Creative Destruction, page 27
“Number and size of files?”
“Thirty-seven folders, containing seven hundred forty-three files. Approximately eighty-four gigabytes.”
“Decrypt folder names. Display the names of all folders in the archive, sorted by last modification date.”
The most recently updated folders were named ISI and TSC.
Both folders had last been changed a week earlier, three days before Alicia’s death. The next day, she’d seen her lawyer to execute a codicil to her will, replacing her sister’s name with Justin’s.
The PDA wasn’t up to the task of decrypting gigabyte files, and he wasn’t up to reviewing them. “Bridge in my home workstation, also on a secure link. Download Alicia’s archive there. Leave everything encrypted for now.”
CHAPTER 3
It was almost midnight when Justin got home from the Richmond train station, but he was too keyed up to sleep. The number of questions about Alicia kept growing. Leaving his suitcase in the hall, he went directly to his den. Setting his PDA on the desk beside his workstation, he asked, “Have all files from Alicia’s archive been downloaded?”
The two computers compared notes. “Yes,” answered the PDA.
“Display archive configuration.” A detailed structure of many files and folders spilled down the screen. “Show the content of the ISI folder in plaintext, newest files first.” He got himself a Coke and some peanuts while the workstation cranked away. When this decryption was done he saw nothing unusual. Her last consulting assignment from ISI, work done two years earlier, was something he had himself arranged. The one recent entry was a current org chart, apparently hacked from ISI’s intranet. Why had she wanted that information?
“Now show the content of the TSC folder in plaintext, newest files first.”
Three months ago, TSC had received an unusual rush order from a small-fry wholesale trading company. The requisition included several expensive, and apparently very specialized, electronics assemblies that were identified only by part numbers. Alicia had been retained to do some basic commercial intelligence gathering: trace the goods to the ultimate end user, and understand how he was using these items. TSC was in part interested in basic market research, but reading between the lines they were more motivated by curiosity about the urgency implied by the contract’s huge penalty for late delivery.
Crunching on peanuts, Justin continued to read. Alicia had hacked into the ordering company’s mainframe, and identified another trading company that had earlier requested the TSC parts. She’d penetrated Company B, and they, too, were a front. He stopped chewing when he got to a third company: ISI secretly controlled Interplanetary Amalgamated Trading. He had himself, on occasion, bought a competitor’s product through Amalgamated’s auspices for analysis in ISI’s labs. There was no indication that Alicia had gotten into Amalgamated’s computers.
Did the soon-after change to her will mean that she’d known about the ISI/Amalgamated link?
An old photo of him and Alicia on a beach getaway sat on a bookshelf. He set it beside the workstation. “Background radio, WZAP.” Sometimes soft music helped him think. Sometimes it put him to sleep. He guessed that tonight it would have the latter effect.
“Query: what are the electronics components identified by part number in the TSC folder? Order standard product literature via my personal email account. Standard encryption.”
Justin caught himself yawning, and realized that he’d been doing so for a while. The clock in the corner of the PDA screen read 2:07 a.m. Time, and past time, for sleep. He deleted the decrypted files and went to bed.
CHAPTER 4
Aquarians: the popular name for the intelligent species of the Luyten 789-6 solar system, approximately 10.5 light years from Earth. The name comes from the constellation, Aquarius, in which Luyten 789-6 is observed. Aquarians, like earlier-discovered ET species, engage in e-commerce with their interstellar neighbors.
Although Aquarians are well regarded for their advanced computational algorithms, it is interesting to note that they compute mentally rather than by computer. Their chief import from humanity is industrial technology.
—Internetopedia
~~~
When his PDA chimed to announce an ISI-internal call, Justin was working through the accumulated backlog from his Boston trip. Over the four-day weekend, his obedient filters had filed for his later attention twenty voicemails and over three hundred business emails.
The top window on the PDA screen at that moment was the abstract of a report from ISI’s atmospheric physics department. They were responding to his forwarding of a recently received Aquarian parallel-processing technique. He’d speculated that it might be adaptable to weather forecasting. From their initial results, the computational efficiencies made practical by the Aquarian algorithm would let ISI extend their predictions by up to a day. That would be a huge advantage in marketing forecasts to agribusinesses, fishing fleets, power companies, and commodities speculators.
The PDA chimed again. This time, he glanced at the caller ID: The incoming call was from Arlen Crawford, ISI’s VP of Contracts and Justin’s boss. ISI, like most large companies, had a single technomist on staff, and Justin had to report to someone. The two men often went weeks without speaking. They went far longer without face-to-face meetings, since Arlen’s office was at ISI headquarters in Scotland. “Call accepted.”
“Justin? Are you by yourself?” On the display screen, Arlen was wearing a suit jacket and tie. Why the formality?
“Hello, Arlen. Yes, I’m in my office and alone.”
“Would you mind closing the door?”
How unusual, Justin thought to himself as he complied. “What can I do for you?”
“I have to ask about something that’s rather irregular.”
The xenotechnomist said nothing.
