Chapter 7: Computer and Network Security

Chapter 7 of Ethics for the Information Age discusses threats to computer and network security, of which there are only a few instances shown in The Maze Runner. The majority of the movie is spent within the maze, where there seem to be no computers, and very few electronic devices. However, there are still some examples which are relevant to the chapter.

First, there are the mechanisms within the maze which the Gladers could potentially hack, but never attempt to in the film. The moving walls that make up the maze presumably have some sort of control mechanism which could be hacked, but this mechanism is likely inaccessible to the Gladers. The Grievers are part machine, but they are too dangerous to get close enough to try hacking them. The exit door to the maze requires an eight-digit code to open, which has 10^8=100,000,000 possible combinations. This would be infeasible to brute force by hand, and too dangerous for the Gladers due to the Grievers guarding it.

Next, there are the mechanisms that the Gladers did try to hack, with varying amounts of success. The elevator which brings supplies to the Gladers could be used as an exit when it goes back down, or the elevator shaft could be used as well. However, one of the Gladers in the movie claims that all attempts to use it as an exit have failed. There is also the electronic device inside of the Grievers that opens doors so they can exit the maze. This is successfully used by the Gladers when they retrieve this device from a dead Griever, allowing them to escape. However, this was a planned vulnerability by the creators of the maze, who wanted the Gladers to escape eventually.

Finally, there are the devices that could have been hacked by a third party outside of the maze. In the last few minutes of the movie, the Gladers have escaped the maze, and they find a room full of computers that were monitoring their activities. A third party could have hacked these computers and gained access to the same monitoring information as the experimenters. The only type of monitoring that is explicitly referred to and shown is the Gladers' brain activity, but it is likely that there are many other monitors as well, such as video monitors. Since these computers likely control the maze as well, the third party could have freed the Gladers by opening the doors and deactivating the Grievers, or they could have killed the Gladers by opening the doors and giving the Grievers access to them.