CypherGhost

Home > Other > CypherGhost > Page 25
CypherGhost Page 25

by D S Kane


  Carl Hernandez. President of the United States.

  Judy Hernandez. A personal trainer working at the YMCA in Manhattan.

  Achmed Houmaz. Youngest of the brothers, Achmed was left to run Arab Oil Corporation after Tariq was disowned by their father and Pesi followed Tariq from the family. Achmed resides in Riyadh, Saudi Arabia.

  Pesi Houmaz. Second in command of a Muslim Brotherhood offshoot group headquartered at its training facility near Upper Pachir, Afghanistan. Pesi is the brother of Tariq Houmaz. Pesi resides in Saudi Arabia.

  Tariq Houmaz. Leader of Muslim Brotherhood offshoot terrorism group, located near Upper Pachir, Afghanistan.

  Charlette Keegan-Ashbury. Call-sign CypherGhost. A first-rate hacker whose future was formed through a personal tragedy when her boyfriend was set up and falsely arrested for hacking the NSA.

  Maulvi Muhammed Khalis. Hazret Ali’s mullah, Nangarhar province, Afghanistan.

  Nomi Klein. Cobbler (document forger) working for the Mossad in the South Bronx, New York.

  Misha Kovich. Cassandra Sashakovich’s uncle and Kiril Sashakovich’s brother. Worked for the KGB until the fall of the Soviet Union, then worked for the Russian Mafiya transporting weapons and money between Moscow and Vladivostok.

  Lily Lee. A girlfriend of William Wing, she lives in Hong Kong. She is also a call girl and her father owns an upscale restaurant, Star Luk restaurant in Hong Kong’s harbor

  Major Jacques LeFleur. French North African Battle Operations Specialist.

  Clyde MacIntosh. Case officer, MI-6, reporting to Sir Charles Crane.

  Adam Mahee. Stanford University adjunct faculty, project manager and contractor, Silicon Valley.

  Sharon Marconi. Louis Steponi’s girlfriend, who is, like Louis, a professional assassin.

  Debra McCandless. Treasurer of Stillwater Technologies, Inc., a Silicon Valley chipset developer in San Jose, California.

  Mark McDougal. Director, unnamed intelligence agency, Washington, DC. McDougal is Bob Gault and Cassandra Sashakovich’s boss. McDougal reports to Gilbert Greenfield, who runs an agency so secret that it is “unnamed.”

  Major Alister McTavish. British Tactics Commander, hired as a mercenary by Major Avram Shimmel.

  Samuel Meyer. Call-sign Uncle Sam. Associate Director of the Mossad and liaison to Aman, successor to Yigdal Ben-Levy. Meyer graduated from Harvard Law School.

  Shula Ries. Call-sign Viper, Mossad kidon who reports to Yigdal Ben-Levy. Ries is more than just a honeypot for the Mossad. She is lethal with any weapon and has no conscience.

  Lev Robinson. A Ness Ziona scientist who works on Bug-Lok, and was turned into a mole by Sir Charles Crane, an MI-6 spymaster.

  Irwin Sadowski. Legislative assistant to Senator Ruth Cantor.

  Ann Silbey Sashakovich. Homeless teenager living in the tunnels under Manhattan, adopted by Cassandra Sashakovich.

  Cassandra Sashakovich. Call-sign Swiftshadow, Multiple aliases, including Chandra Paklorri, Chrissie Card, Darla Kidon, Denise Hardcastle, Susan Blumenthal, Elaine Teman, and Emily Fishcallow. Former NOC and hacker at Gilbert Greenfield’s unnamed intelligence service in Washington, DC. She has gone black, outed by a mole within the agency, and now is hunted by the Houmaz family.

  Kiril Sashakovich. Cassandra’s father, professor of economics, Stanford University, and former econometric planner for the now defunct Soviet Union.

  Natasha Sashakovich. Cassandra’s mother, member of the Half Moon Bay, California city council, and former case officer for the KGB.

  Gunda Schlein. Finance Manager, Dreitsbank, Munich. Schlein’s brother is held by MI-6 to compel her to spy on Jon Sommers. But Sommers has also tried to double her.

  Dr. Henry Sheldorff. High-priced Manhattan plastic surgeon.

  Avram Shimmel. Call-sign Clearcut, mercenary, former major in the IDF,and later, a Mossad kidon. Shimmel is 6’7” and a wall of muscle, but he also was one of the IDF’s most gifted tacticians. His pregnant wife and young daughter were killed by a car bomb set by Tariq Houmaz.

