute video Dialogue: 0,0:07:48.53,0:07:50.92,Default,,0000,0000,0000,,from the last TED, Dialogue: 0,0:07:50.92,0:07:55.99,Default,,0000,0000,0000,,but not all quadcopter swarms are so nice and cute. Dialogue: 0,0:07:55.99,0:07:58.14,Default,,0000,0000,0000,,They don't all have drumsticks. Dialogue: 0,0:07:58.14,0:07:59.100,Default,,0000,0000,0000,,Some can be armed with HD cameras Dialogue: 0,0:07:59.100,0:08:02.50,Default,,0000,0000,0000,,and do countersurveillance on protesters, Dialogue: 0,0:08:02.50,0:08:05.40,Default,,0000,0000,0000,,or, as in this little bit of movie magic, Dialogue: 0,0:08:05.40,0:08:09.10,Default,,0000,0000,0000,,quadcopters can be loaded with firearms Dialogue: 0,0:08:09.10,0:08:12.66,Default,,0000,0000,0000,,and automatic weapons. Dialogue: 0,0:08:12.66,0:08:15.37,Default,,0000,0000,0000,,Little robots are cute when they play music to you. Dialogue: 0,0:08:15.37,0:08:18.14,Default,,0000,0000,0000,,When they swarm and chase you down the block Dialogue: 0,0:08:18.14,0:08:21.77,Default,,0000,0000,0000,,to shoot you, a little bit less so. Dialogue: 0,0:08:21.77,0:08:23.82,Default,,0000,0000,0000,,Of course, criminals and terrorists weren't the first Dialogue: 0,0:08:23.82,0:08:26.66,Default,,0000,0000,0000,,to give guns to robots. We know where that started. Dialogue: 0,0:08:26.66,0:08:27.99,Default,,0000,0000,0000,,But they're adapting quickly. Dialogue: 0,0:08:27.99,0:08:29.97,Default,,0000,0000,0000,,Recently, the FBI arrested Dialogue: 0,0:08:29.97,0:08:31.78,Default,,0000,0000,0000,,an al Qaeda affiliate in the United States, Dialogue: 0,0:08:31.78,0:08:33.70,Default,,0000,0000,0000,,who was planning on using these remote-controlled Dialogue: 0,0:08:33.70,0:08:36.63,Default,,0000,0000,0000,,drone aircraft to fly C4 explosives Dialogue: 0,0:08:36.63,0:08:39.24,Default,,0000,0000,0000,,into government buildings in the United States. Dialogue: 0,0:08:39.24,0:08:44.62,Default,,0000,0000,0000,,By the way, these travel at over 600 miles an hour. Dialogue: 0,0:08:44.62,0:08:46.100,Default,,0000,0000,0000,,Every time a new technology is being introduced, Dialogue: 0,0:08:46.100,0:08:49.64,Default,,0000,0000,0000,,criminals are there to exploit it. Dialogue: 0,0:08:49.64,0:08:51.08,Default,,0000,0000,0000,,We've all seen 3D printers. Dialogue: 0,0:08:51.08,0:08:52.52,Default,,0000,0000,0000,,We know with them that you can print Dialogue: 0,0:08:52.52,0:08:55.35,Default,,0000,0000,0000,,in many materials ranging from plastic Dialogue: 0,0:08:55.35,0:08:59.71,Default,,0000,0000,0000,,to chocolate to metal and even concrete. Dialogue: 0,0:08:59.71,0:09:01.10,Default,,0000,0000,0000,,With great precision Dialogue: 0,0:09:01.10,0:09:03.16,Default,,0000,0000,0000,,I actually was able to make this Dialogue: 0,0:09:03.16,0:09:04.71,Default,,0000,0000,0000,,just the other day, a very cute little ducky. Dialogue: 0,0:09:10.08,0:09:11.93,Default,,0000,0000,0000,,But I wonder to myself, Dialogue: 0,0:09:11.93,0:09:18.84,Default,,0000,0000,0000,,for those people that