SlideShare a Scribd company logo
Hack To The Chief (STEP FOUR)
Step Four:
A hacker who makes his living by doing so becomes the target of a terrorist organization
and its’ murderous setup to assassinate The President of The United States. One day,
Stephen Bolsom noticed his friends list being edited on his social networking accounts.
The only ones left on the list were the names of those who were involved in his new
network to hijack corporate social networking sites to promote new and emerging artists
in the recording and other industries. By the time an old dope dealer of his from ten years
prior shows up on the list, and attempting to chat with him, he is reciprocating with
hostilities towards his tech junkie employees. The dealer tells him he is about to be
exposed unless he gives up some of the money he took from corporate America and
stored in Swiss banks.
He is not aware of the backing organization of this planned attack on his systems at first,
and takes the shakedown lightly. He tells the dope dealer to go “fuck himself” and returns
to what he thinks should be business as usual, but then it happens. The massive server he
has set up at his house crashes, and then begins to spit information out to random
assortments of people hooked into accounts he serviced. His bank records, privately
filmed pornography, and all sorts of incriminating details about his advertising and
business acquaintances. With accounts on the line numbering to hundreds of thousands of
dollars, he is forced to unplug everything. His clients are now left naked and unshielded
from exposure and having their, in some cases very well established accounts busted and
irrevocably removed.
Stephen is soon let to know that he will either conform to a new set of rules, or be
engaged in paying heavily for his own cyber - crimes. When phone rings, and it is his
home security systems reporting that there was a call for an alarm, he is informed there
will be a mandatory police inspection done due to suspicious activity on the videos. “We
just want to make sure you are safe sir.” the security systems customer service
representative tells him. It is just the worst of time, as he had just opened all of the secret
safe positions around the house to store the backup and main hard disks until all of the
controversy about to ensue blew over. He ends up enduring the police inspection,
narrowly avoiding them inspecting the common area with the only safe still open.
He leaves his house the day after, and returns to find that all of the paperwork on his
mortgage has been changed, and the house has been sold out from under him. The
security code doesn’t work. The locks have been changed. There is paperwork and a sold
sign in the yard. His phone rings, its’ the dealer again. He informs Stephen that he is
homeless and due to his keeping such a low profile and living in the boondocks, he has
made it easy on everyone. “The new security company will be there in five minutes, by
the way, for you standing on the lawn. We reported you. Go to The Hilton downtown and
request a letter for you at the front desk. You will find, we can also be very
accommodating.”
Hotel accommodations are sent to his phone, but he is not so easily persuaded. Stephen
does not want to give his new adversary any more leeway to feeling he is going to roll
over and play dead. He takes out the emergency I.D. kit he has always kept in his car in
the case of a fight or flight situation, and goes to the local pub for a brew to stew and
think things over. Paying in cash at the bar, he withdraws money from his credit card,
done on another name from another persons’ identity. He then reports his own car stolen,
and calls a taxi. Removing all of his equipment to take with him from the car “downtown
Hilton.” he tells the cabbie.
He takes to stealing hotel occupancies in cheap key- card establishments where he can
infiltrate the book- keeping records and maintain a low profile. The message at The
Hilton was a room key and a “terminal passcode” in an envelope. Not knowing if there
would be a man in a chair in the dark in that hotel room waiting to meet him like in the
movies kept him from going to the room. Once he is checked in to the hotel, he hacks
their system records and erases even the data of the fake name he registered under. His
enemy held that information on the disks from his home. He takes out his computer, and
begins a back door look into all of his accounts, and finds that all of his money is gone.
The only monies left are from the false identities, and they were pending transfer.
When his accounts go berserk on him, he doesn’t know what to do, but follow a trail of
setups left behind for him to attain his only hope of survival. Maybe he should very well
turn himself into a conspiracy theory nut who became a nobody, a bum and let them win.
Even this idea of a recluse is soon squashed when his android rings with a fresh threat.
They are going to expose his multi - national hacker based programming business to the
authorities and have him doing hard time for all of his crimes if he doesn’t conform, they
tell him. They direct him to The Hilton downtown once more to retrieve an envelope.
As the twists of his trail go further past the point of no return to his old life, he begins to
live by a new set of rules. Not being a thug or a hardened criminal he has no means by
which to support himself with a hustle. He was a white collar criminal, and a very
successful one at that. He begins to live like a hoodlum, lifting ladies purses at bus stops
to get food money to eat, once even asking to use a strangers’ cell phone and then
walking away with it. If he isn’t picked up by the authorities for his various petty thefts at
discount drugstores, he will be surprised he thinks to himself.
He abandons his smart phone, and begins to try and ditch all of the comforts of his old
tech junkie lifestyle. He pawns his laptop, feeling he can’t outright sell it as it would be
another in a long string of losses here. He can’t help but feel that going to the Hilton will
inevitably put him in deeper danger. At least for now, he is free and safe from any further
damage being done. These people obviously wanted him to do something more than
money, as they had all of his money already. At several bus stops in the city throughout
his days travel, he notices a man tailing him. As if it weren’t bad enough that he couldn’t
get through to his old girlfriend for some shelter, he is now being tailed.
At every turn, the equipment is left in his path to return to work, but with very specific
design documents coming forward from the glowing terminals he faces. As he walks by a
stranger in the subway terminal, a phone is dropped in his trench-coat pocket. It begins to
ring, and he picks it up. They inform him that the subway police have been informed of a
man wanted for bank robbery matching his description, and that he needs to exit the train
“NOW!” He just so happens to be at a stop, and as he sees a subway cop running after
him, loses him in the crowd by ditching his trench- coat and stealing a little kids baseball
cap. Earlier in the night, a laptop had magically appeared with a video of his on it playing
at the bus stop on the corner. He is being egged on to use his old programming to open a
key- locked security highly classified documents page at The Pentagon. They tell him his
old programming is still in place on a new network designed by them. All he has to do is
use it, and they will let him go free.
Once living off of forged documents and credit cards, he is now reduced to stealing from
snack machines to eat. While rocking a snack machine back and forth to retrieve a bag of
potato chips, he has an idea. What if he can write some fast programming to reroute the
signal from whatever terminal they would have him on? That would leave him risk free,
if he could make sure the terminals’ cameras were disabled to have any proof of it being
him who infiltrated. The question remains what were those classified documents they
were attempting to obtain and why?
He is being chased, starved and cheated of his own cheatings, to which he can raise no
complaint. He is worn, tired from being up all night and having nowhere to rest, he
decides to turn to just showing up at his old girlfriend, Marcia’s apartment. When he gets
there, it is a very awkward situation as her new boyfriend is there. He basically forces his
way in the door to explain his circumstances, but she is not having any of it. They have
an argument, the end of which is her giving him twenty dollars to “just go away!” He
uses the money to buy some over the counter caffeine pills, what he used to use when he
was crash programming, and some hair dye and scissors. Using the men’s room at a fast
food restaurant for about twenty minutes, he changes his hair style and color, and changes
into some clothing he scavenged from a trash can downtown.
His own crooked affiliations are of no use, and his business shattered, leaving him to
desperate measures that will lead him closer to The Pentagon and The White House with
his hacks than he had ever before attempted, or hoped to be in attempt. He goes to the
downtown library, to use a free computer terminal. Using simple text and cut and pasting
from various sites, he writes a signal rerouting program and drops it onto disk. He is
starting to see that if these documents were in fact stolen for the reason of need, they
would have done it already themselves. No, they were playing another sort of
manipulation once again. But he had no idea what it was. Perhaps the key was contained
in those documents.
When a PC arrives at his high jacked motel room via a courier, he is told to accept the
terminal or take two from his twenty – two to the head. He had crawled in through the
window of the establishment, having checked to see what rooms were free and what the
expected occupancy was for the night. He accepts the terminal and, nervously turns it on.
Once again it is teed up to the network automatically connecting it to the Pentagon’s
Classified Documents section. This time he accepts the challenge, using his signal
rerouting or diffusion program and opens the classified documents and, as per the
instructions popping up on the screen sends them to his contact via an anonymous free
email account.
Whoever is behind his demise is through playing. The documents are the details of the
military detail for movement of all of the U.S. nuclear warheads in times of high alert. It
specifies the amount and procedures of guards around the facilities and their movements
in protecting the warhead. The specialized report is used to pinpoint strategically the
weakest points in the movements in order to fend off possible terrorist organizations in
those areas gaining access. These reports were almost designed as a sort of blueprint for
terrorists to strike, in order to train the personnel for high alert drastic weapons
maneuvers.
By this point, he has been flushed via a series of close calls with Homeland Securities to
Washington, D.C. and he is nervous in the face of a city he does not know, or wish to
tamper with. As he follows his instructions on the terminal while traveling on his pre-
arranged train tickets, he is plagued by these people not only rushing him to work while
traveling on other documents, but giving him unscheduled stops and reroutes enforced by
similar episodes as what happened in the subway. So he finds himself in D.C., just three
days after the initial takeover of his accounts. The fact that he has been physically
demanded to appear in D.C. where the machines storing these records are kept has him
feeling emotionally exhausted. The question was, who were these people, and what was
their new agenda for him now that he had arrived in the capital?
When he boots up the computer, his old network fires up, but with a time sensitive key
element that if not deprogrammed by following instructions will send all of his files to
the F.B.I. and the C.I.A. in a series of very stimulating letters and attachments. He is to
hack into the secret service current events database for details on protection of the
President while traveling in the next week. A picture pops up on the screen, and he is
asked to print from his new printer supplied at his Hilton hotel room a badge enabling
him access to the press room at The White House. He is shown manifests that list him
fresh on the list, and given an itinerary to attend press conferences prior to the Presidents
travel later on in the week.
When the trail turns deadly, with his old girlfriend turning up dead at the scene of a
Senators’ shooting in the brownstones of South Philadelphia, his hometown, he is led
ever further on this action packed trail of terror which will leave you at whits end. The
news story of his girlfriends’ death arrives in an email attachment on the terrorists
terminal, along with a note: this could be you if you try and tell anyone else. The Senator
was a visit point for The President later on in the week, and thus there would be itinerary
changes. They seemed to be arranging a sort of rendezvous with the chief himself.
Stephen just hoped he wasn’t expected to be there.
To the press release room at The White House he is called as a legitimate courier of the
terrorist organizations news media group which has somehow secured him a badge and
the rights to stand in very close proximity to the world’s elite. He asks no questions, and
takes notes quietly in the corner of the room, his exact instructions being to ask one
simple question. The question was “In light of the Senators’ shooting do you feel that you
will have an increase Secret Service protection for the coming weeks travel?” He was
being asked to obviously set himself up to have been the one who asked the fateful
question to the President before what could only be an assassination attempt.
His presence is being established for a very special setup attempt on the Presidents’ life,
and he knows it. As his travel plans are made to include the Presidents infamous last
minute stop on exit from the White House, his favorite deli in Georgetown, he sees his
worst nightmare coming true. They were going to plug the President and have him pinned
for it, left holding the gun. That was the only feasible explanation for the fact that his
presence was being demanded at this point in time. If only he had listened to his mother,
and become a doctor or a professor.
Sweating over a night picking through brownstones trash receptacles, he pieces together a
terminal of his own as he desperately tries to fly under the radar of what he now knows is
an Islamic terrorist organization getting it’s funding by a chain of old dope dealers with
which he once had association. He has backtracked through hacking through their
firewalls to see where their group is initiated from. Though the few transmissions he got
to see from one group member to another cell were vague, they were done in Arabic. The
most visible chain of transactions was from the dope dealers to these men, for opium that
could be turned into heroine at one of their labs. They were a drug supported terrorist
organization, making money hand over fist with no intentions of stopping until they had
destroyed America at the very core of what they felt we were: greed incarnate.
As he faces death head on holding the hands of his own exposure and the greater
imperative of saving the leaders which once vexed him, he is faced with the opportunity
to go down in history as one of the worlds’ most important hackers ever. He pieces
together a small server with the computers he has scavenged, and with his one day off
arranges with an elderly man in the park to set them up and leave them at his house for
him in exchange for use of them for one day. The man agrees, and his tail absent from
sight, he builds a small website to relay messages to the Secret Service men as they
protect the President in real time. Any other way would cause red flags to go up with the
terrorists, and he would lose his chance to get the main cell, who he now knows is a
sniper put in prison. Gathering all of the classified documents stolen, he slowly pieces
together the adverse chain of reactions surrounding a key point where we are storing a
warhead in the Middle East, taken back from them. The Presidents killing would most
likely call for a high alert, and those procedures would be implemented. It was a two part
plan!
Either way, he is in for a down to the wire hair raising ride through downtown
Georgetown to visit the possibility of becoming the infamous hacker who shot the
President on the eve of a terrorist attack. He could just see it now, all of the proof that he
had had dealings with Islamic Nationals to give them all of the necessary documents for
their attack. The exposure of his long standing criminal network which had slid loose as
he lost his marbles. In the end, it all depends on what he could piece together of what had
been thrown away the night before in a brownstones alley.

