State of War nf-7

Home > Literature > State of War nf-7 > Page 13
State of War nf-7 Page 13

by Tom Clancy


  “That’s different,” he said. “Those are real countries. Our government has reciprocal agreements with them, so our citizens can live and work there under the same arrangements.”

  “And that will be true with CyberNation, too,” she said. “We’ll have arrangements with every government on the face of this planet. We’ll have to. It’s the only way our citizens will be able to live and work where they want to.”

  “But…” He stopped.

  “Yes?”

  He shook his head. CyberNation was wrong. The whole idea was ludicrous, and he knew it. He just couldn’t seem to make her understand that.

  “And what happens to the real-world countries?” he asked.

  “Ah, now that is the best question I’ve heard so far,” she said. “And I believe it’s the real heart of your concern, isn’t it? The fact that people becoming citizens of CyberNation, of not paying taxes to the U.S. anymore, would be bad for this country that you love so much.”

  He nodded. He hadn’t really thought of it in those terms before, but she was right. It would be bad for the United States, just as it would be bad for Saudi Arabia, and France, and every other country. It would have to be.

  “But maybe, just maybe, that would be a good thing. After all, the United States is supposed to have a government ‘of the people, by the people, and for the people.’ Can you honestly say that the current tax structure works that way? Never mind for the moment that fewer than ten percent of the population pays more than eighty percent of the taxes. Never mind for the moment that for tax purposes the poverty level is set at an unbelievably low level, so that families making far less money than they need to feed and clothe and house their children are nonetheless paying taxes. No, for now, just look at where those taxes go. Tell me that you’re happy with all the pork barreling that goes on, and that you believe the monumental waste you see all around you is ‘of the people, by the people, and for the people.’ ”

  She paused and looked at him. “Maybe, Alex, just maybe it isn’t CyberNation that’s bad for America. Maybe America has become bad for itself.”

  “No, Ms. Skye,” he said in a flat voice. “We’ve got problems, I’ll admit that. We always have and we always will. But that’s exactly because we are of the people. Any human endeavor will always be flawed. It’s part of our makeup. CyberNation would be no different.”

  There was a moment of silence as they both looked at each other. Then she nodded. “Well,” she said, “I won’t take up any more of your time. I appreciate the opportunity to talk with you. If ever I can help you with information regarding CyberNation, or anything else, please give me a call.”

  He nodded, rose, and shook her hand.

  She paused, still gripping his hand lightly. “Promise me one thing, Alex. Promise me you’ll at least think about what I’ve said.”

  “Oh, I think you can count on that, Ms. Skye.”

  She left and Alex turned back to work. A virtual country? No taxes? Preposterous.

  Wasn’t it?

  14

  Net Force HQ

  Quantico, Virginia

  Jay Gridley walked across the huge laboratory’s hard linoleum floor toward the test chamber. A low, dry rustling sound, as if thousands of leaves were being tossed about in a huge lotto machine, echoed through the room. The air was heavy with the smell of ozone. Across the room, two Jacob’s ladders, the epitome of mad-scientist decor, buzzed, sending hump-shaped blue sparks up their V-shaped electrodes. Close at hand, a bank of Tesla coils radiated even more intense sparkings, and Van de Graff electrostatic generators added their cracklings. A large Lava lamp stood off to the side, and on one of the lab benches, a Rube Goldberg forest of beakers, retorts, and Bunsen burners drove multicolored liquids through tubes and distilled them into yet more containers. At the end of another bench, an old oscilloscope displayed a revolving sine wave. The topper was the huge computer lining the entire wall at the end of the room. Huge rolling reels of magnetic tape rolled back and forth, interspersed with banks of flashing lights. The sound of clicking relays was a touch he had added himself.

  Jay grinned. This particular scenario wasn’t actually all his, but since he had the final word in most Net Force VR work, his suggestions had carried some weight.

  Frankenstein would be proud of this setup. Or at least the moviemakers who did all those science-gone-mad flicks of the thirties, forties, and fifties would be. Jay was proud, too. His people had done their usual great work.

  Around him on the other three walls were hundreds of museum-quality display cases, each one lined with cotton and filled with odd-looking insects. On top of the lab benches, in huge wooden boxes, were thousands upon thousands more bugs: Their assorted wings, legs, and pincers were what made the leaf-rustling sound.

  This wasn’t Jay’s usual VR scenario. It wasn’t intended to help him break into other net sites. It wasn’t even connected to the net at all. Instead, it was quarantined in a stand-alone Net Force computer, with no links to the outside net at all.

  This scenario was a holding cell. It was also a visualizer and a synthesizer. It translated computer viruses, worms, and Trojan horses into distinctive insectoid shapes, complete with whatever features made each particular program unique. When it came time to see how a new attack program worked, Net Force personnel came here, to the test lab, to see what they were up against.

  If the virus ate data, for example, it might have oversized mandibles along with a big abdomen and colors to match the data it went after. If it propagated by hiding in other data, or by catching hold of it, it might have a chameleon-like ability to change color, or spinnerets to ensnare its prey. Each mode of operation, combined with the bug’s delivery and goal, would give Net Force’s software enough info to make a distinctive-looking bug.

  Naturally they still had to look at the actual code that made up the cores of the viruses, but the visualizations gave them a better way of tracking how the virus actually worked.

  Like now, for instance.

  Behind a thick Plexiglas wall was the virus test chamber, itself an analog representation of data transfer between computers. An old-fashioned punch-card printer sat at one end of a long conveyer belt. At the other end was a scanning array and punch-card reader along with a large diagram of a computer that looked like an ant farm.

  Everything was a brilliant white, like some scientific version of heaven. Cameras and magnifying lenses surrounded the apparatus to make it easier to watch the process from start to finish. A long section of the Plexiglas wall had been built to make a huge lens that brought sections of the conveyer belt up several levels of magnification.

  Jay walked over to the punch-card printer and sat at a terminal. He tapped a few buttons and the printer began to spit cards. What he’d actually done was to upload an e-mail that had been infected with the new blanker virus going around. High-end security software had caught it, but the virus had slid past standard virus-checker stuff, and he wanted to find out why.

  He moved to a magnifying glass in front of the printer, one half of which was cut away like a “how it works” kind of drawing, and took a look. There, near the punch card being printed, was a small insect shape. He flipped a larger lens down over the area he was watching and took a better look.

  The bug was fairly large. Pale, almost clear, without color, it was segmented into three main sections. It had six legs and six pincer arms, with one pair of each per section. The head was surprisingly small, with tiny feathered antennae, and it had large eyes.

  As he watched, the middle thorax — if it could be called that, there being three of them — went completely transparent, and he could see through it.

  Clever. The author of this little bug had come up with a new invisibility routine, a don’t-look-at-me-I’m-not-here bit of misdirection that made viral data less noticeable.

  As Jay watched, the bug worked its way toward a small pile of punch cards.

  The first batch of cards dropped down from the printer onto the
belt, which inched itself forward just enough so that the next batch of cards wouldn’t hit the first, and then stopped. The bug didn’t go yet, though.

  It waited for the second set of cards — which actually represented a packet of data — to begin stacking up. Then it reached between the second and third sections and did something to detach the last set of arms and pinchers. That segment moved toward the cards, went transparent, and began cutting at them with its claws. When it had made enough room, it burrowed in and pulled a section of torn card back to cover itself. The bundle of cards dropped onto the conveyer belt a few seconds later, and packet number three began printing.

  Fascinated, Jay watched as the bug split itself apart again several packets later and the second segment burrowed into another stack of cards. The very next stack got the last third of the bug.

  Impressive. A trinary virus — and, if he was right, one coded to ride different packets.

  The last stack of cards dropped onto the conveyer belt, and then the belt sped up, taking the cards toward the scanner at the other end of the test chamber.

  The cards were VR representations of packets of information: the e-mail he’d forwarded broken down and sent in little bunches. The way it worked was the first packet had a list saying how many packets were coming, kind of like a cover sheet for a fax. The last packet had a little tag saying, “The end.” The packets in between contained the actual e-mail itself.

  The computer or server getting the data would watch for all the packets and confirm delivery of each one before forwarding on to the next link in the chain. If there were any errors, the problem packet would be re-sent.

  Early virus writers had taken advantage of the fact that each packet was a set size. That meant that if your message was, say, ten point two packets long, eleven packets would still be sent. The point oh eight unused space would usually be filled with zeroes, and that was where the virus would hitch a ride.

  The virus checkers had gotten wise to this, though, and started carefully checking the size of messages against the number of characters sent.

  So the innovative virus writers had gone one better, and had their creations cut out sections of legitimate data in the middle of the stream and hide there.

  This would change the size of the packet, of course, which would throw an error, but that wouldn’t set off any alarms. Errors in transmission were pretty common. Line noise, bad connections, time-outs, there were many, many legitimate reasons why errors occurred. The receiving computer would simply flag the error, the entire stream would get sent again, and the recipient would get their data unaware of the hitchhiker that had come along.

  This had led to binary viruses, where the virus would split into two innocuous-looking sections that didn’t do anything until they were reassembled at the other end of the chain.

  This was the first time he’d ever seen a trinary, however. In addition, the way the bug had not spaced the packets it was riding evenly led him to think it was randomly selecting them, which would make it tough to get a handle on.

  At the other end of the test chamber, Jay watched the packets slide past the scanning array, which was actually a standard, off-the-shelf virus detector. He wanted to see how this bug got past them, after all. Putting one of his own cutting-edge programs there and squashing the bug with it wouldn’t tell him anything.

  He was disappointed, though. The bug didn’t do anything special to defeat the security program. The off-the-shelf killware wasn’t designed to detect trinary bugs, and so it didn’t.

  Jay saw the virus-bug reassemble itself, and then proceed to a large clear sheet of glass that represented the video subsystem of the computer setup. Once there, it sprayed the glass with some kind of ink, blacking it out. If he had been in the real world, he would have just seen his computer screen blank out.

  Jay ran the test several times to confirm that the virus was indeed randomly selecting packets to leap onto, his thoughts turning over the same question.

