The Digital Dream Read online

Page 12


  >>>>> ..3..

  CHICAGO POLICE DEPARTMENT

  INCIDENT REPORT LOGGING SYSTEM

  YOU DO NOT HAVE ACCESS PRIVILEGES TO THAT PART OF THE SYSTEM.

  PRESS ENTER TO CONTINUE.

  “Oh shit. Come on.” The smile disappears in a scowl of surprise and disappointment. “Don’t freeze up on me now, you bastard.” He tries entering the 3 again. The result is the same.

  He’s been locked out. However it was that he’d been able to get access to that part of the system before, it is no longer working. Maybe someone has discovered the leak. He wonders if he should disconnect quickly and change his network address, before it can be traced back to him. Maybe.

  But he hates to give up. Before his sickness, Predator was not known for giving up. Last year, it had been his late baskets that had seen his team through to the county college finals when, with five minutes left, it had looked like they were history. Predator doesn’t believe in letting go.

  Five minutes. Give ‘em hell. Predator peers at the screen while his hands feel their own way over the keys. 1... 2... 3... 4... 5... After the numbers have all failed to produce any result, he tries letters. Q... W... E... R... T... Still nothing.

  Special characters. !... @... #...

  When the screen flickers, he’s been entering characters so automatically that he has no idea which one worked. He looks down at the keyboard. His finger is resting on the * key. He looks up at the new message on the screen.

  INTERNAL POLICE RECORDS SYSTEMS.

  There is a series of choices under the heading. They are all new to Predator and don’t seem to make a lot of sense. At the bottom of the display is a warning:

  INFORMATION CONTAINED HERE IS RATED CONFIDENTIAL

  A7 CLEARANCE IS REQUIRED FOR ANY RELEASE

  “A7 clearance.” Predator whispers, as though there is someone outside his bedroom door who could be listening at the keyhole. God alone knows what it means but it sounds heavy.

  He leans back and forces himself to think, his fingers drumming idly on the spokes of his wheelchair. His curiosity is tempered by caution. Before his illness the computer system had been a toy, a plaything he had used for entertainment on those odd rainy nights when he had no date or no friends to meet. He’d thought it was kinda nerdy, actually. Looked down at the sort of spotty spectacled freaks who hung out in the computer lab at school. He only got the system because his adoring parents had wanted to reward him after he had been selected for the High School football team. Kiddy stuff, he figured, but with a chance to impress the scouts from the University of Illinois he’d heard were interested in him. Scholarships beckoning...

  It’s ironic, he supposes, that, after the illness took away the use of his legs—and any prospect of sporting triumphs for a long time, if ever—he found solace in the computer. For a time, it was some of the more violent games—Nazi Death Camp, Hunt for the Alien Bodysnatchers, Raid Over Hanoi—that had held him. He is an intelligent boy and recognizes that the vicarious violence is a substitute for the real pain he’d like to inflict. Mindless revenge on someone, while his only connection to the sport he loves is now the posters on the wall and the sideline place on Saturday afternoons.

  Now he is a computer sportsman.

  He was introduced to the wonders of networking by one of the schoolmates who came round to his house after the news got round, all tongue-tied and awkward, not knowing what to say to him or his parents. The boy was a nerd. Logon UNDERDOGG. He’d thought it was funny at the time. But the Dogg was cooler than expected, had shown him how to connect up the modem, how to dial other users and get into the Internet and the bulletin boards. How to go about hacking into other computer systems where the security defenses were a challenge to young minds that made Alien Bodysnatchers look like something out of kindergarten. Yeah, the Dogg had been unexpectedly cool.

  He has become addicted. Irrespective of debts of honor, he knows he cannot stop. Caution just ain’t in it. He hits ENTER.

  DO YOU WANT TO ACCESS AN INDIVIDUAL RECORD?

  ENTER (Y=YES/N=NO) ......

  Predator shrugs.

  >>>>> ..Y..

  Another menu.

  DISPLAYING LAST RECORD ACCESSED

  FRAUD SECTION

  SENSITIVE CASES

  POLITICAL CONNECTIONS

  SUBJECT: FRANCIS, GEORGE SIMON.

  Predator has never been much interested in politics and it is a few seconds before the name registers.

  3

  CLOSED USER GROUP (CUG#7) e-MAIL

  FROM: CALIBAN

  TO: LEVIATHAN

  I have your report. P6. Para 2. Explain to me about this reaction.

  FROM: LEVIATHAN

  TO: CALIBAN

  Your requirement was for an intelligent system. It was designed to store information and learn from its experiences. It uses its knowledge base to make decisions when it’s confronted by a problem. It is capable of initiative. Or, at least, what we would regard as initiative.

  This is an immensely complex program. It is impossible to predict every possible combination of events. There are potentially billions. We’ve been making such rapid progress recently that it’s been difficult to make sure that all the doors are closed properly.

