The Last Enemy - A history of the present future - 1934-2084

Home > Nonfiction > The Last Enemy - A history of the present future - 1934-2084 > Page 7
The Last Enemy - A history of the present future - 1934-2084 Page 7

by Luca Luchesini


  The first one should be led by George and Helena. They have all what it takes to go out in the open and fund biotech startups with the goal of increasing longevity by let’s say, a two-hundred year lifespan. Of course this will be initially dismissed as marketing hype but…”

  “…It will reach people in the right circles,” George took over. “They are the ones who fund studies, give us other ideas, make investments….in a nutshell, it will alert the wealthy that a major change is on the come up. Some will like it, others will not, it does not really matter. Everyone will find a way to adjust to it.”

  “Exactly. Part of it will also leak into the mainstream media, where it will become part of pop culture,” Dora finished.

  “And this is where you come in, Valerio,” said Louis. “How do you plan to spread the word?”

  “I do not have a clear plan yet. Let me take advantage of the extra time we have,” he chuckled.

  “If it’s any help, I do not see anything drastically different from what you do now in advertising. Promoting a few good movies is an easy task, same goes for books – which, by the way, now you can publish them online yourself. We must use the occasional scientific discovery or celebrity misdeed to spread some uncontrolled rumors on new drugs that can extend youth.

  The good thing is that with the Internet nowadays, we can determine the effect all those campaigns will have. At my new company, we have developed software that monitors how news trends and even personal reputations are spreading around the Internet and how new events affect them. The point is, we can create a kind of “immortality readiness barometer”, or “Immortalometer” to make it short, and monitor how it evolves.”

  So the decision to initiate the preparation was made, with everybody in favor of it, except Tarek.

  Since it was not a vote to announce Telomerax, we did not need unanimity to move forward. However, I was a bit worried, and asked Tarek why he was opposing.

  “I have no reason, at least not a rational one,” he said. “if I was rational, I would buy all the arguments that have been discussed. All I have is a gut feeling, telling me this is not a wise decision.”

  “In retrospect, he was right. The next ten years proceeded in a much different way than we could have ever imagined.”

  Part Two

  Detection and Awareness

  Chapter 1

  Avi Eitan sat down in the computer room of Tel Aviv Ben Gurion Airport at precisely eight o'clock on October 23rd, 2010, as he had been doing for the past six months. Barely eighteen years old, he was serving his first year in the Israeli Defense Forces and, given his computer study background, he had been assigned to the team that ran the IT systems of the Israel border control.

  As he logged into the system, he thought about how dull his job was but decided it was much better than checking endless lines of passengers into the terminal building or standing with an M-16 rifle in his hands at one of the many checkpoints between Israel and the West Bank. Or even worse, at Gaza.

  The chances of having to deal with the occasional suicide bomber these days were high enough to make Ben Gurion acceptable.

  On top of that, today there were two pleasant surprises to mix up the routine.

  The first one was the arrival of new airport security members made up of some Falasha girls - Jews of Ethiopian origin. Their beauty was so stunning that even the unkept border guards could not help giving them attention.

  The second surprise was more on the professional side. Avi was asked to start testing a new image match software called “ChronoPic” that had just been installed by the specialists of the Shin Bet, which is the agency with counterespionage and jurisdiction inside Israeli borders.

  The origin of the software was hidden. There were rumors circulating that it was joint developed by the CIA and some experts of the web giants, but there were other claims that stated the NSA was responsible, instead.

  Avi did not really care. He clicked the new icon on his screen and started running the test. The software would collect all the pictures taken by the security cameras of the airport and search for matches to any particular subject in the photo.

  Avi ran the first test on a passenger who had left the day before, choosing one picture taken at the baggage check-in area in the main entrance. After a few seconds, the system returned a set of pictures of the man as he had gone through the security checks. He had spent some time at the coffee shop in the departure hall, loitered a bit in front of a giant chandelier at one of the gift shops, eventually bought a lousy t-shirt and hastily boarded the flight to Paris. The first test had passed.

  Avi then went through the menus and launched an extended search over the past ten days, still focused on the airport entrance. This time it took a bit longer, maybe one minute - Avi thought that from now on he should take note of the amount of time it took to search - then eventually the full set of appearances of the person popped up on the screen. And this person’s name was Pierre Malinsky, a French citizen born in 1965 who entered Israel for the first time in 1987 and whose picture records Avi now had in front of him. The software told him that Pierre regularly visited Israel, three to four times a year, and in many of them he was with a woman who was most likely his wife.

  For a second, Avi thought about whether to start an investigation on the woman or continue with Pierre. He chose to finish what he had already started, and expanded the search from the airport to the whole Shin Bet database, which basically contained footage from all the surveillance cameras of Israel.

  After exactly fourteen minutes and fifty-seven seconds, in which Avi let his thoughts drift again to the Falasha girls, the system returned the full set of images and pictures. There were thousands of them, but it was possible to sort them by time or place, to make it more manageable.

  About twenty of them (roughly one percent) were flagged with a yellow tab indicating that either the system was not sure the subject was the same or there were some discrepancies worth checking. And here was where the real work began.

  Avi started browsing through what he called the “suspect set”, starting from the pictures taken at sensitive locations like border checkpoints, Palestinian authority buildings, military locations, and so on.

  The conclusion was that in all cases the system had raised a false alarm. The picture quality was so poor that the software could not gather enough points to call a match and stated it as a false result. This was a function built into the software design, because the consequences of missing a real danger were far worse than stating a false one. Especially in a country like Israel.

  Before setting the system in automatic search mode, Avi went to the “Morph Search” menu. The software could match the picture of any given subject against an arbitrary set of creations that a malicious agent trying to enter the land of honey and milk could have adopted, such as changing the color and style of their hair, or undergoing plastic surgery, or simply playing with age.

  He ran another test on Pierre, programming the system to look for similar morphs only in the airport area. This time, the search needed ten minutes and seventeen seconds, but Avi noticed that at least at the airport the search did not report any results. He reviewed his options.

  The longer the test lasted, the less chances there were that he would be moved to another task, like for example, God forbids, at the Patriarch Tombs in Hebron to protect his ultraorthodox fellow citizens from Palestinian hate. And by that time he might have gotten to know a Falasha girl. So he selected the full morphing mode on more than one thousand members of the Shin Bet’s most wanted list and put “moderate morphing” to all the rest, with images going back as far as ten years.

  The system started its search, downloading the results into a special file. Avi decided to make a separate file for each image scanned. It was already twelve now, time for the lunch break. He got back to work in the late afternoon.

  ChronoPic had already created more than twenty-three files, some of which were large enough to contain hundreds of pict
ures. He checked if any of the files contained images of members from the most-wanted list. Seeing no results, Avi decided to go home and continue the next day.

  The following morning the number of files had grown to fifty-one. He had to start his analysis work, otherwise the backlog would become unmanageable and he did not want to lose this job.Many logs were inconsistencies due to poor image quality, like the case of Pierre the day before, but there were seven possible crossings with members of the most-wanted list, all under some form of morphing. He checked the dates and the identities. The most recent one had taken place two years ago, and in no case did the declared name matched the one of the suspect.

  This deserved more investigation, so he dutifully followed the Shin Bet instructions and he created a report file for each of the cases and sent it to a secure email address. On the receiving side, an officer would take care of the next level of investigation. It was quite a burdensome process, and in the meantime thirty-four new logs had been produced by ChronoPic. Avi nicknamed it ‘Crony’, considering he was going to spend a lot of time with it.

  On the evening of the second day, he was grateful that his Crony friend allowed him to spend the rest of his shift in the comfortable airport security room.

  And even better, during the afternoon coffee break he had managed to break the ice with Rachel Terwago, one of the most beautiful girls of the Falasha group.

  A few days later, he started analyzing file number 178, which was a strange one. Crony had come upon a morphing correlation between twenty-six different picture sequences, all of which were good quality as they had been taken by the airport security cameras.

  The sequences started in 2001 and finished the week before, on October 16th, 2010. The subject had flown back home on the afternoon Delta Air Lines flight to New York. The problem was, the sequences belonged to two different people. One of the first twenty was apparently George McKilroy, a US citizen. The last six instead belonged to Sean Ewals, an American as well.

  Avi scrutinized the pictures. Indeed, there was some resemblance. The morphing controller stated that George could have morphed into Sean by applying eye and nose surgery, plus some lifting, as Sean looked significantly younger. Then Avi also checked in the border control file. In both cases, there was nothing suspicious. Nothing to report during their stay in Israel, and nothing connecting either one to the Shin Bet database of foreign suspects.

  Avi launched a search on the whole Israel territory on both subjects. After one hour, he figured out that neither George nor Sean went near any sensitive military site. They both appeared in some parking lot and traffic light footage in the Petah Tikvah area. The hotel videos showed that they stayed at different places, while George’s pictures had been taken in the Jerusalem area, Sean always stayed in the surroundings of Tel Aviv. Looking at their customs interview reports, they both declared to be technology entrepreneurs and their whereabouts confirmed that. They were born about thirty years away from each other and this was in line with the images. There was still a strange resemblance flagged by the system, as if George and Sean could be the same person. But then why did Sean look so much younger than George? The opposite would have made sense.

  Avi was about to trash the log as yet another case of false results, then he remembered that his country simply could not afford false outcomes. Besides that, no one could blame him for being too cautious, so he compiled his analysis of file 178 and sent it to the Shin Bet email address.

  Chapter 2

  Eyal Podhoretz was the man in charge of the office for the analysis of internal intelligence at Shin Bet. His team was collecting and putting together information taken from all sorts of sources, from satellite imagery to words whispered in the streets of the Old City of Jerusalem, with the goal of identifying any internal threat to the Jewish State.

