>>>NEXT TIME YOU’RE SITTING AT>>>NEXT TIME YOU’RE SITTING AT A TRAFFIC LIGHT IN YOUR CITY OR A TRAFFIC LIGHT IN YOUR CITY OR TOWN, JUST TAKE A LOOK AT THE TOWN, JUST TAKE A LOOK AT THE PEOPLE YOU CAN SEE. PEOPLE YOU CAN SEE. MANY AREN’T LOOKING FORWARD AS MANY AREN’T LOOKING FORWARD AS THEY WALK, THEY’RE LOOKING DOWN, THEY WALK, THEY’RE LOOKING DOWN, JUST LIKE THEY’RE LOOKING DOWN JUST LIKE THEY’RE LOOKING DOWN WHILE ON PLANES, AT THE WHEEL, WHILE ON PLANES, AT THE WHEEL, AT BALL GAMES, AT HOME. AT BALL GAMES, AT HOME. OUR PHONES HAVE TAKEN OVER A OUR PHONES HAVE TAKEN OVER A PORTION OF OUR LIVES WE DIDN’T PORTION OF OUR LIVES WE DIDN’T KNOW WE HAD TO GIVE AWAY. KNOW WE HAD TO GIVE AWAY. NOW, PLEASE LISTEN TO EDWARD NOW, PLEASE LISTEN TO EDWARD SNOWDEN FROM OUR CONVERSATION SNOWDEN FROM OUR CONVERSATION EARLIER TODAY WHEN HE TALKS EARLIER TODAY WHEN HE TALKS ABOUT HOW VULNERABLE WE ARE, ABOUT HOW VULNERABLE WE ARE, WHAT OUR PHONES GIVE OFF, WHAT WHAT OUR PHONES GIVE OFF, WHAT THEY GIVE AWAY, AND WHAT THEY THEY GIVE AWAY, AND WHAT THEY CAN TELL SOMEONE ABOUT US. CAN TELL SOMEONE ABOUT US.>>HACKING HAS INCREASINGLY>>HACKING HAS INCREASINGLY BECOME WHAT GOVERNMENTS CONSIDER BECOME WHAT GOVERNMENTS CONSIDER A LEGITIMATE INVESTIGATIVE TOOL. A LEGITIMATE INVESTIGATIVE TOOL. THEY USE THE SAME METHODS AND THEY USE THE SAME METHODS AND TECHNIQUES AS CRIMINAL HACKERS. TECHNIQUES AS CRIMINAL HACKERS. AND WHAT THIS MEANS IS THEY WILL AND WHAT THIS MEANS IS THEY WILL TRY TO REMOTELY TAKE OVER YOUR TRY TO REMOTELY TAKE OVER YOUR DEVICE. DEVICE. ONCE THEY DO THIS, BY DETECTING ONCE THEY DO THIS, BY DETECTING A VULNERABILITY IN THE SOFTWARE A VULNERABILITY IN THE SOFTWARE THAT YOUR DEVICE RUNS SUCH AS THAT YOUR DEVICE RUNS SUCH AS APPLE’S IOS OR MICROSOFT APPLE’S IOS OR MICROSOFT WINDOWS, IT CAN CRAFT A SPECIAL WINDOWS, IT CAN CRAFT A SPECIAL KIND OF ATTACK CODE CALLED AN KIND OF ATTACK CODE CALLED AN EXPLOIT. EXPLOIT. THEY THEN LAUNCH THIS EXPLOIT AT THEY THEN LAUNCH THIS EXPLOIT AT THE VULNERABILITY ON YOUR DEVICE THE VULNERABILITY ON YOUR DEVICE WHICH ALLOWS THEM TO TAKE TOTAL WHICH ALLOWS THEM TO TAKE TOTAL CONTROL OF THAT DEVICE. CONTROL OF THAT DEVICE. ANYTHING YOU CAN DO ON THAT ANYTHING YOU CAN DO ON THAT DEVICE, THE ATTACKER, IN THIS DEVICE, THE ATTACKER, IN THIS CASE, THE GOVERNMENT, CAN DO. CASE, THE GOVERNMENT, CAN DO. THEY CAN READ YOUR EMAIL, THEY THEY CAN READ YOUR EMAIL, THEY CAN COLLECT EVERY DOCUMENT B CAN COLLECT EVERY DOCUMENT B THEY CAN LOOK AT YOUR CONTACT THEY CAN LOOK AT YOUR CONTACT BOOK, THEY CAN TURN THE LOCATION BOOK, THEY CAN TURN THE LOCATION SERVICES ON. SERVICES ON. THEY CAN SEE ANYTHING THAT IS ON THEY CAN SEE ANYTHING THAT IS ON THAT PHONE INSTANTLY AND SEND IT THAT PHONE INSTANTLY AND SEND IT BACK HOME TO THE MOTHER SHIP. BACK HOME TO THE MOTHER SHIP. THEY CAN DO THE SAME WITH THEY CAN DO THE SAME WITH LAPTOPS. LAPTOPS. THE OTHER PRONG THAT WE FORGET THE OTHER PRONG THAT WE FORGET SO FREQUENTLY IS THAT IN MANY SO FREQUENTLY IS THAT IN MANY CASES THEY DON’T NEED TO HACK CASES THEY DON’T NEED TO HACK OUR DEVICES. OUR DEVICES. THEY CAN SIMPLY ASK GOOGLE FOR A THEY CAN SIMPLY ASK GOOGLE FOR A COPY OF OUR EMAIL BOX BECAUSE COPY OF OUR EMAIL BOX BECAUSE GOOGLE SAVES A COPY OF THAT. GOOGLE SAVES A COPY OF THAT.>>WHAT ABOUT ENABLEING YOUR>>WHAT ABOUT ENABLEING YOUR MICROPHONE CAMERA? MICROPHONE CAMERA?>>IF YOU CAN DO IT, THEY CAN DO>>IF YOU CAN DO IT, THEY CAN DO IT. IT. IT IS TRIVIAL TO REMOTELY TURN IT IS TRIVIAL TO REMOTELY TURN ON YOUR MICROPHONE OR TO ON YOUR MICROPHONE OR TO ACTIVATE YOUR CAMERA SO LONG AS ACTIVATE YOUR CAMERA SO LONG AS YOU HAVE SYSTEMS-LEVEL ACCESS. YOU HAVE SYSTEMS-LEVEL ACCESS. IF YOU HAD HACKED SOMEONE’S IF YOU HAD HACKED SOMEONE’S DEVICE REMOTELY, ANYTHING THEY DEVICE REMOTELY, ANYTHING THEY CAN DO, YOU CAN DO. CAN DO, YOU CAN DO. THEY CAN LOOK UP YOUR NOSE, THEY CAN LOOK UP YOUR NOSE, RIGHT, THEY CAN RECORD WHAT’S IN RIGHT, THEY CAN RECORD WHAT’S IN THE ROOM. THE ROOM. THE SCREEN MAY BE OFFER AS IT’S THE SCREEN MAY BE OFFER AS IT’S SITTING ON YOUR DESK, BUT THE SITTING ON YOUR DESK, BUT THE DEVICE IS TALKING ALL OF THE DEVICE IS TALKING ALL OF THE TIME. TIME. THE QUESTION WE HAVE TO ASK, WHO THE QUESTION WE HAVE TO ASK, WHO IS IT TALKING TO? IS IT TALKING TO? EVEN IF YOUR PHONE IS NOT EVEN IF YOUR PHONE IS NOT HACKED, RIGHT NOW, YOU LOOK AT HACKED, RIGHT NOW, YOU LOOK AT IT, IT’S SITTING THERE ON A IT, IT’S SITTING THERE ON A CHARGER, IT IS TALKING TENS OR CHARGER, IT IS TALKING TENS OR HUNDREDS OR THOUSANDS OF TIMES A HUNDREDS OR THOUSANDS OF TIMES A MINUTE TO ANY NUMBER OF MINUTE TO ANY NUMBER OF DIFFERENT COMPANIES WHO HAVE DIFFERENT COMPANIES WHO HAVE APPS INSTALLED ON YOUR PHONE. APPS INSTALLED ON YOUR PHONE. IT LOOKS LIKE IT’S OFF. IT LOOKS LIKE IT’S OFF. IT LOOKS LIKE IT’S JUST SITTING IT LOOKS LIKE IT’S JUST SITTING THERE, BUT IT IS CONSTANTLY THERE, BUT IT IS CONSTANTLY CHATTERING. CHATTERING.>>WHAT ABOUT THE PUBLIC>>WHAT ABOUT THE PUBLIC ATTITUDE HELD BY MILLIONS OF ATTITUDE HELD BY MILLIONS OF EVERYDAY AMERICANS, ALL I’VE GOT EVERYDAY AMERICANS, ALL I’VE GOT ON A COMPUTER IS PICTURES OF MY ON A COMPUTER IS PICTURES OF MY FAMILY-, FAMILY-, FAMILY. FAMILY. CC-TV CAMERAS THAT ARE PREVALENT CC-TV CAMERAS THAT ARE PREVALENT IN A TON OF AMERICAN CITIES AND IN A TON OF AMERICAN CITIES AND OVERSEAS CAPITALS. OVERSEAS CAPITALS. THOSE CAMERAS ARE YOUR FRIEND IF THOSE CAMERAS ARE YOUR FRIEND IF YOU’RE INNOCENT AND HAVE NOTHING YOU’RE INNOCENT AND HAVE NOTHING TO HIDE. TO HIDE.>>THAT’S VERY MUCH WHAT THE>>THAT’S VERY MUCH WHAT THE AVERAGE CHINESE CITIZEN BELIEVED AVERAGE CHINESE CITIZEN BELIEVED OR PERHAPS EVEN STILL TO THIS OR PERHAPS EVEN STILL TO THIS DAY BELIEVE SS. DAY BELIEVE SS. WE SEE HOW THESE SAME WE SEE HOW THESE SAME TECHNOLOGIES ARE BEING APPLIED TECHNOLOGIES ARE BEING APPLIED TO CREATE WHAT THEY CALL THE TO CREATE WHAT THEY CALL THE SOCIAL CREDIT SYSTEM. SOCIAL CREDIT SYSTEM. IF ANY OF THESE FAMILY PHOTOS, IF ANY OF THESE FAMILY PHOTOS, ANY OF YOUR ACTIVITIES ONLINE, ANY OF YOUR ACTIVITIES ONLINE, YOUR PURCHASES, IF YOUR YOUR PURCHASES, IF YOUR ASSOCIATIONS, IF YOUR FRIENDS ASSOCIATIONS, IF YOUR FRIENDS ARE IN ANY WAY DIFFERENT FROM ARE IN ANY WAY DIFFERENT FROM WHAT THE GOVERNMENT OR THE WHAT THE GOVERNMENT OR THE POWERS THAT BE OF THE MOMENT POWERS THAT BE OF THE MOMENT WOULD LIKE THEM TO BE, YOU’RE NO WOULD LIKE THEM TO BE, YOU’RE NO LONGER ABLE TO PURCHASE TRAIN LONGER ABLE TO PURCHASE TRAIN TICKETS. TICKETS. YOU’RE NO LONGER ABLE TO BOARD YOU’RE NO LONGER ABLE TO BOARD AN AIRPLANE. AN AIRPLANE. YOU MAY NOT BE ABLE TO GET A YOU MAY NOT BE ABLE TO GET A PASSPORT. PASSPORT. YOU MAY NOT BE ELIGIBLE FOR A YOU MAY NOT BE ELIGIBLE FOR A JOB. JOB. YOU MIGHT NOT BE ABLE TO WORK YOU MIGHT NOT BE ABLE TO WORK FOR THE GOVERNMENT. FOR THE GOVERNMENT. ALL OF THESE THINGS ARE ALL OF THESE THINGS ARE INCREASINGLY BEING CREATED AND INCREASINGLY BEING CREATED AND PROGRAMMED AND DECIDED BY PROGRAMMED AND DECIDED BY ALGORITHMS AND THOSE ALGORITHMS ALGORITHMS AND THOSE ALGORITHMS ARE FUELED BY PRECISELY THE ARE FUELED BY PRECISELY THE INSTANT DATA THAT OUR DEVICES INSTANT DATA THAT OUR DEVICES ARE CREATING ALL OF THE TIME, ARE CREATING ALL OF THE TIME, CONSTANTLY, INVISIBLY, QUIETLY, CONSTANTLY, INVISIBLY, QUIETLY, RIGHT NOW. RIGHT NOW. OUR DEVICES ARE CASTING ALL OF OUR DEVICES ARE CASTING ALL OF THESE RECORDS THAT WE DO NOT SEE THESE RECORDS THAT WE DO NOT SEE BEING CREATED THAT IN AGGREGATE BEING CREATED THAT IN AGGREGATE SEEM VERY INNOCENT. SEEM VERY INNOCENT. YOU WERE AT STARBUCKS AT THIS YOU WERE AT STARBUCKS AT THIS TIME. TIME. YOU WENT TO THE HOSPITAL YOU WENT TO THE HOSPITAL AFTERWARDS AFTERWARDS AFTERWARDS. AFTERWARDS. YOU SPENT A LONG TIME AT THE YOU SPENT A LONG TIME AT THE HOSPITAL. HOSPITAL. AFTER YOU LEFT THE HOSPITAL, YOU AFTER YOU LEFT THE HOSPITAL, YOU MADE A PHONE CALL. MADE A PHONE CALL. YOU MADE A PHONE CALL TO YOUR YOU MADE A PHONE CALL TO YOUR MOTHER. MOTHER. YOU TALKED TO HER UNTIL THE YOU TALKED TO HER UNTIL THE MIDDLE OF THE NIGHT. MIDDLE OF THE NIGHT. THE HOSPITAL WAS AN ONCOLOGY THE HOSPITAL WAS AN ONCOLOGY CLINIC. CLINIC. EVEN IF YOU CAN’T SEE THE EVEN IF YOU CAN’T SEE THE CONTENT OF THESE COMMUNICATIONS, CONTENT OF THESE COMMUNICATIONS, THE ACTIVITY RECORDS, WHAT THE THE ACTIVITY RECORDS, WHAT THE GOVERNMENT CALLS METADATA, WHICH GOVERNMENT CALLS METADATA, WHICH THEY ARGUE THEY DO NOT NEED A THEY ARGUE THEY DO NOT NEED A WARRANT TO COLLECT, TELLS THE WARRANT TO COLLECT, TELLS THE WHOLE STORY. WHOLE STORY. AND THESE ACTIVITY RECORDS ARE AND THESE ACTIVITY RECORDS ARE BEING CREATED AND SHARED AND BEING CREATED AND SHARED AND COLLECTED AND INTERCEPTED COLLECTED AND INTERCEPTED CONSTANTLY BY COMPANIES AND CONSTANTLY BY COMPANIES AND GOVERNMENTS. GOVERNMENTS. AND ULTIMATELY, IT MEANS AS THEY AND ULTIMATELY, IT MEANS AS THEY SELL THESE, AS THEY TRADE THESE, SELL THESE, AS THEY TRADE THESE, AS THEY MAKE THEIR BUSINESSES ON AS THEY MAKE THEIR BUSINESSES ON THE BACKS OF THESE RECORDS, WHO THE BACKS OF THESE RECORDS, WHO THEY ARE SELLING IS NOT THEY ARE SELLING IS NOT INFORMATION. INFORMATION. WHAT THEY’RE SELLING IS US. WHAT THEY’RE SELLING IS US. THEY’RE SELLING OUR FUTURE. THEY’RE SELLING OUR FUTURE. THEY’RE SELLING OUR PARENT. THEY’RE SELLING OUR PARENT. THEY ARE SELLING OUR HISTORY. THEY ARE SELLING OUR HISTORY. OUR IDENTITY. OUR IDENTITY. AND ULTIMATELY, THEY ARE AND ULTIMATELY, THEY ARE STEALING OUR POWER AND MAKING STEALING OUR POWER AND MAKING OUR STORIES WORK FOR THEM. OUR STORIES WORK FOR THEM.>>WHAT DEVICES DO YOU USE IN>>WHAT DEVICES DO YOU USE IN YOUR LIFE NOW, AND HAVE YOU YOUR LIFE NOW, AND HAVE YOU ACCEPTED THE NOTION THAT YOU ARE ACCEPTED THE NOTION THAT YOU ARE WATCHED RATHER CONSTANTLY? WATCHED RATHER CONSTANTLY?>>I TRY NOT TO MAKE THAT EASY>>I TRY NOT TO MAKE THAT EASY FOR THEM. FOR THEM. IF I GET A SMARTPHONE AND I NEED IF I GET A SMARTPHONE AND I NEED TO USE A PHONE, I ACTUALLY OPEN TO USE A PHONE, I ACTUALLY OPEN IT UP BEFORE I USE IT. IT UP BEFORE I USE IT. I PERFORM A KIND OF SURGERY ON I PERFORM A KIND OF SURGERY ON IT TO PHYSICALLY DESOLDER OR IT TO PHYSICALLY DESOLDER OR SORT OF MELT THE METAL SORT OF MELT THE METAL CONNECTIONS THAT HOLD THE CONNECTIONS THAT HOLD THE MICROPHONE ON THE PHONE AND I MICROPHONE ON THE PHONE AND I PHYSICALLY TAKE THIS OFF. PHYSICALLY TAKE THIS OFF. I REMOVE THE CAMERA FOR THE I REMOVE THE CAMERA FOR THE PHONE. PHONE. I CLOSE IT BACK UP. I CLOSE IT BACK UP. I SEAL IT UP. I SEAL IT UP. AND THEN IF I NEED TO MAKE A AND THEN IF I NEED TO MAKE A PHONE CALL, I WILL ATTACH AN PHONE CALL, I WILL ATTACH AN EXTERNAL MICROPHONE ON IT. EXTERNAL MICROPHONE ON IT. THIS IS JUST SO IF THE PHONE IS