Ask Hackaday: Hacking Lingo Fails

header

Ah, CSI. What other television show could present digital forensics with such two-bit dialogue?

It’s time once again to put on your hacker hats – a red fedora, we guess – and tell us the worst hacker dialogue you’ve seen in movies or TV. We’ve seen a ton of shows and movies where writers and directors spend zero time doing any sort of research in whatever technology they’d like to show off in the story they’re trying to convey. Usually this results in lines like, “I’ll create a GUI interface using Visual Basic. See if I can track an IP address.” It’s technobabble at its best, and horribly misinformed at its worst.

We’re wondering what you, the readers of Hackaday, think are the worst examples of hacker lingo fails. Anything from, ‘Enhance!’ to the frightening real-life quote, “the Internet is not a big truck. It’s a series of tubes.”

We’ll compile your suggestions in a later post, but I’m betting something from Star Trek: Voyager will make the #1 technobabble/hacking lingo fails. There’s just too much in that show that isn’t internally consistent and doesn’t pay any heed to the laws of (fictional) physics. Warp 10, I’m looking at you. Of course there was the wonderful Habbo reference in last week’s Doctor Who, but I’m betting that was intentional as [Moffat] seems pretty up to speed on the tropes and memes of the Interwebs.

About a month ago, we asked you for your take on the worst hacking scenes ever shown on TV or film. The results made for good viewing, albeit with a surprising absence of Lawnmower Man. Now we want some dialogue to go with these horrendous hacking scenes. So, what say you, Hackaday? What are the worst hacking lingo fails you’ve seen or heard? Please be specific about what movie/TV show you’re referencing. Last time some good stuff probably slipped by because people just said a few words without context assuming we’d know exactly what they were referring to.

114 thoughts on “Ask Hackaday: Hacking Lingo Fails

  1. The “frightening real-world quote” was from Senator Ted Stevens. I have no love for him, but I think he got more grief for that than he deserved. Engineers often speak of “sending data down the pipe”. In fact, Linux, Windows and other OSes have inter-process communication mechanisms called “pipes”.

    It’s a metaphor, and it’s a metaphor I would readily use when explaining the internet to, say, my mother. Sure, Ted Stevens had a very shallow understanding of the internet. But he had an appropriate level of understanding for an 83 year old PoliSci major.

    1. He was oddly right at a technical level. Every type of standards compliant cabling has a sheath, which can usually be removed. The internet really is a series of tubes. Just so happens the tubes have clad wiring or fiber within.

      The obvious joke being networks are a series of cat tubes.

    1. In Doctor Who’s defense, it’s not meant to be in any way realistic. They do very little technobabble, unless it’s time-machine related, and even there they end up with “wibbly wobbly timey-wimey” things.

    2. He’s 1000 years old, has 2 hearts, travels in a space, time, and occasionally alternate universe machine, which is in the form of a police telephone box, his weapon of choice is a “sonic” screwdriver which can do basically anything by way of some sort of thought control at best, and he has battled everything from cybermen to cute ambulatory blobs of fat.

      Uploading people to the wifi – all part of the day job.

      Relax and go along for the ride.

    3. Watch it again, pay close attention. That episode was loaded with jokes about “the cloud”. I am convinced Moffat is a bit of a nerd and wanted to take a jab at “the cloud”, but got lost in trying to make it presentable to non-nerds.

    1. That’s probably a bit like 555-phone numbers. You don’t want anybody to say “hey, thats our IP. Someone hacked us because of the show, pay $alot”. Just not worth the hassle.

      1. Easy workaround:
        Just use the IP address of NSA.gov[1] and watch the scriptkiddies get whisked away in the middle of the night

        [1] I daren’t run #host nsa.gov to find out their actual IP Address

          1. The ones in Nikita look so obvious that it seems like 555-555-1234 telephone numbers. Dodge just enough that a scriptkiddie doesn’t think ‘hey, let’s hack that computer and see if it’s part of an ARG”.

            But the 3 part IP and 5 part mask does seem a bit out of place.

    2. Watching an Australian TV police drama, they did some computer bits and pieces and you got to see a raw IP for a split second. OK then pause show rewind, typeytypey blam up comes the shows website in the real world. Well done that man, gold friggin star. Rush I believe it was.

  2. It’s not exactly hacking, but I’ve never seen animated bank transfers, if your account received a transaction, there’s never an animation counting the digits… You have to reload the page and there you go… And it’s like every bank transfer in movies…

    1. My vote is for every movie that flicks through images of every fingerprint in the database, or every driver’s license photo while searching.

      If you want realism, on the other hand, go rewatch “Day of the Jackal”, where the entire movie was built on the slowness of searching for information. While they collect hotel registration slips, the Jackal is about to check out, that kind of stuff. The movie would have ended in three minutes if SQL existed!

