Instructional Video9:26
Crash Course

Foreign Policy: Crash Course Government and Politics

12th - Higher Ed
Today Craig finishes up our series on U.S. Government and Politics by talking about both the least and most important aspect of government: foreign policy. Foreign policy is important because it has the potential to affect the largest...
Instructional Video13:42
TED Talks

TED: What security means to me | Eve Ensler

12th - Higher Ed
Playwright Eve Ensler explores our modern craving for security -- and why it makes us less secure. Listen for inspiring, heartbreaking stories of women making change.
Instructional Video19:54
TED Talks

TED: Refugees have the right to be protected | António Guterres

12th - Higher Ed
António Guterres thinks that we can solve the global refugee crisis -- and he offers compelling, surprising reasons why we must try. In conversation with TED's Bruno Giussani, Guterres discusses the historical causes of the current...
Instructional Video14:57
TED Talks

TED: How the blockchain will radically transform the economy | Bettina Warburg

12th - Higher Ed
Say hello to the decentralized economy -- the blockchain is about to change everything. In this lucid explainer of the complex (and confusing) technology, Bettina Warburg describes how the blockchain will eliminate the need for...
Instructional Video14:23
TED Talks

Hasan Elahi: FBI, here I am!

12th - Higher Ed
After he ended up on a watch list by accident, Hasan Elahi was advised by his local FBI agents to let them know when he was traveling. He did that and more ... much more.
Instructional Video9:49
SciShow

The Randomness Problem: How Lava Lamps Protect the Internet

12th - Higher Ed
Randomness is important for all kinds of things, from science to security, but to generate true randomness, engineers have turned to some pretty odd tricks!
Instructional Video10:52
SciShow

How U.S. Airports Might Revamp Security... Using Game Theory

12th - Higher Ed
For the past few years, airports have been working with game theorists to step up their security game.
Instructional Video13:04
TED Talks

TED: When technology can read minds, how will we protect our privacy? | Nita Farahany

12th - Higher Ed
Tech that can decode your brain activity and reveal what you're thinking and feeling is on the horizon, says legal scholar and ethicist Nita Farahany. What will it mean for our already violated sense of privacy? In a cautionary talk,...
Instructional Video14:59
TED Talks

TED: The world doesn't need more nuclear weapons | erika Gregory

12th - Higher Ed
Today nine nations collectively control more than 15,000 nuclear weapons, each hundreds of times more powerful than those dropped on Hiroshima and Nagasaki. We don't need more nuclear weapons; we need a new generation to face the...
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video16:27
TED Talks

James Stavridis: A Navy Admiral's thoughts on global security

12th - Higher Ed
Imagine global security driven by collaboration -- among agencies, government, the private sector and the public. That's not just the distant hope of open-source fans, it's the vision of James Stavridis, a US Navy Admiral. Stavridis...
Instructional Video10:28
SciShow

Attachment Theory: How Your Childhood Shaped You

12th - Higher Ed
Our interpersonal relationships start forming as soon as we’re born, and psychologists have studied how those early connections can set the stage for the other relationships we form later in life.
Instructional Video4:07
SciShow

The Science of Airport Security

12th - Higher Ed
Long lines, being patted down, and having your hands swabbed don't make for a wonderful day, but Michael Aranda explains the machines you encounter in airport security and the science and technology behind them.
Instructional Video4:17
3Blue1Brown

How secure is 256 bit security? Cryptocurrency - Part 2 of 2

12th - Higher Ed
When a piece of cryptography is described as having "256-bit security", what exactly does that mean? Just how big is the number 2^256?
Instructional Video14:16
TED Talks

TED: What it's like to be a parent in a war zone | Aala el-Khani

12th - Higher Ed
How do parents protect their children and help them feel secure again when their homes are ripped apart by war? In this warm-hearted talk, psychologist Aala el-Khani shares her work supporting -- and learning from -- refugee families...
Instructional Video19:22
TED Talks

TED: A vision of crimes in the future | Marc Goodman

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. The world is becoming increasingly open, and that has implications both bright and dangerous. Marc Goodman paints a...
Instructional Video21:02
TED Talks

Bruce Schneier: The security mirage

12th - Higher Ed
The feeling of security and the reality of security don't always match, says computer-security expert Bruce Schneier. In his talk, he explains why we spend billions addressing news story risks, like the "security theater" now playing at...
Instructional Video17:03
TED Talks

David Birch: A new way to stop identity theft

12th - Higher Ed
Bartenders need to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach --...
Instructional Video19:14
TED Talks

Mikko Hypponen: How the NSA betrayed the world's trust -- time to act

12th - Higher Ed
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not....
Instructional Video7:45
TED Talks

TED: Your smartphone is a civil rights issue | Christopher Soghoian

12th - Higher Ed
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on...
Instructional Video5:18
SciShow

How the Massive Equifax Data Breach Happened

12th - Higher Ed
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video8:51
Crash Course

Contractarianism: Crash Course Philosophy

12th - Higher Ed
Today we explore the penultimate ethical theory in this unit: contractarianism. Hank explains Hobbes’ state of nature, and implicit and explicit contracts, as well as the Prisoner’s Dilemma, and the benefits, and costs, of violating...
Instructional Video11:39
TED Talks

TED: How young people join violent extremist groups -- and how to stop them | erin Marie Saltman

12th - Higher Ed
Terrorists and extremists aren't all naturally violent sociopaths -- they're deliberately recruited and radicalized in a process that doesn't fit into a neat pattern. erin Marie Saltman discusses the push and pull factors that cause...