Horizon (1964–…): Season 50, Episode 3 - Defeating the Hackers - full transcript

Horizon meets the two men who uncovered Stuxnet, the pioneers of ultra-paranoid computing, a white-hat hacker who showed out how to hack into stand alone cash machines, and explains how companies test resilience.

It's a rather unlikely
group of scientists.

They're experts in codes
and code-breaking...

..leading researchers in the
baffling world of quantum physics.

They may have built the most
advanced computer in the universe.

And together, they're taking on
one common enemy...

..hackers.

The greatest threat today
to the world is the keyboard.

In the past, it may have been
nuclear weapons

or weapons of mass destruction.

Today, we see that same
level of capability being exercised

by lone individuals using
keyboards as opposed to bombs.



Hackers are trying to devise ways
to steal our money,

our identities, our secrets.

The internet is a bad neighbourhood.

How often are ne'er-do-wells
coming by to rattle the door?

In the digital world, they're
rattling the door knobs all the time.

But it's not just criminals.

Recently, the extent of government
eavesdropping has been revealed.

And now, powerful cyber-weapons
are being uncovered.

My mouth was, like, wide open,
going, "Oh, my God.

"Oh, my God. Oh, my God."

In this murky world,
scientists are trying to harness

the laws of physics and mathematics
to protect us from the hackers.

Mat Honan considered himself
to be pretty savvy

when it came to security
and the internet.



But last year, he discovered just
how devious hackers can be.

The first clue that something bad
was happening

came when he tried
to charge his phone.

When I went to plug it in,
the phone had this icon on it,

an iTunes icon and a plug, that's
the same kind of thing that you see

the very first time
you turn on an iPhone.

And so I went to connect it
to my computer and when I opened up

my computer, the screen turned grey
and it asked for a four-digit PIN.

And I knew I didn't have
a four-digit PIN, I hadn't set up

a four-digit PIN.

I grabbed my iPad out of my bag.

And my iPad was also
in this reset state

that wanted a password to proceed

and the password that I knew
should have worked didn't work.

At that point, I knew
that I was being hacked.

That was pretty terrifying.

I didn't know what they were
doing at this point.

I had no idea
what their motivation was.

The whole hack took
less than 45 minutes.

By five o'clock, basically, my entire
digital life was wiped out.

Every device I own, everything
I had had been taken over

and almost all of it
completely deleted.

Just about every picture
I'd ever taken of my daughter,

old emails, emails from people
who were no longer alive even.

All kinds of stuff
that was very precious to me.

Mat thought he was
the victim of a classic hack.

Someone had repeatedly tried
to crack his password

and eventually succeeded.

He went online to write
about what happened

and then unexpectedly,
the hackers got in touch with him.

They saw it, they saw that I had
speculated that they had brute-forced

my password and this hacker
got in touch with me to say,

"No, that's not how we did it."

And at that point, I tried
to strike up a dialogue with them

because I wanted to understand
both how things had happened

and why they had happened.

And I basically made a deal
that I wouldn't press charges

if they told me how it was done.

I was angry. I was scared.
I was concerned.

I was a lot of things like that.

But I also realised pretty quickly
that this was an interesting story

from a journalist's perspective.

For Mat, it wasn't just personal.

He's also a writer
for Wired Magazine.

His hackers had discovered a series
of loopholes in the internet

which taken together,
left him completely unprotected.

It wasn't like they used some
crazy cracking programme

to hack into all my stuff.
They didn't make my password.

They didn't break any encryption.

They didn't do any
of that kind of stuff.

What they did was they socially
engineered all of my accounts.

And social engineering is basically
just a fancy term for a con job.

Basically, you con your way in
to a company's or a person's

security system by making them think

that an attacker is actually
a customer.

The first step was to find a way
of stealing his identity

for one of his many online accounts.

Their way in was a simple phone call
to the online shopping service

Amazon.

They gave Amazon a fake credit card
number and added it to my account.

They hung up. They called Amazon back
and they told them

they were locked out of my account
and gave them the credit card number

they had just added to my account.

Once they did that, they were able to
get a temporary password from Amazon.

It was a simple deception,
but effective.

The hackers now owned
his Amazon account.

They didn't go on a shopping spree.

What they were after were the last
four numbers of his credit card

to pull off the next stage
of the con.

On those recent orders, they could
see the last four digits

of the credit card
that I had used to pay.

At the time, Apple was using
those last four digits

as an identity verification method.

