Logo

    A Conversation with Edward Snowden (Part 2)

    en-usSeptember 25, 2015
    Who interviewed Edward Snowden in this StarTalk episode?
    What were Snowden's main topics during the interview?
    How did Snowden communicate with Neil deGrasse Tyson?
    What potential source for random numbers is discussed?
    What is the concept of covert communications?

    Podcast Summary

    • An Interview with NSA Whistleblower Edward SnowdenFormer CIA agent Edward Snowden, now a Russian asylum seeker, discussed encryption, privacy, and human rights with Neil deGrasse Tyson, revealing unique insights into the ongoing debate about his actions and their impact on privacy and government surveillance.

      Key takeaway from this episode of StarTalk is the extraordinary interview between Neil deGrasse Tyson and international fugitive Edward Snowden. Snowden, a former CIA agent, became a household name in 2013 when he leaked secret documents from the National Security Agency (NSA), revealing mass surveillance programs that collected personal data from US citizens. The interview, which took place via a remote control robot, allowed Snowden to share his thoughts on encryption, privacy, and human rights. Despite being charged with theft and espionage, Snowden found asylum in Russia and communicated with Tyson through a BeamPro remote presence system. The interview provided unique insights into Snowden's perspective and highlighted the ongoing debate about his actions and their impact on privacy and government surveillance. Whether you view Snowden as a traitor or a hero, this interview offers valuable insights into these complex issues.

    • A former intelligence agent's whistleblowing act led to a national debate on privacy vs. securitySnowden's revelations sparked a debate on balancing individual privacy and national security, resulting in policy changes

      Edward Snowden, a former intelligence agent, made a controversial decision to reveal classified information about government surveillance programs, not for personal gain, but to bring attention to unlawful or immoral activities within the intelligence community. He believed that the programs, which were operating outside the law and without proper oversight, posed a threat to individual privacy and civil liberties. Snowden's actions led to a national debate on the balance between national security and individual privacy, and resulted in significant changes to US surveillance policies. Snowden's actions were not driven by a desire for attention or personal gain, but by a belief in the importance of upholding the law and protecting individual rights.

    • Shift from National Security to National Surveillance AgencyThe increase in government surveillance since the post-9/11 period is not in the nation's interest as it weakens adversaries' systems instead of protecting our own.

      The tension between the NSA's offensive role in hacking into communications and its role in protecting domestic communications has resulted in a significant increase in government surveillance since the post-9/11 period. This shift from a national security agency to a national surveillance agency is not in the nation's interest, as the United States has the most advanced technology companies and internet systems, making it more important to protect our own systems than to weaken those of our adversaries. The speaker also drew a comparison between 21st century United States and Cold War Soviet Union in terms of surveillance on our own citizens, noting that during the Cold War, there was a cultural rejection of intrusive surveillance due to the clear adversary and moral contrast. However, in the absence of a clear adversary after the Soviet Union's collapse, there has been a loss of competitive honesty and a shift towards more surveillance.

    • From Trench Coats to Mass SurveillanceSince the Cold War, technology has enabled new threats from groups like al Qaeda and ISIS, as well as advanced government surveillance. Snowden's NSA leak revealed cell phone monitoring capabilities and metadata collection from US citizens, sparking a debate on security vs privacy.

      The threat landscape has evolved significantly since the Cold War era, and technology has played a major role in this shift. While we no longer have to worry about people in trench coats following us, we now face new threats from organizations like al Qaeda and ISIS, as well as advanced surveillance capabilities used by governments. The NSA's mass surveillance program, revealed by Edward Snowden, raised public awareness about the extent of this surveillance and sparked a global debate. Snowden's leak revealed that the NSA can access various information from our cell phones, including turning them into microphones or monitoring our metadata. While content monitoring is reserved for individual targets, the wider concern is the collection of metadata from every US citizen. Snowden's revelations have left many questioning the world we live in today and the balance between security and privacy.

