Đăng Nhập
Đăng nhập iSach
Đăng nhập = Facebook
Đăng nhập = Google
Quên Mật Khẩu
Đăng ký
Trang chủ
Đăng nhập
Đăng nhập iSach
Đăng nhập = Facebook
Đăng nhập = Google
Đăng ký
Tùy chỉnh (beta)
Nhật kỳ....
Ai đang online
Ai đang download gì?
Top đọc nhiều
Top download nhiều
Top mới cập nhật
Top truyện chưa có ảnh bìa
Truyện chưa đầy đủ
Danh sách phú ông
Danh sách phú ông trẻ
Trợ giúp
Download ebook mẫu
Đăng ký / Đăng nhập
Các vấn đề về gạo
Hướng dẫn download ebook
Hướng dẫn tải ebook về iPhone
Hướng dẫn tải ebook về Kindle
Hướng dẫn upload ảnh bìa
Quy định ảnh bìa chuẩn
Hướng dẫn sửa nội dung sai
Quy định quyền đọc & download
Cách sử dụng QR Code
Truyện
Truyện Ngẫu Nhiên
Giới Thiệu Truyện Tiêu Biểu
Truyện Đọc Nhiều
Danh Mục Truyện
Kiếm Hiệp
Tiên Hiệp
Tuổi Học Trò
Cổ Tích
Truyện Ngắn
Truyện Cười
Kinh Dị
Tiểu Thuyết
Ngôn Tình
Trinh Thám
Trung Hoa
Nghệ Thuật Sống
Phong Tục Việt Nam
Việc Làm
Kỹ Năng Sống
Khoa Học
Tùy Bút
English Stories
Danh Mục Tác Giả
Kim Dung
Nguyễn Nhật Ánh
Hoàng Thu Dung
Nguyễn Ngọc Tư
Quỳnh Dao
Hồ Biểu Chánh
Cổ Long
Ngọa Long Sinh
Ngã Cật Tây Hồng Thị
Aziz Nesin
Trần Thanh Vân
Sidney Sheldon
Arthur Conan Doyle
Truyện Tranh
Sách Nói
Danh Mục Sách Nói
Đọc truyện đêm khuya
Tiểu Thuyết
Lịch Sử
Tuổi Học Trò
Đắc Nhân Tâm
Giáo Dục
Hồi Ký
Kiếm Hiệp
Lịch Sử
Tùy Bút
Tập Truyện Ngắn
Giáo Dục
Trung Nghị
Thu Hiền
Bá Trung
Mạnh Linh
Bạch Lý
Hướng Dương
Dương Liễu
Ngô Hồng
Ngọc Hân
Phương Minh
Shep O’Neal
Thơ
Thơ Ngẫu Nhiên
Danh Mục Thơ
Danh Mục Tác Giả
Nguyễn Bính
Hồ Xuân Hương
TTKH
Trần Đăng Khoa
Phùng Quán
Xuân Diệu
Lưu Trọng Lư
Tố Hữu
Xuân Quỳnh
Nguyễn Khoa Điềm
Vũ Hoàng Chương
Hàn Mặc Tử
Huy Cận
Bùi Giáng
Hồ Dzếnh
Trần Quốc Hoàn
Bùi Chí Vinh
Lưu Quang Vũ
Bảo Cường
Nguyên Sa
Tế Hanh
Hữu Thỉnh
Thế Lữ
Hoàng Cầm
Đỗ Trung Quân
Chế Lan Viên
Lời Nhạc
Trịnh Công Sơn
Quốc Bảo
Phạm Duy
Anh Bằng
Võ Tá Hân
Hoàng Trọng
Trầm Tử Thiêng
Lương Bằng Quang
Song Ngọc
Hoàng Thi Thơ
Trần Thiện Thanh
Thái Thịnh
Phương Uyên
Danh Mục Ca Sĩ
Khánh Ly
Cẩm Ly
Hương Lan
Như Quỳnh
Đan Trường
Lam Trường
Đàm Vĩnh Hưng
Minh Tuyết
Tuấn Ngọc
Trường Vũ
Quang Dũng
Mỹ Tâm
Bảo Yến
Nirvana
Michael Learns to Rock
Michael Jackson
M2M
Madonna
Shakira
Spice Girls
The Beatles
Elvis Presley
Elton John
Led Zeppelin
Pink Floyd
Queen
Sưu Tầm
Toán Học
Tiếng Anh
Tin Học
Âm Nhạc
Lịch Sử
Non-Fiction
Download ebook?
Chat
Digital Fortress
ePub
A4
A5
A6
Chương trước
Mục lục
Chương sau
Chapter 110
J
abba stared blankly at the printout Soshi had just handed him. Pale, he wiped his forehead on his sleeve. “Director, we have no choice. We’ve got to kill power to the databank.”
“Unacceptable,” Fontaine replied. “The results would be devastating.”
Jabba knew the director was right. There were over three thousand ISDN connections tying into the NSA databank from all over the world. Every day military commanders accessed up-to-the-instant satellite photos of enemy movement. Lockheed engineers downloaded compartmentalized blueprints of new weaponry. Field operatives accessed mission updates. The NSA databank was the backbone of thousands of U.S. government operations. Shutting it down without warning would cause life-and-death intelligence blackouts all over the globe.
“I’m aware of the implications, sir,” Jabba said, “but we have no choice.”
“Explain yourself,” Fontaine ordered. He shot a quick glance at Susan standing beside him on the podium. She seemed miles away.
Jabba took a deep breath and wiped his brow again. From the look on his face, it was clear to the group on the podium that they were not going to like what he had to say.
