This is all relatively complex hacking, against multiple systems at multiple levels of generality. Some hacks operate at the technical level: spoofing and front running are hacks that make use of computer speed and automation. Some operate at the level of the financial markets. Some operate at the legislative level: vulnerabilities in securities laws, for example. This is all a microcosm of the hacks that will be described in chapters to come.

