StarTalk Radio - A Conversation with Edward Snowden (Part 2)

Episode Date: September 25, 2015

Neil deGrasse Tyson’s exclusive, one-on-one conversation with Edward Snowden - via robot - concludes with a deeper dive into metadata, personal privacy and covert communications, before exploring pu...lsars and cosmic background radiation. Subscribe to SiriusXM Podcasts+ on Apple Podcasts to listen to new episodes ad-free and a whole week early.

Transcript
Discussion (0)
Starting point is 00:00:00 Welcome to StarTalk, your place in the universe where science and pop culture collide. StarTalk begins right now. Welcome to StarTalk Radio. I'm your host, Neil deGrasse Tyson, your personal astrophysicist. And as many of you know, I also serve as the director of New York City's Hayden Planetarium. The Frederick P. Rose director is the name of my chair. And that is part of the American Museum of Natural History right here in New York City. You can follow StarTalk on Twitter at StarTalk Radio.
Starting point is 00:00:47 You get all the news and buzz of what we're up to and what the shows are coming up. And also on the web, we've got nice pages, Facebook page, StarTalk Radio, and also our own website, StarTalkRadio.net. Also, I tweet if you're interested in my own personal cosmic brain droppings at Neil Tyson. Last week on star talk, we broke format completely. It's rare that we do this, but when we do rest assured that something or someone out of the ordinary has
Starting point is 00:01:21 justified it. And you really can't get more extraordinary than an exclusive interview with an international fugitive via a remote control robot. This is the second and final part of our special edition of StarTalk, featuring my one-on-one conversation with none other than Edward Snowden. Again, I'm not accompanied by my usual comedian co-host. There's no in-studio expert. Instead, we're going to listen together as Ed and I share our ideas about encryption, privacy,
Starting point is 00:01:56 and what all this has to do with our basic human rights. In case you missed last week's episode, I'll just remind you that Ed Snowden is a CIA agent turned international fugitive and has been a household name since 2013 when he leaked secret documents from within the National Security Agency, better known as the NSA. These documents unveiled the government's top-secret mass surveillance programs aimed at collecting huge amounts of personal data, especially via phone records, from all United States citizens,
Starting point is 00:02:34 not just the ones that were particularly suspicious in their behavior or activities. And this wreaked havoc in social media, in mainstream media, and many U.S. citizens found themselves betrayed and invaded by their own government. What Ed did was, by any definition of the word, brave. Whether or not it was right is a matter of whom you talk to. Less than a month after the British news source, The Guardian, released Snowden's revelations, the United States charged Ed with theft of property and espionage, leaving him with no choice but to leave his entire life behind and seek asylum somewhere. In this particular case, Russia. Our old Cold War enemy, Russia. Our old Cold War enemy. Russia. Snowden is still in isolation as we speak,
Starting point is 00:03:28 but being the geek that he is, he found a clever way to communicate with me right here in my office at the Hayden Planetarium. He literally wheeled into my office as a bot. A robot. The voice you will soon be hearing emanates from his virtual face displayed on a Beam Pro remote presence system, which is essentially like an iPad on wheels. He manipulates it directly from Moscow, and it's where he's been offered asylum and is currently in exile.
Starting point is 00:04:01 And he manipulates, you know it's him because I say, can you nod? And he like, he can swing left swing right he can control this thing so uh so the the bot itself had a certain presence in this interview even though all i saw of him was his head now it seems everybody has an opinion about ed snowden some call him a traitor Some call him a national hero. He's worshipped. He's despised. He's praised as an activist. He's criticized as a criminal. And again, it all depends on who you're speaking with. Personally, I choose to think of him as a
Starting point is 00:04:42 card-carrying member of the geek community. And I speak to him not as an interviewing journalist, because that's not what I am, and you get that from other places, but I interact with him as a fellow geek. So let's go to the first part of that interview right now. So you've been in Russia for a while, and are you riding shirtless with Putin in the woods? I actually just finished that up about 15 minutes ago. And then we jumped out of airplanes.
Starting point is 00:05:15 So I expect you're just buds, right? So, Ed, I tried to find you on Twitter. What's your handle? I don't actually have one yet, but I've got to say I follow your Twitter. Oh, well, thank you. Thank you. But still, you kind of need a Twitter handle. So, like, at Snowden, maybe?
