13 - Analysis:
"Is there any chance that this will be done and dusted by lunch?" Dirty Harriet asked and looked at her watch, "it's almost noon now."
"it takes as long as it takes," I shrugged.
"Yeah, it looks as if this prat has has coded their nick into the script," Cilla scoffed.
"! suppose that it's their little inside joke, but it may be about to backfire on them. I'll zap it over to you VJ to see if you can decrypt it and suss out who it is."
She and VJ were at two computer terminals set up Colossus. A big, wall-mounted monitor kept showing blocks of green glowing computer script on black. It was like something from the Matrix.
All the lights were off except for the glow of the monitors and two small desk lights. The only other sound was the hum of the fans cooling computers and the click of fingers on keyboards.
Vikram and Cilla were beginning the analysis of the data we'd downloaded from the AnalitIQ's server. They were so engrossed in what they were doing that I could've announced that either one of them had won an obscene amount on the lottery and they wouldn't have noticed.
"Its like a foreign bloody language," Dirty Harriet whispered, "do you have any idea what they're saying?"
"Nope," I shook my head.
"But isn't this want you did in the Royal Signals," she asked. "I mean it is, isn't it?"
I shook my head in answer.
"I wasn't in cyberwarfare, what my mob did was battlefield electronic warfare," I explained. "Basically our job was to locate, monitor, intercept and disrupt enemy comms network transmissions."
"Oh."
I decided to take pity on Dirty Harriet.
"Look, as you know we located the server's physical location, and that revealed evidence that they are linked to the guys who hacked our drone," I explained. "After some background research we discovered that both the office suite and domain name were rented to AnalitIQ LLC, a company registered in the Turks and Caicos Islands..."
"Anonymously I assume."
"Yeah, but it isn't that important really. See, one of the things that the Russians do..."
"This is Red Storm, yes?"
"Yes, that's their online identity," I nodded. "One of the things they specialize in is creating and selling checkable fake identities. Basically through online identity theft. Oh, and they're all backed up by all the documentation needed to get genuine ID - driving licenses and passports - that kind of thing. So any name on the lease or the articles of incorporation, it'd probably have been as kosher as a sausage roll at a Bah Mitzvah buffet."
Swann snorted at my attempt at humour.
"So this is an attempt to find usable intel," Swann nodded sagely, "but you don't expect to find this hacker's real identity do you?"
"Nah, there's no chance of that happening," I shook my head, "but if we can discover their nick then we can link that to stuff they've done in the past and have a better idea who is responsible."
"But they've got his nick now, all they have to do is decrypt it."
"Got it!" VJ snapped, "the name was encrypted, so I ran an elliptical algorithm."
"Well hello 0R4CL3,"Cilla crowed, "you may call yourself the Oracle but I bet you didn't foresee this, did ya?"
"Oracle, he was the hacker behind the 2015 American military wives death threats campaign," I mused thoughtfully.