How we take back the internet | Edward Snowden

TED
18 Mar 201435:18

Summary

TLDRエドワード・スノーデンは、テッドのステージにリモートから登場し、インターネットの未来と市民の権利について話しました。彼は自己を「英雄」や「裏切り者」ではなく、アメリカ人の市民と位置付け、重要な問題は政府やインターネットのあり方にあると強調しました。NSAの監視プログラムの過剰な点と秘密の決定過程を批判し、報道機関と協力して情報を公開することで、国民による活発な議論が生まれたと主張。また、企業はSSL暗号化を有効にし、プライバシーを強化するべきだと述べ、インターネットの自由と開放を保つために行動する必要性を呼びかけました。

Takeaways

  • 🌐 エドワード・スノーデンは、インターネットの自由と開放性、そして市民の権利を守ることに情熱を注いでいる。
  • 🗣️ スノーデンは自らを「アメリカ人、市民」と位置付け、英雄や裏切り者という言葉を用いたくないと述べた。
  • 🔍 彼はNSAのシステム管理者として、過度な監視活動を目撃し、その問題を公表することで公衆の利益を最大化しようと決意した。
  • 📚 PRISMプログラムは、政府が企業に協力を強要し、民間企業をNSAのスパイ活動に加担させたものである。
  • 🔒 SSLウェブ暗号化を有効にすることで、インターネット企業がユーザーの権利を守る最も大きなステップを踏むことができる。
  • 📉 Boundless Informantプログラムは、NSAがアメリカ国内での通信の監視を追跡しており、アメリカ国内での監視が世界的に見ても非常に多いことを明かしている。
  • 🚨 NSAは自らのルールを数千回も破ったが、それについて詳しい報告が上層部には届かず、監督の不十分さを指摘している。
  • 🏛️ スノーデンは、監視活動がテロ対策として正当化されているが、実際にはそれ以上の脅威にさらしていると主張している。
  • 🌐 彼はインターネットに対する攻撃に対しても、NSAの活動がアメリカをさらしており、経済にも影響を与えると警告している。
  • 📖 スノーデンは、アメリカに帰還する機会が提供されると喜んで受け入れると述べており、その判断は公衆によって決定されるべきだと主張している。
  • 🌟 最後に、スノーデンは民主主義が秘密主義に死ぬが、個人は秘密主義の中で生まれ、プライバシーを犠牲にして良い政府を持ち、自由を犠牲にして安全を確保する必要はないと語った。

Q & A

  • エドワード・スノーデンがどのような人物として自分自身を位置づけていますか?

    -エドワード・スノーデンは自分自身を「ヒーロー」や「反逆者」ではなく、「アメリカ人であり、市民である」と述べています。彼は個人的な性格や属性よりも、政府やインターネット、人々の関係性といった問題に注目すべきだと述べています。

  • NSAのPRISMプログラムとは何ですか?

    -PRISMは、政府が企業アメリカを強制的にNSAの仕事に従わせることで、通信の内容を入手するプログラムです。これはメタデータの収集とは異なり、実際に通信の内容に関与しています。

  • NSAはなぜ企業と協力してデータを収集するのでしょうか?

    -NSAは企業のサーバーから直接データを入手しており、企業がNSAに協力的にデータを提供しているためです。一部の企業はこれに抵抗を示し、法的手続きを求めたが、秘密の裁判所で審理されたため、敗訴しました。

  • インターネット企業はユーザーの権利を守るために何をすべきですか?

    -インターネット企業は、SSLウェブ暗号化を有効にして、すべてのページでの暗号化をユーザーに提供することが重要です。これは、通信が暗号化されていない場合、様々な情報サービスが閲覧履歴を見ることができるためです。

  • Boundless Informantプログラムとは何ですか?

    -Boundless Informantは、NSAがアメリカ国内で行っている通信の遮断を追跡するプログラムであり、NSAはこれを議会に隠していました。このプログラムにより、アメリカ国内で遮断された通信の量が、ロシア国内のそれよりもも多いことが明らかになりました。

  • NSAが自社のルールを何千回も破ったという報道について教えてください。

    -NSAは1年間に2,776回の間違いを犯しており、そのうちの1つのイベントでは3,000人以上が影響を受けました。また、ワシントンD.C.のすべての電話を誤って遮断する事件も報告されています。これらの違反が行われたにもかかわらず、上院情報委員会の議長であるディアーン・フィーンスタインは、その報告をWPが彼女に連絡するまで知らなかったという事実が示唆されています。

  • 監視についての一般的な反論は何ですか?

    -監視についての一般的な反論は、「もしあなたは何も悪くないなら、懸念すべきことは何もない」という考え方です。しかし、スノーデンは、これは権利を放棄することに他なりないと述べています。また、文化的アイデンティティの一部であり、人々に電話をかける自由や、家族にテキストメッセージを送る自由、オンラインで本を購入する自由などが必要です。

  • ディック・チェイニーによるスノーデンの非難に対して、スノーデンはどのように応えますか?

    -スノーデンは、ディック・チェイニーのような人々が持つ国家安全保障の狭い考え方に反論し、彼らの主張するような国益と公共の利益が常に一致するとは限らないと述べています。また、インターネットや経済を敵視することがないという点を強調しています。

  • スノーデンが1,700万の文書を盗んだとされていますが、そのうちの何百件しかジャーナリストと共有されていません。まだ発表されるべき情報はありますか?

    -スノーデンは、まだ多くの情報が公開されていないと述べており、最も重要な報道のいくつかはまだ行われていないと予想しています。

  • Bullrunプログラムとは何ですか?

    -Bullrunは、NSAが企業パートナーを意図的に誤解させるプログラムであり、彼らに安全な基準が提供されていると伝えていますが、実際にはセキュリティが低下するようなアドバイスを与え、バックドアを構築しています。これにより、NSAだけでなく、誰もが世界中の通信にアクセスできるようになります。

  • NSAの活動がアメリカにサイバー攻撃のリスクをもたらしているとされていますが、それは本当ですか?

    -はい、NSAの活動により、アメリカの通信のセキュリティが低下し、知的財産という経済の基礎が危険に晒される可能性があります。これはアメリカが根本的にリスクにさらされる原因となります。

  • スノーデンはテロ対処を名目にして行われたNSAの活動の背後にあるより深い動機についてどう言いますか?

