ABSTRACT

Unlike the previous (and subsequent chapters), this chapter does not focus principally on the law. Indeed, unlike the other behaviours discussed in this book, there is doubt as to the extent to which what is set out here exists, or differs from traditional hacking identified previously.