Wargames Reagan

7 results back to index


pages: 383 words: 105,021

Dark Territory: The Secret History of Cyber War by Fred Kaplan

air gap, Big Tech, Cass Sunstein, Charles Babbage, computer age, data acquisition, drone strike, dumpster diving, Edward Snowden, game design, hiring and firing, index card, information security, Internet of things, Jacob Appelbaum, John Markoff, John von Neumann, kremlinology, Laura Poitras, Mikhail Gorbachev, millennium bug, Morris worm, national security letter, Oklahoma City bombing, operational security, packet switching, pre–internet, RAND corporation, Ronald Reagan, seminal paper, Seymour Hersh, Silicon Valley, Skype, Stuxnet, tech worker, Timothy McVeigh, unit 8200, uranium enrichment, Wargames Reagan, Y2K, zero day

After finishing his synopsis, Reagan turned to General John Vessey, the chairman of the Joint Chiefs, the U.S. military’s top officer, and asked, “Could something like this really happen?” Could someone break into our most sensitive computers? Vessey, who’d grown accustomed to such queries, said he would look into it. One week later, the general came back to the White House with his answer. WarGames, it turned out, wasn’t at all far-fetched. “Mr. President,” he said, “the problem is much worse than you think.” Reagan’s question set off a string of interagency memos, working groups, studies, and meetings, which culminated, fifteen months later, in a confidential national security decision directive, NSDD-145, signed September 17, 1984, titled “National Policy on Telecommunications and Automated Information Systems Security.”

When cyberspace is everywhere, cyber war can seep through every digital pore. During the transitions between presidents, the ideas of cyber warfare were dismissed, ignored, or forgotten, but they never disappeared. All along, and even before Ronald Reagan watched WarGames, esoteric enclaves of the national-security bureaucracy toiled away on fixing—and, still more, exploiting—the flaws in computer software. General Jack Vessey could answer Reagan’s question so quickly—within a week of the meeting on June 8, 1983, where the president asked if someone could really hack the military’s computers, like the kid in that movie—because he took the question to a man named Donald Latham.

The only computer that’s completely secure, he told them with a mischievous smile, is a computer that no one can use. Ware gave Lasker and Parkes the confidence to move forward with their project. They weren’t interested in writing sheer fantasy; they wanted to imbue even the unlikeliest of plot twists with a grain of authenticity, and Ware gave them that. It was fitting that the scenario of WarGames, which aroused Ronald Reagan’s curiosity and led to the first national policy on reducing the vulnerability of computers, was in good part the creation of the man who’d first warned that they were vulnerable. Ware couldn’t say so, but besides working for RAND, he also served on the Scientific Advisory Board of the National Security Agency.


pages: 482 words: 121,173

Tools and Weapons: The Promise and the Peril of the Digital Age by Brad Smith, Carol Ann Browne

"World Economic Forum" Davos, Affordable Care Act / Obamacare, AI winter, air gap, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, augmented reality, autonomous vehicles, barriers to entry, Berlin Wall, Big Tech, Bletchley Park, Blitzscaling, Boeing 737 MAX, business process, call centre, Cambridge Analytica, Celtic Tiger, Charlie Hebdo massacre, chief data officer, cloud computing, computer vision, corporate social responsibility, data science, deep learning, digital divide, disinformation, Donald Trump, Eben Moglen, Edward Snowden, en.wikipedia.org, Hacker News, immigration reform, income inequality, Internet of things, invention of movable type, invention of the telephone, Jeff Bezos, Kevin Roose, Laura Poitras, machine readable, Mark Zuckerberg, minimum viable product, national security letter, natural language processing, Network effects, new economy, Nick Bostrom, off-the-grid, operational security, opioid epidemic / opioid crisis, pattern recognition, precision agriculture, race to the bottom, ransomware, Ronald Reagan, Rubik’s Cube, Salesforce, school vouchers, self-driving car, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, Skype, speech recognition, Steve Ballmer, Steve Jobs, surveillance capitalism, tech worker, The Rise and Fall of American Growth, Tim Cook: Apple, Wargames Reagan, WikiLeaks, women in the workforce

A good firsthand account was authored in 1989 by Paul Nitze, one of the principal arms negotiators of the Cold War era. Paul Nitze, From Hiroshima to Glasnost: At the Center of Decision, A Memoir (New York: Grove Weidenfeld, 1989). Back to note reference 9. David Smith, “Movie Night with the Reagans: WarGames, Red Dawn . . . and Ferris Bueller’s Day Off,” Guardian, March 3, 2018, https://www.theguardian.com/us-news/2018/mar/03/movie-night-with-the-reagans. Back to note reference 10. WarGames, directed by John Badham (Beverly Hills: United Artists, 1983). Back to note reference 11. Fred Kaplan, Dark Territory: The Secret History of Cyber War (New York: Simon & Schuster, 2016), 1–2.


pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan

active measures, air gap, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, British Empire, Cass Sunstein, citizen journalism, Citizen Lab, credit crunch, cryptocurrency, cuban missile crisis, data acquisition, disinformation, Donald Trump, drone strike, Edward Snowden, fake news, family office, Hacker News, hive mind, information security, Internet Archive, Jacob Appelbaum, John Markoff, John von Neumann, Julian Assange, Kevin Roose, Kickstarter, kremlinology, Laura Poitras, MITM: man-in-the-middle, Nate Silver, operational security, post-truth, profit motive, RAND corporation, ransomware, risk tolerance, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Russian election interference, seminal paper, Silicon Valley, South China Sea, Steve Jobs, Stuxnet, subscription business, technoutopianism, undersea cable, uranium enrichment, Vladimir Vetrov: Farewell Dossier, Wargames Reagan, WikiLeaks, zero day

The chaotic arena of cyber operations that this book portrays is not what scholars and military planners had long imagined. They had always envisioned cyber attacks as a kind of digital equivalent to nuclear war: devastating but rare. This notion first etched itself into American consciousness with the 1983 movie WarGames, which featured a young Matthew Broderick inadvertently bringing the world to the brink of nuclear Armageddon by hacking into military computers. President Ronald Reagan saw the film the day after its release and demanded that the government investigate its premise.4 Over the five presidencies since, an endless string of Washington blue-ribbon commissions has addressed the specter of digital destruction.

And before 2014 was over, one did. 8 Coercion “I NEVER THOUGHT I’D BE HERE BRIEFING ON A BAD SETH ROGEN MOVIE, sir,” an Obama aide said to the president. It was a preamble to an intelligence discussion in the White House. Obama asked how he knew the film in question, The Interview, was a bad one. The aide had a ready comeback: “Sir, it’s a Seth Rogen movie.”1 While WarGames kickstarted President Reagan’s interest in cybersecurity and There Will Be Blood served as an inspiration of sorts for some of the NSA’s counterintelligence efforts, The Interview caused an actual cyber attack all by itself. The film was a buddy comedy featuring Rogen and costar James Franco playing a pair of media personalities aiding a CIA-orchestrated assassination of Kim Jong-un.


The Code: Silicon Valley and the Remaking of America by Margaret O'Mara

A Declaration of the Independence of Cyberspace, accounting loophole / creative accounting, affirmative action, Airbnb, Alan Greenspan, AltaVista, Alvin Toffler, Amazon Web Services, An Inconvenient Truth, AOL-Time Warner, Apple II, Apple's 1984 Super Bowl advert, autonomous vehicles, back-to-the-land, barriers to entry, Ben Horowitz, Berlin Wall, Big Tech, Black Lives Matter, Bob Noyce, Buckminster Fuller, Burning Man, business climate, Byte Shop, California gold rush, Californian Ideology, carried interest, clean tech, clean water, cloud computing, cognitive dissonance, commoditize, company town, Compatible Time-Sharing System, computer age, Computer Lib, continuous integration, cuban missile crisis, Danny Hillis, DARPA: Urban Challenge, deindustrialization, different worldview, digital divide, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Doomsday Clock, Douglas Engelbart, driverless car, Dynabook, Edward Snowden, El Camino Real, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Fairchild Semiconductor, Frank Gehry, Future Shock, Gary Kildall, General Magic , George Gilder, gig economy, Googley, Hacker Ethic, Hacker News, high net worth, hockey-stick growth, Hush-A-Phone, immigration reform, income inequality, industrial research laboratory, informal economy, information retrieval, invention of movable type, invisible hand, Isaac Newton, It's morning again in America, Jeff Bezos, Joan Didion, job automation, job-hopping, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kitchen Debate, knowledge economy, knowledge worker, Larry Ellison, Laura Poitras, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, Mary Meeker, mass immigration, means of production, mega-rich, Menlo Park, Mikhail Gorbachev, military-industrial complex, millennium bug, Mitch Kapor, Mother of all demos, move fast and break things, mutually assured destruction, Neil Armstrong, new economy, Norbert Wiener, old-boy network, Palm Treo, pattern recognition, Paul Graham, Paul Terrell, paypal mafia, Peter Thiel, pets.com, pirate software, popular electronics, pre–internet, prudent man rule, Ralph Nader, RAND corporation, Richard Florida, ride hailing / ride sharing, risk tolerance, Robert Metcalfe, ROLM, Ronald Reagan, Salesforce, Sand Hill Road, Second Machine Age, self-driving car, shareholder value, Sheryl Sandberg, side hustle, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, skunkworks, Snapchat, social graph, software is eating the world, Solyndra, speech recognition, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, supercomputer in your pocket, Susan Wojcicki, tacit knowledge, tech billionaire, tech worker, technoutopianism, Ted Nelson, TED Talk, the Cathedral and the Bazaar, the market place, the new new thing, The Soul of a New Machine, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas L Friedman, Tim Cook: Apple, Timothy McVeigh, transcontinental railway, Twitter Arab Spring, Uber and Lyft, uber lyft, Unsafe at Any Speed, upwardly mobile, Vannevar Bush, War on Poverty, Wargames Reagan, WarGames: Global Thermonuclear War, We wanted flying cars, instead we got 140 characters, Whole Earth Catalog, WikiLeaks, William Shockley: the traitorous eight, work culture , Y Combinator, Y2K

