Security and Encryption (20)

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • 16 min
  • Kinolab
  • 2003
image description
Technological Regulation of the Environment and Division

In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.

  • Kinolab
  • 2003
  • 14 min
  • Kinolab
  • 2014
image description
Decryption and Machine Thinking

In the midst of World War II, mathematics prodigy Alan Turing is hired by the British government to help decode Enigma, the code used by Germans in their encrypted messages. Turing builds an expensive machine meant to help decipher the code in a mathematical manner, but the lack of speedy results incites the anger of his fellow coders and the British government. After later being arrested for public indecency, Turing discusses with the officer the basis for the modern “Turing Test,” or how to tell if one is interacting with a human or a machine. Turing argues that although machines think differently than humans, it should still be considered a form of thinking. His work displayed in this film became a basis of the modern computer.

  • Kinolab
  • 2014
  • 10 min
  • Kinolab
  • 2016
image description
Cyber Blackmailing and Compromising Data

In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.

  • Kinolab
  • 2016
  • 9 min
  • Kinolab
  • 2015
image description
Vulnerability of Workplaces and Economic Markets to Hacking

After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.

  • Kinolab
  • 2015
  • 7 min
  • Wall Street Journal
  • 2019
image description
U.S. Companies Learn to Defend Themselves in Cyberspace

Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.

  • Wall Street Journal
  • 2019
  • 3 min
  • CNET
  • 2019
image description
Thanks to Equifax breach, 4 US agencies don’t properly verify your data, GAO finds

US Government agencies rely on outdated verification methods, increasing the risk of identify theft.

  • CNET
  • 2019
Load more