THE

SPRAWL

  •  
  •  
  •  
  • simstimcategories

    documentaries

    the 414s: the original teenage hackers

    A short documentary by Michael T. Vollmann explores the birth, the exploits, and the eventual demise of The 414s - a hacker group active in the early 1980s until the summer of 1983. The documentary offers an interesting look into the early innocent days of hacking, especially just how influential the movie Wargames was to bring mainstream recognition. At the same time, the ease with which The 414s could penetrate even the more sensitive computers and the lack of laws to prosecute the adult members of the group resulted in the series of laws including the infamous Computer Fraud and Abuse Act (CFAA) of 1986. Read more.

    the dutch hacker video

    A video recording produced by the 2600 Magazine showing an attack on a US Army computer during the summer of 1991. Read more.

    hackers wanted

    Hackers Wanted (also known as Can You Hack It?) is a documentary directed and written by Sam Bozzo, Trigger Street Productions and narrated by Kevin Spacey. The documentary explores different subgroups of the hacker culture and how they affect our computerized world. Hackers Wanted includes a wide range of interviews with people from hacker, information security, law enforcement, higher education and journalist communities. It also includes a large segment covering the life, breakins, the arrest and sentencing of Adrian Lamo. Read more.

    hackers - wizards of the electronic age

    Hackers – Wizards of the Electronic Age is a PBS documentary directed by Fabrice Florin filmed at the first Hacker Conference that took place at the Headlands Institute Conference Center in 1984. The conference was organized as a result of Steven Levy's book 'Hackers – Heroes of the Computer Revolution' published the same year. The documentary explores the cultural phenomenon that helped launch a multi-billion dollar computer industry and changed the way people live, communicate, work and play. Read more.

    unauthorized access

    Unauthorized Access is a documentary produced by Annaliza Savage in 1994. Shot in 15 cities and 4 countries, this documentary offers an impressive array of topics dealing with hacking culture. Read more.

    cybercops

    Cybercops is a Channel 4 UK documentary first aired on December 21st 2000. The documentary explores threats to the e-commerce at the turn of the century and the work done by various private companies and law enforcement agencies to defend it and to prosecute the offenders. Read more.

    new york city hackers

    New York City Hackers is an independent documentary by Stig-Lennart Sorensen released in the year 2000. Most of the filming occurs in in New York at the H2K conference, 2600 meeting and an Off the Hook radio show. There is also a coverage of the original MIT hackers from the TMRC club. Read more.

    hackers 95

    Hackers 95 is an independent documentary by Phone-E and RF Burns shot during the summer of 1995. The documentary covers hacker happenings during that summer including Summercon and Defcon III. There are plenty of interviews and random clips from these two conferences. The documentary also includes a separate segment on Area 51 as well as a Secret Service press release on Operation Cybersnare. Read more.

    hacks

    Hacks is an English and German language documentary by Christine Bader. It was shot over a period of four years, starting in 1993 and released in 1997. This documentary deals with social aspects of hacking by covering not only the more traditional “computer” hacks, but expanding the definition to the realms of society, politics, environment, and art. Read more.

    web warriors

    A CBC documentary Web Warriors begins by speculating the link between the release of Blaster worm and massive power blackouts that occurred shortly after. Following this assumption, the documentary explores how computer viruses can be used to disrupt national infrastructures. After a brief coverage of Defcon conference, there is an interview with MafiaBoy. Next there is an interesting twist, where we follow Donnie "a career hacker" trying and ultimately failing to track down the programmer behind the Microsoft Word virus (Sobig) in Moscow, Russia. The documentary concludes by discussing the threat of information warfare coming from Russia and China. Read more.

    bbs: the documentary

    A historical documentary on the subject of BBSs and the underground culture of the 1980s. The documentary includes more than 200 interviews with some of the most influential figures of the BBS era. It is split up into 8 sections ranging from BBS Artscene and FidoNet to Hacking/Phreaking/Anarchy/Cracking underground. Read more.

    in the realm of the hackers

    A documentary about Australian hacker scene in the 1980s. It primarily focuses on the exploits of two hackers going by the names of Electron and Phoenix. NASA's WANK work infection is covered in great length. The documentary also covers the introduction of first computer laws in Australia and subsequent arrests of Electron and Phoenix. Read more.

    hippies from hell

    This documentary covers Dutch hackers namely organizations such as xs4all, Hippies from Hell, HackTic, and TOOL lockpicking club. Read more.

    the kgb, the computer and me

    Based on Clifford Stoll's book "The Cuckoo's Egg", this documentary re-enacts a story of a Lawrence Lab astronomer and his quest to track down the reason behind a minuscule discrepancy in accounting. Clifford Stoll plays as himself. Read more.

    freedom downtime

    A revealing documentary about two high profile hacker cases: Mark Abene and Kevin Mitnick. The documentary includes interviews with a number of guest speakers including Bruce Sterling, Lewis Depayne, John Markoff, Jeff Moss, Mike Roadancer, Bernie S., and many others. This film is directed by Emmanuel Goldstein of 2600. Read more.

