Mick waved goodbye to Kateryna as he rode off on the CBR. He felt a lump in his throat, but it was soon replaced by anticipation. Mick hoped her part in the plan would help her avoid trouble from the authorities. He still had twenty minutes until Kateryna would make her phone call to initiate the chain of events.
Mick had memorized the map from his computer showing a nearby section of freeway where it crossed the river. Before getting on the freeway, he rode along a dirt road that ran along the riverbank. He stopped and changed his clothes, putting some clothing and his computer in the canvas bag from the hospital. He carefully noted the location, riding towards the bridge. He paused surveying it, paying particular attention to the guardrail on the entrance curve.
This could work, but it will be risky!
He turned around and rode to the freeway. He parked the bike and pretended to check the engine.
How long will I have to wait?
He imagined the phone call he asked Kateryna to make to her husband. She would pretend to be upset, saying that she had tried to persuade him to give himself up, but they had argued, and Mick had ridden away on the motorcycle. She would tell which direction he went, saying she just didn’t want him to get hurt.
In less than fifteen minutes, he got his answer. First, he noticed the flow of cars on the freeway stopped. In the eerie quiet, he got back on the bike and started it up. In his mirrors, he saw three vehicles in the distance approaching at high speed.
Time to go!
He took off, going through the gears. The vehicles were closing, as the CBR did not have the torque to leave them behind.
Come on! Stupid gutless 125!
He could see the bridge ahead, but the cars closed rapidly. He hoped that he would be able to make it.
As he approached the bridge, he steered out of his lane towards the small gap in the guardrail, standing on the foot pegs and crouching down. As the bike went airborne, he stood up on the pegs, lifting the front wheel.
He flew through the air for ten meters, preparing for the impact and the pain. He let go of the bike just before he hit the water; everything went dark.
Chapter 24.
To the Joint Anti-Botnet Information Taskforce:
While the first month of this taskforce has not covered itself with glory, I have no doubt that this team will eventually meet its objectives. On the positive side, the Cloud 8++ consortium has been broken up – all major players are now believed dead. The Zed.Kicker botnet appears to be dormant, but not dismantled.
On the negative side, we have lost track of Mick O’Malley once again. We believe he is the only individual who can control the botnet. I know some think he is dead, but I believe he is still alive.
For now, our first goal remains to reverse engineer the botnet in order to take control of it.
Our other goal is to find O’Malley, or find his body.
Nothing will be spared in this operation. We must succeed. I will lead this team until we have met our objectives.
General
Chapter 25.
Mick saw only blackness, and felt only numbing cold. He exhaled, and a burst of bubbles escaped. He felt which way they went, and oriented himself. He kicked his legs, stretched out his arms, and started to move.
Above him was a faint glow of light, so he swam harder towards it. He broke the surface and gulped a breath of cold air into his lungs, treading water as he got his bearings in the twilight.
He had already drifted downstream. The headlights of the pursuing vehicles stopped on the bridge above him. He dove under the water again, swimming at right angles to the current towards the far bank, trying to stay out of sight. He grabbed an overhanging branch and pulled himself out of the water.
Mick stepped on the shore and quickly made for some nearby pine trees. He did a few pushups to get his circulation going.
He shivered as he made his way along the bank, hearing more and more sirens in the distance.
Further down, he found the canvas bag he had hidden earlier. He stripped off his wet clothes and dressed in the dry ones from inside the bag. He set off walking. With a bit of luck, he would escape with his life.
Over the next five thousand kilometers he walked, rode, and sailed on his journey, Mick had one thought over and over.
Was it worth it?
Chapter 26.
Two months later...
Halfway between Dublin and Dun Laoghaire, Seamus Campbell got off the train and walked the short distance to the building. The Blackrock shop was Ireland’s largest dealer of Moto Guzzi motorcycles, Seamus’s second favorite brand of Italian motorcycles. There was a light dusting of snow on the ground that he knew would likely be melted by the afternoon.
As he walked in the door, a short man behind the counter called out to him.
“Hey, there, Seamus! You are right on time today!”
“Hey Finbar – well, I have to impress the boss, don’t I?” Seamus called out as he walked behind the counter, hung up his jacket, and prepared for another day’s work. He wore jeans, a green and gold team uniform shirt, and running shoes.
“Are you going to hurling training tonight?”
“For sure!” he replied.
Seamus was relatively happy these days, and had made many new friends in the small town south of Dublin. He did miss his friends and family. But on the worst nights, he thought of one particular woman.
When Seamus wasn’t working at the shop, he worked on his side project: monitoring a botnet. He could see some occasional probes but so far no serious attempts had been made by anyone to wrest control of the botnet. He was also busy gathering data about the extent of the botnet – compiling information that he hoped one day could be use to completely dismantle it. He had also been painstakingly going through his personal servers to try to find evidence that the silent exploit had been used against it in the theft of his private key. He had not found anything definitive, but he did find some suspicious code that he was having a difficult time analyzing. And he did find a name in the code: nØviz.
He occasionally read articles about UBK in the press. Some were about the rollback of the U.S. Government IT contract. However, others were about new contracts involving other governments. How this could be baffled him.
Seamus had also made some contacts with the local hacker community. He pretended to know much less than he did, and so far had made a few useful friends for the future. He always kept an ear out for one particular hacker friend, but had so far heard nothing.
For now, the botnet, an Internet weapon of mass destruction, was neutralized, in the same way the radioactivity from Chernobyl was encased in a concrete tomb, but was still deadly. He had averted the zero day attack and the resulting destruction, but the weapon was still out there, and the struggle to regain control of the botnet or create a new one was far from over.
In the meantime, he planned to work on motorcycles.
# # #
Alan B. Johnston
Born in Melbourne, Australia, Alan B. Johnston holds two passports, but the same name is on both documents. He currently lives in the United States. His introduction to computers as a tween was machine language programming on a 68ØØ microprocessor. The first high level programming language he learnt was APL. During his teens, he experimented with electronics and amateur radio, talking to people all over the world on his favorite 2Ø meter band, and using amateur satellites.
He started university at age sixteen and has a PhD in engineering. He teaches and works on Internet Communication, and is the co-author of the VoIP security protocol ZRTP. He is the author of four non-fiction books on Voice over IP (VoIP), Internet Communication, Session Initiation Protocol (SIP), and VoIP security. He holds several patents and is a frequent conference speaker worldwide. He has traveled extensively earning more than a million lifetime frequent flier miles.
He owns several motorcycles but no Ducatis. His favorite is an old 1970s Yamaha Enduro. He is an avid dinghy sailor, but has no blue water sailing exper
ience. He enjoys writing, having written several technical books, a dissertation, and some haiku. Counting from Zero is his first novel.
Bibliography and Resources
More information and links about this book and the author are available on the Internet at:
http://countingfromzero.net
Visit us on Facebook:
http://www.facebook.com/countingfromzero
Follow us on Twitter (note there is no 'o' in from in the username):
http://www.twitter.com/countingfrmzero
If you are interested in learning more about some of the computer and Internet security topics discussed in this book, I’d suggest the following:
For more information about open source and free software (“free as in speech, not as in beer”), there is the Free Software Foundation (http://www.fsf.org).
For resources on privacy and free speech on the Internet, there is the Electronic Frontier Foundation (https://www.eff.org) and the Center for Democracy and Technology (https://www.cdt.org).
The Internet Society (http://www.isoc.org) promotes the continued development of an open, free, global Internet through standards, education, and policies.
To get an idea of the dangers of social engineering, and sound policies every organization should implement to protect against it, I would recommend The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick and William L. Simon.
For those wanting to learn the technical details of security, the classic text is Bruce Schneier’s Practical Cryptography, which describes the Diffie-Hellman public key algorithm.
For those wanting to secure their email communication, I would recommend the GNU Privacy Guard or other open source code based on Open PGP (http://gnupg.org). For securing VoIP (Voice over Internet Protocol) communications, take a look at Zfone (http://zfoneproject.com) which uses the ZRTP protocol, and the open source project Cryptophone (http://www.cryptophone.de).
For a history of cryptography and code breaking, I would recommend Simon Singh’s The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. It has an interesting account of the efforts of Alan Turing and others to break the German Enigma encryption during World War II, to the recent history of PGP email encryption and government attempts to control encryption.
For an interesting non-fiction account of real zero day exploits and organized crime's use of the Internet, I would recommend Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet by Joseph Menn.
Counting from Zero Page 24