sponsored links
TEDGlobal 2012

Marc Goodman: A vision of crimes in the future

June 28, 2012

The world is becoming increasingly open, and that has implications both bright and dangerous. Marc Goodman paints a portrait of a grave future, in which technology's rapid development could allow crime to take a turn for the worse.

Marc Goodman - Global Security Futurist
Marc Goodman works to prevent future crimes and acts of terrorism, even those security threats not yet invented. Full bio

sponsored links
Double-click the English subtitles below to play the video.
I study the future
00:15
of crime and terrorism,
00:18
and frankly, I'm afraid.
00:22
I'm afraid by what I see.
00:25
I sincerely want to believe
00:27
that technology can bring us
00:29
the techno-utopia that we've been promised,
00:31
but, you see,
00:35
I've spent a career in law enforcement,
00:36
and that's informed my perspective on things.
00:39
I've been a street police officer,
00:42
an undercover investigator,
00:44
a counter-terrorism strategist,
00:46
and I've worked in more than 70 countries
00:48
around the world.
00:50
I've had to see more than my fair share
00:52
of violence and the darker underbelly of society,
00:53
and that's informed my opinions.
00:56
My work with criminals and terrorists
01:01
has actually been highly educational.
01:03
They have taught me a lot, and I'd like to be able
01:05
to share some of these observations with you.
01:07
Today I'm going to show you the flip side
01:11
of all those technologies that we marvel at,
01:14
the ones that we love.
01:18
In the hands of the TED community,
01:19
these are awesome tools which will bring about
01:21
great change for our world,
01:24
but in the hands of suicide bombers,
01:28
the future can look quite different.
01:30
I started observing
01:34
technology and how criminals were using it
01:36
as a young patrol officer.
01:38
In those days, this was the height of technology.
01:40
Laugh though you will,
01:44
all the drug dealers and gang members
01:46
with whom I dealt had one of these
01:47
long before any police officer I knew did.
01:49
Twenty years later, criminals are still using
01:54
mobile phones, but they're also building
01:57
their own mobile phone networks,
02:00
like this one, which has been deployed
02:03
in all 31 states of Mexico by the narcos.
02:05
They have a national encrypted
02:09
radio communications system.
02:11
Think about that.
02:14
Think about the innovation that went into that.
02:16
Think about the infrastructure to build it.
02:20
And then think about this:
02:23
Why can't I get a cell phone signal in San Francisco? (Laughter)
02:24
How is this possible? (Laughter) It makes no sense. (Applause)
02:28
We consistently underestimate
02:33
what criminals and terrorists can do.
02:34
Technology has made our world
02:38
increasingly open, and for the most part,
02:39
that's great, but all of this openness
02:41
may have unintended consequences.
02:44
Consider the 2008 terrorist attack on Mumbai.
02:46
The men that carried that attack out were armed
02:51
with AK-47s, explosives and hand grenades.
02:54
They threw these hand grenades
02:57
at innocent people as they sat eating in cafes
02:59
and waited to catch trains on their way home from work.
03:02
But heavy artillery is nothing new in terrorist operations.
03:07
Guns and bombs are nothing new.
03:10
What was different this time
03:13
is the way that the terrorists used
03:14
modern information communications technologies
03:17
to locate additional victims and slaughter them.
03:19
They were armed with mobile phones.
03:25
They had BlackBerries.
03:27
They had access to satellite imagery.
03:29
They had satellite phones, and they even had night vision goggles.
03:31
But perhaps their greatest innovation was this.
03:36
We've all seen pictures like this
03:39
on television and in the news. This is an operations center.
03:41
And the terrorists built their very own op center
03:44
across the border in Pakistan,
03:47
where they monitored the BBC,
03:50
al Jazeera, CNN and Indian local stations.
03:51
They also monitored the Internet and social media
03:56
to monitor the progress of their attacks
04:01
and how many people they had killed.
04:03
They did all of this in real time.
04:06
The innovation of the terrorist operations center
04:09
gave terrorists unparalleled situational awareness
04:12
and tactical advantage over the police
04:16
and over the government.
04:18
What did they do with this?
04:21
They used it to great effect.
04:22
At one point during the 60-hour siege,
04:24
the terrorists were going room to room
04:26
trying to find additional victims.
04:28
They came upon a suite on the top floor
04:31
of the hotel, and they kicked down the door
04:32
and they found a man hiding by his bed.
04:34
And they said to him, "Who are you,
04:37
and what are you doing here?"
04:39
And the man replied,
04:41
"I'm just an innocent schoolteacher."
04:42
Of course, the terrorists knew
04:46
that no Indian schoolteacher stays at a suite in the Taj.
04:48
They picked up his identification,
04:52
and they phoned his name in to the terrorist war room,
