
Rivolta(2017)
Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
Movie: Rivolta

Rivolta
HomePage
Overview
Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
Release Date
2017-04-28
Average
0
Rating:
0.0 startsTagline
Genres
Languages:
Keywords
Similar Movies

Shapeless Tracking(es)
Inside a computer a space-time is revealed in which image and sound become numbers and motion manifests as rhythm, flow and chaos. This tracking and integration experiment removes the superficial identity of video to detect kinetic disturbances in everyday environment.

Russia's Cyber Army(ru)
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?

The New Radical(en)
Uncompromising millennial radicals from the United States and the United Kingdom attack the system through dangerous technological means, which evolves into a high-stakes game with world authorities in the midst of a dramatically changing political landscape.

Freedom Downtime(en)
A feature-length documentary about the Free Kevin movement and the hacker world.

Tracking Russian Hackers(fr)
Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.

The Crazy Che(es)
The incredible story of Bill Gaede, an Argentinian engineer, programmer… and Cold War spy.

Cyberbunker: The Criminal Underworld(de)
This documentary reveals how a group of hackers powered the darkest corners of the internet from a Cold War-era bunker in a quiet German tourist town.

The KGB, the Computer and Me(en)
In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.

Revolution OS(en)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.

Bulletproof(en)
"Bulletproof" observes the age-old rituals that take place daily in American schools: homecoming parades, basketball practice, morning announcements, and math class. Unfolding alongside these scenes are an array of newer traditions: lockdown drills, teacher firearm trainings, metal detector inspections, and school safety trade shows. This documentary weaves together these moments in a cinematic meditation on fear, violence, and the meaning of safety, bringing viewers into intimate proximity with the people self-tasked with protecting the nation's children while generating revenue along the way, as well as with those most deeply impacted by these heightened security measures: students and teachers.

Do We Belong Here: The Triumphs and Struggles of Cybersecurity's Women(en)
Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.

All Creatures Welcome(de)
All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.

Defeating the Hackers(en)
Exploring the murky and fast-paced world of the hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them.

Guardians of the New World(en)
Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.

We Are Legion: The Story of the Hacktivists(en)
Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.

Putin's Bears - The Most Dangerous Hackers in the World(de)
They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?

Lo and Behold: Reveries of the Connected World(en)
Werner Herzog's exploration of the Internet and the connected world.

Abendland(de)
Some things can be seen more clearly at night.. . A film poem about a continent at night, a culture on which the sun’s going down, though it’s hyper alert at the same time, an “Abendland” that, often somewhat self-obsessively, sees itself as the crown of human civilization, while its service economy is undergoing rapid growth in a thoroughly pragmatic way. Nikolaus Geyrhalter takes a look at a paradise with a quite diverse understanding of protection. Night work juxtaposed with oblivious evening digression, birth and death, questions that await answers in the semi-darkness, a Babel of languages, the routine of the daily news, and political negotiation: All this has been captured in images with a wealth of details that make us look at things in a new way. The longer you consider a word, the more distant is its return gaze: ABENDLAND.

My Sextortion Diary(ca)
Pati, a young film producer, is fighting to carve out a professional career in the film industry. It is May 2019 when her laptop is stolen during a business trip in Madrid. Two months after, an anonymous Hacker accesses all the stored data in the stolen device and finds three very private photos of Pati. He threatens that if he doesn’t receive $2,400 he will mass-mail the pictures to all her work contacts in order to ruin her professional reputation. The shame, anger and distress caused by the ineffectiveness of the legal forces lead Pati to set out on her own investigation to stop the Hacker and regain control and power over her privacy.