    • Metadata reveals extensive details about an individual's life and activitiesMetadata, often considered less important than content, can reveal significant personal information and is a powerful tool for surveillance

      Metadata, the information about communication rather than the content itself, is more valuable and intrusive than many realize in the context of mass surveillance. Despite initial assurances from politicians that only metadata is being collected, the truth is that metadata can reveal extensive details about an individual's life and activities. Metadata is used not only for targeted killings but also for constructing someone's pattern of life, providing a comprehensive record of an individual's movements, relationships, and habits. The ease of processing large amounts of metadata makes it a powerful tool for surveillance, and its privacy implications should not be underestimated. This is a complex issue with significant implications for online privacy and security, and the ongoing battle between those who seek to protect it and those who seek to access it is a crucial one. In the next part of our interview, we will dive deeper into the technical aspects of encryption and how it relates to this issue.

    • Collaborative access to secrets with multiple conditionsSecret sharing is a cryptographic method that allows multiple parties to access a shared secret, but only if certain conditions are met, such as a specific number of participants being present or specific locations or times.

      Secret sharing is a cryptographic method that allows multiple parties to collaboratively access a shared secret, while ensuring that a predefined number of them must participate before the secret is revealed. This concept is based on the idea of n-dimensional space, where n represents the number of parties involved. To understand this, imagine a three-dimensional space with dimensions of x, y, and z, like GPS coordinates. Secret sharing introduces additional dimensions, such as time or specific conditions, to ensure security. For instance, a secret may only be accessible if a certain number of participants meet at a specific location at a specific time. This method is particularly useful when dealing with sensitive information and ensuring that no single party can compromise the security of the shared secret.

    • Exploring Covert Communications for Secure Data TransmissionTheoretical advancements in secure data transmission like covert communications face practical challenges in implementation. Multi-factor authentication adds layers to security, but privacy and security in the digital age remain crucial.

      Ensuring security in our digital world involves more than just passwords. Multi-factor authentication, which includes SMS codes, one-time use PIN codes, and biometric identifiers, adds multiple dimensions to the way we protect information. However, translating theoretical advances from universities to practical applications takes a long time. A theoretical challenge is how to send a message that no one knows is a message at all, making it blend in with the background noise. This is known as covert communications. Approaches like mix nets, which wrap communications into a voluntary conspiracy of volunteers around the world, can make it harder for observers to correlate the origin and destination of communications. Theoretically, hiding messages in cosmic noise is a possibility, but it's not as simple as it seems. Ed Snowden, a government whistleblower, discussed these challenges during our interview, emphasizing the importance of privacy and security in the digital age.

    • Cosmic Microwave Background as a Source of Random Numbers for EncryptionThe cosmic microwave background's unpredictable shape could potentially serve as a source of truly random numbers for encryption, addressing the challenge of generating unpredictable and unguessable seeds for pseudo random number generators.

      The cosmic microwave background, which appears as noise to us, actually holds a distinct shape when viewed across a spectrum of frequencies. This property makes it an intriguing prospect for hiding signals in the universe. However, creating reliable and robust encryption relies on generating random numbers, which computers struggle to do since they are deterministic machines. Traditional methods involve using pseudo random number generators, which require a seed value. The challenge lies in ensuring the unpredictability and unguessability of the seed value. The cosmic microwave background, with its distinct shape and unpredictability, could potentially serve as a source of truly random numbers for encryption. This idea was proposed in an old paper, and while it's not directly related to the speaker's area of expertise, it highlights the potential of astronomical discoveries in solving complex computational problems. The universe, being above everyone's head, might just hold the key to generating unpredictable and unguessable random numbers for encryption.

    • The Universe as a Source of Random SignalsThe universe offers a vast and unique source of random signals, but effectively harnessing and indexing them for practical use remains a challenge due to their vastness and our current technology limitations.

      The universe can be seen as a source of random information, with phenomena like pulsars providing a finite but vast number of unique and observable signals that could potentially be used for random number generation or even as alternatives to GPS systems. However, the challenge lies in effectively harnessing and indexing these signals due to the vastness of the universe and the limitations of our current technology. Furthermore, the distinction between signal and noise in the context of the universe is subjective, with some signals being desirable and others being unwanted interference. Overall, the idea that the universe is constantly communicating with us through various signals holds a poetic and profound significance for understanding the universe and our place in it.

