How HBO’s ‘The Regime’ creates comedy from an authoritarian regime

posted in: News | 0

Imagine a world where a country’s leader lived a wildly self-indulgent lifestyle and dictated what was to be considered true, and the leader’s followers either cravenly indulge this or blindly believe it all.

No, this isn’t a documentary. HBO’s “The Regime” may have a bland title, but the fictional series, which premieres March 3, is a wild ride, a dark and absurdist satire of authoritarianism, that finds the funny in the sinister and the brutality in the outlandish. 

Set in a fictional Central European country, it centers on the chancellor, Elena Vernham (a mesmerizing, deeply weird Kate Winslet) who rules according to her whims and her paranoia. (She fears her dead father’s disapproval, visiting his glass coffin to pathetically plead her case.)

When she brings in the violent, possibly unhinged army corporal Herbert Zubak (Matthias Schoenaerts) as an aide, sparks fly. He becomes her advisor on everything from his awful country diet to foreign policy, creating new layers of chaos in the palace and the country.   

The show’s creator, Will Tracy, honed his political comedy chops writing for “The Onion News Network” and “Last Week Tonight With John Oliver” and refined his skills writing about power and wealth (and tantrums) on “Succession” and his film, “The Menu.”

He spoke recently by video about the central relationship and the geopolitics, the laughs and the fears. This interview has been edited for length and clarity. 

Q. This is obviously a political show, but it also feels like you were creating the most toxic version of the Sam and Diane dynamic from “Cheers.” 

Herbert originally was a narrative device for the audience to enter this world – a simple country guy who asks, “What is all this?” and “Who are these people? – and he meets everybody, but around page 15 in the pilot, he just faded into the ensemble. 

But I was having trouble making Elena emotionally accessible and the story felt mainly bureaucratic and political. Then I realized he was interesting and had the idea that he might actually have something to say and what he says makes her feel very powerful. 

So just going back to old precepts of how watchable television works, it became a kind of love story like Sam and Diane. There’s a way in which they make themselves feel for little glimpses like the best version of themselves even though it is an incredibly non-traditional and toxic love story.

Q. Elena has a ruthlessness when it comes to holding onto power; she will sacrifice everyone and everything. There are obviously real-life parallels but how do you make the point without making it too on the nose?

We were interested in making a show that had something to say and felt relevant to our world without feeling like a polemic or didactic in any way. Obviously, humor helps with that. And the characters are not emotionally expressive; they’re very presentational and masked, which helps because they would not get on a soapbox and say what they’re thinking about politics because that would not be in their best interest to do so. 

Q. Keplinger, the imprisoned former chancellor, says of Elena that her behavior is born of pain and “you turn their pain to anger and then use it as a cudgel.” But he also says of her, Herbert and their followers that “Broken people love broken people,” which is not so far from Hillary Clinton’s “deplorables” perspective. 

Exactly. Keplinger is a representation of the leftist exasperation, “Why do you people love her and not me?” We were being careful to remember that about the left – he’s certainly the preferable option but he is quite craven and needy and narcissistic in his own specific way. 

Q. Do you feel any empathy for Elena’s cabinet members as they accommodate and appease in ways we’ve seen in real life? 

It’s hard for me to feel that. There’s a story that they tell themselves that they’re doing this for virtuous reasons. But there’s opportunism baked into that feeling of, “I’m going to be the steady hand in there” and sometimes what that means is “I can be that in case this guy gets booted.” They all want to be in pole position. It happens until the moment in which it becomes impossible. And then they’ll do anything to protect themselves. They’ll throw anyone or any idea under the bus to survive. 

I was also inspired a bit by reading about Hitler’s big four cabinet and how even when the Soviets were just days from the bunker and all was lost, there was still a sense they were kind of still positioning themselves, they wanted Papa H to like them the best. 

Q. What did you learn from your days writing for The Onion News and “Last Week Tonight”? Obviously, “Succession” feels like a natural bridge from there to here. 

I think it still stems from The Onion in a way. We were writing these insane, impossible comic stories, but remembering all throughout, even down to the editorial voice style, that it had to have this veneer of verisimilitude. It had to look, sound and feel real, even if what you’re describing is insanity. 

Practically speaking, you also have to do your research to give it the flavor and the structure of how these real-world processes work. And on “Succession” as we’ve seen so many times recently, what would never happen has happened in politics and media and business, so we felt emboldened by that. 

Q. How did you balance the humor with everyone’s outlandish but often brutal behavior and the realism of the geopolitics?

