F-Society, Fsociety, fSociety, fuck society.
Mr. Robot is probably the best series I've seen in 2015. The story line revolves around an anarchic, highly secretive, anti-establishment hacker group named "fSociety" based in Coney Island New York, intent on recruiting Elliot Alderson (Rami Malek) to help them with their mission to destroy the conglomerate E Corp and in the process cancel world debt . Elliot is a socially anxious yet morally righteous "white hat" super-hacker, whose day job with Allsafe Cybersecurity is to protect E Corp's servers against external exploits. Fsociety contact Elliot using a Distributed Denial Of Service (DDoS) attack that takes E Corp offline, but leaving a message in the DAT file on one of E Corps servers for him. As a result Eliot becomes cautiously affiliated to "fSociety" which is led by Mr. Robot (Christian Slater). After disabling the rootkit that was responsible for the DDoS, instead of deleting the file, he changed its root attributes, granting himself sole access.Elliot, Mr Robot and Darlene after the E corp crash. |
Elliot Alderson (Rami Malek) in Mr Robot |
Support for fSociety for cancelling the debt of masses |
However, the series does however gives laymen especially the corporate types a perspective of the data world of cyber spying, viruses, honeypots, spiked emails, trojans, rootkits, ransomware, encryption keys and other computer system vulnerabilities. The TOR network and onion routing protocols are mentioned a few times and in the very first episode it is highlighted that whoever owns the end nodes, owns all the data that traverses it. Meaning if any hacker owns the ISP of the business his targeting then every bit of data that flows through their data pipe belongs to him or her.
Scenes showing hackers destroying their own computer equipment "wipe down mode" is a bit overboard, and microwave oven and incinerator are a bit dramatic since power supplies and computer boxes are incapable of retaining any data. Most experienced hackers cover their tracks very well and leave no evidence behind unless they want to be caught. Except for the hardrives, the computer's BIOS, routers, cellphones and flash memory, the majority of other computer components save no information about use whatsoever.
A CPU cooking in a microwave |
Computer hardrives, hubs/switch, power supplies incinerated |
Besides, the Computer Abuse and Fraud Act is notoriously difficult to navigate and just as difficult to prosecute suspects. Considering hackers using the TOR browser is routed through several connections all over the world and changes their IP number through proxies at least 3 times masking their true identity online and making their connection appear as if it is coming from another country like Estonia for example. So the "IP address evidence" that is left behind is not theirs but rather totally anonymous. In fact the FBI has been paying a university crack team a million dollars to decode the TOR onion protocol yet more than 2 million hacks are taking place daily globally.
No comments:
Post a Comment