Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Homeland</strong><br />
“Or someone's rooted your computer, or mine, or Ange's.”<br />
“Yeah.”<br />
That was the possibility that had been going through my head all morning. Someone with<br />
total control over my computer, someone with the power to light up the camera and the<br />
mic, to grab text off my screen or files off my hard drive. It wasn't a possibility I liked to<br />
think about. The darknet docs showed that Fred Benson had grabbed over eight thousand<br />
photos of one student alone, some poor kid the old bastard had a hate-on for.<br />
How many times had my computer been compromised? 0? Or eight thousand?<br />
And more importantly: if my computer had been pwned, had it been “random” -- someone<br />
scanning for vulnerabilities discovering my computer in a rare, unpatched moment and<br />
grabbing control over it -- or had it been “special”? That is, had someone targeted me? Like<br />
Godel, I wasn't sure I knew the difference between random and special any more.<br />
-..-<br />
I don't know what Jolu told Restless Agent and the rest of his buddies, but there was no<br />
darknet chat accusing me or Ange of being the leak. I still didn't know who Jolu's people<br />
were, and didn't want to know, but I kind of assumed that they were people he worked with<br />
and that he'd gone back from lunch and had a little chat with them -- hopefully away from<br />
any computers that might be covertly running their mics and cameras.<br />
But of course, no one wanted to do much chatting at all on darknet, not without knowing<br />
who and how someone or someones were eavesdropping on us.<br />
Long after the last person -- Liam -- had left Joe's campaign office, I sat at my desk, staring<br />
at my computer like it might have a live, venomous snake hiding inside it. I had stayed late<br />
at my desk, theoretically to finish up the day's work and make up for my little lunchtime<br />
face-to-face meeting, but also because I didn't want to try to deworm my laptop at home,<br />
not when I had an office filled with so many spare and useful computers lying around.<br />
In theory, it should be easy to secure (or re-secure) my laptop. Find another hard drive<br />
and create an encrypted filesystem on it. Boot up my computer -- or any computer! -- with<br />
a boot disk downloaded fresh from the Internet, after carefully validating the checksum to<br />
make absolutely, positively certain that I was using a clean, uninfected, pristine version of<br />
ParanoidLinux. Then I'd install a fresh build of ParanoidLinux on the new drive, copy over<br />
the user data from my old disk to the new one, and I'd essentially have given my computer<br />
a fresh brain with all the memories of the old one, but with a high degree of certainty about<br />
the brain's reliability and trustworthiness. It all worked best if you had a couple of spare<br />
laptops and hard drives lying around, which the Joe campaign had -- old laptops are one<br />
of those things that no one really wants to throw away, so we'd accumulated a lot of semiantique<br />
machines that had been donated by Joe's supporters.<br />
Figuring out whether the old machine had been infected at all was a harder, more subtle<br />
problem. If someone had infected the machine and altered the kernel -- the nugget at the<br />
<strong>SiSU</strong> www.sisudoc.org/ 116