ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Chapter 15 - Not Edited: Eyes Wide Shut: An Enigma

Updated on October 9, 2014

Fiction: Based Upon Actual Events


Chapter 15 - Draft

Hacked Daemon's Computer

Back at work, Curtis was talking to his 3D quantum computer, developing parameters to research possible frequencies, the power required and the viability of the concept. Daemon had dropped in for coffee and left saying it was going to be a very busy day in his other job.

Suddenly, JR’s was standing, looking like he had just won the Nobel Peace Prize, in the 3D hologram. He was in the computer. JR said, “I bet you’re glad to see me.” Curtis was speechless. Where was Daemon? How did JR hack into the “hack-proof” computer and network? Would Daemon know? JR with a wide grin replied, “OK, OK, take a deep breath, I will answer.”

“Daemon is off-site. He is not monitoring us. He is comfortable with you here. He worries when you are not. Daemon will not know that I hacked his network.” Curtis, laughing said, “You know where the word, ‘hacking’ came from? It is from a German word meaning, ‘someone who makes furniture with an ax.’”

Curtis concerned, asked, “How can you let me know when Daemon is watching me?” JR says, “Well, I can watch him watching you.” Curtis cuts him off, “What good is that?” JR replies, “Slow down. Let me explain how I hacked Daemon first.”

JR, proud of his accomplishment, gave a long answer to explain how he hacked Daemon’s network.

JR said, “In a penetration test on Daemon’s network, he used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be purchased on eBay for $40 or less, along with open source Linux DVB software applications and the network data analysis or "sniffing" tool Tool shark. Exploiting that signal, JR says he was able to connect to the Internet via satellite, creating a high-speed, untraceable anonymous Internet connection.”

JR explained, “He also reversed the trick, impersonating Daemon’s Web sites. He intercepted a Domain Name System (DNS) request, also known as a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it's stored. Curtis interrupted, Simple idea, continue with you explanation. JR, with an air of pride, continued, “Then it sends back an answer faster than the ISP. This allows him to replace a Web site that Daemon requested and goes to a site of his choosing. He was also able to hijack signals using GRE or TCP protocols, all undetectable. Satellite hacking is a facet of my many tools in my black box.”

Curtis, walking toward the 3D hologram figure of JR, asks, “How did you decrypt Daemon’s files? Everyone knows quantum-computing codes are unbreakable. It provides near-invulnerable encryption that cannot be eavesdropped upon. The encryption keys are sent via a pattern of single polarized photons and can be changed 100 times per second.

The method is also spy proof, since any third-party observation of the photons changes their properties - laws of quantum physics – the act of observing changes the observed.”

JR, beaming, replies, “Quantum cryptography and quantum information science uses the unit. Unlike conventional computers that uses a bit. Quantum computers use a quantum bit – qubit. A qubit may not only be zero or one, but also zero and one simultaneously. I used photons as a physical representation of qubits.

Curtis interrupts, “I know quantum cryptography is a method of secure communication using qubits. Such communication is based on the Heisenberg uncertainty principle. If an eavesdropper listens to qubits, they change them, which are inevitably noticed by the legitimate users. That is, any attempt of eavesdropping will be caught (in theory). This principle would indicate that it would be impossible to decrypt.”

JR drawled, he was enjoying this, “Curtis you have not been doing your homework. My task was to make sure I duplicate the eavesdropping. I reviewed the implementations of quantum cryptography. You must fight fire with fire. Since observation alters the state. I set up an observation. I duplicated what Daemon had done. . It is not perfect, but it works…so far.”

Curtis animated, asked, “Have you found out what Daemon has accomplished in his New World Order scheme?” JR replied, “He has not completely downloaded all of the information. He thinks he can have everything downloaded by this afternoon. He has discovered only ten humans have been altered. Also, he learned of the locations of Daemon’s spy bots, bug bots, and other communication connections.”

Curtis thinks aloud, musing, “It appears Daemon’s ability to monitor others is enhanced by his extensive communication network. Obviously, Daemon uses his experimental aircraft and satellites to augment his intelligence gathering network.”

Curtis asked again, “How will I know if Daemon is watching me?” JR sitting down at a desk replies, “Quantum Entanglement. You remember quantum entanglement is a physical resource, like energy, associated with the peculiar non classical correlations that are possible between separated quantum systems. Entanglement can be measured, transformed, and purified. A pair of quantum systems in an entangled state can be used as a quantum information channel to perform computational and cryptographic tasks that are impossible for classical systems.”

“I will set-up a computer monitor that will notify you when you are being watched. I have a necklace with a medallion. Inside the medallion is a receiver. The passive receiver will be programmed to activate a solenoid that will send a sharp short needle into your chest. You will know when you are being watched.”

JR, waving his hand, says, “He has to go to complete the transfer of information.” JR disappeared. He was like Elvis: “He has left the room.”

Curtis, heart beating rapidly, began to pace in his office. Wow, this information would make a difference. Information is a tool, but the information Daemon has assembled was now Curtis’ knowledge. Now, he knew he could stop Daemon.

To read excerpts First Draft Chapter 18, click below:


    0 of 8192 characters used
    Post Comment

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Enlydia Listener, you think that is why all three of my computers have "crashed?" I save multiple places... I appreciate the fact this is not "fiction..." It "ain't" for the faint-of-heart..."

    • Enlydia Listener profile image

      Enlydia Listener 7 years ago from trailer in the country

      Dallas...I hope you don't mind, but I am going to be praying a special protection around know you are being watched...Blessings.

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Enlydia Listener, Yes, and more. Beyond your imagination... We (USA) are the best in the world in terms of breaking other peoples "code." The challenge is our own companies are at risk. You can right now hack into electrical power generating companies and shut down their facilities. Ditto electrical petrochemicals, gas plants. A "real world" demonstration was done at Livermore Labs with the company's consent. First, the automatic controls were disabled. Then the heaters were raised on the tanks... It was stopped before and danger was present. Control was from a distant computer... An example of our "Cyber weakness:" We have a secret plane that a foreign government has the plans and specifications and the plane has not even flown yet...

    • Enlydia Listener profile image

      Enlydia Listener 7 years ago from trailer in the country

      Most of this is above you think these concepts are possible in the "real" world?

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Nellieanna, Your perception is correct ("... I perceive your tendency to do so")! Your comments are appreciated. We could talk for hours about them! Thanks!

    • Nellieanna profile image

      Nellieanna Hay 7 years ago from TEXAS

      I've always thought we couldl pass through walls. Perpahs it's like the cleavage lines in the atoms of diamonds which must be lined up to cut correctly or else the diamond shatters. But in the case of our cleavage lines for going through solid walls, when not lined up, they resist. If they did line up - we'd smoothe right on through 'em. Atoms have no "skin", do they? They're simply a micro entitiy of interdependent bits of energy "charges".

      I know - very primitive illustration. But it's what's rumbled around in my thinking and it still has some kind of plausiblility about it. Actually since nothing is actually "solid" - it's all rather elementary. The resistance to being permeable is surely a matter of forces and energies rather than any actual material blockage.

      Oh dear. I hope you don't mind me. Actually if you're to be able to instruct me, you have to know both what I do know and what a vast amount I don't! LOL. (not that it's your job to do so, but I perceive your tendency to do so)

    • dallas93444 profile image

      Dallas W Thompson 8 years ago from Bakersfield, CA

      The part where I mentioned quantum computer code cannot be "broken," there are working models where you anticipate the variables (eg "viewing, environment & etc) and you CAN convert to "Plain-text."

      Perhaps an example of "logic," would be given the actual scale of atomic structure..we are mostly empty space...tell that to your finger when you have hit something..! We should be able to pass thru walls...

    • Nellieanna profile image

      Nellieanna Hay 8 years ago from TEXAS

      It would surprise me if it "ACTED" like what we would consider "logical". Nothing in our logic to rely on as far as determining what the behavior of any of the building blocks of that which we can barely understand. It's weird but only because our perspective is limited and geared to serve its limited needs. Thanks for taking time to explain more of it. I "know" what I don't know in some sort of weird inexplicable ways I think - but I love to know more about what can be explained.

    • dallas93444 profile image

      Dallas W Thompson 8 years ago from Bakersfield, CA

      In my prior life I was a science instructor... The physics part is factual. Electrons are "guess-estimated" in terms of exactly where they are, or where they are not... If you try to "peek" at them.. They are shy and change. It defies logic... Yet science has begun to "manage" the improbable... Some particles appear from nowhere, only to disappear... I know it is weird..

    • Nellieanna profile image

      Nellieanna Hay 8 years ago from TEXAS

      Yikes! This is mentally multi-dimensional even for a novive like I am! I love it. I must admit I was entranced by this sentence: "...any third-party observation of the photons changes their properties - laws of quantum physics – THE ACT OF OBSERVING CHANGES THE OBSERVED." Disappointed that it turned out to be the flaw in Daemon's setup. But it has such a human/subjective quality to it, to me - that I suppose it would be a flaw in a "perfect" plan! I love it anyway. It's ingenious!


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: ""

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)