RESTORATION (a science fiction novel) (RESTORATION (the science fiction trilogy)) (12 page)

BOOK: RESTORATION (a science fiction novel) (RESTORATION (the science fiction trilogy))
5.74Mb size Format: txt, pdf, ePub

He could tell by Tim’s demeanor that he would be there for a while and would probably end up in the poor guy’s office chewing on him for at least an hour.  Tim was a great Boss and Dodge considered him a friend but some of these clowns hated him.  If you did your job he would treat you with mutual respect and if you did it long enough and well enough he might even become your friend. 

On the other hand you certainly didn’t want to cross the guy and start screwing up because you’d find yourself taking the walk of shame toting a cardboard box stuffed with all your crap. 

Tim looked up and saw Dodge just as he went behind the poor sap taking the beating.  The poor
fella was facing Tim and Dodge just couldn’t resist using his own neck tie as a noose to pretend he was being hanged while dangling his tongue out at Tim as he passed behind the guy.  Tim just about lost it when he saw what Dodge was doing but quickly gathered his stern look back and ignored his antics.

“Who says you can’t have fun at work.”
  He stopped by the break room for another cup of coffee.  “
Ah ha! Cup cakes, must be someone’s birthday.”
  Steph never missed a birthday and she always made sure the cup cakes were ordered and brought in first thing that morning so they would be fresh.  She also sent email memos to everyone so they knew whose birthday it was.

When Dodge arrived at his office the door was open and there was a man in at his computer that he had never seen before.
         “Excuse me, what is going on?” He asked.
         “Oh good morning Sir, I’m Brian Nelson from IT.  I’m just installing the latest software patch to our security system on your work station.  Be out of your way in just a minute.” 

Dodge was a little rattled at this unexpected intrusion into his privacy.  IT installed patches once or twice a month but never in his absence, and Brian was new. 

“Who let you in Brian?”  Just curious.
         “Oh, sorry, you weren't here yet when I came by and we’re on a very tight schedule so I went down to see your secretary, Stephanie right?”
         “Yes, my assistant, Steph.”
         “Oh, right, anyway she let me in.  I hope you don’t mind, I never look at anything else, I’m just installing this patch, and I’ll be gone, a.s.a.p.” 

“Oh, no, that’s fine, just wondered, go ahead.  We all have our jobs to do and in your defense I did come in late today.”  Normally Dodge would not have thought anything of it but he was a little paranoid now and would probably stay that way until he and John solved this mystery.  Just then Steph stuck her head in.
         “Good morning Mr. Kerrington, how are you today?”
         “Fine thanks Steph, and you?”
         “Good as always.  Hey, hope you don’t mind I let Brian in but don’t worry he’s a really good egg.”  Brian cracked a smile while he continued to work.  “And by the way, don’t forget its Patti’s birthday today so be sure and say hey to her okay?  She’s Mr. Patterson’s assistant down the hall on the left.”
         “I will, thanks for reminding me.”

         “You got it boss!”

Stephanie zipped on down the hall saying hello and reminding others of Patti’s birthday.  She was one of those people that was rarely, if ever, sick and she was always very upbeat with a big smile.  He wished more people around there were like her; most of them seemed really bored with their jobs. 

“All done Sir, I shouldn’t need to return for 30 days.  Have a good one.”
         “Thanks, I’ll try, you too.” 

“Hmm, Brian is pretty darned cheerful.  Maybe Steph and Brian should date!” 

As soon as Brian cleared out Dodge jumped right on his PC and looked at all activity for the last 24 hours.  He didn’t see anything other than his own work and what Brian just did.  He looked a little deeper into the activity report details to make sure everything looked like normal security patch installs.  IT guy Brian appeared to be clean, so one suspect down about fifteen hundred to go! 

First he really needed to do his regular work and then he could move onto his investigating of the hacked code.  He worked just as fast as possible to get his messages answered then he called Steph in and loaded her up with a few things to do which would clear his plate a little faster. 

