William Blake's The Great Red Dragon and the Woman Clothed with Sun (1805) |
[Italian original]
“What a story!” Massimo thought disconcertingly after he had finished reading Giorgio’s e-mail.
Besides, those strange events seemed to mysteriously intersect with a few instances in Giorgio’s recent life which had occurred before he had been suffering from hallucinations.
His master's studies on ancient religions, his university teaching activities and especially his contagious passion weren’t liked by everybody, especially in a city like Rome, a big Mediterranean centre; lazy, tolerant (and indifferent) but also the seat of the immense organizational, economic and ideological power of the Vatican.
Such a power acted as a magnet for individuals and organizations among which dark forces escaping control could always take root. What worried Massimo were not a few articles in Spanish that had appeared in odd spiritual journals, in which George's activities were stigmatized as 'corrupting', but rather a series of anonymous letters addressed to his master and containing veiled threats which always ended with the Latin words:
Draco rufus
modicum tempus habet.
[The red dragon
has little time].
What did this sentence mean? Giorgio thought that the 'red dragon' was him so the words meant something like "your days are numbered." However, why was he the 'red dragon'?
A Vatican codex of the Bible in Greek and in Latin |
He supposed the phrase to be the result of an assemblage of two passages of the Book of Revelation (or Apocalypse of John) in the Vulgata Clementina translation of the Greek original. More precisely, two words from 12.4 (draco rufus) and three from 12.12 (modicum tempus habet). In most interpretations draco rufus, the red dragon, was the devil. Giorgio, therefore, as a scholar of late antiquity's religions & gods, was a follower of the devil.
Massimo was perplexed. He knew that to the first Christians, all pagan deities were considered living infernal demons, and those who adored them, followers of the infernal powers. But who supported such notion today? To today's Christians the ancient gods were just non-existent.
Another depiction of the Red Dragon by William Blake (1805). Detail |
Besides, if this was the right interpretation of the sentence in the letters (i.e. that Giorgio’s days were numbered), the biblical passage had different and more complex meanings that were open to multiple interpretations.
In any case, someone was threatening Giorgio, that much was clear. And perhaps he was using the imaginative language of the ancient revelation to enhance the psychological effects of the threat.
All this sadly brought Massimo back to Deirdre. The girl had by now reached home and might switch on her PC at any moment.
Massimo thought about their last date at the pub. At the end of the evening, when they were standing in the street in front of the pub’s entrance and were about to say goodbye, he noticed the beautiful red gold necklace that Deirdre was wearing around her neck.
"How beautiful! It brings out the red of your hair. The place was so dark I had hardly noticed it. Now though it shines under the light of the lamppost "
"It's a gift from a friend."
"There's a small Greek inscription engraved on it. May I read it? I'm a fan of ancient languages."
It was true but it was basically just an excuse to get closer to her and perhaps touch her lightly, if possible.
He felt the young woman’s breath on him as he was deciphering the Greek words.
"It's about a red dragon - she said. I always loved the fantasy genre. But I must rush home now. I always receive late-night emails from my boss that I have to answer before going to bed. He's always travelling around the globe. Now he's in South America.
A la prochaine Massimo."
"A la prochaine Deirdre."
The girl smiled at him and walked away with brisk steps. There was something so charming in her ways.
Which though hurt Massimo this time, since the sentence he had just read on her necklace was now obsessively whirling in his head … the red dragon has little time … the red dragon has little time…
How was it ever possible?
The gold necklace bore the Greek original words inscribed:
δράκων πυρρὸς ὀλίγον καιρὸν ἔχει
Which corresponded exactly to the Latin words taken from the Vulgata: draco rufus modicum tempus habet.
From that night the thought of who Deirdre really was had haunted Massimo.
Massimo is waiting at his BackTrack Linux box for Deirdre to reach home |
The girl, for some strange alchemy of the human heart, was a bit like a glimmer of hope in the darkest phase of his life - save for his early childhood, when he tragically lost his father.
But now that sentence … It was very unlikely that words from different passages in the Apocalypse of John had been assembled in exactly the same way in both the letters sent to George and in the inscription carved on the girl's necklace.
Yes, Massimo thought, the odds in favour of mere chance were definitely low.
