Catalog Search Results
Language
English
Description
With such widespread access to the Internet, how vulnerable to online sabotage are banks, government agencies, nuclear plants, utilities, and hospitals? This program examines the Internet's exponential growth and evaluates risks posed by groups and individuals bent on crime or terrorism. Experts from the FBI, the Pentagon, and private companies, and even a self-confessed hacker comment on the danger of online fraud and "denial of service" attacks...
Language
English
Description
There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with "white-hat" hackers, who guard your online security. But their opponents, the "black-hat" hackers, have an interest in an unsecure internet, and sell security leaks to the highest bidder. They are the...
Language
English
Description
The term once suggested a lone troublemaker in search of attention and self-enrichment, but today, "hacker" might also mean a covert foot soldier in the service of his or her country - put to work in top-secret quarters and backed by budgets that exceed hundreds of millions of dollars. This film looks at the kind of combat for which skilled hackers are recruited and which they often pursue with every bit of energy and resourcefulness asked of more...
Language
English
Description
Piracy is having significant financial impacts on the music, video game, and software industries. Piracy is also affecting the type of music that is being produced and limiting the amount of software available to the public. This program looks at Internet piracy, covering use of copyrighted information, software copyright law, the facts and figures surrounding piracy, and respect of intellectual property. Industry professionals and musicians alike...
Language
English
Description
With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the Australian Web site Seek serving as a case study. Seek's security...
Language
English
Description
This film explores the murky and fast-paced world of hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them. Horizon meets the two men who uncovered the world's first cyber weapon, the pioneers of what is called ultra paranoid computing, and the computer expert who worked out how to hack into cash machines.
7) Surveillance
Language
English
Description
In 2013 Edward Snowden revealed to the world the systematic surveillance of global internet traffic by the US and the UK. What he revealed was simply spectacular. Ben Hammersley travels to Washington DC, New York, London and Berlin to examine the ramifications of Snowden's NSA files. Do our governments need these powers to protect us from terrorism, pedophilia and cyber criminality? Or should we fight for the right to privacy online?
Language
English
Description
Most companies spend more money on coffee than they do on security, says Ralph Echemendia, lead instructor at Chicago's Hacker Academy. As this program demonstrates, such flagrant corporate carelessness is a gold mine for digital criminals. With disturbing insight into the hacker underworld, the program shows how crippling database invasions can be launched from almost any computer, grabbing massive chunks of personal information seemingly out of...
Language
English
Description
Fueled by the fastest and most pervasive Internet connections on Earth, online gaming is now a national obsession in South Korea. But while millions of people are engrossed in virtual warfare, their computers have also become very real battlegrounds, with North Korea launching Web-based assaults that disable banking, transport, and Internet portals in the south. After a discussion of gaming addiction in South Korea, this program talks with key defectors...
10) Securing the web
Language
English
Description
The consequences of lax Internet security are severe! Use Securing the Web to awaken your students to the very real dangers posed by online security threats. In this video, a couldn't-care-less computer user is transported into his PC where he learns firsthand about phishing and pharming, spyware and adware, viruses and Trojans, and denial-of-service attacks and zombie networks. Weapons in the security arsenal-firewalls, antivirus software, software...
Language
English
Description
Judee Sibbitt's company, AmberSAFE, uses GPS bracelets to track the whereabouts of children and seniors. In this program, Sue Abu-Hakima, co-founder and CEO of a wireless emergency notification system for schools and government agencies called Amika Mobile Corporation, and Peter Martin, a crisis management and risk assessment expert whose firm, AFI International Group, provides security for people and property, evaluate the AmberSAFE start-up. The...
Language
English
Description
The tools required to fight Internet-based offenses must constantly evolve and adapt. Unfortunately, so do the criminals. This program examines several forms of cyber-crime and their impact on law enforcement, national security, the corporate world, and society at large. Taking a global approach, the film presents interviews with American and European experts on cyber-terrorism, identity theft, child pornography, and other disturbing crimes. Frank...
Language
English
Description
The secret gathering of intelligence has been practiced for thousands of years and spies have proven to be highly inventive. Over the last 100 years methods of spying have become much more technologically sophisticated and invasive. From the days of code cracking early computers to modern satellite reconnaissance, has the line between legitimate surveillance and police state tactics become blurred?
Language
English
Description
Compact and portable, digitized information is an attractive alternative to bulky books, analog media, and emulsion-based photographs-but can it stand the test of time? In this program, Stewart Brand, co-inventor of the TCP/IP Internet protocol, and others in the know assess the rapid proliferation of digitization; confront the alarming risk of massive data loss through technology obsolescence, platform incompatibilities, and storage media degradation;...
Language
English
Description
In today's information-starved and fear-driven society, surveillance technology seems to be deployed almost everywhere-and a surveillance mind-set is just as ubiquitous. This program introduces students to the concept of a "surveillance society" and shows how cutting-edge tools are being developed to identify, monitor, and track both people and objects. Viewers are empowered to explore the central paradox of surveillance technology-specifically, that...
Language
English
Description
When the next terrorist attack occurs, will it be by air strike or keystroke? This program reveals the vulnerability of the internet backbone to paralyzing hack attacks and measures being taken to close some of the many holes in the net. After discussing the open nature of online communications and how attacks via landline are conducted, security consultants demonstrate the ease with which cyberterrorists can breach wireless networks by "war driving."...
Language
English
Description
Nanotechnology will likely transform the security and surveillance industries in the near future. Governments, corporations, and even individuals may have highly sophisticated sensors and tracking apparatus at their disposal - keeping tabs on everyone from customers to potential terrorists to aging parents. In this Fred Friendly Seminar moderated by Peabody award-winning correspondent John Hockenberry, hypothetical situations are used to highlight...
Language
English
Description
As America's military involvement in Iraq and Afghanistan winds down, many drones are coming home for use in border protection and municipal law enforcement. But domestic drone deployment is proliferating in other ways, too-in fact, anyone with a few hundred dollars can buy a sophisticated, unmanned aerial vehicle over the counter. Some operators are defying the law and flying their drones for commercial purposes-be they journalists following a story,...
Language
English
Description
Americans have grown used to being watched at ATMs, in lobbies, and even while driving. Now they are being tracked by satellite if they rent a car or make a cellular phone call and timed if they use an electronic pass to pay a toll. In this program, ABC News anchor Ted Koppel and correspondent John Donvan survey the increasing intrusion-real or perceived-of technology into Americans' privacy. In order to look at the issue from two sides, Koppel is...