0:00:11.861,0:00:15.587 So this is a hotel room,[br]kind of like the one I'm staying in. 0:00:15.587,0:00:17.731 I get bored sometimes. 0:00:17.731,0:00:21.158 A room like this has not a lot[br]to offer for entertainment. 0:00:21.158,0:00:25.687 But for a hacker, it gets a little[br]interesting because that television 0:00:25.687,0:00:28.136 is not like the television in your home, 0:00:28.136,0:00:31.058 it's a node on a network. Right? 0:00:31.058,0:00:33.442 That means I can mess with it. 0:00:33.442,0:00:37.694 If I plug a little device[br]like this into my computer, 0:00:37.694,0:00:40.499 it's an infrared transceiver,[br]I can send the codes that 0:00:40.499,0:00:43.524 the TV remote might send[br]and some other codes. 0:00:43.524,0:00:47.128 So what?[br]Well, I can watch movies for free. 0:00:47.277,0:00:49.275 (Laughter) 0:00:49.275,0:00:53.681 That doesn't matter to me so much,[br]but I can play video games too. 0:00:54.749,0:00:57.734 Hey, but what's this? 0:00:57.935,0:01:01.010 I can not only do this[br]for my TV in my hotel room, 0:01:01.010,0:01:03.822 I can control your TV in your hotel room. 0:01:03.822,0:01:05.006 (Laughter) 0:01:05.006,0:01:07.906 So I can watch you[br]if you're checking out with one of these, 0:01:07.906,0:01:10.892 you know, TV based registration things, 0:01:10.892,0:01:13.512 if you're surfing[br]the web on your hotel TV, 0:01:13.512,0:01:16.224 I can watch you do it. 0:01:17.182,0:01:19.983 Sometimes it's interesting stuff. 0:01:19.983,0:01:22.374 Funds transfer. 0:01:22.712,0:01:25.830 Really big funds transfers. 0:01:25.830,0:01:28.041 You never know what people[br]might want to do 0:01:28.041,0:01:31.528 while they're surfing the web[br]from their hotel room. 0:01:31.892,0:01:34.633 (Laughter) 0:01:34.633,0:01:38.122 The point is I get to decide[br]if you're watching Disney or porn tonight. 0:01:38.122,0:01:40.141 Anybody else staying [br]at the Affinia hotel? 0:01:40.141,0:01:42.614 (Laughter) 0:01:42.614,0:01:46.722 This is a project I worked on[br]when we were trying to figure out 0:01:46.722,0:01:50.196 the security properties of wireless[br]networks; it's called the "Hackerbot". 0:01:50.196,0:01:54.007 This is a robot we've built that can[br]drive around and find Wi-Fi users, 0:01:54.007,0:01:57.358 drive up to them and show them[br]their passwords on the screen. 0:01:57.358,0:02:00.621 (Laughter) 0:02:00.621,0:02:02.572 We just wanted to build a robot, 0:02:02.572,0:02:05.143 but we didn't know[br]what to make it do, so - 0:02:05.143,0:02:07.338 We made the pistol[br]version of the same thing. 0:02:07.338,0:02:09.131 This is called the "Sniper Yagi". 0:02:09.131,0:02:12.010 It's for your long-range[br]password sniffing action, 0:02:12.010,0:02:14.669 about a mile away I can watch[br]your wireless network. 0:02:14.669,0:02:18.648 This is a project I worked on with[br]Ben Laurie to show passive surveillance. 0:02:18.648,0:02:22.171 So what it is, is a map[br]of the conference called 0:02:22.171,0:02:23.837 "Computers, Freedom and Privacy". 0:02:23.837,0:02:28.774 And this conference was[br]in a hotel, and what we did is we, 0:02:28.774,0:02:31.346 you know, put a computer[br]in each room of the conference 0:02:31.346,0:02:33.284 that logged all the Bluetooth traffic. 0:02:33.284,0:02:36.376 So as everybody came and went[br]with their phones and laptops 0:02:36.376,0:02:38.667 we were able to just log that,[br]correlate it, 0:02:38.667,0:02:42.088 and then I can print out a map like this[br]for everybody at the conference. 0:02:42.088,0:02:45.541 This is Kim Cameron,[br]the Chief Privacy Architect at Microsoft. 0:02:45.541,0:02:46.468 (Laughter) 0:02:46.468,0:02:49.139 Unbeknownst to him, 0:02:49.139,0:02:52.880 I got to see everywhere he went. 0:02:52.880,0:02:56.023 And I can correlate this[br]and show who he hangs out with 0:02:56.023,0:02:58.007 (phone dialing)[br]when he got bored, 0:02:58.007,0:03:00.521 (phone dialing)[br]hangs out in the lobby with somebody. 0:03:00.521,0:03:02.964 Anybody here use cellphones? 0:03:02.964,0:03:04.616 (Laughter) 0:03:04.616,0:03:08.488 (Phone ringing) 0:03:08.488,0:03:12.459 So my phone is calling - 0:03:12.459,0:03:15.711 (Ringing) 0:03:17.260,0:03:19.429 calling - 0:03:23.593,0:03:25.769 Voice mail: You have 100 messages. 0:03:25.769,0:03:27.586 Palbos Holman: Uh oh! 0:03:27.586,0:03:29.744 VM: First unheard message - 0:03:29.744,0:03:31.086 PH: Where do I press - 0:03:31.086,0:03:33.367 VM: Message skipped.[br]First skipped message. 0:03:33.367,0:03:34.603 PH: Uh oh! 0:03:34.603,0:03:38.133 VM: Main menu. To listen to your -[br]You have pressed an incorrect key - 0:03:38.133,0:03:40.933 You have two skipped messages.[br]Three saved messages. 0:03:40.933,0:03:42.583 Goodbye. 0:03:42.583,0:03:46.264 PH: Uh oh![br]So we're in Brad's voice mail. 0:03:46.543,0:03:47.994 (Laughter) 0:03:47.994,0:03:50.240 And I was going to record him[br]a new message, 0:03:50.240,0:03:52.673 but I seem to have pressed an invalid key, 0:03:52.673,0:03:54.323 so we're going to move on. 0:03:54.323,0:03:57.963 And I'll explain how that works some[br]other day because we're short on time. 0:03:57.963,0:04:00.114 Anybody here used MySpace? 0:04:00.114,0:04:01.745 MySpace users? Oh! 0:04:01.745,0:04:05.111 Used to be popular.[br]It's kind of like Facebook. 0:04:05.111,0:04:08.663 This guy, a buddy of ours Samy,[br]was trying to meet chicks on MySpace 0:04:08.663,0:04:10.824 which I think is what[br]it used to be good for. 0:04:10.824,0:04:15.514 And what he did is he had[br]a page on MySpace about him. 0:04:16.641,0:04:19.075 It lists all your friends,[br]and that's how you know 0:04:19.075,0:04:22.031 somebody's cool is that they have[br]a lot of friends on MySpace. 0:04:22.031,0:04:23.852 Well, Samy didn't have any friends. 0:04:23.852,0:04:27.743 He wrote a little bit of Javascript code[br]that he put in his page, 0:04:27.743,0:04:29.585 so that whenever you look at his page 0:04:29.585,0:04:32.028 it would just automagically[br]add you as his friend. 0:04:32.028,0:04:35.369 And it would skip the whole[br]acknowledgement response protocol 0:04:35.369,0:04:37.703 saying "Is Samy really your friend?" 0:04:37.703,0:04:40.939 But then it would copy[br]that code onto your page, 0:04:40.939,0:04:43.045 so that whenever anybody[br]looked at your page 0:04:43.045,0:04:45.856 it would automatically add them[br]as Samy's friend too. 0:04:45.856,0:04:46.925 (Laughter) 0:04:46.925,0:04:50.514 And it would change your page[br]to say that "Samy is your hero." 0:04:50.514,0:04:52.023 (Laughter) 0:04:52.023,0:04:56.442 So in under 24 hours, Samy had[br]over a million friends on MySpace. 0:04:56.442,0:04:58.615 (Laughter) 0:04:58.615,0:05:03.415 Hey, he just finished serving[br]3-years probation for that. 0:05:03.553,0:05:05.656 (Laughter) 0:05:05.656,0:05:09.819 Even better, Christopher Abad,[br]this guy, another hacker, 0:05:09.819,0:05:13.492 also trying to meet chicks[br]on MySpace but having spotty results. 