DoDIIS 2017- Teddy Bear Hacking with 11/ yo Cyber Prodigy Reuben Paul

SecureNinjaTV
31 Aug 201709:46

Summary

TLDRAt the Defense Intelligence Agency's conference, 11-year-old Reuben Paul demonstrated hacking a teddy bear to turn it into an eavesdropping device, highlighting the reality of cybersecurity threats from simple electronic devices. Reuben, a cyber expert and CEO of a nonprofit, showcased his skills and emphasized the need for awareness and adaptability in the digital world.

Takeaways

  • 🌐 The Defense Intelligence Agency's (DIA) conference focused on cybersecurity, highlighting the evolving nature of threats in the digital age.
  • πŸ‘Ά Reuben Paul, an 11-year-old cyber expert, demonstrated how a teddy bear could be hacked to become an eavesdropping device, emphasizing that threats can come from unexpected sources.
  • πŸ” Janice Glover Jones, the DIA's Chief Information Officer, emphasized the need to challenge preconceived notions about who poses a threat to our networks and digital infrastructure.
  • πŸ‘¦ Reuben's story began at age six when he started learning about cybersecurity from his father, showing that expertise can be developed at a young age.
  • πŸ’» Reuben used a Raspberry Pi and a computer terminal to hack into the teddy bear, demonstrating the simplicity of tools that can be used for such purposes.
  • 🐻 The teddy bear, named Bob, was hacked to control its LED and audio functions, showing how everyday objects can be manipulated for malicious intent.
  • πŸ“± Reuben showed how he could connect to Bluetooth devices like Fitbit or Apple Watch, illustrating the vulnerability of common smart devices.
  • πŸ”Š The teddy bear was used to record conversations, demonstrating the potential for devices to be used as surveillance tools.
  • 🚨 Reuben discussed the potential for nefarious actors to use such devices to eavesdrop on sensitive conversations or even interfere with medical devices like pacemakers.
  • πŸ‘©β€πŸ’Ό Alicia Webb, the host, thanked Reuben for his demonstration, acknowledging the importance of understanding the ease with which devices can be compromised.

Q & A

  • What was the main focus of the Defense Intelligence Agency's conference in St. Louis?

    -The main focus of the conference was cybersecurity.

  • Who hosted the conference and what is their role?

    -The conference was hosted by Janice Glover Jones, the Chief Information Officer of the Defense Intelligence Agency.

  • Why did Janice Glover Jones bring eleven-year-old Reuben Paul on stage during her opening remarks?

    -Janice Glover Jones brought Reuben Paul on stage to demonstrate the potential of young individuals to understand and exploit cybersecurity vulnerabilities, as he was able to hack a teddy bear to turn it into an eavesdropping device.

  • What is the significance of Reuben Paul's demonstration with the teddy bear?

    -The demonstration signifies that even simple electronic devices, like toys, can be weaponized for cyber espionage and that cybersecurity threats can come from unexpected sources, including young individuals.

  • What is the name of Reuben Paul's nonprofit organization?

    -Reuben Paul's nonprofit organization is called Cyber Shaolin.

  • How did Reuben Paul learn about cybersecurity?

    -Reuben Paul learned about cybersecurity from his father, who trained people on the subject. He started teaching Reuben more advanced topics after realizing his potential for learning cybersecurity during a business call.

  • What is the name of the teddy bear that Reuben Paul hacked?

    -The teddy bear's name is Bob.

  • How did Reuben Paul demonstrate the hacking of Bob the teddy bear?

    -Reuben Paul used a Raspberry Pi to connect to Bob, scanned for the teddy bear's Bluetooth device, and then interacted with its services and characteristics to control the LED and audio recording functions.

  • What are some of the potential malicious uses of a hacked smart toy like Bob?

    -A hacked smart toy could be used to eavesdrop on conversations, record sensitive information, or even interact with other Bluetooth-enabled devices to cause harm, such as turning off a pacemaker.