One thing I learned just in my research is just when you think you’ve written something ridiculous and over the top about an authoritarian leader, you read about real-life figures and think, “Boy, maybe we didn’t push it enough.”

Related Articles

Entertainment |


Who is Jeremiah Brent? Meet the new ‘Queer Eye’ design expert following Bobby Berk’s exit

Entertainment |


Wolfgang Van Halen says he’s surprised by quick success

Entertainment |


What to watch: ‘Shogun’ a worthy remake of classic series

Entertainment |


Pop culture-inspired travel is a serious trend in 2024

Entertainment |


‘Mea Culpa’ review: In Tyler Perry’s Chicago, attorney-client privileges include sex and painting lessons

The world of the show is so extreme because the character is so extreme and so powerful and has access to unlimited kinds of material resources – Elena can create her own reality, and then everyone around her has to pretend as though it is reality. To me, that is an inherently funny, absurd, dark situation. 

The comedy is ingrained in the subject matter and the challenge is remembering that there’s real fear and cruelty and pain that comes out of the world that she creates. We have to remember that she’s a dangerous figure and we owe it to ourselves, especially in the world we live in now, to try to make the geopolitics and the consequences of all that feel real and not like a joke. 

Wisconsin Supreme Court rejects Democrats’ congressional redistricting challenge

posted in: Politics | 0

By SCOTT BAUER (Associated Press)

MADISON, Wis. (AP) — The liberal-controlled Wisconsin Supreme Court on Friday rejected a Democratic lawsuit that sought to throw out the battleground state’s congressional maps, marking a victory for Republicans who argued against the court taking up the case.

The decision leaves the state’s current congressional district boundaries in place for the November election.

The decision not to hear the congressional challenge comes after the court in December ordered new legislative maps, saying the Republican-drawn ones were unconstitutional. The GOP-controlled Legislature, out of fear that the court would order maps even more unfavorable to Republicans, passed ones drawn by Democratic Gov. Tony Evers. He signed those into law on Feb. 19 and urged the court to take up the congressional map challenge.

The Elias Law Group, which filed the congressional challenge on behalf of Democratic voters, said the court’s decision on the legislative maps opened the door to them revisiting the other maps.

But the court declined to take up the case. It did not give a reason in the unsigned order.

Justice Janet Protasiewicz did not participate. There was a request for her to recuse, but Protasiewicz said she didn’t participate because she wasn’t on the court when the case was originally brought.

Two of the court’s conservative members, Chief Justice Annette Ziegler and Justice Rebecca Bradley, wrote that although the case was rightfully rejected, “it likely won’t be long until the new majority flexes its political power again to advance a partisan agenda despite the damage inflicted on the independence and integrity of the court.”

The court faced a tight deadline to act in time for the November election. Wisconsin’s elections commission has said district boundaries must be set by mid-March to meet deadlines for elections officials and candidates. Candidates can start circulating nomination papers on April 15 for the Aug. 13 primary.

In the legislative maps ruling, the state Supreme Court said the earlier conservative-controlled court was wrong in 2021 to say that maps drawn that year should have as little change as possible from the maps that were in place at the time. The lawsuit argued that decision warranted replacing the congressional district maps that were drawn under the “least change” requirement.

Six of the state’s eight congressional seats are held by Republicans. In 2010, the year before Republicans redrew the maps, Democrats held five seats compared with three for Republicans.

Only two of the state’s current congressional districts are seen as competitive.

Western Wisconsin’s 3rd District is represented by Republican U.S. Rep. Derrick Van Orden, who won an open seat in 2022 after longtime Democratic Rep. Ron Kind retired.

And southeastern Wisconsin’s 1st District, held by Republican Rep. Bryan Steil since 2019, was made more competitive under the latest maps but still favors Republicans.

Both seats have been targeted by national Democrats.

The current congressional maps in Wisconsin were drawn by Evers and approved by the state Supreme Court. The U.S. Supreme Court in March 2022 declined to block them from taking effect.

Why health care has become a top target for cybercriminals

posted in: Politics | 0

Elise Takahama | (TNS) The Seattle Times

When a cyberattack hit Seattle’s Fred Hutchinson Cancer Center late last year and exposed the personal data of nearly a million patients, many were caught off guard, stunned a breach could infiltrate such a large and highly resourced health care organization.

But those working in computer security weren’t surprised. In recent years, they’ve watched other hospitals and health care facilities across the country get hit by similar attacks, some that have crashed systemwide operations and caused delays in patient procedures or tests, or rerouted ambulances to other emergency rooms.

