Return to Video

How to avoid surveillance ... with the phone in your pocket

  • 0:01 - 0:03
    For more than 100 years,
  • 0:03 - 0:07
    the telephone companies have provided
    wire-tapping assistance to governments.
  • 0:07 - 0:11
    For much of this time,
    this assistance was manual.
  • 0:11 - 0:15
    Surveillance took place manually
    and wires were connected by hand.
  • 0:15 - 0:17
    Calls were recorded to tape.
  • 0:17 - 0:19
    But as in so many other industries,
  • 0:20 - 0:21
    computing has changed everything.
  • 0:22 - 0:25
    The telephone companies
    built surveillance features
  • 0:25 - 0:27
    into the very core of their networks.
  • 0:27 - 0:29
    I want that to sink in for a second:
  • 0:29 - 0:34
    Our telephones and the networks
    that carry our calls
  • 0:34 - 0:36
    were wired for surveillance first.
  • 0:36 - 0:38
    First and foremost.
  • 0:39 - 0:43
    So what that means is that
    when you're talking to your spouse,
  • 0:43 - 0:47
    your children, a colleague
    or your doctor on the telephone,
  • 0:47 - 0:48
    someone could be listening.
  • 0:49 - 0:51
    Now, that someone might
    be your own government;
  • 0:51 - 0:56
    it could also be another government,
    a foreign intelligence service,
  • 0:56 - 0:59
    or a hacker, or a criminal, or a stalker,
  • 0:59 - 1:02
    or any other party that breaks into
    the surveillance system
  • 1:02 - 1:07
    that hacks into the surveillance system
    of the telephone companies.
  • 1:08 - 1:12
    But while the telephone companies
    have built surveillance as a priority,
  • 1:12 - 1:14
    Silicon Valley companies have not.
  • 1:15 - 1:17
    And increasingly,
    over the last couple years,
  • 1:17 - 1:21
    Silicon Valley companies have built
    strong encryption technology
  • 1:21 - 1:23
    into their communications products
  • 1:23 - 1:25
    that makes surveillance
    extremely difficult.
  • 1:25 - 1:28
    For example, many of you
    might have an iPhone,
  • 1:28 - 1:30
    and if you use an iPhone
    to send a text message
  • 1:30 - 1:33
    to other people that have an iPhone,
  • 1:33 - 1:36
    those text messages
    cannot easily be wire-tapped.
  • 1:36 - 1:37
    And in fact, according to Apple,
  • 1:37 - 1:40
    they're not able to even see
    the text messages themselves.
  • 1:41 - 1:45
    Likewise, if you use FaceTime
    to make an audio call
  • 1:45 - 1:47
    or a video call with one of your
    friends or loved ones,
  • 1:47 - 1:49
    that, too, cannot be easily wire-tapped.
  • 1:49 - 1:51
    And it's not just Apple.
  • 1:51 - 1:54
    WhatsApp, which is now owned by Facebook
  • 1:54 - 1:57
    and used by hundreds of millions
    of people around the world,
  • 1:57 - 2:00
    also has built strong
    encryption technology into its product,
  • 2:00 - 2:04
    which means that people
    in the global south can easily communicate
  • 2:04 - 2:06
    without their governments,
    often authoritarian,
  • 2:06 - 2:08
    wire-tapping their text messages.
  • 2:10 - 2:15
    So, after 100 years of being able
    to listen to any telephone call --
  • 2:15 - 2:17
    anytime, anywhere --
  • 2:17 - 2:20
    you might imagine that government
    officials are not very happy.
  • 2:20 - 2:22
    And in fact, that's what's happening.
  • 2:22 - 2:24
    Government officials are extremely mad.
  • 2:24 - 2:28
    And they're not mad because
    these encryption tools are now available.
  • 2:28 - 2:30
    What upsets them the most
  • 2:30 - 2:34
    is that the tech companies have built
    encryption features into their products,
  • 2:34 - 2:36
    and turned them on by default.
  • 2:37 - 2:39
    It's the default piece that matters.
  • 2:39 - 2:42
    In short, the tech companies
    have democratized encryption.
  • 2:43 - 2:47
    And so, government officials
    like British Prime Minister David Cameron,
  • 2:47 - 2:52
    they believe that all communications --
    emails, texts, voice calls --
  • 2:52 - 2:54
    all of these should be
    available to governments,
  • 2:54 - 2:57
    and encryption is making that difficult.
  • 2:57 - 3:01
    Now, look -- I'm extremely sympathetic
    to their point of view.
  • 3:01 - 3:03
    We live in a dangerous time
    in a dangerous world,
  • 3:03 - 3:05
    and there really are bad people out there.
  • 3:05 - 3:09
    There are terrorists and other
    serious national security threats,
