Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

OpenAI hits back at Google with GPT-5.2 after ‘code red’ memo.

Google’s AI testing feature for clothes now only works with a selfie

Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    OpenAI hits back at Google with GPT-5.2 after ‘code red’ memo.

    14 December 2025

    Trump’s AI executive order promises ‘a rulebook’ – startups may find legal loophole instead

    13 December 2025

    Ok, so what’s up with the LinkedIn algo?

    12 December 2025

    Google Released Its Deepest Research AI Agent To Date — The Same Day OpenAI Dropped GPT-5.2

    12 December 2025

    Disney hits Google with cease and desist alleging ‘massive’ copyright infringement

    11 December 2025
  • Apps

    Google’s AI testing feature for clothes now only works with a selfie

    14 December 2025

    DoorDash driver faces felony charges after allegedly spraying customers’ food

    13 December 2025

    Google Translate now lets you listen to real-time translations on your headphones

    13 December 2025

    With iOS 26.2, Apple lets you bring back Liquid Glass again — this time on the lock screen

    12 December 2025

    World launches its ‘super app’, including payment encryption and encrypted chat features

    12 December 2025
  • Crypto

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025

    Only 5 days until Disrupt 2025 sets the startup world on fire

    22 October 2025
  • Fintech

    Coinbase starts onboarding users again in India, plans to do fiat on-ramp next year

    7 December 2025

    Walmart-backed PhonePe shuts down Pincode app in yet another step back in e-commerce

    5 December 2025

    Nexus stays out of AI, keeping half of its new $700M fund for India startup

    4 December 2025

    Fintech firm Marquis notifies dozens of US banks and credit unions of data breach after ransomware attack

    3 December 2025

    Revolut hits $75 billion valuation in new capital raise

    24 November 2025
  • Hardware

    Pebble founder unveils $75 AI smart ring to record short notes with the push of a button

    10 December 2025

    Amazon’s Ring launches controversial AI-powered facial recognition feature on video doorbells

    10 December 2025

    Google’s first AI glasses are expected next year

    9 December 2025

    eSIM adoption is on the rise thanks to travel and device compatibility

    6 December 2025

    AWS re:Invent was an all-in pitch for AI. Customers may not be ready.

    5 December 2025
  • Media & Entertainment

    Disney signs deal with OpenAI to allow Sora to create AI videos with its characters

    11 December 2025

    YouTube TV will launch genre-based subscription plans in 2026

    11 December 2025

    Founder of AI startup Tavus says users talk to AI Santa ‘for hours’ a day

    10 December 2025

    Spotify releases music videos in the US and Canada for Premium subscribers

    9 December 2025

    Amazon Music’s 2025 Delivered is now here to compete with Spotify Wrapped

    9 December 2025
  • Security

    The flaw in the photo booth manufacturer’s website exposes customers’ photos

    13 December 2025

    Home Depot exposed access to internal systems for a year, researcher says

    13 December 2025

    Security flaws in the Freedom Chat app exposed users’ phone numbers and PINs

    11 December 2025

    Petco takes down Vetco website after exposing customers’ personal information

    10 December 2025

    Petco’s security bug affected customers’ SSNs, driver’s licenses and more

    9 December 2025
  • Startups

    Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

    13 December 2025

    Interest in Spoor’s AI bird tracking software is soaring

    13 December 2025

    Retro, a photo-sharing app for friends, lets you ‘time travel’ to your camera roll

    12 December 2025

    On Me Raises $6M to Shake Up the Gift Card Industry

    12 December 2025

    1X has struck a deal to send its ‘homemade’ humanoids to factories and warehouses

    11 December 2025
  • Transportation

    Inside Rivian’s big bet on self-driving with artificial intelligence

    13 December 2025

    Zevo wants to add robotaxis to its car-sharing fleet, starting with newcomer Tensor