    2. No kidding man. If transferring, logging in, copying, and pretty much everything on the computer popped up progress bars like the movies do I would go bat-shit-insane within a day. Not even back in 1995 when I was first introduced to a GUI interface for an OS was anything that freakishly slow outside of moving large files around.

  3. “Every” movie or TV show ever done that involves a counter of digits, and they make some sort of ‘clicking’ noise, like a ratchet mechanism. That, and tires that screech on a dirt road (but that’s a different story!).

    1. And whenever a vehicle is going in a perfectly straight line the driver is always rocking the steering wheel left & right like they’re navigating some sort of invisible slalom course…

  4. I cringe every time someone defeats an electronic lock by taking the faceplate off and hooking up some device that defeats the lock one digit at a time. And of course, before the digits are “hacked”, they run quickly through all the numbers before locking in place with an ominous beep.

    1. Brute forcing anything should trigger automatic lockout on all but very old or badly designed login / other access systems. this one at a time getting the right one moving on stuff is a joke at best what system would tell a user that just failed to get the correct code what characters were correct in there attempt these systems are designed to keep people out.

      what they should do to the door is disconnect it from the rest of the system then activate its debug mod and use the generic code to open the door or just connect power directly to the mechanism that opens the device.

      1. Did exactly that in a Scott Bakula pilot episode that didn’t get picked up. (Was done between Quantum Leap and Eisenhower & Lutz) He busted open the keypad and applied power directly to the lock motor or solenoid. I think it would’ve made a good show, he played a scientist at Stuart Institute of Technology (SIT) working on teleportation and accidentally merged himself with a robotic space probe. When he was in danger he’d start morphing into a robot.

        I bet someone at a screening said it was too much like the incredible hulk and that scuttled the series.

      2. These sort of hacks are real. In a system that compares a string to another, incorrect strings might return false as soon as the first character is wrong. Measure the time before the response and you can determine when the response time is longer – one of the characters is correct. Theres many papers about this, its even doable over ethernet in small networks if the software is crap.

    2. The ultimate is Bruce Willis defeating the unbreakable lock in the movie RED at the CIA headquarters. I thought of all the other lock hacking movies when i saw that..

  5. The latest episode of the tv-show Grimm had a computer savvy villain. The good guys try to track him down using a list of possible names to match against usernames for an online game server. Cut to shots of the heroes restlessly waiting while a computer scroll down two lists of text at a snails pace. The guy setting up the search then says “I’m sorry this is taking so long but… 221 names to check against the THOUSANDS playing”, portraying that as a very time consuming task for the state of the art looking computer to pull off.

    1. The thing that bugged me about that wasn’t the time but the efficiency of what they were doing. They didn’t need to check it against the list of names, just check if it contained the letters they were looking for (the 221 names were generated by using combinations of a set of letter they started with). Been doing lots of performance stuff at work lately….

  6. It’s hard to pick on some of theses, because they use things like animations and sound FX to keep an audience interested. It’s also entirely possible the writers knew exactly how the things worked, but altered them for drama and or the lowest common denominator. Or for plot devices.

  7. My favourite is undoubtedly in “Independence Day” when Jeff Goldblum uses a Netware client to hack into the alien mother-ship’s central computer.

    Of course, this might just be a critique of Novell…

      1. That just makes it even more painful… The most flexible hardware and software architecture in the universe, and we create a plethora of platforms based on that, that hardly communicate with each other.

        If that was the underpinnings of our technology, then you’d install OSX on a toaster by accident.

    1. You know I never really had a problem with being able to “hack” their computers, I mean a fresh perspective on a problem will often reveal interesting security holes in a supposedly secure system. Given an alien mindset perhaps they were more keen on defending from outside, an internal threat not even being considered. As for the hack itself, whilst the actual screens themselves may have been overly Hollywood the underlying premise seems valid. I mean how much more alien could their computer be compared to some of the weirdass computers architectures we have come up with. As such (and given 50 odd years of research) having an emulator and interfaces seems pretty reasonable to me.

    1. You know what’s funny. I really do say things nobody understands all the time which actually make sense if your not a complete moron with computers. I get flak for it a lot. Maybe I should change my name to McGee.

  8. Going way back – how come they can make a humanoid form robot that speaks 9 bazillion languages (C3PO) yet can’t somehow find the space to wedge a single language chip into the trashcan bot (R2D2).

        1. In Dutch “rate” is phonetically similar to our word “reet” which is a vulgar term for ones bottom. “Killer refresh reet” is particularly funny in most situations round here.

  9. One day I”ve seen a scene from “The Bold and the Beautiful” that one of the guy ask the other a RJ45 cable. the other says: “wow you know a lot about computers.”

    1. Dang! You beat me to that, Vic! That one may be my favorite because it’s not even technobabble. Anyone who’s used a computer knows you can’t just share a keyboard like that, it’s patently insane. I really believe that was included just to win a bet that they couldn’t oneup the gui in visual basic line.

      Also, don’t forget anything in swordfish.