Once they had those,
Apple gave my password reset.

They now owned Mat's
Apple accounts.

Now, they could access pretty much
all of his digital life.

The ultimate prize
was his Twitter account, @mat.

For the hackers, a trophy.

And to keep this prize,
with a few clicks,

they destroyed his digital life.

My computer, my iPhone, my iPad.

They deleted my Google account
so that I couldn't get back in there

and kick them out of the Twitter
account again.

It was an interesting chain.

They went from Amazon to Apple
to Google to Twitter.

These hackers knew
the security flaws of the net

and how to use them,
one after another,

to pull off this con.

And they were just teenagers.

It's just online vandalism.

They thought that this was going
to be funny and they were teenagers,

so they didn't think about the
implications of deleting
everything someone owns

and how much precious data
you may have in your life.

Data's quite precious to people now,

it's valuable
and they didn't really see that.

What happened to Mat
is now rather routine.

Credit card stolen,
social media accounts broken into.

These loopholes are now fixed,

but in the anonymous realm
of the internet,

there will always be ways
to steal someone's identity.

But if you thought the havoc that
a couple of teenagers can wreak

is unsettling, wait till you
see what the big boys can do.

It was probably the most
sophisticated hack in history

and it could have gone
completely unexplained...

but for cyber-security experts
Eric Chien and Liam O Murchu.

Right from the word go, there was
just red flags going up everywhere.

You can really feel it. The hairs
on the back of your neck stand up

if it's something
really, really big.

Their job is to investigate
the viruses that pop up

on your computer.

Most malicious software they see
is pretty run-of-the-mill.

But then along came Stuxnet.

This was probably the biggest puzzle
we'd ever seen.

There was no way we were going
to step away until we understood

what was happening with this
particular piece of malware.

Back in 2010, they had no idea
of the significance

of what had just landed
on their desks.

They were just curious because
Stuxnet contained something rare -

a zero-day exploit.

That's a flaw in the code
that no-one is aware of.

Zero days are extremely uncommon.

For Microsoft Windows, there was
only 12 zero-days in all of 2010.

Four of those 12
were inside of Stuxnet.

It was the most sophisticated code
they had ever seen.

And it was dense. Every bit
of code in there was code

that was doing something.

Much of it was written in
a strange programming language.

What we discovered were
big chunks of code

that we just did not recognise.
We had no idea what it was.

We realised it was code for PLCs,

Programmable Logic Controllers,
which are small computers

that control factory equipment
and things like power plants.

Every time Stuxnet infected
a new computer,

it would start hunting
for one of these Programmable
Logic Controllers.

Then it would fingerprint them.
It had to be the right model,
have certain key magic numbers,

the right peripherals,

or things attached to those PLCs
had to have the right hardware.

Once it found that, it would
copy itself onto the PLCs

and then just sit there for a while.
They'd actually sit there

for almost a month just watching
what was going on.

And it had to observe what
it believed was normal operation

of the targeted plant,
of the targeted facility.

Our first theory was that this was
actually trying to commit espionage.

It was trying to steal
design documents

and some sort of industrial
control facility.

But when they discovered
where Stuxnet was spying,

things took a sinister turn.

Basically, when Stuxnet
infects a machine,

it contacts a server to say,
"Look, I've infected a machine."

And we were able to get access
to the logs on those machines

to find out where the most
infections were and it was in Iran.

And so that gave us a hint
that it was trying to attack

something in Iran.

Iran was suspected to be concealing
a nuclear weapons programme.

Now, Eric and Liam had a clue to
what Stuxnet could be hunting for.

But the final piece
of the puzzle came

when they realised two ID numbers
held huge significance.

And then in November, we got
a tip-off from a guy in Holland

who was an expert
in the communication protocol

between the PLCs and the peripherals
that are attached to it.

He had mentioned, "Hey,
you know these peripherals,

"they all have these magic IDs
associated with them

"and there's a catalogue that you
can go look up, these magic IDs."

It would turn out to be the defining
moment of their investigation.

There was quite a moment.
I mean, Liam was searching online

and I was just standing behind him
watching what was coming up

on the screen and when it first
came, immediately there was...

I felt a rush of blood to my face

because I was like,
"Oh. This is not good."

They realised that
they'd stumbled across something
of global significance.

My mouth literally dropped. People
say that, but it literally dropped.

My mouth was wide open, going, "Oh,
my God. Oh, my God. Oh, my God."

