StarTalk Radio - A Conversation with Edward Snowden (Part 2)
Episode Date: September 25, 2015Neil deGrasse Tyson’s exclusive, one-on-one conversation with Edward Snowden - via robot - concludes with a deeper dive into metadata, personal privacy and covert communications, before exploring pu...lsars and cosmic background radiation. Subscribe to SiriusXM Podcasts+ on Apple Podcasts to listen to new episodes ad-free and a whole week early.
Transcript
Discussion (0)
Welcome to StarTalk, your place in the universe where science and pop culture collide.
StarTalk begins right now.
Welcome to StarTalk Radio.
I'm your host, Neil deGrasse Tyson, your personal astrophysicist.
And as many of you know, I also serve as the director of New York City's Hayden Planetarium.
The Frederick P. Rose director is the name of my chair.
And that is part of the American Museum of Natural History right here in New York City.
You can follow StarTalk on Twitter at StarTalk Radio.
You get all the news and buzz of what we're up to and what the shows are coming up. And also
on the web, we've got nice pages, Facebook page, StarTalk Radio, and also our own website,
StarTalkRadio.net. Also, I tweet if you're interested in my own personal cosmic brain droppings at
Neil Tyson.
Last week on star talk,
we broke format completely.
It's rare that we do this,
but when we do rest assured that something or someone out of the ordinary has
justified it.
And you really can't get more extraordinary than an
exclusive interview with an international fugitive via a remote control robot. This is the second and
final part of our special edition of StarTalk, featuring my one-on-one conversation with none
other than Edward Snowden. Again, I'm not accompanied by my usual comedian co-host.
There's no in-studio expert.
Instead, we're going to listen together
as Ed and I share our ideas about encryption, privacy,
and what all this has to do with our basic human rights.
In case you missed last week's episode,
I'll just remind you that Ed Snowden is a CIA
agent turned international fugitive and has been a household name since 2013 when he leaked secret
documents from within the National Security Agency, better known as the NSA. These documents
unveiled the government's top-secret mass surveillance programs
aimed at collecting huge amounts of personal data,
especially via phone records, from all United States citizens,
not just the ones that were particularly suspicious in their behavior or activities.
And this wreaked havoc in social media, in mainstream media, and many U.S. citizens found themselves betrayed and invaded by their own government.
What Ed did was, by any definition of the word, brave.
Whether or not it was right is a matter of whom you talk to. Less than a month after the British news source, The Guardian, released Snowden's revelations,
the United States charged Ed with theft of property and espionage, leaving him with no
choice but to leave his entire life behind and seek asylum somewhere.
In this particular case, Russia.
Our old Cold War enemy, Russia. Our old Cold War enemy. Russia. Snowden is still in isolation as we speak,
but being the geek that he is, he found a clever way to communicate with me right here in my office
at the Hayden Planetarium. He literally wheeled into my office as a bot. A robot.
The voice you will soon be hearing emanates from his virtual face
displayed on a Beam Pro remote presence system,
which is essentially like an iPad on wheels.
He manipulates it directly from Moscow,
and it's where he's been offered asylum
and is currently in exile.
And he manipulates, you know it's him
because I say, can you nod?
And he like, he can swing left
swing right he can control this thing so uh so the the bot itself had a certain presence
in this interview even though all i saw of him was his head now it seems everybody has an opinion
about ed snowden some call him a traitor Some call him a national hero. He's
worshipped. He's despised. He's praised as an activist. He's criticized as a criminal. And again,
it all depends on who you're speaking with. Personally, I choose to think of him as a
card-carrying member of the geek community.
And I speak to him not as an interviewing journalist,
because that's not what I am, and you get that from other places,
but I interact with him as a fellow geek.
So let's go to the first part of that interview right now.
So you've been in Russia for a while, and are you riding shirtless with Putin in the woods?
I actually just finished that up about 15 minutes ago.
And then we jumped out of airplanes.
So I expect you're just buds, right?
So, Ed, I tried to find you on Twitter.
What's your handle?
I don't actually have one yet, but I've got to say I follow your Twitter.
Oh, well, thank you.
Thank you.
