Authors: William Hertling
Tags: #Computers, #abuse victims, #William Hertling, #Science Fiction
“Thanks,” Pete says when Chris calls him back with the number.
“No biggie,” Chris says. “Query done?”
“Not yet. I’m going to test it in the simulator. Make sure it works before we burn through a tanker truck.”
Chris chuckles. The Utah Data Center’s backup generators burn a tanker truck’s worth of fuel every minute. Not that they’ve ever had to use it, since there’s plentiful grid power, but it’s still their unit of measure for the enormous power of the NSA.
“Fine. I’m going to Portland, check her out in person. I’ll be in touch later.”
Chris leaves his government work in his partner’s hands, and takes their scrubbed, tracking-free car on the four-hour drive from Seattle down to Portland. Once there, he gets an AirBnB, and spends an hour making sure there’s nothing to track him. The owner of the house has a few security cameras. Chris re-angles one on the front porch so it’s staring at the ceiling, and inside he covers the Nest thermometer with a throw blanket so it won’t sense when he’s there or not. He’s got a little travel kit for secure communications, and he uses the directional antenna to find good wi-fi half a mile away on the nearest busy street.
He initiates a video conference with Pete.
“Anything?”
“Not yet,” Pete says, smiling.
“What are you so happy about?” Chris asks.
“The largest computer on the planet’s running my code. Half a billion processor cores in parallel. I don’t experience this every day.”
“We’ll be sure to withdraw cost of the electricity from your pay.”
Pete’s eyes go large. “There’s goes my paycheck for the rest of my career.”
“How long will it take?”
“Ten minutes, max. We’re loading the traffic metadata from every router in the world to find another router that sent the same sequence of packet sizes as the coffee shop router.”
Eight minutes later, the answer comes back: another IP address in Amsterdam.
“Well, what is it?”
Pete types at his keyboard and curses.
“A coffee shop on the next block over.”
“What the fuck? That’s a hell of a search to find a coffee shop two blocks away.”
Pete initiates screen sharing, and his video cam is replaced with a live stream of his desktop. “Look at the path here.” He mouses over a network trace route. “Angie hooked up a repeater connected to both business’s wi-fi networks at once. The data comes in at the first coffee shop, Filter Cafe, to a device on their network, and forty milliseconds later, a slightly different packet goes out over EcoGreen Coffee’s wi-fi, before hitting our boy in Brazil.”
“Why’s the packet different?”
“Onion routing and obfuscation. Each node decrypts, removes address information, then pads with random data to change the length of the packet and re-encrypts. If she’s smart, she’s doing this specifically to make the analysis we’re doing far harder. I was one step ahead of her, figured she’d try that and so I created a statistical search model adjusting for data permutation. Now, here at Filter Cafe, we see an actual Internet connection, a VPN connection originated at a coffee shop in San Diego and terminating at the same MAC address as the device that sent those packets. You know what this means, right? We’re going to have to run the whole shebang again, because there’s no way this connection originated in San Diego. We have to keep going backwards.” Pete smiles. “Get me more compute time. You might want to ask for a few hours, because this will take a while.”
Chris shakes his head. “I can’t go back to Enso twice in one day. Can’t you do the search at ONI, and assume you’re looking for another endpoint within a few blocks?”
Pete hems and haws, but agrees to try.
Thirty minutes later, he finds the matching node, a hotel in the Gaslamp district. Pete passes the information on to Daly.
“You ought to send a team out. There’s a device somewhere within signal range of each of these access points. You might be able to track the hardware back to Angie.”
“What do I tell them to look for?”
“It could be anything from a laptop to a box the size of a deck of cards. It’ll need power. They’ll need to triangulate the wi-fi signal of every device that’s connecting to the access points of these coffee shops. I’ll give them the technical details.”
Chris nods. “Give me a bit.” He disconnects from Pete and wonders if he’s getting in over his head.
His typical private job was easy. The customer wants data on someone, Chris pulls their complete file from the central database, analyzes it himself, and turns over what the client asked for.
Angie has proven vastly more difficult. So far, he’s involved Naval Intelligence, the psych arm housed in the Army, and the NSA. He wonders if it’s time to go back to the client for a higher fee. Not yet. It might be better to trade for a favor.
He makes a call to his liaison at the FBI, and using his official FCC identity, claims he’s investigating a pirate radio station. He gets the FBI to deploy a tech team in San Diego to find the hardware connecting the coffee shop with a hotel bordering the Gaslamp District.
He reconnects with Pete. “Listen, I want someone on Angie full-time. Let’s compromise her phone, her computer, her office. I want every email as she’s composing it, see every photo she takes, I want her phone mic on 24/7 and a transcript of every conversation, and I want to know what she eats for breakfast.”
Pete shakes his head. “We still don’t know for sure she’s done anything.”
“Let’s make damn sure of it then. If she doesn’t have anything to hide, fine. We can discontinue after a week.”
“We’ll need a rotating team then, three analysts around the clock if you want that level of observation.”
“Do it,” Chris says.
Pete sighs and types something into his computer only he can see, then turns away to talk to someone off-screen. “Done,” he says, when he comes back in front of the camera. “It’ll probably be eight hours or so before we’ve compromised everything.”
“What’s next on backtracking the onion network?”
“I go home,” Pete says. “I’ve got dinner with my kids. I’ll finish it tomorrow.”
“Come on, I need this now.”
“The data’s not going away. The search could take days.”
“Backtrack one more node for me.”
Pete stares at the floor for a minute. “Fine. Let me call my wife.” Pete leaves, probably so he can call from outside the secure environment of their office. When he comes back a few minutes later, he bangs on the keyboard harder.
Chris ignores the passive aggressive behavior. Pete’s working, and that’s what matters.
Except soon Pete stops typing.
“This stuff has an impact, you know. My kid’s got a homework project I’m supposed to help her with.”
“This is government business,” Chris says. “We’re tracking down a potentially dangerous computer criminal. You can’t compare that to a homework project.”
“Except there’s always someone. A terrorist needs fact-finding, or a politician might be corrupt. It doesn’t ever stop. My daughter, she only gets so many homework projects. If I don’t help her now, I’ve missed the opportunity for all time.”
Daly stares at Pete through the video connection. “What is wrong with your priorities? A woman running a soon-to-be influential tech company may be a major computer hacker. Have you read her chat messages? She told her employees she wants them to encrypt every message sent over the system and specifically tells them not to use any of the protocols we’ve compromised. Do you know what this could do to national security? This isn’t a run-of-the-mill investigation of some freak halfway around the world.”
Pete leans in close to the video camera. “I get it, and that’s why I’m still here. You and Enso come in with these urgent requests all the time, though. I’ve missed every one of my kids’ performances this year. You two need a little more respect.”
Chris leans back in his chair. One of the things that makes him so effective in his job is that he’s just as innocuous as can be. No matter where he goes, people see him as a pushover. He’s deliberately cultivated what he’s come to think of as negative presence. Where some people use their walk, posture and stance to command people’s attention, when Chris walks into a room, everyone’s eyes wander past him, and they wonder why they even looked up in the first place. The downside of this is even nerds like Pete think they can boss him around. Of course, if he rose to the challenge, it would defeat the whole purpose of cultivating negative presence in the first place.
He falls into the chair a little deeper and says “Of course, Pete. I’ll talk to Enso about it.”
Pete nods, and goes back to typing.
While Pete’s staring off at another window on his own screen, Chris stares at Pete’s brachial plexus, where the bundle of nerves exits the spinal column near the neck and feathers into the separate nerves controlling the arm. He’d strike Pete there, stunning him and leaving him without use of his arms for a few minutes. Then he’d leisurely strangle him. Kind of hard to do through the video camera through.
Mastering negative presence requires channeling his proclivities more deeply. Daly leans back in his chair and waits.
An hour later he’s deep in meditation when Pete breaks the silence.
“Damn.”
“What?”
