How we take back the internet | Edward Snowden

TED
18 Mar 201435:18

Summary

TLDRIn a TED Talk delivered remotely, Edward Snowden discusses the importance of privacy and the role of the Internet in a democratic society. He emphasizes that he acted out of a desire to inform the public about surveillance programs that operate without transparency or oversight. Snowden argues for the necessity of a free and open Internet, advocating for encryption and the protection of user rights. He also addresses the potential dangers of weakened security standards, the misuse of government power, and the importance of a public debate on these issues.

Takeaways

  • 🌐 Edward Snowden believes that the issues at hand are more important than his personal identity or the labels attached to him.
  • 🔍 Snowden chose to leak classified documents because he witnessed overreaching surveillance programs that operated without public awareness or consent.
  • 📖 He prioritized working with journalists to ensure a public debate on surveillance, rather than going to Congress, which had no legal protections for whistleblowers at the time.
  • 📡 PRISM is a program that allows the government to compel corporate America to assist in mass surveillance, raising concerns about secret courts and lack of public oversight.
  • 💼 Companies were allegedly complicit in NSA data collection, with some pushing back but ultimately complying, highlighting the need for corporate responsibility in user privacy.
  • 🔒 Snowden suggests that internet companies should enable SSL web encryption by default to protect user privacy against global surveillance.
  • 📊 Boundless Informant is a program that tracks and estimates the amount of American communications intercepted by the NSA, contradicting previous claims of no such capability.
  • 🚨 The NSA has been reported to break its own privacy rules thousands of times a year, with little to no oversight or awareness from key government officials like Dianne Feinstein.
  • 🏛️ Snowden argues that mass surveillance is not only a threat to privacy but also to the cultural identity and democratic values of societies worldwide.
  • 🔑 The 'Bullrun' program is an initiative where the NSA intentionally misleads corporate partners to weaken security standards, creating vulnerabilities in global communications.
  • 🌟 Snowden emphasizes that democracy thrives on transparency and that privacy and security can coexist without compromising individual liberty or good governance.

Q & A

  • How does Edward Snowden describe his current situation and the method of his participation in the TED conference?

    -Edward Snowden describes his situation as being in a remote location in Russia, controlling a bot from his laptop to participate in the TED conference. He can see what the bot can see, which allows him to interact with the audience virtually.

  • What does Snowden believe is more important than his personal identity in the debate on surveillance?

    -Snowden believes that the issues at hand are more important than his personal identity. He emphasizes the kind of government, Internet, and the relationship between people and societies that we want, rather than focusing on his own character or the labels he's been given.

  • What was Snowden's motivation for revealing classified documents while working as a sysadmin for the NSA?

    -Snowden was motivated by his concerns about the surveillance programs that were being conducted in secret, without public awareness or consent. He wanted to maximize public benefit while minimizing risks and believed that working with journalists was the most responsible way to do so.

  • How does Snowden explain the PRISM program and its implications?

    -PRISM is a program that allows the government to compel corporate America to assist the NSA in surveillance. Snowden points out that even though companies like Yahoo resisted and challenged the government in court, they lost because the cases were heard by a secret court, not an open one.

  • What is Boundless Informant, and why did the NSA hide it from Congress?

    -Boundless Informant is a program that tracks both ends of a communication and can tell how many American communications are being intercepted. The NSA hid it from Congress because they claimed they couldn't track such statistics without invading privacy, despite the program's capability to do so.

  • How does Snowden respond to the argument that mass surveillance is acceptable if one has nothing to hide?

    -Snowden argues that the argument dismisses the importance of individual rights and privacy. He emphasizes that rights matter because one never knows when they might need them and that privacy is a part of our cultural identity in democratic societies.

  • What is the Bullrun program, and how does it affect global cybersecurity?

    -Bullrun is a program where the NSA intentionally misleads corporate partners about security standards, advising them to degrade the security of their services and build in backdoors. This not only allows the NSA but also any other entity to exploit these vulnerabilities, making the world less secure.

  • What does Snowden believe is the real motivation behind mass surveillance programs, beyond the war on terrorism?

    -Snowden suggests that terrorism is used as a cover for action to rationalize the authorization of powers and programs that people wouldn't otherwise give. He believes that the real motivation is to increase the government's power and control, using secrecy and the emotional response to terrorism.

  • How does Snowden view the potential for an amnesty to return to America, and what are his conditions?

    -Snowden would welcome the chance to return to America, but he is clear that he did not act for his own safety. He is unwilling to compromise the journalists he has been working with and insists on continuing his work in the public interest.

  • What is Snowden's idea worth spreading at this moment, according to his TED talk?

    -Snowden's idea worth spreading is that democracy thrives on openness, and privacy is not a trade-off for good governance or security. He believes in the possibility of having both open government and private lives and encourages collective effort to achieve this.

  • What does Snowden think about the role of the Internet and its future in relation to individual freedoms and privacy?

    -Snowden sees the Internet as a crucial platform for individual freedoms and privacy. He believes that it's the responsibility of those who have enjoyed a free and open Internet to preserve that liberty for future generations and to resist changes that could harm the Internet.

Outlines

00:00

🌐 Introduction and Snowden's Self-Description

Chris Anderson introduces Edward Snowden as the man behind significant NSA revelations. Snowden, joining from Russia, discusses perceptions of him as a whistleblower, traitor, or hero, emphasizing that the focus should be on the issues at hand rather than his personal identity. He highlights the importance of the kind of government and internet we want, and the relationship between people and societies.

