I could tell you how I did this, but then I’d have to kill you.
Honestly, though, I lie—I probably couldn’t tell you how I did this. I just did. I was in the zone. I was unstoppable. I ran a scan on each of the four hard drives belonging to Infotech executives, searching for encrypted files and the type of program they would have needed to hack a secure government database. Not that I was intimately familiar with that kind of program or anything. I certainly hadn’t written several of my own.
I concentrated on what I had to do. I’d had it banged into my head over and over again—first by the Big Guys, then by Brooke, and at least five times by Chloe on the way here: find the program Infotech had used to implement the hacks, confirming the Big Guys’ hypothesis that they were the guilty party; get copies of any and all files they’d managed to steal; and then do everything I could to completely and utterly cripple their system. It was a three-pronged attack, and in my own special Toby way, I was multitasking and laying thegroundwork for all three prongs at once. I could have done it faster with my own computer, but despite the fact that it had a glittery finish, the Squad-issued laptop came equipped with a variety of hacking programs almost as good as ones I’d written myself.
Apparently, the previous hacker, whoever she was, hadn’t been a complete imbecile.
The computer made a happy beeping sound as it located a program that fit the parameters I’d been searching for. It was impossible to tell anything about it at first glance, but based on file size and the basic configuration, all of my hacker instincts were telling me that this was the evidence I’d been looking for. I convinced the computer to scan for encrypted files tagged with the program-specific document tag, and a few minutes later, the results came absolutely pouring in.
“Bingo.” As the names of the encrypted files started popping up on my computer, I couldn’t help but gloat audibly.
Find the program used to initiate the hack? Check.
Locate any and all files related to the information acquired in the hacks? Check.
Download those files? It would take some time, but I was willing to give myself a preemptive check on that one, too.
“Bingo!” Lucy echoed my victory cry. Then she turned around and cocked her head to one side. “What bingo?”
“Encrypted files,” I said. “Tons of them, actually.”
I paused. I hadn’t counted on there being this many. As the file names piled up, I bit the inside of my lip. Depending on whether or not they used a different encryption on each file, this could take some serious time to go through. What ifI was wrong? What if the program I’d identified had nothing to do with the hack? What if …
“Problem?” Chloe asked.
Normally, I might have taken offense at the tone, but I was still in hacker mode. My mind was racing to find solutions, not paying any mind to Chloe’s bitquo.
“There could be a problem,” I said. “But I’ve got it covered. I’m widening my download to include all of the encrypted files, on the assumption that if these guys have been stealing classified information, they’re not going to leave it in their system unprotected.”
Unfortunately, from what I was reading on the screen, it looked like nearly all of the system’s files were encrypted. Not surprising given that these guys secured websites for a living, but still a pain in my butt. “There are hundreds of files here,” I said.
Faster now, more and more names appeared on the list.
“Maybe thousands.”
“Can you tell if any of them are the files we’re looking for?”
“I could start decoding,” I said. “Maybe screen for files that include imported data or encrypted applications, but …”
“But with that many files, decryption would still take forever and a day.”
Unfortunately, yes. My mind buzzed, working the problem over and over again. I typed in some parameters and narrowed down the possible files of interest, and looking at them made me salivate to start decoding, but …
ACCESS DENIED.
I stared at the words.
USERNAME/PASSWORD INVALID.
“Problem?” Chloe asked.
My mouth responded while the rest of me went into hyperdrive. “They’ve switched the security settings. They might use a roaming administrator or …” I hit five keys in quick succession. “Or,” I continued, “they might know I’m here.”
“Do you have the files?” Chloe asked.
“Some of them. The downloading process wasn’t complete.”
Besides, even assuming that the information we needed was in the files I’d managed to download, Infotech’s system was still up and running, and that meant that my job here wasn’t done. I’d been given three very specific instructions, and so far, all I’d done was locate the program and begin downloading the files.