“I traced her back through two more nodes. This isn’t easy. It’s not like we have metadata for every single transmission in the world. I need to compensate for missing nodes, correlate across records, and account for the fact she’s transmogrifying the data at each node. Working backwards from San Diego, the data originated from a hospital’s intranet. I had to compromise their firewall so I could access the router’s logs, which they fortunately preserved, to find a doctor’s computer, and then back through this same doctor’s home PC, which was accessing the work computer through LogMeIn, and from that doctor to a server in Sweden. Luckily we compromised the Swedish ISP’s trunk line way back, so we have all that data. Then we run into a problem.”
“What?”
“The Swedish connection originates from a node in the Russian botnet.”
“Damn.”
“Exactly,” Pete says. “They’ve got their own onion network. We’ve partially compromised it, but our coverage is spotty. The NSA has the records, but it’s under the jurisdiction of the Department of Justice Computer Crime division. You’re going to need to their permission.”
Chris had no contacts at DOJ. Enso could make it happen, and even then, only with a lot of questions.
“Okay, look. Forget about backtracking the connection to Brazil. What about pattern matching the size and timing of packets? She’s here in Portland. Do we see data traffic originating from anywhere in Portland, similar to what you’ve found between the nodes in her network?”
“I’m going to need another NSA search.”
“Goddamnit, I can’t, not today.”
“That’s okay. Because I’m heading home.” Pete gets up his chair. Peers down at the camera. “I’m going to see my kid before she goes to bed. You can send me the NSA search approval tomorrow.”
Pete disconnects the video conference.
The little shit! Chris hurls his phone at the wall, glass splinters, and it falls to the ground.
Chris takes a deep breath. This bitch is making his life miserable. She’s going to pay for it, one way or another. Time to take a look up close and personal.
O
N THE WAY
to the storage facility to break into Lewis’s email, I call Thomas.
“Thomas, there’s some crazy shit happening at work. The financing didn’t close, and Tomo is trying to buy us.” I fill him in on the details. “I’m sorry about yesterday and this morning. I want to set your expectation: I have no idea what I’m going to be doing or where I will be until this all gets resolved. Don’t freak out, okay?”
I have to admit, a hostile takeover of your company is a pretty good get-out-of-jail-free card for ignoring your boyfriend and being MIA for twenty-four hours.
“Holy cow,” he says. “You need anything from me?”
“Understanding and patience.”
“You got it. I’m sorry about this morning. I had no idea all this was going on.”
“It’s okay. I’ll let you know as soon as I learn anything significant.”
I hang up and realize that was easier than expected. Granted, I’ve got a killer excuse, but still, now I don’t need to worry about being incommunicado and Thomas being worried. There’s part of me that’s pissed about the whole dynamic, and why I should be accountable to Thomas at all. A different part of me says Thomas deserves nothing less than the full truth.
“Stop!” I yell at myself. Great, I’ve become one of those crazy drivers who talks out loud to themselves. “Be quiet. I need to think.”
By the time I enter my storage room, I’ve created a plan. Lewis is no dummy. He won’t have left a record on Tomo, or any phones with Tomo installed. He’d know enough to use a burner phone, or an unassociated computer. I need to treat him as an aware adversary, not your typical clueless computer user.
I do all my usual setup: secured machine images, VPN, onion routing using my boxes.
I won’t be caught unaware of developments this time: the spare computer is set up with my email and usual stuff, going through a different trunk line on the fiber optic connections I’ve hijacked from Sprint on the other side of the cinderblock room. From there I VPN right back in to my home network through a neighbor’s Internet connection. To anyone else in the world who’s spying on me, I’ll appear to be working from home.
On my hacking computer, I download all of Lewis’s records. His email, chat records, and his text message, of course. I also grab all his metadata: the IP addresses he connects from, the geocoordinate history of his Tomo-connected phone, and his website browsing history.
On my local machine, I set my software to search for patterns, the same sort of data crunching I do to identify asshole abusers, but in this I’m looking for any interesting patterns.
While that’s working in the background, I connect to Dead Channel. Nathan’s already online waiting for me.
Angel> Am I suddenly interesting or something? Why are you always watching me?
SysOp> Because someone is watching you.