Use of digital resources to support criminal acts and/or terrorism
Cyber Crime (18)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 2 min
- Kinolab
- 1990
With his homing signal activated, the android Data takes control of the USS Enterprise and its systems and blocks the human crew from stopping him. For further reading, see the narrative Triton is the world’s most murderous malware, and it’s spreading.
- Kinolab
- 1990
Data Takes Over: Robots and Humans in the Workplace
With his homing signal activated, the android Data takes control of the USS Enterprise and its systems and blocks the human crew from stopping him. For further reading, see the narrative Triton is the world’s most murderous malware, and it’s spreading.
What dangers can AI cause within institutions and systems, if it becomes remotely hijacked? Should AI ever be allowed to develop in such a way that they can block out human autonomy over a certain system?
-
- 4 min
- Kinolab
- 1982
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
- Kinolab
- 1982
Artificial Intelligence as Servants to Humans
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
How can we program AI to perform tasks remotely for us? How can AI be used to remotely hack into public or private systems? Does every program designed to complete a task, even programs such as malware, have a life of its own? What are potential consequences to training AI solely to do the bidding of humans?
-
- 5 min
- Kinolab
- 1993
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
- Kinolab
- 1993
Systems Errors in Entertainment Areas
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
How can workplaces be protected against hacks from someone who works within said workplace? Should safety systems be under the control of a small number of people or computers? Should volatile environments, such as nuclear power plants or dinosaur parks, be trusted with a security system involving a hackable internet of things? What are the alternatives? Is convenience worth the cost in this case?
-
- 11 min
- Kinolab
- 2017
Museum curator Rolo shows off the exhibition of Clayton, a former death row inmate whose consciousness became digital during one of Rolo’s experiments. Despite evidence of his innocence, Clayton was put to death, and his digitally immortal consciousness was subjected to torture inside Rolo’s museum, with guests being able to simulate the electric chair shock on the holographic Clayton and eventually putting him in a conscious but vegetative state. Clayton’s daughter Nish shows up to settle the score, trapping Rolo in an eternal state of torture in a small digital device.
- Kinolab
- 2017
Technological Tortures and Traps
Museum curator Rolo shows off the exhibition of Clayton, a former death row inmate whose consciousness became digital during one of Rolo’s experiments. Despite evidence of his innocence, Clayton was put to death, and his digitally immortal consciousness was subjected to torture inside Rolo’s museum, with guests being able to simulate the electric chair shock on the holographic Clayton and eventually putting him in a conscious but vegetative state. Clayton’s daughter Nish shows up to settle the score, trapping Rolo in an eternal state of torture in a small digital device.
How can one protect their digital consciousness after they pass away? Can anyone ever be fully trusted to handle codes or programs that represent someone else’s existence or consciousness? How does the existence of racial bias and violence make the concept of eternal digital consciousnesses far more harrowing?
-
- 11 min
- Kinolab
- 2016
Detectives Karin Parke and Blue Coulson work together to put an end to the series of mysterious murders perpetrated by the #DeathTo trend on social media. In this “Game of Consequences,” the person most mentioned under this hashtag each day becomes the target of ADIs, government drones shaped like bees, to track down and kill. This trend was spurred by bots on social media, drawing many people into participation, and a sole hacker was responsible both for the bots and for the abuse of the drones. After the detectives fail to protect one victim of the #DeathTo trend, they attempt to shut down the malware, but instead discover a large data mine and unleash a much more massive danger.
- Kinolab
- 2016
Hacked Drones and Targeting Citizens
Detectives Karin Parke and Blue Coulson work together to put an end to the series of mysterious murders perpetrated by the #DeathTo trend on social media. In this “Game of Consequences,” the person most mentioned under this hashtag each day becomes the target of ADIs, government drones shaped like bees, to track down and kill. This trend was spurred by bots on social media, drawing many people into participation, and a sole hacker was responsible both for the bots and for the abuse of the drones. After the detectives fail to protect one victim of the #DeathTo trend, they attempt to shut down the malware, but instead discover a large data mine and unleash a much more massive danger.
Can the “unreal” nature of digital platform ever truly remove harmful intent from inflammatory words or statements? How should “free speech” be regulated on platforms where not everything can be taken literally? How can the information available about a person through their social media use be abused to make them targets? Should the government use cutting-edge digital technology if there is even the slightest chance that it can be abused? Are there requisite consequences to showing a lack of empathy toward others on digital platforms?
-
- 10 min
- Kinolab
- 2016
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
- Kinolab
- 2016
Cyber Blackmailing and Compromising Data
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
Is anyone truly “alone” or “unwatched” when in the presence of their mobile computing devices? Whose responsibility is it to guard people against the dangers witnessed in this narrative? Do digital technologies need clearer and more thorough warnings about the possibilities of malware infecting a device? How can mobile computing devices and location tracking be manipulated to deprive people of autonomy? Are small individual steps such as covering up cameras enough to guard against these types of problems?