Return to Video

A vision of crimes in the future

  • 0:02 - 0:04
    I study the future
  • 0:04 - 0:07
    of crime and terrorism,
  • 0:07 - 0:11
    and frankly, I'm afraid.
  • 0:11 - 0:13
    I'm afraid by what I see.
  • 0:13 - 0:15
    I sincerely want to believe
  • 0:15 - 0:18
    that technology can bring us
  • 0:18 - 0:20
    the techno-utopia that we've been promised,
  • 0:20 - 0:23
    but, you see,
  • 0:23 - 0:26
    I've spent a career in law enforcement,
  • 0:26 - 0:29
    and that's informed my perspective on things.
  • 0:29 - 0:31
    I've been a street police officer,
  • 0:31 - 0:33
    an undercover investigator,
  • 0:33 - 0:35
    a counter-terrorism strategist,
  • 0:35 - 0:37
    and I've worked in more than 70 countries
  • 0:37 - 0:39
    around the world.
  • 0:39 - 0:41
    And I've had to see more than my fair share
  • 0:41 - 0:44
    of violence and the darker underbelly of society,
  • 0:44 - 0:47
    and that's informed my opinions.
  • 0:47 - 0:50
    My work with criminals and terrorists
  • 0:50 - 0:52
    has actually been highly educational.
  • 0:52 - 0:54
    They have taught me a lot,
  • 0:54 - 0:56
    and I'd like to be able to share
  • 0:56 - 0:59
    some of these observations with you.
  • 0:59 - 1:01
    Today I'm going to show you the flip side
  • 1:01 - 1:04
    of all those technologies that we marvel at,
  • 1:04 - 1:06
    the ones that we love.
  • 1:06 - 1:08
    In the hands of the TED community,
  • 1:08 - 1:11
    these are awesome tools which will bring about
  • 1:11 - 1:14
    radical openness and great change for our world,
  • 1:14 - 1:19
    but in the hands of suicide bombers,
  • 1:19 - 1:21
    the future can look quite different.
  • 1:21 - 1:24
    I started observing
  • 1:24 - 1:27
    technology and how criminals were using it
  • 1:27 - 1:29
    as a young patrol officer.
  • 1:29 - 1:33
    In those days, this was the height of technology.
  • 1:33 - 1:35
    Laugh though you will,
  • 1:35 - 1:38
    all the drug dealers and gang members
  • 1:38 - 1:40
    with whom I dealt had one of these
  • 1:40 - 1:43
    long before any police officer I knew did.
  • 1:43 - 1:46
    Twenty years later, criminals are still using
  • 1:46 - 1:49
    mobile phones, but they're also building
  • 1:49 - 1:53
    their own mobile phone networks,
  • 1:53 - 1:55
    like this one, which has been deployed
  • 1:55 - 2:00
    in all 31 states of Mexico by the narcos.
  • 2:00 - 2:02
    They have a national encrypted
  • 2:02 - 2:05
    radio communications system.
  • 2:05 - 2:07
    Think about that.
  • 2:07 - 2:10
    Think about the innovation that went into that.
  • 2:10 - 2:13
    Think about the infrastructure to build it,
  • 2:13 - 2:15
    and then thing about this:
  • 2:15 - 2:17
    why can't I get a cell phone signal
  • 2:17 - 2:19
    in San Francisco? (Laughter)
  • 2:19 - 2:22
    How is this possible? (Laughter)
  • 2:22 - 2:24
    It makes no sense. (Applause)
  • 2:24 - 2:26
    We consistently underestimate
  • 2:26 - 2:28
    what criminals and terrorists can do.
  • 2:28 - 2:31
    Technology has made our world
  • 2:31 - 2:33
    increasingly open, and for the most part,
  • 2:33 - 2:35
    that's great, but all this openness
  • 2:35 - 2:37
    may have unintended consequences.
  • 2:37 - 2:40
    Consider the 2008 terrorist attack on Mumbai.
  • 2:40 - 2:43
    The men that carried that attack out were armed
  • 2:43 - 2:49
    with AK-47s, explosives, and hand grenades.
  • 2:49 - 2:51
    They threw these hand grenades
  • 2:51 - 2:54
    at innocent people as they sat eating in cafes
  • 2:54 - 2:58
    and waited to catch trains on their way home from work.
  • 2:58 - 3:00
    But heavy artillery is nothing new
  • 3:00 - 3:02
    in terrorist operations.
  • 3:02 - 3:05
    Guns and bombs are nothing new.
  • 3:05 - 3:07
    What was different this time
  • 3:07 - 3:09
    is the way that the terrorists used
  • 3:09 - 3:11
    modern information communications technologies
  • 3:11 - 3:15
    to locate additional victims and slaughter them.
  • 3:15 - 3:19
    They were armed with mobile phones.
  • 3:19 - 3:21
    They had Blackberries.
  • 3:21 - 3:24
    They had access to satellite imagery.
  • 3:24 - 3:26
    They had satellite phones,
  • 3:26 - 3:28
    and they even had night vision goggles.
  • 3:28 - 3:31
    But perhaps their greatest innovation was this.
  • 3:31 - 3:34
    We've all seen pictures like this
  • 3:34 - 3:36
    on television and in the news.
  • 3:36 - 3:38
    This is an operation center.
  • 3:38 - 3:40
    And the terrorists built their very own op center
  • 3:40 - 3:42
    across the border in Pakistan,
  • 3:42 - 3:44
    where they monitored the BBC,
  • 3:44 - 3:48
    al Jazeera, CNN, and Indian local stations.
  • 3:48 - 3:50
    They also monitored the internet
  • 3:50 - 3:53
    and social media
  • 3:53 - 3:55
    to monitor the progress of their attacks
  • 3:55 - 3:58
    and how many people they had killed.
  • 3:58 - 4:00
    They did all of this in real time.
  • 4:00 - 4:04
    The innovation of the terrorist operation center
  • 4:04 - 4:08
    gave terrorists unparalleled situational awareness
  • 4:08 - 4:10
    and tactical advantage over the police
  • 4:10 - 4:13
    and over the government.
  • 4:13 - 4:15
    What did they do with this?
  • 4:15 - 4:17
    They used it to great effect.
  • 4:17 - 4:19
    At one point during the 60-hour siege,
  • 4:19 - 4:21
    the terrorists were going room to room
  • 4:21 - 4:23
    trying to find additional victims.
  • 4:23 - 4:25
    They came upon a suite on the top floor
  • 4:25 - 4:27
    of the hotel, and they kicked down the door
  • 4:27 - 4:30
    and they found a man hiding by his bed.
  • 4:30 - 4:32
    And they said to him, "Who are you,
  • 4:32 - 4:34
    and what are you doing here?"
  • 4:34 - 4:36
    And the man replied,
  • 4:36 - 4:38
    "I'm just an innocent schoolteacher."
  • 4:38 - 4:40
    Of course, the terrorists knew
  • 4:40 - 4:42
    that no Indian schoolteacher stays at a suite
  • 4:42 - 4:44
    in the Taj.
  • 4:44 - 4:46
    They picked up his identification,
  • 4:46 - 4:50
    and they phoned his name in to the terrorist war room,
  • 4:50 - 4:52
    where the terrorist war room googled him,
  • 4:52 - 4:55
    and found a picture and called their operatives
  • 4:55 - 4:57
    on the ground and said,
  • 4:57 - 5:00
    "Your hostage, is he heavyset?
  • 5:00 - 5:05
    Is he bald in front? Does he wear glasses?"
  • 5:05 - 5:09
    "Yes, yes, yes," came the answers.
  • 5:09 - 5:12
    The op center had found him and they had a match.
  • 5:12 - 5:14
    He was not a schoolteacher.
  • 5:14 - 5:16
    He was the second-wealthiest businessman
  • 5:16 - 5:19
    in India, and after discovering this information,
  • 5:19 - 5:22
    the terrorist war room gave the order
  • 5:22 - 5:24
    to the terrorists on the ground in Mumbai.
  • 5:24 - 5:28
    We all worry about our privacy settings
  • 5:28 - 5:31
    on Facebook,
  • 5:31 - 5:33
    but the fact of the matter is,
  • 5:33 - 5:36
    our openness can be used against us.
  • 5:36 - 5:39
    Terrorists are doing this.
  • 5:39 - 5:42
    A search engine can determine
  • 5:42 - 5:45
    who shall live and who shall die.
