
Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?

Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
2017-04-28
0
0.0Pati, a young film producer, is fighting to carve out a professional career in the film industry. It is May 2019 when her laptop is stolen during a business trip in Madrid. Two months after, an anonymous Hacker accesses all the stored data in the stolen device and finds three very private photos of Pati. He threatens that if he doesn’t receive $2,400 he will mass-mail the pictures to all her work contacts in order to ruin her professional reputation. The shame, anger and distress caused by the ineffectiveness of the legal forces lead Pati to set out on her own investigation to stop the Hacker and regain control and power over her privacy.
7.0A feature-length documentary about the Free Kevin movement and the hacker world.
6.9REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
6.8The incredible story of Bill Gaede, an Argentinian engineer, programmer… and Cold War spy.
6.4In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
7.2They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
8.0"Bulletproof" observes the age-old rituals that take place daily in American schools: homecoming parades, basketball practice, morning announcements, and math class. Unfolding alongside these scenes are an array of newer traditions: lockdown drills, teacher firearm trainings, metal detector inspections, and school safety trade shows. This documentary weaves together these moments in a cinematic meditation on fear, violence, and the meaning of safety, bringing viewers into intimate proximity with the people self-tasked with protecting the nation's children while generating revenue along the way, as well as with those most deeply impacted by these heightened security measures: students and teachers.
8.0Sigurdur Thordarson, known as Siggi, becomes a hacker at 12, exposing Icelandic bank corruption at 14. Branded the "teenage whistleblower," he joins WikiLeaks in 2010, mentored by Julian Assange. Siggi leaks globally, but clashes with Assange, prompting him to spy for the FBI at 18. This tale weaves paranoia, hacking, and friendship, portraying Siggi's turbulent journey from trust to betrayal, revealing a heart-wrenching coming-of-age narrative.
9.0All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
7.8In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
7.0Hospital staff are reporting more violence and anti-social behaviour than ever before. In 2015, 8 staff were assaulted every hour – a new record high. At The Queen Elizabeth Hospital in Birmingham – one of the UK’s biggest hospitals – they think they have the answer. Here a private security force of 46 uniformed guards, and a sophisticated CCTV system, keep staff and patients safe. A colourful mixture of characters ranging from ex-soldiers, to bouncers, to former elite sportsmen, it’s the security team’s job to keep the hospital running smoothly. With more than 2 million visitors they have to deal with all aspects of crime and anti-social behaviour. All against a back drop of life changing and life saving procedures.
6.9In 1981, Wau Holland and other hackers established the Hamburg based Chaos Computer Club (CCC). The idiosyncratic freethinkers were inspired by Californian technology visionaries and committed themselves to hacker ethics. All information must be free. Use public data, protect private data. But not everyone followed the rules. Computer technology was still in its infancy and the emerging Internet became a projection screen for social utopias. What has become of them? The story of the German hackers, told by the protagonists themselves in a montage of found video and audio material.
7.0CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
7.5The documentary Pirat@ge traces the history of the Internet through the testimonies of those who built it: the hackers. It delves into the concerns of Generation Y, analyzing their networked communication methods, cultural consumption habits, and the sharing of such content.
6.3Exploring the murky and fast-paced world of the hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them.
0.0This film details the techniques used by amateur and professional shoplifters to steal over $6 billion in merchandise annually. Emphasizing how much of this stealing could be prevented ... A convicted shoplifter displays stealing methods under actual conditions and explains how employees could have prevented the thefts.
4.1Some things can be seen more clearly at night.. . A film poem about a continent at night, a culture on which the sun’s going down, though it’s hyper alert at the same time, an “Abendland” that, often somewhat self-obsessively, sees itself as the crown of human civilization, while its service economy is undergoing rapid growth in a thoroughly pragmatic way. Nikolaus Geyrhalter takes a look at a paradise with a quite diverse understanding of protection. Night work juxtaposed with oblivious evening digression, birth and death, questions that await answers in the semi-darkness, a Babel of languages, the routine of the daily news, and political negotiation: All this has been captured in images with a wealth of details that make us look at things in a new way. The longer you consider a word, the more distant is its return gaze: ABENDLAND.
6.5THE 414s tells the story of the first widely recognized computer hackers, a group of Milwaukee teenagers who gained notoriety in 1983 when they broke into dozens of high-profile computer systems, including the Los Alamos National Laboratory, a classified nuclear weapons research facility.