The magic numbers were IDs
for frequency converters,

devices which change
the speed of machinery.

But these were specific models
with a dedicated task -

they spin centrifuges
in nuclear facilities.

I was just like, "Oh, no. This is
it. It's uranium enrichment.

"It's nothing else."

By matching up clues
from the code to data

from the International
Atomic Energy Agency,

they could even narrow it down
to one specific nuclear plant,

A place called Natanz.

Once the network was infected,

Stuxnet's devious attack
was designed to unfold like this.

It would then, basically,
try to attack mechanisms.

One is it would speed up
the centrifuges to 1,410 hertz...

..which would cause those aluminium
tubes inside of the centrifuges

to vibrate uncontrollably
and to shatter apart.

And the other was to lower
the speed to two hertz.

So, you can imagine
a kid's top that you spin

and when it gets really slow,
it begins to wobble and fall over.

As the centrifuges span out
of control, Stuxnet would start

to play back data it had recorded

when everything
was working normally.

It's like you see in the movies
where there's a guy watching

CCTV cameras and they patch
in fake footage,

so that the security guards
don't realise

they're currently robbing the safe.
It's exactly what Stuxnet did,

but sort of in this virtual
computer environment.

But the final trick would come

when the operators tried
to shut down the plant.

When they tried to hit
their big red button

that would send a signal
to those PLCs to tell the system

to shut down gracefully.

But Stuxnet infected those PLCs
and cut off that signal

and basically, allowed the attack
to continue to operate.

And it seems to have worked.

Stuxnet reportedly destroyed
around 1,000 centrifuges,

setting Iran's nuclear programme
back by about two years.

But there's one rather important
question left -

who built Stuxnet?

I guess the realisation for me was,

this is not hackers in their basement
who are doing this.

This is the big guns here
who are doing this.

We don't have, unfortunately,
any evidence that tells us
if it's any particular country.

I would say that
it's pretty clear to us

it's at the level of a nation state

and pretty clear someone
who is not an ally of Iran.

And politically motivated to stop
uranium enrichment in Iran,

so that narrows it down,
pretty much narrows it down.

No-one has officially admitted
to being behind it,

but it's been widely reported
that Stuxnet was built by the US

with help from Israel...

..something that neither
country has denied.

Eric and Liam have managed
to take part and understand

the world's first cyber-weapon.

Stuxnet was definitely
a seminal moment.

It really opened Pandora's box.

Before Stuxnet occurred,
people weren't really

practically thinking about
the existence of cyber warfare,

of malicious programmes being able
to literally blow things up.

Stuxnet opened that door and
every country today is talking

both about offence and defence now

on nation to nation,
state cyber-warfare.

In today's digital world, no-one's
quite sure who is hacking who...

..whether it's criminals, teenagers
or even governments.

But with so much at stake,
it's not surprising that

some of the most inventive minds
in science are trying
to make it secure...

..hoping to stay one step
ahead of the hackers.

This man spends much of his time
trying to understand

the murkier world of the internet.

He's worked with
some of the world's largest

and most secretive organisations,
trying to protect their secrets.

He started off life
as a mathematician

and became fascinated with the world
of codes and code breaking.

We've never actually been at a time
where codes were more important.

Almost everything you do today
uses a code.

Every time you log onto an internet
service like Twitter or Facebook

and send your password, every time
you log into internet banking,

all of that information is
protected using encryption code.

Codes have long fascinated
mathematicians

because they are some
of the most beautiful

and addictive problems
they can wrestle with.

And at the heart of everything
that we do on the web

is one sort of number -

prime numbers.

We're surrounded by them every day.

Numbers like seven

and 13.

What's so special about them is that

they can only be divided
by themselves and by one.

But what makes them
so important to codes

is when you combine two of them.

If you take two prime numbers
and multiply them together,

you get something
called a semiprime.

What's interesting about semiprimes
is that it is really difficult

to calculate the numbers that could
have been multiplied together

to form them to get back
to the original values.

Here's an example.

If you multiply two primes
like 11 and 13,

you get 143. That's the easy bit.

But if you're given 143
and you've got to work out

the two original primes,

that takes a long time
to figure out.

Easy multiplication one way
and hard the other.

This is the key to internet codes.

You can make a big semiprime
very quickly,

but try to calculate the two primes
that it's made of

takes a very long time.

So it's a bit like un-frying an egg.
Easy one way, really hard the other.

And the bigger the number,
the longer it takes.

It takes mere seconds to go one way,
but the other way would take

thousands of computers
millions of years.

It's something we all use every day.

A big semiprime is
used as a code word, a key,

to scramble your credit card details
when you buy something online.

But only you and your bank know
the two original primes

that can unscramble it.

These keys are private and secure

because it would take longer
than the age of the universe

for any hacker to figure them out.

This system of public
and private keys

is known as the RSA algorithm.

So that beautiful piece
of mathematics

has fundamentally changed
the world around us.

Without this technology, without
the ability to look up public keys

and form these connections, internet
banking, social media, stock trading,

all the things we take for granted
online, fundamentally wouldn't work.

Our information would be far too
accessible to any prying neighbour.

It's made the hunt for very,
very large prime numbers

one of the most important
quests in maths.

And here's the current largest...

all 5,000 pages of it.

17.5 million digits.
A very big prime number indeed.

Yet divisible
only by itself and one.

But as prime numbers get bigger,

so do the computers
trying to crack them.

All the time, computers
are gaining in power.

All the time, new mathematical
methods are being discovered.

So far, we've stayed ahead
of the code crackers.

But that could just be
a matter of time.

Codes like RSA are effectively
uncrackable

because however powerful
today's PCs are,

they can only process
one computation at a time.

But now scientists are working
on a new form of computer

that harnesses the most complex
physics in the universe.

The world we are all used to
is a rather reassuring place.

The laws of physics mean
we can know where things are,

how fast they are moving

and predict where
they're going to go.

But as things get smaller,
a lot smaller,

they also get a whole lot weirder

as you enter the world
of quantum mechanics.

Quantum is like trying to see music.

It's like even trying to hear
colour. It's very weird.

It's the world that Erik Lucero
studies every day.

Take a single grain of sand
and in that single grain of sand,

there are billions
and billions of atoms

and what we're interested in
is looking at what happens
with a single atom.

These kinds of scales are
where nature shows itself

in a completely different way

and that is this quantum
mechanical nature.

The laws of quantum physics have
baffled the greatest scientists,

even Einstein.

At the smallest scales,
the idea that we can know exactly

where anything is
starts to break down.

The mathematics that describes
the world of the very small

means things can be in many places
at the same time.

One of the very important features
of quantum mechanics

is this idea of superposition.

Superposition is the idea
that a particle can be both

in one place or another place
at the same time.

We speak about it even in
a binary sense, like zero or one.

It can be both zero and one at the
same time which is a very odd idea.

Superposition means that objects
have no fixed location.

They really are in several places
all at the same time.

Quantum physics may be
mind-bogglingly weird,

but it's starting to be
very useful indeed

and it might be a way for Erik
to crack the world's

most powerful codes.

Here at the University
of Santa Barbara,

Erik has constructed
a machine that operates

within this fantastical world.

He's built one of the world's
most advanced quantum computers.

He's harnessed
this quantum weirdness

to design a computer that has
the potential to become

the ultimate code-cracking machine.

But first, it has to get
very, very cold.

We have a dilution refrigerator
and this base plate right here

is what gets a fraction above
absolute zero -

orders of magnitude
colder than space.

All of this machinery exists just
to cool down the computer chip,

the processor.

So, inside of this
specially-engineered box,

we have a quantum processor,
a solid-state quantum processor.

On this chip, there are four cubits.

The cubits themselves are what
are performing the calculation.

Classical computers use data in
the form of bits,

each a zero or a one.

But quantum bits, called cubits,
use the feature of quantum physics

that means things can be
in two places at once.

It can be a zero and a one
and everything in-between

all at the same time.

This gives it the power to do
many calculations simultaneously.

We mount this quantum processor
onto the base plate here

and we then make all these
electrical connections.

Then we're able to move
the quantum information

all around that chip
and actually extract the answer.

From a scientist's point of view,
it's a very exciting tool

that we can probe nature.

It's so fast that it could be
the kind of computer

that finally cracks
RSA encryption.

To prove it in principle, Erik
used his computer to find

the two prime numbers making up
a small semiprime.

And so it's sort of
at the level of technology

that I would say is maybe
like an Atari.

It's kind of 8-bit technology.

It was a very neat toy problem
and we tried to find,

using a quantum processor,
the factors of 15.

I'll let everyone think
about that for a minute,

but that is probably something that
we all can do, even in grade school.

And it took me seven years
to get my physics PhD to do that

with a quantum processor.

What's remarkable is not the answer,
but the way the computer does it.

The quantum chip considers
every possible solution

all at the same time,
instead of sequentially.

And you're collapsing to this
one answer that will actually be

the answer you're after
which is a huge speed up.

You explore all of these possible
places and possible answers

and you get the one that you want.

And we learn, yes, indeed,
15 = 3 x 5.

Erik's proved that quantum computing
has the potential to smash

the codes that protect the internet.

It blows the doors off
of RSA encryption.

All we need is more and more cubits.
We just need a larger
quantum computer.

Really, all that's left
to do is to scale up

this particular architecture.
It's a big task

and there's a lot of very,
very bright people

that are all working towards that.

I think that what's exciting
is that it really puts

kind of a milestone in the ground
about where things are

and what we need to do next.

You do realise you've broken
the internet now?

Oh, yeah. I'm sorry about that.

For now, at least, the web survives.

But if quantum computing
holds the possibility someday

of breaking the world's
most-secure codes,

it may also provide an even cleverer
way of keeping secrets safe.

Quantum mechanics is funky in a kind
of James Brown kind of way.

Very, very funky.

It's strange and counter-intuitive.

Seth Lloyd runs the

Center for Extreme Quantum
Information Theory at MIT.

It's sometimes hard to appreciate

just how extreme this research
can be.

Quantum computers are particularly
fine for teasing out

the subtle interactions between
atoms and molecules

in elementary particles,

or for simulating what
happens as a black hole collapses.

Or, for that matter,
a recent experiment that we did to

actually implement
a version of time travel.

So, you can use quantum computers
for all kinds of exciting things.

And you can use the laws of quantum
physics to create the ultimate

way of sharing secrets.

Current codes that are used to send
information securely over

the internet are called
public key codes,

and they could be broken
by a quantum computer.

But quantum mechanics also supplies
methods for communicating

securely in a way that's
guaranteed by the laws of physics.

So, these methods go under
the name of quantum cryptography.

It's really a way of telling

if someone is eavesdropping
on your conversations.

In the weird world of the very
small,

things can be in more than
one place as once.

But all that changes at the moment
that you actually look

and measure where something is.

It's known as the 'Observer Effect'.

One of the basic principles
about quantum mechanics is that,

when you look at something,
you change it.

And this simple feature
allows you to communicate in a way

that's provably secure.

But the reason it's useful
is that this theory applies to

a photon of light,

which can be used to carry
a message, a one or a zero.

It means that if you were sending
a quantum message,

you can tell
if someone else is observing it.

If there is an eavesdropper
on the line.

A good way to understand quantum
cryptography is to

think of three people -
Alice, Bob and Eve.

Alice wants to send secret
information to Bob

and Eve wants to listen in -
to eavesdrop.

Alice takes her information,
a string of zeros and ones,

or bits, and encodes them on
photons - particles of light.

Now, the encoding is
done in such a way that Eve,

if she looks at these photons,
will inevitably mess them up.

She'll change them in a way that
Alice and Bob can figure out.

So, after Alice has sent
the photons to Bob,

she and Bob can confer to find out

which photons have been
tampered with.

The photons that haven't been
tampered with, the pristine photons,

now constitute a secret key shared
only by Alice and Bob,

whose security is
guaranteed by the laws of physics.

Alice and Bob now have a
secret code word,

one they know no-one had listened
to, which they and only they know,

and they can use this code word to
send their messages.

This system, using the behaviour
of some of the smallest

particles in the universe,
is already being used.

Quantum cryptography is already used
by folks who want extreme security,

by banks and by agencies whose job
is to protect information.

And, nowadays, there are a number
of companies who build quantum

cryptographic systems
and, for a fee,

you too can communicate in complete

and utter privacy guaranteed
by the laws of quantum mechanics.

But whatever the technology,

all codes ultimately have one very
human vulnerability.

No matter what you do with
quantum cryptography,

or any cryptographic system,
there are always going to be...

They are always going to be
susceptible to attack where

Eve ties up Alice and imitates her,

so when Bob thinks he's
communicating with Alice,

he's actually communicating
with Eve.

So, even if you can't crack a code,
it may be possible to get around it.

To pull off an inside job,

whether by someone leaking or
selling secrets.

Perhaps the greatest vulnerability
for anyone trying to keep

a secret isn't the science...but us.

