enough. He had a six-figure salary, could dress just about however he liked, and turn up pretty much whenever he wanted, as long as the network and software were stable. And there were other bonuses as well.

McLeod pressed the code to open his office door, dumped his crash helmet on the table in the corner and peeled off his leather jacket. It was already getting hot outside, but he wore the leather for protection in case he crashed the hog, not for warmth. Under it he wore a faded CalTech T-shirt – unlike most people who affected such garments, he had actually been there – and tight-fitting black jeans that emphasized his height and lean build. They were cinched around his waist with a leather belt which was fastened with a solid silver buckle depicting a fist giving the finger. It was, in many ways, an accurate indication of his outlook on life.

Then he switched on his monitor. Like most commercial operations that relied on computers, which meant almost everybody these days, the NoJoGen system ran 24/7. Only the flat-panel monitors were shut down when the offices were closed.

McLeod sat down in his swivel chair, ran his fingers through his untidy mop of dark curly hair, opened up his master diagnostic program and started it running. He’d designed the software suite himself. It was a management program that executed a series of commercial diagnostic routines one after the other and displayed the results at the end, and it usually took no more than about ten minutes to run to completion. That gave him enough time to plug in his coffee machine and load up the first brew of the day – in McLeod’s opinion, a supply of decent coffee was almost as important to him as good diagnostic software.

Only when the system analysis results popped up on the screen – all showing green – and his first cup of java was sitting on the desk beside him, did he take a look at the search routines his machine had been running overnight. These weren’t normal internet searches. The wide-area search routines McLeod had put in place accessed private databases as well, many of them run by government agencies and commercial organizations, databases whose managers fondly believed were secure against hackers.

But Jesse McLeod wasn’t just any old hacker. He’d narrowly avoided a prison term at the age of fifteen when he’d wormed his way past three separate firewalls and numerous intruder detection systems to get inside a network at the Pentagon. He’d gained administrator access there, given himself a username and password, and used that network as a gateway that had allowed him to jump straight into another network based in Pennsylvania Avenue and operated by the White House. The reason he wasn’t prosecuted was probably largely due to embarrassment that a kid of his age had managed to outwit the best security consultants and computer experts in the American government and military.

He had been ordered to show these experts exactly how he’d managed to effect his intrusion, however, so that those loopholes could be closed, and he’d also been instructed to test all the Pentagon’s and the White House’s access points – under close supervision – to see if he could defeat those as well. He had, twice, which had resulted in four civilian administrators and three senior military officers losing their jobs within the next three weeks.

In the ten years since then, the FBI had watched Jesse McLeod very closely, but the threat of prison had frightened him, and after that episode he had become what was known as a ‘white hat hacker’. That meant he still trawled the internet, and still probed the sites he found, but if he worked his way into a system he announced the fact to the network administrator and suggested ways of closing the loopholes he’d exploited. He never copied data or did any damage inside the networks he cracked, and a handful of times he’d even been paid ‘consultancy fees’ by the target companies for his efforts.

At least, that was what the FBI believed. But like a lot of things the FBI believed, they were wrong. Jesse McLeod was constitutionally incapable of obeying the law, and that was one of the reasons why NoJoGen paid him such a large salary. The company needed access to the kind of data that was unavailable in the public domain – a less mealy-mouthed description of this activity would be industrial espionage – and relied on him to hack his way into whatever system held it, and then retrieve it.

But these days he was a lot more careful, and a lot more secretive. He had set up dozens of fake identities in China and Pakistan and the new states that had emerged following the break-up of the Soviet Union, places where he knew that American law enforcement would find it difficult, or even impossible, to track him, and used those as the apparent origin – the technical term was a ‘zombie server’ – for his probes. He’d even set up an account that purported to be located in North Korea – a country that offered no internet access at all to its population – just to see what the Fibbies would do about it. They hadn’t noticed.

And so, every night, while he slept peacefully in his penthouse, the sound of waves breaking on the shore below him, his untraceable electronic proxies trawled the web, probing systems and networks and looking for any references to whatever subjects the founder and majority shareholder of NoJoGen, John Johnson Donovan – known simply as ‘JJ’ – had asked him to locate.

His proxies never left any evidence of their intrusion, and merely copied whatever data they could find that related to the search string McLeod had loaded into their programs. When they’d completed their mission, each proxy automatically accessed one of several web-based email accounts and pasted the results into email messages. But these messages would never be sent, because all emails leave an electronic trail across the internet. Instead, all the messages were left on the servers as drafts, and McLeod was then able to access each email account, copy the contents of the draft messages and afterwards delete them, which left no trace at all.

The whole process was automated, and McLeod would only get personally involved if the hacking software he’d designed failed to breach the defences of a particular network. Then he’d flex his hacking muscles and spend a pleasant few hours working out how to get inside that system. But normally, he just scanned the results when they were displayed on his monitor, weeded out the obvious rubbish, and sent the rest up to Donovan’s workstation on the top floor of the building.

Because it was a Monday and the offices had been closed since Saturday morning, there were dozens of results to analyse. As usual, most of them were of neither interest nor relevance, but when McLeod looked at the nineteenth search result he sat back in his seat and whistled.

‘I’ll be damned,’ he muttered to himself.

He checked the source of the data, but that turned out to be no surprise at all. He’d seen immediately that the information had been posted on the front page of a small local newspaper, and the version his proxy had located had been in the on-line version of the journal, hosted on an entirely unprotected server.

McLeod read the article in its entirety, and one short paragraph caught and then held his attention. He sat in thought for a minute or so, then clicked his mouse button a couple of times to bring up an internet search engine. He entered a simple search term and looked at the results, which gave him the name of the website he was interested in. He opened up one of the hacking programs he’d written himself and started probing the distant server, looking for a way inside. There was something there he definitely needed to get a look at.

In less than fifteen minutes he was looking at a list of police case files, listed by number. Then he changed the parameters and generated an alphabetical list of the names of the claimants or victims. Most of the files were small, the incidents fairly pedestrian – muggings, car thefts, burglaries, and so on. And then he saw something big. There were numerous statements, reports by the attending officers, forensic analyses and the like, and a whole sheaf of crime-scene photographs, all neatly labelled and catalogued.

He flicked through the forensic stuff until he found the one that related to the paragraph in the newspaper story, and made a copy of it on his hard drive. Then he glanced through everything else he’d found, and despatched the original newspaper report up to Donovan’s computer with the rest of the stuff. When his boss got in, he guessed he’d get a call.

But he had a completely different recipient in mind for the forensic report he’d copied from the police database.

4

Two hours later, Angela had turned off the M25, where the traffic was actually moving, for a change, and was

Вы читаете The Messiah Secret
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату