0:00:02 > 0:00:05Now on BBC News, Click.
0:00:05 > 0:00:08This week, international espionage.
0:00:08 > 0:00:09Shark fishing in Vegas.
0:00:09 > 0:00:12Spooked out in London.
0:00:12 > 0:00:42The way you walk can be used against you.
0:00:42 > 0:00:43And, I spy in Hong Kong.
0:00:43 > 0:00:45conventions have just taken place.
0:00:45 > 0:00:48We've seen ATMs conned into spewing out cash and solar panels controlled
0:00:48 > 0:00:50from the other side of the world.
0:00:50 > 0:00:52And while Black Hat is the conference for the security
0:00:52 > 0:00:55professionals, the hobbyist hackers hang out at Def Con,
0:00:55 > 0:01:03and they're not all good guys.
0:01:03 > 0:01:09There are all night parties and challenges to hack
0:01:09 > 0:01:11into visitor's phones or laptops with the victim's details posted up
0:01:11 > 0:01:23here, on the notorious Wall of Sheep.
0:01:23 > 0:01:26What these big events expose is the vulnerability of anything
0:01:26 > 0:01:27that's connected to the internet.
0:01:27 > 0:01:30And, of course, we are moving towards a world where everything
0:01:30 > 0:01:32will be connected to the internet from the infrastructure,
0:01:32 > 0:01:35to your car, to your home appliances, to your clothes.
0:01:35 > 0:01:38Yet there's always something new in the world of hacking and this
0:01:38 > 0:01:45week we'll show you some of it.
0:01:45 > 0:01:50But first, Dan Simmons is off gambling.
0:01:50 > 0:01:53When Click was offered a rare opportunity to film how a top casino
0:01:53 > 0:01:56has used its own tech to catch the cheats,
0:01:56 > 0:02:17we sent him in with a simple brief - get the story and come home safely.
0:02:17 > 0:02:20But with Sin City this full of bad guys, it didn't quite go to plan.
0:02:20 > 0:02:22I'm on the inside, but who can I trust?
0:02:22 > 0:02:25A big company boss was caught cheating at the tables only
0:02:25 > 0:02:50last month here.
0:02:50 > 0:02:53In the old days, they'd have had agents casually observing suspects
0:02:53 > 0:02:56on the gaming floor or even snooping through a ceiling made of glass.
0:02:56 > 0:02:59Today, this $20 million security set-up is all about the cameras,
0:02:59 > 0:03:00and this casino has some new ones.
0:03:00 > 0:03:02Can you see it?
0:03:02 > 0:03:02There.
0:03:02 > 0:03:03He's got it on his finger.
0:03:03 > 0:03:06Watch how he handles the cards, and that's him putting the mark.
0:03:06 > 0:03:07It's that subtle.
0:03:07 > 0:03:09It's just that little scratch on the back.
0:03:09 > 0:03:09There.
0:03:09 > 0:03:11I can actually see it.
0:03:11 > 0:03:13He put it on pretty heavy, so we can see it here.
0:03:13 > 0:03:16That's why they call it a visible mark.
0:03:16 > 0:03:18And the idea is, when he sees the card -
0:03:18 > 0:03:21a Queen, King, Ace - come up, he's going to bet as much
0:03:21 > 0:03:22as he can.
0:03:22 > 0:03:24So this is just the perfect example.
0:03:24 > 0:03:26Let's see when the cards come over.
0:03:26 > 0:03:27There's an Ace and a King.
0:03:27 > 0:03:30Of course it's appropriate to bet the most he can when he gets
0:03:30 > 0:03:31those good cards.
0:03:31 > 0:03:33The biggest thing that's happened is the addition
0:03:33 > 0:03:43of the 360 degree cameras.
0:03:43 > 0:03:45They take the place of 400 hand-tilt zoom cameras.
0:03:45 > 0:03:47I can replace 400 of those with 50 oncam 360 cameras.
0:03:47 > 0:03:51I can literally follow the bad guy every step he took in this building.
0:03:51 > 0:03:55Look at that, how far that thing goes.
