The Blue Nowhere-SA (2 page)

Read The Blue Nowhere-SA Online

Authors: Jeffery Deaver

Tags: #Computer hackers, #Crime & mystery, #Serial murders, #Action & Adventure, #Privacy; Encroachment by computer systems, #Crime investigations, #General, #Murder victims, #suspense, #Adventure, #Technological, #California, #Crime & Thriller, #Fiction, #thriller

BOOK: The Blue Nowhere-SA
10.61Mb size Format: txt, pdf, ePub

"But" Sobbing now, shoulders slumped in hopelessness. "Who are you? You don't even know me"

"Not true, Lara," he whispered, studying her anguish the way an imperious chess master examines his defeated opponent's face. "I know everything about you. Everything in the world."

CHAPTER TWO

Slowly, slowly Don't damage them, don't break them.

One by one the tiny screws eased from the black plastic housing of the small radio and fell into the young man's long, exceedingly muscular fingers. Once, he nearly stripped the minuscule threads of one screw and had to stop, sit back in his chair and gaze out his small window at the overcast sky blanketing Santa Clara County until he'd relaxed. The time was eight A.M. and he'd been at this arduous task for over two hours.

Finally all twelve screws securing the radio housing were removed and placed on the sticky side of a yellow Post-it. Wyatt Gillette removed the chassis of the Samsung and studied it. His curiosity, as always, plunged forward like a racehorse. He wondered why the designers had allowed this amount of space between the boards, why the tuner used string of this particular gauge, what the proportion of metals in the solder was.

Maybe this was the optimal design, but maybe not.

Maybe the engineers had been lazy or distracted.

Was there a better way to build the radio?

He continued dismantling it, unscrewing the circuit boards themselves.
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Slowly, slowly

At twenty-nine Wyatt Gillette had the hollow face of a man who was six feet, one inch tall and weighed 154 pounds, a man about whom people were always thinking, Somebody should fatten him up. His hair was dark, nearly black, and hadn't been recently trimmed or washed. On his right arm was a clumsy tattoo of a seagull flying over a palm tree. Faded blue jeans and a gray work shirt hung loosely on him. He shivered in the chill spring air. A tremor made his fingers jerk and he stripped the slot in the head of one tiny screw. He sighed in frustration. As talented mechanically as Gillette was, without the proper equipment you can only do so much and he was now using a screwdriver he'd made from a paper clip. He had no tools other than it and his fingernails. Even a razor blade would have been more efficient but that was something not to be found here, in Gillette's temporary home, the medium-security Federal Men's Correctional Facility in San Jose, California.

Slowly, slowly

Once the circuit board was dismantled he located the holy grail he'd been after - a small gray transistor and he bent its tiny wires until they fatigued. He then mounted the transistor to the small circuit board he'd been working on for months, carefully twining together the wire leads. Just as he finished, a door slammed nearby and footsteps sounded in the corridor. Gillette looked up, alarmed.

Someone was coming to his cell. Oh, Christ, no, he thought.

The footsteps were about twenty feet away. He slipped the circuit board he'd been working on into a copy of Wired magazine and shoved the components back into the housing of the radio. He set it against the wall.

He lay back on the cot and began flipping through another magazine, 2600, the hacking journal, praying to the general-purpose god that even atheist prisoners start bargaining with soon after they land in jail: Please let them not roust me. And if they do, please let them not find the circuit board. The guard looked through the peephole and said, "Position, Gillette." The inmate stood and stepped to the back of the room, hands on his head. The guard entered the small, dim cell. But this wasn't, as it turned out, a roust. The man didn't even look around the cell; he silently shackled Gillette's hands in front of him and led him out the door. At the intersection of hallways where the administrative seclusion wing ran into the general population wing the guard turned and led his prisoner down a corridor that wasn't familiar to Gillette. The sounds of music and shouts from the exercise yard faded and in a few minutes he was directed into a small room furnished with a table and two benches, both bolted to the floor. There were rings on the table for an inmate's shackles though the guard didn't hook Gillette's to them.

"Sit down."

Gillette did.

