Cyber Crime (26)

Use of digital resources to support criminal acts and/or terrorism

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • 10 min
  • Kinolab
  • 2016
image description
Cyber Blackmailing and Compromising Data

In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.

  • Kinolab
  • 2016
  • 15 min
  • MIT Tech Review
  • 2019
image description
Triton is the world’s most murderous malware, and it’s spreading

An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.

  • MIT Tech Review
  • 2019
  • 8 min
  • Kinolab
  • 2011
image description
Digital News Media and the Pressures of Public Demand

In this episode, a princess is kidnapped, and the condition of her release is that the prime minister, Michael Callow, is forced to have sexual intercourse with a pig on live television. While the news media originally wants to keep this incident quiet, digital reporting from other news companies in the US eventually forces the UKN to start a conversation about this event. After an attempt at using deep fake to make the deed appear done, the prime minister is quickly slandered on social media, and public opinion on him and if he should carry out the act shifts rapidly online. With this quick change in mood, the prime minister ultimately fulfills the request in full view of the entire world over the news.

  • Kinolab
  • 2011
  • 9 min
  • Kinolab
  • 2015
image description
Vulnerability of Workplaces and Economic Markets to Hacking

After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.

  • Kinolab
  • 2015
  • 4 min
  • Kinolab
  • 1982
image description
Artificial Intelligence as Servants to Humans

Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.

  • Kinolab
  • 1982
  • 5 min
  • The Atlantic
  • 2019
image description
This is Exactly What Privacy Experts Said Would Happen

U.S. Customs and Border Protection announces that hackers have stolen license-plate images and traveler’s ID photos from a subcontractor, which provides deeper insight to the dangers of big data held by government.

  • The Atlantic
  • 2019
Load more