Chapter 1128: The source of the film leaked two
From Sony's "mail door" in 2014 to Netflix and other video websites last month, more than 40 TV series were threatened and leaked, and to the experience of the new era film industry itself, Hollywood seems to have become a big hacker extortion player, or hacker cash machine.
On the eve of the annual Oscar Awards Season, it is also nicknamed the "Oscar Resource Season" by the Americans with rich entertainment spirit. Many popular films that have just been released or have not been released often appear. Because they were leaked during the review and review committee stage, they were mass-posted on pirated websites.
With the digitalization of film industry production, similar leaks have continued to ban.
But there is no good solution. Not to mention New Era Pictures, even old giants like Disney can't find any perfect solution.
Whether it is for f~b~i or the Internet company's cybersecurity department, tracking the source of hackers is always the most difficult case. Hackers are very sensitive to domain names. For example, an Egyptian hacker may cross the wall to use polar bear's IP to conduct cyber attacks, and it is almost impossible to find the real source.
Generally speaking, large companies like Disney, Netflix, and NBC Global have good information security teams, but you cannot guarantee that their suppliers or small undertaking companies are also safe. In this regard, they are under budget and hackers are prone to intrusion. Therefore, as long as there is a film source leak, it is mostly because of teammates following the downstream of the industrial chain.
Of course, this conclusion is not absolute. After all, Sony's "mail gate" incident last year has been brought up to date.
At the end of 2014, a red skeleton suddenly appeared on the monitors of all office computers within Sony Pictures. This was a threatening message sent by an organization called the "Guard of Peace", requiring Sony to stop releasing the movie "Assassination". Later, conspiracy theory speculated that the main messenger behind this matter was Beibang ZF.
A few days later, the group of hackers once again invaded Sony's computer system, and the display on the computer screen became "to erase Sony from the earth."
Not only that, the hackers also stole up to 100tb of massive data from Sony, including Sony employee information, internal contracts, financial reports, scripts that have not yet started filming, pay for Hollywood stars, and high-definition versions of five movies that have been filmed and have not yet been screened.
This incident was called "Hollywood version of the Snowden incident" by the American media. The damage caused to Sony is immeasurable. In addition to the network vulnerabilities like sieves, they were ridiculed by the United States, and the company was collectively sued by employees, which made Sony frantically filming science fiction thrillers for a period of time. I don't know if it was so scared that it was so scared that it was thrilling.
In short, Sony, which has always been known for its black technology, has become a playground for hackers to enter and exit randomly. This incident aroused great vigilance from Hollywood companies, and they have invested huge amounts of money to strengthen the construction of the company's firewall.
New Era Film has encountered its biggest crisis since its establishment, so that Yang Cheng, the big boss of the headquarters, had to leave the scene to pay attention. The film company has been under great pressure since Donna Round.
Back at the office, Yang Cheng came out of the elevator for a moment and asked, "How is it? Is there any new news?"
Su Su quickly replied, "Ms. Ronde wrote back to the hacker to try to negotiate, but the other party did not respond."
This was long before Yang Cheng expected, "They won't reply, just check the source directly. I want to know where the film source was leaked. If someone really attacked from the network, then the Cybersecurity Department can resign collectively."
Yang Cheng's murderous words happened to be heard by Eddie, who had just walked out of the elevator. As the CEO of the head office, he could not refuse to blame whether it was his responsibility or not.
So he did not hesitate at all and admitted his mistake first, "Boss, I have a responsibility for this matter, and I should strengthen the database prevention measures in advance."
Yang Cheng glanced at him in surprise, "What did you admit wrong?"
But he was too lazy to listen to Eddie's explanation, "Okay, okay, hurry up and talk about it."
Eddie smiled bitterly, "I just want to talk about theft of film sources. When I was working in the Los Angeles Times in my early years, I often heard that Hollywood companies were stolen from film sources. The methods of stealing can be said to be diverse. Except for a few cases, employees committed spontaneous crimes for some reason, most of the cases were instructors, among which Harvey Weinstein was the one who played such despicable means."
Yang Cheng held his shoulders and frowned and stared at Eddie, "Have Weinstein? You won't want to say that our film source is leaked, he is the one who is behind the scenes, right?"
Eddie shook his head repeatedly, "No, I have no evidence, but it's okay to list him as a suspect. From a probability perspective, his suspicion is the greatest, but it cannot be ruled out that his competitors are using tricks.
In the past, technology was underdeveloped, and Hollywood companies could not be strictly regulated. However, as major companies strengthened their measures, the means of stealing film sources have become diverse. After all, peers know their peers the best, and only their competitors can easily find the weaknesses of your preventive measures.
A common method in the past was to remake and record the preview in advance. Of course, the clarity of this method is too poor and unstable, and the viewing effect is not good, but it will not cause too much loss. Moreover, when companies hold premieres in recent years, they will strengthen the management of secret shots, so this method has gradually disappeared.
At present, the most common method that has been leaked is mostly the clear version or even the more private "mao film version". One month before the release of "Wolverine", there was news that the clear and complete version of the resources can be downloaded online.
Some people think it's a joke, but some people who don't believe in evil really found download resources online. This version has not yet added complete music and special effects, and even the steel wire hanging behind the actors has not been erased, spreading wildly online, and the final download volume exceeds 15 million times. If 5 million of them will go to the theater to watch movies, it can also bring hundreds of millions of box office increase to the film.
Of course, this assumption is a hindsight, but it is impossible to say it wrong. After all, no matter how you predict what has not happened, it is okay to predict.
The producer 20th Century Fox took emergency measures in a timely manner and issued warnings through various channels. Whether it was the person who leaked initially or later disseminated, they would file a lawsuit in accordance with the law and invite f~b~i and mpaa to intervene in the investigation. In order to kill the chicken to scare the monkey, a columnist of the Fox News website was soon fired for publishing a review of the leaked version of "Wolverine". f~b~i also raided and plagiarized and investigated a data center in Dallas.
Chapter completed!