Case Two: Sony’s Response to North Korea’s Cyberattack
On November 24, 2014, employees of Sony Pictures Entertainment booted up their computers to find an image of a skull along with a message from a group calling itself the Guardians of Peace. The message read: “We’ve already warned you and this is just the beginning. We’ve obtained all your internal data including your secrets and top secrets [which will be released] if you don’t obey us.”
As Sony would eventually discover, the hackers had stolen reams of sensitive data, including the Social Security numbers of 47,000 current and former employees, system passwords, salary lists, contracts, and even copies of some Sony employees’ passports. The hackers accessed hundreds of Outlook mailboxes as well as Sony IT audit documents. They also stole media files and placed pirated copies of five of Sony’s movies on illegal file-sharing servers. Sony was forced to completely shut down its information systems in an attempt to stem the data breach. Ultimately, Sony would determine that the damage done by the hackers was far more extensive than it first believed. Not only had data been stolen, but 75 percent of the company’s servers had been destroyed and several internal data centers had been wiped clean.
Contacted within hours of the event, the FBI soon identified the culprit. In June, several months before the hack, North Korea’s Ministry of Foreign Affairs had declared that it would take “a decisive and merciless countermeasure” if the U.S. government did not prevent the planned release of Sony’s motion picture The Interview, which features two reporters who venture to North Korea to interview and assassinate the country’s dictator, Kim Jong-un. In the film, the main character, initially won over by the dictator’s apparent kindness, discovers that the tyrant is lying about the country’s prosperity and freedoms. The plot, along with the movie’s unflattering portrayal of the dictator as ruthless and childish, had caught the attention of the North Korean government.
The U.S. government disclosed that it had proof that the North Koreans had made good on their threat. The U.S. National Security Agency (NSA) had reportedly penetrated the North Korean cyberwarfare unit four years prior to the attack and had been monitoring its capabilities since then. After Sony alerted the FBI of the attack, the NSA was able to trace the attack back to North Korea, using a digital fingerprint the hackers had left in the malware. Several weeks after the attack, FBI Director James Comey, revealed in a speech that the Sony hackers had been sloppy. “We could see that the IP [Internet protocol] addresses that were being used to post and to send the emails were coming fromIPs that were exclusively used by the North Koreans.”
The hackers warned Sony not to release The Interview, and then on December 16, the group issued a message threatening large terrorist attacks on theaters that showed the film. The National Organization of Theatre Owners contacted the Department of Homeland Security for information and advice. The FBI and NSA released a bulletin explaining that they had no credible information about a plan to attack theaters, but they could neither confirm nor deny whether the hackers had the ability to launch such an attack. Shortly after the bulletin was released, the four largest U.S. theater chains withdrew their requests to show the movie—Carmike Cinemas first, followed by Regal Entertainment, AMC Entertainment, and Cinemark. Within hours, Sony announced that it had canceled the film’s release. White House officials, Hollywood personalities, and the media were aghast. Comedian Jimmy Kimmel tweeted that the decision by the major theater chains to refuse to screen The Interview was “an un-American act of cowardice that validates terrorist actions and sets a terrifying precedent.”
On December 19, President Obama addressed the issue publicly: “Sony is a corporation. It suffered significant damage. There were threats against its employees. I’m sympathetic to the concerns that they faced. Having said all that, yes, I think they made a mistake.” Obama explained, “We cannot have a society in which some dictator in some place can start imposing censorship in the United States.” The president’s remarks highlighted the seriousness of the incident to the American public, many of whom came to view the incident as an attack on the freedom of expression.
In response to Obama’s comments, Sony officials released a statement later the same day: “Let us be clear—the only decision that we have made with respect to release of the film was not to release it on Christmas Day in theaters, after the theater owners declined to show it.... After that decision, we immediately began actively surveying alternatives to enable us to release the movie on a different platform. It is still our hope that anyone who wants to see this movie will get the opportunity to do so.”
In fact, on Christmas Day, the planned release day in the theater, The Interview became available through video on- demand outlets such as Amazon.com, and within less than a month, the movie had brought in over $40 million in revenue. Approximately 6 million viewers had rented or purchased the movie in this way. Several hundred movie theaters that opted to screen the movie generated another $6 million. Over the next two months, Sony also released the movie on Netflix, on DVD and Blu-Ray, and in theaters in other countries.
