Return to Video

How to avoid surveillance ... with the phone in your pocket

  • 0:01 - 0:05
    For more than a 100 years,
    the telephone companies have provided
  • 0:05 - 0:07
    wire-tapping assistance
    to governments.
  • 0:07 - 0:10
    For much of this time,
    this assistance was manual.
  • 0:11 - 0:15
    Surveillance took place manually
    and wires were connected by hand.
  • 0:15 - 0:17
    Calls were recorded to tape.
  • 0:18 - 0:21
    But as in so many other industries,
    computing has changed everything.
  • 0:22 - 0:24
    The telephone companies
    built surveillance features
  • 0:25 - 0:27
    into the very core of their networks.
  • 0:28 - 0:29
    I want that to sink in for a second.
  • 0:30 - 0:34
    Our telephones and the networks
    that carry our calls
  • 0:34 - 0:38
    were wired for surveillance first,
    first and foremost.
  • 0:39 - 0:45
    So, what that means is when you're talking
    to your spouse, your children, a colleague
  • 0:45 - 0:49
    or your doctor on the telephone,
    someone could be listening.
  • 0:49 - 0:51
    Now that someone might
    be your own government.
  • 0:52 - 0:56
    It could also be another government,
    a foreign intelligence service.
  • 0:56 - 1:01
    Or a hacker, or a criminal, or a stalker,
    or any other party that breaks
  • 1:01 - 1:05
    into the surveillance system that hacks
    into the surveillance system
  • 1:05 - 1:07
    of the telephone companies.
  • 1:08 - 1:12
    But, while the telephone companies have
    built surveillance as a priority,
  • 1:12 - 1:15
    Silicon Valley companies have not.
  • 1:15 - 1:19
    And increasingly over the last couple
    years, Silicon Valley companies have built
  • 1:19 - 1:23
    strong encryption technology into their
    communications products that makes
  • 1:23 - 1:25
    surveillance extremely difficult.
  • 1:26 - 1:29
    For example, many of you might have
    an iPhone and if you use an iPhone
  • 1:30 - 1:34
    to send a text message to other people
    that have an iPhone, those text messages
  • 1:34 - 1:36
    cannot easily be wire-tapped.
  • 1:36 - 1:39
    And in fact, according to Apple
    they're not able to even see
  • 1:39 - 1:41
    the text messages themselves.
  • 1:41 - 1:43
    Likewise, if you use
    FaceTime to make
  • 1:43 - 1:46
    an audio call or a video call
    with one of your friends
  • 1:46 - 1:49
    or loved ones, that too
    cannot be easily wire-tapped.
  • 1:50 - 1:51
    And it's not just Apple.
  • 1:51 - 1:56
    WhatsApp, which is now owned by Facebook
    and used by hundreds of millions of people
  • 1:56 - 2:00
    around the world, also has built strong
    encryption technology into its product.
  • 2:00 - 2:04
    Which means that people in the global
    south can easily communicate without
  • 2:04 - 2:08
    their governments, often authoritarian,
    wire-tapping their text messages.
  • 2:10 - 2:14
    So, after 100 years of being able
    to listen to any telephone call,
  • 2:15 - 2:17
    anytime, anywhere.
  • 2:17 - 2:21
    You might imagine that government
    officials are not very happy.
  • 2:21 - 2:22
    And in fact, that's
    what's happening.
  • 2:22 - 2:23
    Government officials
    are extremely mad.
  • 2:23 - 2:26
    And they're not mad
    because these encryption
  • 2:26 - 2:28
    tools are now available.
  • 2:29 - 2:33
    What upsets them the most, is that
    the tech companies have built encryption
  • 2:33 - 2:37
    features into their products
    and turned them on by default.
  • 2:37 - 2:39
    It's the default piece that matters.
  • 2:39 - 2:43
    In short, the tech companies have
    democratized encryption.
  • 2:43 - 2:47
    And so, government officials like British
    Prime Minister David Cameron,
  • 2:47 - 2:52
    they believe that all communications
    -- emails, texts, voice calls.
  • 2:52 - 2:55
    All of these should be available
    to governments and encryption
  • 2:56 - 2:57
    is making that difficult.
  • 2:58 - 3:01
    Now look, I'm extremely sympathetic
    to their point of view.
  • 3:01 - 3:04
    We live in a dangerous time,
    in a dangerous world
  • 3:04 - 3:06
    and there really are
    bad people out there.
  • 3:06 - 3:09
    There are terrorists and other serious
    national security threats that I suspect
  • 3:09 - 3:13
    we all want to the FBI
    and the NSA to monitor.
  • 3:13 - 3:16
    But those surveillance
    features come at a cost.
  • 3:18 - 3:21
    The reason for that, is that there is no
    such thing as a terrorist laptop,
  • 3:21 - 3:23
    or a drug dealer's cell phone.
  • 3:23 - 3:26
    We all use the same
    communications devices.
  • 3:27 - 3:31
    What that means, is that if the drug
    dealer's telephone calls
  • 3:31 - 3:33
    or the terrorist telephone calls
    can be intercepted,
  • 3:33 - 3:35
    then so can the rest
    of ours too.
  • 3:35 - 3:39
    And I think we really need to ask, should
    a billion people around the world be
  • 3:39 - 3:41
    using devices that
    are wire-tap friendly?
  • 3:44 - 3:50
    The scenario of hacking of surveillance
    systems that I described is not imaginary.
  • 3:50 - 3:54
    In 2009, the surveillance systems
    that Google and Microsoft built
  • 3:54 - 3:55
    into the networks.
  • 3:55 - 3:59
    The systems that they used to respond
    to lawful surveillance requests
  • 3:59 - 4:00
    from the police.
  • 4:00 - 4:02
    Those systems were compromised
    by the Chinese government
  • 4:03 - 4:05
    because the Chinese government
    wanted to figure out which of their own
  • 4:06 - 4:08
    agents the US government
    was monitoring.
  • 4:09 - 4:13
    By the same token, in 2004
    the surveillance system built
  • 4:13 - 4:17
    into the network of Vodafone Greece
    -- Greece's largest telephone company
  • 4:17 - 4:21
    was compromised by unknown entity
    and that feature, the surveillance feature
  • 4:21 - 4:24
    was used to wire-tap the Greek
    Prime Minister and members
  • 4:24 - 4:26
    of the Greek cabinet.
  • 4:26 - 4:29
    The foreign government or hackers
    who did that were never caught.
  • 4:30 - 4:34
    And really, this gets to the very problem
    with these surveillance features
  • 4:34 - 4:35
    or back doors.
  • 4:36 - 4:38
    When you build a back door into
    a communications network
  • 4:38 - 4:41
    or piece of technology,you
    have no way of controlling
  • 4:41 - 4:43
    who's going to go through it.
  • 4:43 - 4:47
    You have no way controlling whether
    it'll be used by your side
  • 4:47 - 4:48
    or the other side.
  • 4:48 - 4:49
    By good guys,
    or by bad guys.
  • 4:50 - 4:53
    And so, for that reason, I think
    that it's better to build networks
  • 4:54 - 4:56
    to be as secure as possible.
  • 4:57 - 5:00
    Yes, this means that in the future,
    encryption is going to make
  • 5:00 - 5:01
    wire-tapping more difficult.
  • 5:02 - 5:05
    It means that the police are going to have
    a tougher time catching bad guys.
  • 5:05 - 5:09
    But the alternative would mean to live
    in a world where anyone's calls
  • 5:09 - 5:12
    or anyone's text messages could
    be surveilled by criminals,
  • 5:12 - 5:15
    by stalkers and by foreign
    intelligence agencies.
  • 5:16 - 5:17
    And I don't want to live
    in that kind of world.
  • 5:18 - 5:23
    And so right now, you probably have
    the tools to thwart many kinds
  • 5:23 - 5:24
    of government surveillance
    already on your phones
  • 5:25 - 5:26
    and already in your pockets.
  • 5:27 - 5:30
    You just might not realize how strong
    and how secure those tools are
  • 5:30 - 5:33
    or how weak the other ways you've used
    to communicate really are.
  • 5:35 - 5:39
    And so, my message
    to you is this.
  • 5:39 - 5:41
    We need to use
    these tools.
  • 5:41 - 5:43
    We need to secure our telephone calls.
  • 5:43 - 5:45
    We need to secure
    our text messages.
  • 5:45 - 5:47
    I want you to use
    these tools.
  • 5:47 - 5:48
    I want you to tell
    your loved ones.
  • 5:49 - 5:50
    I want you to tell
    your colleagues.
  • 5:50 - 5:52
    Use these encrypted
    communications tools.
  • 5:53 - 5:56
    Don't just use them because they're cheap
    and easy, but use them because
  • 5:56 - 5:57
    they are secure.
  • 5:57 - 5:59
    Thank you.
  • 5:59 - 6:01
    (Applause)
Title:
How to avoid surveillance ... with the phone in your pocket
Speaker:
Christopher Soghoian
Description:

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
06:16

English subtitles

Revisions Compare revisions