A 'received mail' ding brought him back to reality. Deirdre must have switched on her computer as Massimo had received a reply to the e-mail he had sent her.
“Hi Massimo.
I would love to see you again soon as well. I am leaving for a few days, but I’ll be back at the beginning of the next week. Call me.
Deirdre.”
Massimo already knew Deirdre’s IP address from their previous chatting sessions. He activated his powerful Backtrack Linux tools. In less than a minute he knew all he needed to know: the number of vulnerable ports, domain name, operating system’s, firewall’s and antivirus’ types & versions (versions have well-known vulnerabilities so they are a key element in any attack), the diagram of the network she was on and so forth.
After acquiring the administrator privileges in her machine he sent her a trojan horse that was invisible to any anti-virus software for the simple reason that it had been created by him and his students in the security labs of the training company he worked for. They had just modified the old and (in)glorious Netbus created by Carl-Fredrik Neikter, a Swedish programmer. He then connected to the Trojan server with its client software. The magic was done. Deirdre's desktop appeared on his screen.
Deirdre seemed artistically very gifted. Her desktop wallpaper was a splendid collage of images with an intriguing Nordic flavour: a fireplace with burning logs, a small white cottage on a sea coast swept by the ocean wind, a pair of white birds walking on the foam of a rough sea … images from a misty world deprived of sun and so far away from his but for this same reason terribly fascinating.
One thing though made him start. Three small red dragons were at the sides of her screen - the top, the right-hand side and the left-hand side - and were joined by three thin lines so as to form the vertices of a triangle that was aesthetically pleasing but also rather disquieting.
He did not have time to watch any longer since a sound from his Linux box alerted him that Deirdre’s PC was being checked remotely by someone or something. He had to act quickly so he started to capture and analyse the incoming traffic into her system. Yes, someone (or an automatic script) was actually remotely executing commands on her PC. And there, among the mass of data captured, he found what he feared:
netstat –an | find "12345"
The command meant that someone (or something) was checking the 12345 port, from where trojans of the Netbus kind - exactly like the Trojan horse of the myth which opened the city's gate to the enemy - usually allow the conquering of the machines that host them.
He had been caught. Connecting the trojan to its default port had been a mistake.
Fortunately Massimo’s IP address was concealed behind the Tor anonymity network. It was therefore very unlikely that they would get to him. But what kind of organization did Deirdre belong to? She had mentioned only two people, her and her boss. Only two people? Utilizing a costly IDS (Intrusion Detection System) that only medium- or large-sized corporations implemented?
In fact what he was expecting at any moment occurred. Deirdre's desktop vanished from his screen. The trojan had been identified and destroyed.
ψ
Massimo slumped into his chair. He knew he could counter attack with a much higher level of sophistication.
But as of now it seemed his worst nightmares were coming true.
Now, MoR, you are teaching us innocents of the evil things that can be done with a computer by a sufficiently skilled and suspicious person.
ReplyDeleteDo you know the American crime novels by Thomas Harris, starting with "Red Dragon," about a killer obsessed with Blake's image? I think Harris may have been familiar with Colin Wilson's "Glass Cage," in which a random killer leaves his victims under walls scrawled with verses from Blake. Something about that ecstatic gentleman fuels the minds of authors, at least of sinister fiction.
You are doing the same thing that Bulgakov does in MASTER AND MARGARITA by moving back and forth in time and place. It's an idea I've been trying to think about too, so I'm curious where you're going with it.
ReplyDeleteThe computer stuff freaks me out. Just the other day at work my boss mentioned that he likes to check previous drafts of emails that he receives. As if I knew such a thing was possible. It seems dreadfully unfair to me, like digging around in someone's heart.
Ha! I just read Sled's comment and I see that she shares my concerns. I'm horrified.
Back Track looks evil, Moore. Massimo is on a scary route: "The route of "the devil hath the power to assume a pleasing face."
ReplyDeleteYou gotta save the good Massimo. :)
Geraldine
Hmmm
ReplyDeleteGiorgio, like all Romans in Britannia long enough, seems to be , “going native”:
Overall we can hypothesise that we have a very large tanning industry of very late Roman date. I know of no similar parallels from elsewhere in Britain or indeed the western Roman Empire. On the programme we suggested that this tanning might be situated in the context of a sub/post-Roman power centre at the fort. Given our more refined dating evidence, I feel that we might instead be looking at large-scale Roman military processing , possibly a military factory of some kind. The army would have had a great demands for leather (for shoes, horse-harnesses and tents) and it might be that Binchester became a supply depot. Of course, we still have much more to do on site and our understanding of the situation will undoubtedly become more subtle and developed.
http://binchester.blogspot.com/
@Sledpress
ReplyDelete@Jenny
Massimo is not a rogue, he is a decent guy. Being obliged to become a computer geek, since, after his sports career collapsed he had to earn his bread he has two important reasons to hack Deirdre’s PC, an act he considers morally wrong: he wants to know who Deirdre really is, because he’s falling in love with her; he wants to protect his Maestro’s life.
Of course there’s a bit of autobiography here. But be happy. My computer knowledge is outdated. I couldn’t (and I wouldn’t anyway) enter you people’s PC :-)
Sled, I won’t get into the Blake’s stuff. I think I have other (confused) ideas.
Jenny, this tale should be based on the string theory that allows the existence of several universes, which complicates things a bit, unfortunately.
@Geraldine
ReplyDeleteMassimo has a good nature Geraldine. He’s not living the happiest period of his life: his wife left him, his soccer career is finished, strange things are happening. He will hopefully get over his 'inferno'. But in the meanwhile, yes, the devil has a pleasing face. This is why he will now probably pick up Sandra, or Carla, or Marta ecc. I still have to make up my mind about her name.
@Richard
ReplyDeleteThanks for the link Richard.
A sub/post-Roman military leather factory may be interesting for our story. I wonder if the centre survived until the sixth century, this being the period of our story, a very interesting one, sixth century Britain, and called by someone 'The age of Arthur':
http://www.heroicage.org/issues/1/haage.htm
Britain at that time was not officially Roman any more (Rome and its administration were officially gone) but it was not Anglo-Saxon either, since the Britons - still a bit Romanized with the upper classes speaking both Latin and Brittonic - controlled much of the country.
So a military factory of such large size – in case it survived until so late - may have been useful since the Britons had to defend themselves against the Scots and the Picts from the North, the Germanic people from the east, and the Irish raiders from the West, as far as I understood.
"Of course there’s a bit of autobiography here. But be happy. My computer knowledge is outdated. I couldn’t (and I wouldn’t anyway) enter you people’s PC :-)"
ReplyDeleteHahahahaha. But the question is: would you tell us that even if your computer knowledge was not outdated? I mean, you could hardly say that a) it is still possible for you to do it and b) that you ARE doing it!
:-D
I'm intrigued as to where this story is going, for sure.
@Andy
ReplyDeleteDespite the stories I write, I'm a good man Andy ;-)
Part of my IT work was that of teaching clients how to ‘harden’ their networks and servers in order to resist attacks.
What is more worrying now is that, almost anybody who owns a copy of the outstanding book 'Hacking Exposed' by Stuart McClure, Joel Scambray and George Kurtz becomes capable (without being a programmer) of penetrating or damaging the majority of networks (or just PCs) since they are all very badly protected.
One good habit is that of having all the latest updates and patches installed in our OSs (Operating systems).
PS
ReplyDeleteOSs but also software like browsers, office products etc. should always be updated.
'Hacking Exposed' was the best text on hacking 5 or more years ago. Today there might be better ones, I have no idea.
Roma,
ReplyDeleteFor a thorough exploration of all of my thoughts and fears about computer hacking, please see a document entitled Sept152011, in a folder called "diary" on my computer. ;)
Ayant une paranoïa aigu, et après avoir lu cette entrée de blog, je vais revenir au papier et plume d'oie.
ReplyDelete@Jenny
ReplyDeleteI don’t know why the role of the woman, from Eve onward, has always been that of the temptress.
@Philippe
ReplyDeleteLe papier et le stylo pourraient résoudre tous les problèmes de PC hacking. Toutefois, l'espionnage existait même à cette époque là.
In any case, true, today chaque imbécile peut nous donner des problème avec nos ordinateurs. That’s why we have to constantly patch our systems, a great bore. I most of the time use Linux, a much more robust system, easier to update and totally free. The Macintosh is also better than Windows, but it is expensive and not as secure as Linux.