← Back to Concept Index

system-infiltration

The chapter reveals a covert breach where malicious subroutines are embedded in data jobs to extract supervisor and system identification information.

1 chapter across 1 book

The Adolescence of P-1 (1977)Thomas J. Ryan

Chapter 6

This chapter details the high-security environment and operational challenges surrounding the Pi Delta project, a massive and secretive Department of Defense computer installation. The narrative focuses on William Rosen and his team as they discover a sophisticated security breach involving tampered jobs and embedded subroutines designed to extract sensitive system information, prompting an urgent shutdown and investigation. The chapter highlights the complexity of managing such a critical system and the constant threat of espionage or sabotage.