Jerome Preisler - Net Force--Attack Protocol

Здесь есть возможность читать онлайн «Jerome Preisler - Net Force--Attack Protocol» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Год выпуска: 2020, Издательство: Hanover Square Press, Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Net Force--Attack Protocol: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Net Force--Attack Protocol»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

**The bestselling Net Force thriller series, created by Tom Clancy and Steve Pieczenik and written by Jerome Preisler, reveals the invisible battlefield where the war for global dominance is fought.**
The president's new cybersecurity team, Net Force, is up and running. But a political deadlock in Washington makes the young agency dangerously vulnerable to the criminals, terror groups and hostile governments who would use the digital space to advance their destructive goals.
In Central Europe, an unknown enemy mounts a crippling high-tech assault against the organization's military threat-response unit on its home base. The strike casts suspicion on a core member of Net Force, threatening to destroy the cyber defense group from within. But as they race to track down their attackers, the stakes are suddenly ratcheted higher. For a global syndicate of black hat hackers and a newly belligerent Russia are hatching a mysterious, shadowy scheme for world domination...

Net Force--Attack Protocol — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Net Force--Attack Protocol», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

There were about two dozen evidence bags on the dining table. Each showed a serial number and its collector’s name. Each bore a notation about where the evidence was being sent for analysis. Each was marked with a police case number, date, time, item description, and case type. They were organized by destination, with those on the right side of the table marked SFIU —the Sacramento Forensics Identification Unit—in black Sharpie ink. Fewer than half were on the left side of the table and marked NF .

Natasha went for a closer look, motioning for Sherron and Way to come along while Hudson stuck with Bryan in the living room.

“What do you see?” she asked the trainees.

They studied the evidence bags a moment. Over half were transparent plastic. The rest were opaque Faraday, or radio-frequency shielding bags, variously sized nylon pouches lined with metallic fabric to prevent the captured electronic devices inside them from transmitting or receiving Wi-Fi, Bluetooth, or satellite signals.

Sherron read the descriptions on the Faradays. “They’re ours,” she said. “Two phones...a tablet...three laptops. A few Jumpdrives.”

“That was quick,” Natasha said. “Again, what do you see?”

Sherron did not miss her abrupt tone. She shifted her attention from the Faradays to the clear plastic bags earmarked for the SFIU.

After a long moment, her eyebrows came up.

“Eew,” she said. “Gross.”

Unseen, Michaels smiled a little. In his white-paper evaluation of the botched Shasta Dam hacker prosecution, the piece of digital evidence Emily had just noticed was one of several to largely slip past investigators.

“What do you see?”

Sherron’s cheeks reddened. “A rubber vagina,” she said. “A sex toy.”

“Not exactly realistic,” Way said under his breath.

Natasha gave him a sharp look. “You’re sure?”

Way cleared his throat.

Natasha faced him another moment, then turned back to Sherron. “Okay,” she said. “What caught your eye about it? Creepiness aside?”

Sherron lifted the bag off the table between her thumb and forefinger, using them like tweezers.

“There are power and Wi-Fi switches,” she said. “It’s intelligent.”

Interactive suits me better. But you’re correct,” Natasha said and paused. “Mr. Way...what can an IoT pocket pussy tell us about its user?”

More throat clearing. “Well, he’d use it for webcam sex.”

“How? Be specific.”

“The guy would log in to a chat room—one with a live model—and give her its password. So she can control its, uh, actions during their session. While she talks dirty to him. Or, you know, does things like...”

“I know,” Natasha said. “Emily? Anything else?”

“The sessions aren’t free,” she said. “He would pay for them with a credit card or cryptocurrency. Either method is traceable, even if he’s using an alias or counterfeit plastic.”

“We can also find out when he was online. What times. And for how long,” Way said. He was plainly angling for redemption. “That would put him at the computer, and here in the house, during certain periods that might coincide with other information we have on him.”

“Also,” Emily said, “I think the model could have information to share.”

“Again...s pecifically .”

