1 00:00:00,300 --> 00:00:04,170 With the National Cyber Warrior Academy at the University of North Georgia, we're learning a little 2 00:00:04,170 --> 00:00:05,390 bit about car hacking. 3 00:00:05,730 --> 00:00:12,120 So over the weekend, we learned that a car, an automobile, has a controller area network, a Khan 4 00:00:12,120 --> 00:00:15,420 network that runs well throughout your entire car. 5 00:00:15,780 --> 00:00:22,590 But it allows you to utilize network sniffing tools like we've seen Wireshark and a couple of other 6 00:00:22,590 --> 00:00:27,900 sniffers to capture the network information that says what's going on in your car, whether that's your 7 00:00:27,900 --> 00:00:33,990 blinkers, your car stereo, your air conditioning, your accelerator, your brakes, your door locks, 8 00:00:34,230 --> 00:00:39,510 we can see all those things and we can tap into the network with just a USB cord and a cable that you 9 00:00:39,510 --> 00:00:46,680 can buy for 20 to 40 bucks on Amazon called a can to USB and has an onboard diagnostic port that plugs 10 00:00:46,680 --> 00:00:47,680 in under the steering wheel. 11 00:00:47,700 --> 00:00:52,920 So what I'm going to do with five of our mentors today is actually take a little time to show them how 12 00:00:52,920 --> 00:00:54,150 to connect to my car. 13 00:00:54,150 --> 00:01:00,240 This is my actual twenty seven Volkswagen Jetta, and we're going to listen to some of the signals coming 14 00:01:00,240 --> 00:01:04,590 out of our onboard diagnostic port through a simple dashboard program that we've set up. 15 00:01:04,590 --> 00:01:10,350 So you can see things like fuel economy and how well the tachometer are just about everything from the 16 00:01:10,350 --> 00:01:10,890 dashboard. 17 00:01:11,310 --> 00:01:13,380 So know what you want to give the first shot. 18 00:01:13,740 --> 00:01:17,870 All you need to do is first plug this into the laptop and make sure we get a yellow light on there. 19 00:01:18,470 --> 00:01:23,520 So and then, Sean, I'll show you where to plug it into the onboard diagnostic port. 20 00:01:24,430 --> 00:01:24,620 Yep. 21 00:01:26,790 --> 00:01:32,820 So what we're doing is first making sure that we're connecting from the computer to the tool, the cable 22 00:01:33,600 --> 00:01:36,590 and make sure we get a yellow light on the underside of the cable there. 23 00:01:37,980 --> 00:01:38,330 Good. 24 00:01:38,370 --> 00:01:45,210 All right, John, you want to step up under here with NOAA and run at the base of the steering wheel? 25 00:01:45,210 --> 00:01:50,490 On the left side, on the left over here, closer to the door here, you should see a purple port on 26 00:01:50,490 --> 00:01:51,030 my car. 27 00:01:52,350 --> 00:01:54,210 Looks like a really big cereal cable. 28 00:01:54,600 --> 00:01:56,370 And that's the onboard diagnostic port. 29 00:01:56,490 --> 00:02:00,360 It's the same thing that a mechanic plugs into when they want to read one of the codes from your car 30 00:02:01,680 --> 00:02:04,290 and you just work that in it, feel like it goes in very far. 31 00:02:04,290 --> 00:02:05,120 But that's perfect. 32 00:02:05,820 --> 00:02:09,540 And then you should see the underside of that light turn green if you can look up under there. 33 00:02:11,270 --> 00:02:11,530 We're good. 34 00:02:11,790 --> 00:02:12,620 All right. 35 00:02:12,990 --> 00:02:15,000 Now that that's happened, we can turn on the vehicle. 36 00:02:15,210 --> 00:02:20,580 I'm actually I'm going to hand this off, Boaz, so I'll let you turn on the car. 37 00:02:21,360 --> 00:02:21,870 So pretty good. 38 00:02:21,870 --> 00:02:23,640 It's it's an automatic. 39 00:02:23,640 --> 00:02:24,900 So it shouldn't take off without you. 40 00:02:24,900 --> 00:02:27,000 The parking brakes on the streets over there and. 41 00:02:27,660 --> 00:02:29,270 Yeah, no, they're good. 42 00:02:29,850 --> 00:02:34,560 So let's remind the folks watching here that this is not intended to be a how to video. 43 00:02:34,590 --> 00:02:35,880 Don't try this at home. 44 00:02:36,840 --> 00:02:38,040 You do need the foot on the brake. 45 00:02:38,210 --> 00:02:38,610 There you go. 46 00:02:39,690 --> 00:02:40,330 All right. 47 00:02:40,890 --> 00:02:43,950 And you can hear you can hear the diesel engine start to purr. 48 00:02:44,340 --> 00:02:49,800 But you can also see on the front screen here, you can see the tachometer is now lit up and we have 49 00:02:49,800 --> 00:02:53,640 the miles per gallon, the fuel economy, how much we're consuming right now. 50 00:02:53,880 --> 00:02:55,830 And if you will, give it just a little bit of gas. 51 00:02:55,830 --> 00:03:00,560 But let's keep it steady a little higher. 52 00:03:01,650 --> 00:03:04,380 We'll see that tank move up just a bit. 53 00:03:05,620 --> 00:03:06,240 Oh, wait. 54 00:03:06,990 --> 00:03:07,950 We got to reconnect. 55 00:03:08,220 --> 00:03:08,730 All right. 56 00:03:08,730 --> 00:03:11,500 So let's see, Isha, you haven't had a chance to run going on here. 57 00:03:11,940 --> 00:03:14,610 We're going to reconnect it lost that connection. 58 00:03:15,570 --> 00:03:20,920 So we're going to do an action right here. 59 00:03:21,270 --> 00:03:23,700 And if you click the Connect button right there. 60 00:03:26,980 --> 00:03:27,400 Good. 61 00:03:27,520 --> 00:03:31,420 And what it's doing now is just running through several different protocols for different types of cars, 62 00:03:31,720 --> 00:03:34,960 European cars are slightly different from Japanese makes and models. 63 00:03:34,960 --> 00:03:35,240 Right. 64 00:03:35,590 --> 00:03:37,000 So it's going through several different. 65 00:03:37,000 --> 00:03:41,530 And it's found one one of the European protocols, it's reading the vehicle information because it's 66 00:03:41,530 --> 00:03:46,000 a little German car, Volkswagen, and it will now. 67 00:03:46,210 --> 00:03:47,020 Yeah, there we go. 68 00:03:47,020 --> 00:03:48,250 We should get a live feed. 69 00:03:49,090 --> 00:03:49,490 Actually know. 70 00:03:49,490 --> 00:03:51,250 No, you want to give it just a little bit of gas. 71 00:03:51,370 --> 00:03:52,930 Just rev it up a little bit. 72 00:03:55,060 --> 00:03:55,500 Thanks, Bill. 73 00:03:55,720 --> 00:03:56,210 Appreciate it. 74 00:03:57,760 --> 00:03:59,320 And there you see the tachometer move. 75 00:03:59,320 --> 00:04:03,600 Go and take it up to 2000 and keep it up around two thousand for a while. 76 00:04:05,480 --> 00:04:10,610 There we go so we can see the readout. 77 00:04:10,640 --> 00:04:15,170 You'll notice that my fuel economy is going way down because we're sitting still and running the engine, 78 00:04:16,850 --> 00:04:19,150 but we're getting information on the load, on the engine. 79 00:04:19,160 --> 00:04:23,340 So if you go back to inital, you see that comes back. 80 00:04:23,540 --> 00:04:24,050 There we go. 81 00:04:24,050 --> 00:04:24,890 And we steady off. 82 00:04:24,890 --> 00:04:26,120 We've got the engine temperature. 83 00:04:26,430 --> 00:04:28,820 Still pretty cool because we just now turned it on, of course. 84 00:04:30,200 --> 00:04:36,470 So we are actually reading from the controller area network of this car into our laptop now and this 85 00:04:36,470 --> 00:04:36,890 laptop. 86 00:04:36,890 --> 00:04:39,620 We have just a very simple dashboard type interface. 87 00:04:39,890 --> 00:04:46,220 But what we learned how to do over the weekend was set up a virtual controller area network, a simulated 88 00:04:46,220 --> 00:04:47,840 car network on the laptop. 89 00:04:48,230 --> 00:04:51,280 Then we can record those signals as we make changes. 90 00:04:51,290 --> 00:04:55,100 So if we turn on the blinker, we can see it flashing on the dashboard indicator. 