Book Read Free

You think you know me pretty well (an Alex Sedaka thriller)

Page 35

by David Kessler


  Finally don’t forget to check out the other Alex Sedaka thrillers.

  Extract from No Way Out

  Copyright © 2010 David Kessler

  It was only a set of fingers flying across a keyboard, yet they could work so much malice.

  She watched in awe as her words appeared before her, the letters on the screen keeping pace with her fingers. What was so amazing was how little she had to change to wreak so much damage. All she had to do to alter the behaviour of an entire computer program was make minor alterations to just two of the lines of the program and then switch two of the other lines around. Hackers and “midnight programmers” would laugh at the absurd simplicity of it. Some of them might even have been mildly amused by the sheer audacity of it. But few of them would have condoned her objectives. Most hackers tended to be free-wheeling libertarians, not embittered racists. And she wasn’t even trained as a computer programmer, apart from one short online course she had taken recently.

  But the irony went deeper than that.

  Everyone knew the old cliché that you can radically change the interpretation of a contract by an ambiguous pronoun or the meaning of a statute by a harmless-looking punctuation mark. In England a diplomat and humanitarian called Roger Casement was said to have been “hanged by a comma” after he was found guilty of treason under a medieval statute. But who would have believed that the same was true of a computer program? And the biggest irony of all was that she couldn’t tell anyone – like the criminal who commits the perfect crime and wants to brag about it to others, but can’t, because if he tells other people, then the crime would no longer be perfect!

  But so what?

  She wasn’t doing it for fame or glory. She was doing it for justice – plain, old-fashioned justice.

  As she continued her work, she glanced up and looked out through the window. In the distance she could see the flickering lights of the nocturnal city. It reminded her that there was a world out there beyond her private world of vengeance. But she forced herself to ignore the distraction. Her fingers continued to dance across the keyboard in the small pool of halogen light that fell upon the desk. The rest of the room was in darkness.

  After a few more seconds of work, she paused, satisfied with the results of her labors. Then, with a couple of clicks on the left button of the mouse, she selected a menu item called “build.” This action inaugurated a two-stage process known to computer programmers as “compiling” and “linking.” It was this process that actually created the finished computer program. By the time forty eight seconds had elapsed, she had created a new version of the program.

  And what a new version!

  She thought about it now, almost wistfully. Getting the original source code had been rather tricky. She’d had to use some of her old contacts to break down the bureaucratic barriers. But many States had public records or freedom of information laws. She wished that she could infiltrate the altered program everywhere. That would be something of a coup! But she had to be realistic.

  When she first started out, she had no idea that she would even be able to do it. It was more idle curiosity than a firm agenda that had prompted her to explore the possibility. But when she studied the documentation and asked a few questions of a professor to understand how the software worked, it suddenly dawned on her just how easy it would be.

  Of course, slipping it in undetected would be the hardest part. There were various ways she could do it. One way was to hack into the server computers and upload the new program. But that was risky. The fact that an organization maintained a server that was accessible from outside did not necessarily mean that it was vulnerable. Interactive websites were usually protected by strong firewalls.

  There was, however, another way to infiltrate the new version of the software that didn’t involve direct use of the internet at all – social engineering. The trick was to get the systems administrators to install it themselves. The key to this method was to make it seem as if it were a modification of a current program that they were already using. By packaging the program complete with forged letterhead, printing on the DVD surface and multicolor process-printed documentation, and then sending it out by special courier, she could trick their Systems Administrators into installing the new version under the erroneous assumption that they were getting an upgrade from the software company.

  It would be the ultimate software hack followed by the ultimate in social engineering.

  But what was the new program? It was not one of those so-called “Trojan horses.” Neither was it a virus that could replicate itself. Nor yet was it a trap-door that would enable her to get into the system later. Indeed, once inserted into the system it would simply do its work.

  And now she was going to make the niggers pay!

  Table of Contents

  Author’s Note

  Contents

  09:30 Pacific Daylight Time (August 14, 2007)

  09:38 PDT

  09:40 PDT

  09:43 PDT

  09:45 PDT

  09:48 PDT (17:48 British Summer Time)

  9:50 PDT

  10:03 PDT

  10:05 PDT

  10:17 PDT (18:17 BST)

  10:36 PDT

  10:39 PDT

  10:43 PDT

  10:52 PDT

  11:04 PDT

  11:09 PDT

  11:17 PDT (19:17 BST)

  11:28 PDT

  11:33 PDT

  11:39 PDT (19:39 BST)

  11:55 PDT

  12:20 PDT

  12:31 PDT

  12:40 PDT

  12:46 PDT

  12:49 PDT

  12:53 PDT

  13:11 PDT

  13:19 PDT

  13:33 PDT

  13:42 PDT

  13:51 PDT

  14:08 PDT

  14:13 PDT

  14:19 PDT

  14:22 PDT

  14:28 PDT

  14:34 PDT

  14:41 PDT

  14:46 PDT

  15:06 PDT

  15:14 PDT

  15:23 PDT (23:23 BST)

  15:27 PDT

  15:29 PDT (23:29 BST)

  15:36 PDT

  15:42 PDT (23:42 BST)

  15:48 PDT

 

 

 


‹ Prev