  • 5:45 - 5:48
    This is the world that we live in.
  • 5:48 - 5:51
    During the Mumbai siege,
  • 5:51 - 5:54
    terrorists were so dependent on technology
  • 5:54 - 5:56
    that several witnesses reported that
  • 5:56 - 5:59
    as the terrorists were shooting hostages with one hand,
  • 5:59 - 6:01
    they were checking their mobile phone messages
  • 6:01 - 6:03
    in the very other hand.
  • 6:03 - 6:06
    That's how integrated it was.
  • 6:06 - 6:08
    In the end, 300 people were gravely wounded
  • 6:08 - 6:13
    and over on men, women, and children
  • 6:13 - 6:15
    lost their lives that day.
  • 6:15 - 6:18
    Think about what happened.
  • 6:18 - 6:21
    During this 60-hour siege on Mumbai,
  • 6:21 - 6:25
    10 men armed not just with weapons
  • 6:25 - 6:28
    but with technology
  • 6:28 - 6:31
    were able to bring a city of 20 million people
  • 6:31 - 6:34
    to a standstill.
  • 6:34 - 6:37
    Ten people brought 20 million people
  • 6:37 - 6:39
    to a standstill, and this traveled around the world.
  • 6:39 - 6:45
    This is what radicals can do with openness.
  • 6:45 - 6:48
    This was done nearly four years ago.
  • 6:48 - 6:50
    What could terrorists do today
  • 6:50 - 6:54
    with the technologies available that we have?
  • 6:54 - 6:56
    What will they do tomorrow?
  • 6:56 - 6:59
    The ability of one to affect many
  • 6:59 - 7:02
    is scaling exponentially,
  • 7:02 - 7:04
    and it's scaling for good
  • 7:04 - 7:06
    and it's scaling for evil.
  • 7:06 - 7:08
    It's not just about terrorism, though.
  • 7:08 - 7:10
    There's also been a big paradigm shift
  • 7:10 - 7:12
    in crime.
  • 7:12 - 7:15
    You see, you can now commit more crime as well.
  • 7:15 - 7:17
    In the old days, it was a knife and a gun.
  • 7:17 - 7:20
    Then criminals moved to robbing trains.
  • 7:20 - 7:22
    You could rob 200 people on a train,
  • 7:22 - 7:24
    a great innovation.
  • 7:24 - 7:26
    Moving forward, the internet
  • 7:26 - 7:28
    allowed things to scale even more.
  • 7:28 - 7:30
    In fact, many of you will remember
  • 7:30 - 7:32
    the recent Sony PlayStation hack.
  • 7:32 - 7:34
    In that incident, over 100 million people
  • 7:34 - 7:37
    were robbed.
  • 7:37 - 7:39
    Think about that.
  • 7:39 - 7:41
    When in the history of humanity
  • 7:41 - 7:43
    has it ever been possible for one person
  • 7:43 - 7:46
    to rob 100 million?
  • 7:46 - 7:49
    Of course, it's not just about stealing things.
  • 7:49 - 7:52
    There are other avenues of technology
  • 7:52 - 7:54
    that criminals can exploit.
  • 7:54 - 7:57
    Many of you will remember this super cute video
  • 7:57 - 7:59
    from the last TED,
  • 7:59 - 8:04
    but not all of quadcopter swarms are so nice and cute.
  • 8:04 - 8:06
    They don't all have drumsticks.
  • 8:06 - 8:08
    Some can be armed with HD cameras
  • 8:08 - 8:11
    and do countersurveillance on protesters,
  • 8:11 - 8:13
    or, as in this little bit of movie magic,
  • 8:13 - 8:19
    quadcopters can be loaded with firearms
  • 8:19 - 8:21
    and automatic weapons.
  • 8:21 - 8:24
    Little robots are cute when they play music to you.
  • 8:24 - 8:27
    When they swarm and chase you down the block
  • 8:27 - 8:29
    to shoot you, a little bit less so.
  • 8:29 - 8:32
    Of course, criminals and terrorists weren't the first
  • 8:32 - 8:35
    to give guns to robots.
  • 8:35 - 8:37
    We know where that started.
  • 8:37 - 8:38
    But they're adapting quickly.
  • 8:38 - 8:40
    Recently, the FBI arrested a man,
  • 8:40 - 8:42
    an al Qaeda affiliate in the United States,
  • 8:42 - 8:44
    who was planning on using these remote-controlled
  • 8:44 - 8:47
    drone aircraft to fly C4 explosives
  • 8:47 - 8:49
    into government buildings in the United States.
  • 8:49 - 8:52
    By the way, these travel
  • 8:52 - 8:54
    at over 600 miles an hour.
  • 8:54 - 8:57
    Every time a new technology is being introduced,
  • 8:57 - 9:00
    criminals are there to exploit it.
  • 9:00 - 9:02
    We've all seen 3D printers.
  • 9:02 - 9:04
    We know with them that you can print
  • 9:04 - 9:06
    in many materials ranging from plastic
  • 9:06 - 9:09
    to chocolate to metal and even concrete
  • 9:09 - 9:12
    with great precision.
  • 9:12 - 9:14
    I actually was able to make this
  • 9:14 - 9:16
    just the other day,
  • 9:16 - 9:19
    a very cute little ducky.
  • 9:19 - 9:23
    But I wonder to myself,
  • 9:23 - 9:26
    for those people that strap bombs
  • 9:26 - 9:29
    to their chests
  • 9:29 - 9:32
    and blow themselves up,
  • 9:32 - 9:34
    how might they use 3D printers?
  • 9:34 - 9:37
    Perhaps
  • 9:37 - 9:41
    like this.
  • 9:41 - 9:43
    You see, if you can print in metal,
  • 9:43 - 9:46
    you can print one of these,
  • 9:46 - 9:48
    and in fact,
  • 9:51 - 9:55
    you can also print one of these too.
  • 9:57 - 10:02
    The UK I know has some very strict firearms laws.
  • 10:02 - 10:05
    You needn't bring the gun into the UK anymore.
  • 10:05 - 10:07
    You just bring the 3D printer
  • 10:07 - 10:10
    and print the gun while you're here,
  • 10:10 - 10:13
    and, of course, the magazines for your bullets.
  • 10:13 - 10:15
    But as these gets bigger in the future,
  • 10:15 - 10:17
    what other items will you be able to print?
  • 10:17 - 10:20
    The technologies are allowing bigger printers.
  • 10:20 - 10:22
    As we move forward,
  • 10:22 - 10:24
    we'll see new technologies also, like the Internet of Things.
  • 10:24 - 10:27
    Every day we're connecting more and more of our lives
  • 10:27 - 10:29
    to the internet, which means
  • 10:29 - 10:31
    that the Internet of Things will soon be
  • 10:31 - 10:35
    the Internet of Things To Be Hacked.
  • 10:35 - 10:37
    All of the physical objects in our space
  • 10:37 - 10:39
    are being transformed into information technologies,
  • 10:39 - 10:43
    and that has a radical implication for our security,
  • 10:43 - 10:46
    because more connections to more devices
  • 10:46 - 10:48
    means more vulnerabilities.
  • 10:48 - 10:50
    Criminals understand this.
  • 10:50 - 10:53
    Terrorists understand this. Hackers understand this.
  • 10:53 - 10:54
    If you control the code,
  • 10:54 - 10:56
    you control the world.
  • 10:56 - 10:59
    This is the future that awaits us.
  • 10:59 - 11:03
    There has not yet been an operating system
  • 11:03 - 11:05
    or a technology that hasn't been hacked.
  • 11:05 - 11:08
    That's troubling, since the human body itself
  • 11:08 - 11:11
    is now becoming an information technology.
  • 11:11 - 11:13
    As we've seen here,
  • 11:13 - 11:15
    we're transforming ourselves into cyborgs.
  • 11:15 - 11:18
    Every year, thousands of cochlear implants,
  • 11:18 - 11:20
    diabetic pumps, pacemakers
  • 11:20 - 11:22
    and defibrillators are being implanted in people.
  • 11:22 - 11:24
    In the United States, there are 60,000 people
  • 11:24 - 11:27
    who have a pacemaker that connects to the internet.
  • 11:27 - 11:30
    The defibrillators allow a physician at a distance
  • 11:30 - 11:33
    to give a shock to a heart
  • 11:33 - 11:35
    in case a patient needs it.
  • 11:35 - 11:37
    But if you don't need it,
  • 11:37 - 11:40
    and somebody else gives you the shock,
  • 11:40 - 11:42
    it's not a good thing.
  • 11:42 - 11:44
    Of course, we're going to go even deeper
  • 11:44 - 11:46
    than the human body.
  • 11:46 - 11:49
    We're going down to the cellular level these days.
  • 11:49 - 11:51
    Up until this point, all the technologies
  • 11:51 - 11:53
    I've been talking about have been silicon-based
  • 11:53 - 11:55
    ones and zeroes,
  • 11:55 - 11:57
    but there's another operating system out there:
  • 11:57 - 12:01
    the original operating system, DNA.
  • 12:01 - 12:06
    And to hackers, DNA is just another operating system
  • 12:06 - 12:08
    waiting to be hacked.
  • 12:08 - 12:10
    It's a great challenge for them.
  • 12:10 - 12:12
    There are people already working
  • 12:12 - 12:14
    on hacking the software of life,
  • 12:14 - 12:16
    and while most of them are doing this to great good
  • 12:16 - 12:18
    and to help us all,
  • 12:18 - 12:20
    some won't be.
  • 12:20 - 12:22
    So how will criminals abuse this?
  • 12:22 - 12:24
    Well, with synthetic biology you can do
  • 12:24 - 12:26
    some pretty neat things.
  • 12:26 - 12:29
    For example, I predict that we will move away
  • 12:29 - 12:31
    from a plant-based narcotics world
  • 12:31 - 12:33
    to a synthetic one.
  • 12:33 - 12:35
    Why do you need the plants anymore?
  • 12:35 - 12:37
    You can just take the DNA code from marijuana
  • 12:37 - 12:42
    or poppies or coca leaves
  • 12:42 - 12:45
    and cut and past that gene
  • 12:45 - 12:47
    and put it into yeast,
  • 12:47 - 12:49
    and you can take those yeast
  • 12:49 - 12:51
    and make them make the cocaine for you,
  • 12:51 - 12:53
    or the marijuana,
  • 12:53 - 12:55
    or any other drug.
  • 12:55 - 12:57
    So how we use yeast in the future
  • 12:57 - 12:59
    is going to be really interesting.
  • 12:59 - 13:01
    In fact, we may have some really interesting
  • 13:01 - 13:03
    bread and beer as we go into
  • 13:03 - 13:06
    this next century. (Laughter)
  • 13:06 - 13:08
    The cost of sequencing the human genome
  • 13:08 - 13:10
    is dropping precipitously.
  • 13:10 - 13:12
    It was proceeding at Moore's Law pace,
  • 13:12 - 13:14
    but then in 2008, something changed.
  • 13:14 - 13:17
    The technologies got better,
  • 13:17 - 13:20
    and now DNA sequencing is proceeding at a pace
  • 13:20 - 13:23
    five times that of Moore's Law.
  • 13:23 - 13:26
    That has significant implications for us.
  • 13:26 - 13:29
    It took us 30 years to get from
  • 13:29 - 13:31
    the introduction of the personal computer
  • 13:31 - 13:34
    to the level of cybercrime we have today,
  • 13:34 - 13:36
    but looking at how biology is proceeding so rapidly,
  • 13:36 - 13:39
    and knowing criminals and terrorists as I do,
  • 13:39 - 13:41
    we may get there a lot faster
  • 13:41 - 13:43
    with biocrime in the future.
  • 13:43 - 13:45
    It will be easy for anybody to go ahead
  • 13:45 - 13:48
    and print their own bio-virus,
  • 13:48 - 13:50
    enhanced versions of ebola or anthrax,
  • 13:50 - 13:52
    weaponized flu.
  • 13:52 - 13:54
    We recently saw a case where some researchers
  • 13:54 - 13:58
    made the H5N1 avian influenza virus
  • 13:58 - 14:00
    more potent.
  • 14:00 - 14:03
    It already has a 70% mortality rate
  • 14:03 - 14:05
    if you get it, but it's hard to get.
  • 14:05 - 14:07
    Engineers, by moving around a small number
  • 14:07 - 14:09
    of genetic changes,
  • 14:09 - 14:11
    were able to weaponize it
  • 14:11 - 14:14
    and make it much more easy for human beings to catch,
  • 14:14 - 14:16
    so that not thousands of people would die,
  • 14:16 - 14:18
    but tens of millions.