0:03:55 > 0:03:57This is two megapixels, the new ones are 12.
0:03:57 > 0:04:00So, from this shot here, I would be able to identify that person.
0:04:00 > 0:04:03Ted says reliable, automatic facial recognition is just a year
0:04:03 > 0:04:04or two away.
0:04:04 > 0:04:06The cameras can already analyse and report the general movements
0:04:06 > 0:04:10of people, but it's still the skill of the operators in catching a cheat
0:04:10 > 0:04:11in the act that's his trump card.
0:04:11 > 0:04:14Ted's enthusiasm has led him to hack together some unique
0:04:14 > 0:04:15and revealing tech himself.
0:04:15 > 0:04:18You can see right here this card, if you're looking at with your naked
0:04:18 > 0:04:20eye, you cannot see through it.
0:04:20 > 0:04:23But once you put it up to the right light and the right lens,
0:04:23 > 0:04:25you can see right through it, like it's...
0:04:25 > 0:04:28Look, he's got - nine, nine.
0:04:28 > 0:04:30So this is a mark that I had printed on this card,
0:04:30 > 0:04:34but I could apply this type of ink on the fly while I'm sitting
0:04:34 > 0:04:36on a game.
0:04:36 > 0:04:38The thing is, all you need is the right light source
0:04:38 > 0:04:39and the right lens.
0:04:39 > 0:04:42This device here has nine different lenses in it
0:04:42 > 0:04:43which I can cycle through.
0:04:43 > 0:04:51I don't know if your camera can catch it, but I can.
0:04:51 > 0:04:53This lens is in the glasses or in their contacts.
0:04:53 > 0:04:56So they don't need a camera like we have, they can do this
0:04:56 > 0:04:58with manual devices, just like my glasses.
0:04:58 > 0:05:01So this is just a cheap phone that I had the camera modified.
0:05:01 > 0:05:04Let me see if I can find a good one.
0:05:04 > 0:05:07You can see through that card with this phone.
0:05:07 > 0:05:10Casinos buy cards, they have to be careful not to buy the cheapest card
0:05:10 > 0:05:12because this is what you get sometimes.
0:05:12 > 0:05:24Our casinos would never have a card like this on the floor.
0:05:25 > 0:05:26Our cheat is at it again.
0:05:26 > 0:05:37This time he's gambled too much on what turns out to be a poor hand.
0:05:37 > 0:05:41That was a great move.
0:05:41 > 0:05:44So it looked as if he's tucking the cards and he's actually knocking
0:05:44 > 0:05:47the chip back into his hand and therefore he lost less money
0:05:47 > 0:05:49than he was going to lose.
0:05:49 > 0:05:51This is the most popular way to con the casino,
0:05:51 > 0:05:54but the cameras have caught it, and Ted's seen enough.
0:05:54 > 0:05:55Excuse me, sir, how are you doing?
0:05:55 > 0:06:00I need you to step away from the table and come with us.
0:06:00 > 0:06:01Our cheat's a plant.
0:06:01 > 0:06:03For legal reasons we can't show you an actual pick-up but,
0:06:03 > 0:06:07while we were filming, Ted caught one guy doing exactly
0:06:07 > 0:06:09the same cheats we've just shown you.
0:06:09 > 0:06:10And that's payday for the good guys.
0:06:10 > 0:06:33But you can't catch them all.
0:06:54 > 0:07:10Drones can be used as a threat factor against not only stationary
0:07:10 > 0:07:12targets, like industrial wireless, but also against moving
0:07:12 > 0:07:12targets as well.
0:07:12 > 0:07:14My name is Jeff Melrose.
0:07:14 > 0:07:16For about 16 years I worked on designing secure systems
0:07:16 > 0:07:19for the US Department of defence as well as the US intelligence
0:07:19 > 0:07:19community.
0:07:19 > 0:07:21Jeff's research, revealed last week in Las Vegas,
0:07:21 > 0:07:36shows a drone carrying an electromagnetic disrupter
0:07:36 > 0:07:39could create what he calls "a cone of silence" around a moving target.
