"Rushkoff, Douglas - Cyberia" - читать интересную книгу автора (Rushkoff Douglas) their electronic mail messages aren't going through, their phone system keeps dying every
now and then in the middle of the day. This is part of the takeover effort. Someone on the board of directors may have some buddy from college who works in the computer industry who he might hire to do an odd job now and again. The Purist I like industrial hacking for the idea of doing it. I started about a year or so ago. And William Gibson brought romance into it with Neuromancer. It's so do-able. #4: The Pro We get hired by people moving up in the political systems, drug cartels, and of course corporations. We even work for foreign companies. If Toyota hired us to hit Ford, we'd hit Ford a little bit, but then turn around and knock the hell out of Toyota. We'd rather pick on them than us. Most industrial hackers do two hacks at once. They get information on the company they're getting paid to hit, but they're also hacking into the company that's paying them, so that if they get betrayed or stabbed in the back they've got their butts covered. So it's a lot of work. The payoffs are substantial, but it's a ton of work. In a real takeover, 50% of the hacking is physical. A bunch of you have to go and get jobs at the company. You need to get the information but you don't want to let them on to what you're doing. The wargames-style automatic dialer will get discovered scanning. They know what that is; they've had that happen to them many times before. I remember a job that I did on a local TV station. I went in posing as a student working on a project for a communications class. I got a tour with an engineer, and I had a notebook and busily wrote down everything he said. The guy took me back where the piece of masking tape on the phone jack or the modem itself is the phone number of that modem. It saves me the time and trouble of scanning 10,000 numbers. I'm already writing notes, so I just write in the number, go home, wait a week or so, and then call them up (you don't call them right away, stupid). Your local telephone company won't notice you and the company you're attacking won't notice you. You try to be like a stealth bomber. You sneak up on them slowly, then you knock the hell out of them. You take the military approach. You do signals intelligence, human intelligence; you've got your special ops soldier who takes a tour or gets a job there. Then he can even take a tour as an employee--then he's trusted for some reason--just because he works there, which is the biggest crock of shit. DISCONNECT Someone got paranoid then, or someone's line voltage changed enough to suggest a tap, and our conversation had been automatically terminated. Pete stores the exchange on disk, then escorts me out onto the fire escape of his apartment for a toke and a talk. He can see I'm a little shaken up. That's not really hacking,'' he says, handing me the joint. I thank him with a nod but opt for a Camel Light. "That's cracking. Hacking is surfing. You don't do it for a reason. You just do it.'' We watch a bum below us on the street rip a piece of cardboard off an empty refrigerator box and drag it away--presumably it will be his home for tonight. That guy is hacking in a way,'' I offer. "Social hacking.'' That's bullshit. He's doing it for a reason. He stole that cardboard because he needs shelter. There's nothing wrong with that, but he's not having such a good time, either.'' So what's real hacking? What's it about?'' Pete takes a deep toke off his joint and smiles. It's tapping in to the global brain. |
|
|