Out there are scientists thinking
dark, paranoid thoughts,

imagining a future where every
computer

in the universe is infected.

Your phone, your laptop,
your work or bank.

In this nightmarish scenario,
the things that scares people most

is not knowing
who is at the other end.

ACOUSTIC GUITAR MUSIC PLAYS

On the face of it, Patrick Lincoln's
real life is rather peaceful...

even content.

But the world that he spends
his life imagining is one in which

threats lurk around every corner.

If you think of it as a neighbourhood
and asking,

"How often are ne'er-do-wells coming
by to rattle the door?"

Trying the doorknob to see
if they can get into your house.

In the digital world, they are
rattling doorknobs all the time.

And therefore I think it is
appropriate for us

to start to be paranoid about what
devices can we really trust

our personal, private,
corporate information to.

And, in the end, moving into an ultra
paranoid mindset where

I can't trust any one device.

He's a leading researcher in a field
called ultra paranoid computing.

Ultra paranoid computing is taking
a point of view that no one

In the past, we've relied
on the unique quality

of a human fingerprint...

..the unique quality of an iris...

but even these things can be stolen.

Unfortunately, those systems
are subject to theft or copying,

so folks can copy a fingerprint

and make something that fools
a fingerprint reader.

Even making copies of irises,
photographs, in some cases,

can fool iris scanners.

So, those are imperfect ways to try
to authenticate that the user

is who they say they are.

So, Patrick turned to a part
of the body that no-one can steal.

He started exploring
whether he could implant

a password into an unconscious
portion of the mind.

Modern cognitive science has found
portions of the brain

that are able to record sequence
information like muscle memory.

The way you learn to ride a bike or
the way to learn to play

a musical instrument, that allows one
to remember long sequences,

but not necessarily have
conscious access to

details of the inside information
in that sequence.

What is the 13th note
of Beethoven's Symphony?

Even if you can play
the symphony on a violin,

you may need to start
at the beginning in order to have

your muscle memory continue through
to that note and then reveal it.

But how do you get
the password in there?

MUSIC: "Eruption" by Van Halen

Now his dark
imaginings are taking shape.

In this paranoid world,

it's not been easy to find
a way of logging on.

But Daniel Sanchez may have found
an intriguing solution.

We have a guitar interface that's

based off of popular rhythm
videogames that people play.

And, essentially, what this is,
is these keys correspond to the

four different
targets on the screen.

The left hand responds to the order
that the circles are scrolling,

and the right hand responds to the
timing. So, essentially,

what you're doing is you're making
a bi-manually coordinated

interception response to the circles
as they cross through the targets.

In other words, using both hands.

The game looks utterly random...

but buried within it is a pattern...

one that repeats nearly 200 times.

Your conscious mind can't
pick it out

but what this is doing is creating
a unique muscle memory.

What we're doing is,
the sequence is repeating.

We don't tell people
the sequence is repeating

and, as they perform
it over and over again,

they become able to perform
a sequence even though

they don't know that they're
learning it.

So, that's how we're able to sort
of store information in people's

brains without them
knowing it's being stored there.

After 45 minutes, the password is
embedded in your muscle memory,

right here in the basal ganglia, a
deep, unconscious part of the brain.

To prove your identity,

you play along with the same
task as before but, this time,

you're actually playing your
password

in your own signature style.

So, essentially, what someone would
do is sit down at a computer

and start performing it. And what
the computer does

is it takes that data and it will
look at their performance

on the trained sequence versus novel
sequences

they've never performed before.

And you can use that information to
say this participant knows

that particular data, or knows that
particular information,

therefore it's Bob. You would have
to know nothing else about them.

It's simply their performance
and their motor abilities that

can tell you who
they are based on what they know.

It may seem strange,

but this could be how you
log on in a paranoid future.

After this entire protocol is done,
a participant will leave

the lab knowing something
they don't know that they know.

That's the password
and the information that we're able

to store that they can't
divulge to anyone else,

and that's essentially how the
cortical cryptography works.

Right now,
were in the grip of a new arms race.

On one side, the code makers
and scientists,

defenders of our digital lives.

On the other side, the hackers
are becoming ever more devious.

Quantum physics and ultra paranoid
computing are just the latest

place where this battle is
being fought out...

..but it is one that is
constantly shifting.

Noisebridge, San Francisco,
a workshop for hackers...

in the original sense of the idea.

A place for pioneers. People taking
apart technology, improving it,

upgrading it, having fun.

But you don't have to look far

to see how connected everything
has become.

Phones with powerful computers,

cars with satellite navigation,

electronic books, even fridges.

And this world of connected
devices is the latest

battleground for the hackers.

Barnaby Jack has been probing
this world

of connected devices,
looking for weakness.

His aim, to hack these
devices before the hackers do.

I've always been doing research,
so I would look at

devices or software,

and I would try and find ways to
break into that code.

And once I found out a way to
break into the code,

I'd write the software that did it.

Hacking proficiently,
I guess I would say,

so I take the same route that
a normal hacker would take

to find these vulnerabilities
and exploit them.

Like any hacker, Barnaby set
out to find the weak points.

The easiest way to bypass
the security systems.

Everyone has wanted to
jump on the wireless bandwagon.

But by going wireless like this,

a lot of people haven't realised the
security ramifications of doing so.

Everything that has a wireless
capability

can potentially be hacked remotely.

So, I decided to look at software
that runs on these devices

because,
once you compromise those devices,

there's a very immediate and real
world effect.

His target was something
we all rely on every day.

Something you might think had
the ultimate security...

Banks.

Or, more precisely, a certain
form of stand alone cash machine.

I decided to look at ATMs because,
you know, they're full of money.

And I looked online,

and I basically just bought them
directly from the distributor.

I took the software off the ATM

and then I reverse engineered
that software,

and I saw that there was a remote
update mechanism.

This was the undefended
part of the system, the way in.

Typically, it would require...

usernames and passwords to access,
but I found a vulnerability which

let me bypass all the username
and password requirements,

and would let me
remotely access the ATM

and upload my own software
anonymously.

Now, the machine was his to control.

It may sound farfetched,
but here's the proof it worked.

And put my software here,
I'd go here and add a group,

so add San Francisco.

I then go ahead and add an ATM,

so I put the name Barnaby's ATM.

So, now I can go ahead and upload
my own software to that ATM.

It connects to the ATM, it sends the
authentication bypass, it succeeds.

And now I could dispense
money from the cassettes,

I could capture people's
credit card details,

I could do all that remotely.

So the software is now uploaded,

so we could go ahead
and issue a remote jackpot command.

That way, anyone near the ATM
at the time can get some money.

So, that could be carried out over
the phone line or over

the...network, whatever it may be.

This flaw, which only affected some
of these sorts of stand alone ATMs,

has, needless to say,
now been fixed.

And Barnaby hopes he gets to these
flaws before the hackers.

We're hoping,
by actually releasing these details

and actually demonstrating
some of these risks,

that the security of these devices
will actually improve quite a bit.

We're working with these
manufacturers to actually

help them improve their codes.

It's estimated there are now over
a billion Wi-Fi-enabled devices,

and hacking and defending
these gadgets

is just the latest battleground.

But perhaps the greatest danger
we face doesn't come from any

one computer, but from
the giant networks

of interconnected computers that

run the most complex
systems on the planet.

From power grids to banking systems
to transport networks.

Because once someone has
hacked one part of it,

they may have hacked
the whole network.

It began with just one computer.

And now it's spreading
through our networks like wildfire.

Power stations are being targeted,

plunging the nation into darkness.

The transport networks are being
targeted, too.

And now the infection is spreading
all across the world.

But this attack isn't real.

It is a simulation being
run by some of Britain's

top cyber security experts.

Cyber security in the UK is
considered to be a tier one threat

alongside terrorism.

This drill is part of a strategy to
pinpoint weaknesses in a network.

They're attacking it to see if,
and where, it breaks.

If we're going to
defend our networks,

we need to understand what an
attacker might do to us.

You need to understand what
the threats are to you,

and you need to understand what
your own vulnerabilities are that

someone might take advantage of.

And if you don't understand what the
attacker might be able to do to you,

you will not develop the best
defences.

The Cyber Range helps us do that.

Once, the only way to test a network
was for a company to attack it

from the inside.

But today, you can come to this
Cyber Range, Europe's first.

This black box is
a kind of internet firing range.

Engineers can programme these 120
computers to create a perfect

mirror image of the company's
global network.

One rack houses their existing
cyber defences,

the other contains the nastiest
malware on earth.

Then the two banks of computers
go to war.

You can emulate a normal day-to-day
email interconnection that

a company would have and,

at the same time, you can
introduce malware into the system.

