FREE BOOKS

Author's List




PREV.   NEXT  
|<   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109   110   111   112   113   114  
115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   135   136   137   138   139   >>   >|  
witching-stations could be RE-PROGRAMMED. People seemed utterly amazed that anyone could have the nerve. Of course these switching stations were "computers," and everybody knew hackers liked to "break into computers:" but telephone people's computers were DIFFERENT from normal people's computers. The exact reason WHY these computers were "different" was rather ill-defined. It certainly wasn't the extent of their security. The security on these BellSouth computers was lousy; the AIMSX computers, for instance, didn't even have passwords. But there was no question that BellSouth strongly FELT that their computers were very different indeed. And if there were some criminals out there who had not gotten that message, BellSouth was determined to see that message taught. After all, a 5ESS switching station was no mere bookkeeping system for some local chain of florists. Public service depended on these stations. Public SAFETY depended on these stations. And hackers, lurking in there call-forwarding or ReMobbing, could spy on anybody in the local area! They could spy on telco officials! They could spy on police stations! They could spy on local offices of the Secret Service.... In 1989, electronic cops and hacker-trackers began using scrambler-phones and secured lines. It only made sense. There was no telling who was into those systems. Whoever they were, they sounded scary. This was some new level of antisocial daring. Could be West German hackers, in the pay of the KGB. That too had seemed a weird and farfetched notion, until Clifford Stoll had poked and prodded a sluggish Washington law-enforcement bureaucracy into investigating a computer intrusion that turned out to be exactly that--HACKERS, IN THE PAY OF THE KGB! Stoll, the systems manager for an Internet lab in Berkeley California, had ended up on the front page of the New Nork Times, proclaimed a national hero in the first true story of international computer espionage. Stoll's counterspy efforts, which he related in a bestselling book, The Cuckoo's Egg, in 1989, had established the credibility of 'hacking' as a possible threat to national security. The United States Secret Service doesn't mess around when it suspects a possible action by a foreign intelligence apparat. The Secret Service scrambler-phones and secured lines put a tremendous kink in law enforcement's ability to operate freely; to get the word out, cooperate, prevent misun
PREV.   NEXT  
|<   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109   110   111   112   113   114  
115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   135   136   137   138   139   >>   >|  



Top keywords:

computers

 

stations

 

Secret

 

Service

 

BellSouth

 

security

 

hackers

 
national
 

computer

 

Public


depended
 

message

 

enforcement

 
systems
 

people

 

secured

 

switching

 
phones
 

scrambler

 

California


manager

 

German

 

Berkeley

 

Internet

 
notion
 
prodded
 

intrusion

 

turned

 

sluggish

 

Washington


investigating

 
bureaucracy
 
farfetched
 

HACKERS

 

Clifford

 
espionage
 

suspects

 

action

 

foreign

 

United


States

 

intelligence

 
apparat
 

cooperate

 

prevent

 

freely

 
operate
 
tremendous
 
ability
 
threat