Good morning everyone. Its great to see you on this Cold Saturday morning. Im going to be moderating a great hour i had a discussion on news threats in the modern age with three amazing authors who contributed to a dialogue weve been having since the beginning of mankind. Heres house today is going to start. Im going to introduce the three authors and let them speak a few minutes and the opportunity to tell what the book is about and then i will do a moderated discussion so we can pull out some major themes and open up to questions and answers. The books will be on sale at the end of this entity will be available for signature discussion. I want to start with my good friend who spent a career in counterterrorism and speaking of threats that this nation and this world faces. Shes now a lecturer at the university and fellow at the Harvard School of Public Health and one of time magazines innovative planners. She is the author most recently of the state of terror and that is a book she will be talking about today. Bruce is a security technologist at the cto system and the best times seller is data and goliath battles to collect your data and control your world and hes also a feller at the center of the law school which many of you probably know about the center and its working technology innovation. And then gabriella is the professor of human rights and humanitarian law where she focuses on international law, negotiation and the Armed Conflict and shes also the faculty director of the program on the national law. The new book the exact title i know because i read it, the future of violence robots, hackers and drones is a recent contribution to this notion of asymmetric threats. These new things that are coming but are not armies that are as briski sometimes as foreign armies. So if you could talk about your book and researching things we talk about a lot today. Sure. Thank you so much. I think i will just tell you what is new about this organization. First of all, it holds territory. Its very good at e. Brand brand. It raises money through oil sales and all your production is much more resilient than anybody dissipated. The also task the refugee flow so this is a perpetual resource for them. They create refugees and then they protect the flows. They are very good at attracting both locals taking advantage of the disenfranchisement of the sunni arabs into soap unprecedentedly good at attracting foreign fighters about 40,000 volunteers coming in not just fighters but also seeking doctors, engineers, people like ruth, they are capitalizing on a frustration with modernity very well. We see converts flowing and, people that are looking for a pure simple life. I will stop there. I think that is two minutes. Thank you very much. I want to turn to you about your new book and the threats that you examined. My book is called data and goliath. [laughter] people that pronounce it data dont get the book. Its about the data that is produced by the computers we interact with, but computers, atm machines and the like and it makes the book fundamentally about surveillance. Its how the data is generated and talking about the government surveillance both Good Governance and bad for bad use the data for the purposes which means the book is about control, its about persuasion on the advertising side and social control and i talk about why this is important and why in society we need to think about the privacy with respect to the data and im trying to talk about the fundamental issue of the Information Age which is how do we extract the data while using individual privacy. So this works because everybody used as a way of surveillance and control the traffic patterns because of that. So an enormous group of benefits come everyone is using it under surveillance. How do we balance this whether it is Law Enforcement or traffic or any other application and im trying to explore those issues in the book. So you walk into a shower and find a spider and it can be real or not were harmless, or it can be Surveillance Drones sent by your nextdoor neighbor that likes danny devito noisy dogs and is looking at pictures at the sports bar from the tv screens to the neighborhood. Or it could be a possibility that its a lethal spider drones sent by a military contractor whos now on vacation but uses a computer chip on that little trial and to order to shoot an infinite needle into your left by and then orders it back through a crack in the window and orders it to selfdestruct and neither are ever found. If you think that this is scifi, you and i can Purchase Online from private vendors a aa battery drone that comes with surveillance from canada and makes it legal until the next step. As of this is a if this is a page of the robotics generally are opening up as opportunities for harm. We all know about cyber. Biotechnology is two steps ahead of us but again now you and i produce genetic sequences and what used to be complicated designs of the most expert professors becoming routine for the graduate students among us. What is in the technologies is that they are becoming more accessible, cheaper, easy to handle command they distribute power. And they allow but just direct attacks but removed as well so they create what we call into world of too many friends where every individual group, corporation or states now poses a threat to any individual group, corporation or state anywhere around the world and the question for us in the book is how do we govern the world on the domestic level and on the international level. Is a wonderful summary and then hope for a dialogue among the authors. I do want to get into what can we do and what can people sitting here do. But i want to talk about the notion of asymmetrical threat. Your book david and goliath we have a notion if you think about the revolutionary war rebellion, freedom fighters, whatever you want to call them but theyve always faced asymmetrical threat and there are challenges in what ways is the modern age difference and in what ways is it similar to challenges that we faced in the past given that it seems Like Technology is going faster than anyone can respond to at any given time. It is a democratization of tactics and weaponry. When we walk outside and see a tank we would know a military was involved because they can afford tanks and that is a shorthand we have been using to figure out who is attacking us. In cyberspace with the urging technologies and also isis is a good example. Tactics are democratized from the nations and corporations and individuals. So todays top programs become the next state totals state tools and best of all flows downhill. Remember last november when sony was attacked there was a debate among experts whether the attack was perpetrated by north korea, governor of the 20 billion budget. That is extraordinary that we cant tell the difference and i think this speaks to isis as an organization that is a non nation state actor but its acting kind of nation state in ways we dont like because we have rules about nation states that have been sent to work. And theres catastrophic works. You think of as only the purview of the government democratizing everyone and i think we are trying to deal with how do we maintain security in this world of democratized threats. Whats also interesting is that we have even before 9 11 where we talk about the National Security threats and personals security threats for the business of the military in the establishment of what is the business of the police department. But part of the democratization does is that it lowers those lines. So we saw several near collision incident of people flying near airports and this is what passage with passage or airliners with someone when they need road in the u. S. Open to a stadium. Those were not even malicious intent operations but it does tell you what is possible out there so its not just the nationstate its what are the motivations and why do people do these things blurring the lines of how we think about regulating the National Security technology that we use. And some of this is good. We want this democratization of power and we want the state to have less power. The individuals have less power so theres a good advance. What i would say its icy very much related beauty. Moms are absolutely in many ways they are more important than the Law Enforcement. Ive been doing work in the refugee community. They are not trapped into isis and the moms cant find out what theyre doing because they are doing because they dont speak in glitch and they dont speak internet which is a big problem. So they need to go against. And i will end on that but one thing where that threat differs, what you all described as threats that they might be bad and a few things happen here and there. That land is what matters to the enemy and its where her work with isis really does differ in some sense to the traditional notion of the Foreign Affairs for the National Security for the new capabilities and new technology but thats only consistent with and complementary to the massive amount of land they govern in parts of the world. So, first of all described how those two pieces of isis work and then challenge me on that notion that im in the 20th century world. It is both a strength and vulnerability because it means that it is then possible to attack them in a way that wouldnt be possible if they didnt have a location. The reason land is so important in this group is to say a proto state, extraordinarily successful successful outcome of at, all activity in fact it was founded and who found religion. Its important to them because its what they call taxation and just protection. Yes. So, that is one of the things that make this group different. It is both its strength and vulnerability. I think that its important on either step and there is a sense of domination and control that gives you a special seat at the table in the International Community that for most types of threats that we talk about, you dont need territory. It doesnt matter where you are physically to attack somebody onsite or you can be anywhere around the world. It really doesnt matter. To start a bio weapon or release some harmful virus it doesnt matter where you are physically. And the drones as we know it allow you to Remote Attack where it doesnt really matter where you are physically so i think that if anything that in the emerging technologies diminish the importance of territory, and on the split site i think that is absolutely right territory is now also a vulnerability. But if it happens in its own territory and has no jurisdiction elsewhere if you have a cyber attack emanating from somewhere else come in just behind the force that doesnt have jurisdiction. They relied on these private companies that hes talking about. Who deals with the bp oil spill . Is that the government lacks bp is the only one that has the expertise and resources capacities to clean water. The government provides the support perimeter support but the government has become a much weaker in terms of its reliance. When a company has attacked the company does the cleanup. Sony was attacked by north korea and wasnt offended by the u. S. Government. I like this notion of land being both an asset and a liability. And it is. And depending on who you are coming you are going to choose to be landed were not. But if you are isis were trying to become a state and get into the un into this government Government Club so that land is an asset. If you were a criminal group and a hacker, land is a liability and now we know where you are. You see a lot of tactics but dont need that land. And this changes with history as where the power is centered its really only only 1400 intel now. Land around it was largely relevant you could be seen for years and the land it didnt matter and it wasnt those isolated pockets of where you were. Now i think that nationstates are stating more. And the notion of land as the power while still important to the United States as an example its getting more diffuse. Imagine a big Climate Change negotiations. Who do you think