    hack attack

    A 1994 Yorkshire Television Production for Discovery Channel documentary - Hacker Attack, is a well balanced account of the hacker, security, and electronic crime worlds in late 80s and early 90s. It begins by featuring Mark Abene incarcerated in Schuylkill talking about his views on hacking and the story of MoD. Emmanuel Goldstein is displayed throughout the documentary talking about the hacker community during 2600 meetings and on the Off the Hook radio show. Next 'Hacker Attack' turns to the darker side of hacking when we jump into unmarked NYPD surveillance van to track down cloned cellular phones. There is an extensive coverage of credit card fraud, high tech robbery, and industrial espionage. At last we can watch Winn Schwartau and Dan Farmer talk about threats to our financial and military infrastructures. Throughout the documentary, there are snippets of anonymous hackers breaking into various computer systems. Read more.

    hackers: outlaws and angels

    A Discovery Channel documentary on the outlaws and angels of the Internet covers a wide range of white hat hackers and computer security industry representatives. In this documentary you will learn how the infamous Captain Zap changed the clocks of the telephone system to give discount rates to all subscribers. You will also be exposed to computer forensics shops set up by NYPD and Kroll Associates, as well as security monitoring centers from ISS. Read more.

    solar sunrise

    FBI made documentary about a series of attacks targeting military computers in February 1998. The documentary covers how Ehud Tenenbaum aka "The Analyzer" and two Californians were identified and later prosecuted for these attacks. Read more.

    hackers in wonderland

    A great documentary on UK and US Hackers. The film interviews a number of prominent UK hackers including ColdFire, Phobos, cyberjunkie. Next it goes across the Atlantic ocean to cover Defcon and returns back to UK to interview hacker group called MOLOCH. Read more.

    cyberwars

    Documentary on the Hacker underground in Asia offers revealing interviews with many prominent hackers from China, Philippines, and South Korea. The documentary begins by interviewing hackers turned security professionals similar to their western counterparts. Next it proceeds to cover more unique attributes of the region. A large segment of this film is dedicated to hacktivist/communist groups in China launching attacks against US targets. At last the documentary concludes with a cautionary tale of hackers working for terrorist groups. Read more.

    walk on the wild side

    A documentary on the UK underground scene. Read more.

    hackers: computer outlaws

    A TLC documentary about computer hackers. It covers some of the most famous hackers such as Steve Wozniak, John Draper, and Kevin Mitnick. This documentary offers a historical perspective on hackers advancing from the age of telephones with Captain Crunch to the age of computers with Woz and at last to the age of information with Kevin Mitnick. Read more.

    the hacktivists

    A documentary about electronic civil disobedience or hacktivism. Read more.

    codes makers and breakers

    The film begins with an interview with a German hacker, Tim. He describes what drives hackers to explore. Next film alarming lack of opportunities for hackers in Italy, concept of Electronic Disobedience in US, and again back to Germany and Chaos Communication Congress. Read more.

    disinformation

    Great documentary featuring CDC (Cult of the Dead Cow). It offers a revealing view of security industry and hacker culture in the late 90s. There is also plenty of discussion on Back Orifice and its impact on the security industry. Read more.

    television

    the day of the technopath

    A documentary on the emerging threats to the computer security in the 1980s. The documentary explores popular viruses and computer intrusions of the era. Read more.

    american greed - cybercrime

    American Greed - Cybercrime episode about carding and the crimes of Max Ray Butler. Read more.

    tiger team - 24 karat caper

    In the second episode of CourtTV's original television series Tiger Team a team of security professionals break into a jeweler office serving Hollywood's elite. Read more.

    tiger team - the car dealership takedown

    In the pilot episode of CourtTV's original television series Tiger Team a team of security professionals steal a car from a dealership. Read more.

    mtv - i'm a hacker

    MTV featured "I'm a Hacker" on its True Life series. A number of teen hackers were featured discussing their exploits. After the episode aired in 1999, one of the filmed hackers (shamrock) revealed that he intentionally misrepresented his exploits in order to hoax MTV. Read more.

    net cafe - hackers

    The 1996 episode of Net Cafe we look at the hacker culture and their influence on the early growth of the internet. Guests include Dan Farmer, author of SATAN and COPS; Eliaz Levi (aka Aleph 1), webmaster of underground.org and Bugtraq; also "Omega" and "White Knight" from Cult of the Dead Cow. Read more.

    computer chronicles - computer security

    A 1984 episode of Computer Chronicles covers computer security concerns of the time. This episode covers a simple database dialup, WarGames, and a few security tips. Read more.

    unsolved mysteries - kevin poulsen

    Infamous episode of unsolved mysteries featuring Keving Poulsen. Strangely all telephone circuits going to the show studio with potential tips went dead when this show first aired. This show led to eventual arrest of Kevin Poulsen near Hughes Market. Read more.

    digital desperado

    CNN Time interview with Justin Petersen aka Agent Steal. Justin was an FBI informant. He helped the FBI to build criminal cases against Kevin Poulsen and later Kevin Mitnick. He caused a controversy when the FBI turned a blind eye on Agent Steal's continued hacking and credit card fraud activities even when working as an informant. Eventually he became a fugitive when his former associate, Ron Austin, sent implicating information to the FBI. Read more.

    the code room - breaking into vegas

    This episode of The Code Room TV series shows a team of well known security experts in a fictional account of casino hacking. SQL Injection and Session Hijacking attacks are illustrated. Read more.

    π
    ///\oo/\\\