Reuben Paul

 
 
 

Vocabulary

 

invent fuel (2) awareness
double analysis grow/grew/grown (2)
threat raise (2) record (3)
item exploit household
spy proclaim demonstrate (2)
harm device (2) meet/met/met
tough clear (2) lead/led/led
advise grade (2) conference
wow request Bluetooth
crowd obviously degree (3)
create executive child’s play
drone sit/sat/sat tooth/teeth
WiFi mission autonomous
poison public (3) vulnerable
spread firsthand network (2)
aspire security successful (2)
hack clone (3) know/knew/known
bleep gullible get/got/got-gotten
fake page (2) conversation
sign in connect you never know
stay contain stay in touch
allow message teddy bear
turn turn on send/sent/sent
threat turn off notification
radius extremely know/knew/known
hope shine (2) smart/smarter/smartest
join major (2) think/thought/thought (2)
stage scandal feel/felt/felt (2)
fee passion pay/paid/paid
fine capture speak/spoke/spoken
NSA protect out of control
FBI defense department
spiral graduate get through
guy respond behind (2)
audio comment acknowledge
rare store (2) contentment
profit debate worry/worried
busy gymnast present (3)
a phone call away

 
 
 
 
 

Video

 

 
 
 
 

Transcript

 
Facebook’s Cambridge Analytica scandal is fueling the debate over how to protect digital information. One hacker from Texas is also raising awareness about growing cyber threats, and he’s only 12 years old.

Ruben Paul is a 6th grader from Austin. He hacks household items to demonstrate how they can be exploited to spy on or even harm people. David Begnaud recently met the self-proclaimed “cyber ninja” who showed him how smart toys can be turned into listening devices.

.     .     .     .     .     .     .     .


 
Reuben Paul, Hacker and Cyber Security Expert: “Hi everybody.”

Ruben Paul is 12 years old — and he’s helping to lead the conversation on cybersecurity. Presenting in the Netherlands . . . advising a tech conference in Singapore . . . and wowing a crowd full of executives in Texas.

Reuben Paul, Hacker and Cyber Security Expert: “It is important that we reinvent cybersecurity because obviously what we have invented so far is clearly not working.

This cyber ninja, as he calls himself, has a second-degree black belt in Kung Fu and he’s on a mission to show how hacking is child’s play.

.     .     .     .     .     .     .     .


 
Reuben Paul, Hacker and Cyber Security Expert: If a 12-year-old can do it. What makes it that somebody is a skilled, actual cyber terrorist? What makes it that they can’t do it?

This Bluetooth is going into new autonomous cars, autonomous drones, it’s going into medical devices.”

Paul says that the Bluetooth and Wi-Fi connections that we use almost every day are extremely vulnerable to hacking.

Reuben Paul, Hacker and Cyber Security Expert: “I’ll never connect to a public Wi-Fi that I don’t know.”

Journalist: “Really?!?”

Reuben Paul, Hacker and Cyber Security Expert: “Somebody can just hack into that Wi-Fi network and poison it.”

.     .     .     .     .     .     .     .


 
He showed me firsthand how a hacker’s poison can spread from a Wi-Fi signal.

Reuben Paul, Hacker: “I successfully know your password.”
Journalist: “How do you know that?”
Reuben Paul, Hacker: “I’ve hacked you. Your login is “Bleep, bleep. Bleep, bleep. Bleep, bleep!”
Journalist: “Yes . . . yes . . . yes. Yep. Bleep that out!
WOW!”

Journalist: So call me gullible. You got me. It took seconds. He had my Twitter username and password using a fake page that he’d cloned after I connected to his public Wi-Fi network.

Journalist: “It’s that easy?”
Reuben Paul, Hacker: “Mm-hmm.”
Journalist: “So, in other words, if I was sitting at a Starbucks . . . I went to sign in to Twitter . . . I put it in — they got it?!?
Reuben Paul, Hacker: “Mm-hmm.”

.     .     .     .     .     .     .     .


 
TV Commercial: “Now, staying in touch is easy and fun!”

Paul also hacked CloudPets Teddy Bear, which uses Bluetooth technology, allowing traveling parents to send messages back to their kids.

Journalist: “What did you do that turns that into a threat?”

