IIZPv5Xa

I can play dirty, but you can’t, it’s in the rule book

Print Friendly, PDF & Email
“I can play dirty, but you can't, it's in the rule book”

-From HERE. United States administrator when asked why China cannot adopt the same policies that the United States routinely uses.

You know, I like Ron Unz. His site “UNZ” often has stuff; opinion and news that you will not find anywhere else. But Lordy! Is it full of racism! It drives me insane, and it’s really bothersome. I get it, you know. I understand the why. But I really don’t want to read about Jews this, and blacks that! Please.

I HATE it!

When The Garden of the Saker was up, I enjoyed it as well. But the comments were so filled with racism and hate that I just stopped reading them. Then Andre quit. He left the stage, and the Saker is no longer.

Sigh.

Life moves on…

Call me a wimp, if you will. But I want to live a sheltered life. One free of racism, and harsh opinions about broad brush-strokes about someones culture, society, color of skin, or tattoos. I don’t want to read that junk.

It gives me a headache. Ugh!

Especially if it is a ‘Bot, a mindless 11-year old, or a government paid troll. The United States is too fucked up right now.

Ugh!

Now… on to bigger and better things. You all know that I have been trying to hunt down this mysterious movie about a girl who starts work at a software campus, only to discover that she is a computer program. I’m still looking. Haven’t found it yet.

Here’s my list so far.

THE LIST

1954 — Tobor the Great — This science fiction film tells the story of a young boy, his grandfather, and his best friend — who just so happens to be a robot — as they work together to stay safe from the group of communist agents on their tail. Starring Charles Drake and Karin Booth.

1956 — 1984 — In a dystopian world, society is closely monitored by Big Brother, an omnipotent force for government surveillance. One man breaks the rules by falling in love and must pay a heavy price. Based on the novel by George Orwell.

1965 — Alphaville — A secret agent goes to the futuristic city of Alphaville to find a missing person and eventually stop the ruling dictator, professor von Braun, and his sentient computer system, Alpha 60.

1967 — Billion Dollar Brain — In this espionage thriller, Michael Caine stars as Harry Palmer, a former secret agent who unexpectedly becomes involved with a frenzied Texas oil baron (Ed Begley) working to eradicate Communism with a supercomputer.

1968 —  2001: A Space Odyssey — A group of astronauts is sent on a mysterious mission alongside the AI supercomputer H.A.L. 9000. What follows is an intense battle between man and machine, resulting in a mystifying journey through space and time.

1968 — Hot Millions — Peter Ustinov plays an embezzler who bypasses a mainframe computer’s security system to pay invoices from his fictitious companies.

1969 — The Computer Wore Tennis Shoes — Dexter Reilly (Kurt Russell) fixes a computer during an electrical storm and gets shocked. The computer’s brain has fused with his, and he’s a genius.

1969 — The Italian Job — A robber (Michael Caine) recently released from prison gets help from a group of Britain’s most infamous computer hackers to steal gold bullion from underneath the noses of the Italian police and mafia. One of the film’s most famous scenes is a massive traffic jam caused by hacking the city’s traffic control computer.

1970 — Colossus: The Forbin Project — Massive computer systems from the U.S. — “Colossus” — and Russia — “Guardian” — connect to each other. Nuclear war is threatened.

1971 — Paper Man — Five bored college students take advantage of a computer glitch and create a fictitious person, but the prank backfires.

1971 — THX 1138 — Set in a futuristic, state-controlled environment, this film follows a man and a woman, named THX 1138 and LUH 3417, respectively, as they instill a revolution upon their strictly-governed and closely-watched society.

1973 — Westworld — For one thousand dollars a day, guests of a futuristic theme park can visit recreations of different time periods and experience their wildest fantasies with lifelike androids. Pals Blane (James Brolin) and Martin (Richard Benjamin) have chosen to visit Westworld and walk the lawless streets of the American frontier. Their fantasies turn to terror, however, when a duel with a robotic gunslinger (Yul Brynner) goes terribly wrong.

1974 — The Conversation — Gene Hackman plays a surveillance expert using high-tech equipment (back in the day) to spy on a couple he fears may be in danger. Nominated for three Oscars.

1975 — Three Days of the Condor — CIA codebreaker Robert Redford tries to figure out why his own agency wants him dead.

1977 — Demon Seed — This science fiction horror film tells the story of Proteus IV, a sentient supercomputer made from artificial intelligence, who goes to incredible and dangerous lengths to attempt to become human.

1982 — Tron — One of the earliest hacking films. A computer engineer learns an executive at his company has been stealing his work and is launched into the world of virtual reality.

1983 — Brainstorm — Researchers Michael Brace (Christopher Walken) and Lillian Reynolds (Louise Fletcher) develop a system that allows the recording and playback of a person’s thoughts onto videotape. The project spins out of control when the technology is used to explore intense sexual and near-death experiences.

1983 — Superman III — Richard Pryor plays Gus Gorman, a hacker who is caught skimming from his company’s payroll through a program he developed and is then blackmailed to help turn Superman evil.

1983 — WarGames — High school student (Matthew Broderick) hacks into a military supercomputer in this classic and activates the U.S. nuclear arsenal, at a time when most people didn’t know what hacking was.

1984 — Cloak and Dagger — When 11-year-old Davey sees the murder of an FBI agent, the dying man hands him an Atari video game cartridge with military secrets. With Dabney Coleman.

1984 — Electric Dreams — Set in San Francisco, this science fiction romantic comedy is about a love triangle between an architect, a cellist, and a personal computer.

1984 — Hide and Seek — A young computer enthusiast develops a kind of artificial intelligence program named “Gregory P1.” To ensure its survival, the computer contacts other computers and begins to fight the humans. It also hooks into the mainframe computer of a nuclear power plant.

1985 — Brazil — When Sam Lowry (Jonathan Pryce) gets involved in a case of mistaken identity, he’s labeled as an enemy of the state by the powerful, technology-dependent bureaucracy controlling his society. On a quest to rectify the wrong, Sam meets the woman of his dreams, but, unbeknownst to him, she may be a terrorist.

1985 — Hackers: Wizards of the Electronic Age — This documentary about the hacker community includes footage of interviews with some of the programmers that created the PC revolution, including Steve Wozniak, co-founder of Apple. Filmed at a hacker conference held in Sausalito, Calif.

1985 — Max Headroom — This science fiction drama tells the origin story of its eponymous character, Max Headroom, an artificially intelligent, computer-generated television host. This film was later repurposed to serve as the pilot for a British series of the same name.

1985 — Prime Risk — Computer-savvy lovers scam Automated Teller Machines and plot to sink the Federal Reserve.

1985 — Real Genius — Two teenagers working on a laser project at a prestigious engineering college begin to question the true purpose of their work when the government steps in with intentions to use their project as a military-grade weapon. Starring Val Kilmer and Gabriel Jarret.

1985 — Weird Science — Teenagers Gary and Wyatt design their ideal woman on a computer, and a freak electrical accident brings her to life in the form of the lovely, superhuman Lisa.

1986 — Ferris Bueller’s Day Off — A high school student (Matthew Broderick) who wants the day off breaks into his school’s computer system and changes grades and attendance records.

1987 — Bellman and True — Computer expert Hiller (Bernard Hill) finds himself unemployed and is bribed into stealing confidential computer information for a group of bank robbers. He gets the job done but makes the mistake of thinking he’s seen the last of the criminals; little does Hiller know they’ve tracked him and his son to London.

1987 — Terminal Entry — Picking up where War Games left off, this film tells the story of a group of high school students who unknowingly hack into the network of a dangerous terrorist organization under the impression they’re simply playing a game — but the acts of terror caused by their actions are no joke.

1988 — Defense Play — After her father is mysteriously killed while working on a project for the U.S. Air Force, Karen (Susan Ursitti) joins forces with Scott (David Oliver), and together, the two computer-savvy students open their own investigation into the murder.

1990 — Circuitry Man — In a dystopian society, narcotics come in the form of a microchip, heavily sought after by Earth’s remaining inhabitants — two of whom are a bio-android and a female bodyguard who, after stealing said microchips, find themselves being tracked by a dangerous criminal.

1990 — Demolition Man — The year is 2032 in San Angeles, a utopian city created by the citizens of Southern California. When a violent criminal breaks out and threatens the societal peace, John Spartan (Sylvester Stallone) is awoken from 36 years spent cryogenically frozen in ice to capture the fugitive, but he becomes distracted when forced to adapt to the future society made up of voice-controlled devices, autonomous connected cars, and more.

1990 — Hardware — Starring Dylan McDermott, this film — set in a post-apocalyptic America — follows a former soldier who unknowingly gifts his girlfriend spare parts from a self-rebuilding, murderous cyborg.

1990 — The KGB, The Computer and Me — In 1986, Clifford Stoll, an astronomer turned computer scientist, began working on a computer system at the Lawrence Berkeley Laboratory. At the time, two accounting programs were responsible for charging people for machine use. When Stoll discovered a 75-cent discrepancy in the normally flawless programs, he began to investigate and eventually uncovered an undocumented user named “Hunter.” As he dug deeper, he realized that Hunter had hacked into the system and installed new programs. His investigation eventually led him and U.S. intelligence to the realization that Hunter was a computer programmer who worked for the KGB.

1991 — Terminator 2: Judgment Day — A cyborg protects Sarah Connor’s teenage son John from another cyborg intent on killing him.

1992 — The Lawnmower Man —Resembling “Frankenstein,” this science fiction horror film tells the story of a scientist (Pierce Brosnan) and his experiment: a once-simple man (Jeff Fahey) who, through the power of mind-enhancing medication and computer-simulated training sessions, becomes a genius. But it isn’t long before this experiment spirals out of control.

1992 — Single White Female — A woman (played by Bridget Fonda) advertises for a roommate. She soon discovers that her new roommate is a hacker (Jennifer Jason Leigh) intent on stealing her identity.

1992 — Sneakers — A Hacker (Robert Redford) leads a team of experts who test the security of San Francisco companies. They discover a black box that can crack any encryption, posing a huge threat if it lands in the wrong hands… including rogue NSA agents.

1993 — American Cyborg: Steel Warrior — When a fleet of murderous cyborgs threatens the remaining life on Earth after a nuclear war, two of the last humans join forces to save the future of their race. A nail-biting battle ensues.

1993 — Frauds — An insurance investigator (Phil Collins) uses games and gimmicks to manipulate the lives of others, including a couple who make an unusual insurance claim. He approves the claim but makes bizarre demands as ransom.

1993 — Ghost in the Machine — A computer-powered MRI machine extracts a serial murderer’s soul, and becomes a deadly technological weapon.

1993 — Jurassic Park — Seinfeld’s nemesis “Newman” (Dennis Nery) plays an IT guy who hacks his way into a coup that involves him stealing dinosaur DNA to sell to the highest bidder.

1993 — Knights — Set in a futuristic world devastated by war, this science fiction thriller tells the story of Gabriel (Kris Kristofferson), a cyborg, and Nea (Kathy Long), a young girl, who — despite being an unlikely duo — team up against their planet’s dominant, blood-thirsty army of cyborgs to save the human race.

1994 — Disclosure — Starring Demi Moore and Michael Douglas, this thriller balances both the virtual and physical worlds, telling the story of a senior executive at a technology company who’s on track for a big promotion — that is, until his fate falls into the hands of his ex-girlfriend, who is determined to revive their relationship … with or without consent.  

1994 — Plughead Rewired: Circuitry Man II — The sequel to 1990’s Circuitry Man follows a female FBI agent and an android named Danner as they track down Plughead — a notorious criminal known for making and selling microchips that promise an extended life to those who take them.

1995 — Ghost in the Shell — In this animated Japanese sci-fi epic, a cyborg policewoman and her partner hunt a cybercriminal called the Puppet Master, who hacks into the brains of cyborgs to get information and use it to commit crimes.  (Scarlett Johansson stars in a 2017 live-action remake.)

1995 — GoldenEye — James Bond tries to stop a Russian crime syndicate from using a stolen space-based weapons program and falls into the clutches of an evil genius who plans to rule Earth from cyberspace.

1995 — Hackers —A teenage hacker is back on the scene seven years after being banned from computers for writing a virus that caused the biggest stock exchange crash in history. He and his friends must prove that a sinister superhacker is framing them for a plot to embezzle funds from a large oil company with a computer worm. With Angelina Jolie.

1995 — Johnny Mnemonic — A computer chip implanted in his brain allows a human data trafficker (Keanu Reeves) to securely store and transport data too sensitive for regular computer networks. When he gets a valuable package that exceeds the chip’s storage capacity, the mnemonic courier must deliver the data within 24 hours or die. Assassins are intent on helping him do just that.

1995 — Judge Dredd — Judge Dredd (Sylvester Stallone) is sent to a penal colony for a murder he didn’t commit. On his way there, he gets an unexpected sidekick when he reunites with Herman “Fergee” Ferguson (Rob Schneider), a hacker he previously busted for destruction of property.

1995 — The Net — A computer programmer (Sandra Bullock) who lives a reclusive life is looking forward to time off when she becomes aware of a conspiracy. Her vacation turns into a nightmare when someone tries to kill her and her identity is stolen. She must prove who she is while trying to figure out why someone wants her dead.

1995 — Under Siege 2: Dark Territory — Steven Seagal returns as ex-Navy SEAL Casey Ryback in this sequel to Under Siege, which finds Ryback and his niece Sarah (Katherine Heigl) on a train headed from Denver to Los Angeles. When the train is hijacked by a psychotic computer genius and his fellow terrorist, who need it for their plot to take control of a top-secret satellite, Ryback enlists the help of a train porter (Morris Chestnut) to foil their plan.

1996 — Independence Day — In an epic fight against an alien race, computer expert David Levinson (Jeff Goldblum) achieves a crucial win when he hacks into the fleet of spaceships coming toward Earth, infecting them with a virus and putting a stop to the looming alien invasion.

1996 — Lawnmower Man 2: Beyond Cyberspace — On a mission for world domination, Jobe (Matt Frewer), a virtual reality-based consciousness, is determined to hack into all the world’s computers, but his plans are thwarted by Peter (Austin O’Brien) and Benjamin (Patrick Bergin), whose unfaltering passion to save the world — and cyberspace — inspires an all-out war.

1996 — Omega Doom — In a world dominated by violent cyborgs, there is little-to-no hope for what’s left of humanity … that is, until one such cyborg — Omega Doom — is struck in the head, causing his wires to short and recircut, leading to a newfound interest in defeating his own kind.

1997 — Masterminds — The new security chief at a prestigious private school plans to even a score by kidnapping several of the wealthy students and holding them for ransom. A teenage computer hacker, expelled from the school for pulling pranks, thwarts his plans.

1998 — 23 — After an orphan invests some of his inheritance in a home computer, he begins discussing conspiracy theories inspired by a novel on bulletin boards. He’s soon hacking military and government computers with a friend. Based on a true story.

1998 — Enemy of the State — A lawyer (Will Smith) isn’t aware that a videotape in his possession proves a congressman was murdered for opposing surveillance legislation. When he becomes the target of a corrupt NSA official and his life begins to fall apart, he enlists the help of an ex-intelligence operative (Gene Hackman).

1998 — Mercury Rising (Code Mercury) — A renegade FBI agent (Bruce Willis) must protect a 9-year-old autistic boy who has cracked encrypted government code that was supposed to be unbreakable.

1998 — Pi — Is there a mathematical key that can unlock the universal patterns in nature? If found, can that key predict anything — even the stock market? A brilliant, obsessed, and paranoid mathematician who barricades himself in a room filled with computer equipment intends to find that key, but might go mad while doing so.

1998 — Webmaster — In this Danish sci-fi thriller, a powerful crime leader hires a hacker to monitor the security of his computer operations. When someone else hacks into the database, the webmaster must go to extremes to find him, or die within 35 hours.

1999 — Entrapment — An undercover art investigator (Catherine Zeta-Jones) is intent on tracking down and capturing a renowned thief (Sean Connery). They end up attempting a heist together.

1999 — eXistenZ — Computer programmer Allegra Geller’s (Jennifer Jason Leigh) latest creation, the hyper-realistic virtual reality game eXistenZ, takes a dangerous turn when a crazed assassin becomes intent on destroying it. With help from Ted Pikul (Jude Law), Allegra sets out to save the game, and her life.

1999 — The Matrix — In a dystopian future, humanity is unknowingly trapped inside the Matrix, a simulated reality created by intelligent machines to distract humans while they use their bodies as an energy source. A computer programmer / hacker known as Neo (Keanu Reeves) discovers the truth and joins forces with other rebels to free humankind.

1999 — Office Space —They’re supposed to be part of one big happy family, but three computer programmers hate their jobs and their boss. They concoct a scheme to embezzle small amounts of money from the high-tech company that employs them, but a mistake results in a bigger theft than planned. With Jennifer Anniston.

1999 — NetForce — In the year 2005, NetForce, a division of the FBI, is tasked with protecting the Net from terrorism. A loophole in a browser allows someone to gain control of the Internet and all the information it holds. Now the commander of NetForce must stop him, as he also tracks down a killer.

1999 — Pirates of Silicon Valley — This biographical drama about the development of the personal computer and the rivalry between Apple Computer and Microsoft spans the years 1971 – 1997. Noah Wyle portrays Steve Jobs and Anthony Michael Hall stars as Bill Gates.

1999 — The Thirteenth Floor — This science-fiction neo-noir film begins in 1999 in Los Angeles when the inventor of a newly completed virtual reality simulation of the city in 1937 is murdered. A computer scientist he has mentored (played by Craig Bierko) becomes the primary suspect and begins to doubt his own innocence because of the evidence against him. He eventually enters the simulation to unravel the truth and realizes nothing is as it seems.

2000 — Takedown — Also known as “Track Down,” the controversial movie version of the manhunt for legendary hacker Kevin Mitnick is based on the book by Tsutomu Shimomura, “Takedown: The Pursuit and Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw – By The Man Who Did It.”

2001 — A.I. Artificial Intelligence —  In this Pinocchio-esque tale, David (Haley Joel Osment) — a sentient, artificially-created robot — wishes to become a real boy, longing for a stronger connection with his human mother.

2001 — Antitrust — When a college graduate (Ryan Phillippe) gets a job writing software at a multi-billion dollar computer company, he has no idea that the founder (Tim Robbins) and new mentor is hiding dark secrets. Is there anyone he can trust?

2001 — The Code — This documentary covers the first decade of GNU/Linux and features some of the most influential people of the free software (FOSS) movement.

2001 — Freedom Downtime — This documentary covers the plight of convicted computer hacker Kevin Mitnick, from the standpoint that Miramax misrepresented him in the film “Takedown.” It includes the story of several computer enthusiasts who confront Miramax reps about their discontent with aspects of the script, including the film’s ending.

2001 — Revolution OS — The history of GNU, Linux, and the open source and free software movements is traced in this documentary. It features several interviews with prominent hackers and entrepreneurs.

2001 — The Score — An aging safecracker (Robert De Niro) plans to retire, but his fence (Marlon Brando) talks him into one final score, stealing one of Canada’s natural treasures hidden in the basement of a Customs House. He joins forces with another thief (Edward Norton) who hires someone to hack into the Custom House’s security system, but things go wrong.

2001 — Secret History of Hacking — The focus of this documentary is phreaking, computer hacking, and social engineering occurring from the 1970s through the 1990s. John Draper, Steve Wozniak, and Kevin Mitnick are prominently featured.

2001 — Swordfish — A spy named Gabriel (John Travolta) plots to steal a large fortune. He enlists Ginger (Halle Berry) to persuade Stanley (Hugh Jackman), who spent two years in prison for hacking an FBI program, to help. But what is Gabriel really up to, and who or what is really behind the plot?

2002 — Catch Me if You CanFrank Abagnale is one of the world’s most respected authorities on forgery, embezzlement, and secure documents. His riveting story provided the inspiration for Steven Spielberg’s film starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent fast on his heels.

2002 — Cypher — Morgan Sullivan (Jeremy Northam) is an accountant turned corporate spy working for a global computer corporation.  When a mysterious woman suggests his job isn’t what it seems, Morgan ascends into a complicated world of brainwashing, where he struggles to maintain his true identity.

2002 — Half the Rent — Otherwise known as Halbe Miete, this film follows a computer hacker (Stephan Kampwirth) who, after the sudden death of his girlfriend, breaks into — and camps out at — other people’s apartments when they’re not home. But when what started as a temporary solution to homelessness becomes a dangerous obsession, will the risk outweigh the reward?

2002 — Minority Report — It’s 2054 and a specialized Pre-Crime police department in D.C. stops crimes before they are committed based on information from Pre-Cogs, three psychic beings who channel their visions into a computer. When they accuse the unit chief (Tom Cruise) of a future murder, he becomes a fugitive, hunted by his own department.

2002 — Storm Watch — A champion player of virtual reality games must suddenly race against time to stop a criminal mastermind who has stolen his identify from destroying the world with a weather satellite. Also known as “Code Hunter.”

2002 — Terminal Error — A former employee of a major software company gets even with the president by planting a computer virus on an MP3 and giving it to his son. His plan is to crash the computer terminals, but the virus has a mind of its own and begins to take out large portions of the city. Father and son must create their own virus to stop the chaos.

2003 — Code 46 — In a dystopian world, citizens are forbidden to travel outside their cities without special permits from the totalitarian government. When forged permits start to circulate, William Gold (Tim Robbins) is tasked with investigating, finding, and taking down the individual responsible, though he never expects to fall in love with her.

2003 — The Core — After several bizarre incidents across the globe, a geophysicist and scientists determine that the planet’s molten core has stopped rotating and that the magnetic field will collapse within a year. They devise a plan to bore down to the core and set off nuclear explosions to restart the rotation and enlist a hacker to scour the internet and eliminate all traces of the pending disaster to prevent worldwide panic.

2003 — Foolproof — Kevin (Ryan Reynolds) is part of a friend group with an odd hobby: they plan heists, yet never carry them out despite being perfectly able to do so. But when their plans fall into the wrong hands, the friends are thrust into the criminal world as they’re forced to carry out a jewelry warehouse heist that was never supposed to see the light of day.

2003 — In the Realm of the Hackers — This documentary reveals how and why two Australian teenager computer hackers, Electron and Phoenix, stole a restructured computer security list in the late 1980s and used it to break into some of the world’s most classified and secure computer systems.

2003 — The Italian Job — After a thief (Edward Norton) turns on his partners and gets away with the gold they’ve stolen in a heist, his former team seeks revenge.

2003 — The Matrix Reloaded — With the help of Neo (Keanu Reeves), Morpheus (Laurence Fishburne), Trinity (Carrie-Anne Moss), and other freedom fighters, more and more humans have been freed from the Matrix and brought to Zion. But 250,000 machines are digging towards the stronghold and will reach them in 72 hours, so they must prepare for war.

2003 — Paycheck — Michael Jennings (Ben Affleck) makes good money working on top-secret projects and then agreeing to have his memory erased, until a payment of $92 million for a three-year assignment is canceled. With his life in danger, he must get help from a scientist (Uma Thurman) he doesn’t remember dating to figure out the importance of seemingly random items.

2004 — One Point O — Simon (Jeremy Sisto), a young, paranoid computer programmer, finds himself on the receiving end of a series of mysteriously empty packages. Little does he know these deliveries are only the tip of a reality-bending iceberg that will change his life forever.

2004 — Paranoia 1.0 — A computer programmer receives mysterious empty packages inside his apartment and tries to find out who’s sending them, why, and who he can trust. Also known as “One Point O.”

2005 — V for Vendetta — In a dystopian future, a tyrannical British government imposes a strict curfew following the outbreak of a virus. An anarchist in a smiling Guy Fawkes mask seeks revenge with the help of a young woman and hacks into the television network to urge others to revolt against tyranny.

2006 — Deja Vu — Doug Carlin (Denzel Washington) is an ATF agent working to capture the terrorist responsible for a ferry bombing that killed hundreds. Using an advanced form of surveillance technology, Doug travels back in time, on a mission to prevent the crime, but his newfound obsession with one of the victims puts everything at risk.

2006 — The Departed — Boston police officer Billy (Leonardo DiCaprio) goes undercover to infiltrate — and take down — the dangerous Irish gang tearing up his city, led by Frank Costello (Jack Nicholson). Becoming consumed by his secret life, Billy loses sight of his mission, though everything comes back into perspective when a career criminal infiltrates and begins threatening the police department.

2006 — Firewall — When his family is taken hostage, a security specialist (Harrison Ford) who designs theft-proof computer systems for financial institutions must break into his own system and steal millions of dollars to pay off their ransom.

2006 — Hacking Democracy — This documentary investigates allegations of election fraud during the 2004 U.S. presidential election. It follows Bev Harris, the founder of Black Box Voting, a nonprofit consumer-protection group, and other citizen activists who set out to uncover flaws in the voting system.

2006 — In Ascolto — Also known as The Listening, this film takes inspiration from the mass surveillance operations of the National Security Agency (NSA), chronicling the experience of a spy (Michael Parks) working undercover to get on the inside of a counter-listening station in the Italian Alps.

2006 — Man of the Year — A satirical political talk show host (Robin Williams) runs for president and gets elected with the help of fans who begin a grassroots campaign. It’s later revealed that his presidency was the result of a computerized voting machine malfunction.

2006 — The Net 2.0 — A young computer systems analyst arrives in Istanbul to start a new job, but finds out her identity has been stolen. She must catch who did it to get her life back.

2006 — Pulse — In this remake of a Japanese horror film, a student is shocked when her boyfriend, a computer hacker, commits suicide. Then she and her friends receive online messages from him, asking for help. Another computer hacker must help her stop a supernatural plague traveling through the network.

2006 — A Scanner Darkly — This computer-animated adaptation of Philip K Dick’s 1977 sci-fi novel is set in the near-future. The U.S.’s war on drugs, particularly a hyper-addictive substance called D (for Death), prompts the enforcement of a police state that uses numberless surveillance scanners.

2007 — Bourne Ultimatum — Operative Jason Bourne (Matt Damon) teams up with an investigative reporter to find the people who betrayed him, while a ruthless CIA official and his team continue to track him down in the hopes of assassinating him before he gets his memory back.

2007 — Breach – This docudrama is based on the events leading up to the capture of FBI Agent Robert Hanssen, convicted of selling secrets to the Soviet Union. A low-level surveillance expert gets promoted and assigned to work with Hanssen, unaware that he is to find proof that he is a traitor.

2007 — Every Step You Take — This documentary is an in-depth look at modern-day Britain and its Orwell-esque levels of government surveillance. It explores the pros and cons of CCTV, highlighted by commentary from notable experts in the field.

2007 — Live Free or Die Hard — As the nation prepares to celebrate Independence Day, a disgruntled government security agent launches an attack on America’s computer infrastructure. Veteran cop John McClane (Bruce Willis) and a young hacker must help the F.B.I.’s cyber division take him down.

2008 — 21 — Six Massachusetts Institute of Technology (MIT) students hack their way to success — and millions of dollars — in Las Vegas casinos by counting cards until casino enforcer Cole Williams (Laurence Fishburne) thwarts their plans. Based on a true story.

2008 — Download: The True Story of the Internet — Told through personal accounts from the founders of Yahoo, eBay, Google, Amazon, and many others, this documentary tells the story of how the internet became what it is today.

2008 — Eagle Eye — Two strangers, Jerry and Rachel, come together after receiving mysterious calls from a woman they never met. She threatens their lives and family to push them into a series of dangerous situations, controlling their actions using cellphones and other technology.

2008 — Hackers are People Too — Hackers created this documentary to portray their community and break down negative stereotypes. It describes what hacking is, how hackers think, and discusses women in the field.

2008 — Untraceable — Agent Jennifer Marsh (Diane Lane) of the Cyber Crimes Division of the FBI in Portland tries to track down a psychopathic hacker killing people online in live streaming video. As his site gets more hits, victims die faster.

2008 — WarGames: The Dead Code 2008 — Is an American teen hacker playing a terrorist-attack simulator game online a real terrorist intent on destroying the United States? That’s what Homeland Security believes and they set out to apprehend him.

2009 — Echelon Conspiracy — When tech whiz Max Peterson (Shane West) gets sent a mysterious cell phone in the mail, he’s unsure of where it came from or what it is — until it starts sending instructions on how to win at the local casino. But it isn’t long before Max’s newfound luck puts him at the center of a dangerous government conspiracy dealing with the world’s security cameras. Will he make it out alive?

2009 — Eyeborgs — In the aftermath of a major terrorist attack, government surveillance in the U.S. is taken to the next level via robotic cameras called “Eyeborgs,” which track and monitor all citizens for suspicious behavior. But when photographic evidence from the Eyeborgs doesn’t line up with the facts in an ongoing murder investigation, a federal agent starts to wonder, who’s really controlling these cameras and what do they want?

2009 — Gamer — Controlled by a teenage gamer’s remote device, death-row inmate Kable must battle fellow prisoners every week in a violent online game. Can he survive enough sessions to gain his freedom, free his wife from avatar slavery, and take down the game’s inventor?

2009 — The Girl with the Dragon Tattoo — A journalist searches for the killer of a woman who has been dead for forty years, with the help of a young female hacker. When they unravel dark family secrets, they must protect themselves. This Swedish language film was remade in English in 2011.

2009 — Hackers Wanted — This unreleased American documentary originally named “Can You Hack It?” follows the adventures of Adrian Lamo, a famous hacker, and explores the origins of hacking and nature of hackers.

2009 — Shadow Government — What impact does the technological landscape have on our daily lives? This documentary, led by Grant Jeffrey, explores exactly how much of our lives are being digitized and observed in the modern era.

2009 — Transcendent Man — The subject of this documentary from filmmaker Robert Barry Ptolemy is Ray Kurzweil, inventor, futurist and author, and his predictions about the future of technology, presented in his 2005 book, The Singularity is Near: When Humans Transcend Biology. Ptolemy follows Kurzweil on his world speaking tour, where he discusses his thoughts on the technological singularity, a proposed advancement that will occur sometime in the 21st century due to progress in artificial intelligence, genetics, nanotechnology, and robotics.

2009 — We Live in Public — Directed by Ondi Timoner, this documentary profiles Josh Harris, “the greatest Internet pioneer you’ve never heard of.” An early dot.com entrepreneur, Harris founded Psuedo.com, an early streaming content service. In 1999, he began an experiment called “Quiet,” in which 100 men and women agreed to give up their privacy to live together under constant video surveillance, so their lives could be streamed online.

2010 — Inception — A thief (Leonardo DiCaprio) who can enter people’s dreams and steal their secrets begins using his gift for corporate espionage. Can he also plant an idea into someone’s mind? The film won four Oscars.

2010 — The Social Network — Jesse Eisenberg portrays Harvard student and computer genius Mark Zuckerberg in this drama about the creation of a social networking site that would become Facebook.

2010 — Tron Legacy — In this revamped Tron continuation, Sam (Garrett Hedlund) searches in and out of the computer world for his father, Kevin Flynn (Jeff Bridges), a brilliant computer programmer.

2011 — Mission Impossible: Ghost Protocol — When mega-spy Ethan Hunt (Tom Cruise) is blamed for a terrorist attack on the Kremlin, he and others from his agency, the Impossible Missions Force (IMF), must prove their innocence.

2011 — StuxNet: Cyberwar — First discovered in 2010, the StuxNet computer worm marked the beginning of a new era in cybercrime, attacking — and causing substantial damage to — an Iranian nuclear program. This documentary explores the malware’s origins alongside its contributions to the advancement of cyber warfare technology.

2012 — Code 2600 — This documentary explores the rise of the Information Technology Age through the eyes of the people who helped build it and the events that shaped it.

2012 — Genius on Hold — The downfall of Walter L. Shaw, a telecommunications genius who became destitute, and his disillusioned son, who became a notorious jewel thief, are the subjects of this documentary.

2012 — Owned & Operated —  Using the lens of the internet, this documentary proves just how much we matter … as consumers, that is. Society today practically lives for privileged individuals — celebrities and politicians, among others — unknowingly adhering to their wicked ways of gaining control, but there is an awakening on the horizon, and it’s going to change everything.

2012 – Panopticon – Living in the digital age, do we really have privacy? This documentary examines how much our daily lives are controlled and watched by omnipresent surveillance, which — as technology advances — has only become harder to avoid.

2012 — Reboot — A young female hacker can’t remember a traumatic event that leaves her with an iPhone glued to her hand. The phone’s timer is counting down to zero and fellow hackers must help her solve the puzzle.

2012 — Shadows of Liberty — Should we trust the media? This documentary examines the five big for-profit conglomerates that control 90 percent of U.S.-based media, raising questions of who to believe in today’s political, economical, and social world.

2012 — Skyfall — James Bond (Daniel Craig) must prove he still has what it takes as he tracks down the source of a cyber-terror attack at M16 headquarters and goes up against a genius hacker.

2012 — Tracked Down — Directed by Paul Moreira, this documentary explains how governments around the world monitor their citizens through advanced electronic warfare equipment — equipment that has fallen into the hands of repressive dictatorial regimes in Libya, Syria and Bahrain. Moreira reveals how the technology can be traded in stealth and traces these deals to their source.

2012 — Underground: The Julian Assange Story — This Australian film follows the early career of the WikiLeaks founder, from his start as a teenage computer hacker in Melbourne.

2012 — We Are Legion: The Story of the Hacktivists — Filmmaker Brian Knappenberger documents the hacking group Anonymous, including interviews from group members.

2013 — The Assange Agenda: Surveillance, Democracy and You — At what point does government surveillance put democracy at risk? According to Julian Assange — founder of Wikileaks — we’re already there. This documentary explores what may lay ahead for today’s digital world if we don’t gain control over the various agencies spying on us.

2013 — Big Data: The Shell Investigation — In the digital age, a journalist’s sources are endless — when consulting big data, that is. This documentary showcases how a team of journalists used easily accessible channels, such as LinkedIn and Wikipedia, to piece together the truth about Royal Dutch Shell’s two-billion-dollar debt to the Iranian government.

2013 — The Bling Ring — Nicki (Emma Watson) and her fame-obsessed group of friends will do anything to make a name for themselves in Hollywood, including breaking into — and robbing — the homes of elite celebrities, which, if not for the internet, would never have been possible.

2013 — DEFCON: The Documentary — The world’s largest hacking conference, DEFCON, has long since had a strict no-camera policy … until now. This documentary follows the four days of DEFCON’s 20th-anniversary event, highlighted by commentary from attendees and staff.

2013 — Disconnect — Three intersecting stories center around the impact of the Internet on people’s lives. The characters include a victim of cyberbullying, a lawyer who communicates constantly through his cell phone but can’t find time to connect with his family, and a couple whose secrets are exposed online.

2013 — DSKNECTD — Do electronic devices bring people together or pull them apart? This documentary examines how human interaction has changed in light of the rise of technologies such as cell phones, social media, and the internet.

2013 — 

2013 — The Fifth Estate — Based on real events, the film begins as WikiLeaks founder Julian Assange (Benedict Cumberbatch) and Daniel Domscheit-Berg join forces as underground watchdogs and create a platform for whistleblowers to leak covert data to expose government secrets and corporate crimes.

2013 — Goodbye World — More than one million cellphones simultaneously receive a two-word message, followed by the collapse of the power grid and widespread panic. A group of people who find shelter in a cabin soon find out what it’s like to live in a post-apocalyptic world.

2013 — Google and the World Brain —   The Google Books Library Project is certainly ambitious, but is it feasible? This documentary examines Google’s plan to open the world’s largest virtual library, as well as the many issues that may stem from it, such as copyright infringement and lack of online privacy.

2013 — Her — In this futuristic story, a lonely writer ( Joaquin Phoenix ) develops an unlikely relationship with an operating system designed to meet his every need.

2013 — Identity Thief — When a woman (Melissa McCarthy) steals the identity of Sandy Patterson (Jason Bateman), a financial firm account executive, and wrecks his credit rating, he sets out to confront her.

2013 — In Google We Trust — Who’s keeping tabs on your data? This revealing documentary gives viewers an inside look into how — and why — our digital interactions are tracked and recorded. If you’re worried about the consequences, watch this now.

2013 — Mickey Virus — In this Bollywood hacker comedy, Delhi Police must seek the help of a lazy hacker to solve a case.

2013 — Terms and Conditions May Apply — This documentary exposes how much the Internet and cellphone usage allows corporations and governments to learn about people.

2013 — TPB AFK: The Pirate Bay Away from Keyboard —This Swedish documentary film, directed and produced by Simon Klose, focuses on the lives of the three founders of The Pirate Bay — Peter Sunde, Fredrik Neij, and Gottfrid Svartholm — and the Pirate Bay trial.

2013 — The Value of Your Personal Data — Produced by the acclaimed VPRO series, this documentary discusses the companies that collect your personal data, who buys it from them, how it is used, and who owns it. It also gives advice on how you can gain back control of it and stop being targeted and manipulated.

2013 — War on Whistleblowers: Free Press and the National Security State — This documentary by Robert Greenwald highlights four cases — Michael DeKort, Thomas Drake, Franz Gayl and Thomas Tamm — where American government employees and contractors exposed fraud and abuse through the media at the risk of their personal and professional lives.

2014 — Algorithm — A computer hacker who specializes in breaking into secure systems, including the telephone company and people’s personal accounts, hacks a government contractor and discovers a mysterious computer program, thrusting him into a revolution.

2014 — The Bureau of Digital Sabotage — What is privacy? This documentary argues it is nonexistent in today’s digital age, delving into our new reality and its most crucial issues by asking citizens to stand up when mass surveillance crosses the line.

2014 — Citizenfour — This documentary by Laura Poitras about whistleblower Edward Snowden and the NSA spying scandal includes interviews of Snowden in Hong Kong in 2013 and features work by journalist Glenn Greenwald.

2014 — Digital Amnesia — An in-depth investigation into the shelf life of digital data and the vulnerable nature in which we store information today, featuring commentary from organizations such as Internet Archive and The Archive Team.

2014 — Ex Machina — A young programmer wins a competition that makes him the human component in a groundbreaking experiment where he must evaluate the capabilities and consciousness of Ava, a breathtaking A.I.

2014 — The Hackers Wars — This documentary discusses hacktivism in the United States, including the government’s surveillance and persecution of hackers and journalists.

2014 — The Human Face of Big Data — This documentary, directed by Sandy Smolan and narrated by Joel McHale, initially focuses on Big Data’s positive aspects, such as how the massive gathering and analyzing of data in real-time through a multitude of digital devices allows us to address some of humanity’s biggest challenges and improve lives globally. It also highlights how the accessibility of this data comes at a steep price.

2014 — The Imitation Game — M16, the newly created British intelligence agency, recruits mathematician Alan Turing (Benedict Cumberbatch) and his team to crack the Germany’s Enigma code during World War II. Nominated for 8 Oscars.

2014 — Inside The Dark Web — Internet surveillance takes center stage in this documentary that details the pros and cons of the World Wide Web. With all types of surveillance taking place globally — government, commercial, and more — what does the future look like for those living in the digital age?

2014 — The Internet’s Own Boy: The Story of Aaron Swartz — Filmmaker Brian Knappenberger explores the life and work of Reddit co-founder Aaron Swartz, a programming prodigy and information activist who committed suicide at the age of 26.

2014 — Killswitch — In a world where we rely so heavily on the internet, what happens if it comes under attack? This award-winning documentary centers on the threat of internet censorship and what we risk losing if we don’t fight back, such as free speech, democracy, and innovation.

2014 — Men, Women and Children — What does it mean to be a parent in the age of social media? This film follows multiple families, each with their own relationships to the internet, as they overcome various challenges, including eating disorders and video game culture.

2014 — Open Windows — A blogger finds out he’s won a dinner with an actress he devotes his website to and is disappointed when she cancels. When he gets a chance to spy on her every move with his laptop, his life gets crazy.

2014 — The Signal — Nic, who is a student at MIT, is on a road trip with two companions when an annoying computer hacker distracts them. They track him to an abandoned shack. After strange occurrences, Nik wakes up wounded and disoriented, wondering what has happened to his friends, and who are these people in space suits?

2014 — Transcendence — Dr. Will Caster, renowned artificial intelligence researcher, is on a controversial quest to create a fully sentient machine, but are the dangerous consequences that follow worth it? This science-fiction thriller stars Johnny Depp, Rebecca Hall, Morgan Freeman, and Paul Bettany, among others.

2014 — Unfriended — a mysterious, supernatural force haunts a group of online chat room friends using the account of their dead friend.

2014 — Who Am I — A subversive hacker group intent on gaining global fame invites a young German computer whiz to join them.

2015 — Big Data: Unlocking Success — Experts from Berkeley Research Group, Lawrence Berkeley National Laboratory, and Microsoft look into the use of data science and its allied fields in this documentary, noting several real-life examples, including events at Johns Hopkins University and MGM Resorts International.

2015 — Blackhat — Convicted hacker Nicholas Hathaway (Chris Hemsworth) joins a team of American and Chinese technical experts to track down a Balkan cyberterrorist operating in Southeast Asia.

2015 — Cyberbully — In this made-for-TV movie, A British teenage girl (Emily Osment) retreats from family and friends when a computer hacker forces her to do his bidding, threatening to leak compromising photos of her if she doesn’t do what he asks.

2015 — Cybertopia: Dreams of Silicon Valley — A technological revolution is looming in Silicon Valley. This documentary explores the future of digitized reality, as well as how daily life has already changed as a result of the dedicated individuals residing in California’s tech headquarters.

2015 — Debug — Six young hackers assigned to fix the computer system on a vessel drifting in deep space become prey to an artificial intelligence source intent on becoming human.

2015 — Deep Web — Filmmaker Alex Winter interviews the people behind the Deep Web and bitcoin and follows the arrest and trial of Ross Ulbricht (“Dread Pirate Roberts”), founder of online black market Silk Road.

2015 — Democracy: Im Rausch der Daten — From Swiss director David Bernet, this documentary tells the story of how politicians in the EU are working to protect society from the dangers of Big Data and mass surveillance.