Meanwhile, Sony has worked to recover from the damage done to the company itself by the hack. Sony Pictures’ parent company, which is based in Japan, asked regulators there for an extension to file its third-quarter financial results. It also fired executive Amy Pascal whose leaked emails contained derogatory remarks about Hollywood producers and the U.S. president’s movie preferences. The company also provided one year of free credit protection services to current and former employees.
In February 2015, President Obama held the first-ever White House summit on cyber security issues in Silicon Valley. The summit was billed as an attempt to deal with the increasing vulnerability of U.S. companies to cyber attacks— including those backed by foreign governments. However, the chief executives of Microsoft, Google, Facebook, and Yahoo all refused to attend the summit. Those companies have long advocated for the government to stop its practice of collecting and using private data to track terrorist and criminal activities and have worked to find better ways to encrypt the data of their customers. However, U.S. security agencies have continually pressured the IT giants to keep the data as unencrypted as possible to facilitate the government’s law enforcement work. Ultimately, both the government and private businesses will need to find a way to work together to meet two contradictory needs—the country’s need to make itself less vulnerable to cyber attacks while at the same time protecting itself from potential real-world violence.
Critical Thinking Questions:
In: Operations Management
This comes from the Columbia University website: “As an equal opportunity and affirmative action employer, the University does not discriminate against or permit harassment of employees or applicants for employment on the basis of race, color, sex, gender (including gender identity and expression), pregnancy, religion, creed, national origin, age, alienage and citizenship, status as a perceived or actual victim of domestic violence, disability, marital status, sexual orientation, military status, partnership status, genetic predisposition or carrier status, arrest record, or any other legally protected status.”
In: Operations Management
10. What are five marketing tools for a sport facility?
In: Operations Management
9. What do you think of the Dodger Stadium all you can eat idea? How much extra per ticket would you charge to cover this cost? Does the team really make money on this?
sports facility management
In: Operations Management
A landscape architect plans to enclose a square foot rectangular region in a botanical garden. She will use shrubs costing per foot along three sides and fencing costing per foot along the fourth side. Find the minimum total cost. Round the answer to the nearest cent.v
In: Operations Management
Companies A, B, and C supply components to three plants (F, G, and H) via two crossdocking facilities (D and E). It costs $4 to ship from D regardless of final destination and $3 to ship to E regardless of supplier. Shipping to D from A, B, and C costs $3, $4, and $5, respectively, and shipping from E to F, G, and H costs $10, $9, and $8, respectively. Suppliers A, B, and C can provide 200, 300 and 500 units respectively and plants F, G, and H need 350, 450, and 200 units respectively. Crossdock facilities D and E can handle 600 and 700 units, respectively. Logistics Manager, Jack Beauregard, had previously used ʺChain of Foolsʺ as his supply chain consulting company, but now turns to you for some solid advice.
How many demand-side constraints are there? Write the demand-side constraints.
In: Operations Management
You will create a COVID-19 action plan for your company (NIKE) by the following steps:
2) How has the company responded to these effects? How have competitors responded? (Difference/Same)
Please provide sources.
In: Operations Management
2. Chapter 1 introduces the subject of Strategy. What are the characteristics of a successful strategy and how has Netflix performed in regards to each of these characteristics?
In: Operations Management
6)explain some of the positive and negative effects a secondary ticket market can have a on a facility
In: Operations Management
Describe basic professional development strategies.
Provide a simple plan for the hospitality industry
In: Operations Management
What were some of the most significant technological innovations that occurred in China during this time period (circa 500 - 1300)?
In: Operations Management
In: Operations Management
2)what additional assets (both tangible and intangible) can a facility sell?
In: Operations Management
With a focus on the resource-based view of the firm discussion in Chapter 3, provide four observations to support how can you justify a company like Netflix’s strategy being more focused on its resources and capabilities rather than specific customer needs?
In: Operations Management
4. If Netflix were to diversify into the telecommunications industry, would it create value for its shareholders? Utilize the appropriate measures found in Chapter 7 that can be applied for Netflix to make up its mind and to justify your answer.
In: Operations Management