TELECOMERICA

The New York corporate headquarters of Telecomerica are located on the Avenue of the Americas, but the nerve system is downtown in their offices on Thomas Street. It occupies forty-two floors of prime Manhattan real estate.

From the roof of the building, a forest of aerials and satellite dishes poke holes in the clouds above the city. On the ground floor, security is at its tightest, with armed guards and metal detectors on every entrance. Crash bars protect the front of the building from vehicular attack and bombproof shutters can be lowered from the ceiling in seconds, if called for. The building was designed, from the outset, to be self-sufficient and protected from nuclear fallout for up to two weeks after a nuclear blast. Back when it was built, during the so-called “Cold War” with the USSR, that had probably seemed like a good idea. Since Vegas it was a Federal requirement.

The physical security is one thing, but the electronic security is just as advanced.

A skilled hacker might make it through the outer defences but not without setting off alarms and the system administrators would shut them down before they had a chance to break through the secondary defences.

None of which mattered to Sam.

Next door to the highly secure Thomas Street facility is a small cafe, popular with the Telecomerica staff.

Just a heavy concrete wall–lined with brick on the cafe side and wooden panelling on the Telecomerica side –separates the cafe from the facility.

Sam sat at a small table on the cafe side and slowly inched his way into the computer network on the other side of the wall.

The rings of firewall security were not a problem. He had already bypassed them simply by connecting to an access point on the inside. Behind all the layers of expensive security.

The trick now was to analyse the network traffic: the tiny packets of data that flowed continuously like high-pressure water through the pipes of the network.

Sam’s custom-built network analyser was based on a couple of the more advanced black ops programs used by other hackers but with special mods of his own. It didn’t look like software at all. More like a random collection of code fragments in no particular shape or order. Ghillie, he called it, after the shaggy camouflage “ghillie suits” worn by Special Forces snipers.

Ghillie slithered into a small space in the network, just a shapeless pile of old code, computer droppings, lying in the memory on one of the big network routers. It lay there undetected, skimming the TCP-IP packets as they flew past, studying them, reporting on them.

The first thing Sam noticed was the silence. The TCP-IP traffic to and from the access point was minimal. There were no computers connecting to the wireless access point that he had hacked into. That indicated that the room was empty. An unused office maybe, or a conference room.

He scanned the room for peripherals: a printer, a digital projector and an interactive whiteboard. A conference room for sure.

He kept low, watching for intrusion detection programs – the network’s guard dogs, smoke alarms or trip-wires.

“One of the guards is talking on his cell,” Fargas said in his ear. “You sure they can’t detect this program of yours?”

“Positive. What’s the guard doing?”

“He’s smiling. Probably ordering Krispy Kremes.”

“Got a big router running hot on the fifth floor,” Sam said. “Think I’ll just go hide in the packet flood and hunt for a network controller.”

“One strawberry, two cinnamon twists and a chocolate iced. And don’t hold the sprinkles,” Fargas said.

Softly, softly, Sam thought, insinuating himself into the new router, and making no further movements, just keeping his head down, watching the flow of data, looking for the software that would be looking for him.

There was nothing.

And yet …

He couldn’t shake off a feeling that somewhere in the depths of the network an eye, like the eye of Mordor, was turned in his direction.

“Ever get that feeling you’re being watched?” he asked.

“You are being watched,” Fargas said from the other side of the street. “I’m watching you. Or your feet at least.”

“You’re supposed to be watching the guards,” Sam said, as he ran a triple check for all known detection programs. Nothing.

“We can back out of this,” Fargas said.

Sam ignored him and began to look around, sending tiny cyber filaments out through the network, scanning for servers.

There were hundreds of servers scattered throughout the building. Some big number-crunchers, others smaller, dedicated to a single task. The one he wanted was a network controller, one of the DHCP servers that ran the network.

It wasn’t hard to find. He simply had to trace the security requests, which all had to be routed through the network controller. This was the machine with the key to the entire system, the SAM database where the network passwords were stored. Unlock that file and the network was his.

“Got the SAM file,” he said. “I’m going to run a rainbow crack and–”

He froze. Something just passed right over the top of him, reading his code. Anti-intrusion! This was new though. Not so much a watchdog, chained to a post, barking at intruders, but something infinitely more dangerous. Something unseen that crawled in the dark places of the network, probing here and there with electronic feelers. A network spider. He had heard of them, had even got a copy of one and taken it apart to see how it worked, but had never encountered one in the wild before.

He shuddered as the digital legs of the dark creature probed his code, sifting through it, analysing it.

Then it was gone. Fooled by the electronic ghillie suit.

“What?” Fargas asked.

“Security spider. Just went right over the top of Ghillie.”

“Pick you up?”

“Cruised straight past.”

Sam traced the shape of the spider and fed it into his early-warning system. The next time the spider, or one of its kind, came crawling in his direction he would have fair warning.

Cracking the network controller was going to be tricky. He briefly considered an ARP poisoning attack against one of the network switches, turning it into a hub and making it accessible to anyone. But that would leave evidence of the hack, which would defeat the whole purpose.

