The Blue Nowhere-SA (27 page)

Read The Blue Nowhere-SA Online

Authors: Jeffery Deaver

Tags: #Computer hackers, #Crime & mystery, #Serial murders, #Action & Adventure, #Privacy; Encroachment by computer systems, #Crime investigations, #General, #Murder victims, #suspense, #Adventure, #Technological, #California, #Crime & Thriller, #Fiction, #thriller

BOOK: The Blue Nowhere-SA
3Mb size Format: txt, pdf, ePub

Renegade334: Where is Shawn?

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Triple-X: Got the idea he's in the Bay area. But that's all I know. Renegade334: You sure it's a man?

Triple-X: No, but how many skirt hackers you know?

Renegade334: Will you help us? We need Phate's real e-mail address, Internet address, web sites he visits, FTP sites he uploads to - anything like that.

Gillette said to Bishop, "He won't want to contact us online or here at CCU. Give me your cell phone number."

Bishop did and Gillette relayed it to Triple-X. The man didn't acknowledge receiving the number and typed only:

Triple-X: I'm logging off. We've been talking too long. I'll think about it. Renegade334: We need your help. Please

Triple-X: That's weird. Renegade334: What?

Triple-X: I don't think I ever saw a hacker write please before.

The connection terminated.

After Phate had learned that Wyatt Gillette was helping the cops look for him and had left the little Animorph crying by the side of the road he'd ditched his car - the whirry brat could identify it - and bought a used clunker with cash. He then sped through the chill overcast to the warehouse he rented near San Jose.

When he played his Real World game of Access he'd travel to a different city and set up house for a while but this warehouse was more or less his permanent residence. It was where he kept everything that was important to him.

If, in a thousand years, archaeologists dug through layers of sand and loam and found this webby, dust-filled place they might believe that they'd discovered a temple from the early computer age, as significant a find as explorer Howard Carter's unearthing the tomb of pharaoh Tutankhamen in Egypt. Here in this cold, empty space - an abandoned dinosaur pen - were all of Phate's treasures. A complete EAI TR-20 analog computer from the sixties, a 1956 Heath electronic analog kit computer, an Altair 8800 and 680b computers, a twenty-five-year-old IBM 510 portable, a Commodore KIM-1, the famous TRS-80, a Kaypro portable, a COSMAC VIP, a number of Apples and Macs, tubes from the original Univac, brass gears and a number disk from a prototype of Charles Babbage's never-completed Difference Engine from the 1800s and notes about it jotted down by Ada Byron -Lord Byron's daughter and Babbage's companion - who wrote instructions for his machines and is therefore considered the world's first computer programmer. Dozens of other items of hardware too. On shelves were all the Rainbow Books - the technical manuals that cover every aspect of computer networking and security, their jackets standing out in the gloom with their distinctive oranges, reds, yellows, aquas, lavenders and teal greens.

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Perhaps Phate's favorite souvenir was a framed poster of correspondence bearing the letterhead of the Traf-O-Data company, Bill Gates's original name for Microsoft.

But the warehouse was not simply a museum. It served a purpose too. Here were rows and rows of boxes of disks, a dozen working computers and perhaps two million dollars' worth of specialized computer components, most of them for supercomputer construction and repair. Buying and selling these products through shell companies was how Phate made his substantial income. This also was his staging area - where he planned his games and where he changed his description and personality. Most of his costumes and disguises were here. In the corner was an ID 4000 - a security identification pass maker - complete with magnetic strip burner. Other machines let him make active identification cards, which broadcast passwords for access to particularly secure facilities. With these machines -and a brief hack into the Department of Motor Vehicles, various schools and departments of vital records - he could become anyone he wanted to be and create the documentation to prove it. He could even write himself a passport.

Who do you want to be?

He now surveyed his equipment. From a shelf above his desk he took a cell phone and several powerful Toshiba laptops, into one of which he loaded a jpeg - a compressed photo image. He also found a large disk-storage box, which would serve his needs nicely.

The shock and dismay of finding that Valleyman was among his adversaries was gone and had turned to electric excitement. Phate was now thrilled that the game he was playing had taken a dramatic twist, one that was familiar to anybody who'd ever played Access or other MUD games: This was the moment when the plot turns 180 degrees and the hunters became the prey.

Cruising through the Blue Nowhere like a dolphin, in coves close to shore, in open sea, breaking the surface or nosing through dim vegetation on the impenetrable bottom, Wyatt Gillette's tireless bot sent an urgent message back to its master.

In CCU headquarters the computer beeped.

"What do we have?" Patricia Nolan asked.

Gillette nodded at the screen.

Search results:

Search request: "Phate"

Location: Newsgroup: alt.pictures.true.crime

Status: Posted message

Gillette's face bristled with excitement. He called to Bishop, "Phate's posted something himself." He called up the message.

Message-ID:

X-Newsposter: newspost-1.2

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

Newsgroups: alt.pictures.true.crime

From:

To: Group

Subject: A recent character

Encoding: -jpg

Lines: 1276

NNTP-Posting-Date: 2 April

Date: 2 Apr 11:12 a.m.

Path:news.newspost.com!southwest.com!newsc om. mesh. ad. jplcounterculturesystems.com! I ari vegauche.fr.netlfrankf lt.de.netlswip.netlnewss rrve.deluxe.interpost.netlinternet.gateway.net!

roma.internet.itlglobalsystems.uk!

Remember: All the world's a MUD, and the people in it merely characters. No one could figure out what Phate's paraphrase of Shakespeare might mean. Until Gillette downloaded the picture that was attached to the message. It slowly appeared on the screen.

"Oh, my God," Linda Sanchez muttered, her eyes fixed on the terrible image.

"Son of a bitch," Tony Mott whispered. Stephen Miller said nothing then he looked away. On the screen was a picture of Lara Gibson. She was half naked and lying on a tile floor - in a basement somewhere, it appeared. There were slashes on her body and she was covered with blood. Her dim eyes were gazing hopelessly at the camera. Gillette, sickened by the picture, supposed that it had been taken when she'd had only a few minutes left to live. He - like Stephen Miller - had to turn away. Bishop asked, "That address? [email protected]? Any chance it's real?" Gillette ran his HyperTrace and checked the address.

"Fake," he said, not surprising anyone with this news.

Miller suggested, "The picture - we know Phate's in the area here somewhere. How about if you send troopers to canvass the one-hour photo-processing places? They might recognize it." Before Gillette could respond Patricia Nolan said impatiently, "He's not going to risk taking film to a photo lab. He'll use a digital camera."

Even nontechno Frank Bishop had figured this out.

Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

"So, this isn't any help to us," the detective said.

"Well, it might be," Gillette said. He leaned forward and tapped the screen, indicating the line that was labeled Path. He reminded Bishop about the pathway in e-mail headers, which identified the networks that Phate's message had made its way through to get to the computer server they'd downloaded it from.

"They're just like street directions. The hacker in Bulgaria? Vlast? His path listings were all faked. But this one might be real or at least have some networks that Phate really used to upload the Gibson woman's picture."

Gillette began checking every network listed in the Path heading with HyperTrace. The program revealed that one was legitimate.

"That's the network Phate's computer was actually connected to: newsserve.deluxe.interpost.net." Gillette ordered HyperTrace to dig up more information about the company. In a moment, this popped up on the screen:

Domain Name: Inteppost.net

Registered to: Interpost Europe SA

23443 Grand Palais

Bruges, Belgium

Services: Internet Service Provider, Web hosting, anonymous browsing and remailing.

"It's a chainer," Gillette said, shaking his head. "I'm not surprised." Nolan explained to Bishop why this was discouraging: "It's a service that hides your identity when you send e-mails or post messages."

Gillette continued, "Phate sent the picture to Interpost and their computers stripped out his real return address, added the fake ones in place of his and then sent it on its way."

"We can't trace it?" Bishop asked.

"No," Nolan said. "It's a dead end. That's why Phate didn't bother to write a fake header, the way Vlast did."

"Well," the cop pointed out, "Interpost knows where Phate's computer is. Let's get their phone number, call them up and find out."

The hacker shook his head. "Chainers stay in business because they guarantee that nobody can find out who the sender is, even the police."

"So we're dead in the water," Bishop said.

But Wyatt Gillette said, "Not necessarily. I think we ought to do some more fishing." And he loaded one
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

of his own search engines into the CCU machine.

