TAG
(1) A small piece of code or data that is added to a program as an afterthought, usually an identifier of some sort, like the time and date completed, along with the author's name. [From the clothes tag you find on shirts and pants at shopping centers.]
(2) In the HTML programming language, a command issued, rather than basic text

_TAKEDOWN: THE PURSUIT AND CAPTURE OF KEVIN MITNICK, AMERICA’S MOST WANTED COMPUTER OUTLAW-- BY THE MAN WHO DID IT_
Nonfiction (supposedly) novel by Tsutomu Shimomura and John Markoff. Originally titled _Catching Kevin_, which I think was a much better title, aesthetically (I mean, c’mon, it’s a 19 word title now!)

_TAP_ [Technical Assistance Program]
Formerly the "Youth International Party Line." Phreaking newsletter among hippies. Another _TAP_ was created in the 1990 by Predat0r, but it too is now defunct

TAPEWORM
A program that invades a computer system and changes certain data as is it becomes available. Usually benign, from the tapeworm programmer's point of view. Often used to "fix" tax forms from within the IRS computer

TARAN KING
Phreak, former editor of Phrack, former member of the 2600 Club and New 2600 Club, and former sysop of Metal Shop BBS. Knight Lightning’s best friend. [Name comes from the main character in the Chronicles of Prydain by Loyd Alexander, a fantasy series (remember _The Black Cauldron_?)]

TCP/IP [Transmission Control Protocol/Internet Protocol]
The language the Internet speaks, which computer OS's intrepret

TEAM HACKERS ‘86
see THE ADMINISTRATION

TELCO [TELephone COmpany]
A corporation which sells a service that would be dirt cheap if it wasn't run by profiteering gluttons, i.e. telephone service. The largest (and until the 1970s, only) telco is AT&T

TELEPHONE
A device that allows one to speak to someone else through wires, long distance. It was created in 1876 and gained true widespread use in 1904. It has great potential for abuse, most recently to get around the insane charges telcos put on the phone that most people pay without question. (I mean really, what the fuck is an "area code"? It doesn’t cost any more to the phone company to put me through to Borneo then it does to put me through to my neighbor.) While it was originally copper wires that carried voice, it has been increasing computerized

TELETRIAL
Mock trial held by phreaks on a bridge in which someone is tried for offenses; if the offending phreak is found guilty, he may be expelled from a group or kicked off a BBS. Very inefficient. Things would be a lot easier if hack/phreaks could just execute the obnoxious ones like the Cosa Nostra does

TEMPEST [Transient ElectroMagnetic PulsE Surveillance Technology]
Military espionage technology which reads the ones and zeros emitted by a computer monitor from as much as a kilometer away

TERMINAL TECHNICIAN
see TERMINUS

TERMINUS
Handle of Len Rose. Also known as Terminal Technician. Respected UNIX programmer and hacker on the side. Former sysop of Metronet. [Handle comes from his admittedly egotistical conviction that he had reached the final point of being a proficient hacker.]

THACKERAY, GAIL
Secret Service administrator who was one of the driving forces behind Operation Sundevil. While is she is a vehement hacker-tracker, she has been known to socialize with them, and tries to train police not to be computer illiterate idiots

THREE-LETTER AGENCIES
The federal agencies comprised of three letters; usually refers to the FBI (Federal Bureau of Investigation), the CIA (Central Intelligence Agency), the IRS (Internal Revenue Service) and the NSA (National Security Agency)

TIGER TEAMS
Defined in _Cyberia_ as "specialized computer commando squads who establish security protocol in a system." I doubt it’s that romantic (it conjurs up imagery of black-suited Navy SEAL computer nerds)

TINA
Phone sex operator who people calling Palm Beach Probation Department got patched through to for free in due to the meddlings of a truly creative phreak, Fry Guy

TPM
see THE PUNK MAFIA [TPM]

TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL [TCP/IP]
see TCP/IP [Transmission Control Protocol/Internet Protocol]

TRASHING
Also known as dumpster diving. Going through the someone’s trash looking for info; usually refers to searching through the dumpster of a corporation for thrown-away passwords or information that can be useful for social engineering

THE TRIBUNAL OF KNOWLEDGE
see THE LEGION OF DOOM [LOD]

TRANSIENT ELECTROMAGNETIC PULSE SURVEILLANCE TECHNOLOGY [TEMPEST]
see TEMPEST [Transient ElectroMagnetic PulsE Surveillance Technology]

TROJAN HORSE
A virus-like program that pretends to be something else in order to get into the system. [From _The Iliad_, by famous dead Greek poet Homer, when the Ithacans gained victory by hiding in a huge wood horse so they could get into Troy. The Trojans were not in the gifted program at warfare school.]

TRW
see EXPERIAN

TUC
Handle of Scott Jefferey Ellentuch. Former member of the Warelords, the Knights of Shadow, the Apple Mafia and Fargo 4A. Phreak (no longer in operation) known for being very likable. [Handle comes from his nickname in school, because teachers were always mispronouncing his last name; and he was always correcting them by saying "Tuc!" (Ellentuc, not Ellentouch or however the git teachers pronounced it.) Isn’t that a cute story?]

TURING, ALAN
British mathematician who predicted in 1950 that computers would become more intelligent than humans. In _Neuromancer_, the "Turing police" is the unit charged with stopping AIs from getting too powerful. In the mid-1930s Alan used Charles Babbage’s ideas to make the "Turing machine," a general purpose calculator

2600 CLUB/NEW 2600 CLUB
Group that included much of the staff of _Phrack Inc._ (No relation to 2600 magazine.) Its membership included Cheap Shades, Data Line, Dr. Crash, Forest Ranger, Gin Fizz, Jester Sluggo, Knight Lightning, Taran King, Monty Python, Phantom Phreaker and the Clashmaster

_2600: THE HACKER QUARTERLY_
Hacker magazine edited by Emmanuel Goldstein, founded 1984. It focuses on technical data, and is a mainstay of the computer underground. It is currently in Volume 13, costs $21 for a one-year subscription, and can be reached for general mail at 2600@2600.com. Current staff is: Emmanuel Goldstein (editor-in-chief), Scott Skinner (layout), Max-q and Phiber Optik (network operations), Neon Samurai (voice mail), and Bloot and Corp (webmasters)

2600 MEETINGS
Held in major cities on the first Friday of every month in malls; discuss security, hacking and phreaking. In late 1992, young people gathering a 2600 meeting were confronted by law enforcement in a mall, where they were searched and equipment was seized. Shortly after, Computer Professionals for Social Responsibility filed suit to get relevant Secret Service files under the Freedom of Information Act. In early 1996, a number of government appeals were overturned and the information was released. [From 2600 Hz, the tone used on blue boxes a long time ago to screw with the phone system.]