Riding the Machine
He called himself Gomez, having chosen the name from
an old TV show. Gomez sat in his cage
as he worked on his computer. He was
just a teenager and he looked like any other teenager, sporting the shaved head
and tattoos that fashion dictated. The
cage was designed to foil detection equipment and so far it had worked. Gomez was his secret identity, the name he
used as he logged onto a salvage satellite.
He could only use the satellite when it happened to be above him, but it
gave him secret access to the web. He
had purchased a password from a dealer.
The satellite was an obsolete, abandoned piece of equipment that had
once served the purpose of whomever launched it into space, but had been
replaced. Gomez supposed it would be
more expensive to retrieve the machine than it would to leave it hanging over
the Earth. Now, someone else was using
it and that someone was selling passwords. The satellite was suitable for Gomez’s
needs and it would be difficult for the authorities to find him, especially if
he took the precaution of logging onto other, more legitimate systems before
sneaking.
The sneaking he did was
unobtrusive. Had he wished, he could
have helped himself to some of the money that flowed through the web, but that
would attract unwanted attention. Any
money he brought to himself would leave a trail for the authorities to
follow. So, Gomez was only looking for
information. He would know which
information when he found it. He
entered corporate and government files, guessing at the passwords. There was always someone who used one of the
passwords he tried and once he was in a particular system, he knew enough to
locate a list of usernames and passwords, allowing him to choose someone to
impersonate and log on again under an identity with more privileges. He was often caught, but knowing that
someone was looking at files and finding out who and where someone is were two
very different processes.
Once in a system, Gomez could read
e-mail, even confidential messages, look through satellites and security
cameras and spy on the activities of robots. For him, it was simple enough to
read a robot’s instructions. He sniffed
around, seeking something worth copying and sending it to the list of news websites
he had memorized. He sorted through the
assortment of mundane messages obsessively, seeking something interesting. An e-mail message caught his attention. It was in a corporate site, a restaurant
franchise that had grown a crop of identical establishments around the
world. They had reported a dissident to
the authorities. The dissident had,
supposedly, made politically incorrect, pro-terrorist statements and should be watched. Gomez wondered what a restauranteur was
doing reporting something like that. He
opened his notepad program, wrote down the dissident’s name and then logged off
of the system. He moved along to a
search engine and entered the name of the dissident, Troy Blankman. Information about several people with the
name Troy Blankman came up and Gomez opened the pages and did a text search on
them. He went through several search
words. “Statement,” “terror,”
“observe,” “charged,” “reported.” Gomez
found nothing. He used the search
engine for another search, to create a list of transcripts of cell phone
conversations by people named Troy Blankman.
Still, there was no way to pick out the Troy Blankman he was looking
for.
He searched for addresses that would
reveal the location of the Troy Blankman making a particular call. He still had nothing, just a bunch of
addresses. Gomez’s mind clicked,
putting things together. He searched
the page of search engine results again, using the finder. He used “restaurant” for the key word as he
searched the text of the listings that the search engine had given him. He found too many entries, so he used
“restauranteur” and “restaurant owner”.
That helped. He narrowed his
results down to the handful of restaurant owners named Troy Blankman. Remembering where the e-mail he had found
had gone to and from, he could find the correct Troy Blankman, complete with
address and phone number. He pasted
that into his notepad.
Gomez snuck into the police system,
using a username and password he had discovered on a previous sojourn, one
belonging to an officer with clearance. First, he opened a list of usernames
and passwords and picked out another persona for next time. Next, he searched the ongoing case files for
Blankman’s name and phone number. Gomez
found what he was looking for. He
thought how typically underhanded the situation was. Troy Blankman owned and operated a restaurant that was in
competition with the franchise and doing well.
Someone working for the franchise had sent an anonymous tip to the
police that Mr. Blankman had made politically incorrect statements, and that
suspicious-seeming people met at his restaurant, in the hope of eliminating a
competitor. The police were tracking
Blankman, using his cell phone to follow his movements. They had sent a robot.
Due to personal risk and a shortage
of officers, the police relied heavily on robots. Armed robots patrolled the streets, eliminating the need for
officers on foot or in squad cars. The
robots also served warrants and caught fugitives. In the sky, small, flying robots served as the eyes of the
police. The flying robots that they
currently used were helicopters, about two feet long, equipped with
cameras. The robots were always under
the control of an officer, back at one of the many facilities that were kept
hidden from the public for safety reasons. A robotic helicopter was resting on
the roof across from Blankman’s restaurant, watching him. It looked through the walls with its
multi-view digital camera, recording all that happened inside. Gomez observed, watching the video feed from
the robot on his computer. He knew what
would happen. Even if the police did
not find anything incriminating, his competitors would denounce him as a
criminal, publicly and anonymously. A
record that he had been investigated would be enough to implicate him and bring
the twenty-four hour news down on him, hungry for a scoop.
Gomez went through the data on Troy
Blankman. He was a forty-two year old
black man who had never been in trouble with the law. Like most people, he was suspicious of the government, but could
hardly be called a terrorist. He spent
twelve to fourteen hours a day at work and the rest of his time at home with
his family. He seemed oblivious to the
fact that he was being scrutinized. His
cooking had gotten good reviews. Gomez
decided he had what he needed and logged off of the police system. He composed an article and laid it all
out. He included the name of the
anonymous tipster who had sought to bring the authorities down on Mr. Blankman,
as well as the name of the franchise he worked for. He e-mailed the article out to the news websites. The act thrilled him, knowing that this
particular corporate plot would backfire. He shut down his computer and went to
get something to eat.
The cage and the special computer it
contained were in his day house. It was
a small, abandoned condominium that Gomez had carefully removed from the real
estate system. It was connected to
utilities and, as long as Gomez paid the bills with a credit card under yet
another identity, his use of it went unnoticed. The Kitchen, with a small freezer and microwave oven, bathroom
and cage were all he needed and at night he could go to parents house to
sleep. He filled the place with food
smell as he cooked a prepackaged meal and then made some instant coffee. He consumed the meal while standing in the
kitchen and then cleaned up. He brought
the antenna he used to find his satellite inside from the condominium’s modest
deck and locked and bolted both doors.
Delving into his backpack, he pulled out his scanner. He adjusted it to the frequencies that the
police used and searched the air around him for the telltale signals of their
robots. Nothing. He sorted through his pack, deciding what to
leave and what to take with him, and then left the day house behind until
tomorrow.
When Gomez arrived the next day, the
satellite was not in position. That was
OK. He shut down the computer in the
cage, retrieved his laptop from his pack and then he went on the web as
himself. His article had turned up in
the news, for all to read. The accused
company had declined to comment.
Satisfied, Gomez read a few other news articles and then left again and
spent the day out with friends. He had
some time before work. He spent his
evenings cooking fast food at one of the identical restaurants in one of many
competing chains of establishments that had been sprinkled over his
hometown. Being part of the system
bugged him, but he had to get money and look legitimate somehow.
The next day, Gomez logged onto the
satellite and poked around. He began
eavesdropping on terrorist websites. There were millions of them on the web and
they operated openly, ready to welcome any recruit that bought the ideologies
they were selling. Unlike other groups
that Gomez had spied on, they did not cover themselves with security measures,
beyond making the site’s operators anonymous.
They simply operated so many hateful sites that authorities had trouble
keeping up. They also moved the sites
to different addresses regularly. Since
the beginning of the terror wars in the early twenty-first century, a startling
variety of extreme groups had transformed themselves into terrorist
organizations. They were constantly
using the web to tell people around the world how to be a terrorist and who to
target. The world’s governments had
responded by pulling together and cracking down, which had led to a conflict
between governments and radicals, with everyone else caught in the middle. The next development had been selling
out. Nobody really knew whether
terrorists began hitting targets given to them by gangsters, or even legitimate
businesses, in return for donations, or if criminals were simply masquerading
as terrorists. Either way, any
difference between idealistic people using terror tactics and criminals
motivated by greed had disappeared.
Gomez moved cautiously as he sought out terrorists’ sites. If he were to be caught by police or
businessmen, he would only be arrested.
Terrorists were more serious.
Sure of his anonymity, he read their
e-mail. There was a lot of buzz about
an upcoming protest in Washington. It
would be another demonstration of the American people’s dissatisfaction with
the loss of privacy and civil liberties. Gomez agreed with them in principle,
but thought that demonstrating had become pointless. The opposing view always claimed that the alternative was to
leave society wide open to terrorist attack.
Gomez figured that the terrorists would attack either way, but the
authorities always claimed that they were doing what they had to for the
people’s protection. Gomez wondered why the terrorists were so interested in
the protest.