    -スノーデンは、テロ対処は感情的な反応を引き起こすことができるため、政府が通常与えない権限やプログラムを正当化するのに使われることが多いと述べています。また、NSAは1990年代にすでにそのような権限を求めていたが、議会とアメリカの人々は経済や社会へのリスクが価値以上のものを要求するため、それに反対したと指摘しています。

  • スノーデンは現在の状況でどのように懸念を処理していますか?

    -スノーデンは、彼が政府を傷つけるためではなく、アメリカ人の利益のために行動していると述べています。彼は、社会的に不適切であるとされ、ジャーナリズムが犯罪化されることなく、異議を唱える人々が脅かされるべきではないと主張しています。

  • スノーデンが見ているカナダはどんな印象を受けていますか?

    -スノーデンは、予想とは異なり、カナダは暖かいと感じていると述べています。

  • スノーデンが伝えたいアイデアは何ですか?

    -スノーデンは、民主主義は密室で死灭する可能性があるが、個人として密室で生まれるため、良好な政府を持つためにプライバシーを犠牲にする必要はなく、オープンな政府とプライベートな生活を両立できると語っています。

  • ニューヨーク・タイムズがスノーデンのアメニストイを求めているとされていますが、彼はアメリカに帰還する機会を歓迎しますか?

    -スノーデンは、プロジェクトの基礎は公共の利益であり、米国の記者団体がこれが必要だと支持していると述べています。しかし、政府は彼がジャーナリストと共有している情報を妥協する取引を望んでいると示唆しており、スノーデンは自分自身の安全を利益とするために活動を止めるとは明確に述べています。

Outlines

00:00

🤖 エドワード・スノーデンの遠隔での登壇

クリス・アンダーソンは市民の権利とインターネットの未来について語し、その裏付けとなるエドワード・スノーデンを遠隔で招いた。スノーデンはロシアのリモート場所から操作するボットを使ってTEDのステージに登場し、視覚的に参加している。スノーデンは尋問されることで、自己を「英雄」や「裏切り者」といった言葉ではなく、「アメリカ人、市民」という単純なアイデンティティで位置づけ、重要なのは彼自身ではなく、政府やインターネット、人々の関係性に関する議論であると主張する。

05:01

📁 PRISMプログラムの公開

スノーデンはPRISMプログラムについて説明し、これは企業アメリカをNSAのために「汚い仕事」をさせるプログラムであると明かす。企業は抗議し、秘密の裁判所で訴訟を起こしたが敗れた。PRISMはコンテンツに焦点を当てており、NSAは企業のサーバーから直接データを入手していると語る。NSAは企業と共謀してデータを収集するわけではなく、強制的かつ法的に問題があるやり方で行われていると指摘する。

10:04

🔒 インターネット企業の暗号化の重要性

スノーデンはインターネット企業がSSLウェブ暗号化を有効にすることがユーザーの権利を守る上で最も重要なことだと主張。ウェブサイトがデフォルトで暗号化されていない現状は問題であり、企業はユーザーのプライバシーを守るためにデフォルトで暗号化を利用するよう強く促す。

15:07

📊 Boundless Informantプログラムの紹介

Boundless InformantはNSAがアメリカ国内での通信の監視を追跡するプログラムであり、国会に隠されていた。スノーデンはこのプログラムがアメリカ国内での通信の監視がロシア国内でのものよりもも多いと示すデータを提供し、それがNSAの目的とは異なると語る。

20:08

🚨 NSAのプライバシー規則違反の報告

スノーデンはNSAが自社の規則を数千回も破ったと報道された件について話す。その多くは大規模な侵害であり、そのうちの1つは3,000人以上の人々に影響を及ぼした。重要なのは、これについてSenate Intelligence Committeeの議長であるDianne Feinsteinが知らなかったことと、規則の破り方について適切な監視がなかったと指摘する。

25:09

🔑 監視に対する一般的な反論

スノーデンは「悪いことがないから心配しないで」との反論に対して、人々の権利を諦めるべきではないと主張。プライバシーは文化的アイデンティティの一部であり、政府による監視は誤解や将来の悪用につながる可能性があると強調する。

30:13

🗣️ スノーデンに対する様々な反応

スノーデンは彼の行動がアメリカを危険にさらす無謀なものか、それともアメリカと世界にとって長期的な利益をもたらす英雄的なものかという問いに対して、彼の見解を述べる。彼はまた、ディック・チェニーからの批判に応じる。

🛡️ Bullrunプログラムの危険性

スノーデンはBullrunプログラムについて警告し、これはNSAが企業パートナーを誤解させるプログラムであり、安全な標準だと誤解させる一方で、実際にはセキュリティを低下させるアドバイスを提供していると語る。これは世界中の通信に対する信頼を失墜させるだけでなく、アメリカ自体にも脅威になると指摘する。

🌐 インターネットに対する新しいマジナ・カルタ

スノーデンはインターネットに対する新しいマジナ・カルタ、すなわち基本的な人権とプライバシーを保護する国際的な規約の必要性を提唱。彼はインターネットを守ることの重要性を強調し、それを守ることで民主主義と個人の自由を守ることができると主張する。

🤝 TEDでの遠隔での登壇

スノーデンは彼がTEDに遠隔で参加し、北アメリカに「帰ってきた」と感じたことを語る。彼はインターネットと技術の力が個人に与える力について話し、個人が政府や諜報機関と戦い勝利することができることを証明したと強調する。

🏛️ 民主主義とプライバシーの価値

スノーデンは民主主義が閉ざされた扉の内側で死ぬが、個人は同じく閉ざされた扉の内側で生まれるという対比を用いて、プライバシーを犠牲にして良質な政府を保つ必要はないと主張。彼はオープンな政府とプライベートな生活を両立し、世界中の人々と協力してその実現を目指すと述べる。

Mindmap

Keywords

💡whistleblower

「whistleblower」とは、不正行為や問題のある行動を内部から告発する人を指します。このビデオでは、エドワード・スノーデンはNSAの内部情報を公開し、政府の監視活動を批判したことで、多くの人々から「whistleblower」と呼ばれています。彼は自分の行動が正義であり、市民の権利を守るために必要だと主張しています。

💡privacy

「privacy」は、個人が自分の情報を保護し、他人からの干渉を防ぐ権利を意味します。ビデオでは、スノーデンが政府によるプライバシーの侵害について警告し、個人がオンライン上で自由に行動する権利を主張しています。例えば、彼はインターネット上の検索履歴をNSAが監視していると指摘し、個人のプライバシーが侵害される危険性があると語っています。

