19
The National Cyber Crime Task Force was buried deep in the Maryland bedrock and housed a huge bank of central databases that fed
the entire law enforcement network as well as hard drives and backup files relating to hundreds of thousands of cases –
everything from simple internet scams and corporate fraud to online paedophile rings and major terrorist networks.
The main machine room was practically deserted by the time Shepherd stepped into its air-conditioned gloom. He had stopped to
splash water on his face and grab something to eat after Franklin had failed to make good on his offer to buy him a burger,
wolfing down a doughnut and a cup of coffee on his way over. No food or drink was allowed in the cyber crimes labs. A seated
figure was silhouetted against three large flatscreen monitors on the far side of the room, his fingers punching code into a
keyboard so fast it sounded like tap dancing. He turned at the sound of Shepherd’s approach and smiled a greeting. ‘Agent
Franklin said you’d be along.’
Agent Smith was one of the senior instructors in the cyber crimes division. There was a rumour that did the rounds each year that
the Agent Smith of the Matrix movies had been based on him and there was certainly more than a passing physical resemblance –
same dark hair receding from a widow’s peak, same sharp features on top of a whip-thin frame – but that was as far as the
comparison went. The real Agent Smith was just about the friendliest instructor in the building, generous with his time and
endlessly patient with those who were never going to pound the cyber beat but needed to understand enough to pass the module
anyway.
‘I’ve set you up with a ghost file,’ he said, nodding at the terminal to the right of his.
Shepherd sat at the desk and assessed the data. In cyber crime there are two types of evidence: physical and digital. Physical
evidence is the actual hardware itself. Often in the chain of evidence it has to be shown that a suspect has used a certain
computer, so fingerprints or even microscopic flakes of skin beneath the keys of keyboards are sought to prove it. Digital
evidence is different. Files and directories can be cloned or copied and worked on by several teams of people at once to crunch
the data faster. These clones are called ghost files and Shepherd was looking at one now, an exact copy of everything on Dr
Kinderman’s hard drive. ‘Find anything yet?’ he asked.
Smith continued to machine gun code into his terminal. ‘The most interesting thing I’ve found so far is nothing.’ He hit a key
and folders started opening, rippling down his main screen like a deck of cards, every single one of them empty. ‘Everything you
would expect is there up until eight months ago, then there’s nothing at all. No directories, no sub-directories, no caches.
Whoever cleaned this out really knew what they were doing.’
Shepherd had been hanging on to the hope that Smith would find something in Dr Kinderman’s personal files, an email, or a virus
that had originated elsewhere with a pathway that might give them a new lead. But the efficiency and skill with which the drive
had been forensically wiped just threw more suspicion on Kinderman. ‘You want me to start checking through the older data, see
what I can find?’
‘You can if you want but I think it will be a waste of time. Anyone this thorough is unlikely to have left anything behind – I’
m pretty sure anything incriminating on the drives would have been in the chunk of data that’s now missing. I was just about to
run it through CARBON, see what that throws up.’ He hit Return and a progress bar popped up on the screen, then he sat back with
a small grin on his face that had ‘ask me’ written all over it.
‘What’s CARBON?’ Shepherd obliged.
‘That is something very confidential that I can only divulge to you now you are a serving Special Agent. But what I am about to
tell you does not get mentioned in the classroom, understood?’ Shepherd nodded.
‘Back in the typewriter days, before photocopiers even, the only way you could get an exact copy of a typed document was to
sandwich carbon paper between two blank sheets. The force of the typewriter letters striking the top sheet would leave a carbon
trace on the bottom one, producing a copy. This application does a similar thing. It records keystrokes, only the user doesn’t
know anything about it. In fact very few people do.
‘After 9/11, when homeland security became the number one priority and the usual concerns for civil rights and privacy went out
of the window, the US Government cut a very high-level deal with all the major computer chip manufacturers. Not sure if you know
this but 99% of all the world’s microchips are made in South Korea. So you can imagine, having the American government in your
corner when you’ve got North Korea as a neighbour must have been a powerful persuader in the discussions. Anyway the deal was
simple. All they had to do in exchange for Uncle Sam’s undying gratitude and future unspecified favours was to modify their
product a little. Ever since then, each new chip produced has an extra partition of memory built into it that doesn’t show up on
any directory and can only be accessed by certain approved law enforcement agencies with the right software.’ He pointed at the
progress bar on the screen as it closed in on 100%. ‘CARBON. Basically, they created the ultimate in Spyware. Normal virus
protection doesn’t even see it because it’s not code, it’s built right into the hardware.’
The progress bar disappeared and a document opened, crammed solid with words and numbers. ‘The data is pretty raw,’ he said, his
fingers resuming their tap routine, ‘and because of the covert nature of the technology the memory cache is relatively small to
keep it hidden so it has to constantly dump old data to keep recording new stuff, just like media disks on security cameras.
Usually it holds about a week’s worth of activity. I’m just going to run a filter to split the data out a little and pick out
any hot or unusual high-frequency words.’ He executed a new command and another window popped open. ‘This is where you can make
yourself useful.’
Shepherd leaned in as words started to appear in the window, gleaned from the raw data. He recognized almost all of them.
‘Ophiuchus is a constellation,’ he said, working his way down the growing list. ‘Andromeda is a galaxy and all those long
numbers beginning with PGC are from the Principal Galaxy Catalogue. Red-Shift is an astronomical term for what happens to distant
light …’
They continued in this way for several minutes, Smith highlighted everything Shepherd recognized until they reached the bottom of
the list and Smith hit Delete to get rid of all the isolated words. There were now just two remaining:
MALA
T
Shepherd fished a notebook from his pocket and flipped back through the entries he had made at Goddard. There was the T again in
the last entry Dr Kinderman had made in his diary:
T
end of days.
A thought struck him, something about the T and what it might mean in relation to Hubble. He found the contact numbers he had
taken down and dialled one, checking the time as he waited for it to connect. The line clicked a few times before a ring tone cut
in. Shepherd held his breath as he waited for someone to answer.
The Tower A Novel (Sanctus)
Simon Toyne's books
- As the Pig Turns
- Before the Scarlet Dawn
- Between the Land and the Sea
- Breaking the Rules
- Escape Theory
- Fairy Godmothers, Inc
- Father Gaetano's Puppet Catechism
- Follow the Money
- In the Air (The City Book 1)
- In the Shadow of Sadd
- In the Stillness
- Keeping the Castle
- Let the Devil Sleep
- My Brother's Keeper
- Over the Darkened Landscape
- Paris The Novel
- Sparks the Matchmaker
- Taking the Highway
- Taming the Wind
- Tethered (Novella)
- The Adjustment
- The Amish Midwife
- The Angel Esmeralda
- The Antagonist
- The Anti-Prom
- The Apple Orchard
- The Astrologer
- The Avery Shaw Experiment
- The Awakening Aidan
- The B Girls
- The Back Road
- The Ballad of Frankie Silver
- The Ballad of Tom Dooley
- The Barbarian Nurseries A Novel
- The Barbed Crown
- The Battered Heiress Blues
- The Beginning of After
- The Beloved Stranger
- The Betrayal of Maggie Blair
- The Better Mother
- The Big Bang
- The Bird House A Novel
- The Blessed
- The Blood That Bonds
- The Blossom Sisters
- The Body at the Tower
- The Body in the Gazebo
- The Body in the Piazza
- The Bone Bed
- The Book of Madness and Cures
- The Boy from Reactor 4
- The Boy in the Suitcase
- The Boyfriend Thief
- The Bull Slayer
- The Buzzard Table
- The Caregiver
- The Caspian Gates
- The Casual Vacancy
- The Cold Nowhere
- The Color of Hope
- The Crown A Novel
- The Dangerous Edge of Things
- The Dangers of Proximal Alphabets
- The Dante Conspiracy
- The Dark Road A Novel
- The Deposit Slip
- The Devil's Waters
- The Diamond Chariot
- The Duchess of Drury Lane
- The Emerald Key
- The Estian Alliance
- The Extinct
- The Falcons of Fire and Ice
- The Fall - By Chana Keefer
- The Fall - By Claire McGowan
- The Famous and the Dead
- The Fear Index
- The Flaming Motel
- The Folded Earth
- The Forrests
- The Exceptions
- The Gallows Curse
- The Game (Tom Wood)
- The Gap Year
- The Garden of Burning Sand
- The Gentlemen's Hour (Boone Daniels #2)
- The Getaway
- The Gift of Illusion
- The Girl in the Blue Beret
- The Girl in the Steel Corset
- The Golden Egg
- The Good Life
- The Green Ticket
- The Healing
- The Heart's Frontier
- The Heiress of Winterwood
- The Heresy of Dr Dee
- The Heritage Paper
- The Hindenburg Murders
- The History of History