Breach of Trust
For opposite reasons, an undercover federal agent and a small time hood join forces to take on a union of drug lords and dirty cops.
The Millennium Thriller
A convicted murderer holds the world hostage with a year 2000 virus in all the world's major computer systems.
For opposite reasons, an undercover federal agent and a small time hood join forces to take on a union of drug lords and dirty cops.
F/X man Rollie Tyler is now a toymaker. Mike, the ex-husband of his girlfriend Kim, is a cop. He asks Rollie to help catch a killer. The operation goes well until some unknown man kills both the killer and Mike. Mike's boss, Silak says it was the killer who killed Mike but Rollie knows it wasn't. Obviously, Silak is involved with Mike's death, so he calls on Leo McCarthy, the cop from the last movie, who is now a P.I., for help and they discover it's not just Silak they have to worry about.
High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his girlfriend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
Tom Masterick, a dock worker, is wrongfully convicted of a murder charge. His death sentence is commuted to a long prison term. When released as an old man, he vows to find the real killer.
Set in a near-future, militarized world marked by closed borders, virtual labor and a global digital network that joins minds and experiences, three strangers risk their lives to connect with each other and break the barriers of technology.
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.
Terry works for a bank, and uses computers to communicate with clients all over the world. One day, she gets a strange coded message from an unknown source. After decoding the message, Terry becomes embroiled in an espionage ring. People are killed, and Terry is chased. Throughout, she remains in contact with this mysterious person, who needs Terry's help save his life.
When Ethan Hunt, the leader of a crack espionage team whose perilous operation has gone awry with no explanation, discovers that a mole has penetrated the CIA, he's surprised to learn that he's the prime suspect. To clear his name, Hunt now must ferret out the real double agent and, in the process, even the score.
With computer genius Luther Stickell at his side and a beautiful thief on his mind, agent Ethan Hunt races across Australia and Spain to stop a former IMF agent from unleashing a genetically engineered biological weapon called Chimera. This mission, should Hunt choose to accept it, plunges him into the center of an international crisis of terrifying magnitude.
Retired from active duty, and training recruits for the Impossible Mission Force, agent Ethan Hunt faces the toughest foe of his career: Owen Davian, an international broker of arms and information, who's as cunning as he is ruthless. Davian emerges to threaten Hunt and all that he holds dear – including the woman Hunt loves.
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
The U.S. has handed over control of its nuclear defense system to the Colossus supercomputer designed by scientist Dr. Charles Forbin. It soon becomes clear, that the now-sentient Colossus is far more intelligent than its creator realized—with the fate of the world hanging in the balance.
Computer hacker Will Farmer engages a government super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain software glitches have in turn made him become paranoid.
Newspaper reporter Michael Ward plunges into a nightmare of guilt, fearing that his "evidence" has sentenced the wrong man to death.
Two technicians battle a vengeful spirit that has infected their stolen military software.
Five friends are picked up as suspects in a political murder, and the cops detain one among them to save face in front of the media. To save him, the guy’s friend and a straightforward cop try to track down the real killer.
If you were a brilliant young scientist diagnosed with only months to live, what choices would you make? To have faith that you were taken early for a reason and go quietly, or to use cryogenics to hope you could be cured someday in the future, or to download your consciousness into computer memory where you could still continue to interact with the ones you love?
A hacker discovers a Zoom file on a local Police server and leaks it to the public. The contents of the file have been kept under wraps to avoid further public outcry and protests. What may seem to be your typical weekly office Zoom call turns into a missing employee and a "who done it" mystery.
It's millennium eve. At the stroke of midnight the Y2K computer bug kicks in, causing widespread chaos in the US.