He decided on a MAC spoofing attack.

Every machine on a network has a Media Access Control address, a unique ID number programmed into the network card. Sam’s next trick was to find a suitable machine and “borrow” its MAC address, fooling the network controller into accepting him as an authorised part of the network.

It didn’t take long. A few minutes of watching, waiting and a new computer came online. A laptop, almost certainly, attaching itself to one of the many wireless access points on the network.

Sam smiled as the laptop revealed its MAC address in the probe request, and was confirmed a nanosecond later by the probe response from the network controller. Before it even had time to authenticate the request, Sam was in, jamming the network card of the laptop for a moment while he reprogrammed his own MAC address, “spoofing” that of the genuine machines.

The network controller looked him up and down, decided that he was the new laptop and happily authenticated him.

He was in.

Someone would be calling tech support about now, Sam thought, complaining about a laptop that was not connecting to the network. But if the help desk here was like most, it would take twenty minutes to answer, and then the first advice would be to restart the laptop.

Plenty of time.

Ethan Rix put on his telephone headset and answered the call with a click of his mouse.

Business was light this time of the morning and this was his first call since coming on shift.

Most of the problems were simple technical questions that he could clear up quickly, the same problems over and over, in fact. Some people seemed to have the same problem each week, and never learned from the week before what the solution was.

The voice on the other end of the phone was complaining about a laptop that wouldn’t connect to the network. As usual, he advised restarting the machine.

“First pinhead of the morning?”

He looked up. Erica Fogarty, one of the on-duty system administrators, was hovering over his desk.

“John Holden from fourth. Can’t connect. System says he’s already on. Couldn’t be a MAC spoof?”

“Inside the firewall? Not possible.” Erica shook her head.

“I’ll run a check of current logins, just to be sure,” Ethan said.

The spider came back as Sam was delicately probing the hard drives of the network controller. He paused and the spider passed by, although he couldn’t shake off that disquieting feeling … was it the spider? Or was there something else? That burning eye of Mordor.

There were trip-wires on the network controller. Sections of the hard disk that, if accessed, would immediately sound the alarm. He manoeuvred cautiously around them and probed deeper into the bowels of the big server.

The SAM database is the record of all the usernames and passwords on the network, all encrypted into secure hashes with over eighty billion possible combinations.

Supposedly unbreakable security.

In fact, it took 7.7 seconds, using a rainbow crack, to retrieve the first password, and within five minutes he had the one he wanted. The SysAdmin password: the system administrator. The key to every door in the network.

Suddenly, the entire network lay open before him. Barefaced, unprotected, vulnerable.

No time though to stop and congratulate himself. He was already moving, racing through the wide-open corridors of the network.

Next stop, the primary transaction database. Millions, billions, of database records. A library of information, all laid out in neat rows in front of him with his new godlike SysAdmin powers.

“I’m in,” he said.

“You serious?” Fargas asked.

“I am God and Harold be my name,” Sam replied.

“Harold?”

“Let’s go shopping. What’ll you have?” Sam asked.

“One strawberry, two cinnamon twists and a chocolate iced.”

“Let’s start with a couple of the latest paper-thin Toshiba notebooks.” Sam scanned the database as he spoke, writing and executing SQL statements, looking up product codes and making matching entries in a sales order table.

“One of those new neuro-headsets,” Fargas contributed.

“Two headsets coming right up. Can I upsize you to a super combo?”

Records updated, the results window informed him a few minutes later. Just a miniscule drop in the massive Telecomerica data ocean. A transaction that never was, but which, to the computers that ran Telecomerica, was now a matter of record. An undisputed fact.

Job done. Time to leave.

He closed the SQL manager and waited – just for a few minutes to make sure that his covert operation had not attracted anyone’s attention.

If Telecomerica suspected the break-in, they would run checks on the data, and that would show up the change he had made. Which would lead them straight to him.

But so far, so good.

“Excuse me, Erica,” Ethan called across the room.

“Yeah?”

“You using SysAdmin?”

“Nobody uses SysAdmin. It’s just a backup in case of password corruption.”

“Someone is.”

She came and stood over his shoulder again. “What are they accessing?”

Reflected in his screen, Ethan saw a horrified expression fall over Erica’s face. “The central database server,” he said.

Sam was just completing the clean-up, erasing every trace of his presence, when all hell broke loose.

The network lit up like a fireworks display as intrusion alarms went off on all the main servers simultaneously. Powerful anti-intrusion code checkers roared through the network pipes, searching, scanning for anything out of the ordinary. Spiders, not one, but a hundred of them, appeared on his radar, crawling everywhere. There were thundering crashes all around him as electronic doors slammed shut.

“Crap!”

“What is it?” Fargas asked.

“They’re on to me. It’s like the Fourth of July in here.”

“Then kill Ghillie and get out of there!”

Frantically, Sam keyed in a self-destruct command, but hesitated before pressing the button.

“Can’t do that yet,” he said.

“Sam, you know if they find it, they’ll pull it to pieces, figure it out and add its profile to the antiviral databases. You’ve got to delete it and get out of there.”

