John Hawks - The Dark River

Здесь есть возможность читать онлайн «John Hawks - The Dark River» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Фантастика и фэнтези, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Dark River: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Dark River»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

A frantic race to save a long-lost Traveler.
An epic battle for freedom.
Two brothers whose power puts them on a collision course…with each other.
In The Traveler, John Twelve Hawks introduced readers to a dangerous world inspired by the modern technology that monitors our lives. Under constant surveillance of the ‘Vast Machine,' a sophisticated computer network run by a ruthless group, society is mostly unaware of its own imprisonment. Gabriel and Michael Corrigan, brothers who were raised “off the grid,” have recently learned they are Travelers like their long-lost father- part of a centuries-old line of prophets able to journey to different realms of consciousness and enlighten the world to resist being controlled. But power affects the brothers differently. As The Traveler ends, Gabriel hesitates under the weight of responsibility. Michael seizes the opportunity-and joins the enemy.
THE DARK RIVER opens in New York City with a stunning piece of news. Gabriel's father, who has been missing for nearly twenty years, may still be alive and trapped somewhere in Europe. Gabriel and his Harlequin protector, Maya, immediately mobilize to escape New York and find the long-lost Traveler. Simultaneously, Michael orders the Brethren-the ruthless group that has been hunting Gabriel-into a full-scale search. Gabriel yearns to find his father to protect him; Michael aims to destroy the man whose existence threatens his newfound power. The race moves from the underground tunnels of New York and London to ruins hidden beneath Rome and Berlin, to a remote region of Africa that is rumored to harbor one of history's greatest treasures. And as the story moves toward its chilling conclusion, Maya must decide if she will trade everything to rescue Gabriel.
A mesmerizing return to the places and people so richly portrayed in The Traveler, THE DARK RIVER is propelled by edge-of-the-seat suspense and haunted by a vision of a world where both hope and freedom are about to disappear.

The Dark River — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Dark River», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

“I thought it was because of General Nash.”

“I’ve read all about Travelers,” Mrs. Brewster said. “Apparently some of them can look at a person’s face and see what he or she is thinking. Do you have that particular skill?”

Michael shrugged. He was wary of revealing too much about his abilities. “I know if a person is lying.”

“Good. That’s what I want you to do during this meeting. It would be most helpful if you could notice who is voting yes, but thinking no.”

MICHAEL FOLLOWED MRS. Brewster to the banquet room, where General Nash gave a short speech welcoming everyone to Dark Island. Three flat-panel video screens had been placed at one end of the room, faced by a semicircle of leather club chairs. The middle television screen was white, but a grid of boxes appeared on the screens of the two side monitors. Members of the Brethren from all over the world sat down at their computers and joined the meeting. A few members had video cameras, so their faces appeared on the screen, but usually the box described only a member’s geographical location: Barcelona, Mexico City, Dubai.

“Ah, here he is,” Nash said when Michael entered the room. “Ladies and gentlemen, this is Michael Corrigan.”

With his hand on Michael’s right shoulder, Nash guided him around to meet the others. Michael felt like a rebellious teenager who had finally been allowed to attend the adults’ party.

After everyone took their seats, Lars Reichhardt, the director of the Berlin computer center, walked up to the podium. He was a big man with red hair, flushed cheeks, and a booming laugh that filled the room.

“It’s an honor to be speaking to all of you,” Reichhardt said. “As you know, our quantum computer was damaged during last year’s attack on our research center in New York. At this time, it’s still not operational. Our new computer center in Berlin uses conventional technology, but it’s still quite powerful. We’ve also created bot nets of cooperating computers around the world that obey our commands without the owner’s knowledge…”

Lines of computer code appeared on the middle monitor behind the podium. As Reichhardt spoke, the computer code became smaller and smaller until it was condensed into a black square.

“We’re also expanding our use of computational immunology. We have created self-sustaining, self-replicating computer programs that move through the Internet like white blood cells in the human body. Instead of looking for viruses and infections, these programs search for infectious ideas that will delay the establishment of the Panopticon.”

On the screen, the tiny square of code entered a computer. It reproduced itself and then was transmitted to a second computer. Rapidly, it began to take over an entire system.

“Initially, we used computational immunology as a tool for discovering our enemies. Because of the problems with the quantum computer, we turned our cyber leukocytes into active viruses that damage computers filled with information that is determined to be antisocial. The program requires no maintenance once it is released into the system.

“But now I will turn to the Hauptgericht -the ‘main course’ of our banquet. We call it the Shadow Program…”

The monitor went dark and then showed the computer-generated image of a living room. Looking like one of the mannequins used to test car safety, a figure sat on a straight-backed chair. His face and body were comprised of geometric shapes, but he was recognizably human-a man.

“The use of electronic surveillance and monitoring has reached a crucial fusion point. Using both government and corporate sources, we have all the data necessary to track an individual during his entire day. We’ve simply combined it into one system-the Shadow Program. Shadow creates a parallel cyber-reality that constantly changes to reflect the actions of each individual. For those members of the Brethren who would like more information after this talk, I’m warning you-the Shadow Program is…” Reichhardt paused, searching for a word. “I would call it verführerisch .”

“Which means beguiling,” Mrs. Brewster explained. “Seductive.”

“Seductive. An excellent word.

“In order to show what the Shadow Program can do, I’ve chosen one member of the Brethren as our subject. Without his knowledge, I have established his duplicated self within our system. Photographs from passport and driver’s license databases are converted into a three-dimensional image. Using medical records and other personal data, we can establish weight and height.”

Michael had briefly meet Dr. Anders Jensen before the meeting started. He was a slight man with thinning blond hair who had some kind of position in the Danish government. Jensen looked surprised when his face appeared on the computer-generated man. Medical information flashed on the screen, and that data transformed the shape of the body. Information taken from a clothing store computer became a gray business suit and a blue necktie. When the figure was dressed, it stood up from the computer chair and waved.

“And here we are!” Reichhardt announced. “Dr. Jensen, meet your shadow self!”

Michael and the rest of the group applauded the achievement while Jensen forced a smile. The Dane didn’t seem happy that his image was now held within the system.

“From housing records we can re-create Professor Jensen’s apartment on Vogel Street. From credit card information, especially from mail-order companies, we can even place selected pieces of furniture in different rooms.”

While the computer-generated professor paced back and forth, a couch, chair, and coffee table appeared in the room. Michael glanced at the others. Mrs. Brewster nodded at him and smiled knowingly.

“This is not exactly correct,” Jensen said. “The couch is pushed against the wall near the door.”

“I beg your pardon, Professor.” Reichhardt spoke briefly into the thin microphone attached to his headset. The shadow couch melted away and appeared in the proper location.

“Now I’d like to show you the edited record of a few hours in Professor Jensen’s life. The Shadow Program watched him nine days ago during a successful test of the system. Because the professor has a home security system, we know exactly when he leaves his apartment. Professor Jensen’s mobile phone and his car’s GPS system allow us to track his trip to a local shopping area. Two surveillance cameras are in the parking lot. The professor is photographed and a facial algorithm confirms his identity. The discount shopping card in Jensen’s wallet comes with an embedded RFID chip. It informs a computer when he’s entered a particular store. Here it’s a business selling books, films, and computer games…”

On the screen, the shadow Anders Jensen began to walk down the aisle of a store, passing other shadow individuals. “Please understand-what you’re seeing on the screen is not hypothetical. It corresponds to Professor Jensen’s physical experience. We know what the store looks like because most modern businesses have been transformed into electronic environments to monitor shopping behavior. We know what the other customers look like because we’ve scanned their ID cards and found images of their faces in various databanks.

“Most products now have RFID chips to guard against theft. They also allow stores to track their shipments. Businesses in Denmark, France, and Germany have chip sensors in the shelves so they know if customers are attracted to promotions and packaging. This will become standard on everything in the next few years. Now watch. Professor Jensen goes to this particular shelf and-”

“That’s enough,” Jensen murmured.

“He picks up the product, returns it to the shelf. He hesitates and then decides to make a purchase of a DVD entitled Tropical Sin III .”

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Dark River»

Представляем Вашему вниманию похожие книги на «The Dark River» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Dark River»

Обсуждение, отзывы о книге «The Dark River» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x