|Subject: Whispered Identities - Chapter 160
Next Thread |
Previous Thread |
Next Message |
Date Posted: Saturday, November 13, 07:09:06pm
In reply to:
's message, "Whispered Identities - Chapter 151 & forward" on Wednesday, October 20, 08:23:26pm
Alberto raced from the computer center, leaving Michael seated at the console. He smiled to himself and tapped his chin.
Hope Dalton hasn’t spent the money on this potential sale....he was correct....he knows nothing of computer technology.
Michael pulled the chair closer to the keyboard, inserted his mini-disc into the hard drive and accessed the bank accounts he had created the previous day. The funds he had transferred from the Dark Angel group now sat in both the accounts of the Banco de Portugal and also one of the accounts in the Cayman Islands. The account Michael had created in Barbados held only a small deposit, awaiting the arrival of further ‘leveraged’ funds from some other terrorist group.
As Michael closed the files and logged off the bank accounts he had created, he sat back and eyed the impressive array of computer technology before him.
This set-up is truly amazing....I could create anything on this system. The coded satellite uplink alone will allow access into any government or corporation in the world. I could penetrate MI-6....the CIA....whoever, by just playing with a variety of hexadecimal codes....less sophisticated that a trojan worm.....but more....ahhh...fun.
Michael began rapidly typing codes onto the keyboard; five of the eight screens flashed different byte configurations and sequences of binary numbers. Michael sniggered to himself.
Just one little attempt at penetrating the CIA mainframe....just to test the system of course.
Bursts of computers codes scrolled across five screens. Suddenly an audio prompt erupted from the speakers.
“Would you like to listen to a selection from the music library while you work sir?”
Michael smiled. The creator of the computer system had been a music lover also.
“Yes....play some Vivaldi guitar concertos first, then follow with Boccherini string quintets....you choose.”
Michael smiled. And now to visit the CIA.
As the codes continued scrolling across the screens, Michael glanced up at the bank of wall speakers. The classical music boomed out in full volume.
“Turn the volume down by half, please,” Michael directed the computer.
As the volume lowered, Michael watched as the codes came to a halt on the screens. He began tapping away on the keyboard. It was common to have a server, especially the CIA’s under the tightest security; he worked feverishly on deciphering the security codes.
There must be a pattern....I will find you....I’ve been into your system before.
The challenge of entering into the CIA mainframe had become nothing more than a game for Michael. He did not believe in breaking into computer systems by methods as crude as brute force attacks or algorithm reversals. He began creating his own program - different from the trojan worm he had used to attempt access into MI-6. This program would insert itself at the point where the external internet traffic entered the CIA’s private network, piggybacking onto the header packets entering the gate machine and circumventing the password routines completely. The screens flashed a torrent of codes, scrolling by. Michael rapidly typed out chunks of hexadecimal computer code. All five screens showed different coding until suddenly, the screens flashed red and the CIA symbol appeared on the screen and a prompt menu asking what department the entrant wished to access. Once again, Michael had penetrated the CIA firewalls.
He sat back, stretching his arms behind his head; his smile turned into a grin. Hummmm....this is almost like wonderful sex.....almost.
“And....that entry into the CIA system was almost too easy,” he spoke to himself in a whisper.
Michael thoughts were interrupted by the sound of the metal door slamming; he quickly exited from the program displays; the screens went blank.
“Mr. Samuelle....I thought you would want to know....I’ve contacted Mr. Dalton and informed him of the softwear difficulties.....he is on his way now....could you possible wait for him here?”
“Certainly Alberto....in the meantime, I’ll begin work on the encryption codes.”
“Can I get you anything sir....food....drink?”
“Water please...thank you.”
Alberto disappeared through the metal door and Michael turned to boot up the softwear.
The encryption coding and firewalls are very sophisticated....whoever created this program, knew of it’s potential.
The door swung open and Dalton strode up to Michael. “What the hell’s the problem with the softwear! I was informed it was ready for presentation!”
“You were misinformed....the creators have encapsulated the program behind sophisticated encryption codes and firewalls. It will take me a couple of days to break them.”
“But my buyer is on his way here!”
“Sorry Richard...but that’s what you have....I suggest you delay him somehow....can you not entertain him....distract him with, well you know.”
“Michel! You surprise me....but you are correct....I will distract him for a couple of days with food, drink and pleasures of the flesh. God, I’d kill the seller of the softwear...if he wasn’t already dead! But Michel....I implore you....please, help me with this! Name your price!”
“As I told you before....consider it payment for hiding Nikita and me.”
“That seems like too little a payment....anyway, perform the task and if you wish to reconsider your offer....consider it done. Now...what can I get for you? Are you going to start work now? I must contact the buyer and set up his.....ahhhh, distractions....you’ll excuse me please.”
Dalton slapped Michael on the back and rushed from the computer room. Michael shook his head and returned to peer at the computer screen as the softwear firewall continued to issue a blocking message.
Next Thread |
Previous Thread |
Next Message |