computer hackers -- fiction
“She’s perfect now.”
Nicole Castro is the most popular girl in school—a brain, a jock, a great friend—but what everyone is struck by is her beauty. Her perfect, perfect face. Or, they were until somebody attacked her, erasing half of her. Or, did they? In Paul Griffin’s Burning Blue, the mysteries of who did this to Nic and who she really is are slowly revealed to everyone, including herself.
Let me get this out of the way: if you're not a "computer person," someone with more than a vague knowledge of computer networking technology, Brain Jack, by Brian Falkner, is probably not the book for you. If, however, you ARE such a person, Brain Jack will start off as the kind of thriller that you think you will love, but its ending, like so many other cyber-thrillers, feels rushed and absurd. Don’t get me wrong--you'll enjoy reading it, but don't expect anything too deep from this book.
Sam is the generic hero of our story. He's 17; he's a computer prodigy; and he's going to save the country from itself. The world of Brain Jack is set only a few years into our future. Falkner does a good job of building a world that, initially, is entirely conceivable based on our present. Computer technology is even more prevalent, and its consequences all the more potent. Las Vegas has been the victim of a nuclear attack that has left it in ruins, and the rest of the country is decaying under strict martial conditions.
Sam Wilson is 14 years old, lives in New York City, and is a computer genius. It is not unusual for Sam and his friends to hack into computer systems and fool around. In fact, computer gaming and use has reached a whole new level in Brain Jack, by Brian Falkner. In Sam's world, being addicted to computer gaming has moved from the basement to gaming lounges. There are individuals who spend their entire days hooked to gaming systems and do nothing else. This book begs the question ...is this a possible future?
Sam likes to hack into systems for fun and to see if he can shut them down and then get out without his identity being detected. One day he decides to disrupt the structure of one of the country's largest telecommunications systems. He is able to move through the system undetected for a while using his computer hacking skills. However, unusual activity is noted by the web security team working for the large company. Sam realizes that he has been spotted and decides to get out quickly. There is a flurry of activity that follows as Sam scrambles to finish the job and remove any evidence that could link this security breach back to him.