Starting point is 00:05:34 Is this something you might do? That sounds good. I think we've got to make it happen. You and I will be Twitter brothers. Oh, nice. Nice. We'll get the legal to approve your every move here. But if they give you that thumbs up, we're good for good.
Starting point is 00:05:49 Your followers will be, you know, the Internet, me, and the NSA. It'll be great. So I think I understand where you're coming from now, but I want to hear from you. You have government service in your blood. you. You have government service in your blood. You join an intelligence agency that's all about gathering information, and then you tell everybody the secrets. So that kind of sounds to me like I'm imagining a police officer showing up at the Indy 500 and handing out speeding tickets. This is not the place to hand out speeding tickets. Everybody's driving fast here, and everybody here knows that.
Starting point is 00:06:30 So what was your tipping point there? Because you were fully in. You were all in. You were all in in this business. And now to come around 180 and say, no, I'm not, are you handing out tickets at Indy 500? No, I do believe in the value of national defense, of intelligence gathering, in line with the context and the value of our society, right?
Starting point is 00:07:00 What I revealed was not simply secret information for voyeuristic intentions or anything like that. And I never published a single document on my own. What I did was I worked in partnership with the free press, the institutions of journalism that are a fundamental part of American society, to reveal not simply the operations of intelligence, of how the intelligence community works, But unlawful or immoral programs, which now courts have agreed with me, broke the law. Even within the CIA or the NSA, no one in the U.S. is supposed to be above the law. In June 2013, the President of the United States, when these programs were first revealed, said, you know what, don't worry about this, guys.
Starting point is 00:07:46 It's not that big a deal. I think we've drawn the right balance here. In January of 2014, he said, in fact, these programs need to end. The mass surveillance, sort of the bulk collection of Americans, needs to stop. And I'm going to call on Congress to do it. Now, that was obviously sort of passing the buck there, but it's a fundamental change in recognition of the value and the necessity of the programs. When we talk about national defense, when we talk about national security in real terms, not in political or rhetorical terms, we need to think about the
Starting point is 00:08:22 concrete difference they make. We need to think about, is this consonant with our values? And is this application of authority, is this application, this intrusive application of force necessary to the protection of our society and proportionate to the threat faced? It's the same reason that we don't watch nuclear missiles at people who sneak through immigration. You know, there has to be some level of reason there. And what I think we've seen is that because these programs were born in secret, outside of the review of open courts, outside of the review of the majority of Congress, and even the president himself
Starting point is 00:09:06 did not know the full details of everything that's been revealed since 2013. For example, it's claimed that he was surprised when they found out that the NSA was monitoring the cell phone of one of his closest allies. And so we need to think about where we draw the lines there. And I think it's because we have a fundamental tension between the NSA's offensive role, which is hacking into people's communications, undermining their security and trying to listen in on them, and also protecting our communications domestically. And what has happened, particularly in the post-911 period,
Starting point is 00:09:41 is we've seen a slide that's increased in velocity and force from a national security agency to a national surveillance agency. And that's not in our nation's interest, because when we think about, for example, a global spy war, let's say cybersecurity, you know, the topic of the day, and we think about the research and development budget of the United States, which is larger than any other country in the world, and we compare it to some of our competitive assets. Not as a percent, just as a total money it's large, but not as a percent of the total, is that correct?
Starting point is 00:10:14 I mean, total dollars, it's large, yes. Right. I don't think anybody would contest that the United States has the most advanced technology companies, research initiatives, and things like that, at least when it comes to industry. And yet, the NSA is weakening the security of internet systems and standards upon which we rely to an equal or greater measure than our adversaries. You can analogize this to an example where the NSA finds a way to build a backdoor into every bank vault of every country in the world.