0:05:13.492,0:05:15.653 Some of these dates[br]didn't work out so well, 0:05:15.653,0:05:19.678 so what Abad did[br]is he wrote a little bit of code 0:05:19.678,0:05:25.602 to connect MySpace to Spam Assassin,[br]which is an open source spam filter. 0:05:25.602,0:05:28.045 It works just like[br]the spam filter in your email. 0:05:28.045,0:05:30.280 You train it by giving it some spam 0:05:30.280,0:05:32.862 train it by giving it a little[br]bit of legitimate email, 0:05:32.862,0:05:34.869 and it tries to use[br]artificial intelligence 0:05:34.869,0:05:37.270 to work out the difference. Right? 0:05:37.270,0:05:41.262 Well, he just trained it on profiles[br]from girls he dated and liked 0:05:41.262,0:05:43.088 as legitimate email. 0:05:43.088,0:05:46.745 Profiles from girls he dated[br]and not liked, as spam, 0:05:46.745,0:05:50.347 and then ran it against[br]every profile on MySpace. 0:05:50.347,0:05:52.923 (Laughter) 0:05:52.923,0:05:56.088 Out spits girls you might like to date. 0:05:56.088,0:05:59.326 What I say about Abad is, I think,[br]there's like three startups here. 0:05:59.326,0:06:02.531 I don't know why we need Match.com,[br]when we can have Spam dating? 0:06:02.531,0:06:05.105 You know this is innovation. 0:06:05.105,0:06:07.461 He's got a problem, he found a solution. 0:06:07.461,0:06:12.053 Does anybody use these - bleep -[br]keys for opening your car remotely? 0:06:12.053,0:06:16.421 They're popular in, well,[br]maybe not Chicago, OK. 0:06:16.779,0:06:19.929 So kids these days will drive[br]through a Wal-Mart parking lot 0:06:19.929,0:06:22.493 clicking open, open, open, bloop. 0:06:22.493,0:06:25.570 Eventually you find another[br]Jetta or whatever just like yours, 0:06:25.570,0:06:29.555 maybe a different color,[br]that uses the same key code. 0:06:29.714,0:06:31.931 Kids will just loot it, lock it up and go. 0:06:31.931,0:06:34.102 Your insurance company[br]will roll over on you 0:06:34.102,0:06:36.184 because there's not[br]evidence of a break-in. 0:06:36.184,0:06:39.626 For one manufacturer we figured[br]out how to manipulate that key 0:06:39.626,0:06:43.373 so that it will open every car[br]from that manufacturer. 0:06:43.373,0:06:44.659 (Laughter) 0:06:44.659,0:06:47.930 There is a point to be made about this[br]which I barely have time for, 0:06:47.930,0:06:52.184 but it's that your car is now a PC,[br]your phone is also a PC, 0:06:52.184,0:06:55.723 your toaster, if it is not a PC,[br]soon will be. Right? 0:06:55.723,0:06:57.757 And I'm not joking about that. 0:06:57.757,0:07:00.192 And the point of that is[br]that when that happens 0:07:00.192,0:07:04.342 you inherit all the security[br]properties and problems of PC's. 0:07:04.342,0:07:06.462 And we have a lot of them. 0:07:06.462,0:07:09.262 So keep that in mind,[br]we can talk more about that later. 0:07:09.262,0:07:12.575 Anybody use a lock like this[br]on your front door? 0:07:12.575,0:07:14.528 OK, good. 0:07:14.528,0:07:15.895 I do too. 0:07:15.895,0:07:17.205 This is a Schlage lock. 0:07:17.205,0:07:19.800 It's on half of the front doors[br]in America. 0:07:19.800,0:07:23.240 I brought one to show you. 0:07:23.240,0:07:25.437 So this is my Schlage lock. 0:07:25.437,0:07:30.413 This is a key that fits the lock,[br]but isn't cut right, so it won't turn it. 0:07:30.413,0:07:34.702 Anybody here ever tried[br]to pick locks with tools like this? 0:07:34.702,0:07:39.207 All right, got a few,[br]few nefarious lock pickers. 