Douglas Preston - Gideon’s Sword

Здесь есть возможность читать онлайн «Douglas Preston - Gideon’s Sword» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: New York, Год выпуска: 2011, ISBN: 2011, Издательство: Grand Central Publishing, Жанр: Триллер, Фантастика и фэнтези, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Gideon’s Sword: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Gideon’s Sword»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Introducing Gideon Crew: trickster, prodigy, master thief.
At twelve, Gideon Crew witnessed his father, a world-class mathematician, accused of treason and gunned down. At twenty-four, summoned to his dying mother's bedside, Gideon learned the truth: his father was framed and deliberately slaughtered. With her last breath, she begged her son to avenge him.
Now, with a new purpose in his life, Gideon crafts a one-time mission of vengeance, aimed at the perpetrator of his father's destruction. His plan is meticulous, spectacular, and successful.
But from the shadows, someone is watching. A very powerful someone, who is impressed by Gideon's special skills. Someone who has need of just such a renegade. For Gideon, this operation may be only the beginning…

Gideon’s Sword — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Gideon’s Sword», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

A pause. “I’m not sure I can give you that.”

“You may not realize this, but in the case of network resets the passphrase is automatically changed, so you’re allowed to release the passphrase internally to IT. If you feel uncomfortable with that, sir, I understand, but then I’ll have to call the NSA for a passphrase override, I’m really sorry—”

“All right, Hopkins. I wasn’t aware of that regulation.” He gave Gideon the passphrase and ID. Gideon jotted it down.

After a moment, with huge relief in his voice, Gideon said: “Whew. That reset did it, sir. Apparently, it was just a hung screen. No security breach. You’re good to go.”

“Excellent.”

Gideon depressed the key and turned to the receptionist. “Sorry to bother you,” he said, handing her the receiver. “Everything’s straightened out.” He walked briskly out of the building to the waiting car.

Thirty minutes later he was back in his motel room, stretched out on the bed, laptop connected to an unsecured computer in the bowels of the General Services Administration that he’d remotely hijacked. He had chosen to target the GSA — the vast government bureaucracy that handles supplies, equipment, procedures, and the like — because he knew it would be a relatively easy mark, and yet one still within the government security perimeter.

Hopkins had explained—​unwittingly, of course—​​that the INSCOM archive could only send documents to previously authorized IP addresses, and unfortunately most of those were also inside classified perimeters…except for one: the National Security Archives at George Washington University. This private archive, the largest in the world outside the Library of Congress, collected vast amounts of government documents, including virtually everything being routinely declassified as part of the Mandatory Declassification Review: the government’s program for declassifying documents under several laws requiring them to do so. A veritable Amazon of information flowed into this archive on a daily basis.

Via the GSA computer, Gideon sent an automated request to the INSCOM secure archive at George Washington via port 6151, directing that a PDF file of a certain classified document be transmitted out through the same port, authorized via General Shorthouse’s passphrase, to be added to a routine dump of Cold War declassified documents headed for the National Security Archives daily batch files. The file was duly transmitted; it passed through the firewall at the sole authorized port, where the passphrase was examined and approved; and the document was subsequently routed to George Washington University and stored with millions of others in one of the archive databases.

Thus, Gideon had successfully arranged for the erroneous declassification of a classified document and hid it within a huge stream of data leaving the secure government perimeter. Now all that remained was to retrieve the document.

The next morning, at around eleven, a certain rumpled yet undeniably charming visiting professor by the name of Irwin Beauchamp, dressed in tweeds, mismatched corduroys, beaten-up wing tips, and a knitted tie (thirty-two dollars; Salvation Army) entered the Gelman Library at George Washington University and requested a slew of documents. His identity was not yet in the system and he had lost his temporary library card, but a kindly secretary took pity on the scatterbrained fellow and allowed him access to the system. Half an hour later, Beauchamp departed the building with a slender manila folder under his arm.

Back in the motel, Gideon Crew spread out the papers from the folder with a trembling hand. The moment of truth had arrived — the truth that would make him either free, or merely more miserable.

