by D S Kane
Carl Hernandez. President of the United States.
Judy Hernandez. A personal trainer working at the YMCA in Manhattan.
Achmed Houmaz. Youngest of the brothers, Achmed was left to run Arab Oil Corporation after Tariq was disowned by their father and Pesi followed Tariq from the family. Achmed resides in Riyadh, Saudi Arabia.
Pesi Houmaz. Second in command of a Muslim Brotherhood offshoot group headquartered at its training facility near Upper Pachir, Afghanistan. Pesi is the brother of Tariq Houmaz. Pesi resides in Saudi Arabia.
Tariq Houmaz. Leader of Muslim Brotherhood offshoot terrorism group, located near Upper Pachir, Afghanistan.
Charlette Keegan-Ashbury. Call-sign CypherGhost. A first-rate hacker whose future was formed through a personal tragedy when her boyfriend was set up and falsely arrested for hacking the NSA.
Maulvi Muhammed Khalis. Hazret Ali’s mullah, Nangarhar province, Afghanistan.
Nomi Klein. Cobbler (document forger) working for the Mossad in the South Bronx, New York.
Misha Kovich. Cassandra Sashakovich’s uncle and Kiril Sashakovich’s brother. Worked for the KGB until the fall of the Soviet Union, then worked for the Russian Mafiya transporting weapons and money between Moscow and Vladivostok.
Lily Lee. A girlfriend of William Wing, she lives in Hong Kong. She is also a call girl and her father owns an upscale restaurant, Star Luk restaurant in Hong Kong’s harbor
Major Jacques LeFleur. French North African Battle Operations Specialist.
Clyde MacIntosh. Case officer, MI-6, reporting to Sir Charles Crane.
Adam Mahee. Stanford University adjunct faculty, project manager and contractor, Silicon Valley.
Sharon Marconi. Louis Steponi’s girlfriend, who is, like Louis, a professional assassin.
Debra McCandless. Treasurer of Stillwater Technologies, Inc., a Silicon Valley chipset developer in San Jose, California.
Mark McDougal. Director, unnamed intelligence agency, Washington, DC. McDougal is Bob Gault and Cassandra Sashakovich’s boss. McDougal reports to Gilbert Greenfield, who runs an agency so secret that it is “unnamed.”
Major Alister McTavish. British Tactics Commander, hired as a mercenary by Major Avram Shimmel.
Samuel Meyer. Call-sign Uncle Sam. Associate Director of the Mossad and liaison to Aman, successor to Yigdal Ben-Levy. Meyer graduated from Harvard Law School.
Shula Ries. Call-sign Viper, Mossad kidon who reports to Yigdal Ben-Levy. Ries is more than just a honeypot for the Mossad. She is lethal with any weapon and has no conscience.
Lev Robinson. A Ness Ziona scientist who works on Bug-Lok, and was turned into a mole by Sir Charles Crane, an MI-6 spymaster.
Irwin Sadowski. Legislative assistant to Senator Ruth Cantor.
Ann Silbey Sashakovich. Homeless teenager living in the tunnels under Manhattan, adopted by Cassandra Sashakovich.
Cassandra Sashakovich. Call-sign Swiftshadow, Multiple aliases, including Chandra Paklorri, Chrissie Card, Darla Kidon, Denise Hardcastle, Susan Blumenthal, Elaine Teman, and Emily Fishcallow. Former NOC and hacker at Gilbert Greenfield’s unnamed intelligence service in Washington, DC. She has gone black, outed by a mole within the agency, and now is hunted by the Houmaz family.
Kiril Sashakovich. Cassandra’s father, professor of economics, Stanford University, and former econometric planner for the now defunct Soviet Union.
Natasha Sashakovich. Cassandra’s mother, member of the Half Moon Bay, California city council, and former case officer for the KGB.
Gunda Schlein. Finance Manager, Dreitsbank, Munich. Schlein’s brother is held by MI-6 to compel her to spy on Jon Sommers. But Sommers has also tried to double her.
Dr. Henry Sheldorff. High-priced Manhattan plastic surgeon.
Avram Shimmel. Call-sign Clearcut, mercenary, former major in the IDF,and later, a Mossad kidon. Shimmel is 6’7” and a wall of muscle, but he also was one of the IDF’s most gifted tacticians. His pregnant wife and young daughter were killed by a car bomb set by Tariq Houmaz.
