Podcasts and Videos
Enhance your comprehension of the topics and perspectives discussed in the textbook with these highly relevant videos and podcasts. If you enjoy the SAGE Videos provided, full-length versions can be viewed at SAGE Videos
Videos help student understand key concepts and themes. To make the most out of video resources, we recommend selecting videos or segments of videos under 5 min long and providing one or two questions to help them engage with what they have watched.
Chapter 1: Cybercrime and the Internet: An Introduction
Cybercrime: a changing cyber-threat landscape
Cybercrime: technology and crime
- Do you agree or disagree with the way that Dr. Wall characterizes cybercrime? Explain.
- What do you think about Dr. Wall’s distinctions between cybersecurity and cybercrime?
- What do you think about what Dr. Wall calls the ‘transformation test?’ Do you think this is a useful way to distinguish between types of cybercrime?
Chapter 2: Researching and Theorizing Cybercrime
Jon Heidt discusses criminological theory: What is the value in learning about criminological theory? How can students benefit from having an understanding of criminological theory in their studies or a future career?
- Can theories with origins pre-dating the internet be used to help understand cybercrime?
- What do you think about Dr. Heidt’s discussion of the link between research, theory, and policy, particularly his cautions? Further, do any of his insights potentially apply to the area of cybercrime?
Chapter 3: Hackers, Crackers and Viral Coders
- The hacker in this podcast describes duping people into handing over their AOL login credentials. At its core, has security hacking changed significantly since this point?
- Hacker subculture, as indicated here, is often characterized by frequent ‘one-up-manship’. Does this make criminal hackers different from other criminal subcultures or similar?
- What role do you think boyish masculinity and youth played in the antics/escapades of the featured hacker?
- Thoughts on the legal treatment of the hacker featured in this podcast?
- Does the ‘low-level credit card fraud’ and other scams described here count as hacking?
- What role do you think boyish masculinity played in the antics/escapades of these hackers?
- What role do you think youth played in the antics/escapades of these hackers?
- What role do you think class/and socio-economic class played in the antics/escapades of these hackers?
- Can you identify any potential techniques of neutralization used in this podcast?
- Many hackers may do crimes as youths and then mature into careers as professionals. Should they be allowed to redeem themselves professionally like this? Should other kinds of criminals? And is this like other kinds of crime where people ‘age out’?
- What do you think about his experience in prison? Is prison too ‘nice’? Or, rather, does it reflect negatively on his life before/after prison that he enjoyed prison?
- Can prisons be a source of prosocial bonds?
- Thoughts on how the hackers’ skills allowed them to integrate into the prison underground economy?
TedX – hackers are all about curiosity, and security is just a feeling, Chris Nickerson
- Do you agree that curiosity is a primary motivator for hackers?
- Is there are relationship between youth and curiosity evinced in this talk about becoming a hacker?
- Does his pathway into hacking sound familiar? Do you think his narrative sounds similar to those for people in other fields?
- What do you think about his discussion about what a ‘real’ hacker is?
- What do you think about his discussion of ‘having plans’ for dealing with information security?
TED - Hackers: the Internet’s immune system, Keren Elazari
- Do you think hackers are necessary for a healthy and secure information technology ecosystem?
- Does combating hackers also mean combating innovation?
Equifax: last week tonight with John Oliver (HBO) (may include content objectionable to some)
- Should companies be allowed to retain so much sensitive data? And should such companies play such a central role in our economy considering the risks associated with data breaches?
- From your perspective, is Equifax responsible for the data breach described in this video? If so, how should the company and the breach be handled by authorities? Should Equifax be punished? If so, how?
- Do you think the arguments made by John Oliver against Equifax are fair?
- What do you think about the way ASUS handled the reporting of the major security vulnerability described by the interviewee?
- Were the ASUS router in question to be implicated in a major breach, who would be more responsible—the attacker who exploited the vulnerabilities or ASUS for failing to make a more secure device and take reported vulnerabilities seriously?
- Is shaming a company an effective way to change their security practices? Is it an ethical way to change their practices?
- Can ‘full disclosure’ of a security vulnerability ever be justified? Or a ‘partial disclosure’?
Chapter 4: Political Hacking: From Hacktivism to Cyberterrorism
- Should governments be allowed to hack other governments? If so, should these acts be regulated more strictly under international law?
- How do you think it would feel like to be a state-actor involved in hacking these networks? What sorts of pressures would you be under? Would you experience any thrills? Might these emotional aspects influence how you go about the hack?
- Can a DDoS attack against a hospital ever be justified, even considering the act being protested in this story (a ‘medical kidnapping’)?
- In this scenario, would the DDoS attack be considered an act of hacktivism or digilantism?
Chapter 5: Virtual ‘Pirates’: Intellectual Property Theft Online
- What do you think about the motivations given by Eijah? Do you think he may have been making ‘mountains out of molehills’ or do you think his grievances were legitimate and deserved his ire?
- Are there any criminological theories you could use to explain Eijah’s behaviour based on his story?
- Do you agree with the characterization of pirates given in this industry-sponsored advertisement?
- How do content industries benefit from portrayals of piracy like those given in this advertisement? Consider the various subtexts of the video in your response.
Chapter 6: Cyber-Frauds, Scams and Cons
- Put yourself in the victim’s shoes. Do you see how she could have fallen in love with the fraudster? And how would you feel finding out it was a scam?
- Imagine you are trying to combat romance scams. Does the story given by the victim give you any insights into policies, practices, or interventions you could change that might have prevented her victimization?
TedX – a story about fishing, hacking and theft, Glen Gooding
- Do contemporary data breaches and ‘hacking’ related thefts constitute new crimes or are they ‘old wine, new bottles’?
- Why do you think the IT security profession does not have a lot of women in the ranks?
Chapter 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to ‘the Dangers’ of Pornography
Does the left hate free speech? (part 1) (may include content objectionable to some)
- Do you think the portrayal of the contemporary internet free speech debate made in this video is fair?
- What do you think about the arguments made in this video about regulating hate speech?
- The video points out a central contradiction in freedom of speech—that the exercise of free speech by one person may encroach on freedom of speech of another. What do you make of this contradiction? Is it possible to enable freedom of speech for all? If not, how do we decide whose speech is protected?
Does the left hate free speech? (part 2) (may include content objectionable to some)
- Do you think the portrayal of the contemporary internet free speech debate made in this video is fair?
- Can you imagine a place where pure freedom of speech exists? What would it look like? And can you honestly say you’d want to be there?
- Can the suppression of one form of speech protect other forms of speech? Or, in other words, can restricting the speech of one person protect the speech of another?
- Freedom of speech is often used to defend unpopular arguments. Do all ideas, however, deserve consideration and debate? Even hateful ones?
Facebook: last week tonight with John Oliver
- How does hate speech persist on Facebook despite policies designed to prevent or curb hate speech?
- Is Facebook a viable avenue for freedom of speech and the spread of information?
Chapter 8: Child Pornography and Child Sex Abuse Imagery
- Should companies be allowed to harvest that much data from children? Even with parental consent?
- What do you think about the way VTech handled the uncovered security vulnerabilities?
- What do you think about the way the vulnerability was disclosed by the hacker?
- What do you think about the consequences VTech faced in this story? Fair? Unfair? Enough? Not enough?
- Do you think vulnerabilities like those discussed here present significant opportunities for child exploitation?
Chapter 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia
Is the internet a haven for misogyny?
- Put yourself in the shoes of a woman experiencing online misogyny (or, if you are a woman who has experienced online misogyny, reflect on your experiences). Do you think you’d be able to separate the online hate and threats from your ‘real life’ experience? Would it make you feel less safe offline? What kinds of worries might you have about your private, public, and professional relationships?
- Regarding online misogyny, is the solution to hateful speech to engage in ‘more speech’ that counters hate speech?
- Reflect on the debate that occurs in this video. One side argues that the internet should be preserved as an open forum. When hate speech is allowed to proliferate, however, can we consider the internet to truly to be an open forum?
Online Harassment: last week tonight with John Oliver (HBO) (may include content objectionable to some)
- Are strategies like ‘simply stop using the internet’ or ‘hop off social media’ actually viable for victims of online harassment in contemporary society?
- How do we distinguish between speech that should be protected and harassing/threatening speech?
- How should police handle issues like online harassment and threats?
- Do women and men have different experiences of the internet? If so, why?
- Should revenge porn be criminalized?
- Put yourself in Melissa’s shoes. How would you cope with eight years of harassment?
- What role, if any, do you think gender played in the harassment discussed in this podcast?
- Does the transnational nature of this crime make it potentially easier to deal with because of the distance? Or harder because of the difficulty in gaining legal recourse?
Chapter 10: Policing the Internet
Policing cybercrime: the challenges, part 1
- What do you think of Dr. Wall’s concept of the ‘reassurance gap’? Do you think this plays a tremendous role in cybercrime policing?
- What do you think about Dr. Wall’s distinction between ‘technical’ and ‘experiential’ forms of crime?
Policing cybercrime: the challenges, part 2
- Do you think that the ‘culture of fear’ is a significant factor in the policing of cybercrimes? Does it force police to mis-prioritize their attention? Does it give the public incorrect views about their likelihood of victimization and the level of harm created?
- Cybercrime policing is ‘pluralized’ across many actors and agencies. How central of a role do you think the police should play in the policing of the internet? Should governments and public police forces be more or less involved in regulating the internet?
- Do you think that social media and other forms of online communication have a ‘civilizing effect’ like those described by Dr. Wall? Why or why not?
- Dr. Wall argues that one of the key challenges for improving police regulation/investigation of cybercrimes is cultural. How might we create cultural change within these police organizations to make them better prepared to grapple with cybercrime issues?
Chapter 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
The Snowden Files: the inside story of the world’s most wanted man
- Was Edward Snowden right to release the details of the NSA’s surveillance programs? Is he a traitor, hero, or something else?
- Did the Snowden leaks make a difference? Did the public change our privacy behaviour? Did the US change its policies?
TedX – why Google won’t protect you from big brother, Christopher Soghoian
- According to Christopher Soghoian, what are the factors that have enabled surveillance to become ubiquitous?
- If internet and communication companies are actively assisting states with mass surveillance of whole populations, what measures can/should users justifiably take to protect their privacy?
TTedX – the dark web, Alan Pearce
- Do you think the benefits offered by the dark web (like those for journalists, activists, or anyone else needed anonymity) out weight the potential costs (ex: child pornography, hackers-for-hire, etc.)?
- Do you agree with the speaker that we are ‘facing the end of the Internet as we know it’?
Government surveillance: last week tonight with John Oliver (HBO) (may include content objectionable to some)
- Is government surveillance really as big a deal as critics claim? In other words, how concerned should we be about government surveillance programs?
- Are US FISA courts a necessary national security protection or an unnecessary facilitator of government overreach?
- What kinds of personal information should or should not be allowed to be gathered or analysed by government surveillance programs?
Right to be forgotten: last week tonight with John Oliver (HBO) (may include content objectionable to some)
- Should people be entitled to the ‘right to be forgotten’?
- How might the ‘right to be forgotten’ be abused? Could it conflict with other rights, like free speech?
- In 2003, Barbra Streisand attempted to have pictures of her house removed from the internet. Her attempt, however, resulted in the information being publicized more widely. This phenomenon is known as the ‘Streisand Effect’. How might the ‘right to be forgotten’ interact with the ‘Streisand Effect’?
Encryption: last week tonight with John Oliver (HBO) (may include content objectionable to some)
- Should governments be allowed to have ‘keys’ to break encryption?
- Does the threat posed by criminals using encryption outweigh the social good such data protections potentially provide?
- Should access to encryption be universal? Should it be regulated and controlled?
- Do you think the ‘Crypto Wars’ were as significant as the podcast makes it seem for the internet, technologists, and the public?
- Encryption is code. Should it be considered a ‘munition’ or should it be considered ‘speech’ protected under the first amendment?
Chapter 12: Conclusion: Looking Toward the Future of Cybercrime
How it works: the Internet of Things
- Are the potential security risks posed by the internet of things worth the benefits?
- Are there potential social/cultural costs posed by having everything around us connected to the internet?
The man biohacking encryption from his garage
- Is biohacking really the ‘future of human evolution’?
- Can you think of possible cybercrimes that may develop as a result of biohacking?