Cyberattacks of all sorts have plagued large corporations, small businesses and individuals for decades now, but in the past several years, health care has become a top target, according to federal and local cybersecurity experts. These organizations hold a massive amount of patient data — including medical records, financial information, Social Security numbers, names and addresses. They’re also among the few businesses that stay open 24/7, meaning they might be more likely to prioritize avoiding disruptions and, therefore, more likely to pay a hacker’s ransom.

“They’re basically a one-stop shop for an adversary,” said Chris Callahan, chief of cybersecurity for the Northwest region of the federal Cybersecurity and Infrastructure Security Agency, or CISA. The agency, housed in the U.S. Department of Homeland Security, also works to defend against government and election hacking, but recently health care — along with K-12 education and the water supply — has emerged as one of its most urgent priorities, Callahan said.

In December, the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first 10 months of 2023. The department also saw a 93% increase in large, health care-related breaches reported to the agency between 2018 and 2022.

The Cybersecurity and Infrastructure Security Agency has a regional office based in the Henry M. Jackson Federal Building in Seattle. (Ken Lambert/The Seattle Times/TNS)

While fewer data breaches in Washington state were reported to the state Attorney General’s Office last year compared with 2021 and 2022, which both saw a record number of cases, experts say cyberattack numbers are still much higher than they were before the pandemic.

In the past three months, 13 health care-related businesses have detailed large breaches to state Attorney General Bob Ferguson, as is required by Washington law when more than 500 residents have been impacted by a cyberattack.

Attacks against computer systems at Proliance Surgeons and Western Washington Medical Group last February and July, respectively, allowed unauthorized access to the data of hundreds of thousands of patients, the medical groups wrote to Ferguson’s office. Dental insurer Delta Dental, Vancouver-based Hi-School Pharmacy, and California-based vision care provider Medical Eye Services (known as MESVision) were also hit last year, impacting thousands more.

Patients’ health information is worth a lot of money to hackers, said Geetha Thamilarasu, an associate professor of computing and software systems at the University of Washington, Bothell. Once someone gets hold of a stolen medical record, they can buy fake prescriptions, file bogus insurance claims, participate in identity theft and sell it online, among other things, she said.

“There is a huge underground market on the dark web,” said Thamilarasu, who specializes in health care security. “Research shows that if a compromised credit card sells for about $1 to $5 each, a compromised medical record can sell anywhere from $400 to $500 — sometimes even $1,000.”

Once a hacker obtains someone’s personal information, they’ll often try to use it as leverage to extort an organization or victim for money, Callahan said. If that fails, they’ll try to sell it to other organized crime groups that generally have “one objective — to make as much money on your information as fast as possible,” he said.

Risk of being doxxed — when someone, usually with ill intent, posts a victim’s personal information online — has become more common, too, he added. After the Fred Hutch breach, many patients whose data was leaked also received a barrage of email threats and spam messages.

Health care organizations, like many others, have spent the last decade moving toward total digitization, creating some new risks.

“Health records are no longer paper,” Thamilarasu said. “While having digital technologies is often great and provides more convenience, it also opens them up to these security vulnerabilities.”

This not only includes patient records, but also medical devices like X-ray and CT scanning machines, which are now often connected to a network or the internet, Thamilarasu said.

“And if you are connected to the internet, you can be hacked,” she said.

While an X-ray machine itself might not carry any patient data, it can act as an entry point for attackers trying to break into an organization’s broader network. In a health care facility, there could be hundreds of Internet-connected devices, which require different types of security measures not always prioritized, she said.

One cyberattack on health care giant Ardent Health Services last year forced hospitals in New Jersey, Oklahoma, Texas, New Mexico and other states to divert ambulances to other emergency rooms and reschedule some nonemergency procedures while systems were offline.

“I think this is becoming more of a problem in health care than any other institution,” Thamilarasu said. “And with health care, you’re no longer just talking about money and loss of data. … This could potentially endanger human lives.”

Anatomy of a cyberattack

It often starts with a simple email.

Maybe an employee gets a message from a familiar name. They don’t notice the name is slightly misspelled, or recognize it could be a phishing attempt. They open it and click the link.

And just like that, a hacker can gain access to the employee’s credentials and the organization’s entire network system.

“The biggest risk sector is employees,” said Callahan of CISA. “If you don’t have the defenses or the user education and awareness, then it’s a super easy way to get into a system.”