By 2:00 p.m. he was free enough to get into his archives and do some digging.  He had more work but it was not that pressing and he knew he could put it off until tomorrow.  He planned to take a look at the final electronics design file on the server for the implant chip.  He wanted to see if there had been any circuitry added to his design without his knowledge. 

Considering the situation he was a little concerned about pulling it up on his monitor.  If a hacker was still accessing the system they could be monitoring who viewed those files and when.  He thought about it for a moment, “
John would know what to do.” 

He called John on his sky to avoid using his desk phone.  Talking to John could throw up a flag somewhere if things
were  being monitored closely.  He felt he was being a little paranoid, but at this point erring on the side of caution was certainly prudent.  John answered on the first ring.     

“Dodge, I was just about to call you.  I made some progress, everything okay on your end?”         

“Well no one is treating me any differently, and it’s been ten years, so I guess so.” 

“Okay, good.  Well here is what I know for sure.  As I originally thought, it’s definitely a back door and it’s in the transmitter section of the Lifecorder uplink software.  The thing is I’m still baffled because it seems useless.  But regardless I’m pretty sure that its purpose is to create a bidirectional communications link. 

No one has ever been able to upload anything into the brain of a person other than their own IHE file so the whole thing seems pointless to me.  Even if you wanted to do that, it has to be done with the head gear at one of the Restoration centers or hospitals.  You need the robotic bi-polar needle and that section of the chip operates on different protocols than this code anyway.” 

“Okay, so please, in laymen’s terms what good is it?”

“I don’t know that yet and neither of us will be able to figure that out without having the hardware and at least a schematic for the section that this code was written to control.  I have my piece of the puzzle solved as far as it can be without having the hardware.  It’s up to you buddy.  Ya gotta find something there on your end before we can go any further.”

“All right but unfortunately I need your help again.  I can access the final designs on the server but if I do, my work station would be flagged for it.  Well, assuming someone is monitoring me here at ESS.  I could go to another person’s workstation but then that may put them in harm’s way and potentially tip off our hacker.  I don’t want to spook them, any ideas?” 

“I have just the thing you need.  It’s a neat little program and it’s compact enough to send over to your skyphone as a compressed file.  It works on the principle of date time discovery or keyword.  It’s basically a worm but don’t worry, I designed it so tight that the security won’t catch it.  

All you need to know is part of the file name or the date it was created or last viewed.  Once it’s installed you load the keyword and it goes looking.  It finds a list of files on the server that contain your keyword so there may be some junk to sift through but it will find the file without flagging that it has been accessed.  It is completely untraceable.

You pick the actual file from the list and then note the date and time that it was last accessed and by whom.  You can open the file and look at the content, and when you’re done, simply click the “close it softly” option in the menu.  The program will give you the option of manually entering file last viewed by and viewed date and time information or, clone.  You want to pick the clone option.  When you close the file it will redisplay the date and time and person that accessed it prior to you and leave no trace of your inquiry. 

If anyone is checking on it periodically, it will show that it has not been accessed.  Very important detail my friend and don’t forget this because this is absolutely crucial.  Do not copy the file!  You can copy the entire contents of the file and then paste it to another window on your PC, or even your phone, but do not copy the actual file.  This is very important.” 

“Okay I get it.  So send it over to me and I’ll get it going.  Oh wait, how do I get it into the system?”
         “Do you have a good reason to email anyone inside the same router leg that you’re on?” 

“Uh, well, no.  Oh wait, I could email a happy birthday wish to Patti down the hall it’s her birthday today.”
         “Perfect!  Get me her email address.  I’ll send you an email on your phone that says happy birthday in colorful text.  I’ll embed the worm in that.  Once it’s in the system for ten minutes it dissolves completely and is undetectable.  Of course you only have the ten minutes so you’ll have to get your snooping done as quickly as possible once she receives it.” 