But still, you kind of need a Twitter handle.
So, like, at Snowden, maybe?
Is this something you might do?
That sounds good.
I think we've got to make it happen.
You and I will be Twitter brothers.
Oh, nice.
Nice.
We'll get the legal to approve your every move here.
But if they give you that thumbs up, we're good for good.
Your followers will be, you know, the Internet, me, and the NSA.
It'll be great.
So I think I understand where you're coming from now, but I want to hear from you.
You have government service in your blood.
you. You have government service in your blood. You join an intelligence agency that's all about gathering information, and then you tell everybody the secrets. So that kind of sounds to me like
I'm imagining a police officer showing up at the Indy 500 and handing out speeding tickets.
This is not the place to hand out speeding tickets.
Everybody's driving fast here, and everybody here knows that.
So what was your tipping point there?
Because you were fully in.
You were all in.
You were all in in this business.
And now to come around 180 and say, no, I'm not, are you handing out
tickets at Indy 500?
No, I do believe in the value of national defense, of intelligence gathering, in line
with the context and the value of our society, right?
What I revealed was not simply secret information for voyeuristic intentions or
anything like that. And I never published a single document on my own. What I did was I
worked in partnership with the free press, the institutions of journalism that are a fundamental
part of American society, to reveal not simply the operations of intelligence, of how the
intelligence community works, But unlawful
or immoral programs, which now courts have agreed with me, broke the law. Even within the CIA or the
NSA, no one in the U.S. is supposed to be above the law. In June 2013, the President of the United
States, when these programs were first revealed, said, you know what, don't worry about this, guys.
It's not that big a deal.
I think we've drawn the right balance here.
In January of 2014, he said, in fact, these programs need to end.
The mass surveillance, sort of the bulk collection of Americans, needs to stop.
And I'm going to call on Congress to do it.
Now, that was obviously sort of passing the buck there, but it's a fundamental change in recognition of the value and the
necessity of the programs. When we talk about national defense, when we talk about national
security in real terms, not in political or rhetorical terms, we need to think about the
concrete difference they make. We need to think about, is this consonant with our values?
And is this application of authority, is this application,
this intrusive application of force necessary to the protection of our society
and proportionate to the threat faced?
It's the same reason that we don't watch nuclear missiles
at people who sneak through immigration. You know, there has to be some level of reason there.
And what I think we've seen is that because these programs were born in secret, outside of the
review of open courts, outside of the review of the majority of Congress, and even the president himself
did not know the full details of everything that's been revealed since 2013.
For example, it's claimed that he was surprised when they found out that the NSA was monitoring
the cell phone of one of his closest allies.
And so we need to think about where we draw the lines there.
And I think it's because we have a fundamental tension between the NSA's offensive role,
which is hacking into people's communications, undermining their security and trying to listen in on them,
and also protecting our communications domestically.
And what has happened, particularly in the post-911 period,
is we've seen a slide that's increased in velocity and force from a national
security agency to a national surveillance agency.
And that's not in our nation's interest, because when we think about, for example, a global
spy war, let's say cybersecurity, you know, the topic of the day, and we think about the
research and development budget of the United States, which is larger than any other country in the world,
and we compare it to some of our competitive assets.
Not as a percent, just as a total money it's large,
but not as a percent of the total, is that correct?
I mean, total dollars, it's large, yes.
Right.
I don't think anybody would contest that the United States
has the most advanced technology companies, research initiatives,
and things like that, at least when it comes to industry. And yet, the NSA is weakening the
security of internet systems and standards upon which we rely to an equal or greater measure
than our adversaries. You can analogize this to an example where the NSA finds a way to build
a backdoor into every bank vault of every country in the world.
And in a sort of global economy where there's only the United States and China, we've got
$90, and they've got $10 in a $100 economy.
