

A story about the world's best Cyber spies. Their training in Israel's military, and their impact on the world we live in.

Naarator / Self

A story about the world's best Cyber spies. Their training in Israel's military, and their impact on the world we live in.
2017-05-08
0
6.2Explore how in the past five decades, the internet has changed the very fabric of our society, highlighted by interviews with the founders of AOL, Craigslist, Friendster, Match, and Tinder.
5.6"Welcome to Macintosh" is a documentary that mixes history, criticism and an unapologetic revelry of all things Apple. Whether a long time Mac fanatic or new to computers, Welcome to Macintosh explores the many ways Apple Computer (now Apple, Inc.) has changed the world, from the early days of the Apple-I to the latest the company has to offer.
6.5Hacks is a 73 minute European documentary exploring what nature of "Hacking" is in a social context. In HACKS, the Austrian multimedia artist Christine Bader examines who is the computer hacker and what moves him or her. Is the hacker a Robin Hood in cyber space or an anarchistic agitator? Bader speaks with Dutch, German and American communication freaks who are working with various kinds of network issues, like making the Internet accessible to individual persons (Felipe Rodriguez, founder of Internet provider Xs4all), creating a meeting place in cyber space, or designing an ultramodern communication network on a ‘multimedia art ship‘. ‘Hackers are not encumbered by technical, financial or organizational problems, they just want to do things‘, Rodriguez thinks. That the technological means ‘just to do things‘ are now freely available is demonstrated by the numerous computer initiatives that whiz past in HACKS.
7.1Does privacy still exist in 2019? In less than a generation, the internet has become a mass surveillance machine based on one simple mindset: If it's free, you're the product. Our information is captured, stored and made accessible to corporations and governments across the world. To the hacker community, Big Brother is real and only a technological battle can defeat him.
6.0Second Skin takes an intimate look at three sets of computer gamers whose lives have been transformed by online virtual worlds. An emerging genre of computer software called Massively Multiplayer Online games, or MMOs, allows millions of users to interact simultaneously in virtual spaces. Of the 50 million players worldwide, 50 percent consider themselves addicted.
0.0Italy’s biggest political party, the Five Star Movement, promotes direct democracy through internet voting. Five Star Movement uses a digital platform named Rousseau, that allows Movement’s members to vote online and express their opinion on various issues. But who governs this data?
7.5What is Bitcoin? With the advent of Bitcoin, the world's first digital currency, for the first time in history money is no longer controlled by banks or governments, but by the people who use it. But where did this currency come from? How does it work? And is it truly the way forward, or just a flash in the pan? Magic Money answers these questions and more as it explores the mysterious origins of Bitcoin, its role in society, and how it could shape the future.
6.0Hackers Wanted explores the origins and nature of hackers and hacking by following the adventures of Adrian Lamo, and contrasting his story with that of controversial figures throughout history.
7.6Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
0.0
7.2TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata – a paranoid hacker libertarian – get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywood’s most hated pirates go through on a personal level.
6.4In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
6.2The onset of the 21st Century will be an era in which the very nature of what it means to be human will be both enriched and challenged as our species breaks the shackles of its genetic legacy and achieves inconceivable heights of intelligence, material progress, and longevity. While the social and philosophical ramifications of these changes will be profound, and the threats they pose considerable, celebrated futurist Ray Kurzweil presents a view of the coming age that is both a dramatic culmination of centuries of technological ingenuity and a genuinely inspiring vision of our ultimate destiny.
8.0In 1942, when computers were human and women were underestimated, a group of female mathematicians helped win a war and usher in the modern computer age. Sixty-five years later their story has finally been told.
7.8In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
10.0This documentary chronicles the creation story of Apple Computer as told through the eyes of Ronald Wayne—the company's forgotten third founder.
6.6When Steve Jobs died the world wept. But what accounted for the grief of millions of people who didn’t know him? This evocative film navigates Jobs' path from a small house in the suburbs, to zen temples in Japan, to the CEO's office of the world's richest company, exploring how Jobs’ life and work shaped our relationship with the computer. The Man in the Machine is a provocative and sometimes startling re-evaluation of the legacy of an icon.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
9.0All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
7.0CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.