  • 14:18 - 14:20
    You see, you can go ahead and create
  • 14:20 - 14:23
    new pandemics, and the researchers who did this
  • 14:23 - 14:24
    were so proud of their accomplishments,
  • 14:24 - 14:26
    they wanted to publish it openly
  • 14:26 - 14:29
    so that everybody could see this
  • 14:29 - 14:31
    and get access to this information.
  • 14:31 - 14:34
    But it goes deeper than that.
  • 14:34 - 14:36
    DNA researcher Andrew Hessel
  • 14:36 - 14:38
    has pointed out quite rightly
  • 14:38 - 14:40
    that if you can use cancer treatments,
  • 14:40 - 14:42
    modern cancer treatments,
  • 14:42 - 14:44
    to go after one cell while leaving all the other cells
  • 14:44 - 14:46
    around it intact,
  • 14:46 - 14:49
    then you can also go after any one person's cell.
  • 14:49 - 14:51
    Personalized cancer treatments
  • 14:51 - 14:54
    are the flip side of personalized bioweapons,
  • 14:54 - 14:57
    which means you can attack any one individual,
  • 14:57 - 15:01
    including all the people in this picture.
  • 15:01 - 15:04
    How will we protect them in the future?
  • 15:04 - 15:07
    What to do?
  • 15:07 - 15:09
    What to do about all this?
  • 15:09 - 15:11
    That's what I get asked all the time.
  • 15:11 - 15:13
    For those of you who follow me on twitter,
  • 15:13 - 15:15
    I will be tweeting out the answer
  • 15:15 - 15:17
    later on today. (Laughter)
  • 15:17 - 15:19
    Actually, it's a bit more complex than that,
  • 15:19 - 15:22
    and there are no magic bullets.
  • 15:22 - 15:24
    I don't have all the answers,
  • 15:24 - 15:26
    but I know a few things.
  • 15:26 - 15:28
    In the wake of 9/11,
  • 15:28 - 15:30
    the best security minds
  • 15:30 - 15:32
    put together all their innovation
  • 15:32 - 15:35
    and this is what they created
  • 15:35 - 15:37
    for security.
  • 15:37 - 15:39
    This was their thought of what
  • 15:39 - 15:41
    the best and brightest in security looks like.
  • 15:41 - 15:44
    If you're expecting the people who built this
  • 15:44 - 15:46
    to protect you
  • 15:46 - 15:49
    from the coming roboypocalypse — (Laughter)
  • 15:49 - 15:52
    — uh, you may want to have a backup plan. (Laughter)
  • 15:52 - 15:54
    Just saying. (Applause)
  • 15:54 - 15:58
    Just think about that. (Applause)
  • 15:58 - 16:01
    Law enforcement is currently a closed system.
  • 16:01 - 16:03
    It's nation-based, while the threat is international.
  • 16:03 - 16:06
    Policing doesn't scale globally.
  • 16:06 - 16:08
    At least, it hasn't,
  • 16:08 - 16:10
    and our current system of guns,
  • 16:10 - 16:13
    border guards, big gates and fences
  • 16:13 - 16:15
    are outdated in the new world into which we're moving.
  • 16:15 - 16:17
    So how might we prepare for some of these
  • 16:17 - 16:19
    specific threats, like attacking a president
  • 16:19 - 16:21
    or a prime minister?
  • 16:21 - 16:23
    This would be the natural government response,
  • 16:23 - 16:25
    to hide away all our government leaders
  • 16:25 - 16:27
    in hermetically sealed bubbles.
  • 16:27 - 16:29
    But this is not going to work.
  • 16:29 - 16:31
    The cost of doing a DNA sequence is going to be trivial.
  • 16:31 - 16:34
    Anybody will have it and we will all have them in the future.
  • 16:34 - 16:36
    So maybe there's a more radical way
  • 16:36 - 16:38
    that we can look at this.
  • 16:38 - 16:40
    What happens if we were to take
  • 16:40 - 16:43
    the President's DNA, or a king or queen's,
  • 16:43 - 16:45
    and put it out to a group of a few hundred
  • 16:45 - 16:47
    trusted researchers so they could
  • 16:47 - 16:49
    study that DNA and do penetration testing against it
  • 16:49 - 16:52
    as a means of helping our leaders?