More Related Content

Viewers also liked

GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...
GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...
GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...
Cindy Dolezel, PMP
 
3 columnas 229 mm en curva bn
3 columnas 229 mm en curva bn3 columnas 229 mm en curva bn
3 columnas 229 mm en curva bn
Jessica Orosco
 
Guia didactica construyendo ciudadania.
Guia didactica  construyendo ciudadania.Guia didactica  construyendo ciudadania.
Guia didactica construyendo ciudadania.
claudia-patricia
 

Viewers also liked (15)

GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...
GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...
GRI%20_ContentIndexSpecificandCoreGeneralStandardDisclosures2014June30_201503...
 
3 columnas 229 mm en curva bn
3 columnas 229 mm en curva bn3 columnas 229 mm en curva bn
3 columnas 229 mm en curva bn
 
Peter D. Feehan Scrum Alliance-CSM_Certificate
Peter D. Feehan Scrum Alliance-CSM_CertificatePeter D. Feehan Scrum Alliance-CSM_Certificate
Peter D. Feehan Scrum Alliance-CSM_Certificate
 
Mark Zuckerberg and Priscilla Chan - Doing Good - Kuleana Lands - The Real S...
Mark Zuckerberg and Priscilla Chan - Doing Good -  Kuleana Lands - The Real S...Mark Zuckerberg and Priscilla Chan - Doing Good -  Kuleana Lands - The Real S...
Mark Zuckerberg and Priscilla Chan - Doing Good - Kuleana Lands - The Real S...
 
312011459 esquema-general-del-evea
312011459 esquema-general-del-evea312011459 esquema-general-del-evea
312011459 esquema-general-del-evea
 
Image Processing Compression and Reconstruction by Using New Approach Artific...
Image Processing Compression and Reconstruction by Using New Approach Artific...Image Processing Compression and Reconstruction by Using New Approach Artific...
Image Processing Compression and Reconstruction by Using New Approach Artific...
 
What's prejudice
What's prejudiceWhat's prejudice
What's prejudice
 
10 Blogging Tips
10 Blogging Tips10 Blogging Tips
10 Blogging Tips
 
Understanding Safety and Product Stewardship
Understanding Safety and Product StewardshipUnderstanding Safety and Product Stewardship
Understanding Safety and Product Stewardship
 
Guia didactica construyendo ciudadania.
Guia didactica  construyendo ciudadania.Guia didactica  construyendo ciudadania.
Guia didactica construyendo ciudadania.
 
When trust boosts customer engagement
When trust boosts customer engagementWhen trust boosts customer engagement
When trust boosts customer engagement
 
E-Brochure
E-BrochureE-Brochure
E-Brochure
 
Corneal Stromal Dystrophies
Corneal Stromal DystrophiesCorneal Stromal Dystrophies
Corneal Stromal Dystrophies
 
Buccal drug delivery systems
Buccal drug delivery systemsBuccal drug delivery systems
Buccal drug delivery systems
 
Zoonoses
ZoonosesZoonoses
Zoonoses
 

Similar to 3.hack to the chief synopsis

The six up synopsis
The six up synopsisThe six up synopsis
The six up synopsis
Joel Brooks
 
Takes one to no one synopsis long
Takes one to no one synopsis longTakes one to no one synopsis long
Takes one to no one synopsis long
Joel Brooks
 
4.takes one to no one synopsis
4.takes one to no one synopsis4.takes one to no one synopsis
4.takes one to no one synopsis
Joel Brooks
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
forensicsnation
 
Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...
Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...
Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...
dplsurve
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx
‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx
‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx
oswald1horne84988
 

Similar to 3.hack to the chief synopsis (19)

Always ric quest original !
Always ric quest original !Always ric quest original !
Always ric quest original !
 
The six up synopsis
The six up synopsisThe six up synopsis
The six up synopsis
 
Takes one to no one synopsis long
Takes one to no one synopsis longTakes one to no one synopsis long
Takes one to no one synopsis long
 
4.takes one to no one synopsis
4.takes one to no one synopsis4.takes one to no one synopsis
4.takes one to no one synopsis
 
5.the holo synopsis
5.the holo synopsis5.the holo synopsis
5.the holo synopsis
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...
Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...
Dropping Off The Grid: A Growing Movement In America: Part II: http://tinyurl...
 
Hit man
Hit manHit man
Hit man
 
Hit man
Hit manHit man
Hit man
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
CFG News - combatting cyber fraud
CFG News - combatting cyber fraudCFG News - combatting cyber fraud
CFG News - combatting cyber fraud
 
‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx
‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx
‘60 Days In’ Everyday People Are Sent to a Violent Prison.docx
 
Letter to whom it concerns
Letter to whom it concernsLetter to whom it concerns
Letter to whom it concerns
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)
 
Jim Stone Freelance.pdf
Jim Stone Freelance.pdfJim Stone Freelance.pdf
Jim Stone Freelance.pdf
 
2600 v02 n03 (march 1985)
2600 v02 n03 (march 1985)2600 v02 n03 (march 1985)
2600 v02 n03 (march 1985)
 
Man on death row; betrayal and conspiracy
Man on death row; betrayal and conspiracyMan on death row; betrayal and conspiracy
Man on death row; betrayal and conspiracy
 
Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...
Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...
Cybercrime criminal threats from cyberspace (crime, media, and popular cultur...
 