So, too, did Secretary of State George Shultz, who had been a Northern Californian ever since the Nixon years, and who had close ties to Stanford and the Valley tech community. Just as it had in the early days of the Eisenhower Administration, the defense agenda once again took a high-tech turn.1 Just three months before WarGames’ release, Ronald Reagan had announced an audacious new program to create a sophisticated missile shield in space using satellites, lasers, and all kinds of computer-controlled technology. Northern Californian fingerprints were all over the proposal: the laser-based system had been championed loudly and early by Berkeley’s Edward Teller, father of the H-bomb and director of the Lawrence Livermore Laboratories.


pages: 521 words: 118,183

The Wires of War: Technology and the Global Struggle for Power by Jacob Helberg

"World Economic Forum" Davos, 2021 United States Capitol attack, A Declaration of the Independence of Cyberspace, active measures, Affordable Care Act / Obamacare, air gap, Airbnb, algorithmic management, augmented reality, autonomous vehicles, Berlin Wall, Bernie Sanders, Big Tech, bike sharing, Black Lives Matter, blockchain, Boris Johnson, Brexit referendum, cable laying ship, call centre, Cambridge Analytica, Cass Sunstein, cloud computing, coronavirus, COVID-19, creative destruction, crisis actor, data is the new oil, data science, decentralized internet, deep learning, deepfake, deglobalization, deindustrialization, Deng Xiaoping, deplatforming, digital nomad, disinformation, don't be evil, Donald Trump, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, fail fast, fake news, Filter Bubble, Francis Fukuyama: the end of history, geopolitical risk, glass ceiling, global pandemic, global supply chain, Google bus, Google Chrome, GPT-3, green new deal, information security, Internet of things, Jeff Bezos, Jeffrey Epstein, John Markoff, John Perry Barlow, knowledge economy, Larry Ellison, lockdown, Loma Prieta earthquake, low earth orbit, low skilled workers, Lyft, manufacturing employment, Marc Andreessen, Mark Zuckerberg, Mary Meeker, Mikhail Gorbachev, military-industrial complex, Mohammed Bouazizi, move fast and break things, Nate Silver, natural language processing, Network effects, new economy, one-China policy, open economy, OpenAI, Parler "social media", Peter Thiel, QAnon, QR code, race to the bottom, Ralph Nader, RAND corporation, reshoring, ride hailing / ride sharing, Ronald Reagan, Russian election interference, Salesforce, Sam Altman, satellite internet, self-driving car, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Skype, smart grid, SoftBank, Solyndra, South China Sea, SpaceX Starlink, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, Susan Wojcicki, tech worker, techlash, technoutopianism, TikTok, Tim Cook: Apple, trade route, TSMC, Twitter Arab Spring, uber lyft, undersea cable, Unsafe at Any Speed, Valery Gerasimov, vertical integration, Wargames Reagan, Westphalian system, white picket fence, WikiLeaks, Y Combinator, zero-sum game

The Pentagon split off from ARPANET to form its own, more secure network: MILNET.19 Ironically, the network the military left behind would become a prime battlefield of the twenty-first century, as a creation of the first Cold War came to define the next one. * * * At about this time, President Ronald Reagan settled in for a Camp David viewing of the new Hollywood thriller WarGames. The president watched in alarm as a teenager (played by Matthew Broderick) hacked into his high school computer to change his grades, eventually finding his way into the North American Aerospace Defense Command and nearly causing World War III. Shaken, Reagan reportedly asked his chairman of the Joint Chiefs of Staff, “Could something like this really happen?”20 Reagan’s inquiry triggered an investigation into the federal government’s cyber vulnerabilities, culminating in a classified presidential directive on “telecommunications and automated information processing systems.”


