Browse content similar to Fear and Coding in Las Vegas. Check below for episodes and series from the same categories and more!
Line | From | To | |
---|---|---|---|
Sima Kotecha, BBC News, Birmingham. | 0:00:01 | 0:00:02 | |
Coming up shortly will be the Film Review, but first here's | 0:00:02 | 0:00:05 | |
Click. | 0:00:05 | 0:00:18 | |
Vegas, home to casinos. | 0:00:34 | 0:00:35 | |
Elvis, sort of. | 0:00:35 | 0:00:38 | |
Superfast knot-tying. | 0:00:38 | 0:00:39 | |
Wide open spaces. | 0:00:39 | 0:00:40 | |
Limos. | 0:00:40 | 0:00:41 | |
The Strip. | 0:00:41 | 0:00:53 | |
And this week, the largest hack-fest on the planet. | 0:00:53 | 0:00:56 | |
If there's one week of stuff in Vegas that isn't staying | 0:00:56 | 0:00:59 | |
in Vegas, it's this week's BSides, Black Hat and notorious | 0:00:59 | 0:01:01 | |
DEF CON gatherings. | 0:01:01 | 0:01:02 | |
This is the week where hackers rub up against law enforcers | 0:01:02 | 0:01:05 | |
and everyone peeks over each other's shoulders and networks. | 0:01:05 | 0:01:14 | |
So, let's get straight into the action. | 0:01:14 | 0:01:16 | |
And for our first act of the show. | 0:01:16 | 0:01:18 | |
Daniel here has got an extra piece of software running allowing him | 0:01:18 | 0:01:21 | |
to hear what's being typed on the other end of a Skype call. | 0:01:21 | 0:01:28 | |
So how does it work? The software during a Skype call learns | 0:01:28 | 0:01:31 | |
how your keyboard sounds like and if you later | 0:01:31 | 0:01:33 | |
during the call type something sensitive, | 0:01:33 | 0:01:35 | |
like a password or e-mail, we can understand what you've typed | 0:01:35 | 0:01:38 | |
using machine learning algorithms. | 0:01:38 | 0:01:42 | |
This is because each key has a unique fingerprint based | 0:01:42 | 0:01:45 | |
on the position of the key on the keyboard. | 0:01:45 | 0:01:57 | |
The suggested results from what our victim might be typing | 0:01:57 | 0:02:00 | |
are listed on the screen. | 0:02:00 | 0:02:01 | |
As you can see, it's spotted every word except one but when asked | 0:02:01 | 0:02:04 | |
to choose the words to make the most likely sentence, it's | 0:02:04 | 0:02:07 | |
not so on the money. | 0:02:07 | 0:02:09 | |
So, this is Scott Helme. | 0:02:09 | 0:02:10 | |
He is not just our victim, he's also a security researcher | 0:02:10 | 0:02:13 | |
who is here to keep Click on track with a hacker's view | 0:02:13 | 0:02:16 | |
of the conferences for the next couple of episodes. | 0:02:16 | 0:02:19 | |
Hello, Scott. | 0:02:19 | 0:02:19 | |
Hello. | 0:02:19 | 0:02:20 | |
What do you think? | 0:02:20 | 0:02:21 | |
So, the technology is still quite young. | 0:02:21 | 0:02:23 | |
It took a bit of setup to make this work but technology advances quite | 0:02:23 | 0:02:26 | |
quickly and things that are difficult today will | 0:02:26 | 0:02:29 | |
probably be easy tomorrow. | 0:02:29 | 0:02:30 | |
We have seen some things like this before as well. | 0:02:30 | 0:02:41 | |
I looked at a hack recently where they could measure | 0:02:41 | 0:02:44 | |
the vibrations in a crisp packet to record my voice. | 0:02:44 | 0:02:46 | |
So I think in the future, things and technologies like this | 0:02:46 | 0:02:49 | |
could be quite bad because it's going to allow people | 0:02:49 | 0:02:52 | |
to extract a lot more information from our devices. | 0:02:52 | 0:02:55 | |
Wow, sobering thoughts. | 0:02:55 | 0:02:55 | |
It seems like the hackers are always going to find new and interesting | 0:02:55 | 0:02:59 | |
ways to get inside our computers. | 0:02:59 | 0:03:06 | |
It was me and two other friends, just a bit of fun. | 0:03:06 | 0:03:09 | |
I manipulate people's feelings, thoughts. | 0:03:09 | 0:03:10 | |
I started getting bullied. | 0:03:10 | 0:03:11 | |
We tried to break into our school's network. | 0:03:11 | 0:03:14 | |
We could control people's screens, change passwords. | 0:03:14 | 0:03:16 | |
I got arrested for Misuse of Computer Act, 1990, section three. | 0:03:16 | 0:03:35 | |
I can't name the company but they lost a lot of money. | 0:03:35 | 0:03:38 | |
This is definitely a way to get ahead of the curve and to stop | 0:03:38 | 0:03:42 | |
anyone from possibly taking a misinformed choice | 0:03:42 | 0:03:44 | |
as to the direction of their life. | 0:03:44 | 0:03:46 | |
This is the UK's first reboot camp for hackers. | 0:03:46 | 0:03:49 | |
The first seven through the doors, aged 16-20, all intend | 0:03:49 | 0:03:51 | |
to change their ways, so we've agreed to keep | 0:03:52 | 0:03:54 | |
their identities secret. | 0:03:54 | 0:04:07 | |
Rehab includes spotting moments when they might be tempted to cross | 0:04:07 | 0:04:10 | |
the line of what's legal and what's not. | 0:04:10 | 0:04:12 | |
That looks like I could get everyone's details. | 0:04:12 | 0:04:14 | |
Your parents will not have any idea how you do what you do. | 0:04:14 | 0:04:18 | |
It will be like magic. | 0:04:18 | 0:04:19 | |
Solomon Gilbert was caught as a teenage offender. | 0:04:19 | 0:04:22 | |
Now he's the one giving the lecture is, in between tackling | 0:04:22 | 0:04:25 | |
cybercrime himself. | 0:04:25 | 0:04:25 | |
I was 17 years old. | 0:04:25 | 0:04:26 | |
I was getting drawn into making my own malicious code, | 0:04:27 | 0:04:29 | |
making my own exploits, stealing things like credit card | 0:04:29 | 0:04:32 | |
information, database information. | 0:04:32 | 0:04:38 | |
I wouldn't do anything with them, but it ended up with me getting | 0:04:38 | 0:04:41 | |
kicked out of school and arrested and looked into by the | 0:04:41 | 0:04:44 | |
counterterrorism intelligence unit. | 0:04:44 | 0:04:47 | |
What were the key moments that changed your path? | 0:04:47 | 0:04:49 | |
Everyone in the cyber security industry has one person that | 0:04:50 | 0:04:52 | |
they've met that's gone, well, you're very talented at this, | 0:04:52 | 0:04:55 | |
let's move you to do it as a job. | 0:04:55 | 0:05:01 | |
Cyber Security Challenge UK has set up a capture the flag competition | 0:05:01 | 0:05:04 | |
so that teenagers can show off their skills. | 0:05:04 | 0:05:12 | |
Several large companies are here to talk future job opportunities. | 0:05:12 | 0:05:15 | |
UK hasn't got enough people to protect itself. | 0:05:15 | 0:05:21 | |
Businesses, the nation, individual accounts, | 0:05:21 | 0:05:22 | |
we all need protecting and that's why we exist. | 0:05:22 | 0:05:25 | |
We need to find these people. | 0:05:25 | 0:05:26 | |
They're there. | 0:05:26 | 0:05:27 | |
We know they're there, we need to find them. | 0:05:27 | 0:05:30 | |
These offenders know this is a second chance, | 0:05:30 | 0:05:32 | |
one they didn't realise they were so well qualified for. | 0:05:32 | 0:05:36 | |
I was more interested in the dark side, back when I was young. | 0:05:36 | 0:05:39 | |
I wasn't really looking at the good side. | 0:05:39 | 0:05:45 | |
The dark side was mainly just attacks, attacks, attacks, | 0:05:45 | 0:05:47 | |
not thinking about defending. | 0:05:47 | 0:05:48 | |
Well, now I know that it exists, it sounds like something that I'd | 0:05:48 | 0:05:52 | |
really, really like to go into because you get the same, like, | 0:05:52 | 0:05:55 | |
rush, the same excitement, but you're doing it for fun, | 0:05:55 | 0:05:58 | |
still, but it's legal and you get paid. | 0:05:58 | 0:06:00 | |
It's like every kind of benefit. | 0:06:00 | 0:06:06 | |
Humans have been using handprints to identify themselves | 0:06:21 | 0:06:23 | |
for a very long time. | 0:06:23 | 0:06:25 | |
These ones here, the Hands Across Time just outside Las Vegas, | 0:06:25 | 0:06:28 | |
in Red Rock, are hundreds of years old. | 0:06:28 | 0:06:30 | |
They're some of the earliest examples of native Americans | 0:06:30 | 0:06:32 | |
showing their identity. | 0:06:32 | 0:06:33 | |
Kind of like a signature. | 0:06:33 | 0:06:35 | |
In recent years we've started to use our hands to identify us | 0:06:35 | 0:06:39 | |
again, and Dan's been finding out how secure they might be. | 0:06:39 | 0:06:46 | |
At Bristol Robotics Lab, they're taking an interest in every detail. | 0:06:46 | 0:06:53 | |
Now, if you're sensitive to flashing lights, look away now. | 0:06:53 | 0:07:04 | |
Is that more secure, then, than just using your fingerprint? | 0:07:04 | 0:07:06 | |
Certainly. | 0:07:07 | 0:07:07 | |
With a fingerprint, it's a small region of the hand. | 0:07:07 | 0:07:10 | |
Obviously with this system we're getting the whole surface and that, | 0:07:10 | 0:07:13 | |
combined with the vein structure, just add an extra layer of security. | 0:07:13 | 0:07:16 | |
