top of page
COMPUTER & NETWORK SECURITY
Computer & Network Security: Text

The Matrix (1999) is centered around a group of people intending to exploit the vulnerabilities of a computer program. The group operates in a secretive base of operations that is hidden from the authoritative forces, using their collective skills to recruit more people to their cause. The members of the group are known by their programming aliases ex: Neo, Morpheus, and Trinity, and their main objective is to cause chaos to disrupt the structure of society. The structure and objective of Morpheus’ followers in The Matrix are similar to those of infamous hacker groups in the real world. While a hacker’s goal is to break into computer software, the characters in The Matrix seek to break out of the computer software which runs their reality. But the goal of Morpheus’ group is to damage the matrix system, just as real-world hacker groups attack and disrupt online systems.

network1.jpg
network2.jpg

TeaMp0isoN is a real world hacker group similar to Morpheus’ group in the movie. Led by a 16 year old with the alias TriCk, in 2011-2012 TeaMp0isoN led an attack against a NASA forum, exposing the credentials of the website admin [3]. The alias names of members like ‘TriCk’ and ‘MLT’ mirror the tags Morpheus and Neo used in the movie while the objective to damage the forum and expose the credentials of the admin mirrors the movie characters’ attack damage against the structure of the matrix and the agents: the Matrix governing body [2]. Another real hacker organization Anonymous carried out an attack against ISIS where they shut down 100 ISIS supporter Twitter accounts, similarly to Neo hijacking the code of the Matrix in order to take Agent Smith offline [4]. TeaMp0isoN and Anonymous are two of the 1,900 different active hacker organizations existing in 2021 [1]. These groups worked to produce 514 new malware strains in 2020 which threaten computer security around the world.

In addition to the similarities between real world hacking groups and Morpheus’ group, there are also similarities between the agents in the matrix simulation and anti-virus software. In the movie, agents were able to track and locate Morpheus’ group wherever they were in the matrix, moving to the location where Morpheus’ group was detected. Real world antivirus systems work by scanning incoming files and code that is passed through a computer’s network traffic [6]. Once the antivirus software finds a match between viruses in its database of known viruses and incoming data, the antivirus isolates the match and removes the malware. This process is similar to how the agents know the aliases of Morpheus’ group and match the group to their descriptions in order to locate them. In the real world just as in the matrix simulation, antivirus programs are effective against the attacking software. A 2016 study found that Microsoft Defender and Microsoft Malicious Software Removal Tool were 90-98% effective in preventing viruses [5]. However, no antivirus is 100% effective; similarly to the way Neo defeated the agents, there is malware that can evade antivirus software.

network3.jpg

References:

[1] Cimpanu, Catalin, “FireEye: More Than 1,900 Distinct Hacking Groups Are Active Today”, (The Record by Recorded Future, 2021), https://therecord.media/fireeye-more-than-1900-distinct-hacking-groups-are-active-today/#:~:text=April%2014%2C%202021-,FireEye%3A%20More%20than%201%2C900%20distinct%20hacking%20groups%20are%20active%20today,at%20the%20end%20of%202019 (9/25/2021)

[2] Cyware, “Top 10 Most Notorious Hacking Groups of All Time”, https://cyware.com/news/top-10-most-notorious-hacking-groups-of-all-time-32d01ba2 (9/25/2021)

[3] GMA News, “Hacker Group Hits NASA Site, Hints at Joining Hacktivists”, https://www.gmanetwork.com/news/scitech/content/228826/hacker-group-hits-nasa-site-hints-at-joining-hacktivists/story/ (10/2/2021)

[4] Hern, Alex, “Anonymous Claims Victory Over Jihadi Twitter Accounts in #OpIsis”, (The Guardian, 2015), https://www.theguardian.com/technology/2015/feb/10/anonymous-claims-victory-over-jihadi-twitter-accounts-in-opisis (10/2/2021)

[5] Maimon, David, “Existing Evidence for the Effectiveness of Antivirus in Preventing Cyber Crime Incidents”, (Georgia State University, 2019), https://scholarworks.gsu.edu/cgi/viewcontent.cgi?article=1000&context=ebcs_tools#:~:text=A%20comparison%20of%20the%20effectiveness,from%2090%25%20to%2098%25 (9/25/2021)  

[6] Verizon.com, “Antivirus”, https://www.verizon.com/info/definitions/antivirus/ (9/25/2021)

bottom of page