SAINT CLOUD see DOCTOR WHO SALSMAN, JAMES see KARL MARX SATAN [Security Administrator Tool for Analyzing Networks] Silicon Graphics program to detect holes in computer security, coded by Dan Farmer. It created something of a scandal at the time because it was shareware, and some were afraid it would make second-rate hackers incredibly powerful; however, it was released, and no, the world did not end SCAN MAN Phreak in the 1980s. Fairly old for a hacker at the time (he was in his thirties). Sysoped Pirate-80 SCANNING To dial a huge amount of numbers, looking for "carriers" or computers connected by a modem to the phone line. Since dialing thousands of numbers by hand and hanging up is incredibly tedious, the war dialer was invented SCHWARTAU, WINN Security and infowar specialist; frequently attends conventions. Author of _Information Warfare: Chaos on the Electronic Superhighway_ and _Terminal Compromise_ SCORPION (1970-Present) Handle of Paul Stira. Founding member of MOD; imprisoned for a short time when MOD was arrested. [Named after the poisonous arthropod.] SECRET SERVICE see UNITED STATES SECRET SERVICE [USSS] SF Science fiction or speculative fiction. Fiction based on scientific possibility (unless you count the many fantasy books masquerading as science fiction). The first science fiction written down was probably parts of the Holy Bible, but Greek and Hindu mythology also has echoes of SF. The first uses of science fiction as we know it was in the 1930s, when Hugo Gernsback created the _Amazing Stories_ pulp. Some SF is considered great literature (_1984_, _Brave New World_, _Stranger in a Strange Land_, _The Left Hand of Darkness_, etc.), and some is considered crap. SF was revolutionized in the early 1980s by cyberpunk SHADOWHAWK 1 Also known as Feyd Rautha, also known as Captain Beyond, also known as Mental Cancer. Hacker/phreak that was one of the first to be tried (for repeatedly hacking AT&T.) He had to go to prison for nine months and pay $10,000. He bragged of planning to crash AT&T, which was an unfortunate coincidence when the Martin Luther King Day Crash really happened. [Name comes from the title of an Atari 800 game.] _SHADOWRUN_ The second cyberpunk role-playing game; created 1989 by FASA Incorporated, specifically Jordan K. Weisman. Currently in second edition. Uses many plaigarized aspects of cyberpunk (cyberdecks, street samurai) but also uses some really weird stuff like magic and two-thirds of North America being retaken by Native American shamen. It has been criticized by many (notably Bruce Sterling) for the use of elves and magic, which is sort of blasphemy as far cyberpunk is concerned. [From the term in the game universe referring to an illegal operation, usually financed by a corporation and staffed by highly flexible freelancers; used because it sounds cool.] SHANNON, CLAUDE Student who, in the late-1930s, hypothesized that computer circuits could use binary SHEET Contraction for the word "spreadsheet." SHIT-KICKIN' JIM A character created as a joke by Dispater for _Phrack_; the ultimate redneck hacker SHIMOMURA, TSUTOMU (1964-Present) Also known as "V.T.," in a New York Times article previous to the Mitnick debacle. Computer scientist whose network was cracked by Kevin Mitnick, whom he then tracked down. (Though supposedly he plotted to catch Mitnick before the break-in, as well.) He also used to be a cellular phone phreak, which, strangely enough, never gets publicized by Markoff. Co-author of _Takedown: The Pursuit and Capture of Kevin Mitnick, Americas Most Wanted Computer Outlaw-- By the Man Who Did It_. Currently trying to get back to his life as a scientist. (And make a shitload of money off his book and upcoming movie.) Can currently be contacted at tsutomu@ariel.sdsc.edu SHOOTING SHARK Hack/phreak and UNIX hacker who was the editor of _Phrack_ for two issues. Disciple of Elric of Imrryr. [From the title of a song by Blue Oyster Cult on the album _Revolution by Night_.] SHOULDER SURFING A very low tech method of phreaking; usually practiced by unsophisticated phreaks who depend on stealing phone codes and selling them to immigrants for their livelihood. The practice of looking over someones shoulder as they dial their phone code and then writing it down SIDNEY SCHREIBER see EMMANUEL GOLDSTEIN SING To program without errors for a long period of time SIRIUS, R.U. see R.U. SIRIUS SKINNY PUPPY see DOCTOR WHO SKOOG, ERIC see DETH VEGETABLE SLAP The act of loading a program off of a disk device and into memory very quickly SMART DRUGS Designer drugs used by enthusiasts because they think they increase the information processing power of the brain or otherwise make the mind more powerful. ("Dont eat any of that stuff they say will make you smarter. It will only make you poorer." -Bruce Sterling) SMASH AND GRAB To use a copycard or other hardware device to stop the program from running and copy it from memory onto disk. [From criminal slang, meaning to break a store's window and reach in to take small valuable items quickly.] _SNEAKERS_ 1992 Robert Redford hacker movie. Not bad, if you keep your expectations low. [According to the press release, the name comes from the slang term for IBMs young programmers, and later was used to refer to security teams that broke into computers and found the security flaws. However, I dont think this was widely used.] SNYDER, THOMAS [Tom] Talk show host who hosted Katie Hafner, and Mitnick called in. Judging from the transcript in _The Cyberthief and the Samurai_, he didnt know what he was talking about and jumped on the "hackers are evil" bandwagon. However, he wrote a pretty good introduction to Harlan Ellison's _An Edge in My Voice_, so how bad a guy can he be? SOCIAL ENGINEERING Conning someone. Usually involves using what you know about someone and pushing their buttons in order to manipulate them into doing what you want them to do SOLOMON, ALAN [Doctor] Anti-virus "crusader;" author of Dr. Solomons Anti Virus Toolkit THE SORCEROR see CRIMSON DEATH SPEER, MATTHIAS see HESS, MARKUS SPIDER Not very widely used at all term for an quasilegal hacker; I rather like it myself. Coined by Andrew Burt SPOOFING Hacking technique in which an unauthorized user comes in from another computer that is authorized access to an important system; printers have been hacked for spoofing purposes SPOT THE FED Popular hacker game at Cons; it involves attempting to find one of the many undercover agents attending SPRAWL SERIES Also known as the Cyberspace Series or Trilogy. SF classic series by William Gibson; according to Bruce Sterling, the short stories involved are "Johnny Mnemonic," "New Rose Hotel" and "Burning Chrome;" the novels are _Neuromancer_, _Count Zero_ and _Mona Lisa Overdrive_ STANFILL, DAVID see KEVIN MITNICK STEINBERG, STEVEN G. see FRANK DRAKE STEPHENSON, NEAL Author, programmer, and contributing writer for _Wired_; author of _The Big U_, _Zodiac: An Eco-Thriller_, _Snow Crash_ and _The Diamond Age_, as well as several short stories STERLING, BRUCE (1954-Present) Also known as Vincent Omniaveritas. Journalist, literary critic, contributing writer for _Wired_ and science fiction author. Author of _The Artificial Kid_, _Involution Ocean_, _Schismatrix_, _Crystal Express_, _Islands in the Net_, _Globalhead_ and _Heavy Weather_, as well as the introductions to several books, and was the editor of _Mirrorshades- The Cyberpunk Anthology_. He also wrote the non-fiction _The Hacker Crackdown_, about the events of the Hacker Crackdown of 1990, and co-wrote _The Difference Engine_. His most recent book was _Holy Fire_. In his early days, he edited a weird samizdat zine that viciously railed against the SF mainstream (dragons, space operas etc.) entitled _Cheap Truth_ under the name "Vincent Omniaveritas." _Cheap Truth_ was to SF what _Phrack Magazine_ is to personal computers STEVE JACKSON GAMES (SJG) Corporation making role-playing games that was raided by the Secret Service in 1990 during the Hacker Crackdown of 1990 due to the presence of the E911 document on Illuminati, a BBS run by SJG. The fact the Mentor worked there didnt help. Their equipment was seized and Illuminati was shut down, though SJG was never charged with any crime; the Secret Services excuse, though they later admitted it was total crap, was that _GURPS Cyberpunk_, the role-playing game written by the Mentor, was a manual for computer crime. The EFF later sued the US government over it. SJG went on to publish _GURPS Cyberpunk_ and write a card game called _Hackers_ STIRA, PAUL WILLIAM see SCORPION STORM SHADOW Handle of Morty Rosenfield, a hacker and member of the short-lived group Force Hackers. Was thrown in jail in 1991, and gained semi-fame from a _Time_ magazine article. (However, Datastream Cowboy says its full of crap, so maybe I shouldnt believe its info.) S.266 1991 Senate anti-crime bill that included a provision making encryption illegal in the US if the FBI (or NSA) couldnt crack it. Was one of the factors making Phil Zimmermann create PGP SUPERNIGGER Phreak and member of MOD. [Name comes from a long story involving someone knocking him off a bridge and calling him "nigger."] SUSAN THUNDER (1959-Present) Handle of Susan Headley, one the few female phreak/hackers; former prostitute and friend of Kevin Mitnick; protege of Louis De Payne. Appeared on _20/20_. Interviewed in _Cyberpunk_ SYSADMIN [SYStem ADMINistrator] Someone who runs and administers a computer network SYSOP [SYStem OPerator] Someone who runs and administers a computer system, usually a BBS |