  • What is the broader message conveyed by Reuben Paul's presentation?

    -The broader message is that cybersecurity threats are diverse and can come from any age group, emphasizing the need for constant vigilance and adaptation to new realities in the digital world.

Outlines

00:00

🐻 Hacking a Teddy Bear for Eavesdropping

In this segment, Alicia Webb from Secret Ninja TV introduces the audience to a cybersecurity conference hosted by the Defense Intelligence Agency's Chief Information Officer, Janice Glover Jones. The conference's highlight was an 11-year-old named Reuben Paul, who demonstrated how to hack a teddy bear to use it as an eavesdropping device. Reuben, who is also a CEO of a cyber nonprofit and a self-taught cyber expert, showcased his skills by hacking a teddy bear named Bob using a Raspberry Pi and a computer terminal. He explained the process of connecting to the bear's Bluetooth services and manipulating its characteristics to control an LED and record audio, which could potentially be used for malicious purposes. The demonstration emphasized the importance of recognizing the potential threats posed by seemingly innocent devices and the need to adapt to the evolving landscape of cybersecurity.

05:01

πŸ” Demonstrating IoT Vulnerabilities with Bob the Teddy Bear

In the second paragraph, Reuben continues his demonstration by showing how to exploit the teddy bear's Bluetooth capabilities for nefarious purposes. He describes the process of connecting to Bob's services and using Python to interact with the device's characteristics. Reuben uses handle 27 to control the LED light, making the heart LED on Bob flash, and then uses handle 12 to send commands, and handles 08 and 02 to record and play back audio. This part of the presentation illustrates the potential for a cyber actor to eavesdrop on conversations or even cause physical harm by hacking into medical devices like pacemakers. The segment concludes with a reminder of the serious implications of IoT device vulnerabilities and the importance of cybersecurity awareness, as Reuben successfully records and plays back a conversation with Bob, proving the concept in a live setting.

Mindmap

Keywords

πŸ’‘Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access. In the video's context, cybersecurity is the central theme, as it discusses the vulnerability of devices like a teddy bear to hacking, which can pose a threat to digital infrastructure. The script highlights the importance of understanding and addressing these threats to maintain the security of networks.

πŸ’‘Eavesdropping Device

An eavesdropping device is a piece of equipment used to secretly listen in on conversations without the consent of the parties involved. In the script, Reuben Paul demonstrates how a teddy bear can be hacked to function as an eavesdropping device, emphasizing the potential for everyday objects to be weaponized for surveillance, which is a significant concern in the field of cybersecurity.

πŸ’‘Hacking

Hacking generally refers to the unauthorized use of computers or technology to gain access to data or systems. In the video, hacking is portrayed through the act of turning a teddy bear into a surveillance tool, illustrating how even a child can exploit vulnerabilities in smart devices to breach security measures.

πŸ’‘Smart Toys

Smart toys are electronic toys that incorporate features such as internet connectivity, speech recognition, or motion sensing. The script uses the example of a teddy bear to represent smart toys, which can be vulnerable to hacking, thus transforming them into potential threats to privacy and security.

πŸ’‘Bluetooth Low Energy (BLE)

Bluetooth Low Energy is a wireless communication protocol designed for devices that require low power consumption. In the script, BLE is mentioned as the technology that allows Reuben to connect to the teddy bear and manipulate it, demonstrating how common wireless technologies can be exploited in cybersecurity threats.

πŸ’‘Raspberry Pi

A Raspberry Pi is a small, affordable computer used for various computing projects. In the video, Reuben uses a Raspberry Pi to connect to the teddy bear and demonstrate the hacking process, showing how accessible and powerful such devices can be in the hands of someone with the right knowledge.

πŸ’‘Python

Python is a high-level programming language known for its readability and versatility. Reuben mentions using Python to write scripts that interact with the teddy bear's BLE services, illustrating how programming skills can be applied to cybersecurity and hacking.

πŸ’‘IoT (Internet of Things)

The Internet of Things refers to the network of physical devices, vehicles, and other items embedded with sensors, software, and connectivity that enable them to collect and exchange data. The script discusses IoT devices like the teddy bear, emphasizing their potential vulnerabilities and the importance of securing them against cyber threats.

πŸ’‘Vulnerabilities

In cybersecurity, vulnerabilities are weaknesses in systems or applications that can be exploited by hackers. The video script discusses how even a young child can find and exploit vulnerabilities in devices like an Xbox or a mobile game, underlining the need for robust security measures in all digital products.

πŸ’‘Cyber Actors

Cyber actors are individuals or groups that engage in cyber activities, which can range from hacking to more sophisticated cyber attacks. The script warns that cyber actors can come in any shape or size, including children, and that they can pose significant threats to digital infrastructure.

πŸ’‘Over-the-Air (OTA) Updates

OTA updates are a method of delivering software updates to devices wirelessly. In the script, Reuben mentions an OTA update service in the teddy bear, which he could potentially exploit to deliver malicious updates, demonstrating another avenue through which devices can be compromised.

Highlights

Alicia Webb, from Secret Ninja TV, attended the Defense Intelligence Agency's worldwide conference focusing on cybersecurity.

Janice Glover Jones, the Chief Information Officer of the DIa, hosted the conference and emphasized the evolving nature of cybersecurity threats.

Eleven-year-old Reuben Paul demonstrated hacking a teddy bear to turn it into an eavesdropping device.

The presentation highlighted the need to challenge preconceived notions about who poses a threat to networks and digital infrastructure.

Sophisticated hackers can use simple electronic devices to gain access to sensitive data.

Young children have discovered vulnerabilities in video game systems and mobile games, indicating that cyber threats can come from any age.

Reuben Paul, at age 11, is the CEO of a cyber nonprofit and a recognized cyber expert.

Reuben's interest in cybersecurity began at the age of six when he started learning from his father.

He founded the nonprofit organization 'Cyber Shaolin' to simplify advanced cybersecurity topics for everyone.

Reuben used a Raspberry Pi and terminal commands to hack the teddy bear, named Bob, demonstrating the process in real-time.

The hacking process involved scanning for devices, connecting to services, and manipulating characteristics to control the teddy bear.

Reuben showed how to make the teddy bear's LED light flash and play audio, indicating its potential as an eavesdropping device.

He also demonstrated how to record audio on the teddy bear without anyone knowing, raising concerns about privacy and security.

The potential misuse of such devices could include recording confidential conversations or even interfering with medical devices like pacemakers.

The presentation concluded with a live demonstration of hacking and recording a conversation with the teddy bear, Bob.

The audience was left with a clear understanding of the ease with which everyday objects can be weaponized in the digital age.

Alicia Webb encouraged viewers to subscribe for more cybersecurity insights and to share their own experiences with IoT devices.

Transcripts

play00:00

are you ready to weaponize a teddy bear

play00:04

secure ninja hi everyone I'm Alicia web

play00:09

secret ninja TV was recently in st.