  This year was relatively quiet, at least in comparison to the years of the Palestinian revolts of the Intifada, but Eyal knew that peace was a concept with a much different interpretation in this part of the world. It simply meant no imminent danger and therefore more time to focus on preventing the next threat. The officer who had received the report from Avi had reached the same conclusion, something was not adding up and he had done more research.

  It turned out that George had died in 2005 and Sean’s visits had begun shortly after. They were both technology entrepreneurs. George had started in computers, then mobile phones, and then veered to biotechnology, which is where Sean started.

  However, Sean was active with a completely different set of companies.

  Eyal had sent two of his guys to politely, yet thoroughly interview the people who had done business with George in Petah Tikvah. Evidently, there were no problems whatsoever.

  According to his colleagues, he was a very creative and rich man, well connected in the business community. Politically, he seemed just like the average American, ready to side with Israel no matter what.

  Could he have been an industrial spy?

  Unlikely, as he was the one that brought the new ideas and techniques, not the other way around.

  And how about his death?

  Totally unexpected. They noted that at some point he got slightly thinner, but who knew why? Then no news for a few months, and all of the sudden the obituary popped up on the ‘San José Mercury’.

  So no one attended the funeral?

  Apparently not, it was a family-only ceremony. One of the interviewees distinctly remembered the name of George’s wife, Sheila.

  The colleagues of Sean gave very similar responses, he was very reliable, very open, and a good friend of Israel without any doubt.

  What was he working on?

  This is where the interviewees hesitated. They were stuck between the security of their home country and the business secrets of their investors. All that the team of Eyal learned was that Sean was working on breakthrough research in aging.

  To complete the puzzle, it was necessary to either interview the family of George McKilroy or catch Sean, maybe during his next trip to Israel. He sent instructions to the border agency to alert Shin Bet immediately upon his next arrival, but to let him go undisturbed. This was what had to be done in Israel.

  To get the US side of the story, he picked up the phone and called his counterpart at the Mossad.

  Yaakov Mayer answered on the fifth ring as usual, after some quick speculation on the reasons behind the call. He knew Eyal when they had served together in the same commando unit during the last Lebanese war of 2005, hunting for the missile launch sites of the Lebanese Shia party and Israel’s archenemy, Hizbollah. He knew he would not call without a solid reason.

  “Hello Eyal. How can I help you?”

  “Hi, Yaakov, we have a potential threat we need your help to fully assess. We are tracking a foreign suspect. We believe he has changed identity over the last few years and he is continuously entering Israel.

  He is active in biotechnology, and a regular visitor to the Petah Tikvah research area. We cannot get any more information about him from our sources and databases, so if you could just activate your network abroad..”

  “Hang on, where is this guy from? Please do not tell me he is..”

  “Unfortunately, yes, he is American.”

  Even without video link, Eyal could imagine Yaakov shaking his head in disappointment. It would have been much easier to ask the Mossad for some services in Iran or Afghanistan, as the United States were one of the hottest places to gather intelligence. Not so much for the inherent difficulty to get to your sources, but rather for the political fallout if anything went wrong.

  “Eyal, let me ask you one question first: can't we just do this by simply calling someone at the FBI or Homeland Security? If we suspect this one is a bad guy, maybe he is also conspiring against the US. Our two countries tend to have common enemies, and it would save us a big embarrassment.”

  “Yaakov, I thought about it and I would rather not get the FBI or HS involved, at least for now. The two guys have bulletproo
f identities. Their passports are one-hundred percent authentic, as well as work and residential addresses, and their social security codes. When the first guy died, guess what…he asked for his body to be cremated with no relatives or friends at the funeral.”

  “So you are afraid he might be acting under the cover of one or more federal agencies. This would mean that our friends from across the pond are spying on us and we are just returning the favor. Maybe Bibi Netanyahu, our Prime Minister, could buy this, if we can prove it. I need to ask you a few additional questions though. First of all, are you really sure we are talking about the same person?”

  “The double identity pattern has been detected by the new software that you handed over to us a few months ago. I sent one of my team members at Ben Gurion, to check how the border control officer at the airport was using the software. The boy, I think his name is Avi, thought he had made some mistake, but after a full day of examination my team member confirmed that Avi can efficiently operate the ChronoPic application. So, yes, to the very best of our knowledge the two individuals, George and Sean, are the same.”

  “And why do you think this George-Sean is a bigger threat to us than Hezbollah?”

  “I did not say he is a bigger threat than Hezbollah, or Hamas rockets, or the Iranian nuke program. All I’m saying is we have a man who has dealt with the biggest technology breakthroughs for the last twenty-five years, who chose to change lives and who is now playing around with biotech in our backyard, under intense protection.

  What if he is in to get some of our secrets for the Americans to reuse? You know that some of the companies he is working with are also engaged in our new bio-drone program.

  Or what if he is trying to smuggle biohazardous stuff inside the Tel Aviv metro area? I am not asking to put him in jail or kidnap him in Connecticut, I am just asking your help with a discreet assessment.”

 

‹ Prev