<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">James Plouffe | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2016-09-20T21:51:40+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/james-plouffe" />
	<id>https://www.vox.com/authors/james-plouffe/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/james-plouffe/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>James Plouffe</name>
			</author>
			
			<title type="html"><![CDATA[&#8216;Mr. Robot&#8217; may be fiction, but its hacking plots are all too real]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/9/20/12983780/mr-robot-may-be-fiction-but-its-hacking-plots-are-all-too-real" />
			<id>https://www.vox.com/2016/9/20/12983780/mr-robot-may-be-fiction-but-its-hacking-plots-are-all-too-real</id>
			<updated>2016-09-20T17:51:40-04:00</updated>
			<published>2016-09-20T16:00:03-04:00</published>
			<category scheme="https://www.vox.com" term="Business &amp; Finance" /><category scheme="https://www.vox.com" term="Future of Work" /><category scheme="https://www.vox.com" term="Media" /><category scheme="https://www.vox.com" term="Money" /><category scheme="https://www.vox.com" term="Robots" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[With the Season 2 finale of &#8220;Mr. Robot&#8221; upon us this Wednesday &#8212; and Sunday&#8217;s Emmy Award win for Rami Malek as Outstanding Lead Actor &#8212; it feels like an appropriate time to reflect on my own involvement with the show as a technical consultant, and, more broadly, the show&#8217;s implications for information security. The [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="Actor Rami Malek accepts Outstanding Lead Actor in a Drama Series for “Mr. Robot” onstage during the 68th Annual Primetime Emmy Awards. | Kevin Winter / Getty" data-portal-copyright="Kevin Winter / Getty" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7130509/Rami%2520Malek%2520Emmy.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	Actor Rami Malek accepts Outstanding Lead Actor in a Drama Series for “Mr. Robot” onstage during the 68th Annual Primetime Emmy Awards. | Kevin Winter / Getty	</figcaption>
</figure>
<p>With the Season 2 finale of &ldquo;<a href="http://www.recode.net/2016/7/10/12136188/mr-robot-season-2-trailer-preparation">Mr. Robot</a>&rdquo; upon us this Wednesday &mdash; and Sunday&rsquo;s <a href="http://www.theverge.com/2016/9/18/12965672/rami-malek-emmys-2016-mr-robot-award-win">Emmy Award win</a> for Rami Malek as Outstanding Lead Actor &mdash; it feels like an appropriate time to reflect on my own involvement with the show as a technical consultant, and, more broadly, the show&rsquo;s implications for information security.</p>

<p>The technical questions I was asked by the show&rsquo;s writing staff threw me off balance on several occasions, because what they wanted the characters to do was on a larger scale than the types of attacks I was accustomed to contemplating. Thinking about how to compromise a web server and then pivot to a database server to get at some data, for example, pales in comparison to executing a crypto-ransomware attack like the one against E Corp. And that attack, as it turned out, was only the beginning.</p>

<p>The exercise of <a href="https://www.wired.com/2016/07/real-hackers-behind-mr-robot-get-right/">planning some of the show&rsquo;s hacks</a> is certainly interesting, but the more dire the consequences, the more difficult it becomes, because what&rsquo;s being shown could &mdash; and in some cases has &mdash; happen(ed).</p>

<p>The question I get asked most often is &ldquo;How did you get involved?&rdquo; with this show that has been praised for its &ldquo;<a href="http://www.vulture.com/2015/07/mr-robot-usa-hacking-unusually-accurate.html">unusually accurate portrait of hacking</a>&rdquo; used by our heroes against the evil E Corp.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>In addition to making the cyber attacks realistic, we also want them to be timely.</p></blockquote></figure>
<p>A long time ago, in an office building far, far away, I worked with the (now) staff writer and tech producer Kor Adana. I was responsible for IT security, and Adana was a trusty lieutenant. We worked on a lot of things, but the best project we ever collaborated on was only loosely work-related. Specifically, we may have used some hacking tools in order to remind a free-riding co-worker that, in order to partake of the donuts that magically appeared every&nbsp;Friday, you were&nbsp;<em>supposed</em>&nbsp;to sign up to periodically provide said donuts. When his browser wouldn&rsquo;t take him anywhere on the internet except the Dunkin&rsquo; Donuts website, the message became clear and justice was served. Those high jinks may have been what sealed the deal for Adana and me.&nbsp;</p>

