Đăng Nhập
Đăng nhập iSach
Đăng nhập = Facebook
Đăng nhập = Google
Quên Mật Khẩu
Đăng ký
Trang chủ
Đăng nhập
Đăng nhập iSach
Đăng nhập = Facebook
Đăng nhập = Google
Đăng ký
Tùy chỉnh (beta)
Nhật kỳ....
Ai đang online
Ai đang download gì?
Top đọc nhiều
Top download nhiều
Top mới cập nhật
Top truyện chưa có ảnh bìa
Truyện chưa đầy đủ
Danh sách phú ông
Danh sách phú ông trẻ
Trợ giúp
Download ebook mẫu
Đăng ký / Đăng nhập
Các vấn đề về gạo
Hướng dẫn download ebook
Hướng dẫn tải ebook về iPhone
Hướng dẫn tải ebook về Kindle
Hướng dẫn upload ảnh bìa
Quy định ảnh bìa chuẩn
Hướng dẫn sửa nội dung sai
Quy định quyền đọc & download
Cách sử dụng QR Code
Truyện
Truyện Ngẫu Nhiên
Giới Thiệu Truyện Tiêu Biểu
Truyện Đọc Nhiều
Danh Mục Truyện
Kiếm Hiệp
Tiên Hiệp
Tuổi Học Trò
Cổ Tích
Truyện Ngắn
Truyện Cười
Kinh Dị
Tiểu Thuyết
Ngôn Tình
Trinh Thám
Trung Hoa
Nghệ Thuật Sống
Phong Tục Việt Nam
Việc Làm
Kỹ Năng Sống
Khoa Học
Tùy Bút
English Stories
Danh Mục Tác Giả
Kim Dung
Nguyễn Nhật Ánh
Hoàng Thu Dung
Nguyễn Ngọc Tư
Quỳnh Dao
Hồ Biểu Chánh
Cổ Long
Ngọa Long Sinh
Ngã Cật Tây Hồng Thị
Aziz Nesin
Trần Thanh Vân
Sidney Sheldon
Arthur Conan Doyle
Truyện Tranh
Sách Nói
Danh Mục Sách Nói
Đọc truyện đêm khuya
Tiểu Thuyết
Lịch Sử
Tuổi Học Trò
Đắc Nhân Tâm
Giáo Dục
Hồi Ký
Kiếm Hiệp
Lịch Sử
Tùy Bút
Tập Truyện Ngắn
Giáo Dục
Trung Nghị
Thu Hiền
Bá Trung
Mạnh Linh
Bạch Lý
Hướng Dương
Dương Liễu
Ngô Hồng
Ngọc Hân
Phương Minh
Shep O’Neal
Thơ
Thơ Ngẫu Nhiên
Danh Mục Thơ
Danh Mục Tác Giả
Nguyễn Bính
Hồ Xuân Hương
TTKH
Trần Đăng Khoa
Phùng Quán
Xuân Diệu
Lưu Trọng Lư
Tố Hữu
Xuân Quỳnh
Nguyễn Khoa Điềm
Vũ Hoàng Chương
Hàn Mặc Tử
Huy Cận
Bùi Giáng
Hồ Dzếnh
Trần Quốc Hoàn
Bùi Chí Vinh
Lưu Quang Vũ
Bảo Cường
Nguyên Sa
Tế Hanh
Hữu Thỉnh
Thế Lữ
Hoàng Cầm
Đỗ Trung Quân
Chế Lan Viên
Lời Nhạc
Trịnh Công Sơn
Quốc Bảo
Phạm Duy
Anh Bằng
Võ Tá Hân
Hoàng Trọng
Trầm Tử Thiêng
Lương Bằng Quang
Song Ngọc
Hoàng Thi Thơ
Trần Thiện Thanh
Thái Thịnh
Phương Uyên
Danh Mục Ca Sĩ
Khánh Ly
Cẩm Ly
Hương Lan
Như Quỳnh
Đan Trường
Lam Trường
Đàm Vĩnh Hưng
Minh Tuyết
Tuấn Ngọc
Trường Vũ
Quang Dũng
Mỹ Tâm
Bảo Yến
Nirvana
Michael Learns to Rock
Michael Jackson
M2M
Madonna
Shakira
Spice Girls
The Beatles
Elvis Presley
Elton John
Led Zeppelin
Pink Floyd
Queen
Sưu Tầm
Toán Học
Tiếng Anh
Tin Học
Âm Nhạc
Lịch Sử
Non-Fiction
Download ebook?
