Book Read Free

The Sundering def-2

Page 30

by Walter Jon Williams


  That evening, she memorized the codes she’d printed, destroyed the printout, and thought, I must remember to use these powers only for good.

  She told Hong that joke at their next meeting. He frowned, brows knitting. “You’ll do well to remember, Four-nine-one,” he said, “that in the military, irony proceeds from thetop. ”

  Sula straightened. “Very good, my lord.”

  “Don’t call me that here.”

  “That’s all right. It was irony.”

  Hong grunted, eyes fixed on his plate. As was his custom, he had chopped his pastry up into several pieces, which he now commenced to eat with military efficiency, last of all sweeping up the crumbs and devouring those as well.

  The day was rainy and he and Sula met indoors. The café was crowded and smelled of damp wool, and the door banged loudly whenever anyone went in and out.

  “Still,” Hong admitted, “that’s a good use of initiative, I suppose. You’ll have to give me a list of those names, of course.”

  “No,” Sula said. “Absolutely not.”

  Hong looked at her in surprise. “What do you mean, no?”

  “You don’t need to know our backup identities. We’ll have secure means of communication no matter what names we’re using, so the only people inconvenienced will be the Naxids, when they arrest you and interrogate you and you can’t tell them where to find us.”

  Hong didn’t seem annoyed, which Sula might have understood, but rather deeply and sincerely concerned, as if he’d just learned she’d come down with a serious illness.

  “Are you all right about this?” he asked. “You’re not having second thoughts about our assignment, are you?”

  “None whatsoever,” she said flatly, and held his eyes until he dropped them.

  Second thoughts aboutyou, she said to herself, are another matter.

  That evening, out of more than merely idle curiosity, Sula used the display and touch-keypad in the surface of the old desk in a corner of her apartment’s front room, and logged onto the archives at the Records Office to see if her passwords still worked. They did.

  But she knew they wouldn’t work much longer: passwords of this sort were changed frequently as a matter of routine, and when the Naxids arrived they might well demand exclusive control of the system.

  “Ada,” she said to Engineer/1st Spence, calling her by the cover name assigned her by the Fleet. “I can use your advice.”

  Spence brought a chair to where Sula worked, and sat. She was a short, sturdy woman of around thirty, with short straw hair and a pug nose. “What do you need?”

  “I’m in the Records Office data system. And what I’d like is to make certain that I can keep my access even after they change the passwords.”

  Spence was surprised. “Is that legal?”

  Sula suppressed a laugh. “I have a warrant,” she said, and hoped her face was straight. “The problem is that the Naxids aren’t going to honor it.”

  Spence considered the display. “Can you get into the directory?”

  Sula gave the command, and a long list, thousands of files, began rolling across the desktop.

  “Apparently I can,” Sula said.

  “System: halt,” Spence ordered. “System: find fileExecutive.”

  Two file names glowed in Sula’s display, one a backup of the other.

  “There you are,” said Spence. “You want to rewrite the executive file to give you permanent access.”

  “Will it let me?”

  “I don’t know. Whose passwords are you using?”

  “Lady Arkat,” Sula said. “She’s the head of System Security.”

  Spence laughed. “You’d think the head of security would have thought to change her passwords the second you were out the door.”

  “She’s rather old. Maybe she’s a creature of habit.”

  “Or maybe she’s, well, on our side.”

  Sula thought that the elderly Torminel was not as sympathetic as all that, but conceded she might be wrong.

  “System,” she ordered, “open fileExecutive. ”

  The file sprawled out before her, thousands upon thousands of if/then statements. Sula gave a low whistle.

  “How good are you at programming?” she asked.

  “Iuse computers,” Spence said, “I don’t program them.”

  “My programming courses were a while ago,” Sula said. Though she did some programming now and again, her skills were hardly first-class.

  “Back up everything,” Spence advised, “go very slowly, and make use of any help files.”

  “Right,” Sula said, and backed up the executive file first thing, both onto the Records Office computer and into the system in her desk. She made herself a pot of strong, sweet tea and prepared for a long night.

  “I’m very good at puzzles,” she reminded herself.

  It was the copy on her desk that she worked with. Fortunately the actual changes that she wanted to make were minor, even though they had far-reaching implications.Whenever you change the password, send me a copy. How complicated could such an order be?

  She told the computer to send the copy to her hand comm, the one she carried with her. After a few catastrophic syntax errors, the program seemed to run, at least in Sula’s desk.

  Sula took a deep breath and scrubbed her palms on her thighs, drying any hypothetical sweat. She would now have to load her altered program back into the computer at the Records Office. She pictured the thousand consequences of this attempt going wrong, Hong’s fury at one of his secret team being exposed, official reprimand, scathing reports in her file.

  She sent her altered program to the Records Office and held her breath. Nothing happened.

  Sula slowly let her breath out, then reached for her tea. It had turned cold, and the thick liquid was like a stripe of molasses on her tongue. She went to the kitchen for a few moments to reheat her tea, and when she came back, nothing had changed.

