• Complain

Mark Russinovich - Operation Desolation: A Short Story

Here you can read online Mark Russinovich - Operation Desolation: A Short Story full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: Thomas Dunne Books, genre: Detective and thriller. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Mark Russinovich Operation Desolation: A Short Story

Operation Desolation: A Short Story: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Operation Desolation: A Short Story" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A thought-provoking new short story from the acclaimed author of Zero Day and Trojan Horse.

Challenging Anonymous is like waving a red flag in front of a bull. But the CEO of a major investment firm has done just that, and now cyber security expert Jeff Aiken has to try to protect the company from its leaders mistakes. The timing couldnt be worse, as Jeff is scheduled to appear at a conference that has invited an Anonymous representative as well. And Jeffs about to discover that the hacker outfit plans to bring their fight offline--and into the real world.

Mark Russinovich: author's other books


Who wrote Operation Desolation: A Short Story? Find out the surname, the name of the author of the book and a list of all author's works by series.

Operation Desolation: A Short Story — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Operation Desolation: A Short Story" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Mark Russinovich

Operation Desolation

I was, and thats why Ive asked to see you two. He paused then said, The hack originated from this hotel. Clive and Norm both straightened in their seats. Given that CyberCon is meeting here, I think a logical conclusion is that an attendee has done it.

This is bad, Clive said. Very bad. If or rather, when word of this leaked, it would very likely negatively affect him and his company, as it would CTI.

Jeff now told them about the assault on him the previous night. Clive looked at him with concern. Have you seen a doctor?

Its not necessary. I was just stunned.

You know, Norm said, it may be that the same person who hacked the RegSec site also attacked you.

Jeff nodded in agreement. I think thats likely. But whats important now is what we do. Ive asked to talk to you because I have a plan. If it succeeds, and I think we have a good chance of that, we can turn this into a positive.

You mean, catch the Anonymous hacker? Norm said.

Jeff smiled. Thats exactly what I mean. Catch him red-handed. His attacker had been a man so if the hacker was the same person, then they were searching for a he not a she, unless there was an accomplice.

Jeff watched as a slow smile spread across the agents face. I think Im going to enjoy learning exactly how you intend to do that.

By the time Jeff had finished explaining what he wanted, Norm was beaming.

A few minutes later the men went back downstairs to CyberCon, with Jeff retiring to the prep room. The hotel network CyberCon used employed Dynamic Host Configuration Protocol, or DHCP, in its computers. When attendees connected to the network they received IP addresses. That was key to what Daryl had suggested. Next, he just needed to acquire an open source trivia game Web site plug-in.

The plan was simple. Clive would offer the trivia game to attendees. Daryl thought, and Jeff agreed, that almost everyone would participate, especially as Clive was going to give prizes. Next, Jeff wrote a tool that monitored game log-ins and produced their IP addresses on the hotel Web server. If the Anonymous hacker participated in the game, the same IP address would appear and Jeff would have him.

There were some potential problems, though. For one, the hacker might not take part. Jeff thought that unlikely but he had to acknowledge it as a possibility. He would also be out of luck if the hacker had left the hotel after executing the attack and then returned since he would have a different IP. Still, hed reasoned most attendees were staying at the conference hotel and it was unlikely many had left the premises and then come back. Hed explained the downside to Clive and Norm but in their opinion the plan had a good shot at success. In anticipation of that, Norm had called the local FBI office and summoned assistance.

Jeff called Clive and told him he was ready for him. A few minutes later the man entered the prep room and sat with him. For the next twenty minutes, he and Jeff brainstormed a number of trivia questions such as What was the first PC virus named? Answer: Brain. The process took less than half an hour.

The conference was scheduled to conclude with a keynote speech. This year the speaker was the head of security for the National Security Agency, or NSA, Americas omnibus information protection and communications intercept agency. The theme of his presentation was that cyber-security was the new theater of war and where the first, even final, shots would very likely be fired. It was a theme everyone in attendance was interested in and it would be well if not universally attended.