He kept snooping. There was one particular terrorist group
that was interested in the protest. The
organizers of that anonymous group were the ones watching, not the actual
operatives. Typically, it was stupid
terrorists that did the actual operations and suicide bombings. Smart
terrorists tricked others into doing it for them. It was that core of organizers who were interested in the protest
and Gomez wanted to know what they were planning. As he snooped, he scored by finding a username and password of
someone he could impersonate, which gave him access to e-mail. He would not use the identity longer than
necessary.
Gomez quickly discovered that the
terrorists had listings of the police robots that would be at the
protests. As was typical, the robots
would watch the protesters and control their movements. Those robots were large, clunking metal
humanoids, whose primary weapon was an electrical touch system. The ETS would send a current through the
machine’s outer skin, strong enough to subdue anyone it came in contact
with. However, those robots typically
had firearms or even explosives stashed somewhere inside their metal bodies. A wave of excited nausea coursed through
Gomez as he found out more. The
terrorists had the frequencies that the robots’ controllers would be using. Someone wanted the protest to be attacked
and was using the nameless terrorist group to do it. The method would be to take control of the police robots. They would not be the first hackers to pull
that off. Gomez himself could do it if
he had the necessary information. The
hard part was not getting caught. It
was known as riding the machine. When a
team of criminals wanted to pull off a job, they typically hired a hacker to
ride the machine. The hacker would
typically control police robots for only a few precise minutes and then abandon
his equipment and run before the signal could be traced.
Gomez shut down his computer and
paced through his day house. He tried
to anticipate the plan from what he knew.
The terrorists were planning to ride the machine and most likely use the
police robots to attack the protest. He
wondered why. He knew nothing about the
people behind it. If the terrorist
group had a name, Gomez did not know it and, even in their most secure
communications, they had not revealed any information about the identity of the
person who wanted the protest attacked.
Gomez guessed. The obvious
choice was ideological terrorists, but an attack on the protest would make
things harder for them. It could be
someone who wanted to make the police look bad, possibly political
opponents. Gomez did not know if the
terrorists had decided to ride the machine themselves, or had been directed to
use that method. He decided it did not
matter. Gomez knew he had to do
something. He had never stumbled onto
something this big. He considered
tipping off the police, but he doubted they would listen to him. They might, but he had to be sure. The same was true of warning the
protesters. He considered impersonating
a cop and contacting them, but the organizers would probably be less likely to
listen to the police. If he were one of
them, he would assume someone was trying to trick them into canceling the
demonstration. Gomez figured that the
only way to be sure would be to act on his own.
He spent the next two days planning
while pretending to watch video in his parents’ living room. With the information he had, he could get
into the police system and transmit his own instructions to the robots. He had the list of frequencies that he had
taken from the terrorists, as well as usernames and passwords of high-ranking
police. The challenge was to figure out
what to tell the robots to do. The
police could override any order that he gave, if they became aware that someone
else was sending commands. He wondered
if it was possible to tell the robots to self-destruct or something. If that were practical, someone would have
already thought of it and he certainly would have seen it in the news. He formed his plan. He would go into the police system and keep
an eye on their robots, as he had done in the past. If he waited and watched, he just might be able to stop incoming
commands. He had use of his satellite
in the evening before the protest and he spent his time practicing, keeping
track police robots assigned to a particular controller.
He slept on the floor of his day
house, after going out to the street and calling his parents, so he could use a
cover story of visiting a friend. Both
of his parents worked and never seemed to mind when he was not home. Gomez was nearly eighteen, anyway. The protest had been allowed on Saturday
morning, from nine to noon. After that,
the permit would expire and the robots would break it up. Gomez woke up, ate and then went into his
cage, ready for battle. His satellite
was not reachable. Gomez swore. No more shadowy fun and games, he told
himself. Stopping the attack was more
important than not being caught. He
went out on the deck and dialed out with his laptop, using his true identity to
enter the web. He entered the police system,
easily. He was lucky. The police officer he was impersonating was
off-line, so his illegal presence was not being traced. Not yet.
He found the listings for the robots on patrol. He was able to watch a video feed from a
robotic helicopter, with a view of everything. The demonstration was contained
in an area in front of the Capitol Building, surrounded by robots that would
challenge anyone who tried to leave without using the permitted route. Anyone
failing to obey would be zapped.