05:01

🔍 Snowden's Motivations and the PRISM Program

Snowden explains his motivations for revealing classified documents, driven by his observations of activities within the intelligence community that troubled him. He talks about the lack of public awareness and consent regarding certain programs. Anderson then introduces the PRISM program, which Snowden describes as a tool for compelling corporate America to assist the NSA in surveillance, noting the resistance and subsequent defeat of companies like Yahoo in court.

10:04

📚 Boundless Informant and NSA's Privacy Rule Violations

Snowden discusses Boundless Informant, a program that tracks and estimates the number of communications intercepted by the NSA, including those of American citizens. He criticizes the NSA for hiding this program from Congress and violating its own rules thousands of times a year, emphasizing the lack of oversight and the scale of these violations.

15:07

🛡️ Privacy Rights and the 'Nothing to Hide' Argument

Addressing the common argument that those who have done nothing wrong have nothing to fear from surveillance, Snowden argues that rights are essential and should not be surrendered lightly. He discusses the cultural importance of privacy and the potential for future misuse of collected data, stressing the need for warrants and oversight to protect against the temptation of unchecked surveillance power.

20:08

🗝️ The Bullrun Program and Cybersecurity Risks

Snowden reveals the Bullrun program, an initiative where the NSA allegedly misled corporate partners about secure standards, effectively weakening security and introducing backdoors into systems. He warns of the dangers this poses to global cybersecurity and the potential for economic and intellectual property risks to the United States.

25:09

🤝 The Importance of Open Government and Personal Privacy

In the final paragraph, Snowden stresses the importance of balancing open government with personal privacy. He reiterates his commitment to public interest and rejects any suggestion of compromising his journalistic collaborators for personal gain. Snowden expresses hope for a collaborative effort to achieve both transparency and privacy, and thanks the audience for their engagement.

Mindmap

Keywords

💡Whistleblower

A whistleblower is an individual who exposes unethical or illegal activities, particularly within an organization. In the context of the video, Edward Snowden is referred to as a whistleblower for revealing classified information about surveillance programs, which he believed were infringing on the public's right to privacy.

💡PRISM

PRISM is a surveillance program under which the NSA allegedly compelled corporate America to provide access to user data. It represents a significant part of the video's discussion on government surveillance and corporate involvement, highlighting the tension between national security and individual privacy.

💡Metadata

Metadata refers to data that describes other data, such as the time and date of a communication. In the video, it is mentioned in contrast to the content of communications, which PRISM focuses on. Metadata is a key aspect of the surveillance debate as it can reveal intimate details about a person's life without revealing the content of their communications.

💡Encryption

Encryption is the process of converting data into a code to prevent unauthorized access. It is a crucial concept in the video as Snowden emphasizes the importance of SSL web encryption for protecting user data from surveillance. The lack of default encryption on sites like Amazon is highlighted as a privacy concern.

💡Boundless Informant

Boundless Informant is an NSA program that tracks and analyzes communications data, including the ability to determine the number of American communications intercepted. It is significant in the video as it contradicts the NSA's claim to Congress that they do not track such statistics, revealing a potential lack of oversight and transparency.

💡Surveillance

Surveillance is the close observation of individuals or groups, often associated with law enforcement or intelligence agencies. The video's central theme revolves around the ethical and legal implications of mass surveillance conducted by the NSA and its impact on civil liberties.

💡Privacy

Privacy is the state of being free from unauthorized intrusion or scrutiny. Snowden's actions were motivated by concerns over privacy violations due to mass surveillance. The video discusses the importance of privacy as a fundamental right and how surveillance programs can erode this right.

💡National Security

National security refers to the measures taken by a government to protect the country's safety and interests. It is often cited as a justification for surveillance programs. However, the video questions the balance between national security and individual privacy, suggesting that the latter is being unduly compromised.

💡Transparency

Transparency implies openness and accountability in actions and decisions. The video argues for greater transparency from governments, particularly in their surveillance activities, to ensure public trust and allow for informed debate on the balance between security and privacy.

💡Constitutional Rights

Constitutional rights are the rights guaranteed by a nation's constitution. The video discusses how surveillance programs may infringe upon constitutional rights, particularly the right to privacy and freedom of the press, which are central to democratic governance.

💡Cybersecurity

Cybersecurity involves the protection of internet-connected systems from threats. The video touches on how the NSA's actions, such as the Bullrun program, potentially undermine cybersecurity by introducing vulnerabilities that can be exploited by adversaries, thus harming national security.

Highlights

Edward Snowden discusses the importance of the kind of government and Internet we want, rather than focusing on his personal identity.

Snowden reveals his motivations for leaking classified documents, emphasizing the lack of public awareness and consent in secret government programs.

The PRISM program is explained as a means for the government to compel corporate America to aid in mass surveillance.

Snowden highlights the secret nature of the FISA court, which approves surveillance programs without public knowledge.

He criticizes the NSA's direct access to company servers, bypassing the need for physical interaction with company representatives.

Snowden calls for tech companies to enable SSL web encryption by default to protect user privacy.

Boundless Informant is introduced as a program that tracks and estimates the amount of American communications intercepted by the NSA.

Snowden discusses the NSA's privacy rule violations, which were unknown to high-level government officials like Dianne Feinstein.

He refutes the 'nothing to hide, nothing to fear' argument, emphasizing the importance of privacy as a cultural identity and right.

Snowden addresses the allegations of him stealing 1.7 million documents and hints at more revelations to come.

The Bullrun program is described as an initiative to mislead corporate partners and weaken security standards for surveillance purposes.

Snowden explains how the NSA's actions could potentially open America up to cyberattacks by reducing the security of global communications.

He argues that the NSA's programs have not stopped any imminent terrorist attacks in the U.S., as confirmed by federal courts and government panels.

Snowden suggests that the true motivation behind mass surveillance is not terrorism, but rather a cover for expanding government powers.

