American library books » Other » Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕

Read book online «Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕».   Author   -   Ipam



1 ... 5 6 7 8 9 10 11 12 13 ... 33
Go to page:
blank computer & talks, mysteriously. “No,there’s much more. Re-type your command.”

TAG 03299110456 Slanton Ashley

Screen blinks dark, then bright with missingdata. Stockton questions, boldly. “What’s happening, Pamela? Why’sthe screen bouncing?”

Pamela gasps, nosily & talks,frightfully. “I’m caught. I’m being traced and tracked. It’s awarning…from the CIA network administrator.”

“You said that couldn’t happen.” Stocktoncomments, nasty then sneers, nosily.

“I say that I destroy the attacker’s websiteafter my execute is finished. The website’s down. Now they’relooking for the hacker….that’s me.” Pamela details, fully with fearof jail and worry of imprisonment for committing hacking job on CIAwebsite, the Central Intelligence Agency.

“Finish the convert before your targeted.”Geneva orders.

“I’m can try but if found, they’ll startfully re-boot breaking my signal, then….” Pamela dumps.

Geneva fills, completely. “…we start over. Ipossess other valid IP addresses from CIA’s IT. This is only ourfirst attempt.”

Pamela types, swiftly & displays Englishwords as binary translator works the next character.

TAG 03299110456 Slanton Ashley IT101991162238 Slanton Thurston B

TAG 03299110456 Slanton Ashley IT101991162238 Slanton Thurston BO

“BO? I don’t know any person named Bo, doyou, Geneva?” Stockton talks, sharply & neck snaps to her.Geneva eye burns screen.

TAG 03299110456 Slanton Ashley IT101991162238 Slanton Thurston BOA

“BOA?” Stockton talks, excitedly. “As in boaconstrictor, the windpipe suffocating snake, do you know any othersnakes, Geneva?”

“A couple without the fangs.” Geneva snares,nasty. Screen blinks, violently black, then yellow back to midnightblack. “Damn,” Geneva screams, surly. “Get it back,Pamela…now!”

“We’ve severed, permanently.” Pamela details,successfully & types, musically keyboard command codes tryingto re-establish the electronic Cyber connection. She’s relieved theCIA IT administrator found the snoop hole, halting this insaneillegal action. Pamela stops, suddenly then eye burns Geneva.

“Who’s Boa, Geneva?” Stockton inquires,stupidly & stares, studiously.

“Very good, Pamela.” Geneva comments, softlythen neck snaps to Stockton. “We wait precisely 13 minutes over 10but less than 15 giving the CIA Network Administrator time tofigure out the resourceful hacker has left the building.” Genevalaughs, evilly. “Then, we execute our second attempt. I’m too closeto solving this puzzle, now.” Stockton nods, once. “Order somedrinks, Stockton, I suddenly find my throat parched.” Stocktonmoves, quickly to landline on her desk as trained gopher forGeneva.

Pamela stands, swiftly. “Potty break,please.”

Geneva sits, swiftly in chair next tocomputer & gallops unpolished nails on surface watching birdiesfly in baby blue skies then orders, commandingly. “Be back in 10for our final conquest, Pamela.”

“Yes, ma’am.” Pamela quotes, meekly &taps, quickly heels on wooden floor into office space, notingco-workers are absent from chair while flirting with cute boysoutside bathroom other side of hallway.

Time 9:45 am.

Division of Cyber Crimes is located on 11thfloor of Federal Building in uptown Birmingham. Office in decoratedwhite cathedral ceil with cherry wood paneled rectangular geometricroom. Crossed window glass panes line East wall, hot in am and coolin pm on desk of Lacy, Ilenn & Stockton. Entrance door occupiesSouth wall along with matching cherry wooden filing cabinet buddiesstanding as overweight useless sentries coming and going intohallway. Across entrance door is set of steel plated elevators forexiting for home using parking garage on basement level 2.

Geneva’s private office fills North corner ofroom with view, beautifully of three sets of windows overlooking11th Avenue, 22 Street and 10th Avenue, an entire block of people,cars and spying.

Pamela’s single cherry wood desk holds upWest wall while silver desktop & black printer clashes, uglywith décor. Second empty desk stands, lonely behind Pamela forfuture employed Retrievers.

I’m not doing it. Pamela thinks,mentally. I don’t break the rules.

Pamela marches, steady & steals, swiftlyIlenn’s maroon leather pocketbook from edge of her desk. Ilennexhibits, purposefully pocketbook when she’s ringed by Arthur tomeet for quickie kiss & hug at vendor’s machine across frombathrooms. Geneva forbids personal contact during work hours. So,Ilenn sits, quietly ready for fast-paced action appearing like jotfor snack. Arthur pays for all and any snacks, coffee or beveragesfor her.

Pamela taps, forwardly & steals, quicklyLacy’s cell phone planted beside her vanilla folders forsafekeeping and spying from Geneva. Geneva doesn’t allow personaltelephone calls during work hours. Lacy uses cell as iPod listeningto Roll & Rock music surfing Internet for research assignments.She poses, purposefully cell for quick action and subtle fun.

Basic digital cell phone has a few individualparts of circuit board, antenna, screen, keyboard, microphone,speaker and battery. Circuit board carries the brains of the unit.Voice speaker is size of dime while mic is no larger than watchbattery. Keyboard controls commands on cell using radio frequency(RF) rays accessing hundreds of FM channels by interior antenna.Each cell has unique RF array & compatibility outside USbetween 900MHz to 1800MHz.

Digit calls/data overlays each channel with aunique sequence code which can be traced, eventually. Data is sentin small pieces over a large number of frequencies for each commandanytime at the touch of a telephone rang. Telecom provides lock onphone with SIM cards so that the phone only works with their payingservice but Pamela knows the specific special code compliments ofthe US government.

Pamela taps into the GSM (Global system forMobile communications) that operates like personal PC using Linuxoperating system for encryption programs, data networking, faxmachine and multi-conferencing.

She uses, skillfully tiny jewelerscrewdriver, stolen from Geneva’s right hand desk drawer. Tinyimplements are the chosen hackers’s and retrievers’s dream toys forphysically breaking into any computer tower to mangle or mixphysically hot wiring controlling any PC on Earth learning thesevaluable hacker skills in college doing that elective ElectricEngineering class mostly for fun and boredom after class time, ofcourse. She giggles, lightly.

She opens, swiftly back panel of cell phonethen taps, using jewelry precision slotted screwdriver of 2.0mm by.40mm by 60mm on 2 and ÂĽ inches long fine steel, in Morse Code IPaddress transmitting to Eola, Texas to Russia to Australia,Pakistan and finally faking out her Cyberspace co-workersdelivering text message to Chicago, Illinois just like she learnedthis week from Geneva. She needs, immediately money for safeshelter and junk food while developing plot to expose Geneva &her evil plan to the world, or at least to Stockton,second-in-command.

Pamela eye burns her desk & struts,directly to entrance door on North wall. She wishes beyond

1 ... 5 6 7 8 9 10 11 12 13 ... 33
Go to page:

Free e-book: «Cyber Kittens and Cowboys by Ipam (books to read for 12 year olds txt) 📕»   -   read online now on website american library books (americanlibrarybooks.com)

Comments (0)

There are no comments yet. You can be the first!
Add a comment