Playlists > 👨‍💻 Hackers & cyber crime

👨‍💻 Hackers & cyber crime
Description:

A Dark Web playlist featuring expert hackers, heists and stunts using highly technical knowledge and innovative tech.

See also:
đź’° Best heist TV shows
https://www.primewire.tf/playlist/6123


Creator: Greer
Posted: 2 years ago
 
Favorite

11 favorites

3199 views

info
Movie: The Matrix Resurrections ( 2021 )
Return to a world of two realities: one, everyday life; the other, what lies behind it. To find out if his reality is a construct, to truly know himself, Mr. Anderson will have to choose to follow the white rabbit once more.
info
Movie: Anon ( 2018 )
In a world without anonymity or crime, a detective meets a woman who threatens their security.
info
Movie: NetForce ( 1999 )
Set in the year 2005, a division of the FBI, called "NetForce" has been initiated to investigate Internet crime. A Bill Gates-type character finds a loophole in his new web browser which enables him to gain control of the Internet. Net-Force, headed by Kristofferson and Bakula's characters set out to stop him.
info
Movie: Ghost in the Shell ( 2017 )
In the near future, Major Mira Killian is the first of her kind: A human saved from a terrible crash, who is cyber-enhanced to be a perfect soldier devoted to stopping the world's most dangerous criminals.
info
TV Show: Ghost in the Shell: SAC_2045 ( 2020 )
Cybercrime is rampant in a near future where advances in technology allow people to augment their minds with "cyberbrains." Full-body cyborg Kusanagi Motoko commands the crime-fighting organization known as Public Security Section 9.
info
Movie: Mickey Virus ( 2013 )
MICKEY VIRUS is a comic thriller set in Delhi, India. When Delhi Police comes across a case revolving around hacking, they begin there search to find a computer expert who can help them crack this case. The head of the police team ACP Siddhanth (Manish Choudhary), stumbles across Mickey Arora (Manish Paul), a lazy but street smart hacker who can actually help them solve the case. Mickey runs a grocery store in day time and creates virus's for anti virus companies in the night. He is also head over heals in love with a character he has created in his game called "Kung Fu Chameli" and will do anything to get out of hard work to do whatever he wants to do. Little does he know that ACP Siddhanth accompanied by Inspector Bhalla (Varun Badola) is a tough nut to crack...
info
Movie: Webmaster ( 1998 )
JB is the city's best attacker, who lives a carefully organized life in and outside the network. After hacking into the most powerful of all domains the Stoiser domain, JB thought that the cruel Stoiser would kill him. But instead he gave him a job - as a webmaster.
info
Movie: Shill ( 2015 )
The money, the mouth, the muscle. The jaw dropping story of cyber crimes most audacious heist and the three men who went on a meticulously planned spending spree to hide ÂŁ100M from the law. Based on actual events.
info
Movie: 1:54 ( 2017 )
Tim is a grade 11 student dealing with loss of his mother several years ago and his own sexuality at 16 going on 17. He was a star runner as a 12 year old with his mother as his coach. With his mother's death he gave up running and him and his friend are chemistry nerds who are bullied and harassed by the jocks at school. Tim eventually returns to running and expands his group of friends. HIs main competitor on the track, Jeff, continues his harassment and resorts to blackmail to hurt Tim's performance on the track with disastrous results.
info
TV Show: Wired ( 2008 )
As single mum, Louise Evans, is given a promotion at her bank only to be coerced into facilitating a ÂŁ250 million internet bank theft. Wired is a thriller about bank fraud, what happens to our money behind the scenes in the world of "electronic banking", and the shadowy bank robbers who no longer operate with masks and sawn-off shotguns.
info
info
TV Show: FACE: Cyber Crime Special Investigation Unit ( 2017 )
Yuki Rin's parents passed away and she has been living with her older brother Koichiro. Koichiro was an IT engineer who worked for the government until he was recruited by a vicious cyber crime group one year ago. That was when Rin's ordinary, happy life crumbled. She miraculously survived despite taking her brother's bullet. Then she was brought into FACE, a cyber crime special investigation unit which the Cabinet created in secret, on the strength of her profiling ability by Minegishi Shugoro. Believing in Minegishi, Rin joins the unit's members to combat cyber crime which can destabilize the nation.
