Security experts who participated in a cyber security conference at the World Forum in The Hague (Netherlands) on Tuesday had the opportunity to attend a presentation made by a 11 "cyber ninja", which showed the sad safety standards in the cyberspace in technology. He hit devices Bluetooth to handle a teddy bear and show how smart toys can "turn into weapons".
This child miracle is American Reuben Paul, a cyber expert and white hacker, who is currently studying at an Austin school in Texas. "From airplanes to cars, from smart phones to smart homes, anything or any game can be part of the Internet of Things (IOT)," Reuben told the audience. "Any smart game can become a weapon."
As part of his live demonstration and to prove his theory, Reuben made Bob's teddy bear, connected to iCloud via Wi-Fi and Bluetooth, to receive and transmit messages.
He then connected a "Raspberry Pi" - a tiny and low-cost computer - to his laptop and started scanning the room for available Bluetooth devices. To the surprise of all the people in the room, the boy managed to download dozens of numbers, including some top officials.
Then, using the programming language called Python, he continued to invade his teddy bear through the Internet through one of the numbers and turned on Bob's lights and transferred a recorded message from the audience through the game.
"They could be used to steal personal information such as passwords, remote monitoring devices to spy on children or identify a person using GPS. Worse still, games could still be programmed to say "meet me in this place and we will go together," said Reuben.
Apart from cyber-ninja, Reuben is also the youngest American to win a black belt at Shaolin Kung Fu. With the help of his family, Reuben created a non-profit organization called CyberShaolin, whose purpose is to raise awareness of "cyber-dangers".
Reuben's father, Mano Paul, an IT specialist, said his child's skills emerged at the age of six when he started exploring how software systems were working.
Reuben hopes to study for cyber security either at Caltech University or at MIT University.