0:07:39.893,0:07:41.994 Well, it's for kids with OCD. 0:07:41.994,0:07:44.615 You've got to put them in there,[br]and finick with them, 0:07:44.615,0:07:47.613 spend hours getting the finesse[br]down to manipulate the pins. 0:07:47.613,0:07:51.457 You know, for the ADD kids in the house[br]there's an easier way. 0:07:51.457,0:07:53.226 I put my little magic key in here, 0:07:53.226,0:07:55.917 I put a little pressure on there[br]to turn it, (Tapping) 0:07:55.917,0:07:59.253 smack it a few times[br]with this special mallet 0:07:59.253,0:08:02.322 and I just picked the lock. We're in. 0:08:03.312,0:08:05.094 It's easy. 0:08:05.094,0:08:08.309 And in fact, I don't really know[br]much more about this than you do. 0:08:08.309,0:08:09.897 It's really, really easy. 0:08:09.897,0:08:12.328 I have a keychain I made[br]of the same kind of key 0:08:12.328,0:08:14.508 for every other lock in America. 0:08:14.508,0:08:19.442 And if you're interested,[br]I bought a key machine 0:08:19.442,0:08:22.510 so that I can cut these keys[br]and I made some for all of you guys. 0:08:22.510,0:08:23.710 (Laughter) 0:08:23.710,0:08:25.604 (Applause) 0:08:25.604,0:08:28.256 So my gift to you,[br]come afterwards and I will show you 0:08:28.256,0:08:30.609 how to pick a lock[br]and give you one of these keys 0:08:30.609,0:08:32.628 you can take home and try it on your door. 0:08:32.628,0:08:35.663 Anybody used these USB thumb drives? 0:08:35.663,0:08:39.378 Yeah, print my Word document, yeah! 0:08:39.378,0:08:42.574 They're very popular. 0:08:42.574,0:08:46.489 Mine works kind of like yours.[br]You can print my Word document for me. 0:08:46.489,0:08:50.015 But while you're doing that,[br]invisibly and magically in the background 0:08:50.015,0:08:54.056 it's just making a handy backup[br]of your My Documents folder, 0:08:54.056,0:08:58.132 and your browser history and cookies[br]and your registry and password database, 0:08:58.132,0:09:02.076 and all the things that you might need[br]someday if you have a problem. 0:09:02.076,0:09:05.963 So we just like to make these things[br]and litter them around at conferences. 0:09:05.963,0:09:09.758 (Laughter) 0:09:09.758,0:09:11.977 Anybody here use credit cards? 0:09:11.977,0:09:13.145 (Laughter) 0:09:13.145,0:09:14.435 Oh, good! 0:09:14.435,0:09:17.956 Yeah, so they're popular[br]and wildly secure. 0:09:17.956,0:09:19.210 (Laughter) 0:09:19.210,0:09:22.506 Well, there's new credit cards[br]that you might have gotten in the mail 0:09:22.506,0:09:25.538 with a letter explaining how[br]it's your new "Secure credit card". 0:09:25.538,0:09:27.004 Anybody get one of these? 0:09:27.004,0:09:31.593 You know it's secure because[br]it has a chip in it, an RFID tag, 0:09:31.593,0:09:34.792 and you can use these in[br]Taxicabs and at Starbucks, 0:09:34.792,0:09:37.956 I brought one to show you,[br]by just touching the reader. 0:09:37.956,0:09:39.969 Has anybody seen these before? 0:09:39.969,0:09:42.451 Okay, who's got one? 0:09:44.151,0:09:45.960 Bring it on up here. 0:09:45.960,0:09:47.910 (Laughter) 0:09:47.910,0:09:50.616 There's a prize in it for you. 0:09:50.616,0:09:53.622 I just want to show you[br]some things we learned about them. 0:09:53.622,0:09:55.663 I got this credit card in the mail. 0:09:55.663,0:09:58.219 I really do need some volunteers,[br]in fact, I need 0:09:58.219,0:10:01.207 one, two, three, four, five[br]volunteers because the winners 0:10:01.207,0:10:04.221 are going to get these[br]awesome stainless steel wallets 0:10:04.221,0:10:08.270 that protect you against the problem that[br]you guessed, I'm about to demonstrate. 