
Richard Doty is a former Air Force Intelligence operative whose job at Kirtland AFB in New Mexico in...

In this Pete Smith Specialty short, we see how real-life investigator Jo Goggin used a motion pictur...

This short 19-minute documentary is an intimate and moving exploration of the profound and far-reach...

This documentary-drama hybrid explores the dangerous human impact of social networking, with tech ex...

Warsaw's Central Railway Station. 'Someone has fallen asleep, someone's waiting for somebody else. M...

NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the ge...

Host Grant Jeffrey discusses how technology and government activities are changing the way our infor...

David Bond lives in one of the most intrusive surveillance states in the world. He decides to find o...

Under the pretext of fighting terrorism or crime, the major powers have embarked on a dangerous race...

A U.S. military surveillance balloon floats on a tether high above Kabul, Afghanistan. Its capacitie...

By exploring the relationship between the watched and the watching, our film uncovers the trauma and...

Based on newly declassified files, the film explores the US government’s surveillance and harassment...

Under the leadership of Xi Jinping, China is on its way to becoming the leading world power of the 2...

Facebook, Amazon and Google provide us with around the clock access to the convenient digital world!...

Sonia Kennebeck takes on the controversial tactic of drone warfare, and demands accountability throu...

A Good American tells the story of the best code-breaker the USA ever had and how he and a small tea...

Some things can be seen more clearly at night.. . A film poem about a continent at night, a culture...

Uncover the insidious ways in which our daily lives are being surveilled by the state. In a gripping...

A Feature Documentary, featuring David Icke The 'mad man' who has been proved right again and again ...

Cyberspace is more insecure than ever as hackers exploit human error and technical vulnerability to ...