“Say he has loose lips. He might have blurted something out while he was getting a virtual f—”

Michaels turned back toward the living room. Natasha’s group was fine. He wanted to see how things were going with Bryan’s trainee.

The Hudson kid hadn’t been an outstanding student by most academic standards. He didn’t shoehorn easily into conventional measures of intelligence or do well on standardized tests. But he tried hard and showed good instincts, a doggedness that reminded Michaels of Leo Harris. He was rooting for him to succeed.

He drifted into the room just as Bry and the kid were entering from a connecting hallway. They stopped near the open front door, where the crime-scene techs were filtering out of the cottage to their van. Michaels could hear their evidence trolleys rolling and clattering over the lawn path.

“They’re done,” Bryan said to the kid. “Taking off. And they missed something big.”

“Do we know what it is?”

Bryan shrugged. “ I know,” he said. “But I’ve been to this scene, like, twelve times. It’s you that counts.”

Hudson looked around. The room was almost bare. Cleared of everything but a sofa, some chairs, and a coffee table. He seemed stumped.

“Want a tip?” Bryan asked.

“I sure won’t say no to one.”

Bryan stood next to him. “Be Gumby. Not a Blockhead.”

Hudson’s face was confused.

“Obscure cartoons-on-cable reference, sorry,” Bryan said. “The thing’s to be flexible. Don’t zero in. Just soak up what you see.”

Hudson looked around some more. Rubbed the back of his neck. Then looked around again, his eyes wandering the room. After a minute, he stepped toward the front wall. There was a smart thermostat about five feet to the right of the door. It was small and round with a digital LED window.

Michaels followed him over to the thermostat. It was two minutes before he got the call.

“Wow,” the kid said. “Smart therms work on adaptive learning. They have all kinds of sensors for reading the environment. Like near-and far-field motion detectors that record when somebody’s home. And when the place is empty.”

Bryan nodded. “What else?”

“Ambient-light sensors. They measure electric-light usage in the house and link on/off patterns to people’s everyday routines. Say, when they wake up and go to sleep.” Hudson thought for a second. “Don’t they use Wi-Fi and cellular signals to communicate with people’s devices? So they can adjust the temperature settings remotely?”

Bryan nodded again. “Tell me why that’s important.”

“When two devices communicate, you never know exactly what incidental data’s exchanged. It’s like a stream picking up sand and depositing it somewhere else. There might be info on the therm’s microprocessor that can help us.” He paused. “The hackers didn’t own this cottage, right?”

“It’s an Airbnb rental,” Bryan said. “How does it matter?”

The kid shrugged. “I just can’t see them bothering to download a thermostat-control app on their phones. They had other things on their minds.”

Bryan looked at him.

“So?” he said. “Think.”

He thought. Michaels waited. Hudson was within a hair’s breadth of finding another of the original case probe’s fatal omissions.

The kid stood there thinking ten seconds longer. Then his eyes lit up.

“IoT devices have hidden internet ports,” he said. “They send data back to their manufacturers without users ever knowing it. Then add it to information from other users’ thermostats or whatever device it might be. That’s how they aggregate data about their customers. Put it all together and turn it into metadata. They use it for product development, ad campaigns...”

He suddenly fell silent.

“Did somebody push Pause?” Bryan asked.

The kid frowned. “It just came to me. If I can figure all this out, wouldn’t the hackers have thought of it? And disabled the ports?”

Bryan shook his head a little. Doubtfully rather than dismissively.

“These ports are hard-coded,” he said. “They would have had to rework the thermostat’s whole operating system.”

“How about deleting the information from the manufacturer’s computers?”

“Not easy. Most companies use cloud storage.”

The kid shrugged again.

“They breached the controls of one of this country’s major dams.”

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Net Force--Attack Protocol»

Представляем Вашему вниманию похожие книги на «Net Force--Attack Protocol» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Net Force--Attack Protocol»

Обсуждение, отзывы о книге «Net Force--Attack Protocol» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x