Performing Arts
Read books online Ā» Performing Arts Ā» Freedom Incorporated by Peter Tylee (me reader .txt) šŸ“–

Book online Ā«Freedom Incorporated by Peter Tylee (me reader .txt) šŸ“–Ā». Author Peter Tylee



1 ... 35 36 37 38 39 40 41 42 43 ... 88
Go to page:
Besides, blundering into a perforation in the outer ring would bring him one step closer to isolating the attack origin.

Then he launched a second thread. He needed to closely monitor the Ravenā€™s progress and feed from whatever morsels of information he might discover. To do that, heā€™d have to hack the cyborgā€™s brain. It was dangerous, though others had succeeded in the past and thoroughly documented the process. Anonymous pioneers had printed a groundbreaking article about cyborg hacking and all the popular computer magazines had followed the case. An entire ā€˜net community had dedicated itself to the art of forcing entry into hybrid computer-human brains. Some cyborgs were privacy paranoid and had erected insurmountable defences - nobody could get through without the appropriate key. Others were lax, either through ignorance, incompetence, or naivety. Some thought it would never happen to them despite the growing cult of cyborg hackers who shared the necessary tools. Hardcore cyborg hackers believed themselves to be intrepid psychologists and anthropologists, ruthlessly examining the human minds that a cocktail of doctors and engineers had generously placed online.

The Raven was easy to find. His connection to the UniForce database perpetually drew information about an array of targets. He didnā€™t have the space to store all the data locally, and even if he did, he would still require constant contact to benefit from the frequent data updates. What was the point in chasing a false lead?

ā€œWhatā€™re you doing?ā€ Esteban demanded at the worst possible moment.

James had forgotten to switch off his monitor to conceal his activities from prying eyes. He would have preferred to work in private but it was a bit late for that now. He slowed his pace to free enough mental resources to formulate an answer. ā€œIā€™m isolating, or trying to isolate the hackerā€™s data stream. If I can do that, I can tell you where they are.ā€

ā€œYeah, but what are you doing there?ā€ Esteban pointed to the second application.

James snorted like an angry pig and said, ā€œHacking the Ravenā€™s mind.ā€

ā€œYou can do that?ā€

ā€œSure. Itā€™s just the same as any ā€˜net connected computer, itā€™s vulnerable to attack.ā€ James massaged the bruise around his implant and refocussed on his work.

Esteban sensibly left him in peace and returned to drafting his first contract. It didnā€™t take long; he just opened the appropriate form and filled in the blanks. The difficult part was deciding to whom he should send it. Assassination contracts usually tendered for millions of Credits. One million was the smallest fee any quality assassin would demand. Two million was common, but five was exceptional.

He reviewed the list of assassins that werenā€™t presently on assignment and selected the top performer. He had an immaculate record - nobody had ever traced him and he had a 100 percent success rate. And heā€™s quick. Most assassins wouldnā€™t make the hit for at least two weeks, and frequently demanded more money if told the matter was urgent. Shadow, as this particular assassin called himself, had an average kill time of five days.

Esteban put the contract in Shadowā€™s pigeonhole, as standard procedure dictated. Good assassins always demanded total anonymity. The system would send Shadow a notification and he would thereby know he had mail waiting for him. He alone could access the message, using an unreproducible electronic key. For security, reasons he used each pigeonhole no more than once. The system generated a new lock and key combination at the successful completion of each assignment.

Shadow would have 24 hours to accept or reject the offer. But Esteban rarely had to deal with rejections. Most assassins understood that UniForce didnā€™t tolerate such impudence. One rejection would substantially reduce the frequency of future offers. Rejecting UniForce twice was tantamount to retirement.

Michele was busy reading bounty hunter records, one by one. She was yet to discover the search feature built into the database engine. Esteban watched her, pitying her in his own way. Should I show her how to search? He watched as she opened and closed another two files. Nah, she looks happy. He made a pact with himself: if she were still going at midnight, heā€™d show her how to isolate the cyborgs from the enormous list.

ā€œHow long until you know where they are?ā€ Esteban asked, keen to get moving. He was tired of sitting at a desk. He was a man of action; it was in his blood. If I canā€™t have poker then, come hell or high water, Iā€™ll have my own fun.

James snorted in annoyance. ā€œIt depends.ā€ He couldnā€™t say which method would be faster, finding them on his own merit or poaching their whereabouts from the Raven. There were too many variables to give an accurate answer.

Esteban frowned.

The trickle of data feeding into the Ravenā€™s computerised brain suddenly surged into a torrent and James seized the opportunity to launch his trojan. It was similar to the method David Coucke had used to penetrate UniForceā€™s network: hollow out a legitimate file and insert a tiny program inside the empty shell. Upon reaching the destination, the virus-like file would activate and reconstruct its host so that any subsequent file scans would report normal. But by then it would be too late, the program would already be inside. It would poke several inconspicuous holes in the targetā€™s firewall, allowing the hacker to delve into the bowels of the targetā€™s network. It was simple, in theory. Practical execution was a different matter, especially on a cyborg. Cyborgs tended to be more aware of their computerā€™s activities. It wasnā€™t just a machine - it was an extension of a human mind. Thatā€™s why it was so important for James to wait for a surge in the data stream. He needed the Raven to be crunching through so much data that he wouldnā€™t notice the loss of a few clock cycles to the trojan.

He held his breath as the Raven swept the modified file up with his data stream. A few seconds later a port sweep revealed the trojan had opened ports 5,000 to 5,005. It worked. ā€œIā€™m in.ā€

ā€œYouā€™ve found them?ā€ Esteban leapt from his chair and slapped a hand roughly on Jamesā€™s shoulder.