When the meeting room was nearly full, but a few minutes before the speaker was to begin, Jeff sat in an outside aisle seat in the middle of the room. Clive took to the public address system, and once he had the attendees attention he spoke. This year, he said, as an added event were asking you all to take part in a cyber-security game of trivia before the keynote presentation. I think youll find it very interesting. A few minutes earlier Jeff had uploaded the game to the conference Web site. Now Clive gave the Web address. Attendees were to log in as usual to access the game. The user who submits the most correct answers first, Clive added, wins five hundred dollars and a special printed award certificate. There were smiles all around. Second- and third-place winners will also receive award certificates. So lets get playing. Well announce the winners after the speech.

Jeff watched the players frantically log in using their laptops, tablets, and smartphones. As they began playing he felt a thrill. In his work, he protected companies from cyber-attacks, from those whose faces he never saw. Or he cleaned up after such attacks, fixing the digital mess theyd left behind. It was rare he actually faced the hacker, saw the criminal face-to-face.

The events the year before, when he and Daryl had dampened an Al Qaeda cyber-attack on the Internet in the West, had brought him in personal contact with those whod launched the assault. Hed nearly been killed as a result and those men died. He didnt expect this to have the same extreme outcome, fortunately.

The game was proving to be popular, as hed expected. From where he sat, Jeff accessed the hotel Wi-Fi to sniff about and to see if he could identify the culprit. He monitored the network, searching for traffic using the attackers IP address. Most of the traffic he saw was, as expected, encrypted and so did not reveal any personal information about any of the users.

He concentrated on the mail server accesses and spotted attendees from cnn.com, techmeme.com, and any number of smaller, less well-known companies. Then he saw Combined Technologies International. Sixteen of their attendees there were playing the game, no, twenty-four,no, thirty-seven,now more than forty.

Jeff watched all log-ins closely. Then there it was: the same IP address logging into the CTI e-mail server. The hacker wasnt staying in another hotel and hed not left this one. Jeff straightened and drew a deep breath as he experienced a wave of elation. Then for a fleeting moment, he wondered if it could be Dillon Ritter. The very thought struck him as impossible. There was no stronger opponent of hacktivism in the industry.

Then he thought of Chuck Chacko. He was doing contract work for CTI. Could it be possible?

No, Jeff told himself. It was surely another CTI employee, who had an ax to grind. He didnt know all who were here but realized with a sinking heart hed very likely know, and probably like, the Anonymous hacker. Hed have to wait to see what the Web site log file said.

Jeff looked about and realized the room was buzzing as the attendees submitted their answers and jovially taunted each other. The speech was about to begin and the room grew silent. A few moments later Clive introduced the keynote speaker to a round of applause. The NSA officer took the podium and walked the attendees through a well-crafted PowerPoint presentation. His point was simple enough: the world was at war and almost no one knew it. That had to change.

None of this was news to Jeff, and he suspected it wasnt to nearly all of those here. It always seemed to be upper management or senior government officials who didnt get it. They hid in the forest of the numbers, betting theyd never be targeted or that there was no reason to counterattack.

Hiding from reality had been the case with Reginald Hinton, CEO of RegSec. For all his posturing and bravado hed run a company with no better than average security. During his forensic investigation Jeff had found all the usual failings unpatched vulnerabilities, antivirus software not updated, firewalls turned off.

And RegSec held the most private and sensitive information a customer could give. Its Web site bragged that it employed the most sophisticated digital protections in existence. The company asked the public for its trust and Hinton had betrayed them. Anonymous had not looted any accounts so far that had not been its style but in such a ragtag group it was inevitable. And to Jeffs knowledge no private records had been stolen, but Anonymous had done that in the past.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Operation Desolation: A Short Story»

Look at similar books to Operation Desolation: A Short Story. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Operation Desolation: A Short Story»

Discussion, reviews of the book Operation Desolation: A Short Story and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.