<p>Years after that stunt, we ran into each other at LAX, and Adana mentioned that he had something in the pipeline that he couldn&rsquo;t talk much about, but which had him very excited; he asked if he could &ldquo;call with questions&rdquo; if it came together. A few months later, the call&nbsp;<em>did</em>&nbsp;come with the introduction: &ldquo;You&rsquo;re on speaker with the writers&rsquo; room &#8230;&rdquo; which is a surprisingly disorienting phrase when your day job is not in Hollywood.</p>

<p>By the way, astute &ldquo;Robot&rdquo; watchers may have noticed that a certain minor E Corp executive and I have something in common. The character&rsquo;s name &mdash; James Plouffe &mdash; and his untimely end &mdash; <a href="http://www.dailymail.co.uk/news/article-3221232/Shocking-final-scene-forced-USA-Network-postpone-Mr-Robot-finale-revealed-contained-dramatic-air-suicide.html">he committed suicide on live TV</a> &mdash; were part of the &ldquo;compensation&rdquo; for my work during the first season.</p>
<img src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7134199/timeline_1442592256_00026-1.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="A “Mr. Robot” character named after security consultant James Plouffe famously killed himself in a scene that caused the network to delay the broadcast." data-portal-copyright="" />
<p>Kor had intended this as a surprise which, owing to the studio&rsquo;s legal obligations, got revealed earlier than planned: It turns out that someone insisting &ldquo;he&rsquo;ll totally think this is hilarious&rdquo; does not provide attorneys with the same level of comfort as a signed agreement promising not to sue over things my namesake does on screen. In hindsight, it made me wonder what trauma I had inflicted to warrant being dispatched in such a fashion but &mdash; for the record &mdash; I&nbsp;<em>did</em>&nbsp;think it was hilarious. Though my character was short-lived, you can see nods to my continued involvement in the Season Two references to the water contamination in Flint, Mich., seen throughout the E Corp Risk Management department.</p>
<h2 class="wp-block-heading">How does it all come together?</h2>
<p>Like most successful enterprises, making it happen is a team effort. The writers&rsquo; room for &ldquo;Mr. Robot&rdquo; typically starts up in mid-fall, and after they&rsquo;ve sketched out some of the broad arcs, the tech consulting team (led by Adana and comprised of Michael Bazzell, Ryan Kazanciyan, Andre McGregor, Marc Rogers and myself) get to work. In many ways, we&rsquo;re in a parallel writers&rsquo; room: While the rest of the writing staff are working on the what, where and why, we&rsquo;re focused on the <em>how</em> (with Adana as our conduit to the show&rsquo;s universe).</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Hacking is how other shows get from Point A to Point B without doing a lot of heavy lifting; if one character needs something, a second character can “hack” something to get it so that things can move forward.</p></blockquote></figure>
<p>When I&rsquo;m asked what it&rsquo;s like to work on the show, I share the IT urban legend about an angry customer demanding that a technology vendor send its 10 best engineers to help the customer design a fix for a problem introduced by the vendor&rsquo;s hardware. The vendor account executive politely declines by explaining that if you put 10 smart people at the same whiteboard, one will be writing and the other nine will be erasing.</p>

<p>That&rsquo;s exactly the way it feels sometimes as we hammer out the particulars of how the characters will perpetrate their various miscreant acts. Each member of our team has a different background and perspective, so we come at the objectives from different angles. As such, we usually have to spend a little time arguing to make sure the ideas we&rsquo;re proposing account for the latest security research, and that they pass a &ldquo;MythBusters litmus test&rdquo;: Is it Busted, Plausible or Confirmed?</p>

<p>Obviously, Busted is an immediate disqualification, Confirmed is usually acceptable, and Plausible is the subject of additional scrutiny, research and debate. We spend a lot of time on this because, in addition to making the attacks realistic, we also want them to be timely.</p>
<h2 class="wp-block-heading">Why do other shows (and movies) get it so wrong?</h2>
<p>Much has been made of &ldquo;Mr. Robot&rsquo;s&rdquo; fanatical attention to technological detail, which stands in stark contrast to the depiction of technology in most other forms of visual media. Executive producer and head writer Sam Esmail deserves a lot of credit for empowering Kor to get it right.  They have the dedication of documentarians when it comes to showing technology and hacking as they are. The amount of time we spent vetting which actual models of smartwatches could be successfully compromised to attack Susan Jacobs&rsquo;s home automation system in the Season Two premiere, the construction of&nbsp;<a href="https://samy.pl/magspoof/">Samy Kamkar&rsquo;s Magspoof</a>, as well as the &ldquo;cantennas&rdquo; (Wi-Fi signal boosters made from Pringles cans) that Elliot and Darlene use are just a few testaments to that dedication.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>We usually have to spend a little time arguing to make sure the ideas we’re proposing account for the latest security research, and that they pass a “MythBusters litmus test.”</p></blockquote></figure>
<p>The particulars of the show&rsquo;s devotion to accuracy have gotten a lot of coverage elsewhere, but it begs the question, &ldquo;Why isn&rsquo;t that devotion&nbsp;<em>shared</em>?&rdquo; It&rsquo;s probably less a case of not sharing and more a case of not understanding, combined with the wrong people being in the right place at the right time.</p>

<p>Early depictions of computers in movies were confined to &ldquo;green screens&rdquo; (text-based terminals that were the interface to mainframes, not to be confused with the green screens that are used for image compositing and visual effects). As computer technology matured and Hollywood began to rely more on computer generated images (CGI), the folks recruited to be technical consultants were often computer graphics wonks &mdash; as opposed to IT professionals &mdash; so they had a feel for some operating system fundamentals, and they knew&nbsp;a lot&nbsp;about building and animating amazing 3-D models, but they didn&rsquo;t really have a perspective on how technology got used in a typical corporate setting. As such, the depiction of computers evolved into a lot of dazzling (if unrealistic) animations.</p>

<p>One other way that popular entertainment misses the boat is by treating &ldquo;hacking&rdquo; as a deus ex machina. Because hacking isn&rsquo;t usually the centerpiece of a typical drama, it is easily relegated to the role of shortcut. Hacking is how other shows get from Point A to Point B without doing a lot of heavy lifting; if one character needs something, a second character can &ldquo;hack&rdquo; something to get it so that things can move forward. It doesn&rsquo;t need to be right, it needs to be fast because it is a tool of convenience, not plot development.</p>
<h2 class="wp-block-heading">Will it make a difference?</h2>
<p>The late, great playwright Edward Albee is credited as having said, &ldquo;the function of art is to bring people into greater touch with reality &#8230;&rdquo; I certainly hope that &ldquo;Mr. Robot&rdquo; accomplishes that. The show is tackling a lot of issues that are relevant to all of us, not the least of which is cyber security.</p>
<img src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7135745/3i90RkRc.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="The real James Plouffe is lead solutions architect with MobileIron." data-portal-copyright="" />
<p>Technology is so pervasive that it has become an afterthought in spite of the fact that, at the risk of sounding melodramatic, it&rsquo;s the center of an arms race. Technology has become inextricably intertwined with our business and personal lives, but we don&#8217;t always exercise appropriate levels of caution or skepticism with regard to how we use that technology. In fact, we often use technology in a way that would be analogous to driving without seat belts or not having door locks on our homes.&nbsp;</p>

<p>I hope that &ldquo;Mr. Robot&rdquo; has helped make people more mindful by illustrating the potential dangers, and that we will all place greater value on cyber security as a result.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.linkedin.com/in/jamesplouffe"><em>James Plouffe</em></a><em>&nbsp;has worked in networking and IT security for more than 15 years, in organizations ranging from startups to the Global 10. He is a lead solutions architect with&nbsp;</em><a href="https://www.mobileiron.com"><em>MobileIron</em></a><em>, and a technical consultant for the award-winning hacker drama &#8220;Mr. Robot.&#8221; Reach him </em><a href="https://twitter.com/moblagentp"><em>@MOBLAgentP</em></a><em>.</em></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>James Plouffe</name>
			</author>
			
			<title type="html"><![CDATA[The Internet of (insecure) Things and other inside observations from the Black Hat hackers conference]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/8/11/12443126/internet-of-insecure-things-inside-observations-black-hat-hackers-conference" />
			<id>https://www.vox.com/2016/8/11/12443126/internet-of-insecure-things-inside-observations-black-hat-hackers-conference</id>
			<updated>2016-08-11T19:21:25-04:00</updated>
			<published>2016-08-11T19:22:57-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[The annual Black Hat hackers conference returned to Las Vegas last week, and was bigger than ever, with attendance up as much as 30 percent, according to the show&#8217;s organizers. This year&#8217;s attendees were an eclectic bunch, running the gamut from cyberpunks to IT security management suits. At the risk of finding myself on the [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="Attendees line up for credentials at the 2016 Black Hat hackers conference at the Mandalay Bay Resort &amp; Casino, Las Vegas. | Black Hat Briefings &amp; Training / Flickr" data-portal-copyright="Black Hat Briefings &amp; Training / Flickr" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/6926697/28467025810_fb2446069e_k.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	Attendees line up for credentials at the 2016 Black Hat hackers conference at the Mandalay Bay Resort &amp; Casino, Las Vegas. | Black Hat Briefings &amp; Training / Flickr	</figcaption>
</figure>
<p>The annual <a href="https://www.blackhat.com/us-16/briefings.html">Black Hat</a> hackers conference returned to Las Vegas last week, and was bigger than ever, with attendance up as much as 30 percent, according to the show&rsquo;s organizers. This year&rsquo;s attendees were an eclectic bunch, running the gamut from cyberpunks to IT security management suits. At the risk of finding myself on the bandwagon of bemoaning how &#8220;commercial&#8221; the conference has become &mdash; more speakers came from IT vendor, and there werere a lot more golf shirts, with decidedly fewer piercings, mohawks and tattoos &mdash; it certainly did feel like a lot has changed since I attended my first Black Hat 10 years ago.</p>
<p><q class="right">It doesn&rsquo;t feel like we&rsquo;re quite ready for all this stuff to be connected yet.</q></p>
<p>Even so, I suppose it&rsquo;s what <em>hasn&rsquo;t</em> changed that&rsquo;s really worth remarking on: Despite the presence of more and more &#8220;corporate types&#8221; &mdash; and, yes, I am one of those &mdash; the conference remains true to its mission, and continues to attract many talented security professionals (that&rsquo;s the nom de guerre du jour, isn&rsquo;t it?) presenting talks on on a wide range of topics. Even if the minutiae of cyber-security insurance feel a little too &#8220;suit-and-tie,&#8221; it&rsquo;s still possible to roll up the sleeves of your hoodie and get down in the guts of crypto, hypervisors, memory heaps and more.</p>

<p>I wish I could have taken in more of the presentations, but in my path through the conference I encountered a few topics that appeared consistently:</p>
<h2 class="wp-block-heading">Car Hacking</h2>
<p>This has been a theme at security conferences for a couple of years, and the safety and security of increasingly computerized and autonomous cars has been making some big headlines recently. The <a href="https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/">sexiest car hack</a> this year was fairly spectacular, in that it allowed almost total control of the vehicle in question, with the caveat that it required physical access to the diagnostic port. Insofar as cyber security is the 21st century equivalent of seat belts and airbags, and the automotive industry has a vested interest in safety and reliability of its products, this area highlights the best type of engagement between the security community and original equipment manufacturers (OEMs).</p>
<h2 class="wp-block-heading">Cloud (Read: AWS)</h2>
<p>The promises of the cloud for redefining IT and facilitating business transformation are many and compelling: Better performance and reliability, more agility &mdash; the list goes on and on. Along with all this promise come a few pitfalls, some old and some new.</p>

