Catalog Search Results
Sometimes the Truth is Stranger than Fiction
(Adults)
Wednesdays; Jan. 10, Feb. 14, Mar. 13, Apr. 10, May 8; 7 p.m. at John and Judy Gay Library (JJGL)
See Also:
Wednesdays; Jan. 3, Feb. 7, Mar. 6, Apr. 3, May 1; 12 p.m. at Hall
Sundays; Jan. 21, Feb. 18, Mar. 17, Apr. 21, May 19; 2 p.m. at JJGL
Pub. Date
[2017]
Language
English
Description
In this episode, Frankie Bridge meets up-and-coming TV star Zahida Allen who was immediately targeted by trolls when she shot to fame on Geordie Shore. While looking at the sheer volume of trolling she has endured, they notice one particularly aggressive troll who Zahida decides she’d like to confront. As the team search for Zahida’s troll, Frankie meets double gold-medal winning Olympic Swimming Superstar Rebecca Adlington, who despite being...
Series
Pub. Date
[2013], c2002
Language
English
Description
In the 21st century, "we are all becoming visible...in that other, parallel world of electronic records, databases, video films, and computer memories," says Professor David Canter. "Criminals who would've been hidden in the past are also becoming visible in this virtual world-provided we know how to look for them." In this program, Canter addresses the use of data mining to track the virtual and real-world movements of criminals. Case studies include...
Pub. Date
[2016]
Language
English
Description
What if there were "countries" the size of the average suburban household? What if they had their own rules, laws, and currencies? What if one of them almost brought the entire Internet to its knees? They're called data havens, and they are the Switzerlands of the Internet: bunkers, caves, and sea fortresses, offering cybercriminals and freedom fighters alike the privacy to conduct unregulated information exchanges, malware attacks, spam dumps, ransomware...
Pub. Date
[2015]
Language
English
Description
Thanks in part to the documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield - cyberspace. NOVA examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race.
Pub. Date
[2012], c2009
Language
English
Description
Quantum cryptography has been threatening to take over our security networks for a few years now. This video segment explores a newly discovered possible solution: diamonds. How could this precious stone be the key to protecting all your electronic data?
Pub. Date
[2012], c2011
Language
English
Description
We'd like to think they're invincible, but America's power stations, water supplies, financial systems, and military communications are all vulnerable to attack. And the most pressing threat isn't from bombs or other physical dangers-it's from computer hacking. What can be done to protect our infrastructure and prevent a devastating digital assault? To find out, this CNBC Original documentary goes to the frontlines of the war on cybercrime and cyber-terrorism....
7) Brainy Bees
Pub. Date
[2012], c2009
Language
English
Description
Reacting quickly in an emergency depends increasingly on security cameras to recognize faces. We have special regions of the brain dedicated to the task of face recognition and constantly do it without effort or a second thought. But for computers and security systems it's more difficult. In this video clip, hear from scientists who are studying the way bees see and process the world in an attempt to improve surveillance technology.
Series
Pub. Date
[2014]
Language
English
Description
The year 2013 was very bad for big business. In February $45 million was stolen from ATMs around the world after cyber criminals hacked credit cards and gave them unlimited withdrawal limits. Then, in November, 40 million credit card numbers were removed from the point-of-sale terminals of U.S. retailer Target. Ben Hammersley travels to New York and Washington D.C. to look at how crime has evolved, forensically examining the many ranks and roles of...
Pub. Date
[2014]
Language
English
Description
There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with "white-hat" hackers, who guard your online security. But their opponents, the "black-hat" hackers, have an interest in an unsecure internet, and sell security leaks to the highest bidder. They are the...
Pub. Date
[2017]
Language
English
Appears on list
Description
This film investigates one of the world’s biggest and most audacious cyberheists where hackers managed to compromise two of the most respected names in international banking, the SWIFT messaging system and the New York Federal Reserve, taking {20}81 million in the process. Following the trail of the stolen money from Dhaka, to Manila and New York, journalist Andrew Wilson is on a mission to uncover how the hackers did it and ultimately who they...
Pub. Date
[2012]
Language
English
Description
What's the secret to stopping crime? David Pogue gives the third degree to scientists pushing the limits of technology, not only to solve horrific murders but also to try to prevent crimes before they even happen. Pogue learns the latest techniques, from unraveling the clues embedded in a decomposing corpse, to detecting lies by peering directly into a suspect's brain, to tracking the creation of a criminal mind. And we meet a genius crime-stopper...
Pub. Date
[2007], c2005
Language
English
Description
Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others' personal information online in order to steal all their money-and even their identities. Through the cautionary stories of two people who got burned, this program shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving up their most sensitive financial and personal information....
Pub. Date
[2012], c2010
Language
English
Description
Digital technology has made us smarter, faster, and more efficient. It has become the driving force of our economy-but at what cost? It's time to ask some tough questions about America's high-tech sector. This CNBC program does so by bringing together a panel of leaders and visionaries from the business community as well as academia and government, including Jay Adelson, former CEO of Digg, Inc.; Vivek Kundra, former U.S. Chief Information Officer;...
Series
Pub. Date
[2014]
Language
English
Description
Though the internet was created by a defense agency, it was embraced by the public as a tool for global communication. This video explains how, using a carrot-and-stick approach, the National Security Agency developed alliances with big tech companies to gain access to their customers' data. FISA court orders, top-secret information, and lucrative contracts lured corporations in, but public reaction in the wake of the Snowden revelations has caused...
Pub. Date
[2012], c2011
Language
English
Description
With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the Australian Web site Seek serving as a case study. Seek's security...
Pub. Date
[2013], c2008
Language
English
Description
Piracy is having significant financial impacts on the music, video game, and software industries. Piracy is also affecting the type of music that is being produced and limiting the amount of software available to the public. This program looks at Internet piracy, covering use of copyrighted information, software copyright law, the facts and figures surrounding piracy, and respect of intellectual property. Industry professionals and musicians alike...
18) Did Silk Road Creator Ross Ulbricht Deserve Life in Prison? Deep Web Director Alex Winter Speaks
Pub. Date
[2015]
Language
English
Description
Alex Winter, director of the documentary Deep Web, talks with Reason TV's Zach Weissmueller about Silk Road founder Ross Ulbricht and anonymity and privacy in cyberspace. A Reason TV production.
Pub. Date
[2013], c2011
Language
English
Description
The term once suggested a lone troublemaker in search of attention and self-enrichment, but today, "hacker" might also mean a covert foot soldier in the service of his or her country - put to work in top-secret quarters and backed by budgets that exceed hundreds of millions of dollars. This film looks at the kind of combat for which skilled hackers are recruited and which they often pursue with every bit of energy and resourcefulness asked of more...
Pub. Date
[2014], c2013
Language
English
Description
This film explores the murky and fast-paced world of hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them. Horizon meets the two men who uncovered the world's first cyber weapon, the pioneers of what is called ultra paranoid computing, and the computer expert who worked out how to hack into cash machines.
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request