How Mr. Robot ‘fudged’ its hacks to protect the public
Showrunners debated over how accurate to make the show’s exploits
AMC's Mr. Robot is a modern Robin Hood tale about a gang of hacktivists taking on a morally reprehensible multinational corporation. The show has garnered particular attention for the authenticity with which it portrays hacking and cybersecurity, and showrunner Sam Esmail went to great pains to make sure all of the hacks shown in the series were plausible and realistic up to a point.
James Plouffe, a strategic technologist at MobileIron, was one of many cybersecurity industry practitioners that Esmail brought in to advise the writers on the technical elements of fsociety's hacks and exploits. According to Plouffe, there was some debate among the show's writers and technical experts as to exactly how true to life the fictional anarcho-hacker collective's exploits should be.
"You wanted to get it right, but not right enough that someone could copy," he explained in an interview with IT Pro. "And I don't want to spoil it for folks who haven't seen some of the things that take place in season three, but I remember kicking around some of the ideas to make certain things happen. And there was this debate between those of us who are working as tech consultants about whether or not it was technically feasible, and a little bit of research suggested that it was."
"There were some folks on the side of 'we want to make this hyper accurate'. And my position was, for the safety of total strangers, let's maybe fudge the math a little bit, so that it doesn't become a public safety issue."
It's hard to argue Mr. Robot hasn't had a huge impact in the cybersecurity industry in the years since it first hit screens; various hackers (including black, white and grey hat varieties) have already begun adopting the show's iconography as part of their public personas.
For Plouffe, it's gratifying he gets to be a part of something that resonates so deeply with the cyber security community: "I appreciate it, in the sense that it was great to be part of something that I would have wanted to watch."
He also hopes that seeing the reality of cyber attacks as portrayed in Mr. Robot has helped contextualise cyber security issues for members of the general public, and raise awareness of threats.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"All the things that happened in Mr. Robot are practical, are based on real things. When you see them log into a firewall console, that's actually a piece of Cisco hardware that's been mocked up. So if anything, I hope that people see that the issues are real," said Plouffe.
"A lot of the activities in Mr. Robot hinge on pretty basic stuff, like getting people to do something dumb; pick up a USB drive in a parking lot, take a free CD from a musician, you know, social engineering stuff. Stuff that we're all susceptible to, potentially. I think people can understand those. And hopefully, it also underscored the ease with which some of that can happen and makes people think twice."
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Gender diversity improvements could be the key to tackling the UK's AI skills shortageNews Encouraging more women to pursue tech careers could plug huge gaps in the AI workforce
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Foreign states ramp up cyberattacks on EU with AI-driven phishing and DDoS campaignsNews ENISA warns of hacktivism, especially through DDoS attacks
-
A new 'top-tier' Chinese espionage group is stealing sensitive datanews Phantom Taurus has been operating for two years and uses custom-built malware to maintain long-term access to critical targets
-
Hackers are abusing ConnectWise ScreenConnect, againNews A new spear phishing campaign has targeted more than 900 organizations with fake invitations from platforms like Zoom and Microsoft Teams.
-
The Allianz Life data breach just took a huge turn for the worseNews Around 1.1 million Allianz Life customers are believed to have been impacted in a recent data breach, making up the vast majority of the insurer's North American customers.
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
