Nicholas Hathaway, a furloughed convict, and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta. As Hathaway closes in, the stakes become personal as he discovers that the attack on a Chinese nuclear power plant was just the...
A gruesome serial killer is terrorizing London while brilliant but disgraced detective John Luther sits behind bars. Haunted by his failure to capture the cyber psychopath who now taunts him, Luther decides to break out of prison to finish the job by any means necessary.
In Seattle, detective Quentin Conners is unfairly suspended and his partner Jason York leaves the police force after a tragic shooting on Pearl Street Bridge, when the hostage and the criminal die. During a bank heist with a hostage situation, Conners is assigned in charge of the operation with the...
In the not so distant future, a team of white collar criminals are enlisted by the Federal government to thwart a cyber-attack that threatens to bankrupt the United States of America.
Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer...
Their crimes earned them the nickname Bitcoin Bonnie and Clyde — and the story only gets weirder in this documentary about the most lucrative heist ever.
An army man takes over his cop girlfriend's investigation of a multiple robberies committed by the same team to recover his late father's Paramvir Chakra medal.
A mysterious young man moves to a new town to work in a low level job in an isolated hotel, run by an unsympathetic bully who has deadly secrets of his own.
Everyone knows something like this is happening. But this is the only experiment to fully demonstrate what excessive openness on the internet means. The filmmaking couple hired youthful-looking (but over 18) actresses to pretend to be prepubescent girls and communicate with strangers who approached...
Marcus King, an old school gangster, a crime lord, has left behind old school crime. He has manoeuvred his business into the leafy lanes of the suburbs and now, in place of pimps and dealers, his team consists of the best graduate geeks that money can bribe. No brothels, no casinos and no drugs -...
Few of the country's major cyber networks are under attack by a ruthless group of International cyber criminals. Three young minds come forward and join the country's cyber security division to fight the attack. But they get indulged in bigger trouble as they now have to face more evil forces from...
In advance of the 2020 Presidential election, Kill Chain: The Cyber War on America's Elections takes a deep dive into the weaknesses of today's election technology, investigating the startling vulnerabilities in America's voting systems and the alarming risks they pose to our democracy.
Cyberspace is more insecure than ever as hackers exploit human error and technical vulnerability to hold it to ransom for their personal data. Companies, public bodies, schools and individuals have all become victims of cyber attacks. In this revealing documentary, victims tell how internet...
A thought provoking documentary feature film providing a comprehensive exploration of the evolution of signals intelligence over the past century. Whether you're intrigued by the secretive world of intelligence agencies or concerned about the implications of digital surveillance, this film will...
The Trick tells the story of world-renowned Professor Philip Jones; Director of Climate Research at the University of East Anglia, who back in 2009 found himself at the eye of an international media storm and the victim of cyberterrorism. With time running out against an unseen enemy, The Trick...
11 of the world's top cyber security experts gather to explore and answer questions about the dark web. What is the dark web? What can you find there? And most important of all, how can business owners take the proper steps to reduce their chances of becoming victims of cybercrime?