麻豆果冻传媒

In Short

Cybersecurity Awareness for the Masses, Part III

Cautionary Tales

Cyber attack
Shutterstock // goir

For the third and final installment looking at the 麻豆果冻传媒 Cybersecurity Fellows鈥 favorite pop culture references, we look at cautionary tales. Having looked at inspirational references in Part I and specifically at examples of strong representation in Part II, we now turn to examples that either highlight risks, including through science fiction, or highlight the dangers of bad cybersecurity. Once again, let us know your favorite cybersecurity related pop references at .

David Forscey – Senior Policy Analyst at National Governors Association Center

Tomorrow Never Dies

On December 16, 1997, director Roger Spottiswoode introduced the world to Tomorrow Never Dies, a highly underrated James Bond film centered around a megalomaniac mogul, Elliot Carver (Jonathan Pryce), bent on dominating global media markets. As a popular depiction of cybersecurity challenges, this film deserves credit for its prescience and imagination. Carver鈥檚 plan involves manipulating GPS signals to send a British warship off course into Chinese territorial waters (fans know these waters really belong to Vietnam), triggering a dangerous slide toward World War III. The cyberattack at issue does not use exotic remote exploits. Instead, it employs an insider attack to make subtle changes to ordinary timing mechanisms. The attackers鈥 purpose is not to steal information or destroy systems, but rather to use disinformation to shape human action and alter global outcomes. As attack methods evolve and politics merge with cyberspace, we would do well to remember Elliot Carver.

Peter Singer – Strategist at 麻豆果冻传媒

Independence Day

While I would like to reference I'll go with the laughable way that humans win Independence Day. The Aliens have a dominant military, the likes of which the world has never seen. And yet they have not put into place the most basic cybersecurity measures, which allows their defeat. That, of course, could never happen in the real world (he writes while leafing through a copy of the latest GAO report on how "nearly all" of US military systems built between 2012 and 2017, from the F-35 to missile launch systems, lacked basic measures all the way down to default passwords and proved "easy to hack").

Graham Webster – Editor at 麻豆果冻传媒鈥檚 DigiChina Project

Liu Cixin鈥檚 "Three-Body" trilogy

In the Chinese context, especially observing from the United States, so much of cybersecurity is tied up with an epochal struggle to develop the most secure, advanced, and autonomous techno-industrial base possible. This is especially so given that, in the ZTE sanctions case, the U.S. government threatened to cut off a key Chinese firm鈥檚 access to crucial semiconductors or other products. When ZTE was really on the ropes, as our DigiChina project reported, Chinese leader Xi Jinping called for China to 鈥渃ast aside illusions and rely on ourselves.鈥 But what if an adversary prevents you from relying on yourself?

Humanity鈥檚 interstellar antagonists in Liu Cixin鈥檚 are able to do just that through the 鈥渟ophon lock.鈥 Sophons are Liu鈥檚 invented physical phenomenon that allows communication, undetectable surveillance, and sabotage at a great distance and without the limitation of light speed. These capabilities combine to impose the sophon lock, which essentially freezes Earth's progress in physics and what Chinese leaders might call 鈥渃ore technologies鈥 so that, as the story comes to a head, humanity鈥檚 enemies maintain an important technological edge. This physics-based IT asymmetry echoes the uncertain but not-totally-outlandish potential for disruptive asymmetry in quantum technologies in the mid-term future.

Natasha Cohen – Cybersecurity Fellow at 麻豆果冻传媒鈥檚 Cybersecurity Initiative

Battlestar Galactica – 2003 Reboot

In Battlestar Galactica, the cybernetic antagonists of humanity, the Cylons, launch a surprise nuclear attack, wiping out most of the population of the Twelve Colonies. They also render most of the military ineffective by introducing malware into the military computer network. The Battlestar Galactica, which was in the process of being decommissioned and turned into a museum when the attack occurred, was never networked, so remains unaffected鈥 a of sorts. There is a line in the first episode as a public affairs officer is giving a tour that describes how the Galactica is different than the rest of the modern fleet: 鈥淵ou will see things that look antiquated, even strange. Like phones with cords, awkward manual valves… it was all designed to operate against an enemy who could infiltrate and disrupt even the most basic of computer systems … we looked backward for protection.鈥

This event brings up a number of prescient themes, such as the dangers of over-networking and linking systems together, as well as the conflict between security and convenience. It also sets up a terrific TV show plot.

Camille Stewart – Manager at Deloitte & Touche LLP

Grey鈥檚 Anatomy

I am a long-time Grey鈥檚 Anatomy fan so when a ransomware attack hit Grey Sloan Memorial last season, I was very interested to see if it would be true to life.

During this two episode storyline, the hacker used ransomware to lock the doctors out of their patients' electronic records, shut down systems, demand the ransom paid in bitcoin, sealed the blood bank doors, and tortured the hospital's inhabitants by cranking up the thermostat. While some of it was sensationalized for TV, the show highlighted the effect such an attack could have on patients, equipment, facilities, and staff. The connected nature of hospital systems, the inability to view medical charts, the vulnerability of necessary medical devices like CT scanners, and the difficulty in getting data back, if not backed up, all highlighted realistic effects of a ransomware attack on a hospital. Also, the FBI鈥檚 warning not to pay a ransomware demand unless it鈥檚 the last resort is real although much of the rest of that plotline is not. Overall, this depiction of the effects of a ransomware attack was a good introduction for a mainstream audience.

Here is some more detailed commentary on the accuracy of & .

Robert Morgus – Sr. Policy Analyst at 麻豆果冻传媒鈥檚 Cybersecurity Initiative

A Fire Upon the Deep

In Vernor Vinge's book A Fire Upon the Deep (1994), the galaxy is divided into four Zones of Thought: Unthinking Depths鈥攊nnermost zone at the galactic core, the Slow Zone鈥攚here 鈥淥ld Earth鈥 resides, the Beyond, and the Transcend. Distance from the galactic core equates to greater the technological potential for civilizations and traveling between zones results in a real-time loss of capability.

Our heros, Pham and Ravna鈥攈uman descendents in the Beyond鈥攆lee from a superintelligence: the Blight, beings from the Transcend. During their flight, a natural phenomenon sends a Slow Zone tsunami cascading into the Beyond, suddenly depriving groups of Beyond-level technology. In a desperate attempt to restore automation, the Blight conduct a digital attack via the 鈥淣et of a Million Lies鈥 (a galactic internet鈥 how fitting) co-opting the computing power of civilizations and things around them.

I love this depiction for two modern phenomena it foreshadows: First, the 鈥淣et of a Million Lies鈥 is a hilarious/sad foreshadow of what our internet has become, where false, mis-, and dis-information seem as prevalent as valid info. Second, the Blight鈥檚 co-option of computing power mirrors the action of modern threat actors, who often coopt neutral computers to bolster computing power and/or obfuscate the source of attacks.

Dani Charles – CEO and Co-Founder of Charles Bernard Ventures

Parks & Recreation

To many, the internet is quickly becoming a scary place. Take, for example, the intro scene for Parks and Recreation Season 4 Episode 9. When Ron Swanson (Nick Offerman) discovers cookies are tracking him across the internet and that his home is viewable on Google Earth, he responds by throwing away his computer. This epitomizes a false choice that many people feel鈥攗se the internet and be constantly vulnerable, or don't use it at all (which isn't really an option at all). This feeling is further exacerbated by the constant stream of new risks/threats, shared via news stories, reports put out by security companies, and amplified by movies/shows that portray the internet as an ominous, ever-threatening environment. This is why Cybersecurity Awareness Month is so critical鈥攊t is a great time to remind people that all is not lost and that there are meaningful best practices they can leverage to allow them to enjoy their devices, the internet AND a better cybersecurity posture.

Nicholas Wright – Consultant, Intelligent Biology

Yes, Minister

Perhaps the most insightful fictional TV series about political decision-making in the last four decades is a wonderful 1980s BBC comedy: . Then Prime Minister Margaret Thatcher made a Yes Minister sketch, and PMs from Tony Blair to David Cameron note its veracity. It contains a lot related to current debates in cyber鈥攁nd illustrates that many cyber or AI challenges, and their solutions, are not new at all.