info
Movie: Cyberbully ( 2011 )
A teenager is subjected to a campaign of bullying by classmates through a social networking site.
info
Movie: Cyberbully ( 2015 )
How far will you go to protect your life, Casey is facing every teenager's worst nightmare, as an anonymous hacker plans to leak her private photos to the public through the Internet. She races against time in order to end the stalker's plan and save her identity.
info
Movie: Submit the Documentary: The Virtual Reality of Cyberbullying ( 2013 )
The way we hurt each other has evolved. Submit the Documentary is an in-depth look into the profound, reality of cyberbullying. Cyberbullying is 24x7x365 and reaches as far as the Internet can carry it. Submit the Documentary is a film that is informative and all too telling of an epidemic confronting our children and their well-being. Submit compassionately tells the stories of children and families who are affected by the harsh reality of cyberbullying and features interviews with educators, experts and law enforcement as they tackle this worldwide issue, while offering solutions to this complicated problem.
info
Movie: Pulse ( 2006 )
When their computer hacker friend accidentally channels a mysterious wireless signal, a group of co-eds rally to stop a terrifying evil from taking over the world.
info
Movie: TRON: Legacy ( 2010 )
The son of a virtual world designer goes looking for his father and ends up inside the digital world that his father designed. He meets his father's corrupted creation and a unique ally who was born inside the digital world.
info
Movie: No Place to Hide: The Rehtaeh Parsons Story ( 2015 )
The far-reaching effects of cyberbullying, rape culture and victim blaming - all borne by one girl, Rehtaeh Parsons.
info
TV Show: Profit ( 1996 )
Profit follows Jim Profit who works for a multinational company, and isn't above using any means necessary to get ahead, and that includes bribery, blackmail, intimidation, extortion, and even murder. Aired in 1996, and despite raving reviews, the show was deemed too provocative for network television and canceled after only 5 episodes. 4 more episodes had been shot and were released only a year and a half later.
info
Movie: Pi ( 1998 )
A paranoid mathematician searches for a key number that will unlock the universal patterns found in nature.
info
Movie: Minority Report ( 2002 )
In a future where a special police unit is able to arrest murderers before they commit their crimes, an officer from that unit is himself accused of a future murder.
info
TV Show: Minority Report ( 2015 )
The future is coming.Based on the international blockbuster film by executive producer Steven Spielberg and the first of his films to be adapted for television, Minority Report follows the unlikely partnership between a man haunted by the future and a cop haunted by her past, as they race to stop the worst crimes of the year 2065 before they happen.Set in Washington, D.C., it is 10 years after the demise of Precrime, a law enforcement agency tasked with identifying and eliminating criminals…before their crimes were committed. To carry out this brand of justice, the agency used three precogs – "precognitives" Dash, Arthur and Agatha – who were able to see the future. Now, in 2065, crime-solving is different, and justice leans more on sophisticated and trusted technology than on the instincts of the precogs.
info
Movie: Skyfall ( 2012 )
James Bond's loyalty to M is tested when her past comes back to haunt her. When MI6 comes under attack, 007 must track down and destroy the threat, no matter how personal the cost.
info
Movie: GoldenEye ( 1995 )
Years after a friend and fellow 00 agent is killed on a joint mission, a Russian crime syndicate steals a secret space-based weapons program known as "GoldenEye" and James Bond has to stop them from using it.
info
Movie: The Social Network ( 2010 )
As Harvard student Mark Zuckerberg creates the social networking site that would become known as Facebook, he is sued by the twins who claimed he stole their idea and by the co-founder who was later squeezed out of the business.
info
Movie: The Imitation Game ( 2014 )
During World War II, the English mathematical genius Alan Turing tries to crack the German Enigma code with help from fellow mathematicians while attempting to come to terms with his troubled private life.
info
Movie: Snowden ( 2016 )
The NSA's illegal surveillance techniques are leaked to the public by one of the agency's employees, Edward Snowden, in the form of thousands of classified documents distributed to the press.
info
Movie: TRON ( 1982 )
A computer hacker is abducted into the digital world and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program.
info
Movie: Judge Dredd ( 1995 )
In a dystopian future, Joseph Dredd, the most famous Judge (a police officer with instant field judiciary powers), is convicted for a crime he did not commit and must face his murderous counterpart.
info
Movie: Risk ( 2017 )
The story of WikiLeak's editor-in-chief Julian Assange as seen by documentary filmmaker Laura Poitras.
info
TV Show: Arrow ( 2012 )
After a violent shipwreck, billionaire playboy Oliver Queen was missing and presumed dead for five years before being discovered alive on a remote island in the Pacific. He returned home to Starling City, welcomed by his devoted mother Moira, beloved sister Thea and former flame Laurel Lance. With the aid of his trusted chauffeur/bodyguard John Diggle, the computer-hacking skills of Felicity Smoak and the occasional, reluctant assistance of former police detective, now beat cop, Quentin Lance, Oliver has been waging a one-man war on crime.
info
Movie: On the Mountains ( 2018 )
An outwardly prosperous Czech family decided to spend a weekend in the mountains. But, as it turned out, these plans became known not only to them. Along the way, their teenage son was repeatedly subjected to violence by only one well-known blackmailer. Which made the boy ask his parents under various pretexts to stop, in order to retire, to take several photos for him.
info
TV Show: Black Mirror ( 2011 )
Over the last ten years, technology has transformed almost every aspect of our lives before we've had time to stop and question it. In every home; on every desk; in every palm - a plasma screen; a monitor; a smartphone--a black mirror of our 21st Century existence. Black Mirror is a contemporary British re-working of The Twilight Zone with stories that tap into the collective unease about our modern world.
info
Movie: The Circle ( 2017 )
A woman lands a dream job at a powerful tech company called the Circle, only to uncover an agenda that will affect the lives of all of humanity.
info
Movie: Colossus: The Forbin Project ( 1970 )
Thinking this will prevent war, the US government gives an impenetrable supercomputer total control over launching nuclear missiles. But what the computer does with the power is unimaginable to its creators.
info
Movie: Paycheck ( 2003 )
What seemed like a breezy idea for an engineer to net him millions of dollars, leaves him on the run for his life and piecing together why he's being chased.
info
Movie: Goodbye World ( 2014 )
When a mysterious terrorist attack causes chaos in the cities, a group of friends take refuge in their countryside cabin. But the challenges of living in a post-apocalyptic world soon take their toll on relationships within the group.
info
Movie: The Signal ( 2014 )
On a road trip, Nic and two friends are drawn to an isolated area by a computer genius. When everything suddenly goes dark, Nic regains consciousness - only to find himself in a waking nightmare.
info
Movie: Jurassic Park ( 1993 )
A pragmatic paleontologist touring an almost complete theme park on an island in Central America is tasked with protecting a couple of kids after a power failure causes the park's cloned dinosaurs to run loose.
info
Movie: The Bourne Ultimatum ( 2007 )
Jason Bourne dodges a ruthless C.I.A. official and his Agents from a new assassination program while searching for the origins of his life as a trained killer.
info
Movie: Hot Millions ( 1969 )
Paroled London fraudster Marcus Pendleton poses as a computer specialist in order to work for an insurance company that entirely relies on its corporate server.
info
Movie: Superman III ( 1983 )
Synthetic kryptonite laced with tar splits Superman in two: good Clark Kent and bad Man of Steel.
info
Movie: Electric Dreams ( 1984 )
An artificially intelligent PC and his human owner find themselves in a romantic rivalry over a woman.
info
Movie: Debug ( 2015 )
Six young computer hackers, sent to work on a derelict spaceship, are forced to match wits with a vengeful artificial intelligence that would kill to be human.
info
Movie: Weird Science ( 1985 )
Two high school nerds use a computer program to literally create the perfect woman, but she turns their lives upside down.
info
Movie: Genius on Hold ( 2013 )
The story of Walter L. Shaw, a telecommunications genius, and his son Walter T. Shaw, a ruthless jewel thief, is a metaphor and a symbol for its time - for the twentieth century and for today.