2015 — Digitale Dissidenten — What price do whistleblowers pay? Interviews with David Ellsberg, Edward Snowden, William Binney, Thomas Drake, Annie Machon, and Julian Assange shed light on the cost of having a conscience in the dark world of government surveillance.

2015 — Furious 7 —Mr. Nobody (Kurt Russell), a government operative, enlists Dominic Toretto to find a hacker who has created God’s Eye, a device that can hack any technology that uses a camera. In return, they can use the device to find and stop Deckard Shaw (Jason Statham), who is seeking revenge against Toretto and his crew for his comatose brother.

2015 — A Good American — This documentary film tells the story of Bill Binney, former technical director of the NSA, a group of exceptional code-breakers, and a program called ThinThread, which, if not dumped three weeks prior to 9/11, would’ve been able to stop the terrorist attacks that took almost 3,000 lives.

2015 — Hacker’s Game — A cyber-detective working for a human rights organization and a hacking expert with shady connections meet on a rooftop and bond over a game of virtual chess. Will their romance survive deception?

2015 — Jobs vs. Gates: The Hippie and The Nerd — This documentary tells the story of two of the biggest men in tech, Bill Gates and Steve Jobs, and the spectacular rivalry between them. Despite landing on two different sides of the battle between Mac and PC, Jobs and Gates’ mutual respect for one another endured the test of time.

2015 — Mapping the Future — Are our lives predictable? If you take the internet’s overflowing amount of data into consideration, the answer is yes. This documentary explores how the abundance of data gathered on the internet in recent years led to a mathematical algorithm for human life.

2015 — Terminal F/Chasing Edward Snowden — This documentary discusses what motivated Edward Snowden, an NSA analyst-turned whistleblower, to leak classified information about global surveillance programs used by the American government, leading him to flee to Hong Kong and later to Russia to evade authorities.

2015 — The Throwaways — Drew (Sam Huntington) is an infamous hacker who is captured by the CIA for a slew of cybercrimes. However, his impending jail sentence is renounced after the CIA gives him an alternate option — work for them. Sam agrees, but on one condition: he gets to build his own team.

2015 — War for the Web — Directed by J. C. Cameron Brueckner, this documentary demystifies the physical infrastructure of the internet and explores the issues of ownership and competition in the broadband marketplace, privacy, and security.

2016 — Anonymous — A young Ukrainian immigrant turns to hacking and identity theft to support his parents, with help from a friend who is a black-market dealer. Petty crimes soon escalate. The film is also known as “Hacker.”

2016 — Backlight: Cyberjihad — Can social media become a weapon? This documentary examines jihadism and its online presence, which, without any hindrance, has only grown larger over the past fifteen years.

2016 — Cyber War — Hackers pose a universal threat; how can we defend ourselves? This documentary explores how governments are building up protection against the ever-growing number of digital threats, including by recruiting those with the brains to wage cyberwar and espionage when necessary.

2016 — Data Center: The True Cost of the Internet — Every day, 247 billion emails are sent through the web. Have you ever wondered what powers them? This eye-opening, high-tech documentary takes viewers inside the digital warehouses that run the internet, otherwise known as data centers.

2016 — Down the Deep, Dark Web — Venture down the internet’s rabbit hole into the secretive world of the dark web, guided by crypto-anarchists, cypherpunks, and hackers. This documentary will make you question everything you thought you knew about the darknet.

2016 — Gringo: The Dangerous Life of John McAfee — Complex antivirus pioneer John McAfee made millions before leaving the U.S. to live in a compound in the jungle in Belize. This Showtime documentary, which he calls fiction, portrays his life in Belize and 2012 departure after a neighbor was murdered.

2016 — The Haystack — Due to sophisticated hacking techniques and the terrorist organizations that often use them, the British Parliament began reviewing the Investigatory Powers Bill, legislation that would provide more leniency in the interception of private email and phone communications. Prior to the bill passing in 2016, this documentary examined how effective it would be, if it was necessary, and what citizens would have to give up once the bill was implemented.

2016 — I.T. — Aviation tycoon Mike Regan (Pierce Brosnan) hires an I.T. consultant on a temporary basis to do some work at his house and is so impressed he gives him a full-time job. He’s fired when he oversteps boundaries and seeks revenge against the businessman and his family.

2016 — Jason Bourne — Former CIA agent Jason Bourne (Matt Damon) is drawn out of hiding to uncover more about his past while fighting cyberterrorism.

2016 — Lo and Behold: Reveries of the Connected World — Filmmaker Werner Herzog examines the Internet and how it affects human interaction and modern society.

2016 — National Bird — A chilling documentary in which three military veterans blow the whistle on the secret U.S. drone war, highlighting America’s modern warfare program through the harrowing experiences of those involved.

2016 — Nerve — Friends pressure a high school senior to join the popular online game Nerve. She becomes caught up in the thrill of the adrenaline-fueled competition, partnered with a mysterious stranger, but the game takes a sinister turn.

2016 — Offline is the New Luxury — Since the dawn of the internet, humanity has slowly but surely become increasingly dependent on various smart devices — phones, tablets, and laptops alike. This documentary asks one poignant question: what would the world be without them?

2016 — Rise of the Trolls — Is being anonymous a blessing or a curse? In this documentary, filmmakers Jonathan Baltrusaitis and Paul Kemp explore the unnerving truths surrounding internet anonymity, dark instincts, and freedom in cyberspace.

2016 — Risk — Laura Poitras spent six years making this documentary about WikiLeaks founder Julian Assange, who gave her the opportunity to closely film him but later tried to censor the film.

2016 — Silicon Cowboys — This documentary tells the true story of how three unsuspecting friends became computing pioneers by dreaming up the Compaq Computer — a portable PC that would directly impact the future of computing and consequently shape the world we live in today.

2016 — Snowden — Joseph Gordon-Levitt stars as Edward J. Snowden in Oliver Stone’s biopic of the former National Security Agency contractor who becomes disillusioned with the intelligence community and leaks classified information, becoming a fugitive from law and a hero to many.

2016 — State of Surveillance — In this documentary film, Edward Snowden — infamously known for leaking classified information from the National Security Agency — invites viewers into the disturbing world of government surveillance. A must-see for anyone who feels like they’re being watched.

2016 — Stingray — This documentary enlightens viewers to just how advanced surveillance technology has become, highlighting the Stingray, which, despite going by many different names, has certified itself as one of the most powerful surveillance devices of all time, though many see it as an invasion of privacy.

2016 — What Makes You Click — Described as both a fascinating psychological study and a gripping cautionary tale, this documentary from the VPRO Backlight series discusses how companies adapt their websites and apps to get consumers to stay on them longer and spend more money.

2016 — Zero Days — Alex Gibney’s documentary focuses on Stuxnet, or “Operation Olympic Games,” a malicious computer worm developed by the United States and Israel to sabotage a key part of Iran’s nuclear program.

2017 — AlphaGo — Can an AI challenger defeat a legendary master in the game of Go? The battle between man and machine takes center stage in this documentary film chronicling Lee Sedol’s nail-biting match against AlphaGo, a computer program devised by Deep Mind Technologies to master the 3,000-year-old game.

2017 — The Circle — Mae (Emma Watson) lands a dream job at a technology and social media company called the Circle. She is soon handpicked by the founder (Tom Hanks) to participate in an experiment that takes transparency to a new level.

2017 — The Crash — The government enlists a team of white-collar criminals to thwart a cyberattack that threatens to bankrupt the United States.

2017 — Facebook: Cracking the Code — What does Facebook know about you? This documentary digs deep into the security issues that social media giant Facebook doesn’t want you to know, including how they track browsing data, promote targeted ads, and spread false information.

2017 — The Fate of the Furious — A cyberterrorist known as Cipher (Charlize Theron) coerces Dom (Vin Diesel) into working for her, hacks and takes control of cars, and reaps havoc.

2017 — Ghost in the Shell — Major (Scarlett Johansson) is saved from a terrible crash and cyber-enhanced as a soldier to stop the world’s most dangerous criminals. She soon discovers that her life was actually stolen and determines to recover her past, find out who did this to her, and stop them before they do it to others.

2017 — Kim Dotcom: Caught in the Web — This documentary tells the story of Megaupload founder Kim Dotcom, a super-hacker, entrepreneur and notorious Internet pirate accused of money laundering, racketeering, and copyright infringement.

2017 — Meeting Snowden — Edward Snowden, former CIA and NSA collaborator, has become infamous for initiating one of the most controversial mass surveillance scandals of all time. But who is he really? In this documentary, Lawrence Lassig and Birgitta Jónsdóttir sit down with the whistleblower to discuss the future of democracy, among other things.

2017 — Nothing to Hide — Do we really have nothing to hide? This documentary takes an in-depth look into government surveillance today and why the public seems to have unanimously accepted the loss of their right to online privacy.

2017 — Silk Road: Drugs, Death, and the Dark Web — In 2011, Ross Ulbricht launched the anonymous darknet website, Silk Road. This documentary explores everything the black market site had to offer, as well as the events leading up to — and following — Ulbricht’s inevitable arrest.

2017 — Stare Into The Lights My Pretties — Many of us live behind a screen, but at what cost? This documentary examines why so many people are addicted to their screens, all the while exploring the impact this collective mindset may have on our future.

2017 — Thoughtcrime — Directed by Bernd Riemann, this documentary compares the disturbing similarities between the disclosures made by former CIA employee Edward Snowden in 2013 and the world created by George Orwell in the dystopian science fiction film 1984, where independent thinking was censored and holding thoughts opposing those in power was considered a criminal act.

2017 — Weapons of Mass Surveillance — Directed by Elizabeth C. Jones, this documentary explores the dangerous alliance of Western surveillance technology and Middle Eastern governments who use that technology to monitor their citizens. It discusses how high-tech cyber-surveillance enables governments to record, archive, and analyze communications.

2018 — Anon — In a world where everyone’s lives are transparent, traceable, and recorded by the authorities, causing crime to almost cease, a detective (Clive Owen) tries to solve a series of murders that may involve a mysterious hacker (Amanda Seyfried).

2018 — Assassination Nation — After an anonymous hacker leaks the private information of the people of Salem, suspicion falls on four teenage girls who are targeted by the community.

2018 — Black Code — Told through accounts from exiled Brazilian activists, Syrian citizens, and Tibetan monks, this documentary explores how governments across the world are exploiting the internet to gain control over their people.

2018 — Cam — Alice (Madeline Brewer) is an exotic webcam performer whose life is turned upside down when her channel — and livelihood — are stolen by a scarily accurate look-alike. Determined to get her identity back, Alice sets out to unmask, and ultimately take down, the mysterious hacker.

2018 — The Cleaners — Nothing stays on the internet forever. The web’s self-cleaning nature dominates this documentary led by field experts, enlightening viewers to the process of content removal, alongside asking one poignant question: who decides what should, and should not, be seen?

2018 — The Creepy Line — Google and Facebook take center stage in this documentary that depicts how the social media platforms have perfected various manipulation tactics, all in the name of gaining access to the public’s personal and private information. Told through first-hand accounts, scientific experiments, and an in-depth analysis.

2018 — The Defenders — Produced by Cybereason, this documentary invites viewers inside the world of cybercrime, analyzing four of the most well-known cyberattacks throughout history — highlighted by commentary from those working to protect our institutions from the ever-changing cyber threat landscape.

2018 — Digital Addicts — How much do screens affect children’s brain development? This documentary follows a group of kids growing up in the digital age, highlighting the harmful, hyper-addictive nature of social media platforms, mobile phones, and more.

2018 — Do You Trust This Computer? — Is a smarter machine always a better machine? This documentary digs deep into the dangers of artificial intelligence, highlighted by commentary from some of the field’s most respected individuals, including Elon Musk.

2018 — Edward Snowden: Whistleblower or Spy? — In 2013, Edward Snowden infamously leaked highly classified information from the NSA. Five years later, this documentary looks back at the sensational time through interviews with participants and witnesses, including some who are speaking out for the first time.

2018 — The Feeling of Being Watched — This documentary is the result of journalist Assia Bendaoui’s investigation into rumors that the FBI has monitored her quiet, predominantly Arab-American neighborhood near Chicago since the 1990s. Her research exposed one of the FBI’s largest counter-terrorism investigations before 9/11.

2018 — General Magic  — This is the story of one of tech’s most influential and least memorable companies. Featuring commentary from members of the original Macintosh team alongside the creators of eBay, iPod, iPhone, and Android, this documentary explores how General Magic created the first handheld personal communicator, aka smartphone, and what happened after.

2018 — The Girl in the Spider’s Web — Computer hacker Lisbeth Salander (who is also an avenging angel for abused women) and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.

2018 — Hacked — After losing his job to a state-of-the-art supercomputer, a disgruntled computer technician decides to test his replacement. In the meantime, a group of hackers infiltrates the building to steal the new technology.

2018 — Inside Facebook: Secrets of a Social Network — Which is more important: money or morality? This eye-opening documentary takes viewers inside Facebook’s moderating hub, demonstrating how the social media company regulates harmful content, such as child abuse and hate speech — although the results prove to be more concerning than comforting.

2018 — Inside the Russian Info War Machine — How does Russia undermine democratic governments, alter world events, and manipulate public opinion? In this documentary, acclaimed journalist Paul Moreira breaks down the Russian information war machine, including its hidden weapon: the trolls and hackers pushing Russia’s agenda across cyberspace.

2018 — Irumbu Thirai — A cat and mouse game for the digital age. After losing millions of dollars to a group of cybercriminals, a soldier sets out on a quest to get back everything he lost. Will his efforts be enough?

2018 — Johnny English Strikes Again — After a cyberattack reveals the identity of all of Britain’s active undercover agents, MI7 agent Johnny English must come out of retirement to find the mastermind hacker.

2018 — King of Crime — Marcus King (Mark Wingett) was a well-known crime lord on the streets … that is, until he brought his illegal empire to cyberspace. When Islamic extremists threaten everything he’s built, the newly cemented king of British cybercrime will do everything in his power to maintain his status.

2018 — Ocean’s 8 — On a mission to pull off an impossible heist at New York’s renowned Met Gala, hacker 9Ball (Rihanna) launches a spear-phishing campaign against an employee at the Metropolitan Museum of Art, gaining access to the museum’s security camera system and giving her all-female crew the insight they need to successfully steal one of the most valuable jewelry pieces in the world.

2018 — Peripheral — This horror film follows a successful young writer — Bobbi Johnson (Hannah Arterton) — who, after experiencing writer’s block while writing her second novel, employs an artificially intelligent software to finish her work. Little does Bobbi know, she’s about to uncover a dangerous conspiracy of social control.

2018 — Searching — A man becomes desperate when his 16-year-old daughter disappears and a police investigation is futile. Hoping to find clues, he searches her laptop, scours photos and videos, and begins contacting her friends.

2018 — Unfriended: Dark Web — After a teen finds a mysterious laptop, he invites several friends to play a game online. The night turns deadly when they become the target of cyber-terrorism.

2019 — BD2K: Big Data to Knowledge — Told through the stories of two patients battling disease in the information age, this documentary film explores how big data has changed the way medicine is practiced, as well as its effect on doctor-patient relationships.

2019 — Cyber Crime — In this documentary, 10 leading cybercrime experts discuss how billions of dollars a year are stolen or lost as a result of cybercrime, destroying businesses and lives.

2019 — Dataland — Living in a world that’s practically run by AI, it’s hard to think we’ve only just scratched the surface of what the technology is capable of — but it’s true. This documentary explores what the world’s top data scientists are working on behind closed doors.

2019 — The Great Hack — This documentary examines the Cambridge Analytica scandal through the roles of several people affected by it.

2019 — HAK_MTL — Tech companies claim to protect our privacy, but is it true? In this eye-opening documentary, a group of Canadian hackers launch an investigation into the internet and how it continues to track, store, and share users’ data, despite assurances that it doesn’t.

2019 — Hero or Villain? The Prosecution of Julian Assange — Depending on who you’re talking to, the name Julian Assange will provoke one of two feelings: fury or awe. This documentary, led by the ABC Four Corners Team, chronicles an investigation into the founder of Wikileaks, featuring commentary from some of the individuals who knew him best.

2019 — Kee — Siddharth (Jiiva) and Shivam (Govind Padmasoorya) share an affinity for hacking, but that’s all they have in common. When the two unexpectedly cross paths, a fight between hacking for good and evil breaks out — and the consequences are fatal.

2019 — Machine Learning: Living in the Age of AI — How do we interact with AI? The technology has cemented itself as one of the foundations of our digital age, but has yet to reach its full potential. This documentary examines what the future of artificial intelligence will look like and the many possibilities ahead of us.

2019 — Official Secrets —  Katharine Gun made headlines in 2003 after blowing the whistle on an illegal NSA spy operation. This drama film, starring Kiera Knightly and Matt Smith, chronicles the scandal, as well as the ensuing legal battles that uncovered top-secret manipulation tactics used by the highest levels of government in both the U.S. and the UK.

2019 — Password — A police officer hunts for a cybercriminal who is destroying people’s lives by hacking their passwords.

2019  — The Secrets of Silicon Valley — Directed by James Corbett, this documentary looks at the long and detailed history of Silicon Valley, located in the San Francisco Bay area, including how it was founded in the aftermath of World War II, the technology companies located there that have shaped the world through innovation, the ties between different companies and the government, and according to Corbett, the shadowy underworld hiding beneath the surface and why Big Tech means big trouble.

2019 — Third Eye Spies — Directed by Lance Mungia, this documentary reveals how an experiment in psychic abilities at Stanford Research Institute led to the CIA’s study of psychic abilities for more than 20 years for use in their top-secret spy program. Parapsychologists Russell Targ and Dean Radin are interviewed, along with dozens of others, regarding recently declassified information.

2019 — Unfriends — In this Bollywood thriller, Veer, who has an idea for a startup, receives a Facebook friend request from Vijay, who becomes his investor. While on a long celebration drive, they meet a girl named Mauli. When Vijay rapes her and intends to kill her, Veer comes to her rescue and helps her escape. When she is later subjected to abuse on the internet, Veer seeks justice for her.

2019 — WannaCry: The Marcus Hutchins Story — Marcus Hutchins, a British computer researcher, became an “accidental hero” when he discovered a kill switch in May 2017 that stopped the spread of WannaCry, hours after the ransomware affected thousands of systems across the world. Three months later, the FBI arrested him because of his involvement in a banking trojan. This documentary, directed by Hugo Berkeley, is his firsthand story.

2019 — Who You Think I Am — A 50-year-old divorced teacher (Juliette Binoche) uses a photo of a young, pretty blonde to create a fake Facebook profile of a 24-year-old woman after being ghosted by her 20-something lover.

2019 — You Can’t Watch This — This independent documentary by George Llewelyn-John discusses freedom of speech and the online world. It highlights stories of five individuals who lose their access to social media and how that censorship affects them.

2020 — Archive — Roboticist George Almore (Theo James) is working to create a true human-equivalent AI, but when his focus turns to reuniting with his dead wife, Julie (Stacy Martin), he finds himself reaping Dr. Frankenstein-worthy consequences.

2020 — The Big Reset 2.0 — Every day, AI grows more functional, intelligent, and capable of completing even the most complicated tasks, but at what point does it become too much? In this documentary produced by Germany’s international broadcaster, Deutsche Welle (DW), experts discuss the field’s ongoing battle between risk and reward.

2020 — Childhood 2.0 — What does it mean to be a child in the highly vulnerable digital age? Online predators, cyberbullying, and mental health take center stage in this documentary that delves into the real-life issues plaguing kids and parents today.

2020 — CyberlanteAfter getting a job at an isolated hotel run by a cruel bully, Matt (Gavin Gordon) finds himself at the center of a battle between hacking for good and evil.

2020 — Enemies of the State —  This American documentary film follows Matt DeHart, targeted by the U.S. government for having confidential documents alleging misconduct by the CIA.

2020 — Interference: Democracy at Risk — In 2016, many new threats against our democracy came to light, such as misinformation campaigns and voter fraud, all of which wouldn’t be possible if not for the advanced, digital age we live in. This documentary urges viewers to make sure it never happens again.

2020 — The Internet of Everything — This documentary discusses how the internet now invades every aspect of our lives, through things beyond computers and phones — such as garbage cans, refrigerators and city infrastructures. It also talks about the problems the Internet has created and asks the question: will the future be a surveillance nightmare or an eco-utopia. Who will determine the outcome?

2020 — Julian Assange: Revolution Now — Overnight, Julian Assange went from coder to convict. This documentary tells the story of the founder of Wikileaks and how his mission to entrust the public with some of the most private information made him an enemy of the United States government.

2020 — Kill Chain: The Cyber War on America’s Elections — Produced by HBO, this documentary examines the rising number of tech vulnerabilities in the American electoral system, featuring an eye-opening demonstration of how secure electronic voting machines are by hackers at DEFCON, the world’s largest hacking conference.

2020 — KnowBe4: The Making Of A Unicorn — A Cybersecurity Story. How CEO Stu Sjouwerman built a culture of fun and a company worth $1 billion. With Chief Hacking Officer Kevin Mitnick. 23-minute documentary produced by Cybercrime Magazine.

2020 — No Safe Spaces — What does freedom of speech look like in the age of social media? In this documentary, comedian Adam Corrolla and talk show host Dennis Prager travel across America to explore what the future holds for the First Amendment.

2020 — Out Of Dark — Ever wondered what it’s like to be a spy? This eye-opening documentary invites cameras on a mission with a real-world intelligence operative,  giving viewers an in-depth look into the top-secret world of foreign and domestic surveillance.

2020 — Password — A Saw-esque thriller in which an IT employee awakens to find himself tied to a chair, surrounded by a dead body and a laptop. Discovering he’s been kidnapped, the employee must find a way out, but will the financial imbalance of India post-globalization get in his way?

2020 — Screen Generation — Gen X, Millennials, Gen Z … and then what? Following the generation dubbed the “Digital Natives,” this documentary ponders what’s in store for the children that grew up behind a screen. Researchers in the U.S. and Europe were interviewed.

2020 — The Social Dilemma — This documentary explores the dangerous human impact of social networking.

2020 — Tenet — In this action thriller directed by Christopher Nolen, an organization called Tenet recruits an unnamed CIA operative known as The Protagonist (John David Washington) for a mission involving “time inversion” to counter a future threat and stop World War III.

2020 — We Need to Talk About A.I. — Director Leanne Pooley takes a close look at the future of artificial intelligence and the impact it will have on the world, including how computers will have the capacity to design and program themselves as they continue to evolve.

2021 — Chakra — Military officer Chandru (Vishal Krishna) is one of fifty people who are robbed on Independence Day. After he discovers his most prized possession was stolen, Chandru joins forces with a police officer to hunt down the dangerous cybercriminal responsible.

2021 — Cryptopia: Bitcoin, Blockchains, And The Future Of The Internet — Filmmaker Torsten Hoffmannn’s eye-opening look into the world of cryptocurrency and the controversy surrounding it, featuring commentary from some of the industry’s major players.

2021 — Dark Web: Cicada 3301 — After visiting the dark web, Connor (Jack Kesy), a gifted hacker, is invited to join the mysterious secret society Cicada 3301. He accepts and soon finds himself embroiled in an intense, high-stakes race against the NSA. Based on real-life events.

2021 —Dark Web: Fighting Cybercrime — The fight against cybercrime takes center stage in this documentary highlighting the security industry and its ceaseless determination to defend against the growing number of digital threats.

2021 — Dear Hacker — What happens when your webcam goes rogue? The directorial debut of French filmmaker Alice Lenay, this documentary is a must-watch for anyone who’s ever wondered about the inner workings of a webcam.

2021 — MY.DOOM: Earth’s Deadliest [Computer] Virus  — First seen in 2004, MyDoom is universally acknowledged as the worst computer virus of all time, having caused over $38 billion in losses. This documentary explores MyDoom’s origins and chaotic run, all the while making an argument for just how essential white hat hackers really are.

2021 — Hacker Fairies — A short drama that follows two white hat hackers on a mission to retrieve stolen photos of several women. Not long into the search, one of the women asks to learn more about hacking. Can she be trusted? 

2021 — Hacker: Trust No One When Danny cofounds a new cryptocurrency, he thinks it will make him rich. When he gets caught hacking, though, he and his girlfriend end up on a hit list instead.

2021 — Love Hard — A columnist, who writes about her bad dating experiences, thinks she has met her perfect match on a dating app. When she flies across country to surprise him for Christmas, she learns she’s been catfished.

2021 — The Perfect Weapon — Based on a best-selling book by New York Times national security correspondent David E. Sanger, this documentary explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌Directed by John Maggio, it features interviews with top military, intelligence, and political officials on the frontlines of cyberterrorism.

2021 — Silk Road — Directed by Tiller Russell, this is the story of the anonymous dark web market launched by Ross Ulbricht in early 2011. Ulbricht was jailed for life after an FBI operation shut down Silk Road.

2021 — The Mitchells vs The Machines — Starring Maya Rudolph, Danny McBride, Eric Andre, and more, this animated film follows the Mitchell family, who stumble into an unprecedented robot apocalypse and find themselves fighting to save the future of humanity.

2021 — The Spy in Your Phone — The positive side of smartphones is that they keep us connected, entertain us, store data, and so much more. This documentary highlights the dangers, including privacy issues, how messaging and social media sites store our data and use it, how individuals and organizations can target us through spyware, and the concern about government mass surveillance. It also discusses what you can do to protect your data.

2021 — Twenty Hacker — Hex is a hacker who runs Better World, a “white hacker” club. When he discovers that black hackers have ruined his father’s company, he enlists his club members to take them down, resulting in an inevitable showdown.

2021 — WANNACRY: Earth’s Deadliest [Computer] Virus — This documentary examines how a computer virus that began as a small crypto worm in 2017 ended up infecting thousands of computers as ransomware. It describes the complex process that allowed it to be distributed in several ways and delves into a parallel story.

2022 — Glimpse — This surveillance-footage thriller follows three individuals, who are up for the same job, as their lives slowly spiral out of control. Starring an ensemble cast including Michael Emerson, Raúl Esparza, and David Alan Basche.

2022 — Hacker: Trust No One — This drama film tells the story of a hacker who finds himself and his girlfriend on a hit list after getting mixed up in the shady world of cryptocurrency.

2022 — Hot Seat — Mel Gibson stars in this riveting tale about an IT expert and former hacker, Friar (Kevin Dillon), who finds himself in the middle of a potentially explosive cyber robbery. Forced to choose between stealing digital funds or having his daughter abducted, Friar is left to determine what matters most while simultaneously working to get out of the hot seat.

2022 — Keedam — Main character Radhika Balan is a cybersecurity expert who believes in using technology to benefit others, but after falling victim to a cyberstalking incident and losing any semblance of privacy, she’s left with no choice but to take matters into her own hands.

2022 — Kimi — Starring Zoe Kravitz and Rita Wilson, this thriller chronicles the events that take place after an agoraphobic tech worker discovers evidence of a violent crime, which ultimately leads to her greatest challenge yet — leaving the house.

2022 — Stalked Within — This thriller follows Gary, a home security operator, who begins to spy on a single mother using his company’s technology equipment. It’s only a matter of time before his obsession turns deadly.

2022 — The Takeover — When an ethical hacker is framed for murder, she must track down those who are blackmailing her, stop them, and clear her name. Starring Holly Mae Brood, Geza Weisz, and Frank Lammers.

2023 — @ — A techno-thriller starring Rachel David as an ethical hacker, this film revolves around the dark web and the horrors that lurk within it. Audiences will become acquainted with the many crimes that take place, such as drug peddling, and the cyberattacks that come to fruition in the deep net.

2023 — M3GAN — Artificially intelligent doll M3GAN is a technological wonder, designed to befriend children and support parents. However, it’s only a matter of time until M3GAN becomes sentient and decides to take on a life of her own, leaving those around her to reap the extraordinary consequences.

2023 — Reality — This drama tells the story of Reality Winner, the former American intelligence specialist who was given the longest prison sentence for the unauthorized release of government information to the media about Russian interference in the 2016 United States elections via an email operation. Sydney Sweeney stars in the titular role.

So far no hits. I recon that the movie should be somewhere in the early 1990’s to 2005 time frame. Low budget, but a seriously important movie. Perhaps it was a spin off of movies of the Matrix genre… Which would place it around 1999. Or maybe right before it, 1995. And the movie Matrix completely overshadowed it.

Still looking.

Sigh.

US hegemony uses 800 military bases and 11 aircraft carriers to force the world to follow US economics, trade and finance rules for USA benefits. Anyone refusing is sanctioned, or if weak violently attacked using human rights excuses. That is coercive diplomacy.

main qimg 59d1f1636ca46f2c9998e9beee52d1a6 lq
main qimg 59d1f1636ca46f2c9998e9beee52d1a6 lq

US hegemony in last 70yrs means endless wars, endless arms sales and endless Tbills and usd printing. It is not sustainable now USA printed usd31trillion and deficits are still adding Tbills. Does the world want to continue wars and deaths for US profits? Most of the world says no.

main qimg a9de785360da1617bf9217de05f28c9f
main qimg a9de785360da1617bf9217de05f28c9f

The 1950s in SHOCKINGLY BEAUTIFUL Colorized Photos

Things Worth Experiencing At Least Once In Your Life, According To People Online

In the everyday rush and routine, we probably don’t find time to think about what we want to do in this life and what really would make us happy. It may be for our whole life or it can also be something that will make us the happiest people alive for a day. There are particular locations, feelings, purchases or activities that we dream about. I may be wrong but many of us probably have our bucket lists made. Some of us have written it down and are actually saving money for our dreams, some of us have written it in our notes and from time to time check it out to see if maybe we managed to complete some of the things. But some of us just have it in our head and create something on the spot if this topic comes up.

  • Reading a book so good you can’t fall asleep without reading a new chapter, and to feel slightly sad when you finish it.
  • Walking in the snowy woods at night.
  • What it’s like to work a busy shift at a restaurant – can be any role, waiting tables, bussing, cooking, hosting. Everyone should have one evening where you are trying to serve and cater to dozens of people at once. You should know how it feels to bring someone the wrong dish or spill a glass on someone. You should know how it feels to work hard af and get no tip, get told to take something back like it’s your fault, all the normal things that happen during a busy shift.
  • Seeing an ocean in person, from a beach.
  • Contentment and security. Not necessarily full happiness, but satisfaction in your own life, and safety within it.
  • I have two. One is seeing a starry night sky, no clouds, no light pollution, just a beautiful night sky. Or better yet, the northern lights. Second is seeing the view from a mountain peak. People always talk about how ugly the world is, but I think these two things really remind you of how beautiful earth is too.
  • A good nights sleep.
  • Being in love with someone who loves you back
  • The sound of it snowing. I laid on the ground, in the snow at night in the Alaskan wilderness, in December, it’s so peaceful.
  • Even if it’s only for a short period of time: full financial independence, while being single. You can pay your own bills, you have your own place, and you have full freedom over your free time. Whether it’s staying in and binge watching Netflix, or going out and sitting amongst strangers. Your time is your own. No kids. No spouse or significant other. I find this is when you really get to know and understand yourself.
  • A loving and supportive group of humans.
  • Having real friends
  • going on a forest and smelling rain
  • Everyone should experience the joys of traveling to a foreign land at least once in their lifetime, even if it’s just to realize how much they love their own toilet. Imagine discovering new cultures, cuisines, and the thrill of trying to communicate with locals using just charades and a phrasebook. Trust me, it’s a life-changing experience that’ll give you a new appreciation for your home and a killer accent to boot.
  • Moving away from your hometown, even if it is for a year
  • A hug, simple but important
  • The energy of a concert.
  • Being well and absolutely disconnected. No phones, no GPS. I last had that experience in the early 90s. Being somewhere with someone you trust and the two of you are the only people who know where you are and what you are doing.
  • Working a minimum or entry level job as a first job especially when young.
    It really makes you appreciate money and interactions with people because it sucked and you got so little of anything even less some respect. Hell you even get to treat the people that work those jobs nicer because you were them once.
  • Another culture. And I don’t mean as a tourist where you have all the comforts of home. To fully absorb and immerse yourself in the lives of that culture. To eat their foods, drink their drinks, and do as they do.

1970s Things Found In Every Home

https://youtu.be/0g4zXepHASM

Claims that the Belt and Road initiative “could create a new epidemic” are a bizarre new line of attack on Beijing’s efforts in the country

By Timur Fomenko, a political analyst

main qimg cbd3f646f3209e52f089b8dfb923c54d
main qimg cbd3f646f3209e52f089b8dfb923c54d

A young man rides atop a load of cluster bomb casings and bomb scrap that his family is taking to a scrap market in town, Xieng Khouang, Laos, 2005. © Jerry Redfern/LightRocket via Getty Images

Laos – a landlocked communist state in Southeast Asia, wedged between China, Vietnam, Cambodia and Myanmar – has the potential to be a nexus of sorts for the entire region. However, its cooperation with Beijing has come under fire from the West.

The impoverished nation holds the unenviable distinction of “the most bombed country in history” after the US dropped over 2 million tons of bombs on it during the Vietnam War. Laos is still weathering the consequences, including deaths from unexploded munitions. Faced with numerous challenges, it has leaned on its giant northern neighbor for assistance.

In recent years, Laos has benefited considerably from China’s Belt and Road Initiative (BRI). In late 2021, the China-Laos railway was built, a high-speed system connecting the country’s capital to Beijing. This has been a gamechanger for its foreign trade and exports. Сurrently, a new superhighway is also being built across the country. Last week, however, an article from Reuters

attracted widespread disdain on social media as it sought to frame China’s development in the country as risking a “new pandemic.” It was titled ‘China, birthplace of the covid pandemic, is laying tracks for another global health crisis.’

The article argued that Laos is home to a bat population that carries “novel coronaviruses,” the same source which allegedly gave rise to Covid-19. By building a highway through the country’s tropical forests, the argument goes, humans will be brought into closer contact with bats, thus destroying their environment and risking a new pandemic. This textbook example of an over-the-top ‘China bad’ story exaggerates and fixates on the speculated negative consequences of Beijing’s activities, never providing the full picture. It is never touched on, for example, how up to 50 people a year in Laos continue to die from undetonated US bombs dropped on the country during the Vietnam war.

Western media at large have it in for China’s relationship with Laos, with outlets denouncing Chinese investments as a “debt trap ” and accusing Laos of being a “vassal state.” Why is it met with such backlash? First of all, Laos is arguably the single most pro-Chinese state in Southeast Asia, the region which the US is aggressively targeting as part of its Indo-Pacific strategy. Despite being communist, Washington sees Vietnam as a potential military and economic counterweight to Beijing due to its maritime periphery; however, Laos is a landlocked state which reduces US geopolitical leverage in countering China. Laos is also fearful of neighboring Vietnam and sees Beijing as a guarantor in securing its own independence.

This, combined with America’s bloody history in the country, and the fact it is a communist state, makes Laos a very comfortable neighbor for China, which also stands as its biggest economic guarantor. Chinese-backed infrastructure is helping the landlocked and impoverished country to gain easier access to ports and markets. Furthermore, by making it a nexus of the region, China is also integrating itself with Thailand and allowing its goods to flow to more Southeast Asian ports. This becomes an obstacle to the US vision of hegemony over the region, which involves completely dominating China’s maritime periphery in a way that checks its ability to project power and shape global commerce.

As a result, the Western corporate media are encouraged to vilify the BRI, including specifically its impact in Laos. Those doubting that there is a concerted effort to do this need only look at the America COMPETES Act of 2022, which allocates $500 million to media outlets to ostensibly “combat Chinese disinformation” for overseas audiences. Among other things, it specifically targets the BRI, effectively incentivizing negative coverage of the Chinese infrastructure project. The US hates the BRI, because it creates connections in Eurasia and therefore changes the strategic landscape away from the maritime routes dominated by America.

The Reuters story in particular draws upon the tried-and-trusted practice of scapegoating China for the Covid-19 pandemic to fearmonger about its road development in Laos. But one must question whether the US ever acknowledged what it did to Laos? Did it apologize for dropping 270 million

cluster bombs on it? An estimated 80 million of those did not explode, and while the US has invested in clean-up efforts, the 50,000 lives these bombs have claimed since the end of the war clearly show this is not enough.

Now, China is not only boosting the Laotian economy with its railroad construction, but also helping clear the deadly consequences of American militarism. Meanwhile, the West keeps promising alternatives to the BRI, with a new name cropping up virtually every year, but talk is cheap and these promises have yet to bear fruit. It’s easy to take the moral high ground on an issue when you aren’t the one who has to bear the consequences. It’s fair to say, if there is a new Cold War, Laos won’t be siding with the West.

Why does the USA attack China so much?

This one chart explains it all.

2023 05 24 06 58
2023 05 24 06 58

“Yes, the CIA and FBI WILL rig the 2024 election”

China’s first domestically designed aircraft carrier having EMALS gets launched

The Fujian, the largest aircraft carrier ever built by China, is a crucial part of the Chinese navy. China is making rapid progress in developing advanced aircraft carriers that are on par with those of the US.

It is worth noting that China has chosen to name its new aircraft carrier after Fujian, a province located just across a narrow strait from Taiwan.

The 80,000 metric ton CNS Fujian is 50% larger than China’s current in-service carriers, putting the People’s Liberation Army Navy in the same class as supercarriers like the US Nimitz-class ships, which weigh 100,000 tons.

Unlike China’s other two carriers, the Liaoning and the Shandong, which are based on outdated Soviet technology and utilize a ski-jump launching system, the Fujian is equipped with an advanced electromagnetic aircraft launch system, similar to that used on the US’s newest carrier, the USS Gerald Ford. This new system will enable China to launch a greater variety of aircraft more quickly and with more ammunition onboard.

After approximately 18 months of trials, China’s largest warship CNS Fujian is expected to become operational by October 2024.

The Fujian and a fourth carrier, which is also under construction, are larger and able to carry more aircraft than the two existing vessels. The South China Morning Post reported in March last year that the fourth carrier might be nuclear-powered.

G7 leaders in Japan declare, China number one enemy

$200 Was Too High For Me But My Mom Insisted On Buying This

645b4220aa252 WacpqAi 700
645b4220aa252 WacpqAi 700

Amarjeet Sada, The 8 YO Serial Killer…

https://youtu.be/kEIMLQ-vE8Q

Chicago-Style Sausage and Peppers

Yield: 8 servings

2023 05 22 18 29
2023 05 22 18 29

Ingredients

  • 2 tablespoons corn oil
  • 1 large red onion, thinly sliced
  • 2 large yellow bell peppers, cored, seeded and thinly sliced
  • 2 large red bell peppers, cored, seeded and thinly sliced
  • 1/4 cup Jack Daniels Sour Mash Whiskey
  • 1/4 cup dark brown sugar, packed
  • 1 tablespoon chopped fresh thyme
  • Salt and pepper to taste
  • 8 spicy Italian sausages (4 ounces each), not hot dogs!
  • 8 good quality hot dog buns
  • 2 tablespoons reserved sausage grease or soft butter

Instructions

  1. Heat corn oil in large skillet and sauté the onions and peppers until tender and beginning to brown, about 10 minutes over medium heat.
  2. Add the bourbon and stir quickly until absorbed.
  3. Add the brown sugar and stir until the sugar melts.
  4. Season with thyme, salt and pepper. (Can be refrigerated for one week. Let come to room temperature before serving.)
  5. Char-grill the sausages until slightly blackened and cooked through.
  6. Brush the hot dog buns with a little sausage grease or butter and toast on the grill or under the broiler.
  7. Nestle a sausage in a bun and top with about 2 tablespoons of peppers and onions.

Yup. The test case was a couple weeks ago.

American soldier crashed a car. He was arrested by Japanese cops. The US government demanded he be released immediately and actual threats were made by the US government to the Japanese government.

The Japanese government rolled over.

That’s the big test of if your country is a US bitch or not.

Korea had THIS

Yangju highway incident - Wikipedia

Killing, 2 Korean girls, US army vehicle Coordinates : 37°51′28″N 126°56′56″E  /  37.857722°N 126.948972°E  / 37.857722; 126.948972  ( Location of the Yangju highway incident ) The Yangju highway incident , also known as the Yangju training accident or Highway 56 Accident , occurred on June 13, 2002, in Yangju , Gyeonggi-do, South Korea . 

A United States Army armored vehicle-launched bridge , returning to base in Uijeongbu on a public road after training maneuvers in the countryside, struck and killed two 14-year-old South Korean schoolgirls, Shin Hyo-sun ( Korean : 신효순) and Shim Mi-seon ( Korean : 심미선). 

The American soldiers involved were found not guilty of negligent homicide in the court martial , further inflaming anti-American sentiment in South Korea and sparking a series of candlelight vigil protests in protest of their deaths. 

The memory of the two schoolgirls is commemorated annually in South Korea

The UK had THIS

Death of Harry Dunn - Wikipedia

Fatal road traffic collision resulting in UK/US diplomatic controversy Coordinates : 51°59′49″N 1°11′45″W  /  51.9969593°N 1.1959241°W  / 51.9969593; -1.1959241 

Death of Harry Dunn Date 27 August 2019 Time 20:25 BST Location B4031 road near RAF Croughton Cause Road traffic collision Deaths Harry Dunn Burial 17 September 2019 

Inquiries Northamptonshire Police Convicted Anne Sacoolas Charges Causing death by careless driving (convicted) Causing death by dangerous driving (acquitted) 

Harry Dunn was a 19-year-old British man who died following a road traffic collision on 27 August 2019. 

He was riding his motorcycle near Croughton, Northamptonshire , United Kingdom, near the exit to RAF Croughton , when a car travelling in the opposite direction and on the wrong side of the road collided with him. 

The car was driven by Anne Sacoolas, who is a former US spy and wife of CIA employee Jonathan Sacoolas, stationed at the time at USAF listening station RAF Croughton. 

Sacoolas admitted that she had been driving the car on the wrong side of the road , and the police said that, based on CCTV footage, they believed that to be true. 

Dunn was pronounced dead at the Major Trauma Centre of John Radcliffe Hospital , Oxford. The collision caused diplomatic tension between UK and US officials. 

Sacoolas fled the UK soon after the incident and claimed diplomatic immunity with US support.