04:54
where the terrorist war room Googled him,
04:57
and found a picture and called their operatives
05:00
on the ground and said,
05:03
"Your hostage, is he heavyset?
05:04
Is he bald in front? Does he wear glasses?"
05:09
"Yes, yes, yes," came the answers.
05:13
The op center had found him and they had a match.
05:18
He was not a schoolteacher.
05:20
He was the second-wealthiest businessman in India,
05:21
and after discovering this information,
05:25
the terrorist war room gave the order
05:26
to the terrorists on the ground in Mumbai.
05:30
("Kill him.")
05:32
We all worry about our privacy settings
05:35
on Facebook,
05:39
but the fact of the matter is,
05:40
our openness can be used against us.
05:43
Terrorists are doing this.
05:46
A search engine can determine
05:48
who shall live and who shall die.
05:52
This is the world that we live in.
05:56
During the Mumbai siege,
05:59
terrorists were so dependent on technology
06:00
that several witnesses reported that
06:03
as the terrorists were shooting hostages with one hand,
06:05
they were checking their mobile phone messages
06:08
in the very other hand.
06:10
In the end, 300 people were gravely wounded
06:13
and over 172 men, women and children
06:16
lost their lives that day.
06:20
Think about what happened.
06:24
During this 60-hour siege on Mumbai,
06:26
10 men armed not just with weapons,
06:29
but with technology,
06:33
were able to bring a city of 20 million people
06:35
to a standstill.
06:39
Ten people brought 20 million people
06:41
to a standstill, and this traveled around the world.
06:43
This is what radicals can do with openness.
06:47
This was done nearly four years ago.
06:54
What could terrorists do today
06:56
with the technologies available that we have?
06:58
What will they do tomorrow?
07:01
The ability of one to affect many
07:04
is scaling exponentially,
07:06
and it's scaling for good and it's scaling for evil.
07:09
It's not just about terrorism, though.
07:13
There's also been a big paradigm shift in crime.
07:15
You see, you can now commit more crime as well.
07:17
In the old days, it was a knife and a gun.
07:22
Then criminals moved to robbing trains.
07:24
You could rob 200 people on a train, a great innovation.
07:26
Moving forward, the Internet
07:30
allowed things to scale even more.
07:32
In fact, many of you will remember
07:34
the recent Sony PlayStation hack.
07:36
In that incident, over 100 million people were robbed.
07:37
Think about that.
07:44
When in the history of humanity
07:45
has it ever been possible for one person
07:47
to rob 100 million?
07:49
Of course, it's not just about stealing things.
07:55
There are other avenues of technology
07:56
that criminals can exploit.
07:59
Many of you will remember this super cute video
08:00
from the last TED,
08:03
but not all quadcopter swarms are so nice and cute.
08:06
They don't all have drumsticks.
08:11
Some can be armed with HD cameras
08:13
and do countersurveillance on protesters,
08:15
or, as in this little bit of movie magic,
08:17
quadcopters can be loaded with firearms
08:20
and automatic weapons.
08:24
Little robots are cute when they play music to you.
08:27
When they swarm and chase you down the block
08:30
to shoot you, a little bit less so.
08:33
Of course, criminals and terrorists weren't the first
08:37
to give guns to robots. We know where that started.
08:39
But they're adapting quickly.
08:41
Recently, the FBI arrested
08:43
an al Qaeda affiliate in the United States,
08:45
who was planning on using these remote-controlled
08:47
drone aircraft to fly C4 explosives
08:49
into government buildings in the United States.
08:51
By the way, these travel at over 600 miles an hour.
08:54
Every time a new technology is being introduced,
08:59
criminals are there to exploit it.
09:02
We've all seen 3D printers.
09:04
We know with them that you can print
09:06
in many materials ranging from plastic
09:07
to chocolate to metal and even concrete.
09:10
With great precision
09:15
I actually was able to make this
09:16
just the other day, a very cute little ducky.
09:18
But I wonder to myself,
09:25
for those people that strap bombs to their chests
09:27
and blow themselves up,
09:34
how might they use 3D printers?
09:35
Perhaps like this.
09:39
You see, if you can print in metal,
09:43
you can print one of these,
09:45
and in fact
09:48
you can also print one of these too.
09:54
The UK I know has some very strict firearms laws.
10:00
You needn't bring the gun into the UK anymore.
10:05
You just bring the 3D printer
10:07
and print the gun while you're here,
10:09
and, of course, the magazines for your bullets.
10:12
But as these get bigger in the future,
10:15
what other items will you be able to print?
10:16
The technologies are allowing bigger printers.
10:18
As we move forward,
10:22
we'll see new technologies also, like the Internet of Things.
10:23
Every day we're connecting more and more of our lives
10:26
to the Internet, which means
10:28
that the Internet of Things will soon be
10:30
the Internet of Things To Be Hacked.
10:34
All of the physical objects in our space
