The Blue Nowhere - novelonlinefull.com
You’re read light novel The Blue Nowhere Part 2 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
The warden leaned against the wall while the cop sat down across from Gillette and said, "You've got one year left on a three-year sentence under the federal Computer Fraud and Abuse Act. You cracked Western Software's machines and stole the source codes for most of their programs, right?"
Gillette nodded.
The source code is the brains and heart of software, fiercely guarded by its owner. Stealing it lets the thief easily strip out identification and security codes then repackage the software and sell it under his own name. Western Software's source codes for the company's games, business applications and utilities were its main a.s.sets. If an unscrupulous hacker had stolen the codes he might have put the billion-dollar company out of business.
Gillette pointed out: "I didn't do anything with the codes. I erased them after I downloaded them."
"Then why'd you crack their systems?"
The hacker shrugged. "I saw the head of the company on CNN or something. He said n.o.body could get into their network. Their security systems were foolproof. I wanted to see if that was true."
"Were they?"
"As a matter of fact, yeah, they were foolproof. The problem is that you don't have to protect yourself against fools. You have to protect yourself against people like me."
"Well, once you'd broken in why didn't you tell the company about the security flaws? Do a white hat?"
White hats were hackers who cracked into computer systems and then pointed out the security flaws to their victims. Sometimes for the glory of it, sometimes for money.
Sometimes even because they thought it was the right thing to do.
Gillette shrugged. "It's their problem. That guy said that it couldn't be done. I just wanted to see if I could."
"Why?"
Another shrug. "Curious."
"Why'd the feds come down on you so hard?" Anderson asked. If a hacker doesn't disrupt business or try to sell what he steals the FBI rarely even investigates, let alone refers a case to the U.S. attorney.
It was the warden who answered. "The reason is the DoD."
"Department of Defense?" Anderson asked, glancing at a gaudy tattoo on Gillette's arm. Was that an airplane? No, it was a bird of some kind.
"It's bogus," Gillette muttered. "Complete bulls.h.i.t."
The cop looked at the warden, who explained, "The Pentagon thinks he wrote some program or something that cracked the DoD's latest encryption software."
"Their Standard 12?" Anderson gave a laugh. "You'd need a dozen supercomputers running full time for six months to crack a single e-mail."
Standard 12 had recently replaced DES - the Defense Encryption Standard - as the state-of-the-art encryption software for the government. It was used to encrypt secret data and messages. The encryption program was so important to national security that it was considered a munition under the export laws and couldn't be transferred overseas without military approval.
Anderson continued, "But even if he did crack something encoded with Standard 12, so what? Everybody tries to crack encryptions."
There was nothing illegal about this as long as the encrypted doc.u.ment wasn't cla.s.sified or stolen. In fact, many software manufacturers dare people to try to break doc.u.ments encrypted with their programs and offer prizes to anybody who can do so.
"No," Gillette explained. "The DoD's saying that I cracked into their computer, found out something about how Standard 12 works and then wrote some script that decrypts the doc.u.ment. It can do it in seconds."
"Impossible," Anderson said, laughing. "Can't be done."
Gillette said, "That's what I told them. They didn't believe me."
Yet as Anderson studied the man's quick eyes, hollow beneath dark brows, hands fidgeting impatiently in front of him, he wondered if maybe the hacker actually had written a magic program like this. Anderson himself couldn't have done it; he didn't know anybody who could. But after all, the cop was here now, hat in hand, because Gillette was a wizard, the term used by hackers to describe those among them who've reached the highest levels of skill in the Machine World.
There was a knock on the door and the guard let two men inside. The first one, fortyish, had a lean face, dark blond hair swept back and frozen in place with hairspray. Honest-to-G.o.d sideburns too. He wore a cheap gray suit. His overwashed white shirt was far too big for him and was halfway untucked. He glanced at Gillette without a splinter of interest. "Sir," he said to the warden in a flat voice. "I'm Detective Frank Bishop, state police, Homicide." He nodded an anemic greeting to Anderson and fell silent.
The second man, a little younger, much heavier, shook the warden's hand then Anderson's. "Detective Bob Shelton." His face was pockmarked from childhood acne.
Anderson didn't know anything about Shelton but he'd talked to Bishop and had mixed feelings concerning his involvement in the case Anderson was here about. Bishop was supposedly a wizard in his own right though his expertise lay in tracking down killers and rapists in hard-scrabble neighborhoods like the Oakland waterfront, Haight-Ashbury and the infamous San Francisco Tenderloin. Computer Crimes wasn't authorized - or equipped - to run a homicide like this one without somebody from the Violent Crimes detail but, after several brief phone discussions with Bishop, Anderson was not impressed. The homicide cop seemed humorless and distracted and, more troubling, knew zero about computers.
Anderson had also heard that Bishop himself didn't even want to be working with Computer Crimes. He'd been lobbying for the MARINKILL case - so named by the FBI for the site of the crime: Several days ago three bank robbers had murdered two bystanders and a cop at a Bank of America branch in Sausalito in Marin County and had been seen headed east, which meant they might very well turn south toward Bishop's present turf, the San Jose area.
Now, in fact, the first thing Bishop did was to check the screen of his cell phone, presumably to see if he had a page or message about a rea.s.signment.
Anderson said to the detectives, "You gentlemen want to sit down?" Nodding at the benches around the metal table.
Bishop shook his head and remained standing. He tucked his shirt in then crossed his arms. Shelton sat down next to Gillette. Then the bulky cop looked distastefully at the prisoner and got up, sat on the other side of the table. To Gillette he muttered, "You might want to wash up sometime."
The convict retorted, "You might want to ask the warden why I only get one shower a week."
"Because, Wyatt," the warden said patiently, "you broke the prison rules. That's why you're in administrative seclusion."
Anderson didn't have the patience or time for squabbles. He said to Gillette, "We've got a problem and we're hoping you'll help us with it." He glanced at Bishop and asked, "You want to brief him?"
According to state police protocol, Frank Bishop was technically in charge of the case. But the detective shook his head. "No, sir, you can go ahead."
"Last night a woman was abducted from a restaurant in Cupertino. She was murdered and her body found in Portola Valley. She'd been stabbed to death. She wasn't s.e.xually molested and there's no apparent motive.
"Now, the victim, Lara Gibson, ran this Web site about how women can protect themselves and gave lectures on the subject around the country. She'd been in the press a lot and was on Larry King. Well, what happens is, she's in a bar and this guy comes in who seems to know her. He gives his name as Will Randolph, the bartender said. That's the name of the cousin of the woman the victim was going to meet for dinner last night. Randolph wasn't involved -he's been in New York for a week - but we found a digital picture of him on the victim's computer and they look alike, the suspect and Randolph. We think that's why the perp picked him to impersonate.
"So, he knows all this information about her. Friends, where she's traveled, what she does, what stocks she owns, who her boyfriend is. It even looked like he waved to somebody in the bar but Homicide canva.s.sed most of the patrons who were there last night and didn't find anybody who knew him. So we think he was faking - you know, to put her at ease, making it look like he was a regular."
"He social engineered her," Gillette offered.
"How's that?" Shelton asked.
Anderson knew the term but he deferred to Gillette, who said, "It means conning somebody, pretending you're somebody you're not. Hackers do it to get access to databases and phone lines and pa.s.scodes. The more facts about somebody you can feed back to them, the more they believe you and the more they'll do what you want them to."
"Now, the girlfriend Lara was supposed to meet - Sandra Hardwick - said she got a call from somebody claiming to be Lara's boyfriend canceling the dinner plans. She tried to call Lara but her phone was out."
Gillette nodded. "He crashed her mobile phone." Then he frowned. "No, probably the whole cell."
Anderson nodded. "Mobile America reported an outage in cell 850 for exactly forty-five minutes. Somebody loaded code that shut the switch down then turned it back on."
Gillette's eyes narrowed. The detective could see he was growing interested.
"So," the hacker mused, "he turned himself into somebody she'd trust and then he killed her. And he did it with information he got from her computer."
"Exactly."
"Did she have an online service?"
"Horizon On-Line."
Gillette laughed. "Jesus, you know how secure that is? He hacked into one of their routers and read her e-mails." Then he shook his head, studied Anderson's face. "But that's kindergarten stuff. Anybody could do that. There's more, isn't there?"
"Right," Anderson continued. "We talked to her boyfriend and went through her computer. Half the information the bartender heard the killer tell her wasn't in her e-mails. It was in the machine itself."
"Maybe he went Dumpster diving and got the information that way."