He shares his personal feelings about living in Russia and the threats to his safety, expressing his commitment to his cause despite the risks.

Snowden and Sir Tim Berners-Lee discuss the need for a Magna Carta for the Internet to protect and preserve online privacy and freedom.

Snowden concludes by emphasizing that democracy thrives on openness, and privacy and security can coexist without sacrificing either.

Transcripts

play00:13

Chris Anderson: The rights of citizens,

play00:15

the future of the Internet.

play00:17

So I would like to welcome to the TED stage

play00:20

the man behind those revelations,

play00:23

Ed Snowden.

play00:25

(Applause)

play00:29

Ed is in a remote location somewhere in Russia

play00:33

controlling this bot from his laptop,

play00:36

so he can see what the bot can see.

play00:40

Ed, welcome to the TED stage.

play00:42

What can you see, as a matter of fact?

play00:45

Edward Snowden: Ha, I can see everyone.

play00:47

This is amazing.

play00:49

(Laughter)

play00:53

CA: Ed, some questions for you.

play00:56

You've been called many things

play00:57

in the last few months.

play00:59

You've been called a whistleblower, a traitor,

play01:04

a hero.

play01:05

What words would you describe yourself with?

play01:09

ES: You know, everybody who is involved

play01:12

with this debate

play01:13

has been struggling over me and my personality

play01:16

and how to describe me.

play01:19

But when I think about it,

play01:21

this isn't the question that we should be struggling with.

play01:24

Who I am really doesn't matter at all.

play01:28

If I'm the worst person in the world,

play01:30

you can hate me and move on.

play01:32

What really matters here are the issues.

play01:35

What really matters here is the kind of government we want,

play01:38

the kind of Internet we want,

play01:39

the kind of relationship between people

play01:42

and societies.

play01:43

And that's what I'm hoping the debate will move towards,

play01:46

and we've seen that increasing over time.

play01:48

If I had to describe myself,

play01:50

I wouldn't use words like "hero."

play01:52

I wouldn't use "patriot," and I wouldn't use "traitor."

play01:54

I'd say I'm an American and I'm a citizen,

play01:57

just like everyone else.

play01:59

CA: So just to give some context

play02:01

for those who don't know the whole story --

play02:03

(Applause) —

play02:07

this time a year ago, you were stationed in Hawaii

play02:11

working as a consultant to the NSA.

play02:14

As a sysadmin, you had access

play02:16

to their systems,

play02:18

and you began revealing certain classified documents

play02:23

to some handpicked journalists

play02:26

leading the way to June's revelations.

play02:27

Now, what propelled you to do this?

play02:33

ES: You know,

play02:36

when I was sitting in Hawaii,

play02:38

and the years before, when I was working in the intelligence community,

play02:40

I saw a lot of things that had disturbed me.

play02:44

We do a lot of good things in the intelligence community,

play02:47

things that need to be done,

play02:49

and things that help everyone.

play02:51

But there are also things that go too far.

play02:53

There are things that shouldn't be done,

play02:55

and decisions that were being made in secret

play02:58

without the public's awareness,

play02:59

without the public's consent,

play03:01

and without even our representatives in government

play03:04

having knowledge of these programs.

play03:08

When I really came to struggle with these issues,

play03:12

I thought to myself,

play03:14

how can I do this in the most responsible way,

play03:17

that maximizes the public benefit

play03:20

while minimizing the risks?

play03:23

And out of all the solutions that I could come up with,

play03:26

out of going to Congress,

play03:28

when there were no laws,

play03:29

there were no legal protections

play03:31

for a private employee,

play03:33

a contractor in intelligence like myself,

play03:36

there was a risk that I would be buried along with the information

play03:40

and the public would never find out.

play03:42

But the First Amendment of the United States Constitution

play03:45

guarantees us a free press for a reason,

play03:48

and that's to enable an adversarial press,

play03:52

to challenge the government,

play03:53

but also to work together with the government,

play03:56

to have a dialogue and debate about how we can

play03:58

inform the public about matters of vital importance

play04:04

without putting our national security at risk.

play04:07

And by working with journalists,

play04:09

by giving all of my information

play04:11

back to the American people,

play04:13

rather than trusting myself to make

play04:15

the decisions about publication,

play04:18

we've had a robust debate

play04:20

with a deep investment by the government

play04:23

that I think has resulted in a benefit for everyone.

play04:28

And the risks that have been threatened,

play04:32

the risks that have been played up

play04:34

by the government

play04:36

have never materialized.

play04:37

We've never seen any evidence

play04:39

of even a single instance of specific harm,

play04:43

and because of that,

play04:44

I'm comfortable with the decisions that I made.

play04:46

CA: So let me show the audience

play04:49

a couple of examples of what you revealed.

play04:51

If we could have a slide up, and Ed,

play04:53

I don't know whether you can see,

play04:55

the slides are here.

play04:56

This is a slide of the PRISM program,

play04:58

and maybe you could tell the audience

play05:01

what that was that was revealed.

play05:03

ES: The best way to understand PRISM,

play05:06

because there's been a little bit of controversy,

play05:07

is to first talk about what PRISM isn't.

play05:11

Much of the debate in the U.S. has been about metadata.

play05:14

They've said it's just metadata, it's just metadata,

play05:16

and they're talking about a specific legal authority

play05:19

called Section 215 of the Patriot Act.

play05:22

That allows sort of a warrantless wiretapping,

play05:25

mass surveillance of the entire country's

play05:27

phone records, things like that --

play05:30

who you're talking to,

play05:31

when you're talking to them,

play05:33

where you traveled.

play05:34

These are all metadata events.

play05:37

PRISM is about content.