💡government surveillance

「government surveillance」とは、政府が市民の行動を監視することを指します。ビデオでは、NSAが通信の監視を行っていることが明らかにされており、スノーデンはこれが市民の権利とプライバシーを侵害するものであると批判しています。特にPRISMプログラムやBoundless Informantプログラムについて触れられており、これらは政府による大規模な監視活動を暗示しています。

💡NSA

「NSA」とはアメリカ合衆国の国家安全保障局(National Security Agency)の略称で、情報収集と暗号解析を行っている政府機関です。ビデオでは、NSAが国内外の通信を監視し、個人のプライバシーを侵害しているとスノーデンが指摘しています。NSAの活動は、彼によって公開されたclassified documentsに基づいて批判されています。

💡Internet freedom

「Internet freedom」とは、インターネット上での情報流通と表現の自由を意味します。ビデオでは、スノーデンがインターネットの自由を守るために奮闘している姿が描かれており、政府による監視がその自由を脅かしていると警告しています。彼はインターネットが自由で開かれた場であるべきだと主張し、市民が自由に情報を交換できるようにと願っています。

💡corporate America

「corporate America」とは、アメリカの企業界全体を指します。ビデオでは、政府が企業に協力を強要し、監視システムを強化するように頼んでいるとスノーデンが語っています。PRISMプログラムにおいて、企業が政府の要請に応じ、顧客のデータを提供していると示唆されています。

💡encryption

「encryption」とは、情報を暗号化することで、不正なアクセスや盗聴を防止する技術を指します。ビデオでは、スノーデンがインターネット企業がウェブ暗号化を強化し、ユーザーのプライバシーを守るべきだと述べています。彼はSSLウェブ暗号化が重要であると強調しており、これがプライバシーとセキュリティを高める手段として提唱しています。

💡national security

「national security」とは、国家の安全と平和を守ることを意味します。ビデオでは、政府は監視活動を国家の安全のために行っていると主張している一方で、スノーデンはその活動が実際には国家の安全を損なうものであると反論しています。彼は政府の主張に反して、監視がテロ事件の防止に役立たなかったと示しています。

💡transparency

「transparency」とは、情報公開や行動の透明性を意味します。ビデオでは、スノーデンが政府の活動に対する透明度の重要性を強調しており、市民は政府の監視活動について知る権利を持っていると主張しています。彼はオープンな政府を求め、市民が政府の活動を監査できるようにと訴えています。

💡Magna Carta for the Internet

「Magna Carta for the Internet」とは、インターネットのための新しい基本的原則や規則を意味します。ビデオでは、スノーデンとティム・バーナーズ=リーはインターネットの価値観を保護するための新しい規約を提案しており、インターネット上の自由とプライバシーを守るための国際的な取り組みを提唱しています。

Highlights

Edward Snowden discusses the importance of the kind of government and Internet we want, emphasizing the significance of the issues over his own identity.

Snowden reveals his motivation for leaking classified documents was the discovery of surveillance programs exceeding necessary bounds without public awareness or consent.

He explains his decision to work with journalists to release information, believing it would maximize public benefit while minimizing risks.

Snowden introduces PRISM as a program that deputizes corporate America to conduct mass surveillance on behalf of the NSA.

He criticizes secret courts for approving surveillance programs without transparency or proper legal review.

Snowden highlights the NSA's direct access to company servers as a method of data collection, bypassing traditional legal processes.

He urges tech companies to adopt SSL web encryption by default to protect user privacy against global surveillance.

Boundless Informant is revealed as an NSA program that tracks and estimates the amount of American communications intercepted, hidden from Congress.

Snowden reports on the NSA's thousands of privacy rule violations per year, unknown to high-level government officials like Dianne Feinstein.

He refutes the 'nothing to hide, nothing to fear' argument, emphasizing the importance of privacy as a cultural identity and a right.

Snowden addresses allegations of him stealing 1.7 million documents and hints at more revelations to come.

The Bullrun program is exposed as an initiative where the NSA intentionally misleads corporate partners to weaken security standards and introduce backdoors.

Snowden warns that weakening security standards can open America up to cyberattacks and undermine the economy.

He argues that the NSA's actions have not stopped any imminent terrorist attacks in the U.S., as confirmed by federal courts and government panels.

Snowden suggests that the real motivation behind surveillance programs is not terrorism but a broader quest for power and control.

He expresses his commitment to continue his work in the public interest despite personal risks and the possibility of amnesty.

Snowden calls for a Magna Carta for the Internet to encode values into its structure and protect privacy and freedom for future generations.

He concludes by emphasizing that democracy thrives on openness and that privacy and good governance are not mutually exclusive.

Transcripts

play00:13

Chris Anderson: The rights of citizens,

play00:15

the future of the Internet.

play00:17

So I would like to welcome to the TED stage

play00:20

the man behind those revelations,

play00:23

Ed Snowden.

play00:25

(Applause)

play00:29

Ed is in a remote location somewhere in Russia

play00:33

controlling this bot from his laptop,

play00:36

so he can see what the bot can see.

play00:40

Ed, welcome to the TED stage.

play00:42

What can you see, as a matter of fact?

play00:45

Edward Snowden: Ha, I can see everyone.

play00:47

This is amazing.

play00:49

(Laughter)

play00:53

CA: Ed, some questions for you.

play00:56

You've been called many things

play00:57

in the last few months.

play00:59

You've been called a whistleblower, a traitor,

play01:04

a hero.

play01:05

What words would you describe yourself with?

play01:09

ES: You know, everybody who is involved

play01:12

with this debate

play01:13

has been struggling over me and my personality

play01:16

and how to describe me.

play01:19

But when I think about it,

play01:21

this isn't the question that we should be struggling with.

play01:24

Who I am really doesn't matter at all.

play01:28

If I'm the worst person in the world,

play01:30

you can hate me and move on.

play01:32

What really matters here are the issues.

play01:35

What really matters here is the kind of government we want,

play01:38

the kind of Internet we want,

play01:39

the kind of relationship between people

play01:42

and societies.

play01:43

And that's what I'm hoping the debate will move towards,

play01:46

and we've seen that increasing over time.

play01:48

If I had to describe myself,

play01:50

I wouldn't use words like "hero."

play01:52

I wouldn't use "patriot," and I wouldn't use "traitor."

play01:54

I'd say I'm an American and I'm a citizen,

play01:57

just like everyone else.

play01:59

CA: So just to give some context

play02:01

for those who don't know the whole story --

play02:03

(Applause) —

play02:07

this time a year ago, you were stationed in Hawaii

play02:11

working as a consultant to the NSA.

play02:14

As a sysadmin, you had access

play02:16

to their systems,

play02:18

and you began revealing certain classified documents

play02:23

to some handpicked journalists

play02:26

leading the way to June's revelations.

play02:27

Now, what propelled you to do this?

play02:33

ES: You know,

play02:36

when I was sitting in Hawaii,

play02:38

and the years before, when I was working in the intelligence community,

play02:40

I saw a lot of things that had disturbed me.

play02:44

We do a lot of good things in the intelligence community,

play02:47

things that need to be done,

play02:49

and things that help everyone.

play02:51

But there are also things that go too far.

play02:53

There are things that shouldn't be done,

play02:55

and decisions that were being made in secret

play02:58

without the public's awareness,

play02:59

without the public's consent,

play03:01

and without even our representatives in government

play03:04

having knowledge of these programs.

play03:08

When I really came to struggle with these issues,

play03:12

I thought to myself,

play03:14

how can I do this in the most responsible way,

play03:17

that maximizes the public benefit

play03:20

while minimizing the risks?

play03:23

And out of all the solutions that I could come up with,

play03:26

out of going to Congress,

play03:28

when there were no laws,

play03:29

there were no legal protections

play03:31

for a private employee,

play03:33

a contractor in intelligence like myself,

play03:36

there was a risk that I would be buried along with the information

play03:40

and the public would never find out.

play03:42

But the First Amendment of the United States Constitution

play03:45

guarantees us a free press for a reason,

play03:48

and that's to enable an adversarial press,

play03:52

to challenge the government,

play03:53

but also to work together with the government,

play03:56

to have a dialogue and debate about how we can

play03:58

inform the public about matters of vital importance

play04:04

without putting our national security at risk.

play04:07

And by working with journalists,

play04:09

by giving all of my information

play04:11

back to the American people,

play04:13

rather than trusting myself to make

play04:15

the decisions about publication,

play04:18

we've had a robust debate

play04:20

with a deep investment by the government

play04:23

that I think has resulted in a benefit for everyone.

play04:28

And the risks that have been threatened,

play04:32

the risks that have been played up

play04:34

by the government

play04:36

have never materialized.

play04:37

We've never seen any evidence

play04:39

of even a single instance of specific harm,

play04:43

and because of that,

play04:44

I'm comfortable with the decisions that I made.

play04:46

CA: So let me show the audience

play04:49

a couple of examples of what you revealed.

play04:51

If we could have a slide up, and Ed,

play04:53

I don't know whether you can see,

play04:55

the slides are here.

play04:56

This is a slide of the PRISM program,

play04:58

and maybe you could tell the audience

play05:01

what that was that was revealed.

play05:03

ES: The best way to understand PRISM,

play05:06

because there's been a little bit of controversy,

play05:07

is to first talk about what PRISM isn't.

play05:11

Much of the debate in the U.S. has been about metadata.

play05:14

They've said it's just metadata, it's just metadata,

play05:16

and they're talking about a specific legal authority

play05:19

called Section 215 of the Patriot Act.

play05:22

That allows sort of a warrantless wiretapping,

play05:25

mass surveillance of the entire country's

play05:27

phone records, things like that --

play05:30

who you're talking to,

play05:31

when you're talking to them,

play05:33

where you traveled.

play05:34

These are all metadata events.

play05:37

PRISM is about content.

play05:40

It's a program through which the government could

play05:42

compel corporate America,

play05:44

it could deputize corporate America

play05:48

to do its dirty work for the NSA.

play05:51

And even though some of these companies did resist,

play05:54

even though some of them --

play05:56

I believe Yahoo was one of them —

play05:57

challenged them in court, they all lost,

play06:00

because it was never tried by an open court.

play06:03

They were only tried by a secret court.

play06:06

And something that we've seen,

play06:07

something about the PRISM program that's very concerning to me is,

play06:10

there's been a talking point in the U.S. government

play06:12

where they've said 15 federal judges

play06:16

have reviewed these programs and found them to be lawful,

play06:18

but what they don't tell you

play06:21

is those are secret judges

play06:24

in a secret court

play06:26

based on secret interpretations of law

play06:29

that's considered 34,000 warrant requests

play06:33

over 33 years,

play06:35

and in 33 years only rejected

play06:38

11 government requests.

play06:41

These aren't the people that we want deciding

play06:43

what the role of corporate America

play06:45

in a free and open Internet should be.

play06:48

CA: Now, this slide that we're showing here

play06:50

shows the dates in which

play06:52

different technology companies, Internet companies,

play06:55

are alleged to have joined the program,

play06:57

and where data collection began from them.

play07:00

Now, they have denied collaborating with the NSA.

play07:05

How was that data collected by the NSA?

play07:10

ES: Right. So the NSA's own slides

play07:13

refer to it as direct access.

play07:16

What that means to an actual NSA analyst,

play07:19

someone like me who was working as an intelligence analyst

play07:22

targeting, Chinese cyber-hackers,

play07:24

things like that, in Hawaii,

play07:26

is the provenance of that data

play07:28

is directly from their servers.

play07:30

It doesn't mean

play07:32

that there's a group of company representatives

play07:35

sitting in a smoky room with the NSA

play07:38

palling around and making back-room deals

play07:40

about how they're going to give this stuff away.

play07:42

Now each company handles it different ways.

play07:44

Some are responsible.

play07:46

Some are somewhat less responsible.

play07:48

But the bottom line is, when we talk about

play07:49

how this information is given,

play07:53

it's coming from the companies themselves.

play07:55

It's not stolen from the lines.

play07:58

But there's an important thing to remember here:

play08:00

even though companies pushed back,

play08:02

even though companies demanded,

play08:04

hey, let's do this through a warrant process,

play08:06

let's do this

play08:08

where we actually have some sort of legal review,

play08:11

some sort of basis for handing over

play08:13

these users' data,

play08:15

we saw stories in the Washington Post last year

play08:17

that weren't as well reported as the PRISM story

play08:20

that said the NSA broke in

play08:23

to the data center communications

play08:25

between Google to itself

play08:27

and Yahoo to itself.