It was true. If they caught and analysed Ghillie, it would be rendered useless, not just now, but always.

Still he hesitated. Without Ghillie he was deaf, dumb and blind.

“I need it,” he said. “If they know the database has been compromised, then they’ll look for the most recent changes and that’ll lead them straight to us!”

He logged back onto the database, a desperate plan forming in his mind. As system administrator, he had full power over the database. Power to create. Power to destroy.

Gritting his teeth, he fired a data bomb right into the heart of the transaction database server. It exploded with a huge whumph, scrambling the database into a billion fragments.

Scanners swept over him, oblivious, fooled by the camouflage. That gave him a ray of hope. Maybe there was still a way …

“Whatever you’re doing, do it fast,” Fargas said.

If they are looking for something, better give them something to find, Sam thought, reaching into his bag of dirty tricks and releasing a couple of vicious viruses into the arteries of the network. The Russian Black Flu and the Japanese Kamikaze. Self-replicating, shape-shifting viruses. Nasty little critters, highly destructive and difficult to stamp out. The network security should cope with them, but it would occupy them for a few minutes: a distraction, a diversion.

What he needed, and needed urgently, was the location of the database backup files. They wouldn’t be on site, but where would they be?

The SQL database management engine gave him the answer: London.

There were alternative backups in Washington DC and Melbourne, but London was the first go-to place if the system crashed (which it just had).

He digitally rocketed across the Atlantic and burst through the security in the London facility. Not bypassing the defences so much as kicking the front door down, using his SysAdmin powers as a battering ram.

Even as he did so, he realised that Ghillie was under attack. Something, someone – a human being not a program – was reading its code, line by line. Nothing he could do about that now. He still needed his eyes and ears if he was going to finish this.

Erica was making Ethan uncomfortable, hovering just behind him. She was on the phone now, her voice loud enough to vibrate the earphones in his headset.

“No, we don’t know how they got in!” she said.

He twisted around. “Logs show a wireless router disconnect and reconnect in Conference Three.”

“Might have pirated a wireless router,” Erica said, not too calmly. “I’ve warned and warned about wireless inside the DMZ.”

“I’ve got viral alerts on three floors,” Ethan yelled. “Variant of the Black Flu, maybe something else too.”

“If it’s wireless, then they’re close. Get security onto it.” Erica hung up and sat down at the spare terminal next to him.

“I’ll take the viruses, you stay on the hacker,” she said.

The backup files were stored in a SAN, Sam realised. A Storage Area Network. This SAN was well secured, padlocked as it were.

He could break it but that would leave traces of his visit. He had to pick the lock. He struggled to concentrate, knowing that they were already on his tail. He prodded the locking software gently, studying the mechanism.

“What have you done now?” Fargas yelled in his ear. “I’ve got security running around like their butts are on fire. Running out into the street.”

“What are they doing?”

“Checking cars, stopping traffic, scanning the buildings. It’s only going to take them a few seconds to figure out where you are, Sam. Get outta there! Crap, coming your way right now!”

Sam slid the laptop off the table and onto his knees as an armed guard burst in through the doors at the front of the cafe.

His heart was hammering in his chest, but casually, ever so casually, he began to sip his chai latte. It was barely lukewarm.

The guard ran his gaze around the cafe and ran back out again, shouting into his radio.

Underneath the table Sam’s fingers flew across the keyboard. He was hyperventilating now and tried to force his breathing to steady, but it would not.

The locking software sprang open and he rifled through the backup files. They were encrypted and compressed, although no trouble if you had the right tools.

He carefully edited the most recent backup of the transaction database, closed it, then reset the time and date on the file back to what it had been before he had made the changes.

When they restored the backup files to replace the ruined database they would be unwittingly putting his data right where he wanted it.

The last thing he did, before sending a self-destruct signal, was to leave traces of a digital signature that he had stolen from a Turkish hacker. Ghillie disappeared as if it had never existed.

He grabbed the parabolic antenna, flattened its wings and threw it into his backpack. He hit the shutdown on his laptop.

“Someone just ran outside with a radio direction finder!” Fargas yelled. “Now they’re all heading right your way.”

Sam was already moving. He was at the rear of the cafe by the washrooms when the guards burst through the front door. He ducked across the hallway into the cafe’s small kitchen, throwing on a baseball cap and pair of sunglasses as he did so, running past the hotplates and startled chefs to the service entrance at the rear.

He emerged onto Trimble Place, looking back again and again, but seeing no sign of pursuit. A police humvee went past him at speed, siren wailing.

He was so engrossed in what was, or wasn’t, behind him that he completely failed to notice the security camera, mounted high on a telegraph pole, that turned to follow him as he scurried along Trimble Place. He walked a little more steadily down Duane Street, eventually losing himself in the crowds thronging their way to work along Hudson Street.

Slowly, Sam’s breathing began to calm. He checked his watch and increased his pace, partly to put in more distance from the scene of the crime, and partly because he was late.

It was 8.52 am.

Time for school.