Every time you successfully steal from the other guy, you gain 10% of their
gross domestic product, their $10 and $90. When we hack China, we get a dollar. When they hack us,
they get $9. It's more important to us to protect our systems because they protect
more valuable assets than it is for us to weaken the security of our
adversaries. When I think about government surveillance, my knee-jerk reaction is Cold War
Russia, Cold War Soviet Union. And it's when this became global, this concept of the government
spying on its own citizens. And it's almost a trope,
you know, a cinematic trope. Spies with suitcases and mustaches hid in shadows behind, you know,
telephone booths and in alleyways. And they'd be observing you surreptitiously, but clearly not
because we all knew they were there. But obviously,
this picture is far different from Ed's reality. And I asked him about the difference in surveillance
programs between then and now. Here's what he said.
How would you compare 21st century United States to Cold War Soviet Union in terms of
surveillance on our own citizens?
You know, I haven't really thought about that too much. When I think about that, I wouldn't
compare them directly. But what I would say is there has been an interesting cultural change
in the political circles of our country, which is that during the Cold War period, we had
an adversary that we compared ourselves to constantly. And it was self-evident to us
that the massive intrusive surveillance programs of the Soviet Union showed us there were undeniable
evidence of the superiority of our moral system, that we rejected those programs, even though we
had the capabilities, even though we could do it more, even though we could do it better. We turned away from it because we said that's not who we are.
We're not going to watch the daily activities. We're not going to peer into the private lives
and private records of ordinary people who have done nothing wrong. In the wake of the Soviet
Union, after their collapse, there's been sort of a vacuum of adversaries. Nobody can really challenge the United States the way that it happened back then. And because of that, I think
we've lost a little bit of a competitive honesty, where we were rating ourselves against everybody
else in the world, or at least the challengers, because we couldn't ignore it. Now, today, when
we talk about our threats, we're talking about people
like Al-Qaeda, people like ISIS, who there's no question of moral superiority because they're
chopping people's heads off and lighting them on fire. When I think of this Cold War Soviet Union,
I think of people in trench coats following you down the street. But today, they're not people
in trench coats. They're surveillance cameras in the street following me down the street. What's
the difference?
The difference in technology is something that politicians have used recently to claim that, you know, we shouldn't worry anymore. For example, they say, we're not listening to what you say on
the phone. We're just keeping track of who you call, how long you call them, and, you know,
that kind of thing. We've got to wrap up this segment
of StarTalk. We've been following
my exclusive interview with government whistleblower
Edward Snowden,
who spoke with me through a robot
that he controlled from his Russian
asylum. Next on StarTalk,
we're going to get more deeply into
the science of encryption technology.
And Ed even had some questions
for me about how to hide secret messages
among the electromagnetic noise of the cosmos.
Welcome back to StarTalk Radio.
We've been following the second part of my exclusive interview
with CIA agent-turned- whistleblower Edward Snowden.
Two years ago, Ed spilled top-secret information to documentary filmmaker Laura Poitras and
journalist Glenn Greenwald, who published an article in The Guardian revealing the NSA's
mass surveillance program. This triggered an upheaval of public debate across the world.
The U.S. intelligence agencies were effectively, and I suppose understandably, outraged,
and Ed was charged with espionage.
Meanwhile, the authors who leaked Ed's information to the world
won Pulitzer Prizes for public service,
also George Polk Awards, and other such prestigious recognitions.
So, apparently the media had a slightly different opinion
than the rest of the government on this issue.
And it was the following year that Laura Poitras directed her documentary film
called Citizen Four, unraveling the entire series of events
from the moment she received Ed's encrypted emails
to the moment Ed found himself in asylum, isolated in a foreign country.
It won the Academy Award for Best Documentary.
And when I saw the film on HBO, it was an unbelievable sequence of events
that you think, oh, this must have been scripted by some espionage writer from the Cold War.
But in fact, no, it was real.
It actually happened.
And we ask ourselves, is this happening today?
And this, the second decade of the 21st century? So I was left with these feelings of,
what is the world we're living in today? I had no idea this was going on.
All right, let's talk about a simple cell phone. What can the NSA do with it?
Two years ago, we would never even have thought to ask the
question. But after Ed leaked thousands of top secret files to the press, we now have the answer
as well. And it isn't easy to sit with. They can do whatever they want. This means they can turn
it on, turn it off, access our apps, turn it into a microphone, watch us, check our mail. But this
sort of content monitoring is relatively reserved for individual targets, as I understand it. But
what Ed is concerned about is the wider net cast over every U.S. citizen to scoop up our metadata.
