- •Dan Brown Digital Fortress
- •Prologue
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •National security agency (nsa) crypto facility authorized personnel only
- •Hl fkzc vd lds
- •Im glad we met
- •Chapter 4
- •Chapter 5
- •Employee carl austin terminated for inappropriate conduct.
- •Time elapsed: 15:09:33 awaiting key: ________
- •Chapter 6
- •Chapter 7
- •“Transltr?”
- •Chapter 8
- •Keep the change.
- •Chapter 9
- •Time elapsed: 15:17:21
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Chapter 16
- •Chapter 17
- •Chapter 18
- •Chapter 19
- •Chapter 20
- •Chapter 21
- •Chapter 22
- •Chapter 23
- •Chapter 24
- •Chapter 25
- •Subject: p. Cloucharde‑terminated
- •Message sent chapter 26
- •Chapter 27
- •Dinner at alfredo’s? 8 pm?
- •Chapter 28
- •Chapter 29
- •Please accept this humble fax my love for you is without wax.
- •Tracer searching . . .
- •Tracer abort?
- •Chapter 30
- •Chapter 31
- •Chapter 32
- •Chapter 33
- •Chapter 34
- •Tracer aborted
- •Error code 22
- •Chapter 36
- •Tracer sent
- •Search for: “tracer”
- •No matches found
- •Search for: “screenlock”
- •Great progress! digital fortress is almost done. This thing will set the nsa back decades!
- •Rotating cleartext works! mutation strings are the trick!
- •Chapter 37
- •Chapter 38
- •Chapter 39
- •Chapter 40
- •Chapter 41
- •Subject: rocio eva granada‑terminated subject: hans huber‑terminated
- •Chapter 42
- •Chapter 43
- •Crypto‑production/expenditure
- •Chapter 44
- •Chapter 45
- •Chapter 46
- •Chapter 47
- •Chapter 48
- •Chapter 49
- •Chapter 50
- •Crypto sublevels authorized personnel only
- •Chapter 51
- •Chapter 52
- •Chapter 53
- •Chapter 54
- •Chapter 55
- •Chapter 56
- •Chapter 57
- •Chapter 58
- •Chapter 59
- •Chapter 60
- •Chapter 61
- •Chapter 62
- •Chapter 63
- •Chapter 64
- •Chapter 65
- •Chapter 66
- •Chapter 67
- •Chapter 68
- •Chapter 69
- •Chapter 70
- •Chapter 71
- •Chapter 72
- •Abort run
- •Chapter 73
- •Chapter 74
- •Chapter 75
- •Chapter 76
- •Chapter 77
- •Chapter 78
- •Chapter 79
- •Chapter 80
- •Chapter 81
- •Chapter 82
- •Chapter 83
- •Chapter 84
- •Chapter 85
- •Chapter 86
- •Sorry. Unable to abort. Sorry. Unable to abort. Sorry. Unable to abort.
- •Tell the world about transltr only the truth will save you now . . .
- •Only the truth will save you now
- •Enter pass‑key
- •Chapter 87
- •Chapter 88
- •Chapter 89
- •Chapter 90
- •Chapter 91
- •Chapter 92
- •Chapter 93
- •Chapter 94
- •Chapter 95
- •Chapter 96
- •Chapter 97
- •Chapter 98
- •Chapter 99
- •Chapter 100
- •Subject: david becker‑terminated
- •Chapter 101
- •Chapter 102
- •Chapter 103
- •Chapter 105
- •Chapter 106
- •Chapter 107
- •Chapter 108
- •Chapter 109
- •Only the truth will save you now enter pass‑key ______
- •Only the truth will save you now enter pass‑key ______
- •Chapter 110
- •Chapter 111
- •Chapter 112
- •Chapter 113
- •Chapter 114
- •Chapter 115
- •Chapter 116
- •Chapter 117
- •Only the truth will save you now
- •Chapter 118
- •Quiscustodietipsoscustodes
- •Chapter 119
- •Illegal entry. Numeric field only.
- •Chapter 120
- •Pfee sesn retm
- •Pfee sesn retm mfha irwe ooig meen nrma enet shas dcns iiaa ieer brnk fble lodi
- •Pfeesesnretmpfhairweooigmeennrmaenetshasdcnsiiaaieerbrnkfblelodi
- •Chapter 121
- •Chapter 122
- •Primedifferencebetweenelementsresponsibleforhiroshimaandnagasaki
- •Chapter 123
- •Prime difference between elements responsible for hiroshima and nagasaki
- •Chapter 124
- •Prime difference between elements responsible forhiroshima and nagasaki
- •Chapter 125
- •Chapter 126
- •Chapter 127
- •Enter pass‑key? 3
- •Kill code confirmed.
- •Chapter 128
- •Epilogue
Chapter 36
“Manual abort?” Susan stared at her screen, mystified.
She knew she hadn’t typed any manual abort command‑at least not intentionally. She wondered if maybe she’d hit the wrong sequence of keys by mistake.
“Impossible,” she muttered. According to the headers, the abort command had been sent less than twenty minutes ago. Susan knew the only thing she’d typed in the last twenty minutes washer privacy code when she’d stepped out to talk to the commander. It was absurd to think the privacy code could have been misinterpreted as an abort command.
Knowing it was a waste of time, Susan pulled up her ScreenLock log and double‑checked that her privacy code had been entered properly. Sure enough, it had.
“Then where,” she demanded angrily, “where did it get a manual abort?”
Susan scowled and closed the ScreenLock window. Unexpectedly, however, in the split second as the window blipped away, something caught her eye. She reopened the window and studied the data. It made no sense. There was a proper “locking” entry when she’d left Node 3, but the timing of the subsequent “unlock” entry seemed strange. The two entries were less than one minute apart. Susan was certain she’d been outside with the commander for more than one minute.
Susan scrolled down the page. What she saw left her aghast. Registering three minutes later, a second set of lock‑unlock entries appeared. According to the log, someone had unlocked her terminal while she was gone.
“Not possible!” she choked. The only candidate was Greg Hale, and Susan was quite certain she’d never given Hale her privacy code. Following good cryptographic procedure, Susan had chosen her code at random and never written it down; Hale’s guessing the correct five‑character alphanumeric was out of the question‑it was thirty‑six to the fifth power, over sixty million possibilities.
But the ScreenLock entries were as clear as day. Susan stared at them in wonder. Hale had somehow been on her terminal while she was gone. He had sent her tracer a manual abort command.
The questions of how quickly gave way to questions of why? Hale had no motive to break into her terminal. He didn’t even know Susan was running a tracer. Even if he did know, Susan thought, why would he object to her tracking some guy named North Dakota?
The unanswered questions seemed to be multiplying in her head. “First things first,” she said aloud. She would deal with Hale in a moment. Focusing on the matter at hand, Susan reloaded her tracer and hit the enter key. Her terminal beeped once.
Tracer sent
Susan knew the tracer would take hours to return. She cursed Hale, wondering how in the world he’d gotten her privacy code, wondering what interest he had in her tracer.
Susan stood up and strode immediately for Hale’s terminal. The screen was black, but she could tell it was not locked‑the monitor was glowing faintly around the edges. Cryptographers seldom locked their terminals except when they left Node 3 for the night. Instead, they simply dimmed the brightness on their monitors‑a universal, honor‑code indication that no one should disturb the terminal.
Susan reached for Hale’s terminal. “Screw the honor code,” she said. “What the hell are you up to?”
Throwing a quick glance out at the deserted Crypto floor, Susan turned up Hale’s brightness controls. The monitor came into focus, but the screen was entirely empty. Susan frowned at the blank screen. Uncertain how to proceed, she called up a search engine and typed: