Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

How the classic cartoon 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago

November 19, 2025

VC Jennifer Neundorfer explains how founders can stand out in a crowded AI market

November 19, 2025

Legally troubled AI music startup Suno raises $2.45 billion valuation on $200 million in revenue

November 19, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Why Benchmark made a rare crypto bet on trading app Fomo with $17 million Series A

    November 6, 2025

    Coinbase CEO Brian Armstrong trolls prediction markets

    November 1, 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agent coding

    October 29, 2025

    Disrupt 2025: Day 3 | Tech Crunch

    October 29, 2025

    MoviePass releases fantasy league game Mogul to the public

    October 29, 2025
  • Security

    How the classic cartoon 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago

    November 19, 2025

    US, UK, Australia sanction Russian 'bulletproof' web host used in ransomware attack

    November 19, 2025

    Security startup Guardio secures $80 million from ION Crossover Partners

    November 19, 2025

    DoorDash confirms data breach affecting users' phone numbers and addresses

    November 17, 2025

    MCP AI agent security startup Runlayer launches with 8 unicorns, $11 million in funding from Khosla's Keith Rabois and Felicis

    November 17, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    VC Jennifer Neundorfer explains how founders can stand out in a crowded AI market

    November 19, 2025

    Legally troubled AI music startup Suno raises $2.45 billion valuation on $200 million in revenue

    November 19, 2025

    Why January Ventures is funding undervalued AI founders

    November 19, 2025

    Onepot AI raises $13M to ease chemical drug manufacturing

    November 19, 2025

    Credit risk automation platform Kaaj raises $3.8 million in seed funding from Kindred Ventures

    November 19, 2025
TechBrunchTechBrunch

How the classic cartoon 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago

TechBrunchBy TechBrunchNovember 19, 20256 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


The year is 2030. A “notorious mystery hacker” known as Puppet Master is wreaking havoc on the Internet, infiltrating the so-called cyber brains of several humans and “every device on the network.” After all, Puppet Master is a creation of Japan's Ministry of Foreign Affairs.

In other words, Puppet Master is what we would today call a government-sponsored hacker, or Advanced Persistent Threat (APT). However, in this case, the “mysterious'' hacker has become the villain, wanted on charges of “stock price manipulation, espionage, political manipulation, terrorism, and cyber brain privacy violation.''

That's the basic premise of the Japanese cult classic “Ghost in the Shell,” which celebrated its 30th anniversary this week and is based on the chapters titled “Bye Bye Clay” and “Ghost Coast” from the first volume of the May 1989 manga of the same name.

It may not be an exaggeration to say that Puppet Master's story was ahead of its time. The World Wide Web (which evolved from the Internet as we know it today) was invented in 1989. This was the same year that the first volume of the Ghost in the Shell manga (including the story of the Puppet Master) hit newsstands in Japan. (The World Wide Web was made publicly available in 1991.)

A scene from the Ghost in the Shell manga. It depicts an employee of Public Security Section 6 and a puppeteer. (Image: TechCrunch)

In the comic, when Puppet Master was captured, officials from Public Security Division 6, an agency under the Ministry of Foreign Affairs, explained that they had been tracking the hacker “for a long time” and were “profiling his behavioral trends and code/technical patterns.”

“As a result, we were finally able to create a special anti-puppeteer attack barrier,” a source said in the manga.

Take the risk of inferring too much from a few sentences. In reality, what officials are describing is essentially what cybersecurity companies like antivirus companies do on a daily basis to thwart malware. They create so-called signatures not only based on the malware's code, but also on its behaviors and characteristics, known as heuristics.

There are other elements of the plot that turn out to be prescient.

At the beginning of Puppet Master's investigation, Major Motoko Kusanagi, the protagonist and commander of the anti-cyberterrorism unit Section 9, hacks into the Sanitation Bureau's network in order to track a garbage truck. (These days, government hackers working for intelligence agencies often break into large networks to spy on specific individual targets, rather than siphoning data from the hacked networks themselves.)

