Выбрать главу

<What should we make of Frans Balder’s artificial intelligence?>

Chapter 5

20. xi

The words blinked onto the computer screen:

<Mission accomplished!>

Plague gave a hoarse, almost deranged yell, and that may have been unwise. But even if the neighbours had happened to hear, they could not have dreamed what it was about. Plague’s home was not an obvious setting for high-level international security coups.

It felt more like a place where a social welfare case might hang out. Plague lived on Högklintavägen in Sundbyberg, a markedly unglamorous area with dull, four-storey, faded brick houses, and the apartment itself had nothing much going for it. It had a sour, stale smell, and his desk was covered in all sorts of rubbish, McDonald’s containers and Coca-Cola cans, crumpled-up pages from notebooks, unwashed coffee cups and empty sweet packets. Even though some had actually made it into the wastepaper basket — which had not been emptied for weeks — you could hardly take a step in the room without getting crumbs or grit under your feet. But none of this would have surprised anyone who knew him.

Plague was not a man who normally showered or changed his clothes much. He spent his whole life in front of the computer, even when he was not working: a giant of a man and overweight, bloated and unkempt, with an attempt at an imperial beard that had long since turned into a shapeless thicket. His posture was dreadful and he had a habit of groaning when he moved. But the man had other talents.

He was a wizard on the computer, a hacker who flew unconstrained through cyberspace and was probably second only to one person in the field, a woman in this particular case. The mere sight of his fingers dancing across the keyboard was a joy to behold. He was as light and nimble on the net as he was heavy and clumsy in the other, more material world, and as a neighbour somewhere upstairs, presumably Herr Jansson, now banged on the floor, he answered the message he had received:

<Wasp, you bloody genius. They ought to put up a statue to you!>

Then he leaned back with a delighted smile and tried to run through in his mind the sequence of events, savouring the triumph for a little while longer before going on to pump Wasp for every detail, and to ensure that she had covered her tracks. No-one must be able to trace them, no-one!

This was not the first time they had been messing with a powerful organization. But this was on a new level, and many in Hacker Republic, the exclusive fellowship to which she belonged, had actually been against the idea, Wasp herself most of all. Wasp could take on just about any authority or person you could care to name, if it were necessary. But she did not like to pick a fight for its own sake.

She disliked that sort of childish hacker nonsense. She was not someone who hacked into supercomputers merely to show off. Wasp wanted to have a clear objective, and she always damn well analyzed the potential consequences. She weighed long-term risks against whatever need was being satisfied in the short-term, and from that point of view it could not be said it made sense to hack into the N.S.A. Still, she let herself be talked into it. Nobody could quite understand why.

Maybe she was bored and wanted to stir up a little chaos so as not to die of tedium. Or else, as some in the group claimed, she was already in conflict with the N.S.A. and therefore the breach amounted to little more than her personal revenge. But others in the group questioned even that and maintained she was looking for information, that she had been on the hunt for something ever since her father, Alexander Zalachenko, had been murdered at Sahlgrenska hospital in Göteborg.

But nobody knew for sure. Wasp had always had her secrets and actually her motives were unimportant, or so they tried to persuade themselves. If she was prepared to help then they should just accept gratefully and not worry about the fact that, to begin with, she had not shown much enthusiasm, or hardly any feelings at all in fact. At least she was no longer being awkward about it, and that seemed as much as anyone could hope for.

They knew better than most that the N.S.A. had outrageously overstepped its boundaries in recent years. These days the organization did not confine itself to eavesdropping on terrorists and potential security risks, or even just foreign heads of state and other powerful figures, but listened in on everything, or nearly everything. Millions, billions, trillions of communications and activities on the net were spied on and archived, and with each passing day the N.S.A. went further and further and pried deeper and deeper into every private life, and had become one immeasurable, watchful, evil eye.

It was true that nobody in Hacker Republic could claim the moral high ground here. Every single one of them had made their way into parts of the digital landscape where they had no business being. Those were the rules of the game, so to speak. A hacker was someone who crossed the line, for better or for worse, someone who by virtue of their occupation broke rules and broadened the frontiers of their knowledge, without always being concerned about the distinction between private and public.

But they were not without ethics and above all they knew, also from their own experience, how power corrupts, especially power without control. None of them liked the thought that the worst, most unscrupulous hacking was no longer carried out by solitary rebels or outlaws, but by state behemoths who wanted to control their populations. Plague and Trinity and Bob the Dog and Flipper and Zod and Cat and the whole Hacker Republic gang had therefore decided to strike back by hacking the N.S.A. and messing with them in one way or another.

That was no simple task. It was a little bit like stealing the gold from Fort Knox, and like the arrogant idiots they were they did not content themselves with breaking into the system. They also wanted superuser status, or “Root” in Linux language, and for that they needed to find unknown vulnerabilities in the system, for what was called a Zero-day attack — first on the N.S.A.’s server platform and then further into the organization’s intranet, NSANet, from which the authority’s signals surveillance went out across the world.

They began as usual with a little social engineering. They had to get hold of the names of systems administrators and infrastructure analysts who held the complex passwords for the intranet. It would not do any harm either if there was a chance that some careless oaf was being negligent about security routines. In fact through their own contacts they came up with four or five names, among them a Richard Fuller.

Fuller worked in the N.I.S.I.R.T., the N.S.A. Information Systems Incident Response Team, which supervised the intranet, and he was constantly on the lookout for leaks and infiltrators. Fuller was a decent sort of fellow — a Harvard law graduate, Republican, former quarterback, a dream patriot if one were to believe his C.V. But through a former lover Bob the Dog managed to discover that he was also bipolar, and possibly a cocaine addict.

When he got excited he would do all sorts of stupid things, such as opening files and documents without first putting them in a so-called sandbox, a required security protocol. Furthermore he was very handsome, though a little smarmy, and someone, probably Bob the Dog himself, came up with the idea that Wasp should travel to his home town in Baltimore, go to bed with him and catch him in a honey trap.

Wasp told them all to go to hell.

She also rejected their next idea, that they would compile a document containing information which looked like dynamite, specifically about infiltrators and leaks at head office in Fort Meade. This would then be infected with malware containing an advanced Trojan with a high level of originality which Plague and Wasp were to develop. The plan was to put out leads on the net which would lure Fuller to the file, and with a bit of luck get him so worked up that he would be careless with security. Not a bad plan at all — it could take them into the N.S.A.’s computer system without an active breach that might be traceable.