  Bernhard Sicci. FBI Assistant Director for Counterterrorism

  Jon Sommers. Call-sign Quicksilver, aka Friedrich Stamphil. Mossad katsa working for Ruth Cohen. A year ago, Jon was recruited by Yigdal Ben-Levy after Jon’s fiancée, Lisa Gabriel, died in a car bombing.

  Abel Sommerstein. Jon Sommers’ father.

  Natasha Sommerstein. Jon Sommers’ mother.

  Sandhia Sorab. Funds Transfer Repair Station Specialist at the Bank of Trade, Karachi, Pakistan.

  Louis Stepponi. A professional assassin.

  Herr Rickard Stossler. A cover identity for Yigdal Ben-Levy.

  Shimon Tennenbaum. A Mossad kidon who works for Yigdal Ben-Levy.

  Nikita Tobelov. Head of Russian Mafiya’s Eastern District, in Vladivostok.

  Benjamin Franklin Wagner. US Ambassador to Israel.

  Phillip Watson. Graduate student at working in the Technology Centre of the University of London.

  Jacob David “JD” Weinstein. A Mossad kidon who works for Yigdal Ben-Levy.

  Ari Westheim. A Mossad kidon who works for Yigdal Ben-Levy.

  William Wing. Call-sign CryptoMonger. Hacker, living in Hong Kong, contract worker for corporations, MI-6, the Mossad, and other intelligence services. He was disowned by his father when he was twelve years old, for hacking into the CSIS servers.

  Xian Wing. Director of Chinese Security Information Systems (CSIS). Father of William Wing.

  Appendix B – On CyberWar

  “A cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11. Such a destructive cyber-terrorist attack could virtually paralyze the nation.

  …Two months ago… a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco. Shamoon included a routine called a ‘wiper’, coded to self-execute. This routine replaced crucial systems… overwrote all the real data on the machine. More than 30,000 computers that it infected were rendered useless.

  It’s no secret that Russia and China have advanced cyber capabilities. Iran has also undertaken a concerted effort to use cyberspace to its advantage.”

  —Former Secretary of Defense Leon Panetta,

  October 11, 2012

  Author’s Note:

  Internet Links Composing a Primer on

  Government-Hacker Relations (by DS Kane)

  Governments and hackers have a love-hate relationship. The war between hackers and the governments of the countries in which they live has been ongoing for more than a decade, with hackers fighting hackers.

  This is the most difficult edge of the knife that is the overall interface of technology and politics. Hackers have roles that are described by governments as either white hats, working for the government, or black hats, working for criminal organizations or software security companies, or gray hats, whose affiliations are not easily determined. It all depends on which government and where the hacker operates, let alone their own allegiances. It has always been this way, since I first got involved in the hacker world, working as a government hacker over thirty years ago.

  To see how complex and dynamic this world is, I have compiled a sampling of just over five months’ news relating to computer security consultants (white-hat hackers), cyber thieves (black hats),government crackers (gray hats) and politicians (most changing their opinions based on whatever wind floats them on a given day). Most of those politicians who are attempting to write our cyber laws have never used a computer and have no idea what encryption is or how it works.

  Although eclectic rather than comprehensive, this sample could provide a basic education in the politics of computer hacking. Each link will take you to an article written by a journalist who has a background in computer security and forensics:

  August 16, 2016 – Duo Security Reports It Takes an Average of 25 Minutes for a Hacker To Break Into Your Computer System | The Daily Dot

  http://www.dailydot.com/la
yer8/duo-insight-phishing-report/

  August 16, 2016 – Edward Snowden: Russia Is Chief Suspect In NSA Hack

  http://www.forbes.com/sites/thomasbrewster/2016/08/16/edward-snowden-russia-nsa-hacked/amp/

  August 15, 2016 – NSA Prism Target Had Gmail and Facebook Hacked

  http://www.businessinsider.com/nsa-prism-target-had-gmail-and-facebook-hacked-2016-8/#this-is-a-picture-of-tony-fullman-in-nsa-files-taken-from-his-facebook-it-has-the-exif-data-generated-by-the-camera-he-took-it-with-1

  August 15, 2016 – Shopping for Spy Gear: Catalog Advertises NSA Toolbox – SPIEGEL ONLINE – News – International

  http://m.spiegel.de/international/world/a-940994.html#spRedirectedFrom=www&referrrer=

  August 15, 2016 – NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware | LeakSource

  https://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/

  August 15, 2016 – Let’s Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools | Motherboard

  https://motherboard.vice.com/read/michael-ossmann-and-the-nsa-playset

  August 15, 2016 – Hackers Say They Hacked NSA-Linked Group, Want 1 Million Bitcoins to Share More | Motherboard

  http://motherboard.vice.com/read/hackers-hack-nsa-linked-equation-group|

  August 14, 2016 – Guy Tricks Tech Support Scammers Into Installing Ransomware

  http://www.ubergizmo.com/2016/08/tech-support-scammers-install-ransomware/

  August 12, 2016 – I hung around with hackers for a week, and now I’m completely paranoid – Business Insider

  http://www.businessinsider.com/hacking-conferences-paranoia-2016-8

  August 12, 2016 – Video: So you want to be a hacker? Advice from the kids of DEF CON – CSMonitor.com

  http://www.csmonitor.com/World/Passcode/Security-culture/2016/0812/Video-So-you-want-to-be-a-hacker-Advice-from-the-kids-of-DEF-CON

  August 11, 2016 – Those chip and PIN cards aren’t as secure as we thought

  https://www.engadget.com/2016/08/11/chip-and-pin-card-hacking/

  August 11, 2016 – Cybersecurity expert tips for attending Def Con hacker convention

  http://www.businessinsider.com/def-con-hacker-convention-2016-7

  August 11, 2016 – What you can buy at Def Con 24

  http://www.businessinsider.com/defcon-sales-2016-8

  August 11, 2016 – What it’s like at Defcon – Business Insider

  http://www.businessinsider.com/defcon-24-2016-8

  August 11, 2016 – Samsung Pay could have a major security flaw – Business Insider

  http://www.businessinsider.com/samsung-pay-could-have-a-major-security-flaw-2016-8

  August 11, 2016 – How Researchers Exposed Iranian Cyberattacks Against Hundreds of Activists | Motherboard

  http://motherboard.vice.com/read/iran-cyberattacks-against-activists

  August 10, 2016 – Hackers Are Now Breaking Into Your Purchase Orders – Fortune

  http://fortune.com/2016/08/10/business-email-hackers

  August 10, 2016 – Julian Assange Lied About a WikiLeaks Data Dump on National Television

  http://gizmodo.com/julian-assange-lied-about-a-wikileaks-data-dump-on-nati-1785091653

  August 10, 2016 – Oops: Microsoft leaks its Golden Key, unlocking Windows Secure Boot and exposing the danger of backdoors

  http://appleinsider.com/articles/16/08/10/oops-microsoft-leaks-its-golden-key-unlocking-windows-secure-boot-and-exposing-the-danger-of-backdoors

  August 9, 2016 – Quadrilateral Cowboy review – hacker sim takes you back to cyberpunk future | Technology | The Guardian

  https://www.theguardian.com/technology/2016/aug/02/quadrilateral-cowboy-hacker-simulator-cyberpunk-blendo-games

  August 8, 2016 – Researchers crack open unusually advanced malware that hid for 5 years | Ars Technica

  http://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/

  August 8, 2016 – This hush-hush hacker group has been quietly spying since 2011 | ZDNet

  http://www.zdnet.com/article/this-hush-hush-hacker-group-has-been-quietly-spying-since-2011/

  August 7, 2016 – Researchers Have Found A Way To Hack Monitors To Spy On You

  http://www.ubergizmo.com/2016/08/researchers-hack-monitors-to-spy/

  August 7, 2016 – ‘Quadrooter’ flaws affect over 900 million Android phones | ZDNet

  http://www.zdnet.com/article/quadrooter-security-flaws-affect-over-900-million-android-phones/

  August 7, 2016 – Hacker Unlocks ‘High Security’ Electronic Safes Without a Trace | WIRED

  https://www.wired.com/2016/08/hacker-unlocks-high-security-electronic-safes-without-trace/

  August 7, 2016 – Department of Justice Official Tells Hundred Federal Judges to Use Tor | Motherboard

  http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor

  August 7, 2016 – Florida company has a personal profile on nearly every American adult

  http://www.digitaltrends.com/computing/personal-profiles-databases-records-private-investigators-source/

  August 7, 2016 – A Hacker’s Tips for Overthrowing the Government

  http://gizmodo.com/a-hackers-tips-for-overthrowing-the-government-1784924774

  August 6, 2016 – White House Considers Elevating Status of Cyber Command/

  http://www.zdnet.com/article/report-white-house-considers-elevating-status-of-cyber-command/

  August 6, 2016 – Commentary: The world’s best cyber army doesn’t belong to Russia

  http://www.reuters.com/article/us-election-intelligence-commentary-idUSKCN10F1H5

  August 6, 2016 – Check out this drip: How Android Encryption Works

  http://drippler.com/drip/how-android-encryption-works Via j.mp/drippler_app

  August 6, 2016 – The political iconoclast at the center of Europe’s tech policy debate – CSMonitor.com

  http://www.csmonitor.com/World/Passcode/2016/0806/The-political-iconoclast-at-the-center-of-Europe-s-tech-policy-debate