Starting point is 00:10:51 And in a sort of global economy where there's only the United States and China, we've got $90, and they've got $10 in a $100 economy. Every time you successfully steal from the other guy, you gain 10% of their gross domestic product, their $10 and $90. When we hack China, we get a dollar. When they hack us, they get $9. It's more important to us to protect our systems because they protect more valuable assets than it is for us to weaken the security of our adversaries. When I think about government surveillance, my knee-jerk reaction is Cold War Russia, Cold War Soviet Union. And it's when this became global, this concept of the government
Starting point is 00:11:42 spying on its own citizens. And it's almost a trope, you know, a cinematic trope. Spies with suitcases and mustaches hid in shadows behind, you know, telephone booths and in alleyways. And they'd be observing you surreptitiously, but clearly not because we all knew they were there. But obviously, this picture is far different from Ed's reality. And I asked him about the difference in surveillance programs between then and now. Here's what he said. How would you compare 21st century United States to Cold War Soviet Union in terms of surveillance on our own citizens?
Starting point is 00:12:25 You know, I haven't really thought about that too much. When I think about that, I wouldn't compare them directly. But what I would say is there has been an interesting cultural change in the political circles of our country, which is that during the Cold War period, we had an adversary that we compared ourselves to constantly. And it was self-evident to us that the massive intrusive surveillance programs of the Soviet Union showed us there were undeniable evidence of the superiority of our moral system, that we rejected those programs, even though we had the capabilities, even though we could do it more, even though we could do it better. We turned away from it because we said that's not who we are. We're not going to watch the daily activities. We're not going to peer into the private lives
Starting point is 00:13:15 and private records of ordinary people who have done nothing wrong. In the wake of the Soviet Union, after their collapse, there's been sort of a vacuum of adversaries. Nobody can really challenge the United States the way that it happened back then. And because of that, I think we've lost a little bit of a competitive honesty, where we were rating ourselves against everybody else in the world, or at least the challengers, because we couldn't ignore it. Now, today, when we talk about our threats, we're talking about people like Al-Qaeda, people like ISIS, who there's no question of moral superiority because they're chopping people's heads off and lighting them on fire. When I think of this Cold War Soviet Union, I think of people in trench coats following you down the street. But today, they're not people
Starting point is 00:13:59 in trench coats. They're surveillance cameras in the street following me down the street. What's the difference? The difference in technology is something that politicians have used recently to claim that, you know, we shouldn't worry anymore. For example, they say, we're not listening to what you say on the phone. We're just keeping track of who you call, how long you call them, and, you know, that kind of thing. We've got to wrap up this segment of StarTalk. We've been following my exclusive interview with government whistleblower Edward Snowden,
Starting point is 00:14:31 who spoke with me through a robot that he controlled from his Russian asylum. Next on StarTalk, we're going to get more deeply into the science of encryption technology. And Ed even had some questions for me about how to hide secret messages among the electromagnetic noise of the cosmos.
Starting point is 00:14:56 Welcome back to StarTalk Radio. We've been following the second part of my exclusive interview with CIA agent-turned- whistleblower Edward Snowden. Two years ago, Ed spilled top-secret information to documentary filmmaker Laura Poitras and journalist Glenn Greenwald, who published an article in The Guardian revealing the NSA's mass surveillance program. This triggered an upheaval of public debate across the world. The U.S. intelligence agencies were effectively, and I suppose understandably, outraged, and Ed was charged with espionage.
Starting point is 00:15:32 Meanwhile, the authors who leaked Ed's information to the world won Pulitzer Prizes for public service, also George Polk Awards, and other such prestigious recognitions. So, apparently the media had a slightly different opinion than the rest of the government on this issue. And it was the following year that Laura Poitras directed her documentary film called Citizen Four, unraveling the entire series of events from the moment she received Ed's encrypted emails
Starting point is 00:15:59 to the moment Ed found himself in asylum, isolated in a foreign country. It won the Academy Award for Best Documentary. And when I saw the film on HBO, it was an unbelievable sequence of events that you think, oh, this must have been scripted by some espionage writer from the Cold War. But in fact, no, it was real. It actually happened. And we ask ourselves, is this happening today? And this, the second decade of the 21st century? So I was left with these feelings of,
Starting point is 00:16:33 what is the world we're living in today? I had no idea this was going on. All right, let's talk about a simple cell phone. What can the NSA do with it? Two years ago, we would never even have thought to ask the question. But after Ed leaked thousands of top secret files to the press, we now have the answer as well. And it isn't easy to sit with. They can do whatever they want. This means they can turn it on, turn it off, access our apps, turn it into a microphone, watch us, check our mail. But this sort of content monitoring is relatively reserved for individual targets, as I understand it. But what Ed is concerned about is the wider net cast over every U.S. citizen to scoop up our metadata.
