In War Games, the 1983 science-fiction film, Matthew Broderick stars as an unmotivated high school student who, with the help of Ally Sheedy and some other friends, unwittingly hacks into a U.S. military computer that has automated command of the United States’ nuclear missile silos. Believing that he has accessed a set of advanced computer games, Broderick’s character selects Global Thermonuclear War and begins playing what he believes is a simulation of the start of a nuclear war between the United States and the Soviet Union. At the risk of spoiling the ending for those who have not seen the movie, it turns out that Broderick’s character may have started the real thing and he and Ally Sheedy’s character spend the rest of the movie racing around to prevent the mutually assured destruction that a nuclear war would bring.

In the 30 years since War Games was first released, computer networks have become far more advanced. Likewise, those who are intent on hacking into computer systems have become incredibly more sophisticated. While not every network security breach poses a risk of global nuclear war, the risk of security breaches has become a serious concern for any commercial enterprise that maintains private records in digital form.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]