It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker. ↗
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing. ↗
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. ↗
Of course there are many ways we can reuse something. We can dye it. We can cut it. We can change the buttons. Those are other ways to make it alive. But this is a new step to use anything - hats, socks, shirts. It's the first step in the process. ↗
To be honest, I think we should find first the possibility to make it. Research is first - if you're not interested, you never can find something. Many things happen from forgotten machines - ones that are no longer used. ↗