  • 3:09 - 3:13
    that I suspect we all want
    the FBI and the NSA to monitor.
  • 3:13 - 3:16
    But those surveillance
    features come at a cost.
  • 3:17 - 3:19
    The reason for that is
  • 3:19 - 3:21
    that there is no such thing
    as a terrorist laptop,
  • 3:21 - 3:23
    or a drug dealer's cell phone.
  • 3:23 - 3:26
    We all use the same
    communications devices.
  • 3:27 - 3:30
    What that means is that
    if the drug dealers' telephone calls
  • 3:30 - 3:33
    or the terrorists' telephone calls
    can be intercepted,
  • 3:33 - 3:35
    then so can the rest of ours, too.
  • 3:35 - 3:36
    And I think we really need to ask:
  • 3:37 - 3:40
    Should a billion people
    around the world be using devices
  • 3:40 - 3:41
    that are wire-tap friendly?
  • 3:43 - 3:47
    So the scenario of hacking of surveillance
    systems that I've described --
  • 3:47 - 3:49
    this is not imaginary.
  • 3:50 - 3:51
    In 2009,
  • 3:51 - 3:55
    the surveillance systems that Google
    and Microsoft built into their networks --
  • 3:55 - 3:58
    the systems that they use to respond
    to lawful surveillance requests
  • 3:58 - 4:00
    from the police --
  • 4:00 - 4:02
    those systems were compromised
    by the Chinese government,
  • 4:02 - 4:05
    because the Chinese government
    wanted to figure out
  • 4:05 - 4:08
    which of their own agents
    the US government was monitoring.
  • 4:08 - 4:10
    By the same token,
  • 4:10 - 4:13
    in 2004, the surveillance system
    built into the network
  • 4:13 - 4:16
    of Vodafone Greece --
    Greece's largest telephone company --
  • 4:16 - 4:19
    was compromised by an unknown entity,
  • 4:19 - 4:21
    and that feature,
    the surveillance feature,
  • 4:21 - 4:23
    was used to wire-tap
    the Greek Prime Minister
  • 4:23 - 4:25
    and members of the Greek cabinet.
  • 4:25 - 4:28
    The foreign government or hackers
    who did that were never caught.
  • 4:30 - 4:34
    And really, this gets to the very problem
    with these surveillance features,
  • 4:34 - 4:35
    or back doors.
  • 4:35 - 4:38
    When you build a back door
    into a communications network
  • 4:38 - 4:39
    or piece of technology,
  • 4:40 - 4:43
    you have no way of controlling
    who's going to go through it.
  • 4:43 - 4:45
    You have no way of controlling
  • 4:45 - 4:47
    whether it'll be used by your side
    or the other side,
  • 4:48 - 4:49
    by good guys, or by bad guys.
  • 4:50 - 4:52
    And so for that reason,
    I think that it's better
  • 4:53 - 4:55
    to build networks
    to be as secure as possible.
  • 4:56 - 4:59
    Yes, this means that in the future,
  • 4:59 - 5:01
    encryption is going to make
    wire-tapping more difficult.
  • 5:01 - 5:04
    It means that the police
    are going to have a tougher time
  • 5:04 - 5:05
    catching bad guys.
  • 5:05 - 5:08
    But the alternative would mean
    to live in a world
  • 5:08 - 5:12
    where anyone's calls or anyone's
    text messages could be surveilled
  • 5:12 - 5:15
    by criminals, by stalkers
    and by foreign intelligence agencies.
  • 5:15 - 5:18
    And I don't want to live
    in that kind of world.
  • 5:18 - 5:21
    And so right now,
    you probably have the tools
  • 5:21 - 5:23
    to thwart many kinds
    of government surveillance
  • 5:23 - 5:26
    already on your phones
    and already in your pockets,
  • 5:26 - 5:30
    you just might not realize how strong
    and how secure those tools are,
  • 5:30 - 5:34
    or how weak the other ways
    you've used to communicate really are.
  • 5:35 - 5:37
    And so, my message to you is this:
  • 5:38 - 5:40
    We need to use these tools.
  • 5:40 - 5:43
    We need to secure our telephone calls.
  • 5:43 - 5:44
    We need to secure our text messages.
  • 5:45 - 5:47
    I want you to use these tools.
  • 5:47 - 5:50
    I want you to tell your loved ones,
    I want you to tell your colleagues:
  • 5:50 - 5:52
    Use these encrypted communications tools.
  • 5:52 - 5:55
    Don't just use them
    because they're cheap and easy,
  • 5:55 - 5:57
    but use them because they're secure.
  • 5:57 - 5:58
    Thank you.
  • 5:58 - 6:02
    (Applause)
Title:
How to avoid surveillance ... with the phone in your pocket
Speaker:
Christopher Soghoian
Description:

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
06:16

English subtitles

Revisions Compare revisions