Chapter 15 - Not Edited: Eyes Wide Shut: An Enigma
Fiction: Based Upon Actual Events
Chapter 15 - Draft
Hacked Daemon's Computer
Back at work, Curtis was talking to his 3D quantum computer, developing parameters to research possible frequencies, the power required and the viability of the concept. Daemon had dropped in for coffee and left saying it was going to be a very busy day in his other job.
Suddenly, JR’s was standing, looking like he had just won the Nobel Peace Prize, in the 3D hologram. He was in the computer. JR said, “I bet you’re glad to see me.” Curtis was speechless. Where was Daemon? How did JR hack into the “hack-proof” computer and network? Would Daemon know? JR with a wide grin replied, “OK, OK, take a deep breath, I will answer.”
“Daemon is off-site. He is not monitoring us. He is comfortable with you here. He worries when you are not. Daemon will not know that I hacked his network.” Curtis, laughing said, “You know where the word, ‘hacking’ came from? It is from a German word meaning, ‘someone who makes furniture with an ax.’”
Curtis concerned, asked, “How can you let me know when Daemon is watching me?” JR says, “Well, I can watch him watching you.” Curtis cuts him off, “What good is that?” JR replies, “Slow down. Let me explain how I hacked Daemon first.”
JR, proud of his accomplishment, gave a long answer to explain how he hacked Daemon’s network.
JR said, “In a penetration test on Daemon’s network, he used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be purchased on eBay for $40 or less, along with open source Linux DVB software applications and the network data analysis or "sniffing" tool Tool shark. Exploiting that signal, JR says he was able to connect to the Internet via satellite, creating a high-speed, untraceable anonymous Internet connection.”
JR explained, “He also reversed the trick, impersonating Daemon’s Web sites. He intercepted a Domain Name System (DNS) request, also known as a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it's stored. Curtis interrupted, Simple idea, continue with you explanation. JR, with an air of pride, continued, “Then it sends back an answer faster than the ISP. This allows him to replace a Web site that Daemon requested and goes to a site of his choosing. He was also able to hijack signals using GRE or TCP protocols, all undetectable. Satellite hacking is a facet of my many tools in my black box.”
Curtis, walking toward the 3D hologram figure of JR, asks, “How did you decrypt Daemon’s files? Everyone knows quantum-computing codes are unbreakable. It provides near-invulnerable encryption that cannot be eavesdropped upon. The encryption keys are sent via a pattern of single polarized photons and can be changed 100 times per second.
The method is also spy proof, since any third-party observation of the photons changes their properties - laws of quantum physics – the act of observing changes the observed.”
JR, beaming, replies, “Quantum cryptography and quantum information science uses the unit. Unlike conventional computers that uses a bit. Quantum computers use a quantum bit – qubit. A qubit may not only be zero or one, but also zero and one simultaneously. I used photons as a physical representation of qubits.
Curtis interrupts, “I know quantum cryptography is a method of secure communication using qubits. Such communication is based on the Heisenberg uncertainty principle. If an eavesdropper listens to qubits, they change them, which are inevitably noticed by the legitimate users. That is, any attempt of eavesdropping will be caught (in theory). This principle would indicate that it would be impossible to decrypt.”
JR drawled, he was enjoying this, “Curtis you have not been doing your homework. My task was to make sure I duplicate the eavesdropping. I reviewed the implementations of quantum cryptography. You must fight fire with fire. Since observation alters the state. I set up an observation. I duplicated what Daemon had done. . It is not perfect, but it works…so far.”
Curtis animated, asked, “Have you found out what Daemon has accomplished in his New World Order scheme?” JR replied, “He has not completely downloaded all of the information. He thinks he can have everything downloaded by this afternoon. He has discovered only ten humans have been altered. Also, he learned of the locations of Daemon’s spy bots, bug bots, and other communication connections.”
Curtis thinks aloud, musing, “It appears Daemon’s ability to monitor others is enhanced by his extensive communication network. Obviously, Daemon uses his experimental aircraft and satellites to augment his intelligence gathering network.”
Curtis asked again, “How will I know if Daemon is watching me?” JR sitting down at a desk replies, “Quantum Entanglement. You remember quantum entanglement is a physical resource, like energy, associated with the peculiar non classical correlations that are possible between separated quantum systems. Entanglement can be measured, transformed, and purified. A pair of quantum systems in an entangled state can be used as a quantum information channel to perform computational and cryptographic tasks that are impossible for classical systems.”
“I will set-up a computer monitor that will notify you when you are being watched. I have a necklace with a medallion. Inside the medallion is a receiver. The passive receiver will be programmed to activate a solenoid that will send a sharp short needle into your chest. You will know when you are being watched.”
JR, waving his hand, says, “He has to go to complete the transfer of information.” JR disappeared. He was like Elvis: “He has left the room.”
Curtis, heart beating rapidly, began to pace in his office. Wow, this information would make a difference. Information is a tool, but the information Daemon has assembled was now Curtis’ knowledge. Now, he knew he could stop Daemon.
To read excerpts First Draft Chapter 18, click below:
More by this Author
First, one must acknowledge the known: “Reality is merely an illusion, albeit a very persistent one.” Albert Einstein “Everything you see or hear or experience in any way at all is specific to...
Everything in the cosmos is fractal, repeats on many scales, and is continuously evolving. Each and every system in the universe continuously evolves within the total universal evolution and all the systems' evolutions...
Is there a connection between sound, vibrations and physical reality? Do sound and vibrations have the potential to create