Bernhard Sicci. FBI Assistant Director for Counterterrorism
Jon Sommers. Call-sign Quicksilver, aka Friedrich Stamphil. Mossad katsa working for Ruth Cohen. A year ago, Jon was recruited by Yigdal Ben-Levy after Jon’s fiancée, Lisa Gabriel, died in a car bombing.
Abel Sommerstein. Jon Sommers’ father.
Natasha Sommerstein. Jon Sommers’ mother.
Sandhia Sorab. Funds Transfer Repair Station Specialist at the Bank of Trade, Karachi, Pakistan.
Louis Stepponi. A professional assassin.
Herr Rickard Stossler. A cover identity for Yigdal Ben-Levy.
Shimon Tennenbaum. A Mossad kidon who works for Yigdal Ben-Levy.
Nikita Tobelov. Head of Russian Mafiya’s Eastern District, in Vladivostok.
Benjamin Franklin Wagner. US Ambassador to Israel.
Phillip Watson. Graduate student at working in the Technology Centre of the University of London.
Jacob David “JD” Weinstein. A Mossad kidon who works for Yigdal Ben-Levy.
Ari Westheim. A Mossad kidon who works for Yigdal Ben-Levy.
William Wing. Call-sign CryptoMonger. Hacker, living in Hong Kong, contract worker for corporations, MI-6, the Mossad, and other intelligence services. He was disowned by his father when he was twelve years old, for hacking into the CSIS servers.
Xian Wing. Director of Chinese Security Information Systems (CSIS). Father of William Wing.
Appendix B – On CyberWar
“A cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11. Such a destructive cyber-terrorist attack could virtually paralyze the nation.
…Two months ago… a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco. Shamoon included a routine called a ‘wiper’, coded to self-execute. This routine replaced crucial systems… overwrote all the real data on the machine. More than 30,000 computers that it infected were rendered useless.
It’s no secret that Russia and China have advanced cyber capabilities. Iran has also undertaken a concerted effort to use cyberspace to its advantage.”
—Former Secretary of Defense Leon Panetta,
October 11, 2012
Author’s Note:
Internet Links Composing a Primer on
Government-Hacker Relations (by DS Kane)
Governments and hackers have a love-hate relationship. The war between hackers and the governments of the countries in which they live has been ongoing for more than a decade, with hackers fighting hackers.
This is the most difficult edge of the knife that is the overall interface of technology and politics. Hackers have roles that are described by governments as either white hats, working for the government, or black hats, working for criminal organizations or software security companies, or gray hats, whose affiliations are not easily determined. It all depends on which government and where the hacker operates, let alone their own allegiances. It has always been this way, since I first got involved in the hacker world, working as a government hacker over thirty years ago.
To see how complex and dynamic this world is, I have compiled a sampling of just over five months’ news relating to computer security consultants (white-hat hackers), cyber thieves (black hats),government crackers (gray hats) and politicians (most changing their opinions based on whatever wind floats them on a given day). Most of those politicians who are attempting to write our cyber laws have never used a computer and have no idea what encryption is or how it works.
Although eclectic rather than comprehensive, this sample could provide a basic education in the politics of computer hacking. Each link will take you to an article written by a journalist who has a background in computer security and forensics:
August 16, 2016 – Duo Security Reports It Takes an Average of 25 Minutes for a Hacker To Break Into Your Computer System | The Daily Dot
http://www.dailydot.com/la
yer8/duo-insight-phishing-report/
August 16, 2016 – Edward Snowden: Russia Is Chief Suspect In NSA Hack
http://www.forbes.com/sites/thomasbrewster/2016/08/16/edward-snowden-russia-nsa-hacked/amp/
August 15, 2016 – NSA Prism Target Had Gmail and Facebook Hacked
http://www.businessinsider.com/nsa-prism-target-had-gmail-and-facebook-hacked-2016-8/#this-is-a-picture-of-tony-fullman-in-nsa-files-taken-from-his-facebook-it-has-the-exif-data-generated-by-the-camera-he-took-it-with-1
August 15, 2016 – Shopping for Spy Gear: Catalog Advertises NSA Toolbox – SPIEGEL ONLINE – News – International
http://m.spiegel.de/international/world/a-940994.html#spRedirectedFrom=www&referrrer=
August 15, 2016 – NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | LeakSource
https://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/
August 15, 2016 – Let’s Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools | Motherboard
https://motherboard.vice.com/read/michael-ossmann-and-the-nsa-playset
August 15, 2016 – Hackers Say They Hacked NSA-Linked Group, Want 1 Million Bitcoins to Share More | Motherboard
http://motherboard.vice.com/read/hackers-hack-nsa-linked-equation-group|
August 14, 2016 – Guy Tricks Tech Support Scammers Into Installing Ransomware
http://www.ubergizmo.com/2016/08/tech-support-scammers-install-ransomware/
August 12, 2016 – I hung around with hackers for a week, and now I’m completely paranoid – Business Insider
http://www.businessinsider.com/hacking-conferences-paranoia-2016-8
August 12, 2016 – Video: So you want to be a hacker? Advice from the kids of DEF CON – CSMonitor.com
http://www.csmonitor.com/World/Passcode/Security-culture/2016/0812/Video-So-you-want-to-be-a-hacker-Advice-from-the-kids-of-DEF-CON
August 11, 2016 – Those chip and PIN cards aren’t as secure as we thought
https://www.engadget.com/2016/08/11/chip-and-pin-card-hacking/
August 11, 2016 – Cybersecurity expert tips for attending Def Con hacker convention
http://www.businessinsider.com/def-con-hacker-convention-2016-7
August 11, 2016 – What you can buy at Def Con 24
http://www.businessinsider.com/defcon-sales-2016-8
August 11, 2016 – What it’s like at Defcon – Business Insider
http://www.businessinsider.com/defcon-24-2016-8
August 11, 2016 – Samsung Pay could have a major security flaw – Business Insider
http://www.businessinsider.com/samsung-pay-could-have-a-major-security-flaw-2016-8
August 11, 2016 – How Researchers Exposed Iranian Cyberattacks Against Hundreds of Activists | Motherboard
http://motherboard.vice.com/read/iran-cyberattacks-against-activists
August 10, 2016 – Hackers Are Now Breaking Into Your Purchase Orders – Fortune
http://fortune.com/2016/08/10/business-email-hackers
August 10, 2016 – Julian Assange Lied About a WikiLeaks Data Dump on National Television
http://gizmodo.com/julian-assange-lied-about-a-wikileaks-data-dump-on-nati-1785091653
August 10, 2016 – Oops: Microsoft leaks its Golden Key, unlocking Windows Secure Boot and exposing the danger of backdoors
http://appleinsider.com/articles/16/08/10/oops-microsoft-leaks-its-golden-key-unlocking-windows-secure-boot-and-exposing-the-danger-of-backdoors
August 9, 2016 – Quadrilateral Cowboy review – hacker sim takes you back to cyberpunk future | Technology | The Guardian
https://www.theguardian.com/technology/2016/aug/02/quadrilateral-cowboy-hacker-simulator-cyberpunk-blendo-games
August 8, 2016 – Researchers crack open unusually advanced malware that hid for 5 years | Ars Technica
http://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/
August 8, 2016 – This hush-hush hacker group has been quietly spying since 2011 | ZDNet
http://www.zdnet.com/article/this-hush-hush-hacker-group-has-been-quietly-spying-since-2011/
August 7, 2016 – Researchers Have Found A Way To Hack Monitors To Spy On You
http://www.ubergizmo.com/2016/08/researchers-hack-monitors-to-spy/
August 7, 2016 – ‘Quadrooter’ flaws affect over 900 million Android phones | ZDNet
http://www.zdnet.com/article/quadrooter-security-flaws-affect-over-900-million-android-phones/
August 7, 2016 – Hacker Unlocks ‘High Security’ Electronic Safes Without a Trace | WIRED
https://www.wired.com/2016/08/hacker-unlocks-high-security-electronic-safes-without-trace/
August 7, 2016 – Department of Justice Official Tells Hundred Federal Judges to Use Tor | Motherboard
http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor
August 7, 2016 – Florida company has a personal profile on nearly every American adult
http://www.digitaltrends.com/computing/personal-profiles-databases-records-private-investigators-source/
August 7, 2016 – A Hacker’s Tips for Overthrowing the Government
http://gizmodo.com/a-hackers-tips-for-overthrowing-the-government-1784924774
August 6, 2016 – White House Considers Elevating Status of Cyber Command/
