Spy Special

Download Subtitles

Transcript

0:00:02 > 0:00:05Now on BBC News, Click.

0:00:05 > 0:00:08This week, international espionage.

0:00:08 > 0:00:09Shark fishing in Vegas.

0:00:09 > 0:00:12Spooked out in London.

0:00:12 > 0:00:42The way you walk can be used against you.

0:00:42 > 0:00:43And, I spy in Hong Kong.

0:00:43 > 0:00:45conventions have just taken place.

0:00:45 > 0:00:48We've seen ATMs conned into spewing out cash and solar panels controlled

0:00:48 > 0:00:50from the other side of the world.

0:00:50 > 0:00:52And while Black Hat is the conference for the security

0:00:52 > 0:00:55professionals, the hobbyist hackers hang out at Def Con,

0:00:55 > 0:01:03and they're not all good guys.

0:01:03 > 0:01:09There are all night parties and challenges to hack

0:01:09 > 0:01:11into visitor's phones or laptops with the victim's details posted up

0:01:11 > 0:01:23here, on the notorious Wall of Sheep.

0:01:23 > 0:01:26What these big events expose is the vulnerability of anything

0:01:26 > 0:01:27that's connected to the internet.

0:01:27 > 0:01:30And, of course, we are moving towards a world where everything

0:01:30 > 0:01:32will be connected to the internet from the infrastructure,

0:01:32 > 0:01:35to your car, to your home appliances, to your clothes.

0:01:35 > 0:01:38Yet there's always something new in the world of hacking and this

0:01:38 > 0:01:45week we'll show you some of it.

0:01:45 > 0:01:50But first, Dan Simmons is off gambling.

0:01:50 > 0:01:53When Click was offered a rare opportunity to film how a top casino

0:01:53 > 0:01:56has used its own tech to catch the cheats,

0:01:56 > 0:02:17we sent him in with a simple brief - get the story and come home safely.

0:02:17 > 0:02:20But with Sin City this full of bad guys, it didn't quite go to plan.

0:02:20 > 0:02:22I'm on the inside, but who can I trust?

0:02:22 > 0:02:25A big company boss was caught cheating at the tables only

0:02:25 > 0:02:50last month here.

0:02:50 > 0:02:53In the old days, they'd have had agents casually observing suspects

0:02:53 > 0:02:56on the gaming floor or even snooping through a ceiling made of glass.

0:02:56 > 0:02:59Today, this $20 million security set-up is all about the cameras,

0:02:59 > 0:03:00and this casino has some new ones.

0:03:00 > 0:03:02Can you see it?

0:03:02 > 0:03:02There.

0:03:02 > 0:03:03He's got it on his finger.

0:03:03 > 0:03:06Watch how he handles the cards, and that's him putting the mark.

0:03:06 > 0:03:07It's that subtle.

0:03:07 > 0:03:09It's just that little scratch on the back.

0:03:09 > 0:03:09There.

0:03:09 > 0:03:11I can actually see it.

0:03:11 > 0:03:13He put it on pretty heavy, so we can see it here.

0:03:13 > 0:03:16That's why they call it a visible mark.

0:03:16 > 0:03:18And the idea is, when he sees the card -

0:03:18 > 0:03:21a Queen, King, Ace - come up, he's going to bet as much

0:03:21 > 0:03:22as he can.

0:03:22 > 0:03:24So this is just the perfect example.

0:03:24 > 0:03:26Let's see when the cards come over.

0:03:26 > 0:03:27There's an Ace and a King.

0:03:27 > 0:03:30Of course it's appropriate to bet the most he can when he gets

0:03:30 > 0:03:31those good cards.

0:03:31 > 0:03:33The biggest thing that's happened is the addition

0:03:33 > 0:03:43of the 360 degree cameras.

0:03:43 > 0:03:45They take the place of 400 hand-tilt zoom cameras.

0:03:45 > 0:03:47I can replace 400 of those with 50 oncam 360 cameras.

0:03:47 > 0:03:51I can literally follow the bad guy every step he took in this building.

0:03:51 > 0:03:55Look at that, how far that thing goes.

