Jason-Bourne

Image:Twocoms / Shutterstock.com

Following the news about Jason Bourne movie, Catherine Allen, Chair and CEO, Santa Fe Group discusses below the cyber security elements in the movie.

Catherine Allen, Chair and CEO at Santa Fe Group:

Catherine Allen“While Jason Bourne features long and improbable car chases, there were some interesting cyber security elements.

“The movie references the CIA investing in startups (of the social media company), which they have done and continue to fund security and data related businesses.

“The movie points out the privacy/national security tug of war…..an ongoing issue as recently exhibited by the Apple phone access to get terrorist information. National security agencies want back doors to all devices, which opens up huge security, as well as privacy, concerns.  The movie was simplistic on these points, but at least did a stab at it.  Personally, I worry more about all the information Google and Amazon and other social media sites have that might be used for more than commercial purposes and by foreign governments than I do what the NSA has.

“The ability to track people and things via satellite and their devices through the Internet is both possible and scary, and the movie Jason Bourne highlighted that.  It did not include voice tracking, but could have…..and it also could have incorporated drones, but didn’t. Also, using cameras in public areas to track people was featured.  The movie hints at the ability to hack public infrastructures by taking down the grid in Iceland….also a reality.

“I actually liked this movie for its use of cyber technology and tracking mechanisms… which are far more interesting than fist fights and crazy car chase through Las Vegas.  It is a melding of what is already in use and soon to be in the fight between national security and privacy.”

Experts Comments

Stay Tuned! Our Information Security Experts Community is responding .....

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.