top of page

Crime

Chapter 7: Computer and Network Security

    One example of a prevalent technology in Black Panther that violates network security principles is the use of a disk that forcibly takes control of vehicles. While this technology does not exist today, something like it could exist in the not too distant future. In the movie, the Wakandans use this technology to turn vehicles into their allies by attaching a disk to the hood of the vehicle and controlling them remotely. In 2015, two hackers were able to remotely stop a Jeep cherokee on the highway while they were sitting in the comfort of their living room [1]. In that instance, it was a Wired reporter that was behind the wheel, and he was aware that they were going to mess with the vehicle. That is not to say that other hackers would be so kind.

    From a Kantian perspective, by hijacking cars and taking control of things that do not belong to you, you are essentially stealing. Because you cannot generalize that everyone should be able to steal, it is wrong for the Black Panther to take that car in Korea, even though he's chasing a violent criminal that could hurt more people. In contrast, utilitarianism states that stealing that car was alright, because it was a small price to pay for stopping Klaue.

    Another example of crime that occurs in the film is the listening devices that T’challa employed to listen in on the interrogation of Klaue. While the CIA and the FBI have used this kind of technology since the 1960s, that does not stop it from being wrong. Listening to people against their will often considered wrong by almost every philosophical ideology.

​

References

  1. Greenberg, Andy. "Hackers Remotely Kill a Jeep on the Highway - With Me In It." Jul. 21, 2015 https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Accessed on Apr. 4, 2019.

bottom of page