Steve Martini - Double Tap
Здесь есть возможность читать онлайн «Steve Martini - Double Tap» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Год выпуска: 2014, ISBN: 2014, Издательство: Jove, Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Double Tap
- Автор:
- Издательство:Jove
- Жанр:
- Год:2014
- ISBN:9781101550229
- Рейтинг книги:4 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 80
- 1
- 2
- 3
- 4
- 5
Double Tap: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Double Tap»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
Double Tap — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Double Tap», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
“No,” he says.
“Let me finish.” He allows me to repeat the entire question while the jury considers his self-righteous stance.
“Is it not possible, sir, given your lack of verifiable information and your preconceived notions,” I add, “that your photographs and that video of Mr. Ruiz taken during what you call an investigation are just as deceptive, just as erroneous, and just as misleading as you claim that news photograph is of you and the victim in Italy?”
“No.”
“And how do you know that?”
He sits on the stand, silent, unable to come up with an answer that isn’t the product of conjecture and assumption. Rufus is a regimented soul. All that mattered to him was that Ruiz had violated his instructions to stay away from Madelyn Chapman. He never bothered to confront Ruiz and ask him what he was doing. In the end the police arrested Emiliano, seized the tape and the photographs, and used them to jump to conclusions.
“I have no further use for this witness.” I turn and leave him sitting on the stand.
CHAPTER TWENTY-NINE
Ihave no illusions: My performance with Rufus on cross-examination may have looked good to the audience, but it is likely to have produced more flash than effect when the jury finally locks itself behind closed doors for deliberations.
There is no discounting the fact that the video and photos taken of Ruiz by Rufus were compiled over a period of nearly two weeks. They show a pattern of conduct on the part of the defendant that is entirely consistent with the state’s theory of the case. No matter the tune or the dance as regards mistaken impressions, the contents of the video-the fact that Ruiz was seen surveilling the victim with a pair of field glasses-will not be lost on the jury, especially after this is hammered home by Templeton in his closing argument.
The indisputable fact is that without putting Ruiz on the stand, there is no way that we can explain what he was doing watching Madelyn Chapman. And putting Ruiz on the stand would be like lighting a torch to find your way through a dark powder magazine. Even assuming that the jury would believe him, without knowing what secrets lurk in his background, putting Emiliano up for Templeton to take a shot at is not something I would choose to do. Though the final decision as to whether to testify rests with the defendant, it is not something I can recommend to him. I am fearful that Templeton would take him apart on the stand, especially given Emiliano’s death wish in lieu of life without parole.
Tonight I am huddled over the keyboard of the desktop in my study, doing a Google search online to learn how my computer works.
I am taking Jim Kaprosky’s advice, checking out the nature of spyware and looking for the two items that he mentioned during my visit to his house last night. When I got to the car I scrawled the words mirror software and looking glass on the back of one of my business cards. Tonight the note is sitting on my desk next to the keyboard.
When Harold Klepp mentioned the word spyware that night at the bar, I thought he was using shorthand to describe Chapman’s Primis package, high-level security software intended to allow the government to plumb the depths of personal information. I was wrong. Klepp may have been out of the loop at Isotenics, but he was hearing things from someone closer to the center of the action.
Chapman had been overheard using the term spyware during her argument on the phone with Gerald Satz. Klepp got the word right but, like me, he didn’t understand the context, the fact that the word was being used in the technical sense: as a term of art, not to describe Primis, but something else.
According to the articles online, adware is a computer term used to describe small bits of what is known as “execution programming.” These are used by commercial firms to track information whenever a computer user goes online and visits certain sites. Shop for a pair of running shoes online, and the next thing you know you’ll be getting pop-up screens trying to peddle everything for the foot, from sneakers to slippers. Chances are one or more of the sites you have visited has just attached bits of adware to the hard drive of your computer.
If you have a pop-up blocker-unless you run one or more scanning programs to search out and remove the adware-you’ll never know it is happening, except that over time your machine will slow down as it loads up on the small bits and pieces. Most of it is harmless, though some can transmit viruses, worms, and other odious items that can kill your computer.
From the digital handshake of surfing the Web, you can also pick up the insidious little devil known as spyware. Generally this is a more sophisticated version of looking-over-your-shoulder as you shop. Spyware usually sends more detailed information to the vendor who planted it online. It is designed to track your shopping habits. According to the information, some of it is so sufficiently sophisticated that it can hunt out your mailing address and fill your mailbox with junk mail.
I do a search for the terms mirror software and looking glass . I score pages of hits, including a firm that produces medical software and a project by a large commercial software manufacturer. But none of these are what I am looking for.
Unless I misunderstood him, Jim Kaprosky was not talking about proprietary software manufactured by a private company. He was talking about the software equivalent of aviation’s spy-style Skunk Works, an operation buried in the dark tunnels of government that somehow has crafted a way to tap into home and office computers, anything online, and gather private data so that it can be processed through Primis.
If this is true, it would allow the government to monitor patterns of conduct and individual activity at a depth and in detail that is mind-numbing.
Given the ever-increasing grasp of central governments around the world, the threat of mischief or worse posed by such technology is daunting. True, it could be used to thwart terrorism. But, unchecked and unseen, it could just as easily give rise to tyranny. Private information on a global scale could be used to chill political speech at a monumental level. In the hands of the unscrupulous, it could be harnessed to extort any number of favors from individuals in public office or those who control the economic throttle and pull the levers that make the world go around.
If information is power, access to personal digitized data in a form that is raw and unrestricted-coupled with processing software allowing oceans of it to be mined at the speed of light-is an open and engraved invitation to despotism.
Sitting in the blue haze emitted from the monitor in my darkened study, I am scrolling down the screen when my eye catches something. It’s a tagline near the bottom of the page, a single news item from one of the wire services. In the second line of the description is the abbreviation NSA . I pull it up.
The article is brief and two years old. According to the wire-service story, a spokesman for the National Security Agency has denied reports that his agency has pioneered a computer bug known as “looking glass,” software designed to track and transmit large volumes of digital data in highly compressed microbursts. According to the initial reports, which have now been denied, the software was believed to be intended for use in foreign intelligence gathering and engineered in a form that would be virtually invisible except to the most sophisticated scanning devices.
I print the article out and scroll on. There are two more articles. When I try to pull them up, I find that both have either expired or been removed from the Internet.
Читать дальшеИнтервал:
Закладка:
Похожие книги на «Double Tap»
Представляем Вашему вниманию похожие книги на «Double Tap» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Double Tap» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.