Code 2600

7.2
2011 1 hr 22 min Documentary

CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.

  • Cast:

Similar titles

Freedom Downtime
Freedom Downtime
A feature-length documentary about the Free Kevin movement and the hacker world.
Freedom Downtime 2001
Lo and Behold: Reveries of the Connected World
Lo and Behold: Reveries of the Connected World
Werner Herzog's exploration of the Internet and the connected world.
Lo and Behold: Reveries of the Connected World 2016
The Secret History of Hacking
The Secret History of Hacking
The Secret History of Hacking is a 2001 documentary film that focuses on phreaking, computer hacking and social engineering occurring from the 1970s through to the 1990s. Archive footage concerning the subject matter and (computer generated) graphical imagery specifically created for the film are voiced over with narrative audio commentary, intermixed with commentary from people who in one way or another have been closely involved in these matters.
The Secret History of Hacking 2001
Revolution OS
Revolution OS
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
Revolution OS 2001
In the Realm of the Hackers
In the Realm of the Hackers
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
In the Realm of the Hackers 2003
Hacks
Hacks
Hacks is a 73 minute European documentary exploring what nature of "Hacking" is in a social context. In HACKS, the Austrian multimedia artist Christine Bader examines who is the computer hacker and what moves him or her. Is the hacker a Robin Hood in cyber space or an anarchistic agitator? Bader speaks with Dutch, German and American communication freaks who are working with various kinds of network issues, like making the Internet accessible to individual persons (Felipe Rodriguez, founder of Internet provider Xs4all), creating a meeting place in cyber space, or designing an ultramodern communication network on a ‘multimedia art ship‘. ‘Hackers are not encumbered by technical, financial or organizational problems, they just want to do things‘, Rodriguez thinks. That the technological means ‘just to do things‘ are now freely available is demonstrated by the numerous computer initiatives that whiz past in HACKS.
Hacks 1997
The Internet's Own Boy: The Story of Aaron Swartz
The Internet's Own Boy: The Story of Aaron Swartz
Programming prodigy and information activist Aaron Swartz achieved groundbreaking work in social justice and political organizing. His passion for open access ensnared him in a legal nightmare that ended with the taking of his own life at the age of 26.
The Internet's Own Boy: The Story of Aaron Swartz 2014
Owned
Owned
OWNED presents the 50 year history of the law-spurning tech tradition of hacking. This vibrant movement gained momentum in the 1960s with Captain Crunch and phone phreaking and now includes annual DefCon hacker conventions in Las Vegas (an amusing highlight of these is the fun game "Spot the Fed"). Kevin Mittnick, dubbed by the New York Times "FBI's Most Wanted Cybercriminal" speaks for the first time about the crimes that lead to his conviction. Misanthropic hacker Fuqrag casually wreaks havoc on government websites from a claustrophobic trailer in an anonymous trailer park.
Owned 2002
The KGB, the Computer and Me
The KGB, the Computer and Me
In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
The KGB, the Computer and Me 1990
Hacking Democracy
Hacking Democracy
Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
Hacking Democracy 2006

Reviews

Vashirdfel
2011/12/30

Simply A Masterpiece

... more
MamaGravity
2011/12/31

good back-story, and good acting

... more
Executscan
2012/01/01

Expected more

... more
Abbigail Bush
2012/01/02

what a terribly boring film. I'm sorry but this is absolutely not deserving of best picture and will be forgotten quickly. Entertaining and engaging cinema? No. Nothing performances with flat faces and mistaking silence for subtlety.

... more
samartel178
2012/01/03

A window into a hidden world that has a well established infrastructure, created with the objective to infiltrate our lives, typically to do the user harm.Chilling, causing one to question the role technology plays in our day to day existence. Will the benefits of instant information enabled by social networking give way to the creation of a beast that ends up harming its users? It has already consumed so many of them! Society's dependency on the beast offers fertile ground for those with less than honorable intentions to take advantage of our natural tendencies to trust when we are convinced that something is safe. The film holds your interest and clearly gets the point across that the security of internet users is at risk, whether they know it or not.Definitely worth viewing.

... more
andrewpmathias
2012/01/04

Recently viewed at the Athens Ohio International Film Festival. I come from a IT and CyberSecurity background so the documentary was very intriguing to me and I couldn't wait to see it.I talked with others who viewed the movie and did not have a background in computers and was not very knowledgeable on cyber security. For people who have not seen/heard much about cyber security, the documentary would appear shocking and show a real look into the Cyber security, privacy, and hacking world.With that being said, those people are going to view the movie differently than I would. A mechanic is going to view an automotive movie differently than a school teacher will, for example.The documentary was informative, and left you with a sense of re-considering all the things you do and have done on the internet. It left you concerned about privacy which I assume was the mission of the director.If I had to "knit pick" some things, I would have liked to seen a better explanation into what Social Engineering is. The documentary shows at some points how hackers "con" users into giving passwords by impersonating someone that may work there, however the documentary does not go into explaining that this is social engineering and I would have liked to seen a bit more in depth explanations for viewers who are not aware of this tactic. Usually the weakest link in a network infrastructure are the individuals who run the network or the users that use the network. The human factor is often the weakest and easiest to break. The movie also talks briefly about Kevin Mitnick, calling him the "most famous computer hacker in the world". I understand this isn't a biography on Mitnick, but I would have also liked the mention that almost, if not all of the time Kevin Mitnick used social engineering and conned most people into giving him the information he needed. The director may have been more focused on emphasizing the privacy concerns and explaining about what "hackers" are and was not as concerned with the techniques hackers use to gain access to a network infrastructure. I can see this approach being a possibility.My only other comment I would like to say is that since the documentary was made in 2010 (according to when the trailer was uploaded to YouTube and the end of the trailer), there is some things that have changed in almost two years. At one point the movie talks about how you could be traced/tracked via GPS on smartphones at any given time. While this is mostly true (and a good possibility in our almost corrupt style government), the laws have changed as of January 2012. It now requires a warrant in order for a law enforcement or government agencies to track you via GPS as the court system labels GPS tracking as a form of searching.Otherwise the documentary was very good. The plot was good, and it kept you sucked into the film all the way to the end. You left with a sense of fear about privacy and a new outlook on the cyber world.I have been a subscriber to Bruce Scheier's Crypt-Gram newsletter for many years and I know how much he dislikes the TSA. I bet once you got Bruce talking about the TSA it was hard to get him to stop. :) I would definitely purchase this movie given the opportunity. I would give it about a 8.5/10 if I could.Whether your a technology buff or not, a must see for all!

... more

Watch Free Now