0:07:39 > 0:07:41The drop off co-ordinates are one, three, seven,
0:07:41 > 0:07:46four, seven, two, nine.
0:07:46 > 0:07:49It locks on automatically without the need for an operator
0:07:49 > 0:07:53and is a threat, he believes, many aren't ready for.
0:07:53 > 0:07:59The ability to provide persistent degradation and navigation signals
0:07:59 > 0:08:01as well as communications is something that would be quite
0:08:01 > 0:08:04useful if you wanted to redirect cargo, redirect a ship,
0:08:04 > 0:08:06potentially causing an environmental disaster in a port, those
0:08:06 > 0:08:29types of things.
0:08:29 > 0:08:31As well as killing coms, interfering with the car's
0:08:31 > 0:08:33telematics or GPS could cause serious problems, especially if it's
0:08:33 > 0:08:56a self-driving vehicle.
0:08:56 > 0:08:57Thankfully, Jeff is on my side.
0:08:57 > 0:09:00OK, maybe making it blow up is a bit of a stretch!
0:09:00 > 0:09:01What happens now, Jeff?
0:09:01 > 0:09:02Just follow the drone.
0:09:02 > 0:09:04What, all the way to London?
0:09:04 > 0:09:12You could have sent a chopper.
0:09:23 > 0:09:25Hello, and welcome to the Week in Tech.
0:09:25 > 0:09:29This was the week that 1,007 miniature robots danced their way
0:09:29 > 0:09:32into the record books.
0:09:32 > 0:09:35Google revealed an experiment to try and combat trolling in virtual
0:09:35 > 0:09:45reality, by making players look like dogs.
0:09:45 > 0:09:48And in honour of International Cat Day, Facebook unveiled research
0:09:48 > 0:09:51showing that cat people have fewer friends and are more likely to be
0:09:51 > 0:09:52single than dog people.
0:09:52 > 0:09:53Happy Cat Day everyone.
0:09:53 > 0:09:55Facebook also announced it will begin bypassing ad blockers
0:09:55 > 0:09:57used by some people on its network.
0:09:57 > 0:10:00The company, which made $17 billion from selling ads last year,
0:10:00 > 0:10:03said it will offer users more options to control what sort
0:10:03 > 0:10:04of ads they see.
0:10:04 > 0:10:06I'm pleased to bring you news that the flying bottom has finally
0:10:07 > 0:10:07emerged from its lair.
0:10:07 > 0:10:11Also known as the Airlander 10 by its creators, Click visited this
0:10:11 > 0:10:13gigantic airship earlier in the year, when it was still
0:10:13 > 0:10:15locked up indoors.
0:10:15 > 0:10:17Now it's outside and, once tests are complete,
0:10:17 > 0:10:20the plan is for it to fly continuously for up to two weeks
0:10:20 > 0:10:21at a time.
0:10:21 > 0:10:22NASA really treated us this week.
0:10:22 > 0:10:24First, they gave us this spectacularly detailed footage
0:10:24 > 0:10:27of a rocket burn, captured with their new high dynamic range
0:10:27 > 0:10:29camera and then, sticking with the spectacular theme,
0:10:29 > 0:10:33they released a smorgasbord of new Mars imagery.
0:10:33 > 0:10:36And, finally...
0:10:36 > 0:10:40Ah, the joy of cycling, the wind in your hair,
0:10:40 > 0:10:45the sun on your back.
0:10:45 > 0:10:48Games developer, Aaron Pewsey, is on a mission to bike the length
0:10:48 > 0:10:50of Britain, all without leaving his front room.
0:10:50 > 0:10:53By hooking up his exercise bike to a pair of virtual reality goggles
0:10:53 > 0:10:57and Google's Street View imagery, he's hoping he'll spice
0:10:57 > 0:10:59up his exercise routine and cycle 1,500 virtual kilometres
0:10:59 > 0:11:03in the process.
0:11:03 > 0:11:07If you've reset your Facebook or your Google password recently
0:11:07 > 0:11:14or you've made a payment on line, you may have received one of these.
0:11:14 > 0:11:21It's a text message to confirm that you're not just some hacker trying
0:11:21 > 0:11:23to access the account from somewhere else in the world.
