To view this page ensure that Adobe Flash Player version 11.1.0 or greater is installed.
CUTTING ROOM Whatever the cause, the effect was devastating. It took months before anything at TV5 could be put online: staff were reduced to communicating by fax machine. The top line cost of the attack has been put at 5 million euros. So we should probably all learn some lessons from this. TV5 has, with advanced authentication procedures for emails from outside the company, and particularly outside France. Flash drives – which we all use intuitively to swap ﬁles – now have to be tested in isolated computers ﬁrst, every time. Dick Hobbs But how do you run a broadcast business today without relying on the internet, without relying on connected devices? The most obvious point of connectivity is the delivery of the programmes: broadcasters expect content to be delivered as ﬁles, and production companies do not want to spend time and money writing tapes. There are plenty of secure, broadcast-speciﬁc services for delivering content, though, and the likes of Aspera, Aframe and Signiant can surely reassure users that nothing nasty is going to get delivered by them. There was a really scary story in the news a week or two ago. In the words of Yves Bigot, director-general of TV5 Monde, “we were a couple of hours from having the whole station gone for good”. Weaknesses are much more likely to be in personal devices. This could be a problem because the ability to connect into the broadcast environment through any device is one of the beneﬁts we are promised by the move to software-deﬁned architectures. What happened to this highly respected broadcaster was that malicious hackers set out to destroy the network’s systems. That has to be an alarm call for all of us. The example often quoted is of a channel controller who commissions a suite of promos for a new programme. The editor goes off and puts a package together, then sends it to the commissioner for checking. Back in April, the broadcaster had a big event in its headquarters, to celebrate the launch of a new channel. Politicians, industry leaders, and broadcasters from around the world came to drink champagne and wish the new channel well. That evening Monsieur Bigot went to dinner with a friend from Radio Canada, but barely had the foie gras been served when his mobile went berserk, a ﬂood of texts and calls telling him that all 12 channels had gone off air. The one piece of good fortune was that, because of the channel launch, TV5 had a lot of engineers on site. By dint of good engineering practice they quickly identiﬁed the particular machine that was targeted. It was isolated and they could rebuild the station. Almost nine hours after the attack started, one channel was back on air. The others followed during the day. Any longer and the loss of service, of revenue and of reputation would have killed the station. According to the BBC’s Gordon Corera, the attackers had carried out reconnaissance of TV5 Monde’s systems, to understand the way it worked. They then built bespoke targeted malware to corrupt and destroy the internet-connected hardware, from the camera robotics to the encoders. There appeared to be seven different points of entry. So this was very serious stuff indeed. It raises a lot of questions that may never be answered. Who paid the hackers to do it? And why TV5 Monde – just because vulnerabilities were identiﬁed? The UK security agencies, according to Corera, think it was an exercise to test cyber weaponry. 98 | KITPLUS - THE TV-BAY MAGAZINE: ISSUE 119 NOVEMBER 2016 That could mean a message popping up on the channel controller’s iPad, connected by wireless anywhere in the building, or maybe connected by 4G on the train home. The trailers are reviewed, comments added and returned to the editor. So now we have a device which could contain an unspeciﬁed range of apps, loaded by someone who is as non-technical as they come, talking directly to the asset and workﬂow management system running the entire station. This is not an insurmountable problem. Other industries have been forced to face the BYOD challenge – bring your own device. In enterprises from retail to banking, staff insisted on ditching the corporate Blackberry because it made them look like a teenage girl. They wanted to use their iOS or Android device and connect it into the corporate network. The solution was to turn the idea of security upside down. The traditional approach is to secure the device. With BYOD you have to accept that the device is insecure – everyone wants to load the latest Angry Birds style craze – and instead secure the corporate data. It is a lot harder for the IT department, but it is possible and, as TV5 Monde discovered, it is absolutely vital. And given that many of the major systems running in your broadcast facility will have direct connections back to the vendor to enable updates and fault-ﬁnding, there are a lot of data paths to keep track of. Finally, one good thing came of the attack at TV5 Monde: a renewed respect for the broadcast engineer. “We owe a lot to the engineer who unplugged that particular machine,” said Monsieur Bigot. “He is a hero here.”