  Why?

  Why would someone go through so much trouble to develop a virus that couldn’t be defeated by modern checkers, just to make someone’s screen go blank? It seemed like a lot of work for not much gain. Somebody that smart could be making good money programming.

  Maybe they were, of course. Though that still begged the question of, Why bother?

  As he watched the bug on the third test, something else occurred to him. There was something familiar about the way it moved, the shape of the antennae.

  He walked toward the most current bug case on the wall of the lab and started looking. He glanced at hundreds of recent viruses, red, green, big, small, all kinds of them.

  There.

  It was the filler, the really recent one that had made the rounds a few days before, the virus that had been eating up hard-drive space.

  He took a closer look, pulling it carefully from its cage.

  The antennae were identical to those of the blanker he was running in the test chamber. He turned the bug over, and saw it shimmer: another invisibility routine.

  Hmm.

  Jay got a live sample of the filler and took it to the test chamber. After a few runs, he was satisfied that whoever had made the filler had also made the blanker. An analysis of the written code showed portions that were exactly the same. This, plus the fact that the bugs had been released only three days apart, told him that they’d probably been developed at around the same time.

  Which led to a particularly nasty thought, one that offered a possible answer to the “Why?” question.

  There’s more to come. This guy is seriously messing with the net, and not just for fun, either.

  In addition to everything else going on, it looked like they had a serial hacker piping cutting-edge viruses out onto the net. Jay cleared the VR scenario and reached for his virgil to com Alex.

  Kim’s Business and Industrial Center Dover, Delaware

  Junior had made the drive from D.C. across the bay, taken Highway 301 north to SR 300, and driven east over the state line into Delaware. From there, it was only another dozen or so miles to Dover.

  It had been dusk when he got there. Dover wasn’t much of a town, but it was big enough to have a branch of Hopkins Security. Like Brinks or Pinkertons or the other big security firms, Hopkins offered service patrols and electronic alarms for homes and businesses. They also offered armed guards.

  If you were their customer and your alarm went off, they didn’t just call the cops like most agencies did. They sent an armed response of their own.

  This was a huge selling point for them. In most places, the local police forces were stretched pretty thin. Answering a security call to an empty house, no matter how much money the owners had, just didn’t rank right up there with burning homes or 911 calls where individuals could be in danger. Oftentimes that gave smash-and-grab thieves enough time to kick in a door and steal half someone’s furniture before the police showed up.

  Hopkins claimed that its armed response teams were the best private security around. They promised security personnel who were sharp, smart, and could all shoot. Every one of them had to qualify on the pistol range quarterly, and Hopkins’s standards were higher than those of seventy-five percent of the major metro police departments in the country.

  All of which was exactly what Junior was looking for.

  The way he figured it, shooting another cop would be too risky. Cop killings were rare enough that somebody might try to link them together, and he definitely didn’t want that. Even an armed security guard killed with a.22 might raise some eyebrows, though he had done all he could to protect himself there. He was planning to use only one gun this time, and the ballistics report would show that the bullets came from a different weapon. Doing it in another state should help, too.

  It still wasn’t smart. He knew that, but just the thought of it thrilled him more than anything else he could think of. Yeah, sex was great, but it was nothing like clearing leather and pulling steel against a man who was trying
to kill you. No drug he had ever tried — and Junior had tried more than a few while in the can — no drug came close.

  This was the ultimate rush. Lose, and you were dead. Win, and you were like a god. You got to say who lived and who died. What could match that?

  He ought to have made this trip before. He should have scouted it out, gotten the lay of the land and all, but Ames had been keeping him too busy running around lately. So what he ought to do now is to make this the scout — find a good place, set it up, check the response time and all.

  That’s what he ought to do. He knew it, too. But it wasn’t what he was going to do. He was hooked, a junkie looking for his next fix, and he just couldn’t wait any longer.

  He drove toward the outskirts of town, looking for a place that would work. It didn’t have to be perfect, but he wanted to find a spot far enough outside the city limits that they’d have to call the sheriff’s office, or even the state troopers. It had to have a Hopkins sign posted, of course, and it also needed to be some kind of business or warehouse or something that, after five o’clock, would be mostly empty. A residential neighborhood was riskier. Too many people, too many eyes. Sure, he had swiped a set of license plates from an old car parked on a D.C. side street, and those were now on his car, but he still didn’t want a crowd around. People in a neighborhood sometimes did weird, unpredictable things.

  He remembered a time down in Mobile ten or eleven years ago. He’d been driving a car for a couple of guys who had said they knew where there was a gun safe full of cash. The house didn’t even have a burglar alarm, they told him, and it was in this middle-class neighborhood full of soccer moms and working dads. The two guys — Lonnie and Leon — had waited for a night when the homeowner had gone bowling. The three of them drove up, Lonnie and Leon went to the house, kicked in the door big as you please, and waltzed on in. Junior sat in the car with the engine running. What they figured was, Lonnie and Leon would crowbar and sledge the safe open inside five minutes, grab the cash, and run.

 

‹ Prev