Drones
Crimes & Technology
Cyberwarfare
Discrimination & Technology
Mystery
100

What are drones used for?

intelligence, surveillance, target acquisition, and reconnaissance

100

What Crimes are Easier to do through the Internet?

A.) Stealing 

B.) Battery

C.) Money Laundering

D.) Drug-Dealing

C.) Money Laundering

100

The barrier of entry for cyberwarfare is high 

T/F

False

100

Can Search Algorithms Discriminate by name?

Y/N

Yes

100

What is love?

Baby don't hurt me, dont hurt me, no more..... 

200

When were general atomics drones equipped with missiles?

2001-2002

200

Definition of Cybercrime?

Any crime that involves a computer or network

200

What is one of the objectives of Cyber Warfare?

To weaken and compromise core systems

200

Where does racism usually operate based on?

algorithms and data analysis programs

200

Who is the best Breaking Bad Character? 

JESSIE PINKMAN - THE OBJECTIVE GOAT 

300

How many people killed in Afghanistan by US Drone Strikes were intended targets from January 2012 - February 2013?

35 People

300

Most Cybercrimes rely on what?

Social Engineering

300

Which Is Not a Type of Cyberwarfare?

A.) Espionage

B.)Denial of Service?

C.)Propaganda

D.) Antivirus software

D.) Antivirus Software

300

Is housing discrimination  something that AI tools perpetuate?

Y/N

Yes

300

At what date was the best human creation 'Fortnite' created?

N/A - (been there since beginning of time)

400

What weapons were commercial UCAVs not equipped with?

A.) Guided Bombs

B.) Cluster Bombs 

C.) Cerebral Bombs

D.) Precision Guided Munitions

C.) Cerebral Bombs

400

What do Businesses Lose with Cybercrimes?

Reputational damage, Sensitive data loss, Stock Drops

400

In 2014 what act of Cyberwarfare did Russia Commit against Ukraine?

DDoS Attack 

400

In what year did researchers find an algorithm in US hospitals that favored white patients over black patients?

2019

400

Is My Suit Drippy?

Y

E

S

500

Which UN Special Reporter stated US Drone Strikes may violate international humanitarian law?

Ben Emmerson

500

The US Department of Justice Divide Cybercrime into three categories. What are they?

  1. crimes in which the computing device is the target -- for example, to gain network access;
  2. crimes in which the computer is used as a weapon -- for example, to launch a denial-of-service (DoS) attack; and
  3. crimes in which the computer is used as an accessory to a crime -- for example, using a computer to store illegally obtained data.
500

What was used to inflict physical damage on an enemy’s industrial systems in 2010

Stuxnet

500

What percent did the COMPAS AI model predict false positives for recidivism with black offenders?

45%

500

Which Ethics Project the swaggiest?

Weaponization of Technology - By Skylar, David & Frannie 

M
e
n
u