

Russia's Cyber Army(2022)
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
Movie: Russia's Cyber Army
Top 1 Billed Cast
Narrator

Russia's Cyber Army
HomePage
Overview
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
Release Date
2022-05-16
Average
0
Rating:
0.0 startsTagline
Genres
Languages:
FrançaisPусскийKeywords
Similar Movies
6.9Freedom Downtime(en)
A feature-length documentary about the Free Kevin movement and the hacker world.
8.3My Home Hero the Movie(ja)
Seven years have passed since family man Tetsuo Tosu survived a fierce battle with a criminal organization. However, Tetsuo's peaceful family life begins to crumble once again when a sudden landslide uncovers an old sin.
7.5Ocean's Eleven(en)
Less than 24 hours into his parole, charismatic thief Danny Ocean is already rolling out his next plan: In one night, Danny's hand-picked crew of specialists will attempt to steal more than $150 million from three Las Vegas casinos. But to score the cash, Danny risks his chances of reconciling with ex-wife, Tess.
0.0Computer Dreams(en)
A documentary about the exciting possibilities of computer animation and the shaping of never before imagined worlds.
6.9Sneakers(en)
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
5.8Big Momma's House 2(en)
FBI agent Malcolm Turner goes back undercover as Big Momma, a slick-talking, slam-dunking Southern granny with attitude to spare! Now this granny must play nanny to three dysfunctional upper-class kids in order to spy on their computer hacker father.
6.8The Italian Job(en)
Charlie Croker pulled off the crime of a lifetime. The one thing that he didn't plan on was being double-crossed. Along with a drop-dead gorgeous safecracker, Croker and his team take off to re-steal the loot and end up in a pulse-pounding, pedal-to-the-metal chase that careens up, down, above and below the streets of Los Angeles.
7.0Ichi the Killer(ja)
As sadomasochistic yakuza enforcer Kakihara searches for his missing boss he comes across Ichi, a repressed and psychotic killer who may be able to inflict levels of pain that Kakihara has only dreamed of.
6.3Swordfish(en)
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
6.0Antitrust(en)
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
7.2Putin's Bears - The Most Dangerous Hackers in the World(de)
They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
0.0The Goddess and the Computer(en)
For centuries, rice farmers on the island of Bali have taken great care not to offend Dewi Danu, the water goddess who dwells in the crater lake near the peak of Batur volcano. Through an analysis of ritual, resource management practices (planting schedules, irrigation vs. conservation, etc) and social organization, anthropologist Steve Lansing and ecologist James Kremer discover the intricacy and sustainability of this ancient water management agricultural system.
8.3Schlaue neue Welt - Das KI-Wettrennen(de)
The race for supremacy in the age of artificial intelligence is on: between the USA, China and Europe. Between big tech companies and start-ups. Who will win the competition? Will Europe be left behind? And who will determine a technology that will shape the future of humanity?
5.8Firewall(en)
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
6.4Hackers(en)
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
7.2Pusher III(da)
Milo is aging, he is planning his daughter's 25th birthday, and his shipment of heroin turns out to be 10,000 pills of ecstasy. When Milo tries to sell the pills anyway, all Hell breaks loose and his only chance is to ask for help from his ex-henchman and old friend Radovan.
0.0Illustrated conversation with Professor Lars Kristiansson(sv)
Based on the conversations Jösta Hagelbäck and Erik Ostlund had with Lars Kristiansson, a professor of information theory with data communication at Chalmers University in Gothenburg, Sweden. The talks took place at the difficult cancer sufferer Kristiansson's sick-bed and dealt with his insights in computer technology, his hopes and fears for the new technology, the role of religion, the history of mathematics, reasoning about algebra, analytic geometry and the fourth dimension, along with cultural outlooks over the Western society's lack of mysticism and spiritual values.
0.0The Standard Deviants: Internet Basics(en)
Jump onto the information superhighway with the Standard Deviants! Learn how to log on, surf the web and find everything you need in a matter of minutes!
4.8Stolen Identity: The Last Hacker(ja)
Genius hacker and murderer Urano escaped from prison and fled to South Korea. Urano was hired by a South Korean anti-government organization to set a trap targeted for the Korea-Japan summit meeting. Sumin is assigned to watch over Urano but is intimidated by his frantic behavior. Urano distrusts her, but gradually their feelings begin to change a little.
2.5Fisher(en)
In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?