The Blue Nowhere

Chapter 6

It seemed that cops used acronyms as much as hackers.

"Man, here"s one more," Mott said, reading the screen.

"More?" Stephen Miller asked, dismayed. He absently organized some of the disks and papers that covered hi desk six inches deep.

"About eighteen months ago a diplomat and a colonel at the Pentagon - both of them with bodyguards - were killed in Herndon, Virginia. That"s the Dulles Toll Road high-tech corridor... I"m ordering the complete files."

"What were the dates of the Virginia killings?" Anderson asked.



"August twelfth and thirteenth."

He wrote this on the white-board and looked at Gillette with a raised eyebrow. "Any clue?"

"IBM"s first PC," the hacker replied. "The release date was August twelfth." Nolan nodded.

"So he"s got a theme," Shelton said.

Frank Bishop added, "And that means he"s going to keep going."

The computer terminal where Mott sat gave a soft beep. The young cop leaned forward, his large automatic pistol clanking loudly against his chair. He frowned. "We"ve got a problem here."

On the screen were the words: Unable to Download Files A longer message was beneath it.

Anderson read the text, shook his head. "The case files at VICAP on the Portland and Virginia killings"re missing. The note from the sysadmin says they were damaged in a data-storage mishap."

"Mishap," Nolan muttered, sharing a look with Gillette.

Linda Sanchez, eyes wide, said, "You don"t think... I mean, he couldn"t"ve cracked VICAP. n.o.body"s ever done that."

Anderson said to the younger cop, "Try the state databases: Oregon and Virginia state police case archives."

In a moment Mott looked up. "No record of any files on those cases. They vanished."

Mott and Miller eyed each other uncertainly. "This"s getting scary," Mott said.

Anderson mused, "But what"s his motive?"

"He"s a G.o.dd.a.m.n hacker," Shelton muttered. "That"s his motive."

"He"s not a hacker," Gillette said.

"Then what is he?"

Gillette didn"t feel like educating the difficult cop. He glanced at Anderson, who explained, "The word "hacker" is a compliment. It means an innovative programmer. As in "hacking together" software. A real hacker breaks into somebody"s machine only to see if he can do it and to find out what"s inside - it"s a curiosity thing. The hacker ethic is it"s okay to look but don"t touch. People who break into systems as vandals or thieves are called "crackers." As in safecrackers."

"I wouldn"t even call him that," Gillette said. "Crackers maybe steal and vandalize but they don"t hurt people. I"d call him a "kracker" with a k. For killer."

"Cracker with a c, kracker with a k" Shelton muttered. "What the h.e.l.l difference does it make?"

"A big difference," Gillette said. "Spell "phreak" with a ph and you"re talking about somebody who steals phone services. "Phishing" - with a ph - is searching the Net for someone"s ident.i.ty. Misspell "wares" with a z on the end, not an s, and you"re not talking about housewares but about stolen software. When it comes to hacking it"s all in the spelling."

Shelton shrugged and remained unimpressed by the distinction.

The identification techs from the California State Police Forensics Division returned to the main part of the CCU office, wheeling battered suitcases behind them. One consulted a sheet of paper. "We lifted eighteen partial latents, twelve partial visibles." He nodded at a laptop computer case slung over his shoulder. "We scanned them and it looks like they"re all the victim"s or her boyfriend"s. And there was no evidence of glove smears on the keys."

"So," Anderson said, "he got inside her system from a remote location. Soft access - like we thought." He thanked the techs and they left.

Then Linda Sanchez - all business at the moment, no longer the grandmother-to-be - said to Gillette, "I"ve secured and logged everything in her machine." She handed him a floppy disk. "Here"s a boot disk."

This was a disk that contained enough of an operating system to "boot up," or start, a suspect"s computer. Police used boot disks, rather than the hard drive itself, to start the computer in case the owner - or the killer, in this case - had installed some software on the hard drive that would destroy data.

"I"ve been through her machine three times now and I haven"t found any b.o.o.by traps but that doesn"t mean they aren"t there. You probably know all this too but keep the victim"s machine and any disks away from plastic bags or boxes or folders - they can create static and zap data. Same thing with speakers. They have magnets in them. And don"t put any disks on metal shelves - they might be magnetized. You"ll find nonmagnetic tools in the lab. I guess you know what to do from here."

"Yep."

She said, "Good luck. The lab"s down that corridor there."

The boot disk in hand, Gillette started toward the hallway.

Bob Shelton followed.

The hacker turned. "I don"t really want anybody looking over my shoulder."

Especially you, he added to himself.

"It"s okay," Anderson said to the Homicide cop. "The only exit back there"s alarmed and he"s got his jewelry on." Nodding at the shiny metal transmission anklet. "He"s not going anywhere."

Shelton wasn"t pleased but he acquiesced. Gillette noticed, though, that he didn"t return to the main room. He leaned against the hallway wall near the lab and crossed his arms, looking like a bouncer with a bad att.i.tude.

If you even get an itchy look that I don"t like you"re going to get hurt bad...