  She sent herself some simple mail—“hello”—using the Records Office computer, and opened her hand comm to discover the mail waiting for her.

  The next test was to see if she could create a set of identification. If she succeeded, she could simply mail the documents to herself here at the apartment. She began work, but stopped when an incoming message icon blinked onto her hand comm. She triggered it, and a text message appeared on the small screen.

  My Lady Arkat,

  We have detected an attempt to rewrite the Executive File of the main computer at the Records Office. This attempt occurred at 01:15:16. We will erase the corrupt copy and reload the Executive File from backups.

  You have been assigned a new, temporary password: 19328467592.

  Please change your temporary password to a permanent password of your choice as soon as you arrive at your desk in the morning.

  In service to the Praxis,

  Ynagarh, CN5, Assistant Data Administrator

  Words leapt to Sula’s lips, words that would disconnect her at once from the Records Office computer.

  She didn’t utter them.

  Instead she tried to work out what had just happened. Though the intrusion had been detected almost ten minutes ago, she was still inside the computer. If the administrators had bothered to check to see who was connected remotely, they would have found her to be Lady Arkat, their own chief, a fact that would have made them reluctant to disconnect her.

  Whatever the case, she still had access to the Records Office computer. She had Lady Arkat’s temporary password, which would be good for the next few hours, until Lady Arkat arrived at the office and changed it. But after that Sula would be frozen out, because the executive file that Sula had ordered to send copies of the new password had been erased.

  As long as Sula stayed connected to the computer, she was still able to make changes, at least as long as she avoided whatever error it was that had caused her altered program to be detected in the first place.

  She took another sip of her tea, jasmine and citrus honey gone
tepid, and wondered what her error could have been.

  Sula looked again at the error message.01:15:16. They had her intrusion down to thesecond.

  That gave her the first clue. Some rummaging in administration files revealed no less than six automated messages that had been sent toAssistantAdministratorYnagarh, each stating that the executive file had been replaced by one of a later date.

  “Ah. Hah,” Sula said.

  It had been the file’s date that had given her away. But in that case, why six messages, and not one?

  The automated system had sent six messages because she had been detected in no less than six different ways. A second mentioned that the file size had changed. The other four informed Ynagarh that a change in the “hash signature” had been detected.

  What the hell arethose? Sula wondered. She turned to ask Spence if she knew, but Spence had long since gone to bed.

  First things first, Sula decided. Dates were something she understood.

  She checked the date on the executive file that had been loaded over her altered file, and found that it had last been changed nine years before.Nine years. The file itself had been created oversix thousand years ago. It was obviously stable and required very little tweaking. No wonder her executive file had set alarm bells ringing.

  Sula reheated her tea again and drank a cup while she contemplated the problem. Could the answer be as simple as changing the date on her file? She had the very high privileges that came with Lady Arkat’s account, and found that it wasn’t a problem: she changed the date on the file to nine years before, and when she made a backup file onto her own computer, the altered date didn’t change back to the real one.

  And a message would go to the administrators if the file’s size changed: that was clear from Ynagarh’s messages. The program that she loaded into the Records Office computer would have to be the exact same size as the one there now.

  She clenched her fists in a cold frenzy. Now she was going to have to go through the program line by line in hopes she could pare out enough redundant programming to make up for the lines she’d added. This wasmaddening …

  Rather than even contemplate this task, she dug for a frantic hour through Lady Arkat’s help files and searched through the program’s architecture, and in time discovered what a hash signature was.

  The ancient executive file was compiled into a binary form that, in addition to performing its various tasks, was itself an integer. By performing a calculation that was very easy to do in one direction, but difficult to backtrack—say dividing bypi and using the first thousand digits of the remainder—the resulting arithmetical signature—the “hash”—could identify even tiny changes in the file’s size.

  Sula opened the file again and let the lines of code scroll in front of her bewildered eyes. She was too tired to think properly. She rose from her chair, stretched, and flapped her arms in hope of bringing a surge of blood into her weary mind. She stepped to the window and gazed down at the street below, the busy life of day much subdued now, the haunt of street cleaners and Torminel.

  Sula’s eyes lifted to the eastern horizon, soon to turn pale green with rising of Shaamah. She had bare hours in which to perform her calculations. Somehow, she had to reverse-engineer the calculation that produced no less than four wildly different hash signatures, without knowing what the algorithms were or where they could be found.

  She dragged her weary feet back to her desk. The executive file wasancient, she thought. It was so old it might have been written by theShaa …

  And then she stopped dead, as she remembered the fondness of the Shaa for prime numbers…

  All weariness sizzled away as she made a galvanic leap into her chair. A list of prime numbers was available in a public database, and she disregarded the first thousand as too small, then seized the next nine thousand and ran them against all values in the executive file.

  One…The first match appeared in the display.

  Two…

  Three…

  Four.

  All the hash numbers were located in the same part of the program, which was clearly the part of the program having to do with alarms and security. She couldn’t have found the alarm program with a month of random searching.

  The Shaa weren’t so damned smart, she concluded.

  Sula scanned the program with great interest. There were the access codes, which were the key, and the alarm files, which were the lock, and there were the log files that recorded all changes in the system, which was a record of which key went with which lock, and when.

  What she had to do, it turned out, was change both the lockand the key. And then the records had to be changed to read,This has always been the lock, andThis has always been the key.

  In the next hour Sula added extra code to the executive file. In order, this set permissions on the log files to unwritable, which would prevent her manipulations from being detected, deleted the last line of the log file, which otherwise would have included her previous command, sent a copy of any new password to Sula’s comm, and then set permissions on the log file back to writable, which returned everything to normal

  She prepared all the hashes for the alarm files.

  Then Sula created a new program that would load her own executive file into the computer at the Records Office, something that would manage the whole procedure a lot faster than could Sula by giving orders or typing commands.

  The program had a number of familiar commands, and some that were new: it set permissions on the log files to unwritable, deleted the last line of the log file, engaged all diagnostic programs, updated size and hash information on all alarms, copied her executive file over the old one, altered the dates of creation and modification on her new file to those of the old one, then ended all diagnostic programs and reset permissions on the log files to writable.

  She tested the operation several times in her own computer. Then, holding her breath, she triggered her new program.

  Sweat prickled on her forehead as she looked at Assistant Administrator Ynagarh’s messages, and saw no message alerting him to anything amiss with his computer.

  She let out a long breath. It seemed that she’d got away with it.

  Dawn was greening in the east. Sula made a last, obsessive scan of everything once more, just to make certain the file was as she left it, and then broke the connection. She told the apartment’s system to wake her in the morning just before the Records Office opened for business, so that she could be sure to get into the computer on Lady Arkat’s temporary password before it was changed.

  As she prepared for bed Sula looked at herself in the mirror and was appalled. Her eyes had deep shadows under them, her hair was stringy, and there were blooms of sweat under her arms. She couldn’t abide sleeping in such condition, so she took a thorough shower. She went into the bedroom she shared with Spence, groped her way to her bed, and fell into it.

  For once, oblivion did not take long to reach her mind.

  It seemed as if she took only a few breaths before the alarm chimed her awake, and she threw on clothing and ran to the desk. It was broad, brilliant daylight. Spence was making herself breakfast, and Macnamara had already left on his morning errands—as the team’s courier, his task was to check certain public places to find if any messages had been left for the team, and he’d been provided with a two-wheeled vehicle for the purpose.

  Sula called the Records Office and used Lady Arkat’s temporary password to gain access to the main computer. Spence silently brought to her desk a cup of heavily sweetened coffee, shortly followed by a toasted muffin and a pot of jam.

  The question was how long it would take Lady Arkat to turn up at her desk. If she were like many of the Peers in the civil administration, she might turn up at midmorning, or even after a long luncheon.

  Sula opened her hand comm and put it on the desk in front of her. She ate her muffin and asked Spence for another.

  She ate her second muffin. She paced. She made more coffee. She empt
ied her bladder. She brushed her teeth and combed her hair.

  She tried to keep from screaming aloud.

  Spence stayed very much out of her way.

  Lady Arkat turned out to be one of the midmorning Peers. It was just after midmorning, at 13:06, when Sula saw that the head of security had checked in and viewed her morning’s messages.

  A few minutes later, Sula’s hand comm chimed. She checked the message, and found Lady Arkat’s new password waiting for her.

  She leaped up from her chair to give a shriek of exultation. Then she deaccessed the Records Office and bounced joyously around the apartment, tidying the breakfast things.

  Macnamara returned from his errands and walked into the apartment carrying a bag of provisions. “No messages,” he reported. Then, seeing Sula’s state, he asked, “Something happened?”

  “I’ve become the Goddess of the Records Office,” Sula said.

  Macnamara thought about this for a moment, then nodded. “Very good, my lady,” he said, and went to the refrigerator to put away the groceries.

  TWELVE

  Lady Michi’s dining room was large enough for the formal dinner parties that were part of the service life of a squadron commander, and was made to seem larger by ornate mirrors fashioned out of highly polished nickel-iron asteroid material, and by the murals that made the room seem to open up into a series of other rooms, each with windows that looked onto a distant horizon.

  Martinez wore full dress—which he would have done in any case—and found the squadcom dressed likewise. From her table, set for two, she looked up at Martinez with an expression of relief.

  “Oh, good,” she said, rising. “I wanted to be the first to invite you to a meal, so that I could warn you that they’re all formal here.”

  “Lord Captain Fletcher told me.”

  “You spoke to him, then? Please sit down, by the way.”

  Martinez placed his gloves on a side table, then sat in the chair that one of Lady Michi’s servants held for him. “I encountered the captain, along with one of the lieutenants, Lady Chandra Prasad.”

 

‹ Prev