[Bill] Binney designed ThinThread, an NSA program that used encryption to try to make mass surveillance less objectionable. It would still have been unlawful and unconstitutional.
US spend more on research and development than the other countries, so we shouldn't be making the internet a more hostile, a more aggressive territory.
It's interesting that you mention [Andrei] Sakharov's creative axis - he had produced something for the government that he then realized was something other than he intended. That's something [NSA whistleblower] Bill Binney and I share.
Defending ourselves from internet-based attacks, internet-originated attacks, is much, much more important than our ability to launch attacks against similar targets in foreign countries.
We reject techniques like torture regardless of whether they're effective or ineffective because they are barbaric and harmful on a broad scale. It's the same thing with cyber warfare. We should never be attacking hospitals. We should never be taking down power plants unless that is absolutely necessary to ensure our continued existence as a free people.
I hate these questions - I don't like talking about this stuff [popular culture], because it's so... to me, it's so ordinary.
The most important thing to the United States is not being able to attack our adversaries, the most important thing is to be able to defend ourselves. And we can't do that as long as we're subverting our own security standards for the sake of surveillance.
I'm not a spy for Russia or China or any other country for that matter.
I think the public still isn't aware of the frequency with which the cyber-attacks, as they're being called in the press, are being used by governments around the world, not just the US.
When you're attacking a router on the internet, and you're doing it remotely, it's like trying to shoot the moon with a rifle. Everything has to happen exactly right. Every single variable has to be controlled and precisely accounted for. And that's not possible to do when you have limited knowledge of the target you're attacking.
It doesn't need to be consistently concentrated in these venture-capital funds and things like that.
I don't go out and play football and stuff - that's not me. I want to think, I want to build, I want to talk, I want to create.
I love my country. I love my family. And I have dedicated my life to both of them.
I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI.
Even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it.
If I had to guess what the future's going to look like for me - assuming it's not an orange jumpsuit in a hole - I think I'm going to alternate between tech and policy.
Anyway, it's not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
I'm not a politician, and I do not think I am as effective in this way as people who actually prepare for it - is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what "digital rights" should be. What values should we be protecting, and how do we assert them.
A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they're really sore - the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment - they're the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don't like that at all.
No one would argue that it's in the United States' interest to have independent knowledge of the plans and intentions of foreign countries. But we need to think about where to draw the line on these kind of operations so we're not always attacking our allies, the people we trust, the people we need to rely on, and to have them in turn rely on us.
When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense.
If you ask anybody at Cyber Command or look at any of the job listings for openings for their positions, you'll see that the one thing they don't prioritize is computer network defense. It's all about computer network attack and computer network exploitation at Cyber Command.
The way the United States intelligence community operates is it doesn't limit itself to the protection of the homeland. It doesn't limit itself to countering terrorist threats, countering nuclear proliferation. It's also used for economic espionage, for political spying to gain some knowledge of what other countries are doing.
If an adversary didn't target our power plants but they did target the core routers, the backbones that tie our internet connections together, entire parts of the United States could be cut off. That would have a tremendous impact on us as a society and it would have a policy backlash.
What has a great value to us as a nation is the internet itself. The internet is critical infrastructure to the United States. We use the internet for every communication that businesses rely on every day.