I asked Ed what the word actually means. So let's go now to the one-on-one conversation Ed and I had together in my office,
here at the Hayden Planetarium,
when he wheeled in in the form of a robot that he controlled from exile in Russia.
In your circles, I've heard the term metadata bounced around a bit.
Now, the only thing I know of metadata is the extra information on my cell
phone camera shot, you know, where it was taken, what time of day, GPS might give its location,
but presumably you have deeper relevance to that term. What is it?
Right. One of the things that politicians use to defend these programs initially, at least some of
them, because I'll point out that both your metadata and your content is being collected
when it crosses the internet, for example, through what's called the Upstream program.
But they've said, you know, don't worry about it
in the context of telephones, because nobody's listening to what you're saying on the phone.
They're simply recording who you're calling, when you're
calling them, where you were when
you called them, and information such as that kind of thing.
What they're talking about is data about data, metadata, sort of the context of a communication,
the fact that it occurred, rather than the content of it itself.
But it's deeply misleading, because when we think about it in the context of mass surveillance,
collecting everybody's everywhere, metadata is more valuable than content.
It's very difficult to get 330 million people to put on headphones every day and listen
to 330 million phone calls, but it's very easy to get a computer to run algorithms against
the metadata the same, because metadata is very small, it's very easy to get a computer to run algorithms against the metadata the same,
because metadata is very small.
It's very compressible.
And you don't have to take my word for this, actually.
The idea that metadata is actually more intrusive, more invasive than content,
is well established even amongst the defenders of mass surveillance.
Stuart Baker, the former general counsel of the National Security Agency,
said that when you have enough metadata, you don't need content. The idea here is that
metadata is a proxy for content. The director of national security, Keith Alexander, said
we kill people based on metadata. And he's right. When we're firing, you know, Hellfire
missiles out of drones at people, we're not targeting it at individuals.
We're targeting it at cell phones, because we don't know who these people are.
We don't have boots on the ground. And that's the reason so many drone strikes go wrong.
But the real danger here is
to assume that metadata is harmless. You know, we know it's used to kill
people, but it also has tremendous
privacy implications. Metadata is the same thing that a private investigator collects when they
follow you around all day. They can't be close enough to you when you're sitting at a cafe
to hear every word you're saying, or you'll notice they're there. But they will be close enough to
you to see who you're meeting with, where you're meeting with them, how long you're there, where you go after you're done, where you live, what
kind of car you drive.
All of these peripheral facts about your life, your activity, are the products of metadata
surveillance.
This is called, in sort of the NSA vernacular, constructing someone's pattern of life.
And the pattern of life is derived not from the content of their communications, but from's pattern of life. And the pattern of life is derived not from
the content of their communications, but from the metadata of it. By monitoring the metadata of 330
million Americans, what you find is a perfect record of 330 million lives. Last week, in the
first part of our interview with Ed, we spoke about the battle raging between defenders of online privacy and those who would seek out our personal information.
The language of this battle is mathematics.
Its dialect, cryptography.
I wanted to know how Ed Snowden, a man who has fought diligently for both the defenders and the seekers, was baptized into this battle in the first place.
This is the most technical part of our interview and arguably the most important.
Ed is going to explain for us what encryption is all about.
Eventually, I began to become fascinated by encryption technologies, anonymity,
how the network of the internet fits together, how things are communicated,
how they're observed. And then as I began to work for the NSA, I also saw how they began to be
subverted for sort of unintentional or for reasons contrary to the intents of the communicants.
But when I think about the mathematics and the schemes within encryption and so on and so forth, I think about the
sort of fringe topics that are less well discussed, even in the
academic sector. For example, there are ideas of encryption that are
called symmetric encryption, which is where you use a password,
a key that's the same on both sides, something that doesn't
change. You lock something, you've got one key that's the same on both sides, something that doesn't change.
You lock something, you've got one key that both locks it and unlocks it.
Then you have asymmetric encryption, where you have one key that locks it, and then you
have a separate key that unlocks it.