Anderson explained to Bishop and Shelton, "He means going digging through trash bins to get information that'll help you hack - discarded company manuals, printouts, bills, receipts, things like that." But he said to Gillette, "I doubt it - everything he knew was stored on her machine."
"What about hard access?" Gillette asked. Hard access is when a hacker breaks into somebody's house or office and goes through the victim's machine itself. Soft access is breaking into somebody's computer online from a remote location.
But Anderson responded, "It had to be soft access. I talked to the friend Lara was supposed to meet, Sandra. She said the only time they talked about getting together that night was in an instant message that afternoon and Lara was home all day. The killer had to be in a different location."
"This's interesting," Gillette whispered.
"I thought so too," Anderson said. "The bottom line is that we think there's some kind of new virus the killer used to get inside her machine. The thing is, Computer Crimes can't find it. We're hoping you'd take a look."
Gillette nodded, squinting as he looked up at the grimy ceiling. Anderson noticed the young man's fingers were moving in tiny, rapid taps. At first the cop thought Gillette had palsy or some nervous twitch. But then he realized what the hacker was doing. He was unconsciously typing on an invisible keyboard - a nervous habit, it seemed.
The hacker lowered his eyes to Anderson. "What'd you use to examine her drive?"
"Norton Commander, Vi-Scan 5.0, the FBI's forensic detection package, Restores and the DoD's Part.i.tion and File Allocation a.n.a.lyzer 6.2. We even tried Surface-Scour."
Gillette gave a confused laugh. "All that and you didn't find anything?"
"Nope."
"How'm I going to find something you couldn't?"
"I've looked at some of the software you've written -there're only three or four people in the world who could write script like that. You've gotta have code that's better than ours - or could hack some together."
Gillette asked Anderson, "So what's in it for me?"
"What?" Bob Shelton asked, wrinkling up his pocked face and staring at the hacker.
"If I help you what do I get?"
"You little p.r.i.c.k," Shelton snapped. "A girl got murdered. Don't you give a s.h.i.t?"
"I'm sorry about her," Gillette shot back. "But the deal is if I help you I want something in return."
Anderson asked, "Such as?"
"I want a machine."
"No computers," the warden snapped. "No way." To Anderson he said, "That's why he's in seclusion. We caught him at the computer in the library - on the Internet. The judge issued an order as part of his sentence that he can't go online."
"I won't go online," Gillette said. "I'll stay on E wing, where I am now. I won't have access to a phone line."
The warden scoffed. "You'd rather stay in administrative seclusion--"
"Solitary confinement," Gillette corrected.
"Just to have a computer?"
"Yes."
Anderson asked, "If he was to stay in seclusion, so there was no chance of going online, would that be okay?"
"I guess," the warden said uncertainly.
The cop then said to Gillette, "It's a deal. We'll get you a laptop."
"You're going to bargain with him?" Shelton asked Anderson in disbelief. He glanced at Bishop for support but the lean cop brushed at his anachronistic sideburns and studied his cell phone again, waiting for his reprieve.
Anderson didn't respond to Shelton. He added to Gillette, "But you get your machine only after you a.n.a.lyze the Gibson woman's computer and give us a complete report."
"Absolutely," the prisoner said, eyes glowing with excitement.
"Her machine's an IBM clone, off the shelf. We'll get it over here in the next hour. We've got all her disks and software and--"
"No, no, no," Gillette said firmly. "I can't do it here."
"Why?"
"I'll need access to a mainframe - maybe a supercomputer. I'll need tech manuals, software."
Anderson looked at Bishop, who didn't seem to be listening to any of this.
"No f.u.c.king way," said Shelton, the more talkative of the homicide partners, even if he had a distinctly limited vocabulary.
Anderson was debating with himself when the warden asked, "Can I see you gentlemen up the hall for a minute?"
CHAPTER 00000011 / THREE.
It had been a fun hack. But not as challenging as he would've liked.
Phate - his screen name, spelled in the best hacker tradition with a ph and not an f - now drove to his house in Los Altos, in the heart of Silicon Valley.
He'd been busy this morning: He'd abandoned the blood-smeared white van that he'd used to light the fires of paranoia within Lara Gibson yesterday. And he'd ditched the disguises - the dreadlock wig, combat jacket and sungla.s.ses of the stalker and the squeaky-clean chip-jockey costume of Will Randolph, Sandy Hardwick's accommodating cousin.