91 00:04:55,100 --> 00:04:59,150 If we rev up the engine, in fact, I think we hacked it and we could go up to two hundred and sixty 92 00:04:59,150 --> 00:05:02,660 or two hundred eighty miles per hour, our engine, our virtual car. 93 00:05:03,410 --> 00:05:06,520 Then we can unlock the doors, locked the doors while it's moving. 94 00:05:06,890 --> 00:05:12,880 Then you record that you capture those network packets and you can actually replay it on the same network. 95 00:05:12,890 --> 00:05:19,160 So what we saw video of was a couple of guys doing exactly this, except they were controlling the car, 96 00:05:19,340 --> 00:05:22,790 turning the steering wheel, turning on the audio, turning it on the stereo. 97 00:05:23,240 --> 00:05:27,110 I think they turned on an air conditioner blaster to a couple of other things. 98 00:05:27,110 --> 00:05:31,040 They were doing well, unfortunately, they ran out off the road and into a ditch. 99 00:05:31,040 --> 00:05:33,530 I believe we did not do that here locally. 100 00:05:33,530 --> 00:05:36,500 We just watched a couple of videos, but the same principles apply. 101 00:05:36,500 --> 00:05:41,480 Once you can capture the network signal, you can use what we call a replay attack, where you take 102 00:05:41,480 --> 00:05:47,750 that same network signal that was triggered when you turn on the blinker, turn on the stereo, hit 103 00:05:47,750 --> 00:05:52,610 the brakes and replay it on a car network and you can have the same effect. 104 00:05:52,620 --> 00:05:55,670 I'm sorry, Doctor, can we have someone who's watching right now? 105 00:05:55,690 --> 00:05:56,600 Here's the question. 106 00:05:56,600 --> 00:05:59,210 What's your software used on the computer? 107 00:05:59,570 --> 00:06:04,010 We were using some open source software from open garages, dawg. 108 00:06:04,310 --> 00:06:12,260 You can go to Open Garages Dog and has a link to the I see sim, I see Capital I Capital C Sym or the 109 00:06:12,260 --> 00:06:13,370 I see simulator. 110 00:06:13,790 --> 00:06:19,490 And it allows you to simulate that controller area network to record things, use a package called Can 111 00:06:19,490 --> 00:06:20,000 Sniffer. 112 00:06:20,300 --> 00:06:25,700 So it sniffs that controller area network and it allows you to record that network traffic and then 113 00:06:25,700 --> 00:06:27,740 can player allows you to play it back. 114 00:06:28,040 --> 00:06:33,470 The can utilize on most new Linux distributions, Debian, Linux, like the Caleigh Linux that we're 115 00:06:33,470 --> 00:06:33,890 using. 116 00:06:34,190 --> 00:06:39,050 You can download everything for free, install it on your own computer and buy one of these cables on 117 00:06:39,050 --> 00:06:45,410 Amazon or any place that sells a can to USB connector and you're able to connect into your real car 118 00:06:45,440 --> 00:06:47,330 and listen to the same signals. 119 00:06:48,830 --> 00:06:54,630 And what would be the advantage for someone wanting to do this on their own vehicle? 120 00:06:54,890 --> 00:06:55,700 Oh, absolutely. 121 00:06:55,700 --> 00:06:56,750 There are two things, really. 122 00:06:56,750 --> 00:06:58,970 First of all, you can just work on your own vehicle. 123 00:06:59,210 --> 00:07:03,170 And it used to be in the old days we would buy a car and we could maintain it ourselves. 124 00:07:03,440 --> 00:07:07,940 Nowadays, we usually have to take it into a garage to even figure out what the problem with it is. 125 00:07:07,940 --> 00:07:09,530 We just get a dashboard indicator. 126 00:07:10,130 --> 00:07:15,290 The cool thing about these onboard diagnostic tools that we can plug into a regular laptop using open 127 00:07:15,290 --> 00:07:18,380 source software and read the code ourselves. 128 00:07:18,560 --> 00:07:21,710 And we still may need some help figuring out what to do with it after that. 129 00:07:22,250 --> 00:07:25,190 The second thing that you can do is check your car for security. 130 00:07:25,430 --> 00:07:30,260 In fact, in one of the videos we saw this weekend, they were able to hack in to the controller area 131 00:07:30,260 --> 00:07:33,530 network through the onboard entertainment system. 132 00:07:33,920 --> 00:07:38,900 So they were connecting in through a cell phone call and hacking a Jeep Grand Cherokee. 133 00:07:38,900 --> 00:07:40,850 You may have seen on the news a few years ago. 134 00:07:41,570 --> 00:07:46,550 What we're hoping to do is get these tools and more people's hands so they can check the security of 135 00:07:46,550 --> 00:07:47,390 their own vehicles. 136 00:07:47,750 --> 00:07:50,860 Plus, of course, we have a number of students who go on to work for the car companies. 137 00:07:50,990 --> 00:07:55,670 We have Giammetti just a few miles south of campus here down in Roswell, in Alpharetta. 138 00:07:55,910 --> 00:07:59,720 So we produce students who have at least seen a little bit of this and have a chance to take it into 139 00:07:59,720 --> 00:08:00,340 the work world. 140 00:08:00,890 --> 00:08:01,760 Thanks for the question. 141 00:08:02,300 --> 00:08:02,680 Sure. 142 00:08:04,430 --> 00:08:11,810 What what kind of skills are the students who are here at the Cyber Warriors Academy? 143 00:08:12,050 --> 00:08:16,730 What kind of skills do they learn from being able to do this or can learn more about car hack? 144 00:08:16,970 --> 00:08:18,290 OK, well, let's see. 145 00:08:18,290 --> 00:08:20,810 First of all, we learned a lot about Kelly Linux, right, guys? 146 00:08:21,050 --> 00:08:25,910 So we learned a lot of command line tools, a lot of open source software tools that people can download 147 00:08:25,910 --> 00:08:27,350 and install on their own computers. 148 00:08:28,190 --> 00:08:33,830 We learned how to use some particular tools for penetration testing or testing the security of a system 149 00:08:34,100 --> 00:08:40,730 like misplayed their attacks that you can use to break into a Windows machine, you can break into a 150 00:08:40,730 --> 00:08:43,280 Samsung television, anything with a computer in it. 151 00:08:43,280 --> 00:08:46,610 These days, there are exploits for cell phones included. 152 00:08:47,450 --> 00:08:49,430 So the students are getting a chance to see how to do that. 153 00:08:49,430 --> 00:08:51,170 We even worked with drones a little bit. 154 00:08:51,440 --> 00:08:57,470 They got a chance to go down to Fort Gordon yesterday to see some live hacking and coding sessions right 155 00:08:57,470 --> 00:09:04,580 there at the Army Cyber Center of Excellence and also the exposure to this class. 156 00:09:05,360 --> 00:09:06,330 Oh, absolutely. 157 00:09:06,530 --> 00:09:11,300 Rose Proctor came over and gave us a good dose of ethics before we started the ethical hacking course, 158 00:09:11,630 --> 00:09:13,270 so that was a great way to kick things off. 159 00:09:13,280 --> 00:09:18,680 We learned about how to do these things with permission on the systems that you own or for companies 160 00:09:18,680 --> 00:09:20,590 that are interested in increasing their security. 161 00:09:20,930 --> 00:09:23,510 We never use hacking tools without permission. 162 00:09:23,510 --> 00:09:24,980 That makes us a bad hacker. 163 00:09:26,060 --> 00:09:33,530 But you need to know what tactics correct hackers are using so that you can defeat the bad hackers. 164 00:09:33,650 --> 00:09:34,310 Exactly. 165 00:09:34,310 --> 00:09:37,070 And we're learning how to hack into things like web applications. 166 00:09:37,310 --> 00:09:42,830 And then we show how to strengthen Web applications so no one can hack into your site where your business 167 00:09:42,830 --> 00:09:50,840 inside you mentioned, drowns there a chance that we might could see some drones in action actually 168 00:09:50,840 --> 00:09:51,760 right behind us. 169 00:09:51,780 --> 00:09:52,060 Sure. 170 00:09:52,310 --> 00:09:53,750 We go when caught in the wind there. 