Malicious Intent
V. 1.0 - 21.02.2003
V. 1.1 - 05.10.2004
V. 1.2 - 10.06.2008
Copyright (C) 02/2003 by Howard Fuhs
Like in the computer world from which the term Hacker is borrowed, there are in all areas of life socially handicaped people regarding their attitude towards their community they are living in and the systems and infrastructure the community relies on. In the field of computer insecurity there are a lot of people beginning with the Script Kiddie which can perfectly run an exploit script but has not the faintest idea what it is actually doing to the Phreaker who is misusing telephone systems.
Those people with a malicious attitude and/or intend ought to be generally labled as Cracker or Trasher and I would like to stick to this naming when it comes to deliberately misusing or sabotaging satellite infrastructures.
It is vital for the reading of the rest of this manuscript, that the reader understands the definition of a Hacker and is well aware of the differences by definition between a Hacker and a Cracker/Trasher. Throughout the manuscript I will use this terms to differentianate between good and evel as far as this is possible in a world which has infinite gray shades and does not only consists of black and white. This simplification is although neccessary as it is meant as a technical treatise about the topic of Satellite Monitoring, Satellite Hacking, Satellite Security and not about ethical issues. On the other hand this simplification fits perferct into the simple world of some security specialists and most politicians around the world, so I hope this text is written in a way that they will understand the manuscript too.
I invite your suggestions for revising this document. I plan to review and revise this document as the need arises.
Copyright (C) 02/2003 by Howard Fuhs
All Rights Reserved!