<p>If there are common threads in our adoption of any new technology, they would most likely be:</p>
<ul id="v6iQUv"> <li>We often adopt it before we fully understand the security implications.</li> <li>Our bad habits from legacy technologies are highly portable.</li> <li>We don&rsquo;t avail ourselves of the new and/or improved security capabilities that are part and parcel of new technology.</li> </ul>
<p>This year&rsquo;s presentations suggested that cloud is no exception. In many ways, cloud bears a resemblance to our existing data centers. In order to prevent the risks from outweighing or overshadowing the benefits, it is critical to understand the ways in which cloud is different, with particular attention to security capabilities available directly from cloud providers. The reality is that there are robust security features and tools already built in to most cloud platforms, but an apparent lack of corresponding good practices, something we must overcome to safely embrace this new form of computing.</p>
<h2 class="wp-block-heading">The Human Element</h2>
<p>It should come as no surprise that wetware (our pet term for &#8220;people&#8221;) is still one of the leading attack vectors and the easiest to reliably exploit. There were no earth-shattering revelations here, only the reminder that people, process and technology often break in roughly equal measure but some combination of the three typically yields the most successful recipe for a breach. The subtext is that an average user&rsquo;s increased <em>comfort</em> with technology is not the same as <em>understanding</em> what is happening behind the scenes. The path forward is two-pronged: More and better education coupled with better security UX so that users know what (and what not) to do, and doing it isn&rsquo;t punishingly complicated.</p>
<h2 class="wp-block-heading">Internet of (Insecure) Things</h2>
<p>To repurpose a line from one of my favorite comedians, Patton Oswalt: &#8220;[Technology] we&rsquo;re all about <em>coulda</em>, not <em>shoulda</em>&#8221; which in this context means the ubiquity of Ethernet or Wi-Fi in common household objects (e.g., light bulbs). Much has been made of the lack of security in many internet-enabled consumer products. It&rsquo;s unclear just how serious a problem this will become, but what is clear is that time-to-market &mdash; and not security &mdash;- is the overriding concern for these products. It&rsquo;s also clear that bad actors are devoting a great deal of time and energy to finding exploitable vulnerabilities, whether these devices are ultimately the target or simply a position from which to pivot from and attack other, higher-value targets. In any case, it doesn&rsquo;t feel like we&rsquo;re quite ready for all this stuff to be connected yet. Exploitable vulnerabilities on isolated devices (i.e., <em>not</em> connected to a network) have limited attack vectors and, therefore, limited utility. It also seems like we&rsquo;re reluctant to acknowledge the inherent risk that all this connectivity creates.</p>

<p><strong>Machine Learning</strong></p>

<p>I, for one, welcome our new robot overlords. Partly because they aren&rsquo;t cranking out T-800s to exterminate us, but mostly because, right now, it appears that they offer some promise for helping us identify and thwart emerging threats. While the true utility of &#8220;deep learning&#8221; in the context of security remains to be seen, better tools for doing the heavy lifting of identifying the patterns in attacks or isolating polymorphic malware are definitely a requirement if we&rsquo;re going to have any hope of successfully defending against the continually evolving tactics of bad actors.</p>

<p><strong>Mobile Security</strong></p>

<p>Perhaps nearest and dearest to my heart, the state of mobile security is frequently one of the most maligned topics discussed at security conferences. At Black Hat this year, it was, by turns, the subject of very practical discussions and purely theoretical (and occasionally misleading) exercises. The result: Some aspects of mobile security aren&rsquo;t nearly as dire as we may have been led to believe while some are much, much worse.</p>

<p><strong>Closing Thoughts</strong></p>

<p>Throughout the event, I kept thinking back to a <a href="https://youtu.be/qq4et4aYxEc">keynote given by Chris Roberts</a> at <a href="http://grrcon.com/">another hacker conference</a> late last year. In it, he noted that, as security professionals, we talk a lot about problems and not enough about solutions. He then posited that we have a responsibility to go beyond simply <em>identifying</em> the problem, and suggested that we should also fix it if it is within our power to do so.</p>

<p>That theme was similar to a message delivered by Robert Stephenson Smyth Baden-Powell in his farewell letter to the Boy Scouts: &#8221; &#8230; leave this world a little better than you found it.&#8221;</p>

<p>And that, frankly, is where it feels like we may be coming up short. Black Hat was a cavalcade of creativity and inventiveness with regard to <em>breaking</em> things, but too many presentations ended without a proposal for how to fix them or, better still, a way to prevent the problems they&rsquo;d identified in the first place. While the &#8220;gotcha&#8221; moments are certainly the most fun and exciting, as an industry we need to be more concerned with creating less opportunity for those gotchas to occur and, if or when they do, how we go about fixing them.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.linkedin.com/in/jamesplouffe"><em>James Plouffe</em></a><em> has worked in networking and IT security for more than 15 years, in organizations ranging from startups to the Global 10. He is a lead solutions architect with </em><a href="https://www.mobileiron.com"><em>MobileIron</em></a><em>, and a technical consultant for the award-winning hacker drama &#8220;Mr. Robot.&#8221; Reach him </em><a href="https://twitter.com/moblagentp"><em>@MOBLAgentP</em></a><em>.</em></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
	</feed>
