Malware (11)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 10 min
- Kinolab
- 2016
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
- Kinolab
- 2016
Cyber Blackmailing and Compromising Data
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
Is anyone truly “alone” or “unwatched” when in the presence of their mobile computing devices? Whose responsibility is it to guard people against the dangers witnessed in this narrative? Do digital technologies need clearer and more thorough warnings about the possibilities of malware infecting a device? How can mobile computing devices and location tracking be manipulated to deprive people of autonomy? Are small individual steps such as covering up cameras enough to guard against these types of problems?
-
- 16 min
- Kinolab
- 2003
In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.
- Kinolab
- 2003
Technological Regulation of the Environment and Division
In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.
How can it be ensured that technology built with the aim to reverse climate change or otherwise aid the environment helps all people, and not just certain higher classes? How can governments or leaders support “Robin Hood” hackers who disrupt technology for a greater good? Who is responsible for bridging digital divides and bringing technological equality to disadvantaged communities, and how should this be approached? How should technology be created to be accessible to all communities?
-
- 5 min
- Kinolab
- 1993
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
- Kinolab
- 1993
Systems Errors in Entertainment Areas
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
How can workplaces be protected against hacks from someone who works within said workplace? Should safety systems be under the control of a small number of people or computers? Should volatile environments, such as nuclear power plants or dinosaur parks, be trusted with a security system involving a hackable internet of things? What are the alternatives? Is convenience worth the cost in this case?
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Cyberspace and Internet Imaginations: “Burning Chrome” by William Gibson
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
How can malware be used for good, and when should it be used for good? How do imaginations of the internet influence how people perceive this mysterious yet pervasive network? In what ways would making aspects of the internet into tangible images help people understand it better? How should the most powerful stakeholders in a given digital architecture be challenged? How might immersion into cyberspace give people more agency?
- Wired
- 2021
Following the January 6th capital riots, there have been many ongoing investigations into right-wing extremists groups. pioneering these investigations are left-leaning hacktivists, determined to expose hate speech and abuse in private conversations.
- Wired
- 2021
- Wired
- 2021
Far-Right Platform Gab Has Been Hacked—Including Private Data
Following the January 6th capital riots, there have been many ongoing investigations into right-wing extremists groups. pioneering these investigations are left-leaning hacktivists, determined to expose hate speech and abuse in private conversations.
Where do we draw the line in content moderation decision-making between allowing a feed of fake information and making sure we are not denying access to real news?