Ask Hackaday: Hacking lingo fails

header

Ah, CSI. What other television show could present digital forensics with such two-bit dialogue?

It’s time once again to put on your hacker hats – a red fedora, we guess – and tell us the worst hacker dialogue you’ve seen in movies or TV. We’ve seen a ton of shows and movies where writers and directors spend zero time doing any sort of research in whatever technology they’d like to show off in the story they’re trying to convey. Usually this results in lines like, “I’ll create a GUI interface using Visual Basic. See if I can track an IP address.” It’s technobabble at its best, and horribly misinformed at its worst.

We’re wondering what you, the readers of Hackaday, think are the worst examples of hacker lingo fails. Anything from, ‘Enhance!’ to the frightening real-life quote, “the Internet is not a big truck. It’s a series of tubes.”

We’ll compile your suggestions in a later post, but I’m betting something from Star Trek: Voyager will make the #1 technobabble/hacking lingo fails. There’s just too much in that show that isn’t internally consistent and doesn’t pay any heed to the laws of (fictional) physics. Warp 10, I’m looking at you. Of course there was the wonderful Habbo reference in last week’s Doctor Who, but I’m betting that was intentional as [Moffat] seems pretty up to speed on the tropes and memes of the Interwebs.

About a month ago, we asked you for your take on the worst hacking scenes ever shown on TV or film. The results made for good viewing, albeit with a surprising absence of Lawnmower Man. Now we want some dialogue to go with these horrendous hacking scenes. So, what say you, Hackaday? What are the worst hacking lingo fails you’ve seen or heard? Please be specific about what movie/TV show you’re referencing. Last time some good stuff probably slipped by because people just said a few words without context assuming we’d know exactly what they were referring to.

Comments

  1. Bob says:

    The “frightening real-world quote” was from Senator Ted Stevens. I have no love for him, but I think he got more grief for that than he deserved. Engineers often speak of “sending data down the pipe”. In fact, Linux, Windows and other OSes have inter-process communication mechanisms called “pipes”.

    It’s a metaphor, and it’s a metaphor I would readily use when explaining the internet to, say, my mother. Sure, Ted Stevens had a very shallow understanding of the internet. But he had an appropriate level of understanding for an 83 year old PoliSci major.

    • smee says:

      He was oddly right at a technical level. Every type of standards compliant cabling has a sheath, which can usually be removed. The internet really is a series of tubes. Just so happens the tubes have clad wiring or fiber within.

      The obvious joke being networks are a series of cat tubes.

  2. isama says:

    yeah, the doctor who uploading souls into “The WIFI” almost made me sick :(

    thank you stephen moffat.

    • Nebulous says:

      In Doctor Who’s defense, it’s not meant to be in any way realistic. They do very little technobabble, unless it’s time-machine related, and even there they end up with “wibbly wobbly timey-wimey” things.

    • James says:

      He’s 1000 years old, has 2 hearts, travels in a space, time, and occasionally alternate universe machine, which is in the form of a police telephone box, his weapon of choice is a “sonic” screwdriver which can do basically anything by way of some sort of thought control at best, and he has battled everything from cybermen to cute ambulatory blobs of fat.

      Uploading people to the wifi – all part of the day job.

      Relax and go along for the ride.

    • defaultex says:

      Watch it again, pay close attention. That episode was loaded with jokes about “the cloud”. I am convinced Moffat is a bit of a nerd and wanted to take a jab at “the cloud”, but got lost in trying to make it presentable to non-nerds.

  3. Sean Smith says:

    In NCIS Season 10 Episode 14 where the prolific hacker has with ip address beginning with 192.168 (can’t find the exact address)

  4. emmjul says:

    It’s not exactly hacking, but I’ve never seen animated bank transfers, if your account received a transaction, there’s never an animation counting the digits… You have to reload the page and there you go… And it’s like every bank transfer in movies…

    • targetdrone says:

      My vote is for every movie that flicks through images of every fingerprint in the database, or every driver’s license photo while searching.

      If you want realism, on the other hand, go rewatch “Day of the Jackal”, where the entire movie was built on the slowness of searching for information. While they collect hotel registration slips, the Jackal is about to check out, that kind of stuff. The movie would have ended in three minutes if SQL existed!

    • defaultex says:

      No kidding man. If transferring, logging in, copying, and pretty much everything on the computer popped up progress bars like the movies do I would go bat-shit-insane within a day. Not even back in 1995 when I was first introduced to a GUI interface for an OS was anything that freakishly slow outside of moving large files around.

  5. spencer says:

    http://www.youtube.com/watch?v=O2rGTXHvPCQ Numb3rs describes the Internet Relay Chat protocol, horrible, just horrible.

  6. John says:

    “Every” movie or TV show ever done that involves a counter of digits, and they make some sort of ‘clicking’ noise, like a ratchet mechanism. That, and tires that screech on a dirt road (but that’s a different story!).

    • Haku says:

      And whenever a vehicle is going in a perfectly straight line the driver is always rocking the steering wheel left & right like they’re navigating some sort of invisible slalom course…

  7. DavidR says:

    I cringe every time someone defeats an electronic lock by taking the faceplate off and hooking up some device that defeats the lock one digit at a time. And of course, before the digits are “hacked”, they run quickly through all the numbers before locking in place with an ominous beep.

    • David says:

      Brute forcing anything should trigger automatic lockout on all but very old or badly designed login / other access systems. this one at a time getting the right one moving on stuff is a joke at best what system would tell a user that just failed to get the correct code what characters were correct in there attempt these systems are designed to keep people out.

      what they should do to the door is disconnect it from the rest of the system then activate its debug mod and use the generic code to open the door or just connect power directly to the mechanism that opens the device.

      • Galane says:

        Did exactly that in a Scott Bakula pilot episode that didn’t get picked up. (Was done between Quantum Leap and Eisenhower & Lutz) He busted open the keypad and applied power directly to the lock motor or solenoid. I think it would’ve made a good show, he played a scientist at Stuart Institute of Technology (SIT) working on teleportation and accidentally merged himself with a robotic space probe. When he was in danger he’d start morphing into a robot.

        I bet someone at a screening said it was too much like the incredible hulk and that scuttled the series.

      • bob says:

        These sort of hacks are real. In a system that compares a string to another, incorrect strings might return false as soon as the first character is wrong. Measure the time before the response and you can determine when the response time is longer – one of the characters is correct. Theres many papers about this, its even doable over ethernet in small networks if the software is crap.

      • mrguy99493 says:
    • CBL_Marshall says:

      Yeah, that’s so unrealistic. In reality, it’s far easier than that to gain illegitimate access to many hotel rooms:
      http://boingboing.net/2012/08/03/howto-open-an-electronic-hotel.html

    • rusted_planet says:

      The ultimate is Bruce Willis defeating the unbreakable lock in the movie RED at the CIA headquarters. I thought of all the other lock hacking movies when i saw that..

  8. optim says:

    The latest episode of the tv-show Grimm had a computer savvy villain. The good guys try to track him down using a list of possible names to match against usernames for an online game server. Cut to shots of the heroes restlessly waiting while a computer scroll down two lists of text at a snails pace. The guy setting up the search then says “I’m sorry this is taking so long but… 221 names to check against the THOUSANDS playing”, portraying that as a very time consuming task for the state of the art looking computer to pull off.

  9. Jack says:

    It’s hard to pick on some of theses, because they use things like animations and sound FX to keep an audience interested. It’s also entirely possible the writers knew exactly how the things worked, but altered them for drama and or the lowest common denominator. Or for plot devices.

  10. Bacchus says:

    My favourite is undoubtedly in “Independence Day” when Jeff Goldblum uses a Netware client to hack into the alien mother-ship’s central computer.

    Of course, this might just be a critique of Novell…

    • crashsuit says:

      [obligatory reply about this being explained in a deleted scene where we're shown how our computers derive from alien tech from Area 51 crash and so systems are not dissimilar]

    • smee says:

      Well Netware really IS super easy to administer….

    • Valen says:

      You know I never really had a problem with being able to “hack” their computers, I mean a fresh perspective on a problem will often reveal interesting security holes in a supposedly secure system. Given an alien mindset perhaps they were more keen on defending from outside, an internal threat not even being considered. As for the hack itself, whilst the actual screens themselves may have been overly Hollywood the underlying premise seems valid. I mean how much more alien could their computer be compared to some of the weirdass computers architectures we have come up with. As such (and given 50 odd years of research) having an emulator and interfaces seems pretty reasonable to me.

  11. nfg says:
  12. NCIS:
    Tony: Oh, twenty bucks says McGee’s about to say something nobody understands again.
    McGee: The GPS coordinates came bundled in a proprietary packet. Since it was a beta, I thought-
    Gibbs: I’m starting to think you can’t help yourself, McGee.

