《A Brilliant Plan》Chapter 14
Advertisement
JUANITA WAS WAITING for us. She was looking at her watch as we walked through the door of the detective-room.
"What's the hurry?" Ron asked.
"We got something on the alarm system. Interesting. Let's go talk to Pete from Labs."
Juanita led the way as we went down to the forensic labs, located in the basement. On the way, Ron gave her a quick update on Marion Altward and her juicy inputs.
Finally, Juanita knocked at an open office door. A little bespectacled man turned from his desk and we simultaneously said "Hi."
Juanita explained, "Pete here worked together with the guy from the insurance company and the manufacturer on the electronic control of Altward's safe."
"They were both extremely forthcoming and helpful," Pete replied.
"Can you tell these guys what you just told me on the phone?" Juanita asked as she sat down on the edge of Pete's desk.
"Sure. Come gather round people," he said and picked up a model that resembled the control panel I had seen in Altward's gallery. He pulled off the front panel to revesal a jumble of wires and chip-cards. "This is one of the latest models on the market. Altward's alarm system is only about two years old and they upgraded it every year, it is as safe as it gets these days." He readjusted his glasses and pointed out the details. "It works like this, you place your thumb or any other finger onto this mold and your fingerprint gets checked in a main control unit, which is located in the main safe room. If the main unit says 'Yes,' it starts opening the electronic locks."
"So there is no way to access the main unit directly?" Ron asked.
"That's right. The fact is that it has no manual input at all, no keyboard, just some little blinking lights. If you do something, you have to do it via the control box. I won't bore you with the encryption system or the security of the network between the control box and the main unit but it comes down to this, everything you do, you do from the wall units."
Advertisement
"Sounds more like a computer than an alarm," I remarked.
"You are correct, it is a computer system," Pete nodded his head and had to readjust his glasses again. "This control box is a standalone computer; the main control unit is, too. So is the other wall unit located in the back-office of the gallery. They are all connected by a network."
"You read a lot about computers and networks being hacked these days," Ron said.
"All the regular computer technologies and network standards are tested constantly by hackers and other criminals for their security gaps and exploits. That's why the manufacturer of these boxes wrote their own version of networking protocols and programming languages."
"That is possible? Sounds like a lot of software development."
"Not really, all the concepts are around, IT students often develop their own languages and protocols at university so they can learn the theoretical concepts behind it."
"So when an outsider, like a hacker-thief, looks into the chips and circuits, all he sees is garbage. "
"Yeah, as if you, for example, are a journalist and fluent in American English and are suddenly confronted with a German article. You recognize it for what it is, an article, and maybe you understand the purpose. But you understand neither the background nor the content."
"Or even worse, Russian, different characters and all," I threw in.
"Exactly," Pete put the box back together and put it on his desk.
"What is the conclusion now? That it couldn't have been done?" Ron was as impatient as ever.
"Hang on, I am not through yet. The tech guys and I went through it step-by-step to see what the hacker-thief had done. We found various points where he removed wires and connectors to attach scanners or readers. He worked his way systematically through the box to find a point of weakness that he could exploit."
Advertisement
"Did he find one?"
"He did!" Pete exclaimed. "Because of various checking mechanisms, every attempt to network with the main control box is logged. However, there is no recording of a failed attempt, like a wrong password."
Ron threw his hands up. "Don't say that. That would mean, someone who knew the password opened the safe. Altward, Faulkner, Assistant... "
"It would but it wasn't. The log of the wall unit has no entry for any of the employees' biometrics being entered."
"But the main box had?"
"Yes. The only way you could achieve that is if you bug the wall box and wait until Altward or someone else scans his thumb 'record' imprint and later 'replays' it."
"In English, you fake the thumbprint toward the main control unit."
"That's it. On a purely electronic basis. Forget all this James Bond nonsense of having fake thumbs and all that. The scan is translated into numbers and code, you catch that somehow, and you have access."
Pete stood up and paced the room. "The problem is that there are so many encryptions, authorizations and logging going on that it is damn near impossible to fool the main control unit. Please understand, the manufacturer took all the necessary steps to prevent such a thing from ever happening."
"Obviously not enough."
"Obviously not," Pete agreed.
Ron was unhappy. "Where does that leave our investigation? Please spare me any more tech details."