  August 6, 2016 – NSA shares raw intelligence including Americans’ data with Israel | US news | The Guardian

  https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents

  August 6, 2016 – NSA denies ‘Raiders of the Lost Ark’ stockpile of security vulnerabilities | Technology | The Guardian

  https://www.theguardian.com/technology/2016/aug/06/nsa-zero-days-stockpile-security-vulnerability-defcon

  August 6, 2016 – Julian Assange on hacking Trump’s tax returns: ‘We’re working on it’ – POLITICO

  http://www.politico.com/story/2016/08/hack-trump-tax-returns-julian-assange-226751

  August 5, 2016 – Hackers Say It Would Be “Too Easy” To Hack The U.S. Elections – BuzzFeed News

  https://www.buzzfeed.com/sheerafrenkel/hackers-say-it-would-be-too-easy-to-hack-the-us-elections

  August 5, 2016 – Computer expert hacks into common voting machine in minutes to reveal shocking 2016 election threat

  http://www.rawstory.com/2016/08/computer-expert-hacks-into-common-voting-machine-in-minutes-to-reveal-shocking-2016-election-threat/

  August 5, 2016 – Hackers for Hillary: event attendance ‘through the roof’ after Trump remarks | Technology | The Guardian

  http://www.theguardian.com/technology/2016/aug/04/hackers-for-hillary-attendance-black-hat-conference-trump

  August 4, 2016 – Chip-and-PIN credit cards hacked easily, Black Hat conference proves —RT America

  https://www.rt.com/usa/354657-chip-pin-cards-blackhat/

  August 4, 2016 – This Engineer Started a Tor-Based Internet Provider to Fight Surveillance | Motherboard

  http://motherboard.vice.com/read/brass-horn-tor-ISP-says-buzz-off-surveillance

  August 4, 2016 – Spoofing GPS is surprisingly easy; detecting it is surprisingly hard / Boing Boing

  h
ttp://boingboing.net/2016/08/04/spoofing-gps-is-surprisingly-e.html

  August 4, 2016 – Frank Abagnale Says Cyber Crime Is About To Get ‘Scary’ | Inc.com

  http://www.inc.com/will-yakowicz/frank-abagnale-cyber-crime.html

  August 2, 2016 – Encryption’s quantum leap: The race to stop the hackers of tomorrow

  http://www.zdnet.com/article/encryptions-quantum-leap-the-race-to-stop-the-hackers-of-tomorrow/?ftag=TREc64629f&bhid=26199999350103284654847101531876

  August 2, 2016 – We Asked Hackers To Predict The Future of Hacking | Motherboard

  https://motherboard.vice.com/read/the-future-of-hacking-podcast

  August 2, 2016 – Hackers Hijack a Big Rig Truck’s Accelerator and Brakes | WIRED

  https://www.wired.com/2016/08/researchers-hack-big-rig-truck-hijack-accelerator-brakes/

  August 2, 2016 – The Hacks We Can’t See | Motherboard

  https://motherboard.vice.com/the-hacks-we-cant-see

  August 2, 2016 – Mission Impossible: The Ridiculous Tech Of Jason Bourne | Fast Company | Business + Innovation

  https://www.fastcompany.com/3062417/mission-impossible-the-ridiculous-tech-of-jason-bourne

  August 2, 2016 – Two Factor Auth List

  https://twofactorauth.org/

  August 2, 2016 – The Motherboard Guide to Not Getting Hacked | Motherboard

  https://motherboard.vice.com/read/the-motherboard-guide-to-not-getting-hacked

  August 1, 2016 – Chinese Mole Uncovered Inside the FBI | Observer

  http://observer.com/2016/08/breaking-chinese-mole-uncovered-inside-the-fbi/

  August 1, 2016 – FBI’s Hacking Tool Found To Have Compromised Dozens Of Computers In Austria | Techdirt

  https://www.techdirt.com/articles/20160731/16062035119/fbis-hacking-tool-found-to-have-compromised-dozens-computers-austria.shtml

  August 1, 2016 – Encryption: It’s a big issue for technology

  http://www.news.com.au/technology/online/security/fbi-director-wants-to-resolve-encryption-issue-before-something-terrible-happens/news-story/c5dfc8d368719151bfa273147cbca770

  August 1, 2016 – Free ways to learn about IT, security and hacking online | ZDNet

 

‹ Prev