    • Distinguishing signal from noise in data collection and surveillanceBe intentional with data collection to avoid unintended consequences, protect individual privacy, and effectively address criminal activity.

      Just as astronomers must distinguish signal from noise in starlight data, societies must do the same with data collection and surveillance. The fundamental source of noise, or unintended consequences, can lead to mass surveillance and profiling, infringing on individual privacy and potentially creating more harm than good. This was illustrated in the discussion about the limitations of indiscriminate data collection and the importance of focusing on probable cause, rather than targeting individuals based on their religion, ethnicity, or other irrelevant factors. The NSA's mass surveillance programs, as well as those of other governments, were criticized for collecting data from millions of innocent people, diverting resources from traditional investigative methods, and creating a culture of suspicion. By narrowing our focus and being intentional with our data collection, we can avoid unintended consequences and protect individual privacy while effectively addressing criminal activity.

    • Targeted surveillance vs mass surveillanceTargeted surveillance is more effective, less intrusive, and respects privacy and civil liberties compared to mass surveillance which can lead to pre-criminal investigation and infringement on individual freedoms.

      Learning from this discussion with Ed Snowden is that targeted surveillance, focusing on individuals with evidence of wrongdoing, is more effective and less intrusive than mass surveillance. Mass surveillance, which collects communications of everyone indiscriminately, can lead to a paradigm shift towards pre-criminal investigation, infringing on privacy and civil liberties. Targeted surveillance, on the other hand, is similar to airport security checks, where intrusion is limited and focused on specific individuals or objects. Snowden's actions brought attention to the importance of balancing security with privacy and individual freedoms.

    Recent Episodes from StarTalk Radio

    Cosmic Queries – In a Zeptosecond

    Cosmic Queries – In a Zeptosecond

    Can nuclear fusion become the ultimate renewable energy source? Neil deGrasse Tyson and co-host Chuck Nice answer fan questions about transporters, the smallest unit of time, expansion, and other ideas that push the boundaries of our understanding of the universe.

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free.

    Thanks to our Patrons Day53, May Jo Williams, Tisha Bernal, Jeff Holcombe, Lorenzo & Elisabetta, C Hahn, Charles Maluf, Paul Levine, Crystal Barnes, and Peter Brush for supporting us this week.

    Subscribe to SiriusXM Podcasts+ on Apple Podcasts to listen to new episodes ad-free and a whole week early.

    Cosmic Queries – Back to School Edition

    Cosmic Queries – Back to School Edition

    What do you wish you had learned in school? On this episode, Neil deGrasse Tyson and comic co-host Chuck Nice go back to school to answer questions about simulation theory, time dilation, white holes, the sound of space, and more!

    NOTE: StarTalk+ Patrons can watch or listen to this entire episode commercial-free here: 
    https://startalkmedia.com/show/cosmic-queries-back-to-school-edition/

    Thanks to our Patrons Goat34, Mark Dent, Edwin J Roldan, Evan Moorhead, and Abby GIll for supporting us this week. 

    (Originally Aired Tuesday, October 4 2022)

    Searching for Habitable Worlds with David Kipping

    Searching for Habitable Worlds with David Kipping

    How do we uncover distant planets’ secrets? Neil deGrasse Tyson and comedian Chuck Nice explore the recent discoveries in exoplanet study, exo-moons, and finding the stars from our sun’s stellar nursery with astronomer and head of Cool Worlds Lab, David Kipping.

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here:
    https://startalkmedia.com/show/searching-for-habitable-worlds-with-david-kipping/

    Thanks to our Patrons Micheal Morey, Kristoff Vidalis, Adir Buskila, Yanir Stein, Randombot38, James Komiensky, Richard Clark, Daniel Helwig, Kayleigh Sell, and KENNY SMART for supporting us this week.

