yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

The hackable technology that worries even a legendary con man | Frank W. Abagnale


3m read
·Nov 3, 2024

Processing might take a few minutes. Refresh later.

All the things that worry me are autonomous cars, things to hack vehicles, pacemakers, your laptop at home where you didn't cover the camera, and someone is watching everything you're doing in your house or listening to everything you're doing in your house. All those things give me great concern. Right now, cybercrime is basically a financial crime. It's a business of stealing money or stealing data. Data is money.

However, I think it's going to turn a lot blacker than that. We have the ability right now, as I speak to you, to shut someone's pacemaker off, but we're limited by distance. We have to be within 35 feet of the victim. I could walk by you on the sidewalk, turn off your pacemaker, speed it up, or any bodily device you have on you controlled by a chip or a computer program. We have that ability right now, but again limited by distance.

We have the ability now for law enforcement to pull over a vehicle on the interstate if they can get within 35 feet of the vehicle because we know that the typical car has about 240 computer components in it. We can lock the car doors, lock the power windows, turn on the airbag, shut off the motor, and take the car and pull it over. We can do that now, but we're limited to a distance of 35 feet.

So the question is, five years from now, will that be 35 miles, 350 miles, or 3,500 miles away? I'm afraid as the future comes, and especially when you talk about cars that drive themselves; the ability to kidnap the person in the car and lock them in the car. The ability to just take over the car and crash the car. Those are the things that haven't been answered that no one has figured out yet how they would stop that from happening, and those are the things that concern me.

We develop a lot of technology, but we never go to the final step, and that is the last question of the development: how would someone misuse this technology, and let's make sure it can't be done. In your house, you have a device you talk to, and you say, "Hey, what time of day is it? What's on TV tonight? Order me this from Amazon." It's a voice-activated device easily hacked and manipulated to reverse to hear everything you say in your house.

If you have cameras in your house, maybe because of dog watching, babysitting, a hacker can easily reverse the camera so they can see everything that goes on in your house and watch it. The same with your outside cameras. We develop those technologies; we want to make them inexpensive, number one, so they're not encrypted. They don't have a lot of technology in them.

And two, where it's return on investment. We want our money back right away. And marketing is saying, "Hey, this is great! We've got to get this out right away!" Without asking that question: what if someone were to do this with it, and how could we stop that now before we ever put it in the marketplace? Very little companies do that. Most of the technology out there can be hacked, can be manipulated because we don't do those things...

More Articles

View All
The Simple Guide To Start Anything
If you want to start a podcast, or write a book, or make a game, or build an app, or start any kind of business, well, where do you actually start? What’s the first thing, and what’s the last thing you do? There’s almost 8 billion people on this planet, a…
Worked example: Chain rule with table | Derivative rules | AP Calculus AB | Khan Academy
The following table lists the values of functions f and g and of their derivatives f prime and g prime for the x values negative 2 and 4. And so, you can see for x equals negative 2, x equals 4, they give us the values of f, g, f prime, and g prime. Let …
The Oldest Unsolved Problem in Math
This is a video about the oldest unsolved problem in math that dates back 2000 years. Some of the brightest mathematicians of all time have tried to crack it, but all of them failed. In the year 2000, the Italian mathematician Piergiorgio Odifreddi listed…
Finding area of figure after transformation using determinant | Matrices | Khan Academy
We’re told to consider this matrix transformation. This is a matrix that you can use, it represents a transformation on the entire coordinate plane. Then they tell us that the transformation is performed on the following rectangle. So, this is the rectang…
What Shutting Down Your Startup Feels Like - Avni Patel Thompson of Poppy with Kat Manalac
Cat, you haven’t been on the podcast in a while. Why don’t you introduce yourself before we talk about Omni for an hour? Well, so I’m Captain Alec. I’m one of the partners at YC. I work a lot on outreach to applicants, so everything we do with an externa…
Legends of Kingfishers, Otters, and Red-tailed Hawks | Podcast | Overheard at National Geographic
I became completely obsessed with them when I was seven. I have no idea why. I’m fairly obsessive person, and so all of my spare time as a teenager was spent sitting in my blind, taking mostly, in fact, almost all useless photographs of kingfishers. What …