play08:29

So even these companies that are cooperating

play08:31

in at least a compelled but hopefully lawful manner

play08:34

with the NSA,

play08:36

the NSA isn't satisfied with that,

play08:39

and because of that, we need our companies

play08:41

to work very hard

play08:44

to guarantee that they're going to represent

play08:47

the interests of the user, and also advocate

play08:49

for the rights of the users.

play08:51

And I think over the last year,

play08:52

we've seen the companies that are named

play08:54

on the PRISM slides

play08:55

take great strides to do that,

play08:57

and I encourage them to continue.

play09:00

CA: What more should they do?

play09:02

ES: The biggest thing that an Internet company

play09:06

in America can do today, right now,

play09:09

without consulting with lawyers,

play09:10

to protect the rights of users worldwide,

play09:14

is to enable SSL web encryption

play09:19

on every page you visit.

play09:21

The reason this matters is today,

play09:24

if you go to look at a copy of "1984" on Amazon.com,

play09:29

the NSA can see a record of that,

play09:32

the Russian intelligence service can see a record of that,

play09:34

the Chinese service can see a record of that,

play09:37

the French service, the German service,

play09:39

the services of Andorra.

play09:40

They can all see it because it's unencrypted.

play09:43

The world's library is Amazon.com,

play09:47

but not only do they not support encryption by default,

play09:49

you cannot choose to use encryption

play09:52

when browsing through books.

play09:53

This is something that we need to change,

play09:55

not just for Amazon, I don't mean to single them out,

play09:57

but they're a great example.

play09:58

All companies need to move

play10:00

to an encrypted browsing habit by default

play10:03

for all users who haven't taken any action

play10:06

or picked any special methods on their own.

play10:08

That'll increase the privacy and the rights

play10:10

that people enjoy worldwide.

play10:13

CA: Ed, come with me to this part of the stage.

play10:16

I want to show you the next slide here. (Applause)

play10:19

This is a program called Boundless Informant.

play10:21

What is that?

play10:23

ES: So, I've got to give credit to the NSA

play10:25

for using appropriate names on this.

play10:28

This is one of my favorite NSA cryptonyms.

play10:31

Boundless Informant

play10:33

is a program that the NSA hid from Congress.

play10:36

The NSA was previously asked by Congress,

play10:38

was there any ability that they had

play10:40

to even give a rough ballpark estimate

play10:44

of the amount of American communications

play10:46

that were being intercepted.

play10:49

They said no. They said, we don't track those stats,

play10:52

and we can't track those stats.

play10:53

We can't tell you how many communications

play10:56

we're intercepting around the world,

play10:58

because to tell you that would be

play10:59

to invade your privacy.

play11:02

Now, I really appreciate that sentiment from them,

play11:05

but the reality, when you look at this slide is,

play11:07

not only do they have the capability,

play11:08

the capability already exists.

play11:11

It's already in place.

play11:13

The NSA has its own internal data format

play11:16

that tracks both ends of a communication,

play11:20

and if it says,

play11:21

this communication came from America,

play11:23

they can tell Congress how many of those communications

play11:26

they have today, right now.

play11:28

And what Boundless Informant tells us

play11:31

is more communications are being intercepted

play11:34

in America about Americans

play11:37

than there are in Russia about Russians.

play11:40

I'm not sure that's what an intelligence agency

play11:42

should be aiming for.

play11:44

CA: Ed, there was a story broken in the Washington Post,

play11:47

again from your data.

play11:49

The headline says,

play11:50

"NSA broke privacy rules

play11:52

thousands of times per year."

play11:54

Tell us about that.

play11:55

ES: We also heard in Congressional testimony last year,

play11:58

it was an amazing thing for someone like me

play12:00

who came from the NSA

play12:02

and who's seen the actual internal documents,

play12:04

knows what's in them,

play12:07

to see officials testifying under oath

play12:09

that there had been no abuses,

play12:11

that there had been no violations of the NSA's rules,

play12:15

when we knew this story was coming.

play12:18

But what's especially interesting about this,

play12:20

about the fact that the NSA has violated

play12:22

their own rules, their own laws

play12:24

thousands of times in a single year,

play12:27

including one event by itself,

play12:30

one event out of those 2,776,

play12:35

that affected more than 3,000 people.

play12:37

In another event, they intercepted

play12:39

all the calls in Washington, D.C., by accident.

play12:43

What's amazing about this,

play12:45

this report, that didn't get that much attention,

play12:47

is the fact that not only were there 2,776 abuses,

play12:52

the chairman of the Senate Intelligence Committee,

play12:54

Dianne Feinstein, had not seen this report

play12:58

until the Washington Post contacted her

play13:02

asking for comment on the report.

play13:04

And she then requested a copy from the NSA

play13:06

and received it,

play13:08

but had never seen this before that.

play13:10

What does that say about the state of oversight

play13:12

in American intelligence

play13:14

when the chairman of the Senate Intelligence Committee

play13:16

has no idea that the rules are being broken

play13:19

thousands of times every year?

play13:21

CA: Ed, one response to this whole debate is this:

play13:24

Why should we care about

play13:27

all this surveillance, honestly?

play13:29

I mean, look, if you've done nothing wrong,

play13:31

you've got nothing to worry about.

play13:34

What's wrong with that point of view?

play13:36

ES: Well, so the first thing is,

play13:37

you're giving up your rights.

play13:39

You're saying hey, you know,

play13:41

I don't think I'm going to need them,

play13:43

so I'm just going to trust that, you know,

play13:45

let's get rid of them, it doesn't really matter,

play13:48

these guys are going to do the right thing.

play13:50

Your rights matter

play13:51

because you never know when you're going to need them.

play13:54

Beyond that, it's a part of our cultural identity,

play13:57

not just in America,

play13:59

but in Western societies

play14:00

and in democratic societies around the world.

play14:03

People should be able to pick up the phone

play14:06

and to call their family,

play14:07

people should be able to send a text message

play14:09

to their loved ones,

play14:10

people should be able to buy a book online,

play14:13

they should be able to travel by train,

play14:14

they should be able to buy an airline ticket

play14:17

without wondering about how these events

play14:18

are going to look to an agent of the government,

play14:22

possibly not even your government

play14:25

years in the future,

play14:26

how they're going to be misinterpreted

play14:28

and what they're going to think your intentions were.

play14:31

We have a right to privacy.