6

A Critique of the Thresher Discrete Logarithm Encryption Standard EVP-4: A Theoretical Back-Door Cryptanalysis Attack Strategy Using a Group of φ-Torsion Points of an Elliptic Curve in Characteristic φ.

Gideon Crew had studied plenty of advanced mathematics in college and, later, at MIT, but the math in this paper was still way over his head. Nevertheless, he understood enough to realize what he had in his hands was the smoking gun. This was the memo his father had written to critique Thresher, the memo his mother said had been destroyed. Yet it hadn’t been. Most likely, the bastard responsible — believing it too difficult or risky to destroy the document outright — had stuck it into an archive he believed would never be declassified. After all, what American general in the era of the Berlin Wall would have believed the Cold War could ever end?

He continued reading, heart racing, until, finally, he came to the final paragraphs. They were written in the dry language of science-speak, but what they said was pure dynamite.

In conclusion, it is the author’s opinion that the proposed Thresher Encryption Standard EVP-4, based on the theory of discrete logarithms, is flawed. The author has demonstrated that there exists a potential class of algorithms, based on the theory of elliptic functions defined over the complex numbers, which can solve certain discrete logarithm functions in real-time computing parameters. While the author has been as yet unable to identify specific algorithms, he has demonstrated herein that it is possible to do so.

The proposed Thresher standard is therefore vulnerable. If this standard is adopted, the author believes that, given the high quality of Soviet mathematical research, codes developed from this standard could be broken within a relatively short period of time.

The author strongly recommends that Thresher Encryption Standard EVP-4 not be adopted in its current form.

That was it. Proof that his father had been framed. And then murdered. Gideon Crew already knew all about the man who had done it: Lieutenant General (ret.) Chamblee S. Tucker, currently CEO of Tucker and Associates, one of the high-profile defense industry lobbying firms on K Street. They represented many of the country’s largest defense contractors, and Tucker had leveraged himself to the hilt in order to finance the firm. He was raking in huge bucks, but they managed to go right back out the door thanks to his extravagant lifestyle.

By itself, this document meant little. Gideon knew that anything could be counterfeited — or be claimed to have been counterfeited. The document wasn’t an endpoint; it was a starting point for the little surprise he had planned for Chamblee S. Tucker.

Using the remote computer he had previously hijacked at the General Services Administration, Gideon stripped the document of its classification watermarks and sent it to a dozen large computer databases worldwide. Having thus secured the document from destruction, he sent an e-mail directly from his own computer to chamblee.tucker@tuckerandassociates.com with the document as an attachment. The covering e-mail read:

General Tucker:

I know what you did. I know why you did it. I know how you did it.

On Monday, I’m sending the attached file to various correspondents at the Post, Times, AP, and network news channels — with an explanation.

Have a nice weekend.

Gideon Crew

7

Chamblee S. Tucker sat behind an enormous desk in the oak-paneled study of his house in McLean, Virginia, thoughtfully hefting a four-pound Murano glass paperweight in one hand. At seventy years old, he was fit for his age and proud of it.

He shifted the paperweight to the other hand, pressed it a few times.

A knock came at the door.

“Come in.” He set the paperweight down with exquisite care.

Charles Dajkovic entered the study. He was in civilian clothes, but his bearing and physique shouted military : whitewall haircut, massive neck, ramrod posture, steely blue eyes. A grizzled, close-clipped mustache was his only concession to civilian life.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Gideon’s Sword»

Представляем Вашему вниманию похожие книги на «Gideon’s Sword» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Douglas Preston - The Obsidian Chamber
Douglas Preston
Douglas Preston - Crimson Shore
Douglas Preston
libcat.ru: книга без обложки
Douglas Preston
Douglas Preston - Riptide
Douglas Preston
Douglas Preston - Brimstone
Douglas Preston
Douglas Preston - Still Life With Crows
Douglas Preston
Douglas Preston - Impact
Douglas Preston
Douglas Preston - Extraction
Douglas Preston
Douglas Preston - Gideon's Corpse
Douglas Preston
Douglas Preston - Cold Vengeance
Douglas Preston
Отзывы о книге «Gideon’s Sword»

Обсуждение, отзывы о книге «Gideon’s Sword» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x