Pete counted off on his fingers, "One: Altward didn't open the safe. It would have shown up in the logbook of the alarm system. Two: It was done by a specialist who erased all records in the system logs of the steps taken during the break-in. Three: You are looking for a specialist with a very specific profile and skills. Four: There is a distinct possibility of other criminal activities in the computer crime area."
Ron looked at me for a while, gnawing at his lower lip. Did he expect consultant input or was he putting me on the suspect list again?
"That specialist profile is in your report?" He asked, slapping the file on his other hand.
"Sure."
"Hard to find?"
Pete nodded. "Yes. The original equipment manufacturer is a Norwegian company."
Ron just raised an eyebrow. "Do I start looking for pullovers in SoCal now?"
Pete shrugged easily. "Someone with good computer skills could interpret the inputs and outputs of the boxes without inside knowledge."
"Where do I find such a guy? Or girl?" With a look toward me.
Pete looked at Ron. "Pardon me; I am only the techie here."
"Where then?" Ron said, rolling his eyes.
Pete was surprised that Ron asked him but answered anyway. "Well, the FBI of course. Hacking is a state-level crime."
On the way back to the office, Ron was steaming. "FBI, Jesus, how far will this go, the President?"
Juanita cheered him up. "Come on. The skill thing is great and it's a good lead. Pete did a good job."
"As soon as you get the FBI involved, the whole case goes down the drain."
Juanita took it easy. "I bet the FBI has its head under water anyway with the double murder of the diplomats behind the airport. They will assist us and they will be happy to not have to do the dirty work."
Advertisement
An Adventure Of Memories
The plants rustled, the birds flew from their resting place in fear, her soft paws landed on the forest floor with stealth, her whiskers twitched with excitement, this was the first time she had actually tried hunting in the forest and not in her own backyard, and she loved it. The twenty dozen smells were so fresh, it was hard not to lose focus. But there was scent that she knew would stop at nothing to get to her, but it didn’t matter, if it were danger…she was undefeatable, if it were a happy and exciting, she would just cherish it. His eyes gleamed in the dark, tonight the forest was acquainted with an unfamiliar scent, his nose picked it up quite quickly, it was alluring almost drawing everything to it, but it said that you should be more wary of it, than anything else. He knew that it would be dangerous to seek the scent to its owner, but it just excited him more. He would stop at nothing to get to it. This is a story about a teen girl and a teen boy, but these two were gifted with extraordinary powers. They’re families were good friends, but if a seedling of doubt were dropped in between, would they go against each other? Would our dear leads stay together and ignore the seedling of doubt? Will their relationship as friends stay like that, bud into a rose, deeper than ever or rot like an apple and make them enemies?
8 114The Magic King's Shadow
This is a simple story regarding the rise of this era's Magic king. But as with any tale concerning the being who sits upon Verlau's throne, it is one of epic proportions. With stunning feats of bravery and stupendous luck, read as a simple youth goes from outcast to king. Note: Novel will also be posted on Scribble Hub with the same title and under the same username (Depictus)
8 93The Adventures of Hood: Part 1 - The Book of Portals
Hood, a magical protege, gets wind of the location of an ancient tome of magic - The Book of Portals by Albo Pomegranite. After months of studying ancient texts, Hood believes he has traced the book's location to the Library of Aspartemane in the eastern city of Kera'bur. Setting out with his friend Masqued Madeleine and picking up a rag tag assortment of characters along the way, Hood's simple attempt to visit the library and retrieve the book turns into a quest of epic proportions.
8 184The Snake Immortal
(Unless there are real life issues, chapters are planned for release every 2 to 4 days. 5 days if I get writer's block.)On a planet where cultivation reigns, one magical beast defied all odds and reached the crossroad to ascension to the Immortal Realm. However, it decided to be reborn and start cultivation anew as it feared the unknown.The Heavens respected its choice and it was reborn from a woman's womb a thousand years after its soul underwent the transformation. With a new life as a human, he embarks on the path of cultivation once more.Just one question remained: why was such an option available alongside ascension?
8 133ρυℓѕє; chanlix. [BOOK ONE] ✓
"Whenever, you know, I got up and someone called my name; My heart started beating faster for some reason. I guess I always wanted to check my pulse to see why its beating so hard? Natural instinct, I guess." - Felix Lee.
8 296Characters
A list of people you can use when casting your characters and photos of them.#5 in women#6 in plotideas#170 in bookhelp
8 181