Wired (Wired, #1)
Rate it:
Open Preview
1%
Flag icon
“What is good? All that heightens the feeling of power in man, the will to power, power itself. What is bad? All that is born of weakness. What is happiness? The feeling that power is growing, that resistance is overcome.”   —Friedrich Nietzsche, Philosopher (1844-1900)
5%
Flag icon
You may be unmatched as a warrior, but nothing will ever change the fact that you have the soul of a scholar.”
5%
Flag icon
Just because you were good at something didn’t mean it was a match with your personality or psyche.
6%
Flag icon
Kira Miller is even more of a genius than her record would suggest,” he said. “Especially when it comes to gene therapy.
7%
Flag icon
And Kira Miller’s file was the only one he kept at home. There were no other records ever located that made any mention of her at all—other than the ones she took, of course.”
8%
Flag icon
Desh knew signs of sociopathy were usually present from a very young age if anyone was looking in the right direction. If Kira Miller could torch her brother in cold blood, she wouldn't likely be squeamish about killing her parents either.
8%
Flag icon
“Working with Jihadists is an interesting choice for a Western woman, even for a sociopath. These groups aren't exactly known for being progressive when it comes to a woman’s place in society.”
9%
Flag icon
Someone as talented as Kira Miller can engineer these to her specifications. Like a Trojan Horse virus that infects your computer. It lies dormant until whatever predetermined time the asshole who invented it has specified. Then it emerges and demolishes your files.”
9%
Flag icon
Humanity seemed to have a singular ability to find destructive uses for any constructive technology.
9%
Flag icon
Humanity never failed to find a way to become its own worst enemy.
10%
Flag icon
The most ordered societies would degenerate into chaos and devastation almost overnight.”
11%
Flag icon
“I’ll give it my best,” he added with a sigh. “That’s all I can do.”
11%
Flag icon
failure, you’re the biggest bargain the government has ever had.”
12%
Flag icon
most men would find her brilliance intimidating.
12%
Flag icon
airtight evidence gathered against her for the murders of Lusetti and her brother, and the Ebola gene therapy plot.
12%
Flag icon
Only someone extremely careful and extremely clever could possibly elude a government-sponsored manhunt for this long.
12%
Flag icon
So how to catch someone smarter than yourself?
12%
Flag icon
You counted on her doing everything exactly right. This was the answer.
12%
Flag icon
assuming she was still in the States, hiding in plain sight.
12%
Flag icon
especially given her need to tap into an ocean of biotechnology literature as her research progressed.
14%
Flag icon
HACKER-CRATIC OATH I swear to use my awesome powers for good, not evil.
14%
Flag icon
hacker-cratic oath quite seriously, and would only work with someone if he had assurances their intentions were honorable.
14%
Flag icon
integrity,” he continued, “but betraying my trust would be a very, very bad idea
14%
Flag icon
“Not unless you're prepared to engage in a little social engineering.”
14%
Flag icon
Man cannot hack using computers alone. The best hackers are also the most proficient at milking information from humans—the system’s weakest links.”
15%
Flag icon
“Human Brain Mapping.
15%
Flag icon
Journal of Cognitive Neuroscience.
15%
Flag icon
Journal of Applied Gerontology.
15%
Flag icon
Once you've laid out your bone fides, people will tell you just about anything.”
15%
Flag icon
Chances are, this will be Kira Miller.”
16%
Flag icon
Would you anticipate they’d try to track you through your online journal subscriptions like we just did?”
16%
Flag icon
“Because the only way to buy an online subscription is by using a credit card.”
16%
Flag icon
“Okay. Suppose she did steal the subscriptions. Could you track such a theft?”
16%
Flag icon
discount subscribers, shall we say, that they don’t know about.
16%
Flag icon
“Two of the journals were being siphoned to the same e-mail address as of about ten months ago. No other stolen subscriptions among the three journals had the same signature.”
17%
Flag icon
If I were her, I’d trace the ping back to us.”
17%
Flag icon
I also want you to plant a tracer, so if she does invade my computer, it can latch on and follow the breadcrumb trail back to her.”
17%
Flag icon
She got through your firewall and invaded your computer. And she downloaded everything she needs.”
17%
Flag icon
There was a leak in USASOC—wide enough to steer a supertanker through.
17%
Flag icon
If Griffin had not been placing sophisticated tracking software on his computer, Desh would never have known it had been compromised.
18%
Flag icon
He wanted to lead her to his computer and plant false information: now he had the perfect conduit for this, one that was above suspicion.
18%
Flag icon
Westerners were still blissfully unaware that the future of progressive society was anything but assured.
18%
Flag icon
The answer: no life at all. He had refused to even consider it.
18%
Flag icon
He needed to know the full extent of the data to which Kira Miller now had access.
18%
Flag icon
bring a slightly different perspective to the material and would glean fresh insights.
18%
Flag icon
key discovery 4u. visit me asap. don't call. computers, walls, phones: all might have ears.
19%
Flag icon
hyper-alert, just as a woman emerged from behind the door with a gun aimed at his chest.
19%
Flag icon
Instead of bullets, two electrode darts had leapt from her gun and stuck like Velcro to Desh’s pants, discharging their massive electric payload in an instant.
20%
Flag icon
human nature to feel more vulnerable when naked, and he was no exception.
20%
Flag icon
realized it was dangerous to make any assumptions about her actions or motives.
« Prev 1 3 6