Novels2Search
White Hat Black Heart
Chapter 88: Queue Manipulation

Chapter 88: Queue Manipulation

Now that Gregor had the background information he needed, it was almost time for execution. Gregor smiled as he manipulated additional Collective Systems databases. Nigel was going to be busy for quite a while.

Gregor launched some custom-made programs to interrogate the database that Viktor and his crew used to schedule fieldwork. They attacked the database administrator’s account directly, which gave him full access to the database and everything within. He was able to get past the preliminary database security but encountered an encrypted block that required special handling.

Gregor knew of two people that had access to such privileged information as passwords. Alexei would ask too many questions, but it might be possible to talk Viktor into providing access.

Viktor’s phone rang.

“Da?”

“Viktor, I’m running maintenance on the field database and need access to it to clean everything up.”

If you encounter this tale on Amazon, note that it's taken without the author's consent. Report it.

“What do you want me to do about it?”

“Alexei is unreachable, and I need an access password.”

“You need my password?”

“Da. I have the database ready.”

“Why do you need my password? Why can’t you just log in?” Viktor demanded.

Fair question, Gregor thought.

“My backend access isn’t working, and I need to get this maintenance done. There are vulnerabilities on this system. You wouldn't want it to get hacked by outsiders.”

“I need to work today. I’m preparing group assignments.”

“If you give me your password, I can fix the problems and have you back in within the hour.”

“CrazyCats75,” Viktor said abruptly. “Capital Cs.”

“Is that your password?”

“Da.”

Too easy.

With Viktor’s password, Gregor was able to unlock the hidden tables. After looking through several pages of field assignments, Gregor noticed a tab labeled “Pending,” inside which was a list of names. Gregor didn’t know for sure, but he hoped it was a list of targets. Next to each name was lists of known associates and places. Gregor added Nigel Watson’s information at the very top of the list, then saved his work.

He notified Viktor that the database was accessible again, then attempted to obfuscate as much about his access as possible.