0:03:55 > 0:03:57This is two megapixels, the new ones are 12.

0:03:57 > 0:04:00So, from this shot here, I would be able to identify that person.

0:04:00 > 0:04:03Ted says reliable, automatic facial recognition is just a year

0:04:03 > 0:04:04or two away.

0:04:04 > 0:04:06The cameras can already analyse and report the general movements

0:04:06 > 0:04:10of people, but it's still the skill of the operators in catching a cheat

0:04:10 > 0:04:11in the act that's his trump card.

0:04:11 > 0:04:14Ted's enthusiasm has led him to hack together some unique

0:04:14 > 0:04:15and revealing tech himself.

0:04:15 > 0:04:18You can see right here this card, if you're looking at with your naked

0:04:18 > 0:04:20eye, you cannot see through it.

0:04:20 > 0:04:23But once you put it up to the right light and the right lens,

0:04:23 > 0:04:25you can see right through it, like it's...

0:04:25 > 0:04:28Look, he's got - nine, nine.

0:04:28 > 0:04:30So this is a mark that I had printed on this card,

0:04:30 > 0:04:34but I could apply this type of ink on the fly while I'm sitting

0:04:34 > 0:04:36on a game.

0:04:36 > 0:04:38The thing is, all you need is the right light source

0:04:38 > 0:04:39and the right lens.

0:04:39 > 0:04:42This device here has nine different lenses in it

0:04:42 > 0:04:43which I can cycle through.

0:04:43 > 0:04:51I don't know if your camera can catch it, but I can.

0:04:51 > 0:04:53This lens is in the glasses or in their contacts.

0:04:53 > 0:04:56So they don't need a camera like we have, they can do this

0:04:56 > 0:04:58with manual devices, just like my glasses.

0:04:58 > 0:05:01So this is just a cheap phone that I had the camera modified.

0:05:01 > 0:05:04Let me see if I can find a good one.

0:05:04 > 0:05:07You can see through that card with this phone.

0:05:07 > 0:05:10Casinos buy cards, they have to be careful not to buy the cheapest card

0:05:10 > 0:05:12because this is what you get sometimes.

0:05:12 > 0:05:24Our casinos would never have a card like this on the floor.

0:05:25 > 0:05:26Our cheat is at it again.

0:05:26 > 0:05:37This time he's gambled too much on what turns out to be a poor hand.

0:05:37 > 0:05:41That was a great move.

0:05:41 > 0:05:44So it looked as if he's tucking the cards and he's actually knocking

0:05:44 > 0:05:47the chip back into his hand and therefore he lost less money

0:05:47 > 0:05:49than he was going to lose.

0:05:49 > 0:05:51This is the most popular way to con the casino,

0:05:51 > 0:05:54but the cameras have caught it, and Ted's seen enough.

0:05:54 > 0:05:55Excuse me, sir, how are you doing?

0:05:55 > 0:06:00I need you to step away from the table and come with us.

0:06:00 > 0:06:01Our cheat's a plant.

0:06:01 > 0:06:03For legal reasons we can't show you an actual pick-up but,

0:06:03 > 0:06:07while we were filming, Ted caught one guy doing exactly

0:06:07 > 0:06:09the same cheats we've just shown you.

0:06:09 > 0:06:10And that's payday for the good guys.

0:06:10 > 0:06:33But you can't catch them all.

0:06:54 > 0:07:10Drones can be used as a threat factor against not only stationary

0:07:10 > 0:07:12targets, like industrial wireless, but also against moving

0:07:12 > 0:07:12targets as well.

0:07:12 > 0:07:14My name is Jeff Melrose.

0:07:14 > 0:07:16For about 16 years I worked on designing secure systems

0:07:16 > 0:07:19for the US Department of defence as well as the US intelligence

0:07:19 > 0:07:19community.

0:07:19 > 0:07:21Jeff's research, revealed last week in Las Vegas,

0:07:21 > 0:07:36shows a drone carrying an electromagnetic disrupter

0:07:36 > 0:07:39could create what he calls "a cone of silence" around a moving target.