Ransomware threats — when a specific malicious software blocks a victim’s personal data until a ransom is paid — are also on the rise, Callahan said.

In 2022, the Federal Bureau of Investigation recorded about 870 ransomware incidents that hit “critical infrastructure” businesses, like transportation, health care, energy, government and food and agriculture. Of those, almost 25% were attacks against health care and public health organizations, compared with about 22% in 2021.

AI technology has played a “huge role” in more sophisticated hacking attempts, Thamilarasu said.

“Attackers are able to generate all these emails, which no longer appear as (obvious) phishing emails,” she said. “Nowadays, they look so genuine and authentic.”

Cybersecurity can be an afterthought for many health care systems because they’re primarily focused on patient care, Callahan said.

Those who manufacture medical devices should also make sure their products are secure, Thamilarasu added.

“We all get that health care systems are one of the most overworked organizations,” she said. “And security is not the priority. Patients are the priority. So I think a lot of these staff and health care providers do not understand the level of damage somebody can cause.”

Push toward cyber safety

Recent cyberattacks have sparked a renewed push among many health care organizations to bolster protections.

Washington state’s Moses Lake Community Health Center, which was targeted last year, is in the middle of several cybersecurity improvements.

“We believe (cybersecurity) is not a destination, but a continuous improvement process,” said Mark Lauteren, the health center’s chief information officer, who joined after the breach. “The bad actors are always changing their environment and their attack methods, so if we put something up and say ‘Done,’ guaranteed, they’ll find a way around it within a few weeks.”

Lauteren declined to discuss the breach, which leaked data of about 1,200 people, but noted that cybersecurity is “not a new priority.” The Moses Lake center has since teamed up with CISA, which offers free, weekly cybersecurity scans to organizations that look for potential vulnerabilities in their system and offer recommendations. CISA officers also run through “tabletop” exercises that mimic real cyberattacks, hoping to prepare organizations in case one occurs.

During these exercises, experts walk organization leadership and IT teams through a dry run of a breach, prompting them with questions. How might they respond? Are they going to pay the ransom? How are they going to start rebuilding their systems afterward?

“We (all) need to be better at protecting ourselves,” Lauteren said.

Since the Fred Hutch breach last fall, an organization spokesperson said it has implemented “additional defensive tools and increased monitoring,” but declined to elaborate on what those entail.

At UW Medicine, whose data was also impacted during the Fred Hutch cyberattack, “we continuously strengthen our cybersecurity measures and actively adapt our strategies to address evolving cyber threats,” hospital spokesperson Susan Gregg said in a statement.

The Washington State Hospital Association has started to hold regular cybersafety sessions for its members, though organization spokesperson Beth Zborowski said she was hesitant to describe specifics to avoid sharing strategies with hackers and prevent any individual hospitals from becoming a target.

“We are paying attention to this. We take people’s health information seriously,” Zborowski said. “If you ask hospital CEOs what keeps them up at night, this would be one of the things.”

Catching a cybercriminal

Falling for a cyber scam can happen in seconds. But it sometimes takes years for an investigation to unfold.

Fred Hutch, for example, is still working on confirming details around its recent breach, though the organization believes hackers overseas “exploited a vulnerability” in a workspace software called Citrix that allowed them to gain access to its clinical network.

The weakness, known as the “Citrix Bleed,” has gained attention from federal cybersecurity teams, who say it allows attackers to bypass password requirements and multifactor authentication measures.

In several other cyberattacks in Washington and throughout the country, investigators found hackers targeted a file-transfer tool called MOVEit, a software application used to exchange data. According to TechCrunch, a group of hackers found a weakness in the software that allowed them to install a backdoor and steal data.

Cybercrime investigations can be complicated, especially if hackers are working from a different country that may not want to work with the U.S., said Kevin Brennan, a supervisory special agent with FBI Seattle’s cyber task force.

“Some of it is going to be through more traditional investigative techniques,” Brennan said. “You know, follow the money — or in this case, cryptocurrency.”

The FBI encourages against paying ransoms because it doesn’t guarantee hackers will delete or stop sharing people’s data, but if companies choose to, the agency also tracks online communications between victims and hackers, searching for small details that might illuminate where a suspect is. It’s becoming much less common for victims to pay ransoms, Brennan said, but the practice still happens; the FBI doesn’t collect data on how frequently ransoms are paid.