0:10:08.270,0:10:10.570 Bring your credit card up here[br]and I'll show you. 0:10:10.570,0:10:14.158 I want to try it on one of these[br]awesome new credit cards. 0:10:14.158,0:10:15.670 OK. 0:10:18.796,0:10:21.258 Do we have a conference organizer, 0:10:21.258,0:10:23.872 somebody who can coerce people[br]into cooperating? 0:10:23.872,0:10:24.825 (Laughing) 0:10:24.825,0:10:28.583 It's by your own volition because - 0:10:29.573,0:10:32.708 This is where the demo gets really awesome 0:10:32.708,0:10:34.370 I know you guys have never seen - 0:10:34.370,0:10:35.564 (Inaudible question) 0:10:35.564,0:10:37.092 What's that? 0:10:37.092,0:10:40.626 They're really cool wallets[br]made of stainless steel. 0:10:41.133,0:10:44.867 Anybody else seen code[br]on screen at TED before? 0:10:44.867,0:10:47.001 Yeah, this is pretty awesome. 0:10:47.001,0:10:49.808 (Laughter) 0:10:51.528,0:10:53.432 OK, great I got volunteers. 0:10:53.432,0:10:56.590 So who has one of these[br]exciting credit cards? 0:10:57.790,0:10:59.282 OK, here we go. 0:10:59.282,0:11:01.506 I'm about to share[br]your credit card number 0:11:01.506,0:11:03.890 only to 350 close friends. 0:11:03.890,0:11:06.194 Hear the beep? 0:11:06.194,0:11:08.780 That means someone's hacking[br]your credit card. 0:11:08.780,0:11:10.107 OK, what did we get? 0:11:10.107,0:11:14.623 Valued customer and the credit[br]card number and expiration date. 0:11:14.623,0:11:18.916 It turns out your secure new[br]credit card is not totally secure. 0:11:19.332,0:11:21.894 Anybody else want to try yours[br]while you're here? 0:11:21.894,0:11:24.053 Man: Can you install overdraft protection? 0:11:24.053,0:11:26.478 PH: Beep, let's see what we got? 0:11:26.478,0:11:28.842 So we bitched about[br]this and AMEX changed it, 0:11:28.842,0:11:31.146 so it doesn't show the name anymore. 0:11:31.146,0:11:35.483 Which is progress.[br]You can see mine, if it shows it. 0:11:37.043,0:11:40.702 Yeah, it shows my name on it,[br]that's what my Mom calls me anyway. 0:11:40.702,0:11:43.395 Yours doesn't have it. 0:11:44.365,0:11:48.530 Anyway, so next time you get[br]something in the mail 0:11:48.530,0:11:51.957 that says it's secure, send it to me. 0:11:51.957,0:11:54.582 (Laughter) 0:11:55.754,0:11:59.046 Oh wait, one of these is empty, hold on. 0:12:00.856,0:12:03.459 I think this is the one, yep, here you go. 0:12:03.459,0:12:05.422 You get the one that's disassembled. 0:12:05.422,0:12:06.829 All right, cool. 0:12:06.829,0:12:10.351 (Applause) 0:12:10.351,0:12:14.094 I still have a few minutes yet left,[br]so I'm going to make a couple of points. 0:12:14.094,0:12:15.025 (Laughter) 0:12:15.025,0:12:16.512 Oh, shit. 0:12:16.512,0:12:21.039 That's my subliminal messaging campaign.[br]It was supposed to be much faster. 0:12:21.039,0:12:25.209 Here's the most exciting slide[br]ever shown at TED. 0:12:25.209,0:12:27.502 This is the protocol diagram for SSL, 0:12:27.502,0:12:29.853 which is the encryption[br]system in your web browser 0:12:29.853,0:12:33.324 that protects your credit card when you're[br]sending it to Amazon and so on. 0:12:33.324,0:12:35.341 Very exciting, I know, but the point is 0:12:35.341,0:12:39.173 hackers will attack every[br]point in this protocol, right? 0:12:39.173,0:12:42.795 I'm going to send two responses[br]when the server's expecting one. 0:12:42.795,0:12:45.664 I'm going to send a zero[br]when it's expecting a one. 0:12:45.664,0:12:48.506 I'm going to send twice as much[br]data as it's expecting. 0:12:48.506,0:12:51.384 I'm going to take twice as long[br]answering as it's expecting. 0:12:51.384,0:12:54.406 Just try a bunch of stuff.[br]See where it breaks. 0:12:54.406,0:12:56.218 See what falls in my lap. 0:12:56.218,0:13:01.282 When I find a hole like that[br]then I can start looking for an exploit. 0:13:01.282,0:13:06.240 This is a little more what SSL looks[br]like to hackers, that's really boring. 0:13:06.240,0:13:10.747 This guy kills a million Africans a year. 0:13:11.031,0:13:14.791 It's Anopheles stephensi mosquito[br]carrying malaria. 0:13:15.738,0:13:17.788 Is this the wrong talk? 0:13:17.788,0:13:19.403 (Laughter) 0:13:19.403,0:13:23.258 This is a protocol diagram for malaria. 0:13:23.892,0:13:27.477 So what we're doing in our lab[br]is attacking this protocol 0:13:27.477,0:13:29.681 at every point we can find. 0:13:29.681,0:13:32.758 It has a very complex life cycle[br]that I won't go into now, 0:13:32.758,0:13:36.227 but it spends some time in humans,[br]some time in mosquitos 0:13:36.227,0:13:39.467 and what I need are hackers. 0:13:39.467,0:13:43.508 Because hackers have a mind[br]that's optimized for discovery. 0:13:43.934,0:13:47.407 They have a mind that's optimized[br]for figuring out what's possible. 0:13:47.407,0:13:49.805 You know, I often illustrate this[br]by saying, 0:13:49.805,0:13:54.676 If you get some random new[br]gadget and show it to your Mom, 0:13:55.455,0:13:59.245 she might say, "Well, what does this do?"[br]And you'd say "Mom, it's a phone." 0:13:59.245,0:14:02.566 And instantly, she'd would know[br]exactly what it's for. 0:14:02.566,0:14:05.085 But with a hacker,[br]the question is different. 0:14:05.085,0:14:08.909 The question is,[br]"What can I make this do?" 0:14:09.102,0:14:12.029 I'm going to take all the screws out,[br]and take the back off, 0:14:12.029,0:14:13.984 and break it into a lot of little pieces. 0:14:13.984,0:14:17.343 But then I'm going to figure out[br]what I can build from the rubble. 0:14:17.343,0:14:21.299 That's discovery, and we need to do that[br]in science and technology 0:14:21.299,0:14:23.439 to figure out what's possible. 0:14:23.439,0:14:27.118 And so in the lab what I'm trying[br]to do is apply that mindset 0:14:27.118,0:14:29.583 to some of the biggest[br]problems humans have. 0:14:29.583,0:14:34.152 We work on malaria, thanks to[br]Bill Gates, who asked us to work on it. 0:14:34.152,0:14:36.863 This is how we used to solve malaria. 0:14:36.863,0:14:39.070 This is a real ad from like the 40's. 0:14:39.070,0:14:43.205 We eradicated malaria in the US[br]by spraying DDT everywhere. 0:14:44.455,0:14:48.505 In the lab what we do is a lot of work[br]to try and understand the problem. 0:14:48.505,0:14:53.658 This is a high-speed video,[br]we have a badass video camera, 0:14:53.658,0:14:56.293 trying to learn how mosquitos fly. 0:14:56.293,0:14:59.441 And you can see that[br]they're more like swimming in air. 0:14:59.441,0:15:01.299 We actually have no idea how they fly. 0:15:01.299,0:15:03.520 But we have a cool video camera so we - 0:15:03.520,0:15:05.534 (Laughter) 0:15:05.534,0:15:09.245 Yeah, it cost more than a Ferrari. 0:15:09.245,0:15:12.395 Anyway we came up with some[br]ways to take care of mosquitos. 