0:07:39 > 0:07:41The drop off co-ordinates are one, three, seven,

0:07:41 > 0:07:46four, seven, two, nine.

0:07:46 > 0:07:49It locks on automatically without the need for an operator

0:07:49 > 0:07:53and is a threat, he believes, many aren't ready for.

0:07:53 > 0:07:59The ability to provide persistent degradation and navigation signals

0:07:59 > 0:08:01as well as communications is something that would be quite

0:08:01 > 0:08:04useful if you wanted to redirect cargo, redirect a ship,

0:08:04 > 0:08:06potentially causing an environmental disaster in a port, those

0:08:06 > 0:08:29types of things.

0:08:29 > 0:08:31As well as killing coms, interfering with the car's

0:08:31 > 0:08:33telematics or GPS could cause serious problems, especially if it's

0:08:33 > 0:08:56a self-driving vehicle.

0:08:56 > 0:08:57Thankfully, Jeff is on my side.

0:08:57 > 0:09:00OK, maybe making it blow up is a bit of a stretch!

0:09:00 > 0:09:01What happens now, Jeff?

0:09:01 > 0:09:02Just follow the drone.

0:09:02 > 0:09:04What, all the way to London?

0:09:04 > 0:09:12You could have sent a chopper.

0:09:23 > 0:09:25Hello, and welcome to the Week in Tech.

0:09:25 > 0:09:29This was the week that 1,007 miniature robots danced their way

0:09:29 > 0:09:32into the record books.

0:09:32 > 0:09:35Google revealed an experiment to try and combat trolling in virtual

0:09:35 > 0:09:45reality, by making players look like dogs.

0:09:45 > 0:09:48And in honour of International Cat Day, Facebook unveiled research

0:09:48 > 0:09:51showing that cat people have fewer friends and are more likely to be

0:09:51 > 0:09:52single than dog people.

0:09:52 > 0:09:53Happy Cat Day everyone.

0:09:53 > 0:09:55Facebook also announced it will begin bypassing ad blockers

0:09:55 > 0:09:57used by some people on its network.

0:09:57 > 0:10:00The company, which made $17 billion from selling ads last year,

0:10:00 > 0:10:03said it will offer users more options to control what sort

0:10:03 > 0:10:04of ads they see.

0:10:04 > 0:10:06I'm pleased to bring you news that the flying bottom has finally

0:10:07 > 0:10:07emerged from its lair.

0:10:07 > 0:10:11Also known as the Airlander 10 by its creators, Click visited this

0:10:11 > 0:10:13gigantic airship earlier in the year, when it was still

0:10:13 > 0:10:15locked up indoors.

0:10:15 > 0:10:17Now it's outside and, once tests are complete,

0:10:17 > 0:10:20the plan is for it to fly continuously for up to two weeks

0:10:20 > 0:10:21at a time.

0:10:21 > 0:10:22NASA really treated us this week.

0:10:22 > 0:10:24First, they gave us this spectacularly detailed footage

0:10:24 > 0:10:27of a rocket burn, captured with their new high dynamic range

0:10:27 > 0:10:29camera and then, sticking with the spectacular theme,

0:10:29 > 0:10:33they released a smorgasbord of new Mars imagery.

0:10:33 > 0:10:36And, finally...

0:10:36 > 0:10:40Ah, the joy of cycling, the wind in your hair,

0:10:40 > 0:10:45the sun on your back.

0:10:45 > 0:10:48Games developer, Aaron Pewsey, is on a mission to bike the length

0:10:48 > 0:10:50of Britain, all without leaving his front room.

0:10:50 > 0:10:53By hooking up his exercise bike to a pair of virtual reality goggles

0:10:53 > 0:10:57and Google's Street View imagery, he's hoping he'll spice

0:10:57 > 0:10:59up his exercise routine and cycle 1,500 virtual kilometres

0:10:59 > 0:11:03in the process.

0:11:03 > 0:11:07If you've reset your Facebook or your Google password recently

0:11:07 > 0:11:14or you've made a payment on line, you may have received one of these.

0:11:14 > 0:11:21It's a text message to confirm that you're not just some hacker trying

0:11:21 > 0:11:23to access the account from somewhere else in the world.

0:11:23 > 0:11:26The theory being that most hacking is done by someone thousands

0:11:26 > 0:11:29of miles away from you, who doesn't actually know you.

0:11:29 > 0:11:34So although they can try and log on as you,

0:11:34 > 0:11:38they won't have access to your phone and can't see the text message.

0:11:38 > 0:11:40This belts and braces approach, called two factor authentication,

0:11:40 > 0:11:42has worked very well at stopping malicious software from just

0:11:42 > 0:11:44rinsing your bank accounts.

0:11:44 > 0:11:49But it turns out it's not as secure as many think.

0:11:49 > 0:11:51In fact, the US government's National Institute of Standards

0:11:51 > 0:11:53and Technology has recently advised against services using SMS

0:11:53 > 0:11:58confirmation codes in the future.

0:11:58 > 0:12:01The UK's National Crime Agency agrees.

0:12:01 > 0:12:05I'm about to be shown one of the reasons why,

0:12:06 > 0:12:22at Positive Technologies in London.

0:12:22 > 0:12:24It's a weakness in the global mobile phone network,

0:12:24 > 0:12:26the part called SS7, which allows hackers to intercept

0:12:26 > 0:12:28phone messages to a given phone number.

0:12:28 > 0:12:29We can intercept phone calls.

0:12:29 > 0:12:30We can redirect phone calls.

0:12:30 > 0:12:33We can attack a particular subscriber, so that subscriber

0:12:33 > 0:12:35will not be available to make phone calls.

0:12:35 > 0:12:42We can attack a particular infrastructure.

0:12:42 > 0:12:46Yeah, and not only can a hacker disrupt and listen to your calls,

0:12:46 > 0:12:48they can also track you to the nearest phone tower, too.

0:12:48 > 0:12:52It's been known about for a few years and the means to do it

0:12:52 > 0:12:55are available for sale on the dark web for really not that much money.

0:12:55 > 0:12:58But arguably the most powerful thing they can do

0:12:58 > 0:13:02is redirect your text messages.

0:13:02 > 0:13:06To show you how it worked a researcher, somewhere else

0:13:06 > 0:13:09in Europe, is about to intercept a text message and use it to gain

0:13:09 > 0:13:18access to my Facebook account.

0:13:18 > 0:13:21That's my brand new Facebook account, not the real one -

0:13:21 > 0:13:21thanks very much.

0:13:21 > 0:13:26Shall we mail?

0:13:26 > 0:13:30And this is the important bit, I'm going to put in the mobile

0:13:30 > 0:13:36number which Facebook can contact me on should I forget my password.

0:13:36 > 0:13:38Now it's time to unleash our guy.

0:13:38 > 0:13:40Now, we're watching his actions on this screen here.

0:13:40 > 0:13:43He's going to tell Facebook he's me and pretend that I have

0:13:43 > 0:13:50forgotten my password.

0:13:50 > 0:13:53The way Facebook checks that it really is me who's asking is,

0:13:53 > 0:13:57of course, by sending a code to my phone and asking me to enter

0:13:57 > 0:14:02that onto the website.

0:14:02 > 0:14:04Facebook has sent a text to that phone over there.

0:14:04 > 0:14:11Apart from, it hasn't...

0:14:11 > 0:14:13That text has been redirected to our guy's phone elsewhere

0:14:13 > 0:14:17in the world.

0:14:20 > 0:14:23In fact, there's the text message on our guy's computer screen.

0:14:23 > 0:14:27He now has all he needs to reset my password and wreak havoc

0:14:27 > 0:14:33on my account.

0:14:33 > 0:14:35OK, let's see what's been done to me.

0:14:35 > 0:14:42There I am.

0:14:42 > 0:14:45I'm lucky it's just a flower that I've been changed to.

0:14:45 > 0:14:48The thing is, this is actually nothing to do with Facebook.

0:14:48 > 0:14:57Any service that uses texts is vulnerable.

0:14:57 > 0:15:03The way Facebook checks that it really is me who's asking is,

0:15:03 > 0:15:07of course, by sending a code to my phone and asking me to enter

0:15:07 > 0:15:13that onto the website.

0:15:13 > 0:15:14That could be your bank.

0:15:14 > 0:15:16I'll say that again - your bank!

0:15:16 > 0:15:18That's where your money is, remember.

0:15:18 > 0:15:21We asked Facebook whether it should rethink its use of SMS verification.

0:15:21 > 0:15:23It said that the technique we witnessed requires significant

0:15:23 > 0:15:26technical and financial investment and so it's very low-risk for most

0:15:26 > 0:15:28people, although it does offer a more secure log-in feature

0:15:28 > 0:15:34called log-in approvals.

0:15:34 > 0:15:36We also asked the British intelligence and security

0:15:36 > 0:15:39organisation, GCHQ, for advice and we were told that the SS7 system

0:15:39 > 0:15:42is old and doesn't have modern security protections built in,

0:15:42 > 0:15:50but they assured us they are working on building up its resilience.

0:15:50 > 0:15:53But why is the SS7 network so open to abuse?

0:15:53 > 0:15:55To find out, I met up with Professor Alan Woodward,

0:15:55 > 0:15:57long time security adviser to Europol.

0:15:57 > 0:16:02We choose a park bench because, well, it just felt a bit spyie.

0:16:02 > 0:16:06A lot of people talk about SS7 having a security flaw in it,

0:16:06 > 0:16:08but it was never designed to be secure because at the time

0:16:08 > 0:16:11it was designed, which was, you've got to remember,

0:16:11 > 0:16:13nearly 40 years ago, the networks inherently

0:16:13 > 0:16:13trusted each other.

0:16:13 > 0:16:16So they didn't think they had to validate talking to each other,

0:16:16 > 0:16:19they just naturally assumed tht they were the only ones talking.

0:16:20 > 0:16:21Can they fix it?

0:16:21 > 0:16:22They could, but I don't think they will.

0:16:22 > 0:16:25It's not within even the law enforcement agencies gift to do

0:16:25 > 0:16:26anything about it.

0:16:26 > 0:16:28Nobody mandates this standard, it's all by agreement amongst

0:16:28 > 0:16:31the telecommunication providers and I don't see them changing it

0:16:31 > 0:16:33any time soon because it's very targeted, so somebody has

0:16:33 > 0:16:35to want to come after you.

0:16:35 > 0:16:38Plus, one of the reasons that some intelligence agencies won't want it

0:16:38 > 0:16:40fixed is because SS7 allows you to be tracked.

0:16:40 > 0:16:43I, personally, would recommend not using SMS because you have to assume

0:16:43 > 0:16:45it could be intercepted and use something like e-mail only

0:16:45 > 0:16:48or ideally move to one of the online services

0:16:48 > 0:17:04which is encrypted.

0:17:06 > 0:17:07You're crazy, old man.

0:17:07 > 0:17:08You have no idea.

0:17:08 > 0:17:10Get ready.

0:17:10 > 0:17:11Now, from hacking to tracking.

0:17:11 > 0:17:14We wondered whether it was possible to escape state snooping

0:17:14 > 0:17:16when the Intelligence Services are trying to track your every move.

0:17:16 > 0:17:20Lara Lewington tracked down an ex-spook to find out how you can

0:17:20 > 0:17:30shake off any unwanted attention.

0:17:30 > 0:17:31Listen up.

0:17:31 > 0:17:33The suspect's name is Special Agent Elizabeth Keen.

0:17:33 > 0:17:39She was my partner but, as of today, she's a fugitive wanted...

0:17:39 > 0:17:42OK, it may be a glamourised version, but this scene is only too familiar

0:17:42 > 0:17:45to former MI5 officer Annie Machon, who went on-the-run after quitting

0:17:45 > 0:17:51the secret service to go public on her experiences.

0:17:51 > 0:17:54I suppose we were the sort of 1990s version of Edward Snowdon.

0:17:54 > 0:17:57Tracking someone's whereabouts may not always look as exciting as this,

0:17:57 > 0:17:59but doing so has become easier than ever.

