There was a really scary story in the news a week or two ago. In the words of Yves Bigot, director-general of TV5 Monde, "we were a couple of hours from having the whole station gone for good".
What happened to this highly respected broadcaster was that malicious hackers set out to destroy the network's systems. That has to be an alarm call for all of us.
Back in April, the broadcaster had a big event in its headquarters, to celebrate the launch of a new channel. Politicians, industry leaders, and broadcasters from around the world came to drink champagne and wish the new channel well.
That evening Monsieur Bigot went to dinner with a friend from Radio Canada, but barely had the foie gras been served when his mobile went berserk, a flood of texts and calls telling him that all 12 channels had gone off air.
The one piece of good fortune was that, because of the channel launch, TV5 had a lot of engineers on site. By dint of good engineering practice they quickly identified the particular machine that was targeted. It was isolated and they could rebuild the station.
Almost nine hours after the attack started, one channel was back on air. The others followed during the day. Any longer and the loss of service, of revenue and of reputation would have killed the station.
According to the BBC's Gordon Corera, the attackers had carried out reconnaissance of TV5 Monde's systems, to understand the way it worked. They then built bespoke targeted malware to corrupt and destroy the internet-connected hardware, from the camera robotics to the encoders. There appeared to be seven different points of entry.
So this was very serious stuff indeed. It raises a lot of questions that may never be answered. Who paid the hackers to do it? And why TV5 Monde - just because vulnerabilities were identified? The UK security agencies, according to Corera, think it was an exercise to test cyber weaponry.
Whatever the cause, the effect was devastating. It took months before anything at TV5 could be put online: staff were reduced to communicating by fax machine. The top line cost of the attack has been put at 5 million euros.
So we should probably all learn some lessons from this. TV5 has, with advanced authentication procedures for emails from outside the company, and particularly outside France. Flash drives - which we all use intuitively to swap files - now have to be tested in isolated computers first, every time.
But how do you run a broadcast business today without relying on the internet, without relying on connected devices? The most obvious point of connectivity is the delivery of the programmes: broadcasters expect content to be delivered as files, and production companies do not want to spend time and money writing tapes.
|