Before 2013, if you said the NSA was making records of everybody's phone calls and the [Government Communications Headquarters] was monitoring lawyers and journalists, people raised eyebrows and called you a conspiracy theorist. Those days are over.
The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.
To do that they, the NSA specifically, targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyses them and it measures them and it stores them for periods of time simply because that's the easiest, most efficient, and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government or someone they suspect of terrorism, they're collecting you're communications to do so.
I believe that when [senator Ron] Wyden and [senator Mark] Udall asked about the scale of this, they [the NSA] said it did not have the tools to provide an answer. We do have the tools and I have maps showing where people have been scrutinised most. We collect more digital communications from America than we do from the Russians.
The internet exchange is sort of the core points where all of the international cables come together, where all of the internet service providers come together, and they trade lines with each other. These are priority one targets for any sort of espionage agency, because they provide access to so many people's communications.
We decentralise the ability to decide the level of publicity that's attached to any of our communications.
When the United States cannibalize dollars from the defensive business of the NSA, securing our communications, protecting our systems, patching zero-day vulnerabilities, and instead we're giving those dollars to be used for creating new vulnerabilities in our systems so that they can surveil us and other people abroad who use the same systems.
We decentralise permissions over the use of our communications.
An investigation found the specific people who authorized the warrantless wiretapping of millions and millions of communications, which per count would have resulted in the longest sentences in world history, and our highest official simply demanded the investigation be halted. Who "can" be brought up on charges is immaterial when the rule of law is not respected. Laws are meant for you, not for them.
It's much easier, I think, to protect communications while they're in transit at least, than it is to enforce legislation in every country in the world to say that you can't do this.
I would say the first key concept is that, in terms of technological and communication progress in human history, the Internet is basically the equivalent of electronic telepathy. We can now communicate all the time through our little magic smartphones with people who are anywhere, all the time, constantly learning what they're thinking, talking about, exchanging messages. And this is a new capability even within the context of the Internet.
Bulk collection means all of your communications are being secretly intercepted. They are being stolen as they cross India, and they're being stored in these silos so that they can be rifled through at the convenience of secret agents, basically.
I know that fundamentally, changes to the fabric of the internet, and sort of our methods of communication, can enforce our rights.
A different [Ronald] Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn't even authorized by law. It's just an old-ass piece of paper with Reagan's signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers - sending hundreds of millions of people's communications back and forth every day - were completely unprotected, electronically naked.
By leaning on companies, by leaning on infrastructure providers, by leaning on researchers, graduate students, post-docs, even undergrads, to look at the challenges having an untrusted internet, where we have to put our communications on wires that are owned by a phone company that we can't trust, that's working in collaboration with a government that we can't trust, in areas around the world, we can restructure that communications fabric in a way that it's encrypted.
In America, we collect more digital communications from America than we do from the Russians.
What we're really debating is not security versus liberty, it's security versus surveillance. When we talk about electronic interception, the way that surveillance works is it preys on the weakness of protections that are being applied to all of our communications. The manner in which they're protected.
What has a great value to us as a nation is the internet itself. The internet is critical infrastructure to the United States. We use the internet for every communication that businesses rely on every day.
Imagine, if you will, you're sitting at my desk in Hawaii. You have access to the entire world, as far as you can see it. Last several days, content of internet communications. Every email that's sent. Every website that's visited by every individual. Every text message that somebody sends on their phone. Every phone call they make.
Follow AzQuotes on Facebook, Twitter and Google+. Every day we present the best quotes! Improve yourself, find your inspiration, share with friends
or simply: