What's Hot

    ‘I am her scapegoat’: My mother-in-law squandered all her cash. Do we purchase her a home so she’s not homeless? | Invesloan.com

    April 29, 2026

    Senate Banking Committee set to vote Wednesday on Trump’s Fed choose Warsh | Invesloan.com

    April 29, 2026

    Nontechnical Manager Has 37 AI Agents That He Oversees | Invesloan.com

    April 29, 2026
    Facebook Twitter Instagram
    Finance Pro
    Facebook Twitter Instagram
    invesloan.cominvesloan.com
    Subscribe for Alerts
    • Home
    • News
    • Politics
    • Money
    • Personal Finance
    • Business
    • Economy
    • Investing
    • Markets
      • Stocks
      • Futures & Commodities
      • Crypto
      • Forex
    • Technology
    invesloan.cominvesloan.com
    Home » ‘Leave the World Behind’ Film Cyberattack Unlikely IRL: Consultants | Invesloan.com
    Money

    ‘Leave the World Behind’ Film Cyberattack Unlikely IRL: Consultants | Invesloan.com

    December 26, 2023Updated:December 26, 2023
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • In Netflix’s “Leave the World Behind,” an unknown entity shuts down communications throughout the US.
    • The cyberattack is later defined as a part of a “cost-effective way to destabilize a country.”
    • A cyberwarfare skilled instructed BI an assault like this might require an immense quantity of coordination.

    Thanks for signing up!

    Access your favourite matters in a personalised feed whilst you’re on the go.

    Bull

    Warning: spoilers forward…

    What would essentially the most cost-effective army marketing campaign to destabilize a rustic appear like?

    According to Netflix’s “Leave the World Behind,” which is predicated on Rumaan Alam’s novel of the identical identify and govt produced by the Obamas, that program begins with “isolation.”

    In the movie, web and mobile companies are shut down, cable is reduce off, and transportation akin to oil tankers, airplanes, and Teslas mysteriously go haywire shortly.

    The aim, based on Mahershala Ali’s character, George ‘G.H.’ Scott, can be to make the goal nation “as deaf, dumb, and paralyzed as possible” to trigger confusion and finally topple an already-divided nation’s authorities from inside by sparking a civil warfare.

    Could hackers or a international adversary pull off a cyberattack just like the one seen in “Leave the World Behind”?

    The film proposes a chilling situation, however it’s extremely unlikely, cybersecurity specialists say.

    Chad Heitzenrater, a senior data scientist at RAND Corporation specializing in cyberwarfare and a former authorities worker, instructed Business Insider that an assault as refined and large-scale because the one within the movie would require almost inconceivable coordination.

    Heitzenrater famous that the views he expressed to BI don’t replicate the views of RAND.

    “The planning that goes into it, and many of these operations just like any military operation … they’re not guaranteed,” Heitzenrater stated. “So to have that many things you’re going to act on, be that assured they’re all going to work, and execute them in a timeframe that makes them all look that coordinated such that everything is out all at once — that would be a really heavy lift for anybody, even for a nation-state.”

    Large-scale vs. small-scale

    Take, for instance, how the movie means that cellphone service was disrupted throughout all networks within the US.

    While there have been circumstances when cell networks have been shut down, Heitzenrater stated that taking down all the community of only one supplier, akin to Verizon, which owns its telecommunications community, “would be hard to imagine.”

    There could possibly be some facet of a supplier wherein a foul actor can make the most of a vulnerability that may impression its total community — in his discipline of labor, Heitzenrater says he isn’t one to say something is inconceivable — however a “far more likely” situation can be a “more regional or limited” impression on one cellphone community.

    The identical goes for the widespread impression of transportation. In the movie, the navigation techniques of ships, airplanes, and Teslas are in some way overridden. A extra believable plan can be a localized impression on planes since air journey is more and more automated, Heitzenrater stated.

    Jasson Casey, CEO of Beyond Identity, an authentication platform, instructed Bloomberg that hacking boats and planes and sending “fake navigation signals” is feasible, however “most of the planes and boats still have an ability for the crew to take over if something seems amiss.”

    “I don’t even think this would be likely,” Heitzenrater stated, including {that a} extra regarding situation can be if somebody have been to disrupt the Federal Aviation Administration’s computerized planning techniques, wherein case flights must keep grounded till the issue is solved.

    Is cyberwarfare low-cost?

    Whether a cyberattack of this degree is “cost-effective” can be onerous to say.

    “If I could answer that question, I would have one of those papers that everybody references,” Heitzenrater stated.

    But an operation of this scale definitely would not be low-cost.

    What could make a cyberattack “cheap” is that vulnerabilities in a specific system can typically enable hackers to impression a number of targets, and the dangerous actor can use that vulnerability repeatedly, he stated. And within the case of 1 cybercriminal benefiting from some vulnerability by, for instance, ransomware, the operation can be pretty cheap.

    But on a bigger scale, discovering vulnerabilities throughout a number of sectors would require immense reconnaissance or intelligence gathering.

    “When you think about it in that aggregate, then it’s not as cheap,” Heitzenrater stated.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Keep Reading

    Nontechnical Manager Has 37 AI Agents That He Oversees | Invesloan.com

    PMs Can Code With AI however Engineers Must Set Expectations: Cursor Staff | Invesloan.com

    Tory Burch Says She Built Company Without a ‘Trade Off’ on Being a Mom | Invesloan.com

    Meet the Unlikely Vibe Coders Changing Who Tech Is for | Invesloan.com

    Robotics CEOs Love Applicants With Autonomous Vehicle Experience | Invesloan.com

    Musk Cites Meetings With Obama and Larry Page in OpenAI Trial | Invesloan.com

    Former Microsoft Engineer Shares the Question He Asked Before Quitting | Invesloan.com

    OpenAI Trial Live Updates: Elon Musk Is Expected to Testify | Invesloan.com

    I Ran a Life Skills Camp for Kids to Learn How to Be More Independent | Invesloan.com

    LATEST NEWS

    ‘I am her scapegoat’: My mother-in-law squandered all her cash. Do we purchase her a home so she’s not homeless? | Invesloan.com

    April 29, 2026

    Senate Banking Committee set to vote Wednesday on Trump’s Fed choose Warsh | Invesloan.com

    April 29, 2026

    Nontechnical Manager Has 37 AI Agents That He Oversees | Invesloan.com

    April 29, 2026

    Bloom Energy is driving the AI wave with a significant raise from Oracle | Invesloan.com

    April 29, 2026
    POPULAR

    China’s first passenger jet completes maiden commercial flight

    May 28, 2023

    Numbers taking US accountancy exams drop to lowest level in 17 years

    May 29, 2023

    Toyota chair faces removal vote over governance issues

    May 29, 2023
    Advertisement
    Load WordPress Sites in as fast as 37ms!
    Facebook Twitter Pinterest WhatsApp Instagram
    © 2007-2023 Invesloan.com All Rights Reserved.
    • Privacy
    • Terms
    • Press Release
    • Advertise
    • Contact

    Type above and press Enter to search. Press Esc to cancel.

    invesloan.com
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}