[00:00:00]
Facebook's Cambridge Analytica scandal is
[00:00:02]
fueling the debate over how
to protect digital information.
[00:00:05]
One hacker from Texas is also raising
[00:00:08]
awareness about growing cyber threats,
and he's only twelve years old.
[00:00:14]
Reuben Paul is a 6th grader from Austin.
[00:00:16]
He hacks household items to demonstrate
[00:00:19]
how they can be exploited to spy on or
even harm people.
[00:00:23]
David Beg now recently met the self
proclaimed cyber Ninja who showed him how
[00:00:28]
smart toys can be turned
into listening devices.
[00:00:31]
Hi,
[00:00:33]
everybody.
Ruben Paul is twelve years old,
[00:00:36]
and he's helping to lead
the conversation on cybersecurity.
[00:00:39]
Pretty presenting in the Netherlands
[00:00:43]
shoot advising a tech
conference in Singapore.
[00:00:46]
That was an amazing presentation.
[00:00:49]
And wowing, a crowd full
of executives in Texas.
[00:00:52]
It is important that we need to reinvent
cybersecurity because obviously what we
[00:00:56]
have invested so far is
clearly not working.
[00:00:58]
This cyber Ninja, as he calls himself,
has a second degree black belt in Kung Fu,
[00:01:03]
and he's on a mission to show
how hacking is child's plane.
[00:01:07]
If a twelve year old can do it,
[00:01:09]
what makes it that somebody is a skilled,
actual cyber terrorist?
[00:01:13]
What makes it that they can't do it?
[00:01:15]
This Bluetooth is going into new
autonomous cars, autonomous drones.
[00:01:19]
It's going into medical devices.
[00:01:22]
Paul says that the Bluetooth and WiFi
[00:01:24]
connections that we use almost every day
are extremely vulnerable to hacking.
[00:01:28]
I'll never connect to a public
WiFi that I don't know.
[00:01:31]
Really.
[00:01:32]
Somebody can just hack
into that WiFi network and poison.
[00:01:35]
He showed me firsthand how a hacker's
poison can spread from a Wi Fi signal.
[00:01:39]
I successfully know your password. How do
[00:01:42]
you know my hacked you?
Your login was David Comes?
[00:01:51]
Yeah, let's bleep that out.
[00:01:54]
Wow.
[00:01:56]
So call me Gullible.
[00:01:58]
You got me.
It took seconds.
[00:02:00]
He had my Twitter username and password
[00:02:03]
using a fake page that he'd cloned after
I connected to his public WiFi network.
[00:02:09]
It's that easy.
[00:02:10]
So in other words, if I was sitting at a
Starbucks, I went to sign in to Twitter.
[00:02:14]
I put it in.
[00:02:16]
They got it.
[00:02:17]
Now.
[00:02:18]
Staying in touch is easy and fun.
[00:02:21]
Paul also hacked Cloud Pets Teddy Bear.
[00:02:24]
It uses Bluetooth technology,
[00:02:25]
allowing traveling parents to send
messages back to their kids.
[00:02:29]
What did you do that turns
that into a threat.
[00:02:32]
Without any notification or any
[00:02:35]
knowledge of the user,
I could turn it on from my computer,
[00:02:38]
which only has to be in a 30 foot radius
of the bear, so I could stand outside.
[00:02:44]
Someone crazy.
[00:02:45]
He turned the bear into a
secret recording device.
[00:02:48]
How do you get his name?
[00:02:49]
Be? Who's the smartest one in the family?
[00:02:54]
The Paul family of four is hopeful
about the future of cyber security.
[00:02:59]
Ruben's parents, mono and Sanguita,
both work in technology,
[00:03:04]
and his six year old brother, ETA,
is even joining him on stage.
[00:03:08]
Now, can you show us this?
Sure.
[00:03:11]
I talked to another ask when they
shine at it and liking what they do.
[00:03:17]
It gives you a feeling of contentment
with Ruben speaking at these conferences
[00:03:22]
and being paid thousands of dollars
to travel there and sometimes the speakers
[00:03:26]
fee. Do you worry that it gets a little
out of control for a twelve year old
[00:03:30]
from the kids to it because
they have a passion for right?
[00:03:33]
It it should never become a job for them.
[00:03:36]
So if tomorrow they come back and they
say, I'm not interested in doing this.
[00:03:40]
It'S perfectly fine with my wife and I
[00:03:44]
Reuben says in the future.
[00:03:45]
He wants to work for the NSA or the FBI,
[00:03:48]
protecting the country against
foreign and domestic cyber threats.
[00:03:52]
Has anyone called you? I feel like
they should be recruiting you now.
[00:03:55]
I've had some offers from the government
[00:03:59]
of the Netherlands and even
the Department of Defense.
[00:04:03]
Did you tell him what I
got to graduate first?
[00:04:05]
Yeah.
I want to get done with 6th grade first.
[00:04:08]
Before I start thinking about job
for CBS this Morning.
[00:04:12]
I'm David Beck now.
[00:04:14]
And the child shall lead them.
[00:04:16]
We reached out to Cloud Pets
and Spiral Toys.
[00:04:19]
The companies behind the Teddy bear
[00:04:21]
that Paul hacked neither responded to our
requests for comment on its website.
[00:04:26]
Cloud Pets says users acknowledge
[00:04:29]
the company may capture audio recordings
and that it may use or store
[00:04:34]
the recordings and the data
contained within them.
[00:04:37]
Paul set up a nonprofit to create videos
that teach people about cyber dangers.
[00:04:41]
He hopes to one day
study at Caltech or MIT.
[00:04:45]
And he also aspires to be
an Olympic gymnast.
[00:04:49]
That's a busy guy.
[00:04:52]
Well, the NSA.
[00:04:53]
Maybe a phone call away for him, right.
That rare.
Nsa Olympic gymnast to double
majors you never know.