"Дон Пендлтон. Renegade Agent ("Палач" #47) " - читать интересную книгу автора

"The Hurricane worked like a charm," Gadgets Schwarz was saying. "Then,
just before we get, I shot the Doberman with the stimulant, and he was
already waking up when Mack and I got the hell out of there. From one
tinkerer to another, Andrzej, nice work." "Andrzej" was Andrzej Konzaki, and
he was no more a tinkerer than Gadgets. Officially on staff with the CIA,
unofficially detached as consultant to Stony Man, Konzaki was one of the
most skilled and innovative armorers in the world. As a marine in Vietnam.
he'd won a Silver Star and lost both legs above the knees. But like Mack
Bolan, Konzaki saw no profit in living in the past.
Now he had the torso of a weight-lifter, the hands and the imagination
of an armorer master craftsman.
He was to be trusted as the expert in every small arm from pistol to
heavy machine gun, as well as knife, small explosives, ever more lethally
exotic devices.
"Gadgets," Bolan said, "you must brief Aaron on the set-up you rigged
to Charon's computer. I want him ready to take over as backup."
Gadgets turned to the fifth person in the War Room, a big
rumpled-looking guy hunched over the control board of a computer terminal
console that was set up at one end of this operating heart of the Stony Man
complex. "DonCo has an in-house mainframe computer. of course, addressable
from any terminal in the place," Gadgets explained. "But on Charon's
personal terminal, and probably on the terminals of his senior staff,
there's a phone link. That allows him to "talk" to any other phone-linked
computer to exchange data, place or accept orders, whatever over a regular
phone line. You know the technology, Aaron, no point in rehashing the
details. But the bottom line is that we're tapped into that phone line."
Bolan stubbed out his cigarette. "What kind of access does that give
us?"
"Right now we can eavesdrop," Gadgets replied. "We can monitor and copy
anything that is requested from the DonCo mainframe computer, or an computer
with which it's linked, if the request comes from either Charon's terminal
or his secretary's. Aaron, I've inserted the access protocol in your file."
The big man at the console nodded. His fingers danced over the keys.
Lines of characters darted across the video display in front of him. He
scanned them, typed again. This time, except for a couple of lines at the
top, the screen was blank.
"No traffic," Aaron reported.
It was just after five, Sunday morning. The softprobe of DonCo had been
completed only three hours earlier.
"So until someone uses one of those consoles, those taps don't do us
any good," muttered Bolan.
"Not quite, Sarge," Gadgets said softly. "If we can figure out Charon's
personal access protocol his users, his query codes and so on, we can
duplicate them. From the computer's point of view, we'd be disguised as
Charon."
"That's the nice thing about phone lines," Aaron nodded. "They work
both ways."
"We already have one lead. That reference to "FRANCOFILE" you saw in
the appointment book," said Gadgets. "It won't get us in by itself, but it's
a point in the right direction."