THESE VITAL SPEECHES
4mSoSJ
4mSoSJ
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
38<br />
CICERO SPEECHWRITING AWARDS<br />
WINNER: PUBLIC POLICY<br />
“Technology, Security, Freedom”<br />
By Charles Crawford for Sir John Sawers, Former<br />
Chief of MI6; Chairman, Macro Advisory Partners<br />
Delivered to Alumni of the University of Nottingham, at the Royal<br />
Institute of British Architects, London, England, Nov. 25, 2015<br />
Back in the 1960s US computer<br />
genius Gordon Moore made an<br />
astute prediction about exponential<br />
growth in computer power. It’s now<br />
called Moore’s Law.<br />
Every two years or so you can<br />
expect double the computer power for<br />
your money.<br />
That relationship has been borne<br />
out over nearly 50 years.<br />
In 1975 the Cray-1 was the world’s<br />
mightiest supercomputer. It had 8<br />
Megabytes: £10 million in today’s<br />
money. My Apple iPhone has 128<br />
Gigabytes of memory, and cost £600.<br />
15,000 times the power, at a fifteen<br />
thousandth of the cost.<br />
Technology gets faster and better<br />
and cheaper and cheaper. Cars and<br />
roads and factories and homes get<br />
safer. Driverless cars.<br />
New medical techniques. Need a<br />
new spare part? Do some Googling,<br />
then use your 3D printer to make one.<br />
Data analytics is one of the new<br />
sciences. Making connections, finding<br />
solutions to problems that were previously<br />
unknowable.<br />
The volume of data is growing at an<br />
exponential rate.<br />
You turn on your mobile phone.<br />
Post a Tweet. Go shopping. Drive past<br />
a CCTV camera. Use your Oyster<br />
card. Watch a YouTube cat video.<br />
Everything you do with a digital<br />
angle—everything anyone does, anywhere<br />
in the world—makes those data<br />
oceans bigger, richer, deeper.<br />
Charles Dickens’ opening of A Tale of<br />
Two Cities is as great as it gets.<br />
It was the best of times<br />
It was the worst of times<br />
The age of wisdom<br />
The age of foolishness<br />
The epoch of belief<br />
The epoch of incredulity<br />
Today, 160 years later, Dickens’ words<br />
sum up our relationship to technology.<br />
The best of times? Or the worst of<br />
times?<br />
The age of wisdom? Or foolishness?<br />
Belief ? Incredulity?<br />
All of them at once?<br />
Thus my three themes tonight. Technology.<br />
Security. Freedom.<br />
Can democratic societies have the<br />
best of times without the worst of times?<br />
We’re going to get more technology.<br />
Lots more technology! Are we going to<br />
get more freedom and less security? Or<br />
more security, but less freedom?<br />
As democracies grapple with these<br />
issues, do terrorists and fanatics feel that<br />
they have more freedom? Will autocracies<br />
become stronger, and democracies<br />
weaker? Do the enemies of democracy<br />
feel more secure?<br />
Dickens’ two cities were London and<br />
Paris.<br />
Just twelve days ago Paris was hit by a<br />
new horrible terrorist attack.<br />
People from across Paris, across<br />
France, across the globe, murdered and<br />
maimed at random. Gunned down by<br />
killers whose twisted ideology sees a<br />
cheerful tolerant culture as the enemy.<br />
Can we stop what happened in Paris<br />
happening here in London?<br />
The honest, unsettling answer:<br />
Yes … Most of the time.<br />
As MI6 Chief, my top priority was<br />
identifying plans hatched abroad to<br />
launch terror attacks against the UK.<br />
We had significant successes: working<br />
with intelligence partners in Britain,<br />
America and the Middle East, we<br />
stopped terrifying attacks.<br />
You don’t see these attacks. Because<br />
they don’t happen. We don’t talk about<br />
them. Why give our enemies clues to<br />
how we are stopping them?<br />
When I joined MI6, I was trained<br />
to spot people tracking me. Telephone<br />
tapping. Intercepting radio communication.<br />
Following you by car or on foot. No<br />
school like the old school!<br />
Today those labour-intensive techniques<br />
are supported by high-end<br />
software. Face-recognition. Footsteprecognition.<br />
Old and new intelligence tradecraft—<br />
they all have their place. But they work<br />
when you know who poses a threat. First<br />
you have to find these people.<br />
You dive deep into those data oceans.<br />
You look for patterns. Snippets of digital<br />
information that suggests activity worth<br />
a closer look.<br />
Then you have to try to work out who<br />
among several thousand possible extremist<br />
sympathisers looks set to launch<br />
a terror attack next week. You also want<br />
to find disaffected people inside terrorist<br />
organisations who might switch sides.<br />
Terrorists are using technology to<br />
change their methods and targets. We<br />
have to change the way we defend ourselves.<br />
You follow terrorists and potential<br />
terrorists where they are.<br />
If a terror suspect enters a pub, it’s<br />
reasonable if not vital that the police<br />
and MI5 have the legal power to enter<br />
the pub and monitor him there.<br />
These days terrorists are scheming<br />
deep in cyberspace.<br />
If the police believe that an active<br />
terrorist suspect is operating online, it’s<br />
reasonable if not vital that the police and<br />
security services have the legal powers to<br />
track him online and identify who he is<br />
communicating with.<br />
The point is this.<br />
People who want to do you harm<br />
benefit from Moore’s Law just as much<br />
as those who want to keep you safe.<br />
As citizens, we want maximum privacy<br />
and maximum security. Unbreakable<br />
encryption is at the centre of the<br />
argument.<br />
Intelligence agencies focus on security<br />
and worry that terrorists will be able to<br />
VSOTD.COM