“Well, there’s no graceful way to bring this up, so I’ll just get right to it. Justin, the security department has informed me that you have been in contact with our TSC rivals.”
“Oh?”
“I’m told that it was on your short leave of absence. Late last night, actually.”
Justin considered. “It sounds like I have been under surveillance. Why is that, Arlen?”
His boss squirmed in his seat. “Nothing of the sort. I’m told that the security people use artificial intelligences to monitor all traffic on the corporate networks. They are curious about a message that you sent last night.”
Justin’s only recent message to TSC had been the request for product information, and that was via his private email.
“I’d like to know why you contacted TSC.”
“It was a personal matter, Arlen. There’s no cause for security to be concerned.”
“But they are concerned.”
Anger mounting, Justin wondered if his face was flushed. “How does it happen that the company sees my private email, composed at home using my personal digital assistant, and sent over the public network?”
At a loss for words, Arlen glanced off-camera. An unhappy, dark-haired man whom Justin didn’t recognize stepped into view behind Arlen’s chair. “As I’m sure you know, to transmit even personal messages requires accessing a ’net directory. Your PDA is apparently set to query an ISI directory server for address look-ups.”
So Arlen had asked whether Justin was alone while someone observed from an unviewable corner of his own office. What gall! “And you are?”
“Michael Zhang. Corporate security.”
“So you would have me believe that security monitors every name look-up to see if any employee is in contact with another company?”
“Yes.”
Justin shook his head. “I don’t accept that. Ignoring innocent ’net surfing, I know of a dozen joint ventures that ISI has with TSC. Each such project is a reason for ISI employees to have regular contacts with TSC.”
Zhang smiled, but it was not a pleasant expression. “Dr. Matthews, your beliefs are of very little interest to me. The fact that we did notice your message should, however, be important to you. Think about that.
“I will expect your prompt explanation as to why that message was sent.”
Zhang’s finger stabbed down to the top of Arlen’s desk. The call window on Justin’s PDA froze. “End of transmission.”
“Save that call,” said Justin. “Every last bit of it.”
His PDA made no comment.
“And change your default setting for directory look-up to a public server.”
~~~
What was going on?
Justin sat tipped back in a kitchen chair, his back against a wall of his dinette. The call from his boss and security made less sense each time he replayed it.
Technomics was a difficult subject; xenotechnomics was even tougher. Mastering his discipline, however, had ingrained in him a useful skill. When he couldn’t make sense of what he was looking at, he knew to mentally step back and look at the bigger picture.
So what was the bigger picture here? TSC had retained Alicia to identify the mysterious purchaser of what Justin now knew were ultra-sensitive radio receivers, items a well-funded radio astronomer might buy. She’d traced the sale to ISI, whether or not she recognized the fact, although his appointment as executor and the current ISI org chart in her archive suggested that she had. She was dead in what might truly be an accident—joyriding with a car’s automatics turned off was not unheard of—but the timing was suspicious. The subsequent disappearances of her PDA and workstation were certainly suspicious. Then came the apparent theft of her billing records for TSC and ISI, as if to remove any suggestion that she’d ever had an involvement with either megacorp. Finally, Zhang’s comments notwithstanding, Justin didn’t accept that ISI could be monitoring every employee for possible access to the TSC ’net site. Which meant that he personally was under ISI surveillance.
Through metaphorical mists a picture was emerging, but he wasn’t sure he believed it. Could he seriously contend that ISI, in which he’d been a happy employee since university, was involved in something so nefarious that it would kill to cover its tracks?
He’d brought the beach snapshot of himself and Alicia into the kitchen. Picking up the picture, he studied her face. “I will get to the bottom of this.”
She wasn’t impressed. Maybe one of the reasons they’d been such good friends was that she didn’t impress easily. Most of his college acquaintances had not known how to deal with the near-celebrity of his modestly famous parents or his excess of competence, but Alicia had understood. “Bad luck,” she’d once told him. “Two parents who played key roles in first contact with the Leos. What are you supposed to do for an encore?”
There was never any question that she’d be successful, if only in the tight-knit community of hackers—the only group whose opinion seriously mattered to her. She’d never approved of his decision to switch majors from computer science to technomics. “You’re on the slippery slope to xenotechnomics, and back into the family’s alien business.” She’d been right about his direction, wrong about his motivation ... or at least so he still thought.
“So where did hacking get you?” he finally asked the photo.
An enigmatic smile was his only answer.
~~~
“Lock.”
Recognizing Justin’s voice, his car chirped in acknowledgment. The chirp and the louder sounds of door locks engaging echoed in the cavernous garage beneath his building.
“Dr. Matthews.” The stranger stepped from behind a pillar. He was dressed in gangster-chic: trench coat and fedora. One hand was in his coat pocket, the visible hand was gloved. “May I have a word with you?”
Justin nodded. If the aim of the visit was intimidation, he was duly concerned. He was not, however, too spooked to think. He sidled towards his car, and was rewarded when the stranger, turning to follow, presented a more face-on view to one of the security cameras.