Starting point is 00:17:20 I asked Ed what the word actually means. So let's go now to the one-on-one conversation Ed and I had together in my office, here at the Hayden Planetarium, when he wheeled in in the form of a robot that he controlled from exile in Russia. In your circles, I've heard the term metadata bounced around a bit. Now, the only thing I know of metadata is the extra information on my cell phone camera shot, you know, where it was taken, what time of day, GPS might give its location, but presumably you have deeper relevance to that term. What is it? Right. One of the things that politicians use to defend these programs initially, at least some of
Starting point is 00:18:03 them, because I'll point out that both your metadata and your content is being collected when it crosses the internet, for example, through what's called the Upstream program. But they've said, you know, don't worry about it in the context of telephones, because nobody's listening to what you're saying on the phone. They're simply recording who you're calling, when you're calling them, where you were when you called them, and information such as that kind of thing. What they're talking about is data about data, metadata, sort of the context of a communication,
Starting point is 00:18:36 the fact that it occurred, rather than the content of it itself. But it's deeply misleading, because when we think about it in the context of mass surveillance, collecting everybody's everywhere, metadata is more valuable than content. It's very difficult to get 330 million people to put on headphones every day and listen to 330 million phone calls, but it's very easy to get a computer to run algorithms against the metadata the same, because metadata is very small, it's very easy to get a computer to run algorithms against the metadata the same, because metadata is very small. It's very compressible.
Starting point is 00:19:08 And you don't have to take my word for this, actually. The idea that metadata is actually more intrusive, more invasive than content, is well established even amongst the defenders of mass surveillance. Stuart Baker, the former general counsel of the National Security Agency, said that when you have enough metadata, you don't need content. The idea here is that metadata is a proxy for content. The director of national security, Keith Alexander, said we kill people based on metadata. And he's right. When we're firing, you know, Hellfire missiles out of drones at people, we're not targeting it at individuals.
Starting point is 00:19:48 We're targeting it at cell phones, because we don't know who these people are. We don't have boots on the ground. And that's the reason so many drone strikes go wrong. But the real danger here is to assume that metadata is harmless. You know, we know it's used to kill people, but it also has tremendous privacy implications. Metadata is the same thing that a private investigator collects when they follow you around all day. They can't be close enough to you when you're sitting at a cafe to hear every word you're saying, or you'll notice they're there. But they will be close enough to
Starting point is 00:20:21 you to see who you're meeting with, where you're meeting with them, how long you're there, where you go after you're done, where you live, what kind of car you drive. All of these peripheral facts about your life, your activity, are the products of metadata surveillance. This is called, in sort of the NSA vernacular, constructing someone's pattern of life. And the pattern of life is derived not from the content of their communications, but from's pattern of life. And the pattern of life is derived not from the content of their communications, but from the metadata of it. By monitoring the metadata of 330 million Americans, what you find is a perfect record of 330 million lives. Last week, in the
Starting point is 00:20:59 first part of our interview with Ed, we spoke about the battle raging between defenders of online privacy and those who would seek out our personal information. The language of this battle is mathematics. Its dialect, cryptography. I wanted to know how Ed Snowden, a man who has fought diligently for both the defenders and the seekers, was baptized into this battle in the first place. This is the most technical part of our interview and arguably the most important. Ed is going to explain for us what encryption is all about. Eventually, I began to become fascinated by encryption technologies, anonymity, how the network of the internet fits together, how things are communicated,
Starting point is 00:21:45 how they're observed. And then as I began to work for the NSA, I also saw how they began to be subverted for sort of unintentional or for reasons contrary to the intents of the communicants. But when I think about the mathematics and the schemes within encryption and so on and so forth, I think about the sort of fringe topics that are less well discussed, even in the academic sector. For example, there are ideas of encryption that are called symmetric encryption, which is where you use a password, a key that's the same on both sides, something that doesn't change. You lock something, you've got one key that's the same on both sides, something that doesn't change.
