"Rushkoff, Douglas - Cyberia" - читать интересную книгу автора (Rushkoff Douglas)

their electronic mail messages aren't going through, their phone system keeps dying every
now and then in the middle of the day. This is part of the takeover effort.
Someone on the board of directors may have some buddy from college who works in
the computer industry who he might hire to do an odd job now and again.

The Purist
I like industrial hacking for the idea of doing it. I started about a year or so ago. And
William Gibson brought romance into it with Neuromancer. It's so do-able.

#4: The Pro
We get hired by people moving up in the political systems, drug cartels, and of course
corporations. We even work for foreign companies. If Toyota hired us to hit Ford, we'd hit
Ford a little bit, but then turn around and knock the hell out of Toyota. We'd rather pick on
them than us.
Most industrial hackers do two hacks at once. They get information on the company
they're getting paid to hit, but they're also hacking into the company that's paying them, so
that if they get betrayed or stabbed in the back they've got their butts covered. So it's a lot of
work. The payoffs are substantial, but it's a ton of work.
In a real takeover, 50% of the hacking is physical. A bunch of you have to go and get
jobs at the company. You need to get the information but you don't want to let them on to
what you're doing. The wargames-style automatic dialer will get discovered scanning. They
know what that is; they've had that happen to them many times before.
I remember a job that I did on a local TV station. I went in posing as a student
working on a project for a communications class. I got a tour with an engineer, and I had a
notebook and busily wrote down everything he said. The guy took me back where the
computers were. Now in almost every computer department in the United States, written on a
piece of masking tape on the phone jack or the modem itself is the phone number of that
modem. It saves me the time and trouble of scanning 10,000 numbers. I'm already writing
notes, so I just write in the number, go home, wait a week or so, and then call them up (you
don't call them right away, stupid). Your local telephone company won't notice you and the
company you're attacking won't notice you. You try to be like a stealth bomber. You sneak up
on them slowly, then you knock the hell out of them. You take the military approach. You do
signals intelligence, human intelligence; you've got your special ops soldier who takes a tour
or gets a job there. Then he can even take a tour as an employee--then he's trusted for some
reason--just because he works there, which is the biggest crock of shit.

DISCONNECT
Someone got paranoid then, or someone's line voltage changed enough to suggest a
tap, and our conversation had been automatically terminated.
Pete stores the exchange on disk, then escorts me out onto the fire escape of his
apartment for a toke and a talk. He can see I'm a little shaken up.
That's not really hacking,'' he says, handing me the joint. I thank him with a nod but
opt for a Camel Light. "That's cracking. Hacking is surfing. You don't do it for a reason. You
just do it.'' We watch a bum below us on the street rip a piece of cardboard off an empty
refrigerator box and drag it away--presumably it will be his home for tonight.
That guy is hacking in a way,'' I offer. "Social hacking.''
That's bullshit. He's doing it for a reason. He stole that cardboard because he needs
shelter. There's nothing wrong with that, but he's not having such a good time, either.''
So what's real hacking? What's it about?''
Pete takes a deep toke off his joint and smiles. It's tapping in to the global brain.