Then he leaned back with a delighted smile and tried to run through in his mind the sequence of events, savouring the triumph for a little while longer before going on to pump Wasp for every detail, and to ensure that she had covered her tracks. No-one must be able to trace them, no-one!
This was not the first time they had been messing with a powerful organization. But this was on a new level, and many in Hacker Republic, the exclusive fellowship to which she belonged, had actually been against the idea, Wasp herself most of all. Wasp could take on just about any authority or person you could care to name, if it were necessary. But she did not like to pick a fight for its own sake.
She disliked that sort of childish hacker nonsense. She was not someone who hacked into supercomputers merely to show off. Wasp wanted to have a clear objective, and she always damn well analyzed the potential consequences. She weighed long-term risks against whatever need was being satisfied in the short-term, and from that point of view it could not be said it made sense to hack into the N.S.A. Still, she let herself be talked into it. Nobody could quite understand why.
Maybe she was bored and wanted to stir up a little chaos so as not to die of tedium. Or else, as some in the group claimed, she was already in conflict with the N.S.A. and therefore the breach amounted to little more than her personal revenge. But others in the group questioned even that and maintained she was looking for information, that she had been on the hunt for something ever since her father, Alexander Zalachenko, had been murdered at Sahlgrenska hospital in Göteborg.
But nobody knew for sure. Wasp had always had her secrets and actually her motives were unimportant, or so they tried to persuade themselves. If she was prepared to help then they should just accept gratefully and not worry about the fact that, to begin with, she had not shown much enthusiasm, or hardly any feelings at all in fact. At least she was no longer being awkward about it, and that seemed as much as anyone could hope for.
They knew better than most that the N.S.A. had outrageously overstepped its boundaries in recent years. These days the organization did not confine itself to eavesdropping on terrorists and potential security risks, or even just foreign heads of state and other powerful figures, but listened in on everything, or nearly everything. Millions, billions, trillions of communications and activities on the net were spied on and archived, and with each passing day the N.S.A. went further and further and pried deeper and deeper into every private life, and had become one immeasurable, watchful, evil eye.
It was true that nobody in Hacker Republic could claim the moral high ground here. Every single one of them had made their way into parts of the digital landscape where they had no business being. Those were the rules of the game, so to speak. A hacker was someone who crossed the line, for better or for worse, someone who by virtue of their occupation broke rules and broadened the frontiers of their knowledge, without always being concerned about the distinction between private and public.
But they were not without ethics and above all they knew, also from their own experience, how power corrupts, especially power without control. None of them liked the thought that the worst, most unscrupulous hacking was no longer carried out by solitary rebels or outlaws, but by state behemoths who wanted to control their populations. Plague and Trinity and Bob the Dog and Flipper and Zod and Cat and the whole Hacker Republic gang had therefore decided to strike back by hacking the N.S.A. and messing with them in one way or another.
That was no simple task. It was a little bit like stealing the gold from Fort Knox, and like the arrogant idiots they were they did not content themselves with breaking into the system. They also wanted superuser status, or “Root” in Linux language, and for that they needed to find unknown vulnerabilities in the system, for what was called a Zero-day attack — first on the N.S.A.’s server platform and then further into the organization’s intranet, NSANet, from which the authority’s signals surveillance went out across the world.
They began as usual with a little social engineering. They had to get hold of the names of systems administrators and infrastructure analysts who held the complex passwords for the intranet. It would not do any harm either if there was a chance that some careless oaf was being negligent about security routines. In fact through their own contacts they came up with four or five names, among them a Richard Fuller.
Fuller worked in the N.I.S.I.R.T., the N.S.A. Information Systems Incident Response Team, which supervised the intranet, and he was constantly on the lookout for leaks and infiltrators. Fuller was a decent sort of fellow — a Harvard law graduate, Republican, former quarterback, a dream patriot if one were to believe his C.V. But through a former lover Bob the Dog managed to discover that he was also bipolar, and possibly a cocaine addict.
When he got excited he would do all sorts of stupid things, such as opening files and documents without first putting them in a so-called sandbox, a required security protocol. Furthermore he was very handsome, though a little smarmy, and someone, probably Bob the Dog himself, came up with the idea that Wasp should travel to his home town in Baltimore, go to bed with him and catch him in a honey trap.
Wasp told them all to go to hell.
She also rejected their next idea, that they would compile a document containing information which looked like dynamite, specifically about infiltrators and leaks at head office in Fort Meade. This would then be infected with malware containing an advanced Trojan with a high level of originality which Plague and Wasp were to develop. The plan was to put out leads on the net which would lure Fuller to the file, and with a bit of luck get him so worked up that he would be careless with security. Not a bad plan at all — it could take them into the N.S.A.’s computer system without an active breach that might be traceable.
Wasp said that she was not going to sit around waiting for that blockhead Fuller to put his foot in it. She did not want to have to rely on other people making mistakes and was being generally contrary and bloody-minded, so no-one was surprised when she suddenly wanted to take over the whole operation herself. Even though there was a certain amount of protest, in the end they all gave in, but not without issuing a series of instructions. Wasp did carefully write down the names and details of the systems administrators which they had managed to obtain, and she did ask for help with the so-called fingerprinting: the mapping of the server platform and operating system. But after that she closed the door on Hacker Republic and the world, and Plague had no reason to think that she paid any attention to his advice, for example that she should not use her handle, her alias, and that she should not work from home but rather from some remote hotel under a false identity, in case the N.S.A.’s bloodhounds managed to track her down. Needless to say, she did everything her own way and all Plague could do was sit at his desk in Sundbyberg and wait, his nerves in tatters. Which is why he still had no idea how she had gone about it.
He knew one thing for certain: what she had achieved was legendary, and while the storm howled outside he pushed aside some of the rubbish on his desk, leaned forward and typed on his computer:
, came the answer.
Empty.
That was how it felt. Salander had hardly slept for a week and she had probably also had too little to drink and eat, and now her head ached and her eyes were bloodshot and her hands shook and what she wanted above all was to sweep all of her equipment to the floor. In one sense she was content, though hardly for the reason Plague or anyone else in Hacker Republic would have guessed. She was content because she had been able to get some new information on the criminal group she was mapping out; she had found evidence of a connection which she had previously only suspected. But she kept that to herself, and she was surprised that the others could have imagined that she would have hacked the system for the hell of it.
Читать дальше