Travis Doering

Last updated

Travis Doering
Travis Doering Film Producer.png
Doering in Classified: The Edward Snowden Story pitch video released September 5, 2013
Born (1991-07-14) July 14, 1991 (age 32)
Vancouver, British Columbia, Canada
Nationality Canadian
Occupation(s) systems analyst, writer and film producer.
Years active2006–present

Travis Doering (born July 14, 1991 in Vancouver, British Columbia) is a Canadian systems analyst, writer and film producer.

Contents

Career

He is best known for his work as a security consultant and writer, in both the film and news media. In 2018 Doering revealed one of the largest data breaches in Canadian history effecting millions of customers of defunct computer retailer NCIX. [1] In 2015 via the now defunct website Hacker Film Blog, [2] Doering revealed vulnerabilities in Apple's iCloud platform and the breach and subsequent theft of customer data from internet security software company "Bitdefender". [3] In the film industry Doering has served as a technical consultant providing hacking and information technology dialogue on several film and television productions including the Canadian science fiction series "Continuum", the police procedural "Motive" and the American zombie film "Dead Rising: Endgame”. [4] In addition to his work in media, Doering also serves as a systems analyst providing information security consultancy services for high risk individuals and businesses since 2006. [5] Before writing Doering worked in the casting and production department on many Canadian and American film and television productions. [6]

Security Research

In September 2018, Doering posted an editorial title NCIX Data Breach on the blog of his cyber security company Privacy Fly. It outlined a severe data breach at a bankrupt Canadian retailer NCIX in which millions of business records detailing 15 years worth of transactions were sold in a series of backroom deals. The editorial prompted an investigation into the sale by the RCMP and Office of the Information and Privacy Commissioner of British Columbia, as well as a civil lawsuit. [7] In July 2015, Doering created the Hacker Film Blog [8] where he co-authored an article about a security breach at antivirus maker BitDefender. [9] The story was later picked up by Forbes, [10] The Washington Times, [11] and PC World. Two months later in September 2015, Doering posted a documentary titled "Vulnerability: The Secrets Behind iCloud Hacking”. The documentary exposed vulnerabilities being exploited by an underground hacking collective known as RipSec, whose members breached over eleven thousand iCloud accounts, a significant portion of which belonged to Hollywood celebrities like Amanda Seyfried, Kate Mara, and Jamie Foxx. [12]

Edward Snowden Movie

In September 2013, Doering and Film Director Jason Bourque set out to crowdfund a feature film titled "Classified: The Edward Snowden Story". [13] "Classified" was a biographical feature film based on the life of NSA leaker Edward Snowden, in January 2014 production was shut down and the project was cancelled after losing several key donators due to not reaching their total 1.7 million dollar funding goal. When the production was shutdown Bourque and Doering announced that "Classified" would be split into two separate projects one titled "Vulnerability", [14] a documentary that focuses on IT security and the internet. The second, a feature film based on Snowden's life that would be produced in cooperation with likeminded production companies and film distributors in the near future. In January 2014 existing backers from "Classified" had the option to transfer their donations to "Vulnerability" or have the funds fully refunded. "Vulnerability" was released on September 25, 2015.

Filmography

Feature credits

YearTitleProducerTechnical ConsultantWriter
2016Dead Rising: Endgame [15] Yes
2015Vulnerability [16] YesYes
2012 Skyfall Yes

Television credits

YearTitleProducerTechnical ConsultantWriter
2012–2015 Continuum Yes
2013–2016 Motive Yes
2013Hacked: Illusions of Security [17] Yes

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">McAfee</span> American global computer security software company

McAfee Corp., formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Gen Digital</span> Multinational software company

Gen Digital Inc. is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 500 company and a member of the S&P 500 stock-market index. The company also has development centers in Pune, Chennai and Bangalore. Its portfolio includes Norton, Avast, LifeLock, Avira, AVG, ReputationDefender, and CCleaner.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

<span class="mw-page-title-main">Equifax</span> American consumer credit reporting agency

Equifax Inc. is an American multinational consumer credit reporting agency headquartered in Atlanta, Georgia and is one of the three largest consumer credit reporting agencies, along with Experian and TransUnion. Equifax collects and aggregates information on over 800 million individual consumers and more than 88 million businesses worldwide. In addition to credit and demographic data and services to business, Equifax sells credit monitoring and fraud prevention services directly to consumers.

<span class="mw-page-title-main">Avast</span> Czech security software company

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic, that researches and develops computer security software, machine learning, and artificial intelligence. Avast has more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. The company has approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it was in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.

<span class="mw-page-title-main">NCIX</span> Defunct Canadian computer retailer

NCIX Computer Inc. was an online computer hardware and software retailer based in Richmond, British Columbia, Canada, founded in 1996 by Steve Wu (伍啟儀).

<span class="mw-page-title-main">Bitdefender</span> Romanian cybersecurity technology company

Bitdefender is a Romanian cybersecurity technology company headquartered in Bucharest, Romania, with offices in the United States, Europe, Australia and the Middle East.

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice, organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak".

A zero-day is a vulnerability or security hole in a computer system unknown to its owners, developers or anyone capable of mitigating it. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or zero-day attack.

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.

<span class="mw-page-title-main">Kaspersky Lab</span> Russian multinational cybersecurity and anti-virus provider

Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.

Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock, which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.

<span class="mw-page-title-main">G Data CyberDefense</span> German software company

G Data CyberDefense AG is a German software company that focuses on computer security. The company was founded in 1985 and is headquartered in Bochum. They are known for being the creators of the world's first antivirus software. G Data uses multiple scanning engines; one is developed in-house and the other is the Bitdefender engine. G Data provides several security products that are targeted at home and business markets. The company has a North American subsidiary located in Newark, Delaware.

Classified: The Edward Snowden Story was a 2014 feature film by Jason Bourque and Travis Doering starring Kevin Zegers, Michael Shanks and Carmen Aguirre.

The Internet service company Yahoo! was subjected to the largest data breach on record. Two major data breaches of user account data to hackers were revealed during the second half of 2016. The first announced breach, reported in September 2016, had occurred sometime in late 2014, and affected over 500 million Yahoo! user accounts. A separate data breach, occurring earlier around August 2013, was reported in December 2016. Initially believed to have affected over 1 billion user accounts, Yahoo! later affirmed in October 2017 that all 3 billion of its user accounts were impacted. Both breaches are considered the largest discovered in the history of the Internet. Specific details of material taken include names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords. Further, Yahoo! reported that the late 2014 breach likely used manufactured web cookies to falsify login credentials, allowing hackers to gain access to any account without a password.

<span class="mw-page-title-main">Okta, Inc.</span> American information technology company

Okta, Inc. is an American identity and access management company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website web services and devices. It was founded in 2009 and had its initial public offering in 2017, being valued at over $6 billion.

References

  1. Robinson, Kristen (September 21, 2018). "Thousands of Canadians' personal data from NCIX servers listed on Craigslist: cybersecurity expert". Global News. Retrieved October 10, 2018.
  2. Cimpanu, Catalin (August 1, 2015). "Bitdefender User Database Breached, Hacker Attempts to Extort Company". Softpedia. Retrieved July 8, 2017.
  3. Constantin, Lucian (July 31, 2015). "Hacker steals login credentials of Bitdefender business users, attempts blackmail". PC World. Retrieved July 8, 2017.
  4. Reid, Michael (December 19, 2013). "Big Picture: Victoria-raised director plans to file-share Snowden biopic". Times Colonist. Retrieved July 8, 2017.
  5. Iyer, Kavita (September 25, 2015). "How 'RipSec' made its way to Hollywood with the iCloud celebrity hack". Tech Worm. Retrieved July 8, 2017.
  6. Rardon, JR (December 12, 2015). "Holiday movie filming around mid-Island area". Nanaimo Daily News. Retrieved July 8, 2017.
  7. Proctor, Jason (September 25, 2018). "Proposed class action lawsuit claims data breach exposed personal information of 258,000 people". CBC News. Retrieved October 10, 2018.
  8. McPeake, Dan (July 29, 2015). "Antivirus Maker Bitdefender Hacked, Customer Data Being Sold in Shady Black Market Deals". Hacker Film. Retrieved April 8, 2016.
  9. Osborne, Charlie (August 3, 2015). "Bitdefender suffers data breach, customer records stolen". ZDNet. Retrieved July 18, 2017.
  10. Fox-Brewster, Thomas (July 31, 2015). "Anti-Virus Firm BitDefender Admits Breach, Hacker Claims Stolen Passwords Are Unencrypted". Forbes. Retrieved July 18, 2017.
  11. Blake, Andrew (July 31, 2015). "Anti-virus maker BitDefender admits hacker stole user data". The Washington Times. Retrieved July 18, 2017.
  12. Darren, Pauli (September 25, 2015). "'RipSec' goes to Hollywood: how the iCloud celeb hack happened". The Register. Retrieved July 18, 2017.
  13. Kharpal, Arjun (September 10, 2013). "Filmmakers look to crowdfunding for Snowden movie". CNBC. Retrieved April 8, 2014.
  14. Master, Web (April 8, 2013). "Official Website". Snowden.sx. Archived from the original on January 3, 2014. Retrieved April 8, 2014.
  15. "Dead Rising: Endgame IMDB". IMDb . Retrieved July 17, 2017.
  16. "Vulnerability IMDB". IMDb . Retrieved March 2, 2014.
  17. Morton, Ben (May 28, 2012). "Feature film sector slows as TV production ramps up". Vancouver Sun . Retrieved September 26, 2013.