    • defaultex says:

      You know what’s funny. I really do say things nobody understands all the time which actually make sense if your not a complete moron with computers. I get flak for it a lot. Maybe I should change my name to McGee.

  13. vonskippy says:

    Going way back – how come they can make a humanoid form robot that speaks 9 bazillion languages (C3PO) yet can’t somehow find the space to wedge a single language chip into the trashcan bot (R2D2).

  14. Oxin says:

    http://www.youtube.com/watch?v=BNtcWpY4YLY “Do you know anything about hackers? Can you jam with the console cowboys in cyberspace?” I’m surprised no one else mentioned it yet…

  15. Joe Pitz says:

    “I’ll create a GUI interface using Visual Basic. See if I can track an IP address.”
    Though is may not be the best solution to the problem, and of course it is TV hype, poor at best, but the concept is not altogether out of line.

    http://guivbip.codeplex.com/wikipage?title=Screen%20Shots&referringTitle=Home

  16. Ryuutei says:

    One day I”ve seen a scene from “The Bold and the Beautiful” that one of the guy ask the other a RJ45 cable. the other says: “wow you know a lot about computers.”

  17. Randy says:

    The entire movie “Hackers”. enough said.

  18. vic says:

    The infamous cringe-worthy “peer hacking” scene from NCIS takes the cake for me : http://www.youtube.com/watch?v=u8qgehH3kEQ

  19. sc0rch3d says:

    Pretty much everything “Rat” does in The Core including the file search for keywords and sending electricity to Coney Island.

  20. Colin R says:

    Jurassic Park, “This is Unix! I know this!” and then with the ‘advanced’ 3D interface manages to fix the door locks and she’s what, 13? Sure. let’s roll with that.

    Side note, we did add in a cleaned up sample of the “ah ah ah you didn’t say the magic word” gif into a project as an error message. That is some priceless movie computer stuff right there.

    http://gifsoup.com/view/1349477/ah-ah-ah.html

    • crashsuit says:

      There was a reply to a similar post the other day explaining this was an actual interface at the time, though it was viewed more as a novelty.

    • smee says:

      It is real. SGI File System Navigator. Ran on IRIX. Oddly enough, there really is some access point control software packages that are comparable at a low level and can be used just as in the movie scene to unlock doors. It is incredibly annoying to do it via command line (or a shell) though and it is far easier to use the built in webserver.

  21. M says:

    In Super Troopers, there’s a scene where Ramathorne is supposed to print a still from a security feed and is just meaninglessly tapping on the keys and saying “Enhance” until Brian Cox gets pissed and says “oh, just print the damn picture”. Bad on purpose, and wonderful for it.

  22. zibri says:

    Same goes for “PDF format”.

  23. yadakcah says:

    Film and TV script writers clearly don’t have a clue how GPS works. Many shows assume that the GPS satellites know where the satnav/phone is and can be used to track it. And some shows even use the word GPS as synonymous with coordinates.

    • emmjul says:

      A few weeks a go a student at my university asked how the GPS Satellites manage to handle all those GPS-Devices and if they don’t run out of capacity… Since then I believe many people actually know a lot less about GPS then I thought…

  24. Nam-Ereh-Won says:
  25. MadMonk says:

    I remember a scene from a little known (and B or even C grade) TV series in the first episode where some asks after a hacker had hacked into their system: “How did they get past our asymmetric encryption?”

    http://www.imdb.com/title/tt1865640/synopsis

    • PenultimateTry says:

      Every time you log into an SSH server using public/private key encryption, you’re using asymmetric encryption. The answer to the question “how did they get past it” is probably “Well, Paul forgot to disable password logins, and the root password was ‘changeme’.”

  26. Anything from The Mangler 2. Anyone besides me remember that movie? Yea… Didn’t think so.

  27. While trying to find the quote from CSI Episode “Grave Danger”, while watching a streaming video states something along the lines of “we can’t trace it because it is an encrypted ip address” well I just realized that I couldn’t trace it either “http : / / 183.172.201.254.5/vid/index.asp” [ http://www.youtube.com/watch?v=Mch9L5Bb-TU at 0:54]

  28. andarb says:

    Brave Little Toaster Saves The Day – just the whole movie. XD

    Replacing one tube actually makes the remainder of the damaged machine regrow. lol

  29. zuul says:

    GUI interface
    ATM machine
    HIV virus

  30. Galane says:

    The ‘microdogs’ scene in the first episode of Seaquest DSV. Genius hacker kid and squeaky voiced dolphin, sooooooo annoying.

    • Polymath says:

      Pretty much all of the science in Seaquest was techno babble

    • Polymath says:

      I’ve been watching Seaquest on Netflix and some of the wrtting is down right painful to listen to. I realize it’s supposed to be the “future” but they’d go from perfectly legitmate (and accurate) hyrdronamics to utter jibberish and back in the same sentence. The “hacking” done by the character Lucas was on the same level of sliliness as the movie hackers. Minus the VR headsets.

  31. Galane says:

    Yet another annoying thing with depictions of computers on TV well into the 1990’s, they almost always used a constant beep beep beep sound effect, sounding much like the head actuator on old Seagate MFM hard drives, which made the sound irregularly and only during head moves.

    There’s a scene in two part crossover of Magnum P.I. and Murder She Wrote where a guy is repeatedly tapping a key on a PC keyboard, as if he’s paging through a document, but the computer isn’t turned on. Monitor is aimed right at the camera, nothing on the screen and no power LEDs lit.

    There’s an episode of Riptide where they three guys are hired as consultants to a TV show and their intro to the cast is an obvious parody of all the stupid impossible BS done with computers and crime solving.

  32. ChalkBored says:

    The use of the words firewall and mainframe anywhere on TV or in the movies.

  33. ChalkBored says:
  34. NCIS Devil’s Triangle
    “I have to inform our entire data services department that we’re officially switching to dual layer backup DVD medium!” Yep, dual layer dvd backups for your huge server farm. That’ll only take a few warehouses full of DVDs.

  35. Kevin says:

    Screens that are apparently blinding the person as they project in perfect focus onto their face.

  36. tiger says:

    i forgot to post this last time, enjoy:

  37. mike says:

    On “any” movies, secret/spy devices (sound recorders, cams, detonators) put below tables/doors/lockers and so on. But all those devices have blinking leds to show they are ON. But a => hidden <= device with a blinking led ??? Hmmmmm…..

  38. Alan says:

    “Reverse the polarity of the neutron flow” – A classic line from the classic Doctor Who Series

  39. Whatnot says:

    Do whitehosue statements or c-span stuff count? ;)

  40. Mike D says:

    Heat sync. ;-)

  41. danthrax says:

    Best STNG technobabble.

    LaForge: “Commander, the transporter is still online. It’s being fed
    power from the auxilliary systems.”

    Riker: “The rematerialization subroutine has been disabled.”

    LaForge: “Yeah, and that’s not all. The phase inducers are connected to
    the emitter array, the override is completely gone, and…pattern
    buffer’s been locked into a continuous diagnostic cycle.”

    Riker: “This doesn’t make any sense. Locking the unit into a diagnostic
    mode just sends the matter array through the pattern buffer. Why would anyone – ”

    LaForge: “There’s a pattern in the buffer still.”

    Riker: “It’s completely intact. There’s less than .003% signal
    degradation. How is that possible?”

  42. spike says:

    i’m pretty sure swordfish had an escalating bit encryption scene, e.g “128 … not 256 …. 512 … etc.

  43. Jason says:

    There’s some REALLY bad hacking lingo in Criminal Minds. This is the best:

    Garcia: “The information superhighway is closed. Someone had the nerve to run a black hat op into my computers, Morgan. They hacked me, okay? But you can bet your sweet ass I will find them. I’ve got honeypot farms hidden behind UML kernel data packets and a first generation honeynet I personally programmed. My snort-log lists every visitor, every server request, every keystroke of this entire network. If I have to back-hack his IP all the way to the freakin’ stone age I will find this son of a *****, okay? So, bye!”

  44. geremlin says:

    saw in a b-movie a hacker coding a antivirus for a sentient virus that had spread alle over the world on A GAMEBOY ADVANCE.

  45. mb says:

    An episode of Star Trek Voyager where they were trapped in a gravity well and decided to use their phasers to “punch through the event horizon.” The event horizon is a line on a map! Good thing they weren’t on Earth, otherwise latitude would be in trouble!

  46. blufires says:

    Here’s one which is mechanical hacking related. In Mad Max, his 600HP Ford Falcon GT coupe has a supercharger sticking out of the bonnet (hood). The belt only starts spinning when he engages it. A supercharger clutch is connected to the supercharger itself, so the belt will keep spinning even when it’s disengaged. In the commentary it’s revealed they had to use a starter motor to turn the supercharger in that scene.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 92,050 other followers