More from Joel Brooks

12.broken records band query
12.broken records band query12.broken records band query
12.broken records band query
Joel Brooks
 
4.takes one to no one
4.takes one to no one4.takes one to no one
4.takes one to no one
Joel Brooks
 
4.takes one to no one scene chart
4.takes one to no one scene chart4.takes one to no one scene chart
4.takes one to no one scene chart
Joel Brooks
 
16. the relative factor
16. the relative factor16. the relative factor
16. the relative factor
Joel Brooks
 
The holo character development.
The holo character development.The holo character development.
The holo character development.
Joel Brooks
 
Aitken alexander associates march 14 2014
Aitken alexander associates march 14 2014Aitken alexander associates march 14 2014
Aitken alexander associates march 14 2014
Joel Brooks
 
Dialogue between detectives harris and rushmore as they are processing tom
Dialogue between detectives harris and rushmore as they are processing tomDialogue between detectives harris and rushmore as they are processing tom
Dialogue between detectives harris and rushmore as they are processing tom
Joel Brooks
 
Dialogue strip search brainstorm
Dialogue strip search brainstormDialogue strip search brainstorm
Dialogue strip search brainstorm
Joel Brooks
 

More from Joel Brooks (20)

12.broken records band query
12.broken records band query12.broken records band query
12.broken records band query
 
2.waste query
2.waste query2.waste query
2.waste query
 
2.waste
2.waste2.waste
2.waste
 
4.takes one to no one
4.takes one to no one4.takes one to no one
4.takes one to no one
 
4.takes one to no one scene chart
4.takes one to no one scene chart4.takes one to no one scene chart
4.takes one to no one scene chart
 
16. the relative factor
16. the relative factor16. the relative factor
16. the relative factor
 
6.what
6.what6.what
6.what
 
September 20
September 20September 20
September 20
 
Joel brooks
Joel brooksJoel brooks
Joel brooks
 
Plot analysis
Plot analysisPlot analysis
Plot analysis
 
Here it is, love!
Here it is, love!Here it is, love!
Here it is, love!
 
Waste
WasteWaste
Waste
 
The holo character development.
The holo character development.The holo character development.
The holo character development.
 
F.b.i 3 28 14
F.b.i 3 28 14F.b.i 3 28 14
F.b.i 3 28 14
 
Aitken alexander associates march 14 2014
Aitken alexander associates march 14 2014Aitken alexander associates march 14 2014
Aitken alexander associates march 14 2014
 
Brainstorming
BrainstormingBrainstorming
Brainstorming
 
Cut the virgin bit
Cut the virgin bitCut the virgin bit
Cut the virgin bit
 
Dialogue between detectives harris and rushmore as they are processing tom
Dialogue between detectives harris and rushmore as they are processing tomDialogue between detectives harris and rushmore as they are processing tom
Dialogue between detectives harris and rushmore as they are processing tom
 
Dialogue strip search brainstorm
Dialogue strip search brainstormDialogue strip search brainstorm
Dialogue strip search brainstorm
 
Manuscript
ManuscriptManuscript
Manuscript
 

Recently uploaded

Panchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdfPanchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdf
Suleman Rana
 

Recently uploaded (12)

Come join us for a night of excitement and fun with our exclusive Indian
Come join us for a night of excitement and fun with our exclusive IndianCome join us for a night of excitement and fun with our exclusive Indian
Come join us for a night of excitement and fun with our exclusive Indian
 
The Ultimate Guide to Mom IPTV- Everything You Need to Know in 2024.pdf
The Ultimate Guide to Mom IPTV- Everything You Need to Know in 2024.pdfThe Ultimate Guide to Mom IPTV- Everything You Need to Know in 2024.pdf
The Ultimate Guide to Mom IPTV- Everything You Need to Know in 2024.pdf
 
NO1 Pandit Amil Baba In Uk Usa Uae London Canada England America Italy German...
NO1 Pandit Amil Baba In Uk Usa Uae London Canada England America Italy German...NO1 Pandit Amil Baba In Uk Usa Uae London Canada England America Italy German...
NO1 Pandit Amil Baba In Uk Usa Uae London Canada England America Italy German...
 
Panchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdfPanchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdf
 
NO1 Pandit Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sh...
NO1 Pandit Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sh...NO1 Pandit Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sh...
NO1 Pandit Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sh...
 
Q4 WEEK 1 JUDGE THE RELEVANCE AND WORTH OF IDEAS.pptx
Q4 WEEK 1 JUDGE THE RELEVANCE AND WORTH OF IDEAS.pptxQ4 WEEK 1 JUDGE THE RELEVANCE AND WORTH OF IDEAS.pptx
Q4 WEEK 1 JUDGE THE RELEVANCE AND WORTH OF IDEAS.pptx
 
Top Best IPTV Providers in the UK for 2024.pdf
Top Best IPTV Providers in the UK for 2024.pdfTop Best IPTV Providers in the UK for 2024.pdf
Top Best IPTV Providers in the UK for 2024.pdf
 
