Does privacy still exist in 2019? In less than a generation, the internet has become a mass surveillance machine based on one simple mindset: If it's free, you're the product. Our information is captured, stored and made accessible to corporations and governments across the world. To the hacker community, Big Brother is real and only a technological battle can defeat him.
A feature-length documentary about the Free Kevin movement and the hacker world.
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
Uncompromising millennial radicals from the United States and the United Kingdom attack the system through dangerous technological means, which evolves into a high-stakes game with world authorities in the midst of a dramatically changing political landscape.
Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata – a paranoid hacker libertarian – get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywood’s most hated pirates go through on a personal level.
Follows Andrew ‘bunnie’ Huang, a gray-hat hacker who rose to international fame in 2001 after clashing with tech giant Microsoft over his guide to modifying the Xbox. Today, Huang is suing the United States government to restore users’ rights to own and use their technology autonomously.
This documentary reveals how a group of hackers powered the darkest corners of the internet from a Cold War-era bunker in a quiet German tourist town.
Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
Pains in the butt, or super heroes of the computer revolution? How about both. The documentary Hackers: Computer Outlaws takes a look at the world of hackers, from Draper to Woz to Mitnick.
The incredible story of Bill Gaede, an Argentinian engineer, programmer… and Cold War spy.
Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.
In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
HIPERTEXTO
Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
A story about the world's best Cyber spies. Their training in Israel's military, and their impact on the world we live in.
Pati, a young film producer, is fighting to carve out a professional career in the film industry. It is May 2019 when her laptop is stolen during a business trip in Madrid. Two months after, an anonymous Hacker accesses all the stored data in the stolen device and finds three very private photos of Pati. He threatens that if he doesn’t receive $2,400 he will mass-mail the pictures to all her work contacts in order to ruin her professional reputation. The shame, anger and distress caused by the ineffectiveness of the legal forces lead Pati to set out on her own investigation to stop the Hacker and regain control and power over her privacy.