Explore 1.5M+ audiobooks & ebooks free for days

From $11.99/month after trial. Cancel anytime.

Netspionage
Netspionage
Netspionage
Ebook117 pages1 hour

Netspionage

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The NSA's core computer network is hacked. The only evidence of the penetration is a folder created on the desktop of the head of the Computer Crimes Division of the NSA, Vincent Pardow. The folder contains only one text document which reads, "I see you. Do you see me? Love the Magician."
The command center is buzzing with activity as dozens of the Federal Government's finest pour over the systems. Soon they discover that not only can the Magician come and go as he pleases breaching any and all the global networks he has also inserted an unstoppable computer virus, aptly named Jubilee, which has polymorphed and propagated to all the systems worldwide. It now threatens all the global financial markets. They have one week before the virus will trigger the deletion of all debit
accounts in all the financial systems in the world. He intends to eliminate all debt records for every person in the world.
Every Government Agency with more than two initials becomes involved as they search the dark side of the net for any trace of the Magician. Soon the word spreads as all of the high tech corporations realize they have become irrelevant. Evidence of a revolutionary new technology is revealed which renders technology as we understand it obsolete; a technology which powerful high-tech corporations and governments must have at any cost. No longer are the corporate and government networks secured. Security is an illusion. Only one person has the key, a mysterious super hacker known only as The Magician.
Meanwhile elite hackers the world over are mysteriously disappearing. Corporations and governments are hunting them down and paying local authorities to imprison them since they cannot prosecute them under existing laws. They also hope to use them to get to the Magician first.
Agent Waylon Gandy is the point man for the FBI's Task Force. A good man who really has no idea what is going on until he is contacted by a computer generated animation of a blue Bull Terrier dog. The dog is lounging in a recliner next to a pool. He's wearing paisley shorts, flip-flops, and a t-shirt with the Microsoft Blue Screen of Death. He is also wearing sunglasses. The dog's name is Snagdasher; a sarcastic, animated, artificial intelligence.
He demands $100,000,000 dollars to help them catch the Magician but later changes his demand $110,000,000 dollars after Agent Gandy pisses him off. From this point on Snagdasher is in and out of every computer network in the world, making deals and generally messing in a big way with all the rich and powerful.
Bill Babcock is a computer instructor for the New Day Computer Training Centers during the day but during his off hours he is a very talented system cracker who goes by the handle, Godonthewire. He is suddenly drawn into the fray as the Magician manipulates the world of fools to give everyone a new start and to straighten out a few kinks in world of governmental affairs.
Law enforcement organizations all over the world join forces to capture the Magician and stop the deadly Jubilee computer virus from activating. Using Snagdasher as a front man, the Magician is determined to bring the establishment to its knees.

LanguageEnglish
PublisherEdward Thames
Release dateJun 4, 2013
ISBN9781301278404
Netspionage
Author

Edward Thames

Edward was born in Plaquemine Parish, Louisiana. He grew up moving from place to place never living in the same location more than two years. He attended various Universities majoring in Pre-Med, creative writing, film making and foreign languages. After winning several writing awards he discovered Information Technology and achieved thirty-four separate technical certifications. He has worked as a contract technical trainer for the last ten years. He has written seven screenplays and five novels. He presently lives in Spring, Texas.

Read more from Edward Thames

Related to Netspionage

Related ebooks

Science Fiction For You

View More

Reviews for Netspionage

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Netspionage - Edward Thames

    NETSPIONAGE

    by

    Edward Thames

    SMASHWORDS EDITION

    * * * * *

    PUBLISHED BY:

    Edward Thames on Smashwords

    Netspionage

    Copyright © 2006 by Edward Thames

    All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording, or otherwise) without the prior written permission of both the copyright owner and the above publisher of this book.

    This is a work of fiction. Names, characters, places, brands, media, and incidents are either the product of the author's imagination or are used fictitiously. The author acknowledges the trademarked status and trademark owners of various products referenced in this work of fiction, which have been used without permission. The publication/use of these trademarks is not authorized, associated with, or sponsored by the trademark owners.

    Smashwords Edition License Notes

    This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each person you share it with. If you're reading this book and did not purchase it, or it was not purchased for your use only, then you should return to Smashwords.com and purchase your own copy. Thank you for respecting the author's work.

    * * * * *

    DEDICATION

    To my A girls. To Saint A, who has been with me from the beginning and Ava, a child of my child who I will probably never see or know but who I love anyway.

    * * * * *

    NETSPIONAGE

    * * * * *

    CHAPTER 1

    It is night although one would never know it because the room is always dark and quiet. Only the blinking of computer power lights and the indirect reflection of a solitary monitor pierce the darkness. The steady hum of the machines is fragmented by the rhythmic tapping of typing on a keyboard.

    This is a computer control room but not the kind you see in commercials and movies. There is a large mainframe with several upright computer racks on either side. Hundreds of fiber cables fill multiple patch panels.

    The mainframe is running a completely customized version of BSD, the shadowy giant among free operating systems. The Big Beastie was the CnC for 875,000 bots across the world. The racks are loaded with routers, switches and numerous proxy servers.

    There is only one person in the room. He is hunched over his keyboard as he types with four fingers. His fingers fly across the keyboard. The monitor screen fills with code as the instructions flow like a rushing river from his mind into the system. He hits enter and the data pushes out through the wires and backbone cables into the vast dark sea of data known as the internet. It races across the world at the speed of light and exits the cyber world in another computer command center; The NSA Central Command Center.

    A computer screen in one of the empty cubicles fills with lines of code as instructions are fed into the system and the systems are processing and executing the commands.

    There are several geeks lounging about. The geek in charge is Brian Kokopeli. He has buzz-cut black hair and is wearing rose colored, granny glasses. He is playing World of Warcraft online. He's really into it when he notices an alert flashing on a monitor nearby. He kicks away from his game and rolls over to an empty cubical in his chair. He clicks on the flashing alert. The word INTRUDER flashes on the screen.

    Kokopeli yells, WE HAVE AN INTRUDER! He grabs the phone, hits autodial and intercom while frantically typing with one hand. The other Geeks are now doing the same.

    I've got you! I'll rip your heart out! Mutters Kokopeli then yells, PUT HIM ON THE BIG BOARD!"

    A huge screen with a map of the world and all the data paths flashes on. The red line highlights the back path of the intruder as he skips around the world through one proxy server after the other; Washington to London, to Amsterdam, to Beijing, to Moscow, to Beirut, to Warsaw, to Denver, to Houston, to New York, back to Washington. Moments later the IP address of the intruder appears.

    Got you asshole! Said Kokopeli. Then he paused and said, What the hell? He types in ipconfig followed by the IP address and the screen pops up. The IP address of the intruder is the very machine Kokopeli is working on.

    *****

    The head of the Computer Crimes Division of the NSA, Vincent Pardow answers the phone.

    Yes.

    Sir, this Kokopeli. We have an intruder.

    Did you get him? Asked Pardow tiredly.

    Sorta. Replied Kokopeli hesitantly. He really didn’t want to have this conversation.

    Clarify? Demanded Pardow whose whole attention was now engaged. He hated vagueness in general because it was unnecessary and usually indicated something was wrong. He especially hated vagueness regarding his network.

    We tracked him through the networks and it appears as if .... Sir, I think you need to see this for yourself.

    Cut the crap! Ordered Pardow.

    Sir, it appears as if he used one of our terminals.

    What? Shut it down! Now! I'm on my way!

    Yes Sir!

    *****

    Night comes early in Eastern Europe as winter draws near. The narrow streets only serve to accelerate the effect. The street lights had just come on when Illia, a slim blond-haired teenager walks out of a corner grocery store. He’s carrying a bag of necessities; a 12 pack of Monster, a dozen Hot Pockets, two bags of chips, and eight assorted candy bars as he heads home. He has been working at a local internet café for the last eight hours and is eager to get home and do his thing. He reaches inside the bag and rummages around and pulls out a can of Monster. He stops and adjusts the bag so he can open the energy drink.

    Car lights appear behind him at the far end of the street. The car moves slowly down the street toward Illia until it is almost beside him. Illia is preoccupied with opening his soda and hanging onto the bag. He finally manages to complete his balancing act and opens his soda. As he takes a swallow he notices the car. A rear tinted window quietly slides down. A taser appears.

    Illia drops his groceries and runs as the taser is fired. He is hit between the shoulder blades and stumbles forward as the electric shock incapacitates him. He lies on the ground jerking spasmodically.

    The rear door of the car opens and a large, heavy-set man emerges. He picks Illia up and carries him to the rear of the car.

    The trunk of the car opens and the large man tosses Illia into the trunk and closes the lid. He looks around for any witnesses and then climbs back into the car. The car disappears into the night.

    CHAPTER 2

    It is dawn as a Falcon 900B corporate jet lands in a small Eastern European airfield. The Falcon taxies to a stop as a black Mercedes limousine pulls up near the plane. The

    Enjoying the preview?
    Page 1 of 1