You can have a look
at the effect it would have.

You can introduce new
software to the system to see how

effective it is against malware.

You can test new intrusion
detection capabilities,

so you can test how well they perform
against intrusions that you

introduce yourself,
all in a safe environment.

The hope is, that by hacking
yourself, you can find those

security flaws and patch them before
a hacker works out how to get in.

Sean McGurk works to protect
America's complex networks,

like power stations
and water companies from attack.

The greatest threat
today to the world is the keyboard.

In the past, it may have been
nuclear weapons

or weapons of mass destruction.

Today, we see that same
level of capability being

exercised by lone individuals using
keyboards, as opposed to bombs.

They can hack into transportation
networks,

into computer networks,
emergency communications networks,

even air transportation are all
susceptible to hackers today.

It's Sean's job to try and find
the unexpected, surprising

weak points that an attacker could
exploit to get into these networks.

What were look at, as far
as vulnerabilities are concerned,

are really three things - people,
processes and technology.

The technology is great.

The encryption is great -
it's very difficult to break.

It takes a tremendous
amount of computing capability,

but the bottom line is

a person can circumvent any layer
of security simply by their actions.

So, in spite of the complex
and sophisticated technology,

once again, it's the people
who are the weak part.

All it can take is something costing
just a few pounds to

get inside the best
protected network.

Removable media is one of the
largest security challenges that we

face today, simply because it
comes in so many shapes and sizes,

so many different forms,

and people are unfamiliar
with its capabilities.

They believe that it's just used to
store files but, unfortunately,

it can also be used to introduce
malicious code

into a network environment.

It may seem unlikely that such
a simple tactic would be effective,

so it's one that Sean was
asked by the US government to test.

When we took as USB stick that had
a corporate logo on it

and placed it in a public area,

we had been a 70 and 80% assurance
that someone would take that

device and insert it
in the corporate network.

When we did the experiment
with a CD ROM

that had the year and pay

and compensation tables just written
with a Sharpie on the disk,

we had almost a 100% guarantee that
piece of media, that CD,

would be introduced
into a corporate environment.

And it is this tactic,
using a removable media device,

which seems to have launched
the world's

most powerful cyber weapon...

Stuxnet.

In 2010, this sophisticated piece
of malware

struck at a uranium enrichment plant
in Iran,

causing significant damage.

This nuclear facility at Natanz
was in a highly secure environment,

cut off from the internet,

but still vulnerable to someone
bringing in a removable

device into the plant.

Whether it was spies or
unwitting accomplices,

we will probably never know.

The challenge with Stuxnet,
for instance,

was it didn't take advantage or try
to break any of the encryption

or the security boundaries,

because it actually exploited
the natural communications

capability of the network.

So, when you plug devices together,
they want to identify each other,

that's part of this plug and play
technology that we use today.

So, these particular individuals
took advantage of that.

They wrote the code to insert into
a network environment

inside the
security perimeter,

so you were already within
the walls of the keep, if you will.

And then it just used
the natural communications

capability of the network,

and it moved from computer
to computer

until it found specifically what
it was looking for.

But nothing in this world of high
stakes hacking...

is quite as simple as it seems...

..because Stuxnet has escaped.

It has now been found
outside its intended target.

What's interesting about Stuxnet

and how we were able to discover
it to begin with is

that it didn't just target
machines in Iran,

it didn't just target
machines in that Natanz facility,

Stuxnet has the ability to
spread to any machine,

any Windows machine across the world.

It has now infected more
than 100,000 machines.

It was never intended to
get in the wild but, unfortunately,

once it did get into the wild,

it demonstrated a level
of sophistication and capability

that up to that point,
no-one had taken advantage of.

This was truly a digital
Pandora's box.

Once it was opened,
you could not put the lid back on.

Stuxnet is now
out in the public domain.

You can take the modules
which are most effective for you

and actually repurpose them,
or retool them,

and launch them
against a private company,

an individual, potentially,
a host nation.

It just depends upon what
your intent and what your desire is.

It highlights the risks of
developing these sorts of weapons.

That they may indeed become
uncontrollable...

and even be used against the nations
that developed them.

There's nothing new about codes
and trying to keep secrets...

..but the advent of global
digital communications

has created a new battleground...

without borders.

One where teenagers...

nation states...

and organised criminals
go head-to-head as equals.

This murky world is
set to become the defining

battleground of the 21st century.

Subtitles by Red Bee Media Ltd