171 00:09:53,750 --> 00:09:55,520 But there we go. 172 00:09:55,820 --> 00:09:59,900 We can see a group of students controlling the drone using just a regular cell phone. 173 00:10:00,140 --> 00:10:01,940 Now, these are some of our smaller drones. 174 00:10:01,940 --> 00:10:03,350 This is a mini cargo. 175 00:10:03,650 --> 00:10:05,360 It'll actually carry some Legos. 176 00:10:05,510 --> 00:10:09,330 And it's fighting a pretty strong headwind, but doing a really good job for a small drone. 177 00:10:09,530 --> 00:10:14,300 We also have larger drones that are FAA registered, anything over eight ounces. 178 00:10:14,300 --> 00:10:19,100 We register with the Federal Aviation Administration and we keep them under four hundred feet. 179 00:10:19,110 --> 00:10:24,380 Some of the good guidelines for using drones and we usually don't fly them directly at students, for 180 00:10:24,380 --> 00:10:30,020 example, can we perhaps maybe walk over here without being drowned? 181 00:10:30,440 --> 00:10:30,980 Oh, sure. 182 00:10:30,980 --> 00:10:31,550 Absolutely. 183 00:10:31,820 --> 00:10:33,890 You guys mind if we get a little closer to the drone action? 184 00:10:34,020 --> 00:10:36,370 She's doing the the Facebook line. 185 00:10:37,250 --> 00:10:39,090 You guys are streaming in real time. 186 00:10:40,400 --> 00:10:41,110 There you go. 187 00:10:41,700 --> 00:10:47,940 You want to double tap the screen, make a big one flip if we can get one in, just 188 00:10:51,320 --> 00:10:54,130 maybe too strong into the wind, allow that to happen there. 189 00:10:54,230 --> 00:10:55,220 Oh, there we go. 190 00:10:55,610 --> 00:10:56,350 All right. 191 00:10:56,360 --> 00:10:57,570 Even in a heavy headwind. 192 00:10:58,490 --> 00:10:59,630 Great job. 193 00:10:59,780 --> 00:11:00,200 All right. 194 00:11:00,200 --> 00:11:04,070 So you can see the students have had a chance to touch lots of different types of technology. 195 00:11:04,820 --> 00:11:11,600 Computers are in everything that we use these days, from toys to agricultural and industrial drones 196 00:11:11,600 --> 00:11:15,650 to our cars, to your Fitbit, you name it, just about everything. 197 00:11:15,980 --> 00:11:16,870 All right. 198 00:11:16,880 --> 00:11:17,780 And a safe landing. 199 00:11:18,410 --> 00:11:20,390 Just about everything has a computer in it these days. 200 00:11:20,400 --> 00:11:25,340 So we need people who are thinking about securing these devices that come into our homes, our businesses 201 00:11:25,580 --> 00:11:26,660 and the world around us. 202 00:11:29,030 --> 00:11:33,640 Perhaps one of our students here like to talk to us about what they've learned so far. 203 00:11:34,100 --> 00:11:38,030 Could we could we get a volunteer who'd like to talk about what they've learned? 204 00:11:38,060 --> 00:11:38,960 One of the mentors. 205 00:11:38,960 --> 00:11:39,990 You guys want to share anything? 206 00:11:40,520 --> 00:11:40,790 Sure. 207 00:11:40,790 --> 00:11:42,320 Because it's a learning experience for them. 208 00:11:42,410 --> 00:11:42,950 Absolutely. 209 00:11:43,340 --> 00:11:45,320 Well, let me tell you a little bit about our mentors. 210 00:11:45,410 --> 00:11:46,600 We'll turn back around this way. 211 00:11:46,910 --> 00:11:51,380 We have four of our students here at the University of Georgia and our fifth mentor right over there 212 00:11:51,380 --> 00:11:53,080 who's actually leading the drone activities. 213 00:11:53,690 --> 00:12:00,520 They've been participating during the entire coding, hacking and all the drone and other activities. 214 00:12:00,530 --> 00:12:04,010 In fact, they facilitated evening activities, team building with these devices. 215 00:12:04,310 --> 00:12:06,020 And so they've been picking up some skills along the way. 216 00:12:06,020 --> 00:12:07,400 I'll start over here with Sean Dekel. 217 00:12:08,480 --> 00:12:11,690 So make your way and share a couple of things that you found interesting about. 218 00:12:12,440 --> 00:12:12,680 All right. 219 00:12:12,680 --> 00:12:13,520 I'm Shawn Dekle. 220 00:12:13,520 --> 00:12:16,610 I'm an information systems major here, minor in cybersecurity. 221 00:12:16,910 --> 00:12:21,710 I'm entering my senior year at the University of North Georgia and Corps cadets and have some interesting 222 00:12:21,710 --> 00:12:25,490 things I've learned here is just how to secure a computer using the command prompt, just knowing where 223 00:12:25,490 --> 00:12:27,620 your signals are going and how they're being traced. 224 00:12:28,010 --> 00:12:30,260 And that's information I didn't know prior to. 225 00:12:30,290 --> 00:12:35,090 So I think I can develop my skills even further and just see what more I can do with a command from 226 00:12:35,900 --> 00:12:37,770 pass it over to coming up next. 227 00:12:38,570 --> 00:12:42,260 Hello, my name is Aisha and I'm a sergeant major here. 228 00:12:42,770 --> 00:12:48,400 And I like this camp because I get to learn more about, like, how to secure my computer and just basically 229 00:12:48,410 --> 00:12:53,000 learning everything and what some of these kids can actually do for the interest. 230 00:12:53,000 --> 00:12:56,720 And to me and I hope to learn some more at the end of this camp. 231 00:12:57,470 --> 00:12:57,560 Right. 232 00:12:59,330 --> 00:13:05,120 I'm Boaz Cradock, the engineer information systems major, but now a little minor in cybersecurity. 233 00:13:05,120 --> 00:13:10,090 Hopefully after this, how this game is really piqued my interest for a number of reasons. 234 00:13:10,100 --> 00:13:15,890 First off, I got a lot to work with high school students, and I never thought I'd realize that I really 235 00:13:15,890 --> 00:13:23,180 wanted to do something like this that we're doing here, which is like learning how to, like, protect 236 00:13:23,180 --> 00:13:26,480 yourself from all the Big Brother stuff that we've been talking about. 237 00:13:26,720 --> 00:13:28,220 And that is always a big scare. 238 00:13:28,220 --> 00:13:32,930 It's been a scare since, like anybody else, they came out with a Smith like 1998. 239 00:13:32,930 --> 00:13:41,930 So, I mean, just like learning how different like AI programs are, say like you have Linux or Mac, 240 00:13:42,260 --> 00:13:44,870 Linux or Mac or Windows boxes. 241 00:13:44,870 --> 00:13:48,230 How they actually even work at the base level requires. 242 00:13:48,500 --> 00:13:50,480 That's not exactly what we're going to learn here. 243 00:13:50,480 --> 00:13:55,310 But I've been doing my own research outside of it and trying to catch up to some of our students. 244 00:13:55,310 --> 00:14:00,680 High level of hacking, understanding and interacting with the high schoolers who actually do have a 245 00:14:00,680 --> 00:14:04,730 high knowledge of it has really sped up my learning process. 246 00:14:04,730 --> 00:14:05,000 So it's. 247 00:14:05,890 --> 00:14:11,170 I get that opportunity, they just have face to face contact with people who have done some ethical 248 00:14:12,220 --> 00:14:13,280 hacking in the past. 249 00:14:13,300 --> 00:14:15,440 So that's not my friend. 250 00:14:15,540 --> 00:14:19,300 No, I'm no aware. 251 00:14:19,330 --> 00:14:26,110 I'm an information systems major I'm sorry, my sophomore year and the minor cyber security I've learned 252 00:14:26,770 --> 00:14:27,130 anyway. 253 00:14:27,140 --> 00:14:30,520 So I helped to, like, protect my own computer and stuff. 254 00:14:30,880 --> 00:14:36,760 And I've learned how everything on the Internet and things are like vulnerable to, like hacking. 255 00:14:37,480 --> 00:14:39,370 And I didn't realize I was such a big problem. 256 00:14:39,490 --> 00:14:42,100 But I've learned many ways to, like, help defend for that. 257 00:14:42,100 --> 00:14:46,300 And I've learned so much about computers and networking in so many different systems. 258 00:14:46,300 --> 00:14:51,000 And I learned so much from the students to use outside the classroom. 259 00:14:52,450 --> 00:14:54,910 It's been really great working with them in here. 260 00:14:58,150 --> 00:15:01,240 When we come over to pick the students, if we can get some volunteers there. 261 00:15:02,200 --> 00:15:02,430 Yes. 262 00:15:02,440 --> 00:15:05,830 So we're going to go talk with some of our campers. 263 00:15:05,830 --> 00:15:13,120 And but if you are watching out there and you have any questions about cyber security or computers, 264 00:15:13,120 --> 00:15:16,240 I mean, this is the group to ask if you've got questions. 265 00:15:16,930 --> 00:15:22,720 They're the ones who will be able to answer those questions, you guys, to a little bit about what 266 00:15:22,720 --> 00:15:25,270 they've been learning or something that's been interesting so far. 267 00:15:25,690 --> 00:15:29,580 Facebook like introduce yourself. 268 00:15:29,590 --> 00:15:31,290 Tell me how you tell us where you're from. 269 00:15:31,300 --> 00:15:32,180 I'm not sick. 270 00:15:32,650 --> 00:15:33,880 I'm from Suwannee, Georgia. 271 00:15:33,880 --> 00:15:39,460 And some of the things we've been learning, learning is like being able to, like, sniff packets that 272 00:15:39,460 --> 00:15:47,950 have passwords in them and like be able to stop phishing attacks, scanning networks, doing like network 273 00:15:47,950 --> 00:15:49,230 scans, things like that. 274 00:15:49,240 --> 00:15:51,370 That's what we've been learning. 275 00:15:52,030 --> 00:15:52,870 What school do you go? 276 00:15:52,870 --> 00:15:56,650 Do I go to Laimbeer High School and that's in Swannie? 277 00:15:56,860 --> 00:15:57,450 Yes. 278 00:15:57,490 --> 00:15:58,870 What made you want to come to this campus? 279 00:15:59,440 --> 00:16:03,850 I saw the headline that it was like a cyber security camp, and that's something I've had an interest 280 00:16:03,850 --> 00:16:04,810 in for a long time. 281 00:16:05,110 --> 00:16:08,680 So I just decided I should give it a shot, see if I get in here I am. 282 00:16:08,680 --> 00:16:09,790 And I'm enjoying my stay. 283 00:16:11,930 --> 00:16:16,280 Thank you so someone else, what have you learned? 284 00:16:17,660 --> 00:16:20,000 Sure, I'd like you. 285 00:16:20,870 --> 00:16:23,930 Yeah, I'm going to go live in mid air. 286 00:16:23,960 --> 00:16:26,580 Yeah, that was me. 287 00:16:26,600 --> 00:16:27,820 He was under no pressure. 288 00:16:27,830 --> 00:16:29,510 He was on Facebook like he did it. 289 00:16:29,520 --> 00:16:31,250 So talk a little bit about what you've learned. 290 00:16:31,460 --> 00:16:35,450 So this camp has kind of exposed me to many other hacking tools. 291 00:16:35,450 --> 00:16:39,860 And I've learned a lot about how to code in different languages such as Python and JavaScript. 292 00:16:39,860 --> 00:16:45,560 And it's a real learning experience for kids who are trying to go into the cybersecurity field, computer 293 00:16:45,560 --> 00:16:48,500 science field, or just anyone that's trying to learn. 294 00:16:49,080 --> 00:16:51,380 I've learned a lot and it's only been five days right now. 295 00:16:51,920 --> 00:16:52,310 Yeah. 296 00:16:52,310 --> 00:16:53,330 So it's awesome. 297 00:16:53,330 --> 00:16:55,160 It's such a great camp and I'm really liking it. 298 00:16:56,900 --> 00:16:57,660 Where are you from? 299 00:16:57,980 --> 00:16:59,030 I'm from Chicago. 300 00:16:59,090 --> 00:17:00,710 I flew here from L.A.. 301 00:17:00,720 --> 00:17:01,800 Yeah, you came here. 302 00:17:01,820 --> 00:17:04,990 So what drew you to this camp all the way up in Chicago? 303 00:17:05,000 --> 00:17:06,250 How did you learn about the people? 304 00:17:06,860 --> 00:17:10,970 So I was actually talking to Dr. Payne, too, and he kind of introduced me to this camp. 305 00:17:11,330 --> 00:17:14,660 So it was just a real like I saw. 306 00:17:14,660 --> 00:17:16,250 And I was like, oh, I really want to do this. 307 00:17:16,250 --> 00:17:21,020 And I was already kind of looking to research more about computer security and cyber security. 308 00:17:21,320 --> 00:17:24,500 So this is kind of opened my eyes to what the field looks like. 309 00:17:24,500 --> 00:17:25,970 And I'm really excited for the future. 310 00:17:26,930 --> 00:17:32,720 And the drone is buzzing right beside you kept looking, looking toward. 311 00:17:32,720 --> 00:17:34,540 He's keeping his eye on the door. 312 00:17:34,550 --> 00:17:34,640 Yeah. 313 00:17:34,640 --> 00:17:36,290 I don't want to get hit by the drone. 314 00:17:37,490 --> 00:17:40,460 Yeah, well, thank you for thank you for sharing. 315 00:17:40,470 --> 00:17:40,730 Yeah. 316 00:17:40,730 --> 00:17:41,300 Thank you. 317 00:17:42,870 --> 00:17:45,750 So shout out to Chicago out there if you're watching. 318 00:17:46,320 --> 00:17:52,470 Now we have a total of 40 students here, 20 male, 20 female students their entire time here is funded 319 00:17:52,470 --> 00:17:58,050 by a grant we got from the NSA and the National Science Foundation of Peace for their books, the room, 320 00:17:58,050 --> 00:17:59,040 their tuition. 321 00:17:59,310 --> 00:18:05,190 Well, everything they cover while they're here is 100 percent paid for because the NSA really believes 322 00:18:05,190 --> 00:18:10,650 in exposing young men and young women to the kinds of things that we need to know out in the cyber workforce. 323 00:18:10,930 --> 00:18:12,140 And we had 36. 324 00:18:12,480 --> 00:18:15,380 That is the National Security Agency. 325 00:18:15,390 --> 00:18:16,070 That's correct. 326 00:18:16,500 --> 00:18:18,090 That's one of those federal three labor. 327 00:18:18,480 --> 00:18:19,280 Absolutely. 328 00:18:19,530 --> 00:18:22,170 And they're funding around 130 camps nationwide. 329 00:18:22,440 --> 00:18:25,230 We were very fortunate to have our second camp this year. 330 00:18:25,230 --> 00:18:31,620 We began this last year and these students stay on campus for 10 days and get ethical hacking, curricular 331 00:18:32,250 --> 00:18:36,980 training, just like you would if you're going to a certified ethical hacker boot camp out in industry. 332 00:18:38,130 --> 00:18:43,290 And I guess what's going to show up and again, if you're watching out there, you have questions. 333 00:18:44,490 --> 00:18:53,040 Like I said, these are the people to ask, A, if I might be talking about some of the cybersecurity 334 00:18:53,040 --> 00:19:00,060 programs, technology programs we offer here, or we do hope to see a good number of these students 335 00:19:00,070 --> 00:19:05,070 enter either a Bachelor of Science and computer science program with a concentration in information, 336 00:19:05,070 --> 00:19:06,120 assurance and security. 337 00:19:06,480 --> 00:19:08,000 The short way we say that is the best. 338 00:19:08,010 --> 00:19:10,650 And yes, with cyber, we are also working. 339 00:19:10,860 --> 00:19:16,320 We have a new graduate certificate in cyber for those people who might be coming back, either changing 340 00:19:16,320 --> 00:19:21,150 careers or wanting some training mid career or coming straight out of a bachelor's program and want 341 00:19:21,150 --> 00:19:26,340 to pick up some graduate certification in cybersecurity, you'll get a chance to see computer security, 342 00:19:26,340 --> 00:19:30,930 network security forensics and a couple of electric fields in there. 343 00:19:31,410 --> 00:19:37,920 But we've been designated by the National Security Agency and the Department of Homeland Security last 344 00:19:37,920 --> 00:19:41,450 year as a center of academic excellence in cyber defense. 345 00:19:41,700 --> 00:19:46,500 And so any of our programs come with a seal from the Department of Homeland Security and the National 346 00:19:46,500 --> 00:19:47,500 Security Agency. 347 00:19:47,790 --> 00:19:51,420 So just give students a little extra credential before they go out into the work world.