0:11:23 > 0:11:26The theory being that most hacking is done by someone thousands
0:11:26 > 0:11:29of miles away from you, who doesn't actually know you.
0:11:29 > 0:11:34So although they can try and log on as you,
0:11:34 > 0:11:38they won't have access to your phone and can't see the text message.
0:11:38 > 0:11:40This belts and braces approach, called two factor authentication,
0:11:40 > 0:11:42has worked very well at stopping malicious software from just
0:11:42 > 0:11:44rinsing your bank accounts.
0:11:44 > 0:11:49But it turns out it's not as secure as many think.
0:11:49 > 0:11:51In fact, the US government's National Institute of Standards
0:11:51 > 0:11:53and Technology has recently advised against services using SMS
0:11:53 > 0:11:58confirmation codes in the future.
0:11:58 > 0:12:01The UK's National Crime Agency agrees.
0:12:01 > 0:12:05I'm about to be shown one of the reasons why,
0:12:06 > 0:12:22at Positive Technologies in London.
0:12:22 > 0:12:24It's a weakness in the global mobile phone network,
0:12:24 > 0:12:26the part called SS7, which allows hackers to intercept
0:12:26 > 0:12:28phone messages to a given phone number.
0:12:28 > 0:12:29We can intercept phone calls.
0:12:29 > 0:12:30We can redirect phone calls.
0:12:30 > 0:12:33We can attack a particular subscriber, so that subscriber
0:12:33 > 0:12:35will not be available to make phone calls.
0:12:35 > 0:12:42We can attack a particular infrastructure.
0:12:42 > 0:12:46Yeah, and not only can a hacker disrupt and listen to your calls,
0:12:46 > 0:12:48they can also track you to the nearest phone tower, too.
0:12:48 > 0:12:52It's been known about for a few years and the means to do it
0:12:52 > 0:12:55are available for sale on the dark web for really not that much money.
0:12:55 > 0:12:58But arguably the most powerful thing they can do
0:12:58 > 0:13:02is redirect your text messages.
0:13:02 > 0:13:06To show you how it worked a researcher, somewhere else
0:13:06 > 0:13:09in Europe, is about to intercept a text message and use it to gain
0:13:09 > 0:13:18access to my Facebook account.
0:13:18 > 0:13:21That's my brand new Facebook account, not the real one -
0:13:21 > 0:13:21thanks very much.
0:13:21 > 0:13:26Shall we mail?
0:13:26 > 0:13:30And this is the important bit, I'm going to put in the mobile
0:13:30 > 0:13:36number which Facebook can contact me on should I forget my password.
0:13:36 > 0:13:38Now it's time to unleash our guy.
0:13:38 > 0:13:40Now, we're watching his actions on this screen here.
0:13:40 > 0:13:43He's going to tell Facebook he's me and pretend that I have
0:13:43 > 0:13:50forgotten my password.
0:13:50 > 0:13:53The way Facebook checks that it really is me who's asking is,
0:13:53 > 0:13:57of course, by sending a code to my phone and asking me to enter
0:13:57 > 0:14:02that onto the website.
0:14:02 > 0:14:04Facebook has sent a text to that phone over there.
0:14:04 > 0:14:11Apart from, it hasn't...
0:14:11 > 0:14:13That text has been redirected to our guy's phone elsewhere
0:14:13 > 0:14:17in the world.
0:14:20 > 0:14:23In fact, there's the text message on our guy's computer screen.
0:14:23 > 0:14:27He now has all he needs to reset my password and wreak havoc
0:14:27 > 0:14:33on my account.
0:14:33 > 0:14:35OK, let's see what's been done to me.
0:14:35 > 0:14:42There I am.
0:14:42 > 0:14:45I'm lucky it's just a flower that I've been changed to.
0:14:45 > 0:14:48The thing is, this is actually nothing to do with Facebook.
0:14:48 > 0:14:57Any service that uses texts is vulnerable.
0:14:57 > 0:15:03The way Facebook checks that it really is me who's asking is,
0:15:03 > 0:15:07of course, by sending a code to my phone and asking me to enter
0:15:07 > 0:15:13that onto the website.
0:15:13 > 0:15:14That could be your bank.
0:15:14 > 0:15:16I'll say that again - your bank!
0:15:16 > 0:15:18That's where your money is, remember.
0:15:18 > 0:15:21We asked Facebook whether it should rethink its use of SMS verification.
0:15:21 > 0:15:23It said that the technique we witnessed requires significant
0:15:23 > 0:15:26technical and financial investment and so it's very low-risk for most
0:15:26 > 0:15:28people, although it does offer a more secure log-in feature
0:15:28 > 0:15:34called log-in approvals.
0:15:34 > 0:15:36We also asked the British intelligence and security
0:15:36 > 0:15:39organisation, GCHQ, for advice and we were told that the SS7 system
0:15:39 > 0:15:42is old and doesn't have modern security protections built in,
0:15:42 > 0:15:50but they assured us they are working on building up its resilience.
0:15:50 > 0:15:53But why is the SS7 network so open to abuse?
0:15:53 > 0:15:55To find out, I met up with Professor Alan Woodward,
0:15:55 > 0:15:57long time security adviser to Europol.
0:15:57 > 0:16:02We choose a park bench because, well, it just felt a bit spyie.
0:16:02 > 0:16:06A lot of people talk about SS7 having a security flaw in it,
0:16:06 > 0:16:08but it was never designed to be secure because at the time
0:16:08 > 0:16:11it was designed, which was, you've got to remember,
0:16:11 > 0:16:13nearly 40 years ago, the networks inherently
0:16:13 > 0:16:13trusted each other.
0:16:13 > 0:16:16So they didn't think they had to validate talking to each other,
0:16:16 > 0:16:19they just naturally assumed tht they were the only ones talking.
0:16:20 > 0:16:21Can they fix it?
0:16:21 > 0:16:22They could, but I don't think they will.
0:16:22 > 0:16:25It's not within even the law enforcement agencies gift to do
0:16:25 > 0:16:26anything about it.
0:16:26 > 0:16:28Nobody mandates this standard, it's all by agreement amongst
0:16:28 > 0:16:31the telecommunication providers and I don't see them changing it
0:16:31 > 0:16:33any time soon because it's very targeted, so somebody has
0:16:33 > 0:16:35to want to come after you.
0:16:35 > 0:16:38Plus, one of the reasons that some intelligence agencies won't want it
0:16:38 > 0:16:40fixed is because SS7 allows you to be tracked.
0:16:40 > 0:16:43I, personally, would recommend not using SMS because you have to assume
0:16:43 > 0:16:45it could be intercepted and use something like e-mail only
0:16:45 > 0:16:48or ideally move to one of the online services
0:16:48 > 0:17:04which is encrypted.
0:17:06 > 0:17:07You're crazy, old man.
0:17:07 > 0:17:08You have no idea.
0:17:08 > 0:17:10Get ready.
0:17:10 > 0:17:11Now, from hacking to tracking.
0:17:11 > 0:17:14We wondered whether it was possible to escape state snooping
0:17:14 > 0:17:16when the Intelligence Services are trying to track your every move.
0:17:16 > 0:17:20Lara Lewington tracked down an ex-spook to find out how you can
0:17:20 > 0:17:30shake off any unwanted attention.
0:17:30 > 0:17:31Listen up.
0:17:31 > 0:17:33The suspect's name is Special Agent Elizabeth Keen.
0:17:33 > 0:17:39She was my partner but, as of today, she's a fugitive wanted...
0:17:39 > 0:17:42OK, it may be a glamourised version, but this scene is only too familiar
0:17:42 > 0:17:45to former MI5 officer Annie Machon, who went on-the-run after quitting
0:17:45 > 0:17:51the secret service to go public on her experiences.
0:17:51 > 0:17:54I suppose we were the sort of 1990s version of Edward Snowdon.
0:17:54 > 0:17:57Tracking someone's whereabouts may not always look as exciting as this,
0:17:57 > 0:17:59but doing so has become easier than ever.
0:17:59 > 0:18:09So how simply can we hide?
0:18:09 > 0:18:11How easy is it, using modern technology, to find out
0:18:11 > 0:18:15where someone is and what can we do to protect ourselves from that?
0:18:15 > 0:18:18Now we're looking at programmes, such as Trap Wire, which was one
0:18:18 > 0:18:20of the disclosures over Wikileaks a few years ago,
0:18:20 > 0:18:23where you get meshing of your GPS, from your phone, facial recognition
0:18:23 > 0:18:25technology via Google and also Facebook photo tagging,
0:18:25 > 0:18:47which can be fed into the CCTV network around the UK.
0:18:47 > 0:18:49So in live-time you can be tracked, you can be photographed,
0:18:49 > 0:18:52you can be idnetified and then, the icing on the cake,
0:18:52 > 0:18:54which is Trap Wire, they've written algorithmic predictive programmes
0:18:54 > 0:18:57and if you're loitering or walking in a suspicion manner,
0:18:57 > 0:18:59and you've already been identified, then you might be
0:18:59 > 0:19:00about to commit a crime.
0:19:00 > 0:19:03You might be about to be a terrorist, so then they can swoop
0:19:03 > 0:19:04and get you.
0:19:04 > 0:19:06The way you walk can be used against you.
0:19:06 > 0:19:09The only way to get around that, as well as disguing yourself,
0:19:09 > 0:19:12is to perhaps put a stone in your shoe, so it forces
0:19:12 > 0:19:13you to walk differently.
0:19:13 > 0:19:16But you said you wanted to know when Mrs Hargrave
0:19:16 > 0:19:17contacted your office.
0:19:17 > 0:19:17Put her through.
0:19:17 > 0:19:18Turn it up.
0:19:18 > 0:19:19You're on with Mrs Hargrave.
0:19:19 > 0:19:22Annie also provides us with a reminder as to how the spies
0:19:22 > 0:19:24can snoop on phone calls and e-mails.
0:19:24 > 0:19:27Since 1998 they have been able to do bulk data hacking,
0:19:27 > 0:19:29which means they can gather all our information,
0:19:29 > 0:19:32be it travel, be it finance, be it health, be it work,
0:19:32 > 0:19:34be it social life on Facebook, whatever, and amalgamate it.
0:19:34 > 0:19:38So our entire lives are just laid open to whoever wants to look
0:19:38 > 0:19:38at that information.
0:19:38 > 0:19:41Now as soon as you do something which might trigger an interest,
0:19:41 > 0:19:45they will specifically look at you - if you get involved in a political
0:19:45 > 0:19:46campaign, or whatever.
0:19:46 > 0:19:48So this is very difficult to try and avoid.
0:19:48 > 0:19:50There are certain tools you can use, the privacy tools.
0:19:50 > 0:19:54In fact, Edward Snowdon has said if you use all of these together,
0:19:54 > 0:19:56and you use them effectively, you can protect your privacy.
0:19:56 > 0:19:58If someone discovers they are being snooped on,
0:19:58 > 0:20:00what should they actually do about it?
0:20:00 > 0:20:03Yes, get a Faraday cage wallet and then lock their phone
0:20:03 > 0:20:05in the fridge or in a biscuit tin overnight.
0:20:05 > 0:20:08The other solution is to go back to the old tech.
0:20:08 > 0:20:10You get pre-2008 computers, you get very old burner phones
0:20:10 > 0:20:15with pre-paid SIMS, and that gives you a fighting chance.
0:20:15 > 0:20:17In terms of the people that we communicate with,
0:20:17 > 0:20:19obviously knowing someone's network and connections is actually
0:20:19 > 0:20:19quite valuable information.
0:20:19 > 0:20:20Hugely valuable.
0:20:20 > 0:20:22I mean, it's probably the key information
0:20:22 > 0:20:23for any intelligence agency.
0:20:23 > 0:20:26We would take weeks, if not months, to try and pull together a full
0:20:26 > 0:20:29picture of a target's networks and who they're in relationships
0:20:29 > 0:20:31with, what their activities are and where they live,
0:20:31 > 0:20:34where they work and where they go, and that was very,
0:20:34 > 0:20:35very resource intensive.