play05:40

It's a program through which the government could

play05:42

compel corporate America,

play05:44

it could deputize corporate America

play05:48

to do its dirty work for the NSA.

play05:51

And even though some of these companies did resist,

play05:54

even though some of them --

play05:56

I believe Yahoo was one of them —

play05:57

challenged them in court, they all lost,

play06:00

because it was never tried by an open court.

play06:03

They were only tried by a secret court.

play06:06

And something that we've seen,

play06:07

something about the PRISM program that's very concerning to me is,

play06:10

there's been a talking point in the U.S. government

play06:12

where they've said 15 federal judges

play06:16

have reviewed these programs and found them to be lawful,

play06:18

but what they don't tell you

play06:21

is those are secret judges

play06:24

in a secret court

play06:26

based on secret interpretations of law

play06:29

that's considered 34,000 warrant requests

play06:33

over 33 years,

play06:35

and in 33 years only rejected

play06:38

11 government requests.

play06:41

These aren't the people that we want deciding

play06:43

what the role of corporate America

play06:45

in a free and open Internet should be.

play06:48

CA: Now, this slide that we're showing here

play06:50

shows the dates in which

play06:52

different technology companies, Internet companies,

play06:55

are alleged to have joined the program,

play06:57

and where data collection began from them.

play07:00

Now, they have denied collaborating with the NSA.

play07:05

How was that data collected by the NSA?

play07:10

ES: Right. So the NSA's own slides

play07:13

refer to it as direct access.

play07:16

What that means to an actual NSA analyst,

play07:19

someone like me who was working as an intelligence analyst

play07:22

targeting, Chinese cyber-hackers,

play07:24

things like that, in Hawaii,

play07:26

is the provenance of that data

play07:28

is directly from their servers.

play07:30

It doesn't mean

play07:32

that there's a group of company representatives

play07:35

sitting in a smoky room with the NSA

play07:38

palling around and making back-room deals

play07:40

about how they're going to give this stuff away.

play07:42

Now each company handles it different ways.

play07:44

Some are responsible.

play07:46

Some are somewhat less responsible.

play07:48

But the bottom line is, when we talk about

play07:49

how this information is given,

play07:53

it's coming from the companies themselves.

play07:55

It's not stolen from the lines.

play07:58

But there's an important thing to remember here:

play08:00

even though companies pushed back,

play08:02

even though companies demanded,

play08:04

hey, let's do this through a warrant process,

play08:06

let's do this

play08:08

where we actually have some sort of legal review,

play08:11

some sort of basis for handing over

play08:13

these users' data,

play08:15

we saw stories in the Washington Post last year

play08:17

that weren't as well reported as the PRISM story

play08:20

that said the NSA broke in

play08:23

to the data center communications

play08:25

between Google to itself

play08:27

and Yahoo to itself.

play08:29

So even these companies that are cooperating

play08:31

in at least a compelled but hopefully lawful manner

play08:34

with the NSA,

play08:36

the NSA isn't satisfied with that,

play08:39

and because of that, we need our companies

play08:41

to work very hard

play08:44

to guarantee that they're going to represent

play08:47

the interests of the user, and also advocate

play08:49

for the rights of the users.

play08:51

And I think over the last year,

play08:52

we've seen the companies that are named

play08:54

on the PRISM slides

play08:55

take great strides to do that,

play08:57

and I encourage them to continue.

play09:00

CA: What more should they do?

play09:02

ES: The biggest thing that an Internet company

play09:06

in America can do today, right now,

play09:09

without consulting with lawyers,

play09:10

to protect the rights of users worldwide,

play09:14

is to enable SSL web encryption

play09:19

on every page you visit.

play09:21

The reason this matters is today,

play09:24

if you go to look at a copy of "1984" on Amazon.com,

play09:29

the NSA can see a record of that,

play09:32

the Russian intelligence service can see a record of that,

play09:34

the Chinese service can see a record of that,

play09:37

the French service, the German service,

play09:39

the services of Andorra.

play09:40

They can all see it because it's unencrypted.

play09:43

The world's library is Amazon.com,

play09:47

but not only do they not support encryption by default,

play09:49

you cannot choose to use encryption

play09:52

when browsing through books.

play09:53

This is something that we need to change,

play09:55

not just for Amazon, I don't mean to single them out,

play09:57

but they're a great example.

play09:58

All companies need to move

play10:00

to an encrypted browsing habit by default

play10:03

for all users who haven't taken any action

play10:06

or picked any special methods on their own.

play10:08

That'll increase the privacy and the rights

play10:10

that people enjoy worldwide.

play10:13

CA: Ed, come with me to this part of the stage.

play10:16

I want to show you the next slide here. (Applause)

play10:19

This is a program called Boundless Informant.

play10:21

What is that?

play10:23

ES: So, I've got to give credit to the NSA

play10:25

for using appropriate names on this.

play10:28

This is one of my favorite NSA cryptonyms.

play10:31

Boundless Informant

play10:33

is a program that the NSA hid from Congress.

play10:36

The NSA was previously asked by Congress,

play10:38

was there any ability that they had

play10:40

to even give a rough ballpark estimate

play10:44

of the amount of American communications

play10:46

that were being intercepted.

play10:49

They said no. They said, we don't track those stats,

play10:52

and we can't track those stats.

play10:53

We can't tell you how many communications

play10:56

we're intercepting around the world,

play10:58

because to tell you that would be

play10:59

to invade your privacy.

play11:02

Now, I really appreciate that sentiment from them,

play11:05

but the reality, when you look at this slide is,

play11:07

not only do they have the capability,

play11:08

the capability already exists.

play11:11

It's already in place.

