- Home
- Sue Bursztynski
It's True! Your Cat Could Be a Spy Page 5
It's True! Your Cat Could Be a Spy Read online
Page 5
Intelligence official.
The man in the grey suit read from his files.
‘Dusko Popov is a Yugoslav businessman,’ he
said. ‘He likes wine and women and fast cars.
The Germans wanted him to be a spy
for them. He accepted. Then
he came to us and offered to be
a double agent. He could bring in a lot
of valuable information.’
‘Then let’s accept his offer,’ said the
official, whose name was Ian Fleming.
After the war, Fleming wrote a series of thrilling
adventures about a secret agent named James
Bond, which later became hugely successful films.
It’s possible that James Bond was inspired by the
agent Dusko Popov. Popov was very good at spying
and information-gathering. It’s a pity the Americans
66
didn’t listen to his warning that the Japanese were
planning to bomb Pearl Harbor in Hawaii, where there
were many US warships and planes. The course of
World War II would have been very different if the US
Pacific Fleet hadn’t been attacked on 7 December 1941.
Immediately after the attack the US, which had been
neutral, decided to join the Allies in the war against
Japan and Germany.
8
CYBER-SPYING
The heads of spy agencies around the world must
have been thrilled when computers were invented.
For centuries, they’d had to get their information the
hard way – by getting people to break in, pay bribes
and copy secret documents or smuggle them out.
Now with computers, and computer networks, they
could . . . well . . . get people to burgle, bribe and make copies. But the spies didn’t
have to leave home to do it.
No more running the risk
of being taken prisoner or
being forced to say
who’d sent them.
68
All they needed now was a computer, a phone line
and a lot of talent. The age of the computer hacker
had arrived.
SO, WHAT DOES A HACKER DO?
Think of a hacker as a
sort of burglar who sits
at home, breaks into
other people’s
computers,
and helps
himself to
information. If the computers have
been networked (linked together), the hacker can poke
around in all the computers in the network, or even
sabotage the system. Hackers can also use viruses to
infiltrate networks all over the world.
Most hackers are computer nerds who like to show
off their skills. Sometimes they are just thieves, out to steal money from bank accounts, or to steal secrets for
a competing business. And then there are the spies . . .
69
THE ‘HANOVER HACKER’
In 1986, Clifford Stoll had a job programming
computers at a university laboratory in Berkeley,
California. In those days the Internet existed, but only a few people used it for business. Personal computers
were not as common as they are now, but universities,
governments and businesses were starting to use
networks. Computer users had passwords, but didn’t
yet understand how important it was to be careful
with them.
One day, Cliff was asked to fix a small problem.
The lab kept track of how much time and money was
spent on computer use. Each time someone logged into
the network, the cost was registered by an accounting
70
program. A bill was 75 cents more than it should have
been. Cliff expected to fix the problem very quickly.
Then he realised there was something strange
about this ‘mistake’. He tracked the 75 cents to a user
whose log-in name was ‘Hunter’, but ‘Hunter’ wasn’t
on the lab’s official list. Checking further, he found
that ‘Hunter’ had been using the log-in account of a
worker who was overseas and hadn’t used the account
in a year. The intruder had used the account to give
himself ‘system manager’ privileges, which meant he
could not only look around the computer network
for information, but could
make changes.
‘Hunter’ was definitely a
hacker at work.
TRACK THE
HACKER
For months, Cliff Stoll made a note of every ‘visit’.
He printed out everything the hacker typed into
the network, and even set his pocket pager to beep
71
whenever the hacker was on-line. The hacker turned
up at all sorts of strange times, so sometimes Cliff
slept under his desk at the lab, much to his girlfriend’s annoyance!
It would have been easy for Cliff to block the
network against the intruder, but Cliff wasn’t satisfied with that. If the hacker was blocked at the Berkeley lab, he’d find another entry point to the network, and then
nobody would be able to track him. Cliff also knew
that the hacker was using the Berkeley computers to
get into other networks, including medical computers.
72
He could mess up records, and sick people’s lives might be at risk if he wasn’t stopped.
When he found out that the hacker was after
military secrets, Cliff warned the FBI and CIA,
America’s two intelligence agencies. But neither was
very alarmed. If no money was involved (except the
75 cents) and no actual damage had been done, then
they didn’t see it as their problem. Even the police
weren’t interested.
Eventually, with help from other computer experts,
Cliff discovered that the phone calls connecting the
hacker to the computer networks were coming from
outside the US, from Hanover in West Germany.