info
Movie: Secret History of Hacking ( 2001 )
A history of hacking focusing on Captain Crunch, Steve Wozniak and Kevin Mitnick.
info
Movie: The Crash ( 2017 )
In the not-so-distant future, a team of white-collar criminals are enlisted by the Federal government to thwart a cyber-attack that threatens to bankrupt the United States of America.
info
Movie: Revolution OS ( 2002 )
While Microsoft may be the biggest software company in the world, not every computer user is a fan of their products, or their way of doing business. While Microsoft's Windows became the most widely used operating system for personal computers in the world, many experts took issue with Microsoft's strict policies regarding licensing, ownership, distribution, and alteration of their software. The objections of many high-profile technology experts, most notably Richard Stallman, led to what has become known as "the Open Source Movement," which is centered on the belief that computer software should be free both in the economic and intellectual senses of the word. Eventually, one of Stallman's admirers, Linus Torvalds, created a new operating system called Linux, a freely distributed software which many programmers consider to be markedly superior to Windows. Revolution OS is a documentary that examines the genesis of the Open Source Movement, and explores and explains the technical and intellectual issues involved in a manner understandable to computer aficionados and non-techheads alike.
info
TV Show: Betas ( 2013 )
Four computer geeks have what they think is a brilliant idea -- a social networking app that, in the words of ringleader Trey, "introduces you to the people you should know," unlike other popular sites, that simply let you keep up with people you already know. They have the app working (which required hacking into the already popular social networking sites for personal data), but they need an angel -- someone to invest some cash in their dream. They target George Murcheson, an investor who has passed on the likes of Facebook, Foursquare and Pinterest. Unable to get an appointment with the man, they crash his party and demo their app, which his investment adviser proclaims a stalker's dream. Murcheson's money could make or break the guys' futures. Raunchy, and with a lot of emphasis on sex and drugs, this Amazon original is not for the younger crowd, but offers grown-ups a look inside the workings of Silicon Valley and the roller-coaster ride of the start-up.
info
Movie: Irumbu Thirai ( 2018 )
An Army Major tries to find a hacker when his money goes missing from his account.
info
TV Show: Highlander: The Raven ( 1998 )
"She is a creature of legend…like the Raven, a thief who stole the sun and the moon. They sent a warrior to bring her back. He found her, and together they brought light back to the world. Sexy Amanda Derieux, teaming up with freelance security expert, Nick Wolfe, puts her high octane arsenal of charisma and sassy, good looks into full force to charm, confound and, when necessary, destroy Immortals bent on evil
info
Movie: Masterminds ( 1997 )
Trapped in a school in which a gang of criminals has siezed control, a young troublemaker fights a cat and mouse battle from inside.
info
Movie: Underground: The Julian Assange Story ( 2012 )
A look at the early career of Wikileaks founder, Julian Assange.
info
Movie: Pirates of Silicon Valley ( 1999 )
History of Apple and Microsoft.
info
Movie: A Scanner Darkly ( 2006 )
An undercover cop in a not-too-distant future becomes involved with a dangerous new drug and begins to lose his own identity as a result.
info
Movie: Hackers: Wizards of the Electronic Age ( 1984 )
All interviews in this documentary were shot over a long weekend at a 1984 hacker conference by the Whole Earth Catalog editors Stewart Brand and Kevin Kelley in Sausalito, California. The event itself (the hacker conference) was inspired by Steven Levy's classic book "Hackers - Heroes of the Computer Revolution".
info
Movie: Citizenfour ( 2014 )
A documentarian and a reporter travel to Hong Kong for the first of many meetings with Edward Snowden.
info
Movie: The Code ( 2001 )
Finnish-made documentary about GNU/Linux, featuring some of the most influential people of the free software (FOSS) movement.
