If computer hackers, those insidious little moles who secretively poke through computer systems uninvited and unchecked, are the real culprits as well placed NASA sources suggest, they need to be identified quickly, and be prosecuted to the fullest extent possible. There are laws that have been broken. Not only the laws regarding computer privacy, but legal experts say that cases can be made for Conspiracy, Sedition, Blackmail, Terrorism and Extortion.
But, according to computer experts, the likelihood of ever find- ing the interlopers is " . . .somewhere between never and none. Unless they left a trail, which good hackers don't, they'll get away with this Scott free."
Hackers have caused constant trouble to computer systems over the years, and incidents have been increasing in both number and severity. This computer assault needs to be addressed immediate- ly. America insists on it. Not only must the hacker responsible for this travesty be caught, but NASA must also explain how their computers can be compromised so easily. If a bunch of kids can enter one NASA communications computer, then what stops them from altering flight computers, life support systems and other comput- er controlled activities that demand perfect operation?
NASA, we expect an answer.
This is Scott Mason, waiting for NASA to lift-off from its duff and get down to business.
* * * * *
Friday, November 15
New York City.
Scott Mason picked up the phone on the first ring.
"Scott Mason," he said without thinking.
"Mr. Mason? This is Captain Kirk." The voice was serious, but did not resonate as did the distinctive voice that belonged to William Shatner. Scott laughed into the phone.