- •Dan Brown Digital Fortress
- •Prologue
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •National security agency (nsa) crypto facility authorized personnel only
- •Hl fkzc vd lds
- •Im glad we met
- •Chapter 4
- •Chapter 5
- •Employee carl austin terminated for inappropriate conduct.
- •Time elapsed: 15:09:33 awaiting key: ________
- •Chapter 6
- •Chapter 7
- •“Transltr?”
- •Chapter 8
- •Keep the change.
- •Chapter 9
- •Time elapsed: 15:17:21
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Chapter 16
- •Chapter 17
- •Chapter 18
- •Chapter 19
- •Chapter 20
- •Chapter 21
- •Chapter 22
- •Chapter 23
- •Chapter 24
- •Chapter 25
- •Subject: p. Cloucharde‑terminated
- •Message sent chapter 26
- •Chapter 27
- •Dinner at alfredo’s? 8 pm?
- •Chapter 28
- •Chapter 29
- •Please accept this humble fax my love for you is without wax.
- •Tracer searching . . .
- •Tracer abort?
- •Chapter 30
- •Chapter 31
- •Chapter 32
- •Chapter 33
- •Chapter 34
- •Tracer aborted
- •Error code 22
- •Chapter 36
- •Tracer sent
- •Search for: “tracer”
- •No matches found
- •Search for: “screenlock”
- •Great progress! digital fortress is almost done. This thing will set the nsa back decades!
- •Rotating cleartext works! mutation strings are the trick!
- •Chapter 37
- •Chapter 38
- •Chapter 39
- •Chapter 40
- •Chapter 41
- •Subject: rocio eva granada‑terminated subject: hans huber‑terminated
- •Chapter 42
- •Chapter 43
- •Crypto‑production/expenditure
- •Chapter 44
- •Chapter 45
- •Chapter 46
- •Chapter 47
- •Chapter 48
- •Chapter 49
- •Chapter 50
- •Crypto sublevels authorized personnel only
- •Chapter 51
- •Chapter 52
- •Chapter 53
- •Chapter 54
- •Chapter 55
- •Chapter 56
- •Chapter 57
- •Chapter 58
- •Chapter 59
- •Chapter 60
- •Chapter 61
- •Chapter 62
- •Chapter 63
- •Chapter 64
- •Chapter 65
- •Chapter 66
- •Chapter 67
- •Chapter 68
- •Chapter 69
- •Chapter 70
- •Chapter 71
- •Chapter 72
- •Abort run
- •Chapter 73
- •Chapter 74
- •Chapter 75
- •Chapter 76
- •Chapter 77
- •Chapter 78
- •Chapter 79
- •Chapter 80
- •Chapter 81
- •Chapter 82
- •Chapter 83
- •Chapter 84
- •Chapter 85
- •Chapter 86
- •Sorry. Unable to abort. Sorry. Unable to abort. Sorry. Unable to abort.
- •Tell the world about transltr only the truth will save you now . . .
- •Only the truth will save you now
- •Enter pass‑key
- •Chapter 87
- •Chapter 88
- •Chapter 89
- •Chapter 90
- •Chapter 91
- •Chapter 92
- •Chapter 93
- •Chapter 94
- •Chapter 95
- •Chapter 96
- •Chapter 97
- •Chapter 98
- •Chapter 99
- •Chapter 100
- •Subject: david becker‑terminated
- •Chapter 101
- •Chapter 102
- •Chapter 103
- •Chapter 105
- •Chapter 106
- •Chapter 107
- •Chapter 108
- •Chapter 109
- •Only the truth will save you now enter pass‑key ______
- •Only the truth will save you now enter pass‑key ______
- •Chapter 110
- •Chapter 111
- •Chapter 112
- •Chapter 113
- •Chapter 114
- •Chapter 115
- •Chapter 116
- •Chapter 117
- •Only the truth will save you now
- •Chapter 118
- •Quiscustodietipsoscustodes
- •Chapter 119
- •Illegal entry. Numeric field only.
- •Chapter 120
- •Pfee sesn retm
- •Pfee sesn retm mfha irwe ooig meen nrma enet shas dcns iiaa ieer brnk fble lodi
- •Pfeesesnretmpfhairweooigmeennrmaenetshasdcnsiiaaieerbrnkfblelodi
- •Chapter 121
- •Chapter 122
- •Primedifferencebetweenelementsresponsibleforhiroshimaandnagasaki
- •Chapter 123
- •Prime difference between elements responsible for hiroshima and nagasaki
- •Chapter 124
- •Prime difference between elements responsible forhiroshima and nagasaki
- •Chapter 125
- •Chapter 126
- •Chapter 127
- •Enter pass‑key? 3
- •Kill code confirmed.
- •Chapter 128
- •Epilogue
Chapter 110
Jabba stared blankly at the printout Soshi had just handed him. Pale, he wiped his forehead on his sleeve. “Director, we have no choice. We’ve got to kill power to the databank.”
“Unacceptable,” Fontaine replied. “The results would be devastating.”
Jabba knew the director was right. There were over three thousand ISDN connections tying into the NSA databank from all over the world. Every day military commanders accessed up‑to‑the‑instant satellite photos of enemy movement. Lockheed engineers downloaded compartmentalized blueprints of new weaponry. Field operatives accessed mission updates. The NSA databank was the backbone of thousands of U.S. government operations. Shutting it down without warning would cause life‑and‑death intelligence blackouts all over the globe.
“I’m aware of the implications, sir,” Jabba said, “but we have no choice.”
“Explain yourself,” Fontaine ordered. He shot a quick glance at Susan standing beside him on the podium. She seemed miles away.