pages: 523 words: 154,042

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro

3D printing, 4chan, active measures, address space layout randomization, air gap, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, availability heuristic, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, business logic, call centre, carbon tax, Cass Sunstein, cellular automata, cloud computing, cognitive dissonance, commoditize, Compatible Time-Sharing System, Computing Machinery and Intelligence, coronavirus, COVID-19, CRISPR, cryptocurrency, cyber-physical system, Daniel Kahneman / Amos Tversky, Debian, Dennis Ritchie, disinformation, Donald Trump, double helix, Dr. Strangelove, dumpster diving, Edward Snowden, en.wikipedia.org, Evgeny Morozov, evil maid attack, facts on the ground, false flag, feminist movement, Gabriella Coleman, gig economy, Hacker News, independent contractor, information security, Internet Archive, Internet of things, invisible hand, John Markoff, John von Neumann, Julian Assange, Ken Thompson, Larry Ellison, Laura Poitras, Linda problem, loss aversion, macro virus, Marc Andreessen, Mark Zuckerberg, Menlo Park, meta-analysis, Minecraft, Morris worm, Multics, PalmPilot, Paul Graham, pirate software, pre–internet, QWERTY keyboard, Ralph Nader, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Richard Thaler, Ronald Reagan, Satoshi Nakamoto, security theater, Shoshana Zuboff, side hustle, Silicon Valley, Skype, SoftBank, SQL injection, Steve Ballmer, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, surveillance capitalism, systems thinking, TaskRabbit, tech billionaire, tech worker, technological solutionism, the Cathedral and the Bazaar, the new new thing, the payments system, Turing machine, Turing test, Unsafe at Any Speed, vertical integration, Von Neumann architecture, Wargames Reagan, WarGames: Global Thermonuclear War, Wayback Machine, web application, WikiLeaks, winner-take-all economy, young professional, zero day, éminence grise


pages: 864 words: 272,918

Palo Alto: A History of California, Capitalism, and the World by Malcolm Harris

2021 United States Capitol attack, Aaron Swartz, affirmative action, air traffic controllers' union, Airbnb, Alan Greenspan, Alvin Toffler, Amazon Mechanical Turk, Amazon Web Services, Apple II, Apple's 1984 Super Bowl advert, back-to-the-land, bank run, Bear Stearns, Big Tech, Bill Gates: Altair 8800, Black Lives Matter, Bob Noyce, book scanning, British Empire, business climate, California gold rush, Cambridge Analytica, capital controls, Charles Lindbergh, classic study, cloud computing, collective bargaining, colonial exploitation, colonial rule, Colonization of Mars, commoditize, company town, computer age, conceptual framework, coronavirus, corporate personhood, COVID-19, cuban missile crisis, deindustrialization, Deng Xiaoping, desegregation, deskilling, digital map, double helix, Douglas Engelbart, Edward Snowden, Elon Musk, Erlich Bachman, estate planning, European colonialism, Fairchild Semiconductor, financial engineering, financial innovation, fixed income, Frederick Winslow Taylor, fulfillment center, future of work, Garrett Hardin, gentrification, George Floyd, ghettoisation, global value chain, Golden Gate Park, Google bus, Google Glasses, greed is good, hiring and firing, housing crisis, hydraulic fracturing, if you build it, they will come, illegal immigration, immigration reform, invisible hand, It's morning again in America, iterative process, Jeff Bezos, Joan Didion, John Markoff, joint-stock company, Jony Ive, Kevin Kelly, Kickstarter, knowledge worker, land reform, Larry Ellison, Lean Startup, legacy carrier, life extension, longitudinal study, low-wage service sector, Lyft, manufacturing employment, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Marshall McLuhan, Max Levchin, means of production, Menlo Park, Metcalfe’s law, microdosing, Mikhail Gorbachev, military-industrial complex, Monroe Doctrine, Mont Pelerin Society, moral panic, mortgage tax deduction, Mother of all demos, move fast and break things, mutually assured destruction, new economy, Oculus Rift, off grid, oil shale / tar sands, PageRank, PalmPilot, passive income, Paul Graham, paypal mafia, Peter Thiel, pets.com, phenotype, pill mill, platform as a service, Ponzi scheme, popular electronics, power law, profit motive, race to the bottom, radical life extension, RAND corporation, Recombinant DNA, refrigerator car, Richard Florida, ride hailing / ride sharing, rising living standards, risk tolerance, Robert Bork, Robert Mercer, Robert Metcalfe, Ronald Reagan, Salesforce, San Francisco homelessness, Sand Hill Road, scientific management, semantic web, sexual politics, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, social web, SoftBank, software as a service, sovereign wealth fund, special economic zone, Stanford marshmallow experiment, Stanford prison experiment, stem cell, Steve Bannon, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, stock buybacks, strikebreaker, Suez canal 1869, super pumped, TaskRabbit, tech worker, Teledyne, telemarketer, the long tail, the new new thing, thinkpad, Thorstein Veblen, Tim Cook: Apple, Tony Fadell, too big to fail, Toyota Production System, Tragedy of the Commons, transcontinental railway, traumatic brain injury, Travis Kalanick, TSMC, Uber and Lyft, Uber for X, uber lyft, ubercab, union organizing, Upton Sinclair, upwardly mobile, urban decay, urban renewal, value engineering, Vannevar Bush, vertical integration, Vision Fund, W. E. B. Du Bois, War on Poverty, warehouse robotics, Wargames Reagan, Washington Consensus, white picket fence, William Shockley: the traitorous eight, women in the workforce, Y Combinator, Y2K, Yogi Berra, éminence grise

Of all the things in the history of the world that you wouldn’t let a child play with, the military-industrial complex’s early computer systems is a strong contender for the top slot. The SAGE operators themselves couldn’t stop bugs from making their nuclear response apparatus spontaneously ready itself for war. Even if they didn’t trigger Armageddon—the plot of WarGames (1983), a movie that apparently terrified the simpleminded President Reagan—kids would no doubt break the delicate systems that were at best always threatening to quit on skilled users. Not to mention the fact that computer time was pricey. At Lakeside in Seattle, the teenage Gates had access to a mainframe terminal as a sanctioned learning tool, something almost no one his age had ever had before.


pages: 592 words: 161,798

The Future of War by Lawrence Freedman

Albert Einstein, autonomous vehicles, Berlin Wall, Black Swan, Boeing 747, British Empire, colonial rule, conceptual framework, crowdsourcing, cuban missile crisis, currency manipulation / currency intervention, disinformation, Donald Trump, Dr. Strangelove, driverless car, drone strike, en.wikipedia.org, energy security, Ernest Rutherford, failed state, Fall of the Berlin Wall, Francis Fukuyama: the end of history, global village, Google Glasses, Herman Kahn, Intergovernmental Panel on Climate Change (IPCC), John Markoff, long peace, megacity, Mikhail Gorbachev, military-industrial complex, moral hazard, mutually assured destruction, New Journalism, Norbert Wiener, nuclear taboo, open economy, pattern recognition, Peace of Westphalia, RAND corporation, Ronald Reagan, South China Sea, speech recognition, Steven Pinker, Strategic Defense Initiative, Stuxnet, Suez canal 1869, Suez crisis 1956, systematic bias, the scientific method, uranium enrichment, urban sprawl, Valery Gerasimov, Wargames Reagan, WarGames: Global Thermonuclear War, WikiLeaks, zero day

Whether or not the intent was to make a film in the spirit of Fail-Safe or Dr. Strangelove, alerting the audience to the risks of an inadvertent nuclear catastrophe, the main thought left by WarGames was the ease with which an outsider might hack his way into the most vital computer networks, highlighting the risks posed by remote access and simple passwords. This was the message taken away by President Reagan, a friend of Lasker’s parents, who was invited to an early showing and was sufficiently disturbed to ask officials whether this movie had a basis in any conceivable reality. As the issue was investigated it turned out to be more serious than had been realised, leading to a set of studies into what was then described as ‘Telecommunications and Automated Information Systems Security’.6 This was a time of exploration into this developing networked world of information, a disembodied place where real things could be made to happen by anyone who could gain access.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

The same year, 1983, that ARPANET was rewritten to be easily expandable, the new breadth of the network caused the Pentagon to grow concerned about its own online security. It split the military systems off onto their own network, known as MILNET. The dangers of connected devices suddenly seemed all too real. And that spring, the movie WarGames starred Matthew Broderick as a precocious teen hacker who accidentally nearly triggered nuclear war with the Soviet Union by hacking the military’s computers at its NORAD base in Colorado in an attempt to play video games. President Reagan, an avid movie buff, watched the drama at Camp David and returned to the White House with a direct query to his military leaders: “Could something like this really happen?” General John Vessey, the chairman of the Joint Chiefs, was surprised when he went to investigate the answer; he returned to the White House the following week and announced, “Mr.