Starting point is 00:22:25 You lock something, you've got one key that both locks it and unlocks it. Then you have asymmetric encryption, where you have one key that locks it, and then you have a separate key that unlocks it. This allows different parties to access shared knowledge without sharing the same key, the same passwords. But then you also have more sort of exotic, esoteric methods like secret sharing. Or they're called secret sharing schemes. One of them that I think is very famous, at least in the community, is called Shamir's secret sharing scheme.
Starting point is 00:23:00 And this was a really challenging concept to get for someone who didn't have a formal background in mathematics, which is the idea of an n-dimensional space. You could have a matrix of dimensions, and this is already kind of abstract and difficult for people who don't think too much about math for how to fit it into their headspace. But think about the three dimensions that we live in every day. their headspace. But think about the three dimensions that we live in every day. You've got sort of an X and a Y axis if you're thinking about a regular plane, like your monitor. You've got the horizontal space and you've got the vertical space. But then our third dimension that we live in every day would be the Z axis, the depth. But beyond that,
Starting point is 00:23:41 when you need to start thinking about additional dimensions beyond the third, it's quite difficult for people to think about. I would say impossible. Impossible. To try to find a fourth line that is perpendicular to the other three, I don't know anybody who can do that. We can do it on paper, of course, mathematically. Because we've got four-dimensional cubes and five-dimensional cubes. So you're talking about an n-dimensional n as in the, you'll determine it later.
Starting point is 00:24:09 Right. An n in the context of secret sharing would be the number of parties who are sharing in the secret. So the idea here is to enable, let's say, five people to work together to share access to one thing that's secret, but they're concerned that one person could give away the key or basically work against the interests of everyone involved. So you have to make sure that sort of n of x participants are collaborating together to access the material before whatever is protected here before it's released. So you would need three of five or four of five and so on.
Starting point is 00:24:49 But how would you do this in the context of passwords and cryptography? It's a fairly difficult problem. But so the way they do this is through an N dimensional array or matrix. And the idea here is that if you think about a three dimensional space analogous to three parties in the example, that's not so hard to get your head around. You can think of any three-dimensional point in space on Earth, for example, GPS coordinates or something similar to that, although that's actually two dimensions.
Starting point is 00:25:18 But you can get altitude on that, so you get a third dimension. Right. Oh, there you go. All right. So there's your third dimension. But you would say, all right, you have to meet at a street corner on Washington, D.C., or in Washington, D.C., and those are your three dimensions. When you're at this point, sort of you have access to the secret. But how do you impose additional constraints? How do you get those extra N dimensions? The fourth dimension could be time. You would only be able to unlock this if you met on a certain street corner in Washington,
Starting point is 00:25:47 D.C. on February 14th of 2016. Valentine's Day. Yes. You said February 14th. Yes, okay. That's when everybody works on all their cryptography. Then you want to add additional constraints. How do we do this? Similar to
Starting point is 00:26:05 space-time, the idea of a continuum where you don't only have physical location, but you also have an additional time constraint. You can also impose additional requirements that substitute for dimensions. When we think about this in the context of computer security and cryptography and things like that, you could use not only people, but what's now called multiple factors, multi-factor authentication, where instead of you simply entering a password, you have to enter a password in addition to presenting an SMS code that comes from your smart, a one-time use pin code, or a physical identifier, biometric identifier. These are additional dimensions, adding multi-dimensionality to the way that we interact with our systems
Starting point is 00:26:52 and protect things mathematically. But these are sort of the challenges to me, the hard problems in security, that are fascinating because people, you know, we've got these brilliant academic researchers who come up with these amazing theoretical advances, but it takes a really long time for us to translate them from the university to the laboratory, to the company, to everyday life. Yeah, that time delay is in almost everything that goes on in universities.
