Use of digital resources to support criminal acts and/or terrorism
Cyber Crime (26)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 10 min
- Kinolab
- 2016
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
- Kinolab
- 2016
Cyber Blackmailing and Compromising Data
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
Is anyone truly “alone” or “unwatched” when in the presence of their mobile computing devices? Whose responsibility is it to guard people against the dangers witnessed in this narrative? Do digital technologies need clearer and more thorough warnings about the possibilities of malware infecting a device? How can mobile computing devices and location tracking be manipulated to deprive people of autonomy? Are small individual steps such as covering up cameras enough to guard against these types of problems?
-
- 15 min
- MIT Tech Review
- 2019
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
- MIT Tech Review
- 2019
-
- 15 min
- MIT Tech Review
- 2019
Triton is the world’s most murderous malware, and it’s spreading
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
Is the grand increase in industrial convenience and productivity worth the increased risk for cyber attacks? In what ways can using an internet of things to control certain systems increase and decrease workplace safety, especially in more volatile settings?
-
- 8 min
- Kinolab
- 2011
In this episode, a princess is kidnapped, and the condition of her release is that the prime minister, Michael Callow, is forced to have sexual intercourse with a pig on live television. While the news media originally wants to keep this incident quiet, digital reporting from other news companies in the US eventually forces the UKN to start a conversation about this event. After an attempt at using deep fake to make the deed appear done, the prime minister is quickly slandered on social media, and public opinion on him and if he should carry out the act shifts rapidly online. With this quick change in mood, the prime minister ultimately fulfills the request in full view of the entire world over the news.
- Kinolab
- 2011
Digital News Media and the Pressures of Public Demand
In this episode, a princess is kidnapped, and the condition of her release is that the prime minister, Michael Callow, is forced to have sexual intercourse with a pig on live television. While the news media originally wants to keep this incident quiet, digital reporting from other news companies in the US eventually forces the UKN to start a conversation about this event. After an attempt at using deep fake to make the deed appear done, the prime minister is quickly slandered on social media, and public opinion on him and if he should carry out the act shifts rapidly online. With this quick change in mood, the prime minister ultimately fulfills the request in full view of the entire world over the news.
Is “hive mind mentality” something unique to digital media? How might these platforms exacerbate this tendency? Is this an inevitable consequence of digital social networks, or could they be designed differently? How can digital media channels disrupt and shape the course of power figures, for better and for worse?
-
- 9 min
- Kinolab
- 2015
After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.
- Kinolab
- 2015
Vulnerability of Workplaces and Economic Markets to Hacking
After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.
What are the alternatives to keeping workplace safety operations in the hands of digital technologies and internets of things? What are the alternatives to keeping economic markets in the hands of digital technologies? Could total safety from hacking ever be achieved? Could hacking potentially be a force for good if digital economic markets become too centralized? Are there any real life scenarios of digital hacking being used to disrupt large economic markets?
-
- 4 min
- Kinolab
- 1982
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
- Kinolab
- 1982
Artificial Intelligence as Servants to Humans
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
How can we program AI to perform tasks remotely for us? How can AI be used to remotely hack into public or private systems? Does every program designed to complete a task, even programs such as malware, have a life of its own? What are potential consequences to training AI solely to do the bidding of humans?
-
- 5 min
- The Atlantic
- 2019
U.S. Customs and Border Protection announces that hackers have stolen license-plate images and traveler’s ID photos from a subcontractor, which provides deeper insight to the dangers of big data held by government.
- The Atlantic
- 2019
-
- 5 min
- The Atlantic
- 2019
This is Exactly What Privacy Experts Said Would Happen
U.S. Customs and Border Protection announces that hackers have stolen license-plate images and traveler’s ID photos from a subcontractor, which provides deeper insight to the dangers of big data held by government.
Should we hold the government accountable for leaks in data protection? How should the affected individuals be compensated? Does the possibility of catching those accused of a certain crime or overstaying a visa justify the breach of privacy and surveillance of unsuspecting and unsuspicious people?