and some of our sister agencies have been looking for an opportunity to get close for a while,” Ito added. “It’s just serendipity that you happen to have timely access. You can get in without arousing suspicion and slide the devices in with no one the wiser.”
Ito lifted the lid on the briefcase and withdrew a couple of electronic devices about the size of a dime. “Nothing here you haven’t seen before, I’m sure. These two are voice activated with a transmission range of almost half a mile, so our people can park listening posts well outside his property in areas that won’t arouse suspicion. Dormant unless activated, with power packs that last for months. These ones,” he added, lifting out a couple of small tubes, “are motion-activated cameras. Same kind of range and power pack. If you can plant any of them unobtrusively in his office and anywhere else that looks promising, it would be a real boon to our efforts.”
Hannah picked up one of the devices and turned it over in her hand. “This is the best you’ve got? I thought you guys were a little more advanced than this. Are these even shielded?”
“They’ll resist some sensors. Not all, but that’s the point. An operator like Gladding is programmed to assume that he’s susceptible to bugging. We let him find some and he figures he’s outsmarted us.”
“Even assuming I have access or the time to plant anything, what makes you think he won’t find them all?”
“He might,” Towle said.
“So what’s the point?”
Towle looked over at Ito. “Show her the clincher.”
Ito pulled out a small case and opened it. Inside was a matte rectangle, maybe half-by-a-quarter-inch in size, tops. Ito peeled it out of the case. It was paper-thin and virtually transparent. “What we’d really love is for you to try to attach this to Gladding’s laptop. We know he keeps it on his desk, so if you can get a minute alone—”
“What is it?” Hannah asked.
“A keystroke logger. Gladding communicates primarily via e-mail and he sends out all his business info over an encrypted network. This device will record not only the encryption key, but every strike on the keypad. Unlike those other toys, this one’s almost impossible to detect with standard sweeping equipment. It attaches with an adhesive—just peel it like a bandage. In a pinch, you could stick it almost anywhere on the laptop and it probably wouldn’t be noticed, but I’d suggest opening the CD drive and sticking it under the tray.”
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.
Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.