I wrote this as an entry to Bruce Schneier’s Seventh Movie-Plot Threat Contest. I guess that makes it a movie I will never write, then. But you never know, as I already have a bunch of outlines for a political thriller / hacker series. If that ever happens, this may get worked into something.
A plucky young hacker is hired by a freshman senator after he receives an encrypted blackmail message signed by his contact at a major campaign-contributing corporation. She doesn’t care about the politics, only her fee. He is being blackmailed for information that he thought was stored securely on his computer. He says she needs to be careful, and she shows him the stun gun in her purse.
She buys him a brand new laptop, and within hours she notices it sending out packets of information. The computer must have spyware that no vendor is catching. That night a scary man breaks into the senator’s office, steals something valuable and implants a tiny hardware device in the new laptop. She follows him out, but loses him outside near an NSA office.
She social engineers her way into the contact’s office at the corporation. While she is there, his computer receives an encrypted message from the senator with the subject “For the right price…” On her way out of the office she glimpses the scary man in a crowd.
Back with the senator, she learns not only that he didn’t send the email she saw, but that he received another threat email from the computer she was using- while she was using it.
Upon further research, she finds a lot of network traffic heading to and from the senator’s machine to the NSA office she saw before. Using a packet capturing device, she is able to discover that the NSA office is transferring huge amounts of data with the big NSA facility in Utah, but the data is all encrypted.
She breaks into the NSA office, and figures out what is going on. The NSA is using the senator as a honeypot against the corporation, and the corporation as a blackmailer against the senator. This is done automatically, and without human interaction. It knows what will work best, and it knows how to mimic everybody’s communication patterns, due to the ubiquitous data harvesting. It knows everyone’s encryption keys and sensitive data due to trojan spyware and hardware devices. It is not just the senator and the corporation being manipulated either. It is thousands of people, maybe millions – anyone with power or money. Before she collects hard evidence or installs a backdoor, the scary man shows up and almost kills her.
She reports to the senator, who is obviously conflicted over something. He fires her and pleads with her to stay away. She argues with him, having decided the money isn’t important after all. As she leaves the senator’s office the scary man attacks her. She manages to stun him, then grab the gun he drops. She shoots him as he charges. She steals his NSA ID and uses it to enter the NSA office, where she uses mad hacking skills to destroy the automatic people-controlling system.
Two weeks later, she is approached by another politician saying he’s received an encrypted blackmail message signed by his contact at a major labor union.