play11:13

The NSA has its own internal data format

play11:16

that tracks both ends of a communication,

play11:20

and if it says,

play11:21

this communication came from America,

play11:23

they can tell Congress how many of those communications

play11:26

they have today, right now.

play11:28

And what Boundless Informant tells us

play11:31

is more communications are being intercepted

play11:34

in America about Americans

play11:37

than there are in Russia about Russians.

play11:40

I'm not sure that's what an intelligence agency

play11:42

should be aiming for.

play11:44

CA: Ed, there was a story broken in the Washington Post,

play11:47

again from your data.

play11:49

The headline says,

play11:50

"NSA broke privacy rules

play11:52

thousands of times per year."

play11:54

Tell us about that.

play11:55

ES: We also heard in Congressional testimony last year,

play11:58

it was an amazing thing for someone like me

play12:00

who came from the NSA

play12:02

and who's seen the actual internal documents,

play12:04

knows what's in them,

play12:07

to see officials testifying under oath

play12:09

that there had been no abuses,

play12:11

that there had been no violations of the NSA's rules,

play12:15

when we knew this story was coming.

play12:18

But what's especially interesting about this,

play12:20

about the fact that the NSA has violated

play12:22

their own rules, their own laws

play12:24

thousands of times in a single year,

play12:27

including one event by itself,

play12:30

one event out of those 2,776,

play12:35

that affected more than 3,000 people.

play12:37

In another event, they intercepted

play12:39

all the calls in Washington, D.C., by accident.

play12:43

What's amazing about this,

play12:45

this report, that didn't get that much attention,

play12:47

is the fact that not only were there 2,776 abuses,

play12:52

the chairman of the Senate Intelligence Committee,

play12:54

Dianne Feinstein, had not seen this report

play12:58

until the Washington Post contacted her

play13:02

asking for comment on the report.

play13:04

And she then requested a copy from the NSA

play13:06

and received it,

play13:08

but had never seen this before that.

play13:10

What does that say about the state of oversight

play13:12

in American intelligence

play13:14

when the chairman of the Senate Intelligence Committee

play13:16

has no idea that the rules are being broken

play13:19

thousands of times every year?

play13:21

CA: Ed, one response to this whole debate is this:

play13:24

Why should we care about

play13:27

all this surveillance, honestly?

play13:29

I mean, look, if you've done nothing wrong,

play13:31

you've got nothing to worry about.

play13:34

What's wrong with that point of view?

play13:36

ES: Well, so the first thing is,

play13:37

you're giving up your rights.

play13:39

You're saying hey, you know,

play13:41

I don't think I'm going to need them,

play13:43

so I'm just going to trust that, you know,

play13:45

let's get rid of them, it doesn't really matter,

play13:48

these guys are going to do the right thing.

play13:50

Your rights matter

play13:51

because you never know when you're going to need them.

play13:54

Beyond that, it's a part of our cultural identity,

play13:57

not just in America,

play13:59

but in Western societies

play14:00

and in democratic societies around the world.

play14:03

People should be able to pick up the phone

play14:06

and to call their family,

play14:07

people should be able to send a text message

play14:09

to their loved ones,

play14:10

people should be able to buy a book online,

play14:13

they should be able to travel by train,

play14:14

they should be able to buy an airline ticket

play14:17

without wondering about how these events

play14:18

are going to look to an agent of the government,

play14:22

possibly not even your government

play14:25

years in the future,

play14:26

how they're going to be misinterpreted

play14:28

and what they're going to think your intentions were.

play14:31

We have a right to privacy.

play14:33

We require warrants to be based on probable cause

play14:37

or some kind of individualized suspicion

play14:39

because we recognize that trusting anybody,

play14:44

any government authority,

play14:45

with the entirety of human communications

play14:48

in secret and without oversight

play14:51

is simply too great a temptation to be ignored.

play14:56

CA: Some people are furious at what you've done.

play14:58

I heard a quote recently from Dick Cheney

play15:01

who said that Julian Assange was a flea bite,

play15:07

Edward Snowden is the lion that bit the head off the dog.

play15:10

He thinks you've committed

play15:12

one of the worst acts of betrayal

play15:14

in American history.

play15:16

What would you say to people who think that?

play15:22

ES: Dick Cheney's really something else.

play15:25

(Laughter) (Applause)

play15:32

Thank you. (Laughter)

play15:37

I think it's amazing, because at the time

play15:39

Julian Assange was doing some of his greatest work,

play15:43

Dick Cheney was saying

play15:45

he was going to end governments worldwide,

play15:47

the skies were going to ignite

play15:50

and the seas were going to boil off,

play15:52

and now he's saying it's a flea bite.

play15:54

So we should be suspicious about the same sort of

play15:57

overblown claims of damage to national security

play16:01

from these kind of officials.

play16:03

But let's assume that these people really believe this.

play16:09

I would argue that they have kind of

play16:12

a narrow conception of national security.

play16:16

The prerogatives of people like Dick Cheney

play16:19

do not keep the nation safe.

play16:22

The public interest is not always the same

play16:26

as the national interest.

play16:29

Going to war with people who are not our enemy

play16:33

in places that are not a threat

play16:35

doesn't make us safe,

play16:37

and that applies whether it's in Iraq

play16:39

or on the Internet.

play16:41

The Internet is not the enemy.

play16:42

Our economy is not the enemy.

play16:44

American businesses, Chinese businesses,

play16:47

and any other company out there

play16:51

is a part of our society.

play16:54

It's a part of our interconnected world.

play16:56

There are ties of fraternity that bond us together,

play17:00

and if we destroy these bonds

play17:03

by undermining the standards, the security,

play17:06

the manner of behavior,

play17:09

that nations and citizens all around the world

play17:12

expect us to abide by.

play17:14

CA: But it's alleged that you've stolen

play17:18

1.7 million documents.

play17:20

It seems only a few hundred of them

play17:22

have been shared with journalists so far.

play17:25

Are there more revelations to come?

play17:28

ES: There are absolutely more revelations to come.

play17:30

I don't think there's any question

play17:33

that some of the most important reporting

play17:37

to be done is yet to come.

play17:42

CA: Come here, because I want to ask you

play17:44

about this particular revelation.

play17:46

Come and take a look at this.

play17:49

I mean, this is a story which I think for a lot of the techies in this room

play17:52

is the single most shocking thing

play17:54

that they have heard in the last few months.

play17:56

It's about a program called "Bullrun."

play17:59

Can you explain what that is?

play18:02

ES: So Bullrun, and this is again

play18:04

where we've got to thank the NSA for their candor,

play18:11

this is a program named after a Civil War battle.

play18:16

The British counterpart is called Edgehill,

play18:17

which is a U.K. civil war battle.

play18:19

And the reason that I believe they're named this way

play18:21

is because they target our own infrastructure.

play18:25

They're programs through which the NSA

play18:27

intentionally misleads corporate partners.

play18:31

They tell corporate partners that these

play18:33

are safe standards.

play18:35

They say hey, we need to work with you

play18:37

to secure your systems,

play18:41

but in reality, they're giving bad advice

play18:44

to these companies that makes them

play18:45

degrade the security of their services.

play18:47

They're building in backdoors that not only

play18:50

the NSA can exploit,

play18:52

but anyone else who has time and money

play18:55

to research and find it

play18:57

can then use to let themselves in

play18:59

to the world's communications.

play19:01

And this is really dangerous,

play19:03

because if we lose a single standard,

play19:07

if we lose the trust of something like SSL,

play19:10

which was specifically targeted

play19:11

by the Bullrun program,

play19:13

we will live a less safe world overall.

play19:16

We won't be able to access our banks

play19:18

and we won't be able to access commerce

play19:23

without worrying about people monitoring those communications

play19:26

or subverting them for their own ends.

play19:28

CA: And do those same decisions also potentially

play19:32

open America up to cyberattacks

play19:35

from other sources?

play19:39

ES: Absolutely.

play19:41

One of the problems,

play19:43

one of the dangerous legacies

play19:46

that we've seen in the post-9/11 era,

play19:49

is that the NSA has traditionally worn two hats.

play19:54

They've been in charge of offensive operations,

play19:56

that is hacking,

play19:57

but they've also been in charge of defensive operations,

play19:59

and traditionally they've always prioritized

play20:02

defense over offense

play20:03

based on the principle

play20:05

that American secrets are simply worth more.

play20:07

If we hack a Chinese business

play20:10

and steal their secrets,

play20:11

if we hack a government office in Berlin

play20:13

and steal their secrets,

play20:15

that has less value to the American people

play20:19

than making sure that the Chinese

play20:21

can't get access to our secrets.

play20:24

So by reducing the security of our communications,

play20:28

they're not only putting the world at risk,

play20:30

they're putting America at risk in a fundamental way,

play20:32

because intellectual property is the basis,

play20:35

the foundation of our economy,

play20:37

and if we put that at risk through weak security,

play20:39

we're going to be paying for it for years.

play20:41

CA: But they've made a calculation

play20:42

that it was worth doing this

play20:44

as part of America's defense against terrorism.

play20:48

Surely that makes it a price worth paying.

play20:51

ES: Well, when you look at the results

play20:55

of these programs in stopping terrorism,

play20:58

you will see that that's unfounded,

play21:01

and you don't have to take my word for it,

play21:03

because we've had the first open court,

play21:07

the first federal court that's reviewed this,

play21:09

outside the secrecy arrangement,

play21:12

called these programs Orwellian

play21:14

and likely unconstitutional.

play21:16

Congress, who has access

play21:19

to be briefed on these things,

play21:21

and now has the desire to be,

play21:23

has produced bills to reform it,

play21:26

and two independent White House panels

play21:29

who reviewed all of the classified evidence

play21:31

said these programs have never stopped

play21:34

a single terrorist attack

play21:35

that was imminent in the United States.

play21:39

So is it really terrorism that we're stopping?

play21:42

Do these programs have any value at all?

play21:44

I say no, and all three branches

play21:47

of the American government say no as well.

play21:49

CA: I mean, do you think there's a deeper motivation

play21:51

for them than the war against terrorism?

play21:54

ES: I'm sorry, I couldn't hear you, say again?

play21:56

CA: Sorry. Do you think there's a deeper motivation

play21:59

for them other than the war against terrorism?

play22:02

ES: Yeah. The bottom line is that terrorism

play22:05

has always been what we in the intelligence world

play22:07

would call a cover for action.

play22:11

Terrorism is something that provokes

play22:13

an emotional response that allows people

play22:15

to rationalize authorizing powers and programs

play22:19

that they wouldn't give otherwise.

play22:22

The Bullrun and Edgehill-type programs,

play22:24

the NSA asked for these authorities

play22:26

back in the 1990s.

play22:28

They asked the FBI to go to Congress and make the case.

play22:31

The FBI went to Congress and did make the case.

play22:33

But Congress and the American people said no.

play22:35

They said, it's not worth the risk to our economy.

play22:38

They said it's worth too much damage

play22:40

to our society to justify the gains.

play22:43

But what we saw is, in the post-9/11 era,

play22:47

they used secrecy and they used the justification of terrorism

play22:50

to start these programs in secret

play22:52

without asking Congress,

play22:54

without asking the American people,

play22:56

and it's that kind of government behind closed doors

play22:59

that we need to guard ourselves against,

play23:01

because it makes us less safe,

play23:02

and it offers no value.

play23:04

CA: Okay, come with me here for a sec,

play23:06

because I've got a more personal question for you.

play23:08

Speaking of terror,

play23:11

most people would find the situation you're in right now

play23:15

in Russia pretty terrifying.

play23:19

You obviously heard what happened,

play23:22

what the treatment that Bradley Manning got,

play23:24

Chelsea Manning as now is,

play23:27

and there was a story in Buzzfeed saying that

play23:29

there are people in the intelligence community

play23:31

who want you dead.

play23:33

How are you coping with this?

play23:35

How are you coping with the fear?

play23:37

ES: It's no mystery

play23:40

that there are governments out there that want to see me dead.

play23:46

I've made clear again and again and again

play23:49

that I go to sleep every morning

play23:52

thinking about what I can do for the American people.

play23:57

I don't want to harm my government.

play24:00

I want to help my government,

play24:03

but the fact that they are willing to

play24:07

completely ignore due process,

play24:09

they're willing to declare guilt

play24:12

without ever seeing a trial,

play24:15

these are things that we need to work against

play24:18

as a society, and say hey, this is not appropriate.

play24:21

We shouldn't be threatening dissidents.

play24:23

We shouldn't be criminalizing journalism.

play24:26

And whatever part I can do to see that end,

play24:30

I'm happy to do despite the risks.

play24:33

CA: So I'd actually like to get some feedback

play24:34

from the audience here,

play24:35

because I know there's widely differing reactions

play24:38

to Edward Snowden.

play24:39

Suppose you had the following two choices, right?

play24:42

You could view what he did

play24:45

as fundamentally a reckless act

play24:46

that has endangered America

play24:50

or you could view it as fundamentally a heroic act

play24:53

that will work towards America and the world's

play24:57

long-term good?

play24:58

Those are the two choices I'll give you.

play25:01

I'm curious to see who's willing to vote with

play25:04

the first of those,

play25:05

that this was a reckless act?

play25:08

There are some hands going up.

play25:10

Some hands going up.

play25:11

It's hard to put your hand up

play25:13

when the man is standing right here,

play25:15

but I see them.

play25:16

ES: I can see you. (Laughter)

play25:19

CA: And who goes with the second choice,

play25:21

the fundamentally heroic act?

play25:23

(Applause) (Cheers)

play25:26

And I think it's true to say that there are a lot of people

play25:28

who didn't show a hand and I think

play25:31

are still thinking this through,

play25:32

because it seems to me that the debate around you

play25:36

doesn't split along traditional political lines.

play25:39

It's not left or right, it's not really about

play25:41

pro-government, libertarian, or not just that.

play25:45

Part of it is almost a generational issue.

play25:48

You're part of a generation that grew up

play25:50

with the Internet, and it seems as if

play25:53

you become offended at almost a visceral level

play25:56

when you see something done

play25:57

that you think will harm the Internet.

play25:59

Is there some truth to that?

play26:03

ES: It is. I think it's very true.

play26:08

This is not a left or right issue.

play26:11

Our basic freedoms, and when I say our,

play26:13

I don't just mean Americans,

play26:15

I mean people around the world,

play26:17

it's not a partisan issue.

play26:19

These are things that all people believe,

play26:21

and it's up to all of us to protect them,

play26:24

and to people who have seen and enjoyed

play26:27

a free and open Internet,

play26:28

it's up to us to preserve that liberty

play26:32

for the next generation to enjoy,

play26:34

and if we don't change things,

play26:35

if we don't stand up to make the changes

play26:39

we need to do to keep the Internet safe,

play26:42

not just for us but for everyone,

play26:45

we're going to lose that,

play26:46

and that would be a tremendous loss,

play26:47

not just for us, but for the world.

play26:50

CA: Well, I have heard similar language recently

play26:52

from the founder of the world wide web,

play26:54

who I actually think is with us, Sir Tim Berners-Lee.

play26:58

Tim, actually, would you like to come up and say,

play27:01

do we have a microphone for Tim?

play27:03

(Applause)

play27:05

Tim, good to see you. Come up there.

play27:12

Which camp are you in, by the way,

play27:15

traitor, hero? I have a theory on this, but --

play27:18

Tim Berners-Lee: I've given much longer

play27:21

answers to that question, but hero,

play27:24

if I have to make the choice between the two.

play27:27

CA: And Ed, I think you've read

play27:31

the proposal that Sir Tim has talked about

play27:33

about a new Magna Carta to take back the Internet.

play27:36

Is that something that makes sense?

play27:38

ES: Absolutely. I mean, my generation, I grew up

play27:41

not just thinking about the Internet,

play27:43

but I grew up in the Internet,

play27:46

and although I never expected to have the chance

play27:50

to defend it in such a direct and practical manner

play27:56

and to embody it in this unusual,

play28:00

almost avatar manner,

play28:02

I think there's something poetic about the fact that

play28:05

one of the sons of the Internet

play28:07

has actually become close to the Internet

play28:10

as a result of their political expression.

play28:12

And I believe that a Magna Carta for the Internet

play28:16

is exactly what we need.

play28:18

We need to encode our values

play28:21

not just in writing but in the structure of the Internet,

play28:25

and it's something that I hope,

play28:27

I invite everyone in the audience,

play28:29

not just here in Vancouver but around the world,

play28:33

to join and participate in.

play28:35

CA: Do you have a question for Ed?

play28:37

TBL: Well, two questions,

play28:39

a general question —

play28:40

CA: Ed, can you still hear us?

play28:42

ES: Yes, I can hear you. CA: Oh, he's back.

play28:46

TBL: The wiretap on your line

play28:47

got a little interfered with for a moment.