0:17:59 > 0:18:09So how simply can we hide?

0:18:09 > 0:18:11How easy is it, using modern technology, to find out

0:18:11 > 0:18:15where someone is and what can we do to protect ourselves from that?

0:18:15 > 0:18:18Now we're looking at programmes, such as Trap Wire, which was one

0:18:18 > 0:18:20of the disclosures over Wikileaks a few years ago,

0:18:20 > 0:18:23where you get meshing of your GPS, from your phone, facial recognition

0:18:23 > 0:18:25technology via Google and also Facebook photo tagging,

0:18:25 > 0:18:47which can be fed into the CCTV network around the UK.

0:18:47 > 0:18:49So in live-time you can be tracked, you can be photographed,

0:18:49 > 0:18:52you can be idnetified and then, the icing on the cake,

0:18:52 > 0:18:54which is Trap Wire, they've written algorithmic predictive programmes

0:18:54 > 0:18:57and if you're loitering or walking in a suspicion manner,

0:18:57 > 0:18:59and you've already been identified, then you might be

0:18:59 > 0:19:00about to commit a crime.

0:19:00 > 0:19:03You might be about to be a terrorist, so then they can swoop

0:19:03 > 0:19:04and get you.

0:19:04 > 0:19:06The way you walk can be used against you.

0:19:06 > 0:19:09The only way to get around that, as well as disguing yourself,

0:19:09 > 0:19:12is to perhaps put a stone in your shoe, so it forces

0:19:12 > 0:19:13you to walk differently.

0:19:13 > 0:19:16But you said you wanted to know when Mrs Hargrave

0:19:16 > 0:19:17contacted your office.

0:19:17 > 0:19:17Put her through.

0:19:17 > 0:19:18Turn it up.

0:19:18 > 0:19:19You're on with Mrs Hargrave.

0:19:19 > 0:19:22Annie also provides us with a reminder as to how the spies

0:19:22 > 0:19:24can snoop on phone calls and e-mails.

0:19:24 > 0:19:27Since 1998 they have been able to do bulk data hacking,

0:19:27 > 0:19:29which means they can gather all our information,

0:19:29 > 0:19:32be it travel, be it finance, be it health, be it work,

0:19:32 > 0:19:34be it social life on Facebook, whatever, and amalgamate it.

0:19:34 > 0:19:38So our entire lives are just laid open to whoever wants to look

0:19:38 > 0:19:38at that information.

0:19:38 > 0:19:41Now as soon as you do something which might trigger an interest,

0:19:41 > 0:19:45they will specifically look at you - if you get involved in a political

0:19:45 > 0:19:46campaign, or whatever.

0:19:46 > 0:19:48So this is very difficult to try and avoid.

0:19:48 > 0:19:50There are certain tools you can use, the privacy tools.

0:19:50 > 0:19:54In fact, Edward Snowdon has said if you use all of these together,

0:19:54 > 0:19:56and you use them effectively, you can protect your privacy.

0:19:56 > 0:19:58If someone discovers they are being snooped on,

0:19:58 > 0:20:00what should they actually do about it?

0:20:00 > 0:20:03Yes, get a Faraday cage wallet and then lock their phone

0:20:03 > 0:20:05in the fridge or in a biscuit tin overnight.

0:20:05 > 0:20:08The other solution is to go back to the old tech.

0:20:08 > 0:20:10You get pre-2008 computers, you get very old burner phones

0:20:10 > 0:20:15with pre-paid SIMS, and that gives you a fighting chance.

0:20:15 > 0:20:17In terms of the people that we communicate with,

0:20:17 > 0:20:19obviously knowing someone's network and connections is actually

0:20:19 > 0:20:19quite valuable information.

0:20:19 > 0:20:20Hugely valuable.

0:20:20 > 0:20:22I mean, it's probably the key information

0:20:22 > 0:20:23for any intelligence agency.

0:20:23 > 0:20:26We would take weeks, if not months, to try and pull together a full

0:20:26 > 0:20:29picture of a target's networks and who they're in relationships

0:20:29 > 0:20:31with, what their activities are and where they live,

0:20:31 > 0:20:34where they work and where they go, and that was very,

0:20:34 > 0:20:35very resource intensive.

