The Girl who played with Fire Page 0,150

proceeding was kept on the computers used by the investigating detectives, and their databases were stored on the server at police headquarters. Salander knew that it would be exceptionally hard to hack into the police intranet, but it was by no means impossible. She had done it before.

When working on an assignment for Armansky several years earlier, she had plotted the structure of the police intranet and assessed the possibility of hacking into the criminal register to make her own entries. She had failed miserably in her attempts to hack in from outside - the police firewalls were too sophisticated and mined with all sorts of traps that might result in unwelcome attention.

The internal police network was a state-of-the-art design with its own cabling, shielded from external connections and the Internet itself. In other words, what she needed was either a police officer who had authorization to access the network or the next best thing - to make the police intranet believe that she was an authorized person. In this respect, fortunately, the police security experts had left a gaping hole. Police stations all around the country had uplinks to the network, and several of them were small local units that were unstaffed at night and often had no burglar alarms or security patrols. The police station in Långvik outside Vasterås was one of these. It occupied about 1,400 square feet in the same building that housed the public library and the regional social security office, and it was manned in the daytime by three officers.

At the time Salander had failed in her efforts to hack into the network for the research she was working on, but she had decided it might be worthwhile to spend a little time and energy acquiring access for future research. She had thought over the possibilities and then applied for a summer job at the library in Långvik. In a break from her cleaning duties, it took her about ten minutes to get detailed blueprints of the whole building. She had keys to the building but, understandably, not to the police offices. She had discovered, however, that without much difficulty she could climb through a bathroom window on the third floor that was left open at night in the summer heat. The police station was patrolled by a freelance security firm, and the officer on duty made rounds only once a night. Ridiculous.

It took her about five minutes to find the username and password underneath the police chief's desk blotter, and one night of experimenting to understand the structure of the network and identify what sort of access he had and what access had been classified as beyond the realm of the local authorities. As a bonus she also got the usernames and passwords of the two local police officers. One of them was thirty-two-year-old Maria Ottosson, and in her computer Salander found out that she had recently applied and been accepted for service as a detective in the fraud division of the Stockholm police. Salander got full administrator rights for Ottosson, who also had left her Dell PC laptop in an unlocked desk drawer. Brilliant. Salander booted up the machine and inserted her CD with the programme Asphyxia 1.0, the very first version of her spy-ware. She downloaded the software in two locations, as an active, integrated part of Microsoft Internet Explorer and as backup in Ottosson's address book. Salander figured that even if Ottosson bought a new computer, she would copy over her address book, and chances were that she would transfer it to the computer at the fraud division in Stockholm when she reported for duty a few weeks later.

Salander also placed software in the officers' desktop computers, making it possible for her to gather data from outside and, by simply stealing their identities, to make adjustments to the criminal register. However, she had to proceed with the utmost caution. The police security division had an automatic alarm if any local officer logged on to the network outside working hours or if the number of modifications increased too dramatically. If she fished for information from investigations in which the local police would not normally be involved, it would trigger the alarm.

Over the past year she had worked together with her hacker associate Plague to take control of the police IT network. This proved to be fraught with such difficulty that eventually they gave up the project, but in the process they had accumulated almost a hundred existing police identities that they

readonlinefreenovel.com Copyright 2016 - 2024