Ruben Paul, Hacker: “Without any notification or any knowledge of the user, I could turn it on from my computer, which only has to be in a 30-foot (9.14 meters) radius of the bear.

So, I could stand outside someone’s residence . . .”

He turned the bear into a secret recording device!

.     .     .     .     .     .     .     .


 

Journalist: “Who’s the smartest one in the family?”

The Paul family of four is hopeful about the future of cybersecurity. Ruben’s parents, Mano and Sangeeta, both work in technology — and his six-year-old brother, Etai, is even joining him on stage now.

Etai Paul, Brother: “Can you show us this?”
Reuben Paul, Hacker: “Sure, I though you’d never ask.”

Mano Paul, Mother: “As long as they shine at it and like what they do, it gives you a feeling of contentment.”

With Ruben speaking at these conferences and being paid thousands of dollars to travel there, and sometimes a speaker’s fee, do you worry that it gets a little out of control for a 12-year-old?

Mano Paul, Father: “For most kids, do it because they have a passion for it, right? It should never become a job for them.

So, if tomorrow they come back and they say, ‘I’m not interested in doing this,’ it’s perfectly fine with my wife and me.”

.     .     .     .     .     .     .     .


 

In the future, I want to work for the NSA or the FBI, protecting the country against foreign and domestic cyber threats.

Journalist: “Has anyone called you? I feel like they should be recruiting you now.”

Ruben Paul, Hacker: “I’ve had some offers from the government of the Netherlands and even the (US) Department of Defense.”

Journalist: “Did you tell them, what, ‘I’ve got to graduate first’?”

Ruben Paul, Hacker: “Yeah, I want to get through 6th grade before I start thinking about that job.

For CBS This Morning, I’m David Begnaud.

.     .     .     .     .     .     .     .


 

TV News Anchor: And a child shall lead them.

We reached out to CloudPets and Spiral Toys, the companies behind the teddy bear that Paul hacked. Neither responded to our requests for comment.

On its website, CloudPets says users acknowledge the company may capture audio recordings — and that it may use or store the recordings and the data contained within them.

Paul set up a non-profit to create videos that teach people about cyber dangers.

He hopes to one day study at Caltech or MIT . . . and he also aspires to be an Olympic gymnast.

News Co-Anchor: “That’s it! Busy guy! Well, the NSA may be a phone call away for him.”

News Anchor: “That’s Right. That rare NSA Olympic gymnast double-major.”
News Co-Anchor: “You never know.”

*     *     *     *     *     *     *


 

Questions

 
Bug. The report opened with a report concerning a breach in Wall Street financial operations. True or false?

Virus. Is Reuben Paul a 32-year old with a PhD in software engineering living and working in Silicon Valley, California?

Malware. Is he a shy, nervous introvert? Does he only stay home, in his bedroom, glued to his computer?

Trojan Horse. Reuben’s nickname is “Super Hacker.” Is this right or wrong? Does he only interact with twelve-year olds in his neighborhood and at school?

Breach. Does he believe only online accounts and computers are susceptible to breaches, hacks and damages?

Firewall. What does Reuben think is the most unsecure practice? Did he do a demonstration? What did he do? What is a common scenario?

Anti-Virus Software. He comes from a workiing-class background. His parents both work in convenience stores. Is this correct or incorrect? Describe his family and background.

Delete Files. Do Reuben’s parents pressure and force him to study and master science and technology?

Identity Theft. Cute children’s toys are cuddly and perfectly harmless. Yes or no?

File Corruption. Reuben wants to create a start up — and become the next Bill Gates, Mark Zuckerberg, Elon Musk. Do you agree? What are his goals and ambitions? Is he only passionate about computers?
 
 
 
Spyware. Do you experience glitches (or hacking) on your device, operating system, software, internet browser, etc?

Cyber Extortion. These days, nothing is totally safe and secure. What do you think?

Phishing. I know some (former) child prodigies. Yes or no?

Data Theft. My friends and I would like to become White Hat Hackers, software engineers, web designers, bloggers, YouTubers.

Ransomware. What might happen in the future?

Backdoor. What could or should people, tech companies and authorities do?
 
 
 
 
 

Comments are closed.