0:20:35 > 0:20:36It could involve human agents.
0:20:36 > 0:20:38It could involve mobile surveillance, teams following them
0:20:38 > 0:20:42around a city.
0:20:42 > 0:20:45Now, of course, they can just could do it by triangulating
0:20:45 > 0:20:48information by hacking all our information on the internet,
0:20:48 > 0:20:49and they've got us.
0:20:49 > 0:20:51Only recently Edward Snowdon has been involved in designing a phone
0:20:51 > 0:20:54case aiming to track when data is being sent or received,
0:20:54 > 0:20:56so a user can tell if it's happening unexpectedly.
0:20:56 > 0:20:59This may all sound a bit extreme to most of us,
0:20:59 > 0:21:02but if you ever do need to go under the radar,
0:21:02 > 0:21:04at least now you may know how.
0:21:04 > 0:21:10Um...very useful to know.
0:21:10 > 0:21:13But then there are those people who've actually put themselves under
0:21:13 > 0:21:15surveillance without realising they're on show to everyone.
0:21:15 > 0:21:17This is backdoored.io, an exhibition filled with images
0:21:17 > 0:21:19from webcams whose passwords haven't been changed from admin.
0:21:19 > 0:21:21It's funny what people put security cameras
0:21:21 > 0:21:34on, though, isn't it?
0:21:34 > 0:21:35Yeah.
0:21:35 > 0:21:36That's been one of the really interesting insights.
0:21:36 > 0:21:39I mean, here people are watching their laundry,
0:21:39 > 0:21:42so you can just imagine, you know - is my laundry dry?
0:21:42 > 0:21:43I'll just go and check the security camera.
0:21:44 > 0:21:45I've got one of plugs.
0:21:45 > 0:21:46Is that plug still plugged in?
0:21:46 > 0:21:53You know?
0:21:53 > 0:21:55Artist Nye Thompson and curator Kosha Hussain have sifted
0:21:55 > 0:21:57through 7,000 images which have been collected by search engines
0:21:57 > 0:21:58from unprotected cameras.
0:21:58 > 0:22:02Why have you got a whole area dedicated just to one street in Hong
0:22:02 > 0:22:05Kong?
0:22:05 > 0:22:08So when the images come in, they all come in with geolocation
0:22:08 > 0:22:16data, so you can actually pinpoint where they are,
0:22:16 > 0:22:18and I noticed there was a disproportionately large number
0:22:18 > 0:22:20of images coming in from just this one location.
0:22:20 > 0:22:22I think somebody just blanket installed surveillance cameras
0:22:22 > 0:22:23in this tower block.
0:22:23 > 0:22:26You know, the same person did all of them and they didn't really
0:22:26 > 0:22:39know what they were doing.
0:22:39 > 0:22:43Many of us use webcams to monitor the things that we're anxious about,
0:22:43 > 0:22:45but I wonder how anxious these people would be if they knew
0:22:45 > 0:22:47who was really watching?
0:22:47 > 0:22:57That's it from Wing Lee Street in Hong Kong.
0:22:57 > 0:22:59On behalf of the residents, thank you for watching,
0:22:59 > 0:23:01even though I don't think they realise.
0:23:01 > 0:23:04And curiously, over the next two weeks, we are going back to China
0:23:04 > 0:23:07with another chance to see two of our China programmes
0:23:07 > 0:23:16from earlier this year, as we take a well-deserved summer break.
0:23:17 > 0:23:19'Made in China' is becoming 'designed in China'.
0:23:19 > 0:23:22That's going to cost him at least a minute.
0:23:22 > 0:23:24Underneath that helmet, he's going to be absolutely fuming.
0:23:24 > 0:23:27So, China, one and two, coming in the next fortnight.
0:23:27 > 0:23:29In the meantime, follow us on Twitter, as always, @BBC Click.
0:23:29 > 0:24:09Thanks for watching and we'll see you soon.
0:24:20 > 0:24:22THEME PLAYS.