info
Movie: Freedom Downtime ( 2001 )
Computer hackers are being portrayed as the newest brand of terrorists. This is a story of a hacker named Kevin Mitnick, imprisoned without bail for nearly five years. Freedom Downtime tries to uncover the reasons why the authorities are so scared of Mitnick as well as define what exactly he did. Surprisingly, no real evidence is ever presented by the authorities to back up the sensationalist claims in mass media. But when a Hollywood studio decides to make a movie about Mitnick's life through the eyes of one of his accusers, hackers turn to activism to get their message out. Through interviews with relatives, friends, lawyers, and experts in the computer and civil liberties arena, a picture of a great injustice becomes apparent. A cross-country journey uncovers some realities of the hacker culture as well as the sobering fact that so many technically young adept people are being imprisoned.
info
Movie: The Great Hack ( 2019 )
The Cambridge Analytica scandal is examined through the roles of several affected persons.
info
Movie: The Social Dilemma ( 2020 )
Set in the dark underbelly of Silicon Valley, The Social Dilemma fuses investigative documentary with enlightening narrative drama. Expert testimony from tech whistle-blowers exposes our disturbing predicament: the services Big Tech provides-search engines, networks, instant information, etc.-are merely the candy that lures us to bite. Once we're hooked and coming back for more, the real commodity they sell is their prowess to influence and manipulate us.
info
Movie: Code 2600 ( 2011 )
As we struggle to comprehend the wide-spanning socio-technical fallout caused by data collection and social networks, our modern culture is trapped in an undercurrent of cyber-attacks, identity theft and privacy invasion. Both enlightening and disturbing, CODE 2600 is a provocative wake-up call for a society caught in the grips of a global technology takeover.
info
Movie: Terms and Conditions May Apply ( 2013 )
A documentary that exposes what corporations and governments learn about people through Internet and cell phone usage, and what can be done about it ... if anything.
info
Movie: Hacking Democracy ( 2006 )
The film the voting machine corporations don't want you to see. HACKING DEMOCRACY follows investigator/grandmother, Bev Harris, and her citizen-activists as they set out to uncover how America counts its votes. Proving the votes can be stolen without a trace culminates in a duel between the Diebold corporation's voting machines and a computer hacker - with America's democracy at stake.
info
Movie: Hackers in Wonderland ( 2000 )
Hackers in Wonderland is a 2000 documentary film, produced and directed by Russell Barnes, about hackers in the United Kingdom.
info
Movie: In the Realm of the Hackers ( 2003 )
In the late 1980s two Melbourne teenage computer hackers known as Electron and Phoenix stole a restricted computer security list and used it to break into some of the world's most classified and supposedly secure computer systems. So fast and widespread was the attack no-one could work out how it had happened, until one of the hackers called the New York Times to brag about it. Ten years after their arrest, this dramatized documentary reveals not only how they did it but why, taking us headlong into the clandestine, risky but intoxicating world of the computer underground.
info
Movie: Kim Dotcom: Caught in the Web ( 2017 )
The story of the most wanted man online
info
Movie: Hackers Wanted ( 2009 )
This film both follows the hacking adventures of famous hacker Adrian Lamo, and uses them as a microcosm for the macrocosm of struggles faced by emerging trends of thought - from the criminal to the philosophical.
info
Movie: Bad Johnson ( 2014 )
A charismatic womanizer receives his comeuppance after his penis mysteriously leaves his body and takes human form.
info
TV Show: CSI: Cyber ( 2015 )
CSI: Cyber is a drama inspired by the advanced technological work of real-life Cyber Psychologist Mary Aiken. Special Agent Avery Ryan heads the Cyber Crime Division of the FBI, a unit at the forefront of solving illegal activities that start in the mind, live online and play out in the real world. While other FBI agents search for criminals in dark homes and alleys, Ryan and her team search the "dark net," a place deep in the bowels of the Web where criminals are anonymous, money is untraceable and where everything is for sale with just a keystroke.
info
Movie: Cam ( 2018 )
In Daniel Goldhaber and Isa Mazzei's paranoid horror thriller "Cam," an erotic webcam performer finds her followers stolen by a doppelganger who hijacks her channel, pushes the sexual envelope further, and otherwise seems determined to destroy her life. Call it identity theft of a possibly supernatural kind.