strap bombs to their chests Dialogue: 0,0:09:18.84,0:09:19.92,Default,,0000,0000,0000,,and blow themselves up, Dialogue: 0,0:09:19.92,0:09:23.68,Default,,0000,0000,0000,,how might they use 3D printers? Dialogue: 0,0:09:23.68,0:09:27.79,Default,,0000,0000,0000,,Perhaps like this. Dialogue: 0,0:09:27.79,0:09:29.98,Default,,0000,0000,0000,,You see, if you can print in metal, Dialogue: 0,0:09:29.98,0:09:33.33,Default,,0000,0000,0000,,you can print one of these, Dialogue: 0,0:09:33.33,0:09:35.80,Default,,0000,0000,0000,,and in fact Dialogue: 0,0:09:39.49,0:09:42.73,Default,,0000,0000,0000,,you can also print one of these too. Dialogue: 0,0:09:45.53,0:09:50.08,Default,,0000,0000,0000,,The UK I know has some very strict firearms laws. Dialogue: 0,0:09:50.08,0:09:52.20,Default,,0000,0000,0000,,You needn't bring the gun into the UK anymore. Dialogue: 0,0:09:52.20,0:09:53.86,Default,,0000,0000,0000,,You just bring the 3D printer Dialogue: 0,0:09:53.86,0:09:56.70,Default,,0000,0000,0000,,and print the gun while you're here, Dialogue: 0,0:09:56.70,0:09:59.80,Default,,0000,0000,0000,,and, of course, the magazines for your bullets. Dialogue: 0,0:09:59.80,0:10:01.34,Default,,0000,0000,0000,,But as these get bigger in the future, Dialogue: 0,0:10:01.34,0:10:03.48,Default,,0000,0000,0000,,what other items will you be able to print? Dialogue: 0,0:10:03.48,0:10:06.77,Default,,0000,0000,0000,,The technologies are allowing bigger printers. Dialogue: 0,0:10:06.77,0:10:08.12,Default,,0000,0000,0000,,As we move forward, Dialogue: 0,0:10:08.12,0:10:10.81,Default,,0000,0000,0000,,we'll see new technologies also, like the Internet of Things. Dialogue: 0,0:10:10.81,0:10:12.84,Default,,0000,0000,0000,,Every day we're connecting more and more of our lives Dialogue: 0,0:10:12.84,0:10:15.43,Default,,0000,0000,0000,,to the Internet, which means Dialogue: 0,0:10:15.43,0:10:19.66,Default,,0000,0000,0000,,that the Internet of Things will soon be Dialogue: 0,0:10:19.66,0:10:21.42,Default,,0000,0000,0000,,the Internet of Things To Be Hacked. Dialogue: 0,0:10:21.42,0:10:23.45,Default,,0000,0000,0000,,All of the physical objects in our space Dialogue: 0,0:10:23.45,0:10:26.31,Default,,0000,0000,0000,,are being transformed into information technologies, Dialogue: 0,0:10:26.31,0:10:29.86,Default,,0000,0000,0000,,and that has a radical implication for our security, Dialogue: 0,0:10:29.86,0:10:32.88,Default,,0000,0000,0000,,because more connections to more devices Dialogue: 0,0:10:32.88,0:10:35.45,Default,,0000,0000,0000,,means more vulnerabilities. Dialogue: 0,0:10:35.45,0:10:37.20,Default,,0000,0000,0000,,Criminals understand this. Dialogue: 0,0:10:37.20,0:10:39.08,Default,,0000,0000,0000,,Terrorists understand this. Hackers understand this. Dialogue: 0,0:10:39.08,0:10:42.24,Default,,0000,0000,0000,,If you control the code, you control the world. Dialogue: 0,0:10:42.24,0:10:46.92,Default,,0000,0000,0000,,This is the future that awaits us. Dialogue: 0,0:10:46.92,0:10:49.75,Default,,0000,0000,0000,,There has not yet