Inside the a.n.a.lysis room Gillette walked up to Lara Gibson"s computer. It was an unremarkable, off-the-shelf IBM clone.

He did nothing with her machine just yet, though. Instead he sat down at a workstation and wrote a kludge - a down-and-dirty software program. In five minutes he was finished writing the source code. He named the program Detective then compiled and copied it to the boot disk Sanchez had given him. He inserted the disk into the floppy drive of Lara Gibson"s machine. He turned on the power switch and the drives hummed and snapped with comforting familiarity.

Wyatt Gillette"s thick, muscular fingers slid eagerly onto the cool plastic of the keys. He positioned his fingertips, callused from years of keyboarding, on the tiny orientation b.u.mps on the F and J keys. The boot disk bypa.s.sed the machine"s Windows operating system and went straight to the leaner MS-DOS - the famous Microsoft Disk Operating System, which is the basis for the more user-friendly Windows. The C: prompt appeared on the black screen.

His heart raced as he stared at the hypnotically pulsing cursor.

Then, not looking at the keyboard, he pressed a key, the one for d- the first letter in the command line, detective.exe, which would start his program.

In the Blue Nowhere time is very different from what we know it to be in the Real World and, in the first thousandth of a second after Wyatt Gillette pushed that key, this happened: The voltage flowing through the circuit beneath the d key changed ever so slightly.

The keyboard processor noticed the change in current and transmitted an interrupt signal to the computer itself, which momentarily sent the dozens of tasks it was currently performing to a storage area known as the stack and then created a special priority route for codes coming from the keyboard.

The code for the letter d was directed by the keyboard processor along this express route into the computer"s basic input-output system - the BIOS - which checked to see if Wyatt Gillette had pressed the SHIFT, CONTROL or ALTERNATE keys at the same time he"d hit the d key.

a.s.sured that he hadn"t, the BIOS translated the letter"s keyboard code for the lowercase d into another one, its ASCII code, which was then sent into the computer"s graphics adapter.

The adapter in turn converted the code to a digital signal, which it forwarded to the electron guns located in the back of the monitor.

The guns fired a burst of energy into the chemical coating on the screen. And, miraculously, the white letter d burned into existence on the black monitor.

All this in that fraction of a second.

And in what remained of that second Gillette typed the rest of the letters of his command, e-t-e-c-t-i-v-e.e-x-e, and then hit the ENTER key with his right little finger.

More type and graphics appeared, and soon, like a surgeon on the trail of an elusive tumor, Wyatt Gillette began probing carefully through Lara Gibson"s computer - the only aspect of the woman that had survived the vicious attack, that was still warm, that retained at least a few memories of who she was and what she"d done in her brief life.

CHAPTER 00000111 / SEVEN.

He walks in a hacker"s slump, Andy Anderson thought, watching Wyatt Gillette return from the a.n.a.lysis lab.

Machine people had the worst posture of any profession in the world.

It was nearly 11:00 A.M. The hacker had spent only thirty minutes looking over Lara Gibson"s machine.

Bob Shelton, who now dogged Gillette back to the main office, to the hacker"s obvious irritation, asked, "So what"d you find?" The question was delivered in a chilly tone and Anderson wondered again why Shelton was riding the young man so hard - especially considering that the hacker was helping them out on a case the detective had volunteered for.

Gillette ignored the pock-faced cop and sat down in a swivel chair, flipped open his notebook. When he spoke it was to Anderson. "There"s something odd going on. The killer was in her computer. He seized root and--"

"Dumb it down," Shelton muttered. "Seized what?"

Gillette explained, "When somebody has root that means they have complete control over a computer network and all the machines on it."

Anderson added, "When you"re root you can rewrite programs, delete files, add authorized users, remove them, go online as somebody else."

Gillette continued, "But I can"t figure out how he did it. The only thing unusual I found were some scrambled files -I thought they were some kind of encrypted virus but they turned out to be just gibberish. There"s not a trace of any kind of software on her machine that would let him get inside."

Glancing at Bishop, he explained, "See, I could load a virus in your computer that"d let me seize root on your machine and get inside it from wherever I am, whenever I want to, without needing a pa.s.scode. They"re called "back door" viruses - as in sneaking in through the back door.

"But in order for them to work I have to somehow actually install the software on your computer and activate it. I could send it to you as an attachment to an e-mail, say, and you could activate it by opening the attachment without knowing what it was. Or I could break into your house and install it on your computer then activate it myself. But there"s no evidence that happened. No, he seized root some other way."

The hacker was an animated speaker, Anderson noticed. His eyes were glowing with that absorbed animation he"d seen in so many young geeks - even the ones who were sitting in court, more or less convicting themselves as they excitedly described their exploits to the judge and jury.

"Then how do you know he seized root?" Linda Sanchez asked.

"I hacked together this kludge." He handed Anderson a floppy disk.

"What"s it do?" Patricia Nolan asked, her professional curiosity piqued, as was Anderson"s.

"It"s called Detective. It looks for things that aren"t inside a computer." He explained for the benefit of the non-CCU cops. "When your computer runs, the operating system -like Windows - stores parts of the programs it needs all over your hard drive. There"re patterns to where and when it stores those files." Indicating the disk, he said, "That showed me that a lot of those bits of programs"d been moved to places on the hard drive that make sense only if somebody was going through her computer from a remote location."

Shelton shook his head in confusion.

But Frank Bishop said, "You mean, it"s like you know a burglar was inside your house because he moved furniture and didn"t put the pieces back. Even though he was gone when you got home."

Gillette nodded. "Exactly."

Andy Anderson - as much a wizard as Gillette in some areas - hefted the thin disk in his hand. He couldn"t help feeling impressed. When he was considering asking Gillette to help them, the cop had looked through some of Gillette"s script, which the prosecutor had submitted as evidence in the case against him. After examining the brilliant lines of source code Anderson had two thoughts. The first was that if anyone could figure out how the perp had gotten into Lara Gibson"s computer it was Wyatt Gillette.

The second was pure, painful envy of the young man"s skills. Throughout the world there were tens of thousands of code crunchers - people who happily churn out tight, efficient software for mundane tasks - and there were just as many script bunnies, the term for kids who write wildly creative but clumsy and largely useless programs just for the fun of it. But only a few programmers have both the vision to conceive of script that"s "elegant," the highest form of praise for software, and the skill to write it. Wyatt Gillette was just such a codeslinger.

Once again Anderson noticed Frank Bishop looking around the room absently, his mind elsewhere. He wondered if he should call headquarters and see about getting a new detective on board. Let Bishop go chase his MARINKILL bank robbers - if that"s what was so G.o.dd.a.m.n important to him - and we"ll replace him with somebody who at least could pay attention.

The CCU cop said to Gillette, "So the bottom line is he got into her system thanks to some new, unknown program or virus."

"Basically, that"s it."

"Could you find out anything else about him?" Mott asked.

"Only what you already know - that he"s been trained on Unix."

Unix is a computer operating system, just like MS-DOS or Windows, though it controls larger, more powerful machines than personal computers.

"Wait," Anderson interrupted. "What do you mean, what we already know?"

"That mistake he made."

"What mistake?"

Gillette frowned. "When the killer was inside her system he keyed some commands to get into her files. But they were Unix commands - he must"ve entered them by mistake before he remembered her machine was running Windows. You must"ve seen them in there."

Anderson looked questioningly at Stephen Miller, who"d apparently been the one a.n.a.lyzing the victim"s computer in the first place. Miller said uneasily, "I noticed a couple lines of Unix, yeah. But I just a.s.sumed she"d typed them."

"She"s a civilian," Gillette said, using the hacker term for a casual computer user. "I doubt she"d even heard of Unix, let alone known the commands." In Windows and Apple operating systems people control their machines by simply clicking on pictures or typing common English words for commands; Unix requires users to learn hundreds of complicated codes.

"I didn"t think, sorry," the bearish cop said defensively. He seemed put out at this criticism over what he must have thought was a small point.

So Stephen Miller had made yet another mistake, Anderson reflected. This had been an ongoing problem ever since Miller had joined CCU recently. In the 1970s Miller had headed a promising company that made computers and developed software. But his products were always one step behind IBM"s, Digital Equipment"s and Microsoft"s and he eventually went bankrupt. Miller complained that he"d often antic.i.p.ated the NBT (the "Next Big Thing" - the Silicon Valley phrase for an innovation that would revolutionize the industry) but the "big boys" were continually sabotaging him.

After his company went under he"d gotten divorced and left the Machine World for a few years, then surfaced as a freelance programmer. Miller drifted into computer security and finally applied to the state police. He wouldn"t"ve been Anderson"s first choice for a computer cop but, then again, CCU had very few qualified applicants to choose from (why earn $60,000 a year working a job where there"s a chance you might get shot, when you can make ten times that at one of Silicon Valley"s corporate legends?).

Besides, Miller - who"d never remarried and didn"t seem to have much of a personal life - put in the longest hours in the department and could be found in the dinosaur pen long after everyone else had left. He also took work "home," that is, to some of the local university computer departments, where friends would let him run CCU projects on state-of-the-art supercomputers for free.

"What"s that mean for us?" Shelton asked. "That he knows this Unix stuff."

Anderson said, "It"s bad for us. That"s what it means. Hackers who use Windows or Apple systems are usually small-time. Serious hackers work in Unix or Digital Equipment"s operating system, VMS."

Gillette concurred. He added, "Unix is also the operating system of the Internet. Anybody who"s going to crack into the big servers and routers on the Net has to know Unix."

Bishop"s phone rang and he took the call. Then he looked around and sat down at a nearby workstation to jot notes. He sat upright; no hacker"s slouch here, Anderson observed. When he disconnected the call Bishop said, "Got some leads. One of our troopers heard from some CIs."

© 2024 www.topnovel.cc