Dehradun Girls 9719300533 Heat-lava { Dehradun } Whiz ℂall Serviℂe By Our
Dehradun Girls 9719300533 Heat-lava { Dehradun } Whiz ℂall Serviℂe By OurDehradun Girls 9719300533 Heat-lava { Dehradun } Whiz ℂall Serviℂe By Our
Dehradun Girls 9719300533 Heat-lava { Dehradun } Whiz ℂall Serviℂe By Our
 
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
 
Doorstep ꧁❤8901183002❤꧂Lucknow #ℂall #Girls , Lucknow #ℂall #Girls For Shot...
Doorstep ꧁❤8901183002❤꧂Lucknow  #ℂall #Girls , Lucknow  #ℂall #Girls For Shot...Doorstep ꧁❤8901183002❤꧂Lucknow  #ℂall #Girls , Lucknow  #ℂall #Girls For Shot...
Doorstep ꧁❤8901183002❤꧂Lucknow #ℂall #Girls , Lucknow #ℂall #Girls For Shot...
 
Lite version of elevator game simplified.pptx
Lite version of elevator game simplified.pptxLite version of elevator game simplified.pptx
Lite version of elevator game simplified.pptx
 
Online Lotus ID | India's Top Cricket Betting ID Platform
Online Lotus ID | India's Top Cricket Betting ID PlatformOnline Lotus ID | India's Top Cricket Betting ID Platform
Online Lotus ID | India's Top Cricket Betting ID Platform
 

