TED 2014 Lyrics

You’ve been called many things in the last few months: whistleblower, traitor, hero… What words would you use to describe yourself?

You know, everybody who’s involved with this debate has been struggling over me, my personality and how to describe me. This isn’t the question we should be struggling with. Who I am really doesn’t matter at all. If I’m the worst person in the world, hate me and move on. What really matters here are the issues of the government we want, the Internet we want, the relationship between people and societies. That’s what I hope the debate will move towards. If I had to describe myself, I’m not a hero, patriot, traitor. I’d say I’m an American and a citizen. [Applause.]

Tell the audience what the Prism program really meant.

First, what Prism isn’t. The debate in the US is about metadata. That this is “just metadata.” They’re talking about the specific section 215 of the Patriot Act; this is warrantless wiretapping, phone-tapping, who you’re talking to, when you’re talking to them, where you travel — those are all metadata events. Prism is about content. It’s a program through which the government could compel corporate America, deputize corporate America to do the dirty work for the NSA. Even though some companies did resist — I think Yahoo did challenge this in court — they lost. But this was never tried by open court, only by secret court. This has been a talking point in the US government, that 15 federal judges reviewed the programs and found them to be lawful. What they don’t tell you is those are secret judges in a secret court making secret interpretations of the law. There have been 34,000 warrant requests in 33 years and they only rejected 11 government requests. These aren’t the people we want deciding what the role of corporate America in a free society should be.

The slide we’re looking at shows dates when companies joined the Prism program. They’ve denied collaborating with the NSA, so how was that data collected?

The NSA’s own slides refer to it as direct access. What that means to an NSA analyst, someone like me, who’s targeting Chinese cyber acts, is that the provenance of data is directly from their servers. It doesn’t mean that there’s a group of company reps sitting in a smoky room, palling around with the NSA and making backroom deals to give stuff away. Some [companies] are responsible, some are less responsible. When we talk about this information and how it’s given, it’s given by the companies themselves, it’s not stolen. Even though companies push back and say, “Hey, let’s do this through a warrant process, we have some legal review and basis for handing over users’ data,” we saw stories in the Washington Post that said the NSA broke into the data center communications between Google to itself, Yahoo to itself. Even when those companies cooperate in a lawful manner with the NSA, the NSA isn’t satisfied. We need our companies to work very hard to guarantee they’re going to represent the interest of the user and advocate for the rights of the users. We’ve seen the companies named on the slides take great strides to do that and I encourage that to continue.

The biggest thing an Internet company in America can do today without consulting lawyers to protect users worldwide is to enable SSL web encryption on every page you visit. The reason this matters is that today, if you look at the book 1984 on amazon.com, the NSA can see a record of that, the Russian intelligence service can see a record of that, the French, the German… It’s unencrypted. The world’s library, amazon.com, not only does not support encryption by default but you cannot choose encryption. I don’t mean to single out Amazon; all companies should move to encrypted browsing by default. That will increase the privacy and rights that people enjoy worldwide. [Applause]

What’s Boundless Informant?

All credit to the NSA for using appropriate names. Boundless Informant is a program the NSA hid from Congress. The NSA was previously asked by Congress to give a rough ballpark estimate of the amount of American communications being intercepted. They said they don’t track those stats: “we can’t track those stats, we can’t tell you how many communications we’re intercepting. To tell you that would be to invade privacy.” [He laughs, so does the audience, though somewhat wryly.] But the capability already exists, it’s already in place. The NSA has its own data format that tracks both ends of a communication. Boundless Informant tells us that more communications are being intercepted in America about Americans than there are in Russia about Russians. I’m not sure that’s what an intelligence agency should be aiming for.

There was another story, that the NSA broke privacy rules thousands of times a year. What was that about?

We heard in Congressional testimony, and this was amazing for someone like me from the NSA who’s seen the internal documents and knows what in them, to see officials testify under oath that there were no abuses, no violations of rules. We knew this story was coming. One event out of 2,776 affected more than 3,000 people. In another event, they intercepted all the calls in Washington DC — by accident. What’s amazing about this report is not only were there 2,776 abuses but the chairman of the Senate’s Intelligence Committee, Dianne Feinstein, had not even seen the report until the Washington Post contacted her asking for comment. She then requested a copy from the NSA. What does that say about the state of oversight in the Senate when the chairman of the Intelligence Committee has no idea about thousands of abuses?

You might think if you haven’t done anything wrong then it doesn’t really matter. Why should we care about all this surveillance?