Meanwhile, one of the garbage men confesses to his colleague that he hacked into his wife's computer because he thought she was cheating on him. Shortly thereafter, it is discovered that he was using a computer virus that he had obtained from “a certain programmer.” This is a clear case of technology-enabled domestic violence, and even stalkerware, that TechCrunch has investigated extensively over the past few years.

After all, the abusive trash man didn't have a wife. His memories were all made up. His ghost, his mind or consciousness, was hacked by the Puppet Master with the purpose of using him to hack government officials. In some ways, this is similar to how some sophisticated hackers hack into a network and then use that network to hack their real target, separating themselves from themselves and their final target to cover their tracks.

Puppet Master as a government hacker, infiltrating networks to track targets or attack other networks, and jealousy-driven hacking are not the only fascinating parts of detective stories related to anime hacking.

John Wilander, a cybersecurity veteran and author of hacker-themed novels, has written an in-depth analysis of the film that focuses on the details and references real-life scenarios. Wilander cited examples of hackers reusing known exploits and malware to make attribution difficult, researching malware and infecting themselves without alerting their creators, and using computers for industrial espionage.

Obviously, the manga and anime take the basic, realistic premise of the Puppet Master as a hacker and take it in a more fantastical direction. This hacker turns out to be an advanced artificial intelligence, capable of controlling humans through his cyberbrain, and, spoiler alert, is self-aware enough to seek political asylum and eventually propose to Kusanagi that he fuse his human “ghost,” or mind.

Screenshots from Ghost in the Shell, especially the scene where Puppet Master and Major Kusanagi fuse together. (Image: Screenshot/YouTube)

To understand how prophetic Ghost in the Shell was, it's important to place it in historical context. In 1989 and 1995, the term cybersecurity did not yet exist, but the term “cyberspace” was famously coined by science fiction author William Gibson in his classic book Neuromancer.

But while computer security, or information security, is already a reality and has been for decades, it was a very niche specialty within computer science.

The first computer virus is believed to be the Creeper worm, which was released in 1971 onto Arpanet, a government-developed network that became the Internet's predecessor. Several other viruses and worms wreaked havoc after that, but once the Internet and the World Wide Web became a reality, they became ubiquitous.

Perhaps the first government espionage activity documented on the Internet was discovered by Clifford Stoll, a trained astronomer and computer administrator at Lawrence Berkeley National Laboratory in California. In 1986, Stoll noticed a 75-cent accounting error in the network and eventually discovered that hackers had penetrated the lab's systems. The hackers were eventually identified and found to have been providing information to the Soviet Union's KGB from the lab and other U.S. government networks.

Stoll immortalized his months of detailed and painstaking research in his book, The Cuckoo's Egg. This first-person account is like a very detailed and extensive report by a security researcher who analyzed a hacking campaign carried out by government hackers. The Cuckoo's Egg has since become a classic, but it's safe to say it wasn't necessarily mainstream at the time it was released.

As far as I know, Ghost in the Shell creator Masamune Shirow has never said whether real events influenced the hacking plot points in the manga. But it's clear what he was paying attention to in a hidden world that was alien to most people on the planet back then, who were still years away from being able to connect to the Internet, let alone know that hackers existed.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

US, UK, Australia sanction Russian 'bulletproof' web host used in ransomware attack

November 19, 2025

Security startup Guardio secures $80 million from ION Crossover Partners

November 19, 2025

DoorDash confirms data breach affecting users' phone numbers and addresses

November 17, 2025

MCP AI agent security startup Runlayer launches with 8 unicorns, $11 million in funding from Khosla's Keith Rabois and Felicis

November 17, 2025

Surveillance technology provider Prorei has been hacked, data stolen and website defaced

November 17, 2025

Five people plead guilty to helping North Koreans infiltrate US companies as 'remote IT workers'

November 14, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

How the classic cartoon 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago

November 19, 2025

VC Jennifer Neundorfer explains how founders can stand out in a crowded AI market

November 19, 2025

Legally troubled AI music startup Suno raises $2.45 billion valuation on $200 million in revenue

November 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.