Is this the best way to prevent cyber attacks?

Matthew Claudel
Innovation Scholar, Senseable City Laboratory, MIT
Carlo Ratti
Director, MIT - Department of Urban Studies and Planning
The Big Picture
Explore and monitor how The Digital Economy is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

The Digital Economy

“Life,” Oscar Wilde famously said, “imitates Art far more than Art imitates Life.” In the case of Sony Pictures’ movie The Interview, the world found itself confronted with a further iteration: life imitating art imitating life. The movie’s release sparked international intrigue, drama, and shadowy geopolitical power struggles. It even prompted a grave US Presidential address – all for a simple case of hacking.

Hacking into information systems is nothing new; it goes hand in hand with the emergence of telecommunications. One of the first attacks struck Guglielmo Marconi’s demonstration of radio transmission in 1903, when he communicated from Cornwall to London, 300 miles away. Nevil Maskelyne, a music-hall magician and would-be wireless tycoon, who had been frustrated by the Italian inventor’s patents, managed to take control of the system and broadcast obscene messages to the Royal Institution’s scandalized audience.

Though hacking is as old as wireless itself, much has changed since Marconi’s time. Information networks now blanket our planet, collecting and transferring immense amounts of data in real time. They enable many familiar activities: instantaneous communications, social media, financial transactions, and logistics management. Most important, information is no longer sequestered in a virtual realm, but permeates the environment in which we live. The physical, biological, and digital worlds have begun to converge – giving rise to what scientists refer to as “cyber-physical systems.”

Automobiles, for example, have evolved from straightforward mechanical systems into veritable computers on wheels. The same thing is happening to other consumer goods: We now have connected washing machines and learning thermostats, not to mention Bluetooth toothbrushes and computerized infant scales.

Indeed, cyber-physical systems range from the macro level (think urban transport, like Uber) to the micro (say, the beating of a human heart). Our very bodies, strapped with connected wearables, are today imbued with more computing power than all of NASA at the time of the Apollo missions.

All of this promises to revolutionize many aspects of human life – mobility, energy management, health care, and much more – and may point toward a greener and more efficient future. But cyber-physical systems also heighten our vulnerabilities to malicious hacking, an issue that is being discussed at the World Economic Forum in Davos. Far from being isolated in cyberspace, attacks can now have devastating consequences in the physical world. It is an annoyance when a software virus crashes our computers; but what if the virus crashes our cars?

Malicious hackers are difficult to combat with traditional government and industry tools – the Sony Pictures case being a telling example. Hacking can be carried out anywhere and everywhere, potentially involving multiple networks in obscure locations. It defies conventional retaliation and protection strategies. As then-US Defense Secretary Leon Panetta warned in 2012, given its current systems, the United States is vulnerable to a “cyber Pearl Harbor” that could derail trains, poison water supplies, and cripple power grids.

So, how can such a scenario be prevented?

One option, surprisingly, could be to promote widespread adoption of hacking itself. Familiarity with hackers’ tools and methods provides a powerful advantage in diagnosing the strength of existing systems, and even in designing tighter security from the bottom up – a practice known as “white hat” hacking. Ethical infiltration enables a security team to render digital networks more resistant to attack by identifying the flaws. This may become routine practice – a kind of cyber fire drill – for governments and businesses, even as academic and industry research focuses in the coming years on the development of further technical safeguards.

In general, today’s defenses take the form of autonomous, constantly vigilant digital “supervisors” – computers and code that control other computers and code. Similar to traditional military command-and-control protocols, they gain power in numbers and can quickly react to a broad array of attacks. Such a digital ecosystem strengthens checks and balances, reducing the possibility of failure and mitigating the effects of an incursion.

In such a future scenario, a Hollywood blockbuster might be about networks of computers fighting each other, while humans stand by. It would portray the broader idea of “singularity,” a hypothetical turning point when the artificial surpasses the human. Fortunately, in this case, life is still far from imitating art.

This article is published in collaboration with Project Syndicate. Publication does not imply endorsement of views by the World Economic Forum.

To keep up with Forum:Agenda subscribe to our weekly newsletter.

Authors: Carlo Ratti, a member of the World Economic Forum’s Global Agenda Council on Future Cities and the curator of the Future Food District pavilion at the 2015 World Expo in Milan, directs the Senseable City Laboratory at the Massachusetts Institute of Technology. Matthew Claudel is a research fellow at the Senseable City Laboratory.

Image: An illustration picture shows a projection of binary code on a man holding a laptop computer, in an office in Warsaw June 24, 2013. REUTERS/Kacper Pempel.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

About Us



Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum