  {"id":16101,"date":"2016-11-17T17:44:54","date_gmt":"2016-11-17T22:44:54","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/"},"modified":"2016-11-17T17:44:54","modified_gmt":"2016-11-17T22:44:54","slug":"the-sony-pictures-hack-two-years-later","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/","title":{"rendered":"The Sony Pictures Hack: Two Years Later"},"content":{"rendered":"<p>November 24 will mark two years since the North Korean government\u2019s massive cyberattack on Sony Pictures Entertainment (SPE). The attack \u2013 widely believed to be an attempt to intimidate SPE into canceling the release of <em>The Interview<\/em> \u2013 exposed 30,000 company documents and 170,000 emails.<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a> Two years later, how are SPE and the entertainment industry moving forward in the aftermath of the hack?<\/p>\n<p>While no company would ever want to see its inner workings revealed to the public, the SPE attack posed a particularly stark threat to the operating model of the entertainment industry. This model depends centrally on colorful personalities having a safe space to exercise freedom of speech and engage in creative expression. The hacking episode demonstrated that actors, directors, screenwriters, and producers all assumed \u2013 wrongly \u2013 that email was one such safe space. The hacked emails lifted the curtain on the eccentric, blunt, colorful and at times politically incorrect entertainment industry community. Regarding some of the more controversial emails that were disclosed, Amy Pascal, the former co-chair of SPE who was fired in the wake of the attack, said, \u201cEveryone understood because we all live in this weird thing together called Hollywood. If we all actually were nice, it wouldn\u2019t work.\u201d<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a><\/p>\n<p>Following the attack, SPE and other entertainment industry firms took steps to strengthen network defenses. Key measures have included: monitoring for atypical login patterns, encrypting data even if it is held behind a firewall, and placing greater control over access to individual files.<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a> As the CEO of a cybersecurity consultancy told CNBC, \u201cPrior to the hack, creative types saw security as friction. It became super personal in terms of the type of information that was stolen. Across the studios, they realized that it could have been any of them.\u201d<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a><\/p>\n<p>While steps to improve network security were necessary to SPE\u2019s continued functioning as a company, it remains to be seen whether they will be sufficient to reestablish trust among the artists and film executives that had grown accustomed to free-flowing exchanges over email. As one prominent screenwriter wrote in the <em>New York Times<\/em>, \u201cSince the Sony hacking, I say less in personal emails, and much less in professional ones. \u2026 If I\u2019m writing to someone whose cloud a hacker might fancy, I am less cozy, which is a bit like downgrading a close friend to an acquaintance.\u201d<a href=\"#_edn5\" name=\"_ednref5\">[v]<\/a> On the other hand, SPE chairman and CEO Michael Lynton told <em>Slate<\/em>, \u201cI still regularly see emails that make me say, \u2018Really?\u2019\u2026 The technology is so compelling that \u2013 for whatever reason \u2013 people are still sending me emails that they would very much not like to see show up in another venue.\u201d<a href=\"#_edn6\" name=\"_ednref6\">[vi]<\/a><\/p>\n<p>Going forward, can SPE and other entertainment industry firms continue to benefit from the convenience of email while protecting the privacy of their artistic talent? I would encourage SPE and other companies to consider a policy that would delete all emails after a fixed period \u2013 say, 90 days \u2013 unless the user proactively requested that the messages be archived. And if emails need to be stored for a longer period, they should be held in a highly secure location \u2013 not in a standard inbox. I would also encourage the entertainment industry to use other tools like Signal to communicate. Such tools can protect privacy and avoid the sort of self-censorship and chilling effect that the hack was intended to produce.<\/p>\n<p>Some will argue that no digital communication is ever truly secure, and that the only solution is to be more careful when we communicate using technology. For the time being, this may ultimately be true. But my hope is that over the long term we can all restore our faith in the security of digital communications, ensuring that movie stars and ordinary citizens alike can express themselves freely and openly through digital means.<\/p>\n<p>(630 words)<\/p>\n<p>&nbsp;<\/p>\n<p>References<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> Natalie Robehmed, \u201cThe Entire Sony Hack Is Now Available On Wikileaks,\u201d \u00a0Forbes, April 16, 2015, <a href=\"http:\/\/www.forbes.com\/sites\/natalierobehmed\/2015\/04\/16\/the-entire-sony-hack-is-now-available-on-wikileaks\/\">http:\/\/www.forbes.com\/sites\/natalierobehmed\/2015\/04\/16\/the-entire-sony-hack-is-now-available-on-wikileaks\/<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> \u201cEx-Sony Chief Amy Pascal Acknowledges She Was Fired,\u201d NBC News, February 12, 2015, <a href=\"http:\/\/www.nbcnews.com\/storyline\/sony-hack\/ex-sony-chief-amy-pascal-acknowledges-she-was-fired-n305281\">http:\/\/www.nbcnews.com\/storyline\/sony-hack\/ex-sony-chief-amy-pascal-acknowledges-she-was-fired-n305281<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> Julia Boorstin, \u201cThe Sony hack: One year later,\u201d CNBC, November 24, 2015, \u00a0<a href=\"http:\/\/www.cnbc.com\/2015\/11\/24\/the-sony-hack-one-year-later.html\">http:\/\/www.cnbc.com\/2015\/11\/24\/the-sony-hack-one-year-later.html<\/a><\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[iv]<\/a> Ibid.<\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[v]<\/a> Delia Ephron, \u201cIt\u2019s a Whole New Paranoid World,\u201d The New York Times, March 21, 2015, <a href=\"http:\/\/www.nytimes.com\/2015\/03\/22\/opinion\/sunday\/its-a-whole-new-paranoid-world.html\">http:\/\/www.nytimes.com\/2015\/03\/22\/opinion\/sunday\/its-a-whole-new-paranoid-world.html<\/a><\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[vi]<\/a> Amanda Hess, \u201cInside the Sony Hack,\u201d Slate, November 22, 2015, \u00a0<a href=\"http:\/\/www.slate.com\/articles\/technology\/users\/2015\/11\/sony_employees_on_the_hack_one_year_later.html\">http:\/\/www.slate.com\/articles\/technology\/users\/2015\/11\/sony_employees_on_the_hack_one_year_later.html<\/a><\/p>\n<p>Note: All online sources accessed November 17, 2016. Photo from: <a href=\"http:\/\/www.yrbmagazine.com\/the-interview-free-movie-passes-chicago-houston-nyc-jamesfrancotv-sethrogen-theinterview-theinterviewmovie\/\">http:\/\/www.yrbmagazine.com\/the-interview-free-movie-passes-chicago-houston-nyc-jamesfrancotv-sethrogen-theinterview-theinterviewmovie\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two years later, how are Sony Pictures and the entertainment industry moving forward in the aftermath of the hack?<\/p>\n","protected":false},"author":2324,"featured_media":16114,"comment_status":"open","ping_status":"closed","template":"","categories":[845,2291],"class_list":["post-16101","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-cybersecurity","category-sony"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Sony Pictures Hack: Two Years Later - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Sony Pictures Hack: Two Years Later - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Two years later, how are Sony Pictures and the entertainment industry moving forward in the aftermath of the hack?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/the_interview_wide_poster_crop.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/\",\"name\":\"The Sony Pictures Hack: Two Years Later - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/the_interview_wide_poster_crop.jpg\",\"datePublished\":\"2016-11-17T22:44:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/the_interview_wide_poster_crop.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/the_interview_wide_poster_crop.jpg\",\"width\":640,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/the-sony-pictures-hack-two-years-later\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Sony Pictures Hack: Two Years Later\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Sony Pictures Hack: Two Years Later - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/","og_locale":"en_US","og_type":"article","og_title":"The Sony Pictures Hack: Two Years Later - Technology and Operations Management","og_description":"Two years later, how are Sony Pictures and the entertainment industry moving forward in the aftermath of the hack?","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/","og_site_name":"Technology and Operations Management","og_image":[{"width":640,"height":480,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/the_interview_wide_poster_crop.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/","name":"The Sony Pictures Hack: Two Years Later - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/the_interview_wide_poster_crop.jpg","datePublished":"2016-11-17T22:44:54+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/the_interview_wide_poster_crop.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/the_interview_wide_poster_crop.jpg","width":640,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-sony-pictures-hack-two-years-later\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"The Sony Pictures Hack: Two Years Later"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/16101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/2324"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=16101"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/16101\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/16114"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=16101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=16101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}