    13 December 2025

    Driving aboard Rivian’s fight for autonomy

    12 December 2025

    Rivian goes big on autonomy, with custom silicon, lidar and a hint of robotaxis

    12 December 2025

    Rivian’s AI assistant is coming to its electrics in early 2026

    11 December 2025
  • Venture

    Runware raises $50 million in Series A to make it easier for developers to create images and videos

    12 December 2025

    Stanford’s star reporter understands Silicon Valley’s startup culture

    12 December 2025

    The market has “changed” and founders now have the power, VCs say

    11 December 2025

    Tiger Global plans cautious business future with new $2.2 billion fund

    8 December 2025

    Sources: AI-powered synthetic research startup Aaru raises Series A at $1B ‘headline’ valuation

    6 December 2025
  • Recommended Essentials
TechTost
You are at:Home»Security»How the classic anime ‘Ghost in the Shell’ predicted the future of cybersecurity 30 years ago
Security

How the classic anime ‘Ghost in the Shell’ predicted the future of cybersecurity 30 years ago

techtost.comBy techtost.com20 November 202506 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
How The Classic Anime 'ghost In The Shell' Predicted The
Share
Facebook Twitter LinkedIn Pinterest Email

The year is 2030. A “notorious mystery hacker” known as o Puppetry is wreaking havoc on the internet by seeping into the so-called cyberbrains of several people as well as “every terminal on the network.” As it turns out, Puppet Master is a creation of Japan’s Ministry of Foreign Affairs.

In other words, Puppet Master is what we would today call a government-sponsored hacker, or advanced persistent threat (APT). In this case, however, the “ghost” hacker goes rogue and is wanted for “stock manipulation, espionage, political engineering, terrorism, and invasion of cyber brain privacy.”

This is the basic premise of the Japanese cult classic anime”Ghost in the Shellwhich marked its 30th anniversary this week since its debut and was based on the chapters titled “Bye Bye Clay” and “Ghost Coast” from the first volume of the manga of the same name, was released in May 1989.

To say that the Puppet Master story was ahead of its time might be an understatement. The World Wide Web, essentially what evolved from the internet as we know it today, was invented in 1989, the same year the first volume of the “Ghost in the Shell” manga — including the Puppet Master story — hit newsstands in Japan. (The World Wide Web went public in 1991.)

A scene from the Ghost in the Shell manga, depicting an official from Public Security Division 6 and the Puppet TheaterImage Credits:TechCrunch screenshot

In the manga, when Puppet Master is caught, an employee from Public Security Division 6, an agency under the Ministry of Foreign Affairs, explains that they have been hunting the hacker “for a long time” and “profiled his behavioral tendencies and code/technology patterns”.

“As a result, we were finally able to create a special attack barrier against the puppets,” the official says in the manga.

At the risk of extrapolating too much from a few sentences, the reality is that what the official describes is basically what cybersecurity companies, like antivirus companies, do every day to stop malware. Not only do they create the so-called signatures based on the malware’s code, but also based on its behavior and properties, known as heuristics.

There are other plot elements that proved prescient.

At the beginning of Puppet Master’s investigation, Major Motoko Kusanagi, the protagonist and commander of the anti-terrorist unit Section 9, breaks into the Sewer Department’s network to locate a garbage truck. (These days, government hackers working for intelligence agencies often break into large networks to spy on specific individual targets, rather than extract data from the breached network itself.)

While this is happening, one of the scavengers confesses to his colleague that he hacked his wife’s cyberspace because he believes she is cheating on him. Soon after, we find out that he was using a computer virus that he got from “some programmer”. This is a clear case of domestic abuse through technology, or even stalkerware, which TechCrunch has investigated extensively over the past few years.

As it turns out, the abusive scavenger didn’t have a wife. His memories were all made up. Of ghost — essentially his mind or consciousness — was hacked by Marionette with the goal of using it to hack government officials. In a way, this is similar to what some advanced hackers do when they break into networks that they then use to hack their real target, as a way to cover their tracks by adding separation from themselves and the ultimate target.

Puppet Master as a government hacker, hacking networks to track targets or use them to attack other networks, and a jealousy-fueled hack aren’t the only exciting pieces of speculative fiction related to anime hacking.

John Wilander, a cybersecurity veteran who writes hacker fiction books, wrote exhaustive analysis of the film which highlighted details that refer to real-life scenarios. Wilander gave examples such as hackers reusing known exploits or malware to make performance more difficult, researching malware without notifying the creators and infecting themselves with it, and using computers for industrial espionage.

Obviously, the manga and anime take the basic – and realistic – premise of the Puppet Master as a hacker in more fantastical directions. The hacker, who turns out to be an advanced AI, can control people through their cyber brains and is self-aware to the point where — spoiler alert — he applies for political asylum and ends up suggesting that Kusanagi merge theghosts”, essentially their mind.

A still from “Ghost in the Shell”, specifically the scene where the puppeteer and Major Kusanagi mergeImage Credits:Screenshot/YouTube

To understand how prophetic “Ghost in the Shell” was, it’s important to put it in its historical context. In 1989 and 1995, cyber security was not even a word yet, although the term “cyberspaceit was famously coined by science fiction writer William Gibson in his classic book, Neuromancer.

Computer security, or information security, however, was already a reality, and had been for a few decades, but it was a highly specialized specialty in computer science.

The first computer virus is believed to be the Creeper worm, which was released in 1971 on Arpanet, the government-developed network that became the precursor to the Internet. A handful of other viruses and worms wreaked havoc after that, before becoming ubiquitous when the Internet and World Wide Web became a reality.

Perhaps the first documented government spying campaign on the Internet was the one he discovered Clifford Stolla trainee astronomer who also managed the computers at the Lawrence Berkeley National Laboratory in California. In 1986, Stoll noticed a 75-cent accounting error on the network, which eventually led him to discover that a hacker had broken into the lab’s systems. In the end, the hacker was tracked down and found to be feeding information from the lab and other US government networks to the KGB of the Soviet Union.

Stoll captured his many months of meticulous and painstaking research in the book “The Cuckoo’s Egg,” a first-person account that reads like a very detailed and extensive report by security researchers analyzing a hacking campaign carried out by government hackers.

As far as I can tell, “Ghost in the Shell” creator Masamune Shirow has never spoken about the real-life events that inspired the hacking plot points in the manga. But it’s clear that he was paying attention to what, at the time, was a hidden world foreign to most people on Earth, who were still years away from being online, let alone knowing the existence of hackers.

Anime classic cyber security Cybersecurity Future ghost Ghost In The Shell hacker Hacking manga predicted science fiction Shell years
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLegally troubled AI-powered music startup Suno raises $2.45B valuation on $200M revenue
Next Article Amazon’s Prime Video is getting AI-generated video recaps for some TV shows
bhanuprakash.cg
techtost.com
  • Website

Related Posts

The flaw in the photo booth manufacturer’s website exposes customers’ photos

13 December 2025

Home Depot exposed access to internal systems for a year, researcher says

13 December 2025

Security flaws in the Freedom Chat app exposed users’ phone numbers and PINs

11 December 2025
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

OpenAI hits back at Google with GPT-5.2 after ‘code red’ memo.

14 December 2025

Google’s AI testing feature for clothes now only works with a selfie

14 December 2025

Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

13 December 2025
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Coinbase starts onboarding users again in India, plans to do fiat on-ramp next year

7 December 2025

Walmart-backed PhonePe shuts down Pincode app in yet another step back in e-commerce

5 December 2025

Nexus stays out of AI, keeping half of its new $700M fund for India startup

4 December 2025
Startups

Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

Interest in Spoor’s AI bird tracking software is soaring

Retro, a photo-sharing app for friends, lets you ‘time travel’ to your camera roll

© 2025 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.