Fear and Coding in Las Vegas Click - Short Edition


Fear and Coding in Las Vegas

Similar Content

Browse content similar to Fear and Coding in Las Vegas. Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

Sima Kotecha, BBC News, Birmingham.

0:00:010:00:02

Coming up shortly will be the Film Review, but first here's

0:00:020:00:05

Click.

0:00:050:00:18

Vegas, home to casinos.

0:00:340:00:35

Elvis, sort of.

0:00:350:00:38

Superfast knot-tying.

0:00:380:00:39

Wide open spaces.

0:00:390:00:40

Limos.

0:00:400:00:41

The Strip.

0:00:410:00:53

And this week, the largest hack-fest on the planet.

0:00:530:00:56

If there's one week of stuff in Vegas that isn't staying

0:00:560:00:59

in Vegas, it's this week's BSides, Black Hat and notorious

0:00:590:01:01

DEF CON gatherings.

0:01:010:01:02

This is the week where hackers rub up against law enforcers

0:01:020:01:05

and everyone peeks over each other's shoulders and networks.

0:01:050:01:14

So, let's get straight into the action.

0:01:140:01:16

And for our first act of the show.

0:01:160:01:18

Daniel here has got an extra piece of software running allowing him

0:01:180:01:21

to hear what's being typed on the other end of a Skype call.

0:01:210:01:28

So how does it work? The software during a Skype call learns

0:01:280:01:31

how your keyboard sounds like and if you later

0:01:310:01:33

during the call type something sensitive,

0:01:330:01:35

like a password or e-mail, we can understand what you've typed

0:01:350:01:38

using machine learning algorithms.

0:01:380:01:42

This is because each key has a unique fingerprint based

0:01:420:01:45

on the position of the key on the keyboard.

0:01:450:01:57

The suggested results from what our victim might be typing

0:01:570:02:00

are listed on the screen.

0:02:000:02:01

As you can see, it's spotted every word except one but when asked

0:02:010:02:04

to choose the words to make the most likely sentence, it's

0:02:040:02:07

not so on the money.

0:02:070:02:09

So, this is Scott Helme.

0:02:090:02:10

He is not just our victim, he's also a security researcher

0:02:100:02:13

who is here to keep Click on track with a hacker's view

0:02:130:02:16

of the conferences for the next couple of episodes.

0:02:160:02:19

Hello, Scott.

0:02:190:02:19

Hello.

0:02:190:02:20

What do you think?

0:02:200:02:21

So, the technology is still quite young.

0:02:210:02:23

It took a bit of setup to make this work but technology advances quite

0:02:230:02:26

quickly and things that are difficult today will

0:02:260:02:29

probably be easy tomorrow.

0:02:290:02:30

We have seen some things like this before as well.

0:02:300:02:41

I looked at a hack recently where they could measure

0:02:410:02:44

the vibrations in a crisp packet to record my voice.

0:02:440:02:46

So I think in the future, things and technologies like this

0:02:460:02:49

could be quite bad because it's going to allow people

0:02:490:02:52

to extract a lot more information from our devices.

0:02:520:02:55

Wow, sobering thoughts.

0:02:550:02:55

It seems like the hackers are always going to find new and interesting

0:02:550:02:59

ways to get inside our computers.

0:02:590:03:06

It was me and two other friends, just a bit of fun.

0:03:060:03:09

I manipulate people's feelings, thoughts.

0:03:090:03:10

I started getting bullied.

0:03:100:03:11

We tried to break into our school's network.

0:03:110:03:14

We could control people's screens, change passwords.

0:03:140:03:16

I got arrested for Misuse of Computer Act, 1990, section three.

0:03:160:03:35

I can't name the company but they lost a lot of money.

0:03:350:03:38

This is definitely a way to get ahead of the curve and to stop

0:03:380:03:42

anyone from possibly taking a misinformed choice

0:03:420:03:44

as to the direction of their life.

