access. You will not be able to make any system changes.”

“Fair enough. That’s what I needed.” In response to the tacit vote of confidence the sharing of that access code represented, she said, “And thank you.”

“You’re welcome. Call me if you need any further assistance. It is imperative that Monihan be kept safe.”

Diana hung up and all but ran into the living room to sit down at the computer. She pulled up the appropriate access screen and entered Delphi’s number into the correct field. Her screen went blank briefly, and then page after page of detailed, complex computer code began scrolling down her screen. Crud. This was going to be like looking for a needle in a haystack.

Time to think like a hacker. If she were going to tamper with a system of this size, how would she do it? She’d head for a low-level subroutine connected to the analysis portions of the program and she’d bury the smallest possible command she could in it that would foul it up.

She made her way to the analysis subroutines and frantically waded through the dense programming language. She couldn’t help but be impressed by the elegance of the program. It was the single most intelligent piece of computer work she’d ever seen. She’d give her right arm to meet whoever’d designed this database.

And then she saw it. A bland little command sequence that didn’t have quite the same feel as the rest of the code around it. She read the three-line instruction again. Her internal warning antennae wiggled wildly. She followed the instruction set to where it led elsewhere in the database and found another innocuous bit of code that didn’t feel right. It led to another. And then to another. All these little pieces of code were linked together, a huge set of tiny monkey wrenches scattered throughout the cogs and gears of the mighty machine that was Oracle.

Over the course of the next couple minutes, she traced the spiderweb of commands and found them inserted all over the program. She didn’t begin to understand precisely how these commands were screwing up the Oracle database, but there was no doubt the system was completely corrupted.

Something about this code tickled the edges of her consciousness. And then it hit her. She recognized the programming style of the commands. The spare, coldly logical technique of the programming was identical to the instructions the intruder in her house had put onto this very computer last night!

She opened the file of code she’d copied out of her computer’s operating system and compared it to the lines of commands in the Oracle database. It was as clear as day. The same person had done both bits of hacking.

On a hunch, she called up a screen view of the code where the signature of the programmer was entered beside each line of code they’d written. She stared in shock. Her own name stared back at her.

The hacker this morning. Had he entered this code from her home computer? It made sense.

Somebody knew she was an Oracle agent. Why else would both her computer, and now the Oracle database be attacked by the same person on the same day? If her identity was compromised, how many other Oracle agents were exposed and in danger? And if the very heart of the Oracle agency had suffered an attack like this, was the entire agency at risk?

As alarming as that was, she had more important fish to fry at the moment. Somebody who could afford to hire a frighteningly smart hacker was trying to stop her or even kill her. From doing what? It could only be one thing. The only project she’d been working on for weeks now was the link between Q-group and Gabe Monihan. Whoever’d hacked into her computer and into Oracle was out to kill Gabe. And they were very close on not only her heels, but his.

The bad feeling in her gut exploded into panic, roiling and bubbling nearly out of control. She typed a hasty note to Delphi outlining her discovery and finished it with a warning that Delphi himself or herself could be in danger.

Now what?

She sat back and stared at her computer for a couple seconds. C’mon brain. Come up with something smart! The next step was to find out who was behind the Q-group and Richard Dunst.

For lack of anywhere else to begin, she typed into her computer the familiar name of the Q-group’s primary chat room. It should be deserted, since most or all of its members would either be arrested by now or running for their lives.

The screen blinked. Seventeen members were present in the chat room.

Seventeen?

She signed in quickly, using her usual fake e-mail address and Arabic ID for this chat group. She scanned through the discussion, a disjointed conversation about European soccer scores. Translating the coded phrases in her head based on what she’d figured out the last couple months, she stared in shock.

Someone she’d never seen in this room before was giving this new group of people a crisp set of instructions.

On how to kill Gabe Monihan.

6:00 P.M.

D iana read frantically through the posts, looking for key phrases that meant something entirely different than their surface meaning. There. A soccer score from the Bristol Capitols. That was a reference to Washington, D.C. A mention of a soccer game date a couple of weeks from now. She reversed the date and gaped-01-20. January 20. This person was ordering another hit on Gabe today? Her blood pressure lurched upward significantly.

She flinched at a request for who was going to be at the upcoming game so they could get a block of tickets together. Four, no six people responded to that bit. A six-man team was volunteering to kill Gabe? Her blood pressure pounded up another few points.

The chat host, a total stranger to this room called Disco-Duck, replied that he thought he could only get tickets for one or two guys. A bunch of people clamored to be the ones chosen to go. What kind of handle was DiscoDuck, anyway? She’d lay ten-to-one odds no teenager today had ever heard of the song from the 1970s by that name. Not a kid, then. Someone older. Probably was a teen or young adult in the seventies. That would put this guy in his fifties at the youngest.

Had the mastermind behind the Q-group and Richard Dunst finally shown himself?

Quickly, she opened another chat screen and prayed some of her hacker buddies were online. They were.

She typed in, Hey guys. I need you to do another trace like you did this morning. This one’s possibly more important than the last one. Anyone up for it?

A reply from a top-notch hacker who went by the handle, Fantasy Man, was forthcoming almost instantly. How could it be more important than the last batch? Those idiots were out to kill the new president. What’s more important than that?

She typed back tersely, Finding the idiots’ boss.

Fantasy Man retorted, Who are you, anyway? Why were you tracking down criminals for the FBI? Are you some sort of undercover agent or something?

Crud. She’d worked for years establishing a cover with these guys, worming her way into the good graces of the best and most dangerous hackers on the East Coast. If she confessed to being Army Intelligence now she’d spook them off for sure. But they were also highly intelligent people. Would they smell a rat if she gave them anything less than the complete truth? Ultimately, if they turned their hacking skills on her, they’d find out everything there was to know about her, anyway. Heck, for all she knew, they already had. She sighed. She had no choice.

She typed carefully, I’m not FBI. I’m not a cop, either. I’m a conspiracy theorist for the military.

The cursor blinked steadily, winking at her for long seconds as she waited for a reply. C’mon, guys. Help her out here. She couldn’t do this alone.

Finally the reply popped up. You’re sure you’re not a cop?

Positive, she typed back immediately.

Was that arrest scene real this morning, or did you stage it to make it look like you’re on our side?

She typed in an abbreviation to indicate laughing. I’m better than that. If I’d wanted to stage a scenario to convince you I’m legit, I’d have done a whole lot better than those pathetic losers.

Who were those guys who hauled you off?

She didn’t have time to get into this. DiscoDuck could go offline at any moment. Army Intelligence. Long story.

Вы читаете Target
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату