Top hacker shows us how it's done | Pablos Holman | TEDxMidwest

TEDx Talks
30 Aug 201217:50

Summary

TLDRIn this engaging talk, the speaker, a hacker, demonstrates the vulnerabilities of everyday devices, including hotel TVs, Wi-Fi networks, and car key fobs, to highlight security flaws. He showcases inventive projects like 'Hackerbot' and 'Sniper Yagi', illustrating how easily data can be compromised. With humor, he also discusses the potential of applying hacking skills to solve global issues like malaria, showing a laser system that targets mosquitos, and emphasizing the need for a hacker mindset in science and technology.

Takeaways

  • πŸ˜„ The speaker demonstrates how a hacker can manipulate a hotel room's television to access and control various functions, including free movie streaming and video games.
  • πŸ” The speaker reveals the potential to spy on guests through the hotel TV system, highlighting the privacy risks associated with networked devices.
  • πŸ€– 'Hackerbot' is introduced as a robot designed to locate Wi-Fi users, emphasizing the accessibility of personal data in public spaces.
  • 🎯 The 'Sniper Yagi' device is showcased for its ability to intercept wireless signals from a mile away, underlining the vulnerability of Wi-Fi networks.
  • πŸ“± A project with Ben Laurie is described, where Bluetooth traffic at a conference was logged to track attendees' movements, showcasing the feasibility of passive surveillance.
  • πŸ—ΊοΈ The speaker humorously points out the ability to track Kim Cameron, a Microsoft executive, without his knowledge, illustrating the intrusiveness of surveillance techniques.
  • πŸ“ž A humorous anecdote about voicemail hacking is shared, emphasizing the ease with which everyday technology can be compromised.
  • πŸ‘Ύ The MySpace 'Samy' worm is discussed as an example of how social engineering can lead to widespread security breaches.
  • πŸ” The speaker discusses the potential for car key codes to be manipulated, raising concerns about the security of physical access systems.
  • 🏠 The security of smart home devices, like locks, is questioned as the speaker demonstrates how easily a common lock can be picked with the right tools.
  • πŸ’³ The speaker warns about the security flaws in RFID-equipped credit cards, showing how they can be easily read from a distance.

Q & A

  • What is the primary focus of the speaker's talk?

    -The speaker's talk primarily focuses on the potential for hackers to exploit various technologies, including hotel televisions, wireless networks, and everyday devices, to gain unauthorized access and control. They also discuss the security implications of these vulnerabilities.

  • How does the speaker demonstrate the vulnerability of hotel televisions?

    -The speaker demonstrates the vulnerability of hotel televisions by using an infrared transceiver to send codes that the TV remote might send, enabling them to control the TV and access additional features such as free movies and games, and even spy on other guests' activities.

  • What is the 'Hackerbot' project mentioned in the script?

    -The 'Hackerbot' is a robot built by the speaker that can drive around and find Wi-Fi users, then drive up to them and display their passwords on a screen, illustrating the potential for hackers to uncover sensitive information.

  • What is the 'Sniper Yagi' and its purpose?

    -The 'Sniper Yagi' is a long-range password sniffing device that can monitor wireless networks from about a mile away, used to demonstrate the passive surveillance capabilities of hackers.

  • How did the speaker track Bluetooth traffic at the 'Computers, Freedom and Privacy' conference?

    -The speaker placed a computer in each room of the conference that logged all the Bluetooth traffic. By correlating this data, they were able to create a map showing the movements and interactions of conference attendees.

  • What is the significance of the speaker's MySpace story involving Samy and Christopher Abad?

    -The speaker uses the MySpace stories to illustrate how hackers can exploit social media platforms for personal gain, such as automatically adding friends to increase popularity or using AI to filter potential dating prospects.

  • How does the speaker demonstrate the insecurity of car key fobs?

    -The speaker shows that by manipulating the key fob's code, it is possible to open every car from a specific manufacturer, highlighting the lack of security in these systems.

  • What is the Schlage lock demonstration about?

    -The Schlage lock demonstration is about how easily a lock can be picked using a simple tool and a mallet, emphasizing the vulnerability of common security measures.

  • What is the purpose of the USB thumb drive mentioned in the script?

    -The USB thumb drive mentioned in the script is a device that, while appearing to be a regular storage device, secretly makes a backup of sensitive data from the host computer, such as documents, browser history, and password databases.