Italy had THIS

1998 Cavalese cable car crash - Wikipedia

US Navy aircraft struck ski lift, Italy The Cavalese cable car crash , also known as the Cermis massacre ( Italian : Strage del Cermis ), occurred on February 3, 1998, near the Italian town of Cavalese , a ski resort in the Dolomites some 40 kilometres (25 mi) northeast of Trento . 

Twenty people were killed when a United States Marine Corps EA-6B Prowler aircraft, flying too low and against regulations, in order for the pilots to "have fun" and "take videos of the scenery", cut a cable supporting a cable car of an aerial lift . 

The pilot, Captain Richard J. Ashby, and his navigator , Captain Joseph Schweitzer, were put on trial in the United States and found not guilty of involuntary manslaughter and negligent homicide .

If Americans can come and wantonly commit crimes and get almost no punishment then you’re essentially an occupied country.

For Japan. THIS.

Why is China’s economy continuing to grow to the point it is the largest or second largest economy in the world based on which method used to compare economies.

China has been able to harness a number of factors over several decades that has benefited its people economically. The Chinese government has taken great effort to improve the lives of its people. Its goal is to create a moderately prosperous society for its huge population. With a country of 1.4 billion people moderately prosperous equates to a large economy.

China has devoted a lot of effort to educate its people. In 1950 the literacy rate was 20%, but today it is over 97%. Eduction is highly important to the government. This has led China to produce the most STEM (science, technology, engineering, math) graduates yearly, which drives innovation.

2023 05 22 18 50
2023 05 22 18 50

Chinese culture is one of business and that means trade is an important part business activity. Now days China trades with almost every country globally. It is the primary trade partner with many.

2023 05 22 18 50s
2023 05 22 18 50s

With China’s huge manufacturing sector needed to produce goods for it huge population benefits from economies of scale. This in turn drives down manufacturing costs making goods cheaper in China and for export.

Developed economies for the most part are service economies not manufacturing ones, hence their need to import goods.

2023 05 22 18 51
2023 05 22 18 51

China’s ability to produce a wide variety of goods from simple utensils to automobiles and high speed trains means it can produce much of what other countries need but cannot produce.

All the above and more is why China’s economy continues to grow at a faster rate compared to the developed countries of the West.

1970’s Rmic Hand Chair

Thrift store find.

645b42c261a00 i0xjb5adkgq91 700
645b42c261a00 i0xjb5adkgq91 700

Kenyan President Ruto Says African Leaders Won’t Be Summoned Like Kids By The West No Longer

Ukrainian Artist Dinara Kasko Continues To Push The Boundaries Of Pastry Design

0 71 650x650
0 71 650×650

Here are the incredible edibles of pastry chef Dinara Kasko. The culinary artist from Ukraine has amassed a huge online following for her innovative cake designs and moulds. Although Dinara graduated from Kharkov University Architecture School, she found her true passion was pastry. However, she now uses her background in architectural design to create her incredible cakes as she uses the 3D-modelling program, 3DSMAX, to create silicone cake moulds.

More: Instagram, Shop h/t: twistedsifter

dinarakasko 41614189 861744723949514 5990201141601036649 n 650x650
dinarakasko 41614189 861744723949514 5990201141601036649 n 650×650
dinarakasko 41391858 160508341542774 2235192387253299797 n 650x650
dinarakasko 41391858 160508341542774 2235192387253299797 n 650×650
dinarakasko 41324106 483875635427462 8244750592175350411 n 650x650
dinarakasko 41324106 483875635427462 8244750592175350411 n 650×650
dinarakasko 40998570 527878407684987 2203689512561675051 n 650x650
dinarakasko 40998570 527878407684987 2203689512561675051 n 650×650
dinarakasko 40527828 182137562683559 7771011558694223350 n 650x650
dinarakasko 40527828 182137562683559 7771011558694223350 n 650×650
dinarakasko 40130902 897982783727241 1534858838783851366 n 650x650
dinarakasko 40130902 897982783727241 1534858838783851366 n 650×650
dinarakasko 39325447 822674894745944 5624021363556614144 n 650x650
dinarakasko 39325447 822674894745944 5624021363556614144 n 650×650
dinarakasko 38817756 226834861307241 6010283633800118272 n 650x650
dinarakasko 38817756 226834861307241 6010283633800118272 n 650×650
dinarakasko 38758152 223370175018951 4754677595813969920 n 650x650
dinarakasko 38758152 223370175018951 4754677595813969920 n 650×650
dinarakasko 38618432 2159951087623608 2479376902201016320 n 650x650
dinarakasko 38618432 2159951087623608 2479376902201016320 n 650×650
dinarakasko 38431279 1049952548488589 1242157451705319424 n 650x650
dinarakasko 38431279 1049952548488589 1242157451705319424 n 650×650
dinarakasko 37930832 2092981207443359 8458182475875614720 n 650x650
dinarakasko 37930832 2092981207443359 8458182475875614720 n 650×650
dinarakasko 37719115 461748637672841 3298468693587001344 n 650x650
dinarakasko 37719115 461748637672841 3298468693587001344 n 650×650
dinarakasko 37350152 311301616109832 4007132447681544192 n 650x650
dinarakasko 37350152 311301616109832 4007132447681544192 n 650×650
dinarakasko 37219535 1139442422879889 4187861707969789952 n 650x650
dinarakasko 37219535 1139442422879889 4187861707969789952 n 650×650
dinarakasko 37123355 498770223878587 4588682225129619456 n 650x650
dinarakasko 37123355 498770223878587 4588682225129619456 n 650×650
dinarakasko 37046974 1113847855422026 6421143662784151552 n 650x650
dinarakasko 37046974 1113847855422026 6421143662784151552 n 650×650
dinarakasko 37006114 291523351416108 1451648647685996544 n 650x650
dinarakasko 37006114 291523351416108 1451648647685996544 n 650×650
dinarakasko 36991283 175126146692154 4468434200382406656 n 650x650
dinarakasko 36991283 175126146692154 4468434200382406656 n 650×650
dinarakasko 36981775 523168418101156 134943822286159872 n 650x650
dinarakasko 36981775 523168418101156 134943822286159872 n 650×650
dinarakasko 36942191 172914016904065 1234765447916683264 n 650x650
dinarakasko 36942191 172914016904065 1234765447916683264 n 650×650
dinarakasko 36934903 238351493556148 6441881830768508928 n 650x650
dinarakasko 36934903 238351493556148 6441881830768508928 n 650×650
dinarakasko 36907511 165151734360140 6880737431545446400 n 650x650
dinarakasko 36907511 165151734360140 6880737431545446400 n 650×650
dinarakasko 36858249 259595097926360 5939026827824594944 n 650x650
dinarakasko 36858249 259595097926360 5939026827824594944 n 650×650
dinarakasko 36751418 223708181801981 1172602827168546816 n 650x650
dinarakasko 36751418 223708181801981 1172602827168546816 n 650×650
dinarakasko 36734210 434855686995557 763599757359710208 n 650x650
dinarakasko 36734210 434855686995557 763599757359710208 n 650×650
dinarakasko 36698358 217829555723286 3475720001028096000 n 650x650
dinarakasko 36698358 217829555723286 3475720001028096000 n 650×650
dinarakasko 36160658 1581276925328803 2367888729541967872 n 650x650
dinarakasko 36160658 1581276925328803 2367888729541967872 n 650×650
dinarakasko 36148118 1988891081421575 1635678470082134016 n 650x650
dinarakasko 36148118 1988891081421575 1635678470082134016 n 650×650
dinarakasko 36147766 275253999699940 7359782084988108800 n 650x650
dinarakasko 36147766 275253999699940 7359782084988108800 n 650×650
dinarakasko 36136644 665021273845403 7723593891160522752 n 650x650
dinarakasko 36136644 665021273845403 7723593891160522752 n 650×650
dinarakasko 36044514 214788319176144 1562719370998710272 n 650x650
dinarakasko 36044514 214788319176144 1562719370998710272 n 650×650
dinarakasko 35617011 651574808521201 7143799836213510144 n 650x650
dinarakasko 35617011 651574808521201 7143799836213510144 n 650×650
dinarakasko 35616970 1564807433645404 52030977580466176 n 650x650
dinarakasko 35616970 1564807433645404 52030977580466176 n 650×650
dinarakasko 35515149 228660027928389 4379804479327830016 n 650x650
dinarakasko 35515149 228660027928389 4379804479327830016 n 650×650
dinarakasko 34478544 2204842826198339 1142588689465999360 n 650x650
dinarakasko 34478544 2204842826198339 1142588689465999360 n 650×650
dinarakasko 33545912 1850178935287529 3029794080923058176 n 650x650
dinarakasko 33545912 1850178935287529 3029794080923058176 n 650×650
dinarakasko 30086751 1801197790182190 1706444352705789952 n 650x650
dinarakasko 30086751 1801197790182190 1706444352705789952 n 650×650
dinarakasko 30085482 189399711865494 6468088157840605184 n 650x650
dinarakasko 30085482 189399711865494 6468088157840605184 n 650×650
dinarakasko 29738082 804168449788145 4066623122030198784 n 650x650
dinarakasko 29738082 804168449788145 4066623122030198784 n 650×650
dinarakasko 29416069 161107051255551 542833404643639296 n 650x650
dinarakasko 29416069 161107051255551 542833404643639296 n 650×650
dinarakasko 29414608 356259028193480 8509945950007984128 n 650x650
dinarakasko 29414608 356259028193480 8509945950007984128 n 650×650

 

No, because both have nukes. The US has been doing everything to stop China’s rise. Lying and accusing China on human rights, genocide, and whatever sins they can think of to discredit China. The US now summons her vassals to go to war with China to weaken China’s economy and military, similar to UR conflict.

Only BABY BOOMERS will REMEMBER these things

“Garden Decor” For Sale On Fb Marketplace

645b403106763 s25p8if49hva1 700
645b403106763 s25p8if49hva1 700

TWO BOEING E-4B COMMAND AND CONTROL AIRCRAFT AIRBORNE OVER CONTINENTAL USA

Fwr0UwcWIAECb3W
Fwr0UwcWIAECb3W

Things No Longer Found at Gas Stations

Did I Just Find A Serial Killer?

645b3feab2a20 rspiyltzhkta1 700
645b3feab2a20 rspiyltzhkta1 700

Chicago Hot Dogs

Never leave the celery salt off the Chicago Dogs! They won’t be the same. I guarantee it.

chicago hot dogs
chicago hot dogs

Ingredients

  • All-beef hot dogs
  • Green sweet bell pepper, diced
  • Yellow onions, diced
  • Mustard
  • Sweet pickle relish
  • Dill pickle chips
  • Cucumbers, sliced thin
  • Iceberg lettuce, shredded
  • Tomatoes, diced
  • Hot peppers (pepperoncini)
  • Celery salt

Instructions

  1. Steam hot dogs and put condiments on table. NEVER USE KETCHUP! Celery salt is a MUST!
  2. Serve on poppy seed buns, if they are available.

Kenya President Gets Standing Ovation in Pan-African Parliament for Epic Speech

2023 05 24 11 21
2023 05 24 11 21
2023 05 24 11 22
2023 05 24 11 22

No Eyedea What It Is, From Goodwill

645b552224d55 boe4rfeamiia1 700
645b552224d55 boe4rfeamiia1 700

Scam may be overstating it, but they will seize your money without warning or explanation and you should avoid using them as much as possible, especially if you are a business.

I would strongly advise anyone, especially a seller, to avoid using Paypal. Like many, I was in the camp of “They’re the most established payment service on the web and I’ve never had a problem with them.” Until I did, and I’ve learned of the massive amount of unethical behavior they get away with.

In my case, the situation’s not too severe, but it’s still frustrating. I coached a client overseas in Europe. He wanted to pay with Paypal. Not having a better suggestion, I thought sure, why not? I coached, he sent the funds over, all set, right?

Paypal put a hold on the funds for a few days to make sure things were in good order. Shortly thereafter, they suspended my account. I got the following email:

2023 05 24 14 58
2023 05 24 14 58

Mind you, I have literally only done a single transaction on this account, the one I just did. I had no warning there was a problem with my account and my client is in good standing with Paypal. I did not receive any explanation.

On the site, my account now has a banner that looks like this:

2023 05 24 14 59
2023 05 24 14 59

I can no longer transfer money, unlink my bank account, remove my personal information, or anything. Paypal has indefinitely seized my money.

If I attempt to refund my client, they tell me the attempt fails due to technical reasons.

Paypal offered no explanation for the freeze. They claimed the funds would be released after a review that ended on May 15th, 2023, and I got this email:

2023 05 24 15 01
2023 05 24 15 01

I consequently reported them to the Better Business Bureau. Paypal actually responded on this, claiming that my account used an “anonymizing service” (I assume referring to the fact I use a VPN for all of my Internet activity) and that I share limited access with another account (I have no idea what this means). These were the only explanations given for why they seized my funds.

2023 05 24 15 02
2023 05 24 15 02

I will reiterate that I never received any warning or notification that my account had any issues prior to the transaction. It was only after the transaction, when Paypal had possession of my money, that they notified me they would be keeping it for themselves.

If they genuinely believed I was a security risk, they should have prevented my transaction in the first place, or immediately refunded my client’s payment. It’s like if I tried to ship a package with UPS, and UPS just said “we think you might be a drug dealer so we’re just going to keep your package for ourselves.”

As of now, I have requested only that they refund my client. Even if they have an issue with me, I don’t see how they can justify refusing a refund. At this time I have not received a response and my client has not been refunded.

So I know you might be thinking, because I was thinking – “Howie it clearly must be just something with you. You did something wrong to justify this treatment.” I am far from alone.

They faced a class action lawsuit for this behavior in 2022

. They seized $172,000 from one plaintiff, $42,000 from another, and $26,984 from a third. Very similar situation – frozen account, no explanation, get a subpoena if you want to find out why.

If you’d like a plethora of horror stories, just visit the ecommerce subreddit

.

Read any of the reviews on trustpilot

, consumeraffairs

, or wherever else. Obviously there is a tendency to leave negative reviews rather than positive to go in appreciating that, but you’ll find many, many users who’ll tell you this same story.

Whether you think I’m just a crazy one-off case or not, I strongly encourage you take measures to protect yourself so you do not become a victim as well. I’d offer the following suggestions.

  • If you can avoid using Paypal, do so.
  • If you must use Paypal, keep as little balance in your account as possible, as it can be seized at any time.
  • If you can associate Paypal with a deposit-only account, do so. They shouldn’t be able to withdraw from your linked bank account without your consent, but there are some user horror stories where that has happened.
  • Be aware that Paypal owns Venmo as well.

There are numerous alternatives to Paypal, several of which even charge lower fees, including Stripe, Wise, Square, Google, and more. All have better reputations and at the very least I can tell you none of them have taken my money for themselves.

Good luck. I hope this post helps you avoid being a victim.

Everything You Remember And Miss About…SEARS

41 Countries Ready To Accept BRICS Currency

The list of countries interested to join the BRICS alliance and accept the new currency for global trade is growing. 

China and Russia are lobbying other developing countries in joining the international efforts to dethrone the U.S. dollar. 

Developing countries in Asia and Africa are looking to replace the U.S. dollar with their native currencies or a new tender. 

The development is causing a roadblock to the dollar’s prospects and challenging its status as the world reserve currency...


Article HERE

Not possible.

China is an outlier in most aspects of economy and it is impossible for India to catch up in foreseeable future because –

  1. Current differential between the two countries is too large
  2. Factors that enable future growth (education, innovation, industrialization) are not firing on all cylinders either

Listed below are the data points from few indicators to illustrate the situation –

Trade & Industrialization:

  • Total exports (2016): India – $260 billion, China – $2.1 trillion
    • apparel: India – $18 billion, China – $175 billion
    • footwear: India – $2.5 billion, China – $51 billion
    • electrical and electronics – India – $8 billion, China – $782 billion
  • Number of large companies in Fortune 500 (2017): India has 7, China has 109

Infrastructure & Facilities:

  • High Speed Rails:
    • India – first HSR project (Mumbai-Ahmedabad) started in 2017, to be functional by 2022 covering 500 km
    • China – already has 25,000 km of HSR network, transporting double the volume of passengers than airlines
  • Metro Trains:
    • India – 8 cities with total track length of 370 km
    • China – 39 cities with total track length of 3,600 km (Beijing metro alone is 600 km)
  • Airports: India has 346, China has 507 (2013 data)
  • World’s Top 1000 hospitals: India has 9, China has 84

Tourism:

  • Foreign Tourist arrivals: India – 10 million,
  • China – 60 millionTourism revenue:
  • India – $27 billion,
  • China – $114 billion

Education & Innovation:

  • World’s Top 500 universities: India has 8, China has 21
    Adult Literacy: India 74% (2011 data), expected to hit mid-80’s by next census (2021), China – 99% (2010)
  • Number of Patents and Trademarks: both India and China are in world’s Top 10 (2016 data)
    Patents filed by India – 45k, China – 1.3 million
    • Trademarks listed by India – 313k, China – 3.7 million

Rising Income levels:

  • 75% of world’s new billionaires are coming from India and China:
    • Since 2010, India is adding one new billionaire every 33 days
      China is adding one new billionaire every 5 days
    • India has world’s third highest number of billionaires and China has world’s largest:

      Number of billionaires in India – 131, China – 819
  • Expanding Middle Class:
    • India – 600 million people, based on the criteria of spending ($2 to $10 per day)
      Only 24 million people, if based on the criteria of wealth ($13k)
    • China – 500 million by 2022, based on the criteria of earning ($9k to 34k)
    • GDP Per Capita: India – $1.7k, China – $8.1k
  • Overall Economy:
  • Forex reserves: India – $400 billion, China – $3 trillion
  • GDP (nominal): India – $2.5 trillion, China – $11 trillion
  • Trend
2023 05 24 11 39
2023 05 24 11 39

Key Take-Aways and Summary:

  • China’s exports of only electricals and electronics ($782 billion) are three times of India’s total exports ($260 billion)
  • Length of metro in China’s one city (Beijing – 600 km) is more than total length of all metros in India (370 km)
  • China’s forex reserves ($3 trillion) are more than India’s total GDP ($2.5 trillion)
  • China’s middle class is not only larger, but also richer than India’s middle class – making it a more attractive investment destination
  • India’s growth story is real, but China’s growth story is much bigger. On most economic indicators, India has been performing good, but China has been performing a lot better
  • Before 2020, India is estimated to overtake UK and France to become world’s fifth largest economy
2023 05 24 11 40
2023 05 24 11 40
  • By 2030, India is expected to overtake Germany and Japan to become world’s third largest economy. But even then ($6 trillion +), it would be less than one-third the size of China’s economy ($20 trillion +)
2023 05 24 11 4r1
2023 05 24 11 4r1

If interested, please refer to my other write-ups on India – China topics:

Shashank Goyal’s answer to Why has China developed so much faster than India?

Shashank Goyal’s answer to Why did China invade India in 1962?

Sylvester Stallone Prop Found In A Thrift Store

645b40887af3c k6fmm1gh0aj91 700
645b40887af3c k6fmm1gh0aj91 700

United States puts its “cross hairs” on Africa

A country that is well known for best at controlling internet trolls and media is exaggerating a non-existent event in Africa, namely “China is launching a social movement to persecute black people”. In fact, from 2023 until May 24, 2023, I have not seen any hot topics or frontpage news related to black people in China on any social media platform.

By the way, in China, the vast majority of people have never seen murder in their lifetime. It is foolish to use the lie of ‘encouraging murder’ to describe China. Because even if this kind of encouragement exists, no one will respond. Chinese people do not know how to murder, unlike the country that creates this lie.

2023 05 24 11 37
2023 05 24 11 37

CLOSED Fast Food Restaurants from the past

Beijing summons Japanese envoy over ‘anti-China’ G7 summit

China’s Vice Foreign Minister Sun Weidong has summoned the Japanese ambassador to register protests over “hype around China-related issues” at the Group of Seven (G7) summit over the weekend, the foreign ministry said in a statement.

The heads of the world’s richest countries who met in the Japanese city of Hiroshima expressed serious concerns about rising tensions in the East China Sea and the South China Sea as well as voicing concerns about the human rights situations in China, including in Tibet and Xinjiang.

Article HERE

Huawei is preparing a number of new chipsets to launch later this year and Kirin A2 is one of them. The company is testing this chip for quite a time and it’s ready for production.

main qimg 683730442cd8736a4555cdee8051d838
main qimg 683730442cd8736a4555cdee8051d838

Huawei will launch the Kirin A2 chipset by this year. If everything goes right, the company could choose Q3 or Q4 for the release.

Also, Kirin A2 is ready for the trial stage and it has mass production capacity.

This is due to the past decision that Huawei took at the very last moment before launch events. Yet, the exact details are unknown. On this matter, Huawei has not revealed any details about Kirin A2 or related returns. But we’ll have to wait, as there are several months left in the making.

Kirin A2 for smartphones?

Nope, Kirin A-series was officially announced for wearable devices such as earphones, smartwatches, and others. The current breakthrough in Huawei’s chipset production capability remains low-key.

Therefore, the company may take this route to start producing self-developed wearables semiconductors. These types of chips don’t require advanced process technology. Hence, it’s very likely that Kirin A2 will be used for wearable gadgets.

Kirin A1:

Kirin A1 was the world’s first Bluetooth 5.1 and Bluetooth Low Energy 5.1 wearable chip. The A1 is developed by Huawei’s chipset designing division, HiSilicon, and printed by Taiwan’s TSMC.

Kirin A1 is designed for wireless earphones, headbands, neckbands, smart speakers, smart eyewear, and smartwatches. Huawei Watch GT 2 series is the first smartwatch to equip this SoC and it’s still running wild in terms of performance and battery.

After the US sanctions in 2019, Huawei had to stop making new HiSilicon chips. And with the recent achievement in automation tech, Huawei could print its own chipset.

Stores We Loved That No Longer Exist!

https://youtu.be/XcewCyZkvWw

What is the purpose of the US-Papua New Guinea defense agreement pact?

Leaked draft of the US-Papua New Guinea defense pact exposes the granting of legal immunity to US personnel and contractors, allowing unrestricted movement of US aircraft, vehicles, and vessels, and exempting US staff from migration requirements.

It is evident that this pact serves the US’s geopolitical interests rather than offering genuine humanitarian aid. The motive aligns with the US’s broader Indo-Pacific strategy.

However, what PNG truly needs is effective action to address the climate crisis and achieve economic growth. Unfortunately, the US is unlikely to prioritize these crucial concerns. Instead, it treats PNG and other South Pacific nations as mere pawns in its larger geopolitical game.

This behavior reflects the US’s historical tendency to come and go in the region as it pleases, without consistent commitment or genuine regard for local priorities.

Pictures from the past

135023461 i7HSO rBu9LiGy3HZUWHlSKsC84avzkKWDrTeFtkdWA
135023461 i7HSO rBu9LiGy3HZUWHlSKsC84avzkKWDrTeFtkdWA
chorley park was the fourth government house constructed in the early 20th century in toronto the bi tumb 660
chorley park was the fourth government house constructed in the early 20th century in toronto the bi tumb 660
pieces of old architecture that are now lost 640 01
pieces of old architecture that are now lost 640 01
pieces of old architecture that are now lost 640 02
pieces of old architecture that are now lost 640 02
pieces of old architecture that are now lost 640 09
pieces of old architecture that are now lost 640 09
pieces of old architecture that are now lost 640 11
pieces of old architecture that are now lost 640 11
pieces of old architecture that are now lost 640 18
pieces of old architecture that are now lost 640 18
pieces of old architecture that are now lost 640 20
pieces of old architecture that are now lost 640 20
pieces of old architecture that are now lost 640 32
pieces of old architecture that are now lost 640 32
pieces of old architecture that are now lost 640 33
pieces of old architecture that are now lost 640 33
pieces of old architecture that are now lost 640 high 03
pieces of old architecture that are now lost 640 high 03
pieces of old architecture that are now lost 640 high 04
pieces of old architecture that are now lost 640 high 04
pieces of old architecture that are now lost 640 high 06
pieces of old architecture that are now lost 640 high 06
pieces of old architecture that are now lost 640 high 08
pieces of old architecture that are now lost 640 high 08
pieces of old architecture that are now lost 640 high 12
pieces of old architecture that are now lost 640 high 12
pieces of old architecture that are now lost 640 high 14
pieces of old architecture that are now lost 640 high 14
pieces of old architecture that are now lost 640 high 16
pieces of old architecture that are now lost 640 high 16
pieces of old architecture that are now lost 640 high 22
pieces of old architecture that are now lost 640 high 22
pieces of old architecture that are now lost 640 high 29
pieces of old architecture that are now lost 640 high 29
SHORPY 4a25677a.preview
SHORPY 4a25677a.preview
SHORPY 4a09098a
SHORPY 4a09098a
SHORPY 4a09098a.preview
SHORPY 4a09098a.preview
SHORPY 4a10873a.preview
SHORPY 4a10873a.preview
SHORPY 4a11556a.preview
SHORPY 4a11556a.preview
SHORPY 5a08489u.preview
SHORPY 5a08489u.preview
SHORPY 8d33892u.preview
SHORPY 8d33892u.preview
SHORPY 8d34747a2.preview
SHORPY 8d34747a2.preview

First

Get a SIM

It’s a prepaid sim card. The Airports have many counters. Simply present your passport and visa and get a pre paid SIM card.

That gets you around 20GB Data that should be enough for a few days

Connection takes only seconds. The minute you insert the sim, the phone works and you can make the calls

Now most loaded apps won’t work


Next Money

You can easily download WeChat and Alipay but Alipay is better

However there is a problem for Indians

OTP

You can register Alipay for foreigners and enter your card details and load Rs. 25000/— per day (CNY 2000)

You get your OTP in some cases and that OTP cannot be read by your phone unless you have roaming

In my case, a friend from SBI Shanghai loaded money into my Alipay from his account

So best option is to preload Alipay from India itself except that it’s banned

So what to do?

Don’t worry

Enterprising Chinese at the Airport will gladly take your cash dollars (No Rupee) and load money into your Alipay

They even have counters for foreigners


Next VPN

Install Nord VPN and buy the Pro version

However be prepared for a few days to not have proper Twitter or Instagram or Facebook response

Unless you have WiFi router, Mobile Data usually doesn’t use VPN that efficiently


Finally get a prescription if you are carrying medicines please


Do Volunteer for the Face Scan. That way when you reach your hotel and they simply scan your face, and your details jump out and you don’t need a passport at all wherever you go within Shanghai (Only in Shanghai)

I had this happen to me.

My family and I were at home one evening, when all the sudden someone started frantically pounding on my front door. My wife opened the door to the neighbor lady who was crying hysterically. She invited her in, and she told us her husband was in a rage, and had put his hands on her.

About that time, the husband came charging through my front door, and began verbally assaulting his wife with profanity at the top of his lungs. In MY living room.

Before I had a chance to address the situation, my older daughter told him to tone it down, at which point he responded with “shut the F!#K up, B#!CH”.

The words barely left his lips before those lips were introduced to my fist.

Turns out he had no interest in fighting another man.

Once he found his feet, he was out my front door faster than he barged in. I’m sure most of the folks reading this will be disgusted with my actions. I Don’t care.

What does matter to me, is the opinion of that man’s wife.

Years later, she thanked me, saying he never put his hands on her again.

Not because he didn’t want to, but because he was afraid she would run to my house!

Fine by me.

Classic TV Commercials from the ’60s and ’70s

OMG!

.
(Visited 469 times, 1 visits today)
5 1 vote
Article Rating
4 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Trak

World on a Wire?
In the present day, Cybernetics and Future Science’s (Institut für Kybernetik und Zukunftsforschung) new supercomputer hosts a simulation program that includes an artificial world with more than 9,000 “identity units” who live as human beings, unaware that their world is just a simulation.
https://en.wikipedia.org/wiki/World_on_a_Wire

mtness

I have created a forum topic to add to the list here: Looking for that one movie

We should add to the list there, and hopefully find that flick!

Best regards, MT

Dan

A variation on the lefts number one motto…. Rules are for thee, never for me.