This allows different parties to access shared knowledge without sharing the same key, the
same passwords. But then you also have more sort of exotic, esoteric methods like secret sharing.
Or they're called secret sharing schemes.
One of them that I think is very famous, at least in the community, is called Shamir's
secret sharing scheme.
And this was a really challenging concept to get for someone who didn't have a formal background in mathematics,
which is the idea of an n-dimensional space.
You could have a matrix of dimensions, and this is already kind of abstract and difficult
for people who don't think too much about math for how to fit it into their headspace.
But think about the three dimensions that we live in every day.
their headspace. But think about the three dimensions that we live in every day. You've got sort of an X and a Y axis if you're thinking about a regular plane, like your monitor.
You've got the horizontal space and you've got the vertical space. But then our third
dimension that we live in every day would be the Z axis, the depth. But beyond that,
when you need to start thinking about additional dimensions beyond the third, it's quite difficult for people to think about.
I would say impossible.
Impossible.
To try to find a fourth line that is perpendicular to the other three,
I don't know anybody who can do that.
We can do it on paper, of course, mathematically.
Because we've got four-dimensional cubes and five-dimensional cubes.
So you're talking about an n-dimensional n as in the, you'll determine it later.
Right.
An n in the context of secret sharing would be the number of parties who are sharing in the secret.
So the idea here is to enable, let's say, five people to work together to share access to one thing that's secret, but they're
concerned that one person could give away the key or basically work against
the interests of everyone involved. So you have to make sure that sort of n of x
participants are collaborating together to access the material before whatever
is protected here before it's released.
So you would need three of five or four of five and so on.
But how would you do this in the context of passwords
and cryptography?
It's a fairly difficult problem.
But so the way they do this is through
an N dimensional array or matrix.
And the idea here is that if you think about
a three dimensional space analogous to three parties in the example, that's not so hard to get your head around.
You can think of any three-dimensional point in space on Earth, for example, GPS coordinates or something similar to that, although that's actually two dimensions.
But you can get altitude on that, so you get a third dimension.
Right. Oh, there you go. All right. So there's your third dimension.
But you would say, all right, you have to meet at a street
corner on Washington, D.C., or in Washington, D.C., and those are your three
dimensions. When you're at this point, sort of you have access to the secret.
But how do you impose additional constraints? How do you get those extra N dimensions?
The fourth dimension could be time. You would only be able to
unlock this if you met on a certain street corner in Washington,
D.C. on February 14th of 2016.
Valentine's Day.
Yes.
You said February 14th.
Yes, okay.
That's when everybody works on all their cryptography.
Then you want to add additional constraints.
How do we do this? Similar to
space-time, the idea of a continuum where you don't only have physical location, but you also
have an additional time constraint. You can also impose additional requirements that substitute
for dimensions. When we think about this in the context of computer security and cryptography and things like that, you could use not only people, but what's now called multiple factors, multi-factor authentication, where instead
of you simply entering a password, you have to enter a password in addition to presenting
an SMS code that comes from your smart, a one-time use pin code, or a physical identifier, biometric identifier.
These are additional dimensions,
adding multi-dimensionality to the way
that we interact with our systems
and protect things mathematically.
But these are sort of the challenges to me,
the hard problems in security, that are fascinating
because people, you know, we've got these brilliant academic researchers
who come up with these amazing theoretical advances,
but it takes a really long time for us to translate them from the university to the laboratory,
to the company, to everyday life.
Yeah, that time delay is in almost everything that goes on in universities.
And, of course, the government has been trying to speed that up to get practical, marketable products from the brainchilds of academic researchers.
So about these dimensions, let me ask you something. encrypted message and that encrypted message gets intercepted, the interceptor will know,
presumably, that it's an encrypted message, whether or not they can decode it.
Wouldn't it be better to send a message that they don't even know is a message at all,
so that it doesn't call attention to themselves?
Something that is blended in the noise of the background, so that it doesn't even call attention to itself?
This is a sort of classic challenge in a co-con,
or what's called covert communications as a study,
sort of a theoretical space,
is how do you divorce the content of the communications,
for example, whatever the message is that's protected by that encryption,
from the fact that that communication occurred in the first place.