  10. Jurassic Park, “This is Unix! I know this!” and then with the ‘advanced’ 3D interface manages to fix the door locks and she’s what, 13? Sure. let’s roll with that.

    Side note, we did add in a cleaned up sample of the “ah ah ah you didn’t say the magic word” gif into a project as an error message. That is some priceless movie computer stuff right there.

    http://gifsoup.com/view/1349477/ah-ah-ah.html

    1. It is real. SGI File System Navigator. Ran on IRIX. Oddly enough, there really is some access point control software packages that are comparable at a low level and can be used just as in the movie scene to unlock doors. It is incredibly annoying to do it via command line (or a shell) though and it is far easier to use the built in webserver.

  11. In Super Troopers, there’s a scene where Ramathorne is supposed to print a still from a security feed and is just meaninglessly tapping on the keys and saying “Enhance” until Brian Cox gets pissed and says “oh, just print the damn picture”. Bad on purpose, and wonderful for it.

  12. Film and TV script writers clearly don’t have a clue how GPS works. Many shows assume that the GPS satellites know where the satnav/phone is and can be used to track it. And some shows even use the word GPS as synonymous with coordinates.

    1. A few weeks a go a student at my university asked how the GPS Satellites manage to handle all those GPS-Devices and if they don’t run out of capacity… Since then I believe many people actually know a lot less about GPS then I thought…

    1. Every time you log into an SSH server using public/private key encryption, you’re using asymmetric encryption. The answer to the question “how did they get past it” is probably “Well, Paul forgot to disable password logins, and the root password was ‘changeme’.”

    1. I’ve been watching Seaquest on Netflix and some of the wrtting is down right painful to listen to. I realize it’s supposed to be the “future” but they’d go from perfectly legitmate (and accurate) hyrdronamics to utter jibberish and back in the same sentence. The “hacking” done by the character Lucas was on the same level of sliliness as the movie hackers. Minus the VR headsets.

  13. Yet another annoying thing with depictions of computers on TV well into the 1990’s, they almost always used a constant beep beep beep sound effect, sounding much like the head actuator on old Seagate MFM hard drives, which made the sound irregularly and only during head moves.

    There’s a scene in two part crossover of Magnum P.I. and Murder She Wrote where a guy is repeatedly tapping a key on a PC keyboard, as if he’s paging through a document, but the computer isn’t turned on. Monitor is aimed right at the camera, nothing on the screen and no power LEDs lit.

    There’s an episode of Riptide where they three guys are hired as consultants to a TV show and their intro to the cast is an obvious parody of all the stupid impossible BS done with computers and crime solving.

  14. NCIS Devil’s Triangle
    “I have to inform our entire data services department that we’re officially switching to dual layer backup DVD medium!” Yep, dual layer dvd backups for your huge server farm. That’ll only take a few warehouses full of DVDs.

  15. On “any” movies, secret/spy devices (sound recorders, cams, detonators) put below tables/doors/lockers and so on. But all those devices have blinking leds to show they are ON. But a => hidden <= device with a blinking led ??? Hmmmmm…..

  16. Best STNG technobabble.

    LaForge: “Commander, the transporter is still online. It’s being fed
    power from the auxilliary systems.”

    Riker: “The rematerialization subroutine has been disabled.”

    LaForge: “Yeah, and that’s not all. The phase inducers are connected to
    the emitter array, the override is completely gone, and…pattern
    buffer’s been locked into a continuous diagnostic cycle.”

    Riker: “This doesn’t make any sense. Locking the unit into a diagnostic
    mode just sends the matter array through the pattern buffer. Why would anyone – ”

    LaForge: “There’s a pattern in the buffer still.”

    Riker: “It’s completely intact. There’s less than .003% signal
    degradation. How is that possible?”

  17. There’s some REALLY bad hacking lingo in Criminal Minds. This is the best:

    Garcia: “The information superhighway is closed. Someone had the nerve to run a black hat op into my computers, Morgan. They hacked me, okay? But you can bet your sweet ass I will find them. I’ve got honeypot farms hidden behind UML kernel data packets and a first generation honeynet I personally programmed. My snort-log lists every visitor, every server request, every keystroke of this entire network. If I have to back-hack his IP all the way to the freakin’ stone age I will find this son of a *****, okay? So, bye!”

  18. An episode of Star Trek Voyager where they were trapped in a gravity well and decided to use their phasers to “punch through the event horizon.” The event horizon is a line on a map! Good thing they weren’t on Earth, otherwise latitude would be in trouble!

  19. Here’s one which is mechanical hacking related. In Mad Max, his 600HP Ford Falcon GT coupe has a supercharger sticking out of the bonnet (hood). The belt only starts spinning when he engages it. A supercharger clutch is connected to the supercharger itself, so the belt will keep spinning even when it’s disengaged. In the commentary it’s revealed they had to use a starter motor to turn the supercharger in that scene.

Leave a Reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.