This Book Is Full of Spiders (John Dies at the End #2)
This Book Is Full of Spiders (John Dies at the End #2) Page 61
This Book Is Full of Spiders (John Dies at the End #2) Page 61
She emerged from the bathroom and, out loud, asked Molly, “So where are we?”
But that wasn’t hard to figure out, was it? She drew a map in her head of the building and the tunnel thing that ran south toward the hospital. She had taken a left turn and that would put her in the basement of that smaller building behind the asylum. This would have been the administration building, with all of the offices and stuff.
Amy glanced around at the computer workstations and suddenly had a revelation that made her feel like Neo in The Matrix, the first time he realized he had gained the power to stop bullets.
This was the nerve center of the quarantine, before the government abandoned it. And they left their computers behind.
Figuring out which workstation she wanted was an easy choice—there was one that had three monitors attached to it. She held her breath and hit the power button. It came up, and she wondered how much electricity she had—the room had to have been running off of a generator, but the guys in charge of putting gas in it or whatever were gone. There was nothing to do for it, but to work fast.
The system booted and a network password box came up. At this point the question was how many passwords did this system require. There was a big difference between getting through one password and getting through three—getting through three would be much easier.
She was, after all, at the workstation—she wasn’t trying to break in remotely (which she couldn’t do, but she knew people who could) and in the world of computer security there is a threshold of just how many passwords a human can remember. Give them one, and they’re fine. Two, they’re probably still okay. But give them three—say, one for the workstation, another for the network, and a third for whatever application they use—and they’re going to have to start writing them down. She started opening creaky desk drawers and found the big one in the middle contained nothing but a box of ballpoint pens and a single Post-it Note with a list of nonsense words and characters. The first would be the username, the rest would be passwords.
And just like that, she was in. She tried to make sense of what programs they had on their desktop, then noticed something that made her yelp with joy.
This computer has Internet access.
Holy crap. She didn’t even know where to start.
She nervously checked both of the locked doors—still no sounds from the other side—and settled in at the workstation. The first task, she decided, would be to get a sense of the layout of the system, and what exactly she had available to her. She found what they were using for e-mail, and saw tons and tons of messages in the in-box with attachments—status reports and equipment requests and lots of other standardized forms. Bureaucratic spam. There were also long e-mail exchanges about sound—reports and experiment results about frequencies and modulation and terms she had never heard before, like “infrasound.” The staff were sending audio clips back and forth, and huge walls of analytical text referring to them full of technical gibberish. She’d have to set all that aside for now, she could spend weeks trying to get through it all.
She next found a program that, when she clicked on it, took over all three screens, filling them with banks of various camera feeds. Absolutely nothing was going on in most of them—you wouldn’t know they were live if not for the occasional bit of trash that would blow into view—but they were clearly of the exterior of the hospital quarantine.
She got out of that, and found a separate application that gave her a full aerial view of the hospital grounds, rotating slowly just like the gun-camera video Josh had shown her earlier. She was going to hit “Esc” to back out of it, but suddenly had the irrational fear that if she hit the wrong key, she’d see a missile come flying out of the bottom of the screen and blow everybody up. After a little more snooping she found out that the aerial drone thing was controlled elsewhere, which made sense. You wouldn’t control something like that from a keyboard, you’d want a control stick and all that. She was just watching the feed as a spectator—
David.
She saw him, because the camera view swung around and focused on him. She had no control over that, whoever was operating the drone, wherever they were, had done it. The view blinked and zoomed in, then blinked and zoomed in again.
It was David, plain as day, in a standoff with a big guy who looked really mad. They were surrounded by a crowd, next to the huge bonfire Josh had said was some ceremonial thing (and no matter how she looked at it, it really did look like skulls and bones in there). There was radio chatter going back and forth in the video feed, but it was faint and Amy couldn’t make it out word for word. What she was able to gather was that the guy flying the drone was asking for permission to fire from a superior, and then Amy realized that she wasn’t just watching this through a camera, but a gun camera, and that the gun was pointing right at David.
“No! Don’t shoot!” she said, stupidly, at the computer monitor. She had to have some ability to contact them, right? There were landline phones here. And she would say, what? That she was a random girl who sneaked into the REPER command center and that she didn’t want them to shoot her zombie boyfriend? All that would do would alert them to the fact that they had an unauthorized person on their network and that they needed to remotely shut down everything.
On the video feed, the big guy raised a gun, pointing it right at David. The camera view shifted slightly, putting the big guy in the crosshairs.
“Yes! Shoot that guy!”
They didn’t. She picked up enough of the radio chatter to get that the drone pilot (who she gathered went by the code name “Guardian”) had been told to stand by and await further orders. Several excruciating minutes later, David was hauled away and taken inside the hospital building, and the camera view zoomed back out so that it could see the whole yard and, presumably, any zombies who tried to make a run for the fence. The next most likely one to make a run for the fence, however, was David, if she knew him at all. And David was not a zombie. This was not wishful thinking on her part—when David was talking to the big gun guy, he was gesturing and conversing exactly the way David had the last time she had talked to him. David was no more a zombie than he had been two weeks ago, and Amy had faith that the drone operator in fact did not know that. He had been sold the same B.S. that Josh believed, about murderous infected non-humans. Those things did exist—Amy just watched them eat the crew she had ridden down here with. One could burst in that tunnel at any second. But the people inside that fence were people.
And the military was about to bomb them all.
In the end, it took Amy an hour to make the connection. As a hacker, she was a novice, but she knew that by far the most effective way into any system was what hackers called “social engineering.” The biggest weakness in any network is the human beings. It doesn’t matter how many firewalls or passwords you set up, in the end the system was manned by people. Lazy, busy, harried people who when all was said and done, would take the path of least resistance.
Figuring out where the drone pilot was operating from was easy—a Google search told her that Unmanned Aerial Vehicle or UAV pilots operated from only one location—Creech Air Force Base, just outside of Las Vegas, Nevada. Next she went sifting through the e-mail system to see if she could somehow get so lucky as to find e-mails from
[email protected]
/* */ but there was no such luck. What she did find was a series of e-mails flying back and forth from the day before, with various people clarifying the “ROE” (which she figured out was Rules of Engagement) with the “Zulus” in the quarantine, as apparently the drone had shot a guy who was attempting to climb the fence and Amy gathered from reading fifty or so e-mails that they were supposed to wait until somebody actually got over the first fence before shooting. Somewhere buried in all of these forms she found an “Eyes Only” document that had been sent to the guy who manned this workstation, some kind of after action report on that incident that named the drone operator: a Captain Shane McInnis.
This was part of an e-mail thread that bounced back and forth between people with REPER e-mail addresses. The issue was the kid who had been shot, a twenty-two-year-old male they were referring to only as Patient 2027. She sifted through a bundle of scanned Eyes Only reports, until she found some kind of admission form they were using for the quarantine. Everything was expressed in jargon and acronyms but Amy was able to piece together that the kid had been held only because he was found in proximity to somebody else who was infected—the kid had killed that person with a baseball bat. But the relevant part of the report on the kid himself were these five words that ended the admission form:
“No signs of infection detected.”
Patient 2027 was not a zombie. He was just a kid. And now he was dead.
One thing became clear when following the chain of e-mails on this subject: that particular fact had not been shared outside of a very small group of people in REPER.
Amy looked down at the clock. It was now 4 A.M., which would be two in the morning Nevada time. The shooting happened at 3 P.M. yesterday. Obviously it wasn’t the same guy manning the drone all the time. Did they work some kind of regular shifts? If so, that meant Captain McInnis would be back behind the stick in the morning. It really didn’t matter either way, that name was all she had.
All right. Start simple. Did Captain Shane McInnis have a Facebook page? She searched. Yes, he did. Set to private, which made sense for a guy in that line of work. She could break into that—Facebook’s password reset request form was easy to fool—but she wasn’t sure that’d get her what she wanted. Back to Google. She looked up the schools around where the air force base was located, and searched for anything on Google with the names of the schools and “McInnis” in the same article.
Boom. Nevaeh McInnis, point guard on the middle-school basketball team. Want to bet that’s Captain McInnis’s daughter? Thirteen years old—Amy knew she’d have a Facebook page. Ten seconds later, it was up on her screen. She had left everything public, her pics—including shots of her posing with Dad in a dress uniform—her friends list (there was Dad, listed under “family”). Nevaeh had 132 Facebook friends. Amy sent her a friend request, wondering what time Nevaeh would wake up in the morning to check it. But Nevaeh was apparently a night owl, because even at two in the morning her time, she was up to immediately accept a friend request from a total stranger ten years older than her.
Use arrow keys (or A / D) to PREV/NEXT chapter