Read The Blue Nowhere-SA Online

Authors: Jeffery Deaver

Tags: #Computer hackers, #Crime & mystery, #Serial murders, #Action & Adventure, #Privacy; Encroachment by computer systems, #Crime investigations, #General, #Murder victims, #suspense, #Adventure, #Technological, #California, #Crime & Thriller, #Fiction, #thriller

The Blue Nowhere-SA (13 page)

BOOK: The Blue Nowhere-SA
7.58Mb size Format: txt, pdf, ePub
ads

He then moved to the Internet Relay Chat rooms. The IRC was an unregulated no-holds-barred series of networks where you could find real-time discussions among people who had similar interests. You typed your comment, hit the ENTER key and your words appeared on the screens of everyone who was logged into the room at that time. He logged into the room #hack (the rooms were designated by a number sign followed by a descriptive word). It was in this same room where he'd spent thousands of hours, sharing information, arguing and joking with fellow hackers around the world. After the IRC Gillette began searching through the BBS, bulletin boards, which are like Web sites but can be accessed for only the cost of a local phone call - no Internet service provider is required. Many were legitimate but many others - with names like DeathHack and Silent Spring - were the darkest parts of the online world. Completely unregulated and unmonitored, these were the places to go for recipes for bombs and poisonous gases and debilitating computer viruses that would wipe the hard drives of half the population of the world.

Following the leads - losing himself in Web sites, newsgroups, chat rooms and archives. Hunting This is what lawyers do when they paw through hoary old shelves searching for that one case that will
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

save their client from execution, what sportsmen do easing through the grass toward where they thought they heard the snarl of a bear, what lovers do seeking the core of each other's lust Except that hunting in the Blue Nowhere isn't like searching library stacks or a field of tall grass or on your mate's smooth flesh; it's like prowling through the entire ever-expanding universe, which contains not only the known world and its unshared mysteries but worlds past and worlds yet to come. Endless.

Snap.

He had broken another key - the all-important E. Gillette flung this keyboard into the corner of the cubicle, where it joined its dead friend.

He plugged in a new one and kept going.

At 2:30 P.M. Gillette emerged from the cubicle. His back was racked with pure fiery pain from sitting frozen in one place. Yet he could still feel the exhilarating rush from that brief time he'd spent online and the fierce reluctance at leaving the machine.

In the main part of the CCU he found Bishop talking with Shelton; the others were on telephones or standing around the white-board, looking over the evidence. Bishop noticed Gillette first and fell silent.

"I've found something," the hacker said, holding up a stack of printouts.

"Tell us."

"Dumb it down," Shelton reminded. "What's the bottom line?"

"The bottom line," Gillette responded, "is that there's somebody named Phate. And we've got a real problem."

CHAPTER TWELVE

"Fate" Frank Bishop asked.

A Gillette said. "That's his username - his screen name. Only he spells it p-h-a-t-e. Like p-h phishing, remember? The way hackers do."

It's all in the spelling

"What's his real name?" Patricia Nolan asked.

"I don't know. Nobody seems to know much about him - he's a loner - but the people who've heard of him're scared as hell."

"A wizard?" Stephen Miller asked.

"Definitely a wizard."

Bishop asked, "Why do you think he's the killer?"

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Gillette flipped through the printouts. "Here's what I found. Phate and a friend of his, somebody named Shawn, wrote some software called Trapdoor. Now, 'trapdoor' in the computer world means a hole built into a security system that lets the software designers get back inside to fix problems without needing a passcode. Phate and Shawn use the same name for their script but this's a little different. It's a program that somehow lets them get inside anybody's computer."

"Trapdoor," Bishop mused. "Like a gallows, too."

"Like a gallows," Gillette echoed.

Nolan asked, "How does it work?"

Gillette was about to explain it to her in the language of the initiated then glanced at Bishop and Shelton. Dumb it down.

The hacker walked to one of the blank white-boards and drew a chart. He said, "The way information travels on the Net isn't like on a telephone. Everything sent online - an e-mail, music you listen to, a picture you download, the graphics on a Web site - is broken down into small fragments of data called

'packets.' When your browser requests something from a Web site it sends packets out into the Internet. At the receiving end the Web server computer reassembles your request and then sends its response also broken into packets - back to your machine."

"Why're they broken up?" Shelton asked.

Nolan answered, "So that a lot of different messages can be sent over the same wires at the same time. Also, if some of the packets get lost or corrupted your computer gets a notice about it and resends just the problem packets. You don't have to resend the whole message." Gillette pointed to his diagram and continued, "The packets are forwarded through the Internet by these routers - huge computers around the country that guide the packets to their final destination. Routers have real tight security but Phate's managed to crack into some of them and put a packet-sniffer inside."

"Which," Bishop said, "looks for certain packets, I assume."

"Exactly," Gillette continued. "It identifies them by somebody's screen name or the address of the machines the pack-ets're coming from or going to. When the sniffer finds the packets it's been waiting for it diverts them to Phate's computer. Once they're there Phate adds something to the packets." Gillette asked Miller, "You ever heard of stenanography?"

The cop shook his head. Tony Mott and Linda Sanchez weren't familiar with the term either but Patricia Nolan said, "That's hiding secret data in, say, pictures or sound files you're sending online. Spy stuff."

"Right," Gillette confirmed. "Encrypted data is woven right into the file itself - so that even if somebody intercepts your e-mail and reads it or looks at the picture you've sent all they'll see is an innocent-looking file and not the secret data. Well, that's what Phate's Trapdoor software does. Only it doesn't hide messages in the files - it hides an application."

"A working program?" Nolan said.

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

"Yep. Then he sends it on its way to the victim."

Nolan shook her head. Her pale, doughy face revealed both shock and admiration. Her voice was hushed with awe as she said, "No one's ever done that before."

"What's this software that he sends?" Bishop asked.

"It's a demon," Gillette answered, drawing a second diagram to show how Trapdoor worked.

"Demon?" Shelton asked.

"There's a whole category of software called 'bots,'" Gillette explained. "Short for 'robots.' And that's just what they are - software robots. Once they're activated they run completely on their own, without any human input. They can travel from one machine to another, they can reproduce, they can hide, they can communicate with other computers or people, they can kill themselves." Gillette continued, "Demons are a type of bot. They sit inside your computer and do things like run the clock and automatically back up files. Scut work. But the Trapdoor demon does something a lot scarier. Once it's inside your computer it modifies the operating system and, when you go online, it links your computer to Phate's."

"And he seizes root," Bishop said.

"Exactly."

"Oh, this is bad," Linda Sanchez muttered. "Man" Nolan twined more of her unkempt hair around a finger. Beneath the fragile designer glasses her green eyes were troubled - as if she'd just seen a terrible accident. "So if you surf the Web, read a news story, read an e-mail, pay a bill, listen to music, download pictures, look up a stock quotation - if you're online at all - Phate can get inside your computer."

"Yep. Anything you get via the Internet might have the Trapdoor demon in it."

"But what about firewalls?" Miller asked. "Why don't they stop it?" Firewalls are computer sentries that keep files or data you haven't requested out of your machine. Gillette explained, "That's what's brilliant about this: Because the demon's hidden in data that you've asked for, firewalls won't stop it."

"Brilliant," Bob Shelton muttered sarcastically.

Tony Mott drummed his fingers absently on his bike helmet. "He's breaking rule number one."

"Which is?" Bishop asked.

Gillette recited, "Leave the civilians alone."

Mott, nodding, continued, "Hackers feel that the government, corporations and other hackers are fair game. But you should never target the general public."

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Sanchez asked, "Is there any way to tell if he's inside your machine?"

"Only little things - your keyboard seems a little sluggish, the graphics look a little fuzzy, a game doesn't respond quite as quickly as usual, your hard drive engages for a second or two when it shouldn't. Nothing so obvious that most people'd notice."

Shelton asked, "How come you didn't find this demon thing in Lara Gibson's computer?"

"I did - only what I found was its corpse: digital gibberish. Phate built some kind of self-destruct into it. If the demon senses you're looking for it, it rewrites itself into garbage."

"How did you find all this out?" Bishop asked.

Gillette shrugged. "Pieced it together from these." He handed Bishop the printouts. Bishop looked at the top sheet of paper.