“This worm,” Jabba began. “This worm is not an ordinary degenerative cycle. It’s a selective cycle. In other words, it’s a worm with taste.”
Brinkerhoff opened his mouth to speak, but Fontaine waved him off.
“Most destructive applications wipe a databank clean,” Jabba continued, “but this one is more complex. It deletes only those files that fall within certain parameters.”
“You mean it won’t attack the whole databank?” Brinkerhoff asked hopefully. “That’s good, right?”
“No!” Jabba exploded. “It’s bad! It’s very fucking bad!”
“Cool it!” Fontaine ordered. “What parameters is this worm looking for? Military? Covert ops?”
Jabba shook his head. He eyed Susan, who was still distant, and then Jabba’s eyes rose to meet the director’s. “Sir, as you know, anyone who wants to tie into this databank from the outside has to pass a series of security gates before they’re admitted.”
Fontaine nodded. The databank’s access hierarchies were brilliantly conceived; authorized personnel could dial in via the Internet and World Wide Web. Depending on their authorization sequence, they were permitted access to their own compartmentalized zones.
“Because we’re tied to the global Internet,” Jabba explained, “hackers, foreign governments, and EFF sharks circle this databank twenty-four hours a day and try to break in.”
“Yes,” Fontaine said, “and twenty-four hours a day, our security filters keep them out. What’s your point?”
Jabba gazed down at the printout. “My point is this. Tankado’s worm is not targeting our data.” He cleared his throat. “It’s targeting our security filters.”
Fontaine blanched. Apparently he understood the implications—this worm was targeting the filters that kept the NSA databank confidential. Without filters, all of the information in the databank would become accessible to everyone on the outside.
“We need to shut down,” Jabba repeated. “In about an hour, every third grader with a modem is going to have top U.S. security clearance.”
Fontaine stood a long moment without saying a word.
Jabba waited impatiently and finally turned to Soshi. “Soshi! VR! NOW!”
Soshi dashed off.
Jabba relied on VR often. In most computer circles, VR meant “virtual reality,” but at the NSA it meant vis-rep—visual representation. In a world full of technicians and politicians all having different levels of technical understanding, a graphic representation was often the only way to make a point; a single plummeting graph usually aroused ten times the reaction inspired by volumes of spreadsheets. Jabba knew a VR of the current crisis would make its point instantly.
“VR!” Soshi yelled from a terminal at the back of the room.
A computer-generated diagram flashed to life on the wall before them. Susan gazed up absently, detached from the madness around her. Everyone in the room followed Jabba’s gaze to the screen.
The diagram before them resembled a bull’s-eye. In the center was a red circle marked data. Around the center were five concentric circles of differing thickness and color. The outermost circle was faded, almost transparent.
“We’ve got a five-tier level of defense,” Jabba explained. “A primary Bastion Host, two sets of packet filters for FTP and X-eleven, a tunnel block, and finally a PEM-based authorization window right off the Truffle project. The outside shield that’s disappearing represents the exposed host. It’s practically gone. Within the hour, all five shields will follow. After that, the world pours in. Every byte of NSA data becomes public domain.”
Fontaine studied the VR, his eyes smoldering.
Brinkerhoff let out a weak whimper. “This worm can open our databank to the world?”
“Child’s play for Tankado,” Jabba snapped. “Gauntlet was our fail-safe. Strathmore blew it.”
“It’s an act of war,” Fontaine whispered, an edge in his voice.
Jabba shook his head. “I really doubt Tankado ever meant for it to go this far. I suspect he intended to be around to stop it.”
Fontaine gazed up at the screen and watched the first of the five walls disappear entirely.
“Bastion Host is toast!” a technician yelled from the back of the room. “Second shield’s exposed!”
“We’ve got to start shutting down,” Jabba urged. “From the looks of the VR, we’ve got about forty-five minutes. Shutdown is a complex process.”
It was true. The NSA databank had been constructed in such a way as to ensure it would never lose power—accidentally or if attacked. Multiple fail-safes for phone and power were buried in reinforced steel canisters deep underground, and in addition to the feeds from within the NSA complex, there were multiple backups off main public grids. Shutting down involved a complex series of confirmations and protocols—significantly more complicated than the average nuclear submarine missile launch.
“We have time,” Jabba said, “if we hurry. Manual shutdown should take about thirty minutes.”
Fontaine continued staring up at the VR, apparently pondering his options.
“Director!” Jabba exploded. “When these firewalls fall, every user on the planet will be issued top-security clearance! And I’m talking upper level! Records of covert ops! Overseas agents! Names and locations of everyone in the federal witness protection program! Launch code confirmations! We must shut down! Now!”
The director seemed unmoved. “There must be some other way.”
“Yes,” Jabba spat, “there is! The kill-code! But the only guy who knows it happens to be dead!”
“How about brute force?” Brinkerhoff blurted. “Can we guess the kill-code?”
Jabba threw up his arms. “For Christ sake! Kill-codes are like encryption keys—random! Impossible to guess! If you think you can type 600 trillion entries in the next forty-five minutes, be my guest!”
“The kill-code’s in Spain,” Susan offered weakly.
Everyone on the podium turned. It was the first thing she had said in a long time.
Susan looked up, bleary-eyed. “Tankado gave it away when he died.”
Everyone looked lost.
“The pass-key...” Susan shivered as she spoke. “Commander Strathmore sent someone to find it.”
“And?” Jabba demanded. “Did Strathmore’s man find it?”
Susan tried to fight it, but the tears began to flow. “Yes,” she choked. “I think so.”
Chương trước
Mục lục
Chương sau
Digital Fortress
Dan Brown
Digital Fortress - Dan Brown
https://isach.info/story.php?story=digital_fortress__dan_brown