play14:33

We require warrants to be based on probable cause

play14:37

or some kind of individualized suspicion

play14:39

because we recognize that trusting anybody,

play14:44

any government authority,

play14:45

with the entirety of human communications

play14:48

in secret and without oversight

play14:51

is simply too great a temptation to be ignored.

play14:56

CA: Some people are furious at what you've done.

play14:58

I heard a quote recently from Dick Cheney

play15:01

who said that Julian Assange was a flea bite,

play15:07

Edward Snowden is the lion that bit the head off the dog.

play15:10

He thinks you've committed

play15:12

one of the worst acts of betrayal

play15:14

in American history.

play15:16

What would you say to people who think that?

play15:22

ES: Dick Cheney's really something else.

play15:25

(Laughter) (Applause)

play15:32

Thank you. (Laughter)

play15:37

I think it's amazing, because at the time

play15:39

Julian Assange was doing some of his greatest work,

play15:43

Dick Cheney was saying

play15:45

he was going to end governments worldwide,

play15:47

the skies were going to ignite

play15:50

and the seas were going to boil off,

play15:52

and now he's saying it's a flea bite.

play15:54

So we should be suspicious about the same sort of

play15:57

overblown claims of damage to national security

play16:01

from these kind of officials.

play16:03

But let's assume that these people really believe this.

play16:09

I would argue that they have kind of

play16:12

a narrow conception of national security.

play16:16

The prerogatives of people like Dick Cheney

play16:19

do not keep the nation safe.

play16:22

The public interest is not always the same

play16:26

as the national interest.

play16:29

Going to war with people who are not our enemy

play16:33

in places that are not a threat

play16:35

doesn't make us safe,

play16:37

and that applies whether it's in Iraq

play16:39

or on the Internet.

play16:41

The Internet is not the enemy.

play16:42

Our economy is not the enemy.

play16:44

American businesses, Chinese businesses,

play16:47

and any other company out there

play16:51

is a part of our society.

play16:54

It's a part of our interconnected world.

play16:56

There are ties of fraternity that bond us together,

play17:00

and if we destroy these bonds

play17:03

by undermining the standards, the security,

play17:06

the manner of behavior,

play17:09

that nations and citizens all around the world

play17:12

expect us to abide by.

play17:14

CA: But it's alleged that you've stolen

play17:18

1.7 million documents.

play17:20

It seems only a few hundred of them

play17:22

have been shared with journalists so far.

play17:25

Are there more revelations to come?

play17:28

ES: There are absolutely more revelations to come.

play17:30

I don't think there's any question

play17:33

that some of the most important reporting

play17:37

to be done is yet to come.

play17:42

CA: Come here, because I want to ask you

play17:44

about this particular revelation.

play17:46

Come and take a look at this.

play17:49

I mean, this is a story which I think for a lot of the techies in this room

play17:52

is the single most shocking thing

play17:54

that they have heard in the last few months.

play17:56

It's about a program called "Bullrun."

play17:59

Can you explain what that is?

play18:02

ES: So Bullrun, and this is again

play18:04

where we've got to thank the NSA for their candor,

play18:11

this is a program named after a Civil War battle.

play18:16

The British counterpart is called Edgehill,

play18:17

which is a U.K. civil war battle.

play18:19

And the reason that I believe they're named this way

play18:21

is because they target our own infrastructure.

play18:25

They're programs through which the NSA

play18:27

intentionally misleads corporate partners.

play18:31

They tell corporate partners that these

play18:33

are safe standards.

play18:35

They say hey, we need to work with you

play18:37

to secure your systems,

play18:41

but in reality, they're giving bad advice

play18:44

to these companies that makes them

play18:45

degrade the security of their services.

play18:47

They're building in backdoors that not only

play18:50

the NSA can exploit,

play18:52

but anyone else who has time and money

play18:55

to research and find it

play18:57

can then use to let themselves in

play18:59

to the world's communications.

play19:01

And this is really dangerous,

play19:03

because if we lose a single standard,

play19:07

if we lose the trust of something like SSL,

play19:10

which was specifically targeted

play19:11

by the Bullrun program,

play19:13

we will live a less safe world overall.

play19:16

We won't be able to access our banks

play19:18

and we won't be able to access commerce

play19:23

without worrying about people monitoring those communications

play19:26

or subverting them for their own ends.

play19:28

CA: And do those same decisions also potentially

play19:32

open America up to cyberattacks

play19:35

from other sources?

play19:39

ES: Absolutely.

play19:41

One of the problems,

play19:43

one of the dangerous legacies

play19:46

that we've seen in the post-9/11 era,

play19:49

is that the NSA has traditionally worn two hats.

play19:54

They've been in charge of offensive operations,

play19:56

that is hacking,

play19:57

but they've also been in charge of defensive operations,

play19:59

and traditionally they've always prioritized

play20:02

defense over offense

play20:03

based on the principle

play20:05

that American secrets are simply worth more.

play20:07

If we hack a Chinese business

play20:10

and steal their secrets,

play20:11

if we hack a government office in Berlin

play20:13

and steal their secrets,

play20:15

that has less value to the American people

play20:19

than making sure that the Chinese

play20:21

can't get access to our secrets.

play20:24

So by reducing the security of our communications,

play20:28

they're not only putting the world at risk,

play20:30

they're putting America at risk in a fundamental way,

play20:32

because intellectual property is the basis,

play20:35

the foundation of our economy,

play20:37

and if we put that at risk through weak security,

play20:39

we're going to be paying for it for years.

play20:41

CA: But they've made a calculation

play20:42

that it was worth doing this

play20:44

as part of America's defense against terrorism.

play20:48

Surely that makes it a price worth paying.

play20:51

ES: Well, when you look at the results

play20:55

of these programs in stopping terrorism,

play20:58

you will see that that's unfounded,

play21:01

and you don't have to take my word for it,

play21:03

because we've had the first open court,

play21:07

the first federal court that's reviewed this,

play21:09

outside the secrecy arrangement,

play21:12

called these programs Orwellian

play21:14

and likely unconstitutional.

play21:16

Congress, who has access

play21:19

to be briefed on these things,

play21:21

and now has the desire to be,

play21:23

has produced bills to reform it,

play21:26

and two independent White House panels

play21:29

who reviewed all of the classified evidence

play21:31

said these programs have never stopped

play21:34

a single terrorist attack

play21:35

that was imminent in the United States.

