SURVEILLANCE

Shows

Videos

  • The Law Banning Congressional Insider Trading Isnโ€™t Enough to Stop It

    The law banning members of Congress from insider trading should be upgraded in light of the frantic stock trading on Capitol Hill during the coronavirus pandemic, the billโ€™s author, Senator Kirsten Gillibrand (D-NY), told VICE News. Members of Congress should be banned from owning individual stocks altogether, and the sharing of โ€œpolitical intelligenceโ€ with outsiders should have to be disclosed, Gillibrand said. Her remarks follow waves of outrage over members of Congress selling millions worth of shares before the market tanked over fears of coronavirus. In some cases, those sales came after closed-door briefings about the virus.

  • Hacking Critical Infrastructure

    We ask an Industrial Control System expert how to detect hackers and what can be done once a network is compromised.

  • The Economic Toll of Chinaโ€™s Cyber Espionage

    Bill Evanina explains how the U.S. has lost an estimated 400 billion dollars in the form of economic espionage by Chinese hackers.

  • Why Your Phone Is Safer Than Your Computer

    โ€‹โ€‹โ€‹Ben finds out why a phone is more secure than a computer.โ€‹

  • How to Unlock a Laptop Using an NSA Tool

    Security researcher Joe FitzPatrick shows Ben a demo of SLOTSCREAMER, a NSA spy tool he created from leaked documents.โ€‹โ€‹

  • Hacker โ€˜Phineas Fisherโ€™ Speaks on Camera for the First Timeโ€”Through a Puppet

    Benย interviews hackerย Phineas Fisher on the condition the interview is recreated with a puppet.

  • Hacking the Internet of Things

    John Matherly demos Shodan, a search tool that finds all the insecure devices connected to the internet.

  • Ashley Madison Fembots (Extra Scene)

    In an extra scene from CYBERWAR, Ben Makuch talks to Annalee Newitz about how the fembots were made on Ashley Madison.

  • The Attribution Problem in Cyber Attacks

    In an extra scene fromย CYBERWAR,ย Bruce Schneier explains the difference between real world attribution and cyber attribution.

  • Hacking Lessons From geohot

    In an extra scene fromย CYBERWAR,ย George Hotz (geohot) shows Ben Makuch how to perform a binary exploit.

  • Hacking a USB Key

    Darknet J shows Ben how easy it is to perform a USB exploit and take complete control over a computer.โ€‹โ€‹

  • When a Hacker Goes to Jail

    Benย gets prison advice from Christopher Weatherhead aka ‘Nerdo’.

  • MLT on the Future of Hacking

    Hacker MLT tells Benย about the security flaws in driverless cars and the future of the UK hacking community.

  • National Security and Silicon Valley

    Ben talks to Matthew Prince, CEO of CloudFlare, about meeting with the National Security team and how Silicon Valley companies would approach the threat of violent extremism online.โ€‹

  • Pakistan and the Geopolitical Chess Game

    Pakistan is a vital US ally in one of the world’s most strategically important regions. In an extra scene fromย CYBERWAR, Hamid Mir, journalist and host of “Capital Talk,” explains how the Americans have used his country as a base for surveillance since the 1960s.

  • Cyber Kill Lists

    America builds a global killing machine, using data to identify and take out suspected terrorists. Ben heads to Pakistan to see how the CIA and NSA put together the kill list.