give Sam access, through the e-mail connection, to the heart of the U.S. government.
Through the serial connection, he copied the file into the Operating System folder of the e-mail server and closed out of the UPS and the UPS company network.
Now there was nothing more he could do. It was up to the staff at the White House to open the door and let him in.
7 | NEOH@CK
He checked his watch a couple of times, not worried but a little nervous. If Cross Fire was detected, then he was sunk. If it simply wasn’t activated, then he would miss the convention.
To pass the time, he alt-tabbed back to see Ursula.
The next set of neuro-exercises involved loading a program, such as Photoshop, while thinking about that program. Very soon he could open and close programs, activate commands and functions, and even move things around on a page, all without touching the keyboard. Next, Ursula asked him to visualize each key on the keyboard in turn, while pressing it. That was easy enough.
A short while later, he was in the middle of an exercise that involved him thinking of a word, then seeing it appear on the screen, when a pop-up message alerted him that Cross Fire was now active.
“See you soon, Ursula,” he whispered, and minimized her again.
• • •
Someone had activated Cross Fire, opening up a tiny pathway onto one of the e-mail servers on the White House network.
He slipped Ghillie onto the machine, and it lay there for a while, unobserved but observing.
The amount of data traffic was amazing but not unexpected for the nerve center of a world superpower.
Sam did not move at all, just watched for intrusion detectors or security spiders. The spiders were everywhere, constantly crawling through the White House network. They passed over him harmlessly, though, without seeing.
He spun a small data-web on one branch of the network, blocking packets from getting through. Not many, and they would get through on the retry, but enough for him to gauge how the network reacted.
The White House network was monitored by special software called Therminator. It presented the network as a thermal image, with any problems showing up as hot spots. But there had to be a built-in tolerance level, Sam figured; otherwise, every slight networking issue would set off alarm bells.
No alarms went off. No searchlights swept the area. A small packet loss was within the tolerance of the network, it seemed, as it should be.
He extended a probe, a clever device that emulated broken TCP/IP packets and simulated data loss, which would be ignored by Therminator. He scanned the disk structure of the big server.
There were over thirty disk drives attached to the machine. He scrolled through the list of drives, wondering where to start.
One caught his eye. A tiny drive, just half a gigabyte. A fraction of the size of the others, which was why he noticed it. It was labeled “NHC.”
It took a moment before that clicked.
NHC! Neoh@ck Con! It had to be, he thought as he accessed the contents of the drive itself.
The hackers had set up their own partition on one of the White House central server’s disks and were using that for their meetings. On the drive was just a single file. An executable. A program. That would be the online- forum software, he guessed.
His watch said it was 8:15. Too early. Not that he minded being early, but there might be risks in logging on too soon. The longer he was logged in, the greater the chance of being caught.
He alt-tabbed to bring the Neuro-Sensor software to the front again, but even as he did so, he realized something strange. For the last twenty minutes, he had been crawling around inside the computer network of the White House. He had activated programs, spun data-webs, even written short bursts of code.
But he hadn’t touched the mouse or the keyboard at all.
Ursula had a whole bunch of other exercises to improve his skills, but he was getting impatient, so he bypassed them and loaded the next module.
“Neuro-visualization,” Ursula told him smoothly. “The neuro-sensors in your headset are also transmitters. They not only pick up signals from your brain, but they also can feed sounds and images into your brain by stimulating brain waves in your visual and auditory cortices.”
“Cool,” Sam said, nervously flicking a glance at his watch. It was 8:16. Only a minute had passed.
“Close your eyes,” Ursula said. “I am going to send an image to you now. Nothing fancy, just a red triangle. Relax and allow your brain to receive and interpret the image. If you open your eyes, the feed will automatically shut off. This is a safety mechanism to ensure you do not overload the visual receptors in your brain with information from two different sources.”
Sam closed his eyes.
“Visual feed starting now,” Ursula said.
A blurry red dot appeared behind Sam’s eyes.
“It had better get better than this,” he muttered.
“You should now be seeing a fuzzy red shape,” Ursula said. “Focus on it; try and draw it toward you.”
Sam focused, imagining himself speeding toward the red nothingness. It began to grow in size.
After a moment, it filled almost half of his vision, and although still out of focus, it was clearly a large red triangle.
“Concentrate on the triangle; try and bring it sharply into focus. As it changes, I want you to press the Plus and Minus keys on your keyboard. If it gets clearer, press Plus. If it becomes less distinct, then press Minus. When it is perfectly sharp, press the space bar.”
Sam waited until the edges were sharp and clear, then pressed the space bar.
“Okay,” she said. “Now for color. I am going to show you a series of color images. When you see the one that has a red dot at the top, a blue dot at the left, and a green dot on the right, then press the space bar.”
It was the first image.
“Good. Now I am going to send you a color image. If you can identify the image, then type the name on the screen,” she said, and added, “with your mind, of course.”
Sam opened his eyes for a moment to check his watch (8:53 p.m.), and when he shut them, a huge, clear image of the famous da Vinci painting
The painting disappeared, replaced by his normal Windows background and icons. He opened a few programs and closed them again just to prove he could do it. He opened a word processor and typed a few sentences with his mind. He ran an MP3 file and was astounded to hear the music inside his head. He tried the same with a video and was rewarded by the movie starting to play in a small window.
He closed it and glanced at the clock in the lower right corner of his screen (did you call it a screen when it was inside your head?) and noticed that it was 8:59 p.m.
“Dinnertime,” he said out loud.
Without touching the mouse or the keyboard or looking at the LCD screen of his laptop, he ventured back into the electronic corridors of the White House.
He checked the clock in the bottom right corner again. 9:00 p.m.
Open, he thought, staring at the file.