Now the CIA and FBI were interested. But they insisted on doing their own investigations and wouldn’t tell
Cliff what was happening.
Frustrated, Cliff continued on his own. Then his
girlfriend, Martha, had a great idea: since the hacker
wanted military secrets, why not give him false ones?
They set up a phoney military program called SDINET
and invented a secretary who sent and received letters
and documents with tempting military names for the
73
program. The ‘secretary’ invited official users to write to her and ask for copies.
Only a system manager could access SDINET, but
ordinary system managers wouldn’t be interested in
military secrets. If anyone wrote, it would have to be the hacker. Cliff and Martha waited . . . would their
trap work?
Someone did reply! But the letter for documents
came from an American address, not from Germany.
Cliff contacted the CIA once more and got results.
Caught!
The hacker turned out to be a man called Markus
Hess, one of a group who had been selling their stolen
secrets to the KGB (the spy agency
of the Soviet Union). The KGB
had asked a man working for
them in the US to send the letter,
to make sure if SDINET was real.
Markus and his hacker mates
w
ere sentenced to two years
in prison, and Cliff wrote a
best-selling book about it all.
74
This happened in the days when hackers and viruses
were rare. Now the Internet is used all around the
world. We often hear about a new virus, or someone
caught hacking into banking or military networks
across the world. And spy hackers are probably out
there snooping for secrets . . . The Internet has become a hacker heaven.
75
9
SHORT NINJA,
TALL TALES
Silent, mysterious, fast-moving figures
in black . . . leaping over rooftops and
running up walls, a sword at your throat in
an instant . . . They disappear into the shadows
unnoticed and overhear whispered secrets.
They are the ninja – warriors, spies and assassins of
Japan. Today, ninja arts (ninjutsu) are practised
by people who certainly don’t lurk in the
shadows, kill or spy on enemies. ‘Ninja’
comes from Japanese words shinobi-no-mono,
meaning ‘a person who hides his presence’.
76
Extraordinary stories were told about the ninja.
People thought they had supernatural powers, but they
were just very, very good at what they did. The ninja
probably encouraged the stories to make
their enemies more afraid.
In one story, a dwarf ninja
supposedly hid in the pit under an
enemy lord’s toilet and stabbed him
when he went to relieve himself!
Probably the lord died of a stroke,
but it’s easy to see how a
story like this would spread.
And it’s only one of many tall
tales about what these skilled
fighters and spies could do.
Japanese warriors, the samurai, had a strict code
of honour. Honour was challenging your enemy and
fighting man-to-man in the open. Ninja behaviour
was the opposite. Ninja used ambushes and surprise
attacks, and often travelled in disguise. No wonder
the samurai thought ninja dishonourable. They were
tortured to death if they were caught.
77
Some Japanese warlords trained their own people as
spies. Others hired ninja. After all, ninja were experts.
If you were trapped in a fortress with enemies outside,
you’d be glad to have ninja warriors with you, because
they could escape. There’s a story of one besieged
castle, and in the night a ninja slipped out into the
enemy camp, stole their flag, then flew it from the
castle the next day to mock them.
STRAW DUMMIES AND
NIGHTINGALE FLOORS
Ninjutsu was a family thing.
Young ninja would be trained
from childhood in the
different techniques of fighting,
running, hiding,
swimming and so on. They spent
a lifetime perfecting their skills.
No wonder the lords of
warring clans took so much
trouble to protect themselves!
78
In their castles they had traps, including squeaky
floors called nightingale floors because they ‘sang’
when someone stepped on them. The night guards
would be on the scene immediately if they had
unwelcome company.
Ninja were expert at disguise and did their
homework. A ninja dressed as a farmer or priest would
certainly know about farming or the priesthood, so
his disguise would be convincing. He’d also be able to
speak in different local accents to fool ferrymen when
crossing rivers. Some ninja lived and worked inside
an enemy fortress, but they were really ‘sleeper agents’
who were called on when needed.
79
Ninja history goes back a long way. In the 1400s,
there were around 70 ninja clans on the main Japanese
island, Honshu. Ninja specialised in espionage.
Their leaders were called jonin. The ‘middle men’ who arranged jobs with the lords were called the chunin.
The fighters were known as the genin. They did the spying and fighting, and often didn’t know who their
boss was.
Some ninja clans worked for just one noble family.
The most famous ninja leader, Fuma Kotaro Nobuyuki,
served a family called the Hojo, as his ancestors had.