been an operating system Dialogue: 0,0:10:49.75,0:10:52.35,Default,,0000,0000,0000,,or a technology that hasn't been hacked. Dialogue: 0,0:10:52.35,0:10:55.09,Default,,0000,0000,0000,,That's troubling, since the human body itself Dialogue: 0,0:10:55.09,0:10:58.19,Default,,0000,0000,0000,,is now becoming an information technology. Dialogue: 0,0:10:58.19,0:11:01.76,Default,,0000,0000,0000,,As we've seen here, we're transforming ourselves into cyborgs. Dialogue: 0,0:11:01.76,0:11:04.31,Default,,0000,0000,0000,,Every year, thousands of cochlear implants, Dialogue: 0,0:11:04.31,0:11:06.52,Default,,0000,0000,0000,,diabetic pumps, pacemakers Dialogue: 0,0:11:06.52,0:11:08.74,Default,,0000,0000,0000,,and defibrillators are being implanted in people. Dialogue: 0,0:11:08.74,0:11:11.39,Default,,0000,0000,0000,,In the United States, there are 60,000 people Dialogue: 0,0:11:11.39,0:11:14.35,Default,,0000,0000,0000,,who have a pacemaker that connects to the Internet. Dialogue: 0,0:11:14.35,0:11:17.71,Default,,0000,0000,0000,,The defibrillators allow a physician at a distance Dialogue: 0,0:11:17.71,0:11:19.50,Default,,0000,0000,0000,,to give a shock to a heart Dialogue: 0,0:11:19.50,0:11:21.85,Default,,0000,0000,0000,,in case a patient needs it. Dialogue: 0,0:11:21.85,0:11:23.94,Default,,0000,0000,0000,,But if you don't need it, Dialogue: 0,0:11:23.94,0:11:25.72,Default,,0000,0000,0000,,and somebody else gives you the shock, Dialogue: 0,0:11:25.72,0:11:29.11,Default,,0000,0000,0000,,it's not a good thing. Dialogue: 0,0:11:29.11,0:11:32.73,Default,,0000,0000,0000,,Of course, we're going to go even deeper than the human body. Dialogue: 0,0:11:32.73,0:11:34.98,Default,,0000,0000,0000,,We're going down to the cellular level these days. Dialogue: 0,0:11:34.98,0:11:37.13,Default,,0000,0000,0000,,Up until this point, all the technologies Dialogue: 0,0:11:37.13,0:11:40.92,Default,,0000,0000,0000,,I've been talking about have been silicon-based, ones and zeroes, Dialogue: 0,0:11:40.92,0:11:43.61,Default,,0000,0000,0000,,but there's another operating system out there: Dialogue: 0,0:11:43.61,0:11:48.31,Default,,0000,0000,0000,,the original operating system, DNA. Dialogue: 0,0:11:48.31,0:11:52.75,Default,,0000,0000,0000,,And to hackers, DNA is just another operating system Dialogue: 0,0:11:52.75,0:11:54.75,Default,,0000,0000,0000,,waiting to be hacked. Dialogue: 0,0:11:54.75,0:11:56.24,Default,,0000,0000,0000,,It's a great challenge for them. Dialogue: 0,0:11:56.24,0:11:57.64,Default,,0000,0000,0000,,There are people already working on hacking the software of life, Dialogue: 0,0:11:59.54,0:12:02.50,Default,,0000,0000,0000,,and while most of them are doing this to great good Dialogue: 0,0:12:02.50,0:12:03.90,Default,,0000,0000,0000,,and to help us all, Dialogue: 0,0:12:03.90,0:12:07.44,Default,,0000,0000,0000,,some won't be. Dialogue: 0,0:12:07.44,0:12:09.10,Default,,0000,0000,0000,,So how will criminals abuse this? Dialogue: 0,0:12:09.10,0:12:11.38,Default,,0000,0000,0000,,Well, with synthetic biology you can do some pretty neat things. Dialogue: 0,0:12:11.38,0:12:14.58,Default,,0000,0000,0000,,For example, I predict that we will move away Dialogue: 0,0:12:14.58,0:12:17.69,Default,,0000,0000,0000,,from a plant-based narcotics world Dialogue: 0,0:12:17.69,0:12:20.75,Default,,0000,0000,0000,,to a synthetic one. Why do you need the plants anymore? Dialogue: 0,0:12:20.75,0:12:23.87,Default,,0000,0000,0000,,You can just take the DNA code from marijuana Dialogue: 0,0:12:23.87,0:12:28.66,Default,,0000,0000,0000,,or poppies or coca leaves Dialogue: 0,0:12:28.66,0:12:30.98,Default,,0000,0000,0000,,and cut and past that gene Dialogue: 0,0:12:30.98,0:12:33.66,Default,,0000,0000,0000,,and put it into yeast, Dialogue: 0,0:12:33.66,0:12:35.06,Default,,0000,0000,0000,,and you can take those yeast Dialogue: 0,0:12:35.06,0:12:38.33,Default,,0000,0000,0000,,and make them make the cocaine for you, Dialogue: 0,0:12:38.33,0:12:42.11,Default,,0000,0000,0000,,or the marijuana, or any other drug. Dialogue: 0,0:12:42.11,0:12:43.90,Default,,0000,0000,0000,,So how we use yeast in the future Dialogue: 0,0:12:43.90,0:12:45.79,Default,,0000,0000,0000,,is going to be really interesting. Dialogue: 0,0:12:45.79,0:12:48.13,Default,,0000,0000,0000,,In fact, we may have some really interesting bread and beer Dialogue: 0,0:12:48.13,0:12:51.95,Default,,0000,0000,0000,,as we go into this next century. Dialogue: 0,0:12:51.95,0:12:55.95,Default,,0000,0000,0000,,The cost of sequencing the human genome is dropping precipitously. Dialogue: 0,0:12:55.95,0:12:58.34,Default,,0000,0000,0000,,It was proceeding at Moore's Law pace, Dialogue: 0,0:12:58.34,0:13:00.31,Default,,0000,0000,0000,,but then in 2008, something changed. Dialogue: 0,0:13:00.31,0:13:01.98,Default,,0000,0000,0000,,The technologies got better, Dialogue: 0,0:13:01.98,0:13:05.82,Default,,0000,0000,0000,,and now DNA sequencing is proceeding at a pace Dialogue: 0,0:13:05.82,0:13:08.94,Default,,0000,0000,0000,,five times that of Moore's Law. Dialogue: 0,0:13:08.94,0:13:12.77,Default,,0000,0000,0000,,That has significant implications for us. Dialogue: 0,0:13:12.77,0:13:15.51,Default,,0000,0000,0000,,It took us 30 years to get from Dialogue: 0,0:13:15.51,0:13:17.66,Default,,0000,0000,0000,,the introduction of the personal computer Dialogue: 0,0:13:17.66,0:13:19.89,Default,,0000,0000,0000,,to the level of cybercrime we have today, Dialogue: 0,0:13:19.89,0:13:23.52,Default,,0000,0000,0000,,but looking at how biology is proceeding so rapidly, Dialogue: 0,0:13:23.52,0:13:25.18,Default,,0000,0000,0000,,and knowing criminals and terrorists as I do, Dialogue: 0,0:13:25.18,0:13:28.05,Default,,0000,0000,0000,,we may get there a lot faster Dialogue: 0,0:13:28.05,0:13:29.92,Default,,0000,0000,0000,,with biocrime in the future. Dialogue: 0,0:13:29.92,0:13:31.96,Default,,0000,0000,0000,,It will be easy for anybody to go ahead Dialogue: 0,0:13:31.96,0:13:33.84,Default,,0000,0000,0000,,and print their own bio-virus, Dialogue: 0,0:13:33.84,0:13:36.60,Default,,0000,0000,0000,,enhanced versions of ebola or anthrax, Dialogue: 0,0:13:36.60,0:13:38.36,Default,,0000,0000,0000,,weaponized flu. Dialogue: 0,0:13:38.36,0:13:41.15,Default,,0000,0000,0000,,We recently saw a case where some researchers Dialogue: 0,0:13:41.15,0:13:46.18,Default,,0000,0000,0000,,made the H5N1 avian influenza virus more potent. Dialogue: 0,0:13:46.18,0:13:49.64,Default,,0000,0000,0000,,It already has a 70 percent mortality rate Dialogue: 0,0:13:49.64,0:13:51.23,Default,,0000,0000,0000,,if you get it, but it's hard to get. Dialogue: 0,0:13:51.23,0:13:54.04,Default,,0000,0000,0000,,Engineers, by moving around a small number Dialogue: 0,0:13:54.04,0:13:55.70,Default,,0000,0000,0000,,of genetic changes, Dialogue: 0,0:13:55.70,0:13:57.40,Default,,0000,0000,0000,,were able to weaponize it Dialogue: 0,0:13:57.40,0:14:00.66,Default,,0000,0000,0000,,and make it much more easy for human beings to catch, Dialogue: 0,0:14:00.66,0:14:02.84,Default,,0000,0000,0000,,so that not thousands of people would die, Dialogue: 0,0:14:02.84,0:14:04.55,Default,,0000,0000,0000,,but tens of millions. Dialogue: 0,0:14:04.55,0:14:07.04,Default,,0000,0000,0000,,You see, you can go ahead and create Dialogue: 0,0:14:07.04,0:14:09.02,Default,,0000,0000,0000,,new pandemics, and the researchers who did this Dialogue: 0,0:14:09.02,0:14:10.54,Default,,0000,0000,0000,,were so proud of their accomplishments, Dialogue: 0,0:14:10.54,0:14:12.43,Default,,0000,0000,0000,,they wanted to publish it openly Dialogue: 0,0:14:12.43,0:14:14.53,Default,,0000,0000,0000,,so that everybody could see this Dialogue: 0,0:14:14.53,0:14:18.67,Default,,0000,0000,0000,,and get access to this information. Dialogue: 0,0:14:18.67,0:14:20.47,Default,,0000,0000,0000,,But it goes deeper than that. Dialogue: 0,0:14:20.47,0:14:22.41,Default,,0000,0000,0000,,DNA researcher Andrew Hessel Dialogue: 0,0:14:22.41,0:14:23.81,Default,,0000,0000,0000,,has pointed out quite rightly Dialogue: 0,0:14:23.81,0:14:26.09,Default,,0000,0000,0000,,that if you can use cancer treatments, Dialogue: 0,0:14:26.09,0:14:27.22,Default,,0000,0000,0000,,modern cancer treatments, Dialogue: 0,0:14:27.22,0:14:30.17,Default,,0000,0000,0000,,to go after one cell while leaving all the other cells Dialogue: 0,0:14:30.17,0:14:31.82,Default,,0000,0000,0000,,around it intact, Dialogue: 0,0:14:31.82,0:14:35.97,Default,,0000,0000,0000,,then you can also go after any one person's cell. Dialogue: 0,0:14:35.97,0:14:37.94,Default,,0000,0000,0000,,Personalized cancer treatments Dialogue: 0,0:14:37.94,0:14:40.56,Default,,0000,0000,0000,,are the flip side of personalized bioweapons, Dialogue: 0,0:14:40.56,0:14:43.94,Default,,0000,0000,0000,,which means you can attack any one individual, Dialogue: 0,0:14:43.94,0:14:48.13,Default,,0000,0000,0000,,including all the people in this picture. Dialogue: 0,0:14:48.13,0:14:52.26,Default,,0000,0000,0000,,How will we protect them in the future? Dialogue: 0,0:14:52.26,0:14:55.07,Default,,0000,0000,0000,,What to do? What to do about all this? Dialogue: 0,0:14:55.07,0:14:57.56,Default,,0000,0000,0000,,That's what I get asked all the time. Dialogue: 0,0:14:57.56,0:14:59.15,Default,,0000,0000,0000,,For those of you who follow me on Twitter, Dialogue: 0,0:14:59.15,0:15:03.68,Default,,0000,0000,0000,,I will be tweeting out the answer later on today. (Laughter) Dialogue: 0,0:15:03.68,0:15:06.31,Default,,0000,0000,0000,,Actually, it's a bit more complex than that, Dialogue: 0,0:15:06.31,0:15:08.39,Default,,0000,0000,0000,,and there are no magic bullets. Dialogue: 0,0:15:08.39,0:15:10.10,Default,,0000,0000,0000,,I don't have all the answers, Dialogue: 0,0:15:10.10,0:15:11.77,Default,,0000,0000,0000,,but I know a few things. Dialogue: 0,0:15:11.77,0:15:14.46,Default,,0000,0000,0000,,In the wake of 9/11, Dialogue: 0,0:15:14.46,0:15:17.26,Default,,0000,0000,0000,,the best security minds Dialogue: 0,0:15:17.26,0:15:19.24,Default,,0000,0000,0000,,put together all their innovation Dialogue: 0,0:15:19.24,0:15:23.38,Default,,0000,0000,0000,,and this is what they created for security. Dialogue: 0,0:15:23.38,0:15:27.40,Default,,0000,0000,0000,,If you're expecting the people who built this to protect you Dialogue: 0,0:15:27.40,0:15:31.12,Default,,0000,0000,0000,,from the coming robopocalypse — (Laughter) Dialogue: 0,0:15:31.12,0:15:34.07,Default,,0000,0000,0000,,— uh, you may want to have a backup plan. (Laughter) Dialogue: 0,0:15:34.07,0:15:40.27,Default,,0000,0000,0000,,Just saying. Just think about that. (Applause) Dialogue: 0,0:15:40.27,0:15:43.18,Default,,0000,0000,0000,,Law enforcement is currently a closed system. Dialogue: 0,0:15:43.18,0:15:45.99,Default,,0000,0000,0000,,It's nation-based, while the threat is international. Dialogue: 0,0:15:45.99,0:15:49.94,Default,,0000,0000,0000,,Policing doesn't scale globally. At least, it hasn't, Dialogue: 0,0:15:49.94,0:15:54.22,Default,,0000,0000,0000,,and our current system of guns, border guards, big gates and fences Dialogue: 0,0:15:54.22,0:15:57.33,Default,,0000,0000,0000,,are outdated in the new world into which we're moving. Dialogue: 0,0:15:57.33,0:15:59.60,Default,,0000,0000,0000,,So how might we prepare for some of these specific threats, Dialogue: 0,0:15:59.60,0:16:02.03,Default,,0000,0000,0000,,like attacking a president or a prime minister? Dialogue: 0,0:16:02.03,0:16:04.16,Default,,0000,0000,0000,,This would be the natural government response, Dialogue: 0,0:16:04.16,0:16:06.44,Default,,0000,0000,0000,,to hide away all our government leaders Dialogue: 0,0:16:06.44,0:16:08.25,Default,,0000,0000,0000,,in hermetically sealed bubbles. Dialogue: 0,0:16:08.25,0:16:10.08,Default,,0000,0000,0000,,But this is not going to work. Dialogue: 0,0:16:10.08,0:16:13.22,Default,,0000,0000,0000,,The cost of doing a DNA sequence is going to be trivial. Dialogue: 0,0:16:13.22,0:16:16.47,Default,,0000,0000,0000,,Anybody will have it and we will all have them in the future. Dialogue: 0,0:16:16.47,0:16:19.92,Default,,0000,0000,0000,,So maybe there's a more radical way that we can look at this. Dialogue: 