    Robots Searching for Life on Saturn’s Moon with Matt Travers

    Robots Searching for Life on Saturn’s Moon with Matt Travers

    Could we use robots to explore the oceans of Enceladus? Neil deGrasse Tyson and co-host Harrison Greenbaum dive deep into the EELS Project, sending a snake-like robot to Enceladus with Matthew Travers, a roboticist at the Biorobotics Lab at Carnegie Mellon University.

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here:
    https://startalkmedia.com/show/robots-searching-for-life-on-saturns-moon-with-matt-travers/

    Thanks to our Patrons Sam Gmail, Juraj Petrovic, Teresina Rojas, Nichole Buck, Don, Jeremy Berry, Antonio Johnson, Mike Feinberg, AGM-Prism✦, Micheal Brown, and Jason Lie for supporting us this week.

    Engineering Humans for Deep Space with Ronke Olabisi

    Engineering Humans for Deep Space with Ronke Olabisi

    What happens to the human body in deep space? Neil deGrasse Tyson, Chuck Nice and Gary O’Reilly explore tissue engineering, Wolverine & Deadpool’s healing style, and the science to help humans adapt to long-term space travel with biomedical engineer Ronke Olabisi.

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: 
    https://startalkmedia.com/show/engineering-humans-for-deep-space-with-ronke-olabisi/

    Thanks to our Patrons Micheal Morey, Kristoff Vidalis, Adir Buskila, Yanir Stein, Randombot38, James Komiensky, Richard Clark, Daniel Helwig, Kayleigh Sell, and KENNY SMART for supporting us this week.

    The Updated Physics of Black Holes with Steve Balbus & Andrew Mummery

    The Updated Physics of Black Holes with Steve Balbus & Andrew Mummery

    What’s happening just outside a black hole? Neil deGrasse Tyson and co-host Gary O’Reilly travel to Oxford University to explore the mysterious universe of black holes, their accretion disks, magnetic fields, and the impact they have on the world around them with astrophysicist Steve Balbus and theoretical physicist Andy Mummery.

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/the-updated-physics-of-black-holes-with-steve-balbus-andrew-mummery/

    Thanks to our Patrons James Parrish, Sunny Thao, Elizabeth Terveer, Dawson Brandon, Bhanu, William Silverman, John Hutchison, Carl J. Patrizio, MariElsa, Aminah, and Anna Szamosi for supporting us this week.

    Planetary Defense with Bill Nye

    Planetary Defense with Bill Nye

    What would we do if a life-destroying asteroid was coming our way? Bill Nye and comedian Chuck Nice answer questions about planetary defense, asteroids in space, and sci-fi technology.

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here:
    https://startalkmedia.com/show/planetary-defense-bill-nye/

    (Originally Aired May 23, 2017)

    Things You Thought You Knew – Planet X

    Things You Thought You Knew – Planet X

    What is the three body problem? How will the universe end? Neil deGrasse Tyson and comedian Chuck Nice break down the case of Planet X, why the three body problem is unsolvable, and prevailing theories on how the universe will come to an end. 

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free.

    Thanks to our Patrons Micheal Brown, Naburos, Teresa Fiorenza, Afshin Odabaee, Liz Freedman, Grace Sakoda, Dean Klunk, Alex Deters, Craig Maier, and Jack Cater for supporting us this week.

    Cosmic Queries – Strange Matter

    Cosmic Queries – Strange Matter

    What could we do to hide from the aliens? Neil deGrasse Tyson and comedian Chuck Nice answer fan questions about human radio wave signals, strange matter, universes inside black holes, and other physics questions!

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: 
    https://startalkmedia.com/show/cosmic-queries-strange-matter/

    Thanks to our Patrons Pepper Horton, Albert Vara, Shuky Mayer, William and Adwoa Steel, Timothé Payette, CESAR FRADIQUE, Tony Chantosa, Norwne Gonio, Tim Wescott, and Momo Gasuki for supporting us this week.

    Could We Someday Live Forever? With Ray Kurzweil

    Could We Someday Live Forever? With Ray Kurzweil

    Would you want to live forever? On this episode, Neil deGrasse Tyson and author, inventor, and futurist Ray Kurzweil discuss immortality, longevity escape velocity, the singularity, and the future of technology. What will life be like in 10 years? 

    NOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: 
    https://startalkmedia.com/show/could-we-someday-live-forever-with-ray-kurzweil/

    Thanks to our Patrons Johan Svensson, Galen J., Kellen Bolander, Sunshine, and Brian White for supporting us this week.

    (Originally Aired Tuesday, November 29 2022)

    Related Episodes

    Encryption: What's the Problem?

    Encryption: What's the Problem?

    End-to-end encryption secures messages before they leave a device, preventing them from being read in transit. Increasingly the default protocol for messaging apps, neither governments nor the platforms on which it operates can access unscrambled communications and message content. Some governments have demanded ‘back doors’ for criminal investigations, while others have exploited workarounds to access the encrypted messages of political dissidents.

    This talk considers the current public discourse on online surveillance and privacy, and where society might go from here.


    A lecture by Victoria Baines recorded on 14 February 2023 at Barnard's Inn Hall, London.

    The transcript and downloadable versions of the lecture are available from the Gresham College website: https://www.gresham.ac.uk/watch-now/problem-encryption

    Gresham College has offered free public lectures for over 400 years, thanks to the generosity of our supporters. There are currently over 2,500 lectures free to access. We believe that everyone should have the opportunity to learn from some of the greatest minds. To support Gresham's mission, please consider making a donation: https://gresham.ac.uk/support/

    Website:  https://gresham.ac.uk
    Twitter:  https://twitter.com/greshamcollege
    Facebook: https://facebook.com/greshamcollege
    Instagram: https://instagram.com/greshamcollege

    Support the show

    #132 – George Hotz: Hacking the Simulation & Learning to Drive with Neural Nets

    #132 – George Hotz: Hacking the Simulation & Learning to Drive with Neural Nets
    George Hotz (geohot) is a programmer, hacker, and the founder of Comma.ai. Please support this podcast by checking out our sponsors: - Four Sigmatic: https://foursigmatic.com/lex and use code LexPod to get up to 40% & free shipping - Decoding Digital: https://appdirect.com/decoding-digital - ExpressVPN: https://expressvpn.com/lexpod and use code LexPod to get 3 months free EPISODE LINKS: Comma.ai's Twitter: https://twitter.com/comma_ai Comma.ai's Website: https://comma.ai/ George's Instagram: https://www.instagram.com/georgehotz George's Twitch: https://www.twitch.tv/georgehotz George's Twitter: https://twitter.com/realgeorgehotz Comma.ai YouTube (unofficial): https://www.youtube.com/channel/UCwgKmJM4ZJQRJ-U5NjvR2dg PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/LexFridmanPage - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. 00:00 - Introduction 07:02 - Will human civilization destroy itself? 09:49 - Where are the aliens? 14:36 - Tic Tac UFO and Bob Lazar 17:04 - Conspiracy theories 19:07 - The programming language of life 23:28 - The games that humans play 31:58 - Memory leaks in the simulation 34:29 - Theories of everything 36:14 - Ethereum startup story 44:02 - Cryptocurrency 53:28 - Self-help advice 57:08 - Comma.ai 59:02 - Comma two 1:07:50 - Tesla vs Comma.ai 1:16:53 - Driver monitoring 1:30:34 - Communicating uncertainty 1:32:22 - Tesla Dojo 1:38:50 - Tesla Autopilot big rewrite 1:45:09 - How to install the Comma Two 1:49:44 - Openpilot is Android & Autopilot is iOS 1:58:59 - Waymo 2:10:12 - Autonomous driving and society 2:12:24 - Moving 2:15:29 - Advice to Startups 2:28:32 - Programming setup 2:31:32 - Ideas that changed my life 2:39:37 - GPT-3 2:42:57 - AGI 2:47:00 - Programming languages that everyone should learn 2:53:33 - How to learn anything 2:56:05 - Book recommendations 3:04:28 - Love 3:06:17 - Psychedelics 3:08:38 - Crazy