play28:49

(Laughter)

play28:51

ES: It's a little bit of an NSA problem.

play28:53

TBL: So, from the 25 years,

play28:57

stepping back and thinking,

play29:00

what would you think would be

play29:02

the best that we could achieve

play29:04

from all the discussions that we have

play29:06

about the web we want?

play29:09

ES: When we think about

play29:12

in terms of how far we can go,

play29:15

I think that's a question that's really only limited

play29:18

by what we're willing to put into it.

play29:20

I think the Internet that we've enjoyed in the past

play29:23

has been exactly what we as not just a nation

play29:29

but as a people around the world need,

play29:32

and by cooperating, by engaging not just

play29:36

the technical parts of society,

play29:38

but as you said, the users,

play29:40

the people around the world who contribute

play29:43

through the Internet, through social media,

play29:45

who just check the weather,

play29:47

who rely on it every day as a part of their life,

play29:49

to champion that.

play29:52

We'll get not just the Internet we've had,

play29:55

but a better Internet, a better now,

play29:58

something that we can use to build a future

play30:02

that'll be better not just than what we hoped for

play30:05

but anything that we could have imagined.

play30:07

CA: It's 30 years ago that TED was founded, 1984.

play30:13

A lot of the conversation since then has been

play30:15

along the lines that

play30:17

actually George Orwell got it wrong.

play30:18

It's not Big Brother watching us.

play30:20

We, through the power of the web,

play30:22

and transparency, are now watching Big Brother.

play30:24

Your revelations kind of drove a stake

play30:26

through the heart of that rather optimistic view,

play30:30

but you still believe there's a way of doing something

play30:34

about that.

play30:35

And you do too.

play30:37

ES: Right, so there is an argument to be made

play30:43

that the powers of Big Brother have increased enormously.

play30:47

There was a recent legal article at Yale

play30:51

that established something called the Bankston-Soltani Principle,

play30:55

which is that our expectation of privacy is violated

play31:00

when the capabilities of government surveillance

play31:02

have become cheaper by an order of magnitude,

play31:05

and each time that occurs, we need to revisit

play31:08

and rebalance our privacy rights.

play31:11

Now, that hasn't happened since

play31:13

the government's surveillance powers

play31:15

have increased by several orders of magnitude,

play31:18

and that's why we're in the problem that we're in today,

play31:21

but there is still hope,

play31:25

because the power of individuals

play31:27

have also been increased by technology.

play31:30

I am living proof

play31:32

that an individual can go head to head

play31:34

against the most powerful adversaries

play31:36

and the most powerful intelligence agencies

play31:38

around the world and win,

play31:42

and I think that's something

play31:44

that we need to take hope from,

play31:46

and we need to build on

play31:47

to make it accessible not just to technical experts

play31:50

but to ordinary citizens around the world.

play31:52

Journalism is not a crime,

play31:54

communication is not a crime,

play31:56

and we should not be monitored in our everyday activities.

play31:59

CA: I'm not quite sure how you shake the hand of a bot,

play32:01

but I imagine it's, this is the hand right here. TBL: That'll come very soon.

play32:07

ES: Nice to meet you,

play32:08

and I hope my beam looks as nice

play32:10

as my view of you guys does.

play32:13

CA: Thank you, Tim.

play32:16

(Applause)

play32:21

I mean, The New York Times recently called for an amnesty for you.

play32:25

Would you welcome the chance to come back to America?

play32:30

ES: Absolutely. There's really no question,

play32:33

the principles that have been the foundation

play32:36

of this project

play32:38

have been the public interest

play32:42

and the principles that underly

play32:45

the journalistic establishment in the United States

play32:49

and around the world,

play32:51

and I think if the press is now saying,

play32:56

we support this,

play32:58

this is something that needed to happen,

play33:00

that's a powerful argument, but it's not the final argument,

play33:03

and I think that's something that public should decide.

play33:06

But at the same time,

play33:07

the government has hinted that they want

play33:09

some kind of deal,

play33:11

that they want me to compromise

play33:13

the journalists with which I've been working,

play33:15

to come back,

play33:16

and I want to make it very clear

play33:19

that I did not do this to be safe.

play33:22

I did this to do what was right,

play33:24

and I'm not going to stop my work

play33:26

in the public interest

play33:28

just to benefit myself.

play33:30

(Applause)

play33:36

CA: In the meantime,

play33:38

courtesy of the Internet and this technology,

play33:42

you're here, back in North America,

play33:44

not quite the U.S., Canada, in this form.

play33:48

I'm curious, how does that feel?

play33:52

ES: Canada is different than what I expected.

play33:55

It's a lot warmer.

play33:57

(Laughter)

play34:02

CA: At TED, the mission is "ideas worth spreading."

play34:06

If you could encapsulate it in a single idea,

play34:08

what is your idea worth spreading

play34:10

right now at this moment?

play34:14

ES: I would say the last year has been a reminder

play34:18

that democracy may die behind closed doors,

play34:21

but we as individuals are born

play34:23

behind those same closed doors,

play34:26

and we don't have to give up

play34:28

our privacy to have good government.

play34:32

We don't have to give up our liberty

play34:34

to have security.

play34:35

And I think by working together

play34:38

we can have both open government

play34:41

and private lives,

play34:42

and I look forward to working with everyone

play34:44

around the world to see that happen.

play34:47

Thank you very much.

play34:48

CA: Ed, thank you.

play34:50

(Applause)

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
Edward SnowdenPrivacy RightsSurveillanceInternet FreedomGovernment OversightNSA WhistleblowerDigital SecurityCybersecurityTED TalkPublic Interest
¿Necesitas un resumen en inglés?