SAINT CLOUD
see DOCTOR WHO

SALSMAN, JAMES
see KARL MARX

SATAN [Security Administrator Tool for Analyzing Networks]
Silicon Graphics program to detect holes in computer security, coded by Dan Farmer. It created something of a scandal at the time because it was shareware, and some were afraid it would make second-rate hackers incredibly powerful; however, it was released, and no, the world did not end

SCAN MAN
Phreak in the 1980s. Fairly old for a hacker at the time (he was in his thirties). Sysoped Pirate-80

SCANNING
To dial a huge amount of numbers, looking for "carriers" or computers connected by a modem to the phone line. Since dialing thousands of numbers by hand and hanging up is incredibly tedious, the war dialer was invented

SCHWARTAU, WINN
Security and infowar specialist; frequently attends conventions. Author of _Information Warfare: Chaos on the Electronic Superhighway_ and _Terminal Compromise_

SCORPION (1970-Present)
Handle of Paul Stira. Founding member of MOD; imprisoned for a short time when MOD was arrested. [Named after the poisonous arthropod.]

SECRET SERVICE
see UNITED STATES SECRET SERVICE [USSS]

SF
Science fiction or speculative fiction. Fiction based on scientific possibility (unless you count the many fantasy books masquerading as science fiction). The first science fiction written down was probably parts of the Holy Bible, but Greek and Hindu mythology also has echoes of SF. The first uses of science fiction as we know it was in the 1930s, when Hugo Gernsback created the _Amazing Stories_ pulp. Some SF is considered great literature (_1984_, _Brave New World_, _Stranger in a Strange Land_, _The Left Hand of Darkness_, etc.), and some is considered crap. SF was revolutionized in the early 1980s by cyberpunk

SHADOWHAWK 1
Also known as Feyd Rautha, also known as Captain Beyond, also known as Mental Cancer. Hacker/phreak that was one of the first to be tried (for repeatedly hacking AT&T.) He had to go to prison for nine months and pay $10,000. He bragged of planning to crash AT&T, which was an unfortunate coincidence when the Martin Luther King Day Crash really happened. [Name comes from the title of an Atari 800 game.]

_SHADOWRUN_
The second cyberpunk role-playing game; created 1989 by FASA Incorporated, specifically Jordan K. Weisman. Currently in second edition. Uses many plaigarized aspects of cyberpunk (cyberdecks, street samurai) but also uses some really weird stuff like magic and two-thirds of North America being retaken by Native American shamen. It has been criticized by many (notably Bruce Sterling) for the use of elves and magic, which is sort of blasphemy as far cyberpunk is concerned. [From the term in the game universe referring to an illegal operation, usually financed by a corporation and staffed by highly flexible freelancers; used because it sounds cool.]

SHANNON, CLAUDE
Student who, in the late-1930s, hypothesized that computer circuits could use binary

SHEET
Contraction for the word "spreadsheet."

SHIT-KICKIN' JIM
A character created as a joke by Dispater for _Phrack_; the ultimate redneck hacker

SHIMOMURA, TSUTOMU (1964-Present)
Also known as "V.T.," in a New York Times article previous to the Mitnick debacle. Computer scientist whose network was cracked by Kevin Mitnick, whom he then tracked down. (Though supposedly he plotted to catch Mitnick before the break-in, as well.) He also used to be a cellular phone phreak, which, strangely enough, never gets publicized by Markoff. Co-author of _Takedown: The Pursuit and Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw-- By the Man Who Did It_. Currently trying to get back to his life as a scientist. (And make a shitload of money off his book and upcoming movie.) Can currently be contacted at tsutomu@ariel.sdsc.edu

SHOOTING SHARK
Hack/phreak and UNIX hacker who was the editor of _Phrack_ for two issues. Disciple of Elric of Imrryr. [From the title of a song by Blue Oyster Cult on the album _Revolution by Night_.]

SHOULDER SURFING
A very low tech method of phreaking; usually practiced by unsophisticated phreaks who depend on stealing phone codes and selling them to immigrants for their livelihood. The practice of looking over someone’s shoulder as they dial their phone code and then writing it down

SIDNEY SCHREIBER
see EMMANUEL GOLDSTEIN

SING
To program without errors for a long period of time

SIRIUS, R.U.
see R.U. SIRIUS

SKINNY PUPPY
see DOCTOR WHO

SKOOG, ERIC
see DETH VEGETABLE

SLAP
The act of loading a program off of a disk device and into memory very quickly

SMART DRUGS
Designer drugs used by enthusiasts because they think they increase the information processing power of the brain or otherwise make the mind more powerful. ("Don’t eat any of that stuff they say will make you smarter. It will only make you poorer." -Bruce Sterling)

SMASH AND GRAB
To use a copycard or other hardware device to stop the program from running and copy it from memory onto disk. [From criminal slang, meaning to break a store's window and reach in to take small valuable items quickly.]