play21:39

So is it really terrorism that we're stopping?

play21:42

Do these programs have any value at all?

play21:44

I say no, and all three branches

play21:47

of the American government say no as well.

play21:49

CA: I mean, do you think there's a deeper motivation

play21:51

for them than the war against terrorism?

play21:54

ES: I'm sorry, I couldn't hear you, say again?

play21:56

CA: Sorry. Do you think there's a deeper motivation

play21:59

for them other than the war against terrorism?

play22:02

ES: Yeah. The bottom line is that terrorism

play22:05

has always been what we in the intelligence world

play22:07

would call a cover for action.

play22:11

Terrorism is something that provokes

play22:13

an emotional response that allows people

play22:15

to rationalize authorizing powers and programs

play22:19

that they wouldn't give otherwise.

play22:22

The Bullrun and Edgehill-type programs,

play22:24

the NSA asked for these authorities

play22:26

back in the 1990s.

play22:28

They asked the FBI to go to Congress and make the case.

play22:31

The FBI went to Congress and did make the case.

play22:33

But Congress and the American people said no.

play22:35

They said, it's not worth the risk to our economy.

play22:38

They said it's worth too much damage

play22:40

to our society to justify the gains.

play22:43

But what we saw is, in the post-9/11 era,

play22:47

they used secrecy and they used the justification of terrorism

play22:50

to start these programs in secret

play22:52

without asking Congress,

play22:54

without asking the American people,

play22:56

and it's that kind of government behind closed doors

play22:59

that we need to guard ourselves against,

play23:01

because it makes us less safe,

play23:02

and it offers no value.

play23:04

CA: Okay, come with me here for a sec,

play23:06

because I've got a more personal question for you.

play23:08

Speaking of terror,

play23:11

most people would find the situation you're in right now

play23:15

in Russia pretty terrifying.

play23:19

You obviously heard what happened,

play23:22

what the treatment that Bradley Manning got,

play23:24

Chelsea Manning as now is,

play23:27

and there was a story in Buzzfeed saying that

play23:29

there are people in the intelligence community

play23:31

who want you dead.

play23:33

How are you coping with this?

play23:35

How are you coping with the fear?

play23:37

ES: It's no mystery

play23:40

that there are governments out there that want to see me dead.

play23:46

I've made clear again and again and again

play23:49

that I go to sleep every morning

play23:52

thinking about what I can do for the American people.

play23:57

I don't want to harm my government.

play24:00

I want to help my government,

play24:03

but the fact that they are willing to

play24:07

completely ignore due process,

play24:09

they're willing to declare guilt

play24:12

without ever seeing a trial,

play24:15

these are things that we need to work against

play24:18

as a society, and say hey, this is not appropriate.

play24:21

We shouldn't be threatening dissidents.

play24:23

We shouldn't be criminalizing journalism.

play24:26

And whatever part I can do to see that end,

play24:30

I'm happy to do despite the risks.

play24:33

CA: So I'd actually like to get some feedback

play24:34

from the audience here,

play24:35

because I know there's widely differing reactions

play24:38

to Edward Snowden.

play24:39

Suppose you had the following two choices, right?

play24:42

You could view what he did

play24:45

as fundamentally a reckless act

play24:46

that has endangered America

play24:50

or you could view it as fundamentally a heroic act

play24:53

that will work towards America and the world's

play24:57

long-term good?

play24:58

Those are the two choices I'll give you.

play25:01

I'm curious to see who's willing to vote with

play25:04

the first of those,

play25:05

that this was a reckless act?

play25:08

There are some hands going up.

play25:10

Some hands going up.

play25:11

It's hard to put your hand up

play25:13

when the man is standing right here,

play25:15

but I see them.

play25:16

ES: I can see you. (Laughter)

play25:19

CA: And who goes with the second choice,

play25:21

the fundamentally heroic act?

play25:23

(Applause) (Cheers)

play25:26

And I think it's true to say that there are a lot of people

play25:28

who didn't show a hand and I think

play25:31

are still thinking this through,

play25:32

because it seems to me that the debate around you

play25:36

doesn't split along traditional political lines.

play25:39

It's not left or right, it's not really about

play25:41

pro-government, libertarian, or not just that.

play25:45

Part of it is almost a generational issue.

play25:48

You're part of a generation that grew up

play25:50

with the Internet, and it seems as if

play25:53

you become offended at almost a visceral level

play25:56

when you see something done

play25:57

that you think will harm the Internet.

play25:59

Is there some truth to that?

play26:03

ES: It is. I think it's very true.

play26:08

This is not a left or right issue.

play26:11

Our basic freedoms, and when I say our,

play26:13

I don't just mean Americans,

play26:15

I mean people around the world,

play26:17

it's not a partisan issue.

play26:19

These are things that all people believe,

play26:21

and it's up to all of us to protect them,

play26:24

and to people who have seen and enjoyed

play26:27

a free and open Internet,

play26:28

it's up to us to preserve that liberty

play26:32

for the next generation to enjoy,

play26:34

and if we don't change things,

play26:35

if we don't stand up to make the changes

play26:39

we need to do to keep the Internet safe,

play26:42

not just for us but for everyone,

play26:45

we're going to lose that,

play26:46

and that would be a tremendous loss,

play26:47

not just for us, but for the world.

play26:50

CA: Well, I have heard similar language recently

play26:52

from the founder of the world wide web,

play26:54

who I actually think is with us, Sir Tim Berners-Lee.

play26:58

Tim, actually, would you like to come up and say,

play27:01

do we have a microphone for Tim?

play27:03

(Applause)

play27:05

Tim, good to see you. Come up there.

play27:12

Which camp are you in, by the way,

play27:15

traitor, hero? I have a theory on this, but --

play27:18

Tim Berners-Lee: I've given much longer

play27:21

answers to that question, but hero,

play27:24

if I have to make the choice between the two.

play27:27

CA: And Ed, I think you've read

play27:31

the proposal that Sir Tim has talked about

play27:33

about a new Magna Carta to take back the Internet.

play27:36

Is that something that makes sense?

play27:38

ES: Absolutely. I mean, my generation, I grew up

play27:41

not just thinking about the Internet,

play27:43

but I grew up in the Internet,

play27:46

and although I never expected to have the chance

play27:50

to defend it in such a direct and practical manner

play27:56

and to embody it in this unusual,

play28:00

almost avatar manner,

play28:02

I think there's something poetic about the fact that

play28:05

one of the sons of the Internet

play28:07

has actually become close to the Internet

play28:10

as a result of their political expression.

