Preview

We Are Legion Movie Analysis

Good Essays
Open Document
Open Document
771 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
We Are Legion Movie Analysis
9. We are legion: The story of hacktivists:
Brian Knappenberger writes and creates a film which portrays a special and expert hacking group, their inside workings, plans and beliefs which they use and test to carry out their cyber-attacks.
This group of hacktivists hacks into cyberspaces, online government portals, websites of foreign governments and lots more as a way of protesting against the abuse of copyrights, online censorship, brutality of the police.
10. Firewall:
In this movie, great skill is given to the expertise of Jack Stanfield who is an expert in Bank security. Based on his expertise, he builds his career. He goes about designing computer systems which are theft proof.
However, his achievements and all of his moves are followed
…show more content…
Together they secretly watch the actions of the powerful and privileged people around the world.
They are the masterminds behind the creation of a whistle blower platform and through this platform they leak information without revealing their identities. In the process, a whole lot of nefarious plans are released, government secrets are exposed and the culprits are brought to justice.
12. Black Hat:
The movie begins with the hacking of popular and important business like a nuclear plant in Hong Kong and Chicago’s Mercantile Trade Exchange. The perpetrators are unknown and still at large. A proposal is made that the FBI would involve itself and work together along with China to track down these cyber criminals and hackers.
The Chinese investigation team insists on releasing an international criminal hacker by the name of Nick Hathway, from prison, in order to help track down these cyber criminals. As Nick Hathway, the FBI and the Chinese join forces, they unravel the mystery behind the cyber attacks.
13. Algorithm: Hacker
…show more content…
With his hacking into the program he is forced to be a part of a cyber revolution that rocks his world apart.
14. Eagle Eye:
In the movie, Eagle eye, we see the lives of two complete strangers, Jerry Shaw and Rachel Holloman. The two of them come into contact with another complete strange and mysterious looking woman.
They are suddenly thrown into a turmoil where their lives are in danger and it threatens to destroy their family completely as well. It all began when they picked up a phone call from an unknown caller who has been tracking them and controlling all of their moves and actions through the latest technology.
15. IT:
This movie is like a reincarnation of the troubles that the characters faced when they were kids and it comes back to haunt them as adults. It begins with scenes of social outcast groups from the year 1960 being bullied and tormented by a demon which can change itself into a clown. It comes back to haunt them after so many years, and they must fight this evil demon to free their adult life from danger.
16.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Chewy 123 Case Study

    • 371 Words
    • 2 Pages

    He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" to disrupt the networks of Sony Pictures,…

    • 371 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The antagonists is a company called ChatRoll and they’re obvious leader is the founder and president of the ChatRoll named Thomas Roll. Thomas backstory is when he was a child they had school back then and Thomas got picked on constantly. How he was a loser and how he would never amount to anything, He hated school he never wanted to go back but his mom and dad would always make him feel better when he got home. Then the nuclear war happened and both his parents were killed by a bombing at city hall while they were at a charity event and he was sent to his abusive uncle and transferred to another school where the bullying just got worse and worse by the day. He was so happy when the government announced that there would no longer be public…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Area 51

    • 351 Words
    • 2 Pages

    - Activities related to a supposed shadowy one world government or the Majestic 12 organization.…

    • 351 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Flawfinder

    • 277 Words
    • 1 Page

    Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The Ku Klux Klan people haven 't gotten out of the idea the black people…

    • 1738 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    Black Hat Hackers; groups of individuals that writes and deploys malware programs and or viruses for profit or for fun.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Survivalist Groups

    • 1252 Words
    • 6 Pages

    South are usually very racist, and unlike the groups in the North, they are not…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Anonymous Group

    • 1592 Words
    • 7 Pages

    They sometimes are referred to as “hactivists”, which means they act like activists but hacking computers using the Internet in order to carry out their objectives. They claim they don’t have a leader, but still act in a…

    • 1592 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The recent security breach by unauthorized intruders into the parent company of NASDAQ is an example of the kind of breaches directed against important financial infrastructure and illustrates the difficulty of determining clear attribution. As we would in response to any such breach, the FBI is working to identify the scope of the intrusion and assist the victim in the remediation process.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Anonymous Research Paper

    • 734 Words
    • 3 Pages

    A "loose coalition of Internet denizens,"[12] the group is banded together by the Internet, through sites such as 4chan,[10][12] 711chan,[10] Encyclopædia Dramatica,[13] IRC channels,[10] and YouTube.[3] Social networking services, such as Facebook, are used for the creation of groups which reach out to people to mobilize in real-world protests.[14]…

    • 734 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Secret Societies

    • 2335 Words
    • 10 Pages

    “They are seen as the bogeymen of our time. Are these groups really something to be feared?” This quote from Mysteries of History: Secret Societies is the basis for the ideas in this essay. The groups being spoken about in the quote are ones that hold many covert ideas and powerful purposes to which most of the public have no clue. What really is a secret society? There is no actual definition to what a secret society really is, each individual groups defines itself. Each group has its own set of morals and values that deeply identify what it is. Throughout history, there have been a large amount of people who join these groups, but why they join is something they will forever keep to themselves. It mostly started with your average rebel forming a group against views they do not agree with, or against their current governmental situation. Evan today there are major politicians, like, George H.W. Bush, George W. Bush, and even George Washington; have been said to be part of these groups. And it seems that entertainers are following the trend. Rappers Jay-Z and Kanye west, and Singer Rihanna…

    • 2335 Words
    • 10 Pages
    Good Essays
  • Better Essays

    Domestic Surveillance

    • 1760 Words
    • 7 Pages

    Their main goal is to search for terrorist or potential terrorist so that nothing bad will happen to us or the Nation as a whole. They have many different partners in crime or those that help to fight crime you can say all over the United States. They all link up and support one another with leads and information as it becomes available. The USA PATRIOT Act was passed in 2001 so that many people or companies can unite and help one another by linking up and communicating with what information that they may have on terrorist or possible terrorist to deter them. All this information is available 24 hours a day and is index and stored and shared…

    • 1760 Words
    • 7 Pages
    Better Essays