http://www.zdnet.com/article/report-white-house-considers-elevating-status-of-cyber-command/
August 6, 2016 – Commentary: The world’s best cyber army doesn’t belong to Russia
http://www.reuters.com/article/us-election-intelligence-commentary-idUSKCN10F1H5
August 6, 2016 – Check out this drip: How Android Encryption Works
http://drippler.com/drip/how-android-encryption-works Via j.mp/drippler_app
August 6, 2016 – The political iconoclast at the center of Europe’s tech policy debate – CSMonitor.com
http://www.csmonitor.com/World/Passcode/2016/0806/The-political-iconoclast-at-the-center-of-Europe-s-tech-policy-debate
August 6, 2016 – NSA shares raw intelligence including Americans’ data with Israel | US news | The Guardian
https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
August 6, 2016 – NSA denies ‘Raiders of the Lost Ark’ stockpile of security vulnerabilities | Technology | The Guardian
https://www.theguardian.com/technology/2016/aug/06/nsa-zero-days-stockpile-security-vulnerability-defcon
August 6, 2016 – Julian Assange on hacking Trump’s tax returns: ‘We’re working on it’ – POLITICO
http://www.politico.com/story/2016/08/hack-trump-tax-returns-julian-assange-226751
August 5, 2016 – Hackers Say It Would Be “Too Easy” To Hack The U.S. Elections – BuzzFeed News
https://www.buzzfeed.com/sheerafrenkel/hackers-say-it-would-be-too-easy-to-hack-the-us-elections
August 5, 2016 – Computer expert hacks into common voting machine in minutes to reveal shocking 2016 election threat
http://www.rawstory.com/2016/08/computer-expert-hacks-into-common-voting-machine-in-minutes-to-reveal-shocking-2016-election-threat/
August 5, 2016 – Hackers for Hillary: event attendance ‘through the roof’ after Trump remarks | Technology | The Guardian
http://www.theguardian.com/technology/2016/aug/04/hackers-for-hillary-attendance-black-hat-conference-trump
August 4, 2016 – Chip-and-PIN credit cards hacked easily, Black Hat conference proves —RT America
https://www.rt.com/usa/354657-chip-pin-cards-blackhat/
August 4, 2016 – This Engineer Started a Tor-Based Internet Provider to Fight Surveillance | Motherboard
http://motherboard.vice.com/read/brass-horn-tor-ISP-says-buzz-off-surveillance
August 4, 2016 – Spoofing GPS is surprisingly easy; detecting it is surprisingly hard / Boing Boing
h
ttp://boingboing.net/2016/08/04/spoofing-gps-is-surprisingly-e.html
August 4, 2016 – Frank Abagnale Says Cyber Crime Is About To Get ‘Scary’ | Inc.com
http://www.inc.com/will-yakowicz/frank-abagnale-cyber-crime.html
August 2, 2016 – Encryption’s quantum leap: The race to stop the hackers of tomorrow
http://www.zdnet.com/article/encryptions-quantum-leap-the-race-to-stop-the-hackers-of-tomorrow/?ftag=TREc64629f&bhid=26199999350103284654847101531876
August 2, 2016 – We Asked Hackers To Predict The Future of Hacking | Motherboard
https://motherboard.vice.com/read/the-future-of-hacking-podcast
August 2, 2016 – Hackers Hijack a Big Rig Truck’s Accelerator and Brakes | WIRED
https://www.wired.com/2016/08/researchers-hack-big-rig-truck-hijack-accelerator-brakes/
August 2, 2016 – The Hacks We Can’t See | Motherboard
https://motherboard.vice.com/the-hacks-we-cant-see
August 2, 2016 – Mission Impossible: The Ridiculous Tech Of Jason Bourne | Fast Company | Business + Innovation
https://www.fastcompany.com/3062417/mission-impossible-the-ridiculous-tech-of-jason-bourne
August 2, 2016 – Two Factor Auth List
https://twofactorauth.org/
August 2, 2016 – The Motherboard Guide to Not Getting Hacked | Motherboard
https://motherboard.vice.com/read/the-motherboard-guide-to-not-getting-hacked
August 1, 2016 – Chinese Mole Uncovered Inside the FBI | Observer
http://observer.com/2016/08/breaking-chinese-mole-uncovered-inside-the-fbi/
August 1, 2016 – FBI’s Hacking Tool Found To Have Compromised Dozens Of Computers In Austria | Techdirt
https://www.techdirt.com/articles/20160731/16062035119/fbis-hacking-tool-found-to-have-compromised-dozens-computers-austria.shtml
August 1, 2016 – Encryption: It’s a big issue for technology
http://www.news.com.au/technology/online/security/fbi-director-wants-to-resolve-encryption-issue-before-something-terrible-happens/news-story/c5dfc8d368719151bfa273147cbca770
August 1, 2016 – Free ways to learn about IT, security and hacking online | ZDNet