Target. Cindy Dees

Target - Cindy  Dees


Скачать книгу
in her bedroom.

      God, she hated not being taken seriously. It was endemic to her work that people routinely thought she was crazy. But that was her job. To cook up crazy ideas and build contingency plans to respond to them. First the army thought she was nuts, and now these cops. Did the entire flipping Establishment feel that way about her? Did she have some sort of tattoo on her forehead that identified her to the authorities as a weirdo? At least the army had the excuse of the notorious Lockworth name as a reason to doubt her. But these cops didn’t know her from Adam. What was it about her that inspired such antipathy? It wasn’t as if she tried not to fit in. Well, okay. She rebelled against the system sometimes. But that was just because they all made her so mad!

      In a decidedly rebellious frame of mind, she stood by silently while Grady and Fratiano painstakingly photographed her wall of pictures. They took their sweet time finishing the job. Finally, Grady said casually, “Any chance we could take those pictures with us?”

      “No!” she answered sharply. “I told you. They’re part of an ongoing investigation I’m conducting. Get a warrant if you want to seize any of my stuff.”

      Any pretense of pleasantry between them gone, the police left quickly after that. Some help they’d turned out to be. But, she did take Officer Fratiano’s advice and give Army CID a ring. A night sergeant took down the information about her break-in and, after she assured him no classified information had been stored on her home computer, seemed totally unimpressed by her urgency over someone attempting to break into said computer. When the guy asked which of her files had been accessed, she jolted. That was a darned good question. She promised to check out her system and get back to him on it. In turn, he suggested she come down to the CID office in the morning and make a written statement.

      She hung up the phone and sat down at her computer. As always, a sense of joy and adventure at connecting to the vast electronic universe of the Internet tingled through her fingers. She checked out her basic operating system first. Yup, the code had been tampered with. The guy had been trying to gain access to her encrypted notes on dozens of possible conspiracies. And that would be why they’re encrypted, buddy. The new commands the hacker had inserted into her system were spare. Elegant. Coldly logical. This guy had a distinctive flair for his work. A strong signature to his programming style. Unfortunately, she didn’t know the individual to whom it belonged.

      In the hacker community, certain computer programmers became cult celebrities. They had legions of fans who followed their exploits with breathless awe and emulated their spectacular break-ins. She cultivated relationships with informants and outright criminals in this cyber underground as part of her work gathering intelligence off the Internet.

      She highlighted the intruder’s code, then cut and pasted it to a new file. She’d have to show it around. See if any of her cyber pals recognized the work. In the meantime, it was wicked late and tomorrow was a big day. January 20. Inauguration day for her favorite poster boy.

      She climbed into bed wearily and reached for the lamp beside her bed. “G’night Gorgeous,” she mumbled at the wall of pictures of Monihan.

      She closed her eyes gratefully and let her mind drift toward sleep.

      She was just on the verge of slipping into unconsciousness when a sound jolted her rudely to full awareness. An insistent electronic chirping. Now what? Surely she didn’t have an alarm clock set somewhere in the house for this insane hour. Reluctantly, she sat up in bed. If it was a smoke detector in need of a battery, she was going to rip the damned thing right off the ceiling.

      She padded out into the living room and stopped cold at her fully lit computer screen and the bold announcement across it in large letters that she had an incoming e-mail. When in the Sam Hill had her Internet server started announcing incoming messages like this? She was bloody well turning the new feature off this instant. Irate, she sat down at her computer and pulled up her Internet server. She went to the mail screen and gaped at the address of the e-mail’s sender. [email protected].

      Holy…freaking…cow.

      Oracle? To her home address?

      And Delphi? Personally?

      An involuntary shiver passed through her. Oracle. An idea. A database. A secret organization. Her secondary employer and the tool of a shadowy figure known to her only as Delphi.

      She’d been recruited for her ultrasecret work for Oracle and Delphi straight out of her army intelligence training. Although, she always suspected it was more her attendance at the ultraexclusive Athena Academy for the Advancement of Women than her position in the government that earned her the nod from Oracle. Her first mission for Delphi had been to plant the Oracle computer program in the army’s vast computer network, where it collected data on everything from crop patterns in Africa to political unrest in Europe, terrorism threats to DOD research programs, and anything else that might prove useful to Delphi.

      She didn’t know if Delphi was male or female, a person or a computer program, or maybe just another layer of protection shrouding in mystery the identity of the person or persons behind Oracle. At any rate, Delphi took inputs from a wide variety of government and nongovernment sources and analyzed the staggering mass of information, combing through it all for hints of possible threats to the United States. The ultimate conspiracy theorist, as it were.

      And tonight, Delphi had something to tell her.

      Since when had her secret employer started contacting its agents personally in the middle of the night? Not that she ever had any contact with other Oracle agents to compare notes, but it certainly had never happened to her before. Hastily, she opened the e-mail from the mysterious Delphi.

      Have been working on the database and it came up with a rather alarming bit of information. Could you please look into it immediately? —D

      Attached was a reference number for the particular analysis Delphi wanted her to check out.

      She assumed “immediately” meant this very second. What in the world could be so urgent? Thoroughly alarmed now, Diana accessed Oracle’s database, or at least the superficial levels of it available over the Internet, and plugged in the reference number. She waited, tense, while the system retrieved the analysis in question. Most of the assessments the Oracle database had fed her recently were bogus, and her repeated proposals of these eventually unfounded threats to her superiors had earned her a host of rumors that she’d lost her edge completely. But this one… Straight from Delphi? Did she dare believe it, if this “bit of information” turned out to be yet another wildly off-the-wall speculation?

      The threat analysis popped up onto the screen. She scrolled down through the lengthy write-up to the end where the thumbnail summary of the problem was traditionally placed. Tonight, this section was surprisingly short. She scanned the words quickly. And lurched upright in her seat at the report’s terse conclusion.

      A person or persons will attempt to assassinate President-elect Gabriel Monihan within the next twenty-four hours. You must stop them.

      4:00 A.M.

      A rather alarming bit of information, indeed! Urgently, she paged through the rest of the report, scanning the facts and assumptions the massive Oracle database used to arrive at its conclusion. Of course, large sections of the analysis were not transmitted to her here. They were deemed too sensitive to transit the Internet where they risked being intercepted. If she wanted to read the full text, she’d have to go down to the Oracle office and do it in person. But, at a glance, the logic looked sound. Not that she seriously expected anything else. Despite its recent flubs, the program was a masterpiece of computer software engineering.

      She grabbed her black leather duster, a nearly ankle-length coat that billowed menacingly when she strode along a windy street. It made her feel like a gunslinger straight out of the Wild West. Plus, it had great pockets that stored a host of doo-dads and gadgets. Heck, it could swallow up an automatic rifle if it had to. Not that a desk jockey like her needed that feature often, of course. The coat also helped her blend into the gothic subculture of hackers and society dropouts from whom she got some of her best intelligence tips. Best


Скачать книгу