Once officers identify a suspect overseas, they have a couple of options, Brennan said. If the FBI is working with a country whose laws don’t require them to arrest someone based on an alleged crime they committed in the U.S., agents might look for potential crimes the suspect committed in that country, he said.

In other cases, agents might have to wait for the suspect to travel somewhere that will extradite them to the U.S.

FBI Seattle doesn’t generally track “success” rates for closing cybercrime cases, but Brennan noted various challenges involved when working with international law enforcement. It can also be hard to report an accurate number of closed cases because sometimes cybercriminals are only charged with one breach when law enforcement officials might know or suspect they’re involved with many more, he added.

“It can be a waiting game at times,” Brennan said. “It can be frustrating, both for us and the victims. But it’s not something we’re going to give up on just because they’re hiding in a country that might not cooperate with the U.S.”

Staying safer online

As our collective reliance on technology grows, it can be easy to panic about further opening ourselves up to hacking and data leaks, experts said. But they noted there’s also a lot we can do to limit risk.

Health care organizations are “basically a one-stop shop for an adversary,” said Chris Callahan, chief of cybersecurity for the Northwest region of the federal Cybersecurity and Infrastructure Security Agency. (Ken Lambert/The Seattle Times/TNS)

Cybersecurity experts have a list of tips about how to stay safe online, which can be found at CISA website StopRansomware.gov. HHS has also created a health care-specific tool kit, which includes information about how health care systems can mitigate known vulnerabilities, bolster email security, enable multifactor authentication, deploy strong encryption and roll out basic cybersecurity training.

“You don’t want to call us in your darkest hour,” Callahan said. Institutions “want to make sure you know who your local FBI or CISA contact is. There’s all kinds of things we can do to help protect yourselves before an attack.”

According to CISA, some of the most simple changes to boost individual cybersecurity include:

—Recognizing and reporting phishing

—Using strong passwords

—Turning on multifactor authentication

—Updating software

If you think you’ve been targeted by a hacker, you can also report the incident to the FBI website ic3.gov, which is open to the public.

“I take some comfort in knowing that, as sad as it sounds, so much personally identifiable information has been stolen, the odds of any individual person being a victim is not very high,” said Brennan of FBI Seattle. “We all drive down the highway at 70 miles an hour and think, ‘I’m not going to be the one that gets into an accident.’ And odds are we’re not.”

___

(c)2024 The Seattle Times. Visit The Seattle Times at www.seattletimes.com. Distributed by Tribune Content Agency, LLC.

Forest Lake officials opt for expedited search for city administrator

posted in: News | 0

Forest Lake City Council members are moving forward with an expedited search for the next city administrator — and interim city administrator Kristina Handt is at the top of their list of candidates.

Handt, in fact, is the only candidate currently under consideration.

Kristina Handt (Courtesy photo)

Handt, the former Lake Elmo city administrator, was hired in mid-January after the Forest Lake City Council voted unanimously to terminate former city administrator Patrick Casey’s employment contract and hire her as interim administrator and interim clerk. The vote came after a closed session to discuss Casey’s annual performance evaluation.

Handt is currently searching for a permanent city administrator position and has been presented with “a few opportunities … that have timelines … that would be in conflict with running through the standard executive search,” City Attorney Amanda Johnson told the council on Monday night.

Council members decided Monday to pause the general search process and proceed with an expedited review of Handt, Johnson said.

“The components of the process are the same as the general process would be,” she said. “This includes a background check, reference review, personality assessment and interviews.”

Handt’s interview with the council and a community stakeholder panel will be on March 14 and will be open to the public.

The council is expected to hold a special meeting on March 18 to vote on Handt’s possible hiring for the permanent position.

If the council does not vote to move forward with Handt, officials with DDA Human Resources will proceed “with the full-scope executive search as originally planned,” Mayor Mara Bain said.

“Our goal for Forest Lake is to consider as many candidates as possible,” Bain said. “Because of the timing of other municipalities’ searches for city administrator, this expedited timing is the only possible way to consider Kristina for the Forest Lake position.”

Related Articles

Local News |


Lake Elmo attorney suspended for misleading statement in custody case

Local News |


Lake Elmo Airport working on decreasing noise complaints with preventative measures

Local News |


Woodbury grad party shooting: Gunman who fired shot that killed boy, 14, pleads guilty to unintentional murder

Local News |


Now open in Stillwater: Mike and Kat’s Other Place, a cozy espresso bar

Local News |


There’s only one place to score ‘Fargo’-themed Bisquick boxes. In Scandia, of course.