Read Black Hat Blues Online

Authors: Rick Dakan

Tags: #Speculative Fiction Suspense

Black Hat Blues (42 page)

BOOK: Black Hat Blues
9.58Mb size Format: txt, pdf, ePub
ads

your work” kind of person. She’d want to know everything they did in

order to smoke Isaiah out, and she’d want to see some real results. At

the same time, they needed to build up some credibility for Post Hoc,

so Paul and Chloe came up with a plan that looked like something Post

Hoc would have come up with on their own. They decided to create a

honey pot.

The honey pot was a trap meant to lure in a target and trap it. Honey

pots designed to capture hackers were usually websites that gave the

appearance of being easy to hack and which seemed to contain inter-

esting or desirable data. Hackers would break in, not realizing there

would be a host of hidden processes running that were ready to snatch

them up and hopefully catch them in the act. In their case, they set up

a Post Hoc-created website that was very much modeled after a kind of

America’s Most Wanted for the internet. The site featured descriptions

of wanted hackers and then offered bounties of tens of thousands of

dollars for information leading to their capture. Hackers could report

leads through the site anonymously and receive payment anonymously

too, just the way an outfit like BountySploit worked.

Of course the main target was Isaiah himself. Paul had debated long

and hard with Sacco about whether or not to put Isaiah’s picture up

on the site. Weirdly, it had been Sacco who wanted the pic up and Paul

who wanted to wait. Sacco felt that by putting the picture up right

away, they would indirectly be warning Isaiah just how much danger he

might be in. Paul agreed with that assessment, but was more concerned

with ways to show that the site was working at generating leads about

Isaiah over time. He wanted to save the picture for later and pass it

off as a discovery made by one of their bounty hunters, along with an

announcement that they’d paid the fictitious bounty hunter an award

for such valuable information. That was the key, of course—making

Isaiah think that the site had valuable information on him that he in

turn would try to steal back. In the end, Paul’s position carried the day

and Sacco seemed to resign himself to the plan as they’d laid it out.

The description of the wanted hacker Paul put up included no per-

sonal information about Isaiah at first. It did however detail some of

226

Geek Mafia: Black Hat Blues

the crimes he was accused of committing, including some that Paul

and the rest of the Crew were actually responsible for, like cashing the

fake checks. It also included a list of some of the networks, websites,

and bank accounts that Isaiah was believed to have compromised. They

posted links to the site in various hacker forums online and Paul and

c1sman spent some time talking it up on IRC. They got traffic almost

immediately, and a steady stream of hits showed there was real interest

within the community, but hopefully not too much outside. Paul didn’t

want a lot of tourists coming in from Digg or Slashdot just to poke

around and so they encouraged people to keep the site to just hackers.

Ostensibly this was because they didn’t want newbies muddying the

waters with false or ridiculous leads, but in fact Paul wanted to keep

the number of users low so they would have less data to hunt through

when they checked their trap for victims.

They worked mostly out of the Baltimore house, although Sacco and

Chloe had taken separate cars and gone war driving around the city

and suburbs looking for open wireless networks they could take over

for added bandwidth. They’d built a pretty complete map after a few

days, allowing c1sman to work out of a van moving from spot to spot

and piggybacking on either open or ill-protected hotspots. Although

their site was hosted through a German ISP and heavily protected, they

didn’t want anyone (especially Isaiah or Marsh) tracing traffic back to

them in Baltimore. After the third day, Paul started adding in new

information about Isaiah, simulating supposed leads that bounty hunt-

ers were turning in. The truth was, no one was actually giving them any

useful leads at all. But that was OK. All they needed to do was give the

impression that they were closing in on Isaiah. Then, hopefully, he’d get

curious enough to try and hack in and leave some trace of his activities

they could follow back to him.

C1sman put in the most hours, second only to Paul. Chloe continued

to interface via e-mail with Marsh and Clover, forwarding them prog-

ress reports that were supposed to be from the Post Hoc crew. They’d

decided not to tell her about the honey pot site directly, hoping she

wouldn’t have her security people try and hack it just to get more data

on them. There was a good chance she might find it on her own, but

no sense in stirring up problems for themselves unnecessarily. C1sman’s

main job was to pore over the traffic data for everything coming in and

out of the honey pot. He had an array of traffic analysis tools set up,

along with various scripts and cookies attached to the site that clung

on to anyone who visited it. Most hackers would be protected against

most of these bugs, but even the way they disabled them told c1sman

Rick Dakan

227

something about the skills of those visiting him. Plus, there were other,

more sophisticated pieces of malware that c1sman had created that were

much harder to detect and only a handful of those visiting the site man-

aged to remove them. The assumption was, if Isaiah was visiting the

site regularly he’d be in this final, uber-skilled set of visitors who left

practically no trace. Thus, tracking them down became priority one and

they might, just might, find some clue to Isaiah’s location.

It was on the fifth day, when Paul put up Isaiah’s picture, that things

started to fall into place. C1sman had identified some distinct patterns

in the traffic data that pointed to someone who was both interested in

what was being published on the site and who had (they suspected)

tried to hack into the site on several occasions. They had even “suc-

ceeded” once, cracking into a portion of the site full of corrupted data

meant to serve as trojan horses for the hacker who took them. Whoever

it was caught on almost immediately though, and their malware was

deactivated or destroyed before it could give them any useful informa-

tion. But it was enough to give c1sman a thread to start weaving a

pattern together from, and it eventually led them back to a physical

location.

“It’s a hacker space in New York,” c1sman said when they’d all gath-

ered in the Baltimore room once more. Sacco and Chloe looked as

exhausted as Paul felt. They’d been out driving within a hundred mile

radius buying disposable cell phones, hijacking open wi-fi spots, and

getting supplies and food for the group. Paul had busied himself with

the false posts and regular updates to the honey pot site, while Bee and

c1sman had combed through the analytics. “It’s called HackNY, and it’s

a non-profit set up by some NY hackers as a place for people to work on

projects and stuff like that. It’s all white hat stuff, a lot of fun hardware

hacking and things like that. I was there when they were setting up

right after the last HOPE. It’s pretty cool.”

“And you think Isaiah might be using it to connect to our honey

pot?” Paul asked.

“I think someone there is, yeah. Or if not, they’re using HackNY’s

big fat connection to connect to its TOR network. But yeah, they

missed one of my little bugs from the honey pot and it popped up at

HackNY twice.”

“What’s this hacker space like?” asked Chloe. “Who has access to

their network?”

“According to their website they’ve got about 70 dues paying mem-

bers—it’s $65 a month. You gotta figure at least twice that many come

through just to check it out or as friends of the members. And they have

228

Geek Mafia: Black Hat Blues

classes and demos that’re open to the public, and so anyone could be

coming through then.”

“So he could probably slip in and not arouse any attention,” said

Paul. “It makes sense. You gotta figure a hacker space’s network is super

secure, right? And we know he’s based out of New York. Isaiah could

easily be using the space to do some digging into our honey pot. Even

if we do trace it back to HackNY, that leaves us with dozens, maybe

hundreds of possible targets. It’s great camouflage.”

“C1sman, you said you’ve been there?” asked Chloe.

“Yeah, the one time when they were just setting up.”

“And they know you? The people who run it?”

“A little bit. From, you know, cons and stuff. Not well.”

“Perfect,” said Chloe. “We need you to go to NY and start hanging

out there.”

Paul saw her plan, and he liked it. All except one part.

“I don’t think I can do that,” said c1sman. Paul could see from the

way he fidgeted and looked down at his keyboard that he wasn’t happy

with the idea at all.

“Of course you can,” said Chloe. “You were great during the pitch

to Marsh’s security guy, and this is even easier. We’re only asking you

to be yourself. You go in there, start hanging out, and wait for Isaiah

or someone you can identify as one of his followers to show up. We’ll

coordinate with you from somewhere nearby and let you know when

we see someone poking around the honey pot. Then you ID the guy,

unless it is Isaiah, in which case you can ID him right away. Either way

we follow him when he leaves and track down Isaiah’s home base.”

“I don’t think I could do all that. I really don’t.”

“It’s not dangerous,” Chloe insisted. “The thing is though, you’re

the only one in our Crew he hasn’t met or even gotten a description of.

Isaiah knows the rest of us by sight and will have briefed his followers

about us in all likelihood. You’re the only one who can do this for us.

Do you see that?”

C1sman didn’t answer, just kept looking at his laptop. Paul gave Bee

an imploring look and nodded towards him. She moved up close and

put her arm around his shoulders. “Chris, honey, please. Sandee needs

this, she really does. And we’ll be right outside. You did so well before.

And this is much easier than last time.”

They all waited in silence for a long time, at least a minute, but to

Paul it seemed like ten. He was readying his own salvo of encourage-

ment when c1sman finally nodded. “Yeah, OK. I’ll give it a shot.”

Chapter 27
Chloe

Chloe didn’t like having to go into Marsh’s den one more time,

but the woman had insisted. Their dealings over the phone had

been very professional and non-committal. Chloe as Maria would claim

to have dug up some new fact about the target—they hadn’t put the

name Isaiah out there yet—and Marsh would ask to have a hard copy

delivered by Fed Ex or private messenger. No e-mail or faxes. That

meant driving somewhere far away from their Baltimore hideout before

dropping a couple of pages into an envelope and paying twenty bucks

to overnight it an hour’s drive away. Still, that was safer than deliver-

ing it personally and then having to spend the next few hours shaking

any tails she might have put on them. But today Marsh had asked for

a face to face meeting, and that meant hiring a limo and driver again

just to keep up appearances. It also meant buying new outfits for her

and Sacco, since they didn’t want to seem like they only had one suit

apiece (which was true since the Key West house was lost). The dollars

just kept adding up. They’d come out of the con with over a million in

cash, but they’d spent over three hundred thousand since then.

It was worth it if they could get Sandee out, though, and Chloe was

going to do her best to make a play for Sandee’s release at this meet-

ing. She and Paul had come up with an excuse that seemed reason-

able enough—they would say they have information linking Sandee

to Isaiah. If Marsh got him released, they could follow Sandee back to

his friends and hopefully learn Isaiah’s location. How could they do

this? Well, Post Hoc had uncovered some secret e-mail and credit card

230

Geek Mafia: Black Hat Blues

accounts that Sandee used and would probably use again to contact

Isaiah (or at least that’s what they were going to tell Marsh). All they

needed was for Sandee to be out from under house arrest long enough to

make him disappear and then the rest of them could escape along with

him, leaving Marsh and Clover and Isaiah far, far behind them.

Chloe and Sacco had to wait in reception this time, something that

made her all the more nervous about this meeting. Was Marsh just

playing power games with them or was she really busy? Or was it both?

Or something else altogether? Chloe did her best to appear bored and

unconcerned as she paged through a copy of
National Geographic
.

Sacco played Tetris on his phone. When Larry the receptionist ushered

them into Marsh’s office twenty minutes after their appointment was

supposed to begin, Chloe was expecting apologies or excuses. Instead,

BOOK: Black Hat Blues
9.58Mb size Format: txt, pdf, ePub
ads

Other books

100 Days and 99 Nights by Alan Madison
Moon Mask by James Richardson
The Infamous Rogue by Alexandra Benedict
Shatter by Joan Swan
Let It Snow... by Leslie Kelly, Jennifer Labrecque
Blood and Salt by Kim Liggett
A Lady's Wish by Katharine Ashe
A March Bride by Rachel Hauck