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

The guard left and the door slammed, leaving Gillette alone with his curiosity and itchy desire to get back to his circuit board. He sat shivering in the windowless room, which seemed to be less a place in the Real World than a scene from a computer game, one set in medieval times. This cell, he decided, was the chamber where the bodies of heretics broken on the rack were left to await the high executioner's axe. Thomas Frederick Anderson was a man of many names.

Tom or Tommy in his grade school days.

A dozen handles like Stealth and CryptO when he'd been a high school student in Menlo Park, California, running bulletin boards and hacking on Trash-80s and Commodores and Apples. He'd been T.F. when he'd worked for the security departments of AT and Sprint and Cellular One, tracking down hackers and phone phreaks and call jackers (the initials, colleagues decided, stood for

"Tenacious Fucker," in light of his 97 percent success record in helping the cops catch the perps). As a young police detective in San Jose he'd had another series of names - he'd been known as Courtney 334 or Lonelygirl or BrittanyT in online chat rooms, where in the personas of fourteen-year-old girls he'd written awkward messages to pedophiles, who would e-mail seductive propositions to these fictional dream girls and then drive to suburban shopping malls for romantic liaisons, only to find that their dates were in fact a half-dozen cops armed with a warrant and guns. Nowadays he was usually called either Dr. Anderson -when introduced at computer conferences - or just plain Andy. In official records, though, he was Lieutenant Thomas F. Anderson, chief of the California State Police Computer Crimes Unit.

The lanky man, forty-five years old, with thinning curly brown hair, now walked down a chill, damp corridor beside the pudgy warden of the San Jose Correctional Facility -San Ho, as it was called by perps and cops alike. A solidly built Latino guard accompanied them. They continued down the hallway until they came to a door. The warden nodded. The guard opened it and Anderson stepped inside, eyeing the prisoner.

Wyatt Gillette was very pale - he had a "hacker tan," as the pallor was ironically called - and quite thin. His hair was filthy, as were his fingernails. Gillette apparently hadn't showered or shaved in days. The cop noticed an odd look in Gillette's dark brown eyes; he was blinking in recognition. He asked,

"You're are you Andy Anderson?"

"That's Detective Anderson," the warden corrected, his voice a whip crack.

"You run the state's computer crimes division," Gillette said.

"You know me?"

"I heard you lecture at Comsec a couple of years ago."

The Comsec conference on computer and network security was limited to documented security professionals and law enforcers; it was closed to outsiders. Anderson knew it was a national pastime for young hackers to try to crack into the registration computer and issue themselves admission badges. Only two or three had ever been able to do so in the history of the conference.
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

"How'd you get in?"

Gillette shrugged. "I found a badge somebody dropped."

Anderson nodded skeptically. "What'd you think of my lecture?"

"I agree with you: silicon chips'll be outmoded faster than most people think. Computers'll be running on molecular electronics. And that means users'll have to start looking at a whole new way to protect themselves against hackers."

"Nobody else felt that way at the conference."

"They heckled you," Gillette recalled.

"But you didn't?"

"No. I took notes."

The warden leaned against the wall while the cop sat down across from Gillette and said, "You've got one year left on a three-year sentence under the federal Computer Fraud and Abuse Act. You cracked Western Software's machines and stole the source codes for most of their programs, right?" Gillette nodded.

The source code is the brains and heart of software, fiercely guarded by its owner. Stealing it lets the thief easily strip out identification and security codes then repackage the software and sell it under his own name. Western Software's source codes for the company's games, business applications and utilities were its main assets. If an unscrupulous hacker had stolen the codes he might have put the billion-dollar company out of business.

Gillette pointed out: "I didn't do anything with the codes. I erased them after I downloaded them."

"Then why'd you crack their systems?"

The hacker shrugged. "I saw the head of the company on CNN or something. He said nobody could get into their network. Their security systems were foolproof. I wanted to see if that was true."

"Were they?"

"As a matter of fact, yeah, they were foolproof. The problem is that you don't have to protect yourself against fools. You have to protect yourself against people like me."

"Well, once you'd broken in why didn't you tell the company about the security flaws? Do a white hat?" White hats were hackers who cracked into computer systems and then pointed out the security flaws to their victims. Sometimes for the glory of it, sometimes for money. Sometimes even because they thought it was the right thing to do.

Gillette shrugged. "It's their problem. That guy said that it couldn't be done. I just wanted to see if I
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

could."

"Why?"

Another shrug. "Curious."

"Why'd the feds come down on you so hard?" Anderson asked. If a hacker doesn't disrupt business or try to sell what he steals the FBI rarely even investigates, let alone refers a case to the U.S. attorney. It was the warden who answered. "The reason is the DoD."

"Department of Defense?" Anderson asked, glancing at a gaudy tattoo on Gillette's arm. Was that an airplane? No, it was a bird of some kind.

"It's bogus," Gillette muttered. "Complete bullshit." The cop looked at the warden, who explained, "The Pentagon thinks he wrote some program or something that cracked the DoD's latest encryption software."

"Their Standard 12?" Anderson gave a laugh. "You'd need a dozen supercomputers running full time for six months to crack a single e-mail."

Standard 12 had recently replaced DES - the Defense Encryption Standard - as the state-of-the-art encryption software for the government. It was used to encrypt secret data and messages. The encryption program was so important to national security that it was considered a munition under the export laws and couldn't be transferred overseas without military approval. Anderson continued, "But even if he did crack something encoded with Standard 12, so what?

Everybody tries to crack encryptions."

There was nothing illegal about this as long as the encrypted document wasn't classified or stolen. In fact, many software manufacturers dare people to try to break documents encrypted with their programs and offer prizes to anybody who can do so.

"No," Gillette explained. "The DoD's saying that I cracked into their computer, found out something about how Standard 12 works and then wrote some script that decrypts the document. It can do it in seconds."

"Impossible," Anderson said, laughing. "Can't be done." Gillette said, "That's what I told them. They didn't believe me." Yet as Anderson studied the man's quick eyes, hollow beneath dark brows, hands fidgeting impatiently in front of him, he wondered if maybe the hacker actually had written a magic program like this. Anderson himself couldn't have done it; he didn't know anybody who could. But after all, the cop was here now, hat in hand, because Gillette was a wizard, the term used by hackers to describe those among them who've reached the highest levels of skill in the Machine World.

There was a knock on the door and the guard let two men inside. The first one, fortyish, had a lean face, dark blond hair swept back and frozen in place with hairspray. Honest-to-God sideburns too. He wore a cheap gray suit. His overwashed white shirt was far too big for him and was halfway untucked. He
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

glanced at Gillette without a splinter of interest. "Sir," he said to the warden in a flat voice. "I'm Detective Frank Bishop, state police, Homicide." He nodded an anemic greeting to Anderson and fell silent. The second man, a little younger, much heavier, shook the warden's hand then Anderson's. "Detective Bob Shelton." His face was pockmarked from childhood acne.

Anderson didn't know anything about Shelton but he'd talked to Bishop and had mixed feelings concerning his involvement in the case Anderson was here about. Bishop was supposedly a wizard in his own right though his expertise lay in tracking down killers and rapists in hard-scrabble neighborhoods like the Oakland waterfront, Haight-Ashbury and the infamous San Francisco Tenderloin. Computer Crimes wasn't authorized - or equipped - to run a homicide like this one without somebody from the Violent Crimes detail but, after several brief phone discussions with Bishop, Anderson was not impressed. The homicide cop seemed humorless and distracted and, more troubling, knew zero about computers. Anderson had also heard that Bishop himself didn't even want to be working with Computer Crimes. He'd been lobbying for the MARINKILL case - so named by the FBI for the site of the crime: Several days ago three bank robbers had murdered two bystanders and a cop at a Bank of America branch in Sausalito in Marin County and had been seen headed east, which meant they might very well turn south toward Bishop's present turf, the San Jose area.

Now, in fact, the first thing Bishop did was to check the screen of his cell phone, presumably to see if he had a page or message about a reassignment.

Other books

First Chair by Nikki Hoff
This Rock by Robert Morgan
Not a Marrying Man by Miranda Lee
Eye of the Tiger by Crissy Smith
Dark Paradise by Tami Hoag
Ada Unraveled by Barbara Sullivan
Galway Bay by Mary Pat Kelly