Return to Video

How to avoid surveillance ... with the phone in your pocket

  • 0:01 - 0:03
    For more than 100 years,
  • 0:03 - 0:07
    the telephone companies have provided
    wiretapping assistance to governments.
  • 0:07 - 0:11
    For much of this time,
    this assistance was manual.
  • 0:11 - 0:15
    Surveillance took place manually
    and wires were connected by hand.
  • 0:15 - 0:17
    Calls were recorded to tape.
  • 0:17 - 0:19
    But as in so many other industries,
  • 0:20 - 0:21
    computing has changed everything.
  • 0:22 - 0:25
    The telephone companies
    built surveillance features
  • 0:25 - 0:27
    into the very core of their networks.
  • 0:27 - 0:29
    I want that to sink in for a second:
  • 0:29 - 0:34
    Our telephones and the networks
    that carry our calls
  • 0:34 - 0:36
    were wired for surveillance first.
  • 0:36 - 0:38
    First and foremost.
  • 0:39 - 0:43
    So what that means is that
    when you're talking to your spouse,
  • 0:43 - 0:47
    your children, a colleague
    or your doctor on the telephone,
  • 0:47 - 0:48
    someone could be listening.
  • 0:49 - 0:51
    Now, that someone might
    be your own government;
  • 0:51 - 0:56
    it could also be another government,
    a foreign intelligence service,
  • 0:56 - 0:59
    or a hacker, or a criminal, or a stalker
  • 0:59 - 1:02
    or any other party that breaks into
    the surveillance system,
  • 1:02 - 1:07
    that hacks into the surveillance system
    of the telephone companies.
  • 1:08 - 1:12
    But while the telephone companies
    have built surveillance as a priority,
  • 1:12 - 1:14
    Silicon Valley companies have not.
  • 1:15 - 1:17
    And increasingly,
    over the last couple years,
  • 1:17 - 1:21
    Silicon Valley companies have built
    strong encryption technology
  • 1:21 - 1:23
    into their communications products
  • 1:23 - 1:25
    that makes surveillance
    extremely difficult.
  • 1:25 - 1:28
    For example, many of you
    might have an iPhone,
  • 1:28 - 1:30
    and if you use an iPhone
    to send a text message
  • 1:30 - 1:33
    to other people who have an iPhone,
  • 1:33 - 1:36
    those text messages
    cannot easily be wiretapped.
  • 1:36 - 1:37
    And in fact, according to Apple,
  • 1:37 - 1:40
    they're not able to even see
    the text messages themselves.
  • 1:41 - 1:45
    Likewise, if you use FaceTime
    to make an audio call
  • 1:45 - 1:47
    or a video call with one of your
    friends or loved ones,
  • 1:47 - 1:49
    that, too, cannot be easily wiretapped.
  • 1:49 - 1:51
    And it's not just Apple.
  • 1:51 - 1:54
    WhatsApp, which is now owned by Facebook
  • 1:54 - 1:57
    and used by hundreds of millions
    of people around the world,
  • 1:57 - 2:00
    also has built strong
    encryption technology into its product,
  • 2:00 - 2:04
    which means that people
    in the Global South can easily communicate
  • 2:04 - 2:06
    without their governments,
    often authoritarian,
  • 2:06 - 2:08
    wiretapping their text messages.
  • 2:10 - 2:15
    So, after 100 years of being able
    to listen to any telephone call --
  • 2:15 - 2:17
    anytime, anywhere --
  • 2:17 - 2:20
    you might imagine that government
    officials are not very happy.
  • 2:20 - 2:22
    And in fact, that's what's happening.
  • 2:22 - 2:24
    Government officials are extremely mad.
  • 2:24 - 2:28
    And they're not mad because
    these encryption tools are now available.
  • 2:28 - 2:30
    What upsets them the most
  • 2:30 - 2:34
    is that the tech companies have built
    encryption features into their products
  • 2:34 - 2:36
    and turned them on by default.
  • 2:37 - 2:39
    It's the default piece that matters.
  • 2:39 - 2:42
    In short, the tech companies
    have democratized encryption.
  • 2:43 - 2:47
    And so, government officials
    like British Prime Minister David Cameron,
  • 2:47 - 2:52
    they believe that all communications --
    emails, texts, voice calls --
  • 2:52 - 2:54
    all of these should be
    available to governments,
  • 2:54 - 2:57
    and encryption is making that difficult.
  • 2:57 - 3:01
    Now, look -- I'm extremely sympathetic
    to their point of view.
  • 3:01 - 3:03
    We live in a dangerous time
    in a dangerous world,
  • 3:03 - 3:05
    and there really are bad people out there.
  • 3:05 - 3:09
    There are terrorists and other
    serious national security threats
  • 3:09 - 3:13
    that I suspect we all want
    the FBI and the NSA to monitor.
  • 3:13 - 3:16
    But those surveillance
    features come at a cost.
  • 3:17 - 3:19
    The reason for that is
  • 3:19 - 3:21
    that there is no such thing
    as a terrorist laptop,
  • 3:21 - 3:23
    or a drug dealer's cell phone.
  • 3:23 - 3:26
    We all use the same
    communications devices.
  • 3:27 - 3:30
    What that means is that
    if the drug dealers' telephone calls
  • 3:30 - 3:33
    or the terrorists' telephone calls
    can be intercepted,
  • 3:33 - 3:35
    then so can the rest of ours, too.
  • 3:35 - 3:36
    And I think we really need to ask:
  • 3:37 - 3:40
    Should a billion people
    around the world be using devices
  • 3:40 - 3:41
    that are wiretap friendly?
  • 3:43 - 3:47
    So the scenario of hacking of surveillance
    systems that I've described --
  • 3:47 - 3:49
    this is not imaginary.
  • 3:50 - 3:51
    In 2009,
  • 3:51 - 3:55
    the surveillance systems that Google
    and Microsoft built into their networks --
  • 3:55 - 3:58
    the systems that they use to respond
    to lawful surveillance requests
  • 3:58 - 4:00
    from the police --
  • 4:00 - 4:02
    those systems were compromised
    by the Chinese government,
  • 4:02 - 4:05
    because the Chinese government
    wanted to figure out
  • 4:05 - 4:08
    which of their own agents
    the US government was monitoring.
  • 4:08 - 4:10
    By the same token,
  • 4:10 - 4:13
    in 2004, the surveillance system
    built into the network
  • 4:13 - 4:16
    of Vodafone Greece --
    Greece's largest telephone company --
  • 4:16 - 4:19
    was compromised by an unknown entity,
  • 4:19 - 4:21
    and that feature,
    the surveillance feature,
  • 4:21 - 4:23
    was used to wiretap
    the Greek Prime Minister
  • 4:23 - 4:25
    and members of the Greek cabinet.
  • 4:25 - 4:28
    The foreign government or hackers
    who did that were never caught.
  • 4:30 - 4:34
    And really, this gets to the very problem
    with these surveillance features,
  • 4:34 - 4:35
    or backdoors.
  • 4:35 - 4:38
    When you build a backdoor
    into a communications network
  • 4:38 - 4:39
    or piece of technology,
  • 4:40 - 4:43
    you have no way of controlling
    who's going to go through it.
  • 4:43 - 4:45
    You have no way of controlling
  • 4:45 - 4:47
    whether it'll be used by your side
    or the other side,
  • 4:48 - 4:49
    by good guys, or by bad guys.
  • 4:50 - 4:52
    And so for that reason,
    I think that it's better
  • 4:53 - 4:55
    to build networks
    to be as secure as possible.
  • 4:56 - 4:59
    Yes, this means that in the future,
  • 4:59 - 5:01
    encryption is going to make
    wiretapping more difficult.
  • 5:01 - 5:04
    It means that the police
    are going to have a tougher time
  • 5:04 - 5:05
    catching bad guys.
  • 5:05 - 5:08
    But the alternative would mean
    to live in a world
  • 5:08 - 5:12
    where anyone's calls or anyone's
    text messages could be surveilled
  • 5:12 - 5:15
    by criminals, by stalkers
    and by foreign intelligence agencies.
  • 5:15 - 5:18
    And I don't want to live
    in that kind of world.
  • 5:18 - 5:21
    And so right now,
    you probably have the tools
  • 5:21 - 5:23
    to thwart many kinds
    of government surveillance
  • 5:23 - 5:26
    already on your phones
    and already in your pockets,
  • 5:26 - 5:30
    you just might not realize how strong
    and how secure those tools are,
  • 5:30 - 5:34
    or how weak the other ways
    you've used to communicate really are.
  • 5:35 - 5:37
    And so, my message to you is this:
  • 5:38 - 5:40
    We need to use these tools.
  • 5:40 - 5:43
    We need to secure our telephone calls.
  • 5:43 - 5:44
    We need to secure our text messages.
  • 5:45 - 5:47
    I want you to use these tools.
  • 5:47 - 5:50
    I want you to tell your loved ones,
    I want you to tell your colleagues:
  • 5:50 - 5:52
    Use these encrypted communications tools.
  • 5:52 - 5:55
    Don't just use them
    because they're cheap and easy,
  • 5:55 - 5:57
    but use them because they're secure.
  • 5:57 - 5:58
    Thank you.
  • 5:58 - 6:02
    (Applause)
Title:
How to avoid surveillance ... with the phone in your pocket
Speaker:
Christopher Soghoian
Description:

Who is listening in on your phone calls? On a landline, it could be anyone, says privacy activist Christopher Soghoian, because surveillance backdoors are built into the phone system by default, to allow governments to listen in. But then again, so could a foreign intelligence service ... or a criminal. Which is why, says Soghoian, some tech companies are resisting governments' call to build the same backdoors into mobile phones and new messaging systems. Learn how some tech companies are working to keep your calls and messages private.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
06:16

English subtitles

Revisions Compare revisions