He led about 200 ninja who fought, spied and gathered
information for the Hojo. Fuma Kotaro Nobuyuki’s
most famous action was a night attack on enemy
forces, the Takeda. He had his men fake an attack, using horses with straw dummies as warriors. Meanwhile,
the ninja smuggled themselves into the enemy camp,
hiding along the sides of stolen Takeda horses. Then
they attacked. In the darkness and confusion, the
Takeda were killing each other instead of the Fuma.
This was the ninja way of doing things. Not
‘honourable’, but intelligent!
80
NINJA FACTS AND FICTION
Some people say the ninja
* wear black costumes
* throw star-shaped metal knives
* can walk through walls or ‘shape-shift’
* can become invisible
* can fly
* come back as ghosts.
Are these things true?
Well, there is a ninja uniform, trousers and hood in black, brown or dark blue, to help hide at night (or
white in snowy weather), but they didn’t wear it while
they were spying. Imagine a spy walking into an enemy
stronghold in uniform! Mostly, ninja wore whatever
was useful, including chain mail when they fought.
81
The star-knives,
shuriken, were used to
help ninja escape when
they were being chased.
They weren’t always
accurate, but were
useful to scare and delay the
pursuer. Ninja carried other
weapons to use in fights, such as
knives and swords.
They couldn’t walk through
walls, of course. In Japanese
houses, which had lots
of gaps and crawl-spaces,
someone who knows the art of movement, and how
to blend in with the landscape, can seem invisible.
They couldn’t fly, either, but they were great acrobats.
One ninja is supposed to have faked
his own death so he could pretend to
be a ghost. If people believe
you’re superhuman, they
might well believe you’re a ghost too!
82
Jiro’s justice!
There’s a story about Jiro, a young boy whose ninja
father was killed by the Lord of Kuwana. Jiro was
determined to avenge his father’s death. First he made
friends with the lord’s son and went inside the house.
One day, Jiro hid in an old well and the lord’s son
thought he’d gone home. That night, Jiro climbed into
the roof and drilled a hole into the
ceiling above the Lord of Kuwana.
He lowered a silken thread through
the hole, and he dripped poison
down the thread – right
into the snoring mouth
of
the lord! He went
home, leaving Kuwana
to die.
Kings, queens and emperors have always had spies.
Today governments have intelligence agencies and big
businesses steal information from each other. As long
as people have secrets, there will be spies . . .
83
S U E B U R S Z T Y N S K I saw her first spy
movie when she was eight. There was a family
rumour that her cousin had worked for military
intelligence, but Sue didn’t follow in his footsteps.
Instead she writes books about monsters,
astronauts, archaeology, women scientists,
wheels, and fiction books too. She works in a
school library and might be spotted at science
fiction conventions. Sue doesn’t have a cat.
M I t c h V a n e Code-nAMe: The Squid,
becAuse of her use of black ink in many of her
illustrations. Specialises in identikit Pictures,
forgerY, and secret codes.
84
THANKS
I would like to thank Nikki White for advice on ninja, Bart Rutherford O’Connor for help on hackers, Anne Watling for checking the text, Gary Pearl, Joanne Davis, Fiona Ellem and the students of Gandel Besen House, Dandenong West Primary School and Charleville State School.
Sue Bursztynski
The publishers would like to thank the following for
photographs used through the book:
istockphoto.com and photographers: Stefan Klein (torn paper, photo frames and folder used throughout text), pages viii, 37 Edyta Pawlowska (magnifying glass), pages i, 51 James Hernandez (paw prints), page viii Sue Colvil (Roman soldier), page 5 Maartje van Caspel (notebook computer), page 20 Dan Brandenburg (soldiers), page 28 Greg Nicholas (negative strip), page 34 George Cairns (meeting place), page 40 Clayton Hansen (dynamite), page 40 Kelly Resener (rat), page 57 Duncan Walker (mysterious man), pages 40, 74 Greg Nicholas (photo frame), page 74 Sean Locke (handcuffed man), page 82 José Manuel Ferrão (ninja), page 82 Slavolijub Pantelic (shuriken), page 83
Bryce Knoll (notepaper), page 86 Gergely Bényi (binoculars); the Library of Congress, Prints and Photographs Division for photographs on: page 16 Harriet Tubman [LC-USZ62-7816],
page 23 Belle Boyd [LC-DIG-cwpbh-01991], page 28 Morse code operators [LC-USW3-035513-D], [LC-USW3-035512-D], page
36 World War II poster [LC-USZC4-2793]; and the National Security Agency, USA for the photographs on page 41 US seal, and page 48 the Enigma, the computer Bombe.