Starting point is 00:27:23 And, of course, the government has been trying to speed that up to get practical, marketable products from the brainchilds of academic researchers. So about these dimensions, let me ask you something. encrypted message and that encrypted message gets intercepted, the interceptor will know, presumably, that it's an encrypted message, whether or not they can decode it. Wouldn't it be better to send a message that they don't even know is a message at all, so that it doesn't call attention to themselves? Something that is blended in the noise of the background, so that it doesn't even call attention to itself? This is a sort of classic challenge in a co-con, or what's called covert communications as a study,
Starting point is 00:28:16 sort of a theoretical space, is how do you divorce the content of the communications, for example, whatever the message is that's protected by that encryption, from the fact that that communication occurred in the first place. And this is really a challenge. How do you send a signal that no one hears? And when we think about this as a theoretical problem, a university problem, there are some approaches where people go, well, we can try to construct what's called a mix net when we think about network-based communications like the internet, where we route everybody's communications into a voluntary conspiracy
Starting point is 00:28:55 of volunteers around the world who are simply trying to protect people's privacy. And when you get everybody's communications coming into one point, you then send them to a second point and a third point. And they're constantly mixed up. So people observing the network have a much more difficult time correlating the communication that ended up at the destination with where it originated from. But beyond this, when we think about sort of a back out from the practical problems and think about the theoretical problems here, there are real questions about what happens when communications get lost in the noise. We may not be able to hear in space because, of course, in space, no one can hear you scream. But the universe is actually rich with cosmic noise, loud enough to distort messages and perhaps hide messages within them. This may seem like an infinite source of camouflage, but it's not so simple. Ed and I spoke about this conundrum and of the potential of hiding messages in the sounds of the universe.
Starting point is 00:30:01 And of course, by sounds of the universe, we're referring to electromagnetic radiation, which, in its own way, can be noisy. Next on StarTalk. Welcome back to StarTalk Radio. This is a special edition of StarTalk where we chose to break our usual format in favor of a little one-on-one time with government whistleblower, hero, traitor, treasonous Ed Snowden.
Starting point is 00:30:35 Tonight, you are hearing part two of that interview. show, we're going back to that conversation with Ed right here in my office when he spoke to me through a remote-controlled robot, which is essentially an eye-level iPad with wheels. Through this virtual medium, he and I went back and forth about his early education, encryption technology, Fourth Amendment rights, and why he chose to break his contract of secrecy to the government to defend the Constitution. Let's check it out. So the cosmic microwave background is an interesting point. It looks like noise.
Starting point is 00:31:18 No one knows these days, but in the day when you don't even know because you only just live your billionth second, the TVs had what were called rabbit ear antennas. Surely you've read about this in your history books. I do adjust them on the top. And then you couldn't move because you became part of the antenna by touching it. But if you went between channels, there would be this sort of static on the screen, what we called static.
Starting point is 00:31:41 Some percentage of that static is the actual signal from the beginning of the universe is the actual signal from the beginning of the universe, the cosmic microwave background. And so it looks like noise locally, but in fact, if you look at it across an entire sort of spectrum of frequencies, it actually has a shape, a very distinctive shape that we know and describe highly precisely in physics. So if you were to hide something in the cosmic microwave background, you'd have to follow the shape that it takes, depending on what frequency you would communicate with. I'm just warning you in advance, if you want to hide a signal in the universe,
Starting point is 00:32:18 they have very characteristic profiles, just so you know. So this is actually a really interesting thing that I would like to ask you about. Because astronomy is pretty far from my wheelhouse. At some level, the universe is above everyone's head. There was an old paper that was once written on using entropy that's gathered from this cosmic microwave background radiation as a source of random numbers. Because the most difficult part of generating reliable, robust encryption for computer scientists and mathematicians working on cryptography today is to make a computer generate a random number. Because they can't.
Starting point is 00:33:05 At the end of the day, they're deterministic machines. They're a bunch of ones and zeros. They're basically on and off switches. They can't, on their own, do anything truly random. Instead, they use what are called pseudo-random mathematical functions to try to develop numbers which are random enough to work for our purposes. But all of these pseudo-random number generators rely on what's called a seed value,
Starting point is 00:33:30 an initial random input, which today in computers we try to generate from, for example, the movements of someone's mouse, the time on the machines it's ticking by, network communications that are going out, things that are a little bit unpredictable or hard to guess for an adversary who's trying to attack these encrypted communications.
Starting point is 00:33:50 Well, we used to use the random number generator to generate the seed for the random number generator. That should help a little bit, is that right? Well, the question is how many steps of complexity can you get there that cannot be reversed? And unfortunately, when you have adversaries of enough sophistication and budget, anything that a user who is not as powerful can do can generally be reversed by an adversary of a given level of sophistication. But when we think about where do we get these
Starting point is 00:34:24 truly random numbers from in a reliable way, they can't be guessed, it can't go back in time, you can't figure out what the original truly random number was from which all the pseudo-random functions were run off of. And a paper was once written on using the universe as the seed of that random function, using sort of the distant noise that comes from things like pulsars or magnetons or some other cosmological feature, and listening to that all around the world.
Starting point is 00:34:58 Because even if you could record everything that you can hear in a given location on Earth, you know, at an observatory in Maui, or in the state of Washington, Chile, or something like that. You can't hear all of the different noise that's hitting all of the planet in every spot all of the time. The amount of, uh, the amount that we're hearing from the universe is simply too large. the amount that we're hearing from the universe is simply too large. Is there any source in the universe, you can say, that would be unique in that respect or hard to observe that you think could be used as a source of truly random information? Yeah, the problem is now we have a network of telescopes that communicate with one another that have basically all sky coverage.
Starting point is 00:35:44 Radio telescopes can observe the universe in the daytime and at nighttime, and these signals are typically radio signals. So pulsars are a great example. They're rapidly spinning. They send pulses of radio waves. If you wanted to nab one of those pulses and somehow index to it, in principle you could, but there's a finite number of pulsars that we've got them in the catalog. We've got them. They're there.
Starting point is 00:36:08 And so I'd have to think about that. I'll dig up that paper. You'll send me the paper. I'll send you a link. By carrier pigeon, so we can't trace what we're going to do. I think the NSA already has it. Yeah, so people were thinking, could we make a GPS system that is good for all planets,
Starting point is 00:36:29 that does not involve just the satellites around one planet? And in principle, you could do that from pulsars, which are far enough away from our entire solar system that everybody can just see them, indexed to them, and they're the best timekeepers there ever was. Some of them rotate 1,000 times, they're called millisecond pulsars, and so they're timekeeping devices that are built into the universe. So we've got top people working on that one. This brings up another thing which, to me, I've never really quite understood. Whenever we talk about engineering of communications or electrical engineering in general,
Starting point is 00:37:12 we talk about signal and noise. And when we talk about it out in the universe, you know, the way this is expanded, we think about it as noise, as astronomical noise. But is it really noise? You know, when we think about the fact that all of these different points in the universe are actually doing something, is it noise or is it signal? I think the distinguisher we have there is whether we want it in our calculation or not. But there's something poetic, I think, in the idea that the universe is talking to us all the time. Yeah, it's a great way to think about it.
Starting point is 00:37:46 I once wrote an essay called Signal and Noise. That's what it was, and I featured it in one of my books. That was the most fun essay I've ever written because it was a topic that the public doesn't, they're not compelled to think about much, yet it has profound implications for knowing anything at all in the universe. And so you're right. There are signals that I'm uninterested in because they're interfering with some other signal that I am interested in. And so I will repeatedly get data on the object I'm interested in to raise its signal relative to any other signal that I'm getting and I'll give you an example we have clusters of stars out
Starting point is 00:38:30 there where they call them glock one of the types is called a globular cluster thousands of stars and they're all here and they're all there they are and it's a beehive we don't see them moving because we don't live long enough it's a beehive but I'm interested in that one star right there. How am I going to isolate that star? What am I going to do? And so I focus in on it, try to get rid of as many other stars as I can. Now there's another star that's sitting right next to it, and it's sharing light in my detector. There's light spillage in my detector. I want to get rid of what I don't want and keep what I do want. And so you're right. In many times, it is just my choice what I'm declaring to be signal and what I'm declaring to be noise.
