The Star Trek transporter is something we know as fringe physics right now. German scientists are working on teleportation technology but it’s so far off we know we won’t be asking Scotty to beam us up anytime soon.


If we think about how great it would be to offer teleportation to the masses and travel instantaneously from a teleport center in your town to a receiving center in Tokyo we also need to consider the nefarious things that can be transported the same way. Can we imagine dirty bombs, small pox viruses, invasion forces, and other catastrophic elements just appearing out of nowhere?


This is great fodder for sci-fi writers but we know that it’s silly to worry about breech of national security via a Star Trek transporter station. But it does make us wonder about the technology we see on current television shows. Leaving the sci-fi example for a moment let’s explore the skills and tools used on shows about hackers.


Hackers have been portrayed as people who were using fringe science and unlikely social engineering ploys (relying on laughably inept IT Admins) to take down large networks and destroy files and steal millions. But as an educated audience we’ve become more savvy and discerning every day with our technology and we’re not fooled as easily and we dismiss it. Then along came a show called Mr. Robot.


Mr. Robot is a daunting hacker suspense thriller that airs on the USA Network and is rewriting the way hacking technology is portrayed and used in real life. It’s not outside of the box and it’s all very believable. It’s worth taking 5 minutes to read Wired’s “A Peek Inside Mr. Robot’s Toolbox”. You’ll see that almost all of the hacking tools used are available and can be used to attack systems anywhere.


As long as we have something of value there’s always someone who wants to take it. It’s why we lock our doors and install security systems and park under street lights at night. We take precautions that lessen the chance that we will become a victim.


A good IT consulting partner can help your company mitigate the risks associated with hacker breech by doing a complete assessment of your network and be the first line of defense against the outside world. It’s more than just patching and updating a firewall.


There’s just too much intelligent life down here with bad intent, Scotty.