Cyber Crime (18)

Use of digital resources to support criminal acts and/or terrorism

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • 8 min
  • Kinolab
  • 2011
image description
Digital News Media and the Pressures of Public Demand

In this episode, a princess is kidnapped, and the condition of her release is that the prime minister, Michael Callow, is forced to have sexual intercourse with a pig on live television. While the news media originally wants to keep this incident quiet, digital reporting from other news companies in the US eventually forces the UKN to start a conversation about this event. After an attempt at using deep fake to make the deed appear done, the prime minister is quickly slandered on social media, and public opinion on him and if he should carry out the act shifts rapidly online. With this quick change in mood, the prime minister ultimately fulfills the request in full view of the entire world over the news.

  • Kinolab
  • 2011
  • 9 min
  • Kinolab
  • 2015
image description
Vulnerability of Workplaces and Economic Markets to Hacking

After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.

  • Kinolab
  • 2015
  • 5 min
  • The Atlantic
  • 2019
image description
This is Exactly What Privacy Experts Said Would Happen

U.S. Customs and Border Protection announces that hackers have stolen license-plate images and traveler’s ID photos from a subcontractor, which provides deeper insight to the dangers of big data held by government.

  • The Atlantic
  • 2019
  • 15 min
  • MIT Tech Review
  • 2019
image description
Triton is the world’s most murderous malware, and it’s spreading

An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.

  • MIT Tech Review
  • 2019
  • 7 min
  • Wall Street Journal
  • 2019
image description
U.S. Companies Learn to Defend Themselves in Cyberspace

Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.

  • Wall Street Journal
  • 2019
  • 3 min
  • CNET
  • 2019
image description
Thanks to Equifax breach, 4 US agencies don’t properly verify your data, GAO finds

US Government agencies rely on outdated verification methods, increasing the risk of identify theft.

  • CNET
  • 2019
Load more