info
Movie: Eagle Eye ( 2008 )
Jerry and Rachel are two strangers thrown together by a mysterious phone call from a woman they have never met. Threatening their lives and family, she pushes Jerry and Rachel into a series of increasingly dangerous situations, using the technology of everyday life to track and control their every move.
info
Movie: Cloak & Dagger ( 1984 )
A young boy and his imaginary friend end up on the run while in possession of a top-secret spy gadget.
info
Movie: Antitrust ( 2001 )
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
info
Movie: Firewall ( 2006 )
A security specialist is forced into robbing the bank that he's protecting, as a bid to pay off his family's ransom.
info
Movie: Mission: Impossible - Ghost Protocol ( 2011 )
The IMF is shut down when it's implicated in the bombing of the Kremlin, causing Ethan Hunt and his new team to go rogue to clear their organization's name.
info
Movie: Charlie's Angels ( 2000 )
Three women, detectives with a mysterious boss, retrieve stolen voice-ID software, using martial arts, tech skills, and sex appeal.
info
Movie: Office Space ( 1999 )
Three company workers who hate their jobs decide to rebel against their greedy boss.
info
Movie: Breach ( 2007 )
In February, 2001, Robert Hanssen, a senior agent with 25 years in the FBI, is arrested for spying. Jump back two months: Eric O'Neill, a computer specialist who wants to be made an agent is assigned to clerk for Hanssen and to write down everything Hanssen does. O'Neill's told it's an investigation of Hanssen's sexual habits. Within weeks, the crusty Hanssen, a devout Catholic, has warmed to O'Neill, who grows to respect Hanssen. O'Neill's wife resents Hanssen's intrusiveness; the personal and professional stakes get higher. How they catch Hanssen and why he spies become the film's story. Can O'Neill help catch red-handed "the worst spy in history" and hold onto his personal life?
info
Movie: Don't Hang Up ( 2017 )
An evening of drunken prank calls becomes a nightmare for two teenagers when a stranger turns their own game against them, with deadly consequences.
info
Movie: Independence Day ( 1996 )
The aliens are coming and their goal is to invade and destroy Earth. Fighting superior technology, mankind's best weapon is the will to survive.
info
Movie: Nirvana ( 1997 )
Jimi, a successful computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
info
Movie: Ghost in the Shell 2.0 ( 2008 )
A hacker known as the Puppet Master is hunted by a female cyborg cop and her partner. This film is a revised version of Ghost in the Shell (1995).
info
Movie: Deja Vu ( 2006 )
After a ferry is bombed in New Orleans, an A.T.F. agent joins a unique investigation using experimental surveillance technology to find the bomber, but soon finds himself becoming obsessed with one of the victims.
info
Movie: Jumpin' Jack Flash ( 1986 )
An American computer wiz who works at a New York bank is suddenly thrust into the world of international espionage after she inadvertently receives a coded message from a British spy.
info
Movie: eXistenZ ( 1999 )
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
info
Movie: Die Hard 4.0: Hacker Underworld ( 2007 )
Mitnick talks about his activities as a professional hacker. Now he is a security consultant to companies battling hackers like him.
info
Movie: The Lawnmower Man ( 1992 )
A simple man is turned into a genius through the application of computer science.
info
Movie: The Thirteenth Floor ( 1999 )
A computer scientist running a virtual reality simulation of 1937 becomes the primary suspect when his colleague and mentor are murdered.
info
Movie: Foolproof ( 2003 )
Kevin, Sam and Rob are founding members of a theoretical group which pulls off heists. Leo, a gangster, blackmails them into pulling off a real multi-million dollar heist. Now it's up to them to get out alive.
info
Movie: Serenity ( 2005 )
The crew of the ship Serenity try to evade an assassin sent to recapture one of their members who is telepathic.
info
TV Show: Halt and Catch Fire ( 2014 )
Halt and Catch Fire is set roughly one year after IBM all but corners the market with the release of its first major product – the IBM PC. In this fictional drama, a former IBM executive, Joe MacMillan plans to reverse engineer the flagship product of his former employer and forces his current company, Cardiff Electric, into the personal computer race. MacMillan enlists the help of Gordon Clark, a great engineer whose unrealized dreams of creating a revolutionary product have created tension in his marriage to Donna, and Cameron Howe, a volatile prodigy who puts her future in jeopardy to join MacMillan's rogue PC project. Halt and Catch Fire thrives on the spirit of innovation and explores what it's like to stand at the forefront of something world-changing and work towards it, no matter the risk.
info
TV Show: Intelligence ( 2014 )
Intelligence is a dramatic thriller about a high-tech intelligence operative enhanced with a super-computer microchip in his brain. With this implant, Gabriel Vaughn is the first human ever to be connected directly into the worldwide information grid and have complete access to Internet, WiFi, telephone and satellite data. He can hack into any data center and access key Intel in the fight to protect the United States from its enemies. Leading the elite government cyber-security agency created to support him is Director Lillian Strand, a straightforward and efficient boss who oversees the unit's missions. Strand assigns Riley Neal, a Secret Service agent, to protect Gabriel from outside threats, as well as from his appetite for reckless, unpredictable behavior and disregard for protocol. Other skilled members of the Cybercom team include Chris Jameson and Gonzalo "Gonzo" Rodriguez two resourceful federal investigators. The brains behind the design of the chip is Dr. Shenendoah Cassidy, whose son, Nelson is jealous of Gabriel's prominent place in his father's life. As the first supercomputer with a beating heart, Gabriel is the most valuable piece of technology the country has ever created and is the U.S.'s secret weapon.
info
TV Show: Almost Human ( 2013 )
Almost Human is an action-packed police drama set 35 years in the future, when police officers are partnered with highly evolved human-like androids. The year is 2048. Meet John Kennex a cop who survived one of the most catastrophic attacks ever made against the police department. After waking up from a 17-month coma, he can't remember much - except that his partner was killed; his girlfriend, Anna Moore, left him after the attack; and he lost one of his legs and is now outfitted with a highly sophisticated synthetic appendage. Suffering from depression, mental atrophy, trauma-onset OCD, PTSD and the "psychological rejection of his synthetic body part," John returns to work at the behest of longtime ally Captain Sandra Maldonado. By mandate, every cop must partner with a robot. And despite his passionate aversion to androids, John is paired up with a battle-ready MX-43. But he abruptly terminates his partnership after the robot discovers incriminating information about him. So technician Rudy Lom introduces John to Dorian, a discontinued android with unexpected emotional responses. Although such responses were deemed flaws, it is in these "flaws" that John relates to Dorian most. After all, John is part-machine now, and Dorian is part-human. John and Dorian's understanding of each other not only complements them, it connects them. As he adjusts to working with his new partner, John also must learn to get along with his new colleagues, including the eager and somewhat starstruck Detective Valerie Stahl and the distrustful Detective Richard Paul, who does not welcome John back with open arms. Almost Human will follow the week-to-week missions of John and Dorian, as they fight crime across this futuristic landscape, while the mysteries surrounding his attack and the larger mythology of this new world unfold.
info
Movie: Now You See Me ( 2013 )
An F.B.I. Agent and an Interpol Detective track a team of illusionists who pull off bank heists during their performances, and reward their audiences with the money.
info
Movie: Now You See Me 2 ( 2016 )
The Four Horsemen resurface, and are forcibly recruited by a tech genius to pull off their most impossible heist yet.
info
Movie: The Bling Ring ( 2011 )
Teenagers break into celebrities houses to experience the rich life by stealing their belongings.
info
TV Show: Biohackers ( 2020 )
A medical student enters a top German university on a secret mission to uncover a conspiracy linking a family tragedy to a visionary biology professor.
info
TV Show: Unité 42 ( 2017 )
Unité 42 is a detective series, which carries us through the twists and turns of the Internet and emerging technologies. Modern technology allows criminals to act in the real world, all the while shielded by their computer screens. The police's Digital Unit therefore combines field investigations and virtual expeditions using a unique duo: Sam, a cop newly transferred from the homicide bureau (and not particularly tech-savvy), and Billie, a young, feisty policewoman and IT expert. They will need to collaborate, not without difficulty at first, before being able to learn from each other. For behind each case of cyber criminality, first and foremost, lies a human story to be told.