Security and Encryption (20)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 16 min
- Kinolab
- 2003
In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.
- Kinolab
- 2003
Technological Regulation of the Environment and Division
In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.
How can it be ensured that technology built with the aim to reverse climate change or otherwise aid the environment helps all people, and not just certain higher classes? How can governments or leaders support “Robin Hood” hackers who disrupt technology for a greater good? Who is responsible for bridging digital divides and bringing technological equality to disadvantaged communities, and how should this be approached? How should technology be created to be accessible to all communities?
-
- 14 min
- Kinolab
- 2014
In the midst of World War II, mathematics prodigy Alan Turing is hired by the British government to help decode Enigma, the code used by Germans in their encrypted messages. Turing builds an expensive machine meant to help decipher the code in a mathematical manner, but the lack of speedy results incites the anger of his fellow coders and the British government. After later being arrested for public indecency, Turing discusses with the officer the basis for the modern “Turing Test,” or how to tell if one is interacting with a human or a machine. Turing argues that although machines think differently than humans, it should still be considered a form of thinking. His work displayed in this film became a basis of the modern computer.
- Kinolab
- 2014
Decryption and Machine Thinking
In the midst of World War II, mathematics prodigy Alan Turing is hired by the British government to help decode Enigma, the code used by Germans in their encrypted messages. Turing builds an expensive machine meant to help decipher the code in a mathematical manner, but the lack of speedy results incites the anger of his fellow coders and the British government. After later being arrested for public indecency, Turing discusses with the officer the basis for the modern “Turing Test,” or how to tell if one is interacting with a human or a machine. Turing argues that although machines think differently than humans, it should still be considered a form of thinking. His work displayed in this film became a basis of the modern computer.
How did codebreaking help launch computers? What was Alan Turing’s impact on computing, and on the outcome of WW2? How can digital technologies be used to turn the tides for the better in a war? Are computers in our age too advanced for codes to be secret for long, and is this a positive or a negative? How do machines think? Should a machines intelligence be judged by the same standards as human intelligence?
-
- 10 min
- Kinolab
- 2016
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
- Kinolab
- 2016
Cyber Blackmailing and Compromising Data
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
Is anyone truly “alone” or “unwatched” when in the presence of their mobile computing devices? Whose responsibility is it to guard people against the dangers witnessed in this narrative? Do digital technologies need clearer and more thorough warnings about the possibilities of malware infecting a device? How can mobile computing devices and location tracking be manipulated to deprive people of autonomy? Are small individual steps such as covering up cameras enough to guard against these types of problems?
-
- 9 min
- Kinolab
- 2015
After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.
- Kinolab
- 2015
Vulnerability of Workplaces and Economic Markets to Hacking
After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.
What are the alternatives to keeping workplace safety operations in the hands of digital technologies and internets of things? What are the alternatives to keeping economic markets in the hands of digital technologies? Could total safety from hacking ever be achieved? Could hacking potentially be a force for good if digital economic markets become too centralized? Are there any real life scenarios of digital hacking being used to disrupt large economic markets?
-
- 7 min
- Wall Street Journal
- 2019
Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.
- Wall Street Journal
- 2019
-
- 7 min
- Wall Street Journal
- 2019
U.S. Companies Learn to Defend Themselves in Cyberspace
Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.
How might small businesses fit into this picture? How could cyber security development be more oriented toward the public good? How can tech corporations help the government in a age which seems to be tending toward digital mutually assured destruction?
-
- 3 min
- CNET
- 2019
US Government agencies rely on outdated verification methods, increasing the risk of identify theft.
- CNET
- 2019
-
- 3 min
- CNET
- 2019
Thanks to Equifax breach, 4 US agencies don’t properly verify your data, GAO finds
US Government agencies rely on outdated verification methods, increasing the risk of identify theft.
If the government does not ensure our cyber security, then who does? Can any digital method for identity verification be completely safe, especially given how much of our personal data lives in the digital world?