has more power, exxon or bolivia . Its not even close. A dont give cover in this particular and we are seeing more security related spheres that have that characteristic. A common theme and i dont know if you like it all three of you mentioned the challenge between security and privacy dealing with the populations and then being online and access to data. All three of you suggest we shouldnt view it that way. It isnt verses, it is come it is and come and it seems to me in reading that i cant help the audience how can you conceive of it. How can you monitor the muslim populations to make sure that violent extremism isnt going on and how can people think in the future given the kind of threats we are facing the privacy will be a factor in any of the stuff. In the liberty are generally its a balancing act if you give a little bit of something in exchange for the other and theres kind of a zerosum game in between the two can and we think it is more accurate to think about in the abuses when we take the term from biology where these values sometimes conflict but sometimes reinforce and they actually always depend on one another so security is largely meaningless but its also true that you cant have liberty without security so we tend to have these debates about surveillance for instance where we all do to disagree also disagree on the governments surveillance as an evil where its Privacy Security but reading about Airport Security because college surveillance because we dont like the word that of course its surveillance and the reason we submit ourselves and go through Airport Security procedures because we think it enhances both our security and liberty to file. We wouldnt be otherwise. But when we have government regulations that protect the medical records, we dont train liberty for privacy, we tend to think that this is kind of a regulation enhancing both. It enhances both the security and privacy. So in this complex world where there are so many actors out there is a big brother because so many little but theres so many little and mediumsized printers out there, it would be wrong to think about it as an always trade one for the other. A lot of the time youre trying to maximize both. I also use the term liberty. There is liberty versus control and security versus privacy comes from the belief i think false that surveillance enhances security. We surveyed the most important patients because it counters. It actually doesnt. What we know about it is that it is very invasive on the populations. They feel less secure, less safe, more hostile towards the surveillance. Theres there is actually a documentary on the community in chicago. Its a really beautiful commentary on what it does to the fabric of the community. It doesnt make them more secure. So it comes from this false belief that if you have less privacy coming you get more security. But we do not opine for the chinese local surveillance or for east germany. We dont wish that we lived in iraq. We like the fact that we have privacy and that gives us security. We are not secure when we are observed. And theres a really interesting ontology relationship. If you like surveillance predators. Now of course they are examples of old times when you have to give up something, some liberty. Airport Airport Security is a great example of that. Lots of others. We want the fbi to investigate crimes. So how do we make that tradeoff . We have some mechanisms and its really pretty simple. Transparency over accountability. Those mechanisms are in place we feel secure giving the abilities to invade the privacy because we know and we can verify that they are not going to do that capriciously or in selfserving ways. Think about how this might work in a country like china where you dont have those checks which is why on nsa surveillance which doesnt have transparency not counting so doesnt have oversight, doesnt have accountability. And this is surveillance that is making us less secure rather than more secure as opposed to something the police might be which would be much more transparent along on that answer. So i guess i would like to give a counter example. The president announced in february of this year that there were three pilot cities where there was the end counter in a Violent Extremism Program and one of them is boston. Another is los angeles and others were minneapolis. And there is a lot of concern about Civil Liberties when the government starts trying to work with individuals in a community that may be right for recruitment. By the way there are many converts as i said earlier. But i think how i would feel if i were worried about my child. Whats happening again, the moms want help. They know they cant do without the government and the government cant do it without the moms. So, theres an example where on the one hand, there is a Civil Liberties concerns of the people who are most affected often are not as concerned as those that are thinking about intellectually. Jessica brings up a good point in her book but i want you to bring up. The challenge for government especially in terms of isis there is a legitimate intelligence interest allowing extremists to use social media to appoint that there is a dance in some ways going on you dont have to think about any sort of traditional Law Enforcement aspect. Can you describe a little bit . Is that government able to sort of monitor but then be able to tell okay we are past the point of this being advance and now this person is radicalized and about to jump on a plane . The group is unprecedentedly good at using social media and theyve been using especially twitter, youtube and facebook took done isis recruitment sites more quickly than the twitter but they move onto encrypted sites sometimes spanning up to 100 hours trying to recruit one individual. How do you the tradeoff is if you take it all down like the United Kingdom is trying to do how do you continue to be aware of whats going on when you take down the litter twitter when another one pops up and with my colleague mike walter foun