Chapter 14 Calculating In Your Sleep 1/2

Start from the beginning
                                    

"We are not inept dogs."

"Who is that talking?"said Valerie.

"I hoped you'd recognize it," said Jessica.

"We are not inept dogs..."

Jessica placed her finger on the virtual monitor and massaged the soundwaves. "You know how many services utilize voice command?"

"We just heard that conversation," said Shannon. "It was between Malvis and that terrorist."

"Between terrorists," Jessica corrected. She trimmed the playback into three audio segments:

"We are not inept dogs"; "These people owe you something?"; "Whatever."

"Your everyday voice algorithm isolates wavelength patterns," Jess continued. "It records voices, collates their unique signals, and formulates a vocal signature before storing it in the database, unbeknownst to everyone but authorities. Privacy acts are just cardboard fences. Virtually anything with a processor utilizes the vocal algorithm." As she spoke, Jessica's fast fingers cast a spell on the screen. "We're the only ones who know what Malvis's partner in crime really sounds like. Everyone in New Sumer heard an artificial voice. What's more, I bet the wavelengths were reconfigured manually."

"Terrorists normally don't want to be found," Shannon said frustratedly. "But what makes you think the recording in Valerie's data wasn't manipulated?"

"Because I think an Azarean encrypted this file."

"And?"

"You ever met an Azarean, Shannon?"

"I have come into contact with them. Why?"

"They're full of themselves," said Valerie.

"Bing. Arrogant, to be precise," Jessica said.

"So, I guess an Azarean adding an extra layer of security would require them to presuppose that someone can break through the first," Shannon rejoined.

"Which is ridiculous, but we broke through two. "Her next button-press initiated a flow of code on the monitor.

Valerie beamed. "Are you doing what I think you're doing?"

"What am I doing?" Jessica said coyly.

"You're, umm, doing the stuff with the voice algorithm."

"Cross-referencing our mystery man's real voice with every voice in the vocal database."

"Tell me no one is tracking that."

Jessica scoffed. "Well, as a precaution, I'm bouncing the signal off multiple IP addresses. And as an extra-extra precaution, I initiated the hack from someone else's personal computer. Because, you know, precautions..."

"That's fucked up!" Shannon stammered. "You mean, you're using that computer to hack another computer to hack another computer?"

"If you want to oversimplify..."

"Whose computer are you hacking?"

A random wail punched through the console speakers. "Why can't I steam my anime!" Jessica and her friends lent their undivided attention to a live feed. They saw her apartment acquaintance, Jeffrey, throwing a tantrum in sleek white pajamas.

"If he does get tracked, they won't find anything," she told them. "Besides, the voice search is being rerouted within and throughout Goliath's network. Invisible." She began whirling her hands for effect. "And the results will land right where I want them." She unstrapped her backpack and retrieved her Vit, whose screen revealed the exact same cryptic web of wavelengths that played on the monitor. "For now, we play the waiting game."

"For Beth's sake, I do hope you find him," said Valerie.

"And what will you do when you find that man?" said Shannon.

Jessica rubbed her chin. "What am I going to do,  or what do I want to do?"

Shannon leered.

Amon returned from his five-minute hiatus to supplant himself in the middle of the girls' conversation. "I knew it was a good idea to keep you on our radar, but it was actually a great idea. The flash drive you gave me is a handheld hotbed of conspiracy."

"Valerie is the one who brought it to me," Jessica muttered.

Amon's shades fell on Valerie. "So, you procured it, and she cracked it. Does that sound right?"

"Si, basically," answered Valerie. "But explain, tall, red and handsome. What did you find?"

"Maybe they're running super-secret experiments on humans?" Shannon guessed. "Probably abducting us in invisible spaceships. God, I hope they're not eating people."

Amon took off his glasses and glared. "May I?"

"Proceed, Cracker."

He inhaled sharply. "Goliath is secretly funneling finances into research across several black sites. Then there's this headquarter floor that's not on official records."

"Another secret?" said Jessica.

"Looks like it. Couldn't be sure, so I dug deeper but found nothing but a list of names."

"Lemme see."

Amon held out an old touch-screen phone. Jessica found nothing of interest until she read the very, very last name. David Mourner. Her shoulders knotted. "Are these people related to something specific?"

"Storage," said Amon.

"The hell does that mean?"

"Whoever these people are, I hope their experience is nothing like mine was."

Jessica mentally tried to piece together Amon's story. "Sorry," she muttered.

He shook his head. "Not now. Whoever these people are, they know things."

"Like the fact that SK-3 was a fractured security algorithm Goliath wants to cover up?"

"Right." Amon's brow furrowed, eyes rolling into his head.

3...

2...

1...

"Wait..." A neon green light blinked above him. "If that's true—"

"People would attribute the breach of New Sumer's network to a corporate mishap," said Jessica.

"But—"

"The chip says that Goliath staged the breach and the terrorist attack from the get-go."

"Which means—"

"SK-3 was dead on arrival, probably intentionally, and not compromised by an external hack. The fault in Goliath's coding was ignored or deliberate, which could implicate them in a conspiracy. The average Joe Schmoe and Jane Doe wouldn't understand that. The fake terrorist ploy helped Goliath publicize the lie of a breached—but actually broken—algorithm. But if people learn the truth about SK-3's shittiness..."

Amon's expression was not the picture of surprise Jessica expected. Instead, his half-smirk was bitter-sweet.

"Goliath is vulnerable," she finished.

"They engineer terrorism," Amon nodded. "Terrorism engineers new security directives. Although, I don't understand why they didn't use an older security algorithm and lay the blame there. Why invent a faulty one, considering the risk?"

"Which is why I believe it was a mistake." Jessica closed her fist. "Goliath made a mistake."

Hacking the Sun - The Re-RemakeWhere stories live. Discover now