  • 16:52 - 16:54
    Or what if we sent it out to a few thousand?
  • 16:54 - 16:57
    Or, controversially, and not without its risks,
  • 16:57 - 16:59
    what happens if we just gave it to the whole public?
  • 16:59 - 17:02
    Then we could all be engaged in helping.
  • 17:02 - 17:05
    We've already seen examples of this working well.
  • 17:05 - 17:09
    The Organized Crime and Corruption Reporting Project
  • 17:09 - 17:11
    is staffed by journalists and citizens
  • 17:11 - 17:13
    where they are crowd-sourcing
  • 17:13 - 17:15
    what dictators and terrorists are doing
  • 17:15 - 17:17
    with public funds around the world,
  • 17:17 - 17:19
    and, in a more dramatic case,
  • 17:19 - 17:21
    we've seen in Mexico
  • 17:21 - 17:23
    a country that has been racked
  • 17:23 - 17:26
    by 50,000 narcotics-related murders
  • 17:26 - 17:28
    in the past six years.
  • 17:28 - 17:30
    They're killing so many people
  • 17:30 - 17:32
    they can't even afford to bury them all
  • 17:32 - 17:34
    in anything but these unmarked graves
  • 17:34 - 17:36
    like this one outside of Ciudad Juarez.
  • 17:36 - 17:39
    What can we do about this?
  • 17:39 - 17:41
    The government has proven ineffective.
  • 17:41 - 17:43
    So in Mexico, citizens, at great risk to themselves,
  • 17:43 - 17:47
    are fighting back to build an effective solution.
  • 17:47 - 17:49
    They're crowd-mapping the activities
  • 17:49 - 17:52
    of the drug dealers.
  • 17:52 - 17:54
    Whether or not you realize it,
  • 17:54 - 17:56
    we are at the dawn of a technological arms race,
  • 17:56 - 17:58
    an arms race between people
  • 17:58 - 18:01
    who are using technology for good
  • 18:01 - 18:03
    and those who are using it for ill.
  • 18:03 - 18:05
    The threat is serious, and the time to prepare for it
  • 18:05 - 18:07
    is now.
  • 18:07 - 18:10
    I can assure you that the terrorists and criminals are.
  • 18:10 - 18:12
    My personal belief is that,
  • 18:12 - 18:14
    rather than having a small elite force
  • 18:14 - 18:17
    of highly trained government agents
  • 18:17 - 18:19
    here to protect us all,
  • 18:19 - 18:21
    we're much better off
  • 18:21 - 18:23
    having average and ordinary citizens like ourselves
  • 18:23 - 18:26
    approaching this problem as a group
  • 18:26 - 18:28
    and seeing what we can do.
  • 18:28 - 18:30
    If we all do all our part,
  • 18:30 - 18:32
    I think we'll be in a much better space.
  • 18:32 - 18:34
    The tools to change the world
  • 18:34 - 18:36
    are in everybody's hands.
  • 18:36 - 18:38
    How we use them is not just up to me,
  • 18:38 - 18:40
    it's up to all of us.
  • 18:40 - 18:42
    This was a technology I would frequently deploy
  • 18:42 - 18:44
    as a police officer.
  • 18:44 - 18:47
    This technology has become outdated
  • 18:47 - 18:49
    in our current world.
  • 18:49 - 18:51
    It doesn't scale, it doesn't work globally,
  • 18:51 - 18:54
    and it surely doesn't work virtually.
  • 18:54 - 18:57
    We've seen paradigm shifts in crime and terrorism.
  • 18:57 - 19:01
    They call for a shift to a more open form
  • 19:01 - 19:04
    and a more participatory form of law enforcement.
  • 19:04 - 19:08
    So I invite you to join me.
  • 19:08 - 19:11
    After all, public safety is too important
  • 19:11 - 19:13
    to leave to the professionals.
  • 19:13 - 19:17
    Thank you. (Applause)
  • 19:17 - 19:22
    (Applause)
Title:
A vision of crimes in the future
Speaker:
Marc Goodman
Description:

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
19:43

English subtitles

Revisions Compare revisions