jefferey deaver – the blue nowhere


In the 21st century J. Deaver writes some novels based on the ability of men in managing the web. Jeffery Deaver (1950), American journalist, country singer and lawyer, writes mystery-crimenovels. His most popular series features his character Lincoln Rhyme, a quadriplegic detective, and Amelia Sachs. The Bone Collector (1997, made into a film by Phillip Noyce in 1999), The Coffin Dancer (1998), The Empty Chair (2000), The Twelfth Card (2005) are among them. Other titles include The Blue Nowhere (2001) The Bodies Left Behind (2008). The Blue Nowhere is about criminal hackers who call internet blue nowhere. In this novel one of them commits crimes using social engineering and a law enforcement computer crime unit. In this extract an hacker explains polimen some trcks computer criminals use. (The Blue Nowhere, Chapter 12)
Gillette asked Miller, “You ever heard of stenanography?”
The cop shook his head. Tony Mott and Linda Sanchez weren’t familiar with the term either but Patricia Nolan said, “That’s hiding secret data in, say, pictures or sound files you’re sending online. Spy stuff.”
“Right,” Gillette confirmed. “Encrypted data is woven right into the file itself – so that even if somebody intercepts your e-mail and reads it or looks at the picture you’ve sent all they’ll see is an innocent-looking file and not the secret data. Well, that’s what Phate’s Trapdoor software does. Only it doesn’t hide messages in the files – it hides an application.”
“A working program?” Nolan said.
“Yep. Then he sends it on its way to the victim.”
Nolan shook her head. Her pale, doughy face revealed both shock and admiration. Her voice was hushed with awe as she said, “No one’s ever done that before.”
“What’s this software that he sends?” Bishop asked.
“It’s a demon,” Gillette answered, drawing a second diagram to show how Trapdoor worked.
“Demon?” Shelton asked.
“There’s a whole category of software called ‘bots,’” Gillette explained. “Short for ‘robots.’ And that’s just what they are – software robots. Once they’re activated they run completely on their own, without any human input. They can travel from one machine to another, they can reproduce, they can hide, they can communicate with other computers or people, they can kill themselves.”
Gillette continued, “Demons are a type of bot. They sit inside your computer and do things like run the clock and automatically back up files. Scut work. But the Trapdoor demon does something a lot scarier. Once it’s inside your computer it modifies the operating system and, when you go online, it links your computer to Phate’s.”
“And he seizes root,” Bishop said.
“Exactly.”
Notes
Gillette: hacker’s name
Miller: a policeman
Cop: policeman
Stuff: things
Woven: interlaced, knitted
Phate: code name of the hacker; the hacker use PH instead of F
Trapdoor: program to enter computers
Working: operational
doughy: unhealthy
hushed: softened
awe: fear
run: work
input: help
back up: reproduce
Scut : mechanical
Scarier: more frightening
Seizes: take
Root: root access, access to the original computer

Lascia un commento