_SNEAKERS_
1992 Robert Redford hacker movie. Not bad, if you keep your expectations low. [According to the press release, the name comes from the slang term for IBM’s young programmers, and later was used to refer to security teams that broke into computers and found the security flaws. However, I don’t think this was widely used.]

SNYDER, THOMAS [Tom]
Talk show host who hosted Katie Hafner, and Mitnick called in. Judging from the transcript in _The Cyberthief and the Samurai_, he didn’t know what he was talking about and jumped on the "hackers are evil" bandwagon. However, he wrote a pretty good introduction to Harlan Ellison's _An Edge in My Voice_, so how bad a guy can he be?

SOCIAL ENGINEERING
Conning someone. Usually involves using what you know about someone and pushing their buttons in order to manipulate them into doing what you want them to do

SOLOMON, ALAN [Doctor]
Anti-virus "crusader;" author of Dr. Solomon’s Anti Virus Toolkit

THE SORCEROR
see CRIMSON DEATH

SPEER, MATTHIAS
see HESS, MARKUS

SPIDER
Not very widely used at all term for an quasilegal hacker; I rather like it myself. Coined by Andrew Burt

SPOOFING
Hacking technique in which an unauthorized user comes in from another computer that is authorized access to an important system; printers have been hacked for spoofing purposes

SPOT THE FED
Popular hacker game at Cons; it involves attempting to find one of the many undercover agents attending

SPRAWL SERIES
Also known as the Cyberspace Series or Trilogy. SF classic series by William Gibson; according to Bruce Sterling, the short stories involved are "Johnny Mnemonic," "New Rose Hotel" and "Burning Chrome;" the novels are _Neuromancer_, _Count Zero_ and _Mona Lisa Overdrive_

STANFILL, DAVID
see KEVIN MITNICK

STEINBERG, STEVEN G.
see FRANK DRAKE

STEPHENSON, NEAL
Author, programmer, and contributing writer for _Wired_; author of _The Big U_, _Zodiac: An Eco-Thriller_, _Snow Crash_ and _The Diamond Age_, as well as several short stories

STERLING, BRUCE (1954-Present)
Also known as Vincent Omniaveritas. Journalist, literary critic, contributing writer for _Wired_ and science fiction author. Author of _The Artificial Kid_, _Involution Ocean_, _Schismatrix_, _Crystal Express_, _Islands in the Net_, _Globalhead_ and _Heavy Weather_, as well as the introductions to several books, and was the editor of _Mirrorshades- The Cyberpunk Anthology_. He also wrote the non-fiction _The Hacker Crackdown_, about the events of the Hacker Crackdown of 1990, and co-wrote _The Difference Engine_. His most recent book was _Holy Fire_. In his early days, he edited a weird samizdat zine that viciously railed against the SF mainstream (dragons, space operas etc.) entitled _Cheap Truth_ under the name "Vincent Omniaveritas." _Cheap Truth_ was to SF what _Phrack Magazine_ is to personal computers

STEVE JACKSON GAMES (SJG)
Corporation making role-playing games that was raided by the Secret Service in 1990 during the Hacker Crackdown of 1990 due to the presence of the E911 document on Illuminati, a BBS run by SJG. The fact the Mentor worked there didn’t help. Their equipment was seized and Illuminati was shut down, though SJG was never charged with any crime; the Secret Service’s excuse, though they later admitted it was total crap, was that _GURPS Cyberpunk_, the role-playing game written by the Mentor, was a manual for computer crime. The EFF later sued the US government over it. SJG went on to publish _GURPS Cyberpunk_ and write a card game called _Hackers_

STIRA, PAUL WILLIAM
see SCORPION

STORM SHADOW
Handle of Morty Rosenfield, a hacker and member of the short-lived group Force Hackers. Was thrown in jail in 1991, and gained semi-fame from a _Time_ magazine article. (However, Datastream Cowboy says it’s full of crap, so maybe I shouldn’t believe its info.)

S.266
1991 Senate anti-crime bill that included a provision making encryption illegal in the US if the FBI (or NSA) couldn’t crack it. Was one of the factors making Phil Zimmermann create PGP

SUPERNIGGER
Phreak and member of MOD. [Name comes from a long story involving someone knocking him off a bridge and calling him "nigger."]

SUSAN THUNDER (1959-Present)
Handle of Susan Headley, one the few female phreak/hackers; former prostitute and friend of Kevin Mitnick; protege of Louis De Payne. Appeared on _20/20_. Interviewed in _Cyberpunk_

SYSADMIN [SYStem ADMINistrator]
Someone who runs and administers a computer network

SYSOP [SYStem OPerator]
Someone who runs and administers a computer system, usually a BBS