“Okay,
understood .  Her email is Patti dot L at ESS Inc dot tech”.
         “All right you’ll have the goods in about ten minutes.  I’ll send it to your phone and then you can forward it to your own email there at work.  Open it and copy the contents of the window to a new email and then enter her email address followed by any additional comments to personalize it.  Once you get a confirmation that she has received the email simply click your print icon as if though you wanted to print the confirmation out.  When the printer selection box appears click the drop down and scroll all the way to the bottom and select the printer option “print to file”.  It will have an asterisk after it and this is what launches the program.  Click it and your computer will reboot on its own.  When it comes back up, you won’t recognize the operating system because it won’t be normal.  It will just be orange text on a black background with very simple commands similar to the old DOS systems.  You’ll see the place to put in your keyword and that will get the thing started.  You have to stay right on it because ten minutes go by fast.” 

             
“Why is it limited to ten minutes?”
         “Any longer than that and the security could potentially catch it.  If you don’t get done in time your computer will automatically shut off and then we’ll have to start over.  Let me know what you find.”
         “Wait, John, how do I save something if I find it?”
         “The on screen prompts will offer you options of places to send it off to or save it.  I would recommend a new unused microdrive.”

         “Okay, will do, I’ll be watching for the file.”
         “Oh, by the way, Dodge, there will be no mouse or voice command functionality, its old school bro!”

“Okay, I’ll do my best.” 

Great old school DOS style!”
 

Not five minutes later Dodge received the file, and he quickly forwarded it from his phone to his email.  When he opened it, he was greeted with a corny, happy birthday jingle and a little banner that scrolled across the page followed by some cakes with little dancing legs.  He chuckled to himself.  Only John Calhoun could make something that looked so corny and cute into a diabolical hack with great purpose.  That guy was a little bit scary. 

He added a quick “Happy B-day Patti!  From: Dodge Kerrington,” to the subject line and hit send.  Much to his surprise he got an auto response back immediately which read
         “Hey Everyone, it’s my birthday!  I’m celebrating and leaving work early today.  I’ll be back tomorrow and I’ll get back to you as soon as I can.  Thanks! Patti.” 


Great, an auto response,
I hope the code still functions.”
He went to the print command, and sure enough, the drop down printer box included “print to file*”.  He clicked it and his computer shut down just like John said it would.  It shut off so fast that it startled him and he thought maybe the program didn’t work right.  He made a quick note of the time it was 3:15 and he had until 3:25 to complete his task. 

The computer came back on in about five seconds and booted up quickly with a very simple and unusual screen that looked like something from the old days just like John said it would.  He saw some of these screens on John’s retro toys when in DOS mode and even on PCs in old movies but never had to use one.   The instructions were very simple and straightforward.  He quickly located the keyword box and tried to move his mouse over it. 
“Oh shoot, it doesn’t work,”
then he remembered what John had said “no mouse or voice commands.”  “
Ah, yes, TAB.”
John always had to use the TAB key on his retro toys. 

He tabbed down to the key word box and typed in        “implant_rev_26”. 
“Now what, there’s no run button?  How the heck am I supposed to run this blasted thing?”

He tried tabbing through the fields but didn’t see anything, crap, the clock was ticking. 
“Come on Dodge, you idiot, think!”
  Then it dawned on him,
“Enter.”
  He hit the enter key and bingo the thing showed a little box that displayed “running.”  A little row of running dots appeared under it that ticked along as if it was trying to entertain you while you waited impatiently for the results. 

Just then he heard footsteps nearing his office in the hall and he had no idea who was coming but figured he had better turn the screen a bit out of sight.  It was certainly not a normal screen.  Anyone that saw it would question what he was doing.  He heard his co-worker in the office next to him greet the person coming.  It was Tim, crap!  Bad timing!  If Tim came in to talk to him he wouldn’t be able to work and it would time out.

Other books

Alpha by Rachel Vincent
A Little Learning by J M Gregson
Less Than a Gentleman by Sparks, Kerrelyn
The Whim of the Dragon by DEAN, PAMELA
Enslaved by Colette Gale
Table for five by Susan Wiggs