“Dr. Matthews, it would be in your best interest to be expedient in wrapping up your executor duties.”
Matthews leaned against his car. “I don’t understand.”
A humorless smile briefly manifested itself in the shadow of the hat. “Let’s not waste time. The names of executors are matters of public record. So are burglary reports.”
“I see.”
“A certain corporation would prefer that one of its consulting assignments remain confidential. They feel very strongly about this point.” The thug took his hand from his pocket. It held a thick envelope rather than the weapon Justin had been expecting. “Naturally the corporation wishes to reimburse the estate for past services rendered. We leave to your discretion the proper disposition of the funds.”
Justin took the envelope, wondering as he did so about the etiquette of bribery. Was a verbal response expected? After a long silence, he decided that it wasn’t.
“We appreciate your cooperation.” With that his visitor turned and strode swiftly from the garage.
~~~
Barbara peered dubiously from Justin’s living-room 3-V at the stack of hundred-dollar bills before him. The session was doubly encrypted, using his key and hers. The computational load from double decryption made the image jerky.
“I could use a little more input here,” he said.
“This payoff is from TSC?”
“My visitor hinted as much, without making it explicit. I don’t know that I believe it, though. The mystery is in ISI’s clandestine use of the radio parts.”
“Are there any hard facts beside the money?”
Alicia’s long-ago annoyance at Justin’s career change had come partially from the loss of a kindred spirit. Well, he may have decided not to program, let alone hack, for a living, but he’d never lost the knack. The security system in his apartment complex had proven to be no match for his skills.
Justin scanned backward through the garage’s surveillance records to an earlier time that evening. His subterfuge in the garage hadn’t worked: The thug’s face was shadowed by the brim of the hat, his features indistinct. “Mr. X here is a fact, just not a useful one.”
“I’m not so sure. Maybe I can do something with that. Send me copies?” She hummed to herself, toggling between the digital frames of his visitor. “I have software that can probably clean up the images.”
To his puzzled look she explained, “You know I teach media studies at UCLA. Sometimes I recover old film, dusty reels no one has seen in decades, stuff that’s shown up in Hollywood estate sales. That kind of old film is generally in horrible shape. Allie did up some image-enhancement software to my specs. Give me a sec.”
The humming resumed, ending after a while in a satisfied, “Ah.” She transferred an enhanced image file to Justin’s workstation. The face of Justin’s caller, slightly blurry but now quite distinct, popped onto his 3-V.
“Good work.” He studied the face, far clearer than it had been live in the dark garage. Would TSC care if their contract with Alicia became public? He saw no reason why they should. “Maybe it’s time to play a hunch.
“Computer, log onto the ISI intranet. Download the group directory for the security department. See if the enhancement from the apartment security system matches anyone there.”
His suspect’s face was still shadowed and blurry, so he wasn’t surprised that the search took a while. He found he wasn’t surprised either to learn that his visitor worked for Michael Zhang.
“There are too many odd circumstances surrounding Allie’s death. I can’t believe it’s an accident,” Barbara said.
“I don’t know if we can be sure of that yet. What seems clear is that she had discovered something very embarrassing, if not illegal, at ISI. Something major. Even if Alicia’s death was due only to a traffic accident, these people at ISI, whoever they are, still want to keep their actions secret.”
“What actions?”
He shrugged. “I’m working on that.”
CHAPTER 5
So what was going on at ISI?
That wasn’t an easy question. It was a big company, with hundreds, maybe thousands, of projects under way at any time. Justin couldn’t possibly be aware of all of them, and surely Alicia had recognized that.
What Alicia had known with precision was the type of work he did at ISI: xenotechnomics. He pondered the technologies that the various ETs had disclosed, and how ISI might best leverage them. He tried to infer from what was already known what else of value the ETs might have, and then helped lobby the ICU to order that. He tried to anticipate ET responses, to get a jump on competitors who were more passively awaiting the next years-long interstellar messaging cycle.
Huge sums were involved in being first to market with new ET technologies, and in knowing ahead of time what markets to vacate because ET was about to make them obsolete. There was also gamesmanship: Can you get the ICU to order specific technologies that ISI might be able to exploit faster than its competitors?
What did ISI secretly ordering TSC radio receivers have to do with any of this?
Sigh. For absence of a better idea, he fell back onto one of his basic principles: If it can’t hurt, try it. He was the only xenotechnomist at ISI, but he didn’t exactly work alone. He worked routinely with a number of artificial intelligences, AIs. What with his computer-science background, before (as Alicia put it) he’d turned to the dark side, Justin had implemented several personal AIs. Maybe one of them would see what he was missing.
Only none of the AIs knew any more about ISI’s interest in radio receivers than did Justin. Damn. To be thorough, he had them run self-diagnostics. All were fine. To be even more thorough, he made a final check. Every system he had ever built maintained a transaction history file, simply good programming practice in case of a system crash or subtle bug. As long as the programs ran smoothly, he had no need to check these files. He hadn’t looked at some of the logs for years.