0,0:16:19.92,0:16:21.85,Default,,0000,0000,0000,,What happens if we were to take Dialogue: 0,0:16:21.85,0:16:25.05,Default,,0000,0000,0000,,the President's DNA, or a king or queen's, Dialogue: 0,0:16:25.05,0:16:27.39,Default,,0000,0000,0000,,and put it out to a group of a few hundred Dialogue: 0,0:16:27.39,0:16:29.28,Default,,0000,0000,0000,,trusted researchers so they could Dialogue: 0,0:16:29.28,0:16:32.22,Default,,0000,0000,0000,,study that DNA and do penetration testing against it Dialogue: 0,0:16:32.22,0:16:34.43,Default,,0000,0000,0000,,as a means of helping our leaders? Dialogue: 0,0:16:34.43,0:16:36.68,Default,,0000,0000,0000,,Or what if we sent it out to a few thousand? Dialogue: 0,0:16:36.68,0:16:39.35,Default,,0000,0000,0000,,Or, controversially, and not without its risks, Dialogue: 0,0:16:39.35,0:16:42.20,Default,,0000,0000,0000,,what happens if we just gave it to the whole public? Dialogue: 0,0:16:42.20,0:16:45.77,Default,,0000,0000,0000,,Then we could all be engaged in helping. Dialogue: 0,0:16:45.77,0:16:48.39,Default,,0000,0000,0000,,We've already seen examples of this working well. Dialogue: 0,0:16:48.39,0:16:51.31,Default,,0000,0000,0000,,The Organized Crime and Corruption Reporting Project Dialogue: 0,0:16:51.31,0:16:52.99,Default,,0000,0000,0000,,is staffed by journalists and citizens Dialogue: 0,0:16:52.99,0:16:54.72,Default,,0000,0000,0000,,where they are crowd-sourcing Dialogue: 0,0:16:54.72,0:16:57.34,Default,,0000,0000,0000,,what dictators and terrorists are doing Dialogue: 0,0:16:57.34,0:16:59.02,Default,,0000,0000,0000,,with public funds around the world, Dialogue: 0,0:16:59.02,0:17:00.68,Default,,0000,0000,0000,,and, in a more dramatic case, Dialogue: 0,0:17:00.68,0:17:02.99,Default,,0000,0000,0000,,we've seen in Mexico, Dialogue: 0,0:17:02.99,0:17:04.61,Default,,0000,0000,0000,,a country that has been racked Dialogue: 0,0:17:04.61,0:17:08.62,Default,,0000,0000,0000,,by 50,000 narcotics-related murders Dialogue: 0,0:17:08.62,0:17:10.39,Default,,0000,0000,0000,,in the past six years. Dialogue: 0,0:17:10.39,0:17:11.77,Default,,0000,0000,0000,,They're killing so many people Dialogue: 0,0:17:11.77,0:17:14.05,Default,,0000,0000,0000,,they can't even afford to bury them all Dialogue: 0,0:17:14.05,0:17:15.82,Default,,0000,0000,0000,,in anything but these unmarked graves Dialogue: 0,0:17:15.82,0:17:19.22,Default,,0000,0000,0000,,like this one outside of Ciudad Juarez. Dialogue: 0,0:17:19.22,0:17:22.33,Default,,0000,0000,0000,,What can we do about this? The government has proven ineffective. Dialogue: 0,0:17:22.33,0:17:25.46,Default,,0000,0000,0000,,So in Mexico, citizens, at great risk to themselves, Dialogue: 0,0:17:25.46,0:17:29.54,Default,,0000,0000,0000,,are fighting back to build an effective solution. Dialogue: 0,0:17:29.54,0:17:33.73,Default,,0000,0000,0000,,They're crowd-mapping the activities of the drug dealers. Dialogue: 0,0:17:33.73,0:17:35.52,Default,,0000,0000,0000,,Whether or not you realize it, Dialogue: 0,0:17:35.52,0:17:39.20,Default,,0000,0000,0000,,we