Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hack the lights: The Italian Job in terms of cybersecurity
#1
Bug 
Quote:
[Image: three-italian-jobs-featured.jpg]

We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.

Protagonists, or their opponents, taking control of a city’s transportation management system is standard movie fare. The characters’ aim is to create either a traffic jam for pursuers or a getaway route for themselves. Hackers, Live Free or Die Hard and Taxi are a tiny sample of the artistic incarnations of this hacking scheme. The once-original set-piece has long since turned into a Hollywood cliché.

The trope most likely began with the 1969 British film The Italian Job. Unsurprisingly for that era, it was the only cyber-related incident in the movie. But the traffic sabotage plot point spawned many imitations, including in two remakes of the original picture, one by Hollywood (The Italian Job, 2003) and one by Bollywood (Players, 2012).

In its various iterations, the traffic-light scene remains pivotal. Thus, by comparing the three versions, we can trace the evolution of moviemakers’ and moviegoers’ attitudes about critical infrastructure hacks.

The Italian Job (1969), the British way

The future-oriented Turin is depicted basically as a smart city of the time. In the movie, a supercomputer controls every traffic light from a single center, where data from traffic cameras is also collected. The mastermind behind the robbery, who dies early on, bequeaths to main character Charlie Croker a detailed plan for a daring heist, along with malware for the supercomputer and an unexplained gadget that can disable cameras.

The program’s origin is unknown; someone probably got hold of the original source code and modified it with chaos in mind. Of course, in 1969 not only was there no Internet, but even local area networks were not properly rolled out. The only way to install the malware onto the computer is to sneak into the building and manually swap the magnetic tape in the drive. That requires the services of Professor Peach, supposedly the top computer expert in the country.

To get into the traffic control center and change the program, the computer needs to be stopped. Croker takes on the mission, hurling his bicycle into a power substation and cutting off not only the traffic control center, but also most of the rest of the city (and plunging a lavish mafia feast into darkness).

Now Peach enters the game, removing the tape reel from the drive and loading another. With the power out, that’s really all that’s left to do, anyway. So, they got a computer expert just to perform the task of a lab assistant. In case you missed that absurdity, that tech genius is played by funnyman Benny Hill.

The next phase of the plan is to knock out the cameras. To throw the traffic control center off the scent, and conceal the actual robbery, the criminals plant some devices — probably jammers, but the details are not revealed — on trash cans and roofs in the vicinity of the cameras. Traffic cameras in those days could not transmit wireless signals, but the mysterious gadgets manage to disable the cameras.

The result: Everything goes like clockwork. The cameras switch off, the traffic lights start blinking, the city roads are paralyzed, and Peach is arrested for indecent behavior on public transportation (don’t ask).

British version: Takeaways

Cybersecurity
  • The film displays a rather dismissive attitude toward the physical security of critical infrastructure. Both the power substation and the traffic control center are practically unguarded. The attackers get to the drive without a hitch and successfully replace the tape.
  • The computer accepts the substitute program without question. That’s actually excusable; code signing wasn’t invented until much later.
Perception
  • Computer hacking is perceived as something highly complex. To fool the computer, the gang spends a lot of energy recruiting the best computer expert in the land (only to have him change a tape reel).
  • There is no attempt to explain the technical side of things; instead, black-box gadgets miraculously disable the cameras.
The Italian Job (2003), the American way

The Hollywood version, in my view, cannot be considered a direct remake of the British film. Sure, the characters have the same goal (to steal gold bars), and the chase scene is practically a carbon copy of the original, but the motivations are very different. Psychology and morals aside, they still have to mess around with cameras and traffic lights. But these criminals do not have to look for a specialist; they already have a computer genius on the team: Lyle, whose day job happens to involve 3D modeling of buildings for planning and coordinating robberies. That’s your digital transformation at work. In 2003, having a computer specialist on the team is considered pretty normal.

What’s more, the American version of the movie requires a bit more hacking. First, the criminals try to hack into a phone company’s remote monitoring system, convince its employees that it is a legal wiretapping operation, and ultimately redirect the audio stream to their own listening post. Lyle has experience with the latter, having spent years eavesdropping on his ex.

But the main hack is unchanged. Getting inside the Los Angeles Automated Traffic Surveillance and Control Operations Center in 2003 is way easier than getting into Turin’s system was in 1969 — the center is connected to the Internet and even has a graphical user interface (GUI). Lyle sits at his laptop and tries to figure out the password — manually. He enters password after password without success, until at last the magic words “Access Granted” appear on the screen.

The operations center predicts traffic flow and automatically changes traffic lights based on camera captures. But it has a manual mode too, and Lyle uses that to take control of the lights. As a demonstration, he changes all of the lights at one intersection to green, causing an accident. But he quickly switches the lights back, and the center writes off the incident as a glitch.

The gang’s plan is to make a wave of green that lets them speed through while gridlocking the rest of Los Angeles. On the day of the robbery, a somewhat dazed Lyle sits on a baggage carousel at Union Station armed with a laptop and router, monitoring the situation on the roads, changing signal lights (not only on the road, but also in the subway), and paralyzing the control center by displaying the message “You’ll never shut down the real Napster” on every screen. (As a comic plot element, Lyle claims that he invented the Napster peer-to-peer network and that Shawn Fanning stole his idea. Lyle likes to call himself Napster. He does, to be fair, resemble the stereotypical computer whiz kid.)

Thanks to the well-coordinated operation, the gold is stolen, everyone gets away, and the dastardly villain falls into the hands of the Ukrainian mafia, whose path he manages to cross.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
CrystalDiskInfo 9.3.0
Changes in 9.3.0: ...harlan4096 — 06:59
Microsoft OneDrive on the web is adding ...
Microsoft has anno...harlan4096 — 06:08
Vivaldi Stable 6.7 (3329.21)
Vivaldi Stable 6.7...harlan4096 — 17:09
Mozilla Firefox Browser 125.0.3
Mozilla Firefox Br...harlan4096 — 15:17
ThunderSoft Photo Gallery Creator [for ...
ThunderSoft Photo Ga...ismail — 09:51

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>