Chapter 3: Networked Communication

Throughout the episode, multiple ways of communication are used between the hacker and characters. Throughout the episode, the hacker abused network communications to get his victim to do their bidding. This abuse is heavily dramatized, but it gives a good idea of what and how we can protect ourselves from other types of abuse from networked communications.

The Internet

The internet was used within the episode to showcase the initial interaction between Kenny and the hacker. Their interaction was through Kenny downloading the antivirus Shrive, which was malware in disguise. With the internet, more forms of interaction were created, in this case, accessing the shared content of someone else. Everyday, we create 2.5 quintillion bytes of data [1]. With such a large number being created everyday, an incalculable fraction of the created data is malicious. This data takes many different forms, such as the application that Kenny downloaded, emails, pictures, etc.

Email

Emails are one form of data used for network communications. In the episode, they created a direct form of communication between Kenny and the hacker. Directing Kenny to do illegal tasks, the hacker initially blackmailed Kenny through the use of email. Due to the simplicity and inconsequential action of sending emails, it is not a surprise that there are 3.4 billion phishing emails sent everyday. 94% of all cyber attacks across the globe are through email, where “common types of malware delivery via scam email includes Office doc files with 45% of malware, followed by Windows apps with 26% of the same.” [2].

Cellular Communications

With the rise of cellphones, both text messages and phone calls popularity have risen due to their portability. Text messages were the main form of communication between the hacker and all of their blackmail victims. From what we saw, the hacker would send instructions directly to their victim for their next task to prevent their secret from being revealed to the world. Text messaging and phone calls allow for another avenue of malicious intent. According to the FTC, in 2020, $86 million was reported to be lost to fraud from text message scams [3].

  1. Shah, K. (2020, September 17). How much data is created every day in 2020? LinkedIn. Retrieved April 25, 2022, from https://www.linkedin.com/pulse/how-much-data-created-every-day-2020-kesha-shah

  2. Wise, Jason. “How Many Phishing Emails Are Sent Daily in 2022? 11+ Statistics.” EarthWeb, 7 Apr. 2022, https://earthweb.com/how-many-phishing-emails-are-sent-daily/.

  3. “Cybersecurity Glossary.” Verizon, https://www.verizon.com/about/account-security/smishing-and-spam-text-messages#:~:text=Smishing%20is%20a%20term%20used,credit%20card%20information%20and%20more.