3.hack to the chief synopsis

  • 1. Hack To The Chief (STEP FOUR) Step Four: A hacker who makes his living by doing so becomes the target of a terrorist organization and its’ murderous setup to assassinate The President of The United States. One day, Stephen Bolsom noticed his friends list being edited on his social networking accounts. The only ones left on the list were the names of those who were involved in his new network to hijack corporate social networking sites to promote new and emerging artists in the recording and other industries. By the time an old dope dealer of his from ten years prior shows up on the list, and attempting to chat with him, he is reciprocating with hostilities towards his tech junkie employees. The dealer tells him he is about to be exposed unless he gives up some of the money he took from corporate America and stored in Swiss banks. He is not aware of the backing organization of this planned attack on his systems at first, and takes the shakedown lightly. He tells the dope dealer to go “fuck himself” and returns to what he thinks should be business as usual, but then it happens. The massive server he
  • 2. has set up at his house crashes, and then begins to spit information out to random assortments of people hooked into accounts he serviced. His bank records, privately filmed pornography, and all sorts of incriminating details about his advertising and business acquaintances. With accounts on the line numbering to hundreds of thousands of dollars, he is forced to unplug everything. His clients are now left naked and unshielded from exposure and having their, in some cases very well established accounts busted and irrevocably removed. Stephen is soon let to know that he will either conform to a new set of rules, or be engaged in paying heavily for his own cyber - crimes. When phone rings, and it is his home security systems reporting that there was a call for an alarm, he is informed there will be a mandatory police inspection done due to suspicious activity on the videos. “We just want to make sure you are safe sir.” the security systems customer service representative tells him. It is just the worst of time, as he had just opened all of the secret safe positions around the house to store the backup and main hard disks until all of the controversy about to ensue blew over. He ends up enduring the police inspection, narrowly avoiding them inspecting the common area with the only safe still open.
  • 3. He leaves his house the day after, and returns to find that all of the paperwork on his mortgage has been changed, and the house has been sold out from under him. The security code doesn’t work. The locks have been changed. There is paperwork and a sold sign in the yard. His phone rings, its’ the dealer again. He informs Stephen that he is homeless and due to his keeping such a low profile and living in the boondocks, he has made it easy on everyone. “The new security company will be there in five minutes, by the way, for you standing on the lawn. We reported you. Go to The Hilton downtown and request a letter for you at the front desk. You will find, we can also be very accommodating.” Hotel accommodations are sent to his phone, but he is not so easily persuaded. Stephen does not want to give his new adversary any more leeway to feeling he is going to roll over and play dead. He takes out the emergency I.D. kit he has always kept in his car in the case of a fight or flight situation, and goes to the local pub for a brew to stew and think things over. Paying in cash at the bar, he withdraws money from his credit card, done on another name from another persons’ identity. He then reports his own car stolen, and calls a taxi. Removing all of his equipment to take with him from the car “downtown Hilton.” he tells the cabbie.
  • 4. He takes to stealing hotel occupancies in cheap key- card establishments where he can infiltrate the book- keeping records and maintain a low profile. The message at The Hilton was a room key and a “terminal passcode” in an envelope. Not knowing if there would be a man in a chair in the dark in that hotel room waiting to meet him like in the movies kept him from going to the room. Once he is checked in to the hotel, he hacks their system records and erases even the data of the fake name he registered under. His enemy held that information on the disks from his home. He takes out his computer, and begins a back door look into all of his accounts, and finds that all of his money is gone. The only monies left are from the false identities, and they were pending transfer. When his accounts go berserk on him, he doesn’t know what to do, but follow a trail of setups left behind for him to attain his only hope of survival. Maybe he should very well turn himself into a conspiracy theory nut who became a nobody, a bum and let them win.
  • 5. Even this idea of a recluse is soon squashed when his android rings with a fresh threat. They are going to expose his multi - national hacker based programming business to the authorities and have him doing hard time for all of his crimes if he doesn’t conform, they tell him. They direct him to The Hilton downtown once more to retrieve an envelope. As the twists of his trail go further past the point of no return to his old life, he begins to live by a new set of rules. Not being a thug or a hardened criminal he has no means by which to support himself with a hustle. He was a white collar criminal, and a very successful one at that. He begins to live like a hoodlum, lifting ladies purses at bus stops to get food money to eat, once even asking to use a strangers’ cell phone and then walking away with it. If he isn’t picked up by the authorities for his various petty thefts at discount drugstores, he will be surprised he thinks to himself. He abandons his smart phone, and begins to try and ditch all of the comforts of his old tech junkie lifestyle. He pawns his laptop, feeling he can’t outright sell it as it would be another in a long string of losses here. He can’t help but feel that going to the Hilton will inevitably put him in deeper danger. At least for now, he is free and safe from any further
  • 6. damage being done. These people obviously wanted him to do something more than money, as they had all of his money already. At several bus stops in the city throughout his days travel, he notices a man tailing him. As if it weren’t bad enough that he couldn’t get through to his old girlfriend for some shelter, he is now being tailed. At every turn, the equipment is left in his path to return to work, but with very specific design documents coming forward from the glowing terminals he faces. As he walks by a stranger in the subway terminal, a phone is dropped in his trench-coat pocket. It begins to ring, and he picks it up. They inform him that the subway police have been informed of a man wanted for bank robbery matching his description, and that he needs to exit the train “NOW!” He just so happens to be at a stop, and as he sees a subway cop running after him, loses him in the crowd by ditching his trench- coat and stealing a little kids baseball cap. Earlier in the night, a laptop had magically appeared with a video of his on it playing at the bus stop on the corner. He is being egged on to use his old programming to open a key- locked security highly classified documents page at The Pentagon. They tell him his old programming is still in place on a new network designed by them. All he has to do is use it, and they will let him go free.
  • 7. Once living off of forged documents and credit cards, he is now reduced to stealing from snack machines to eat. While rocking a snack machine back and forth to retrieve a bag of potato chips, he has an idea. What if he can write some fast programming to reroute the signal from whatever terminal they would have him on? That would leave him risk free, if he could make sure the terminals’ cameras were disabled to have any proof of it being him who infiltrated. The question remains what were those classified documents they were attempting to obtain and why? He is being chased, starved and cheated of his own cheatings, to which he can raise no complaint. He is worn, tired from being up all night and having nowhere to rest, he decides to turn to just showing up at his old girlfriend, Marcia’s apartment. When he gets there, it is a very awkward situation as her new boyfriend is there. He basically forces his way in the door to explain his circumstances, but she is not having any of it. They have an argument, the end of which is her giving him twenty dollars to “just go away!” He uses the money to buy some over the counter caffeine pills, what he used to use when he was crash programming, and some hair dye and scissors. Using the men’s room at a fast food restaurant for about twenty minutes, he changes his hair style and color, and changes into some clothing he scavenged from a trash can downtown.