  • How does the speaker expose the vulnerabilities of RFID credit cards?

    -The speaker exposes the vulnerabilities of RFID credit cards by demonstrating how easily the card's information can be read by a nearby device, showing that the 'secure' cards are not as secure as they claim to be.

  • What is the speaker's stance on the mindset of hackers?

    -The speaker views the hacker mindset as being highly valuable for discovery and innovation. They argue that hackers are optimized for figuring out what's possible and can apply this mindset to solving significant problems in science and technology.

  • What project is the speaker working on to combat malaria?

    -The speaker is working on a project that uses a laser system to track and eliminate mosquitos, particularly those carrying malaria. The system uses consumer electronics to detect, identify, and destroy the mosquitos, with the goal of reducing the spread of malaria.

Outlines

00:00

😲 Hacking Hotel Rooms for Fun and Surveillance

The speaker, a hacker, demonstrates how to exploit the television in a hotel room as a node on a network. By using an infrared transceiver, they can control the TV to watch movies for free, play games, and even spy on other guests' TVs. They can observe sensitive activities like online banking and personal data. The speaker also introduces 'Hackerbot', a robot designed to locate Wi-Fi users and display their passwords, and the 'Sniper Yagi', a device for long-range password sniffing. They discuss a project mapping Bluetooth traffic at a conference to track attendees' movements and interactions, highlighting privacy concerns in public spaces.

05:04

πŸ˜… Creative Hacking: From MySpace to Car Keys

The speaker shares stories of hackers using creative methods for social engineering. One hacker, Christopher Abad, used a spam filter to sort potential MySpace dates based on past experiences. Another example involves car key hacking, where a device can be used to open any car from a specific manufacturer. The speaker emphasizes the increasing connectivity of everyday devices, like cars and toasters, which brings new security challenges akin to those faced by PCs. They also demonstrate a simple method to pick a common lock using a 'magic key' and a mallet, and offer to give away a keychain that can open many locks, highlighting the vulnerabilities in physical security systems.

10:04

πŸ›’ Security Flaws in Modern Technology

The speaker discusses various security vulnerabilities in everyday technology. They demonstrate how easy it is to hack into USB thumb drives to steal personal data, and how new 'secure' credit cards with RFID chips can be read by simple devices. They also touch on the security of online transactions protected by SSL, showing how hackers can exploit weaknesses in the protocol. The speaker concludes with a call to action for hackers to use their skills to solve major global problems like malaria, suggesting that the same mindset used for hacking can be applied to scientific discovery and innovation.

15:06

🦟 Innovative Solutions to Global Problems: Mosquitos and Malaria

The speaker shifts from discussing hacking to showcasing innovative solutions to global problems, using malaria as an example. They describe how their lab at Intellectual Ventures is developing a laser system to kill mosquitos, particularly the species that carry malaria. The system uses components from consumer electronics and can identify and target specific mosquitos based on their wing beat frequency. The speaker shows a video of the system in action, successfully tracking and 'vaporizing' mosquitos in real-time. They emphasize the potential of this technology to protect humans and crops from mosquito-borne diseases.

Mindmap

Keywords

πŸ’‘Hacker

A hacker, in the context of the video, refers to an individual with advanced computer skills who uses these skills to exploit vulnerabilities in computer systems or networks for various purposes, often unauthorized. The video discusses how a hacker can manipulate hotel room televisions, access personal data, and control other devices, illustrating the potential risks and creative uses of hacking skills.

πŸ’‘Infrared transceiver

An infrared transceiver is a device that sends and receives infrared signals. In the video, it is used by a hacker to emulate a TV remote control, allowing them to control the television in a hotel room. This demonstrates how everyday devices can be hacked to perform unintended functions.

πŸ’‘Wi-Fi

Wi-Fi is a wireless networking technology that allows devices to connect to the internet or communicate with each other wirelessly. The video mentions the use of a 'Hackerbot' to find Wi-Fi users and 'Sniper Yagi' for long-range password sniffing, highlighting the security vulnerabilities in Wi-Fi networks.

πŸ’‘Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances. The video describes a project where Bluetooth traffic was logged in a conference to track attendees' movements and interactions, showcasing how Bluetooth signals can be intercepted and used for surveillance.

πŸ’‘MySpace

MySpace is a social networking service that was popular for connecting with friends and meeting new people. The video references how hackers exploited MySpace's friend system by writing scripts to automatically add friends and manipulate user profiles, demonstrating the potential for social engineering on social media platforms.

πŸ’‘RFID

RFID stands for Radio Frequency Identification, a technology used in contactless systems like credit cards and keyless entry systems. The video discusses the security flaws in RFID-enabled credit cards, where hackers can read and potentially clone the data, indicating the risks associated with RFID technology.

πŸ’‘Laser

A laser is a device that emits light through a process of optical amplification. In the video, the speaker discusses a project where lasers are used to target and eliminate mosquitos, particularly those carrying malaria. This innovative use of lasers highlights the potential for technology to address global health issues.

πŸ’‘Moore's Law

Moore's Law is the observation that the number of transistors on a microchip doubles approximately every two years, leading to faster and cheaper electronics. The video mentions that the mosquito-killing laser system is built from consumer electronics that follow Moore's Law, suggesting that such technology can become increasingly affordable and accessible.

πŸ’‘Malaria

Malaria is a life-threatening disease caused by parasites that are transmitted to people through the bites of infected mosquitos. The video discusses the work being done at the Intellectual Ventures Lab to combat malaria, including the development of a laser system to kill mosquitos, emphasizing the role of technology in addressing global health challenges.

πŸ’‘SSL

SSL, or Secure Sockets Layer, is a standard security technology for establishing an encrypted link between a server and a client. The video references SSL as part of the encryption system in web browsers that protect sensitive data like credit card information. The speaker also discusses how hackers attempt to exploit vulnerabilities in SSL protocols, indicating the ongoing battle between security measures and hacking attempts.

πŸ’‘Hacking mindset

The hacking mindset refers to the approach of thinking creatively and critically to discover and exploit vulnerabilities or to innovate and solve complex problems. The video emphasizes the importance of this mindset in both the hacking community and scientific research, where it is applied to tackle challenges like malaria and develop novel solutions.

Highlights

A hacker can control a hotel room's television remotely using an infrared transceiver.

The speaker can watch movies for free and play video games by hacking into the hotel TV system.

It's possible to control another guest's TV and monitor their activities in the hotel room.

The 'Hackerbot' is a robot designed to find Wi-Fi users and display their passwords.

The 'Sniper Yagi' is a device for long-range password sniffing, capable of monitoring wireless networks from a mile away.

A project with Ben Laurie involved mapping conference attendees' movements and interactions using Bluetooth tracking.

The speaker demonstrated the ability to track Kim Cameron, Microsoft's Chief Privacy Architect, without his knowledge.

A humorous phone call scenario where the speaker pretends to access someone's voicemail.

A MySpace user named Samy used JavaScript to automatically add visitors as friends, quickly amassing over a million friends.

Christopher Abad used a spam filter to analyze MySpace profiles and suggest potential dates.

Car thieves can use remote key fobs to open and steal cars, highlighting a security flaw.

The speaker suggests that as more devices become computerized, they inherit the security issues of PCs.

A Schlage lock can be easily picked with a simple technique, undermining its perceived security.

USB thumb drives can be rigged to secretly back up data from any computer they are plugged into.

New credit cards with RFID chips can be easily read by hackers, compromising card details.

The speaker proposes using hackers' skills to solve complex scientific problems, like malaria.

A high-speed camera is used to study mosquito flight patterns, which could lead to new methods of mosquito control.

A laser system is being developed to automatically detect and kill mosquitoes, potentially helping to combat malaria.

The Intellectual Ventures Lab works on innovative solutions to some of humanity's most pressing problems.

Transcripts

play00:00

Transcriber: Bob Prottas Reviewer: Ariana Bleau Lugo

play00:11

So this is a hotel room, kind of like the one I'm staying in.

play00:15

I get bored sometimes.

play00:17

A room like this has not a lot to offer for entertainment.

play00:21

But for a hacker, it gets a little interesting because that television

play00:25

is not like the television in your home,

play00:28

it's a node on a network. Right?

play00:31

That means I can mess with it.

play00:33

If I plug a little device like this into my computer,

play00:37

it's an infrared transceiver, I can send the codes that

play00:40

the TV remote might send and some other codes.

play00:43

So what? Well, I can watch movies for free.

play00:47

(Laughter)

play00:49

That doesn't matter to me so much, but I can play video games too.

