The Blue Nowhere-SA (21 page)

Read The Blue Nowhere-SA Online

Authors: Jeffery Deaver

Tags: #Computer hackers, #Crime & mystery, #Serial murders, #Action & Adventure, #Privacy; Encroachment by computer systems, #Crime investigations, #General, #Murder victims, #suspense, #Adventure, #Technological, #California, #Crime & Thriller, #Fiction, #thriller

BOOK: The Blue Nowhere-SA
9.69Mb size Format: txt, pdf, ePub

Bishop turned back to the preliminary crime scene report from St. Francis Academy. Huerto Ramirez had compiled it in record time but there wasn't much that was helpful here either. The murder weapon had again been a Ka-bar knife. The duct tape used to bind Jamie Turner was untraceable, as were the Tabasco and ammonia that had stung his eyes. They'd found plenty of Holloway's fingerprints - but those were useless now since they already knew his identity.

Bishop walked to the white-board and gestured to Mott for the marker, who pitched it to him. The detective wrote these details on the board but when he started to write "Fingerprints," he paused. Phate's fingerprints

The burning Jaguar

These facts troubled him for some reason. Why? he wondered, brushing his sideburns with his knuckles. Do something with that

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

He snapped his fingers.

"What?" Linda Sanchez asked. Mott, Miller and Nolan looked at him.

"Phate didn't wear gloves this time."

At Vesta's, when he'd kidnapped Lara Gibson, Phate had carefully wrapped a napkin around his beer bottle to obscure his prints. At St. Francis he hadn't bothered. "That means he knows we have his real identity." Then the detective added, "And the car too. The only reason to destroy it is if he knew that we'd found out he was driving a Jaguar. How'd he do that?"

The press hadn't mentioned his name or the fact that the killer was driving a Jaguar.

"We have ourselves a spy, you think?" Linda Sanchez said. Bishop's eyes fell again on the white-board and he noticed the reference to Shawn, Phate's mysterious partner. He tapped the name and asked, "What's the whole point of this game of his? It's to find some hidden way of getting access to your victim's life."

Nolan said, "You're thinking Shawn's a trapdoor? An insider?" Tony Mott shrugged. "Maybe he's a dispatcher at headquarters? Or a trooper?"

"Or somebody from California State Data Management?" Stephen Miller suggested.

"Or maybe," a man's voice growled, "Gillette is Shawn." Bishop turned and saw Bob Shelton standing in front of a cubicle toward the back of the room.

"What're you talking about?" Patricia Nolan asked.

"Come here," he said, gesturing them toward the cubicle. Inside, on the desk, a computer monitor glowed with text. Shelton sat down and scrolled through it as the others on the team crammed into the cubicle.

Linda Sanchez looked over the screen. With some concern she said, "You're on ISLEnet. Gillette said we weren't supposed to log on from here."

"Of course he said that," Shelton spat out bitterly. "Know why? Because he was afraid we'd find this--" He scrolled a little further down and gestured toward the screen. "It's an old Department of Justice report I found in the Contra Costa County archives. Phate might've erased the copy in Washington but he missed this one." Shelton tapped the screen. "Gillette was Valleyman. He and Holloway ran that gang Knights of Access - together. They founded it."

"Shit," Miller muttered.

"No," Bishop whispered. "Can't be."

Mott spat out, "He fucking social engineered us too!"

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Bishop closed his eyes, seared by the betrayal.

Shelton muttered, "Gillette and Holloway've known each other for years. 'Shawn' could be one of Gillette's screen names. Remember that the warden said he'd been caught going online. He was probably contacting Phate. Maybe this whole thing was a plan to get Gillette out of prison. What a fucking son of bitch."

Nolan pointed out, "But Gillette programmed his bot to search for Valleyman too."

"Wrong." Shelton pushed a printout toward Bishop. "Here's how he modified his program." The printout read:

Search: IRC, Undernet, Dalnet, WAIS, gopher, Usenet, BBSs, WWW, FTP, ARCHIVES

Bishop shook his head. "I don't understand it."

"The way he wrote the request," Nolan said, "his bot would retrieve anything that had a reference to Phate, Holloway or Trapdoor in it unless it also referred to Gillette or Valleyman. Those it would ignore." Shelton continued, "He's the one who's been warning Phate. That's why he got away from St. Francis in time. And Gillette told him that we knew what kind of car he was driving, so he burned it." Miller added, "And he was so desperate to stay and help us, remember?"

"Sure he was," Shelton said, nodding. "Otherwise, he'd lose his chance to--" The detectives looked at each other.

Bishop whispered, "Ć’escape."

They sprinted down the corridor that led to the analysis lab. Bishop noticed that Shelton had drawn his weapon.

The door to the lab was locked. Bishop pounded but there was no response. "Key!" he called to Miller. But Shelton growled, "Fuck the key--" and kicked the door in, raising his gun. The room was empty.

Bishop continued to the end of the corridor and pushed into a storeroom in the back of the building. He saw the fire door, which led outside into the parking lot. It was wide open. The fire alarm in the door-opener bar had been dismantled - just as Jamie Turner had done to escape from St. Francis Academy.

Bishop closed his eyes and leaned against the damp wall. He felt the betrayal deep within his heart, as sharp as Phate's terrible knife.

"The more I know you, the more you don't seem like the typical hacker."
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

"Who knows? Maybe I'm not."

Then the detective turned and hurried back into the main area of the CCU. He picked up the phone and called the Department of Corrections Detention Coordination Office at the Santa Clara County Building. The detective identified himself and said, "We've got a fugitive on the run wearing an anklet. We need an emergency trace. I'll give you the number of his unit." He consulted his notebook. "It's--"

"Could you call back later, Lieutenant?" came the weary response.

"Call back? Excuse me, sir, you don't understand. We just had an escape. Within the last thirty minutes. We need to trace him."

"Well, we're not doing any tracing. The whole system's down. Crashed like the Hindenberg. Our tech people can't figure out why."

Bishop felt the chill run through his body. "Tell them you've been hacked," he said. "That's why." The voice on the other end of the line gave a condescending laugh. "You've been watching too many movies, Detective. Nobody can get into our computers. Call back in three or four hours. Our people're saying we should be up and running by then."

III

SOCIAL ENGINEERING

Anonymity is one thing that the next wave of computing will abolish.

- Newsweek

CHAPTER EIGHTEEN

He takes things apart.

Wyatt Gillette was jogging through the chill evening rain down a sidewalk in Santa Clara, his chest aching, breathless. It was 9:30 P.M. and he'd put nearly two miles between him and CCU headquarters since he'd escaped.

He knew his way around this neighborhood - he wasn't far from one of the houses where he'd lived as a boy - and he was thinking of the time his mother had told a friend, who'd asked if ten-year-old Wyatt preferred baseball to soccer, "Oh, he doesn't like sports. He takes things apart. That seems to be all he likes to do."

A police car approached and Gillette eased to a quick walk, keeping his head under the umbrella he'd found in the computer analysis lab at CCU.

The car disappeared without slowing. The hacker sped up once again. The anklet tracking system would be down for several hours but he couldn't afford to dawdle.

He takes things apart

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Nature had cursed Wyatt Edward Gillette with a raging curiosity that seemed to grow exponentially with every new year. But that perverse gift had at least been mitigated somewhat by the blessing of hands and a mind skillful enough to, more often than not, satisfy his obsession. He lived to understand how things worked and there was only one way to do that: take them apart. Not a single thing in the Gillette house had been safe from the boy and his tool kit. His mother would return home from her job to find young Wyatt sitting in front of her food processor, happily examining its component parts.

"Do you know how much that cost?" she'd ask angrily.

Didn't know, didn't care.

But ten minutes later it would be reassembled and working fine, neither better nor worse for its dismemberment.

And the Cuisinart's surgery had occurred when the boy was only five years old. Soon, though, he'd taken apart and put back together all the things mechanical in the house. He understood pulleys and wheels and gears and motors and they began to bore him so it was on to electronics. For a year he preyed upon stereos and record players and tape decks. Taking 'em apart, putting 'em back together

It didn't take long before the boy had dispensed with the mysteries of vacuum tubes and circuit boards, and his curiosity began to prowl like a tiger with a reawakened hunger. But then he discovered computers.

He thought of his father, a tall man with the perfect posture and trim hair that had been his legacy from the air force. The man had taken him to a Radio Shack when his son was eight and told him he could pick out something for himself. "You can get anything you want."

