The Tower A Novel (Sanctus)

19





The National Cyber Crime Task Force was buried deep in the Maryland bedrock and housed a huge bank of central databases that fed

the entire law enforcement network as well as hard drives and backup files relating to hundreds of thousands of cases –

everything from simple internet scams and corporate fraud to online paedophile rings and major terrorist networks.

The main machine room was practically deserted by the time Shepherd stepped into its air-conditioned gloom. He had stopped to

splash water on his face and grab something to eat after Franklin had failed to make good on his offer to buy him a burger,

wolfing down a doughnut and a cup of coffee on his way over. No food or drink was allowed in the cyber crimes labs. A seated

figure was silhouetted against three large flatscreen monitors on the far side of the room, his fingers punching code into a

keyboard so fast it sounded like tap dancing. He turned at the sound of Shepherd’s approach and smiled a greeting. ‘Agent

Franklin said you’d be along.’

Agent Smith was one of the senior instructors in the cyber crimes division. There was a rumour that did the rounds each year that

the Agent Smith of the Matrix movies had been based on him and there was certainly more than a passing physical resemblance –

same dark hair receding from a widow’s peak, same sharp features on top of a whip-thin frame – but that was as far as the

comparison went. The real Agent Smith was just about the friendliest instructor in the building, generous with his time and

endlessly patient with those who were never going to pound the cyber beat but needed to understand enough to pass the module

anyway.

‘I’ve set you up with a ghost file,’ he said, nodding at the terminal to the right of his.

Shepherd sat at the desk and assessed the data. In cyber crime there are two types of evidence: physical and digital. Physical

evidence is the actual hardware itself. Often in the chain of evidence it has to be shown that a suspect has used a certain

computer, so fingerprints or even microscopic flakes of skin beneath the keys of keyboards are sought to prove it. Digital

evidence is different. Files and directories can be cloned or copied and worked on by several teams of people at once to crunch

the data faster. These clones are called ghost files and Shepherd was looking at one now, an exact copy of everything on Dr

Kinderman’s hard drive. ‘Find anything yet?’ he asked.

Smith continued to machine gun code into his terminal. ‘The most interesting thing I’ve found so far is nothing.’ He hit a key

and folders started opening, rippling down his main screen like a deck of cards, every single one of them empty. ‘Everything you

would expect is there up until eight months ago, then there’s nothing at all. No directories, no sub-directories, no caches.

Whoever cleaned this out really knew what they were doing.’

Shepherd had been hanging on to the hope that Smith would find something in Dr Kinderman’s personal files, an email, or a virus

that had originated elsewhere with a pathway that might give them a new lead. But the efficiency and skill with which the drive

had been forensically wiped just threw more suspicion on Kinderman. ‘You want me to start checking through the older data, see

what I can find?’

‘You can if you want but I think it will be a waste of time. Anyone this thorough is unlikely to have left anything behind – I’

m pretty sure anything incriminating on the drives would have been in the chunk of data that’s now missing. I was just about to

run it through CARBON, see what that throws up.’ He hit Return and a progress bar popped up on the screen, then he sat back with

a small grin on his face that had ‘ask me’ written all over it.

‘What’s CARBON?’ Shepherd obliged.

‘That is something very confidential that I can only divulge to you now you are a serving Special Agent. But what I am about to

tell you does not get mentioned in the classroom, understood?’ Shepherd nodded.

‘Back in the typewriter days, before photocopiers even, the only way you could get an exact copy of a typed document was to

sandwich carbon paper between two blank sheets. The force of the typewriter letters striking the top sheet would leave a carbon

trace on the bottom one, producing a copy. This application does a similar thing. It records keystrokes, only the user doesn’t

know anything about it. In fact very few people do.

‘After 9/11, when homeland security became the number one priority and the usual concerns for civil rights and privacy went out

of the window, the US Government cut a very high-level deal with all the major computer chip manufacturers. Not sure if you know

this but 99% of all the world’s microchips are made in South Korea. So you can imagine, having the American government in your

corner when you’ve got North Korea as a neighbour must have been a powerful persuader in the discussions. Anyway the deal was

simple. All they had to do in exchange for Uncle Sam’s undying gratitude and future unspecified favours was to modify their

product a little. Ever since then, each new chip produced has an extra partition of memory built into it that doesn’t show up on

any directory and can only be accessed by certain approved law enforcement agencies with the right software.’ He pointed at the

progress bar on the screen as it closed in on 100%. ‘CARBON. Basically, they created the ultimate in Spyware. Normal virus

protection doesn’t even see it because it’s not code, it’s built right into the hardware.’

The progress bar disappeared and a document opened, crammed solid with words and numbers. ‘The data is pretty raw,’ he said, his

fingers resuming their tap routine, ‘and because of the covert nature of the technology the memory cache is relatively small to

keep it hidden so it has to constantly dump old data to keep recording new stuff, just like media disks on security cameras.

Usually it holds about a week’s worth of activity. I’m just going to run a filter to split the data out a little and pick out

any hot or unusual high-frequency words.’ He executed a new command and another window popped open. ‘This is where you can make

yourself useful.’

Shepherd leaned in as words started to appear in the window, gleaned from the raw data. He recognized almost all of them.

‘Ophiuchus is a constellation,’ he said, working his way down the growing list. ‘Andromeda is a galaxy and all those long

numbers beginning with PGC are from the Principal Galaxy Catalogue. Red-Shift is an astronomical term for what happens to distant

light …’

They continued in this way for several minutes, Smith highlighted everything Shepherd recognized until they reached the bottom of

the list and Smith hit Delete to get rid of all the isolated words. There were now just two remaining:

MALA

T

Shepherd fished a notebook from his pocket and flipped back through the entries he had made at Goddard. There was the T again in

the last entry Dr Kinderman had made in his diary:

T

end of days.

A thought struck him, something about the T and what it might mean in relation to Hubble. He found the contact numbers he had

taken down and dialled one, checking the time as he waited for it to connect. The line clicked a few times before a ring tone cut

in. Shepherd held his breath as he waited for someone to answer.





Simon Toyne's books