Jabba took a deep breath and wiped his brow again. From the look on his face, it was clear to the group on the podium that they were not going to like what he had to say.
“This worm,” Jabba began. “This worm is not an ordinary degenerative cycle. It’s a selective cycle. In other words, it’s a worm with taste.”
Brinkerhoff opened his mouth to speak, but Fontaine waved him off.
“Most destructive applications wipe a databank clean, “Jabba continued, “but this one is more complex. It deletes only those files that fall within certain parameters.”
“You mean it won’t attack the whole databank?” Brinkerhoff asked hopefully. “That’s good, right?”
“No!” Jabba exploded. “It’s bad! It’s very fucking bad!”
“Cool it!” Fontaine ordered. “What parameters is this worm looking for? Military? Covert ops?”
Jabba shook his head. He eyed Susan, who was still distant, and then Jabba’s eyes rose to meet the director’s. “Sir, as you know, anyone who wants to tie into this databank from the outside has to pass a series of security gates before they’re admitted.”
Fontaine nodded. The databank’s access hierarchies were brilliantly conceived; authorized personnel could dial in via the Internet and World Wide Web. Depending on their authorization sequence, they were permitted access to their own compartmentalized zones.
“Because we’re tied to the global Internet, “Jabba explained, “hackers, foreign governments, and EFF sharks circle this databank twenty‑four hours a day and try to break in.”
“Yes,” Fontaine said, “and twenty‑four hours a day, our security filters keep them out. What’s your point?”
Jabba gazed down at the printout. “My point is this. Tankado’s worm is not targeting our data.” He cleared his throat. “It’s targeting our security filters.”
Fontaine blanched. Apparently he understood the implications‑this worm was targeting the filters that kept the NSA databank confidential. Without filters, all of the information in the databank would become accessible to everyone on the outside.
“We need to shut down,” Jabba repeated. “In about an hour, every third grader with a modem is going to have top U.S. security clearance.”
Fontaine stood a long moment without saying a word.
Jabba waited impatiently and finally turned to Soshi. “Soshi! VR! NOW!”
Soshi dashed off.
Jabba relied on VR often. In most computer circles, VR meant “virtual reality,” but at the NSA it meant vis‑rep‑visual representation. In a world full of technicians and politicians all having different levels of technical understanding, a graphic representation was often the only way to make a point; a single plummeting graph usually aroused ten times the reaction inspired by volumes of spreadsheets. Jabba knew a VR of the current crisis would make its point instantly.
“VR!” Soshi yelled from a terminal at the back of the room.
A computer‑generated diagram flashed to life on the wall before them. Susan gazed up absently, detached from the madness around her. Everyone in the room followed Jabba’s gaze to the screen.
The diagram before them resembled a bull’s‑eye. In the center was a red circle marked data. Around the center were five concentric circles of differing thickness and color. The outermost circle was faded, almost transparent.
“We’ve got a five‑tier level of defense,” Jabba explained. “A primary Bastion Host, two sets of packet filters for FTP and X‑eleven, a tunnel block, and finally a PEM‑based authorization window right off the Truffle project. The outside shield that’s disappearing represents the exposed host. It’s practically gone. Within the hour, all five shields will follow. After that, the world pours in. Every byte of NSA data becomes public domain.”
Fontaine studied the VR, his eyes smoldering.
Brinkerhoff let out a weak whimper. “This worm can open our databank to the world?”
“Child’s play for Tankado,” Jabba snapped. “Gauntlet was our fail‑safe. Strathmore blew it.”
“It’s an act of war,” Fontaine whispered, an edge in his voice.
Jabba shook his head. “I really doubt Tankado ever meant for it to go this far. I suspect he intended to be around to stop it.”
Fontaine gazed up at the screen and watched the first of the five walls disappear entirely.
“Bastion Host is toast!” a technician yelled from the back of the room. “Second shield’s exposed!”
“We’ve got to start shutting down,” Jabba urged. “From the looks of the VR, we’ve got about forty‑five minutes. Shutdown is a complex process.”
It was true. The NSA databank had been constructed in such a way as to ensure it would never lose power‑accidentally or if attacked. Multiple fail‑safes for phone and power were buried in reinforced steel canisters deep underground, and in addition to the feeds from within the NSA complex, there were multiple backups off main public grids. Shutting down involved a complex series of confirmations and protocols‑significantly more complicated than the average nuclear submarine missile launch.
“We have time,” Jabba said, “if we hurry. Manual shutdown should take about thirty minutes.”
Fontaine continued staring up at the VR, apparently pondering his options.
“Director!” Jabba exploded. “When these firewalls fall, every user on the planet will be issued top‑security clearance! And I’m talking upper level! Records of covert ops! Overseas agents! Names and locations of everyone in the federal witness protection program! Launch code confirmations! We must shut down! Now!”
The director seemed unmoved. “There must be some other way.”
“Yes,” Jabba spat, “there is! The kill‑code! But the only guy who knows it happens to be dead!”
“How about brute force?” Brinkerhoff blurted. “Can we guess the kill‑code?”
Jabba threw up his arms. “For Christ sake! Kill‑codes are like encryption keys‑random! Impossible to guess! If you think you can type 600 trillion entries in the next forty‑five minutes, be my guest!”
“The kill‑code’s in Spain,” Susan offered weakly.
Everyone on the podium turned. It was the first thing she had said in a long time.
Susan looked up, bleary‑eyed. “Tankado gave it away when he died.”
Everyone looked lost.
“The pass‑key . . .” Susan shivered as she spoke. “Commander Strathmore sent someone to find it.”
“And?” Jabba demanded. “Did Strathmore’s man find it?”
Susan tried to fight it, but the tears began to flow. “Yes,” she choked. “I think so.”