ā€œNo.ā€ He winced, his shoulder smarting. ā€œIā€™m inside the Ravenā€™s computer.ā€

ā€œOh.ā€ Esteban wasnā€™t impressed. Nobody had ever explained to him the significance of hacking a cyborg. ā€œIs that all.ā€

ā€œMaybe he knows where they are.ā€

Esteban rolled his eyes. ā€œYes, but if he gets his grotty little mittens on them first itā€™ll be too late, wonā€™t it?ā€

ā€œToo late for what?ā€ James didnā€™t follow.

ā€œFor me, stupid.ā€

Michele spun from her arduous task and interjected, ā€œYouā€™re going to kill them?ā€

He puffed out his chest. ā€œAnd why not? Jackie said to use our top assassin.ā€

ā€œYou?ā€ James asked incredulously. ā€œI thought youā€™d retired. Been retired - involuntarily.ā€

Estebanā€™s gaze narrowed. His expression darkened as though a thundercloud passed beneath his skin and his eyes went icy. ā€œThat wasnā€™t permanent. Now itā€™s time for my second debut into the professional circuit.ā€

Second debut? How can you have a second first-appearance, moron? James wished he had someone intelligent in the room to converse with. ā€œOkay, whatever floats your boat.ā€

ā€œIā€™m sharing the workload,ā€ Esteban admitted. ā€œOur second best assassin will deal with the Raven. That cyborg might be a freak, but he wonā€™t be expecting it. Second best will be good enough for him. But I will deal with Sutherland and the others.ā€

ā€œAnd collect the reward.ā€ James understood, or thought he did. Estebanā€™s ulterior motive would have sickened him to the core, so perhaps it was better that he didnā€™t know.

Esteban shrugged and said, ā€œHonest pay for honest work.ā€

James snorted and entwined his mind around the Ravenā€™s crystal-core. He downloaded a snippet of data, not enough to make the bounty hunter suspicious, just enough to sample the data structure. The hardest part about cyborg hacking wasnā€™t gaining access; it was decoding the bizarre storage structures. The difficulty varied depending on the intelligence of the specimen. Dopy cyborgs stored data and memories in arrays that resembled old hard disk platters. Intellectually superior cyborgs used fascinating crystalline structures that rivalled the Stanley Encryption Algorithm for complexity. One thing was certain, every cyborg had a unique way of arranging their data and it was going to take time to decode.

He gently probed the sample and turned it over in his mind, trying to find a pattern or anything he could define as a starting point. Hmmā€¦ James rubbed a hand across his tired eyes. This is going to take longer than I thought. He copied more data during the next deluge. The Raven was busy examining video feeds from around the world, testing millions of faces for a match. It was a daunting task even for the latest generation supercomputer running the most advanced face recognition software. It generated copious overhead processing and taxed the Ravenā€™s link to the nano-net. It was therefore the perfect cover for James to stealthily download analysis material. If I could just find a patternā€¦ James wondered what the Raven might have modelled his structures on. Psychologists whoā€™d entered the cyborg-hacking debate usually pointed out that cyborgs preferred personally meaningful structures. Once, a cyborg had joined the discussion and said she used a stellar map of her star sign to plot data locations in her crystal-core. What could possibly be meaningful to a man who calls himself ā€˜the Ravenā€™? Sheep? Decaying flesh? An eyeball ripe for plunging a beak into?

It was eerie to delve so intimately into another manā€™s mind. James knew he would find things he didnā€™t wish to see. But business was business and he shoved those concerns aside for the sake of seeing his daughter before her next birthday.

He wove a decoding application around the problem and fed it with as much processing power as he could safely divert from network servers. How did civilisation survive without multithreading? He set an alarm to alert him the second it discovered a pattern in the data-spaghetti and then returned his focus to the trace. A sour expression twisted his lips and he popped another two stimulants into his mouth, squirted in some water, and swallowed. Five minutes later the drugs had taken the edge off his throbbing headache and cleared his thinking. Itā€™s only a matter of time arsehole. He dug deeper, rummaging through code that might yield answers to the two most important questions: Where is the hacker? What is he up to?

Esteban watched, frustrated that he couldnā€™t do more than wait. He whittled away the time by stripping his Peacemaker nine-millimetre semiautomatic and lightly oiling every surface - not too much or it would attract grit and jam at an inconvenient moment. When he was finished, he reassembled it and checked the slide mechanism before easing a cartridge into the chamber and loading a full clip. Thirteen rounds. Twelve in the clip and one ready to go. Nowhere near enough. Estebanā€™s days of stealth were over. Brute force suited him now and for what he had in mind he needed to invite some friends.

*

Friday, September 17, 2066

12:59 Andamooka, South Australia

Cookie smiled ruefully and thought, If only I hadnā€™t gone back. Heā€™d done the digital equivalent of tripping a snare wire that the UniForce administrators had laid for him. Heā€™d twisted and turned and broken free of the trap, but heā€™d come perilously close to being pinned down. And if that happened, theyā€™d trace his location. Heā€™d been careful. Heā€™d relayed his signal through seven anonymisers and strung it around the globe five times, but still he was vulnerable. It could take them a minute, but once theyā€™d locked onto the heartbeat of his signal, theyā€™d trace it to Andamooka. Cookie was glad his custom applications were monitoring for a trace and would alert him if one began. Depending on the skills of his opponents, heā€™d

1 ... 35 36 37 38 39 40 41 42 43 ... 88
Go to page:

Free ebook Ā«Freedom Incorporated by Peter Tylee (me reader .txt) šŸ“–Ā» - read online now

Comments (0)

There are no comments yet. You can be the first!
Add a comment