Terminal Compromise - LightNovelsOnl.com
You're reading novel online at LightNovelsOnl.com. Please use the follow button to get notifications about your favorite novels and its latest chapters so you can come back anytime and won't miss anything.
"Ah, I think it would be . . .ah better . . .if we spoke . . .at . . ."
"How about the same place?" Scott offered.
"OK," Hugh was hesitant. "I guess so . . .when?"
"Whenever you want. No pressure." Scott released the tension.
"I get off at 5, how about . . .?"
"I'll be there."
"Yes ma'am. This is Scott Mason. I'm a reporter for the Times.
I will only take a few seconds of his time. Is he in?" Scott used his kiss-the-secretary's-a.s.s voice. Better then being aggressive unless it was warranted.
"I'll check, Mr. Mason," she said. The phone went on hold.
After a very few seconds, the Muzak was replaced with a gruff male voice.
"Mr. Mason? I'm Francis MacMillan. How may I help you?" He conveyed self a.s.suredness, vitality and defensiveness.
"I won't take a moment, sir." Scott actually took several sec- onds to make sure his question would be formed accurately. He probably only had one chance. "We have been researching an article on fraudulent investment practices on the part of various banks; some fall out from the S&L mess." He paused for effect.
"At any rate, we have received information that accuses First State of defrauding it's investors. In particular, we have records that show a complicated set of financial maneuvers that are designed to drain hundreds of millions of dollars from the a.s.sets of First State. Do you have any comment?"
Total silence. The quality of fiber phone lines made the silence all the more deafening.
"If you would like some specifics, sir, I can provide them to you," Scott said adding salt to the wound. "In many cases, sir, you are named as the person responsible for these activities. We have the doc.u.ments and witnesses. Again, we would like a comment before we go to print."
Again Scott was met with silence. Last try.
"Lastly, Mr. MacMillan, we have evidence that your bank's comput- ers have been invaded by hackers who can alter the financial posture of First State. If I may say so, the evidence is quite d.a.m.ning." Scott decided not to ask for a comment directly. The question was no longer rhetorical, it was implicit.
If feelings could be transmitted over phone wires, Scott heard MacMillan's nerve endings commence a primal scream. The phone explosively hung up on Scott.
Thursday, December 3 First State Bank, New York
Francis MacMillan, President of First State Savings and Loan, bellowed at the top of his lungs. Three Vice Presidents were in his office before 7:00 A.M.
"Who the f.u.c.k's in charge of making sure the d.a.m.ned computers are safe?"
The V.P. of Data processing replied. "It's Jeanne Fineman, sir."
"Fire him."
"Jeanne is a woman . . ."
"Fire them both. I want them out of here in 10 minutes." McMil- lan's virulent intensity gave his aides no room for dissent.
"Sir, why, it's almost Christmas, and it wasn't her fault . . ."
"And no bonus. Make sure they never work near banks, or comput- ers ever again! Got that?" Everyone nodded in shock.
"Al?" McMillan shouted. "Buy back our stock, quietly. When the market hears this we're in for a dump. No one will believe us when we respond, and it will take us a day to get out an answer."
"How much?" Al Shapiro asked.
"You figure it out. Just keep it calm." Shapiro noted it agree- ably.
"Where the h.e.l.l are the lawyers? I want that pinko-f.a.ggot news- paper stopped by tonight." McMillan's rage presaged a very, very bad day at First State.
"And someone, someone, find me that s.h.i.+t hole worm Sidneys. I want him in my office in 30 seconds. Now," he violently thrust his arms in the air, "get the h.e.l.l out of here until you have some good news."
Friday, December 4
RUN ON FIRST STATE AS IT STALLS ON OWN BAILOUT by Scott Mason
Since yesterday afternoon, First State Savings and Loan has been in a.s.set-salvation mode. Upon reports that computer hackers have had access to First State's computers and records for some time, and can change their contents at will, the stock market reacted negatively by a sell-off. In the first 15 minutes of trading, First State's stock plummeted from 48 1/2 to 26 1/4, a reduction of one half its value. Subsequently, the stock moved up with block buying. At the noon bell, the stock had risen modestly to 31. It is a.s.sumed that First State itself is repurchasing their own stock in an attempt to bolster market confidence.
However, at 2:00PM, First State contacted banking officials in New York and Was.h.i.+ngton, as well as the SEC, to announce that a rush of worried depositors had drained the bank of it's available hard currency reserves, and would close until the following morning when cash transfers would permit the bank to continue payments.
Last quarter cash holding were reported in excess of $3 Billion, and First State has acknowledged that any and all monies would be available to those who desired it. In a press release issued by First State at 1:00 PM they said, "A minor compromise of our computers has caused no discernible damage to the computers, our customers or the bank. A thorough investigation has determined that the hacker was either a figment of the imagination of a local paper or was based upon unfounded hearsay. The bank's attorneys are reviewing their options."
The combination of the two announcements only further depressed First State stock. It stood at 18 7/8 when the SEC blocked further trading.
This is Scott Mason, who reported the news as he saw it. Accu- rately.
Chapter 15
Sunday, December 6 Was.h.i.+ngton, D.C.
Miles Foster was busy at one of the several computers in his Was.h.i.+ngton, D.C. condo. It was necessary, on a daily basis, to stay in contact with a vast group of people who were executing portions of his master plan. He thought it was going quite well, exceedingly so in fact. Spread over 3 continents he remote controlled engineers and programmers who designed methods to compromise computers. With his guidance, though. He broke them into several groups, and none of them knew they were part of a much larger organization, nor did they have any idea of their ultimate objective.
Each of his computer criminals was recruited by Alex; that's the only name that Miles knew. Alex. Miles had drawn up a list of minimum qualifications for his 'staff'. He forwarded them to h.o.m.osoto, who, Miles guessed, pa.s.sed them on to the ubiquitous yet invisible Alex. That obviously wasn't his real name, but suitable for conversation.
Miles had developed a profile of the various talents he required.
One group needed to have excellent programming skills, with a broad range of expertise in operating systems. An operating system is much like English or any other language. It is the O/S that allows the computer to execute its commands. Unless the computer understands the O/S, the computer is deaf dumb and blind. As a child learns to communicate, a computer is imbued with the basic knowledge to permit it to function. It is still essentially stupid, that is, it can't do anything on its own without instructions, but it can understand them when they are given.
In order to violate a computer, a thorough understanding of the O/S, or language of the computer is a must. Good programmers learn the most efficient way to get a computer to perform the desired task. There are, as in any field, tricks of the trade.
Through experience, a programmer will learn how to fool the computer into doing things it might not be designed to do. By taking advantage of the features of the Operating System, many of them unknown and therefore undoc.u.mented by the original designers of the O/S, a computer programmer is able to extract additional performance from the equipment.
Similarly, though, such knowledge allows the motivated programmer to bypa.s.s critical portions of the Operating System to perform specific jobs and to circ.u.mvent any security measures that may be present. For example, in most of the 85,000,000 or so DOS com- puters in the world, it is common knowledge that when you ERASE a file, you really don't erase it. You merely erase the NAME of the file. If a secretary was told to dispose of doc.u.ment from a file cabinet, and she only removed the name of each file, but left the contents remaining in the file drawers, she would cer- tainly have reason to worry for her job. Such is an example of one of the countless security holes that permeate computer land.
To take advantage of such glaring omissions, several software companies were formed that allowed users to retrieve 'erased'