Starting point is 00:39:08 But there is also a fundamental source of noise. It also exists. In any CCD detector, you want to detect an object. The fact that the detector is not at absolute zero means thermal currents create signal within the detector. That's noise. Total noise. That's interesting, because when you mention that, it raises to me the idea that by listening to something,
Starting point is 00:39:35 by collecting more than we need or more than we desire, more than was relevant to us, we can basically suffer unintended consequences. And this is very analogous, I think, to the NSA's systems of surveillance that we've seen. And it's not just in the United States. It's not just the NSA. This is a global problem that every country is going to be dealing with. The problem is mass surveillance, which is where, because of all the communications that
Starting point is 00:39:58 are going over the air through cellular networks or going across the internet on fiber optic cables under the sea, we've got governments that are basically co-opting telecommunications companies or they're grabbing these fibers and they're collecting everything from them. And just like you can get some kind of thermal input that could damage sensors or screw up your readings, we've seen the White House itself has done reviews of the value and effectiveness of mass surveillance and found that despite the fact that they're collecting or they claim the legal authority to monitor the communications of everyone in America, 330 million Americans, every time they pick up the phone, it never made a concrete
Starting point is 00:40:40 difference in a single terrorist investigation. And as a result, all of the people, all of the resources that we're committing to sort of monitoring all of these innocent people's communications are taking away focus from the traditional means of law enforcement investigations and intelligence gathering that watch people who are really suspected individually of being involved in some sort of criminal activity or wrongdoing. Basically by creating a haystack of human lives, we're losing the needles rather than finding them. Isn't part of why data has been collected indiscriminately, if I can say that, because if it weren't you could accuse the authorities uh profiling which no one
Starting point is 00:41:29 that's a taboo at least in america although it's certainly not taboo when you're boarding uh certain airplanes uh headed certain places in the world you know they'll profile you like this but in america that's considered bad and so they've got it that's why they screen everyone at the airport even the 80 yearold hunched over woman, right? They screen everybody. Right. When we think about the problem of profiling and whatnot, it's the fact that they're going after too many people indiscriminately. They're trying to run everybody through an algorithm.
Starting point is 00:42:00 And then they go, this doesn't work. But we don't know who we're looking for. We want to watch everybody because they might be doing something wrong. So let's try to narrow it down. Let's try to select on their religion or their ethnicity. And these things are wrong because it makes criminals out of innocent people. It puts a criminal suspicion on people who have done nothing wrong. But we haven't had this problem in the past when we look at investigations.
Starting point is 00:42:24 And that's because rather than profiling, we have another means of investigation, which is called probable cause. It's the idea that rather than watch people who we don't know are involved in any wrongdoing, we don't watch people who haven't done anything wrong. who specifically are doing something wrong, who we have some evidence to indicate that they're doing something nefarious or contrary to our laws, and we monitor them specifically. The distinction between mass surveillance, which we know doesn't work, and targeted surveillance in this regard, is the idea that rather than simply collect the communications of everybody in America at the telephone companies or at the internet service providers, you do the traditional means of investigation, which are to tap their phones specifically, whether that's at their house, whether that's through their computer, whether that's through their cell phone.
Starting point is 00:43:17 And on this basis, you don't have to worry about profiling. You don't have to worry about anything else. If you're thinking about profiling, what you're really arguing for, the idea that we would need to watch everybody because we don't know who's doing something wrong specifically, what you're arguing for is a paradigm shift in the method of investigation, which would be pre-criminal investigation. Instead of investigating people who have broken the law and then holding them to the account of justice, you want to investigate everybody all the time
Starting point is 00:43:50 in case they might do something wrong, regardless of whether or not they actually have. Isn't that what happens at airport security lines? That is what happens at airport security lines, but there's a distinction. The intrusion there is very narrow because you only have a limited amount of effects on you. You've got the clothes you're wearing, you've got the things in your bag. They can't read your thoughts, they can't ask about your family, they don't know what your hopes and dreams are and things like that.
Starting point is 00:44:18 You're in Moscow, why don't you choose a tropical country with palm trees and sipping coconut on the beach right now? You know, good question. I actually never intended to end up in Russia. I was originally booked. There were journalists who were taking pictures of my plane seat that departed Russia without me. To go to Ecuador or Bolivia or Uruguay or Venezuela, something like that, someplace that was a little bit warmer. But unfortunately, the Department of State canceled my passport when I was flying on my way there, and they trapped me in the airport in Russia.
Starting point is 00:44:59 But, you know, I will say that despite all of the things that I've lost, I'm glad that I was able to play at least a small part in doing something I can be proud of. You've been listening to StarTalk Radio and my one-on-one conversation with government whistleblower Ed Snowden. Hope you were able to glean something new from these past two shows. Whether your ideas about Ed were reinforced or you were lifted into a different way of thinking about the situation. Or maybe you just learned something new about encryption technology and welcome Ed as a member of the geek community in the way, of course, I have done. I'm Neil DeGrasse Tyson, your personal astrophysicist. And as always, I bid you to keep looking up.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.