FREE BOOKS

Author's List




PREV.   NEXT  
|<   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253   254   255  
256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   >>  
ose study will reveal that this document is not about machinery. The E911 Document is about ADMINISTRATION. It describes how one creates and administers certain units of telco bureaucracy: Special Service Centers and Major Account Centers (SSC/MAC). It describes how these centers should distribute responsibility for the E911 service, to other units of telco bureaucracy, in a chain of command, a formal hierarchy. It describes who answers customer complaints, who screens calls, who reports equipment failures, who answers those reports, who handles maintenance, who chairs subcommittees, who gives orders, who follows orders, WHO tells WHOM what to do. The Document is not a "roadmap" to computers. The Document is a roadmap to PEOPLE. As an aid to breaking into computer systems, the Document is USELESS. As an aid to harassing and deceiving telco people, however, the Document might prove handy (especially with its Glossary, which I have not included). An intense and protracted study of this Document and its Glossary, combined with many other such documents, might teach one to speak like a telco employee. And telco people live by SPEECH--they live by phone communication. If you can mimic their language over the phone, you can "social-engineer" them. If you can con telco people, you can wreak havoc among them. You can force them to no longer trust one another; you can break the telephonic ties that bind their community; you can make them paranoid. And people will fight harder to defend their community than they will fight to defend their individual selves. This was the genuine, gut-level threat posed by Phrack magazine. The real struggle was over the control of telco language, the control of telco knowledge. It was a struggle to defend the social "membrane of differentiation" that forms the walls of the telco community's ivory tower --the special jargon that allows telco professionals to recognize one another, and to exclude charlatans, thieves, and upstarts. And the prosecution brought out this fact. They repeatedly made reference to the threat posed to telco professionals by hackers using "social engineering." However, Craig Neidorf was not on trial for learning to speak like a professional telecommunications expert. Craig Neidorf was on trial for access device fraud and transportation of stolen property. He was on trial for stealing a document that was purportedly highly sensitive and purportedly worth
PREV.   NEXT  
|<   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253   254   255  
256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   >>  



Top keywords:

Document

 

people

 
social
 

defend

 

describes

 
community
 

reports

 

answers

 

roadmap

 

struggle


control

 

orders

 
professionals
 

threat

 
Glossary
 
Neidorf
 
Centers
 

bureaucracy

 

purportedly

 

document


language

 

magazine

 
Phrack
 

longer

 

individual

 

harder

 
paranoid
 

genuine

 

telephonic

 

exclude


learning

 

professional

 

telecommunications

 

expert

 

However

 

engineering

 

reference

 
hackers
 

access

 

device


stealing

 

highly

 
sensitive
 
property
 

transportation

 

stolen

 

repeatedly

 
special
 

knowledge

 

membrane