

Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.


Self
Self
Self
Self
Self
7.3Ten of Muhammad Ali's former rivals pay tribute to the three-time world heavyweight champion.
7.2Deep beneath the surface in the Syrian province of Ghouta, a group of female doctors have established an underground field hospital. Under the supervision of paediatrician Dr. Amani and her staff of doctors and nurses, hope is restored for some of the thousands of children and civilian victims of the ruthless Syrian civil war.
6.0A man takes over a TV station and holds a number of hostages as a political platform to awaken humanity, instead of money.
6.6After being slain by a group of criminals, a man is reborn with animal-like superpowers and makes it his mission to right the wrongs of his city.
6.0A rogue gunman is assassinating high-ranking military officers one by one. When Gunnery Sgt. Brandon Beckett is informed his father, legendary shooter Thomas Beckett has been killed, Brandon springs into action to take out the perpetrator.
6.0Erstwhile C.I.A. assassin Richard Malone hopes for a tranquil retirement in the placid Pacific Northwest, but what he gets is a rumble with a right-wing extremist plotting a secret revolution.
6.1A subjective documentary that explores various theories about hidden meanings in Stanley Kubrick's classic film The Shining. Five very different points of view are illuminated through voice over, film clips, animation and dramatic reenactments.
6.5Major Ronan Jackson, an accomplished fighter pilot for the Israel Defense Forces and son of a U.S. Senator, is shot down while flying through Syrian airspace. After miraculously surviving the crash, Jackson is taken captive by a group of Hezbollah militiamen. A squad of elite soldiers, led by Gunnery Sergeant Dave Torres, risk their own lives in the hopes of saving an ally they've never met.
6.8While crafting his Grammy-nominated album "Astroworld," Travis Scott juggles controversy, fatherhood and career highs in this intimate documentary.
6.0The boredom of small town life is eating Bill Williamson alive. Feeling constrained and claustrophobic in the meaningless drudgery of everyday life and helpless against overwhelming global dissolution, Bill begins a descent into madness. His shockingly violent plan will shake the very foundations of society by painting the streets red with blood.
6.3Rise of the Footsoldier follows the inexorable rise of Carlton Leach from one of the most feared generals of the football terraces to becoming a member of a notorious gang of criminals who rampaged their way through London and Essex in the late eighties and early nineties.
5.8When Nick Davis leaves prison after one year in solitairy, he is hired to operate a forklift in a warehouse in the harbor owned by the Japanese Yakuza patriarch Isshin Tendo. The place is assaulted by the Italian Mafia lead by Dino Campanela and Nick rescues and saves the life of Shuji Sawamoto, who is the representative of Yakuza interests in America. Shuji hires Nick to work for Yakuza and becomes his godfather in the family after his oath to join Yakuza. However, Nick is a lonely FBI undercover agent assigned to penetrate the criminal organization. When the FBI discovers that Campanela is organizing a massive attack to destroy the Yakuza, Nick's boss Littman calls off the operation to leave the dirty work to the Italian Mafia. But the connection of Nick with Shuji and his goddaughter Yuko forces him to help his Japanese family.
5.9Luc Deveraux, the heroic former Universal Soldier, is about to be thrown into action once again. When SETH, the supercomputer-controlled ultra-warrior, decides to take revenge and destroy its creators, only Luc can stop it. All hell breaks loose as Luc battles SETH and a deadly team of perfect soldiers in a struggle that pits man against machine and good against evil.
5.9The lethal Reaper virus spreads throughout Britain—infecting millions and killing hundreds of thousands. Authorities brutally and successfully quarantine the country but, three decades later, the virus resurfaces in a major city. An elite group of specialists is urgently dispatched into the still-quarantined country to retrieve a cure by any means necessary. Shut off from the rest of the world, the unit must battle through a landscape that has become a waking nightmare.
6.4When John Doe is convicted of being a vigilante serial killer, a vigilante group named 'Speak for the Dead' emerges in support of John's cause—elevating the debate about justice versus vengeance.
6.6Documentary about legendary Paramount producer Robert Evans, based on his famous 1994 autobiography.
5.8Scientists create a genetic clone of a serial killer in order to help catch the killer, teaming up with two cops.
6.3An amateur fighter is lured by a trafficking syndicate specializing in elite underground fighting where her brutal captor forces her to fight or face certain death.
5.8Maverick cop Orin Boyd always brings down the domestic terrorists he tracks, but he ruffles feathers with his unorthodox techniques -- and soon finds himself reassigned to the toughest district in Detroit. When he discovers a group of detectives secretly operating a drug ring, Boyd joins forces with an unlikely ally -- gangster Latrell Walker -- to bring down the rotten cops.
7.1Does privacy still exist in 2019? In less than a generation, the internet has become a mass surveillance machine based on one simple mindset: If it's free, you're the product. Our information is captured, stored and made accessible to corporations and governments across the world. To the hacker community, Big Brother is real and only a technological battle can defeat him.
0.0For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
7.8Cyberspace is more insecure than ever as hackers exploit human error and technical vulnerability to hold it to ransom for their personal data. Companies, public bodies, schools and individuals have all become victims of cyber attacks. In this revealing documentary, victims tell how internet criminals have destroyed their lives
0.0A thought provoking documentary feature film providing a comprehensive exploration of the evolution of signals intelligence over the past century. Whether you're intrigued by the secretive world of intelligence agencies or concerned about the implications of digital surveillance, this film will leave you with a deeper understanding of the role signals intelligence plays in society.
7.2TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata – a paranoid hacker libertarian – get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywood’s most hated pirates go through on a personal level.
6.7A college student searches for justice after she discovers deepfake pornography of herself circulating online.
7.6Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
6.4In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
6.0Their crimes earned them the nickname Bitcoin Bonnie and Clyde — and the story only gets weirder in this documentary about the most lucrative heist ever.
9.0All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
8.0Pains in the butt, or super heroes of the computer revolution? How about both. The documentary Hackers: Computer Outlaws takes a look at the world of hackers, from Draper to Woz to Mitnick.
8.5In Mr. Robot Decoded, creator Sam Esmail, stars Rami Malek and Christian Slater, real-life hacker Jeff Moss and other experts open up about how the show made an extremely technical subject relatable to a wide audience and brought humanity to hackers through the main character Elliot Alderson.
6.3Exploring the murky and fast-paced world of the hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them.
10.0Kayleigh Haywood, a teenage girl addicted to social media, meets a stranger online who lures her into a trap.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
6.9In advance of the 2020 Presidential election, Kill Chain: The Cyber War on America's Elections takes a deep dive into the weaknesses of today's election technology, investigating the startling vulnerabilities in America's voting systems and the alarming risks they pose to our democracy.
0.0Hacking at Leaves documents artist and hazmat-suit aficionado Johannes Grenzfurthner as he attempts to come to terms with the United States' colonial past, Navajo tribal history, and the hacker movement. The story hones in on a small tinker space in Durango, Colorado, that made significant contributions to worldwide COVID relief efforts. But things go awry when Uncle Sam interferes with the film's production.
7.5Documentary and reflection about the effects of technology.
7.9Everyone knows something like this is happening. But this is the only experiment to fully demonstrate what excessive openness on the internet means. The filmmaking couple hired youthful-looking (but over 18) actresses to pretend to be prepubescent girls and communicate with strangers who approached them based on their fake accounts. They attracted dozens of men in the first ten days, then hundreds, and finally thousands...
6.9In 1981, Wau Holland and other hackers established the Hamburg based Chaos Computer Club (CCC). The idiosyncratic freethinkers were inspired by Californian technology visionaries and committed themselves to hacker ethics. All information must be free. Use public data, protect private data. But not everyone followed the rules. Computer technology was still in its infancy and the emerging Internet became a projection screen for social utopias. What has become of them? The story of the German hackers, told by the protagonists themselves in a montage of found video and audio material.