0:15:12.395,0:15:14.807 Let's shoot them down with laser beams. 0:15:14.807,0:15:19.318 This is what happens when you put[br]one of every kind of scientist in a room 0:15:19.318,0:15:21.318 and a laser junky. 0:15:21.318,0:15:25.237 So people thought it was funny at first, 0:15:25.237,0:15:30.076 but we figured out, you know, we can[br]build this out of consumer electronics. 0:15:30.076,0:15:33.390 It's using the CCD from a webcam, 0:15:33.390,0:15:36.590 the laser from a Blu-ray burner, 0:15:36.590,0:15:40.212 the laser galvo is from a laser printer. 0:15:40.212,0:15:43.220 We do motion detection on a GPU processor 0:15:43.220,0:15:45.414 like you might find in video game system. 0:15:45.414,0:15:47.343 It's all stuff that follows Moore's law. 0:15:47.343,0:15:50.228 So it's actually not going to[br]be that expensive to do it. 0:15:50.228,0:15:52.466 The idea is that we would put 0:15:52.466,0:15:56.317 a perimeter of these laser systems[br]around a building or a village 0:15:56.317,0:15:59.507 and just shoot all the mosquitos[br]on their way in to feed on humans. 0:15:59.507,0:16:02.800 And we might want to do that[br]for your backyard. 0:16:02.800,0:16:04.763 We could also do it to protect crops. 0:16:04.763,0:16:06.629 Our team is right now working on 0:16:06.629,0:16:09.285 characterizing what they[br]need to do the same thing for 0:16:09.285,0:16:12.899 the pest that has wiped out[br]about two thirds 0:16:12.899,0:16:16.477 of the Orange groves in Florida. 0:16:18.102,0:16:20.719 So people laughed at first. 0:16:20.719,0:16:23.441 This is a video of our system working. 0:16:23.441,0:16:26.119 We are tracking mosquitos live[br]as they fly around. 0:16:26.119,0:16:28.622 Those crosshairs are put there[br]by our computer. 0:16:28.622,0:16:30.483 It just watches them, finds them moving 0:16:30.483,0:16:34.217 and then it aims a laser at them[br]to sample their wing beat frequency. 0:16:34.217,0:16:37.424 Figure out from that, is this a mosquito? 0:16:37.424,0:16:40.325 Is it Anopheles Stephensi?[br]Is it female? 0:16:40.325,0:16:44.912 And if all that's true then[br]we shoot it down with lethal laser. 0:16:44.912,0:16:46.981 (Laughter) 0:16:46.981,0:16:48.753 So we have this working in a lab. 0:16:48.753,0:16:51.879 We're working on taking[br]that project into the field now. 0:16:51.879,0:16:56.425 All this happens at the Intellectual[br]Ventures Lab in Seattle where I work 0:16:56.425,0:17:01.626 and we try and take on some[br]of the hardest problems that humans have. 0:17:01.626,0:17:03.468 This is the money shot. 0:17:03.468,0:17:06.731 You can see we just burned[br]his wing off with a UV laser. 0:17:06.731,0:17:08.849 He's not coming back. 0:17:08.849,0:17:12.072 (Applause) 0:17:12.072,0:17:15.874 Kind of vaporized[br]his wing right there, yeah. 0:17:15.874,0:17:18.636 They love it.[br]I mean, you know. 0:17:18.636,0:17:20.769 Never got called by PETA or anyone else. 0:17:20.769,0:17:23.226 I mean, it's the perfect enemy. 0:17:23.226,0:17:26.379 There's just no one coming[br]to the rescue of mosquitos. 0:17:26.379,0:17:29.660 Sometimes we overdo it. 0:17:29.660,0:17:32.093 So anyway, I'm going to get off stage. 0:17:32.093,0:17:35.141 This is the Intellectual Ventures Lab[br]where I work. 0:17:35.141,0:17:37.835 Basically we use every kind of scientist 0:17:37.835,0:17:42.185 and one of every tool in the world[br]to work on crazy invention projects. 0:17:42.185,0:17:43.537 Thanks. 0:17:43.537,0:17:45.285 (Applause)