Open Source Writing|
Experimental Prototype X1.06
The Wife Disposal Service by Peter
Section 8 | Back
"Good night sir." James looked up to see Suzi, his secretary, getting ready to leave along with the rest of the staff.
"Good night" said James pretending to work. When everyone had left the building, James un-wrapped the package. Inside was a laptop, a black mobile phone, an assortment of items and some instructions. He read the instructions. The phone had one contact number in the address book and the laptop needed to be put out of sight but in-range of the WiFi in his house. The laptop, when switched-on, would take him through a simple setup sequence. At the end were instructions on how to dispose of the phone and the laptop when the deed was done.
"Ready when you are, sir." said his chauffeur.
James packed his things including the new laptop and phone into his brief case and followed his chauffeur to the car. When James got home, he checked to see if Sarah was home, she wasn't, so he set to work. He found a dark, dirty place in the cellar and put the laptop down on an old box. His wife was scared shitless of spiders so she would never go down there.
He plugged it in and switched on. He then saw the weirdest boot sequence ever ... "BTX Loader V1.02 ... FreeBSD 9.2 (Die Hard Edition) ... " a load of gibberish scrolled up the screen and then cleared. "Please select WiFi access point" appeared on the screen followed by a list. James looked down the list, recognised "BTHub4-TZH7" as his WiFi. He moved the mouse pointer over it and clicked. The laptop responded with "Please enter password"
"Fuck !!" said James and ran up the stairs to find the WiFi password straight into a very startled Sarah.
"OH SHIT !! you scared the living crap out of me, what the hell are you doing down there ??" asked Sarah.
"I ... um ... thought I heard something." lied James.
"Well, I hope you didn't find anything, OK I'm off to my class, see you later." lied Sarah as she got her bag and left.
James found the router's WiFi password printed on the back, wrote it on a scrap of paper and went back to the laptop. He entered the password, pressed return and watched the screen.
"Obtaining IP address ... Connected .... Testing Internet connection ... OK, connecting to remote server ... OK, Establishing man-in-the-middle network bridge ... OK ... System Active. Press Delete three times to wipe hard drive and kill system.".
James was fascinated but had other things to do, so he covered the laptop with an old bit of cloth and walked back up the stairs.
Thousands of miles away, a compromised web server in South Africa acknowledged the first transmission from the laptop and went back to it's normal task of serving out web pages containing boring corporate bullshit to anyone who wanted to read it.
Back in London a man read a text message: "Client 31 has activated system" and said to the man next to him "James has activated the laptop. When the divorce probability reaches 90% contact him on the special phone and send him all the wife's email and text conversations. If he wants to dispose of her, tell him the cost, method of payment and get as much info as possible about his wife so we can tailor the hit to be as statistically insignificant to the police as possible." The second man nodded.
Thread-ID: 27, Next Threads: 28
Next Section 9