0:03:440:03:46

This is the UK's first reboot camp for hackers.

0:03:460:03:49

The first seven through the doors, aged 16-20, all intend

0:03:490:03:51

to change their ways, so we've agreed to keep

0:03:520:03:54

their identities secret.

0:03:540:04:07

Rehab includes spotting moments when they might be tempted to cross

0:04:070:04:10

the line of what's legal and what's not.

0:04:100:04:12

That looks like I could get everyone's details.

0:04:120:04:14

Your parents will not have any idea how you do what you do.

0:04:140:04:18

It will be like magic.

0:04:180:04:19

Solomon Gilbert was caught as a teenage offender.

0:04:190:04:22

Now he's the one giving the lecture is, in between tackling

0:04:220:04:25

cybercrime himself.

0:04:250:04:25

I was 17 years old.

0:04:250:04:26

I was getting drawn into making my own malicious code,

0:04:270:04:29

making my own exploits, stealing things like credit card

0:04:290:04:32

information, database information.

0:04:320:04:38

I wouldn't do anything with them, but it ended up with me getting

0:04:380:04:41

kicked out of school and arrested and looked into by the

0:04:410:04:44

counterterrorism intelligence unit.

0:04:440:04:47

What were the key moments that changed your path?

0:04:470:04:49

Everyone in the cyber security industry has one person that

0:04:500:04:52

they've met that's gone, well, you're very talented at this,

0:04:520:04:55

let's move you to do it as a job.

0:04:550:05:01

Cyber Security Challenge UK has set up a capture the flag competition

0:05:010:05:04

so that teenagers can show off their skills.

0:05:040:05:12

Several large companies are here to talk future job opportunities.

0:05:120:05:15

UK hasn't got enough people to protect itself.

0:05:150:05:21

Businesses, the nation, individual accounts,

0:05:210:05:22

we all need protecting and that's why we exist.

0:05:220:05:25

We need to find these people.

0:05:250:05:26

They're there.

0:05:260:05:27

We know they're there, we need to find them.

0:05:270:05:30

These offenders know this is a second chance,

0:05:300:05:32

one they didn't realise they were so well qualified for.

0:05:320:05:36

I was more interested in the dark side, back when I was young.

0:05:360:05:39

I wasn't really looking at the good side.

0:05:390:05:45

The dark side was mainly just attacks, attacks, attacks,

0:05:450:05:47

not thinking about defending.

0:05:470:05:48

Well, now I know that it exists, it sounds like something that I'd

0:05:480:05:52

really, really like to go into because you get the same, like,

0:05:520:05:55

rush, the same excitement, but you're doing it for fun,

0:05:550:05:58

still, but it's legal and you get paid.

0:05:580:06:00

It's like every kind of benefit.

0:06:000:06:06

Humans have been using handprints to identify themselves

0:06:210:06:23

for a very long time.

0:06:230:06:25

These ones here, the Hands Across Time just outside Las Vegas,

0:06:250:06:28

in Red Rock, are hundreds of years old.

0:06:280:06:30

They're some of the earliest examples of native Americans

0:06:300:06:32

showing their identity.

0:06:320:06:33

Kind of like a signature.

0:06:330:06:35

In recent years we've started to use our hands to identify us

0:06:350:06:39

again, and Dan's been finding out how secure they might be.

0:06:390:06:46

At Bristol Robotics Lab, they're taking an interest in every detail.

0:06:460:06:53

Now, if you're sensitive to flashing lights, look away now.

0:06:530:07:04

Is that more secure, then, than just using your fingerprint?

0:07:040:07:06

Certainly.

0:07:070:07:07

With a fingerprint, it's a small region of the hand.

0:07:070:07:10

Obviously with this system we're getting the whole surface and that,

0:07:100:07:13

combined with the vein structure, just add an extra layer of security.

0:07:130:07:16

Do you think this could be spoofed?

0:07:160:07:32

I think it's unlikely.

0:07:320:07:33

Research recently showed the ability to extract fingerprints

0:07:330:07:35

or handprints off celebrities from a distance.

0:07:350:07:37

From photos?

0:07:370:07:37

From photos.

0:07:370:07:38

So, you could use that to generate a 3-D surface but you still wouldn't

0:07:380:07:42

have the vein structure on the back of the hand.

0:07:420:07:45

That would be very difficult to hack.

0:07:450:07:46

In Chicago, some people are already using their palm

0:07:460:07:49

and to pay for things.

0:07:490:07:59

It's being called Naked Payment.

0:07:590:08:00

No cards, cash or phones.

0:08:010:08:04

From September, TSB will be the first bank in Europe to adopt

0:08:040:08:08

retina scan technology as a way of accessing online bank accounts,

0:08:080:08:10

although initially customers will need a Samsung Galaxy S8

0:08:110:08:18

handset to use the technology.

0:08:180:08:19

But is it secure?

0:08:190:08:20

In May, the Chaos Computer Club in Germany posted this video,

0:08:200:08:23

fooling the S8's iris scanner using a photograph

0:08:230:08:25

and a contact lens.

0:08:250:08:26

TSB and Samsung are hoping that others won't go

0:08:260:08:29

to that sort of trouble.

0:08:290:08:34

At the CyLab Biometrics Center in Pittsburgh, they've developed

0:08:340:08:36

a system that can identify the irises of people moving in

0:08:360:08:39

a crowd from up to 12 metres away.

0:08:390:08:52

But if the eyes don't have it, the face just might.

0:08:520:08:55

Back at Bristol Robotics Lab, this 3-D face scanner

0:08:550:08:57

is using a technique they've developed called Photometric stereo.

0:08:570:09:05

Two invisible lights flash at high speed,

0:09:050:09:07

allowing the camera to capture the orientation, shape

0:09:070:09:09

and texture of what it sees.

0:09:090:09:17

So far, it has a 95% accuracy rate but that's good enough to attract

0:09:170:09:21

some major investment.

0:09:210:09:26

They are working with Cubic, which develops the Oyster card,

0:09:260:09:28

contactless payment system used in London's trains and buses.

0:09:280:09:31

It's being part funded by the British government

0:09:310:09:33

to innovate gateless technologies, allowing passengers to simply walk

0:09:330:09:35

into a station and onto a train.

0:09:360:09:38

You can imagine, if you can get rid of the gate line in a place

0:09:380:09:42

like Victoria Station, there's a massive potential

0:09:420:09:44

for increasing throughput.

0:09:440:09:45

So we ran quite an interesting project for them, which they are now

0:09:450:09:49

installing at their laboratory in Salford and the aim is to move it

0:09:490:09:52

on to the Underground so that the system will recognise

0:09:520:09:55

people and you get rid of the gates and it will allow people to go

0:09:550:09:59

through without any impediments.

0:09:590:10:06

Now, this is a is a prototype but we have been told

0:10:060:10:09

that the system will recognise even a pair of glasses.

0:10:090:10:12

So, let's see if it knows who I am now.

0:10:120:10:18

Look at that, you can see my name come up right there.

0:10:180:10:22

It could make your life so easy.

0:10:220:10:24

Just walk around, the face is the key to doing everything

0:10:240:10:26

you want to do in the modern world.

0:10:260:10:34

And just to double-check, I've tried to fool it with this guy.

0:10:340:10:37

Oh, look at that.

0:10:370:10:41

It recognises me, but this is very clearly an impostor.

0:10:410:10:43

This face clearly isn't going to get me anywhere.

0:10:430:10:55

Dan Simmons, being shredded. Sorry, Dan.

0:11:000:11:06

So, that's it for another week.

0:11:060:11:12

Of course we'll be back with more next week from Vegas,

0:11:120:11:15

Download Subtitles

SRT

ASS