FREE BOOKS

Author's List




PREV.   NEXT  
|<   193   194   195   196   197   198   199   200   201   202   203   204   205   206   207   208   209   210   211   212   213   214   215   216   217  
218   219   220   221   222   223   224   225   226   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   >>   >|  
oard on the Data General when he's finished beta-testing the software for it, which he wrote himself. It'll have E-mail features, massive files on all manner of computer-crime and investigation procedures, and will follow the computer-security specifics of the Department of Defense "Orange Book." He thinks it will be the biggest BBS in the federal government. Will it have Phrack on it? I ask wryly. Sure, he tells me. Phrack, TAP, Computer Underground Digest, all that stuff. With proper disclaimers, of course. I ask him if he plans to be the sysop. Running a system that size is very time-consuming, and Fitzpatrick teaches two three-hour courses every day. No, he says seriously, FLETC has to get its money worth out of the instructors. He thinks he can get a local volunteer to do it, a high-school student. He says a bit more, something I think about an Eagle Scout law-enforcement liaison program, but my mind has rocketed off in disbelief. "You're going to put a TEENAGER in charge of a federal security BBS?" I'm speechless. It hasn't escaped my notice that the FLETC Financial Fraud Institute is the ULTIMATE hacker-trashing target; there is stuff in here, stuff of such utter and consummate cool by every standard of the digital underground.... I imagine the hackers of my acquaintance, fainting dead-away from forbidden-knowledge greed-fits, at the mere prospect of cracking the superultra top-secret computers used to train the Secret Service in computer-crime.... "Uhm, Carlton," I babble, "I'm sure he's a really nice kid and all, but that's a terrible temptation to set in front of somebody who's, you know, into computers and just starting out...." "Yeah," he says, "that did occur to me." For the first time I begin to suspect that he's pulling my leg. He seems proudest when he shows me an ongoing project called JICC, Joint Intelligence Control Council. It's based on the services provided by EPIC, the El Paso Intelligence Center, which supplies data and intelligence to the Drug Enforcement Administration, the Customs Service, the Coast Guard, and the state police of the four southern border states. Certain EPIC files can now be accessed by drug-enforcement police of Central America, South America and the Caribbean, who can also trade information among themselves. Using a telecom program called "White Hat," written by two brothers named Lopez from the Dominican Republic, police can now network inte
PREV.   NEXT  
|<   193   194   195   196   197   198   199   200   201   202   203   204   205   206   207   208   209   210   211   212   213   214   215   216   217  
218   219   220   221   222   223   224   225   226   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   >>   >|  



Top keywords:

computer

 

police

 
Phrack
 

federal

 

called

 
Intelligence
 

enforcement

 

program

 

computers

 

security


America

 

thinks

 
Service
 

acquaintance

 
starting
 
forbidden
 
suspect
 

fainting

 

knowledge

 

superultra


babble

 

pulling

 
Carlton
 

Secret

 

terrible

 

temptation

 
cracking
 

prospect

 

secret

 

provided


Caribbean

 

information

 

Central

 

states

 

border

 

Certain

 

accessed

 
Dominican
 

Republic

 

network


brothers

 

telecom

 
written
 
southern
 

Council

 

Control

 

services

 
hackers
 

proudest

 

ongoing