Gomez watched the protesters showing
signs and banners and chanting for a couple of hours. One of the protest organizers, a small man
with black hair, was giving speeches and leading the chant. A message flashed
on Gomez’s computer screen. He knew
what it meant without reading it. The
police were on to him. He closed
everything and logged back on, under a different name. Amusingly, the police were sending reports
of his previous activities to the officer he was now impersonating. The e-mails became less funny as Gomez read
his real name in the text. He
responded.
“As you were, I will handle the
matter personally.”
Gomez hoped that the ploy would buy
him enough time. More e-mail came
in. There was another intruder. Gomez figured it must be the terrorists. Without enough information to impersonate
police, the new intruder was simply transmitting straight to the robots, using
his own equipment. Gomez composed a
quick e-mail informing the police.
Messages came in faster than he could read them. The police signal controlling the robots had
been drowned out by the intruder and was being boosted. Also, the officer Gomez was impersonating
had tried to log on. Gomez wondered how
long it would take the police to figure out which of the two users was an
imposter. Knowing he was already
caught, Gomez kept working. He took
direct control of a police transmitter and cycled through the frequencies,
looking for one that was not on the list he had found on the terrorists’
site.
The terrorists were riding the
machine and Gomez watched the result on video coming in from the helicopter he
still had control of as it hovered above the protest. The police robots surrounding the crowd shifted their weight and
gun barrels emerged from their torsos. The protesters frightened reaction was
immediate. They made gestures of
surrender, unaware that the robots were not under police control. Gomez
broadcast command words to the robots in a desperate attempt to make them pull
in their guns. As they received
contradictory commands from two sources, the humanoid machines did a confused
dance, their guns whirring and clicking in and out. On the deck of Gomez’s day house, a small robotic helicopter
arrived. The machine buzzed in front of
him like a vigilant insect, staring with its camera. Gomez ignored it and kept working.
The police knew who Gomez was, and
even where he was, but he still had control of a transmitter that was close
enough to the demonstration. He
wondered if they knew he was on their side, or had chosen to ignore him and
focus on boosting their own signal. The
police were strengthening a signal on the same frequency that the terrorists
were using, in an attempt to drown out the unauthorized signal, while Gomez was
broadcasting on one of the other frequencies that the robots were programmed to
receive. Mentally, Gomez tried to
concentrate on the robot commands that he knew. Hoping to neutralize their guns, Gomez instructed them to fall on
their bellies, which they did. They
immediately rose and stood. In the
parking lot under the deck that Gomez was sitting on, robotic squad cars
arrived with a screech of rubber on pavement. They followed their program and a
recorded message instructed Gomez to surrender. A buzzing helicopter hovered watchfully over him.
On his computer, the video of the
confused robots winked off. It was
replaced by a message informing him that the frequency the unit was receiving
had changed. Good, Gomez thought. The police were instructing the robots to
stop taking instructions on any frequency Gomez was using. He switched frequencies, cycling through the
ones on the list he had stolen from the terrorist site. His fingers danced on the keyboard as he
manually changed from one frequency to another. A turret extended from the top of one of the robotic squad cars
below him and shot something onto the deck with a pop. A small metallic grape with a wire trailing
away from it like a fishing line landed on the floor of the deck near
Gomez. He knew he was about to get
zapped, but he kept working. One by
one, the robots guarding the protest refused each frequency as soon as Gomez
switched to it. He hurriedly used each
of the frequencies on the list in turn.
The squad car pulled back its grape, which skittered off the deck and
along the pavement.
Gomez switched to the last frequency
on the list and leaned back, hoping that what he had just done had worked. The squad car in front of him popped again
and the metal grape shot toward him and bounced off his knee. An electric shock sprang through him. Gomez fell from his chair and wiggled on the
floor of the deck while hearing his own screams. The squad car instructed him to surrender and get in with
mechanical authority. Gomez voiced his
agreement and went back inside, leaving his now inert and ruined laptop
behind. The robot helicopter followed
him inside, pushing through the door with its nose. It watched the young man’s every move as he walked out the front
door, down the stairs and out to the squad car that waited with its door
open. Gomez climbed into the vehicle
and the door shut with an angry thump as its locks clicked into place. The automated voice smoothly informed him of
his rights as the car rolled away, its lights flashing.