To: Group From: Triple-X

I heard that Titan233 was asking for a copy of Trapdoor. Don't do it, man. Forget you heard about it. I know about Phate and Shawn. They're DANGEROUS. I'm not kidding.

"Who's he?" Shelton asked. "Triple-X? Be good to have a talk with him in person."

"I don't have any clue what his real name is or where he lives," Gillette said. "Maybe he was in some cybergang with Phate and Shawn."

Bishop flipped through the rest of the printouts, all of which gave some detail or rumor about Trapdoor. Triple-X's name was on several of them.

Nolan tapped one. "Can we trace the information in the header back to Triple-X's machine?" Gillette explained to Bishop and Shelton, "Headers in newsgroup postings and e-mails show the route the message took from the sender's computer to the recipient's.

Theoretically you can look at a header and trace a message back to find the location of the sender's machine. But I checked these already." Nodding at the sheet. "They're fake. Most serious hackers falsify the headers so nobody can find them."

"So it's a dead end?" Shelton muttered.

"I just read everything quickly. We should look at them again carefully," Gillette said, nodding at the printouts. "Then I'm going to hack together a bot of my own. It'll search for any mention of the words Phate,' 'Shawn,' 'Trapdoor'or Triple-X.'"

"A fishing expedition," Bishop mused. "P-h phishing." It's all in the spelling

Tony Mott said, "Let's call CERT. See if they've heard anything about this."
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Although the organization itself denied it, every geek in the world knew that these initials stood for the Computer Emergency Response Team. Located on the Carnegie Mellon campus in Pittsburgh, CERT

was a clearinghouse for information about viruses and other computer threats. It also warned systems administrators of impending hacker attacks.

After the organization was described to him Bishop nodded. "Let's give them a call." Nolan added, "But don't say anything about Wyatt. CERT's connected with the Department of Defense." Mott made the call and spoke to someone he knew at the organization. After a brief conversation he hung up. "They've never heard about Trapdoor or anything similar. They want us to keep them posted." Linda Sanchez was staring at the picture of Andy Anderson's daughter on his desk. In a troubled whisper she said, "So nobody who goes online is safe."

Gillette looked into the woman's round brown eyes. "Phate can find out every secret you've got. He can impersonate you or read your medical records. He can empty your bank accounts, make illegal political contributions in your name, give you a phony lover and send your wife or husband copies of fake love letters. He could get you fired."

"Or," Patricia Nolan added softly, "he could kill you."

"Mr. Holloway, are you with us? Mr. Holloway!"

"Huh?"

"'Huh?' 'Huh?' Is that the response of a respectful student? I've asked you twice to answer the question and you're staring out the window. If you don't do the assignments we're going to have a prob-"What was the question again?"

"Let me finish, young man. If you don't do the assignments then we're going to have some problems. Do you know how many deserving students're on the waiting list to get into this school? Of course you don't and you don't care either. Did you read the assignment?"

"Not exactly."

" 'Not exactly.' I see. Well, the question is: Define the octal number system and give me the decimal equivalent of the octal numbers 05726 and 12438. But why do you want to know the question if you haven't read the assignment? You can hardly answer-"The octal system is a number system with eight digits, like the decimal system has ten and the binary system has two."

"So, you remember something from the Discovery Channel, Mr. Holloway."

"No, I-"If you know so much why don't you come up to the board and try to convert those numbers for us. Up to the board, up you go!"

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

"I don't need to write it out. The octal number 05726 converts to decimal 3030. You made a mistake with the second number ƒ 12438 isn't an octal number. There's no digit 8 in the octal system. Only zero through seven."

"I didn't make a mistake. It was a trick question. To see if the class was on its toes."

"If you say so."

BOOK: The Blue Nowhere-SA
7.58Mb size Format: txt, pdf, ePub
ads

Other books

These Dead Lands: Immolation by Stephen Knight, Scott Wolf
Ship Captain's Daughter by Ann Michler Lewis
Unholy Alliance by Don Gutteridge
Greek Coffin Mystery by Ellery Queen
Call of the Herald by Brian Rathbone
Stepping Out by Laura Langston
Sex and Death by Sarah Hall
Wild Licks by Cecilia Tan