10:36
are being transformed into information technologies,
10:38
and that has a radical implication for our security,
10:41
because more connections to more devices
10:45
means more vulnerabilities.
10:48
Criminals understand this.
10:50
Terrorists understand this. Hackers understand this.
10:52
If you control the code, you control the world.
10:54
This is the future that awaits us.
10:57
There has not yet been an operating system
11:02
or a technology that hasn't been hacked.
11:05
That's troubling, since the human body itself
11:07
is now becoming an information technology.
11:10
As we've seen here, we're transforming ourselves into cyborgs.
11:13
Every year, thousands of cochlear implants,
11:17
diabetic pumps, pacemakers
11:19
and defibrillators are being implanted in people.
11:21
In the United States, there are 60,000 people
11:24
who have a pacemaker that connects to the Internet.
11:26
The defibrillators allow a physician at a distance
11:29
to give a shock to a heart
11:33
in case a patient needs it.
11:34
But if you don't need it,
11:37
and somebody else gives you the shock,
11:39
it's not a good thing.
11:41
Of course, we're going to go even deeper than the human body.
11:44
We're going down to the cellular level these days.
11:48
Up until this point, all the technologies
11:50
I've been talking about have been silicon-based, ones and zeroes,
11:52
but there's another operating system out there:
11:56
the original operating system, DNA.
11:58
And to hackers, DNA is just another operating system
12:03
waiting to be hacked.
12:08
It's a great challenge for them.
12:10
There are people already working on hacking the software of life,
12:11
and while most of them are doing this to great good
12:14
and to help us all,
12:17
some won't be.
12:19
So how will criminals abuse this?
12:22
Well, with synthetic biology you can do some pretty neat things.
12:24
For example, I predict that we will move away
12:26
from a plant-based narcotics world
12:29
to a synthetic one. Why do you need the plants anymore?
12:33
You can just take the DNA code from marijuana
12:36
or poppies or coca leaves
12:39
and cut and past that gene
12:43
and put it into yeast,
12:46
and you can take those yeast
12:48
and make them make the cocaine for you,
12:50
or the marijuana, or any other drug.
12:53
So how we use yeast in the future
12:57
is going to be really interesting.
12:59
In fact, we may have some really interesting bread and beer
13:01
as we go into this next century.
13:03
The cost of sequencing the human genome is dropping precipitously.
13:07
It was proceeding at Moore's Law pace,
13:11
but then in 2008, something changed.
13:13
The technologies got better,
13:15
and now DNA sequencing is proceeding at a pace
13:17
five times that of Moore's Law.
13:21
That has significant implications for us.
13:24
It took us 30 years to get from
13:28
the introduction of the personal computer
13:30
to the level of cybercrime we have today,
13:32
but looking at how biology is proceeding so rapidly,
13:35
and knowing criminals and terrorists as I do,
13:38
we may get there a lot faster
13:40
with biocrime in the future.
13:43
It will be easy for anybody to go ahead
13:45
and print their own bio-virus,
13:47
enhanced versions of ebola or anthrax,
13:49
weaponized flu.
13:51
We recently saw a case where some researchers
13:53
made the H5N1 avian influenza virus more potent.
13:56
It already has a 70 percent mortality rate
14:01
if you get it, but it's hard to get.
14:04
Engineers, by moving around a small number
14:06
of genetic changes,
14:09
were able to weaponize it
14:11
and make it much more easy for human beings to catch,
14:12
so that not thousands of people would die,
14:15
but tens of millions.
14:18
You see, you can go ahead and create
14:19
new pandemics, and the researchers who did this
14:22
were so proud of their accomplishments,
14:24
they wanted to publish it openly
14:25
so that everybody could see this
14:27
and get access to this information.
14:29
But it goes deeper than that.
14:34
DNA researcher Andrew Hessel
14:35
has pointed out quite rightly
14:37
that if you can use cancer treatments,
14:39
modern cancer treatments,
14:41
to go after one cell while leaving all the other cells
14:42
around it intact,
14:45
then you can also go after any one person's cell.
14:47
Personalized cancer treatments
14:51
are the flip side of personalized bioweapons,
14:53
which means you can attack any one individual,
14:55
including all the people in this picture.
14:59
How will we protect them in the future?
15:03
What to do? What to do about all this?
15:07
That's what I get asked all the time.
15:10
For those of you who follow me on Twitter,
15:12
I will be tweeting out the answer later on today. (Laughter)
15:14
Actually, it's a bit more complex than that,
15:19
and there are no magic bullets.
15:21
I don't have all the answers,
15:23
but I know a few things.
15:25
In the wake of 9/11,
15:27
the best security minds
15:29
put together all their innovation
15:32
and this is what they created for security.
15:34
If you're expecting the people who built this to protect you