The first thing is you’re giving up your rights. “I don’t think I’m going to need them so I’ll get rid of them, it doesn’t really matter, these guys will do the right thing.” But your rights matter because you never know when you’ll need them. In democratic societies around the world, people should be able to pick up the phone, call family, send text messages to loved one, travel by train, buy an airline ticket — without wondering how those events will look to an agent of government, possibly not even your government but one years in the future. How might this be misinterpreted? We have a right to privacy. We require warrants to be based on probable causes. Trusting any government authority with the entirety of human communications without any oversight is too great a temptation to be ignored.
Some people are furious with you. Dick Cheney, for instance, described Julian Assange as a fleabite, and said you are the lion that bit the head off the dog. He thinks you’ve committed one of worst acts of betrayal in human history.

[smiles] Dick Cheney is really something else. [The audience laughs, and applauds.] Thank you.

At the time Julian Assange was doing his greatest work, Dick Cheney was saying he’d endangered governments worldwide, the skies were going to ignite, seas would boil off. Now he says it was a fleabite. We should be suspicious of overblown claims from these officials. But! Let’s assume that these people really believe this. I would argue they have a narrow conception of national security. The prerogatives of people like Dick Cheney do not keep the nation safe; the public interest is not always the same as the national interest. The Internet is not the enemy, the economy is not the enemy.

It’s been alleged you stole 1.7 million documents. So far, hundreds have been shared. Is there more to come?

There are absolutely more revelations to come. Some of the most important reporting is yet to come.

Someone is making the calculation that it’s worth doing this, as a part of defense against terrorism. Is this a price worth paying?

When you look at the results of these programs countering terrorism, you see that’s unfounded. You don’t have to take my word for it. We had the first open court to review this outside secrecy arrangement. It was called Orwellian and likely unconstitutional. Congress has asked to be briefed and has produced bills to reform it. Two independent White House panels said the programs had never stopped a single imminent terrorism attack in the US. Is it really terrorism we’re stopping? Do these programs have any value at all? I say no. All three branches say no as well.

Do you think there’s a deeper motivation for them other than war against terrorism?

The bottom line is that terrorism is used as a cover for action. Terrorism provokes an emotional response that allows people to rationalize and authorize programs they wouldn’t have otherwise. The US asked for this authority in the 1990s; it asked the FBI to make the case in Congress, and they said no, it’s not worth the risk to the economy, it would do too much damage to society to justify gains. But in the post 9/11 era, they used secrecy and justification of terrorism to start programs in secret without asking Congress or the American people. Government behind closed doors is what we must guard against.

Most people would find your situation terrifying. We see the treatment of Bradley, now Chelsea Manning. Some people in the intelligence community are said to want you dead. How are you copying[sic] with this fear?

It’s no mystery that there are governments that want to see me dead. I’ve been clear again and again and again, I go to sleep thinking about what I can do for the American people. I don’t want to harm my government, I want to help them. But the fact that they are willing to completely ignore due process, they are willing to declare guilt without ever seeing a trial, these are things we need to work against as a society. This is not appropriate.

TED began 30 years ago, in 1984. But it seems Orwell got it wrong, his was almost an optimistic view?

There is an argument to be made that the powers of Big Brother have increased enormously. A legal article at Yale established the Bankston and Soltani principle. But there is still hope. The power of individuals has also been increased by technology. Individuals can go head to head against the most powerful adversaries and agencies in the world — and win. That’s something we need to take hope from and build on to make accessible to everyone. Journalism is not a crime… Communication is not a crime.
The New York Times is calling for an amnesty for you. Would you welcome the chance to come back?

Absolutely. There’s really no question. The principles that have been the foundation of this project have been the public interest and the principles that underlie the journalistic establishment in the US and around the world. I think if the press is now saying we support this, this is something that needed to happen, that’s a powerful argument but it’s not final. That’s something the public should decide. The government has hinted they want some kind of deal, a compromise deal to come back. But I want to make it very clear. I did not do this to be safe. I did this to do what was right. I won’t stop working in the public interest just to benefit myself. [Applause.]

So TED’s mission is “ideas worth spreading.” What’s your idea worth spreading?

I would say the last year has been a reminder that democracy may die behind closed doors. We don’t have to give up privacy to have good government, we don’t have to give up liberty to have security. By working together we can have open government and private lives. I look forward to working with everyone to see that happen.

How to Format Lyrics:

  • Type out all lyrics, even repeating song parts like the chorus
  • Lyrics should be broken down into individual lines
  • Use section headers above different song parts like [Verse], [Chorus], etc.
  • Use italics (<i>lyric</i>) and bold (<b>lyric</b>) to distinguish between different vocalists in the same song part
  • If you don’t understand a lyric, use [?]

To learn more, check out our transcription guide or visit our transcribers forum

About

Genius Annotation

Edward Snowden makes an appearance with an interview at TED Talks.

h/t blog.ted.com

Q&A

Find answers to frequently asked questions about the song and explore its deeper meaning

Credits
Release Date
March 18, 2014
Tags
Comments