  FROM: CALIBAN

  TO: LEVIATHAN

  > It is capable of initiative.

  In other words, it took you by surprise. You didn’t know what the fuck it was doing, did you?

  > This is an immensely complex program.

  I know it is complex. Don’t patronize me, Doctor.

  > We’ve been making such rapid progress recently...

  And don’t make excuses. I don’t pay you to make mistakes.

  FROM: LEVIATHAN

  TO: CALIBAN

  I am sorry. Is there anything else in the report that requires further explanation?

  FROM: CALIBAN

  TO: LEVIATHAN

  IT ALL REQUIRES FURTHER FUCKING EXPLANATION.

  I DO NOT WANT GOBBLEDYGOOK TECHNICAL EXPLANATIONS OF GAME AND CHAOS THEORY. TELL ME WHAT REALLY HAPPENED.

  FROM: LEVIATHAN

  TO: CALIBAN

  At this stage in its development, we have had to set the system loose, in a manner of speaking. This means that it is out on the network. It is self-replicating, as I explained in the report. In theory, it could be in a million places at once. And we think it hit a million to one chance. The system encountered a virus. A crude thing, but it was operating at a level that was compatible with that of our system. It was as though the two programs were resonating at the same level and the virus became embedded in the program. The first time it happened, the program simply took what it thought was defensive action. It was acting within its parameters. It worked correctly. It’s just that the parameters we gave it were slightly too wide.

  FROM: CALIBAN

  TO: LEVIATHAN

  And that stupid boy could become aware of it.

  FROM: LEVIATHAN

  TO: CALIBAN

  We do not believe that he actually realized what he was communicating with.

  FROM: CALIBAN

  TO: LEVIATHAN

  I still want to know why we didn’t hear about the problem at the time and why this thing of yours went off and took action without us being aware of it.

  FROM: LEVIATHAN

  TO: CALIBAN

  I have no explanation. I repeat. I apologize.

  FROM: CALIBAN

  TO: LEVIATHAN

  I want to know the MOMENT anything else happens. NO MORE SURPRISES!

  4

  When I finally get to the Amalgamated office, I find Kathleen crouched over the borrowed terminal. She looks up as I enter: momentarily, stupidly, I’m lost in her presence and the appeal of her large brown eyes.

  “Well, I’m back into the network...” If she’s aware of the effect that she has on me she gives no sign of it. I play it cool and hope that my efforts to hide it are successful. She turns back to the screen as I sit down beside her.

&n
bsp; “Look.” The screen logo shows a large slanting B and, at the bottom of the screen, the words

  Blackdawn Importing INC: Press ENTER to continue.

  Kathleen stabs at the key and another menu appears.

  “I told you at the weekend that I could detect other computers. I’d guess that some of them aren’t even in the States. I thought I might have a try at listing them. Just so that we know what we’re dealing with.”

  I rub the old-broken nose. “All right, but be careful. We’re skating on the edge of the law here. If someone detected us...”

  Kathleen nods. “I can’t put my finger on it but I still get the idea that there’s another trace program running. A couple of times I’ve had the feeling that someone’s watching me.” She shakes her head, sending the thick reddish-brown hair tumbling. “Maybe it’s just my imagination.”

  I frown. “You’ve got nothing specific?”

  “Not really. Although there was a time-out a while back after I entered my access code. Well, I say my code... Actually, the code I’m using belongs to Gabriel. He’s the guy from Amalgamated who normally uses this workstation. Anyway, the code acceptance is usually instantaneous but this time there was a break of about thirty seconds. I thought I’d got a problem with the security system but it came back okay.”

  I look around the tiny office. Another small handbill has appeared next to one of the posters. It advertises a gay men’s and lesbian’s ball in a local club. Looking around, I see that a man’s overcoat is hung on the back of the door and a battered travel bag has been thrown carelessly down beside a chair.

  “Gabriel, huh? No problems with using his room?”

  “No problems.” Kathleen seems surprised and then sees me glance at the overcoat. “Oh, he doesn’t mind me being here. He’s spending most of his time out of the office anyway on this course they’ve got him doing. He just pops in now and again.”

  Her eyes return the screen. “He’s a nice boy anyway.”

  I smile. “I’m pleased to hear it. Look, I have to get back to the firm. Why don’t you call in late afternoon and let me know how you’re going on?”

  Kathleen’s attention remains on the terminal. She waves an acknowledgment as I leave. I guess she’ll wait until I’m clear before she breaks down and sobs with heartbreak at my departure.

  5

  CLOSED USER GROUP (CUG#7) e-MAIL

  FROM: LEVIATHAN

  TO: CALIBAN

  > I want to know the MOMENT anything else happens.

  We have some more information. We can confirm that whoever was able to trace the hackers through the system used a modified form of the original virus.

  FROM: CALIBAN

  TO: LEVIATHAN

  > Whoever was able to trace the hackers through the system used a modified form of the original virus.

  Does that mean that this person wrote it originally? My understanding was that it started with the boy.

  FROM: LEVIATHAN

  TO: CALIBAN

  > My understanding was that it started with the boy

  We still believe that to be so. Our view is that someone else found it and changed it. We now understand the access routes and how it worked at a technical level. We intend to close down all the routes into the system.

  FROM: CALIBAN

  TO: LEVIATHAN

  So the loop will now be closed?

  I want that done. And I want to know the origins of this latest breach of the program’s security, Doctor. I want to know who the bastard is.

  FROM: LEVIATHAN

  TO: CALIBAN

  We are already working on that, Sir. I’m sure that the program will be able to obtain for us the location of the terminal and the ID of the person using it.

  FROM: CALIBAN

  TO: LEVIATHAN

  Tell me when you’ve got it. Take no other action. I will decide what is to be done this time.

  6

  Late afternoon. McAllister strolls into the office. Lugubrious wink to the pretty receptionist. It must be windy outside: the big man’s hair is ruffled and his crumpled suit looks even more disheveled than usual, his shirt hanging sail-like over the loops of his belt where his stomach sags against it. He grunts a greeting and settles his huge frame into a chair facing me. The office suddenly seems much smaller. We spend a few futile minutes talking about the incident at Adobe Flats and its repercussions before moving on to the investigations that I’d requested. Mac retrieves a dog-eared notebook from his pocket and riffles through pages.

  “First this Blackdawn outfit. There ain’t a lot to say.” He pauses to scratch his stomach. Easy. Mac has a style all of his own and trying to hurry him is never a profitable exercise. “According to the official records, the company is wholly owned by this guy Robert O’Regan. But it ain’t trading. Never has, in fact. It’s just a shell.”

  I frown. Unused shell companies are not uncommon. People set them up for all sorts of reasons, generally connected with manipulation of tax laws. But such companies do not usually have expensive computer systems...

  “Next, Robert O’Regan himself. Seems he’s some kinda mystery man, which is strange, know what I mean, because, besides Blackdawn, he’s on the boards of five other corporations.” He produces another list and hands it to me. I check it out.

  “None of these names mean anything at all to me, Mac.”

  He grunts. “Me neither. But we ain’t dead yet. I got traces out on six other folk who are also listed as directors of these other corporations. And I’ve found out that Blackdawn and O’Regan both have bank accounts.” He waves another piece of paper. “I’m trying to find out more about them, too. That’s if you think we should go on.”

  “Right now, we go on—but only just. I had a talk with the boss earlier to explain why I still needed Kathleen. I didn’t say too much, only that we’d fixed the damage at the client’s site and were investigating the causes. I had to tell him something about the phantom network idea. He started talking about dropping the assignment.”

  “Why?”

  “Too dangerous, he says. If we got caught it could look as though we were the ones at fault. On top of which, the client won’t carry on paying for what we’re doing for much longer. I finally talked him into letting us go on for a few days, but we’re going to have to come up with something real quick.”

  “Well, I don’t expect to hear no more until tomorrow morning now.” McAllister sniffs and continues speculatively. “Might as well take time out for a quick beer.”

  I have to smile. When I first met McAllister, I was inclined to agree with people who described him as dry and humorless. It took time to figure out the deadly, sardonic sense of humor that lurks beneath the glum exterior. Now, I’m surprised to find I enjoy the big man’s company. Attraction of opposites, like I said before. Mac’s years as a detective on the tougher streets of a tough city have left him with an inexhaustible fund of stories, ranging from the scandalous to the ribald.

  While I’m considering whether I can desert the undiminished pile of paperwork on my desk, the phone rings. One of my old clients wants to know if I’ll be free to see them about a routine security audit later this month. I’m holding the phone under my chin and searching for my diary under a pile of paper when Kathleen returns. By the time the call is finished, the two of them have plotted a retreat to one of McAllister’s local haunts. It makes up my mind for me.

  7

  CLOSED USER GROUP (CUG#7) e-MAIL

  FROM: LEVIATHAN

  TO: CALIBAN

  REF: See attached WP file RMREP046.DOC.

  We are sure that this is the extent of the problem. Obviously, this person was involved in recovering the situation in this company and stumbled onto the virus as a result. It’s probable that he doesn’t really know what he’s into.

  FROM: CALIBAN

  TO: LEVIATHAN

  And you’re sure that nobody else is involved.

  FROM: LEVIATHAN

  TO: CALIBAN

  The access is o
nly coming from one terminal. We know where it is. It all seems straightforward. We are putting a stop on it.

  FROM: CALIBAN

  TO: LEVIATHAN

  > We are putting a stop on it.

  NO! Open the system. Watch what happens. Make sure that whoever is using it does not get to anything sensitive.