This Time, James Bond Fights Hackers - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure // PC & Servers
News
11/12/2012
06:57 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

This Time, James Bond Fights Hackers

James Bond spends most of his time during Skyfall fighting a cyber terrorist. The latest James Bond flick might be unrealistic, but it reminds us that losing data, especially to hackers, can be a very bad thing.

James Bond has always leaned on his gadgets for an edge in fighting off villains. The latest movie is no different. Skyfall has its share of high-tech gadgets: a palm-print reader; a radio transmitter that reveals Bond's location when pressed; plus a classic Bond car, the Aston Martin DB5. But for the most part, James Bond, played by actor Daniel Craig, does not depend on typical 007 devices like exploding pens or jet packs. Instead, the conflict in Skyfall centers on computer hacking, and how sensitive data in the wrong hands can put lives at risk.

Of course, the hacking in Skyfall is a James Bond version of hacking -- not realistic. "Skyfall's depiction of hacking was a lot like Star Trek's depiction of space travel -- a lot of jargon used in a way that has no meaning whatsoever," said Raphael Mudge, founder of Strategic Cyber.

From the movie trailer you don't get the impression that hacking is critical to the plot, but it is:

Spoiler alert: The movie begins with Bond trying to find a missing hard drive, which has encrypted information about agents. He's soon fighting the guy who has the hard drive on top of a fast-moving train.

M, the head of the British Secret Intelligence Service, is put in a vulnerable situation, knowing lives are at risk if the data is released. M makes the decision to allow a sharpshooter to take down the bad guy to hasten recovery of the hard drive. Bond is shot instead, and disappears for some time. When he sees that headquarters are under a cyber attack, he returns to duty in London.

To fight off the threat of cyberwar and security loopholes, Bond depends on human intelligence -- mainly Q, the quartermaster, who is a computer hacking genius. In introducing himself to Bond, Q quips, "I can do more damage on my laptop, sitting in my pajamas, before my first cup of Earl Grey than you can do in a year in the field. Every now and then a trigger has to be pulled."

Later in the film, the information from the hard drive is released on YouTube and several agents are assassinated.

The concept of "security by obscurity" even comes up in the film. It's well known in the security field that protecting a system this way doesn't actually work. Computer experts explain why on Quora.

Perhaps Skyfall was inspired by the Stuxnet virus, which was created by the U.S. and Israel to spy on Iran's nuclear enrichment facilities. The virus was discovered in June 2010, and it spreads through Microsoft Windows and can affect Siemens equipment. The Wall Street Journal reports that Stuxnet also infected Chevron's network.

The villain Raoul Silva, played by Javier Bardem, is a cyber terrorist. Many have made the connection that Bond is fighting a Julian Assange-inspired character. The cyber terrorist Silva sends messages on the computer screen telling M to, "Think on your sins."

In reality, penetrating a corporation would look more like what Mudge demonstrated to me during BlackHat and Defcon. Skyfall does remind us, though, that losing data could cause serious damage if that information falls into the wrong hands and that connecting devices to a network can compromise the system.

In all, Skyfall provided a few hours of entertainment. And although not very realistic, it did allude to the war we are currently fighting -- cyberwar. There was no mention of Bond bringing his own smart phone or tablet to the office, but maybe that's a good thing. BYOD might have introduced even more vulnerabilities into the network.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll