Skip to main content

Hacking against the Apocalypse: Tony Stark and the Remilitarized Internet

  • Chapter
Interfacing with the Internet in Popular Cinema
  • 71 Accesses

Abstract

Manuel De Landa’s War in the Age of Intelligent Machines (WAIM) is an excellent history of the cross-pollinations of military thought and technological advances, focusing alternately on the evolution of larger hardware components (ballistic missiles, computers) and on the “control machinery” (155), or software, that directs that hardware. Through the eyes of his robot historian, the Internet and modern computing was incubated by the American military: driven by a scarcity of computing supplies and resources, Paul Baran at the Research ANd Development (RAND) Corporation had “convinced government officials the United States needed to establish a distributed communications system that could withstand a nuclear attack” (Moshovitus, 35). This meant the creation of a “distributed network,” one that sent “small ‘packets’ of information” over a number of different routes (Ryan, 15); this proposed system shunned the “traditional network” (one unit of information over one single path, as exampled by “AT&T’s highly centralized national telephone network” [Ryan, 13]) and would instead “allow information to be sent over many different possible routes” (Moshovitus, 35). The first such space, ARPAnet, was created in December 1969 (ibid., 61); while it publicly debuted at the 1972 International Conference on Computer Communications, it wasn’t until “a rumor, suggesting army intelligence officers had used ARPAnet files to relocate files concerning the whereabouts and behaviors of political activities” that knowledge of its existence became widespread (ibid., 87).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Notes

  1. In writing this chapter I also considered Todd Standage’s The Turk (New York: Walker, 2002)

    Google Scholar 

  2. David Levy’s Chess and Computers (Potomac, MD: Computer Science Press, 1976)

    Google Scholar 

  3. David Levy, ed., Computer Chess Compendium (London: B. T. Batsford, 1988).

    Google Scholar 

  4. I am also indebted to Andrew Hodges’s fantastic biography of Alan Turing (The Enigma [London: Vintage Books, 1983]).

    Google Scholar 

  5. Nate Silver’s book The Signal and the Noise (New York: Penguin Press, 2012) details Kasparov’s battle with Deep Blue in more depth.

    Google Scholar 

  6. While I also considered Slavoj Žižek’s Welcome to the Desert of the Real (New York: Verso, 2002)

    Google Scholar 

  7. Paul Virilo’s Strategy of Deception, trans. Chris Turner (New York: Verso, 2000)

    Google Scholar 

  8. the most useful connections here were drawn from Baudrillard’s The Gulf War did not take place (Bloomington: Indiana University Press, 1991) wherein he describes the dangers surrounding a modern warfare made unreal by the distance of spectacular television coverage and increasingly disembodied combat. The war games De Landa describes are just slightly more literal simulations.

    Google Scholar 

  9. Lawrence H. Suid in Guts and Glory (Lexington: University of Kentucky Press, 2002) highlights the ending sequence in which Lightman effectively gets the acting soldier to stand down as particularly egregiously unrealistic (446–452). In fact, he points out that the computer would have no access to any computer network and especially not to telephone lines (451).

    Google Scholar 

  10. Peter Krapp, “Terror and Play, or What Was Hacktivism?” Grey Room 21 (Fall 2005): 70–93; Eric Schmitt, David E. Sanger, and Charlie Savage, “Mining of Data is Called Crucial to Fight Terror.” New York Times, June 8, 2013; David E Sanger and Thom Shanker, “Broad Powers seen for Obama in Cyberstrikes.” New York Times, February 4, 2013.

    Article  Google Scholar 

Download references

Authors

Copyright information

© 2014 Aaron Tucker

About this chapter

Cite this chapter

Tucker, A. (2014). Hacking against the Apocalypse: Tony Stark and the Remilitarized Internet. In: Interfacing with the Internet in Popular Cinema. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137386694_5

Download citation

Publish with us

Policies and ethics