Chat
Digital Fortress
ePub
A4
A5
A6
Chương trước
Mục lục
Chương sau
Chapter 15
S
usan Fletcher sat at her computer terminal inside Node 3. Node3 was the cryptographers' private, soundproofed chamber justoff the main floor. A two-inch sheet of curved one-way glass gavethe cryptographers a panorama of the Crypto floor while prohibitinganyone else from seeing inside.
At the back of the expansive Node 3 chamber, twelve terminalssat in a perfect circle. The annular arrangement was intended toencourage intellectual exchange between cryptographers, to remindthem they were part of a larger team—something like acode-breaker's Knights of the Round Table. Ironically, secretswere frowned on inside Node 3.
Nicknamed the Playpen, Node 3 had none of the sterile feel ofthe rest of Crypto. It was designed to feel like home—plushcarpets, high-tech sound system, fully stocked fridge, kitchenette,a Nerf basketball hoop. The NSA had a philosophy about Crypto:Don't drop a couple billion bucks into a code-breakingcomputer without enticing the best of the best to stick around anduse it.
Susan slipped out of her Salvatore Ferragamo flats and dug herstockinged toes into the thick pile carpet. Well-paid governmentemployees were encouraged to refrain from lavish displays ofpersonal wealth. It was usually no problem for Susan—she wasperfectly happy with her modest duplex, Volvo sedan, andconservative wardrobe. But shoes were another matter. Even whenSusan was in college, she'd budgeted for the best.
You can't jump for the stars if your feet hurt, heraunt had once told her. And when you get where you'regoing, you darn well better look great!
Susan allowed herself a luxurious stretch and then settled downto business. She pulled up her tracer and prepared to configure it.She glanced at the E-mail address Strathmore had given her.
NDAKOTA@ara.anon.org
The man calling himself North Dakota had an anonymous account,but Susan knew it would not remain anonymous for long. The tracerwould pass through ARA, get forwarded to North Dakota, and thensend information back containing the man's real Internetaddress.
If all went well, it would locate North Dakota soon, andStrathmore could confiscate the pass-key. That would leave onlyDavid. When he found Tankado's copy, both pass-keys could bedestroyed; Tankado's little time bomb would be harmless, adeadly explosive without a detonator.
Susan double-checked the address on the sheet in front of herand entered the information in the correct datafield. She chuckledthat Strathmore had encountered difficulty sending the tracerhimself. Apparently he'd sent it twice, both times receivingTankado's address back rather than North Dakota's. It wasa simple mistake, Susan thought; Strathmore had probablyinterchanged the datafields, and the tracer had searched for thewrong account.
Susan finished configuring her tracer and queued it for release.Then she hit return. The computer beeped once.
TRACER SENT.
Now came the waiting game.
Susan exhaled. She felt guilty for having been hard on thecommander. If there was anyone qualified to handle this threatsingle-handed, it was Trevor Strathmore. He had an uncanny way ofgetting the best of all those who challenged him.
Six months ago, when the EFF broke a story that an NSA submarinewas snooping underwater telephone cables, Strathmore calmly leakeda conflicting story that the submarine was actually illegallyburying toxic waste. The EFF and the oceanic environmentalistsspent so much time bickering over which version was true, the mediaeventually tired of the story and moved on.
Every move Strathmore made was meticulously planned. He dependedheavily on his computer when devising and revising his plans. Likemany NSA employees, Strathmore used NSA-developed software calledBrainStorm—a risk-free way to carry out "what-if"scenarios in the safety of a computer.
BrainStorm was an artificial intelligence experiment describedby its developers as a Cause & Effect Simulator. It originallyhad been intended for use in political campaigns as a way to createreal-time models of a given "political environment." Fedby enormous amounts of data, the program created a relationaryweb—a hypothesized model of interaction between politicalvariables, including current prominent figures, their staffs, theirpersonal ties to each other, hot issues, individuals'motivations weighted by variables like sex, ethnicity, money, andpower. The user could then enter any hypothetical event andBrainStorm would predict the event's effect on "theenvironment."
Commander Strathmore worked religiously with BrainStorm—notfor political purposes, but as a TFM device; Time-Line, Flowchart,& Mapping software was a powerful tool for outlining complexstrategies and predicting weaknesses. Susan suspected there wereschemes hidden in Strathmore's computer that someday wouldchange the world.
Yes, Susan thought, I was too hard on him.
Her thoughts were jarred by the hiss of the Node 3 doors.
Strathmore burst in. "Susan," he said. "Davidjust called. There's been a setback."
Chương trước
Mục lục
Chương sau
Digital Fortress
Dan Brown
Digital Fortress - Dan Brown
https://isach.info/story.php?story=digital_fortress__dan_brown