play28:12

And I believe that a Magna Carta for the Internet

play28:16

is exactly what we need.

play28:18

We need to encode our values

play28:21

not just in writing but in the structure of the Internet,

play28:25

and it's something that I hope,

play28:27

I invite everyone in the audience,

play28:29

not just here in Vancouver but around the world,

play28:33

to join and participate in.

play28:35

CA: Do you have a question for Ed?

play28:37

TBL: Well, two questions,

play28:39

a general question —

play28:40

CA: Ed, can you still hear us?

play28:42

ES: Yes, I can hear you. CA: Oh, he's back.

play28:46

TBL: The wiretap on your line

play28:47

got a little interfered with for a moment.

play28:49

(Laughter)

play28:51

ES: It's a little bit of an NSA problem.

play28:53

TBL: So, from the 25 years,

play28:57

stepping back and thinking,

play29:00

what would you think would be

play29:02

the best that we could achieve

play29:04

from all the discussions that we have

play29:06

about the web we want?

play29:09

ES: When we think about

play29:12

in terms of how far we can go,

play29:15

I think that's a question that's really only limited

play29:18

by what we're willing to put into it.

play29:20

I think the Internet that we've enjoyed in the past

play29:23

has been exactly what we as not just a nation

play29:29

but as a people around the world need,

play29:32

and by cooperating, by engaging not just

play29:36

the technical parts of society,

play29:38

but as you said, the users,

play29:40

the people around the world who contribute

play29:43

through the Internet, through social media,

play29:45

who just check the weather,

play29:47

who rely on it every day as a part of their life,

play29:49

to champion that.

play29:52

We'll get not just the Internet we've had,

play29:55

but a better Internet, a better now,

play29:58

something that we can use to build a future

play30:02

that'll be better not just than what we hoped for

play30:05

but anything that we could have imagined.

play30:07

CA: It's 30 years ago that TED was founded, 1984.

play30:13

A lot of the conversation since then has been

play30:15

along the lines that

play30:17

actually George Orwell got it wrong.

play30:18

It's not Big Brother watching us.

play30:20

We, through the power of the web,

play30:22

and transparency, are now watching Big Brother.

play30:24

Your revelations kind of drove a stake

play30:26

through the heart of that rather optimistic view,

play30:30

but you still believe there's a way of doing something

play30:34

about that.

play30:35

And you do too.

play30:37

ES: Right, so there is an argument to be made

play30:43

that the powers of Big Brother have increased enormously.

play30:47

There was a recent legal article at Yale

play30:51

that established something called the Bankston-Soltani Principle,

play30:55

which is that our expectation of privacy is violated

play31:00

when the capabilities of government surveillance

play31:02

have become cheaper by an order of magnitude,

play31:05

and each time that occurs, we need to revisit

play31:08

and rebalance our privacy rights.

play31:11

Now, that hasn't happened since

play31:13

the government's surveillance powers

play31:15

have increased by several orders of magnitude,

play31:18

and that's why we're in the problem that we're in today,

play31:21

but there is still hope,

play31:25

because the power of individuals

play31:27

have also been increased by technology.

play31:30

I am living proof

play31:32

that an individual can go head to head

play31:34

against the most powerful adversaries

play31:36

and the most powerful intelligence agencies

play31:38

around the world and win,

play31:42

and I think that's something

play31:44

that we need to take hope from,

play31:46

and we need to build on

play31:47

to make it accessible not just to technical experts

play31:50

but to ordinary citizens around the world.

play31:52

Journalism is not a crime,

play31:54

communication is not a crime,

play31:56

and we should not be monitored in our everyday activities.

play31:59

CA: I'm not quite sure how you shake the hand of a bot,

play32:01

but I imagine it's, this is the hand right here. TBL: That'll come very soon.

play32:07

ES: Nice to meet you,

play32:08

and I hope my beam looks as nice

play32:10

as my view of you guys does.

play32:13

CA: Thank you, Tim.

play32:16

(Applause)

play32:21

I mean, The New York Times recently called for an amnesty for you.

play32:25

Would you welcome the chance to come back to America?

play32:30

ES: Absolutely. There's really no question,

play32:33

the principles that have been the foundation

play32:36

of this project

play32:38

have been the public interest

play32:42

and the principles that underly

play32:45

the journalistic establishment in the United States

play32:49

and around the world,

play32:51

and I think if the press is now saying,

play32:56

we support this,

play32:58

this is something that needed to happen,

play33:00

that's a powerful argument, but it's not the final argument,

play33:03

and I think that's something that public should decide.

play33:06

But at the same time,

play33:07

the government has hinted that they want

play33:09

some kind of deal,

play33:11

that they want me to compromise

play33:13

the journalists with which I've been working,

play33:15

to come back,

play33:16

and I want to make it very clear

play33:19

that I did not do this to be safe.

play33:22

I did this to do what was right,

play33:24

and I'm not going to stop my work

play33:26

in the public interest

play33:28

just to benefit myself.

play33:30

(Applause)

play33:36

CA: In the meantime,

play33:38

courtesy of the Internet and this technology,

play33:42

you're here, back in North America,

play33:44

not quite the U.S., Canada, in this form.

play33:48

I'm curious, how does that feel?

play33:52

ES: Canada is different than what I expected.

play33:55

It's a lot warmer.

play33:57

(Laughter)

play34:02

CA: At TED, the mission is "ideas worth spreading."

play34:06

If you could encapsulate it in a single idea,

play34:08

what is your idea worth spreading

play34:10

right now at this moment?

play34:14

ES: I would say the last year has been a reminder

play34:18

that democracy may die behind closed doors,

play34:21

but we as individuals are born

play34:23

behind those same closed doors,

play34:26

and we don't have to give up

play34:28

our privacy to have good government.

play34:32

We don't have to give up our liberty

play34:34

to have security.

play34:35

And I think by working together

play34:38

we can have both open government

play34:41

and private lives,

play34:42

and I look forward to working with everyone

play34:44

around the world to see that happen.

play34:47

Thank you very much.

play34:48

CA: Ed, thank you.

play34:50

(Applause)

Rate This

5.0 / 5 (0 votes)

関連タグ
情報公開プライバシーインターネット民主主義スノーデンNSA監視自由セキュリティTEDトーク