  • 8. His own crooked affiliations are of no use, and his business shattered, leaving him to desperate measures that will lead him closer to The Pentagon and The White House with his hacks than he had ever before attempted, or hoped to be in attempt. He goes to the downtown library, to use a free computer terminal. Using simple text and cut and pasting from various sites, he writes a signal rerouting program and drops it onto disk. He is starting to see that if these documents were in fact stolen for the reason of need, they would have done it already themselves. No, they were playing another sort of manipulation once again. But he had no idea what it was. Perhaps the key was contained in those documents. When a PC arrives at his high jacked motel room via a courier, he is told to accept the terminal or take two from his twenty – two to the head. He had crawled in through the window of the establishment, having checked to see what rooms were free and what the expected occupancy was for the night. He accepts the terminal and, nervously turns it on. Once again it is teed up to the network automatically connecting it to the Pentagon’s Classified Documents section. This time he accepts the challenge, using his signal
  • 9. rerouting or diffusion program and opens the classified documents and, as per the instructions popping up on the screen sends them to his contact via an anonymous free email account. Whoever is behind his demise is through playing. The documents are the details of the military detail for movement of all of the U.S. nuclear warheads in times of high alert. It specifies the amount and procedures of guards around the facilities and their movements in protecting the warhead. The specialized report is used to pinpoint strategically the weakest points in the movements in order to fend off possible terrorist organizations in those areas gaining access. These reports were almost designed as a sort of blueprint for terrorists to strike, in order to train the personnel for high alert drastic weapons maneuvers. By this point, he has been flushed via a series of close calls with Homeland Securities to Washington, D.C. and he is nervous in the face of a city he does not know, or wish to tamper with. As he follows his instructions on the terminal while traveling on his pre- arranged train tickets, he is plagued by these people not only rushing him to work while
  • 10. traveling on other documents, but giving him unscheduled stops and reroutes enforced by similar episodes as what happened in the subway. So he finds himself in D.C., just three days after the initial takeover of his accounts. The fact that he has been physically demanded to appear in D.C. where the machines storing these records are kept has him feeling emotionally exhausted. The question was, who were these people, and what was their new agenda for him now that he had arrived in the capital? When he boots up the computer, his old network fires up, but with a time sensitive key element that if not deprogrammed by following instructions will send all of his files to the F.B.I. and the C.I.A. in a series of very stimulating letters and attachments. He is to hack into the secret service current events database for details on protection of the President while traveling in the next week. A picture pops up on the screen, and he is asked to print from his new printer supplied at his Hilton hotel room a badge enabling him access to the press room at The White House. He is shown manifests that list him fresh on the list, and given an itinerary to attend press conferences prior to the Presidents travel later on in the week.
  • 11. When the trail turns deadly, with his old girlfriend turning up dead at the scene of a Senators’ shooting in the brownstones of South Philadelphia, his hometown, he is led ever further on this action packed trail of terror which will leave you at whits end. The news story of his girlfriends’ death arrives in an email attachment on the terrorists terminal, along with a note: this could be you if you try and tell anyone else. The Senator was a visit point for The President later on in the week, and thus there would be itinerary changes. They seemed to be arranging a sort of rendezvous with the chief himself. Stephen just hoped he wasn’t expected to be there. To the press release room at The White House he is called as a legitimate courier of the terrorist organizations news media group which has somehow secured him a badge and the rights to stand in very close proximity to the world’s elite. He asks no questions, and takes notes quietly in the corner of the room, his exact instructions being to ask one simple question. The question was “In light of the Senators’ shooting do you feel that you will have an increase Secret Service protection for the coming weeks travel?” He was being asked to obviously set himself up to have been the one who asked the fateful question to the President before what could only be an assassination attempt.
  • 12. His presence is being established for a very special setup attempt on the Presidents’ life, and he knows it. As his travel plans are made to include the Presidents infamous last minute stop on exit from the White House, his favorite deli in Georgetown, he sees his worst nightmare coming true. They were going to plug the President and have him pinned for it, left holding the gun. That was the only feasible explanation for the fact that his presence was being demanded at this point in time. If only he had listened to his mother, and become a doctor or a professor. Sweating over a night picking through brownstones trash receptacles, he pieces together a terminal of his own as he desperately tries to fly under the radar of what he now knows is an Islamic terrorist organization getting it’s funding by a chain of old dope dealers with which he once had association. He has backtracked through hacking through their firewalls to see where their group is initiated from. Though the few transmissions he got to see from one group member to another cell were vague, they were done in Arabic. The most visible chain of transactions was from the dope dealers to these men, for opium that could be turned into heroine at one of their labs. They were a drug supported terrorist organization, making money hand over fist with no intentions of stopping until they had destroyed America at the very core of what they felt we were: greed incarnate.
  • 13. As he faces death head on holding the hands of his own exposure and the greater imperative of saving the leaders which once vexed him, he is faced with the opportunity to go down in history as one of the worlds’ most important hackers ever. He pieces together a small server with the computers he has scavenged, and with his one day off arranges with an elderly man in the park to set them up and leave them at his house for him in exchange for use of them for one day. The man agrees, and his tail absent from sight, he builds a small website to relay messages to the Secret Service men as they protect the President in real time. Any other way would cause red flags to go up with the terrorists, and he would lose his chance to get the main cell, who he now knows is a sniper put in prison. Gathering all of the classified documents stolen, he slowly pieces together the adverse chain of reactions surrounding a key point where we are storing a warhead in the Middle East, taken back from them. The Presidents killing would most likely call for a high alert, and those procedures would be implemented. It was a two part plan! Either way, he is in for a down to the wire hair raising ride through downtown
  • 14. Georgetown to visit the possibility of becoming the infamous hacker who shot the President on the eve of a terrorist attack. He could just see it now, all of the proof that he had had dealings with Islamic Nationals to give them all of the necessary documents for their attack. The exposure of his long standing criminal network which had slid loose as he lost his marbles. In the end, it all depends on what he could piece together of what had been thrown away the night before in a brownstones alley.