SURVEILLANCE

Videos

Cyberwar / Extra Scene
2:34

Hacking Critical Infrastructure

We ask an Industrial Control System expert how they detect hackers and what can be done once a network is compromised.
Cyberwar / Extra Scene
0:53

The Economic Toll of China’s Cyber Espionage

Bill Evanina explains how the U.S. has lost an estimated 400 billion dollars in the form of economic espionage by Chinese hackers.
Cyberwar / Extra Scene
1:12

Why Your Phone Is Safer Than Your Computer

Ben finds out why a phone is more secure than a computer.
Cyberwar / Extra Scene
3:14

How to Unlock a Laptop Using an NSA Tool

Hacking like the NSA isn't that hard.
Cyberwar / Extra Scene
2:16

Talking to a Former Member of Israel’s Cyber Spy Agency

Ben talks to a former veteran from Israel's cybersecurity and intelligence team known as Unit 8200.
Cyberwar / Extra Scene
5:45

Hacker ‘Phineas Fisher’ Speaks on Camera for the First Time—Through a Puppet

Ben interviews the hacker on the condition the interview is recreated with a puppet.
Cyberwar / Extra Scene
3:49

Hacking the Internet of Things

John Matherly demos Shodan, a search tool that finds all the unsecure devices connected to the internet.
Cyberwar / Extra Scene
1:43

The Attribution Problem in Cyber Attacks

Bruce Schneier explains the difference between real world attribution and cyber attribution.
Cyberwar / Extra Scene
5:02

Hacking Lessons From geohot

George Hotz (geohot) shows Ben Makuch how to perform a binary exploit.
Cyberwar / Extra Scene
2:45

Hacking a USB Key

Darknet J shows Ben how easy it to take control over a computer.
Cyberwar / Extra Scene
0:57

When a Hacker Goes to Jail

Ben gets prison advice from Christopher Weatherhead aka 'Nerdo'.
Cyberwar / Extra Scene
1:56

MLT on the Future of Hacking

Hacker MLT tells Ben about the security flaws in driverless cars and the future of the UK hacking community.
0106