Chapter 15 - Not Edited: Eyes Wide Shut: An Enigma

Fiction: Based Upon Actual Events

Source

Chapter 15 - Draft

Hacked Daemon's Computer

Back at work, Curtis was talking to his 3D quantum computer, developing parameters to research possible frequencies, the power required and the viability of the concept. Daemon had dropped in for coffee and left saying it was going to be a very busy day in his other job.

Suddenly, JR’s was standing, looking like he had just won the Nobel Peace Prize, in the 3D hologram. He was in the computer. JR said, “I bet you’re glad to see me.” Curtis was speechless. Where was Daemon? How did JR hack into the “hack-proof” computer and network? Would Daemon know? JR with a wide grin replied, “OK, OK, take a deep breath, I will answer.”

“Daemon is off-site. He is not monitoring us. He is comfortable with you here. He worries when you are not. Daemon will not know that I hacked his network.” Curtis, laughing said, “You know where the word, ‘hacking’ came from? It is from a German word meaning, ‘someone who makes furniture with an ax.’”

Curtis concerned, asked, “How can you let me know when Daemon is watching me?” JR says, “Well, I can watch him watching you.” Curtis cuts him off, “What good is that?” JR replies, “Slow down. Let me explain how I hacked Daemon first.”

JR, proud of his accomplishment, gave a long answer to explain how he hacked Daemon’s network.

JR said, “In a penetration test on Daemon’s network, he used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be purchased on eBay for $40 or less, along with open source Linux DVB software applications and the network data analysis or "sniffing" tool Tool shark. Exploiting that signal, JR says he was able to connect to the Internet via satellite, creating a high-speed, untraceable anonymous Internet connection.”

JR explained, “He also reversed the trick, impersonating Daemon’s Web sites. He intercepted a Domain Name System (DNS) request, also known as a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it's stored. Curtis interrupted, Simple idea, continue with you explanation. JR, with an air of pride, continued, “Then it sends back an answer faster than the ISP. This allows him to replace a Web site that Daemon requested and goes to a site of his choosing. He was also able to hijack signals using GRE or TCP protocols, all undetectable. Satellite hacking is a facet of my many tools in my black box.”

Curtis, walking toward the 3D hologram figure of JR, asks, “How did you decrypt Daemon’s files? Everyone knows quantum-computing codes are unbreakable. It provides near-invulnerable encryption that cannot be eavesdropped upon. The encryption keys are sent via a pattern of single polarized photons and can be changed 100 times per second.

The method is also spy proof, since any third-party observation of the photons changes their properties - laws of quantum physics – the act of observing changes the observed.”

JR, beaming, replies, “Quantum cryptography and quantum information science uses the unit. Unlike conventional computers that uses a bit. Quantum computers use a quantum bit – qubit. A qubit may not only be zero or one, but also zero and one simultaneously. I used photons as a physical representation of qubits.

Curtis interrupts, “I know quantum cryptography is a method of secure communication using qubits. Such communication is based on the Heisenberg uncertainty principle. If an eavesdropper listens to qubits, they change them, which are inevitably noticed by the legitimate users. That is, any attempt of eavesdropping will be caught (in theory). This principle would indicate that it would be impossible to decrypt.”

JR drawled, he was enjoying this, “Curtis you have not been doing your homework. My task was to make sure I duplicate the eavesdropping. I reviewed the implementations of quantum cryptography. You must fight fire with fire. Since observation alters the state. I set up an observation. I duplicated what Daemon had done. . It is not perfect, but it works…so far.”

Curtis animated, asked, “Have you found out what Daemon has accomplished in his New World Order scheme?” JR replied, “He has not completely downloaded all of the information. He thinks he can have everything downloaded by this afternoon. He has discovered only ten humans have been altered. Also, he learned of the locations of Daemon’s spy bots, bug bots, and other communication connections.”

Curtis thinks aloud, musing, “It appears Daemon’s ability to monitor others is enhanced by his extensive communication network. Obviously, Daemon uses his experimental aircraft and satellites to augment his intelligence gathering network.”

Curtis asked again, “How will I know if Daemon is watching me?” JR sitting down at a desk replies, “Quantum Entanglement. You remember quantum entanglement is a physical resource, like energy, associated with the peculiar non classical correlations that are possible between separated quantum systems. Entanglement can be measured, transformed, and purified. A pair of quantum systems in an entangled state can be used as a quantum information channel to perform computational and cryptographic tasks that are impossible for classical systems.”

“I will set-up a computer monitor that will notify you when you are being watched. I have a necklace with a medallion. Inside the medallion is a receiver. The passive receiver will be programmed to activate a solenoid that will send a sharp short needle into your chest. You will know when you are being watched.”

JR, waving his hand, says, “He has to go to complete the transfer of information.” JR disappeared. He was like Elvis: “He has left the room.”

Curtis, heart beating rapidly, began to pace in his office. Wow, this information would make a difference. Information is a tool, but the information Daemon has assembled was now Curtis’ knowledge. Now, he knew he could stop Daemon.

To read excerpts First Draft Chapter 18, click below:

http://hubpages.com/hub/chapter18

More by this Author


Comments 10 comments

Nellieanna profile image

Nellieanna 6 years ago from TEXAS

Yikes! This is mentally multi-dimensional even for a novive like I am! I love it. I must admit I was entranced by this sentence: "...any third-party observation of the photons changes their properties - laws of quantum physics – THE ACT OF OBSERVING CHANGES THE OBSERVED." Disappointed that it turned out to be the flaw in Daemon's setup. But it has such a human/subjective quality to it, to me - that I suppose it would be a flaw in a "perfect" plan! I love it anyway. It's ingenious!


dallas93444 profile image

dallas93444 6 years ago from Bakersfield, CA Author

In my prior life I was a science instructor... The physics part is factual. Electrons are "guess-estimated" in terms of exactly where they are, or where they are not... If you try to "peek" at them.. They are shy and change. It defies logic... Yet science has begun to "manage" the improbable... Some particles appear from nowhere, only to disappear... I know it is weird..


Nellieanna profile image

Nellieanna 6 years ago from TEXAS

It would surprise me if it "ACTED" like what we would consider "logical". Nothing in our logic to rely on as far as determining what the behavior of any of the building blocks of that which we can barely understand. It's weird but only because our perspective is limited and geared to serve its limited needs. Thanks for taking time to explain more of it. I "know" what I don't know in some sort of weird inexplicable ways I think - but I love to know more about what can be explained.


dallas93444 profile image

dallas93444 6 years ago from Bakersfield, CA Author

The part where I mentioned quantum computer code cannot be "broken," there are working models where you anticipate the variables (eg "viewing, environment & etc) and you CAN convert to "Plain-text."

Perhaps an example of "logic," would be given the actual scale of atomic structure..we are mostly empty space...tell that to your finger when you have hit something..! We should be able to pass thru walls...


Nellieanna profile image

Nellieanna 6 years ago from TEXAS

I've always thought we couldl pass through walls. Perpahs it's like the cleavage lines in the atoms of diamonds which must be lined up to cut correctly or else the diamond shatters. But in the case of our cleavage lines for going through solid walls, when not lined up, they resist. If they did line up - we'd smoothe right on through 'em. Atoms have no "skin", do they? They're simply a micro entitiy of interdependent bits of energy "charges".

I know - very primitive illustration. But it's what's rumbled around in my thinking and it still has some kind of plausiblility about it. Actually since nothing is actually "solid" - it's all rather elementary. The resistance to being permeable is surely a matter of forces and energies rather than any actual material blockage.

Oh dear. I hope you don't mind me. Actually if you're to be able to instruct me, you have to know both what I do know and what a vast amount I don't! LOL. (not that it's your job to do so, but I perceive your tendency to do so)


dallas93444 profile image

dallas93444 6 years ago from Bakersfield, CA Author

Nellieanna, Your perception is correct ("... I perceive your tendency to do so")! Your comments are appreciated. We could talk for hours about them! Thanks!


Enlydia Listener profile image

Enlydia Listener 6 years ago from trailer in the country

Most of this is above me...do you think these concepts are possible in the "real" world?


dallas93444 profile image

dallas93444 6 years ago from Bakersfield, CA Author

Enlydia Listener, Yes, and more. Beyond your imagination... We (USA) are the best in the world in terms of breaking other peoples "code." The challenge is our own companies are at risk. You can right now hack into electrical power generating companies and shut down their facilities. Ditto electrical petrochemicals, gas plants. A "real world" demonstration was done at Livermore Labs with the company's consent. First, the automatic controls were disabled. Then the heaters were raised on the tanks... It was stopped before and danger was present. Control was from a distant computer... An example of our "Cyber weakness:" We have a secret plane that a foreign government has the plans and specifications and the plane has not even flown yet...


Enlydia Listener profile image

Enlydia Listener 6 years ago from trailer in the country

Dallas...I hope you don't mind, but I am going to be praying a special protection around you...you know you are being watched...Blessings.


dallas93444 profile image

dallas93444 6 years ago from Bakersfield, CA Author

Enlydia Listener, you think that is why all three of my computers have "crashed?" I save multiple places... I appreciate the fact this is not "fiction..." It "ain't" for the faint-of-heart..."

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working