are at the dawn of a technological arms race, Dialogue: 0,0:17:39.20,0:17:40.98,Default,,0000,0000,0000,,an arms race between people Dialogue: 0,0:17:40.98,0:17:42.74,Default,,0000,0000,0000,,who are using technology for good Dialogue: 0,0:17:42.74,0:17:44.95,Default,,0000,0000,0000,,and those who are using it for ill. Dialogue: 0,0:17:44.95,0:17:49.31,Default,,0000,0000,0000,,The threat is serious, and the time to prepare for it is now. Dialogue: 0,0:17:49.31,0:17:52.75,Default,,0000,0000,0000,,I can assure you that the terrorists and criminals are. Dialogue: 0,0:17:52.75,0:17:54.85,Default,,0000,0000,0000,,My personal belief is that, Dialogue: 0,0:17:54.85,0:17:56.80,Default,,0000,0000,0000,,rather than having a small, elite force Dialogue: 0,0:17:56.80,0:17:58.84,Default,,0000,0000,0000,,of highly trained government agents Dialogue: 0,0:17:58.84,0:18:00.56,Default,,0000,0000,0000,,here to protect us all, Dialogue: 0,0:18:00.56,0:18:02.26,Default,,0000,0000,0000,,we're much better off Dialogue: 0,0:18:02.26,0:18:04.34,Default,,0000,0000,0000,,having average and ordinary citizens Dialogue: 0,0:18:04.34,0:18:06.76,Default,,0000,0000,0000,,approaching this problem as a group Dialogue: 0,0:18:06.76,0:18:08.08,Default,,0000,0000,0000,,and seeing what we can do. Dialogue: 0,0:18:08.08,0:18:09.32,Default,,0000,0000,0000,,If we all do our part, Dialogue: 0,0:18:09.32,0:18:11.65,Default,,0000,0000,0000,,I think we'll be in a much better space. Dialogue: 0,0:18:11.65,0:18:13.12,Default,,0000,0000,0000,,The tools to change the world Dialogue: 0,0:18:13.12,0:18:14.81,Default,,0000,0000,0000,,are in everybody's hands. Dialogue: 0,0:18:14.81,0:18:17.65,Default,,0000,0000,0000,,How we use them is not just up to me, Dialogue: 0,0:18:17.65,0:18:20.13,Default,,0000,0000,0000,,it's up to all of us. Dialogue: 0,0:18:20.13,0:18:22.76,Default,,0000,0000,0000,,This was a technology I would frequently deploy Dialogue: 0,0:18:22.76,0:18:24.69,Default,,0000,0000,0000,,as a police officer. Dialogue: 0,0:18:24.69,0:18:28.46,Default,,0000,0000,0000,,This technology has become outdated in our current world. Dialogue: 0,0:18:28.47,0:18:31.19,Default,,0000,0000,0000,,It doesn't scale, it doesn't work globally, Dialogue: 0,0:18:31.19,0:18:33.26,Default,,0000,0000,0000,,and it surely doesn't work virtually. Dialogue: 0,0:18:33.26,0:18:36.53,Default,,0000,0000,0000,,We've seen paradigm shifts in crime and terrorism. Dialogue: 0,0:18:36.53,0:18:40.87,Default,,0000,0000,0000,,They call for a shift to a more open form Dialogue: 0,0:18:40.87,0:18:45.77,Default,,0000,0000,0000,,and a more participatory form of law enforcement. Dialogue: 0,0:18:45.77,0:18:48.41,Default,,0000,0000,0000,,So I invite you to join me. Dialogue: 0,0:18:48.41,0:18:53.60,Default,,0000,0000,0000,,After all, public safety is too important to leave to the professionals. Dialogue: 0,0:18:53.60,0:18:56.40,Default,,0000,0000,0000,,Thank you. (Applause) Dialogue: 0,0:18:56.40,0:19:04.28,Default,,0000,0000,0000,,(Applause)