0:20:35 > 0:20:36It could involve human agents.

0:20:36 > 0:20:38It could involve mobile surveillance, teams following them

0:20:38 > 0:20:42around a city.

0:20:42 > 0:20:45Now, of course, they can just could do it by triangulating

0:20:45 > 0:20:48information by hacking all our information on the internet,

0:20:48 > 0:20:49and they've got us.

0:20:49 > 0:20:51Only recently Edward Snowdon has been involved in designing a phone

0:20:51 > 0:20:54case aiming to track when data is being sent or received,

0:20:54 > 0:20:56so a user can tell if it's happening unexpectedly.

0:20:56 > 0:20:59This may all sound a bit extreme to most of us,

0:20:59 > 0:21:02but if you ever do need to go under the radar,

0:21:02 > 0:21:04at least now you may know how.

0:21:04 > 0:21:10Um...very useful to know.

0:21:10 > 0:21:13But then there are those people who've actually put themselves under

0:21:13 > 0:21:15surveillance without realising they're on show to everyone.

0:21:15 > 0:21:17This is backdoored.io, an exhibition filled with images

0:21:17 > 0:21:19from webcams whose passwords haven't been changed from admin.

0:21:19 > 0:21:21It's funny what people put security cameras

0:21:21 > 0:21:34on, though, isn't it?

0:21:34 > 0:21:35Yeah.

0:21:35 > 0:21:36That's been one of the really interesting insights.

0:21:36 > 0:21:39I mean, here people are watching their laundry,

0:21:39 > 0:21:42so you can just imagine, you know - is my laundry dry?

0:21:42 > 0:21:43I'll just go and check the security camera.

0:21:44 > 0:21:45I've got one of plugs.

0:21:45 > 0:21:46Is that plug still plugged in?

0:21:46 > 0:21:53You know?

0:21:53 > 0:21:55Artist Nye Thompson and curator Kosha Hussain have sifted

0:21:55 > 0:21:57through 7,000 images which have been collected by search engines

0:21:57 > 0:21:58from unprotected cameras.

0:21:58 > 0:22:02Why have you got a whole area dedicated just to one street in Hong

0:22:02 > 0:22:05Kong?

0:22:05 > 0:22:08So when the images come in, they all come in with geolocation

0:22:08 > 0:22:16data, so you can actually pinpoint where they are,

0:22:16 > 0:22:18and I noticed there was a disproportionately large number

0:22:18 > 0:22:20of images coming in from just this one location.

0:22:20 > 0:22:22I think somebody just blanket installed surveillance cameras

0:22:22 > 0:22:23in this tower block.

0:22:23 > 0:22:26You know, the same person did all of them and they didn't really

0:22:26 > 0:22:39know what they were doing.

0:22:39 > 0:22:43Many of us use webcams to monitor the things that we're anxious about,

0:22:43 > 0:22:45but I wonder how anxious these people would be if they knew

0:22:45 > 0:22:47who was really watching?

0:22:47 > 0:22:57That's it from Wing Lee Street in Hong Kong.

0:22:57 > 0:22:59On behalf of the residents, thank you for watching,

0:22:59 > 0:23:01even though I don't think they realise.

0:23:01 > 0:23:04And curiously, over the next two weeks, we are going back to China

0:23:04 > 0:23:07with another chance to see two of our China programmes

0:23:07 > 0:23:16from earlier this year, as we take a well-deserved summer break.

0:23:17 > 0:23:19'Made in China' is becoming 'designed in China'.

0:23:19 > 0:23:22That's going to cost him at least a minute.

0:23:22 > 0:23:24Underneath that helmet, he's going to be absolutely fuming.

0:23:24 > 0:23:27So, China, one and two, coming in the next fortnight.

0:23:27 > 0:23:29In the meantime, follow us on Twitter, as always, @BBC Click.

0:23:29 > 0:24:09Thanks for watching and we'll see you soon.

0:24:20 > 0:24:22THEME PLAYS.