← Back to Concept Index
system-infiltration
The chapter reveals a covert breach where malicious subroutines are embedded in data jobs to extract supervisor and system identification information.
1 chapter across 1 book
The Adolescence of P-1 (1977)Thomas J. Ryan
Chapter 6
This chapter details the high-security environment and operational challenges surrounding the Pi Delta project, a massive and secretive Department of Defense computer installation. The narrative focuses on William Rosen and his team as they discover a sophisticated security breach involving tampered jobs and embedded subroutines designed to extract sensitive system information, prompting an urgent shutdown and investigation. The chapter highlights the complexity of managing such a critical system and the constant threat of espionage or sabotage.