Bücher online kostenlos Kostenlos Online Lesen
The Blue Nowhere

The Blue Nowhere

Titel: The Blue Nowhere Kostenlos Bücher Online Lesen
Autoren: Jeffery Deaver
Vom Netzwerk:
dead end. That’s why Phate didn’t bother to write a fake header, the way Vlast did.”
    “Well,” the cop pointed out, “ Interpost knows where Phate’s computer is. Let’s get their phone number, call them up and find out.”
    The hacker shook his head. “Chainers stay in business because they guarantee that nobody can find out who the sender is, even the police.”
    “So we’re dead in the water,” Bishop said.
    But Wyatt Gillette said, “Not necessarily. I think we ought to do some more fishing.” And he loaded one of his own search engines into the CCU machine.

CHAPTER 00011000 / TWENTY-FOUR
    A s the computer at the state police’s CCU was sending out a request for information about Interpost, Phate sat in the Bay View Motel, a decrepit inn along a sandy stretch of commercial sprawl in Fremont, California, just north of San Jose. Staring at the laptop’s monitor, he was following the progress of Gillette’s search.
    Gillette would of course know that a foreign chainer like Interpost wouldn’t give any U.S. cop as much as the courtesy of a reply to a request for a client’s identity. So, as Phate had anticipated, Gillette had used a search engine to look for general information about Interpost, in hopes of retrieving something that might let the cops beg or bribe some cooperation from the Belgium Internet service.
    Within seconds Gillette’s search engine had found dozens of sites in which Interpost was mentioned and was shooting their names and addresses back to the CCU computer. But the packets of data that made up this information took a detour—they were diverted to Phate’s laptop. Trapdoor then modified the packets to insert its hardworking demon and sent them on their way to CCU.
    Phate now got this message:
    TRAPDOOR
    Link complete
    Do you wish to enter subject’s computer? Y/N
    Phate keyed Y, hit enter and a moment later was wandering around inside CCU’s system.
    He typed more commands and began looking through files, reflecting that the cops at CCU had thought that, like some slobbering serial killer, Phate had posted the picture of the dying Gibson woman just to threaten them or to get off on some weird sado-sexual exhibitionist thing. But no, he’d posted the picture as bait—to find the Internet address of the CCU machine. Once he’d uploaded the picture he’d instructed a bot to tell him the address of everybody who’d downloaded it. One of those had been a California state government computer in the western San Jose area—which he’d guessed was the CCU office, even though the domain name suggested it was a tourism organization.
    Phate now raced through the police computer, copying information, then he went straight to a folder labeled Personnel Records—Computer Crimes Unit.
    The contents were—not surprisingly—encrypted. Phate pulled down a screen window on Trapdoor and clicked on Decrypt. The program went to work to crack the code.
    As the hard drive moaned, Phate stood and fetched a Mountain Dew from a cooler sitting on the motel room floor. He stirred in a No-Doz and, sipping the sweet drink, walked to the window, where shafts of brilliant sunlight had momentarily broken through the storm clouds. The flood of jarring light agitated him and he pulled the shade down quickly, then turned back to the muted colors of the computer screen, which were far more pleasing to him than God’s palette could ever be.
    “W e’ve got him,” Gillette announced to the team. “Phate’s inside our machine. Let’s start the trace.”
    “All right!” Tony Mott said, offering a deafening whistle of victory.
    Gillette began HyperTrace and, with faint pings, one by one the route between CCU’s computer and Phate’s appeared on the screen as a tiny yellow line.
    “Our boy’s good, whatta you say, boss?” Linda Sanchez offered, nodding an admiring head toward Gillette.
    “Looks like he got it right,” Bishop said.
    Ten minutes before, Gillette had had a thought: that Phate’s message was a feint. He decided that the killer had been setting them up like a master MUD player and that he’d posted the picture of Lara not to taunt or threaten them but so he could find out CCU’s Internet address and get inside their computer.
    Gillette had explained this to the team and then added, “And we’re going to let him.”
    “So we can trace him, ” Bishop said.
    “You got it,” Gillette confirmed.
    Waving a hand at the CCU machines, Stephen Miller protested, “But we

Weitere Kostenlose Bücher