15:38
from the coming robopocalypse — (Laughter)
15:42
— uh, you may want to have a backup plan. (Laughter)
15:46
Just saying. Just think about that. (Applause)
15:49
Law enforcement is currently a closed system.
15:55
It's nation-based, while the threat is international.
15:58
Policing doesn't scale globally. At least, it hasn't,
16:01
and our current system of guns, border guards, big gates and fences
16:05
are outdated in the new world into which we're moving.
16:09
So how might we prepare for some of these specific threats,
16:12
like attacking a president or a prime minister?
16:14
This would be the natural government response,
16:17
to hide away all our government leaders
16:19
in hermetically sealed bubbles.
16:21
But this is not going to work.
16:23
The cost of doing a DNA sequence is going to be trivial.
16:25
Anybody will have it and we will all have them in the future.
16:28
So maybe there's a more radical way that we can look at this.
16:31
What happens if we were to take
16:35
the President's DNA, or a king or queen's,
16:37
and put it out to a group of a few hundred
16:40
trusted researchers so they could
16:42
study that DNA and do penetration testing against it
16:44
as a means of helping our leaders?
16:47
Or what if we sent it out to a few thousand?
16:49
Or, controversially, and not without its risks,
16:52
what happens if we just gave it to the whole public?
16:54
Then we could all be engaged in helping.
16:57
We've already seen examples of this working well.
17:01
The Organized Crime and Corruption Reporting Project
17:03
is staffed by journalists and citizens
17:06
where they are crowd-sourcing
17:08
what dictators and terrorists are doing
17:10
with public funds around the world,
17:12
and, in a more dramatic case,
17:14
we've seen in Mexico,
17:16
a country that has been racked
17:18
by 50,000 narcotics-related murders
17:19
in the past six years.
17:23
They're killing so many people
17:25
they can't even afford to bury them all
17:27
in anything but these unmarked graves
17:29
like this one outside of Ciudad Juarez.
17:31
What can we do about this? The government has proven ineffective.
17:34
So in Mexico, citizens, at great risk to themselves,
17:37
are fighting back to build an effective solution.
17:40
They're crowd-mapping the activities of the drug dealers.
17:44
Whether or not you realize it,
17:49
we are at the dawn of a technological arms race,
17:50
an arms race between people
17:54
who are using technology for good
17:56
and those who are using it for ill.
17:58
The threat is serious, and the time to prepare for it is now.
18:00
I can assure you that the terrorists and criminals are.
18:04
My personal belief is that,
18:08
rather than having a small, elite force
18:10
of highly trained government agents
18:12
here to protect us all,
18:14
we're much better off
18:15
having average and ordinary citizens
18:17
approaching this problem as a group
18:19
and seeing what we can do.
18:22
If we all do our part,
18:23
I think we'll be in a much better space.
18:24
The tools to change the world
18:26
are in everybody's hands.
18:28
How we use them is not just up to me,
18:30
it's up to all of us.
18:32
This was a technology I would frequently deploy
18:35
as a police officer.
18:38
This technology has become outdated in our current world.
18:40
It doesn't scale, it doesn't work globally,
18:43
and it surely doesn't work virtually.
18:46
We've seen paradigm shifts in crime and terrorism.
18:48
They call for a shift to a more open form
18:51
and a more participatory form of law enforcement.
18:56
So I invite you to join me.
19:01
After all, public safety is too important to leave to the professionals.
19:03
Thank you. (Applause)
19:08
(Applause)
19:11

sponsored links

Marc Goodman - Global Security Futurist
Marc Goodman works to prevent future crimes and acts of terrorism, even those security threats not yet invented.

Why you should listen

Marc Goodman imagines the future crime and terrorism challenges we will all face as a result of advancing technologies. He thinks deeply about the disruptive security implications of robotics, artificial intelligence, social data, virtual reality and synthetic biology. Technology, he says, is affording exponentially growing power to non-state actors and rogue players, with significant consequences for our common global security. How to respond to these threats? The crime-fighting solution might just lie in crowdsourcing.

Goodman heads the Future Crimes Institute, a think tank and clearinghouse that researches and advises on the security and risk implications of emerging technologies. He also serves as the Global Security Advisor and Chair for Policy and Law at Singularity University.

The original video is available on TED.com
sponsored links

If you need translations, you can install "Google Translate" extension into your Chrome Browser.
Furthermore, you can change playback rate by installing "Video Speed Controller" extension.

Data provided by TED.

This website is owned and operated by Tokyo English Network.
The developer's blog is here.