How to Avoid Surveillance...With Your Phone Christopher Soghoian TED Talks

For more than 100 years,

the telephone companies have provided
wiretapping assistance to governments.

For much of this time,
this assistance was manual.

Surveillance took place manually
and wires were connected by hand.

Calls were recorded to tape.

But as in so many other industries,

computing has changed everything.

The telephone companies
built surveillance features

into the very core of their networks.

I want that to sink in for a second:

Our telephones and the networks
that carry our calls

were wired for surveillance first.

First and foremost.

So what that means is that
when you’re talking to your spouse,

your children, a colleague
or your doctor on the telephone,

someone could be listening.

Now, that someone might
be your own government;

it could also be another government,
a foreign intelligence service,

or a hacker, or a criminal, or a stalker

or any other party that breaks into
the surveillance system,

that hacks into the surveillance system
of the telephone companies.

But while the telephone companies
have built surveillance as a priority,

Silicon Valley companies have not.

And increasingly,
over the last couple years,

Silicon Valley companies have built
strong encryption technology

into their communications products

that makes surveillance
extremely difficult.

For example, many of you
might have an iPhone,

and if you use an iPhone
to send a text message

to other people who have an iPhone,

those text messages
cannot easily be wiretapped.

And in fact, according to Apple,

they’re not able to even see
the text messages themselves.

Likewise, if you use FaceTime
to make an audio call

or a video call with one of your
friends or loved ones,

that, too, cannot be easily wiretapped.

And it’s not just Apple.

WhatsApp, which is now owned by Facebook

and used by hundreds of millions
of people around the world,

also has built strong
encryption technology into its product,

which means that people
in the Global South can easily communicate

without their governments,
often authoritarian,

wiretapping their text messages.

So, after 100 years of being able
to listen to any telephone call –

anytime, anywhere –

you might imagine that government
officials are not very happy.

And in fact, that’s what’s happening.

Government officials are extremely mad.

And they’re not mad because
these encryption tools are now available.

What upsets them the most

is that the tech companies have built
encryption features into their products

and turned them on by default.

It’s the default piece that matters.

In short, the tech companies
have democratized encryption.

And so, government officials
like British Prime Minister David Cameron,

they believe that all communications –
emails, texts, voice calls –

all of these should be
available to governments,

and encryption is making that difficult.

Now, look – I’m extremely sympathetic
to their point of view.

We live in a dangerous time
in a dangerous world,

and there really are bad people out there.

There are terrorists and other
serious national security threats

that I suspect we all want
the FBI and the NSA to monitor.

But those surveillance
features come at a cost.

The reason for that is

that there is no such thing
as a terrorist laptop,

or a drug dealer’s cell phone.

We all use the same
communications devices.

What that means is that
if the drug dealers' telephone calls

or the terrorists' telephone calls
can be intercepted,

then so can the rest of ours, too.

And I think we really need to ask:

Should a billion people
around the world be using devices

that are wiretap friendly?

So the scenario of hacking of surveillance
systems that I’ve described –

this is not imaginary.

In 2009,

the surveillance systems that Google
and Microsoft built into their networks –

the systems that they use to respond
to lawful surveillance requests

from the police –

those systems were compromised
by the Chinese government,

because the Chinese government
wanted to figure out

which of their own agents
the US government was monitoring.

By the same token,

in 2004, the surveillance system
built into the network

of Vodafone Greece –
Greece’s largest telephone company –

was compromised by an unknown entity,

and that feature,
the surveillance feature,

was used to wiretap
the Greek Prime Minister

and members of the Greek cabinet.

The foreign government or hackers
who did that were never caught.

And really, this gets to the very problem
with these surveillance features,

or backdoors.

When you build a backdoor
into a communications network

or piece of technology,

you have no way of controlling
who’s going to go through it.

You have no way of controlling

whether it’ll be used by your side
or the other side,

by good guys, or by bad guys.

And so for that reason,
I think that it’s better

to build networks
to be as secure as possible.

Yes, this means that in the future,

encryption is going to make
wiretapping more difficult.

It means that the police
are going to have a tougher time

catching bad guys.

But the alternative would mean
to live in a world

where anyone’s calls or anyone’s
text messages could be surveilled

by criminals, by stalkers
and by foreign intelligence agencies.

And I don’t want to live
in that kind of world.

And so right now,
you probably have the tools

to thwart many kinds
of government surveillance

already on your phones
and already in your pockets,

you just might not realize how strong
and how secure those tools are,

or how weak the other ways
you’ve used to communicate really are.

And so, my message to you is this:

We need to use these tools.

We need to secure our telephone calls.

We need to secure our text messages.

I want you to use these tools.

I want you to tell your loved ones,
I want you to tell your colleagues:

Use these encrypted communications tools.

Don’t just use them
because they’re cheap and easy,

but use them because they’re secure.

Thank you.

(Applause)