Chapter 66
files.
These were among the skills that Miles wanted his people to have.
He needed them to be fluent in not only DOS, but Unix, Xenix, VMS, Mac and a host of other Operating Systems. He needed a group that knew the strengths and weaknesses of every major O/S to fulfill his mission. They needed to be able to identify and exploit the trap doors and holes in all operating and security systems. From an engineering standpoint, Miles found it terrifi- cally exciting. Over the three years he had been working for h.o.m.osoto, Miles and his crew designed software techniques and hardware tools that he didn't believe were even contemplated by his former employer, the NSA.
The qualifications he sent to h.o.m.osoto were extensive, detailed and demanding. Miles wasn't convinced that anyone but he could find the proper people. The interview process alone was crucial to determining an applicant's true abilities, and a mediocre programmer could easily fool a non-technical person. While Miles and h.o.m.osoto agreed that all programmers should be isolated from each other, Miles felt he should know them more than by a coded name over modem lines. Miles lost that battle with one swift word from h.o.m.osoto. No.
To Miles' surprise, within a few days of providing h.o.m.osoto with is recruitment lists, his 'staff' began calling him on his com- puter. To call Miles, a computer needed his number, and the proper security codes. To a man, or woman, they all did. And, as he spoke to them over the public phone lines, in encrypted form of course, he was amazed at their quality and level of technical sophistication. Whoever Alex was, he knew how to do his job.
Over a period of a few months, Miles commanded the resources of over 100 programmers. But, Miles thought, there was something strange about most of those with whom he spoke. They seemed ready to blindly follow instructions without questioning the a.s.signed tasks. When a programmer takes a job or an a.s.signment, he usually knows that he will be designing a data base, or word processor or other application program. However, Miles' staff was to design programs intended to damage computers.
He had a.s.sembed the single largest virus software team in the world, and none of them questioned the nature or ethics of the work. Miles would have thought that while there is considerable technical talent around the world, finding people who would be willing to work on projects to facilitate the interruption of communications and proper computer operations would have been the most difficult part of recruitment. He realized he was wrong, although he did not know why. Technical mercenaries perhaps? He had never seen an ad with that as a job t.i.tle, but, what the h.e.l.l. Money can buy anything. Weapons designers since Oppen- heiner have had to face similar moral dilemmas, and with wide- spread hatred of things American, recruitment couldn't have been all that difficult.
As he sat in his apartment, he was receiving the latest
Miles knew this designer only as Claude. Claude's virus was small, less than 2K, or 2000 characters, but quite deadly. Miles went over it and saw what it was designed to do. Ooh, clever, thought Miles. As many viruses do, this one attached itself to the Command.Com file of the DOS Operating System. Rather than wait for a specific future date, the next time the computer was booted, or turned on, Claude's virus in the O/S would play havoc with the chips that permit a printer to be connected to the computer. In a matter of seconds, with no pre-warning, the user would hear a small fizzle, and smell the recognizable odor of electronic burn. During the time the user poked his nose around the computer, to see if the smell was real or imaginary, the virus would destroy the contents of the hard disk.
According to Claude, whose English was better than most French- men, there was a psychological advantage to this type of double- duty virus. The victim would realize that his computer needed repair and take it be fixed at his local computer shop. But, alas! Upon its return, the owner would find his hard disk trashed and attempt to blame the repairman. Deviously clever. Of course this type of virus would be discovered before too long. After a few thousand computers had their printer port blown up, word would get around and the virus would be identified. But, mean- while, oh what fun.
As Miles prepared to send Claude's latest and greatest to another of his staff for a.n.a.lysis and debugging, the computer dedicated to speaking to h.o.m.osoto beeped at him. He glanced over at Nip- Com. He labeled all his computers with abbreviations. In this case, Nippon Communications seemed appropriate.
>>>>>
MR. FOSTER
Miles scooted his chair over to NipCom and entered his PRG re- sponse..
Here Boss-san. What's up
YOU TELL ME.
Huh?
I READ THE PAPERS. AGAIN YOU MOVE PRECIPITOUSLY.
What are you talking about?
FIRST STATE BANK. YOUR INFECTORS ARE WITHOUT DISCIPLINE
I still don't know what you mean
THE PAPERS HAVE SAID THAT FIRST STATE BANK WAS INVADED BY HACKERS AND THEIR STOCK DROPPED VERY MUCH. IT IS STILL NOT TIME.
Oh, that. Good bit of work.
NO SO MR FOSTER. I AM NOT PLEASED WITH YOU
Me, why? I didn't have anything to do with it
EXPLAIN
Nothing to explain. My group doesn't do that, and even if they did, so what.
WHAT ABOUT THE VIRUSES? I READ EVERY DAY OF NEW COMPUTER VIRUS.
THEY MUST BE STOPPED.
Why? It's all in good fun. Let 'em release them all they want.
THEY WILL HURT OUR PLANS
Bull. If anything, they help us.
HOW IS THAT?
Getting folks good and nervous. They're beginning to wonder who they can trust. It sure as h.e.l.l won't be the government.
BUT IT IS IN THE PAPERS.
So?
THE BANKS WILL PROTECT THEMSELVES. THEY WILL SEEN WHAT THE HACKERS DO AND MAKE OUR JOB MORE DIFFICULT.
Not a chance. Listen, there are hundreds, maybe thousands or more of small time hackers who poke around computers all the time. Sometimes they do some damage, but most of the time they are in it for the thrill. The challenge. They are loosely organized at best. Maybe a few students at a university, or high school who fancy themselves computer criminals. Most of them wouldn't know what to do with the information if they took it.
The only reason this one hit the papers is because First is under investigation anyway, some fraud stuff. Literally thousands of computers are attacked every day, yet those don't appear in the paper or TV. It's kind of like rape. Companies don't want to admit they've been violated. And since damage has been limited, at least as far as the scale upon which we function, it's a non- issue. I DO NOT SEE IT THAT WAY.
Well, that's the way it is. There are maybe a half dozen well coordinated hacking groups who care to cause damage. The rest of them, ignore them. They're harmless.
I WISH I BELIEVED THAT
There's not much we can do about it.
WHY NOT STOP THEM
We can't. Look at our plans. We have hundreds of people who have a single purpose. We operate as a single ent.i.ty. The hack- ers are only a small thorn. Industry can't do much about them, so they ignore them. It is better that we ignore them, too.
FIND THEM
Who?
THE FIRST BANK ATTACKERS
Why?
I WANT THEM STOPPED
I told you, you can't do that. It's impossible. Call the Arab.
LOOK AT US, MR FOSTER. NOTHING IS IMPOSSIBLE.