play00:54

Hey, but what's this?

play00:57

I can not only do this for my TV in my hotel room,

play01:01

I can control your TV in your hotel room.

play01:03

(Laughter)

play01:05

So I can watch you if you're checking out with one of these,

play01:07

you know, TV based registration things,

play01:10

if you're surfing the web on your hotel TV,

play01:13

I can watch you do it.

play01:17

Sometimes it's interesting stuff.

play01:19

Funds transfer.

play01:22

Really big funds transfers.

play01:25

You never know what people might want to do

play01:28

while they're surfing the web from their hotel room.

play01:31

(Laughter)

play01:34

The point is I get to decide if you're watching Disney or porn tonight.

play01:38

Anybody else staying at the Affinia hotel?

play01:40

(Laughter)

play01:42

This is a project I worked on when we were trying to figure out

play01:46

the security properties of wireless networks; it's called the "Hackerbot".

play01:50

This is a robot we've built that can drive around and find Wi-Fi users,

play01:54

drive up to them and show them their passwords on the screen.

play01:57

(Laughter)

play02:00

We just wanted to build a robot,

play02:02

but we didn't know what to make it do, so -

play02:05

We made the pistol version of the same thing.

play02:07

This is called the "Sniper Yagi".

play02:09

It's for your long-range password sniffing action,

play02:12

about a mile away I can watch your wireless network.

play02:14

This is a project I worked on with Ben Laurie to show passive surveillance.

play02:18

So what it is, is a map of the conference called

play02:22

"Computers, Freedom and Privacy".

play02:23

And this conference was in a hotel, and what we did is we,

play02:28

you know, put a computer in each room of the conference

play02:31

that logged all the Bluetooth traffic.

play02:33

So as everybody came and went with their phones and laptops

play02:36

we were able to just log that, correlate it,

play02:38

and then I can print out a map like this for everybody at the conference.

play02:42

This is Kim Cameron, the Chief Privacy Architect at Microsoft.

play02:45

(Laughter)

play02:46

Unbeknownst to him,

play02:49

I got to see everywhere he went.

play02:52

And I can correlate this and show who he hangs out with

play02:56

(phone dialing) when he got bored,

play02:58

(phone dialing) hangs out in the lobby with somebody.

play03:00

Anybody here use cellphones?

play03:02

(Laughter)

play03:04

(Phone ringing)

play03:08

So my phone is calling -

play03:12

(Ringing)

play03:17

calling -

play03:23

Voice mail: You have 100 messages.

play03:25

Palbos Holman: Uh oh!

play03:27

VM: First unheard message -

play03:29

PH: Where do I press -

play03:31

VM: Message skipped. First skipped message.

play03:33

PH: Uh oh!

play03:34

VM: Main menu. To listen to your - You have pressed an incorrect key -

play03:38

You have two skipped messages. Three saved messages.

play03:40

Goodbye.

play03:42

PH: Uh oh! So we're in Brad's voice mail.

play03:46

(Laughter)

play03:47

And I was going to record him a new message,

play03:50

but I seem to have pressed an invalid key,

play03:52

so we're going to move on.

play03:54

And I'll explain how that works some other day because we're short on time.

play03:57

Anybody here used MySpace?

play04:00

MySpace users? Oh!

play04:01

Used to be popular. It's kind of like Facebook.

play04:05

This guy, a buddy of ours Samy, was trying to meet chicks on MySpace

play04:08

which I think is what it used to be good for.

play04:10

And what he did is he had a page on MySpace about him.

play04:16

It lists all your friends, and that's how you know

play04:19

somebody's cool is that they have a lot of friends on MySpace.

play04:22

Well, Samy didn't have any friends.

play04:23

He wrote a little bit of Javascript code that he put in his page,

play04:27

so that whenever you look at his page

play04:29

it would just automagically add you as his friend.

play04:32

And it would skip the whole acknowledgement response protocol

play04:35

saying "Is Samy really your friend?"

play04:37

But then it would copy that code onto your page,

play04:40

so that whenever anybody looked at your page

play04:43

it would automatically add them as Samy's friend too.

play04:45

(Laughter)

play04:46

And it would change your page to say that "Samy is your hero."

play04:50

(Laughter)

play04:52

So in under 24 hours, Samy had over a million friends on MySpace.

play04:56

(Laughter)

play04:58

Hey, he just finished serving 3-years probation for that.

play05:03

(Laughter)

play05:05

Even better, Christopher Abad, this guy, another hacker,

play05:09

also trying to meet chicks on MySpace but having spotty results.

play05:13

Some of these dates didn't work out so well,

play05:15

so what Abad did is he wrote a little bit of code

play05:19

to connect MySpace to Spam Assassin, which is an open source spam filter.

play05:25

It works just like the spam filter in your email.

play05:28

You train it by giving it some spam

play05:30

train it by giving it a little bit of legitimate email,

play05:32

and it tries to use artificial intelligence

play05:34

to work out the difference. Right?

play05:37

Well, he just trained it on profiles from girls he dated and liked

play05:41

as legitimate email.

play05:43

Profiles from girls he dated and not liked, as spam,

play05:46

and then ran it against every profile on MySpace.

play05:50

(Laughter)

play05:52

Out spits girls you might like to date.

play05:56

What I say about Abad is, I think, there's like three startups here.

play05:59

I don't know why we need Match.com, when we can have Spam dating?

play06:02

You know this is innovation.

play06:05

He's got a problem, he found a solution.

play06:07

Does anybody use these - bleep - keys for opening your car remotely?

play06:12

They're popular in, well, maybe not Chicago, OK.

play06:16

So kids these days will drive through a Wal-Mart parking lot

play06:19

clicking open, open, open, bloop.

play06:22

Eventually you find another Jetta or whatever just like yours,

play06:25

maybe a different color, that uses the same key code.

play06:29

Kids will just loot it, lock it up and go.

play06:31

Your insurance company will roll over on you

play06:34

because there's not evidence of a break-in.

play06:36

For one manufacturer we figured out how to manipulate that key

play06:39

so that it will open every car from that manufacturer.

play06:43

(Laughter)

play06:44

There is a point to be made about this which I barely have time for,

play06:47

but it's that your car is now a PC, your phone is also a PC,

play06:52

your toaster, if it is not a PC, soon will be. Right?

play06:55

And I'm not joking about that.

play06:57

And the point of that is that when that happens

play07:00

you inherit all the security properties and problems of PC's.

play07:04

And we have a lot of them.

play07:06

So keep that in mind, we can talk more about that later.

play07:09

Anybody use a lock like this on your front door?

play07:12

OK, good.

play07:14

I do too.

play07:15

This is a Schlage lock.

play07:17

It's on half of the front doors in America.

play07:19

I brought one to show you.

play07:23

So this is my Schlage lock.

play07:25

This is a key that fits the lock, but isn't cut right, so it won't turn it.

play07:30

Anybody here ever tried to pick locks with tools like this?

play07:34

All right, got a few, few nefarious lock pickers.

play07:39

Well, it's for kids with OCD.

play07:41

You've got to put them in there, and finick with them,

play07:44

spend hours getting the finesse down to manipulate the pins.

play07:47

You know, for the ADD kids in the house there's an easier way.

play07:51

I put my little magic key in here,

play07:53

I put a little pressure on there to turn it, (Tapping)

play07:55

smack it a few times with this special mallet

play07:59

and I just picked the lock. We're in.

play08:03

It's easy.

play08:05

And in fact, I don't really know much more about this than you do.

play08:08

It's really, really easy.

play08:09

I have a keychain I made of the same kind of key

play08:12

for every other lock in America.

play08:14

And if you're interested, I bought a key machine

play08:19

so that I can cut these keys and I made some for all of you guys.

play08:22

(Laughter)

play08:23

(Applause)

play08:25

So my gift to you, come afterwards and I will show you

play08:28

how to pick a lock and give you one of these keys

play08:30

you can take home and try it on your door.

play08:32

Anybody used these USB thumb drives?

play08:35

Yeah, print my Word document, yeah!

play08:39

They're very popular.

play08:42

Mine works kind of like yours. You can print my Word document for me.

play08:46

But while you're doing that, invisibly and magically in the background

play08:50

it's just making a handy backup of your My Documents folder,

play08:54

and your browser history and cookies and your registry and password database,

play08:58

and all the things that you might need someday if you have a problem.

play09:02

So we just like to make these things and litter them around at conferences.

play09:05

(Laughter)

play09:09

Anybody here use credit cards?

play09:11

(Laughter)

play09:13

Oh, good!

play09:14

Yeah, so they're popular and wildly secure.

play09:17

(Laughter)

play09:19

Well, there's new credit cards that you might have gotten in the mail

play09:22

with a letter explaining how it's your new "Secure credit card".

play09:25

Anybody get one of these?

play09:27

You know it's secure because it has a chip in it, an RFID tag,

play09:31

and you can use these in Taxicabs and at Starbucks,

play09:34

I brought one to show you, by just touching the reader.

play09:37

Has anybody seen these before?

play09:39

Okay, who's got one?

play09:44

Bring it on up here.

play09:45

(Laughter)

play09:47

There's a prize in it for you.

play09:50

I just want to show you some things we learned about them.

play09:53

I got this credit card in the mail.

play09:55

I really do need some volunteers, in fact, I need

play09:58

one, two, three, four, five volunteers because the winners

play10:01

are going to get these awesome stainless steel wallets

play10:04

that protect you against the problem that you guessed, I'm about to demonstrate.

play10:08

Bring your credit card up here and I'll show you.

play10:10

I want to try it on one of these awesome new credit cards.

play10:14

OK.

play10:18

Do we have a conference organizer,

play10:21

somebody who can coerce people into cooperating?

play10:23

(Laughing)

play10:24

It's by your own volition because -

play10:29

This is where the demo gets really awesome

play10:32

I know you guys have never seen -

play10:34

(Inaudible question)

play10:35

What's that?

play10:37

They're really cool wallets made of stainless steel.

play10:41

Anybody else seen code on screen at TED before?

play10:44

Yeah, this is pretty awesome.

play10:47

(Laughter)

play10:51

OK, great I got volunteers.

play10:53

So who has one of these exciting credit cards?

play10:57

OK, here we go.

play10:59

I'm about to share your credit card number

play11:01

only to 350 close friends.

play11:03

Hear the beep?

play11:06

That means someone's hacking your credit card.

play11:08

OK, what did we get?

play11:10

Valued customer and the credit card number and expiration date.

play11:14

It turns out your secure new credit card is not totally secure.

play11:19

Anybody else want to try yours while you're here?

play11:21

Man: Can you install overdraft protection?

play11:24

PH: Beep, let's see what we got?

play11:26

So we bitched about this and AMEX changed it,

play11:28

so it doesn't show the name anymore.

play11:31

Which is progress. You can see mine, if it shows it.

play11:37

Yeah, it shows my name on it, that's what my Mom calls me anyway.

play11:40

Yours doesn't have it.

play11:44

Anyway, so next time you get something in the mail

play11:48

that says it's secure, send it to me.

play11:51

(Laughter)

play11:55

Oh wait, one of these is empty, hold on.

play12:00

I think this is the one, yep, here you go.

play12:03

You get the one that's disassembled.

play12:05

All right, cool.

play12:06

(Applause)

play12:10

I still have a few minutes yet left, so I'm going to make a couple of points.

play12:14

(Laughter)

play12:15

Oh, shit.

play12:16

That's my subliminal messaging campaign. It was supposed to be much faster.

play12:21

Here's the most exciting slide ever shown at TED.

play12:25

This is the protocol diagram for SSL,

play12:27

which is the encryption system in your web browser

play12:29

that protects your credit card when you're sending it to Amazon and so on.

play12:33

Very exciting, I know, but the point is

play12:35

hackers will attack every point in this protocol, right?

play12:39

I'm going to send two responses when the server's expecting one.

play12:42

I'm going to send a zero when it's expecting a one.

play12:45

I'm going to send twice as much data as it's expecting.

play12:48

I'm going to take twice as long answering as it's expecting.

play12:51

Just try a bunch of stuff. See where it breaks.

play12:54

See what falls in my lap.

play12:56

When I find a hole like that then I can start looking for an exploit.

play13:01

This is a little more what SSL looks like to hackers, that's really boring.

play13:06

This guy kills a million Africans a year.

play13:11

It's Anopheles stephensi mosquito carrying malaria.

play13:15

Is this the wrong talk?

play13:17

(Laughter)

play13:19

This is a protocol diagram for malaria.

play13:23

So what we're doing in our lab is attacking this protocol

play13:27

at every point we can find.

play13:29

It has a very complex life cycle that I won't go into now,

play13:32

but it spends some time in humans, some time in mosquitos

play13:36

and what I need are hackers.

play13:39

Because hackers have a mind that's optimized for discovery.

play13:43

They have a mind that's optimized for figuring out what's possible.

play13:47

You know, I often illustrate this by saying,

play13:49

If you get some random new gadget and show it to your Mom,

play13:55

she might say, "Well, what does this do?" And you'd say "Mom, it's a phone."

play13:59

And instantly, she'd would know exactly what it's for.

play14:02

But with a hacker, the question is different.

play14:05

The question is, "What can I make this do?"

play14:09

I'm going to take all the screws out, and take the back off,

play14:12

and break it into a lot of little pieces.

play14:13

But then I'm going to figure out what I can build from the rubble.

play14:17

That's discovery, and we need to do that in science and technology

play14:21

to figure out what's possible.

play14:23

And so in the lab what I'm trying to do is apply that mindset

play14:27

to some of the biggest problems humans have.

play14:29

We work on malaria, thanks to Bill Gates, who asked us to work on it.

play14:34

This is how we used to solve malaria.

play14:36

This is a real ad from like the 40's.

play14:39

We eradicated malaria in the US by spraying DDT everywhere.

play14:44

In the lab what we do is a lot of work to try and understand the problem.

play14:48

This is a high-speed video, we have a badass video camera,

play14:53

trying to learn how mosquitos fly.

play14:56

And you can see that they're more like swimming in air.

play14:59

We actually have no idea how they fly.

play15:01

But we have a cool video camera so we -

play15:03

(Laughter)

play15:05

Yeah, it cost more than a Ferrari.

play15:09

Anyway we came up with some ways to take care of mosquitos.

play15:12

Let's shoot them down with laser beams.

play15:14

This is what happens when you put one of every kind of scientist in a room

play15:19

and a laser junky.

play15:21

So people thought it was funny at first,

play15:25

but we figured out, you know, we can build this out of consumer electronics.

play15:30

It's using the CCD from a webcam,

play15:33

the laser from a Blu-ray burner,

play15:36

the laser galvo is from a laser printer.

play15:40

We do motion detection on a GPU processor

play15:43

like you might find in video game system.

play15:45

It's all stuff that follows Moore's law.

play15:47

So it's actually not going to be that expensive to do it.

play15:50

The idea is that we would put

play15:52

a perimeter of these laser systems around a building or a village

play15:56

and just shoot all the mosquitos on their way in to feed on humans.

play15:59

And we might want to do that for your backyard.

play16:02

We could also do it to protect crops.

play16:04

Our team is right now working on

play16:06

characterizing what they need to do the same thing for

play16:09

the pest that has wiped out about two thirds

play16:12

of the Orange groves in Florida.

play16:18

So people laughed at first.

play16:20

This is a video of our system working.

play16:23

We are tracking mosquitos live as they fly around.

play16:26

Those crosshairs are put there by our computer.

play16:28

It just watches them, finds them moving

play16:30

and then it aims a laser at them to sample their wing beat frequency.

play16:34

Figure out from that, is this a mosquito?

play16:37

Is it Anopheles Stephensi? Is it female?

play16:40

And if all that's true then we shoot it down with lethal laser.

play16:44

(Laughter)

play16:46

So we have this working in a lab.

play16:48

We're working on taking that project into the field now.

play16:51

All this happens at the Intellectual Ventures Lab in Seattle where I work

play16:56

and we try and take on some of the hardest problems that humans have.

play17:01

This is the money shot.

play17:03

You can see we just burned his wing off with a UV laser.

play17:06

He's not coming back.

play17:08

(Applause)

play17:12

Kind of vaporized his wing right there, yeah.

play17:15

They love it. I mean, you know.

play17:18

Never got called by PETA or anyone else.

play17:20

I mean, it's the perfect enemy.

play17:23

There's just no one coming to the rescue of mosquitos.

play17:26

Sometimes we overdo it.

play17:29

So anyway, I'm going to get off stage.

play17:32

This is the Intellectual Ventures Lab where I work.

play17:35

Basically we use every kind of scientist

play17:37

and one of every tool in the world to work on crazy invention projects.

play17:42

Thanks.

play17:43

(Applause)

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Hacking DemosCybersecurityTech InnovationHotel HackingWireless NetworksPrivacy ConcernsGadget HacksData SecurityInfrared TechSmart Devices