Do you think this could be spoofed? | 0:07:16 | 0:07:32 | |
I think it's unlikely. | 0:07:32 | 0:07:33 | |
Research recently showed the ability to extract fingerprints | 0:07:33 | 0:07:35 | |
or handprints off celebrities from a distance. | 0:07:35 | 0:07:37 | |
From photos? | 0:07:37 | 0:07:37 | |
From photos. | 0:07:37 | 0:07:38 | |
So, you could use that to generate a 3-D surface but you still wouldn't | 0:07:38 | 0:07:42 | |
have the vein structure on the back of the hand. | 0:07:42 | 0:07:45 | |
That would be very difficult to hack. | 0:07:45 | 0:07:46 | |
In Chicago, some people are already using their palm | 0:07:46 | 0:07:49 | |
and to pay for things. | 0:07:49 | 0:07:59 | |
It's being called Naked Payment. | 0:07:59 | 0:08:00 | |
No cards, cash or phones. | 0:08:01 | 0:08:04 | |
From September, TSB will be the first bank in Europe to adopt | 0:08:04 | 0:08:08 | |
retina scan technology as a way of accessing online bank accounts, | 0:08:08 | 0:08:10 | |
although initially customers will need a Samsung Galaxy S8 | 0:08:11 | 0:08:18 | |
handset to use the technology. | 0:08:18 | 0:08:19 | |
But is it secure? | 0:08:19 | 0:08:20 | |
In May, the Chaos Computer Club in Germany posted this video, | 0:08:20 | 0:08:23 | |
fooling the S8's iris scanner using a photograph | 0:08:23 | 0:08:25 | |
and a contact lens. | 0:08:25 | 0:08:26 | |
TSB and Samsung are hoping that others won't go | 0:08:26 | 0:08:29 | |
to that sort of trouble. | 0:08:29 | 0:08:34 | |
At the CyLab Biometrics Center in Pittsburgh, they've developed | 0:08:34 | 0:08:36 | |
a system that can identify the irises of people moving in | 0:08:36 | 0:08:39 | |
a crowd from up to 12 metres away. | 0:08:39 | 0:08:52 | |
But if the eyes don't have it, the face just might. | 0:08:52 | 0:08:55 | |
Back at Bristol Robotics Lab, this 3-D face scanner | 0:08:55 | 0:08:57 | |
is using a technique they've developed called Photometric stereo. | 0:08:57 | 0:09:05 | |
Two invisible lights flash at high speed, | 0:09:05 | 0:09:07 | |
allowing the camera to capture the orientation, shape | 0:09:07 | 0:09:09 | |
and texture of what it sees. | 0:09:09 | 0:09:17 | |
So far, it has a 95% accuracy rate but that's good enough to attract | 0:09:17 | 0:09:21 | |
some major investment. | 0:09:21 | 0:09:26 | |
They are working with Cubic, which develops the Oyster card, | 0:09:26 | 0:09:28 | |
contactless payment system used in London's trains and buses. | 0:09:28 | 0:09:31 | |
It's being part funded by the British government | 0:09:31 | 0:09:33 | |
to innovate gateless technologies, allowing passengers to simply walk | 0:09:33 | 0:09:35 | |
into a station and onto a train. | 0:09:36 | 0:09:38 | |
You can imagine, if you can get rid of the gate line in a place | 0:09:38 | 0:09:42 | |
like Victoria Station, there's a massive potential | 0:09:42 | 0:09:44 | |
for increasing throughput. | 0:09:44 | 0:09:45 | |
So we ran quite an interesting project for them, which they are now | 0:09:45 | 0:09:49 | |
installing at their laboratory in Salford and the aim is to move it | 0:09:49 | 0:09:52 | |
on to the Underground so that the system will recognise | 0:09:52 | 0:09:55 | |
people and you get rid of the gates and it will allow people to go | 0:09:55 | 0:09:59 | |
through without any impediments. | 0:09:59 | 0:10:06 | |
Now, this is a is a prototype but we have been told | 0:10:06 | 0:10:09 | |
that the system will recognise even a pair of glasses. | 0:10:09 | 0:10:12 | |
So, let's see if it knows who I am now. | 0:10:12 | 0:10:18 | |
Look at that, you can see my name come up right there. | 0:10:18 | 0:10:22 | |
It could make your life so easy. | 0:10:22 | 0:10:24 | |
Just walk around, the face is the key to doing everything | 0:10:24 | 0:10:26 | |
you want to do in the modern world. | 0:10:26 | 0:10:34 | |
And just to double-check, I've tried to fool it with this guy. | 0:10:34 | 0:10:37 | |
Oh, look at that. | 0:10:37 | 0:10:41 | |
It recognises me, but this is very clearly an impostor. | 0:10:41 | 0:10:43 | |
This face clearly isn't going to get me anywhere. | 0:10:43 | 0:10:55 | |
Dan Simmons, being shredded. Sorry, Dan. | 0:11:00 | 0:11:06 | |
So, that's it for another week. | 0:11:06 | 0:11:12 | |
Of course we'll be back with more next week from Vegas, | 0:11:12 | 0:11:15 |