Keys - Julius Chance

Keys

Автор

Страниц

15

Год

2021

Communication interception is a critical aspect in today's rapidly evolving world, serving as both a shield and a sword. On one hand, it plays a crucial role in averting potential terrorist threats, ensuring the safety and security of nations. On the other hand, however, it possesses the power to prematurely determine the outcome of conflicts or destroy competitors' businesses with seemingly minimal effort. Its influence extends beyond individuals, encompassing entire states.

Within this narrative, the once stable situation in the United States of America gradually spirals out of control, leaving their world leadership position vulnerable and susceptible. The ability to remain ahead of the curve is slipping through their fingers as an unforeseen adversary emerges from the shadows: a seemingly insignificant Russian company sporting the audacious moniker 'Traceless Hero'. Despite the relentless efforts of two hundred hackers from the United States' National Security Agency, their attempts to decipher the puzzle prove fruitless, leaving them questioning their expertise and resources. This predicament sends ripples of unease through the Department of Telecommunications and Computer Services, rocking the chairs as if an earthquake had struck with a magnitude of nine.

In the midst of this chaotic journey, entwined within the unfolding events, a delicate thread of love stretches between two hearts, providing solace and hope amidst the turmoil.

Читать бесплатно онлайн Keys - Julius Chance

Give the key away and knock at the gate (Russian proverb)

A year has passed since the US intelligence services eavesdropping on the computers and smartphones of some Russian officials and businessmen stopped working. Then China, Europe, Syria, and Latin American countries began to gradually disappear from the "ether". The White House was now guessing, among many other things, as to why Germany was so stubbornly resisting his pressure and continuing negotiation of the Nord Stream 2 gas pipeline construction. What specific conditions does Russia offer? It also became unclear why the Islamic State 1 in Syria failed so quickly. The situation was slowly but surely spiraling out of control. The world leader was losing the advantage of being able to stay ahead of the curve. And all these terrible failures were caused by some Russian firm that appeared out of nowhere, with the mocking name ‘Traceless Hero’. Two hundred hackers of the US National Security Agency have been vainly struggling with the puzzle for several months. Especially offensive was the fact that the system of the "Trackless Hero" used all the usual means of communication controlled by the special services in order to send its messages, but yet somehow all those messages remain totally inaccessible to US intelligence. A stream of secret information floated right under American noses, through the servers they could access, through the channels they controlled, through the protocols they developed themselves, but, alas, they could read nothing. Under the head of the Department of Telecommunications and Computer Services, Craig Stevenson, the chair rocked like at a nine-point earthquake. Of course, the chairs swayed under all of his subordinates.

The door flew open and a disgruntled Craig entered the Computer Interception Department's office.

“Well, still not hacked?”

“Not yet,” the head of the department Nick pronounced apologetically.

“That is, the best hackers in the United States, listening to the whole world, to the presidents of all major countries, even to German Chancellor’s smartphone, are not able to hack the communication channel of some small Russian company?”

“This is not an ordinary firm, sir. We’ve made some inquiries. Their main Russian programmer Antony has a double university education – his Russian and ours Westerns. Moreover, the cryptographic department there is headed by our compatriot, a Ph.D. in cybernetics from Princeton University, by some Daniel.”

“No matter how cunning these guys are, you have what Snowden blabbed out the whole world about – the access to computers and smartphones from the back door, thanks to the cooperation of leading manufacturers of telecommunications equipment with us! Are you unable to take advantage of this? Billions taxpayer dollars to coerce leading Telecom firms to implement secret loopholes were simply wasted? Should I report this to the chief?”

“This is an unusual case, sir. We are faced with something non-standard, totally inexplicable.”

“Nonstandard? Ha. Such a word! Are you Nick still unaware that entrusted you department and very you personally, are supposed to solve exactly such ‘non-standard’ tasks? We pay out such a hefty salary just for cracking such problems. Those who can only do the standard ones do not drive the brand new Bentleys, like yours, they get along with second-hand Toyota cars. And they do not live in a mansion on the coast, like yours, but in a two-room apartment in a gloomy sleeping suburb. Do you want us to eliminate this discrepancy?”