A computer, in and of itself, is an inert object. Like a projectile, it needs energy to propel it. Young Angelo and the electricity flowing from the overloaded wall socket provided that energy. But engaging in an activity can quickly becomes boring if there is nothing new or thrilling to capture a young, imaginative mind, especially when that activity involves an ultramodern data-crunching machine. Like the projectile, to have meaning the exercise of power must have a purpose, a target. That is where the X Legion came in.
The X Legion, properly pronounced Tenth as in the roman numeral, was a collection of young South and Central American computer geeks who had found each other as they crawled about the World Wide Web in search of fun, adventure, some sort of achievement. In the beginning they played simple games among themselves, games that involved world conquest, or that required each of the participants to amass great wealth by creating virtual stock portfolios. Slowly, and ever so innocently, the members of the X Legion began to break into the computer systems of international companies, not at all unlike those owned or operated by their own fathers. They did this, they told each other, in order to test their growing computer skills and engage in feats that had real and measurable consequences. “We live in a real world,” a legionnaire in Argentina stated one night as they were just beginning to embark upon this new adventure. “So let us see what we can do in that world.”
At first, the targets selected for their raids were chosen by the legionnaires themselves, without any controlling or centralized authority. This, quite naturally, led to arguments as fellow members of their group ridiculed the accomplishments of another if they thought the object of a fellow legionnaire’s attack had been too easy.
“Manipulating the accounts of a Swiss bank must have more meaning,” a Bolivian boy claimed, “than stealing from a local candy store.” Though intelligent and articulate, no one had a clear idea of how best to gauge the relative value of their targets.
To resolve this chaotic state of affairs, a new member who used the screen name “longbow” volunteered to take on the task of generating both the targets to be attacked by the members of the legion and the relative value of those targets. Points for the successful completion of the mission would be awarded to the participants by longbow based upon the security measures that had to be overcome, the creativity that the hacker used in rummaging around in the targeted computer, and the overall cost that the company owning the hacked site ultimately had to pay to correct the problem the legionnaire created. How longbow managed to determine all of this was of no concern to the young men like Angelo who belonged to the legion. Longbow offered them real challenges and order in the otherwise chaotic and shapeless world in which they lived, but did not yet understand.
When they were sure he was not listening, which was rare, the rank and file of the legion discussed their self-appointed leader. It didn’t matter to Angelo and other members of the X Legion that longbow was not from South or Central America. One of the first clues that brought this issue into question was the English and Spanish longbow used. Like all members of the X Legion, longbow switched between the two languages interchangeably. Since so many of the richest and most advanced businesses using the World Wide Web communicated in English, this was all but a necessity. When it came to his use of those languages, it appeared to the well-educated legionnaires that both Spanish and English were second languages to their taskmaster. Everything about longbow’s verbiage was too exact, too perfect, much like the grammar a student would use.
That longbow might be using them for reasons that the young Latin American hackers could not imagine never concerned Angelo. Like his cyber compatriots, his world was one of words, symbols, data, and not people, nationals, and causes. Everything that they saw on their computer screen was merely images, two-dimensional representations. In addition to this self-serving disassociated rationale, there was the fear that longbow, who was an incredible treasure trove of tricks and tools useful to the legion of novice hackers, might take offense if they became too inquisitive about longbow’s origins. The loss of their cyber master would result in anarchy, something these well-off cyber anarchists loathed.
* * *
While the security guards went about their rounds, protecting the young Chilean and his family from the outside world, Angelo was reaching out into that world. As he did each time he received a mission from longbow, Angelo did not concern himself with the “why” governing his specific tasking for the evening. Rather, he simply concentrated on the “how.”
Upon returning from school that afternoon, Angelo had found explicit instructions from longbow on how to break into the computer system of the United States Army Matériel Command in Alexandria, Virginia. This particular system, Angelo found out quickly, handled requests for repair parts and equipment from American military units deployed throughout the world.
The “mission” Angelo had been assigned was to generate a false request, or alter an existing one, so that the requesting unit received repair parts or equipment that was of no earthly use to the unit in the field. Knowing full well that the standards used to judge the success of a mission concerned creativity as well as the cost of the damage inflicted, Angelo took his time in selecting both the target of his attack and the nature of the mischief he would inflict upon it. After several hours of scrolling through hundreds of existing requests, he hit upon one that struck his fancy.
It concerned a requisition that had been forwarded from an Army unit stationed in Kosovo to its parent command located in Germany. The requesting unit, an infantry battalion, had suffered a rash of accidents in recent months because of winter weather and lousy driving by Americans born and raised in states where the only snow anyone ever saw was on TV. Though the human toll had been minimal, the extensive damage to the battalion’s equipment had depleted both its own reserve of on-hand spare parts as well as the stock carried by the forward-support maintenance unit in-country. While not every item on the extensive list of replacement parts was mission essential, some demanded immediate replacement. This earned those components deemed critical both a high priority and special handling. With the commander’s approval, the parts clerk in Kosovo submitted a request, via the Army’s own Internet system, to the division’s main support battalion back in Germany to obtain these mission-essential items.
As was the habit of this particular parts clerk, he had waited until the end of the normal workday before submitting his required list of repair parts. In this way the clerk avoided having to go through the entire routine of entering the system, pulling up the necessary on-screen documents, and filling out all the unit data more than once a day. Though parts that had been designated mission essential and awarded a high priority were supposed to be acted upon as soon as they landed on the desk of the parts clerk, lax supervision at the forward-support unit where the clerk worked permitted personnel in his section to pretty much do things as they saw fit. So it should not have come as a great surprise that the parts clerk in Kosovo chose to pursue the path of least resistance, executing his assigned duties in a manner that was most expedient, for the clerk.
This little quirk left a window of opportunity for someone like Angelo to spoof the United States Army Matériel Command’s computer system. Since the request was initiated in Kosovo and relayed to the forward-support battalion’s parent unit after normal working hours in Kosovo, the personnel in Germany charged with reviewing that request were not at their desks. Those personnel had the responsibility of reviewing all requests from subordinate units to ensure that they were both valid and correct. They then had to make the decision as to whether the request from Kosovo would be filled using on-hand stocks in Germany or forwarding back to Army Matériel Command to be acted upon using Army-wide sources.
Читать дальше