Consider Episode 4, entitled "Big Brother", which first aired in 1980. Featuring the introduction of a new national integrated database, sectional bureaucratic interests block the introduction of privacy safeguards. They aren鈥檛 overcome by cogent argument. The Minister鈥檚 old-fashioned political tactics win the day on behalf of privacy鈥攁lthough as any viewer knows it could easily have gone the other way, and the Minister loses as many (or more) such battles than he wins.

Political and bureaucratic forces engage in eternal tussles, and not just in the US or UK. One may read Chinese AI policy and perceive a coherent鈥攑erhaps even threatening鈥攕trategy. But they are no more free of bureaucratic politics and clashing Ministries than the rest of us. Indeed, China has a good claim to the invention bureaucracy itself.

Ido Kilovaty – Law Professor, University of Tulsa College of Law

Black Mirror

I am personally a big fan of the 鈥淗ated in the Nation鈥 episode of Black Mirror (S03E06). In that episode, detective Karin Parke (Kelly Macdonald) is summoned to investigate the death of different online personas. Parke discovers that the victims had been targeted with the Twitter hashtag #DeathTo, used against people who become public hate figures. One victim鈥檚 autopsy reveals an Autonomous Drone Insect (ADI), created to replace the now-extinct bee population, burrowed in her brain. Parke links the deaths to a website promoting a "game" where Twitter users can vote to kill a hated public figure, with the victim selected via the #DeathTo hashtag. The investigation leads to the conclusion that the ADIs find their targets using advanced facial recognition software, and this can only be possible if the company who developed these ADIs had access to government records. As a result, the government is forced to admit that it is covertly using ADIs for mass public surveillance, as this was the only incentive to back the project with the funds necessary to make it successful.

This is an example that demonstrates the growing cybersecurity threat of autonomous drones, facial recognition, and the risks associated with bulk government surveillance.

Justin Sherman – Student at Duke University

Veep

In season 5, episode 3 of HBO鈥檚 Veep, President Selina Meyer (Julia Louis-Dreyfus) is dealing with the fallout of a tweet she should not have sent鈥攆or what she thought was a private message ends up broadcasted from the POTUS Twitter account. (In the name of full transparency, this episode ran back in 2016 before Donald Trump was himself POTUS. Props for good writing!) This questionable tweet happens to coincide with a Chinese breach of several government systems, which Selina decides to publicly announce and then attribute as the cause of the tweet. 鈥淐an I really blame another country for something they didn鈥檛 do?鈥 she asks one of her advisers of the cyber incident. Of course, replies her chief of staff. 鈥淚t鈥檚 been the cornerstone of American foreign policy since the Spanish-American War.鈥

What I love about this bit鈥攊ncluded, of all things, in a political satire鈥攊s that it communicates several important aspects of cybersecurity at the national level: The public was not aware of the data breach, which meant the discloser could control the narrative. It was too soon after the incident for any private or third-party entity to reasonably pin down attribution, which meant the government could again point fingers with little challenge. But that still didn鈥檛 mean others wouldn鈥檛 know鈥攊ndeed, the Chinese President later confronts Selina about her false accusations during a private meeting (leveraging her lie back against her). It鈥檚 all useful commentary buried in an otherwise over-the-top show! And with this episode, of course, you also learn to always be careful of what you tweet.

Sharon Bradford Franklin – Co-Director at 麻豆果冻传媒鈥檚 Cybersecurity Initiative

Her

The movie Her won the Academy Award for the best original screenplay in 2014. It portrays a man, Theodore, who falls in love with his operating system (OS), for whom he picks a female voice, and she names herself Samantha. Samantha embodies so many of the hopes and fears that we all have for artificial intelligence. Her capabilities are highly impressive and continually improving at exponential speed. On the other hand, when Samantha begins to take over Theodore's work as a writer as well as his emotions, she embodies the fears of many that AI could take over our lives, surpass our abilities, and control us. Hopefully, we will all learn how to take advantage of AI's benefits, craft AI systems with appropriate safeguards, and maintain a healthy balance in our lives.

Programs/Projects/Initiatives

Topics

Cybersecurity Awareness for the Masses, Part III