CHAPTER TWENTY-FOUR

As the computer at the state police's CCU was sending out a request for information about Interpost, Phate sat in the Bay View Motel, a decrepit inn along a sandy stretch of commercial sprawl in Freemont, California, just north of San Jose. Staring at the laptop's monitor, he was following the progress of Gillette's search.

Gillette would of course know that a foreign chainer like Interpost wouldn't give any U.S. cop as much as the courtesy of a reply to a request for a client's identity. So, as Phate had anticipated, Gillette had used a search engine to look for general information about Interpost, in hopes of retrieving something that might let the cops beg or bribe some cooperation from the Belgium Internet service. Within seconds Gillette's search engine had found dozens of sites in which Interpost was mentioned and was shooting their names and addresses back to the CCU computer. But the packets of data that made up this information took a detour - they were diverted to Phate's laptop. Trapdoor then modified the packets to insert its hardworking demon and sent them on their way to CCU. Phate now got this message:

Trapdoor

Link complete

Do you wish to enter subject's computer? Y/N

Phate keyed Y, hit ENTER and a moment later was wandering around inside CCU's system. He typed more commands and began looking through files, reflecting that the cops at CCU had thought that, like some slobbering serial killer, Phate had posted the picture of the dying Gibson woman just to threaten them or to get off on some weird sado-sexual exhibitionist thing. But no, he'd posted the picture as bait - to find the Internet address of the CCU machine. Once he'd uploaded the picture he'd instructed a bot to tell him the address of everybody who'd downloaded it. One of those had been a California state government computer in the western San Jose area - which he'd guessed was the CCU office, even though the domain name suggested it was a tourism organization.

Phate now raced through the police computer, copying information, then he went straight to a folder labeled Personnel Records - Computer Crimes Unit.

The contents were - not surprisingly - encrypted. Phate pulled down a screen window on Trapdoor and clicked on Decrypt. The program went to work to crack the code.

As the hard drive moaned, Phate stood and fetched a Mountain Dew from a cooler sitting on the motel room floor. He stirred in a No-Doz and, sipping the sweet drink, walked to the window, where shafts of brilliant sunlight had momentarily broken through the storm clouds. The flood of jarring light agitated him and he pulled the shade down quickly, then turned back to the muted colors of the computer screen, which were far more pleasing to him than God's palette could ever be.

"We've got him," Gillette announced to the team. "Phate's inside our machine. Let's start the trace."
Generated by ABC Amber LIT Conv
erter, http://www.processtext.com/abclit.html

"All right!" Tony Mott said, offering a deafening whistle of victory. Gillette began HyperTrace and, with faint pings, one by one the route between CCU's computer and Phate's appeared on the screen as a tiny yellow line.

"Our boy's good, whatta you say, boss?" Linda Sanchez offered, nodding an admiring head toward Gillette.

"Looks like he got it right," Bishop said.

Ten minutes before, Gillette had had a thought: that Phate's message was a feint. He decided that the killer had been setting them up like a master MUD player and that he'd posted the picture of Lara not to taunt or threaten them but so he could find out CCU's Internet address and get inside their computer. Gillette had explained this to the team and then added, "And we're going to let him."

"So we can trace him," Bishop said.

"You got it," Gillette confirmed.

Waving a hand at the CCU machines, Stephen Miller protested, "But we can't let him in our system." Gillette said shortly, "I'll transfer out all the real data to backup tapes and load some encrypted files. While he's trying to decrypt them we'll track him down."

Bishop agreed and Gillette had transferred all the sensitive data, like the real personnel files, to tape and replaced them with scrambled files. Then Gillette sent out a search request about Interpost and, when the results came back, the Trapdoor demon came with them.

"It's like he's a rapist," Linda Sanchez said, seeing the folders in their system opening and closing as Phate examined them.

Violation is the crime of the new century

"Come on, come on," Gillette encouraged his HyperTrace program, which was issuing faint sonar pings each time another link in the chain of connection was identified.

Other books

Lawyer Trap by R. J. Jagger
Her Secret Pirate by Gennita Low
Ponies at Owls' Wood by Scilla James
Gardner, John by Licence Renewed(v2.0)[htm]
East of Ashes by Nieuwoudt, Gideon
The Hidden City by Michelle West
When the Starrs Align by Marie Harte
Midnight Jewels by Jayne Ann Krentz
The Cemetery Club (Darcy & Flora Cozy Mystery Book 1) by Blanche Day Manos, Barbara Burgess