A secret service agent, Jennifer Marsh, gets caught in a very personal and deadly cat-and-mouse game with a serial killer who knows that people (being what they are - both curious and drawn to the dark side of things) will log onto an "untraceable" website where he conducts violent and painful murders LIVE on the net. The more people who log on and enter the website, the quicker and more violently the victim dies. Written by McCormack |
Sneakers
Martin Bishop is the head of a group of experts who specialise in
testing security systems. When he is blackmailed by Government agents
into stealing a top secret black box, the team find themselves embroiled
in a game of danger and intrigue. After they recover the box, they
discover that it has the capability to decode all existing encryption
systems around the world, and that the agents who hired them didn't work
for the Government after all... Written by
Graeme Roy |
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that... Written by Jaromir Król |
War Games
A young computer whizz kid accidentally connects into a top secret
super-computer which has complete control over the U.S. nuclear arsenal.
It challenges him to a game between America and Russia, and he
innocently starts the countdown to World War 3. Can he convince the
computer he wanted to play a game and not the real thing ?
Written by
Colin Tinto |
Eagle Eye
Anti Trust
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication's system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems. Written by Jordan Thornsburg |
The Score
Nick Wells, a professional criminal, decides to leave the business for good, since he nearly got caught on his last job. His plan is to live in peace with his girl Diane, running his Montreal jazz club. Soon afterward, Max, his good friend and financial partner, comes along with an offer Nick can't refuse: A historical and priceless French scepter has been discovered while being smuggled into the country. It is now under massive surveillance in the Montreal Customs House, and soon to be returned to France. Nick has to team up with Max's man inside, the young, talented and aggressive thief Jack Teller to get the precious item. Only one question remains: Who will trick whom out of their share? Written by JungleBunny |
Sword Fish
When the DEA shut down its dummy corporation operation codenamed
SWORDFISH in 1986, they had generated $400 million which they let sit
around; fifteen years of compound interest has swelled it to $9.5
billion. A covert counter-terrorist unit called Black Cell, headed by
the duplicitious and suave Gabriel Shear, wants the money to help
finance their raise-the-stakes vengeance war against international
terrorism, but it's all locked away behind super-encryption. He brings
in convicted hacker Stanley Jobson, who only wants to see his daughter
Holly again but can't afford the legal fees, to slice into the
government mainframes and get the money. Written by
Jeff Cross |
Hackers
A young boy is arrested by the US Secret Service for writing a computer
virus and is banned from using a computer until his 18th birthday. Years
later, he and his new-found friends discover a plot to unleash a
dangerous computer virus, but they must use their computer skills to
find the evidence while being pursued by the Secret Service and the evil
computer genius behind the virus. Written by
Alexander Lum |