And this is really a challenge. How do you send a signal that no one hears?
And when we think about this as a theoretical problem, a university problem,
there are some approaches where people go, well, we can try to construct what's called a mix net when we think about network-based communications
like the internet, where we route everybody's communications into a voluntary conspiracy
of volunteers around the world who are simply trying to protect people's privacy.
And when you get everybody's communications coming into one point, you then send them to a second point and a third point.
And they're constantly mixed up.
So people observing the network have a much more difficult time correlating the communication that ended up at the destination with where it originated from.
But beyond this, when we think about sort of a back out from the practical problems and think about the theoretical problems here, there are real questions about what happens when communications get lost in the noise.
We may not be able to hear in space because, of course, in space, no one can hear you scream.
But the universe is actually rich with cosmic noise, loud enough to distort messages and perhaps hide messages within them. This may seem like an infinite source of camouflage, but it's not so simple.
Ed and I spoke about this conundrum and of the potential of hiding messages in the sounds of the universe.
And of course, by sounds of the universe, we're referring to electromagnetic radiation,
which, in its
own way, can be
noisy. Next on StarTalk.
Welcome back to StarTalk Radio.
This is a special edition of StarTalk
where we chose to
break our usual format in favor of a little one-on-one time with government whistleblower, hero, traitor, treasonous Ed Snowden.
Tonight, you are hearing part two of that interview.
show, we're going back to that conversation with Ed right here in my office when he spoke to me through a remote-controlled robot, which is essentially an eye-level iPad with wheels.
Through this virtual medium, he and I went back and forth about his early education,
encryption technology, Fourth Amendment rights, and why he chose to break his contract of
secrecy to the government to defend the Constitution.
Let's check it out.
So the cosmic microwave background is an interesting point.
It looks like noise.
No one knows these days, but in the day when you don't even know because you only just live your billionth second,
the TVs had what were called rabbit ear antennas.
Surely you've read about this in your history books.
I do adjust them on the top.
And then you couldn't move because you became part of the antenna by touching it.
But if you went between channels,
there would be this sort of static on the screen,
what we called static.
Some percentage of that static is the actual signal
from the beginning of the universe is the actual signal from the beginning
of the universe, the cosmic microwave background. And so it looks like noise locally, but in fact,
if you look at it across an entire sort of spectrum of frequencies, it actually has a shape,
a very distinctive shape that we know and describe highly precisely in physics. So if you were to hide something in the cosmic microwave background,
you'd have to follow the shape that it takes,
depending on what frequency you would communicate with.
I'm just warning you in advance, if you want to hide a signal in the universe,
they have very characteristic profiles, just so you know.
So this is actually a really interesting thing that I would like to ask you about.
Because astronomy is pretty far from my wheelhouse.
At some level, the universe is above everyone's head.
There was an old paper that was once written on using entropy
that's gathered from this cosmic microwave background radiation as a source of random numbers.
Because the most difficult part of generating reliable, robust encryption for computer scientists and mathematicians working on cryptography today is to make a computer generate a random number.
Because they can't.
At the end of the day, they're deterministic machines.
They're a bunch of ones and zeros.
They're basically on and off switches.
They can't, on their own, do anything truly random.
Instead, they use what are called pseudo-random mathematical functions
to try to develop numbers which are random enough to work for our purposes.
But all of these pseudo-random number generators
rely on what's called a seed value,
an initial random input,
which today in computers we try to generate
from, for example, the movements of someone's mouse,
the time on the machines it's ticking by,
network communications that are going out,
things that are a little
bit unpredictable or hard to guess for an adversary who's trying to attack these encrypted
communications.
Well, we used to use the random number generator to generate the seed for the random
number generator.
That should help a little bit, is that right?
Well, the question is how many steps of complexity can you get there that cannot be reversed? And unfortunately, when you have
adversaries of enough sophistication and budget, anything
that a user who is not as powerful
can do can generally be reversed by an adversary of a given level
of sophistication. But when we think about where do we get these
truly random numbers from in a reliable way, they can't be guessed,
it can't go back in time, you can't figure out what the original
truly random number was from which all the pseudo-random functions
were run off of. And a paper was once written
on using the universe as the seed
of that random function, using sort of the
distant noise that comes from things like pulsars or magnetons or some other cosmological
feature, and listening to that all around the world.
Because even if you could record everything that you can hear in a given location on Earth, you know, at an observatory
in Maui, or in the state of Washington, Chile, or something like that. You can't hear all of the
different noise that's hitting all of the planet in every spot all of the time. The amount of,
uh, the amount that we're hearing from the universe is simply too large.
the amount that we're hearing from the universe is simply too large.
Is there any source in the universe, you can say, that would be unique in that respect or hard to observe that you think could be used as a source of truly random information?
Yeah, the problem is now we have a network of telescopes that communicate with one another
that have basically all sky coverage.
Radio telescopes can observe the universe in the daytime and at nighttime,
and these signals are typically radio signals.
So pulsars are a great example.
They're rapidly spinning.
They send pulses of radio waves.
If you wanted to nab one of those pulses and somehow index to it, in principle you could,
but there's a finite number of pulsars that we've got them in the catalog.
We've got them. They're there.
And so
I'd have to think about that.
I'll dig up that paper.
You'll send me the paper.
I'll send you a link. By carrier pigeon, so we can't trace
what we're going to do.
I think the NSA already has it.
Yeah, so people were thinking, could we make a GPS system that is good for all planets,
that does not involve just the satellites around one planet?
And in principle, you could do that from pulsars, which are far enough away from our entire solar system
that everybody can just see them, indexed to them, and they're the best timekeepers there ever was.
Some of them rotate 1,000 times, they're called millisecond pulsars, and so
they're timekeeping devices that are built into the universe.
So we've got top people working on that one.
This brings up another thing which, to me, I've never really quite understood.
Whenever we talk about engineering of communications or electrical engineering in general,
we talk about signal and noise.
And when we talk about it out in the universe, you know, the way this is expanded,
we think about it as noise, as astronomical noise.
But is it really
noise? You know, when we think about the fact that all of these different points in the universe are actually doing something, is it noise or is it signal? I think the distinguisher
we have there is whether we want it in our calculation or not. But there's something
poetic, I think, in the idea that the universe is talking to us all the time.
Yeah, it's a great way to think about it.
I once wrote an essay called Signal and Noise.
That's what it was, and I featured it in one of my books.
That was the most fun essay I've ever written
because it was a topic that the public doesn't, they're not compelled to think about much,
yet it has profound implications for knowing anything at all in the universe.
And so you're right.
There are signals that I'm uninterested in because they're interfering with some other signal that I am interested in.
And so I will repeatedly get data on the object I'm interested in to raise its signal relative to any other signal that I'm getting and I'll give you an example we have clusters of stars out
there where they call them glock one of the types is called a globular cluster
thousands of stars and they're all here and they're all there they are and it's
a beehive we don't see them moving because we don't live long enough it's a
beehive but I'm interested in that one star right there. How am I going to isolate that star? What am I going to do? And so I focus in on it, try to get rid of as many other
stars as I can. Now there's another star that's sitting right next to it, and it's sharing light
in my detector. There's light spillage in my detector. I want to get rid of what I don't want
and keep what I do want. And so you're right. In many times, it is just my choice what I'm declaring to be signal
and what I'm declaring to be noise.
But there is also a fundamental source of noise.
It also exists.
In any CCD detector, you want to detect an object.
The fact that the detector is not at absolute zero
means thermal currents create signal within the detector.
That's noise. Total noise.
That's interesting, because when you mention that,
it raises to me the idea that by listening to something,
by collecting more than we need or more than we desire,
more than was relevant to us,
we can basically suffer unintended consequences.
And this is very analogous, I think, to the NSA's systems of surveillance that we've seen.
And it's not just in the United States.
It's not just the NSA.
This is a global problem that every country is going to be dealing with.
The problem is mass surveillance, which is where, because of all the communications that
are going over the air through cellular networks or going across the internet on fiber optic cables under the sea, we've
got governments that are basically co-opting telecommunications companies or they're grabbing
these fibers and they're collecting everything from them.
And just like you can get some kind of thermal input that could damage sensors or screw up
your readings, we've seen the White House itself has done reviews of
the value and effectiveness of mass surveillance and found that despite the fact that they're
collecting or they claim the legal authority to monitor the communications of everyone
in America, 330 million Americans, every time they pick up the phone, it never made a concrete
difference in a single terrorist investigation.
And as a result, all of the people, all of the resources that we're committing to sort
of monitoring all of these innocent people's communications are taking away focus from
the traditional means of law enforcement investigations and intelligence gathering that watch people
who are really suspected individually of being involved in some sort of criminal activity
or wrongdoing. Basically by creating a haystack of human lives, we're
losing the needles rather than finding them. Isn't part of why data has been collected
indiscriminately, if I can say that, because if it weren't you could accuse the authorities uh profiling which no one
that's a taboo at least in america although it's certainly not taboo when you're boarding
uh certain airplanes uh headed certain places in the world you know they'll profile you like this
but in america that's considered bad and so they've got it that's why they screen everyone
at the airport even the 80 yearold hunched over woman, right?
They screen everybody.
Right.
When we think about the problem of profiling and whatnot, it's the fact that they're going after too many people indiscriminately.
They're trying to run everybody through an algorithm.
And then they go, this doesn't work.
But we don't know who we're looking for.
We want to watch everybody because they might be doing something wrong.
So let's try to narrow it down.
Let's try to select on their religion or their ethnicity.
And these things are wrong because it makes criminals out of innocent people.
It puts a criminal suspicion on people who have done nothing wrong.
But we haven't had this problem in the past when we look at investigations.
And that's because rather than profiling, we have another means of investigation, which is called probable cause.
It's the idea that rather than watch people who we don't know are involved in any wrongdoing, we don't watch people who haven't done anything wrong.
who specifically are doing something wrong, who we have some evidence to indicate that they're doing something nefarious or contrary to our laws,
and we monitor them specifically.
The distinction between mass surveillance, which we know doesn't work, and targeted surveillance in this regard,
is the idea that rather than simply collect the communications of everybody in America at the telephone companies or at the internet service providers, you do the traditional
means of investigation, which are to tap their phones specifically, whether that's at their
house, whether that's through their computer, whether that's through their cell phone.
And on this basis, you don't have to worry about profiling.
You don't have to worry about anything else.
If you're thinking about profiling, what you're really arguing for, the idea that we would
need to watch everybody because we don't know who's doing something wrong specifically,
what you're arguing for is a paradigm shift in the method of investigation, which would
be pre-criminal investigation.
Instead of investigating people who have broken the law
and then holding them to the account of justice, you want to investigate everybody all the time
in case they might do something wrong, regardless of whether or not they actually have.
Isn't that what happens at airport security lines?
That is what happens at airport security lines, but there's a distinction. The intrusion there
is very narrow because you only have a limited amount of effects
on you.
You've got the clothes you're wearing, you've got the things in your bag.
They can't read your thoughts, they can't ask about your family, they don't know what
your hopes and dreams are and things like that.
You're in Moscow, why don't you choose a tropical country with palm trees and sipping coconut on the beach right now?
You know, good question.
I actually never intended to end up in Russia.
I was originally booked.
There were journalists who were taking pictures of my plane seat that departed Russia without me.
To go to Ecuador or Bolivia or Uruguay or Venezuela, something like that,
someplace that was a little bit warmer. But unfortunately, the Department of State canceled
my passport when I was flying on my way there, and they trapped me in the airport in Russia.
But, you know, I will say that despite all of the things that I've lost, I'm glad that I was
able to play at least a small part in doing something I can be proud of.
You've been listening to StarTalk Radio and my one-on-one conversation with government whistleblower Ed Snowden.
Hope you were able to glean something new from these past two shows.
Whether your ideas about Ed were reinforced or you were lifted into a different way of
thinking about the situation. Or maybe you just learned something new about encryption technology
and welcome Ed as a member of the geek community in the way, of course, I have done. I'm Neil
DeGrasse Tyson, your personal astrophysicist. And as always, I bid you to keep looking up.