play00:11

Louis for the Defense Intelligence

play00:13

Agency's dota s-- worldwide conference

play00:15

and not surprisingly the focus of this

play00:17

year's event was cybersecurity the

play00:20

conference was hosted by DI a's chief

play00:21

information officer janice Glover Jones

play00:23

in her opening remarks she brought on

play00:25

the stage eleven-year-old Reuben Paul

play00:27

who was able to hack a stuffed teddy

play00:29

bear

play00:29

to turn it into an eavesdropping device

play00:31

now let's take a look at the

play00:32

presentation and if you're anything like

play00:34

us you're really going to enjoy this it

play00:37

is imperative that we shed our

play00:38

preconceived notions of who poses a

play00:41

threat to our networks and our digital

play00:43

infrastructure today's sophisticated

play00:46

hackers use simple electronic devices

play00:49

like remote-control cars or other smart

play00:52

toys to gain access to our most

play00:54

sensitive data skilled cyber actors

play00:57

don't need to spend years or decades

play00:59

honing or refining their craft to

play01:02

inflict severe damage for example a

play01:06

five-year-old recently found a flaw in

play01:09

an Xbox video game system that allowed

play01:11

him to hack into his father's account in

play01:15

a ten-year-old discovered a new class of

play01:18

bugs in a mobile game allowing her to

play01:20

manipulate the results while these might

play01:24

not sound like dire threats to national

play01:26

security

play01:27

they should be instructive to the

play01:29

digital world we now inhabit malicious

play01:32

cyber actors can come in any shape and

play01:35

size and we must adapt to this new

play01:37

reality I would like to introduce to you

play01:40

someone who personifies this

play01:42

technological information and represents

play01:45

the sophistication of cyber actors he is

play01:49

the CEO of a cyber nonprofit as well as

play01:52

a cyber expert all at the age of 11

play01:55

please welcome Ruben Paul

play01:59

good morning Reuben hey where's Bob why

play02:12

don't you go ahead and get started so

play02:13

Reuben will find Bob that's got lost 11

play02:17

years old you're the CEO of a company

play02:20

you consider yourself a cyber expert and

play02:25

then you do gymnastics yes all at the

play02:30

age of 11 how did you get here well

play02:33

before I answer your question I just

play02:35

wanted to say a big thank you I want to

play02:37

thank my God Jesus Christ for the gifts

play02:39

he has given me and giving me this

play02:40

opportunity

play02:41

I want to thank you miss Glover Jones

play02:43

for letting me share the stage today and

play02:44

I want to thank all the people who are

play02:46

serving today and all the people who

play02:48

have served the veterans and all the

play02:49

attorneys here and I hope one day to

play02:52

serve our nation just like you on the

play02:53

cyber wall

play03:01

now back to your question it all began

play03:05

when I was about six years old and my

play03:10

dad used to train people on

play03:12

cybersecurity so I used to listen in and

play03:15

learn about basic security topics and

play03:17

one day when he goes on a business call

play03:20

he forgot the word firewall so I

play03:22

prompted him from the back and he

play03:24

realized I had a potential for learning

play03:26

cybersecurity so he started teaching me

play03:28

more advanced topics like hacking phones

play03:32

and windows and IOT devices so I started

play03:40

learning and I had to I was simplifying

play03:42

advanced topics down so that anyone

play03:44

could understand them and that's how I

play03:46

came up with cyber Shaolin my nonprofit

play03:48

organization a nonprofit organization so

play03:51

tell us about Bob who's Bob

play03:52

so this chair is Bob meet Bob so Bob is

play03:56

a pair of breeches a silver of breeches

play03:59

that's why I named him Bob he got

play04:01

something to say huh yeah he has a

play04:03

little message for us I just wanted to

play04:07

say hi how are you doing I'm really

play04:11

excited to be here today

play04:12

thanks for the opportunity so what do

play04:16

you use Bob for most people sleep with

play04:18

teddy bears well but I gathered that

play04:20

you're not most people well I'm going to

play04:23

hack into Bob you're gonna hack into Bob

play04:25

yes okay you're gonna show us what you

play04:28

got yes okay so I basically have a

play04:31

Raspberry Pi at any computer I'm

play04:34

connecting through it I'm connecting to

play04:36

it using terminal and just on my Mac and

play04:39

I'm gonna use and I'm just gonna scan

play04:42

for my dog so here you know Wow

play04:53

oh let me turn my phone off happy

play04:56

[Applause]

