(Note: FSCK= File System ChecK)
Chapter 7. FSCK
He crawled through the large-diameter air shaft to find the data center, the mainframe computer needed tons of chilled air, ventilation for such a system was large and fed the massive amount of air into the heat-producing rows of circuits and drives to the isolated room.
It was easier to find in real-life than on the blueprints.
Turning his back to the blinking light that indicated the vent for dispatch, Radio Check nodded at the position of the computer center. The information tech department chose to place the data and internet nerve center directly across from the demands of its internet access, the computer-aided dispatch and radio systems. Residing behind two-sets of locked doors, blueprints failed to show the contents of the room.
Using the small fiber-optic camera, he could only see a series of rate of rise heat detectors, two smoke detectors but no video camera. Nodding, he backed the fiber-optic cable out, placing a yellow flashing light on the inside of the air-return chamber. Unseen from the outside, they served only show the correct vent for him.
Pushing on the spring-loaded vent cover, it swung down and stopped on friction-braked hinges without a noise. Carefully, he positioned the big musket across the hole and pulled a hook from the winch disguised as a cap made from a furry animal and hooked it to the trigger-guard of the firearm.
He double checked the tablet computer he pulled from in his pocket and checked the universal USB-cable adapter. He lowered himself with his foot in the cap to control his descent to the floor, and looked around before flipping his leather mask up for better vision and, as observed by the little flex-camera he used, no video cameras were in the small room.
With a skilled eye, he followed a cable that fed from the ceiling to the back of a cabinet where he pressed an old style, round RCA adapter into a port in the back of the console and pressed a button on his headset, he smiled at the sound of a radio working perfectly.
“Radio service, radio check.”
“Five by five, outer limits.”
This tickled his sense of humor, ”Outer Limits” referred to an old tv show that started with a famous line to those who were fans.
“We are controlling transmission.”
The smiling fan of Outer Limits knelt down and plugged in his small data cable to a USB port on the tablet and the opposite end into the console. After a moment an icon turned green in the upper right corner of his display and indicated that he had gained access to a low-level, unprotected file and with a single command “FSCK” caused a reboot of the core system.
Thirty seconds later, the system reboot was complete, with him in control. Using VOIP he connected to another computer that was now logged into a wi-fi signal identified as “Sheriff Backbone WIFI”. The tablet spoofed the MAC address of a local squad car that the team sniffed out when it drove by a city park one evening on mundane duties.
“Voice check main core.”
“Copy five by five. Outer limits. We are in control of your set.”
“Engaged, system logs will self-destruct in five-minutes.” The clipped, professional voice answered. “All conversation now will be over intranet in-house. We have control of all video and radio transmission. Radio Check, you are the invisible man.”
Radio Check unplugged from the mainframe, he calmly walked over to the door and slowly opened it, blocking the lock with a UPC bar code from a box of Cap’n Crunch cereal purchased at a mom and pop shop that never installed video cameras, with cash, the year before. Then with care, he looked out.
Doors were open and the sounds were of emergency traffic. They were all focused on the barricaded person in the main floor men’s room.