Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 24

Strict Standards: Non-static method modFlexiCustomCode::parsePHPviaFile() should not be called statically in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 54

Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/components/com_grid/GridBuilder.php on line 29
You Can't Understand Security Without These Classic Works | WIRED
Skip Article Header. Skip to: Start of Article.There are seminal books, movies, articles, and more that you’ve been meaning to get to but just haven’t made the time for. Well, the time is now, so here’s some essential background material for helping you understand the worlds of security and government today. Slide: 1 /of 14 .Caption: WarGames | A high-schooler hacks into a US military computer and brings the country to the brink of war—a reminder that attribution can be tricky. MGM/Everett CollectionSlide: 2 /of 14 .Caption: “Secrets of the Little Blue Box” | Ron Rosenbaum’s 1971 Esquire story introduced phone phreaking to the world and inspired Jobs and Woz to start their first business.Slide: 3 /of 14 .Caption: Citizenfour | Snowden defined how we now think about government surveillance; Laura Poitras’ documentary defined how we think about Snowden himself. Laura PoitrasSlide: 4 /of 14 .Caption: The Cyphernomicon | Timothy May published this mind-bogglingly prescient outline for a crypto-anarchic revolution on the Cypherpunks mailing list in 1994.Slide: 5 /of 14 .Caption: Enemy of the State | More than a decade before Edward Snowden exposed the extent of the NSA’s domestic spying, this 1998 film warned of the dangers of giving the agency unfettered powers.Slide: 6 /of 14 .Caption: Moral Politics: How Liberals and Conservatives Think | George Lakoff’s assertion that metaphor and the framing of ideas determines personal politics remains hugely influential in modern polling.AdvertisementYou Can’t Understand Security Without These Classic Works

Slide: 7 /of 14 .

Caption: Mikko Hypponen | Few security professionals possess the public speaking skills necessary to convey supreme technical expertise. Hypponen is that rarity.

Slide: 8 /of 14 .

Caption: Crypto | Steven Levy’s “people’s history of cryptography” starts at the advent of public key encryption and traces it through the geek victories in the first Crypto War.

Slide: 9 /of 14 .

Caption: Sneakers | The perfect nerd-caper flick, this 1992 tale of penetration testers caught up in a conflict over secret codebreaking tools still feels relevant today.

Slide: 10 /of 14 .

Caption: Cryptonomicon | Neal Stephenson’s 1999 masterwork is the ultimate cypherpunk epic, flitting between World War II and the late ’90s tech boom.

Slide: 11 /of 14 .

Caption: Def Con | For understanding American hacker culture, four days in Vegas at one of the world’s biggest hacker conferences is like drinking from a fire hose. Ryan Young for WIRED

Slide: 12 /of 14 .

Caption: The Cuckoo’s Egg | Clifford Stoll’s 1989 thriller recounts his hunt for a KGB cyberspy after a 75-cent accounting discrepancy revealed a breach into Lawrence Berkeley National Lab computers.

Advertisement

Slide: 13 /of 14 .

Caption: Three Days of the Condor | Sydney Pollack’s 1975 political thriller stars Robert Redford as a nerdy CIA researcher who returns from lunch to find all his colleagues dead.

Slide: 14 /of 14 .

Caption: The Puzzle Palace | WIRED contributor James Bamford’s seminal 1982 book exposed how the NSA operated internally and how it spied on Americans after WWII.

Go Back to Top. Skip To: Start of Article.
imageYou Can’t Understand Security Without These Classic WorksGallery ImageGallery ImageYou Can’t Understand Security Without These Classic WorksGallery ImageGallery ImageYou Can’t Understand Security Without These Classic WorksGallery ImageYou Can’t Understand Security Without These Classic WorksYou Can’t Understand Security Without These Classic WorksYou Can’t Understand Security Without These Classic WorksPerez-03You Can’t Understand Security Without These Classic Works
You Can’t Understand Security Without These Classic WorksYou Can’t Understand Security Without These Classic WorksGallery ImageGallery ImageGallery ImageYou Can’t Understand Security Without These Classic Works
You Can’t Understand Security Without These Classic WorksPerez-03Gallery Image

Read more http://feeds.wired.com/c/35185/f/661370/s/497ad60e/sc/28/l/0L0Swired0N0C20A150C0A90Cwargames0Ecrypto0Esneakers140Ecore0Esecurity0Erelated0Eworks0C/story01.htm


Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 24

Strict Standards: Non-static method modFlexiCustomCode::parsePHPviaFile() should not be called statically in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 54

Find out more by searching for it!

Custom Search







Strict Standards: Non-static method modBtFloaterHelper::fetchHead() should not be called statically in /home/noahjames7/public_html/modules/mod_bt_floater/mod_bt_floater.php on line 21