"Anything?" asked the boy, eyeing the hundreds of items on the shelves. Anything you want

He'd picked a computer.

It was a perfect choice for a boy who takes things apart - because the little Trash-80 computer was a portal to the Blue Nowhere, which is infinitely deep and infinitely complex, made up of layer upon layer of parts small as molecules and big as the exploding universe. It's the place where curiosity can roam free forever.

Schools, however, tend to prefer their students' minds to be compliant first and curious second, if at all, and as he moved up through his grades young Wyatt Gillette began to founder. Before he bottomed out, though, a wise counselor plucked him out of the stew of high school, sized him up and sent him off to Santa Clara Magnet School Number Three.

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

The school was billed as a "haven for gifted but troubled students residing in Silicon Valley" - a description that could, of course, be translated only one way: hacker heaven. A typical day for a typical student at Magnet Three involved cutting P.E. and English classes, tolerating history and acing math and physics, all the while concentrating on the only schoolwork that really mattered: talking with your buddies nonstop about the Machine World.

Now, walking down a rainy sidewalk, not far from this very school in fact, he had many memories of his early days in the Blue Nowhere.

Gillette clearly remembered sitting in the Magnet Three school yard, practicing his whistle for hour upon hour. If you could whistle into a fortress phone at just the right tone you could fool the phone switches into thinking you yourself were another switch and would be rewarded with the golden ring of access. (Everybody knew about Captain Crunch - the username of a legendary young hacker who had discovered that the whistle given away with the cereal of the same name generated a tone of 2600

megahertz, the exact frequency that let you break into the phone company's long-distance lines and make free calls.)

He remembered all the hours he'd spent in the Magnet Three cafeteria, which smelled like wet dough, or in study hall or the green corridors, talking about CPUs, graphics cards, bulletin boards, viruses, virtual disks, passwords, expandable RAM, and the bible - that is, William Gibson's novel Neuromancer, which popularized the term "cyberpunk."

He remembered the first time he cracked into a government computer and the first time he got busted and sentenced to detention for hacking - at seventeen, still a juvenile. (Though he still had to do time; the judge was stern with boys who seized root of Ford Motor Company's mainframe when they should've been out playing baseball - and the old jurist was more stern yet with boys who lectured him, adamantly pointing out that the world'd be in pretty shitty shape today if Thomas Alva Edison had been more concerned with sports than inventing.)

But the most prominent memory at the moment was of an event that occurred a few years after he graduated from Berkeley: his first online meeting with a young hacker named CertainDeath, the username of Jon Patrick Holloway, in the #hack chat room.

Gillette was working as a programmer during the day. But like many code crunchers he was bored with that life and counted the hours until he could get home to his machine to explore the Blue Nowhere and meet kindred souls, which Holloway certainly was; their first online conversation lasted four and a half hours.

Initially they traded phone phreaking information. They then put theory into practice and pulled off what they declared to be some "totally moby" hacks, cracking into the Pac Bell, AT and British Telecom switching systems.

From these modest beginnings they began prowling through corporate and government machines. Their reputation spread and pretty soon other hackers began to seek them out, running Unix "finger" searches on the Net to find them by name and then sitting at the young men's virtual feet to learn what the gurus had to teach. After a year or so of hanging out online with various regulars he and Holloway realized that they'd become a cybergang - a rather legendary one, as a matter of fact. CertainDeath, the leader and bona fide wizard. Valleyman, the second in command, the thoughtful philosopher of the group and nearly as good a codeslinger as CertainDeath. Sauron and Klepto, not as smart but half crazy and willing to do anything online. Others, too: Mosk, Replicant, Grok, NeuRO, BYTEr

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

They needed a name and Gillette had delivered: "Knights of Access" had occurred to him after playing a medieval MUD game for sixteen hours straight.

Other books

Animal 2 by K'wan
Scarecrow by Richie Tankersley Cusick
The Heart's Ashes by A. M. Hudson
The Warded Man by Peter V. Brett
Thug Matrimony by Wahida Clark
Wuthering Frights by H.P. Mallory
Mist Warrior by Kathryn Loch
Tell A Thousand Lies by Atreya, Rasana
The Tale of Oriel by Cynthia Voigt