play04:57

that is a lot of things I see someone's

play05:01

Fitbit charge HR sex someone's device

play05:06

like an Apple watch oh there's Bob let's

play05:08

see him it's at cloud FETs now you make

play05:10

sure it's Bob yes and not general

play05:12

Stuart's phone okay okay I need my job

play05:18

so if you're trying to turn off your

play05:22

Bluetooth devices it's too late so I'm

play05:27

just going to connect to the ver

play05:28

interactively and once I do that I'm

play05:35

going to see these services so the first

play05:41

two are for our on Bluetooth specs and

play05:45

it's basically for interactive

play05:47

interactively connecting between the

play05:49

bear and the device the last one is for

play05:52

over-the-air updates and this one is

play05:55

specific to the manufacturer so what I'm

play05:57

going to do is I'm just going to in each

play06:00

of these services there is

play06:02

characteristics properties that you can

play06:04

use so I'm basically just going to

play06:07

describe the characteristics so once I

play06:11

get this characteristics I see that the

play06:14

I went through each one and there's a

play06:16

specific one handle 27 but I'm gonna

play06:19

actually read handle 28 because that's

play06:21

the description for the handle so when I

play06:24

do it I'm gonna do character - read

play06:26

handle 28 and we get these three or

play06:33

these these numbers that's a hex so I'm

play06:38

just gonna go into Python and put that

play06:39

in a nun exit how did you learn Python

play06:44

I've been taking I have a book at home

play06:48

Python for kids self-taught okay yeah so

play06:54

I have LED so handle 27 controls the LED

play06:58

so basically I'm just going to write to

play07:00

that handle and I'm gonna write handle

play07:04

to handle 2701 so as you see on Bob the

play07:09

LED

play07:10

little heart LED will flash Wow so I'm

play07:16

gonna turn that off and who just wants

play07:17

to see a light turn on I'm gonna make

play07:19

some audio play so I went through each

play07:22

one of these and I found that handle 12

play07:23

is for commands sending commands to the

play07:26

bear and 0 8 is for audio and then 0 2

play07:32

is for a record and it records to slot 1

play07:34

automatically there are few different

play07:35

slots but it what's the saw one so when

play07:38

I enter this command Bob is gonna record

play07:41

everything I say and nobody's gonna know

play07:43

it so once I enter it miss clover Jones

play07:46

it's gonna ask me a question or ask Bob

play07:48

a question I'm gonna answer it for Bob

play07:50

and then you guys are gonna screen

play07:52

notice is awesome ok 3 2 1 hey Bob have

play07:59

you just been hacked yes I was so I just

play08:08

turned it off and to play it back I'm

play08:11

going to t zero eight zero one and I'm

play08:13

gonna play back on slot 1

play08:21

[Applause]

play08:24

[Music]

play08:30

so if you were a nefarious cyber actor

play08:34

what could you do with Bob or any other

play08:37

smart tooth enabled device so I could

play08:41

act theoretically stand out any

play08:42

government Institute base and then

play08:44

connect to a Bluetooth low-energy device

play08:46

like a Fitbit or an Apple watch or

play08:48

something like that and then I could

play08:50

record secretive conversations or if I

play08:52

was or I could stand out a doctor

play08:55

outside a doctor's office and connect to

play08:57

a heart pacemaker and turned it off

play08:59

making some causing some serious damage

play09:02

so ladies and gentlemen what we just

play09:05

witnessed is in about five minutes

play09:08

Rubin here was able to hack into Bob and

play09:12

record our conversations this is the

play09:15

reality of what we live in and we want

play09:18

to say thank you Rubin for coming and

play09:19

sharing with us how easy this is Wow

play09:25

Reubens not just a talented hacker he's

play09:27

a true communicator we're pretty sure

play09:29

he's going to have a nice long career

play09:30

thanks for watching guys be sure to

play09:32

subscribe to the channel so you don't

play09:33

miss anything that we filmed at DotA's

play09:35

2017 leave us a comment below and let us

play09:38

know if you have any toys or IOT devices

play09:40

yourself we'd love to hear about it I'm

play09:43

Alicia Webb and I'll see you next week

play09:44

bye

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
CybersecurityHackingSmart ToysTED TalkYouth ExpertData BreachCyber ThreatsTech EducationCyber AwarenessIoT Devices